SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Security Operations Podcasts
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Your Weekly Source for Linux GNews from the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
A podcast made by people who love running Linux.
…
continue reading
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Comedy + "Conspiracy Theory". Welcome to a shenanigan infused journey into the mind of this particular Garbage Can Dood...
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android's a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
…
continue reading
A podcast about all things energy, brought to you by the Australian Energy Market Operator.
…
continue reading
Sea Control is CIMSEC's Flagship podcast. We focus on maritime security, naval affairs, and defense and foreign policy.
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Entry & Exit is a podcast about building, scaling, and exiting security and fire businesses. Hosts Stephen Olmon and Collin Trimble share their journey growing Alarm Masters through acquisitions and organic growth, along with the lessons they’ve learned along the way. From recurring revenue strategies to sales, operations, and M&A, Entry & Exit gives business owners and entrepreneurs an inside look at what it takes to succeed in the security industry. Whether you’re starting your first compa ...
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
The Guardian Way is a weekly podcast from Guardian Protection Force that turns real-world security experience into practical guidance you can use today. Hosted by Garrett Thomas with co-host Terry MacAdam, each episode breaks down an operations-level topic like executive protection, protective intelligence, workplace violence prevention, campus security, remote guarding, and patrol program design. We focus on what works in the field, why it works, and how to implement it with clear steps, po ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
…
continue reading
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
…
continue reading
The best in maritime security, technology, history, and international affairs from CIMSEC - your moment of power point rehab.
…
continue reading
This podcast distills the signal from the noise about enterprise IT digital transformation and operations in the era of Agile, DevOps and distributed applications. Interviews feature expert guests in conversation with IT journalism veteran Beth Pariseau, Senior News Writer at Informa TechTarget.
…
continue reading
Commissionaires Nova Scotia proudly presents Purpose & Protection, a podcast dedicated to the people behind Canada’s security: veterans, their families, civilians and all those dedicated to keeping our communities safe. Each episode explores the lived experiences of those who’ve served, those who support them, and those shaping the future of Canada’s security landscape. From the frontlines to the home front, you’ll hear stories of resilience, leadership and purpose. As the largest private em ...
…
continue reading
EOD Gear IMPROVISED brings in the top people from the EOD community and the communities working with or around us.
…
continue reading
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
…
continue reading
Cyber Daily News is a fast, no nonsense cybersecurity podcast designed for professionals, builders, and anyone who wants to stay ahead of real world threats. Each episode delivers a concise breakdown of the most important cyber incidents, vulnerabilities, exploits, and security trends shaping the day. You will hear clear explanations of breaches, ransomware campaigns, zero day vulnerabilities, nation state activity, and major security advisories, without hype or filler. The focus is on what ...
…
continue reading
If you wish to know what it's really like to make the life and death decisions portrayed in the movies by James Bond or on TV by Homeland's, Cary Matherson, then Black Spy Podcast is the show for you. If you're interested in the clandestine world of secret intelligence, espionage, counter-terrorism and national security, then this definitely your must listen Podcast! Every week, along with a different successful or famous guest who's always been interested in the secret services, ex officer, ...
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
…
continue reading
I am targeting a market of IT professionals who enjoy woodworking as a hobby. Providing information around information technology topics like cyber security, cyber crime, and a few woodworking projects
…
continue reading
Special operations military news and straight talk with the guys in the community. Hosted by former military operators. As seen ranked #1 in Apple Podcasts government category.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
1
From IoT to AIoT: Operational and Security Challenges for Modern Enterprises
27:24
27:24
Play later
Play later
Lists
Like
Liked
27:24Industrial enterprises are undergoing significant transformation as connected devices reshape the way they operate. IoT platforms provide new opportunities for automation, predictive maintenance, and more efficient device management. But these benefits come with challenges. In this episode of the Security Strategist podcast, host Trisha Pillay spea…
…
continue reading
1
OpGCD Live! Sundaze!! - Vol. 25 - National Security:Legend of Danny Casolaro! - FREE PATREON PREVIEW - FREE PATREON PREVIEW
32:43
32:43
Play later
Play later
Lists
Like
Liked
32:43OpGCD Live! Sundaze!! - Vol. 25 - National Security:Legend of Danny Casolaro! - FREE PATREON PREVIEW Links for JJ - https://www.patreon.com/c/OperationGCD
…
continue reading
1
Year End Repeat: Pig Butchering: Operation Shamrock Fights Back
41:13
41:13
Play later
Play later
Lists
Like
Liked
41:13Over the holidays we are rerunning some of our favourite episodes. This one first aired this summer and was one of my first conversations with the fascinating head of Operation Shamrock. We'll be back with regular programming on January 5th.By Jim Love
…
continue reading
1
111. The Man Behind The CIA: Shooting In The White House (Ep 2)
48:59
48:59
Play later
Play later
Lists
Like
Liked
48:59Bill Donovan has set himself up across an entire floor of the swanky London hotel, Claridge’s. From here he is now running international intelligence operations and laying plans for the future of espionage in the United States. But, his arch nemesis, J. Edgar Hoover has an alternative vision for how these lofty ideas should play out. Listen as Davi…
…
continue reading
It's the End of the Year Special! We're here to break down the 2025 year with all the goods and bads! Hosts: Tom Bridge - @[email protected] Marcus Ransom - @marcusransom Selina Ali - LinkedIn Links: https://macadminmusings.com/blog/2025/12/14/stop-working-before-everything-is-finished/ Sponsors: Iru 1Password Backblaze Meter Watchman Moni…
…
continue reading
Cyber Daily News December 23, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Romanian Water Authority Hit by Ransomware; 1,000 Systems Across 10 Regions Compromisedhttps://thecyberexpress.com/romanian-water-authority-ransomware-attack/- U.S. CISA adds a flaw in …
…
continue reading
1
Taking a holiday break – Pop Goes the Stack returns after New Year’s!
0:55
0:55
Play later
Play later
Lists
Like
Liked
0:55Hi, Pop Goes the Stack listeners! The holiday season is here, and we’re taking a short break to recharge, enjoy time with loved ones, and maybe step away from our stacks (just for a bit). Don’t worry—we’ll be back after New Year’s with more sharp insights, expert takes, and our signature snark to help you navigate the fast-paced world of applicatio…
…
continue reading
1
Why AI Agents Demand a New Approach to Identity Security
13:07
13:07
Play later
Play later
Lists
Like
Liked
13:07AI agents are evolving into capable collaborators in cybersecurity, acting as operational players. These agents read sensitive data, trigger workflows, and make decisions at a speed and scale beyond human capability. Matt Fangman, Field CTO at SailPoint, explains on The Security Strategist podcast that this new power has costs. AI agents have turne…
…
continue reading
1
447: Linux Hits 5%! 2025 Year in Review & 2026 Bold Predictions (ft. Máirín Duffy)
1:28:54
1:28:54
Play later
Play later
Lists
Like
Liked
1:28:54What’s Inside: The 5% Milestone: We analyze the data behind the massive surge in Linux desktop adoption and why gaming is the secret weapon. The UpTech Project: Máirín Duffy introduces us to a student-led initiative bridging the digital divide with Linux. 2026 Predictions: From RISC-V taking over wearables to the COSMIC desktop challenging the stat…
…
continue reading
1
Is Your Holiday Traffic Human—or AI-Driven and Under Attack?
24:09
24:09
Play later
Play later
Lists
Like
Liked
24:09As businesses approach the holiday season, security teams feel the pressure while online activity increases. At the same time, AI is quickly changing how attacks are launched and how organisations function daily. In the recent episode of The Security Strategist podcast, host Richard Stiennon, Chief Research Analyst at IT-Harvest, sits down with Pas…
…
continue reading
1
#237 Josh "Bugsy" Segal on Ukraine, Electronic Warfare, and Fast Battlefield Innovation
51:32
51:32
Play later
Play later
Lists
Like
Liked
51:32The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Dr. Josh "Bugsy" Segal recaps his…
…
continue reading
Cyber Daily News December 22, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- New Flaw in Somalia’s E-Visa System Exposes Travelers’ Passport Datahttps://thecyberexpress.com/somalia-e-visa-security-flaw-data-exposure/- Infy Returns: Iran-linked hacking group show…
…
continue reading
1
Arrests In 0365 Scheme: Cybersecurity Today With David Shipley
13:09
13:09
Play later
Play later
Lists
Like
Liked
13:09Global Cybercrime Crackdowns and Rising Threats This episode of 'Cybersecurity Today' hosted by David Shipley covers significant cybersecurity news. Nigerian police arrested three suspects linked to a Microsoft 365 phishing platform known as Raccoon O365. U.S. prosecutors charged 54 individuals in an ATM malware scheme tied to a Venezuelan criminal…
…
continue reading
1
Setting course for 2050: A deep dive into the Draft 2026 Integrated System Plan
22:06
22:06
Play later
Play later
Lists
Like
Liked
22:06Australia’s electricity system is transforming at speed and the choices made, specifically in the coming decade, will shape costs, reliability and emissions outcomes for generations. In this episode of AEMO On Air, we sat down with Nicola Falcon, AEMO’s Executive General Manager of System Design, to unpack the Draft 2026 Integrated System Plan (ISP…
…
continue reading
1
SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. Bu…
…
continue reading
Christmas Must Buy Books The Black Spy Podcast 224, Season 23, Episode 0004 This week's Black Spy Podcast sees host Carlton King step away from headlines and hard geopolitics to offer listeners something more seasonal – a carefully curated list of books he believes make powerful, thought-provoking Christmas stocking fillers, each chosen for its abi…
…
continue reading
1
329: Linux 6.18, New Valve Hardware, COSMIC 1.0, NixOS, LXQt, Raspberry Pi, & more Linux news
27:14
27:14
Play later
Play later
Lists
Like
Liked
27:14video: https://youtu.be/cKQEl5Jho8Y This week in Linux, I'm Back! and this time, I mean I'm back and TWIL is back. This episode is going to have some stuff that happened between now and the last episode from a month ago but starting next week, the show is back on a weekly basis. On this week's show, we've got a new release of the Linux kernel with …
…
continue reading
1
110. The Man Behind The CIA: Charming Mussolini and Stealing From MI6 (Ep 1)
49:13
49:13
Play later
Play later
Lists
Like
Liked
49:13“Wild” Bill Donovan laid the template for the formation of the modern CIA, but this wasn’t the way his life was supposed to turn out. A working class boy from Buffalo, Bill dreamt of something better for himself. These dreams took him to the trenches of Belgium and the beaches of Normandy, then to the halls of power themselves. This is the story of…
…
continue reading
Cyber Daily News December 21, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Massive Android botnet Kimwolf infects millions, strikes with DDoShttps://securityaffairs.com/185921/malware/massive-android-botnet-kimwolf-infects-millions-strikes-with-ddos.html- ATM …
…
continue reading
1
What's behind US gov push to 'privatize' offensive cyber operations?
2:01:57
2:01:57
Play later
Play later
Lists
Like
Liked
2:01:57(Presented by ThreatLocker: Allow what you need. Block everything else by default, including ransomware and rogue code.) Three Buddy Problem - Episode 77: New React2Shell data from Microsoft, fresh Apple and Cisco zero-days already in the wild, and state-linked campaigns from Russia and China that show a merging of espionage, crime, and infrastruct…
…
continue reading
Cyber Daily News December 20, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Russia was behind a destructive cyber attack on a water utility in 2024, Denmark sayshttps://securityaffairs.com/185885/hacking/russia-was-behind-a-destructive-cyber-attack-on-a-water-u…
…
continue reading
1
Year-End Review: The Highs and Lows of Cybersecurity in 2025
55:25
55:25
Play later
Play later
Lists
Like
Liked
55:25Cybersecurity Today brings you a special year-end episode, featuring noteworthy guests Tammy Harper from Flare, Laura Payne from White Tuque, David Shipley from Beauceron Security, and John Pinard, co-host of Project Synapse. This episode delves into the pivotal cybersecurity stories of 2025, including a detailed discussion on MFA phishing attacks,…
…
continue reading
1
Unsecurity Episode 253: The Human Element of Cybersecurity with Kyle Waters
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10Kyle “caboose” Waters of Cyber Unicorns enlightens this extended episode! Having a combined passion for people and security, Kyle demonstrates how to effectively educate the masses. Steering away from typical training and using unique approaches, this talk explores how to break through the barriers that create vulnerabilities. Like, subscribe, and …
…
continue reading
Tom Blanton talks about 40 years of unearthing CIA plots at the National Security Archive. https://nsarchive.gwu.edu/ Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Karen Greenberg on Twitter https://x.com/KarenGreenberg3 Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk on Twitter: https://twitter.co…
…
continue reading
1
123 – Android XR, Jetpack Navigation 3, and more!
4:38
4:38
Play later
Play later
Lists
Like
Liked
4:38Welcome to Now in Android, your ongoing guide to what's new and notable in the world of Android development. Dan covers the latest releases from Android XR, the Android Studio Otter 2 feature drop with Gemini 3, the release of Android 16 QPR2, Jetpack Navigation 3, and more! Chapters: 0:00 - Introduction 0:31 - Android XR 1:59 - Android Studio and …
…
continue reading
Cyber Daily News December 19, 2025Stories mentioned in today's briefing:- China-linked APT UAT-9686 is targeting Cisco Secure Email Gateway and Secure Email and Web Managerhttps://securityaffairs.com/185861/apt/china-linked-apt-uat-9686-is-targeting-cisco-secure-email-gateway-and-secure-email-and-web-manager.html- Hewlett Packard Enterprise (HPE) f…
…
continue reading
1
Overcoming Regulatory, Infrastructure, and Operational Challenges When Scaling Tech Globally
24:54
24:54
Play later
Play later
Lists
Like
Liked
24:54Scaling technology globally is one of the most complex challenges for Chief Technology Officers and enterprise leaders. It requires balancing infrastructure, operations, regulatory compliance, and user trust, all while delivering systems that are reliable, secure, and effective across diverse regions. In this episode of Security Strategist, host Tr…
…
continue reading
1
On the Zero Day of Christmas - Cisco Devices Under Attack
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35Cybersecurity Today: Cisco Zero Day Exploited & Maritime Cyber Attack Unfolds In this episode of Cybersecurity Today, host David Shipley discusses a series of critical cybersecurity incidents, including the exploitation of a zero-day flaw in Cisco email security infrastructure by a China-linked group, a Hollywood-style attack on an Italian ferry in…
…
continue reading
1
SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs
4:37
4:37
Play later
Play later
Lists
Like
Liked
4:37Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn t quite clean for ISC, but SSL2 and SSL3 systems have been cut down by about half. https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ra…
…
continue reading
Cyber Daily News December 18, 2025Stories mentioned in today's briefing:- FBI Seizes E-Note Crypto Exchange Linked to Ransomware Money Launderinghttps://thecyberexpress.com/e-note-crypto-exchange-seized/- Cisco Warns of Active Cyberattack Exploiting Critical AsyncOS Vulnerabilityhttps://thecyberexpress.com/cisco-cve-2025-20393-secure-email-cyberatt…
…
continue reading
1
2015 vs 2025: What the Last Decade of Threats Taught Us
45:20
45:20
Play later
Play later
Lists
Like
Liked
45:20In this special, end-of-year episode (and Hazel’s final show as host) Talos Takes goes on a time-travel adventure: What would a defender from 2015 think of the cybersecurity realities of 2025? Joined by Talos teammates Pierre Cadieux, Alex Ryan, and Joe Marshall, we compare the threats, tools, and challenges of 2015 with those of 2025. The team rec…
…
continue reading
1
Behind the scenes with AIOps in Salesforce Hyperforce
23:51
23:51
Play later
Play later
Lists
Like
Liked
23:51As it rolled out AI and AIOps, Salesforce shunned the cloud repatriation route and instead expanded its public cloud presence with Hyperforce. Paul Constantinides, an engineering leader at Salesforce for more than 21 years, currently leads engineering for Hyperforce. In this episode, he details the evolution of the Salesforce internal platform over…
…
continue reading
1
SANS Stormcast Thursday, December 18th, 2025: More React2Shell; Donicwall and Cisco Patch; Updated Chrome Advisory
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit applications that do not have Next.js exposed. https://isc.sans.edu/diary/Maybe%20a%20Little%20Bit%20More%20Intere…
…
continue reading
1
Life After the Trident: Kaj Larsen Talks War, Media, and Meaning
55:19
55:19
Play later
Play later
Lists
Like
Liked
55:19Kaj Larsen is a former U.S. Navy SEAL turned journalist, filmmaker, and podcast host. After serving with Naval Special Warfare, he transitioned into frontline reporting, covering conflict zones and global security issues for outlets including VICE News, HBO, and National Geographic. Known for his grounded, no-nonsense storytelling, Larsen brings an…
…
continue reading
1
Episode 114: Executive Protection - Reputation and Brand Protection
3:07
3:07
Play later
Play later
Lists
Like
Liked
3:07Executive Protection (EP) is often misunderstood as “bodyguarding,” but the real value is business continuity and trust protection. In this episode, we break down how EP supports reputation and brand protection for leaders and the companies they represent - before, during, and after key moments. EP is built on threat awareness, discretion, and plan…
…
continue reading
1
Episode 441: Device lifecycle management and buyback with Rippling
50:48
50:48
Play later
Play later
Lists
Like
Liked
50:48Welcome to the podcast, Rippling IT, who are working on a novel solution for full lifecycle management related to the devices that their platform enables. Hosts: Tom Bridge - @[email protected] Selina Ali - LinkedIn Guests: Zaafir Kherani - LinkedIn Sponsors: Iru 1Password Backblaze Meter Watchman Monitoring If you're interested in sponsor…
…
continue reading
1
Lee Odess: Why Physical Security Is Becoming an Enterprise Software Business
48:28
48:28
Play later
Play later
Lists
Like
Liked
48:28Hosts Stephen Olmon and Collin Trimble sit down with Lee Odess for a wide-ranging, no-nonsense conversation about the forces reshaping the security and life-safety industry—and why operators who keep treating cloud, mobile, and AI like “features” are already falling behind. Lee, one of the most connected voices in access control and physical securi…
…
continue reading
1
React2Shell Vulnerability, Black Force Phishing Kit, Microsoft OAuth Attacks, and PornHub Data Breach
14:46
14:46
Play later
Play later
Lists
Like
Liked
14:46In this episode of Cybersecurity Today, host Jim Love discusses a range of pressing cybersecurity threats. The show covers the escalating React2Shell vulnerability, which has led to widespread automated exploitation campaigns involving crypto miners and back doors. Additionally, Jim reports on the Black Force phishing kit, which bypasses multifacto…
…
continue reading
1
Risky Business #819 -- Venezuela (credibly?!) blames USA for wiper attack
54:05
54:05
Play later
Play later
Lists
Like
Liked
54:05In the final show of 2025, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: React2Shell attacks continue, surprising no one The unholy combination of OAuth consent phishing, social engineering and Azure CLI Venezuela’s state oil firm gets ransomware’d, blames US… but what if it really is a US cyber op?! Russian junk-h…
…
continue reading
1
Risky Business #819 -- Venezuela (credibly?!) blames USA for wiper attack
54:05
54:05
Play later
Play later
Lists
Like
Liked
54:05In the final show of 2025, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: React2Shell attacks continue, surprising no one The unholy combination of OAuth consent phishing, social engineering and Azure CLI Venezuela’s state oil firm gets ransomware’d, blames US… but what if it really is a US cyber op?! Russian junk-h…
…
continue reading
1
SANS Stormcast Wednesday, December 17th, 2025: Beyond RC4; Forticloud SSO Vuln Exploited; FortiGate SSO Exploited;
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Beyond RC4 for Windows authentication Microsoft outlined its transition plan to move away from RC4 for authentication and published guidance and tools to facilitate this change. https://www.microsoft.com/en-us/windows-server/blog/2025/12/03/beyond-rc4-for-windows-authentication FortiCloud SSO Login Vuln Exploited Arctic Wolf observed exploit attemp…
…
continue reading
1
109. Hunting Al-Qaeda: The CIA’s Deadliest Day (Ep 4)
42:03
42:03
Play later
Play later
Lists
Like
Liked
42:03Nine people dead. A severed head laying motionless in the rubble. Silence punctuated by screams. The moments after the 2009 Camp Chapman attack sound like something out of a horror film, but this was the devastating reality for those who trusted an Al Qaeda double agent to deliver on his promises. In this episode, David and Gordon reach the climax …
…
continue reading
1
446: Ubuntu From The BIOS & The Quest for an Open Source Mac
1:10:08
1:10:08
Play later
Play later
Lists
Like
Liked
1:10:08This week on Destination Linux, we are joined by a special guest host: Craig Rowland, the CEO of Sandfly Security! We’re diving deep into the reality of modern security—specifically when third-party code knocks over your castle. From malicious VSCode extensions to the "React2Shell" vulnerability, we discuss why "Open Source" doesn't automatically m…
…
continue reading