Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
Firewall

Firewall

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Politics, technology and the pursuit of happiness. Twice a week, Bradley Tusk, New York-based political strategist and venture investor, covers the collision between new ideas and the real world. His operating thesis is that you can't understand tech today without understanding politics, too. Recorded at P&T Knitwear, his bookstore / podcast studio, 180 Orchard Street, New York City.
  continue reading
 
Welcome to Beyond The Firewall: The Business Bytecast, where cybersecurity meets business strategy and IT innovation powers success. Designed for C-suite executives and managers, this podcast explores how cutting-edge technology, from cyber risk management to outsourced IT services and fractional CTO leadership, transforms organizations. We tackle the challenges of securing your business in a digital world and highlight the opportunities that IT solutions like on-demand support bring to the ...
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
A new podcast powered by Experian Partner Solutions. Join hosts Cody Gredler and Morgan Grevey as they speak with leading security experts and share their unique experiences and insights to keep listeners—and their identities—safe from cybersecurity threats.
  continue reading
 
Artwork

1
THEOS Cybernova

Theos CyberNova

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
  continue reading
 
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
HowTo Linux MP3

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
HowTo Linux HD

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Linux, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Artwork

1
HowTo Linux OGG

Jupiter Broadcasting

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
HowTo Linux will guide you through the amazing world of Linux. From switching to Windows, to building the ultimate home theater, firewall, office file server, and just about anything else.
  continue reading
 
Artwork

1
Ctrl+Alt+Azure

Tobias Zimmergren, Jussi Roine

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
  continue reading
 
Artwork
 
A live podcast show, that’s like a morning radio show, just much better. Live from 6h00-8h00 Monday, Wednesday and Friday. Clever, funny, outrageous and sometimes very silly. Come for the guests, stay for the laughter. Also check out our other shows on The Real Network for more entertainment.
  continue reading
 
Artwork

1
The Extra 10

Jason Esposito & Ben Cartland

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Join Jason Esposito and Ben Cartland as they explore the deeper questions behind Jason's sermons at Crossway Church, a "community for the curious".
  continue reading
 
Artwork
 
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
  continue reading
 
An exploration of the UAP - UFO phenomenon and the associated "high strangeness" which accompanies it from the standpoint of analysts and researchers. Fortean Winds is a collective of data and research professionals who began a project in 2020 to better understand the UFO/UAP phenomenon from the perspective of existing research and evidence. After a few years study and note taking (which you can see at our website https://www.forteanwinds.com) , we're ready to discuss our notes and insights ...
  continue reading
 
Artwork

1
Cyber Coffee Hour

Dr. Joseph J. Burt-Miller Jr. and Alfredzo Nash

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Artwork

1
Network Security

University of Twente

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
  continue reading
 
Artwork

1
Keefer Brother's Wilder Minds

Casey Keefer and Chris Keefer

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The Keefer Brothers have spent over 20 years mastering the art of survival- not just in the wild, but in the world of storytelling, business and life. Now, these pioneers make Wilder Minds their new home. Each episode, epic stories collide with unfiltered truth and personal evolution- to uncover what it takes to live life against the grain. Awake your soul with Wilder Minds.
  continue reading
 
Join us as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peek behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | Co-Host Twitter Handle: Andy @andylapteff
  continue reading
 
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
  continue reading
 
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
  continue reading
 
The Internet Explorer's Podcast is a comedy-ish, science-ish, history-ish, popculture-ish parody podcast where curiosity meets absurdity. Each week, self-proclaimed "internet explorer" Jimmy dives headfirst into the wildest, weirdest, and most questionable corners of the internet. He “researches” topics like DIY invisibility cloaks, medieval alchemy, and whether plants can feel pain—then confidently explains his findings to a real expert, who sets the record straight while humoring Jimmy’s m ...
  continue reading
 
Artwork

1
Fortinet Cybersecurity Podcast

Fortinet Cybersecurity Podcast

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
  continue reading
 
Hi there! I'm Doug Noll, an award-winning author, speaker, and trainer. I am, among many other things, a lawyer-turned-peacemaker, mediator, and expert in deep, empathic listening. I left a 22-year career as a trial lawyer, earned my Masters Degree in Peacemaking and Conflict Studies, and have helped thousands of companies and organizations with internal conflicts and poor communication. I am the co-founder of the award-winning Prison of Peace Project. I have trained mediators and leaders in ...
  continue reading
 
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
  continue reading
 
Artwork

1
DIAF

Adequate.com

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
DIAF is a series of audiobooks presented in podcast format which follow the adventures of Brian Brushwood and Justin Robert Young.
  continue reading
 
Artwork

1
PANCast™

Palo Alto Networks - LIVEcommunity

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Listen, Learn, Leverage! This Palo Alto Networks podcast offers insights to help you build knowledge, maximize investment, and improve your company’s cybersecurity posture.
  continue reading
 
Artwork
 
What if your breath was as important as your interface design? A podcast at the crossroads of mindful movement and meaningful tech. Hosted by Eric Infanti — Marine Corps veteran, UX design leader, and spiritual practitioner — Human by Design explores what it means to build systems, bodies, and lives that support human flourishing. From samadhi to strongman, wireframes to warrior breathwork — Eric's episodes bridge ancient wisdom with modern design. Human by Design explores the terrain where ...
  continue reading
 
Artwork

1
CodeBlueTech

CodeBlueTech

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Mid-Atlantic’s Best IT services company. Helping Business Owners create, improve and scale their Technology strategy. IT services, IT Security and IT Support advice and leadership from expert professionals. Q&A with Senior Engineers, Service Managers and Business Development.
  continue reading
 
Artwork

1
EL&L

Ely

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
My name is Ely and I’m a full-time and independent graphic designer. My fiancé is Laura Together, we have discovered that no matter how crazy our work lives can be, there is always laughter in it. Although we have much in common, our differences in pets, music, food, movies, and T.V. shows make for the best conversations.
  continue reading
 
Loading …
show series
 
A heartfelt tribute to the first pet Bradley ever had, a rescue dog named Sam who was his inseparable companion for a decade. Plus, what the Happy City Index gets right and wrong, how he rates his own level of happiness about New York, and why the selection of the new pope is good for the world. This episode was taped at P&T Knitwear at 180 Orchard…
  continue reading
 
In this episode of the Other Side of the Firewall podcast, the hosts discuss the latest cybersecurity news, focusing on the dismantling of a major IoT botnet and the implications for device security. They emphasize the importance of keeping devices updated and the risks associated with neglected IoT devices. The conversation also explores the lands…
  continue reading
 
Almost exactly two years ago, “Five Eyes” intelligence agencies discovered a successful and ongoing cyber attack on critical US infrastructure by a state-sponsored actor based in China. This group, associated with the People’s Liberation Army and known as Volt Typhoon, was tasked with quietly gaining persistent remote access to critical systems inc…
  continue reading
 
09.05.25 Pt 1 - Gareth Cliff and Ben Karpinski weigh in on the election of the new Pope and why preserving tradition still holds value in a fast-changing world. They also unpack the controversy around Julius Malema being denied entry into the UK, and what it says about South Africa's global standing and political self-respect. Plus, in an era where…
  continue reading
 
Elizabeth Glazer, the founder of Vital City, joins Bradley to discuss the condition of our civic culture, what she is doing to inject big ideas into policymaking debates, and how Vital City's work can inspire New Yorkers to make the city a better place to live. This episode was taped at P&T Knitwear at 180 Orchard Street — New York City’s only free…
  continue reading
 
00:00 Introduction to Cybersecurity and Acronis 03:01 The Evolution of Acronis and Cyber Protection 06:10 Understanding Cyber Threats and Ransomware 09:04 Common Mistakes in Data Protection 11:57 The Importance of Business Continuity 15:02 The Role of Managed Service Providers 17:58 Best Practices for Cybersecurity 21:11 The Human Factor in Cyberse…
  continue reading
 
In this eye-opening episode, we sit down with Heather Benwell, Chief Marketing Officer at Challengeword, to explore one of the fastest-growing threats in cybersecurity: social engineering. From phishing to deepfakes, and the evolving complexity of human-targeted attacks, Heather shares stories, statistics, and insights that highlight just how vulne…
  continue reading
 
Your host, Doug Noll, talks with the Founder of Simple Salt, Dylan Evans. Dylan shares his journey in the security industry, emphasizing the critical role of human behavior alongside technical measures. He discusses the common misconceptions that cybersecurity is purely technical, highlighting the importance of training and developing personnel. Dy…
  continue reading
 
Helpful episodes to listen to first Episode 40 - Website and Email Filtering Episode 56 - Home Network Attacks From Within Episode 57 - How Firewalls Protect You And What You Might Be Missing Questions we answer in this episode What is a trojan horse? What are two ways an outbound firewall protects you? What is an outbound firewall's greatest frust…
  continue reading
 
Fortinet ON AIR is a video podcast series recorded live at Mobile World Congress 2025 in Barcelona, featuring expert voices from across the telecommunications ecosystem.In each episode, we dive into the evolving cybersecurity landscape—exploring how telcos and service providers can stay secure, resilient, and competitive in a fast-changing digital …
  continue reading
 
Fortinet ON AIR is a video podcast series recorded live at Mobile World Congress 2025 in Barcelona, featuring expert voices from across the telecommunications ecosystem.In each episode, we dive into the evolving cybersecurity landscape—exploring how telcos and service providers can stay secure, resilient, and competitive in a fast-changing digital …
  continue reading
 
Fortinet ON AIR is a video podcast series recorded live at Mobile World Congress 2025 in Barcelona, featuring expert voices from across the telecommunications ecosystem.In each episode, we dive into the evolving cybersecurity landscape—exploring how telcos and service providers can stay secure, resilient, and competitive in a fast-changing digital …
  continue reading
 
Fortinet ON AIR is a video podcast series recorded live at Mobile World Congress 2025 in Barcelona, featuring expert voices from across the telecommunications ecosystem.In each episode, we dive into the evolving cybersecurity landscape—exploring how telcos and service providers can stay secure, resilient, and competitive in a fast-changing digital …
  continue reading
 
Fortinet ON AIR is a video podcast series recorded live at Mobile World Congress 2025 in Barcelona, featuring expert voices from across the telecommunications ecosystem.In each episode, we dive into the evolving cybersecurity landscape—exploring how telcos and service providers can stay secure, resilient, and competitive in a fast-changing digital …
  continue reading
 
Fortinet ON AIR is a video podcast series recorded live at Mobile World Congress 2025 in Barcelona, featuring expert voices from across the telecommunications ecosystem.Hear from leaders at Accenture, NEC, Orange Cyberdefense, Cirion Technologies, and Google Cloud as they tackle the biggest challenges facing telcos—from AI-powered attacks and SecOp…
  continue reading
 
SANS Stormcast Tuesday, May 12th: Apple Patches; Unipi Technologies Scans; Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stup…
  continue reading
 
Alias Cybersecurity Jonathan Kimmitt is joined by Chad Kliewer to discuss the exciting CISO Showdown competition between Chief Information Security Officers (CISOs) at BSidesOK. They delve into the history of the showdown, how it works, and highlight significance of the championship belt. Tune in as they share insights and fun facts about this uniq…
  continue reading
 
In this episode, our Talent Delivery Consultant Rosie Larter sits down with Josh Chitwood, a seasoned Senior Sales Engineer, to explore the everything cyber resilience. Together, they dive into the global adoption of cybersecurity practices, what it really takes to build lasting resilience, and how to navigate the inevitable dips that come with inn…
  continue reading
 
Guest: Prof. Lisa Kaltenegger Professor Lisa Kaltenegger, Director of the Carl Sagan Institute at Cornell University, beams aboard to talk about her book, Alien Earths, the search for life in the cosmos, what exoplanets teach us about our home world, and her love for Star Trek.Alien Earths: The New Science of Planet Hunting in the Cosmos, by Lisa K…
  continue reading
 
12.05.25 Pt 2 - Gareth Cliff and Mash dive into the Influencer Revolution — from AI babies taking over social media to the future of content creation. Things get spicy as they debate what their “price” would be to sell their bodies. Plus, Jonathan Fine joins the conversation to unpack everything you need to know about the Finance Magnates Africa Su…
  continue reading
 
12.05.25 Pt 1 - Gareth Cliff is joined by Mash in a wild ride of revelations — from America’s sudden love for South African farmers to Mash’s own unexpected farming ambitions. Gareth digs into Joburg’s crumbling chaos and asks the real question: where’s all the money going? Plus, Dr Hanan steps in to help a self-proclaimed “illiterate” man navigate…
  continue reading
 
SANS Stormcast Monday, May 11th: Steganography Challenge; End-of-Life Routers; ASUS Driverhub; RV-Tools SEO Poisoning Steganography Challenge Didier revealed the solution to last weekend’s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums…
  continue reading
 
Turkey camp went full throttle—mud-soaked crawls, beard-dragging longbeards, and neighbors firing up blowers mid-stalk. Becky gets her first bird. Casey gets denied permission so hard he needed a Busch Light. And Will Brantley rolls in fresh off a Metallica concert and tags out in 25 minutes. This one has it all—strutters, safes, and the legend of …
  continue reading
 
In this episode of The Other Side of the Firewall podcast, hosts Ryan Williams Sr. and Shannon Tynes discuss a variety of topics ranging from personal updates and family life to their media consumption habits, including TV shows and movies. They also delve into the video game industry, sharing insights on upcoming releases and trends. Additionally,…
  continue reading
 
09.05.25 Pt 2 - Gareth Cliff is joined by international wealth coach JT Foxx for a candid conversation that bridges continents. JT shares his American perspective on what it’s like walking through South African malls, dives into his ever-growing list of high-profile connections, and unpacks why Donald Trump—love him or hate him—is one of the greate…
  continue reading
 
Questions we answer in this episode Who is Troy Hunt? How did he get phished? What are some lessons we can learn from his story? Who will we be inviting as a guest to the podcast? Episode summary Troy Hunt, a security expert, got phished. He clicked a link in an email, and entered his password into a fake website. The hackers logged into his Mailch…
  continue reading
 
SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%…
  continue reading
 
In this edition of the Wide World of Cyber podcast Patrick Gray talks to SentinelOne’s Steve Stone and Alex Stamos about how foreign adversaries are targeting security vendors, including them. From North Korean IT workers to Chinese supply chain attacks, SentinelOne and its competitors are constantly fending off sophisticated hacking campaigns. Thi…
  continue reading
 
Implementing the UK Cyber Governance Code of Practice with IASME Cyber Assurance In this episode, we discuss the crucial topic of cyber governance for business leaders. With 74% of large businesses and 70% of medium businesses in the UK experiencing a cyber breach in the past year, boards are now clearly expected to lead on cyber risk. In response,…
  continue reading
 
Your host, Doug Noll, talks with the Co-founder and CEO of LearnUpon, Brendan Noud. Brendan shares his journey from a business degree at University College Dublin and a consulting career at KPMG to founding LearnUpon, an LMS platform. He discusses the challenges of entrepreneurship, the importance of empathy and listening in leadership, and the imp…
  continue reading
 
SANS Stormcast Thursday, May 8th: Modular Malware; Sysaid Vuln; Cisco Wireless Controller Patch; Unifi Protect Camera Patch Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%…
  continue reading
 
In this episode of Breaking Badness, we sit down with John Donovan of ZEDEDA to unpack thelighter and more profound sides of cybersecurity’s biggest gatherings. From RSA’s unexpectedbaby goats and vendor booth antics to BSides San Francisco’s community-driven keynotestage, John shares personal stories, industry insights, and valuable advice on how …
  continue reading
 
In this episode of The Other Side of the Firewall podcast, Ryan Williams and Shannon Tynes discuss the latest developments in cybersecurity, focusing on Microsoft's shift to passwordless accounts and the implications for users. They explore the challenges of password management, the benefits of passkeys and biometric authentication, and the future …
  continue reading
 
In this week's episode, we ponder what to expect from Microsoft Build 2025. Is it worth traveling to Seattle for the event, that takes place May 19-22? We reflect on the possible announcements, the breakout session topics, as well as the keynotes. (00:00) - Intro and catching up. (04:56) - Show content starts. Show links - Microsoft Build 2025 - DE…
  continue reading
 
Send us a text Consulting Engineers (CEs) at networking vendors blend deep technical expertise with customer-facing skills to bridge the gap between account managers and specialized solution design. They operate as specialists who support Sales Engineers when customer requirements demand deeper technical knowledge. • CEs often join from traditional…
  continue reading
 
7.05.25 Pt 2 - Gareth and Kyle Worde unpack why Donald Trump might just be the ultimate case study in brand disruption — love him or hate him, the man changed the game. They also dig into the surprising story behind the most famous photo ever taken and what it sold for. Plus, a heated (and hilarious) debate: should men wear makeup, or is it still c…
  continue reading
 
7.05.25 Pt 1 - Gareth is joined by Kyle Worde for a deep dive into the strange ways we measure ourselves against others — from status symbols to social media scorecards — and how that comparison becomes its own kind of currency. They also tackle a tough but eye-opening topic: why simply giving homeless people a house doesn’t always mean they can re…
  continue reading
 
Send us a text In this episode of The Internet Explorer’s Podcast, Jimmy finally delivers on his promise from the Sun Gazing episode and dives into the bizarre world of DNA activation through sound therapy. What starts as a reflection on a late-night moment of desperation quickly spirals into a hilarious breakdown of how pseudoscientific claims tak…
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: White House’s off-brand Israeli Signal fork logs cleartext messages with hard coded creds while getting hacked (twice). Just … Wow. Ransomware attacks on UK retailers are linked, and Marks & Spencer has it extra bad After six years dormant, a Magento eCommerce …
  continue reading
 
SANS Stormcast Wednesday, May 7th: Infostealer with Webserver; Android Update; CISA Warning Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that, in addition to implementing typical infostealer functionality, includes a web server suitable to create local phishing sites. https://isc.sans.edu/diary/Python%…
  continue reading
 
Loading …
Listen to this show while you explore
Play