Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Spyware Podcasts

show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
  continue reading
 
Artwork

4051
Radio Free Security

WatchGuard LiveSecurity Service

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

4651
Threat Monitor

SearchSecurity.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork
 
In a landscape saturated with directives, Focal Point prioritizes discussions over dictation. The show’s mission is to present diverse perspectives on hot topics and current events, encouraging viewers to form their own opinions. Focal Point is an IRONCLAD Original.
  continue reading
 
Artwork

1
Deep Pockets

Petra Soderling

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Petra Söderling, the author of 'Governments and Innovation - the Economic Developer's Guide to Our Future', discusses the role governments play in creating new innovations, and innovation based industries. Intended audience: Economic Development and Foreign Direct Investment Professionals, Policy Makers, Civil Servants, CEOs, CFOs, R&D folks and tech enthusiasts. To subscribe to more free content go to https://petrasoderling.com/ Nothing in the show should be taken as investment advise.
  continue reading
 
Artwork
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
Artwork

1
Target USA Podcast by WTOP

WTOP | Hubbard Radio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Whether its terrorists, anarchists, cyber criminals or nation states, America has a target on its back. WTOP National Security Correspondent J.J. Green investigates the threats facing the U.S., the people behind them, the agencies fighting them and their impact on Americans.
  continue reading
 
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Artwork
 
Margo Cruz, the host of Tech Law Tracker, keeps up with new state-level regulations of the internet to find out how state laws are shaping the development and use of technology.
  continue reading
 
Artwork

4301
Anthony Desnos

Anthony Desnos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
I’m Anthony Desnos, a security engineer specializing in Android apps and malware analysis. Date of birth: 18/02/1985 Web: https://anthonydesnos.com/ Address: 4117 David Dr, CA California, US Gmail: [email protected] Social: https://gravatar.com/anthonydesnos522 https://www.facebook.com/anthonydesnos/ https://www.instagram.com/anthonydesnos552/ https://x.com/AnthonyDes19261 https://www.reddit.com/user/Crazy-Mousse-4053/ https://www.scoop.it/u/anthonydesnos522-gmail-com https://www.pi ...
  continue reading
 
Artwork

1
Cyber Humanity

Immersive Labs

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
  continue reading
 
Artwork

201
Untold: The Daniel Morgan Murder

Duende Productions and Flameflower Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The phone hacking scandal that closed News of the World was big, but that was just the tip of the iceberg. At the bottom of that iceberg of 'dark arts' - hacking, burglary, bugging, and bribing bent cops - is the body of Daniel Morgan. It’s been described by an Assistant Commissioner of the Metropolitan Police as “one of the most disgraceful episodes in the entire history of the Metropolitan Police Service.” Over the three decades since Daniel was killed, five failed police investigations an ...
  continue reading
 
Artwork

1
Views on First

Knight First Amendment Institute at Columbia University

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
“Views on First” is the Knight First Amendment Institute’s flagship podcast. Each season, we invite leading legal scholars, practitioners, tech policy experts, and others to join us in conversations about some of the most pressing First Amendment issues in the ever-shifting expressive landscape of the digital age. “Views on First: Season 1” won a 2024 Anthem Award Silver Medal and 2023 Signal Listener’s Choice Award and a Signal Silver Medal.
  continue reading
 
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
  continue reading
 
Loading …
show series
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Wondering why Gootloader is suddenly back in action? Join host Kim along with intelligence analyst Hayden & Systems Security Engineer Corey as they discuss: Gootloader Returns Using SEO Poisoning (1:27) New Android Spyware LANDFALL (6:33) Curly COMrades Hide in Windows Using Linux VMs (10:57) Sector…
  continue reading
 
Government surveillance vendors want us to believe their spyware products are only used in limited and targeted operations against terrorists and serious criminals. That claim is increasingly difficult to justify, given the broad range of victims — journalists, activists, and now political consultants — that have come forward. AI isn't all or nothi…
  continue reading
 
🎙️ Nevada Ransomware Traced to Malware Developer, CBO Cyberattack, Samsung Landfall Android Spyware 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1008: Today's episode will discuss the latest news: · ClickFix Attacks Against macOS Users Evolving with New Techniques …
  continue reading
 
We don't do holiday themed episodes in this house, so no tricks, but we have some treats for you. First we discuss the problem of shadow AI (1:00) and how it seems like we're just repeating the mistakes of previous tech waves in ignoring security until it's too late. Then we dig into a new report from Kaspersky about a crazy exploit they discovered…
  continue reading
 
A newly uncovered cyber-espionage operation known as Operation ForumTroll has revealed the resurgence of commercial spyware in state-sponsored surveillance campaigns. According to new research from Kaspersky, the campaign exploited a Google Chrome zero-day vulnerability (CVE-2025-2783) and targeted Russian and Belarusian organizations in government…
  continue reading
 
🎙️ Iberia Customer Data Leak After Vendor Breach, CrowdStrike Insider Feeding, Oracle Identity Zero-Day 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1016: Today's episode will discuss the latest news: · Cleveland County Oklahoma Attleboro Mass Law Enforcement Hit b…
  continue reading
 
Reuters reports that the executive order has been put on hold. If signed, the order would probably face significant opposition, including from Republicans who previously criticized the proposed moratorium on state regulation. Waymo continues to expand its reach, with the robotaxi company posting Friday that it’s now “officially authorized to drive …
  continue reading
 
-Cybersecurity giant CrowdStrike denied it had been hacked following claims from a hacker group, which leaked screenshots from inside CrowdStrike's network. -X's new feature will show where users are based, how they're connected to X, and how many times they've changed their username. -Two Trump-appointed FCC officials voted to undo the telecom ind…
  continue reading
 
It's an acronym-filled, government-only bonanza this week! We discuss the DoJ sanctioning Russian bulletproof hosting provider Media Land (0:53), the SEC dropping its enforcement action against SolarWinds and its CISO (13:25), and the FCC reversing course on a longstanding security rule for telecom providers (26:00). Support the show…
  continue reading
 
Google is upgrading its image generation model with new editing chops, higher resolutions, more accurate text rendering, and the ability to search the web. Also, the fire that broke out at the Oswego, NY Is the second major fire -- and the third overall -- in the last few months at the Novelis plant, Learn more about your ad choices. Visit podcastc…
  continue reading
 
🎙️ Russia VAK Cyberattack Outages, Amazon Iran Cyber-Enabled Kinetic Attacks, Bulletproof Hosting 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1015: Today's episode will discuss the latest news: · China Aligned Threat Actor Espionage Network Targets Devices Globall…
  continue reading
 
Written by: Lorenzo Franceschi-Bicchierai The story of the Ghost in the Shell’s main villain the Puppet Master hinted at a future where governments use hackers for espionage, at a time when most of the world had never connected to the internet. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Grenada is facing one of the most consequential national security decisions in its modern history, after the United States quietly requested permission to install a radar system and station military personnel on the island as it pursues action against Venezuela. Veteran Grenadian journalist Linda Straker breaks down the mystery behind the U.S. requ…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim, intelligence analyst John, and threat hunter Tristan as they discuss: Fortinet Flaw Enables Admin Takeover Akira Ransomware Targets Nutanix VMs Smart Redirects Evade Phishing Detection Threat Hunter Hacks: SEO Hits Hard Listen on @Listennotes: https://lnns.co/mgbyVjXv7p6 Kim Bromley: …
  continue reading
 
Former Treasury Secretary Larry Summers has resigned from OpenAI’s board days after Congress released an extensive cache of emails with convicted sex offender Jeffrey Epstein, which included details of intimate affairs. OpenAI is pushing deeper into retail, with Target set to debut a new ChatGPT-powered app for shoppers in coming weeks. The news fo…
  continue reading
 
🎙️ Major Battery Maker Ransomware, Iran Backdoors 30K Systems, Crypto Mining Ray Attack 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1014: Today's episode will discuss the latest news: · Security Community Aims to Reach Chinese Hackers via LinkedIn for Dialogue · C…
  continue reading
 
Constellation Energy will use the loan to refurbish a reactor it idled in 2019. Microsoft has agreed to buy the power once the facility reopens in 2028. Also, Hugging Face co-founder and CEO Clem Delangue says all the attention is on LLMs, but smaller, specialized models will make sense in many use cases going forward. Learn more about your ad choi…
  continue reading
 
Think your cell phone is safe from tracking? Steve reveals how global networks let anyone pinpoint your location—no hacking required and no malware involved. Apple introduces a new Digital ID inside Wallet. Checkout.com refuses to pay a ransom demand. Google announces "Private AI Compute" in the cloud. Google backpedals on their "devs must register…
  continue reading
 
Think your cell phone is safe from tracking? Steve reveals how global networks let anyone pinpoint your location—no hacking required and no malware involved. Apple introduces a new Digital ID inside Wallet. Checkout.com refuses to pay a ransom demand. Google announces "Private AI Compute" in the cloud. Google backpedals on their "devs must register…
  continue reading
 
Zap’s Fuze-3 device has been firing pulses of plasma at the company’s headquarters in Seattle, and the results of those experiments will ultimately inform the design of the company’s future demonstration plants. The Fuze-3 device was able to compress a soup of charged particles to more than two hundred thirty two thousand PSI and heat it to more th…
  continue reading
 
Dennis is joined by Rich Mogull, chief analyst at the Cloud Security Alliance, cloud security trainer, and all around good guy to talk about the Cloudflare outage, why the internet is now just six companies, and what, if anything, organizations can do to improve their resilience in the current environment. Support the show…
  continue reading
 
🎙️ DoorDash Personal Info Stolen | Penn AG Office Breach | Microsoft Aisuru Botnet 500K IPs | Chrome Zero-Day 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1013: Today's episode will discuss the latest news: · Iranian Hackers Target Defense and Government Officials …
  continue reading
 
One year ago, e-commerce giant Amazon kicked off its new online car sales business with Hyundai. Now, Ford is joining in with a certified used car twist. Also, Facebook's new content protection tool extends to Instagram too. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
  continue reading
 
🎙️ Anthropic Claude AI Powered 90% Chinese Espionage, Checkout.com Breach, WaPo 10K Oracle Hack 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1012: Today's episode will discuss the latest news: · Jaguar Land Rover Cyberattack Cost the Company Over $220 Million · Aki…
  continue reading
 
The company has been quietly changing how it talks about who its internet customers will be before it announced a big name change last week. Also, a federal jury in California ruled Friday that Apple must pay medical device maker Masimo $634 million for infringing a patent on blood oxygen monitoring technology. Learn more about your ad choices. Vis…
  continue reading
 
The European Quantum Technologies Conference - EQTC - 2025 was buzzing! From policy and industry to startups and unicorns, Europe’s quantum ecosystem faces a high-stakes moment. Listen in for interviews, insights, and why this is the moment to hop into quantum. Joining me on this episode are guests from across the quantum ecosystem, sharing their i…
  continue reading
 
The group chat is available to Free, Plus, and Team users on both mobile and web platforms. OpenAI says the pilot is designed to explore how people use group conversations in ChatGPT. Also, in a video announcing the release of beehiiv, Tyler Denk, the co-founder and CEO of beehive, said that what makes newsletter platforms powerful is ownership. “O…
  continue reading
 
This week was a bit of a throwback to olden times, with the disclosure by Amazon threat intelligence of zero days in Cisco and Citrix products that were exploited by an unnamed APT, and Google using legal action to disrupt the Lighthouse phishing service operation. We dig into those two stories, plus we discuss the challenge of trying to quantify t…
  continue reading
 
Chad: the Brainrot IDE is an actual product that pairs vibe coding with brainrot activities like gambling, Tinder and games. Also, orders of the Besties Tequila were supposed to be fulfilled by end of summer but were delayed again and again due to the bottle. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
🎙️ Synnovis Notifies Data Breach After 2024 Ransomware, Google Sues Chinese Phishing Scams, UK New Cyber Laws 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1011: Today's episode will discuss the latest news: · OpenAI Court Order Sparks NYT Copyright Dispute Over AI …
  continue reading
 
These palm-sized robots use ultrasound signals to navigate harsh conditions in search and rescue missions. Also, the autocomplete will help users create more effective prompts for AI apps, resulting in fewer back-and-forths. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
  continue reading
 
"You know, you really don't need a forensics team to get to the bottom of this. If you guys were the inventors of Facebook, you'd have invented Facebook." Melanie Ensign joins Dennis Fisher and Lindsey O'Donnell-Welch to discuss David Fincher's massively successful 2010 film, The Social Network, a movie that opens a window into the dark side of Sil…
  continue reading
 
U.S. President Donald Trump’s threat to send troops or cut aid to Nigeria has triggered a diplomatic and security storm across Africa. In this episode, we speak with humanitarian journalist Usman Abbba Zanna from Maiduguri, who explains how Trump’s words could inflame tensions, embolden extremists, and reshape Nigeria’s ties to the West. See Privac…
  continue reading
 
The U.S. is far ahead of Europe in the race for large AI models, at least in funding. But the picture is different for the application layer, global VC firm Accel highlighted in its 2025 Globalscape report. Also, Australia's intelligence chief warned that Chinese hackers are trying to break into its networks, sometimes successfully, to "pre-positio…
  continue reading
 
🎙️ GlobalLogic Warns 10,000 Employees Data Theft, Asahi Japan Crippled, Adobe Patches 29 Flaws 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1010: Today's episode will discuss the latest news: · SAP Patches Critical Flaws in SQL Anywhere Monitor Solution Manager · F…
  continue reading
 
Robyn wants to position it self as an empathetic chatbot and not as a companion or a therapy app. Also, Yann LeCun, a chief AI scientist at Meta, is planning to leave the company to build his own startup, which will focus on continuing his work on world models. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
Amazon is taking Perplexity AI to court over its agentic browser that shops on your behalf, raising urgent questions about who controls your online buying experience when bots do the heavy lifting. FFmpeg teaching assembly language for performance. The state of Nevada recovers after not paying ransom. A "rounding error" nets a clever attacker $128 …
  continue reading
 
Amazon is taking Perplexity AI to court over its agentic browser that shops on your behalf, raising urgent questions about who controls your online buying experience when bots do the heavy lifting. FFmpeg teaching assembly language for performance. The state of Nevada recovers after not paying ransom. A "rounding error" nets a clever attacker $128 …
  continue reading
 
The platform has attracted an eclectic user base. More than half of Fortune 500 companies are using Lovable to "supercharge creativity," according to Osika, who insisted retention remains strong. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
  continue reading
 
🎙️ Nearly 30 Oracle EBS Victims Named, Hackers Exploit Ivanti Flaw, APT37 Abuse Google Find Hub 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1009: Today's episode will discuss the latest news: · CISA 2015 Information Sharing Law Renewal Bill Ending Shutdown Threat …
  continue reading
 
After Tesla shareholders approved a new compensation package that could be worth $1 trillion, CEO Elon Musk appears to be celebrating with a normal weekend on his social media platform X. Also, if you watched all the way to the end of the new Apple TV show “Pluribus,” you may have noticed an unusual disclaimer in the credits: “This show was made by…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play