Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Risk Podcasts

show episodes
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
  continue reading
 
Artwork

1
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Artwork

1
Caffeinated Risk

McCreight & Leece

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Artwork

1
AI Security Ops

Black Hills Information Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join in on weekly podcasts that aim to illuminate how AI transforms cybersecurity—exploring emerging threats, tools, and trends—while equipping viewers with knowledge they can use practically (e.g., for secure coding or business risk mitigation).
  continue reading
 
Artwork

1
Risk Grustlers

Scrut Automation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to 'Risk Grustlers,' where we celebrate the extraordinary journeys of modern-day Risk Leaders who embrace the art of 'Grustle'—a powerful fusion of Grind and Hustle. Our podcast dives into the innovative strategies and bold decisions taken by these risk-takers, shaping the future of cybersecurity and risk management. Join us as we explore their inspiring stories, insightful advice, and cutting-edge technologies that define the alternative GRC landscape.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Artwork

1
Verdict with Ted Cruz

Premiere Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Join Senator Ted Cruz and co-host Ben Ferguson as they break down the most important news stories of the day and reveal what they mean for you. On "Verdict with Ted Cruz,” you will go behind the scenes of the political debates that define our country. "Verdict with Ted Cruz" is being brought to you by Jobs, Freedom, and Security PAC, a political action committee dedicated to supporting conservative causes, organizations, and candidates across the country. In 2022, Jobs, Freedom, and Security ...
  continue reading
 
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. ​ We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
  continue reading
 
Artwork

1
Bite Size Security

Mike Fitzpatrick

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cybersecurity is a business risk that impacts your bottom line, brand, and growth. The Cyber Risk Podcast for Business Leaders, hosted by Mike Fitzpatrick, CRISC, CDPSE, Distinguished Fellow of the Ponemon Institute and CEO of NCX Group, delivers weekly, no-nonsense insights tailored to CEOs, CFOs, and decision-makers. From data breaches to practical cybersecurity and data privacy strategies, we offer steps to manage risk, ensure compliance, and protect revenue. Subscribe now to turn risk in ...
  continue reading
 
Artwork

1
ISF Podcast

Information Security Forum Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
  continue reading
 
Artwork

1
Great Security Debate

The Great Security Debate

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Two CISOs and a security-minded friend discuss and debate topics of security and privacy, with a focus on looking at the topic from various angles, both that they support and those they don't. Sign up for our newsletter to be notified when new episodes drop, or when new projects are announced https://newsletter.greatsecuritydebate.net
  continue reading
 
Artwork

1
Security Breach

Eric Sorensen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
  continue reading
 
Artwork

1
Know Your Risk Podcast

Know Your Risk Radio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Do you know how much risk your retirement portfolio is actually exposed to? Whether it’s preservation of capital or an aggressive growth strategy, every investor needs a clearly defined RISK PROFILE. Host Zach Abraham, Chief Investment Officer at Bulwark Capital Management, will cover all types of investment vehicles and you’ll learn what investing looks like when portfolios aren’t influenced by the corporate objectives of the big banks and Wall Street brokerage houses. Subscribe to the podc ...
  continue reading
 
Held live every two weeks on Thursdays, the Global Security Briefing is now the industry's largest virtual event of its kind. We examine security threats, supply chain impacts and geopolitical developments for global security and risk intelligence professionals. Since the earliest days of COVID, Factal and Emergent Risk International have held an essential hour-long briefing for global security and resilience professionals.
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
  continue reading
 
Artwork

4
Distilled Security Podcast

Justin Leapline, Joe Wynn, and Rick Yocum

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
  continue reading
 
Artwork

1
Security & GRC Decoded

Raj Krishnamurthy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC). Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy. It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates. Security & GRC ...
  continue reading
 
Artwork

1
THE SAFE CAST

Boss Security Screens

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Security isn’t about luck—it’s about strategy. In this podcast, we break down how to protect your home, family, and business from threats most people don’t even think about. We’re not here to fuel fear—we’re here to help you prepare. Hosted by security professionals, Michael Johnson, a retired law enforcement captain with 29 years of experience and James Kerr an expert from Boss Security Screens, this podcast delivers real, no-nonsense advice. We know what truly stops burglars—not just locks ...
  continue reading
 
Artwork

1
At The Boundary

Global and National Security Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
  continue reading
 
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
  continue reading
 
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
  continue reading
 
Artwork
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Loading …
show series
 
What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer c…
  continue reading
 
In this episode of Risk Grustlers, Aayush Ghosh Choudhury, CEO and Co-Founder of Scrut, sits down with Sounil Yu, Chief AI Officer at Knostic and author of the ‘Cyber Defense Matrix,’ to talk about what it really means to run agentic AI safely, starting from “basic” security hygiene and identity hardening, all the way to drawing hard boundaries aro…
  continue reading
 
Scaling Open Source Observability and Managing Risk in the Software Supply Chain – Avi Press In this episode of the Security Repo Podcast, Avi Press, founder and CEO of Scarf, dives deep into the evolving world of open source observability and its intersection with security. He unpacks how better visibility into software usage can inform both defen…
  continue reading
 
Episode Summary: If you plan to sell your business in the next three to five years, cyber risk may be the biggest threat to your exit that no one is talking about. A single breach, a hidden vulnerability, or an untested environment can delay your deal, cut your valuation, or kill the transaction outright. In this episode, Mike Fitzpatrick breaks do…
  continue reading
 
Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
  continue reading
 
Enjoying the content? Let us know your feedback! Imagine discovering that your organization is running nearly ten times more applications than your IT team knows about. Imagine learning that two out of every three cloud tools being used by your employees were never approved, never vetted for security, and are completely invisible to your monitoring…
  continue reading
 
The final Briefing of 2025 features Factal editor James Morgan with an update on Ukraine-Russia. What's the state of the ground war, the drone war, the hybrid war and peace talks? That's the first 20 minutes. Then Kieran O'Leary from Emergent Risk International presents five things ERI is tracking. That includes why tin prices may be an indicator o…
  continue reading
 
The crew makes suggestions for building a hacking lab today! We will tackle: What is recommended today to build a lab, given the latest advancements in tech Hardware hacking devices and gadgets that are a must-have Which operating systems should you learn Virtualization technology that works well for a lab build Using AI to help build your lab Visi…
  continue reading
 
1. Cultural Debate on Santa Claus UK museum’s guidance to “decolonize” Father Christmas. Santa is criticized for being “too white” and “too male.” Suggests changes like: Santa working alongside elves to show equality. Mrs. (Mother) Christmas taking a more prominent role. Removing the “naughty or nice” list, which is framed as colonial and judgmenta…
  continue reading
 
Exploitable vulnerabilities within OT devices and how this is expected to change Cyber warfare risk in 2026 - how organisations can defend themselves Securing the supply chain and expanding XIoT attack surface Thom Langford, Host, teissTalk https://www.linkedin.com/in/thomlangford/ Jordan M. Schroeder, CISO https://www.linkedin.com/in/schroederjord…
  continue reading
 
Join the 5,000+ cybersecurity professionals on our BHIS Discord server to ask questions and share your knowledge about AI Security. https://discord.gg/bhis AI Security Ops | Episode 34 – Why Did We Create This Podcast? In this episode, the BHIS team explains the purpose behind AI Security Ops, what you can expect from future episodes, and why this …
  continue reading
 
Send us a text In this episode of the Security Circle Podcast, Host Yolanda “Yoyo” Hamblen is joined by Chris Stitt, a highly respected security and leadership practitioner whose career spans crisis management, international security operations, and complex bureaucratic environments. Chris brings rare credibility to the leadership conversation — no…
  continue reading
 
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Show Notes: https://securityweekly.com/bsw-427…
  continue reading
 
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
  continue reading
 
Join Business Security Weekly for a roundtable-style year-in-review. The BSW hosts share the most surprising, inspiring, and humbling moments of 2025 in business security, culture, and personal growth. And a few of us might be dressed for the upcoming holiday season... Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes…
  continue reading
 
1. Christmas and Its Religious Significance The discussion begins with warm holiday greetings and reflections on the meaning of Christmas. Emphasis is placed on celebrating the birth of Jesus Christ, highlighting its spiritual importance over commercial aspects like gifts and Santa Claus. Ben and the Senator share personal traditions, such as readi…
  continue reading
 
What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer c…
  continue reading
 
December 23, 2025 - Zach and Chase discuss the current state of the market, focusing on investment strategies, the impact of AI on business models, and the dynamics of global markets. He emphasizes the importance of understanding valuation concerns and the cultural implications of market behavior. The conversation also touches on capital flows, int…
  continue reading
 
It’s the holidays, your defenses are down, your inbox is lying to you, and yes—you’re gonna click the link. In Part 1 of our holiday special, Doug White and a panel of very smart people explain why social engineering still works decades later, why training alone won’t save you, and why the real job is surviving after the click. From phishing and sm…
  continue reading
 
Love a hot take? 🔥 You’re in luck! We’re back with a special end-of-year treat: a rapid-fire round of cybersecurity hot takes guaranteed to start arguments in your group chats and hijack at least one Slack thread. 💬 The team weighs in on bold claims like “Passwords will finally die in 2026” and “AI will solve more cybersecurity problems than it cau…
  continue reading
 
TL;DR: In part 1 of 2, Gadi Evron joins the show and chats with Jim and Rafal on the topic of the "AI Cataclysm". What does that even mean? Listen in - but it's part to do with how AI is changing the attacker model (level of effort, expertise required, timeline) and what defenders should start to think about. Part 2 is coming soon, standby. YouTube…
  continue reading
 
Using OWASP SAMM to assess and improve compliance with the Cyber Resilience Act (CRA) is an excellent strategy, as SAMM provides a framework for secure development practices such as secure by design principles and handling vulns. Segment Resources: https://owaspsamm.org/ https://cybersecuritycoalition.be/resource/a-strategic-approach-to-product-sec…
  continue reading
 
Golden Fleet Announcement Trump unveils plans for the construction of two massive battleships, described as: The largest ever built. “100 times more powerful” than previous Iowa-class ships. Part of a new Golden Fleet to revitalize U.S. naval power. Long-term vision: expand to 20–25 ships, boosting American shipbuilding and jobs. Emphasis on nation…
  continue reading
 
December 22, 2025 - Zach and Chase discuss the recent surge in precious metals, particularly gold and platinum, and the underlying market dynamics driving these changes. They explore capital cycle investing, the valuation of gold mining companies, and the importance of trading strategies and market timing. The conversation also touches on the role …
  continue reading
 
Interview with Frank Vukovits: Focusing inward: there lie threats also External threats get discussed more than internal threats. There’s a bit of a streetlight effect here: external threats are more visible, easier to track, and sharing external threat intelligence doesn’t infringe on any individual organization’s privacy. That’s why we hear the i…
  continue reading
 
To our listeners a GREAT THANK YOU! Without you this would not be possible. We thank EACH and every one of you for making Verdict what it is today and supporting this show. Much more to blow you away in 2026 so keep listening, and keep sharing! Merry Christmas and a blessed New Year to all of you! Please Hit Subscribe to this podcast Right Now. Als…
  continue reading
 
South Africa's ransomware crisis is intensifying, and attackers aren't taking a holiday break. This week on Priviso Live, we unpack the alarming industry analysis showing why South African organisations remain dangerously exposed, with poor patch cycles, weak identity controls, and inadequate backups creating a perfect storm during the festive seas…
  continue reading
 
(Presented by ThreatLocker: Allow what you need. Block everything else by default, including ransomware and rogue code.) Three Buddy Problem - Episode 77: New React2Shell data from Microsoft, fresh Apple and Cisco zero-days already in the wild, and state-linked campaigns from Russia and China that show a merging of espionage, crime, and infrastruct…
  continue reading
 
1. Immigration and Housing Mass immigration under President Biden increased rental demand and housing prices. Trump’s deportations and border enforcement are lowering rents and home prices. Median age of first-time homebuyers is rising above 40 (highest since WWI). Wharton study: “Every 1% population increase → rents up 1%.” Recent rent declines (−…
  continue reading
 
December 19, 2025 - Zach and Chase discuss current market trends, investment strategies, and the implications of passive investing on market valuations. They explore the relationship between the US and China, emphasizing the mutual dependencies that exist between the two economies. The conversation also touches on football insights, analyzing game …
  continue reading
 
Hi everyone, It's Dwayne, host of the security repo podcast. The show is taking a 2-week break over the holidays to give you a chance to catch up on our backlog of security conversations. Our next new episode premieres January 7th, 2026. It's one to look forward to. And I wanted to say a huge thank you to each and every one of our listeners and sub…
  continue reading
 
Send us a text We’ve all heard the euphemism about knowledge being power. But perhaps the more accurate assessment comes from my favorite childhood cartoon. Yes, I’ve referenced it before, but when GI Joe signed off each episode by letting us know that “Knowing is Half the Battle”, Duke and his crew were echoing the same sentiment as our guest for …
  continue reading
 
Border Security Illegal immigration reportedly dropped by 99%. $100 billion invested in border security infrastructure (wall, technology, personnel). Claimed economic benefits: reduced housing costs and rents due to deportations. Working Families Tax Cut (formerly “One Big Beautiful Bill”) Permanent extension and expansion of Trump-era tax cuts. Sp…
  continue reading
 
Community Q&A on AI Security | Episode 34 In this episode of BHIS Presents: AI Security Ops, our panel tackles real questions from the community about AI, hallucinations, privacy, and practical use cases. From limiting model hallucinations to understanding memory features and explaining AI to non-technical audiences, we dive into the nuances of lar…
  continue reading
 
December 18, 2025 - Zach and Chase discuss the current state of the markets, focusing on index performance, inflation data, and the implications for investment strategies. They analyze the valuation concerns surrounding major tech stocks, the impact of international capital flows, and the potential for AI-driven growth. The conversation also touche…
  continue reading
 
This week in the security news: Linux process injection Threat actors need training too A Linux device "capable of practically anything" The Internet of webcams Hacking cheap devices Automating exploitation with local AI models Lame C2 Smallest SSH backdoor Your RDP is on the Internet These are not the high severity bugs you were looking for Low ha…
  continue reading
 
Meet my friends, Clay Travis and Buck Sexton! If you love Verdict, the Clay Travis and Buck Sexton Show might also be in your audio wheelhouse. Politics, news analysis, and some pop culture and comedy thrown in too. Here’s a sample episode recapping four takeaways. Give the guys a listen and then follow and subscribe wherever you get your podcasts.…
  continue reading
 
The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! On this episode, Accidental CISO is joined by guest host Tanya Janca, @shehackspurple. Tanya is a hacker, software developer, author, and educator. She is passionate about application …
  continue reading
 
All links and images can be found on CISO Series. Check out this post by Binoy Koonammavu of Secusy AI for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is best-selling cybersecurity author Peter G…
  continue reading
 
Economic Agenda Promises of major tax relief starting in 2026: No tax on tips, overtime, and Social Security for most Americans. Projected savings: $11,000–$20,000 per family annually. Anticipated largest tax refund season ever next spring. Emphasis on record investment inflows, job creation, and tariff leverage. Goal: “Greatest economy in history.…
  continue reading
 
December 17, 2025 - Zach and Chase discuss the current state of the market, focusing on key indicators, AI's impact, and the competitive landscape of major companies like Tesla and Oracle. They delve into the implications of inflation, investment strategies in cyclical markets, and the energy sector's resilience. The conversation also touches on mi…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analyst Ivan as they discuss: React2Shell Exploits Flood the Internet as Attacks Continue (1:06) ClickFix Style Attack Leveraging Grok and ChatGPT for Malware Delivery (7:39) New ConsentFix Attack Hijacking Microsoft Accounts via Azure CLI (13:50) Holiday Season Attac…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play