This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Vulnerability Exploits Podcasts
A podcast that helps us understand human vulnerability and how we can defend against the attacks that exploit us.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Personal finance nerd at heart! Making content to entertain and educate. Want to be on the show? Email us at [email protected] Sponsorship and business inquiries: [email protected] Get new episodes a week earlier on our YouTube channel!
…
continue reading
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
We Cover the Cyberspace.
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
…
continue reading

1
Best of the Left - Leftist Perspectives on Progressive Politics, News, Culture, Economics and Democracy
BestOfTheLeft.com
Expertly-curated progressive politics, news, and culture produced by leftist humans, not algorithms or AI. This is an award-winning podcast that dives deeply into a wide range of national and international issues facing society and governments. We draw from hundreds of sources of progressive news and commentary. Est. 2006. Save time by listening to a range of perspectives on a focused topic in each episode and be introduced to new sources you will not have come across on your own!
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
Think about all of the things you consider every day to help keep yourself, your loved ones, and your community happy, healthy, and hopeful. Now consider this: There is an ever-growing body of research demonstrating significant negative impacts, for yourself and the ones you love, in the consumption of pornography. It can change the way you think, harm your ability to connect with other people, and can contribute to changing the world in negative ways. Join us every other week as we consider ...
…
continue reading
This podcast is dedicated to the unsung heroes out there wishing to heal from the wounds of childhood they did not create. Adult children of alcoholics and children of narcissistic parents have been emotionally conditioned and neurologically wired to abandon the authentic self, for the sake of parental attachments. Emotional neglect manifests as codependency, a need for external validation, and approval. Unaware, those suffering from abandonment wounds, who exhibit codependency often attract ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A comedy podcast about shame- because no one roasts you harder than yourself! Each week, psychotherapist-turned-comedian Ely Kreimendahl exploits her therapy skills to talk all-things-shame with a new special guest. Every guest shares a core story of something that once made them spiral HARD, answers both silly and emotionally complicated questions, and even if these conversations are ACCIDENTALLY therapeutic, it's not therapy.... Ely goes ALL IN on sharing her shame, too. Does coming togeth ...
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Human trafficking is one of the greatest injustices in our world today. It’s the exploitation of vulnerable people for their bodies and labor. It’s modern-day slavery, and it’s generating billions of dollars each year. In this podcast, we will unpack the problem of human trafficking, share powerful stories from the frontlines, hear from thought leaders in the fight for freedom, and equip you to make a difference–right where you are. A21 is a global anti-human trafficking organization operati ...
…
continue reading
Eric Payne, a divorced dad and retired marriage & fatherhood blogger, tells the comedic tale of his "Chapter 2" — having to start life over brand new after a divorce he didn't want. What Does Starting Over Mean? Although "free” for the first time in 15 years, Eric has years of baggage and a stubborn desire to hold on to the past which initially keeps him stuck as he tries to move in a world way different than the one where he first met his ex-wife in the year 2000. From one-night stands to g ...
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security
…
continue reading
Ghost Stories Enter the realm where ghosts whisper ancient secrets and demons lurk in shadows that stretch beyond mortal comprehension. Ghost Stories delivers spine-chilling supernatural horror without advertisements interrupting your descent into paranormal activity and cosmic horror. All ads are strategically placed at the beginning to preserve the immersive experience of every exorcism, vampire encounter, and psychological horror that haunts our darkest nightmares. In the depths of supern ...
…
continue reading
Welcome to the Partnership Podcast - The P Pod, from the Somerset Safeguarding Children Partnership! Meet the agencies who will help you to support children, young people and their families across Somerset. Explore local and national learning and how to improve your safeguarding practice. If you would like to take part in a future podcast or have any questions or comments arising from any episodes we'd love you to contact us at [email protected] www.somersetsafeguardingchildren.org.uk
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
This podcast features all things related to Information Security and Cyber Security
…
continue reading
Bringing you vital facts and perspectives on Islamist extremism and how to combat it directly from leading activists in the field. Clarion Podcast is brought to you by Clarion Project, dedicated to challenging Islamist extremism and promoting dialogue with Muslim human rights activists.
…
continue reading
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
…
continue reading
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
…
continue reading
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
…
continue reading

1
Apple zero-day patch, Jailbreaking ChatGPT-5 Pro, 7-year old Cisco Vulnerability exploited
8:57
8:57
Play later
Play later
Lists
Like
Liked
8:57A patch today keeps the zero-day away Jailbreaking ChatGPT-5 Pro The thing about vulnerabilities is they stay vulnerable Huge thanks to our sponsor, Conveyor It’s Thursday. Have you been personally victimized by a portal security questionnaire this week? Most solutions just give you a browser extension to copy and paste answers in, still leaving ho…
…
continue reading

1
AI Joins the Fight Against Exploits: Google and Mozilla Patch Dangerous Vulnerabilities
59:42
59:42
Play later
Play later
Lists
Like
Liked
59:42Both Google and Mozilla have rolled out urgent security updates to patch multiple high-severity vulnerabilities in their flagship browsers—Google Chrome and Mozilla Firefox—underscoring the constant arms race between developers and cyber attackers. Google’s update addresses a critical out-of-bounds write vulnerability (CVE-2025-9132) within Chrome’…
…
continue reading

1
SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
…
continue reading

1
SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln (#)
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, l…
…
continue reading

1
Farmers Insurance also hit by Salesforce breach, UpCrypter phishing campaign, Pakistan hits Indian government agencies
8:20
8:20
Play later
Play later
Lists
Like
Liked
8:20If Salesforce flutters its wings in San Francisco... How is this still tricking people? From tagging to bagging Huge thanks to our sponsor, Prophet Security Security teams are drowning in alerts - many companies generate upwards of 1000 or more alerts a day, and nearly half go ignored. That’s where Prophet Security comes in. Their AI SOC platform a…
…
continue reading

1
SANS Stormcast Tuesday, August 26th, 2025: Decoding Word Reading Location; Image Downscaling AI Vulnerability; IBM Jazz Team Server Vuln
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%20Value%20in%20Microsoft%20Word%20Documents/32224 Weaponizing image scaling against production AI systems AI systems often downscale imag…
…
continue reading

1
SANS Stormcast Tuesday, August 26th, 2025: Decoding Word Reading Location; Image Downscaling AI Vulnerability; IBM Jazz Team Server Vuln (#)
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01SANS Stormcast Tuesday, August 26th, 2025: Decoding Word Reading Location; Image Downscaling AI Vulnerability; IBM Jazz Team Server Vuln Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%…
…
continue reading

1
Former Dev Gets 4 Years for Sabotaging Workplace
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11Everyone may get elaborate revenge fantasies but few follow through due to the bad outweighing the satisfaction. One man, sensing he was to be terminated soon, however, decided if he were to go he would try to take the whole company down with him. Last week he was sentenced to 4 years in prison. Sources: https://pastebin.com/Pi0YSFUt…
…
continue reading

1
Ep. 318 - The 4th Monday Series - Finding Stable Employment in a Crazy Economy with Bobby Knost
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Bobby Knost. Bobby is a proud memb…
…
continue reading

1
Betrayed by Charisma: When Charm is a Mask for Manipulation
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35In this powerful episode, trauma-informed life coach and codependency recovery expert Lisa A. Romano explores the hidden dangers of falling for charisma—especially for adult children of narcissistic or emotionally immature parents. If you've ever been drawn to someone magnetic and charming, only to feel emotionally used, discarded, or confused, thi…
…
continue reading

1
He Treats His Wife Like A Pet | Financial Audit
1:40:10
1:40:10
Play later
Play later
Lists
Like
Liked
1:40:10▶ *FREE TRIAL* To make our classes and budgeting app *more affordable*, we bundled them together for an *80% DISCOUNT* and for this month only, you can try DollarWise Central for *free* - check it out here and change your life: https://dollarwise.com/dollarwise-central/▶▶ Idk if she needed a break or what, but she *took the gloves off* in the post-…
…
continue reading

1
Malicious Go module, new Mirai botnet, Silk Typhoon exploits cloud
9:26
9:26
Play later
Play later
Lists
Like
Liked
9:26Malicious Go module steals credentials via Telegram Mirai-based botnet resurfaces targeting systems globally Silk Typhoon hackers exploit cloud trust to hack downstream customers Huge thanks to our sponsor, Prophet Security Ever feel like your security team is stuck in a loop of alert fatigue and manual investigations? Meet Prophet Security. Their …
…
continue reading

1
Rui Ataide on Navigating Ransomware Negotiations
28:39
28:39
Play later
Play later
Lists
Like
Liked
28:39Rui Ataide, Managing Security Consultant at GuidePoint Security, joins the Nexus Podcast to discuss his experiences negotiating with ransomware gangs on behalf of victimized organizations. Ataide covers the nuances, processes, and methodology of negotiating with groups. He also explains how extortion and data theft has changed the risk management c…
…
continue reading

1
SANS Stormcast Monday, August 25th, 2025: IP Cleanup; Linux Desktop Attacks; Malicious Go SSH Brute Forcer; Onmicrosoft Domain Restrictions
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .d…
…
continue reading

1
SANS Stormcast Monday, August 25th, 2025: IP Cleanup; Linux Desktop Attacks; Malicious Go SSH Brute Forcer; Onmicrosoft Domain Restrictions (#)
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04SANS Stormcast Monday, August 25th, 2025: IP Cleanup; Linux Desktop Attacks; Malicious Go SSH Brute Forcer; Onmicrosoft Domain Restrictions The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were “zero padded”, an unfortunate choice. As of this week, datafeeds should no longer be “zero …
…
continue reading

1
#1732 It's Never Just About the Kids (Online Censorship, Age Verification, and the Project 2025 Agenda)
2:53:34
2:53:34
Play later
Play later
Lists
Like
Liked
2:53:34Air Date 8/24/2025 The nature of politics and public policy is that there's always a need to balance opposing interests. Almost nowhere is there a more intractable set of opposing interests than in the attempt to protect children from harmful content on the internet while maintaining free access to adults, particularly because people wildly disagre…
…
continue reading

1
Week in Review: Celebrating 5 years of Cyber Security Headlines
45:50
45:50
Play later
Play later
Lists
Like
Liked
45:50Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino. This is our milestone edition, celebrating five years of the daily Cyber Security Headlines news podcast. Our guests today will be the CSH reporters themselves, reflecting on some stories from this week as well as their favorite stories from th…
…
continue reading

1
3 True McDonald’s Horror Stories That Will Leave You Terrified
24:23
24:23
Play later
Play later
Lists
Like
Liked
24:23Ghost Stories Enter the realm where ghosts whisper ancient secrets and demons lurk in shadows that stretch beyond mortal comprehension. Ghost Stories delivers spine-chilling supernatural horror without advertisements interrupting your descent into paranormal activity and cosmic horror. All ads are strategically placed at the beginning to preserve t…
…
continue reading
▶ *FREE TRIAL* To make our classes and budgeting app *more affordable*, we bundled them together for an *80% DISCOUNT* and for this month only, you can try DollarWise Central for *free* - check it out here and change your life: https://dollarwise.com/dollarwise-central/▶▶ SHE HAS A HIDDEN DEBT WTTFFFFFF- she has a BONUS loan with her bank, it's hor…
…
continue reading

1
Apple’s urgent update, Scattered Spider sentence, Microsoft seeks SSD feedback
8:44
8:44
Play later
Play later
Lists
Like
Liked
8:44Apple urges iPhone, iPad and Mac update ASAP Scattered Spider operative gets 10 years and a big fine Microsoft seeks customer feedback on SSD failure issues Huge thanks to our sponsor, Conveyor Does logging into a portal security questionnaire feel like punishment? We get it. Other solutions offer browser extensions that require you to do all the c…
…
continue reading

1
SANS Stormcast Friday, August 22nd, 2025: The -n switch; Commvault Exploit; Docker Desktop Escape Vuln;
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the …
…
continue reading

1
SANS Stormcast Friday, August 22nd, 2025: The -n switch; Commvault Exploit; Docker Desktop Escape Vuln; (#)
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52SANS Stormcast Friday, August 22nd, 2025: The -n switch; Commvault Exploit; Docker Desktop Escape Vuln; Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%…
…
continue reading

1
SANS Stormcast Thursday, August 21st, 2025: Airtel Scans; Apple Patch; Microsoft Copilot Audit Log Issue; Password Manager Clickjacking
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
…
continue reading

1
PyPI Cracks Down on Domain Expiration Attacks to Protect Python Packages
45:01
45:01
Play later
Play later
Lists
Like
Liked
45:01The Python Package Index (PyPI), the backbone of the global Python ecosystem, has rolled out new security safeguards aimed at stopping a dangerous form of supply-chain attack: domain resurrection attacks. These attacks exploit a subtle but devastating weakness—when a maintainer’s email domain expires, attackers can re-register it, hijack the email,…
…
continue reading

1
SANS Stormcast Thursday, August 21st, 2025: Airtel Scans; Apple Patch; Microsoft Copilot Audit Log Issue; Password Manager Clickjacking (#)
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52SANS Stormcast Thursday, August 21st, 2025: Airtel Scans; Apple Patch; Microsoft Copilot Audit Log Issue; Password Manager Clickjacking Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple …
…
continue reading

1
Britain Backs Down: UK Drops Encryption Backdoor Demand on Apple
20:29
20:29
Play later
Play later
Lists
Like
Liked
20:29A major international clash over encryption has come to a dramatic resolution. Earlier this year, the U.K. government, acting under its controversial Investigatory Powers Act of 2016 (IPA)—better known as the “Snoopers’ Charter”—issued a secret Technical Capacity Notice to Apple, demanding that the company weaken its Advanced Data Protection (ADP) …
…
continue reading

1
#1731 Raw Power, the Presidency, the Courts, and Democracy in the Balance
3:41:10
3:41:10
Play later
Play later
Lists
Like
Liked
3:41:10Air Date 8/20/2025 There's been a faction of conservatives who have been trying to instill king-like powers into the presidency for a long time, so it shouldn't be surprising that Trump is getting so much help from the packed court and the apparatchiks in the states who are more than happy to turn their precious federalism on its head as long as th…
…
continue reading

1
PipeMagic Backdoor: How Ransomware Actors Exploited a Windows Zero-Day
54:55
54:55
Play later
Play later
Lists
Like
Liked
54:55In early 2025, Microsoft and security researchers uncovered PipeMagic, a modular and memory-resident backdoor that has been quietly leveraged in ransomware campaigns worldwide. Disguised as a legitimate ChatGPT desktop application, this sophisticated malware granted persistent access, precise control, and stealthy communication channels to its oper…
…
continue reading

1
I've Finally Met My Match | Financial Audit
1:36:58
1:36:58
Play later
Play later
Lists
Like
Liked
1:36:58▶▶ This post show is willdddd- I make him call his old boss and ask for his job back. I've never had a post show like this before, watch here: https://www.youtube.com/channel/UCLe_q9axMaeTbjN0hy1Z9xA/join▶▶▶Download the *DollarWise Budgeting App* today: *Apple:* https://apple.co/4iChGhr *Google Play:* https://bit.ly/sb-googleplay Don't overcomplica…
…
continue reading

1
270,000 Intel Employee Records at Risk from Authentication Bypass and Hardcoded Credentials
36:28
36:28
Play later
Play later
Lists
Like
Liked
36:28In late 2024, Intel faced a major cybersecurity wake-up call when security researcher Eaton Zveare uncovered a series of vulnerabilities inside the company’s internal systems—flaws that exposed employee and supplier data at unprecedented scale. These vulnerabilities, later confirmed and patched by Intel, included authentication bypasses in web appl…
…
continue reading

1
CISA: Ransomware Attack Disrupts Trimble Cityworks, Threatening Local Governments
3:43
3:43
Play later
Play later
Lists
Like
Liked
3:43In late February 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a critical alert regarding a ransomware attack targeting Trimble Cityworks, an asset management platform widely used by local governments and infrastructure organizations across the United States. The attack, detailed in a report by Cyber Security Hub, ex…
…
continue reading

1
UK drops Apple backdoor mandate, Allianz Life breach impacts 1.1M, attack stifles speed cameras
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13UK agrees to drop 'backdoor' mandate for Apple devices Massive Allianz Life data breach impacts 1.1M people Speed cameras knocked out after cyber attack Huge thanks to our sponsor, Conveyor If portal questionnaires were a person, you’d block them by now. Endless clicks, bad navigation, and expanding questions stacked like russian nesting dolls, all…
…
continue reading

1
SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
…
continue reading

1
SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues (#)
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32…
…
continue reading

1
How Social Engineering and Vendor Weaknesses Led to Allianz Life’s Massive Breach
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45In July 2025, Allianz Life Insurance Company of North America confirmed a data breach impacting over 1.1 million customers, financial professionals, and employees—a stark reminder of how vulnerable even the most established financial institutions remain to evolving cyber threats. The breach stemmed from a third-party vendor compromise, specifically…
…
continue reading

1
Cloud Computing Heist: $3.5 Million Fraud Leads to Prison for Fake Crypto Influencer
47:58
47:58
Play later
Play later
Lists
Like
Liked
47:58The U.S. Department of Justice has closed the chapter on one of the most audacious cloud fraud and cryptojacking schemes in recent years. Charles O. Parks III, known online as “CP3O” and the self-styled “MultiMillionaire,” has been sentenced for orchestrating a multimillion-dollar scam that defrauded leading cloud providers out of more than $3.5 mi…
…
continue reading

1
Embassy Espionage: Kimsuky and Suspected Chinese Partners Deploy XenoRAT in Seoul
1:04:58
1:04:58
Play later
Play later
Lists
Like
Liked
1:04:58A new wave of state-sponsored cyber espionage is sweeping across South Korea, targeting foreign embassies through highly tailored, multi-stage spearphishing campaigns. Security researchers at Trellix have uncovered that this operation—likely linked to North Korea’s Kimsuky (APT43) group but with indicators of Chinese involvement—has been active sin…
…
continue reading

1
GSMA Confirms Flaws: Researchers Unveil Dangerous 5G Sniffing and Injection Attack
51:18
51:18
Play later
Play later
Lists
Like
Liked
51:18A groundbreaking security study from the Singapore University of Technology and Design has revealed a major vulnerability in 5G networks that allows attackers to bypass traditional defenses—without even needing a rogue base station. The newly released Sni5Gect attack framework demonstrates how adversaries within range of a victim can intercept and …
…
continue reading

1
SAP NetWeaver Under Siege: New Exploit Chains Threaten Global Enterprises
44:53
44:53
Play later
Play later
Lists
Like
Liked
44:53SAP NetWeaver, one of the world’s most critical enterprise platforms, is under active attack from both ransomware groups and state-backed hackers. A newly released exploit combines two devastating vulnerabilities—CVE-2025-31324 and CVE-2025-42999—to bypass authentication and execute malicious code with full administrative privileges. With CVSS scor…
…
continue reading

1
3 True WWE Horror Stories That Will Make You Never Watch Again
25:22
25:22
Play later
Play later
Lists
Like
Liked
25:22Ghost Stories Enter the realm where ghosts whisper ancient secrets and demons lurk in shadows that stretch beyond mortal comprehension. Ghost Stories delivers spine-chilling supernatural horror without advertisements interrupting your descent into paranormal activity and cosmic horror. All ads are strategically placed at the beginning to preserve t…
…
continue reading