Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Security Management Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
The BUILDINGS Podcast presents the latest developments and practices in facility management from energy management, lowering operating costs, maintenance of commercial buildings, life and safety, sustainability, green issues, project management, security, building performance and much more. Find more facility management news at www.buildings.com Send any comments or questions to [email protected] Support this podcast: https://podcasters.spotify.com/pod/show/buildings-podcast/support
…
continue reading
Welcome to Church Security Talk – your go-to resource for church safety and security. Join host Simon Osamoh, an ex-UK detective, former head of counterterrorism at Mall of America, Minnesota and church security expert. As he shares tips and tool to help your church stay safe and secure! Stay protected and informed with our online training courses visit worshipsecurity.org.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Federal News Network Executive Editor Jason Miller talks to federal chief information officers about the latest technology trends and issues facing their agencies.
…
continue reading
Weekly market commentary by Hedge Fund Manager Erik Townsend and interviews with the brightest minds in the world of finance and macroeconomics. Made possible by funding from Fourth Turning Capital Management, LLC
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
Jake Voll brings security industry professionals together to discuss best practices, challenges, and opportunities.
…
continue reading
News, views, and insights into the cybersecurity realm produced by Greg Johnson, CEO of Webcheck Security. www.webchecksecurity.com
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
Secure Money Advisors is a licensed fiduciary in Pittsburgh, PA that develops holistic approaches to retirement planning. From annuities to wealth management and basic retirement planning, we offer a broad array of financial products and services clients need to succeed.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Do It Fuh Grantley is a life and finance podcast produced by Fortress Fund Managers, where we speak with women and men in Barbados about their Grantleys and other money matters.
…
continue reading

1
Cybersecurity, Privacy, Risk Management, Cryptocurrencies, Fintech, Information Technology
Shahid Sharif
Career guidance & consulting services in Information Technology, Cybersecurity, Privacy, Risk Management, Cryptocurrencies, & Fintech #self improvement # productivity #cybersecurity #security #privacy #risk #fintech #blockchain #cryptocurrencies
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
Brian Duff, host of the Mind 4 Survival prepping podcast, helps preparedness minded people be more safe, confident and prepared so they can better protect themselves, their families, and loved ones when it matters most.
…
continue reading
The United States is in the midst of a dramatic political realignment with shifting views on national security, economics, technology, and the role of government in our lives. Saagar Enjeti and Marshall Kosloff explore this with thinkers, policymakers, and more.
…
continue reading
The Enterprise Mobility Roundup takes a look at mobility in the enterprise, focusing on workforce devices, business applications and the technology behind them.
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
Produced by Products That Count, a 501(c)3 nonprofit that helps everyone build great products, this podcast is an award-winning show by and for product minds, with millions of downloads and a 5-star rating on most major platforms. Each of the 300+ episodes features a product leader interviewing another product leader and exploring what it takes to build great products. Recent ones feature the Chief Product Officers of Brex, Glassdoor, Experian and more. About Us: Products that Count is a 501 ...
…
continue reading
Identity at the Center is a weekly podcast all about identity security in the context of identity and access management (IAM). With decades of real-world IAM experience, hosts Jim McDonald and Jeff Steadman bring you conversations with news, topics, and guests from the identity management industry. Do you know who has access to what?
…
continue reading
Tech Disruptors by Bloomberg Intelligence features conversations with thought leaders and management teams on disruptive trends. Topics covered in this series include cloud, e-commerce, cybersecurity, AI, 5G, streaming, advertising, EVs, automation, crypto, fintech, AR/VR, metaverse and Web 3.0. This podcast is intended for professional investors only. It is being prepared solely for informational purposes only and does not constitute an offer or investment advice.
…
continue reading
The Logistics of Logistics is a podcast hosted by industry expert Joe Lynch. Joe interviews founders, executives, and innovators who are shaping the future of logistics and supply chain. Topics include transportation, logistics, warehousing, technology, supply chain, and ecommerce. The Logistics of Logistics audience expects an inside perspective of what’s next in logistics and supply chain delivered via podcasts, videos, and articles. Topics include: Transportation Topics Small package, Sma ...
…
continue reading
Star Link emphasizes in providing corporate organizations with all types of biometric attendance system & access control system and all most all types of softwares to speed up HRs, Admin & Top Most Management with smooth an effective workflow.
…
continue reading

1
Managing online security throughout the decades.
43:09
43:09
Play later
Play later
Lists
Like
Liked
43:09This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with some more chicken follow up, this week, delving into malware-relat…
…
continue reading

1
Tomcat Manager Attacks: 400 IPs in Coordinated Brute-Force Attack
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49On June 5, 2025, GreyNoise flagged a massive spike in coordinated brute-force login attempts targeting Apache Tomcat Manager interfaces. Nearly 400 unique IP addresses, many traced back to DigitalOcean infrastructure, were involved in a widespread and opportunistic campaign. In this episode, we dissect the attack pattern, what makes Apache Tomcat a…
…
continue reading

1
SANS Stormcast June, Tuesday, June 10th, 2025: Octosql; Mirai vs. Wazuh DNS4EU; Wordpress Fair Package Manager
6:09
6:09
Play later
Play later
Lists
Like
Liked
6:09OctoSQL & Vulnerability Data OctoSQL is a neat tool to query files in different formats using SQL. This can, for example, be used to query the JSON vulnerability files from CISA or NVD and create interesting joins between different files. https://isc.sans.edu/diary/OctoSQL+Vulnerability+Data/32026 Mirai vs. Wazuh The Mirai botnet has now been obser…
…
continue reading

1
Is Security Well-Positioned to Influence Decisions Around School System Funding and Arming Guards?
26:30
26:30
Play later
Play later
Lists
Like
Liked
26:30Brandon Payne, executive director for the National Council on School Facilities, joins this month’s episode of Security Management Highlights to discuss how to integrate security and safety into school facility planning and funding during both retrofits and new builds. Then, Kevin Jones, CPP, PCI, addresses key considerations for arming security pr…
…
continue reading

1
The Evolution of Patch Management with Eric Schultze
24:02
24:02
Play later
Play later
Lists
Like
Liked
24:02Join us for a stroll down patch memory lane! Ivanti's Chris Goettl invites an old colleague to the show -- Eric Schultze, a former software development leader at Amazon, Microsoft, and Shavlik Technologies -- to look back on the early days of Patch Tuesday and how patch management has evolved over the decades since. Join the conversation online on …
…
continue reading

1
How Cyberattacks on Mainline Health and Select Medical Exposed Over 200,000 Patients
45:10
45:10
Play later
Play later
Lists
Like
Liked
45:10The healthcare industry is facing a relentless wave of cyber threats, as demonstrated by two recent breaches impacting Mainline Health Systems and Select Medical Holdings. In April 2024, Mainline Health experienced a direct ransomware attack by the Inc Ransom group, compromising sensitive data for over 101,000 individuals. Select Medical’s breach, …
…
continue reading

1
Vercel COO on Scaling the AI-Native Web Stack
44:26
44:26
Play later
Play later
Lists
Like
Liked
44:26Front-end development is rapidly evolving, driven by large-language models, agentic workflows and serverless architecture — enabling smarter, scalable apps and blurring front- and back-end boundaries. In this episode of the Tech Disruptors podcast, Vercel’s Chief Operating Officer Jeanne DeWitt Grosser joins Bloomberg Intelligence senior analyst Su…
…
continue reading

1
The Siemens-Microsoft Antivirus Dilemma Threatening OT Security
1:23:55
1:23:55
Play later
Play later
Lists
Like
Liked
1:23:55This episode examines a serious conflict between Siemens’ Simatic PCS industrial control systems and Microsoft Defender Antivirus. The absence of an "alert only" mode in Defender has created a significant operational risk for plants running Siemens’ systems. Without this functionality, operators must choose between ignoring potential malware detect…
…
continue reading

1
Prometei Botnet’s Global Surge: A Threat to Linux and Windows Systems Alike
41:20
41:20
Play later
Play later
Lists
Like
Liked
41:20Prometei is one of the most persistent and sophisticated botnet threats in circulation today. First identified in 2020—and active since at least 2016—this modular malware continues to evolve rapidly, targeting both Windows and Linux systems across the globe. Originally designed for cryptocurrency mining, Prometei has expanded its capabilities to in…
…
continue reading

1
#357 - Sponsor Spotlight - Silverfort
1:02:45
1:02:45
Play later
Play later
Lists
Like
Liked
1:02:45This episode is sponsored by Silverfort. Visit silverfort.com for more. In this sponsored episode of the Identity at the Center Podcast, Jeff and Jim sit down with Hed Kovetz, CEO and Co-founder at Silverfort. They discuss the rapid evolution in the identity security space, Silverfort's groundbreaking innovations, and the critical role of AI and no…
…
continue reading

1
EP 554 - Orpheus Ocean CEO on Leveraging Deep Ocean Data Intelligence Solutions to Develop and Deploy Blue Economy Technologies
35:53
35:53
Play later
Play later
Lists
Like
Liked
35:53What will it truly take to build and scale the technologies that can reverse climate change? The scale and urgency of the transformation required to fight climate change has never been more clear. Building hardware and software products, acquiring the funding and creating a diverse community to enhance talent capacity and to drive innovation, is es…
…
continue reading

1
EP 131 Tim Wenzel on "Targeted: CEOs, Culture, and the Fallout We Didn't Predict'
54:40
54:40
Play later
Play later
Lists
Like
Liked
54:40Send us a text 🔑 Top Talking Points: “Targeted: CEOs, Culture, and the Fallout We Didn't Predict” The Assassination of Brian Thompson – Overview of the attack, public reaction, and why so little is known about the case – The transformation of the attacker into a disturbing “folk hero” among some Gen Z communities Executive Risk in a Post-COVID Worl…
…
continue reading

1
Inside Edge of Honor: Brad Thor on Duty and Danger
31:19
31:19
Play later
Play later
Lists
Like
Liked
31:19Join Fred Burton as he interviews bestselling author Brad Thor to discuss his latest thriller, Edge of Honor. Brad shares the inspiration behind the book, blending patriotism, traditional spycraft, and modern geopolitical tensions, and dives into the challenges of crafting realistic fiction while staying grounded in current events. He also explores…
…
continue reading

1
559 | Saagar Enjeti: What's Next for America and Iran?
1:02:05
1:02:05
Play later
Play later
Lists
Like
Liked
1:02:05REALIGNMENT NEWSLETTER: https://therealignment.substack.com/ PURCHASE BOOKS AT OUR BOOKSHOP: https://bookshop.org/shop/therealignment Email Us: [email protected] Back from paternity leave, Saagar Enjeti returns to The Realignment. Marshall and Saagar discuss the aftermath of U.S.-Israeli airstrikes on Iran's nuclear program, how the operatio…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each scans than they used to, but the average length of passwords did not change. https://isc.sans.edu/diary/Quick%20Pass…
…
continue reading

1
Patient Trust on the Line: The Fallout from McLaren Health Care’s 2024 Breach
44:50
44:50
Play later
Play later
Lists
Like
Liked
44:50In this episode, we dive into the 2024 McLaren Health Care data breach that compromised the sensitive information of over 743,000 individuals—just one year after a similar ransomware attack impacted 2.2 million. We’ll unpack the timeline of the attack: how cybercriminals gained unauthorized access between July 17 and August 3, exploiting vulnerabil…
…
continue reading

1
REPOST: The Revenue Engine with Kara Smith Brown
59:31
59:31
Play later
Play later
Lists
Like
Liked
59:31Kara Brown and Joe Lynch discuss the revenue engine. Kara is the Founder and CRO of LeadCoverage, the premier B2B marketing and PR firm dedicated to helping logistics companies increase lead generation through targeted marketing strategies and media coverage. About Kara Brown A prominent thought leader in B2B go-to-market strategy, Kara Smith Brown…
…
continue reading

1
Iran’s digital threat after U.S. strikes.
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35Cybersecurity warnings about possible Iranian retaliation have surged. A potential act of sabotage disrupts the NATO Summit in The Hague. Canadian cybersecurity officials discover Salt Typhoon breached a major telecom provider. The U.S. House bans WhatsApp from all government devices. APT28 uses Signal chats in phishing campaigns targeting Ukrainia…
…
continue reading

1
NeuralTrust’s Echo Chamber: The AI Jailbreak That Slipped Through the Cracks
56:30
56:30
Play later
Play later
Lists
Like
Liked
56:30This podcast dives deep into one of the most pressing vulnerabilities in modern AI — the rise of sophisticated "jailbreaking" attacks against large language models (LLMs). Our discussion unpacks a critical briefing on the evolving landscape of these attacks, with a spotlight on the novel “Echo Chamber” technique discovered by NeuralTrust. Echo Cham…
…
continue reading

1
Cybersecurity in Retail Amidst Escalating Attacks
10:42
10:42
Play later
Play later
Lists
Like
Liked
10:42Myke Lyons, CISO at Cribl, discusses cybersecurity in retail, especially in relation to the recent string of attacks against the sector.
…
continue reading

1
AT&T, Verizon, and Beyond: How Salt Typhoon Targets Global Telcos
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06In this episode, we dive deep into the alarming revelations about Salt Typhoon—a Chinese state-sponsored advanced persistent threat (APT) actor, also known as RedMike, Earth Estries, FamousSparrow, GhostEmperor, and UNC2286. Backed by China’s Ministry of State Security (MSS), this group has been running extensive cyber espionage operations since at…
…
continue reading

1
Fake Microsoft, Netflix, & Apple Support: The Scam Lurking in Google Search
32:40
32:40
Play later
Play later
Lists
Like
Liked
32:40In this eye-opening episode, we break down a sophisticated new trend in tech support scams (TSS) that’s catching even the most cautious users off guard. Scammers are now hijacking Google Ads and manipulating search results to funnel users—who are simply looking for help—to malicious phone numbers injected directly into legitimate websites like Appl…
…
continue reading
In this episode, Greg Schaffer interviews James Pham, CEO and co-founder of Opsin, who shares his unique journey from chemistry medalist in high school to tech entrepreneur. James discusses how his academic and professional path took him from studying in Korea and working in Singapore to pursuing his entrepreneurial dream in the U.S., eventually ea…
…
continue reading
While the tech world watches Hewlett Packard Enterprise’s proposed acquisition of Juniper Networks unfold, Juniper is still moving ahead. CEO Rami Rahim joins Bloomberg Intelligence’s Woo Jin Ho to unpack how Juniper is seizing the AI moment and driving market-share gains with cutting-edge innovations like 800G AI switching and Mist AI. From cloud …
…
continue reading

1
Securing AI Agents; Using AI Agents for Security
29:31
29:31
Play later
Play later
Lists
Like
Liked
29:31Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss the emerging concept of AI agents, their implications for security, and how Microsoft is integrating these technologies into their solutions. They explore the evolution of AI from simple prompt-response interactions to autonomous agents capable of making decisions and…
…
continue reading

1
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336
1:01:18
1:01:18
Play later
Play later
Lists
Like
Liked
1:01:18Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
…
continue reading

1
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336
1:01:18
1:01:18
Play later
Play later
Lists
Like
Liked
1:01:18Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
…
continue reading

1
OWASP vulnerable and outdated components (noun) [Word Notes]
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. Audio reference Link: "The…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%20AtHome%20IP%20Cameras/32062 Critical Netscaler Security Update CVE-2025-5777 CVE 2025-5777 is a critical severity vu…
…
continue reading

1
From Malware to Court: Qilin Ransomware’s ‘Call a Lawyer’ Tactic
43:58
43:58
Play later
Play later
Lists
Like
Liked
43:58In this episode, we take a deep dive into the Qilin ransomware group — now regarded as the world’s leading ransomware-as-a-service (RaaS) operation — and explore how it’s reshaping the cybercrime landscape in 2025. Qilin, also known as Agenda, burst onto the scene in 2022 with a Go-based ransomware. It has since evolved into a highly evasive Rust-b…
…
continue reading
US warns of heightened risk of Iranian cyberattacks. Cyber warfare has become central to Israel and Iran’s strategies. Oxford City Council discloses data breach. Europe aiming for digital sovereignty. Michigan hospital network says data belonging to 740,000 was stolen by ransomware gang. RapperBot pivoting to attack DVRs. A picture worth a thousand…
…
continue reading

1
Zero-Click, Zero-Warning: The FreeType Flaw Behind a Spyware Surge
57:15
57:15
Play later
Play later
Lists
Like
Liked
57:15In this episode, we dive deep into the story behind CVE-2025-27363, a critical zero-click vulnerability in the widely used FreeType font rendering library. Initially discovered by Facebook’s security team and patched by Google in May 2025, this flaw allowed attackers to execute arbitrary code on Android devices—without any user interaction—by explo…
…
continue reading

1
Leadership Tips and the Future of CRE with Link Logistics’ Luci Smith, BOMA International’s 2025-2026 Chair
8:23
8:23
Play later
Play later
Lists
Like
Liked
8:23As the 2025 BOMA International Conference & Expo draws near, BUILDINGS sat down with incoming chair Luci Smith to discuss what leadership looks like, the best advice she’s ever received in commercial real estate, and what’s next for the industry.By Endeavor Business Media
…
continue reading

1
The Insurance Industry Under Fire: Anatomy of the Aflac Cyber Incident
53:58
53:58
Play later
Play later
Lists
Like
Liked
53:58In this episode, we take a deep dive into the June 2025 cyberattack on Aflac, one of the latest strikes in a growing wave of sophisticated, AI-driven cyber campaigns targeting the insurance industry. On June 12, Aflac detected suspicious activity within its U.S. network—a breach attributed to a highly organized cybercrime group and part of a larger…
…
continue reading

1
Beyond Traditional IAM: Are You Prepared for Identity Convergence and the Rise of Agentic AI?
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47"What we're seeing now is a lot of the vendors that were traditionally one of the identity pillars are kind of expanding into other pillars,” says Kevin Converse, Vice President, Identity and Access Management, GuidePoint Security. In this episode of The Security Strategist podcast, Richard Stiennon speaks with Converse, VP at GuidePoint Security. …
…
continue reading

1
The Nucor Cyberattack: How Ransomware Threatens American Steel
58:40
58:40
Play later
Play later
Lists
Like
Liked
58:40In May 2025, a ransomware attack forced Nucor — one of America’s largest steel producers — to halt its metal production operations. This wasn’t just a corporate IT incident: it disrupted a critical link in the nation’s industrial supply chain. In this episode, we take an in-depth look at the Nucor attack: how cybercriminals targeted operational tec…
…
continue reading

1
#356 - Mr. NHI, Lalit Choda, on Securing the Exploding World of NHI
1:04:31
1:04:31
Play later
Play later
Lists
Like
Liked
1:04:31Join Jim McDonald and Jeff Steadman on the Identity at the Center podcast as they welcome Lalit Choda, founder and CEO of the Non-Human Identity Management Group. Lalit, also known as "Mr. NHI," shares his journey from investment banking to becoming a leading expert in non-human identities. This episode delves into the critical and often overlooked…
…
continue reading

1
EP 553 - CPO Rising Series: Airtable VP and Head of Product on AI's Transformative Impact on Product Management
31:36
31:36
Play later
Play later
Lists
Like
Liked
31:36Are you ready to unlock the future of product management through AI? In this episode of the CPO Rising Series hosted by Products That Count Resident CPO Renee Niemi, Airtable VP and Head of Product Anthony Maggio will be speaking on how AI is revolutionizing product development and user experiences. Anthony shares insights from Airtable's journey o…
…
continue reading

1
Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - Chip Hughes, Ashley Stevenson, John Pritchard, Amit Masand, Matt Caulfield, David Lee - ESW #412
1:38:23
1:38:23
Play later
Play later
Lists
Like
Liked
1:38:23In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
…
continue reading

1
Rethinking Identity: IAM, PAM & Passwordless Trends from Identiverse - David Lee, Amit Masand, Chip Hughes, Ashley Stevenson, John Pritchard, Matt Caulfield - ESW #412
1:38:23
1:38:23
Play later
Play later
Lists
Like
Liked
1:38:23In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine comp…
…
continue reading
…
continue reading

1
SANS Stormcast Monday, June 23rd, 2025: ADS and Python; More Secure Cloud PCs; Zend.to Path Traversal; Parser Differentials
5:36
5:36
Play later
Play later
Lists
Like
Liked
5:36ADS & Python Tools Didier explains how to use his tools cut-bytes.py and filescanner to extract information from alternate data streams. https://isc.sans.edu/diary/ADS%20%26%20Python%20Tools/32058 Enhanced security defaults for Windows 365 Cloud PCs Microsoft announced more secure default configurations for its Windows 365 Cloud PC offerings. https…
…
continue reading

1
Inside the $225M Crypto Seizure: How Law Enforcement Traced Illicit Funds Across Borders
1:01:32
1:01:32
Play later
Play later
Lists
Like
Liked
1:01:32A staggering $225 million in illicit cryptocurrency was recently seized by U.S. authorities in what has become the largest digital asset recovery in Secret Service history. This episode unpacks the mechanics, methods, and forensics that made this possible—and how a sprawling network of scams, labor compounds, and fake identities in Southeast Asia u…
…
continue reading