A free podcast about cybersecurity, vulnerability management, and the CVE Program.
…
continue reading
Cve Podcasts
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Welcome to Time for a Reset, the marketing podcast that gets behind the thinking of the industry’s sharpest leaders who are shaping the world’s most iconic brands. We ask the big questions: What does it take to drive real change? How do you stay ahead when the ground keeps shifting? From changing consumer expectations to marketing’s growing role on the board agenda, each episode digs into what matters now and what’s coming next. Expect smart conversations, practical takeaways, and a fresh pe ...
…
continue reading
Shannon N. Green, former director and senior fellow of the CSIS Human Rights Initiative and former managing director of CSIS’s Commission on Countering Violent Extremism (CVE), explored the violent extremism phenomenon – its causes, manifestations, and responses. In each episode, Shannon sat down with a different expert or practitioner, building a mosaic of voices and perspectives on CVE from all around the world.
…
continue reading
Exploring some of the key concepts in preventative counterterrorism work, drawing on global experience and RUSI research. Over the past few years, RUSI's Terrorism and Conflict group has conducted multiple and extensive reviews of global preventing and countering violent extremism (P/CVE) programmes, identifying what can work and what has not worked in these efforts. The research covered hundreds of programmes addressing different ideological motivations, with a particular focus on Islamist ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Your Home for Linux-related fun and learning!
…
continue reading
A team of five employees of the Association of Space, Defense, Refuge, and Education were sent to the aquatic Planet 15-DS3. A research mission, a planet full of sea creatures, and one question. Is this planet a possible astrological eden, or is there a reason for the previous mission failure?
…
continue reading
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
…
continue reading
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
…
continue reading
The Commission on Rehabilitation Counselor Certification presents "Inside Rehabilitation Counseling," a series of conversations with the professionals, educators, and thought-leaders working in the specialized field of rehabilitation counseling.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Coffee, Chaos & ProdSec is where cybersecurity meets caffeine-fueled chaos. Hosts Kurt (security architect and chaos tamer) and Cameron (ProdSec wrangler and DevSecOps junkie) dive into hacking, AppSec, supply chain failures, AI surprises, and the everyday madness of defending modern systems. With humor, sharp insight, real breach breakdowns, bad password confessions, and a few questionable impressions, they explore the messy reality of security and how teams survive it. New episodes Every W ...
…
continue reading
Calling all .NET developers! Dive into the heart of modern .NET technology with us. We are the go-to podcast for all .NET developers worldwide; providing an audio toolbox for developers who use modern .NET. Our show, previously known as The .NET Core Podcast, is all about keeping you up-to-date and empowered in this ever-evolving field. Tune in for engaging interviews with industry leaders, as we discuss the topics every .NET developer should be well-versed in. From cross-platform wonders to ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
You can grab your weekly technology without having to geek out on TechTime with Nathan Mumm. The Technology Show for your commute, exercise, or drinking fun. Listen to the best 60 minutes of Technology News and Information in a segmented format while sipping a little Whiskey on the side. We cover Top Tech Stories with a funny spin, with information that will make you go Hmmm. Listen once a week and stay up-to-date on technology in the world without getting into the weeds. This Broadcast styl ...
…
continue reading
A deeper dive into Prelude Operator platform and all things computer security
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security
…
continue reading
Dive into the heart of cybersecurity with "The Other Side of the Firewall & Ask A CISSP" podcasts, where the spotlight shines on diversity and excellence within the tech realm. As the digital world expands, the voices shaping its future become ever more crucial. Our mission? To celebrate and amplify the stories of People of Color who've not just climbed the ladder but shattered ceilings along the way to senior and C-suite echelons. Join us on a journey beyond the conventional, as we engage w ...
…
continue reading
Join hosts Eddie Knight and Josh Kelley as they look at the latest trends and current events in the industry! Whether you're new to DevOps or a veteran of the industry, this podcast will help you continuously improve your DevOps game.
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
A podcast about security, human rights, conflict, and law, with an Australian and Southeast Asian focus.
…
continue reading
Flash cybersecurity advisories from the US Government. These alerts provide timely technical and operational information, indicators of compromise, and mitigations for current major security threats, vulnerabilities, and exploits. These alerts have been edited and adapted for audio by N2K Networks as a public service.
…
continue reading
The FINOS Open Source in Finance Podcast celebrates open source projects and interesting topics at the cross section of financial services and open source. So far, our industry experts have discussed practical applications of and their real-world experiences with a range of open source projects including desktop interoperability, low code platforms, synthetic data, and data modeling. They’ve also discussed best practices for inner source, common myths about open source and why commercial com ...
…
continue reading
Eagle is an L.A. based hip-hop artist. On Secret Skin, he and his guests examine what’s really going on behind the face that hip-hop artists put on for the public. The in-jokes. The heavy stuff. The tour stories. The day-to-day struggles and absurdities of being a working musician. The Secret Skin.
…
continue reading
Hosted by two brothers - Adam a comedian, Thomas an economist - this show will help you understand the world of money without the need for a calculator or dictionary. Easy to understand and jargon free. Adam will ask and Thomas will answer all those money questions you've pondered but never knew who to ask. From interest rates to GDP, trade wars to house prices, the world of economics has an impact on so many aspects of our everyday lives. This podcast will break it all down as Adam and "rea ...
…
continue reading
1
SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on. https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Comma…
…
continue reading
1
SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation (#)
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerab…
…
continue reading
1
Ep 15 - Part 1 - Get Comfortable Being Vulnerable: The Chaos Behind Every CVE and Every Risk
1:11:58
1:11:58
Play later
Play later
Lists
Like
Liked
1:11:58🎙️ Coffee, Chaos and ProdSec - Ep 15 Vulnerabilities are piling up faster than teams can read the reports, and vulnerability management is buckling under the weight. So this week, Kurt and Cameron grab their mugs and dig into why modern VM feels impossible, why severity scores mislead everyone, and how reachability and exploitability matter far mor…
…
continue reading
Character introduction: 10-CVE. The Orpheus isn't the first ship to explore 15-DS3. Android 10-CVE discusses their findings on this aquatic planet. The character introduction transcript can be found here! In this character introduction you heard the voice of Luka Miller as 10-CVE. This character introduction was edited and sound designed by Landon …
…
continue reading
1
277: TechTime Radio: "THANKS" Giving Episode with Dubai’s Flying Taxis, Australia’s Teen Social Ban, CVE vs Hackers, Nike’s Robo Shoes, Unsafe AI Toys, Black Friday Deals, with Guest Nick Espinosa | Air ...
55:31
55:31
Play later
Play later
Lists
Like
Liked
55:31What happens when a holiday “thankful” theme clashes with cutting-edge technology, bold policies, and some notable missteps? We begin with Dubai’s high-profile plan to introduce flying taxis and ask tough questions: can eVTOLs truly reduce travel time after accounting for boarding, airspace management, and vertiport capacity—or will they just be ex…
…
continue reading
Show Notes Hey everyone, and welcome back to The Modern .NET Show; the premier .NET podcast, focusing entirely on the knowledge, tools, and frameworks that all .NET developers should have in their toolbox. I'm your host Jamie Taylor, bringing you conversations with the brightest minds in the .NET ecosystem. This episode is a super important, top-of…
…
continue reading
1
SANS Stormcast Tuesday, December 16th, 2025: Current React2Shell Example; SAML woes; MSMQ issues after patch;
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45More React2Shell Exploits CVE-2025-55182 Our honeypots continue to detect numerous React2Shell variants. Some using slightly modified exploits https://isc.sans.edu/diary/More%20React2Shell%20Exploits%20CVE-2025-55182/32572 The Fragile Lock: Novel Bypasses For SAML Authentication SAML is a tricky protocol to implement correctly, in particular if dif…
…
continue reading
1
SANS Stormcast Tuesday, December 16th, 2025: Current React2Shell Example; SAML woes; MSMQ issues after patch; (#)
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46SANS Stormcast Tuesday, December 16th, 2025: Current React2Shell Example; SAML woes; MSMQ issues after patch; More React2Shell Exploits CVE-2025-55182 Our honeypots continue to detect numerous React2Shell variants. Some using slightly modified exploits https://isc.sans.edu/diary/More%20React2Shell%20Exploits%20CVE-2025-55182/32572 The Fragile Lock:…
…
continue reading
1
SANS Stormcast Monday, December 15th, 2025: DLL Entry Points; ClickFix and Finger; Apple Patches
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45Abusing DLLs EntryPoint for the Fun DLLs will not just execute code when some of their functions are called, but also as they are loaded. https://isc.sans.edu/diary/Abusing%20DLLs%20EntryPoint%20for%20the%20Fun/32562 Apple Patches Everything: December 2025 Edition Apple released patches for all of its operating systems, fixing two already exploited…
…
continue reading
1
SANS Stormcast Monday, December 15th, 2025: DLL Entry Points; ClickFix and Finger; Apple Patches (#)
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45SANS Stormcast Monday, December 15th, 2025: DLL Entry Points; ClickFix and Finger; Apple Patches Abusing DLLs EntryPoint for the Fun DLLs will not just execute code when some of their functions are called, but also as they are loaded. https://isc.sans.edu/diary/Abusing%20DLLs%20EntryPoint%20for%20the%20Fun/32562 Apple Patches Everything: December 2…
…
continue reading
1
Unpacking Visual Studio 2026: New Features, Bug Fixes, and What's Coming Next with Mads Kristensen
1:04:20
1:04:20
Play later
Play later
Lists
Like
Liked
1:04:20Strategic Technology Consultation Services This episode of The Modern .NET Show is supported, in part, by RJJ Software's Strategic Technology Consultation Services. If you're an SME (Small to Medium Enterprise) leader wondering why your technology investments aren't delivering, or you're facing critical decisions about AI, modernization, or team pr…
…
continue reading
1
SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack
6:56
6:56
Play later
Play later
Lists
Like
Liked
6:56Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 Mystery Google Chrome 0-Day Vulnerability Google released an update for Google Chrome fixing a vulne…
…
continue reading
1
SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack (#)
6:56
6:56
Play later
Play later
Lists
Like
Liked
6:56SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 "My…
…
continue reading
1
SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches.
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution in ColdFusion, as well as the code execution issue in Acrobat, will very likely see exploits soon. h…
…
continue reading
1
SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches. (#)
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches. Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution…
…
continue reading
1
278: TechTime Radio: Identity Rental Schemes, AI Book Controversies, Teen Social Bans, Chatbot Safety Failures, Streaming Deals, "SAY WHAT" Oddball Tech Stories, and Our Whiskey Competition Crowns a Winner ...
55:39
55:39
Play later
Play later
Lists
Like
Liked
55:39This week on TechTime Radio, a state-backed cyber scheme hiding in plain sight. That’s where we start: identity rental, deepfaked interviews, and remote tooling that let North Korean operators slip into real jobs at real companies. We unpack how recruiters lure engineers, what data they demand, and the quiet ways compromised devices become corporat…
…
continue reading
1
The Hidden Backbone of the Internet: Subsea Cable Security with Alex Botting
37:25
37:25
Play later
Play later
Lists
Like
Liked
37:25Undersea cables quietly carry almost all global internet traffic yet rarely feature in security debates. This episode explains how subsea infrastructure underpins the global economy, data flows, and modern military operations while facing frequent "accidental" disruptions and growing geopolitical risk. Listeners hear why chokepoints, island depende…
…
continue reading
1
PP090: Why Native Controls Aren’t Enough to Protect Your Cloud Workspaces (Sponsored)
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37Cloud-based workspaces such as Google Workspace are often the backbone of an organization. But they also face threats from spam and phishing, account takeovers, and illicit access to sensitive documents and files. On today’s Packet Protector we talk with sponsor Material Security about how it brings additional layers of protection to Google Workspa…
…
continue reading
1
SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as undocumented may actually be documented in the underlying hardware description. https://www.tomshardware.com/tech-industry/cyber-security/researcher-finds-undocumented-microphone-and-major-security-flaws-in…
…
continue reading
1
SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory (#)
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as "undocumented" may actually be documented in the underlying hardware description. https://www.to…
…
continue reading
1
95 - Coloring the World with Creativity and Innovation: Victoria Lozano, CMO at Crayola
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49In this episode of Time for a Reset: Insights from Global Brand Marketers, brought to you by Overline, host Nick King speaks with Victoria Lozano, CMO of Crayola, about what it truly takes for legacy brands to stay culturally relevant. Victoria reveals how Crayola balances deep brand purpose with constant product innovation, thereby building an eco…
…
continue reading
1
SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34AutoIT3 Compiled Scripts Dropping Shellcodes Malicious AutoIT3 scripts are usign the FileInstall function to include additional scripts at compile time that are dropped as temporary files during execution. https://isc.sans.edu/diary/AutoIT3%20Compiled%20Scripts%20Dropping%20Shellcodes/32542 React2Shell Update The race is on to patch vulnerable syst…
…
continue reading
1
SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln (#)
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln AutoIT3 Compiled Scripts Dropping Shellcodes Malicious AutoIT3 scripts are usign the "FileInstall" function to include additional scripts at compile time that are dropped as temporary files during execution. https://isc.sans.edu/diary/AutoIT3%20Compiled%20…
…
continue reading
1
253 - Shadow IT and SaaS Sprawl - The Hidden Security Risk in Your Organization
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01Enjoying the content? Let us know your feedback! Imagine discovering that your organization is running nearly ten times more applications than your IT team knows about. Imagine learning that two out of every three cloud tools being used by your employees were never approved, never vetted for security, and are completely invisible to your monitoring…
…
continue reading
Character introduction: ** ****** ***** .-- . / .- .-. . / ..- -. -.. . .-. / .- - - .- -.-. -.- .-.-.- / .. / .-. . .--. . .- - --..-- / .-- . / .- .-. . / ..- -. -.. . .-. / .- - - .- -.-. -.- .-.-.- The character introduction transcript can be found here! In this character introduction you heard the voice of Jamie Stapleton as ** ****** ***** Th…
…
continue reading
1
SANS Stormcast Friday, December 5th, 2025: Compromised Govt System; React Vuln Update; Array Networks VPN Attacks
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Government%3F%20%5BGuest%20Diary%5D/32536 React Update Working exploits for the React vulnerability patched yesterday are n…
…
continue reading
1
SANS Stormcast Friday, December 5th, 2025: Compromised Govt System; React Vuln Update; Array Networks VPN Attacks (#)
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35SANS Stormcast Friday, December 5th, 2025: Compromised Govt System; React Vuln Update; Array Networks VPN Attacks Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Governmen…
…
continue reading
1
SANS Stormcast Thursday, December 4th, 2025: CDN Headers; React Vulnerabiity; PickleScan Patch
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React server components. Exploitation is likely imminent. https://react.dev/blog/2025/12/03/critical-se…
…
continue reading
1
SANS Stormcast Thursday, December 4th, 2025: CDN Headers; React Vulnerabiity; PickleScan Patch (#)
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45SANS Stormcast Thursday, December 4th, 2025: CDN Headers; React Vulnerabiity; PickleScan Patch Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React se…
…
continue reading
1
Ep 14 - DevSecOps Without the Buzzwords - What It Really Takes to Build Secure Software
1:09:57
1:09:57
Play later
Play later
Lists
Like
Liked
1:09:57🎙️ Coffee, Chaos and ProdSec - Ep 14 DevSecOps gets thrown around in cybersecurity more than any other term, but almost no one agrees on what it actually means. So this week, Kurt and Cameron pour fresh mugs and unpack the real practices behind modern Application Security, Product Security, DevSecOps, and Software Supply Chain Security without the …
…
continue reading
1
SANS Stormcast Wednesday, December 3rd, 2025: SmartTube Compromise; NPM Malware Prompt Injection Attempt; Angular XSS Vulnerability
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-3670629826 https://github.com/yuliskov/SmartTube/releases/tag/notification Two Years, 17K Downloads: The NPM Malware That Tried to Gas…
…
continue reading