Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Vulnerability Exploits Podcasts

show episodes
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
  continue reading
 
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
  continue reading
 
Expertly-curated progressive politics, news, and culture produced by leftist humans, not algorithms or AI. This is an award-winning podcast that dives deeply into a wide range of national and international issues facing society and governments. We draw from hundreds of sources of progressive news and commentary. Est. 2006. Save time by listening to a range of perspectives on a focused topic in each episode and be introduced to new sources you will not have come across on your own!
  continue reading
 
Artwork

1
Consider Before Consuming

Fight the New Drug

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Think about all of the things you consider every day to help keep yourself, your loved ones, and your community happy, healthy, and hopeful. Now consider this: There is an ever-growing body of research demonstrating significant negative impacts, for yourself and the ones you love, in the consumption of pornography. It can change the way you think, harm your ability to connect with other people, and can contribute to changing the world in negative ways. Join us every other week as we consider ...
  continue reading
 
This podcast is dedicated to the unsung heroes out there wishing to heal from the wounds of childhood they did not create. Adult children of alcoholics and children of narcissistic parents have been emotionally conditioned and neurologically wired to abandon the authentic self, for the sake of parental attachments. Emotional neglect manifests as codependency, a need for external validation, and approval. Unaware, those suffering from abandonment wounds, who exhibit codependency often attract ...
  continue reading
 
Artwork

1
Shame Spiral

Ely Kreimendahl

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A comedy podcast about shame- because no one roasts you harder than yourself! Each week, psychotherapist-turned-comedian Ely Kreimendahl exploits her therapy skills to talk all-things-shame with a new special guest. Every guest shares a core story of something that once made them spiral HARD, answers both silly and emotionally complicated questions, and even if these conversations are ACCIDENTALLY therapeutic, it's not therapy.... Ely goes ALL IN on sharing her shame, too. Does coming togeth ...
  continue reading
 
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
  continue reading
 
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
  continue reading
 
Human trafficking is one of the greatest injustices in our world today. It’s the exploitation of vulnerable people for their bodies and labor. It’s modern-day slavery, and it’s generating billions of dollars each year. In this podcast, we will unpack the problem of human trafficking, share powerful stories from the frontlines, hear from thought leaders in the fight for freedom, and equip you to make a difference–right where you are. A21 is a global anti-human trafficking organization operati ...
  continue reading
 
Eric Payne, a divorced dad and retired marriage & fatherhood blogger, tells the comedic tale of his "Chapter 2" — having to start life over brand new after a divorce he didn't want. What Does Starting Over Mean? Although "free” for the first time in 15 years, Eric has years of baggage and a stubborn desire to hold on to the past which initially keeps him stuck as he tries to move in a world way different than the one where he first met his ex-wife in the year 2000. From one-night stands to g ...
  continue reading
 
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
Ghost Stories

Ghost Stories

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Ghost Stories Enter the realm where ghosts whisper ancient secrets and demons lurk in shadows that stretch beyond mortal comprehension. Ghost Stories delivers spine-chilling supernatural horror without advertisements interrupting your descent into paranormal activity and cosmic horror. All ads are strategically placed at the beginning to preserve the immersive experience of every exorcism, vampire encounter, and psychological horror that haunts our darkest nightmares. In the depths of supern ...
  continue reading
 
Artwork

1
The P Pod

The Somerset Safeguarding Children Partnership

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Partnership Podcast - The P Pod, from the Somerset Safeguarding Children Partnership! Meet the agencies who will help you to support children, young people and their families across Somerset. Explore local and national learning and how to improve your safeguarding practice. If you would like to take part in a future podcast or have any questions or comments arising from any episodes we'd love you to contact us at [email protected] www.somersetsafeguardingchildren.org.uk
  continue reading
 
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
  continue reading
 
Artwork

1
Clarion Podcasts

Clarion Project

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Bringing you vital facts and perspectives on Islamist extremism and how to combat it directly from leading activists in the field. Clarion Podcast is brought to you by Clarion Project, dedicated to challenging Islamist extremism and promoting dialogue with Muslim human rights activists.
  continue reading
 
Artwork

1
The Mobile Security Show

AT&T Tech Channel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
  continue reading
 
Artwork
 
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
  continue reading
 
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
  continue reading
 
Loading …
show series
 
A patch today keeps the zero-day away Jailbreaking ChatGPT-5 Pro The thing about vulnerabilities is they stay vulnerable Huge thanks to our sponsor, Conveyor It’s Thursday. Have you been personally victimized by a portal security questionnaire this week? Most solutions just give you a browser extension to copy and paste answers in, still leaving ho…
  continue reading
 
Both Google and Mozilla have rolled out urgent security updates to patch multiple high-severity vulnerabilities in their flagship browsers—Google Chrome and Mozilla Firefox—underscoring the constant arms race between developers and cyber attackers. Google’s update addresses a critical out-of-bounds write vulnerability (CVE-2025-9132) within Chrome’…
  continue reading
 
SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
  continue reading
 
SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, l…
  continue reading
 
If Salesforce flutters its wings in San Francisco... How is this still tricking people? From tagging to bagging Huge thanks to our sponsor, Prophet Security Security teams are drowning in alerts - many companies generate upwards of 1000 or more alerts a day, and nearly half go ignored. That’s where Prophet Security comes in. Their AI SOC platform a…
  continue reading
 
Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%20Value%20in%20Microsoft%20Word%20Documents/32224 Weaponizing image scaling against production AI systems AI systems often downscale imag…
  continue reading
 
SANS Stormcast Tuesday, August 26th, 2025: Decoding Word Reading Location; Image Downscaling AI Vulnerability; IBM Jazz Team Server Vuln Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%…
  continue reading
 
Everyone may get elaborate revenge fantasies but few follow through due to the bad outweighing the satisfaction. One man, sensing he was to be terminated soon, however, decided if he were to go he would try to take the whole company down with him. Last week he was sentenced to 4 years in prison. Sources: https://pastebin.com/Pi0YSFUt…
  continue reading
 
Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Bobby Knost. Bobby is a proud memb…
  continue reading
 
In this powerful episode, trauma-informed life coach and codependency recovery expert Lisa A. Romano explores the hidden dangers of falling for charisma—especially for adult children of narcissistic or emotionally immature parents. If you've ever been drawn to someone magnetic and charming, only to feel emotionally used, discarded, or confused, thi…
  continue reading
 
▶ *FREE TRIAL* To make our classes and budgeting app *more affordable*, we bundled them together for an *80% DISCOUNT* and for this month only, you can try DollarWise Central for *free* - check it out here and change your life: https://dollarwise.com/dollarwise-central/▶▶ Idk if she needed a break or what, but she *took the gloves off* in the post-…
  continue reading
 
Malicious Go module steals credentials via Telegram Mirai-based botnet resurfaces targeting systems globally Silk Typhoon hackers exploit cloud trust to hack downstream customers Huge thanks to our sponsor, Prophet Security Ever feel like your security team is stuck in a loop of alert fatigue and manual investigations? Meet Prophet Security. Their …
  continue reading
 
Rui Ataide, Managing Security Consultant at GuidePoint Security, joins the Nexus Podcast to discuss his experiences negotiating with ransomware gangs on behalf of victimized organizations. Ataide covers the nuances, processes, and methodology of negotiating with groups. He also explains how extortion and data theft has changed the risk management c…
  continue reading
 
The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .d…
  continue reading
 
SANS Stormcast Monday, August 25th, 2025: IP Cleanup; Linux Desktop Attacks; Malicious Go SSH Brute Forcer; Onmicrosoft Domain Restrictions The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were “zero padded”, an unfortunate choice. As of this week, datafeeds should no longer be “zero …
  continue reading
 
Air Date 8/24/2025 The nature of politics and public policy is that there's always a need to balance opposing interests. Almost nowhere is there a more intractable set of opposing interests than in the attempt to protect children from harmful content on the internet while maintaining free access to adults, particularly because people wildly disagre…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino. This is our milestone edition, celebrating five years of the daily Cyber Security Headlines news podcast. Our guests today will be the CSH reporters themselves, reflecting on some stories from this week as well as their favorite stories from th…
  continue reading
 
Ghost Stories Enter the realm where ghosts whisper ancient secrets and demons lurk in shadows that stretch beyond mortal comprehension. Ghost Stories delivers spine-chilling supernatural horror without advertisements interrupting your descent into paranormal activity and cosmic horror. All ads are strategically placed at the beginning to preserve t…
  continue reading
 
▶ *FREE TRIAL* To make our classes and budgeting app *more affordable*, we bundled them together for an *80% DISCOUNT* and for this month only, you can try DollarWise Central for *free* - check it out here and change your life: https://dollarwise.com/dollarwise-central/▶▶ SHE HAS A HIDDEN DEBT WTTFFFFFF- she has a BONUS loan with her bank, it's hor…
  continue reading
 
Apple urges iPhone, iPad and Mac update ASAP Scattered Spider operative gets 10 years and a big fine Microsoft seeks customer feedback on SSD failure issues Huge thanks to our sponsor, Conveyor Does logging into a portal security questionnaire feel like punishment? We get it. Other solutions offer browser extensions that require you to do all the c…
  continue reading
 
Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the …
  continue reading
 
SANS Stormcast Friday, August 22nd, 2025: The -n switch; Commvault Exploit; Docker Desktop Escape Vuln; Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%…
  continue reading
 
Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
  continue reading
 
The Python Package Index (PyPI), the backbone of the global Python ecosystem, has rolled out new security safeguards aimed at stopping a dangerous form of supply-chain attack: domain resurrection attacks. These attacks exploit a subtle but devastating weakness—when a maintainer’s email domain expires, attackers can re-register it, hijack the email,…
  continue reading
 
SANS Stormcast Thursday, August 21st, 2025: Airtel Scans; Apple Patch; Microsoft Copilot Audit Log Issue; Password Manager Clickjacking Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple …
  continue reading
 
A major international clash over encryption has come to a dramatic resolution. Earlier this year, the U.K. government, acting under its controversial Investigatory Powers Act of 2016 (IPA)—better known as the “Snoopers’ Charter”—issued a secret Technical Capacity Notice to Apple, demanding that the company weaken its Advanced Data Protection (ADP) …
  continue reading
 
Air Date 8/20/2025 There's been a faction of conservatives who have been trying to instill king-like powers into the presidency for a long time, so it shouldn't be surprising that Trump is getting so much help from the packed court and the apparatchiks in the states who are more than happy to turn their precious federalism on its head as long as th…
  continue reading
 
In early 2025, Microsoft and security researchers uncovered PipeMagic, a modular and memory-resident backdoor that has been quietly leveraged in ransomware campaigns worldwide. Disguised as a legitimate ChatGPT desktop application, this sophisticated malware granted persistent access, precise control, and stealthy communication channels to its oper…
  continue reading
 
▶▶ This post show is willdddd- I make him call his old boss and ask for his job back. I've never had a post show like this before, watch here: https://www.youtube.com/channel/UCLe_q9axMaeTbjN0hy1Z9xA/join▶▶▶Download the *DollarWise Budgeting App* today: *Apple:* https://apple.co/4iChGhr *Google Play:* https://bit.ly/sb-googleplay Don't overcomplica…
  continue reading
 
In late 2024, Intel faced a major cybersecurity wake-up call when security researcher Eaton Zveare uncovered a series of vulnerabilities inside the company’s internal systems—flaws that exposed employee and supplier data at unprecedented scale. These vulnerabilities, later confirmed and patched by Intel, included authentication bypasses in web appl…
  continue reading
 
In late February 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a critical alert regarding a ransomware attack targeting Trimble Cityworks, an asset management platform widely used by local governments and infrastructure organizations across the United States. The attack, detailed in a report by Cyber Security Hub, ex…
  continue reading
 
UK agrees to drop 'backdoor' mandate for Apple devices Massive Allianz Life data breach impacts 1.1M people Speed cameras knocked out after cyber attack Huge thanks to our sponsor, Conveyor If portal questionnaires were a person, you’d block them by now. Endless clicks, bad navigation, and expanding questions stacked like russian nesting dolls, all…
  continue reading
 
Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
  continue reading
 
SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32…
  continue reading
 
In July 2025, Allianz Life Insurance Company of North America confirmed a data breach impacting over 1.1 million customers, financial professionals, and employees—a stark reminder of how vulnerable even the most established financial institutions remain to evolving cyber threats. The breach stemmed from a third-party vendor compromise, specifically…
  continue reading
 
The U.S. Department of Justice has closed the chapter on one of the most audacious cloud fraud and cryptojacking schemes in recent years. Charles O. Parks III, known online as “CP3O” and the self-styled “MultiMillionaire,” has been sentenced for orchestrating a multimillion-dollar scam that defrauded leading cloud providers out of more than $3.5 mi…
  continue reading
 
A new wave of state-sponsored cyber espionage is sweeping across South Korea, targeting foreign embassies through highly tailored, multi-stage spearphishing campaigns. Security researchers at Trellix have uncovered that this operation—likely linked to North Korea’s Kimsuky (APT43) group but with indicators of Chinese involvement—has been active sin…
  continue reading
 
A groundbreaking security study from the Singapore University of Technology and Design has revealed a major vulnerability in 5G networks that allows attackers to bypass traditional defenses—without even needing a rogue base station. The newly released Sni5Gect attack framework demonstrates how adversaries within range of a victim can intercept and …
  continue reading
 
SAP NetWeaver, one of the world’s most critical enterprise platforms, is under active attack from both ransomware groups and state-backed hackers. A newly released exploit combines two devastating vulnerabilities—CVE-2025-31324 and CVE-2025-42999—to bypass authentication and execute malicious code with full administrative privileges. With CVSS scor…
  continue reading
 
Ghost Stories Enter the realm where ghosts whisper ancient secrets and demons lurk in shadows that stretch beyond mortal comprehension. Ghost Stories delivers spine-chilling supernatural horror without advertisements interrupting your descent into paranormal activity and cosmic horror. All ads are strategically placed at the beginning to preserve t…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play