Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
Listen to articles handpicked by our editors, and stay updated on top technology news from TechCrunch.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
A show about hacking the system, hosted by Patrick Tomasso and Gabi Pirraglia. Patrick is a content creator and Gabi is digital strategist, together they pull apart the internet and social media to reveal the hidden creative formulas for success.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
We Cover the Cyberspace.
…
continue reading
Want to learn more about how terrorists and violent extremists are using the internet to communicate and share propaganda? Perhaps you’re interested in why terrorists share their manifestos online and livestream their attacks? The Tech Against Terrorism podcast is a deep dive into the evolving use of the internet by terrorists and violent extremists, how this relates to real world harms, and what can be done to support the tech sector to disrupt this threat. Join us as we speak to the world’ ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
…
continue reading
The Technado crew covers a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
…
continue reading
Hosted by Ian Landsman and Aaron Francis, Mostly Technical is a lively discussion on Laravel, business, and an eclectic mix of related topics.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Senior Intelligence Analysts Chris Morgan and Kim Bromley bring together over 30 years of experience in threat intelligence across government, military, and telecommunications. Along with their guests, they provide practical perspectives on t ...
…
continue reading
In 10 minutes daily, The Business of Tech delivers the latest IT services and MSP-focused news and commentary. Curated to stories that matter with commentary answering 'Why Do We Care?', channel veteran Dave Sobel brings you up to speed and provides resources to go deeper. With insights and analysis, this focused podcast focuses on the knowledge you need to be effective, profitable, and relevant.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
ID Tech's Alex Perala and Tony Bitzionis are joined by a varied range of guest experts to discuss identity technology, biometrics, digital ID, artificial intelligence, and more.
…
continue reading
Hello, I'm Rees from the YouTube channel ctrl-alt-rees. Here is a thing wherein I ramble about things.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Welcome to ’Hacker Hacks,’ the podcast where we dive deep into the mysterious world of cybersecurity. Each episode unveils the tactics, techniques, and procedures used by both ethical and malicious hackers, empowering you with knowledge to defend your digital realm. Whether you’re a seasoned IT professional, an emerging tech enthusiast, or just curious about the digital shadows, ’Hacker Hacks’ is your ultimate guide to understanding the tricks of the trade and the tools to thwart them. Subsc ...
…
continue reading
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
…
continue reading
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Tech news from Australia and abroad, with Mashable reporter/tech extraordinaire Johnny Lieu and FBi's Lucy Smith.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
…
continue reading
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
…
continue reading
The Cyber Ways Podcast brings academic cyber security research into the "real world." We interview top academic researchers to find how their research can be put into practice by cyber security professionals. Our focus is on behavioral aspects of cyber security. Occasionally, we touch on related topics, such as information privacy and surveillance.Each episode discusses one published, peer-reviewed article to reveal the practical implications of the research. Your hosts, Tom Stafford and Cra ...
…
continue reading
As a civically engaged entrepreneur and mom, I understand the challenges of advocating for yourself and others while attempting to balance your personal and professional demands. I had to develop a personal system of success in every area of my life. Now I want to help you build your unique system and truly trust your voice, even if it shakes. That’s why this week I am launching my new podcast entitled “Trust Your Voice”, based on my new book, “Trust Your Voice”, A Roadmap to Focus and Influ ...
…
continue reading
The Doctor Chaos Security Podcast - Join us as we ramble on topics related to cyber security
…
continue reading
Where timely and relevant security meets puns and witty banter. Our goal is to keep defenders apprised of pertinent news and trends in under forty-five minutes.
…
continue reading
Rob Wyatt and PJ McNerney discuss the latest and greatest news in the tech world and to figure out where things have been, where they are, and hopefully where they are going.
…
continue reading
Come join MrMario2011 talk about modding, exploiting, a bit of game/console hacking, and everything in between!
…
continue reading
deep dive into Data-as-a-Service (DaaS) businesses. World of DaaS is a podcast for data enthusiasts, by data enthusiasts, where Auren Hoffman talks to business and technology leaders about all things data - building it, acquiring it, analyzing it, and everything in between.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading

1
Ransomware Hits SMBs Hard, Google OAuth Exploited, Gladinet's Security Flaw, and AI Scraping Issues
15:27
15:27
Play later
Play later
Lists
Like
Liked
15:27Ransomware attacks targeting small and medium-sized businesses (SMBs) have reached alarming levels, with a recent UK government survey revealing that 1% of organizations reported such incidents, affecting approximately 19,000 entities. This marks a significant increase from the previous year, highlighting a troubling trend where nation-state actors…
…
continue reading

1
HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders!
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22# Title * HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders! ## Description 🔍 Microsoft’s AI Uncovers 20 Zero-Day Threats | CoffeeLoader Malware Gets Smarter In this episode of Exploit Brokers, Cipherceval dives into how Microsoft Security Copilot, powered by AI, discovered over 20 previously unknown vulnerabilities in popula…
…
continue reading

1
Uber, Volkswagen pair up to launch robotaxi service in US with self-driving, electric microbuses
3:37
3:37
Play later
Play later
Lists
Like
Liked
3:37Volkswagen of America and Uber on Thursday unveiled an ambitious plan to launch a commercial robotaxi service — using autonomous electric VW ID. BUZZ vehicles — in multiple U.S. cities over the next decade. The companies expect to launch a commercial service in Los Angeles, the first city on the list, by late 2026 Learn more about your ad choices. …
…
continue reading

1
SAP zero-day active, another OAuth exploit, cybersecurity CEO arrested
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21SAP zero-day vulnerability under widespread active exploitation Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts Cybersecurity firm CEO charged with installing malware on hospital systems Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity control…
…
continue reading

1
Cybersecurity Updates: CEO Legal Troubles, Global Cyber Rules, Microsoft Fix Issues, and AI at B-Side SF
8:49
8:49
Play later
Play later
Lists
Like
Liked
8:49In this episode of 'Cybersecurity Today', host David Shipley covers multiple key stories: Veritaco CEO Jeffrey Bowie is charged with attempting to infect a hospital with malware. Global Chief Information Security Officers (CISOs) call on world governments to harmonize cybersecurity regulations. Issues arise with Microsoft's recent 'Mystery Folder' …
…
continue reading

1
Snake Oilers: LimaCharlie, Honeywell Cyber Insights, CobaltStrike and Outflank
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50In this edition of the Snake Oilers podcast, three sponsors come along to pitch their products: LimaCharlie: A public cloud for SecOps Honeywell Cyber Insights: An OT security/discovery solution Fortra’s CobaltStrike and Outflank: Security tooling for red teamers This episode is also available on Youtube. Show notes…
…
continue reading

1
SANS Stormcast Monday, April 28th: Image Steganography; SAP Netweaver Exploited
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
…
continue reading

1
Harnessing Generative AI: Boosting Employee Productivity and Data Management with Hunter Jensen
26:34
26:34
Play later
Play later
Lists
Like
Liked
26:34Hunter Jensen, the founder and CEO of Barefoot Solutions, discusses the evolving landscape of artificial intelligence (AI) and its practical applications in business. Barefoot Solutions, a custom software development firm, has been at the forefront of technology innovations for over 20 years, adapting to trends from web development to machine learn…
…
continue reading

1
This Week in AI: Microsoft Recall, Adobe Firefly 4, OpenAI Deep Research, Intel’s Big Move | April 2025
3:40
3:40
Play later
Play later
Lists
Like
Liked
3:40This week’s AI developments are shaking up the tech world! Microsoft introduces Recall for Copilot+ PCs, Adobe unveils Firefly Image Model 4, and OpenAI expands its Deep Research tool to free users. Intel steps up to challenge Nvidia with new AI chip ambitions, while the White House launches a major AI education initiative. Plus, DeepMind’s updated…
…
continue reading

1
Understanding SaaS Security: Insights, Challenges, and Best Practices
38:05
38:05
Play later
Play later
Lists
Like
Liked
38:05In this episode of Cybersecurity Today, host Jim Love delves into the topic of SaaS (Software as a Service) security. Sharing his early experiences promoting SaaS, Jim elaborates on its inevitable rise due to cost-effectiveness and shared development resources. The episode highlights security concerns with SaaS, such as shadow IT and weak access co…
…
continue reading

1
The Future of Managed Services: AI Integration and M&A Trends with Industry Experts with Abraham Garver and Howard Cohen
36:46
36:46
Play later
Play later
Lists
Like
Liked
36:46This episode features a deep dive into the evolving landscape of managed services, focusing on the insights of industry experts Howard M. Cohen and Abraham Garver. The discussion centers around the significant shift towards service-oriented models within the managed service provider (MSP) sector, highlighting the importance of artificial intelligen…
…
continue reading

1
OutRun Movie, Harrier Attack Reloaded, New DOOM Trailer & More - Ramble 109
29:31
29:31
Play later
Play later
Lists
Like
Liked
29:31London Marathon Fundraising: https://www.justgiving.com/page/rees-london-marathon-2025 Latest Main Channel Release (OCLP On 2008 Intel Mac Pro): https://youtu.be/0b_A7xhdBFE In this episode I talk about the new DOOM: The Dark Ages trailer, an upcoming OutRun movie, progress on the Amiga OutRun arcade port, Harrier Attack Reloaded on the Amstrad CPC…
…
continue reading

1
Week in Review: Secure by Design departure, Microsoft’s security report, LLMs outrace vulnerabilities
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bethany De Lude, CISO emeritus, The Carlyle Group Thanks to our show sponsor, Dropzone AI Alert investigation is eating up your security team’s day—30 to 40 minutes per alert adds up fast. Dropzone AI‘s SOC Analyst transforms this rea…
…
continue reading

1
IBM and Intel Earnings Reveal Challenges; $22M Fintech Raise Targets MSP Billing Pain
16:21
16:21
Play later
Play later
Lists
Like
Liked
16:21IBM and Intel have recently reported their earnings, revealing significant challenges despite some positive figures. IBM exceeded earnings expectations with a revenue of $14.54 billion, but its net income fell sharply due to the U.S. government's cost-cutting measures, resulting in a loss of $100 million from canceled contracts. Meanwhile, Intel re…
…
continue reading

1
Government censorship comes to Bluesky, but not its third-party apps … yet
5:50
5:50
Play later
Play later
Lists
Like
Liked
5:50Government censorship has found its way to Bluesky, but there’s currently a loophole thanks to how the social network is structured. Earlier this month, Bluesky restricted access to 72 accounts in Turkey at the request of Turkish governmental authorities, according to a recent report by the Freedom of Expression Association. Learn more about your a…
…
continue reading

1
Lazarus Strikes Again: Inside Operation SyncHole and the 1-Day Exploitation Crisis
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49In this episode, we break down the most urgent cybersecurity developments from late April 2025—including the Lazarus Group’s high-profile “Operation SyncHole” targeting South Korean industries. Discover how attackers are exploiting newly disclosed vulnerabilities faster than ever, with nearly 1 in 3 CVEs weaponized within 24 hours of publication. W…
…
continue reading

1
Thomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware security
1:33:42
1:33:42
Play later
Play later
Lists
Like
Liked
1:33:42Three Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism. We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national s…
…
continue reading

1
OAuth Phishing and Microsoft 365: The Hidden Threats SMBs Can't Ignore
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54In this episode, we dissect the real-world challenges of securing Microsoft 365 environments—especially for small and medium-sized businesses—amid rising threats and licensing limitations. From Reddit frustrations to official Microsoft documentation, we explore the harsh truth: many essential security features, like alerting on suspicious logins, r…
…
continue reading

1
Part 2: Solving the Top 10 Problems with Vulnerability Management
38:32
38:32
Play later
Play later
Lists
Like
Liked
38:32Once again, we're back with all the answers. Traditional vulnerability management comes with many pitfalls, and we're counting down the solutions to all the problems you might be running into. Ivanti's Chris Goettl and Robert Waters break down the back five on our list: a periodic approach to remediation, poor prioritization, lack of business conte…
…
continue reading

1
Why Outlook Is Eating Your CPU — And What Microsoft Says About It
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17Microsoft has acknowledged a serious issue affecting users of classic Outlook for Windows: CPU usage spikes up to 50% just from typing emails. First appearing in builds released since November 2024, this bug is now hitting users across several update channels—including Current, Monthly Enterprise, and Insider—leading to power drain, sluggish perfor…
…
continue reading

1
Freedom to Excel: How Illinois HB2827 Could Stifle Educational Innovation and Parent Choice
45:27
45:27
Play later
Play later
Lists
Like
Liked
45:27In this episode of the Trust Your Voice podcast, hosted by Sylvie Légère, the focus is on educational choice and the challenges faced by homeschooling families in Illinois due to the House Bill 2827. The show brings together Leslee Dirnberger and Aziza Butler, two leaders in the homeschooling community, to discuss the implications of this bill. Les…
…
continue reading

1
Linktree rolls out a suite of monetization features for creators
4:09
4:09
Play later
Play later
Lists
Like
Liked
4:09Linktree is launching a set of new features aimed at helping creators earn more money directly from its platform. The new tools include the ability to sell courses and digital products, earn from brand-sponsored links, and build shoppable storefronts. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading

1
Russian army map malware, edge tech attack report, Commvault flaw
8:12
8:12
Play later
Play later
Lists
Like
Liked
8:12Russian army targeted by Android malware hidden in mapping app Attackers hit security device defects hard in 2024 Critical Commvault Command Center flaw warning Huge thanks to our sponsor, Dropzone AI Alert investigation is eating up your security team's day—30 to 40 minutes per alert adds up fast. Dropzone AI's SOC Analyst transforms this reality …
…
continue reading

1
Record-Breaking Cybercrime Losses and Data Breaches in 2024
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45In this episode of Cybersecurity Today, host David Shipley discusses the FBI's report on cybercrime losses in 2024, which reached a record $16.6 billion, marking a 33% increase from the previous year. The report highlights major types of cyber crimes such as phishing, spoofing, extortion, and investment fraud, with older adults being significantly …
…
continue reading

1
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues;
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
…
continue reading

1
Maryland's New IT Tax, Microsoft's Copilot Revolution, and Cynomi's Cybersecurity Growth Surge
12:12
12:12
Play later
Play later
Lists
Like
Liked
12:12Maryland has introduced a new 3% sales tax on data and information technology services, set to take effect on July 1, 2025. This legislation expands the definition of taxable services to include essential IT offerings such as cloud storage, IT consulting, and cybersecurity. Experts warn that this tax could lead to increased costs for businesses, po…
…
continue reading

1
The U.S. doesn’t refine cobalt. This startup wants to change that.
3:08
3:08
Play later
Play later
Lists
Like
Liked
3:08Xerion says it has a new technique to produce highly refined cobalt in a single step. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
Trojan Map App: Spyware Targets Russian Soldiers via Alpine Quest
9:14
9:14
Play later
Play later
Lists
Like
Liked
9:14A newly discovered Android spyware campaign is targeting Russian military personnel by weaponizing a popular mapping app. Disguised as a cracked version of Alpine Quest Pro, this trojanized app delivers Android.Spy.1292.origin—a powerful surveillance tool that steals data, tracks location in real-time, and downloads secondary payloads to extract co…
…
continue reading

1
Blue Shield Breach: 4.7 Million Health Records Leaked via Google Analytics
8:47
8:47
Play later
Play later
Lists
Like
Liked
8:47Blue Shield of California has confirmed a data breach affecting 4.7 million members—caused not by hackers, but by a misconfigured Google Analytics setup. Sensitive health information was inadvertently exposed to Google’s ad platforms between April 2021 and January 2024. In this episode, we break down what went wrong, what data was leaked, and what …
…
continue reading

1
Automox Insiders – Tidy Endpoints, Tidy Mind: Spring Cleaning with Adam Whitman, E17
13:22
13:22
Play later
Play later
Lists
Like
Liked
13:22In this episode of Automox Insiders, host Maddie Regis chats with Adam Whitman, Manager of Solutions Engineering at Automox, about all things IT spring cleaning. From patch management and software audits to business continuity planning and endpoint hygiene, Adam shares practical, real-world tips for tidying up your tech stack and staying ahead of I…
…
continue reading

1
$16.6 Billion Lost: The True Cost of Cybercrime in America
8:48
8:48
Play later
Play later
Lists
Like
Liked
8:48Cybercrime in the U.S. has reached new, record-breaking heights. In this episode, we dive deep into the FBI's 2024 Internet Crime Complaint Center (IC3) report — a comprehensive look at the economic and human toll of cybercrime in America. With $16.6 billion in reported losses, a 33% increase year-over-year, and 859,532 complaints filed, the data p…
…
continue reading

1
Crowdsourced AI benchmarks have serious flaws, some experts say
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29AI labs are increasingly relying on crowdsourced benchmarking platforms such as Chatbot Arena to probe the strengths and weaknesses of their latest models. But some experts say that there are serious problems with this approach from an ethical and academic perspective. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading

1
Blue Shield of California shared private data,FBI IC3 report, Ex-Army sergeant jailed
9:43
9:43
Play later
Play later
Lists
Like
Liked
9:43Blue Shield of California shared private health data of millions with Google The FBI issues its 2024 IC3 report Ex-Army sergeant jailed for selling military secrets Huge thanks to our sponsor, Dropzone AI Security analysts need practical experience to build investigation skills, but getting expert guidance for every alert is impossible. That's why …
…
continue reading

1
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
…
continue reading

1
Zendesk Shifts to Outcome-Based Pricing; CISA Faces Resignations Amid Budget Cuts and Cyber Threats
15:31
15:31
Play later
Play later
Lists
Like
Liked
15:31Zendesk has made a significant shift in its pricing model by moving away from traditional seat licenses to an outcome-based pricing structure. This change, articulated by CEO Tom Eggemeier, means that customers will only pay when an AI agent successfully resolves a business problem. This approach aligns with a broader industry trend towards consump…
…
continue reading

1
Tariff turmoil may have killed the tech M&A market’s comeback
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41The tech market doesn’t need to be soaring up and to the right to foster healthy M&A activity. Deals can get done even in down markets. But can M&A thrive in an uncertain market? That’s a harder question. The venture market soured in 2022 as fundraising and exits largely dried up Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading

1
BreachForums Down: Hacktivist Attack or FBI Crackdown?
24:15
24:15
Play later
Play later
Lists
Like
Liked
24:15Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and John as they discuss: BreachForums Down: Dark Storm Team Takes Credit A Potential New Vulnerability in SAP NetWeaver Exploit User Targets Salesforce Data ReliaQuest Research: Understanding Chinese Espionage Strategies Kim Bromley: Senior Cyber …
…
continue reading

1
Cybersecurity Today: Virtual Employees, AI Security Agents, and CVE Program Updates
7:47
7:47
Play later
Play later
Lists
Like
Liked
7:47In this episode of 'Cybersecurity Today,' host Jim Love discusses various pressing topics in the realm of cybersecurity. Highlights include Anthropic's prediction on AI-powered virtual employees and their potential security risks, Microsoft’s introduction of AI security agents to mitigate workforce gaps and analyst burnout, and a pivotal court ruli…
…
continue reading

1
DFIR Foundations: Real-World Lessons in Containment, Eradication, and Recovery
54:45
54:45
Play later
Play later
Lists
Like
Liked
54:45In this powerful continuation of our DFIR series, cybersecurity experts Daniel Schwalbe, DavidBianco, Lesley Carhart, and Sarah Sabotka dissect the heart of effective incident response,containment, eradication, recovery, and lessons learned. Packed with firsthand war stories,sharp tactical advice, and honest debates, this episode is a must-listen f…
…
continue reading
Ian and Aaron discuss their respective trips to Vegas and Miami, Aaron's latest video, making new friends in real life, & more. Sponsored by Bento, WorkOS, Native PHP for Mobile, and Laracon US 2025 Interested in sponsoring Mostly Technical? Head to https://mostlytechnical.com/sponsor to learn more. (00:00) - Back from Vegas (17:26) - Marker 237 (1…
…
continue reading

1
Florida draft law mandating encryption backdoors for social media accounts billed ‘dangerous and dumb’
3:34
3:34
Play later
Play later
Lists
Like
Liked
3:34A digital rights group blasted the Florida bill, but lawmakers voted to advanced the draft law. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
CYFIRMA Research- Scamonomics: The Dark Side of Stock & Crypto Investments in India
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14Cybercriminals are impersonating trusted business executives and financial experts to trap unsuspecting investors. These scammers are creating fake investment firms with fraudulent registration details, professional-looking websites and manipulated social media engagement to appear legitimate. They are actively using Telegram channels, WhatsApp gro…
…
continue reading

1
Microsoft Recall updates, Russian orgs deal with networking software updates, SSL.com certificate issuance vulnerability
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10Microsoft Recall on Copilot+ PC: testing the security and privacy implications Russian organizations targeted by backdoor masquerading as secure networking software updates SSL.com Scrambles to Patch Certificate Issuance Vulnerability Huge thanks to our sponsor, Dropzone AI Is your security team spending too much time chasing alerts instead of stop…
…
continue reading