Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Security Weekly Podcasts

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
On Mondays, Jon Stewart hosts The Daily Show, but on Thursdays, he's back in your ears with The Weekly Show -- a podcast featuring in-depth conversations with a range of special guests. From experts and advocates, to stakeholders and thought leaders, we discuss the challenges, changes, and ideas that are shaping our world.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Off The Wall is a weekly show on WUSB radio, Stony Brook - Long Island, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
…
continue reading
Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps — all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and ...
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 18:00 UTC.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Americast is the authoritative US news and politics podcast from the BBC. Each week we provide audiences with the best analysis from across the BBC, with on-the-ground observations and big picture insights about the stories which are defining America right now. The podcast is hosted by trusted BBC journalists including the BBC’s North America editor, Sarah Smith, BBC Radio 4 presenter, Justin Webb, the BBC’s disinformation and social media correspondent, Marianna Spring, and BBC North Americ ...
…
continue reading
Join Senator Ted Cruz and co-host Ben Ferguson as they break down the most important news stories of the day and reveal what they mean for you. On "Verdict with Ted Cruz,” you will go behind the scenes of the political debates that define our country. "Verdict with Ted Cruz" is being brought to you by Jobs, Freedom, and Security PAC, a political action committee dedicated to supporting conservative causes, organizations, and candidates across the country. In 2022, Jobs, Freedom, and Security ...
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
With two new shows each week, our experts dig into the game-tape for analysis rich in detail and information. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
This Week in Pre-IPO Stocks reports on pre-IPO stock research, trends, trading, and venture capital funds. Visit www.agdillon.com for more.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
As the industry-leading podcast for the airline and airport sectors, Window Seat brings together editors and experts from across the Aviation Week Network who are joined by senior leaders to discuss the business of air transport.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Coming Soon.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading

1
TNW 400: How Security Experts Hacked the Hackers - Inside the Darcula Toll Scam Ring
1:07:11
1:07:11
Play later
Play later
Lists
Like
Liked
1:07:11Jennifer Pattison Tuohy of The Verge joins Mikah Sargent on this episode of Tech News Weekly! Apple is rumored to launch a series of AI-powered devices, the upcoming Pebble Time 2's design is shown off, a look into a global SMS phishing scam ring, and the blood oxygen feature is returning to Apple Watches? Apple is seeking to expand its product off…
…
continue reading

1
Hackberry PIs and Other Hacker Things - PSW #887
2:08:42
2:08:42
Play later
Play later
Lists
Like
Liked
2:08:42We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You nee…
…
continue reading

1
Defending Trust & Reputation as CISOs and Leaders Prepare Their AI Strategy - Santosh Nair - BSW #408
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
…
continue reading

1
Episode 463 - Reducing deaths and injuries through evidence-based road policing and public safety strategies
4:12
4:12
Play later
Play later
Lists
Like
Liked
4:12We speak with Associate Professor Lyndel Bates, School of Criminology and Criminal Justice and the Griffith Criminology Institute at Griffith University at the World Police Summit 2025, held at the Dubai World Trade Centre 13-15 May. Associate Professor Lyndel Bates has research and teaching interests predominantly in road policing, road safety and…
…
continue reading

1
300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet... - SWN #502
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-502
…
continue reading

1
The Future of Supply Chain Security - Janet Worthington - ASW #343
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
…
continue reading

1
ESW at BlackHat and the weekly enterprise security news - ESW #419
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
…
continue reading
Federal court filing system hit in sweeping hackBy Carl Franklin
…
continue reading

1
Week in Review: UK LegalAid collapse, public ransomware approval, Salesforce breach impact
30:03
30:03
Play later
Play later
Lists
Like
Liked
30:03Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Montez Fitzpatrick, CISO, Navvis Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. Th…
…
continue reading

1
Are Changes Coming In U.S. Airport Security Screening?
31:15
31:15
Play later
Play later
Lists
Like
Liked
31:15Aviation Week Network editors discuss whether it’s the right time to update airport security rules and restrictions that have been in place since the Sept. 11, 2001, terrorist attacks.
…
continue reading
Murray Kinsella and Gavan Casey reflect on a dramatic comeback win for the Lions in Australia. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
Risky Biz Soap Box: How to measure vulnerability reachability
35:48
35:48
Play later
Play later
Lists
Like
Liked
35:48In this Soap Box edition of the Risky Business podcast Patrick Gray chats with Socket founder Feross Aboukhadijeh about how to measure the reachability of vulnerabilities in applications. It’s great to know there’s a CVE in a library you’re using, but it’s even better if you can say whether or not that vulnerability actually impacts your applicatio…
…
continue reading

1
Hackberry PIs and Other Hacker Things - PSW #887
2:08:42
2:08:42
Play later
Play later
Lists
Like
Liked
2:08:42We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You nee…
…
continue reading

1
Inside Trump’s meeting with Putin… Americast is in Alaska!
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37Ahead of his meeting with Vladimir Putin on Friday, Donald Trump has said that “in the first two minutes, I’ll know exactly whether or not a deal can be made”.Trump will be the first US president to have a face to face meeting with the Russian president since the war in Ukraine started.Alaska is a state which is already home to a historic deal betw…
…
continue reading

1
BONUS: Daily Review with Clay and Buck - Aug 14 2025
1:01:42
1:01:42
Play later
Play later
Lists
Like
Liked
1:01:42Meet my friends, Clay Travis and Buck Sexton! If you love Verdict, the Clay Travis and Buck Sexton Show might also be in your audio wheelhouse. Politics, news analysis, and some pop culture and comedy thrown in too. Here’s a sample episode recapping four Thursday takeaways. Give the guys a listen and then follow and subscribe wherever you get your …
…
continue reading
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining us is our sponsored guest, Rob Allen, chief product officer, ThreatLocker. In this episode: Legacy infrastructure…
…
continue reading
Aviation Week Network editors gather in London to discuss the latest proposals for expanding Europe's largest hub. Host Karen Walker is joined by David Casey, Victoria Moores, Alan Dron, Chen Chuanren, Kurt Hofmann and Brian Budzynski for this conversation about London Heathrow Airport.
…
continue reading

1
BONUS POD: W. Virginia, South Dakota, Arkansas Join ICE in Crackdown plus House Probe Deepens on AutoPen
14:18
14:18
Play later
Play later
Lists
Like
Liked
14:18🛂 Immigration Enforcement Expansion The first half of the document discusses recent agreements between ICE (U.S. Immigration and Customs Enforcement) and three states—West Virginia, South Dakota, and Arkansas—to expand immigration enforcement under Section 287(g) of the Immigration and Nationality Act. Key points include: West Virginia: Governor Pa…
…
continue reading

1
Deep Sh!t State: Trump’s Retribution Campaign
1:40:37
1:40:37
Play later
Play later
Lists
Like
Liked
1:40:37As Trump targets the FBI and Justice Department for retribution, Jon is joined by former FBI Assistant Special Agent in Charge Michael Feinberg and New York Times FBI and DOJ reporter Devlin Barrett. They explore how high-profile cases have damaged these agencies' credibility, discuss the dismantling of their workforces and investigative capacity u…
…
continue reading

1
Court filing system hack explained, PA AG weighs in on attack, Fortinet attacks raise concerns
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22Hack of federal court filing system exploited security flaws known since 2020 Pennsylvania attorney general says cyberattack knocked phone, email systems offline Spike in Fortinet VPN brute-force attacks raises zero-day concerns Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know…
…
continue reading
This week on Caveat, Dave and Ben welcome back N2K’s own Ethan Cook for our latest policy deep dive segment. As our lead analyst, Ethan shares his knowledge of law, privacy, and surveillance on the latest policy developments shaping the cybersecurity and legal landscape. While this show covers legal topics, and Ben is a lawyer, the views expr…
…
continue reading

1
Poisoned Calendar invites, ChatGPT, and Bromide
32:20
32:20
Play later
Play later
Lists
Like
Liked
32:20A poisoned Google Calendar invite that can hijack your smart home, a man is hospitalised after ChatGPT told him to season his food with… pesticide, and some thoughts on Superman’s latest cinematic outing. All this and more is discussed in the latest edition of the "Smashing Security" podcast by cybersecurity veterans Graham Cluley, joined this week…
…
continue reading
Harvard University professor and economist Dani Rodrik first questioned in the late 1990s whether globalization had gone too far. He joins FP Live to share his take on the Trump administration’s tariffs and how to navigate a historically turbulent moment in global trade. Jamieson Greer: Trump’s Trade Representative: Why We Remade the Global Order D…
…
continue reading

1
Unsecurity Episode 244: Journey to Pen Testing w/ Morgan Trust
32:48
32:48
Play later
Play later
Lists
Like
Liked
32:48We're back! Pen Tester and Team Ambush member Morgan Trust walks us through his journey into the cybersecurity field. With a can-do approach, Morgan discusses how he has developed professionally, expanding his expertise across public speaking and competitive hacking. His presentation, "The New Era of Deception: AI, Deep Fakes, and The Dark Web" has…
…
continue reading

1
What's really behind Trump's crime crackdown?
26:14
26:14
Play later
Play later
Lists
Like
Liked
26:14What is really behind Donald Trump’s decision to send the National Guard into Washington DC, and what could it mean for other states in America? As troops arrive into DC, after Trump said the deployment was necessary to bring down crime and homelessness, Sarah and Justin talk about why the US president has made the announcement now. We also discuss…
…
continue reading

1
The “Business Casual August” Edition
1:16:30
1:16:30
Play later
Play later
Lists
Like
Liked
1:16:30This week, a rejuvenated Scott returned from vacation to sit down with his Lawfare colleagues Benjamin Wittes, Daniel Byman, and Kate Klonick to talk through some of the week’s big national security news, including: “Occupational Hazards.” The Israeli government led by Prime Minister Benjamin Netanyahu has stated its intent to occupy Gaza City, the…
…
continue reading

1
Defending Trust & Reputation as CISOs and Leaders Prepare Their AI Strategy - Santosh Nair - BSW #408
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
…
continue reading

1
Defending Trust & Reputation as CISOs and Leaders Prepare Their AI Strategy - Santosh Nair - BSW #408
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
…
continue reading

1
Texas Dems Surrender-Explaining Dem Redistricting Hypocrisy Nationwide
33:06
33:06
Play later
Play later
Lists
Like
Liked
33:06Texas Democrats' Return Fled to avoid redistricting legislation. Faced legal pressure: potential arrest, fines, and threats of office vacancy. Ultimately returned, allowing the redistricting bill to proceed. Redistricting & Gerrymandering Cruz and Ferguson claim Democratic states like California, New York, Illinois, and Massachusetts are far more a…
…
continue reading

1
Fortinet SSL VPNs getting hammered, The Netherlands critical infrastructure compromise, Africa the most targeted for cyber attacks
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26The hits just keep on coming Where's the Little Dutch Boy when you need him? I felt the ransomware down in Africa Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time…
…
continue reading

1
Episode 462 - International engagement with the International Association of Chiefs of Police
10:23
10:23
Play later
Play later
Lists
Like
Liked
10:23We speak with Vince Hawkes, former Commissioner, Ontario Provincial Police of the International Association of Chiefs of Police (IACP) in his role as Director of International Engagement and Partnerships, speaking at the 2025 World Police Summit in Dubai, UAE. The International Association of Chiefs of Police (IACP) is the world’s largest and most …
…
continue reading

1
Risky Business #802 -- Accessing internal Microsoft apps with your Hotmail creds
1:00:00
1:00:00
Play later
Play later
Lists
Like
Liked
1:00:00On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: CISA warns about the path from on-prem Exchange to the cloud Microsoft awards a crisp zero dollar bill for a report about what a mess its internal Entra-authed apps are Everyone and their dog seems to have a shell in US Federal Court information syst…
…
continue reading

1
Episode 461 - Protecting the community better with responsible data and AI
15:43
15:43
Play later
Play later
Lists
Like
Liked
15:43We speak with John Kilburn, Regional Industry Leader of SAS, Silver Sponsor at the World Police Summit 2025, held at the Dubai World Trade Centre 13-15 May. As the Regional Industry Leader – Law Enforcement and Public Safety at SAS, John leads the development and strengthening of partnerships with Law Enforcement and Public Safety agencies across e…
…
continue reading

1
SN 1038: Perplexity's Duplicity - Malicious Repository Libraries
3:03:49
3:03:49
Play later
Play later
Lists
Like
Liked
3:03:49CISA's Emergency Directive to ALL Federal agencies re: SharePoint. NVIDIA firmly says "no" to any embedded chip gimmicks. Dashlane is terminating its (totally unusable) free tier. Malicious repository libraries are becoming even more hostile. The best web filter (uBlock Origin) comes to Safari. The very popular SonicWall firewall is being compromis…
…
continue reading
CISA's Emergency Directive to ALL Federal agencies re: SharePoint. NVIDIA firmly says "no" to any embedded chip gimmicks. Dashlane is terminating its (totally unusable) free tier. Malicious repository libraries are becoming even more hostile. The best web filter (uBlock Origin) comes to Safari. The very popular SonicWall firewall is being compromis…
…
continue reading
By Emmanuel Goldstein
…
continue reading

1
300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet... - SWN #502
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-502
…
continue reading

1
BONUS: Daily Review with Clay and Buck - Aug 12 2025
1:03:31
1:03:31
Play later
Play later
Lists
Like
Liked
1:03:31Meet my friends, Clay Travis and Buck Sexton! If you love Verdict, the Clay Travis and Buck Sexton Show might also be in your audio wheelhouse. Politics, news analysis, and some pop culture and comedy thrown in too. Here’s a sample episode recapping four Tuesday takeaways. Give the guys a listen and then follow and subscribe wherever you get your p…
…
continue reading

1
Defensive Security Podcast Episode 317
1:17:05
1:17:05
Play later
Play later
Lists
Like
Liked
1:17:05Want to support our show? Want to get access to episodes a week before everyone else? Become a patreon sponsor here: https://www.patreon.com/defensivesec If you’re in Atlanta on August 20, you can join us for a LIVE episode at Mission 25. Register here: MCS Mission: Security’25 Our new merch store is live: DefSec Store We’ve added a lot of new item…
…
continue reading
In this episode, Brian and Milou discuss the often-dreaded topic of phishing and compliance training. They explore the various types of phishing attacks, including spear phishing and whaling, and delve into the business aspects of phishing, such as ransomware. The conversation emphasizes the importance of human factors in cybersecurity, highlightin…
…
continue reading

1
The Future of Supply Chain Security - Janet Worthington - ASW #343
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
…
continue reading