Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Spyware Podcasts

show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
Threat Monitor

SearchSecurity.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
  continue reading
 
Artwork

1
Fact & Spin

Improve the News Foundation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Join Scott Wallace and the team for our daily podcast that lets you discover the truth behind the day’s biggest news headlines! Visit our website at www.verity.news
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and ...
  continue reading
 
Artwork

1
Machines Like Us

The Globe and Mail

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Machines Like Us is a technology show about people. We are living in an age of breakthroughs propelled by advances in artificial intelligence. Technologies that were once the realm of science fiction will become our reality: robot best friends, bespoke gene editing, brain implants that make us smarter. Every other Tuesday Taylor Owen sits down with the people shaping this rapidly approaching future. He’ll speak with entrepreneurs building world-changing technologies, lawmakers trying to ensu ...
  continue reading
 
Artwork

1
Fascism in Cinema

Dr. Tenzan Eaghll

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The podcast where academics and plebs critically discuss representations of fascism and anti-fascism in modern cinema. Hosted by Tenzan Eaghll and Nathan Litwin. Let's get critical!
  continue reading
 
Artwork
 
Margo Cruz, the host of Tech Law Tracker, keeps up with new state-level regulations of the internet to find out how state laws are shaping the development and use of technology.
  continue reading
 
Artwork
 
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
  continue reading
 
Artwork

1
Anthony Desnos

Anthony Desnos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
I’m Anthony Desnos, a security engineer specializing in Android apps and malware analysis. Date of birth: 18/02/1985 Web: https://anthonydesnos.com/ Address: 4117 David Dr, CA California, US Gmail: [email protected] Social: https://gravatar.com/anthonydesnos522 https://www.facebook.com/anthonydesnos/ https://www.instagram.com/anthonydesnos552/ https://x.com/AnthonyDes19261 https://www.reddit.com/user/Crazy-Mousse-4053/ https://www.scoop.it/u/anthonydesnos522-gmail-com https://www.pi ...
  continue reading
 
Artwork

1
Cyber Humanity

Immersive Labs

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
  continue reading
 
Artwork

1
Untold: The Daniel Morgan Murder

Duende Productions and Flameflower Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The phone hacking scandal that closed News of the World was big, but that was just the tip of the iceberg. At the bottom of that iceberg of 'dark arts' - hacking, burglary, bugging, and bribing bent cops - is the body of Daniel Morgan. It’s been described by an Assistant Commissioner of the Metropolitan Police as “one of the most disgraceful episodes in the entire history of the Metropolitan Police Service.” Over the three decades since Daniel was killed, five failed police investigations an ...
  continue reading
 
Artwork

1
Views on First

Knight First Amendment Institute at Columbia University

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
“Views on First” is the Knight First Amendment Institute’s flagship podcast. Each season, we invite leading legal scholars, practitioners, tech policy experts, and others to join us in conversations about some of the most pressing First Amendment issues in the ever-shifting expressive landscape of the digital age. “Views on First: Season 1” won a 2024 Anthem Award Silver Medal and 2023 Signal Listener’s Choice Award and a Signal Silver Medal.
  continue reading
 
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
  continue reading
 
Loading …
show series
 
China holds a military parade with Vladimir Putin and Kim Jong Un, the U.S. military strikes an alleged Tren de Aragua drug boat, killing 11, the Thai government seeks House dissolution as the opposition backs a rival's Prime Minister bid, U.K. Deputy Prime Minister Rayner admits to stamp duty underpayment, the Trump administration lifts a hold on …
  continue reading
 
A pair of newly discovered zero-day vulnerabilities—CVE-2025-43300 in Apple’s ImageIO framework and CVE-2025-55177 in WhatsApp—have been confirmed as part of a sophisticated spyware campaign targeting both iPhone and Android users. Security researchers revealed that attackers chained these flaws together in seamless zero-click exploits, requiring n…
  continue reading
 
Putin and Xi are heard on a hot mic discussing immortality, RFK Jr. faces bipartisan questioning before the Senate Finance Committee, 26 nations pledge post-war security guarantees for Ukraine, a report alleges that one-in-four Gaza detainees are identified as militants, at least 15 are killed in a funicular tram crash in Portugal’s Lisbon, a mass …
  continue reading
 
Cato Networks, a leader in Secure Access Service Edge (SASE), has made its first acquisition, purchasing Aim Security, an AI security startup founded in 2022. The acquisition, valued at an estimated $300–350 million, represents a major step in addressing the growing risks tied to generative AI adoption in enterprises. As organizations increasingly …
  continue reading
 
No Agenda Episode 1796 - "Zeds" "Zeds" Executive Producers: Sir Kevin Keeper of the Spee, Secretary-General of Portland Sir Digi Jason Daniels - Secretary-General of West Texas, Commodore of Coleman County, Knight of Lake Highlands and Duke of the Republic of Texas Sir Robert, Knight of the Seven Villages, and Sir Jonny B. Good Sir Scovee Sir Gene …
  continue reading
 
Cybersecurity startup Tidal Cyber, founded in 2022 by three former MITRE experts, has raised $10 million in Series A funding, bringing its total capital to $15 million. The funding will accelerate the company’s product innovation and expansion, advancing its mission to operationalize the MITRE ATT&CK framework and empower organizations with threat-…
  continue reading
 
Disney has reached a $10 million settlement with the U.S. Federal Trade Commission (FTC) after being found in violation of the Children’s Online Privacy Protection Act (COPPA). At the heart of the case is Disney’s failure to properly label child-directed content on YouTube as “Made for Kids” (MFK). Instead, many videos — including clips from Frozen…
  continue reading
 
Google has released its September 2025 Android security patches, addressing a staggering 111 unique vulnerabilities, including two actively exploited zero-day flaws that are already being used in targeted attacks. These zero-days — CVE-2025-38352, a Linux kernel race condition, and CVE-2025-48543, a flaw in the Android Runtime — allow attackers to …
  continue reading
 
A critical zero-day vulnerability, CVE-2025-53690, is being actively exploited in the wild, targeting Sitecore Experience Manager (XM) and Experience Platform (XP) systems deployed with outdated ASP.NET machine keys. Google and Microsoft threat intelligence teams have confirmed that attackers are leveraging ViewState deserialization attacks to achi…
  continue reading
 
Your AI reads the small print, and that's a problem. This week in episode 433 of "Smashing Security" we dig into LegalPwn - malicious instructions tucked into code comments and disclaimers that sweet-talks AI into rubber-stamping dangerous payloads (or even pretending they’re a harmless calculator). Meanwhile, new research from Anthropic reveals th…
  continue reading
 
When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a loo…
  continue reading
 
When even the Department of Defense can't properly vet its software dependencies, what chance do the rest of us have? Steve Gibson reveals how "fast-glob" became a case study in supply chain blindness, explores whether AI can ever truly be controlled after Meta's celebrity chatbot disaster, and celebrates BYTE Magazine's 50th anniversary with a loo…
  continue reading
 
Trump moves Space Command’s headquarters to Alaska, Belgium announces plans to recognize the State of Palestine, Von der Leyen's plane is allegedly hit by GPS interference, Romania's coalition faces no-confidence votes, a judge rules that Trump's LA military deployment was illegal, British comedian Graham Linehan is arrested over an X post on trans…
  continue reading
 
A new and highly sophisticated Android malware campaign, dubbed Brokewell, has emerged as one of the most dangerous mobile threats of 2024–2025. First spotted in April 2024 disguised as fake browser updates, Brokewell has since evolved into a fully featured spyware and remote access trojan (RAT), delivered through deceptive Meta (Facebook) advertis…
  continue reading
 
Aviation safety and geopolitics collided when multiple flights carrying high-ranking European and UK officials were hit by suspected Russian GPS jamming. European Commission President Ursula von der Leyen’s flight to Bulgaria experienced a severe GPS outage, forcing a manual landing. EU officials immediately pointed the finger at Moscow, calling th…
  continue reading
 
In August 2025, the largest SaaS breach of the year shook the enterprise world when a newly identified threat actor, UNC6395, orchestrated a supply-chain attack through compromised Salesloft Drift and Drift Email applications. By stealing OAuth tokens, the attackers gained unauthorized access to Salesforce and Google Workspace environments of more …
  continue reading
 
China hosts the largest-ever Shanghai Cooperation Organization (SCO) summit, A powerful earthquake causes widespread casualties in Eastern Afghanistan, President Donald Trump mulls a U.S.-led Gaza relocation effort, Guyana-Venezuela tensions mount ahead of the Guyanese general election, Houthis raid U.N. offices in Yemen and detain 11 staff, Vladim…
  continue reading
 
No Agenda Episode 1795 - "Dead Feathered" "Dead Feathered" Executive Producers: Sir Scovee, Duke of the Piedmont Kimberly Hillage Scott Readicker Sir Castic the Nomad Carrie Konkel Matt Matthew Montgomery Associate Executive Producers: Dame Astrid & Sir Mark Arch Duchess and Arch Duke of Japan and all the Islands in the Japan Sea Tom Stecich Sean H…
  continue reading
 
Thai Prime Minister Paetongtarn Shinawatra is removed from office, South Korea's ex-First Lady Kim Keon-hee is indicted on bribery charges, Trump reportedly names Jim O'Neill as acting CDC director, the U.S. ends a tariff exemption on shipping packages under $800, a UK court overturns an order to close an asylum hotel, Trump revokes Kamala Harris' …
  continue reading
 
Trump hosts post-war Gaza talks, The White House fires the CDC’s director, North Korea’s Kim and Russia’s Putin agree to attend a military parade in Beijing, Japan’s trade envoy cancels a trip to Washington, Anthropic forms a national security advisory council, Nvidia’s Q2 revenue beats expectations at $46.7 billion, The FDA limits COVID-19 vaccine…
  continue reading
 
Sweden is reeling from one of the largest public sector cyber incidents in its history. A ransomware attack on Miljödata, an IT services provider supporting nearly 80% of Sweden’s municipalities and several regions, has left critical systems inaccessible and raised fears of a massive leak of sensitive personal data. The stolen information could inc…
  continue reading
 
The cybersecurity world has entered a new era: AI-powered ransomware. Researchers recently uncovered PromptLock, a proof-of-concept malware that uses OpenAI’s gpt-oss:20b model and Lua scripting to autonomously generate malicious code, encrypt data, and exfiltrate files across Windows, Linux, and macOS. While still experimental, PromptLock demonstr…
  continue reading
 
The 2025 Purple Knight Report paints a stark picture of enterprise identity security: the average security assessment score for hybrid Active Directory (AD) and Entra ID environments has plummeted to just 61%—a failing grade and an 11-point decline since 2023. This troubling trend underscores the persistent challenges organizations face in protecti…
  continue reading
 
No Agenda Episode 1794 - "Heroin Hotties" "Heroin Hotties" Executive Producers: Sir Tall Paul Sir Commodore SX-64 Augusto Andreoli Matthew Martell Sir Kretchman Joe Spry Associate Executive Producers: Aaron DuVall Skylar Firestone Dame lisa Sir Camera Chris Jarrett Bayne Gabriel Dubaere Eli the coffee guy Linda Lu Duchess of jobs & writer of winnin…
  continue reading
 
Cybercrime is entering a new phase—one marked by AI-powered phishing attacks, the weaponization of legitimate remote access tools, and the rise of professionalized underground markets. Recent reports highlight the alarming growth of AI-driven polymorphic phishing, where malicious emails are automatically tailored, randomized, and adapted in real ti…
  continue reading
 
The recent Salesforce data breach underscores a growing reality in cybersecurity: even when core SaaS platforms are secure, their third-party integrations often aren’t. Between August 8–18, 2025, attackers from the group UNC6395 exploited compromised OAuth tokens from the Salesloft Drift AI chat integration, systematically exporting data from hundr…
  continue reading
 
Trump's 50% tariffs on India take effect, Brazil's Bolsonaro is placed under 24-hour surveillance, the U.S. reportedly offers air and intelligence support to police Ukraine's post-war security, Denmark summons its senior U.S. envoy over an alleged Greenland influence operation, Two children are killed in a shooting during Mass at a Minneapolis Cath…
  continue reading
 
A new and highly sophisticated cyber espionage campaign attributed to Silk Typhoon—also known as Mustang Panda, TEMP.Hex, or UNC6384—has been uncovered, targeting diplomats and government entities across Southeast Asia. Researchers from Google’s Threat Intelligence Group (GTIG) revealed that the attackers deployed Adversary-in-the-Middle (AitM) tec…
  continue reading
 
We unpack how some password managers can be tricked into coughing up your secrets, with a clickjacking sleight-of-hand, what website owners can do to prevent it, and how to lock down your personal password vault. Then we time-hop to the post-quantum scramble: "harvest-now, decrypt later", Microsoft's 2033 quantum-safe pledge, and whether your print…
  continue reading
 
The fight over encryption has entered a new phase. The Federal Trade Commission (FTC), led by Chairman Andrew Ferguson, has issued a strong warning to major U.S. technology companies: resist foreign government demands to weaken encryption. At stake is nothing less than the security of millions of Americans’ private communications, financial data, a…
  continue reading
 
Researchers have uncovered a new form of indirect prompt injection that leverages a simple but powerful trick: image scaling. This novel attack involves hiding malicious instructions inside high-resolution images, invisible to the human eye. When AI systems automatically downscale these images during preprocessing, the hidden prompt becomes visible…
  continue reading
 
The healthcare sector has been rocked yet again by a massive cybersecurity incident. Healthcare Services Group (HCSG), a provider of dining and laundry services to healthcare facilities, disclosed a data breach that compromised the personal information of over 624,000 individuals. Between late September and early October 2024, hackers gained unauth…
  continue reading
 
French retail giant Auchan has confirmed a massive data breach that compromised the personal details of hundreds of thousands of customers. The stolen data includes names, addresses, phone numbers, email addresses, and loyalty card numbers—though banking details, passwords, and PINs were reportedly not affected. Despite this, the breach is serious …
  continue reading
 
Trump fires Federal Reserve Governor Lisa Cook, Australia expels Iran’s ambassador, France’s François Bayrou calls for a confidence vote, Trump threatens to sue California over its redistricting plans, Cambodian lawmakers pass a law allowing the revocation of citizenship, Australian police conduct a manhunt for a gunman who killed two officers, Elo…
  continue reading
 
Alarm bells are ringing over a supposed browser zero-day, but is the threat as bad as it sounds? Steve reveals why "clickjacking" might be more whac-a-mole than breaking news, and what that really means for your passwords. • Germany may soon outlaw ad blockers • What's happening in the courts over AI • The U.K. drops its demands of Apple • New Micr…
  continue reading
 
Alarm bells are ringing over a supposed browser zero-day, but is the threat as bad as it sounds? Steve reveals why "clickjacking" might be more whac-a-mole than breaking news, and what that really means for your passwords. • Germany may soon outlaw ad blockers • What's happening in the courts over AI • The U.K. drops its demands of Apple • New Micr…
  continue reading
 
A critical vulnerability in Docker Desktop, CVE-2025-9074, has shaken the container security world. Scoring 9.3 on the CVSS scale, this flaw exposed an unauthenticated Docker Engine API (192.168.65.7:2375) to any container running on Windows and macOS. With nothing more than a few HTTP requests—or even three lines of Python code—attackers could esc…
  continue reading
 
The Arch Linux community has just endured more than a week of turbulence as a massive distributed denial-of-service (DDoS) attack disrupted its most critical services, including the main website, the Arch User Repository (AUR), and community forums. Beginning in mid-August 2025, the sustained volumetric and protocol-level assault overwhelmed hostin…
  continue reading
 
Cyberattacks against supply chains are no longer isolated disruptions—they are systemic threats with the power to cascade across industries and nations. The recent ransomware attack on Data I/O, a chip programming firm whose customers include global giants like Apple, Microsoft, Amazon, and Bosch, demonstrates how one breach can disrupt manufacturi…
  continue reading
 
The U.S. healthcare sector continues to face relentless cyberattacks, and rural hospitals are increasingly at the center of this crisis. The recent Aspire Rural Health System breach in Michigan—attributed to the BianLian ransomware group—exposed the personal and medical data of nearly 140,000 patients and staff. From Social Security numbers and fin…
  continue reading
 
Artificial Intelligence (AI) models are shaping the future of industries from healthcare and finance to autonomous vehicles and national infrastructure. But with this rise comes a hidden battlefield: adversarial attacks designed to manipulate AI systems in subtle yet devastating ways. One of the most alarming threats is the OneFlip attack, a method…
  continue reading
 
Trump hosts South Korean President Jae-Myung Lee at the White House, An Israeli strike kills five journalists at a Gaza hospital, Typhoon Kajiki forces mass evacuations in Vietnam, Trump threatens military deployment to Baltimore, Zelenskyy says Ukraine can strike Russia without US permission, Israel strikes Yemen's capital after a Houthi cluster b…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play