Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Hey everyone, Welcome to the Infosec Prep Podcast. We aim to bring you weekly Infosec news and bring some people on to interview! Join our discord at https://discord.gg/9xTqKTY
The Hurricane Labs InfoSec Podcast features the clashing of swords and witty banter about the latest security topics. Listen in as we discuss headlines, hacks, tech tips, Splunk stuff, and more!
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Security Nation is a podcast dedicated to celebrating the champions in the cybersecurity community who are advancing security in their own ways. We also cover the latest developments in infosec that you should know about.
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
Thinking about the intersection of security, technology, and society—and what might be coming next. Every Monday morning you get a curated 15-30 minute summary of the week's most important stories and why they matter. Plus regular essays and interviews that explore a single topic.
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec


1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
Cyber Security moves much too quickly to wait for a weekly news recap. That’s why we’re here each and every weekday bringing you the relevant Information Security stories from overnight. Make InfoSec Overnights part of your daily routine to ensure you and your team are up to the minute on the threats attacking your organization.
Trace Labs is a Canadian based non profit specializing in the crowd sourcing of open source intelligence collection. In this series, we explore the topics, techniques and tools that relate to OSINT collection.
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
U
UNSECURITY: Information Security Podcast


1
UNSECURITY: Information Security Podcast
InfoSec Missionaries
Weekly information security podcast airing Monday mornings hosted by Evan Francen and Brad Nigh. In a unique focus on protecting personal information, Evan and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Evan is the CEO of FRSecure and the author of the book UNSECURITY (publish date December, 2018). Brad is the Principal Security Consultant at FRSecure and a 20+ year veteran of the industry. Hosting things ...
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
Modem Mischief tells the true stories of the outlaws of cyberspace. Hackers, dark web lurkers and cybercrime perpetrators of the digital underground are explored in this true crime series.
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over seven million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field.
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
Welcome to Security Happy Hour, where we interview new and established members of the cybersecurity community. In this show we cover where guests have come from and where they want to go, as well as current events and other security related items.
Just two people trying to do IT and Security the right way.
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest in risk, impact, and mitigation for cybersecurity practitioners globally. The show is live at 9 AM EST Monday through Thursday and tune in each Friday for a special Tech Corner with some of the industry's brightest minds to discuss the latest challenges, innovations, and technologies. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We wa ...
Lighthearted security advice and banter from 1Password and guests.
Join hacker maker Phillip Wylie and his guests as they discuss and unveil the “secrets” of professional hacking — a mysterious, intriguing, and often misunderstood occupation, even by those in the field of cybersecurity. With the rising need for professional hackers, those entering the infosec world are drawn to it, and understandably so — it is an exciting and fascinating career. Still, it sure has nothing to do with magic. Join these conversations to discover what the role entails, the dif ...
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
Welcome to the Cybrary Studios, home to Cybrarys three podcast series, including the award-winning 401 Access Denied voted Best Cybersecurity Podcast for NORTH AMERICA by the 2021 Cybersecurity Excellence Awards.The Cybrary Podcast -In this show, we will be speaking with current leaders and experts in the IT and Cybersecurity fields. Discussing topics ranging from DevSecOps and Ransomware attacks to diversity and the retention of talent the Cybrary Podcast covers it all. Stay up to date with ...
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
The goal of the podcast is to share practical tips of what works and what doesn't in information security. Essentially we turn our guests' wisdom into practical tips you can use to improve your own skills.
T
The Host Unknown Podcast


1
The Host Unknown Podcast
Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over 7 years of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
Podcast by InfoSec Campus
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
I
Infosec Overnights - Daily Security News


1
REvil killer, Tricky phish, Top Aces locked, and more.
2:51
2:51
Play later
Play later
Lists
Like
Liked
2:51
A daily look at the relevant information security news from overnight. Episode 238 - 13 May 2022 REvil killer - https://portswigger.net/daily-swig/researcher-stops-revil-ransomware-in-its-tracks-with-dll-hijacking-exploit Tricky phish - https://www.bleepingcomputer.com/news/security/iranian-hackers-exposed-in-a-highly-targeted-espionage-campaign/ Z…
h
humans-of-infosec


1
Episode 66: Getting Security Fundamentals Right
41:43
41:43
Play later
Play later
Lists
Like
Liked
41:43
Caroline talks with tech executive Brian Carmenatty and Sanjay Deo, Founder & President at 24By7Security, Inc. They explore how teams can face prevalent threats by going back to basics with their technology and security policies.By Humans of InfoSec
I
Infosec Prep Podcast

1
Episode 0x09 How to break into Infosec
1:32:27
1:32:27
Play later
Play later
Lists
Like
Liked
1:32:27
In this episode, Alh4zr3d, Hopscotch, Homebrewer, PurpleFox, Cheese, and S1ren discuss how to break into Information Security as a profession as well as answer questions such as how to pivot out of Capture the Flags and into a career, How age factors into a job hunt, How to transition from a non-security role to a security role, and much more. We a…
H
Hurricane Labs InfoSec Podcast


1
Pentest Perspective: Taking a Look at Social Engineering
29:55
29:55
Play later
Play later
Lists
Like
Liked
29:55
The Hurricane Labs team shares a few stories about their experiences with social engineering–and ways we can become more resilient to this type of attack. Also, make sure to check out some of the articles and resources mentioned during this episode: Verizon 2021 Data Breach Investigations Report Influence: The Psychology of Persuasion RSA Key Extra…
T
The CyberHub Podcast


1
Zyxel Firewall Exploit, SonicWall urges Patch, Iran OilRig & US Signs Cybercrime treaty
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25
Zyxel Firewall Exploit, SonicWall urges Patch, Iran OilRig & US Signs Cybercrime treaty Cybersecurity News CyberHub Podcast May 16th, 2022 Today's Headlines and the latest #cybernews from the desk of the #CISO: CISA Removes Windows Vulnerability From 'Must-Patch' List Due to Buggy Update SonicWall ‘strongly urges’ admins to patch SSLVPN SMA1000 bug…
C
Cyber Work


1
What does a cybersecurity beginner do? | Cybersecurity Career Series
16:10
16:10
Play later
Play later
Lists
Like
Liked
16:10
Just getting started? This role is for you! The Cybersecurity Beginner role focuses on the foundational skills and knowledge that will allow anyone to take the first step towards transitioning into a cybersecurity career. No prior knowledge of cybersecurity or work experience is required. The only prerequisite is a passion for technology and cybers…
Ukraine CERT-UA warns of new attacks launched by Russia-linked Armageddon APT Microsoft fixes new PetitPotam Windows NTLM relay attack vector Hackers are exploiting critical bug in Zyxel firewalls and VPNs And now let’s thank today’s sponsor, Torq Myth 1: Automation Is Only a Reactive Part of SecOps Incorrect. Proactive management of security incid…
S
Security Unfiltered


1
Episode 50 - Thomas Kinsella - Life Of A SOC Analyst
1:03:19
1:03:19
Play later
Play later
Lists
Like
Liked
1:03:19
In this episode I talk with Thomas Kinsella about the life of a SOC Analyst and the struggles that come with it. We also touch on what someone can do to avoid those struggles and how companies should adjust to minimize the struggles. As always, if you enjoy this podcast please leave a review on Apple Podcasts. Below is all the links! Follow the Pod…
C
CyberWire Daily


1
The current state of zero trust. [CyberWire-X]
31:51
31:51
Play later
Play later
Lists
Like
Liked
31:51
According to the zero trust philosophy, we all assume that our networks are already compromised and try to design them to limit the damage if it turns out to be so. In this episode of CyberWire-X, we’ve invited subject matter experts, Amanda Fennell, the Chief Information Officer and Chief Security Officer of Relativity, and Galeal Zino, CEO of epi…
C
CyberWire Daily


1
Eric Escobar: Collaboration is key. [Pen tester] [Career Notes]
8:12
8:12
Play later
Play later
Lists
Like
Liked
8:12
Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking into a network with a friend, he was bitten b…
I
ITSPmagazine


1
Building The Ultimate Live Stream Broadcasting Stack | KnightLife On ITSPmagazine With Alissa Valentina Knight
23:02
23:02
Play later
Play later
Lists
Like
Liked
23:02
In this new episode of KnightLife, I unbox the new PTZOptics 30X-SDI Gen 2 Live Streaming Broadcast Camera and Ubiquiti Networks UniFi Switch for building the ultimate live stream tech stack! I also present a detailed architecture diagram for how it will all be connected in my upcoming live streams at RSA Conference 2022. __________________________…
C
CyberWire Daily


1
Vulnerabilities in IoT devices. [Research Saturday]
23:32
23:32
Play later
Play later
Lists
Like
Liked
23:32
Dr. May Wang, Chief Technology Officer at Palo Alto Networks, joins Dave Bittner to discuss their findings detailed in Unit 42's "Know Your Infusion Pump Vulnerabilities and Secure Your Healthcare Organization" research. Unit 42 recently set out to better understand how well hospitals and other healthcare providers are doing in securing smart infus…
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, May 9-13, is hosted by Rich Stroffolino with our guest, Rich Lindberg, CISO, JAMS Thanks to our sponsor, Datadog Break down silos between DevOps and Security teams to enable collaboration and strengthen the security of your environment. In this on-demand webinar, hear from one…
C
CyberWire Daily


1
War crimes in cyberspace? Iranian cyberespionage (and a possible APT side-hustle). A backdoor for Roblox. Darkweb C2C trader sentenced. eBay newsletter conspirator pleads guilty. CIA gets a CISO.
24:39
24:39
Play later
Play later
Lists
Like
Liked
24:39
Ukraine holds its first war crimes trial. Are there war crimes in cyberspace? Iranian cyberespionage (and a possible APT side-hustle). Roblox seems to have been used to introduce a backdoor. CISA issues ICS advisories. Darkweb C2C trader sentenced. The last conspirator in the strange case of the eBay newsletter takes a guilty plea. Carole Theriault…
This Week in InfoSec (07:30) With content liberated from the “today in infosec” twitter account and further afield 9th May 2006: Jeanson James Ancheta became the first person to be charged for controlling a botnet. He had hijacked around 500,000 computers and was sentenced to 57 months in prison, forfeiture of a 1993 BMW and $58,000 in profit, and …
T
The Hacker Factory


1
From IT To Cybersecurity | A Conversation With Mark Harvey | The Hacker Factory With Phillip Wylie
43:07
43:07
Play later
Play later
Lists
Like
Liked
43:07
Mentor and former IT directory Mark Harvey shares his story and path from IT to cybersecurity. Mark took a non traditional approach to getting into cybersecurity through popular well known hands on learning resources to go from IT directory to cybersecurity consultant. _______________________ Guest Mark Harvey Security Engineer at Alias On LinkedIn…
I
ITSPmagazine


1
From IT To Cybersecurity | A Conversation With Mark Harvey | The Hacker Factory With Phillip Wylie
43:07
43:07
Play later
Play later
Lists
Like
Liked
43:07
Mentor and former IT directory Mark Harvey shares his story and path from IT to cybersecurity. Mark took a non traditional approach to getting into cybersecurity through popular well known hands on learning resources to go from IT director to cybersecurity consultant. _______________________ Guest Mark Harvey Security Engineer at Alias On LinkedIn …
I
ITSPmagazine


1
Governance, Risk, And Compliance: Protecting The Business With Policies, Controls, And Audits | A Live Stream Panel With Kouadjo Bini | Redefining CyberSecurity With Sean Martin
45:36
45:36
Play later
Play later
Lists
Like
Liked
45:36
GRC is comprised of the ethical management of an organization combined with the organization’s ability to identify, quantify, and manage risk, along with the ability to demonstrate compliance for these things in connection with internal, industry, and regulatory standards, frameworks, and requirements. If defined, implemented, and managed correctly…
R
Reality 2.0


1
Episode 111: Peer-to-Peer Messaging with Quiet
1:17:19
1:17:19
Play later
Play later
Lists
Like
Liked
1:17:19
Katherine Druckman and Doc Searls talk to Kyle Rankin and Holmes Wilson about Quiet, a Tor-based peer-to-peer messaging project. Site/Blog/Newsletter FaceBook Twitter YouTube Mastodon Special Guest: Kyle Rankin. Support Reality 2.0 Links: GitHub - ZbayApp/monorepo — An early prototype for a peer-to-peer alternative to Slack and Discord.…
Google will use mobile devices to thwart phishing attacks CISA urges organizations to patch actively exploited F5 BIG-IP vulnerability Kick China off social media, says tech governance expert Thanks to our episode sponsor, Datadog Break down silos between DevOps and Security teams to enable collaboration and strengthen the security of your environm…
T
The Cybrary Podcast


1
How to Checkmate Ransomware Threat Actors with Red/Blue Team Training | The Cybrary Podcast Ep. 83
Ransomware attacks impacted 66% of organizations in 2021. As threat actor groups like FIN7 take advantage of expanded networks, security weaknesses, and human trust, it's more important than ever to keep up with their level of prowess. Cybrary's "enterprise defender," Owen Dubiel, and "chief thief," Matt Mullins, discuss how their cybersecurity wor…
I
Iron Sysadmin Podcast


1
Episode 121a - Finding software to learn on
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55
Welcome to Episode 121 Main Topic How do I get a hold of expensive software, for the purposes of learning? Check with your school, a LOT of vendors have super-cheap solutions for education. Your school may be able to provide you a learning license/sub for software you are interested in Less than Legal alternatives Red hat enterprise linux Red Hat D…
I
Iron Sysadmin Podcast


1
Episode 121b - RHEL 8.6, Metaverse Face-Punches, and Nvidia Drivers
50:12
50:12
Play later
Play later
Lists
Like
Liked
50:12
Welcome to Episode 121b Announcements Patreon Update Z(ed)-Thor name_pending197 Jérémy Arinomi Andrew Tatro Bruce Robert Matt David S0l3mn Trooper_Ish LiNuXsys666 Mark The Mentor Marc Julius Andi J Charles 22532 Nate’s going to be helping host RHEL Presents. (as a guest host) Get your Iron Sysadmin Merch at Teespring! https://teespring.com/stores/i…
C
CyberWire Daily


1
Killnet hits Italian targets. Access restored to RuTube. Hacktivism in the hybrid war. Emotet surges. NPM dependency confusion attacks were pentesting. Cybercrime and punishment.
26:11
26:11
Play later
Play later
Lists
Like
Liked
26:11
Killnet hits Italian targets. Access to RuTube is restored. Hacktivism in the hybrid war. Emotet surges. Clearing up the confusion of NPM dependency confusion attacks. Tim Eades from Cyber Mentor Fund on finding the right investors. Our guest is Michael DeBolt of Intel 471 on the growing interest in Biometrics in the criminal underground. And cyber…
C
CyberWire Daily


1
CISA Alert AA22-131A – Protecting against cyber threats to managed service providers and their customers. [CISA Cybersecurity Alerts]
3:27
3:27
Play later
Play later
Lists
Like
Liked
3:27
The cybersecurity authorities of the UK, Australia, Canada, New Zealand, and the US have observed a recent increase in malicious cyber activity against managed service providers (MSPs). Allied cybersecurity authorities expect state-sponsored cyber actors to increase their targeting of MSPs in an attempt to exploit provider-customer trust relationsh…
C
CYBER


1
BONUS: The Surprising Origins of Ransomware
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42
This bonus episode of Cyber is sponsored by Command Line Heroes. If you like Cyber, you’re going to like Command Line Heroes. It’s an original podcast from Red Hat where listeners hear epic true tales of how developers, programmers, hackers, geeks, and open source rebels are revolutionizing the technology landscape. It’s an award winning show that’…
I
Infosec Overnights - Daily Security News


1
HP broken BIOS, New Nerbian, Konica cure, and more.
2:41
2:41
Play later
Play later
Lists
Like
Liked
2:41
A daily look at the relevant information security news from overnight. Episode 237 - 12 May 2022 HP broken BIOS - https://www.bleepingcomputer.com/news/security/hp-fixes-bug-letting-attackers-overwrite-firmware-in-over-200-models/ New Nerbian - https://threatpost.com/nerbian-rat-advanced-trick/179600/ Bitter at Bangladesh - https://www.bleepingcomp…
T
The CyberHub Podcast


1
Intel & Chrome Patch, F5 Warning, Iran targeting moderate countries
9:36
9:36
Play later
Play later
Lists
Like
Liked
9:36
Intel & Chrome Patch, F5 Warning, Iran targeting moderate countries Cybersecurity News CyberHub Podcast May 12th, 2022 Today's Headlines and the latest #cybernews from the desk of the #CISO: Intel Patches High-Severity Vulnerabilities in BIOS, Boot Guard Chrome 101 Update Patches High-Severity Vulnerabilities Government Agencies Warn of Increase in…
All links and images for this episode can be found on CISO Series In the cyber industry we pat each other on the back and give each other awards, all while the statistics for breaches appear to be worsening, Are we celebrating growing failure? Does the cyber industry suck? Check out this post for the discussions that are the basis of our conversati…
Old botnets are new again Meta withdraws Oversight Board guidance request EU proposes new CSAM rules Thanks to our episode sponsor, Datadog In this on-demand webinar, you’ll learn how to best utilize the suite of Datadog Cloud Security products to identify the root cause of an attack and how a unified platform provides real-time threat-detection an…
Jonathan Armstrong and Tom Fox return for another episode of Life with GDPR. In this episode, we take up the proposed agreement for data transfers from the EU (and UK) to the US. Some of the issues we consider in the myriad of questions around this latest version of Privacy Shield include: 1. Is this simply an agreement to agree? 2. Who will popula…
S
Smashing Security


1
274: Hands off my biometrics, and a wormhole squirmish
49:10
49:10
Play later
Play later
Lists
Like
Liked
49:10
Clearview AI receives something of a slap in the face, and who is wrestling over an internet wormhole? All this and more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault. And don't miss our featured interview with Artur Kane of GoodAccess. Visit https://www.smashi…
C
CyberWire Daily


1
Consensus on the Viasat hack: Russia did it. Kaspersky remains under investigation. The Nerbian RAT is out. NPM dependencies exploited, but to what end? Advisories from CISA and its partners.
25:43
25:43
Play later
Play later
Lists
Like
Liked
25:43
There’s international consensus on the cyberattack against Viasat. Kaspersky remains under investigation. The Nerbian RAT is out. NPM dependencies are exploited, but to what end? Caleb Barlow examines Russia’s future on the internet. Our guest is Deepen Desai from Zscaler with the latest phishing research. And new advisories from CISA and its partn…
Interview Links Learn more about Kali Linux. Check out what they’re up to over at Offensive Security. Follow g0tmi1k on Twitter, and check out his blog. Rapid Rundown Links Read the Krebs on Security article on the upcoming password changes. Like the show? Want to keep Jen and Tod in the podcasting business? Feel free to rate and review with your f…
I
Infosec Overnights - Daily Security News


1
Windows zero-days patched, Intel bad memory, @ phishing, and more.
3:33
3:33
Play later
Play later
Lists
Like
Liked
3:33
A daily look at the relevant information security news from overnight. Episode 236 - 11 May 2022 Windows zero-days patched - https://www.bleepingcomputer.com/news/microsoft/microsoft-fixes-new-ntlm-relay-zero-day-in-all-windows-versions/ Intel bad memory - https://threatpost.com/intel-memory-bug-poses-risk-for-hundreds-of-products/179595/ Siemens a…
T
The CyberHub Podcast


1
Patch Tuesday Recap, EU Blames Russia & New National Cyber Directors
7:18
7:18
Play later
Play later
Lists
Like
Liked
7:18
Patch Tuesday Recap, EU Blames Russia & New National Cyber Directors Cybersecurity News CyberHub Podcast May 11th, 2022 Today's Headlines and the latest #cybernews from the desk of the #CISO: Microsoft Warns of New Zero-Day Being Exploited E.U. Blames Russia for Cyberattack on KA-SAT Satellite Network Operated by Viasat SAP Patches Spring4Shell Vul…
I
ITSPmagazine


1
Foster Kid to Network Engineer | A Conversation With Daniel Hall | 2 Cyber Chicks Podcast With With Erika McDuffie And Jax Scott
24:08
24:08
Play later
Play later
Lists
Like
Liked
24:08
At an early age, Daniel Hall was fortunate to discover his creative outlet within software development. Coming from an abusive orphanage home to teaching coding to college students at the age of 13 to hacking the app, Clubhouse. Dan has dedicated 45 years to the technology field but beyond that, he provides a powerful voice in our industry. Join us…