Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Security Management Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Dale Peterson interviews the innovators in ICS / SCADA cyber security as well as the top talent in related fields. It is the podcast for those who want more information similar to what is presented at the annual S4 event each January in Miami South Beach.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Welcome to Church Security Talk – your go-to resource for church safety and security. Join host Simon Osamoh, an ex-UK detective, former head of counterterrorism at Mall of America, Minnesota and church security expert. As he shares tips and tool to help your church stay safe and secure! Stay protected and informed with our online training courses visit worshipsecurity.org.
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
Felicia King is an internationally recognized CISO and considered to be one of the top network layer security strategists in the U.S. Since launching in 2004 on the WGTD network, her Breakfast Bytes podcast has focused on information security risk management and the issues business leaders need to be aware of to benefit from the challenges others have faced. Learn about the most effective approaches, what you can do to mitigate risk, and how to protect your most valuable assets, your data, a ...
…
continue reading
The BUILDINGS Podcast presents the latest developments and practices in facility management from energy management, lowering operating costs, maintenance of commercial buildings, life and safety, sustainability, green issues, project management, security, building performance and much more. Find more facility management news at www.buildings.com Send any comments or questions to [email protected] Support this podcast: https://podcasters.spotify.com/pod/show/buildings-podcast/support
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Federal News Network Executive Editor Jason Miller talks to federal chief information officers about the latest technology trends and issues facing their agencies.
…
continue reading
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
…
continue reading
Jake Voll brings security industry professionals together to discuss best practices, challenges, and opportunities.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Soterion’s SAP Security & GRC podcast with host Dudley Cartwright, helping you on your journey to effective access risk management in SAP.
…
continue reading
The Proposal Manager Podcast contains a wealth of information about all things related to the public sector bidding process. From the C-Suite to a GovCon newbie, this show has something for everyone. Each episode will discuss topics related to government business development, capture, and proposal management.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Modern CTO is the #1 place where technology leaders and CTOs hang out. We live to bring tech leaders value. Listen in on our fun, intelligent and engaging podcast. We hang out with interesting and popular CTOs in Aerospace, Artificial Intelligence, Robotics + Many more industries. All of this, right here, right now, on the Modern CTO Podcast. What do you think of the show? Let us know here!
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
The LP Magazine podcast keeps loss prevention professionals, security staff, and retail management up-to-date on important information and best practices for your business and career. Each episode features insights from retail loss protection, asset protection, law enforcement and more.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading

1
Your Time Management Revolution - productivity tips from The Inefficiency Assassin, Helene Segura
Helene Segura, MA Ed, CPO
Time management consultant Helene Segura brings you a variety of recommendations on the mindset, strategies and tactics successful people implement for effective time management and productivity. Some episodes are solo musings, only 2-5 minutes in length. Other episodes are interviews that can last 30 minutes to an hour. Note to podcast aficionados: This is not a templated show, so there’s no set format. These are recordings of thoughts, recommendations and interviews – all designed to help ...
…
continue reading
Join County National Bank's Senior Wealth Management Officers Christopher Phillips and Holleigh Baker as they explore the true meaning behind the question "What is Wealth?" From discussions with various guests, they delve into how wealth is not just about financial abundance but also about security, flexibility, and values discovered through personal stories and insights. Join them as they uncover the diverse perspectives on what wealth truly means in today's world and how these insights sha ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
A free podcast about cybersecurity, vulnerability management, and the CVE Program.
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
CyberSound™ is a podcast built by and for business owners and professionals. Tune in as our cybersecurity experts cover the latest news regarding IT security, the most recent and relevant threats organizations are facing today, and provide tips to keep your business safe.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
The Bare Metal Cyber CCISO Prepcast is your comprehensive guide to mastering the Certified Chief Information Security Officer (CCISO) exam. With 70 focused episodes, this series demystifies every domain, concept, and competency area tested, from governance and risk to technical controls, strategic planning, and vendor oversight. Designed specifically for experienced security professionals preparing for executive-level certification, the Prepcast offers deep dives into frameworks like ISO 270 ...
…
continue reading
Teaching you all about IRAs & Roth IRAs, employer retirement plans, taxes, Social Security, Medicare, portfolio withdrawal strategies, annuities, estate planning and much more!
…
continue reading
Listen to the latest insights from Dr. David Kelly, Chief Global Strategist, and Gabriela Santos, Chief Strategist for the Americas at J.P. Morgan Asset Management, as they sit down with a variety of thought leaders for a conversational breakdown of big ideas, future trends, emerging topics, and their investment implications, helping to inform the building of stronger long-term investment plans.
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
Building AI: Securing the Future of Artificial Intelligence is the podcast for leaders navigating the security challenges of modern AI infrastructure. Host David Yacov speaks with CISOs, security engineers, and enterprise leaders building secure AI systems, from privacy-preserving synthetic data and MLOps security to AI governance, regulatory compliance, and infrastructure risk management. If you're securing AI infrastructure, managing AI compliance, or building trustworthy AI systems, this ...
…
continue reading
discussions on topics connected with software development; privacy, security, management, tools, techniques, skills, training, business, soft skills, health
…
continue reading

1
A New Step on the Pathway to Violence, Plus Outdoor Security and Vendor Cybersecurity Management
29:40
29:40
Play later
Play later
Lists
Like
Liked
29:40This month’s Security Management Highlights episode features three compelling conversations with industry experts, starting with a chat with Ontic’s Cynthia Marble about a new step on the pathway to violence—step zero—and how it provides an even earlier opportunity to prevent escalation, if you’re paying attention. Then, Jeff Krull from Baker Tilly…
…
continue reading

1
Root Evidence Launches With $12.5M to Redefine Vulnerability Management
36:51
36:51
Play later
Play later
Lists
Like
Liked
36:51In July 2025, a team of seasoned cybersecurity leaders launched Root Evidence, a Boise-based startup with a mission to revolutionize how organizations tackle vulnerability management. Armed with $12.5 million in seed funding led by Ballistic Ventures, founders Jeremiah Grossman, Robert Hansen, Heather Konold, and Lex Arquette are setting out to fix…
…
continue reading

1
Episode 457 - Rolling out Privileged Access Management
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03We speak with Aaron Tay, Technical Solutions Consultant with Manage Engine, as sponsors for the Cyber Security Asia 2025 conference in Kuala Lumpur, 21-22 April. ManageEngine is a division of Zoho Corporation that offers comprehensive on-premises and cloud-native IT and security operations management solutions for global organizations and managed s…
…
continue reading

1
Security Firms Warn GPT-5 Is Wide Open to Jailbreaks and Prompt Attacks
44:26
44:26
Play later
Play later
Lists
Like
Liked
44:26Two independent security assessments have revealed serious vulnerabilities in GPT-5, the latest large language model release. NeuralTrust’s red team demonstrated a “storytelling” jailbreak, a multi-turn conversational exploit that gradually steers the AI toward producing harmful instructions without triggering its single-prompt safeguards. By embed…
…
continue reading

1
Germany’s Top Court Limits Police Spyware to Serious Crimes Only
39:06
39:06
Play later
Play later
Lists
Like
Liked
39:06Germany’s Federal Constitutional Court has issued a landmark ruling sharply restricting the use of state spyware by law enforcement. The decision directly addresses 2017 regulations that allowed police to monitor encrypted communications with few limitations. Now, spyware may only be deployed in investigations of serious crimes punishable by at lea…
…
continue reading
CISA issues an Emergency Directive to urgently patch a critical vulnerability in Microsoft Exchange hybrid configurations. SoupDealer malware proves highly evasive. Google patches a Gemini calendar flaw. A North Korean espionage group pivots to financial crime. Russia’s RomCom exploits a WinRAR zero-day. Researchers turn Linux-based webcams into pe…
…
continue reading
In this episode of Coffee Break with Jake, we dive deep into the art of turning proposals into PO's. Jake leads a candid discussion with security pros from across the industry on preventing ghosting, speeding up quote delivery, tracking conversion rates, and making sure deals are both won and profitable. This week's discussion points: ✅ How top per…
…
continue reading

1
BadCam: Lenovo Webcam Flaw Turns Everyday Cameras into Remote BadUSB Attack Tools
53:04
53:04
Play later
Play later
Lists
Like
Liked
53:04A new hardware security warning has emerged with the discovery of BadCam, a set of vulnerabilities in certain Lenovo webcams that could allow attackers to transform them into BadUSB devices. Uncovered by Eclypsium researchers, the flaw shows that attackers no longer need physical access to a USB peripheral to compromise it — they can now remotely r…
…
continue reading

1
Free Wi-Fi Loophole Lets Hackers Breach Smart Bus Control Systems
46:40
46:40
Play later
Play later
Lists
Like
Liked
46:40A new cybersecurity investigation has revealed that the same free passenger Wi-Fi offered on many smart buses is directly connected to critical onboard systems — creating a massive, exploitable security gap. Researchers demonstrated that, with no network segmentation in place, anyone on the free Wi-Fi could pivot into systems controlling driver ass…
…
continue reading

1
The AI Conversation CTOs are Having Behind Closed Doors with Robert Duffy, CTO at HealthEdge
53:24
53:24
Play later
Play later
Lists
Like
Liked
53:24Today, we're talking to Robert Duffy, CTO at HealthEdge. We discuss what CTOs are really saying about AI behind closed doors, how to scale AI initiatives across large organizations, and why balancing innovation with regulatory compliance is crucial in healthcare technology. All of this right here, right now, on the Modern CTO Podcast! To learn more…
…
continue reading

1
032 - No Salt Required: Listener Questions Before the Break
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40In this episode I address listener feedback and questions, from clarifying my stance on the “Tea” controversy to sharing practical tips from the community about Privacy.com workarounds. This episode covers some loose ends before I take a brief hiatus. I also discuss why I won’t be at Black Hat this year, share thoughts on minimalism versus practica…
…
continue reading
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecu…
…
continue reading

1
Lawfare Daily: The Trials of the Trump Administration, Aug. 8
1:35:11
1:35:11
Play later
Play later
Lists
Like
Liked
1:35:11In a live conversation on YouTube, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Senior Editors Anna Bower and Roger Parloff, and Lawfare contributor Peter Harrell to discuss the D.C. Circuit vacating Judge Boasberg’s probable cause of contempt by the Trump administration, where the legal challenges to President Trump’s IEEPA tariff…
…
continue reading

1
SANS Stormcast Monday, August 11th, 2025: Fake Tesla Preorders; Bad USB Cameras; Win-DoS Epidemic
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07Google Paid Ads for Fake Tesla Websites Someone is setting up fake Tesla lookalike websites that attempt to collect credit card data from unsuspecting users trying to preorder Tesla products. https://isc.sans.edu/diary/Google%20Paid%20Ads%20for%20Fake%20Tesla%20Websites/32186 Compromising USB Devices for Persistent Stealthy Access USB devices, like…
…
continue reading

1
Lawfare Archive: A New Documentary on Surviving the War in Gaza
53:44
53:44
Play later
Play later
Lists
Like
Liked
53:44From August 6, 2024: A new film from Al Jazeera’s Fault Lines series called “The Night Won’t End” profiles three Palestinian families as they try to survive the war in Gaza. On today’s episode, Lawfare Managing Editor Tyler McBrien speaks to the documentary’s director, Kavitha Chekuru, along with a few of the journalists and researchers who came to…
…
continue reading

1
Ed Amoroso: Security shouldn't be the main dish. [Computer Science] [Career Notes]
11:03
11:03
Play later
Play later
Lists
Like
Liked
11:03Please enjoy this encore of Career Notes. Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new ex…
…
continue reading
From June 7, 2023: On January 1, 2023, Luiz Inácio Lula da Silva was sworn in as president of Brazil. A week later, insurrectionists in Brazil stormed government buildings, including the president’s palace, the Supreme Federal Court, and the National Congress building to violently disrupt the democratic transition of power and challenge the results…
…
continue reading

1
When malware plays pretend. [Research Saturday]
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30Nicolás Chiaraviglio, Chief Scientist from Zimperium's zLabs, joins to discuss their work on "Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed." Zimperium’s zLabs team has been tracking an evolving banker trojan dubbed DoubleTrouble, which has grown more sophisticated in both its distribution and capabilities. Initially spread via …
…
continue reading

1
SonicWall, Informants Exposed, Cisco Vishing, Perplexity, GPT‑5, Josh Marpet–SWN #501 - SWN #501
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23This week we have, SonicWall, Confidential Informants Exposed, Cisco Vishing, Perplexity vs robots.txt, Microsoft’s Project Ire, Meta–Flo Jury Verdict, GPT‑5 Lands, TeaOnHer Data Leak, Josh Marpet, and more on the Security Weekly News.. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-…
…
continue reading
Researchers uncover multiple vulnerabilities in a popular open-source secrets manager. Software bugs threaten satellite safety. Columbia University confirms a cyberattack. Researchers uncover malicious NPM packages posing as WhatsApp development tools.A new EDR killer tool is being used by multiple ransomware gangs. Home Improvement stores integrat…
…
continue reading

1
Ep. 11 - AI in Offensive Security - Cutting Through the Hype
57:46
57:46
Play later
Play later
Lists
Like
Liked
57:46Episode 12 - AI in Offensive Security: Cutting Through the Hype Host: Tony UV - https://www.linkedin.com/in/tonyuv/ Guest: Andrew Wilson - https://www.linkedin.com/in/awilsonaz/ Is AI revolutionizing offensive security, or simply accelerating what humans already do? In this episode, we cut through the hype and get real about how AI is reshaping vul…
…
continue reading

1
Scaling Laws: What Keeps OpenAI’s Product Policy Staff Up at Night? A Conversation with Brian Fuller
51:16
51:16
Play later
Play later
Lists
Like
Liked
51:16Brian Fuller, a member of the Product Policy Team at OpenAI, joins Kevin Frazier, the AI Innovation and Law Fellow at the University of Texas School of Law and a Senior Editor at Lawfare, to analyze how large AI labs go about testing their models for compliance with internal requirements and various legal obligations. They also cover the ins and ou…
…
continue reading

1
SANS Stormcast Friday, August 8th, 2025:: ASN43350 Mass Scans; HTTP1.1 Must Die; Hyprid Exchange Vuln; Sonicwall Update; SANS.edu Research: OSS Security and Shifting Left
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59Mass Internet Scanning from ASN 43350 Our undergraduate intern Duncan Woosley wrote up aggressive scans from ASN 43350 https://isc.sans.edu/diary/Mass+Internet+Scanning+from+ASN+43350+Guest+Diary/32180/#comments HTTP/1.1 Desync Attacks Portswigger released details about new types of HTTP/1.1 desync attacks it uncovered. These attacks are particular…
…
continue reading

1
ReVault: Critical Dell Firmware Flaws Allow Windows Login Bypass and Persistent Implants
48:07
48:07
Play later
Play later
Lists
Like
Liked
48:07In a powerful reminder that hardware security is just as critical as software defense, Cisco Talos researchers have uncovered “ReVault,” a collection of five high-severity firmware vulnerabilities in Dell’s ControlVault3 subsystem. These flaws impact over 100 Dell laptop models, including the Latitude, Precision, and XPS series—devices used widely …
…
continue reading

1
Air France–KLM Data Breach Exposes Customer Info via Compromised Third-Party Platform
36:56
36:56
Play later
Play later
Lists
Like
Liked
36:56The aviation industry has suffered yet another major cybersecurity incident. Air France and KLM have confirmed a data breach impacting customer records via an external customer service platform. While no sensitive financial or identity documents were compromised, attackers successfully accessed unspecified customer data—prompting both airlines to n…
…
continue reading
Why should hate AI When firmware attacks The 300 second breach Old ways still work, AI might help And so begins the crawler wars Turn off your SonicWall VPN Your Pie may be wrapped in PII Attackers will find a way Signed kernel drivers D-Link on the KEV Rasperry PIs attack Stealthy LoRa LLM's don't commit code, people do Jame's Bond style rescue wi…
…
continue reading
Why should hate AI When firmware attacks The 300 second breach Old ways still work, AI might help And so begins the crawler wars Turn off your SonicWall VPN Your Pie may be wrapped in PII Attackers will find a way Signed kernel drivers D-Link on the KEV Rasperry PIs attack Stealthy LoRa LLM's don't commit code, people do Jame's Bond style rescue wi…
…
continue reading
Why should hate AI When firmware attacks The 300 second breach Old ways still work, AI might help And so begins the crawler wars Turn off your SonicWall VPN Your Pie may be wrapped in PII Attackers will find a way Signed kernel drivers D-Link on the KEV Rasperry PIs attack Stealthy LoRa LLM's don't commit code, people do Jame's Bond style rescue wi…
…
continue reading
Microsoft warns of a high-severity vulnerability in Exchange Server hybrid deployments. A Dutch airline and a French telecom report data breaches. Researchers reveal new HTTP request smuggling variants. An Israeli spyware maker may have rebranded to evade U.S. sanctions. CyberArk patches critical vulnerabilities in its secrets management platform. …
…
continue reading

1
Cyber Economics and Keeping Up with Innovation ft Trupti Shiralkar (Cybersecurity Leader & Advisor)
59:56
59:56
Play later
Play later
Lists
Like
Liked
59:56What trade-offs are you willing to make in cybersecurity? In this episode of Security & GRC Decoded, host Raj Krishnamurthy is joined by Trupti Shiralkar, a seasoned cybersecurity leader and Advisory Board Member at Backslash Security, to explore how risk, ROI, and real-world constraints shape modern security programs. With decades of experience ac…
…
continue reading

1
EP04 - AI Encryption vs Blockchain: Lessons from a Unicorn Pivot
0:56
0:56
Play later
Play later
Lists
Like
Liked
0:56EPISODE 04 - COMING SEPTEMBER 22ND What happens when a $1 billion AI privacy unicorn pivots from enterprise AI to blockchain? Jeremy Donato, COO at Zama, reveals why cutting-edge homomorphic encryption struggled in AI markets but thrived in crypto. From enterprise readiness gaps to institutional adoption patterns, discover what this pivot teaches u…
…
continue reading

1
Critical Flaws in CyberArk Conjur and HashiCorp Vault Put Enterprise Secrets at Risk
37:29
37:29
Play later
Play later
Lists
Like
Liked
37:29Enterprise secrets managers—long considered the most secure components in modern infrastructure—are now under fire. In a groundbreaking report, cybersecurity firm Cyata revealed 14 critical zero-day vulnerabilities across CyberArk Conjur and HashiCorp Vault, exposing flaws that allow unauthenticated attackers to achieve remote code execution (RCE),…
…
continue reading

1
Prompt Injection Nightmare: Critical AI Vulnerabilities in ChatGPT, Copilot, Gemini & More
56:52
56:52
Play later
Play later
Lists
Like
Liked
56:52Enterprise AI assistants are revolutionizing productivity—but they’re also opening new doors for cyberattacks. In this episode, we explore explosive research from Zenity Labs, which reveals that leading AI tools like ChatGPT, Microsoft Copilot, Google Gemini, Cursor, and Salesforce Einstein are vulnerable to prompt injection attacks—a class of expl…
…
continue reading

1
What bonds fixed income research strategies?
18:26
18:26
Play later
Play later
Lists
Like
Liked
18:26Watch the video version on YouTube. Research analysts play a pivotal role in fixed income markets, where active management is crucial due to the vast array of issuers and securities. The fixed income industry encompasses a diverse range of bond sectors, including rates, emerging market debt, municipals, high yield and securitized debt, each offerin…
…
continue reading

1
Lawfare Daily: ‘Big Tech in Taiwan’ with Sam Bresnick
37:43
37:43
Play later
Play later
Lists
Like
Liked
37:43Sam Bresnick, Research Fellow and Andrew W. Marshall Fellow at Georgetown’s Center for Security and Emerging Technology (CSET), joins Lawfare’s Justin Sherman to discuss his recently published report, “Big Tech in Taiwan: Beyond Semiconductors.” They discuss a previous report Sam coauthored with Georgetown CSET colleagues, “Which Ties Will Bind?,” …
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some …
…
continue reading

1
#164 - Summary of the 2025 annual Social Security trustees report
48:07
48:07
Play later
Play later
Lists
Like
Liked
48:07Andy summarizes the recent 2025 annual Social Security trustees report, including what it would actually mean if the system's trust fund were to deplete, and what changes can be made to ensure that doesn't happen Links in this episode: The full 2025 Social Security trustees report - here My company's August 1 2025 newsletter summarizing the 2025 So…
…
continue reading

1
SANS Stormcast Thursday, August 7th, 2025: Sextortion Update; Adobe and Trend Micro release emergency patches
5:06
5:06
Play later
Play later
Lists
Like
Liked
5:06Do Sextortion Scams Still Work in 2025? Jan looked at recent sextortion emails to check if any of the crypto addresses in these emails received deposits. Sadly, some did, so these scams still work. https://isc.sans.edu/diary/Do%20sextortion%20scams%20still%20work%20in%202025%3F/32178 Akira Ransomware Group s use of Drivers Guidepoint Security obser…
…
continue reading

1
From Google to LVMH: ShinyHunters’ Salesforce Breaches Spark Global Ransom Crisis
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37A new wave of cyber extortion is sweeping across global enterprises, and the battlefield is Salesforce CRM. The notorious **ShinyHunters group—tracked internally by Google as UNC6040/UNC6240—**has launched a coordinated series of breaches using vishing (voice phishing) to compromise employee credentials, exfiltrate sensitive customer data, and dema…
…
continue reading
Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecu…
…
continue reading

1
Cisco Hit by Vishing Attack: CRM Breach Exposes Millions of User Profiles
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43Cisco has confirmed a new data breach after a vishing (voice phishing) attack tricked a company representative into exposing access to a third-party CRM system. Detected on July 24, 2025, the breach compromised basic user details such as names, emails, and phone numbers of Cisco.com registrants. While the data was non-sensitive, the incident unders…
…
continue reading
Two Chinese nationals are arrested for allegedly exporting sensitive Nvidia AI chips. A critical security flaw has been discovered in Microsoft’s new NLWeb protocol. Vulnerabilities in Dell laptop firmware could let attackers bypass Windows logins and install malware. Trend Micro warns of an actively exploited remote code execution flaw in its endp…
…
continue reading

1
Ox Security Unveils Agent Ox: AI Tool That Writes Tailored Fixes for Software Vulnerabilities
52:37
52:37
Play later
Play later
Lists
Like
Liked
52:37The world of application security is shifting dramatically as AI begins to move from simply flagging vulnerabilities to actively fixing them. Ox Security has launched Agent Ox, a groundbreaking AI-powered extension designed to automate secure, organization-specific code fixes. Unlike generic coding assistants that offer boilerplate advice, Agent Ox…
…
continue reading
In this episode of The Currency of Knowledge, host Holleigh sits down again with Austin Jenkins from Dimensional Fund Advisors for Part 2 of their conversation—this time diving into the timely and often misunderstood world of ethical and sustainable investing, also known as ESG (Environmental, Social, and Governance) investing. Whether you're an en…
…
continue reading

1
Meta Deletes 6.8 Million Scam Accounts as AI-Powered Fraud Rings Exploit WhatsApp
34:45
34:45
Play later
Play later
Lists
Like
Liked
34:45Meta has removed 6.8 million accounts tied to criminal scam centers in the first half of 2025, marking one of the most aggressive crackdowns on digital fraud in the company’s history. The move comes amid an alarming surge in online scams that cost global victims $16.6 billion in 2024 alone, a 33% increase from the year before. Many of these scams a…
…
continue reading

1
Episode 15: Community Building, Art of Convincing, and GTD Strategies
1:54:21
1:54:21
Play later
Play later
Lists
Like
Liked
1:54:21🎙️ Welcome back to the Distilled Security Podcast! In this episode, hosts Justin Leapline, Joe Wynn, and Rick Yocum sit down with James Ringold (Senior Security Cloud Solution Architect at Microsoft and President of ISSA Pittsburgh) to talk all about building stronger cybersecurity communities. From the behind-the-scenes of BSides Pittsburgh 2025 t…
…
continue reading

1
302 - A brief overview of Model Context Protocol (MCP)
33:00
33:00
Play later
Play later
Lists
Like
Liked
33:00In this week's episode, we break down Model Context Protocol, or MCP. What is it, why should you care, and how does it change your solutions? We discuss the concept, the architecture, and share our experiences working with MCP solutions. (00:00) - Intro and catching up. (03:02) - Show content starts. Show links - MCP home: modelcontextprotocol.io -…
…
continue reading