Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cyber Hacker Podcast

show episodes
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork

1
The Rogue Ghost

The Affinity Web

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Dive into the thrilling world of the Rogue Ghost Podcast, where treasure hunts and cryptic clues pave the way through the mystical AffinityVerse. Join the enigmatic Enchanter, the Rogue Ghost, and the cunning cyber hacker, Runeweaver, as they race against time to unearth hidden puzzle boxes infused with ancient magic. As the series unfolds, they forge new alliances and confront new enemies while navigating the perilous traps set by the sinister Cerberus Syndicate. This serialized adventure i ...
  continue reading
 
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Welcome to The Monica Talks Cyber Podcast Experience: The fastest, easiest and an engaging way to build and grow your career and business in artificial intelligence, leadership and cybersecurity. Monica Talks Cyber is a technology, career and business podcast and an engaging platform for real stories, discussions and opinions from renowned global experts in technology, leadership and cybersecurity. The podcast show is hosted by Monica Verma, Hacker, CISO, Keynote Speaker, Founder & CEO, Mult ...
  continue reading
 
Artwork

1
Darnley's Cyber Café

Darnley's Cyber Café

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
  continue reading
 
Artwork
 
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
  continue reading
 
Artwork

1
Click Here

Recorded Future News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
  continue reading
 
Artwork

1
Unmasked

Assura, Inc.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A bi-monthly show focusing on cybersecurity, hacker news with a lighter side. Unmasked is a look behind the cyber professionals and will spotlight teammates, community advocators and businesses to give insight to how cybersecurity affects everyone. Brought to you by Assura. Where the superheroes of cybersecurity provide a clearer understanding of the threats we face in our digital world. With Host: Paul Blacker Web: https://www.assurainc.com/
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
  continue reading
 
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
  continue reading
 
Artwork
 
A short and to the point podcast about hacking and cyber security. A weekly podcast that give you best information and knowledge about cyber security. And helps you to save your time. Support this podcast: https://podcasters.spotify.com/pod/show/hacker-life/support
  continue reading
 
True crime meets cybercrime. Discover the people behind the keyboard. From Ransomware-as-a-Service (RaaS) gangs to global financial crime syndicates, the rise of sophisticated cyber threats is reshaping the world. These aren’t lone hackers — they’re organized groups running multi-million dollar operations in the shadows. In the Masked Actors podcast, cyber threat expert and former soldier turned hacker Gary Ruddell joins forces with Nick Palmer, a seasoned financial crime fighter, to investi ...
  continue reading
 
Artwork

1
Security Explained

Chris Grayson, Drew Porter, Logan Lamb

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Security Explained, where we strive to make the complex realm of cyber security better understood by everyone. Join our three hackers / hosts Christopher Grayson, Drew Porter, and Logan Lamb for approachable conversation and a few laughs on the world of hackers, how to think about privacy and security in today's rapidly changing world, and how to keep yourself and your loved ones safe.
  continue reading
 
Artwork

1
H4unt3d Hacker

H4unt3d Hacker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
The H4unt3d Hacker podcast is an idea that came to be from a conversation over a glass of bourbon. We bring you REAL talk about cybersecurity. Want to know how hackers see the world and events? Then tune in and go on a trip with the H4unt3d Hackers in their hoppin H4unt3d house. Mike Jones "H4unt3d" Mike is a former hacktivist, red teamer, SIGINT operator and intelligence analyst. Mike left the world of illegal hacking to help businesses and individuals learn how and why they are attacked an ...
  continue reading
 
Artwork

1
Ctrl - Alt - Secure Podcast

Red Sentry CEO Valentina Flores

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Ctrl-Alt-Secure podcast, your guide to navigating the ever-changing landscape of cybersecurity. Join us as we delve into the latest trends, threats, and innovations shaping the infosec space.
  continue reading
 
Artwork
 
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
  continue reading
 
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
  continue reading
 
Artwork

1
IoT Security Podcast

Phosphorus Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast What is IoT Security Podcast? The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join our host, Phil ...
  continue reading
 
Artwork

1
Razorwire Cyber Security

Razorthorn Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
  continue reading
 
Welcome to One Step Beyond Cyber, the ultimate IT and cybersecurity podcast that's sure to keep you on the edge of your seat! Whether you're a tech guru or a total newbie, our hosts Scott Kreisberg, and Tim Derrickson will make sure you're entertained and educated every step of the way. As technology advances, it can be challenging to keep up with the latest trends and developments. Don’t worry, our hosts are here to help! They will discuss real-world IT-related problems and solutions, as we ...
  continue reading
 
Artwork
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
Colors of InfoSec Podcast

Asif Ahmad & Christina Morillo

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Do you want to "break-in" to infosec/tech but have no idea where to start? Are you tired of all the advice with little to no direction? Join Asif Ahmad and Christina Morillo as they demystify what it means to navigate a career in information security and enterprise technology, as people of color. If you've been looking for practical advice, tips, and lessons learned, this is the podcast for you. Twitter: @colorsofinfosec
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
What sets *Build Your Empire Podcast* apart is the focus on practical wisdom. Every episode begins with a “Weekly Stoic Quote” to set the mindset for the journey ahead, and guests share actionable advice both in their field of expertise and for life in general. Whether you’re listening to a well known sports figure or another empire builder, we share strategies for overcoming challenges, discussions on the importance of mental and physical health, and the lessons learned here are meant to re ...
  continue reading
 
Welcome to The JMOR Tech Talk Show, your weekly gateway to the exciting universe of technology. Every Friday evening, we take a deep dive into the captivating realm of tech, demystifying the latest gadgets and exploring the ’whys’ and ’hows’ of our digital age. I’m your host, John C. Morley, a seasoned entrepreneur, engineer, and dedicated content creator. In each episode, we’ll be joined by a diverse lineup of guests, including authors, celebrities, and visionary thought leaders, all eager ...
  continue reading
 
Artwork

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
  continue reading
 
Artwork

1
Cyber Humanity

Immersive Labs

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
  continue reading
 
Artwork

1
CyberSpeaksLIVE

CyberSpeaksLIVE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
CyberSpeaksLIVE is an InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeakslive.
  continue reading
 
Artwork
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Artwork

1
Threat Vector by Palo Alto Networks

Palo Alto Networks and N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
  continue reading
 
Tripwire’s cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire’s VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
  continue reading
 
The Cyber Sentinel Podcast with host Alan Adcock CEO, Automated Solutions Consulting Group, Inc. Alan founded ASC Group as a technology services provider for the small-to-midsize business community. Over time, they have evolved to specialize in data reliability and security for schools, medical practices, and remote workforces. Their clients can rely on their infrastructure to provide business continuity and rely on his team of network experts to uphold ethical business practices and standar ...
  continue reading
 
Loading …
show series
 
The source, an audio transcript, explores listener engagement with a podcast focusing on cyber security, privacy, and digital activism. By analyzing stream counts and episode topics from late 2019 to 2021, the hosts identify a significant surge in popularity starting in 2021. This growth was primarily driven by content related to hacking, privacy v…
  continue reading
 
🎙️ Welcome to the JMOR Tech Talk Show with your host, John C. Morley – Serial Entrepreneur, Engineer, and National Talk Show Host. Each week, I break down today’s hottest tech stories with insights, analysis, and a touch of curiosity to keep you thinking and inspired. From AI breakthroughs to global tech policy shifts, I bring the facts and the fla…
  continue reading
 
According to Bleeping Computer, hackers associated with "Scattered Spider" tactics have expanded their targeting to the aviation and transportation industries after previously attacking insurance and retail sectors. In this episode, host Amanda Glassner is joined by Heather Engel, Managing Partner at Strategic Cyber Partners, to discuss. To learn m…
  continue reading
 
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
  continue reading
 
GB Hackers has reported that a Kansas City man pleaded guilty to federal charges after admitting he hacked into the computer systems of multiple organizations in an attempt to promote his cybersecurity services. In this episode, host Amanda Glassner is joined by Heather Engel, Managing Partner at Strategic Cyber Partners, to discuss. To learn more …
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
Segment 1 - Interview with Helen Patton: Introducing the Cybersecurity Canon Did you know that there’s a hall-of-fame for cybersecurity books? Over the past decade, the Cybersecurity Canon has published reviews on dozens of cybersecurity books and established a hall of fame. Hall of fame books are defined as titles that all cybersecurity profession…
  continue reading
 
The Perils and Pleasures of Online Connection A Deep Dive into the "Romance Scams" Twitter Space: Navigating Digital Deception and Personal NarrativesOn September 3, 2022, a Twitter Space titled "Romance Scams" took place, running for over 10 hours. Hosted by Alberto Daniel Hill (@ADanielHill), with KingBurrito (@trombelise) as a co-host, the conve…
  continue reading
 
In the twitter space recording, a unique and vulnerable interaction unfolds, primarily between Alberto Daniel Hill, Rebel One, and Kim Burrito. The conversation shifts from general topics to a deeply personal "master class on seduction for men, dumb men," as Alberto humorously frames it, revealing his struggles with social interaction, particularly…
  continue reading
 
Twitter Spaces: Krypto POKER This Twitter Space recording, hosted by Alberto Daniel Hill, delves into a discussion about a project called "Kryptopoker" seeking support from members of the cybersecurity community. The conversation highlights various interactions, personal philosophies, and insights into the psychological profiles, credibility, and t…
  continue reading
 
The Digital Ghost: When Ethical Hacking Collides with Unprepared Justice The provided source details the compelling story of Alberto Daniel Hill, a highly skilled cybersecurity expert from Uruguay whose professional identity as a "gray hat" hacker—one who identifies vulnerabilities without explicit permission to prompt security improvements—led to …
  continue reading
 
The sources capture a dynamic group conversation covering a wide array of topics, beginning with a frustrating customer service experience with Capital One regarding a canceled credit card. The discussion then pivots to severe weather events, including tornadoes and snowstorms, and the specialized vehicles used for storm chasing. Participants share…
  continue reading
 
This survey report offers a comprehensive analysis of @ADanielHill's activity and ranking on X Spaces, comparing his metrics to other hosts to determine his position among them. The analysis indicates that @ADanielHill, also known as Alberto Hill, has an exceptionally high level of engagement, having hosted 1,924 X Spaces since 2021, co-hosted 207 …
  continue reading
 
This recording features an online session discussing cybersecurity in the digital age, hosted by Go54, a leading African hosting company. The primary speaker, Olu, a cyber security professional and co-founder of Cyber Security Education Initiative, offers strategies for protecting data and mitigating cyber threats across personal, business, and nat…
  continue reading
 
This report provides an exhaustive analysis of the role of Twitter (now X) and its live audio feature, Twitter Spaces, as a central platform for interaction, intelligence dissemination, and content creation within the global cybersecurity community. For years, the platform hosted a vibrant, self-organizing ecosystem known as "InfoSec Twitter," whic…
  continue reading
 
The provided document is a report focused on the intersection of Twitter and cybersecurity, specifically examining how Twitter Spaces contributes to this field. The title, "Twitter and Twitter Spaces for Cybersecurity Report.md," indicates it is likely a markdown file, suggesting it might be a technical or research-oriented document. Its purpose ap…
  continue reading
 
This comprehensive report, "Hack the Planet: A Definitive Report on the 20 Most Influential Hacker Films and TV Shows," examines the evolution of the hacker archetype in cinema and television, tracing their portrayal from curious pioneers to complex figures challenging reality. The authors evaluate each film and TV show using four key criteria: cin…
  continue reading
 
This extended transcript captures a dynamic online discussion, primarily featuring a central host and several participants. The conversation spans various topics, initially focusing on technical issues with the hosting platform as participants are repeatedly removed or experience audio problems. This leads to a playful, yet somewhat frustrated, inv…
  continue reading
 
According to Eurogamer, Candy Crush developer King, which is under the Microsoft umbrella, is reportedly replacing laid off staff with AI tools they helped to build. In this episode, hosts Paul John Spaulding, Kyle Haglund, VP, Audio Engineering at Cybercrime Magazine, and Sam White, Video Producer at Cybercrime Magazine, discuss this news, alongsi…
  continue reading
 
8th July 2008: Several DNS vendors released patches to mitigate an attack method discovered by Dan Kaminsky which could be used to cause DNS cache poisoning. Kaminsky had discovered the vulnerability 6 months prior and reported it to vendors privately so they could address it. RIP, Dan. https://x.com/todayininfosec/status/1942695691270193211 10th J…
  continue reading
 
Greg Crowley is the CISO at eSentire. In this episode, he joins host Charlie Osborne to discuss security provider acquisitions and what CISOs should consider in these situations. Next Level CISO is a Cybercrime Magazine podcast brought to you by eSentire, the Authority in Managed Detection and Response. eSentire’s mission is to hunt, investigate an…
  continue reading
 
Quantum Brilliance's quantum accelerator has been successfully installed at Fraunhofer IAF, a leading research institution in Germany. This marks the first room-temperature quantum accelerator of its kind in Europe. You can listen to all of the Quantum Minute episodes at https://QuantumMinute.com. The Quantum Minute is brought to you by Applied Qua…
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
In this episode, I address listener feedback and corrections regarding use of public Wi-Fi, MAC addresses, and aliases. I dive deep into the nuances of MAC address randomization on GrapheneOS versus Apple’s private Wi-Fi addresses, explaining why GrapheneOS offers superior privacy protection. I discuss the real threats of public Wi-Fi in 2025 (hint…
  continue reading
 
Billionaire Frank McCourt wants to buy TikTok. Not to go viral—but to rewire the web. He says 170 million users could help him turn the Internet into something less addictive… and more democratic. Is that idealism, delusion… or both? As President Trump extends the deadline on the sale of the app, we return to our discussion with Frank McCourt. Lear…
  continue reading
 
In the security news: The train is leaving the station, or is it? The hypervisor will protect you, maybe The best thing about Flippers are the clones Also, the Flipper Zero as an interrogation tool Threats are commercial and open-source Who is still down with FTP? AI bug hunters Firmware for Russian drones Merging Android and ChromOS Protecting you…
  continue reading
 
⬥GUEST⬥ Tobias Halmans, OT Incident Responder | GIAC Certified Incident Handler | Automation Security Consultant at admeritia GmbH | On LinkedIn: https://www.linkedin.com/in/tobias-halmans/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Websit…
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
What separates a great CISO from a great one? In this powerhouse conversation, Ron invites friend and cybersecurity leader Gary Hayslip, CISO at SoftBank Investment Advisers, back on the mic to discuss what it takes to lead in today’s high-stakes digital world. Gary shares battle-tested insights on accountability, the evolving expectations of the C…
  continue reading
 
Join Michael Sikorski and Michael Daniel on Threat Vector for a deep dive into cybersecurity collaboration. They discuss how competing companies and governments can work together. Learn about the Cyber Threat Alliance (CTA) and its role in sharing threat intelligence. The episode explores the challenges of trust and incentives. It covers topics fro…
  continue reading
 
David Greenwood, Product at Sekoia, joins host Charlie Osborne to discuss SOC leadership in the age of AI agents, including how they differ from traditional automation practices, best management practices, and more. This episode was brought to you by Sekoia. Leading the way in detection and response solutions for modern SOCs, Sekoia offers business…
  continue reading
 
Twitter Spaces - Insights of a Cybersecurity Expert An In-Depth Look into a Twitter Space Hosted by Alberto Daniel Hill: Insights from a Recent Recording This article delves into a recording of a Twitter Space hosted by @ADanielHill, also known as Alberto Daniel Hill, a prominent cybersecurity professional from Montevideo, Uruguay. Known for their …
  continue reading
 
Hacking, Trust, and the Human Condition 1. Introduction: A Microcosm of the Modern World This briefing document synthesizes key themes, ideas, and facts from live Twitter Spaces, offering a unique, unfiltered glimpse into the complexities of our digital lives. These raw conversations, featuring a diverse mix of experts, activists, and everyday indi…
  continue reading
 
Got a question or comment? Message us here! Hackers just unleashed the largest DDoS attack in history, peaking at 7.3 Tbps and 4.8 billion packets per second. In just 45 seconds, it pummeled its target with the data equivalent of over 9,000 HD movies, a powerful reminder of how far attack capabilities have evolved. 🎧 Tune in to today’s SOC Brief fo…
  continue reading
 
Kevin Mitnick, who was widely known as the "World's Most Famous Hacker," passed away on July 16th, 2023 after more than a year's long battle with pancreatic cancer, as reported by CNN. In this episode, host Paul John Spaulding interviews Scott Schober, author of "Hacked Again," to discuss his experience meeting Mitnick, sharing memories, and more. …
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
Intelligence, Innovation, and Human Understanding The sources are transcripts from audio conversations exploring diverse interpretations of truth and humanity's future. Participants discuss the nature of intelligence, distinguishing between memorization and the ability to recontextualize information, while also questioning the idolization of figure…
  continue reading
 
Shadow Ops: Unveiling Government Data Vulnerabilities These sources capture a **dynamic conversation** primarily between **Carl, Adam, and other participants** on a **Twitter Spaces session**, covering a wide array of **interconnected topics**. The discussion spans from **technical security concerns**, including **cyberattacks, vulnerabilities in g…
  continue reading
 
Are you running SAP? The clock is ticking... Standard maintenance end-of-life is set for the end of 2027. Migration to S/4HANA must be completed by then (or 2030 if you buy into SAP’s special three-year reprieve). While that may appear to be enough time, companies currently working toward an S/4HANA transition are finding the journey challenging, a…
  continue reading
 
Twitter Spaces Stories. Conversations on AI, Politics, and Society. Adam running for president. This podcast transcript features Adam, a presidential candidate, discussing his core values of honesty, truth, and power, while expressing his anti-corruption stance and desire to improve the country. He later engages in a mock interview with an AI, outl…
  continue reading
 
Welcome back to Re-Imagining Cyber! In this episode, Tyler Moffitt, (Senior Security Analyst at OpenText) explores the emerging threat of generative AI in the hands of cyber criminals. Discover how AI models like ChatGPT, WormGPT, and FraudGPT have drastically lowered the skill floor for launching sophisticated attacks. Tyler breaks down the four m…
  continue reading
 
The Anonymous Disclosures: An Analysis of the SURGE-Hill Recordings The foundation of this analysis rests upon two key intelligence disclosures from an operative of the hacktivist collective Anonymous, identified as "SURGE," in conversation with journalist Alberto Daniel Hill. These recordings, while originating from a non-traditional intelligence …
  continue reading
 
This report provides a comprehensive analysis of intelligence disclosed by the Anonymous operative "SURGE," corroborated by an extensive body of public records, court filings, and technical reports. The investigation reveals a coordinated and systematic effort, operating under the banner of the "Department of Government Efficiency" (DOGE), to subve…
  continue reading
 
As cybersecurity regulations tighten across the automotive industry, OEMs and suppliers are under growing pressure to not only build secure vehicles but also prove compliance across their entire software and hardware stack. In this episode of Cars, Hackers, and Cyber Security, we explore the key strategies for mastering compliance with global autom…
  continue reading
 
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play