Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Vulnerability Exploits Podcasts

show episodes
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
  continue reading
 
Artwork

1
Consider Before Consuming

Fight the New Drug

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Think about all of the things you consider every day to help keep yourself, your loved ones, and your community happy, healthy, and hopeful. Now consider this: There is an ever-growing body of research demonstrating significant negative impacts, for yourself and the ones you love, in the consumption of pornography. It can change the way you think, harm your ability to connect with other people, and can contribute to changing the world in negative ways. Join us every other week as we consider ...
  continue reading
 
This podcast is dedicated to the unsung heroes out there wishing to heal from the wounds of childhood they did not create. Adult children of alcoholics and children of narcissistic parents have been emotionally conditioned and neurologically wired to abandon the authentic self, for the sake of parental attachments. Emotional neglect manifests as codependency, a need for external validation, and approval. Unaware, those suffering from abandonment wounds, who exhibit codependency often attract ...
  continue reading
 
Expertly-curated progressive politics, news, and culture produced by leftist humans, not algorithms or AI. This is an award-winning podcast that dives deeply into a wide range of national and international issues facing society and governments. We draw from hundreds of sources of progressive news and commentary. Est. 2006. Save time by listening to a range of perspectives on a focused topic in each episode and be introduced to new sources you will not have come across on your own!
  continue reading
 
Artwork

1
The Breach Report

Robert Wortmann, Rense Buijen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
  continue reading
 
Artwork

1
Shame Spiral

Ely Kreimendahl

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A comedy podcast about shame- because no one roasts you harder than yourself! Each week, psychotherapist-turned-comedian Ely Kreimendahl exploits her therapy skills to talk all-things-shame with a new special guest. Every guest shares a core story of something that once made them spiral HARD, answers both silly and emotionally complicated questions, and even if these conversations are ACCIDENTALLY therapeutic, it's not therapy.... Ely goes ALL IN on sharing her shame, too. Does coming togeth ...
  continue reading
 
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
  continue reading
 
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
  continue reading
 
Human trafficking is one of the greatest injustices in our world today. It’s the exploitation of vulnerable people for their bodies and labor. It’s modern-day slavery, and it’s generating billions of dollars each year. In this podcast, we will unpack the problem of human trafficking, share powerful stories from the frontlines, hear from thought leaders in the fight for freedom, and equip you to make a difference–right where you are. A21 is a global anti-human trafficking organization operati ...
  continue reading
 
Eric Payne, a divorced dad and retired marriage & fatherhood blogger, tells the comedic tale of his "Chapter 2" — having to start life over brand new after a divorce he didn't want. What Does Starting Over Mean? Although "free” for the first time in 15 years, Eric has years of baggage and a stubborn desire to hold on to the past which initially keeps him stuck as he tries to move in a world way different than the one where he first met his ex-wife in the year 2000. From one-night stands to g ...
  continue reading
 
“Don’t look to the bottle, the knife, or the gun… Look for the soul you’ll become! Welcome to “Beat The Mental Health Out Of It!”, where humor meets heart—and things get uncomfortably real! Join our fearless host, “The DEFECTIVE Schizoaffective,” a lovable goofball navigating life with Schizoaffective Disorder who boldly asked, “What the hell… why not turn my traumatic experiences into a podcast for the enjoyment of others?” He is often joined by his wise, “elderly” co-host, “IndyPocket,” an ...
  continue reading
 
Artwork

1
The P Pod

The Somerset Safeguarding Children Partnership

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Partnership Podcast - The P Pod, from the Somerset Safeguarding Children Partnership! Meet the agencies who will help you to support children, young people and their families across Somerset. Explore local and national learning and how to improve your safeguarding practice. If you would like to take part in a future podcast or have any questions or comments arising from any episodes we'd love you to contact us at [email protected] www.somersetsafeguardingchildren.org.uk
  continue reading
 
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
  continue reading
 
Artwork

1
Clarion Podcasts

Clarion Project

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Bringing you vital facts and perspectives on Islamist extremism and how to combat it directly from leading activists in the field. Clarion Podcast is brought to you by Clarion Project, dedicated to challenging Islamist extremism and promoting dialogue with Muslim human rights activists.
  continue reading
 
Artwork

1
The Mobile Security Show

AT&T Tech Channel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
  continue reading
 
Artwork
 
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
  continue reading
 
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
  continue reading
 
Artwork

1
Ghost Stories

Ghost Stories

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Ghost Stories Enter the realm where ghosts whisper ancient secrets and demons lurk in shadows that stretch beyond mortal comprehension. Ghost Stories delivers spine-chilling supernatural horror without advertisements interrupting your descent into paranormal activity and cosmic horror. All ads are strategically placed at the beginning to preserve the immersive experience of every exorcism, vampire encounter, and psychological horror that haunts our darkest nightmares. In the depths of supern ...
  continue reading
 
Loading …
show series
 
Air Date: 8-1-25 Today, Jay!, Amanda, Deon, and Erin discuss: The impact of A.I. LLM “friend” bots on childhood development How using A.I. LLMs negatively impacts critical thinking and information retention The importance of understanding how A.I. LLM tools work before using them The ways in which A.I. LLM tools could and shouldn’t help movements o…
  continue reading
 
▶ *FREE BONUS EPISODES* - I am personally paying for your Hammer *ELITE* subscription for the first month https://www.youtube.com/channel/UCLe_q9axMaeTbjN0hy1Z9xA/join Sign up for *ELITE* and I'll send you a digital gift card covering the $10 cost. In today's post show, *I BRING IN THE BOYFRIEND* - and the confrontation gets heated as I expose how …
  continue reading
 
Scattered Spider Related Domain Names A quick demo of our domain feeds and how they can be used to find Scattered Spider related domains https://isc.sans.edu/diary/Scattered+Spider+Related+Domain+Names/32162 Excel External Workbook Links to Blocked File Types Will Be Disabled by Default Excel will discontinue allowing links to dangerous file types …
  continue reading
 
In this episode, we analyze the multiple vulnerabilities recently disclosed in Honeywell’s Experion Process Knowledge System (PKS), a widely deployed industrial control and automation solution that underpins operations in energy, chemical plants, manufacturing, healthcare, and transportation sectors worldwide. Reported by CISA and Positive Technolo…
  continue reading
 
In this episode, we uncover the Auto-Color Linux malware, a stealthy and highly persistent Remote Access Trojan (RAT) that is rapidly emerging as one of the most dangerous threats of 2025. First identified by Palo Alto Networks’ Unit 42 and later analyzed by Darktrace, Auto-Color has now been linked to active exploitation of CVE-2025-31324, a criti…
  continue reading
 
In this episode, we investigate the growing cybersecurity storm targeting the Python Package Index (PyPI) — the backbone of Python’s software distribution ecosystem. A recent phishing campaign in July 2025 has developers on high alert, as attackers impersonated PyPI using a deceptive domain (pypj.org) to trick maintainers into handing over their cr…
  continue reading
 
In this episode, we examine the alarming discovery of critical security vulnerabilities in Dahua smart cameras, one of the world’s most widely deployed surveillance systems. Researchers at Bitdefender uncovered two zero-click flaws — CVE-2025-31700 and CVE-2025-31701 — that allow unauthenticated remote attackers to gain root access to Dahua devices…
  continue reading
 
Air Date: 7/31/2025 Who would have thought that a political movement built almost exclusively on conspiracy theories and a cult of personality would end up being threatened by the cult leader being implicated in the biggest and worst conspiracy coverup… even though it’s been well documented for decades? Content warning for detailed accusations leve…
  continue reading
 
Securing Firebase: Lessons Re-Learned from the Tea Breach Inspried by the breach of the Tea app, Brendon Evans recorded a video to inform of Firebase security issues https://isc.sans.edu/diary/Securing%20Firebase%3A%20Lessons%20Re-Learned%20from%20the%20Tea%20Breach/32158 WebKit Vulnerability Exploited before Apple Patch A WebKit vulnerablity patch…
  continue reading
 
In this episode, we dive into Dropzone AI’s landmark $37 million Series B funding round, bringing the company’s total raised to over $57 million. Backed by major investors, Dropzone AI is accelerating the development of its AI-powered SOC analysts — tools designed to autonomously investigate and resolve security alerts across critical threat catego…
  continue reading
 
In this episode, we explore Axonius’s landmark acquisition of Cynerio, a healthcare cybersecurity company specializing in protecting vulnerable medical devices like MRI machines, infusion pumps, and ventilators. The deal — valued at over $100 million in cash and stock — marks Axonius’s first-ever acquisition and signals a major strategic expansion …
  continue reading
 
In this episode, we examine a critical firmware security crisis shaking Lenovo devices worldwide. Security researchers at Binarly have uncovered six serious vulnerabilities in the Insyde BIOS firmware used in Lenovo’s IdeaCentre and Yoga product lines. Four of these flaws, rated high severity, reside in the System Management Mode (SMM) — a privileg…
  continue reading
 
*FREE BONUS EPISODES* - I am personally paying for your Hammer *ELITE* subscription for the first month https://www.youtube.com/channel/UCLe_q9axMaeTbjN0hy1Z9xA/join Sign up for *ELITE* and I'll send you a digital gift card covering the $10 cost. In today's post show, SHE HAS A PAYDAY LOAN SHE HID FROM ME- I freak the F out and have to destroy her …
  continue reading
 
In this episode, we dive into Promptfoo’s groundbreaking $18.4 million Series A funding round, led by Insight Partners and supported by Andreessen Horowitz, bringing the AI security startup’s total funding to $23.4 million. Founded in 2024, Promptfoo has quickly emerged as a leader in securing Large Language Models (LLMs) and generative AI applicat…
  continue reading
 
*This episode contains a detailed discussion of child abuse, sexual violence, human trafficking, and trauma. Listener discretion is advised. Dr. Suamhirs Piraino-Guzman is a behavioral neurologist, clinical psychologist, human trafficking survivor, and international human rights advocate. In this powerful episode, he shares his story of surviving s…
  continue reading
 
Apple Updates Everything: July 2025 Edition Apple released updates for all of its operating systems patching 89 different vulnerabilities. Many vulnerabilities apply to multiple operating systems. https://isc.sans.edu/diary/Apple%20Updates%20Everything%3A%20July%202025/32154 Python Triage A quick python script by Xavier to efficiently search throug…
  continue reading
 
A platform designed to protect women’s safety in dating has instead become a nightmare for its users. In this episode, we uncover the catastrophic Tea app data breach, which exposed more than 59 GB of highly sensitive user data due to a fundamental security failure: a completely public Firebase storage bucket with no authentication, no encryption, …
  continue reading
 
Deepfake technology has evolved from a fringe novelty into one of the most serious cybersecurity and national security threats of our time. In this episode, we examine how artificial intelligence–generated synthetic media is being weaponized to impersonate CEOs, manipulate elections, infiltrate corporate networks, and damage reputations worldwide. …
  continue reading
 
In this episode, we dive deep into Microsoft Threat Intelligence’s latest findings on two critical macOS vulnerabilities that shook Apple’s privacy defenses. The flaws, identified as CVE-2025-31199 (Sploitlight) and CVE-2024-44133 (HM Surf), specifically targeted Apple’s Transparency, Consent, and Control (TCC) framework, the system designed to gua…
  continue reading
 
On July 28, 2025, Aeroflot—Russia’s largest state-owned airline—was brought to its knees in one of the most severe cyberattacks since the country’s invasion of Ukraine in 2022. The sophisticated assault, carried out by Ukrainian hacktivist group Silent Crow and the Belarusian Cyber-Partisans, led to the cancellation of more than 100 flights, strand…
  continue reading
 
Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a bl…
  continue reading
 
French defense contractor Naval Group, a cornerstone of Europe’s naval defense industry, is facing a high-stakes cybersecurity crisis. A threat actor known as “Neferpitou” claims to have exfiltrated 1TB of sensitive data, including combat management system (CMS) source code for submarines and frigates, technical documents, developer virtual machine…
  continue reading
 
In July 2025, a team of seasoned cybersecurity leaders launched Root Evidence, a Boise-based startup with a mission to revolutionize how organizations tackle vulnerability management. Armed with $12.5 million in seed funding led by Ballistic Ventures, founders Jeremiah Grossman, Robert Hansen, Heather Konold, and Lex Arquette are setting out to fix…
  continue reading
 
In April 2025, NASCAR became the latest victim of a major cyberattack, with hackers infiltrating its network between March 31 and April 3. During the breach, personal information—including names and Social Security numbers—was exfiltrated from NASCAR’s systems. In response, the organization has notified affected individuals, activated its incident …
  continue reading
 
In this episode, we examine the sophisticated operations of Scattered Spider—also known as Muddled Libra, UNC3944, and Octo Tempest—a financially motivated cybercriminal group that has redefined the ransomware threat landscape. Recently highlighted by Google’s Threat Intelligence Group (GTIG), Scattered Spider has escalated its attacks by targeting…
  continue reading
 
▶ *FREE BONUS EPISODES* - I am personally paying for your Hammer *ELITE* subscription for the first month https://www.youtube.com/channel/UCLe_q9axMaeTbjN0hy1Z9xA/join Sign up for *ELITE* and I'll send you a digital gift card covering the $10 cost. In today's post show, *THIS IS INSANNEEE* - they did not want this discussed in the main episode, but…
  continue reading
 
Are you constantly hurt by a spouse who struggles to prioritize you? Do they avoid setting boundaries with their parents—even when it damages your marriage? If your partner was raised in a toxic or emotionally immature home, their nervous system may have been wired for survival—not connection. That early programming can lead to deep-rooted abandonm…
  continue reading
 
Dan Berte, director of IoT security at Bitdefender, joins the Nexus Podcast to join his team's ongoing research into the security of solar grid inverters and three serious vulnerabilities uncovered in the popular Deye Solarman management platform. Dan discusses his team's research, the disclosure process, and the implications on green energy initia…
  continue reading
 
Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Congressman Darren Soto. Darren So…
  continue reading
 
Linux Namespaces Linux namespaces can be used to control networking features on a process-by-process basis. This is useful when trying to present a different network environment to a process being analysed. https://isc.sans.edu/diary/Sinkholing%20Suspicious%20Scripts%20or%20Executables%20on%20Linux/32144 Coyote in the Wild: First-Ever Malware That …
  continue reading
 
Air Date: 7-27-2025 Back when I worked in the climate movement, just after the turn of the century, we knew that the extreme weather we were warning about would become ever-more clear to see in people's lived experiences and assumed that any doubts people had about the science of climate change would be wiped away with the evidence they could see w…
  continue reading
 
A new and highly sophisticated malware strain named Koske is redefining the threat landscape for Linux environments. Suspected to be partially developed using artificial intelligence, Koske introduces novel and highly evasive techniques, blending image files, rootkits, and adaptive cryptomining logic to create a stealthy and persistent backdoor int…
  continue reading
 
BlackSuit, the ransomware strain known for crippling critical sectors and demanding multi-million dollar payouts, has just suffered a devastating blow. In a coordinated international law enforcement operation codenamed "Operation Checkmate," authorities—including the U.S. Department of Justice, Homeland Security Investigations, FBI, Europol, the UK…
  continue reading
 
A new banking trojan called Coyote has emerged as a groundbreaking cyber threat, becoming the first known malware in the wild to exploit Microsoft’s User Interface Automation (UIA) framework—an accessibility tool originally designed to help users interact with Windows interfaces. But in the hands of attackers, UIA becomes a weapon of stealth and pr…
  continue reading
 
*FREE BONUS EPISODES* - I am personally paying for your Hammer *ELITE* subscription for the first month https://www.youtube.com/channel/UCLe_q9axMaeTbjN0hy1Z9xA/join Sign up for *ELITE* and I'll send you a digital gift card covering the $10 cost. In today's post show, I CALL HER DAD AND CONFRONT HIM- and it's literally DISGUSTING. You don't want to…
  continue reading
 
A newly disclosed critical vulnerability, CVE-2025-7742, is putting hundreds of LG Innotek LNV5110R security cameras at risk around the world—including within critical infrastructure. This high-severity authentication bypass flaw allows remote attackers to gain full administrative control without credentials, giving them access to live camera feeds…
  continue reading
 
New File Integrity Tool: ficheck.py Jim created a new tool, ficheck.py, that can be used to verify file integrity. It is a drop-in replacement for an older tool, fcheck, which was written in Perl and no longer functions well on modern Linux distributions. https://isc.sans.edu/diary/New%20Tool%3A%20ficheck.py/32136 Mitel Vulnerability Mitel released…
  continue reading
 
In one of the most concerning state-sponsored cyber incidents of the year, Chinese hackers exploited zero-day vulnerabilities in Microsoft SharePoint to breach the networks of the National Nuclear Security Administration (NNSA)—the U.S. agency responsible for managing the nation's nuclear arsenal. The attackers, part of a suspected Chinese state-sp…
  continue reading
 
In this episode, we expose the alarming supply chain attack that compromised millions of JavaScript projects across the globe. This sophisticated breach targeted the NPM ecosystem, infecting widely-used packages like eslint-config-prettier and is, through a coordinated phishing campaign and the exploitation of non-expiring legacy access tokens. Att…
  continue reading
 
In one of the most dramatic cybersecurity legal battles of the past year, Clorox has filed a lawsuit against IT services giant Cognizant, accusing the company of gross negligence that allegedly enabled a catastrophic 2023 cyberattack. The breach wreaked havoc on Clorox's operations—causing widespread product shortages, a multibillion-dollar hit to …
  continue reading
 
In this episode, we dive deep into HeroDevs' recent $125 million strategic growth investment, a move that signals a major expansion in the fight against the vulnerabilities of end-of-life (EOL) open source software. Based in Salt Lake City, HeroDevs has carved out a critical niche—providing "Never-Ending Support" (NES) to ensure security, complianc…
  continue reading
 
Reversing SharePoint Toolshell Exploits CVE-2025-53770 and CVE-2025-53771 A quick walk-through showing how to decode the payload of recent SharePoint exploits https://isc.sans.edu/diary/Analyzing%20Sharepoint%20Exploits%20%28CVE-2025-53770%2C%20CVE-2025-53771%29/32138 Compromised JavaScript NPM is Package The popular npm package is was compromised …
  continue reading
 
In a landmark move to disrupt the financial engine powering ransomware attacks, the United Kingdom is pushing forward with legislation that would ban ransom payments across the public sector and critical national infrastructure (CNI). This sweeping proposal covers everything from local councils and schools to healthcare providers like the NHS, aimi…
  continue reading
 
Two newly added vulnerabilities in SysAid’s On-Prem IT support software — CVE-2025-2775 and CVE-2025-2776 — have officially joined the Cybersecurity and Infrastructure Security Agency (CISA)’s Known Exploited Vulnerabilities (KEV) catalog, signaling increased concern around their potential abuse. While there are no confirmed reports of public explo…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play