Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Spyware Podcasts

show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork

4
It Could Happen Here

Cool Zone Media and iHeartPodcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
It Could Happen Here started as an exploration of the possibility of a new civil war. Now a daily show, it's evolved into a chronicle of collapse as it happens, and an exploration of how we might build a better future. Every day Robert Evans, Garrison Davis, Mia Wong, and James Stout take you on a jaunty walk through the burning ruins of the old world and towards a better one that lays just on the horizon.
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
Threat Monitor

SearchSecurity.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
  continue reading
 
Artwork
 
In a landscape saturated with directives, Focal Point prioritizes discussions over dictation. The show’s mission is to present diverse perspectives on hot topics and current events, encouraging viewers to form their own opinions. Focal Point is an IRONCLAD Original.
  continue reading
 
Artwork

1
Machines Like Us

The Globe and Mail

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Machines Like Us is a technology show about people. We are living in an age of breakthroughs propelled by advances in artificial intelligence. Technologies that were once the realm of science fiction will become our reality: robot best friends, bespoke gene editing, brain implants that make us smarter. Every other Tuesday Taylor Owen sits down with the people shaping this rapidly approaching future. He’ll speak with entrepreneurs building world-changing technologies, lawmakers trying to ensu ...
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Artwork

1
Cyber Focus

McCrary Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
  continue reading
 
Artwork

1
Deep Pockets

Petra Soderling

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Petra Söderling, the author of 'Governments and Innovation - the Economic Developer's Guide to Our Future', discusses the role governments play in creating new innovations, and innovation based industries. Intended audience: Economic Development and Foreign Direct Investment Professionals, Policy Makers, Civil Servants, CEOs, CFOs, R&D folks and tech enthusiasts. To subscribe to more free content go to https://petrasoderling.com/ Nothing in the show should be taken as investment advise.
  continue reading
 
Artwork

1
Target USA Podcast by WTOP

WTOP | Hubbard Radio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Whether its terrorists, anarchists, cyber criminals or nation states, America has a target on its back. WTOP National Security Correspondent J.J. Green investigates the threats facing the U.S., the people behind them, the agencies fighting them and their impact on Americans.
  continue reading
 
Artwork

1
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Artwork

1
Fascism in Cinema

Dr. Tenzan Eaghll

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The podcast where academics and plebs critically discuss representations of fascism and anti-fascism in modern cinema. Hosted by Tenzan Eaghll and Nathan Litwin. Let's get critical!
  continue reading
 
Artwork
 
Margo Cruz, the host of Tech Law Tracker, keeps up with new state-level regulations of the internet to find out how state laws are shaping the development and use of technology.
  continue reading
 
Artwork

1
Anthony Desnos

Anthony Desnos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
I’m Anthony Desnos, a security engineer specializing in Android apps and malware analysis. Date of birth: 18/02/1985 Web: https://anthonydesnos.com/ Address: 4117 David Dr, CA California, US Gmail: [email protected] Social: https://gravatar.com/anthonydesnos522 https://www.facebook.com/anthonydesnos/ https://www.instagram.com/anthonydesnos552/ https://x.com/AnthonyDes19261 https://www.reddit.com/user/Crazy-Mousse-4053/ https://www.scoop.it/u/anthonydesnos522-gmail-com https://www.pi ...
  continue reading
 
Artwork

1
Cyber Humanity

Immersive Labs

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
  continue reading
 
Artwork

1
Untold: The Daniel Morgan Murder

Duende Productions and Flameflower Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The phone hacking scandal that closed News of the World was big, but that was just the tip of the iceberg. At the bottom of that iceberg of 'dark arts' - hacking, burglary, bugging, and bribing bent cops - is the body of Daniel Morgan. It’s been described by an Assistant Commissioner of the Metropolitan Police as “one of the most disgraceful episodes in the entire history of the Metropolitan Police Service.” Over the three decades since Daniel was killed, five failed police investigations an ...
  continue reading
 
Artwork

1
Views on First

Knight First Amendment Institute at Columbia University

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
“Views on First” is the Knight First Amendment Institute’s flagship podcast. Each season, we invite leading legal scholars, practitioners, tech policy experts, and others to join us in conversations about some of the most pressing First Amendment issues in the ever-shifting expressive landscape of the digital age. “Views on First: Season 1” won a 2024 Anthem Award Silver Medal and 2023 Signal Listener’s Choice Award and a Signal Silver Medal.
  continue reading
 
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
  continue reading
 
Loading …
show series
 
"Complexity is the biggest enemy of security." Janne Uusilehto, a veteran who has led security and privacy engineering at Nokia, Microsoft, and Google, joins the podcast to peel back the curtain on the hidden world of cybersecurity standards. He reveals why industry rivals, like the original mobile phone giants, agreed to rules that ultimately gene…
  continue reading
 
This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company. A newly identified Chinese APT group has been observed deploying a sophisticated, fileless malware framework called EggStreme against a…
  continue reading
 
What happens when the federal cyber workforce shrinks just as threats are multiplying? In this episode, Federal News Network’s Justin Doubleday joins host Frank Cilluffo to unpack the turbulence facing government agencies. They examine the mass departures at CISA, the controversial firings under DHS’s Cyber Talent Management System, and the looming…
  continue reading
 
On today’s episode, Andy sits down with former FBI agent Dan Brunner to discuss ICE’s reactivated access to Graphite, an Israeli-made spyware capable of infiltrating phones, reading encrypted apps like WhatsApp and Signal, and even activating microphones. Originally signed under Biden but paused for review, the $2 million contract has raised concer…
  continue reading
 
In this episode we look at how Immigration and Customs Enforcement is believed to have access to Graphite—powerful spyware capable of silently hacking smartphones and reading encrypted apps like WhatsApp and Signal. At issue is what Graphite can do, the legal red lines it risks crossing, and what it means for civil liberties inside the U.S. if you …
  continue reading
 
The feature is called Memory Integrity Enforcement (MIE) and is designed to help stop memory corruption bugs, which are some of the most common vulnerabilities exploited by spyware developers and makers of phone forensic devices used by law enforcement. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Longterm and short-term security work from Apple on this week’s Checklist. First, the company’s warning individuals in France of potential spyware attacks. We’ll look at what they’re looking for and advice for staying safe. Plus - the iPhones Apple announced this week are bringing a new memory safety feature. We'll familiarize ourselves with Memory…
  continue reading
 
SonicWall SSL VPN flaws now being actively exploited Acting federal cyber chief outlines his priorities U.S. based investors in spyware firms nearly tripled in 2024 Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it…
  continue reading
 
Garrison talks with Cooper Quentin from the Electronic Frontier Foundation about Paragon’s spyware Graphite, how it reads text messages, who is most at risk, and misinformation exaggerating the spyware's known capabilities. Sources: https://ssd.eff.org/ https://citizenlab.ca/2025/03/a-first-look-at-paragons-proliferating-spyware-operations/ https:/…
  continue reading
 
Three Buddy Problem - Episode 61: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the va…
  continue reading
 
This week on Security Conversations, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode. Plus…
  continue reading
 
Microsoft tags a critical vulnerability in Fortra’s GoAnywhere software. A critical Redis vulnerability could allow remote code execution. Researchers tie BIETA to China’s MSS technology enablement. Competing narratives cloud the Oracle E-Business Suite breach. An Ohio-based vision care firm will pay $5 million to settle phishing-related data breac…
  continue reading
 
Deloitte is rolling out Claude to its nearly 500,000 employees after issuing a refund for a report that contained AI hallucinations. Plus, Taylor Swift fans love a good puzzle, but some were rubbed the wrong way by a promotional scavenger hunt which appeared to use AI-generated videos. Learn more about your ad choices. Visit podcastchoices.com/adch…
  continue reading
 
The story of how Geoffrey Hinton became “the godfather of AI” has reached mythic status in the tech world. While he was at the University of Toronto, Hinton pioneered the neural network research that would become the backbone of modern AI. (One of his students, Ilya Sutskever, went on to be one of OpenAI’s most influential scientific minds.) In 201…
  continue reading
 
AMD has signed a multi-year chip supply deal with OpenAI that could generate tens of billions in revenue for the chipmaker, helping accelerate its momentum in the AI industry. AMD has agreed to supply 6 gigawatts of compute capacity to OpenAI, which is enough to power up to 4 ½ million homes, across multiple generations of its Instinct GPUs, starti…
  continue reading
 
Unity vulnerability puts popular games at risk Oracle zero-day exploit patched Third-party breach claims Discord user info Huge thanks to our sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in through the cracks other tools miss. That’s why organizations are turning to ThreatLocker. As a zero-trust endpoint protection platform, Threat…
  continue reading
 
Robert, James, Mia, and Gare talk about the comedians who sold their soul to perform stand up for the royal family in Saudi Arabia. Sources: https://www.bbc.com/news/world-middle-east-37598413 https://www.hrw.org/news/2018/09/02/yemen-coalition-bus-bombing-apparent-war-crime https://www.bbc.com/news/world-middle-east-37598413 See omnystudio.com/lis…
  continue reading
 
A critical zero-day in Oracle E-Business Suite is under active exploitation. ICE plans a major expansion of its social media surveillance operations. Discord confirms a third-party data breach. A critical vulnerability in the Unity game engine could allow arbitrary code execution. New variants of the XWorm remote access trojan spread through phishi…
  continue reading
 
A waffle-centric controversy underlines ongoing tensions between Bluesky and some of its most vocal users. Also, police say they have arrested a suspect allegedly connected to multiple online threats that led TikTok to evacuate its headquarters near Los Angeles on Friday. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
California's Department of Insurance has been warning Tesla to fix its claims process since 2022, but consumer complaints have skyrocketed anyways. Amazon founder Jeff Bezos made a rare public appearance at Italian Tech Week in Turin on Friday and used the opportunity to predict that millions of people will be living in space “in the next couple of…
  continue reading
 
ParkMobile 2021 data breach class action suit concludes UK government study suggests secondary schools larger target than businesses Zimbra Collaboration Suite flaw used in calendar attacks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. …
  continue reading
 
Mia talks with Unraveled’s Raven about ICE’s horrific raids in Chicago from a traffic stop murder to helicopter apartment raids. Sources: https://thetriibe.com/2025/09/feds-detain-dozens-of-immigrants-in-massive-south-shore-apartment-building-raid-in-chicago/ https://chicago.suntimes.com/immigration/2025/10/01/massive-immigration-raid-on-chicago-ap…
  continue reading
 
No Agenda Episode 1805 - "Hamburger Wine" "Hamburger Wine" Executive Producers: Matthew Lohmar Sir Ghee Karl Diethrick Jackie Greene John Bigelow Janet Gilles Sir David Killian Associate Executive Producers: Linda Lu, Duchess of jobs & writer of winning resumes. Secretary-General: Matthew Lohmar Secretary General of Water Well Drillers Become a mem…
  continue reading
 
The DataTribe Challenge is a launchpad for elite cybersecurity and cyber-adjacent startups ready to break out. 2025 marks the 8th annual edition of the event with a change in venue and some exciting new updates. We take you on a journey from inception with Leo Scott, Managing Director and Chief Innovation Officer at DataTribe, and 3 past DataTribe …
  continue reading
 
Please enjoy this encore of Career Notes. Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down.…
  continue reading
 
Assaf Dahan, Director of Threat Research, Cortex XDR, at Palo Alto Networks, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified Phantom Taurus, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middl…
  continue reading
 
All of this week's episodes of It Could Happen Here put together in one large file. - SEIU 1000 Union Rep of the IE Reports Live from the Frontline - Everyone Hates Them: Trump, the Media and Jimmy Kimmel - Does Tylenol Give Your Baby Autism? - What Does the Antifa Executive Order Mean for Free Speech? - Executive Disorder: White House Weekly #36 Y…
  continue reading
 
In this final episode of The Lockdown, I reflect on the journey of the podcast, and explaining why I’m redirecting my energy to other projects. I discuss the importance of practical privacy measures, measures over an ‘all-or-nothing’ approach, as well as sharing my thoughts on threat modeling, and address several listener questions about privacy to…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Nick Espinosa, nationally syndicated host of The Deep Dive Radio Show, with guest Steve Zalewski, co-host, Defense in Depth Thanks to our show sponsor, Nudge Security Here’s the thing: your employees are signing up for new apps, sharing data, and connecting tool…
  continue reading
 
A fast-spreading malware campaign is abusing WhatsApp as both lure and launchpad. Carmaker Renault suffers a data breach. DrayTek patches a critical router flaw. CISA alerts cover a range of vulnerabilities. A new phishing kit lowers the bar for convincing lures. A Catholic hospital network pays $7.6 million to settle data breach litigation. A majo…
  continue reading
 
A notorious predominantly English-speaking hacking group has launched a website to extort its victims, threatening to release about a billion records stolen from companies who store their customers’ data in cloud databases hosted by Salesforce. Apple has removed ICEBlock and other apps from its App Store that allow users to anonymously report sight…
  continue reading
 
Three Buddy Problem - Episode 66: We discuss drone sightings that shut down airports across Europe and what they reveal about hybrid warfare and the changing nature of conflict; Oracle ransomware/extortion campaign tied to unpatched E-Business Suite vulnerabilities and the company’s muted response. Plus, the TikTok–Oracle deal and the strange role …
  continue reading
 
On today’s episode, Andy welcomes back Stefano Ritondale from @AllSourceNews to discuss the dramatic rise in U.S. cocaine consumption and its impact on Mexican cartels. Cocaine use has surged by 154% in western states since 2019, fueling the power of the Jalisco New Generation Cartel (CJNG), led by Nemesio Rubén “El Mencho” Oseguera Cervantes. Desp…
  continue reading
 
We’re doing the ransomware thing again - checking on the folks at Jaguar Land Rover, plus what may be a ransomware attack at Japanese brewery Asahi. Then - why isn’t the anti-phishing training at your work working? UC San Diego has some thoughts. All of that plus tiny updates from Apple on this edition of The Checklist, brought to you by SecureMac.…
  continue reading
 
Google says hackers associated with a prolific ransomware group are sending extortion emails to executives at “numerous” large organizations after claiming to have stolen their sensitive information from a suite of business software products developed by Oracle. Also, OpenAI has sold 6.6 billion dollars in shares held by current and former employee…
  continue reading
 
Government shutdown furloughs most CISA staff Microsoft Defender bug triggers erroneous BIOS update alerts Motility RV software company suffers cyberattack Huge thanks to our sponsor, Nudge Security Here's the thing: your employees are signing up for new apps, sharing data, and connecting tools together, often without anyone knowing. And, AI adopti…
  continue reading
 
The gang discuss the government shutdown, War Department plans to deploy troops to US cities, ICE raids in Chicago, new border wall construction, and a National Security Presidential Memo targeting political violence indicators like “anti-capitalism, anti-christianity, and extremism on migration, race, and gender.” https://www.gofundme.com/f/ec-off…
  continue reading
 
No Agenda Episode 1804 - "Mucho Retardo" "Mucho Retardo" Executive Producers: Sir Donald of the Fire Bottles No Name Commodore Semi-anonymous vegan Associate Executive Producers: Sir Adam of The Koch Empire. Nathan Parker Sean Homan Eli the coffee guy Anita suasso de Lima de Prado Linda Lu, Duchess of jobs & writer of winning resumes Peter Goodall …
  continue reading
 
CISA furloughs most of its workforce due to the government shutdown. The U.S. Air Force confirms it is investigating a SharePoint related breach. Google warns of a large-scale extortion campaign targeting executives. Researchers uncover Android spyware campaigns disguised as popular messaging apps. An extortion group claims to have breached Red Hat…
  continue reading
 
London-based actress Tilly Norwood has about 40 thousand Instagram followers. One thing to know though is she’s not real. She is an AI-generated character created by Xicoia, the AI division of the production company Particle6. Also, Apple is sidelining plans to overhaul its Vision Pro VR glasses to focus on developing AI smart glasses that can comp…
  continue reading
 
Breach notification letters set to flood North America's mailboxes New bug in classic Outlook only fixed via Microsoft support Air Force admits SharePoint privacy issue over breach Huge thanks to our sponsor, Nudge Security AI notetakers like Otter AI spread fast. In fact, one Nudge Security customer discovered 800 new accounts created in only 90 d…
  continue reading
 
James introduces a rebroadcast of Final Straw Radio in which Mo speaks with Bursts about the implications of recent Executive Orders and Memoranda for free speech and the First Amendment. https://thefinalstrawradio.noblogs.org/post/2025/09/28/the-implications-of-trumps-war-on-antifa-with-moira-meltzer-cohen/ See omnystudio.com/listener for privacy …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play