Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Secure Coding Podcasts
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
Discussions with regulators, top lawyers and entrepreneurs about the legal framework for blockchain technology. We look at international regulations, trends, and jurisprudence impacting crypto and its related parts.
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Bask in the simple joys of being right. The Michael Knowles Show cuts through the madness of our politics and culture, analyzing the top stories of the day. Monday through Friday. If you like The Michael Knowles Show, become a Daily Wire member TODAY with promo code: KNOWLES and enjoy the exclusive benefits for 25% off at https://utm.io/ueEss
…
continue reading
Welcome to the Code. Deploy. Go Live. podcast! By Microsoft MVPs Andrew Connell and Julie Turner, our mission is to deliver prescriptive guidance on Microsoft 365 and Azure for Full-Stack Developers. Get the latest news, discussions, and interviews on topics ranging from Microsoft 365, Microsoft Azure, and related topics. For developers, by developers!
…
continue reading
Stories from the world of hacking, cybersecurity, and rogue AI. Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million dow ...
…
continue reading
A show about the perils & pitfalls of creative intellectual automation; and why the future of good Internet vibes is for the humans, by the humans.
…
continue reading
Revenera experts are joined by industry leaders for discussions on all the latest talking points in the world of software.
…
continue reading
Welcome to Beyond the Code, the podcast where we dive into the legal, regulatory, and ethical issues surrounding emerging technologies. Each week, we bring you in-depth conversations with industry experts, discussing the latest advancements in technology and their implications on society and the legal system. From artificial intelligence to blockchain, we'll be exploring all the hot topics in the field. Your host, Yitzy Hammer, a lawyer and tech enthusiast, is joined by a diverse group of ex ...
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Join in on weekly podcasts that aim to illuminate how AI transforms cybersecurity—exploring emerging threats, tools, and trends—while equipping viewers with knowledge they can use practically (e.g., for secure coding or business risk mitigation). Brought to you by the experts at Black Hills Information Security https://blackhillsinfosec.com -------------------------------------------------- About Joff Thyer - https://blackhillsinfosec.com/team/joff-thyer/ About Derek Banks - https://blackhil ...
…
continue reading
The cybersecurity podcast about application security and those who practice it. Hosted by tech industry veterans, each episode focuses on a specific area of cybersecurity, with the hosts and their guests sharing their practitioners’ experiences and opinions, sprinkled liberally with a solid dose of humor and anecdotes.
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
Podcast by Skyscanner
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
The Security Podcast of Silicon Valley invites founders, engineers, and security leaders to share how they tackle compliance, growth, and real-world security challenges—turning obstacles into strategic advantages. Brought to you by YSecurity.
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast, and so are the conversations that shape it. Welcome to The Security Champions Podcast, the go-to resource for insights from the front lines of application security. The podcast is cohosted by Michael Burch, Director of Application Security for Security Journey, and Dustin Lehr, the Director of AppSec Advocacy. Each month, one of them shares a candid conversation with security leaders, engineering voic ...
…
continue reading
Software Unscripted, A weekly podcast of casual conversations about code hosted by Richard Feldman. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
We created Enginears as a place to share Engineering stories and to aid knowledge sharing and discovery into how companies build their products. Hosted on Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
As organizations accelerate their adoption of generative AI and intelligent agents to transform how they build and manage solutions, IT professionals and developers are expanding their expertise to design, deploy, and govern AI-powered systems—leveraging Microsoft Copilot Studio and Azure AI Foundry to integrate collaboration tools, enforce enterprise-grade compliance, and support both low-code and pro-code development. With built-in security frameworks, governance controls, and seamless int ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
Stories from the most powerful women you've never heard of. Eighty years ago, Eloise Page joined the OSS, trailblazing a path for what ultimately became the United States Intelligence Community. She rose the ranks from secretary to case officer, defying the norms of her time, and eventually became the first female Chief of Station at CIA. Along the way, Eloise earned the code name “Iron Butterfly.” These are the women who have shaped our world, and whose influence continues to ripple through ...
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Larry and Kerry talk about parenting issues during Covid-19 isolation period
…
continue reading
The podcast of foojay.io, a central resource for the Java community’s daily information needs, a place for friends of OpenJDK, and a community platform for the Java ecosystem — bringing together and helping Java professionals everywhere.
…
continue reading
Listen for today's top stories, with context, in just 15 minutes. Get informed from Bloomberg's 3,000 journalists and analysts.
…
continue reading
1
Chapter 1: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill.
15:30
15:30
Play later
Play later
Lists
Like
Liked
15:30Chapter 1: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill.
…
continue reading
1
020 | Ignite 2025: Agents, Copilot APIs & Security Copilot
59:45
59:45
Play later
Play later
Lists
Like
Liked
59:45Join Andrew Connell and Julie Turner as they recap Microsoft Ignite 2025, diving deep into the latest announcements for developers. They discuss Agent 365's new governance capabilities, Copilot API updates, including retrieval and search features, and exciting declarative agent enhancements. The hosts also cover Security Copilot's inclusion with E5…
…
continue reading
1
Vibe Coding For Success and Failure - PSW #902
1:06:52
1:06:52
Play later
Play later
Lists
Like
Liked
1:06:52Tune in for some hands-on tips on how to use Claude code to create some amazing and not-so-amazing software. Paul will walk you through what worked and what didn't as he 100% vibe-coded a Python Flask application. The discussion continues with the crew discussing the future of vibe coding and how AI may better help in creating and securing software…
…
continue reading
1
EP 76: Why Security Certs for New Medical Devices Might Just Work
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50Diversity in healthcare devices complicates segmentation, security controls, and zero-trust approaches. New certifications aim to help. Bob Lyle, CRO of Medcrypt, identifies how layered defenses, rigorous cybersecurity requirements for new devices, continuous monitoring, and dark-web credential surveillance can reduce risk.…
…
continue reading
1
The Trust Trap - Security von Coding Assistants (god2025)
43:05
43:05
Play later
Play later
Lists
Like
Liked
43:05Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
…
continue reading
You think you’re slick hiding gifts in the trunk of the car? Please. The modern snoop is high tech. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
Did Somalians really build America? Michael Knowles breaks down the viral claim sweeping TikTok and X — separating historical fact from political fantasy. In just four minutes, Knowles explains where the narrative came from, what the data actually shows, and why activists keep pushing these revisionist talking points. If you've seen the memes, the …
…
continue reading
Time honors the architects of AI with a cover photo that proves the magazine has no idea how to actually use it. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
The Hidden Danger of Storing Secrets Online | Interview with Jake Knott from Watchtower
38:16
38:16
Play later
Play later
Lists
Like
Liked
38:16In this episode of Cybersecurity Today, host Jim Love discusses the shocking discovery of over 80,000 leaked credentials and secrets in online code formatting tools with Jake Knott, a principal security researcher from Watchtower. They delve into the vulnerabilities exposed by these tools, the inadvertent leaking of sensitive information, and how a…
…
continue reading
1
Agents, MCP, and Graph Databases: Java Developers Navigate the AI Revolution (#86)
1:03:35
1:03:35
Play later
Play later
Lists
Like
Liked
1:03:35The AI revolution isn't replacing Java developers. No, it's forcing us to think harder. Welcome to another episode of the Foojay Podcast! Today, we're talking about AI and Java, how it's changing the way we work, what we need to watch out for, and why understanding what's really happening matters more than ever. I recorded interviews at Devoxx and …
…
continue reading
The labor market has swung from the Great Resignation to “job hugging,” where workers cling to their roles out of fear of AI-driven layoffs and inflation, crushing engagement and accelerating burnout. At the same time, OpenAI is accused of suppressing research showing job losses, ignoring internal warnings about chatbot mental health risks, and ble…
…
continue reading
1
Silencio Hacker Misa Negra en Vivo. En ESPAÑOL.
15:21
15:21
Play later
Play later
Lists
Like
Liked
15:21"Las fuentes contienen extractos de una discusión de audio en varias partes, aparentemente un podcast o un chat en vivo, donde los oradores exploran temas relacionados con el satanismo, el luciferismo, el ocultismo y el hacking. La conversación se centra fuertemente en las diferencias filosóficas entre estos sistemas de creencias y las religiones t…
…
continue reading
1
Disney Gone Wild, Docker, AIs, Passkeys, Gogs, React2Shell, Notepad++, Josh Marpet... - SWN #537
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38Disney Gone Wild, Docker, AIs, Passkeys, Gogs, React2Shell, Notepad++, Josh Marpet, and More Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-537
…
continue reading
1
Daybreak Weekend: Jobs Preview, Paris Conference, BOJ Decision
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19Bloomberg Daybreak Weekend with Host Nathan Hager take a look at some of the stories we'll be tracking in the coming week. In the US – a look ahead to the November jobs report and quarterly earnings from Nike. In the UK – a look ahead to the Conference of Paris. In Asia – a look ahead to the next monetary policy decision from the Bank of Japan. See…
…
continue reading
1
Disney Gone Wild, Docker, AIs, Passkeys, Gogs, React2Shell, Notepad++, Josh Marpet... - SWN #537
30:38
30:38
Play later
Play later
Lists
Like
Liked
30:38Disney Gone Wild, Docker, AIs, Passkeys, Gogs, React2Shell, Notepad++, Josh Marpet, and More Show Notes: https://securityweekly.com/swn-537
…
continue reading
1
Narco-Cults Luciferianism and Hacking Philosophy
32:03
32:03
Play later
Play later
Lists
Like
Liked
32:03The sources contain excerpts from a multi-part audio discussion, seemingly a podcast or live chat, where the speakers explore topics related to satanism, luciferianism, occultism, and hacking. The conversation focuses heavily on philosophical differences between these belief systems and traditional religions, particularly Christianity, with an emph…
…
continue reading
1
Psychopathy, Satanism, and Culture Jamming. RAW AUDIO FILE FROM X SPACES.
5:40:13
5:40:13
Play later
Play later
Lists
Like
Liked
5:40:13The sources contain excerpts from a multi-part audio discussion, seemingly a podcast or live chat, where the speakers explore topics related to satanism, luciferianism, occultism, and hacking. The conversation focuses heavily on philosophical differences between these belief systems and traditional religions, particularly Christianity, with an emph…
…
continue reading
Just like milk or eggs, your devices can go bad. Here's how to tell in this short podcast. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
Estafas románticas de IA un ex-criminal habla
16:28
16:28
Play later
Play later
Lists
Like
Liked
16:28Estafas románticas de IA un ex-criminal habla
…
continue reading
El enigma de @spydirbyte
…
continue reading
The enigma of @spydirbyte
…
continue reading
cybermidnight random raw audio
…
continue reading
cybermidnight random
…
continue reading
1
Question from Nicole Eggert (Baywatch) about my story and case
1:10
1:10
Play later
Play later
Lists
Like
Liked
1:10Question from Nicole Eggert (Baywatch) about my story and case. For the ep25. anniversary edition
…
continue reading
LOGIN TO HELL; the audio book Get the full ebook soon, The kindle version https://amzn.to/3P61vuY
…
continue reading
RAW AUDIO SPACES
…
continue reading
1
SILENCED: A BANNER PODCAST EPISODE: This is what they did with me at another scale.
1:48:45
1:48:45
Play later
Play later
Lists
Like
Liked
1:48:45This is what they did with me at another scale. The basis are the same. 3 Things can no long be hidden, the sun, the moon and the truth... Tommy Robinson (@TRobinsonNewEra) exposes far-left hate group 'Hope Not Hate'. Tommy produces audio/video evidence that proved that Hope Not Hate pays people to tell lies.…
…
continue reading
1
The Prophet Ignored: A Bank Goes Dark in Uruguay.
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59- The catastrophic cyberattack that validated Alberto Daniel Hill's prophecy involved the theft of 30,000 of Uruguay's national PKI certificates. This event, described as a "devastating nationaltering crisis" and a "catastrophic cyber failure," occurred a few years after ADH's initial public warning.1. Nature of the Attack: A hacker, calling themse…
…
continue reading
1
ALBERTO PRESIDENT RAW AUDIO PART 1
11:54:36
11:54:36
Play later
Play later
Lists
Like
Liked
11:54:36ALBERTO PRESIDENT RAW AUDIO PART 1
…
continue reading
1
Ep. 1874 - Alleged Charlie Kirk Assassin Smirks During First Court Hearing
52:49
52:49
Play later
Play later
Lists
Like
Liked
52:49Charlie Kirk’s alleged assassin finally appears in court, a Catholic mystic predicts tensions in Venezuela could have global consequences, and Netflix's newest movie makes everything Opposites Day. Ep.1874 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlri - - - Today's Sponsors: Catholic Match - Download the a…
…
continue reading
Cybersecurity Today: Spider-Man Phishing Kit, Gogs Zero-Day Exploits, and Recent Patches In this episode, host Jim Love discusses recent cybersecurity issues including the Spider-Man phishing kit targeting European banks and cryptocurrency users, a zero-day vulnerability in the self-hosted Git service Gogs, and various security updates. The Spider-…
…
continue reading
1
Oxford's word of the year 2025 is 'rage bait'
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45Scroll. Get mad. Leave a comment. Repeat. If you’ve ever felt manipulated into arguing with a stranger online, you’ve fallen for the trap. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
Trump Offers Ukraine Security, UK Gilt Penalty Fades, Europe's AI Giant
21:25
21:25
Play later
Play later
Lists
Like
Liked
21:25Your morning briefing, the business news you need in just 15 minutes. On today's podcast: (1) President Donald Trump said the US would be willing to contribute assistance to Ukraine as part of a security agreement to end the war with Russia, but continued to express frustration with the pace of talks. (2) The seizure of an enormous oil supertanker …
…
continue reading
1
Interface is everything, and everything is an interface
24:28
24:28
Play later
Play later
Lists
Like
Liked
24:28Ryan talks with Wesley Yu, head of engineering at Metalab, about the evolution of interfaces in technology, the pressure that UI generated on the fly would put on your backend systems, and why AI is just the latest and fanciest in a long line of CRUD apps. Episode notes: Metalab designs interfaces for top brands around the world, helping them desig…
…
continue reading
1
SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack
6:56
6:56
Play later
Play later
Lists
Like
Liked
6:56Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 Mystery Google Chrome 0-Day Vulnerability Google released an update for Google Chrome fixing a vulne…
…
continue reading
1
Tech Segment: MITM Automation + Security News - Josh Bressers - PSW #904
2:07:47
2:07:47
Play later
Play later
Lists
Like
Liked
2:07:47This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
…
continue reading
1
Tech Segment: MITM Automation + Security News - Josh Bressers - PSW #904
2:07:47
2:07:47
Play later
Play later
Lists
Like
Liked
2:07:47This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
…
continue reading
1
Tech Segment: MITM Automation + Security News - Josh Bressers - PSW #904
2:07:47
2:07:47
Play later
Play later
Lists
Like
Liked
2:07:47This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
…
continue reading
1
Tech Segment: MITM Automation + Security News - Josh Bressers - PSW #904
2:07:47
2:07:47
Play later
Play later
Lists
Like
Liked
2:07:47This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
…
continue reading
🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com AI News | Episode 33 In this episode of BHIS Presents: AI Security Ops, the panel dives into the latest developments shaping the AI security landscape. From the first documented AI-orchestrated cyber-espionage campaign to polymorphic malware powered by Gemini, we…
…
continue reading
Flying soon? Look at your boarding pass. Spot these codes and you could get bumped off your flight. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Kim Komando
…
continue reading
1
Ep. 1873 - Erika Kirk Addresses Assassination Conspiracies
49:29
49:29
Play later
Play later
Lists
Like
Liked
49:29Erika Kirk addresses conspiracy theories surrounding her husband's assassination, the U.S. seizes a Venezuelan oil tanker, and Marco Rubio destroys woke fonts. Ep.1873 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlri - - - Today's Sponsors: CrowdHealth - Join CrowdHealth to get started today for $99 for your …
…
continue reading
1
Defending Your Cyber Systems and Your Mental Attack Surface with Chris Hughes
34:10
34:10
Play later
Play later
Lists
Like
Liked
34:10When your firewall forgets to buckle up, the crash doesn’t happen in the network first, it happens in your blindspots. In this episode, Ron is joined by returning guest Chris Hughes, Co-Founder of Aquia and host of the Resilient Cyber podcast. Chris helps reframe vulnerability work as exposure management, connect technical risk to human resilience,…
…
continue reading