Want to learn more about how terrorists and violent extremists are using the internet to communicate and share propaganda? Perhaps you’re interested in why terrorists share their manifestos online and livestream their attacks? The Tech Against Terrorism podcast is a deep dive into the evolving use of the internet by terrorists and violent extremists, how this relates to real world harms, and what can be done to support the tech sector to disrupt this threat. Join us as we speak to the world’ ...
…
  continue reading
Tech Exploits Podcasts
A show about hacking the system, hosted by Patrick Tomasso and Gabi Pirraglia. Patrick is a content creator and Gabi is digital strategist, together they pull apart the internet and social media to reveal the hidden creative formulas for success.
…
  continue reading
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
  continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
  continue reading
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
…
  continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
  continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
  continue reading
We hear enough about our problems. Let’s solve them. Every Monday, journalist, analyst and entrepreneur Henry Blodget interviews leading thinkers across business, tech, politics and beyond about their big ideas for how to build a better future. Part of the Vox Media Podcast Network.
…
  continue reading
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
  continue reading
Welcome to Tech News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news of all things tech, including the latest developments in areas such as artificial intelligence, robotics, cybersecurity, gadgets, apps, and more. Whether you're a tech enthusiast, industry professional, or simply curious about the potential  ...
…
  continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
  continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
  continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
  continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
  continue reading
Decoding artificial intelligence for busy medical professionals
…
  continue reading
You already know the monthly OUCH! Newsletter brings you the latest cybersecurity tips—but now, we’re taking it even further. Tune in to the new OUCH! Podcast, where we go deeper on cybersecurity topics and give you extra insights to stay ahead of the threats.
…
  continue reading
We Cover the Cyberspace.
…
  continue reading
Regular cybersecurity news updates from the Risky Business team...
…
  continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
  continue reading
Daily bulletins reporting the latest news from the world of science and technology, from the Standard. Hosted on Acast. See acast.com/privacy for more information.
…
  continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
  continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
  continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
  continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
  continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
  continue reading
Daily run down of top cyber and tech current events
…
  continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
  continue reading
ABA on Call presented by CentralReach, explores the Applied Behavior Analysis/Healthcare Technology industries through thought-provoking conversation. Watch to explore ideas and trends in the field with renowned ABA experts, Rick Kubina Jr., Ph.D, BCBA-D & Doug Kostewicz, Ph.D, BCBA-D. Earn BACB CEUs to support your ongoing certification for Season 4 and future episodes.
…
  continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
  continue reading
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
…
  continue reading
Come join MrMario2011 talk about modding, exploiting, a bit of game/console hacking, and everything in between!
…
  continue reading
A "by Hackers for Hackers" podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest hacking techniques.
…
  continue reading
Tech news from Australia and abroad, with Mashable reporter/tech extraordinaire Johnny Lieu and FBi's Lucy Smith.
…
  continue reading
A podcast that helps us understand human vulnerability and how we can defend against the attacks that exploit us.
…
  continue reading
Marginalized voices have always been at the forefront of the internet, yet our stories often go overlooked. Bridget Todd chronicles our experiences online, and the ways marginalized voices have shaped the internet from the very beginning. We need monuments to all of the identities that make being online what it is. So let’s build them.
…
  continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
  continue reading
…
  continue reading
Stay informed with our exclusive interviews featuring industry experts, who share their valuable insights, expert opinions, and practical strategies to safeguard yourself and your organisation from cyber threats. In each episode, we shed light on cybersecurity trends, emerging technologies, and notable incidents shaping our digital world. Tune in to ThreatCast and embark on a journey to fortify your digital resilience.
…
  continue reading
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
…
  continue reading
You are not years away from accomplishing your career goals, you are skills away. Learn the Tradecraft to Take Your Cybersecurity Skills to the Executive Level. © Copyright 2025, National Security Corporation. All Rights Reserved
…
  continue reading
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
…
  continue reading
Interviews with users, hackers, and staff of America Online (AOL), covering the 90’s/Early 2000’s.
…
  continue reading

1
DeepSeek Revolutionizes Image-to-Text, Meta Launches Scam Protections, Whisker Launches Smart Litter Boxes, CISA Warns of Windows SMB Exploit, and more...
12:25
12:25
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
12:25(0:10): DeepSeek Unveils AI Model Revolutionizing Image-to-Text Conversion with Unprecedented Efficiency and Accuracy (2:31): Meta Unveils New WhatsApp and Messenger Tools to Combat Scams Targeting Vulnerable Users (4:30): Whisker Unveils AI-Powered Litter Boxes with Facial Recognition, Advanced Tracking, and Health Monitoring (7:00): Urgent Alert:…
…
  continue reading

1
The ‘menopause gold rush’ that’s exploiting women’s health gaps
14:01
14:01
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
14:01Experts are warning that women are being exploited by a growing ‘menopause gold rush’ as companies and influencers rush to give profit-driven advice.It’s led to a call for a national education programme to ensure women get clear, evidence-based support and advice. Meanwhile, UK scientists are hoping to join NASA in working on the Habitable Worlds O…
…
  continue reading

1
Episode 146: Hacking Horror Stories
1:50:38
1:50:38
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:50:38Episode 146: In this episode of Critical Thinking - Bug Bounty Podcast Justin, Joseph, and Brandyn all sit down to celebrate the spooky season by swapping their scariest bug stories. From frightening fails and firings to hacks with chilling and critical consequences. Grab your flashlight and a blanket for this one! Follow us on twitter at: https://…
…
  continue reading

1
028 Value-Based Methods and Their Limits - The World of Q-learning
2:34
2:34
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
2:34Some AIs learn by becoming expert judges, calculating a score for every possible clinical decision before making a move. We explain value-based methods, the 'AI Critic,' and why they excel at multiple-choice medicine but falter when the decisions are infinitely complex. #HealthAI #DigitalHealth #ArtificialIntelligence #ReinforcementLearning #DeepLe…
…
  continue reading

1
LG Uplus confirms breach, Conduent attack impacts 10M+, hackers exploit tools against Ukraine
7:08
7:08
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
7:08LG Uplus confirms cybersecurity incident 10 million+ impacted by Conduent breach Russian hackers exploit tools against Ukrainian targets Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Convey…
…
  continue reading

1
Srsly Risky Biz: Peter Williams, Ex-ASD, Pleads Guilty to Selling Eight Exploits to Russia
19:03
19:03
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
19:03Tom Uren and Amberleigh Jack talk about Peter Williams, the general manager of vulnerability research firm Trenchant, who has pleaded guilty to selling exploits to the Russian 0day broker Operation Zero. It’s a terrible look, but it doesn’t mean the private sector can’t be trusted to develop exploits. They also discuss a new report’s recommendation…
…
  continue reading

1
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch
6:07
6:07
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:07How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
…
  continue reading

1
Autonomous IT, Live! True Stories From the Hacker Underworld, E05
36:16
36:16
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
36:16In this episode of the Autonomous IT, host Landon Miles dives deep into the world of vulnerabilities, exploits, and the psychology behind cyberattacks. From the story of Log4j and its massive global impact to the difference between hackers and attackers, this episode explores how and why breaches happen—and what can be done to stop them. Joining La…
…
  continue reading

1
Why Cyber Threats Surge 20% During M&A, Plus the Latest on Qilin and Lazarus Group Campaigns
31:05
31:05
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
31:05Resources: https://linktr.ee/ReliaQuestShadowTalk Picture this: You close a $50M acquisition on Friday and by Monday, attackers are in your network. Sound far-fetched? It's not. Join host Kim along with intelligence analyst John & Threat Hunter Leo as they discuss: Attackers Exploit WSUS Flaw (1:15) Qilin Deploys Cross-Platform Attacks (4:21) Lazar…
…
  continue reading

1
Nvidia nears $5 trillion market value after AI announcements
13:19
13:19
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
13:19Nvidia is poised to reach a $5 trillion dollar market value after its shares jumped 5% following a string of announcements at its annual GPU Technology Conference. Hurricane Melissa has hit Cuba after ferocious winds caused power outages and catastrophic damage across Jamaica. And why looking at art in galleries can provide immediate stress relief,…
…
  continue reading

1
Android malware types like a human, sanctions weaken cyber ecosystems, side-channel extracts Intel, AMD secrets
7:41
7:41
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
7:41New Android malware types like a human Sanctions weaken nation-state cyber ecosystems Side-channel attack extracts Intel, AMD secrets Huge thanks to our sponsor, Conveyor Have you been personally victimized by a questionnaire this week? The queue never ends. But Conveyor can change that story. With AI that answers questionnaires of any format, and …
…
  continue reading

1
Epic's New AI - A Crystal Ball for Medicine, or a Look in the Rear-View Mirror
4:05
4:05
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
4:05Epic recently unveiled Comet, a new AI model trained on 118 million patient records to predict future health events. The scale is unprecedented, and its initial ability to outperform specialised models is a huge leap forward for clinical AI. But what is it really learning from our messy, real-world data? In this today's episode, we break down why C…
…
  continue reading
This is today’s cyber news for October 29th, 2025. Today’s brief tracks a hardware side-channel that weakens confidential computing on mainstream servers, real-world zero-day abuse in a major enterprise resource planning platform, and a trusted-update weakness that can turn patching into a malware pipeline. We also cover a ransomware twist that run…
…
  continue reading
We all know the internet loves a viral story. But what happens when that story is about a real woman being harassed and the platforms that ostensibly should be protecting her instead punish her? That’s what happened to Livie, a DoorDash driver in New York State whose story is currently going viral on TikTok. Bridget breaks down what actually happen…
…
  continue reading

1
Risky Business #812 -- Alleged Trenchant exploit mole is ex-ASD
1:06:14
1:06:14
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:06:14In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: L3Harris Trenchant boss accused of selling exploits to Russia once worked at the Australian Signals Directorate Microsoft WSUS bug being exploited in the wild Dan Kaminsky DNS cache poisoning comes back because of a bad PRNG SpaceX finally starts dis…
…
  continue reading

1
Risky Business #812 -- Alleged Trenchant exploit mole is ex-ASD
1:06:14
1:06:14
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:06:14In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: L3Harris Trenchant boss accused of selling exploits to Russia once worked at the Australian Signals Directorate Microsoft WSUS bug being exploited in the wild Dan Kaminsky DNS cache poisoning comes back because of a bad PRNG SpaceX finally starts dis…
…
  continue reading

1
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC
8:04
8:04
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
8:04Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
…
  continue reading

1
ACCC Sues Microsoft, Japan Launches JPYC, China Advances Military AI, Google Launches AI Health Coach, and more...
11:38
11:38
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
11:38(0:10): ACCC Sues Microsoft for Allegedly Misleading Consumers with Microsoft 365 Price Hikes (2:00): Japan Launches JPYC, Aiming for 10 Trillion Yen Stablecoin Market Amid Blockchain Integration Drive (4:21): China's AI-Powered Military Tech Advances: Robot Dogs, Drone Swarms, and DeepSeek's Rapid Scenario Analysis (7:06): Google Unveils AI-Powere…
…
  continue reading
HackingTeam’s successor is targeting Russia and Belarus, X users must re-enroll their security keys, Chrome will put HTTP behind a warning dialogue, and 15 people are expected to plead guilty in an Italian hacking scandal. Show notes Risky Bulletin: HackingTeam successor linked to recent Chrome zero-days…
…
  continue reading

1
Hands-On IT – Virtualization, IT Support, and... Home Labs? How Automox Techies Use Automox, E07
26:13
26:13
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
26:13In this episode of the Hands-On IT podcast, Landon Miles interviews Anthony Maxwell, who is a software engineer at Automox. They discuss Anthony's journey from IT operations to software engineering, and his home lab setup. He discusses his favorite projects, the skills he's learned, and how he applies them in his professional life. Anthony also pro…
…
  continue reading

1
Code Red: Breaking Down China's Cyber Offensive—Volt, Salt, and Flax Typhoon
44:02
44:02
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
44:02What do Volt Typhoon, Salt Typhoon, and Flax Typhoon reveal about China's cyber playbook? This episode of Cyber Focus breaks down a new McCrary Institute report on China's advanced persistent threat campaigns—and what they mean for U.S. national security. Frank Cilluffo sits down with Mark Montgomery, Brad Medairy, and Bill Evanina to explain how C…
…
  continue reading

1
Amazon layoffs: 14,000 jobs slashed as AI reshapes workforce
11:07
11:07
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
11:07All main global operations are understood to be impacted, with the UK among those to see office roles axed. Storm hunters fly into Hurricane Melissa as Jamaica braces for 'storm of the century'. To hear our chat with Deputy Chief Meteorologist Dan Rudman, click here. From December, Meta, TikTok, and Snapchat will start blocking users under the age …
…
  continue reading

1
ModChat 138 - Modfest Returns & Y2JB Release for PS5
26:24
26:24
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
26:24Xbox-Scene's Modfest returns for the second time! Participate in some friendly competition, maybe win some prizes, and help the community with some innovations all in one go! Aside from that announcement, RXDK gets some more love with its own Neighborhood release spanning across all major operating systems. Clone Hero gets a homebrew port to the Xb…
…
  continue reading
This is today’s cyber news for October 28th, 2025. We lead with a fix-now warning on Windows update servers after confirmed abuse, a reminder that whoever shapes your patches shapes your posture. Google knocked down rumors of a massive Gmail breach, underscoring how misinformation burns time even when core services are fine. X set a hard deadline t…
…
  continue reading

1
027 Curriculum learning - teaching an agent step-by-step
2:47
2:47
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
2:47You can't teach an AI complex medicine by throwing it in at the deep end. Curriculum learning applies the principles of medical school to AI, training models on simple tasks before moving to complex ones. Find out why this matters for building safe and effective clinical AI. #HealthAI #DigitalHealth #ArtificialIntelligence #MachineLearning #Curricu…
…
  continue reading

1
Atlas browser hijacked, Bye, bye Twitter birdie, Dante spyware surfaces
8:15
8:15
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
8:15Atlas browser hijacked Bye, bye Twitter birdie Dante spyware surfaces Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Conveyor takes all that chaos and turns it into calm. AI fills in the que…
…
  continue reading

1
OpenAI Launches Music AI, Apple Maps Introduces AI Ads, Microsoft Cuts Signal AI Shift, Tesla Launches FSD 1414, and more...
11:23
11:23
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
11:23(0:10): OpenAI's New AI Tool Revolutionizes Music Creation Amid Legal and Ethical Challenges (2:37): Apple Maps to Introduce AI-Driven Ads, Faces Potential Backlash Over Privacy Concerns (4:31): Microsoft Layoffs Highlight 'Great Flattening' and AI Shift, Redefining Job Security in Tech Industry (6:08): Tesla Unleashes FSD 14.1.4 Update: Enhanced N…
…
  continue reading

1
SANS Stormcast Tuesday, October 28th, 2025:  Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection
6:17
6:17
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:17Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
…
  continue reading

1
Department of Know: Promoting passphrases, questioning international security conferences, gift card hackers
34:00
34:00
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
34:00Link to episode page This week's edition of The Department of Know is hosted by Rich Stroffolino with guests Bil Harmer, operating partner and CISO, Craft Ventures, and Sasha Pereira, CISO, WASH Thanks to our show sponsor, ThreatLocker If security questionnaires make you feel like you're drowning in chaos, you're not alone. Endless spreadsheets, po…
…
  continue reading

1
Between Two Nerds: NSA gets its mojo back!
27:04
27:04
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
27:04In this edition of Between Two Nerds Tom Uren and The Grugq dissect a recent Chinese CERT report that the NSA had hacked China’s national time keeping service. This episode is also available on Youtube. Show notes MSS Weixin post CN-CERT technical analysis Global Times on X BTN110: The NSA's nine to five hacking campaign…
…
  continue reading

1
Hurricane Melissa: 'Jamaica's most destructive storm yet'
10:16
10:16
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
10:16Hurricane Melissa is now Category 5, meaning it is the strongest storm to hit Jamaica since 1988. As of 5 a.m. EDT on Monday, maximum sustained winds of 160 mph were recorded. How destructive is Storm Melissa going to be? How much rainfall is expected to hit Jamaica, and has climate change played a role in its intensity? We speak to Deputy Chief Me…
…
  continue reading

1
Ep. 326 - The 4th Monday Series - Back From The Dead with Carrie Hatton
29:50
29:50
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
29:50Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Carrie Hatton. Carrie lives in Nor…
…
  continue reading

1
#256 - Maximize Your Cybersecurity Budgets (with Ross Young)
44:25
44:25
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
44:25In this episode of CISO Tradecraft, G Mark Hardy and Ross Young dive into part two of their series on cybersecurity budgets. Continuing from where they left off, they discuss the OWASP Threat and Safeguard Matrix (TaSM), effective protection scoring, and practical strategies to enhance your budget management as a CISO. Learn about the importance of…
…
  continue reading
This is today’s cyber news for October 27th, 2025. We cover an emergency push by Microsoft to protect Windows Server Update Services from active attacks, Amazon’s explanation for a Domain Name System failure inside Amazon Web Services that rippled across major apps, and a cache-poisoning risk in BIND that threatens the trust behind logins and payme…
…
  continue reading

1
The New Digg Wants to Bring Back a Peaceful Internet
1:09:41
1:09:41
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
1:09:41Roughly 20 years ago, Digg was known as the homepage of the internet. The social and news platform was so big that Alexis Ohanian, the founder of Reddit, referred to it as “the enemy.” But things have changed, and this year, the site's original founder Kevin Rose teamed up with Ohanian to revamp and relaunch Digg. Now, in this age of AI, the new Di…
…
  continue reading

1
Microsoft WSUS vulnerability, LastPass death hoax, Copilot phishing technique
9:36
9:36
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
9:36Microsoft WSUS vulnerability could allow for remote code execution Fake LastPass death claims used to breach password vaults New CoPhish attack steals OAuth tokens via Copilot Studio agents Huge thanks to our sponsor, Conveyor If security questionnaires make you feel like you're drowning in chaos, you're not alone. Endless spreadsheets, portals, an…
…
  continue reading

1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE
6:20
6:20
 
 
Play later
 
Play later
 
Lists
 
Like
 
Liked
6:20Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
…
  continue reading
A bug in Microsoft WSUS is under attack, Thailand revokes the citizenship of scam-linked businessman, the US charges high tech poker cheat, and Iran’s top hacking school is breached. Show notes Risky Bulletin: Russian bill would require researchers to report bugs to the FSB
…
  continue reading
 
 
 
