Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Spyware Podcasts

show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
Threat Monitor

SearchSecurity.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
  continue reading
 
Artwork
 
In a landscape saturated with directives, Focal Point prioritizes discussions over dictation. The show’s mission is to present diverse perspectives on hot topics and current events, encouraging viewers to form their own opinions. Focal Point is an IRONCLAD Original.
  continue reading
 
Artwork

1
Machines Like Us

The Globe and Mail

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Machines Like Us is a technology show about people. We are living in an age of breakthroughs propelled by advances in artificial intelligence. Technologies that were once the realm of science fiction will become our reality: robot best friends, bespoke gene editing, brain implants that make us smarter. Every other Tuesday Taylor Owen sits down with the people shaping this rapidly approaching future. He’ll speak with entrepreneurs building world-changing technologies, lawmakers trying to ensu ...
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Artwork

1
Deep Pockets

Petra Soderling

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Petra Söderling, the author of 'Governments and Innovation - the Economic Developer's Guide to Our Future', discusses the role governments play in creating new innovations, and innovation based industries. Intended audience: Economic Development and Foreign Direct Investment Professionals, Policy Makers, Civil Servants, CEOs, CFOs, R&D folks and tech enthusiasts. To subscribe to more free content go to https://petrasoderling.com/ Nothing in the show should be taken as investment advise.
  continue reading
 
Artwork

1
Target USA Podcast by WTOP

WTOP | Hubbard Radio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Whether its terrorists, anarchists, cyber criminals or nation states, America has a target on its back. WTOP National Security Correspondent J.J. Green investigates the threats facing the U.S., the people behind them, the agencies fighting them and their impact on Americans.
  continue reading
 
Reckon you know who’s running Europe? Think again. Every week, we dive into a Follow the Money investigation exposing the continent’s hidden powerbrokers: from deceiving companies and influential lobbyists to corrupt politicians and financial fraudsters. Tune into our podcast and join our journalists as they reveal how they uncovered the truth and held power to account.Presented by Emma du Chatinier and Alexander Fanta.
  continue reading
 
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
  continue reading
 
Artwork
 
Margo Cruz, the host of Tech Law Tracker, keeps up with new state-level regulations of the internet to find out how state laws are shaping the development and use of technology.
  continue reading
 
Artwork

1
Anthony Desnos

Anthony Desnos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
I’m Anthony Desnos, a security engineer specializing in Android apps and malware analysis. Date of birth: 18/02/1985 Web: https://anthonydesnos.com/ Address: 4117 David Dr, CA California, US Gmail: [email protected] Social: https://gravatar.com/anthonydesnos522 https://www.facebook.com/anthonydesnos/ https://www.instagram.com/anthonydesnos552/ https://x.com/AnthonyDes19261 https://www.reddit.com/user/Crazy-Mousse-4053/ https://www.scoop.it/u/anthonydesnos522-gmail-com https://www.pi ...
  continue reading
 
Artwork

4
Cyber Humanity

Immersive Labs

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
  continue reading
 
Artwork

1
Untold: The Daniel Morgan Murder

Duende Productions and Flameflower Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The phone hacking scandal that closed News of the World was big, but that was just the tip of the iceberg. At the bottom of that iceberg of 'dark arts' - hacking, burglary, bugging, and bribing bent cops - is the body of Daniel Morgan. It’s been described by an Assistant Commissioner of the Metropolitan Police as “one of the most disgraceful episodes in the entire history of the Metropolitan Police Service.” Over the three decades since Daniel was killed, five failed police investigations an ...
  continue reading
 
Artwork

1
Views on First

Knight First Amendment Institute at Columbia University

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
“Views on First” is the Knight First Amendment Institute’s flagship podcast. Each season, we invite leading legal scholars, practitioners, tech policy experts, and others to join us in conversations about some of the most pressing First Amendment issues in the ever-shifting expressive landscape of the digital age. “Views on First: Season 1” won a 2024 Anthem Award Silver Medal and 2023 Signal Listener’s Choice Award and a Signal Silver Medal.
  continue reading
 
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
  continue reading
 
Loading …
show series
 
We don't do holiday themed episodes in this house, so no tricks, but we have some treats for you. First we discuss the problem of shadow AI (1:00) and how it seems like we're just repeating the mistakes of previous tech waves in ignoring security until it's too late. Then we dig into a new report from Kaspersky about a crazy exploit they discovered…
  continue reading
 
A newly uncovered cyber-espionage operation known as Operation ForumTroll has revealed the resurgence of commercial spyware in state-sponsored surveillance campaigns. According to new research from Kaspersky, the campaign exploited a Google Chrome zero-day vulnerability (CVE-2025-2783) and targeted Russian and Belarusian organizations in government…
  continue reading
 
Atlas browser hijacked Bye, bye Twitter birdie Dante spyware surfaces Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Conveyor takes all that chaos and turns it into calm. AI fills in the que…
  continue reading
 
A change in iOS is deleting-clues of old spyware infections, Starlink disables 2,500 terminals at scam compounds, a Caribbean hospital is still down 5 months after a ransomware attack, and officials are charged in Poland’s Pegasus spyware scandal. Show notes Risky Bulletin: iOS 26 change deletes clues of old spyware infections…
  continue reading
 
Jen Roberts, Associate Director of the Atlantic Council’s Cyber Statecraft Initiative, and Sarah Graham, Research Consultant with the Atlantic Council’s Cyber Statecraft Initiative, who are coauthors along with Nitansha Bansal of the recent paper, “Mythical Beasts: Diving Into the Depths of the Global Spyware Market,” join Lawfare’s Justin Sherman …
  continue reading
 
A stranger reading your messages, tracking your movements, scrolling through your photos. That's what spyware can do – without you even knowing. It’s marketed as a tool to fight terrorism and crime, but it’s also used to silence journalists, activists, and political opponents.Greek journalist Vas Panagiotopoulos reveals how the EU and national gove…
  continue reading
 
Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vec…
  continue reading
 
CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Lu…
  continue reading
 
On today’s episode, Andy and Mike Baker break down Mexico’s president denying a Reuters report on the CIA’s covert role in the drug war. Full Reuters Report: https://www.reuters.com/world/americas/mexico-president-attacks-reuters-report-cias-role-countrys-drug-war-2025-09-12/ Buy Target Intelligence: PSYOP with Shawn Ryan: http://psyopshow.com/ Spo…
  continue reading
 
It's Halloween! There's a guy with an axe who wants to get into your iPhone! We'll talk about keeping him out. Plus - ghosts may not be real, but ghost accounts are. We'll tell you how to be a ghost account buster on this edition of The Checklist, brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get in touch with u…
  continue reading
 
Alan Rozenshtein, Senior Editor at Lawfare, speaks with Brett Goldstein, Special Advisor to the Chancellor on National Security and Strategic Initiatives at Vanderbilt University; Brett Benson, Associate Professor of Political Science at Vanderbilt University; and Renée DiResta, Lawfare Contributing Editor and Associate Research Professor at George…
  continue reading
 
LinkedIn users have until Monday to opt out of its AI training program New names surface for NSA leadership Open-source security group pulls out of U.S. grant, citing DEI restrictions Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer re…
  continue reading
 
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video ⁠here⁠. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
  continue reading
 
A Texas telecom confirms a nation-state attack. A global outage disrupts Azure and Microsoft 365 services. Malicious npm packages steal sensitive data from Windows, Linux, and macOS systems. Hacktivists have breached multiple critical infrastructure systems across Canada. Major chipmakers spill the TEE. TP-Link home routers fall under federal scrut…
  continue reading
 
This week, Scott sat down with his Lawfare colleagues Public Service Fellow Ari Tabatabai and Managing Editor Tyler McBrien to talk through the week’s big news in national security, including: “Great APEC-tations.” President Trump is headed to Asia this week, both for a meeting of the regional Asia-Pacific Economic Cooperation (APEC) organization a…
  continue reading
 
On today’s episode, Lawfare Managing Editor Tyler McBrien sits down with Quico Toro, global opinion columnist at the Washington Post and Director of Climate Repair at the Anthropocene Institute, to talk about his new book, “Charlatans: How Grifters, Swindlers, and Hucksters Bamboozle the Media, the Markets, and the Masses,” which he wrote with his …
  continue reading
 
LG Uplus confirms cybersecurity incident 10 million+ impacted by Conduent breach Russian hackers exploit tools against Ukrainian targets Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Convey…
  continue reading
 
Tom Uren and Amberleigh Jack talk about Peter Williams, the general manager of vulnerability research firm Trenchant, who has pleaded guilty to selling exploits to the Russian 0day broker Operation Zero. It’s a terrible look, but it doesn’t mean the private sector can’t be trusted to develop exploits. They also discuss a new report’s recommendation…
  continue reading
 
Explosions rock a shuttered Myanmar cybercrime hub. The Aisuru botnet shifts from DDoS to residential proxies. Dentsu confirms data theft at Merkle. Boston bans biometrics. Proton restores journalists’ email accounts after backlash. Memento labs admits Dante spyware is theirs. Australia accuses Microsoft of improperly forcing users into AI upgrades…
  continue reading
 
New Android malware types like a human Sanctions weaken nation-state cyber ecosystems Side-channel attack extracts Intel, AMD secrets Huge thanks to our sponsor, Conveyor Have you been personally victimized by a questionnaire this week? The queue never ends. But Conveyor can change that story. With AI that answers questionnaires of any format, and …
  continue reading
 
Katsiaryna Shmatsina, Eurasia Fellow at Lawfare, sits down with Gabrielius Landsbergis, former Lithuanian Foreign Minister (2020–2024), now a visiting fellow at Stanford University, and Vytis Jurkonis, Associate Professor at Vilnius University and Director of Freedom House’s Lithuania office. They discuss Lithuania’s response to Russia’s full-scale…
  continue reading
 
A global smishing campaign of unprecedented scale has been uncovered by Palo Alto Networks, revealing the vast operations of a Chinese-speaking threat actor known as the Smishing Triad. Since January 2024, the group has deployed more than 194,000 malicious domains, impersonating legitimate organizations ranging from toll and postal services to bank…
  continue reading
 
A NATO corruption scandal made international headlines when several suspects were arrested across Europe earlier this year. But a cross-border investigation reveals that just a few months later, the United States quietly dropped charges against four of them – despite strong evidence. FTM journalists Jesse Pinster and Simon Van Dorpe reveal how one …
  continue reading
 
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting la…
  continue reading
 
Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting la…
  continue reading
 
The global ransomware economy is collapsing under growing resistance from its targets. According to new data from cybersecurity firm Coveware, the third quarter of 2025 saw ransomware payments drop to a historic low, with just 23% of victims paying attackers—a continuation of a six-year downward trend. Even when ransoms were paid, the average payme…
  continue reading
 
WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden’s power grid operator confirms a cyberattack. Italian spyware targets …
  continue reading
 
Mozilla is taking a decisive step toward transparency and user control by requiring all Firefox extensions to disclose how they collect and handle personal data. The new mandate introduces a dedicated key—browser_specific_settings.gecko.data_collection_permissions—that every extension must include in its manifest file. Whether or not an extension c…
  continue reading
 
Chainguard, the Kirkland, Washington-based cybersecurity company, has announced a landmark $280 million growth funding round led by General Catalyst’s Customer Value Fund (CVF), pushing its total capital raised to nearly $900 million and valuing the firm at $3.5 billion. This new round marks a pivotal phase for Chainguard as it shifts from product-…
  continue reading
 
Sarah Powazek, Director of the Public Interest Cybersecurity Program at UC Berkeley’s Center for Long-Term Cybersecurity, and Michael Razeeq, Nonresident Fellow at the Public Interest Cybersecurity Program, join Lawfare’s Justin Sherman to discuss the cyber threats facing states, what options and resources states currently have to address cybersecu…
  continue reading
 
Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In t…
  continue reading
 
The Pwn2Own Ireland 2025 hacking competition was set to feature one of its most anticipated moments — a $1 million zero-click remote code execution exploit against WhatsApp — but the demonstration never happened. Scheduled to be showcased by researcher Eugene of Team Z3, the exploit’s abrupt withdrawal stunned attendees and quickly became the most …
  continue reading
 
Link to episode page This week's edition of The Department of Know is hosted by Rich Stroffolino with guests Bil Harmer, operating partner and CISO, Craft Ventures, and Sasha Pereira, CISO, WASH Thanks to our show sponsor, ThreatLocker If security questionnaires make you feel like you're drowning in chaos, you're not alone. Endless spreadsheets, po…
  continue reading
 
A serious vulnerability has been discovered in the OpenAI Atlas omnibox, a hybrid interface designed to handle both URLs and user prompts. Researchers at NeuralTrust revealed that attackers can disguise malicious instructions as URLs to jailbreak the omnibox, taking advantage of how Atlas interprets malformed input. Unlike traditional browsers, Atl…
  continue reading
 
The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of G…
  continue reading
 
A critical remote code execution (RCE) flaw, tracked as CVE-2025-59287, has put thousands of enterprise networks at risk by exposing the Windows Server Update Service (WSUS) to active exploitation. The vulnerability, rooted in unsafe object deserialization, allows unauthenticated remote attackers to execute arbitrary code with System-level privileg…
  continue reading
 
In this edition of Between Two Nerds Tom Uren and The Grugq dissect a recent Chinese CERT report that the NSA had hacked China’s national time keeping service. This episode is also available on Youtube. Show notes MSS Weixin post CN-CERT technical analysis Global Times on X BTN110: The NSA's nine to five hacking campaign…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play