Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork
 
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
  continue reading
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Artwork

1
Exploit

Exploit Podcast

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
A show about hacking the system, hosted by Patrick Tomasso and Gabi Pirraglia. Patrick is a content creator and Gabi is digital strategist, together they pull apart the internet and social media to reveal the hidden creative formulas for success.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
Tech Against Terrorism

Tech Against Terrorism

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Want to learn more about how terrorists and violent extremists are using the internet to communicate and share propaganda? Perhaps you’re interested in why terrorists share their manifestos online and livestream their attacks? The Tech Against Terrorism podcast is a deep dive into the evolving use of the internet by terrorists and violent extremists, how this relates to real world harms, and what can be done to support the tech sector to disrupt this threat. Join us as we speak to the world’ ...
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
Day[0]

dayzerosec

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.
  continue reading
 
[DAILY] Crypto News, AI News, and maybe stock market News shortly. These trends are taking off, You can get in early to profit! Let’s chill and get rich together. 😉
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Senior Intelligence Analysts Chris Morgan and Kim Bromley bring together over 30 years of experience in threat intelligence across government, military, and telecommunications. Along with their guests, they provide practical perspectives on t ...
  continue reading
 
Artwork

1
Technado

ACI Learning

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The Technado crew covers a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
  continue reading
 
Artwork

1
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
  continue reading
 
Artwork
 
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
  continue reading
 
Artwork

1
Hacker Hacks

Arun kumar Krishna

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Welcome to ’Hacker Hacks,’ the podcast where we dive deep into the mysterious world of cybersecurity. Each episode unveils the tactics, techniques, and procedures used by both ethical and malicious hackers, empowering you with knowledge to defend your digital realm. Whether you’re a seasoned IT professional, an emerging tech enthusiast, or just curious about the digital shadows, ’Hacker Hacks’ is your ultimate guide to understanding the tricks of the trade and the tools to thwart them. Subsc ...
  continue reading
 
Artwork

1
The Breach Report

Robert Wortmann, Rense Buijen

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Artwork

1
The Mobile Security Show

AT&T Tech Channel

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
  continue reading
 
Artwork
 
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
  continue reading
 
Artwork
 
The Cyber Ways Podcast brings academic cyber security research into the "real world." We interview top academic researchers to find how their research can be put into practice by cyber security professionals. Our focus is on behavioral aspects of cyber security. Occasionally, we touch on related topics, such as information privacy and surveillance.Each episode discusses one published, peer-reviewed article to reveal the practical implications of the research. Your hosts, Tom Stafford and Cra ...
  continue reading
 
Artwork

1
Trust Your Voice

Sylvie Légère

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
As a civically engaged entrepreneur and mom, I understand the challenges of advocating for yourself and others while attempting to balance your personal and professional demands. I had to develop a personal system of success in every area of my life. Now I want to help you build your unique system and truly trust your voice, even if it shakes. That’s why this week I am launching my new podcast entitled “Trust Your Voice”, based on my new book, “Trust Your Voice”, A Roadmap to Focus and Influ ...
  continue reading
 
I'll talk about everything from politics to entertainment and philosophy. I'm also a part-time entertainment writer and working-class from the UP of Michigan, so that might come up occasionally. Oh, and I make weird experimental music and sometimes host a college radio show.
  continue reading
 
Artwork

1
"World of DaaS"

Word of DaaS with Auren Hoffman

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
deep dive into Data-as-a-Service (DaaS) businesses. World of DaaS is a podcast for data enthusiasts, by data enthusiasts, where Auren Hoffman talks to business and technology leaders about all things data - building it, acquiring it, analyzing it, and everything in between.
  continue reading
 
Artwork

1
The CyberCast

Andrew Morgan

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
  continue reading
 
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Japan 2004 was held October 14-15 in Tokyo at the at the Tokyo International Exchange Center. Two days, two tracks. Raisuke Miyawaki was the keynote speaker.Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-asia-04/bh-jp-04-index.html Black ...
  continue reading
 
Loading …
show series
 
Welcome to Cypher Tech Hacks, the podcast where host Alex Cipher takes you inside the most shocking, real-world hacks in digital history. In today’s episode, we uncover The CommBox Classroom Exploit—a ransomware attack that started with smartboards in schools. Attackers used unsecured CommBox devices to infiltrate school networks, encrypt critical …
  continue reading
 
🔴 Get 20% Off Every Spot Trading Fee on Bitget: https://lihi2.com/sWxzC (Limited Offer) (Bitget is the 6th largest exchange in the world) 🔴 [Follow Me] Stay updated on the latest AI, tech, and crypto trends in just 10 mins daily! Discover the newest money-making opportunities! ------ These articles discuss important events in global financial marke…
  continue reading
 
Welcome to AI Weekly Insights — your go-to podcast for the latest breakthroughs in artificial intelligence and machine learning! This episode covers the U.S. passing the landmark Take It Down Act to criminalize non-consensual deepfake content, Google’s powerful AI Mode in Search reshaping online queries, Amazon Web Services’ release of its most adv…
  continue reading
 
London Marathon Fundraising: https://www.justgiving.com/page/rees-london-marathon-2025 Latest Main Channel Release (OCLP On 2008 Intel Mac Pro): https://youtu.be/0b_A7xhdBFE In this episode I talk about the new MiSTer MultiSystem 2, ARM's 40th anniversary, the Japanese Game Preservation Society, Polygon's sale, GTA VI delay & more! Listen on your f…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest DJ Schleen, Head of Security, Boats Group Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ranso…
  continue reading
 
On April 25, 2025, Nova Scotia Power, the province’s primary electricity provider, confirmed what many suspected: a cyber incident involving unauthorized access had compromised customer data. But what looked at first like an isolated disruption is, in reality, a single node in a much broader—and much more dangerous—global pattern. In this episode, …
  continue reading
 
In a rare move, SentinelOne has publicly confirmed that it is under persistent attack from nation-state threat actors and ransomware gangs. This episode breaks down their recent report detailing how these adversaries—some believed to be backed by China and North Korea—are targeting SentinelOne to gain insight into how thousands of environments are …
  continue reading
 
In this episode, we unpack the evolving landscape of Product Lifecycle Management (PLM) and why it's become a strategic cornerstone in modern IT environments. From conception to retirement, managing a product’s lifecycle is now about more than just operations—it's about security, compliance, innovation, and cost. We explore the critical milestones …
  continue reading
 
UK retailer Co-Op suffers cyberattack FBI shares list of 42,000 LabHost phishing domains NSO group looking at hefty damages in WhatsApp case Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. Thr…
  continue reading
 
Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
  continue reading
 
In this episode of Automate IT, Jeremy Maldonado dives into the world of data-driven endpoint management—breaking down what it means to go “beyond the spreadsheets.” He explores how visibility, intelligent reporting, asset intelligence, and risk scoring can transform how IT teams manage and secure their environments. Drawing from his own journey in…
  continue reading
 
🔴 Get 20% Off Every Spot Trading Fee on Bitget: https://lihi2.com/sWxzC (Limited Offer) (Bitget is the 6th largest exchange in the world) 🔴 [Follow Me] Stay updated on the latest AI, tech, and crypto trends in just 10 mins daily! Discover the newest money-making opportunities! ------ These reports summarize important news affecting the cryptocurren…
  continue reading
 
​In a move that has sparked controversy, the United States and Ukraine have signed a bilateral agreement granting the U.S. access to Ukraine's critical mineral resources. Also, another scandalous Trump family member and how Reagan's biggest scandal verifies anarchist critiques of state power and violence.…
  continue reading
 
"If you envision a world where what would be the most ideal way to make access management IAM decisions, to enable people to access internal things, you'd want to do a few things,” reflects Bobby DeSimone, Founder and CEO at Pomerium. In this episode of The Security Strategies Podcast, host Alejandro Leal, cybersecurity expert and senior analyst at…
  continue reading
 
Alleged ‘Scattered Spider’ member extradited to U.S. Experts see little progress after major Chinese telecom hack Polish police take down impersonation scammers Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks…
  continue reading
 
🔴 Get 20% Off Every Spot Trading Fee on Bitget: https://lihi2.com/sWxzC (Limited Offer) 🔴 [Follow] to keep up with daily big news! ------ These articles provide an overview of global technology and AI developments as of May 1, 2025. They highlight the advancement of AI agents designed for complex tasks. These agents also raise concerns about privac…
  continue reading
 
Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
  continue reading
 
LayerX just raised another $11 million — and it’s not to build another antivirus. With $45 million in total funding, the company is betting that your browser is the most vulnerable—and most overlooked—part of your cybersecurity stack. In this episode, we explore how LayerX turns everyday browsers like Chrome and Firefox into intelligent defense age…
  continue reading
 
Send us a text In Part 1 of this two-part MLSecOps Podcast, Principal Security Consultant Gavin Klondike joins Dan and Marcello to break down the real threats facing AI systems today. From prompt injection misconceptions to indirect exfiltration via markdown and the failures of ML Ops security practices, Gavin unpacks what the industry gets wrong—a…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss: ReliaQuest's Discovery of Critical SAP NetWeaver Vulnerability AI Upgrade for Darcula Phishing Kit DragonForce's New Cartel Business Model Maximum Severity Commvault flaw Kim Bromley: Senior Cyber Threa…
  continue reading
 
In this episode, we dive into the story of Pistachio, the Norwegian cybersecurity startup that just raised $7 million in new funding—bringing its total to $10.5 million. Pistachio isn’t building another firewall or antivirus tool; it’s targeting the weakest link in most security systems: people. With AI-powered phishing attacks becoming increasingl…
  continue reading
 
Takeaways #ExposureManagement involves assessing multiple factors, not just single scans. Organisations must optimise their remediation capacity due to limited resources. Visibility is crucial, but finding the most important exposure is essential. #TraditionalVulnerability management programs are becoming ineffective. Exploitability is the key crit…
  continue reading
 
🔴 Get 20% Off Every Spot Trading Fee on Bitget: https://lihi2.com/sWxzC (Limited Offer) 🔴 [Follow] to keep up with daily big news! ------ These reports summarize key market developments impacting both traditional US stock and crypto markets at the end of April 2025. News highlights include the US economy's contraction and associated stock market de…
  continue reading
 
In this episode of Breaking Badness, the crew investigates two escalating threats in the cybercrime ecosystem: the cleverly named phishing-as-a-service platform Morphing Meerkat, and the bulletproof hosting provider Proton66, a favorite among amateur cybercriminals.First, they dig into how Morphing Meerkat uses DNS-over-HTTPS (DoH) and clever phish…
  continue reading
 
In this episode, we dive deep into AirBorne — a critical set of vulnerabilities in Apple’s AirPlay protocol and SDK, recently uncovered by security researchers at Oligo. These flaws enable zero-click, wormable remote code execution (RCE) attacks across iPhones, Macs, Apple TVs, CarPlay systems, and millions of third-party devices. Even more alarmin…
  continue reading
 
Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi Google tracked 75 zero days exploited in the wild in 2024 France ties Russian APT28 hackers to 12 cyberattacks on French orgs Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect b…
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: British retail stalwart Marks & Spencer gets cybered South Korean telco sets out to replace all its subscriber SIMs after (we assume) it lost the keymat It’s a good exploit week! Bugs in Apple Airplay, SAP webservers, Erlang SSH and CommVault backups Juice jack…
  continue reading
 
Read CYFIRMA’s report on the Hannibal Stealer, a rebranded variant of SHARP and TX Stealers, which has re-emerged with expanded data exfiltration capabilities and an updated command-and-control infrastructure. Hannibal Stealer is built in C# on the .NET framework. It targets a wide range of data sources, including browsers, cryptocurrency wallets, …
  continue reading
 
🔴 Get 20% Off Every Spot Trading Fee on Bitget: https://lihi2.com/sWxzC (Limited Offer) 🔴 [Follow] to keep up with daily big news! ------ These articles cover the latest tech industry updates globally as of April 30, 2025. They highlight developments in key areas. Significant advancements are occurring in AI models. Examples include Alibaba's launc…
  continue reading
 
More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
  continue reading
 
The bots have taken over—and they’re not just crawling your website. In this episode, we dig into the alarming reality that automated bots now generate over half of all internet traffic. Armed with artificial intelligence and cloaked in residential proxies, these bots are evolving beyond simple scripts into highly evasive, persistent threats target…
  continue reading
 
In this episode, we investigate the massive data breach at VeriSource Services, Inc. (VSI), a Houston-based HR outsourcing and employee benefits administrator. Initially reported as affecting fewer than 2,000 individuals, the breach has now ballooned to a confirmed 4 million affected people. We trace the timeline from the initial detection of suspi…
  continue reading
 
🔴 Get 20% Off Every Spot Trading Fee on Bitget: https://lihi2.com/sWxzC(Limited Offer) 🔴 [Follow] to keep up with daily big news! ------ U.S. stock market performance was mixed due to company earnings reports and uncertainty about car tariffs. The White House plans to ease some car tariffs. However, General Motors (GM) delayed its financial outlook…
  continue reading
 
Three actively exploited vulnerabilities—CVE-2025-42599 (Qualitia Active! mail), CVE-2025-3928 (Commvault Web Server), and CVE-2025-1976 (Broadcom Brocade Fabric OS)—have been added to CISA’s KEV catalog. The Qualitia flaw is a remote stack-based buffer overflow (CVSS 9.8) allowing code execution without authentication. Commvault's vulnerability pe…
  continue reading
 
Ian and Aaron are joined by Taylor Otwell to discuss the Mostly Technical Party at Laracon, what exactly Taylor does on a day-to-day basis, how they all use AI, and so much more. Sponsored by Bento, WorkOS, Native PHP for Mobile, and Laracon US 2025 Interested in sponsoring Mostly Technical? Head to https://mostlytechnical.com/sponsor to learn more…
  continue reading
 
Brian O'Kelley is the co-founder and former CEO of AppNexus, which built core infrastructure for programmatic advertising and was acquired by AT&T for $1.6 billion in 2018. He's now the co-founder and CEO of Scope3, a company working to reduce the carbon footprint in digital advertising. In this episode of World of DaaS, Brian and Auren discuss: Th…
  continue reading
 
Spring is in the air, and it’s time to give your IT environment the deep clean it deserves! In this episode of Hands-On IT, host Landon Miles shares nine essential spring cleaning tips to help IT pros declutter, optimize, and future-proof their systems. From cleaning workspaces and dusting off hardware to reviewing patch policies, auditing backups,…
  continue reading
 
Uyghur Language Software Hijacked to Deliver Malware Cloudflare sees a big jump in DDoS attacks 4chan back online Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a d…
  continue reading
 
A New Breed of Python-Based RATs is Abusing Discord for C2 The CYFIRMA research team has investigated an emerging class of Python malware that is turning popular platforms into weaponized control panels. One recent variant showcases just how accessible and disruptive these tools have become. This lightweight Remote Access Trojan (RAT) uses Discord …
  continue reading
 
Loading …
Listen to this show while you explore
Play