Cyber Risk Reports provide strategic intelligence that highlight current security activity. The reports address seven major risk management categories: vulnerability, physical, legal, trust, identity, human, and geopolitical.
…
continue reading
Cyber Risk Reporting Podcasts
The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Threatscape Briefing delivers daily audio sitreps on the signals shaping global risk and competition. Each episode distills the “One Big Thing” into a concise, executive-ready briefing connecting military, economic, cyber, and cultural flashpoints. Built for analysts, risk managers, and decision-makers, the format is fast, authoritative, and globally timed to keep you ahead of the curve. Threatscape Briefing is part of the Geopolitical Threatscape ecosystem and equips decision‑makers with cl ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Join two longtime cybersecurity professionals and their guests as they rant, rave, and tell you the nitty-gritty of cybersecurity that nobody else talks about in their fancy marketing materials and trade show giveaways, all so you can protect your organization from cyber criminals. This cybersecurity podcast even pairs well with the international best-selling book "Cyber Rants." Zach Fuller and Lauro Chavez have fun, try not to take life too seriously, and definitely don't hold anything back ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The Bare Metal Cyber CRISC Audio Course is a comprehensive audio training series designed to help you master the CRISC certification with confidence. Each episode delivers in-depth coverage of ISACA’s CRISC domains — from risk governance to monitoring — using a uniquely structured, exam-focused format built for long-term retention. Whether you're studying on the go or doing a deep review, this prepcast is your essential guide to IT risk success.
…
continue reading
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
…
continue reading
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
ABC News Daily is the podcast that helps you understand the issues affecting your world. Every episode, host Samantha Hawley walks through one story with the help of an ABC colleague or expert in under 15 minutes. When you want coverage you can trust, listen to ABC News Daily. Key topics of recent episodes include the Donald Trump administration, DOGE, Tesla, insurance costs, recession risks, egg shortages, DeepSeek, neo-Nazis, Putin and Xi, solar batteries, the jobs market, anti-Semitism, a ...
…
continue reading
1
Conscious Governance
Conscious Governance that helps Boards & CEOs make the choices that create the future for the communities they serve
Conscious Governance is an advisory service that helps Boards & CEOs make the choices that create the future for the communities they serve. We do this by creating clarity from complexity in governance, strategy, risk and leadership.
…
continue reading
Welcome to AcoraCast - The forefront of expertise and innovation, with the freshest IT, cyber security and AI insights brought to you by Acora. Tune in as we unravel the latest trends, tips, and tools, all tailored to empower you in your role as an IT or Security Trailblazer. Interested in seeing what else Acora can do? Visit our website.
…
continue reading
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and he ...
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
The internet in its blooming evolution makes personal data big business – for government, the private sector and denizens of the dark alike. The Data Privacy Detective explores how governments balance the interests of personal privacy with competing needs for public security, public health and other communal goods. It scans the globe for champions, villains, protectors and invaders of personal privacy and for the tools and technology used by individuals, business and government in the great ...
…
continue reading
“From The Blockchain" brings you today’s most innovative entrepreneurs and thought leaders to unpack the true potential of smart contract technology, web3, and the digital frontier! Host Ashley Smith is thrilled to have you join today’s top tier community of forward thinking trailblazers. This show brings substance over hype - say goodbye to the noise of NFT and cryptocurrency market speculation. Instead, From The Blockchain aims foster a culture of idea sharing, creativity, and innovation t ...
…
continue reading
1
Walking on EggStremes. [Research Saturday]
28:01
28:01
Play later
Play later
Lists
Like
Liked
28:01This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company." Built for long-term espionage, the campaign uses DLL sideloading, in-memory execution, and abused Windows services to stay stealthy an…
…
continue reading
The NSA reshuffles its cybersecurity leadership. A new report unmasks ICE’s latest surveillance system. CISA marks a milestone by retiring ten Emergency Directives. Trend Micro patches a critical vulnerability. Grok dials back the nudes, a bit. Cambodia extradites a cybercrime kingpin to China. Ghost Tap malware intercepts payment card data. Resear…
…
continue reading
1
Why the PM finally called an antisemitism inquiry
14:13
14:13
Play later
Play later
Lists
Like
Liked
14:13More than three weeks since the Bondi terror attack, the federal government has announced a royal commission into antisemitism and social cohesion. Since the massacre, Anthony Albanese has resisted calls to establish an inquiry. But after widespread pressure continued to mount, the PM has reversed course, now defending his decision to not call an i…
…
continue reading
1
CYFIRMA Research- Resurgence of Scattered Lapsus$ Hunters
7:50
7:50
Play later
Play later
Lists
Like
Liked
7:50The threat landscape just got more complex. The Scattered LAPSUS$ Hunters-alliance has re-emerged, merging the tactics of notorious groups. This isn’t just a name change; it’s a shift toward professionalized, identity-centric extortion. What you need to know: High-Value Targets: Focused on enterprises with $500M+ revenue, specifically in Cloud, Tel…
…
continue reading
1
SANS Stormcast Friday, January 9th, 2026: Gephi Analysis; zlib vuln; GnuPG Vulns; Cisco/Cloudflare DNS Issue
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12Analysis using Gephi with DShield Sensor Data Gephi is a neat tool to create interactive data visualizations. It can be applied to honeypot data to find data clusters. https://isc.sans.edu/diary/Analysis%20using%20Gephi%20with%20DShield%20Sensor%20Data/32608 zlib v1.3.1.2 Global Buffer Overflow in TGZfname() of zlib untgz Utility The untgz utility …
…
continue reading
The US withdraws from global cybersecurity institutions. A maximum-severity vulnerability called Ni8mare allows full compromise of a workflow automation platform. Cisco patches ISE. Researchers uncover a sophisticated multi-stage malware campaign targeting manufacturing and government organizations in Italy, Finland, and Saudi Arabia. The growing r…
…
continue reading
1
Spanish Airline Attributes Breach to November Incident, Illinois Agency Exposed Data, UK Cyber Action Plan
17:51
17:51
Play later
Play later
Lists
Like
Liked
17:51🎙️ Spanish Airline Attributes Breach to November Incident, Illinois Agency Exposed Data, UK Cyber Action Plan 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1040: Today's episode will discuss the latest news: Australia's Scams Framework Criticized Over Major Exclusio…
…
continue reading
As the Trump administration focuses on its actions abroad, political tension is escalating at home. An Immigration and Customs Enforcement officer has shot dead a US citizen in the city of Minneapolis. The shooting has intensified bitter political debate over Donald Trump’s controversial immigration policy which has seen ICE raids in cities across …
…
continue reading
1
SANS Stormcast Thursday, January 8th, 2026: HTML QR Code Phishing; n8n vulnerability; Powerbank Feature Creep
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23A phishing campaign with QR codes rendered using an HTML table Phishing emails are bypassing filters by encoding QR codes as HTML tables. https://isc.sans.edu/diary/A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table/32606 n8n vulnerabilities In recent days, several new n8n vulnerabilities were disclosed. Ensure that …
…
continue reading
Jaguar Land Rover reveals the fiscal results of last year’s cyberattack. A Texas gas station chain suffers a data spill. Taiwan tracks China’s energy-sector attacks. Google and Veeam push patches. Threat actors target obsolete D-Link routers. Sedgwick Government Solutions confirms a data breach. The U.S. Cyber Trust Mark faces an uncertain future. …
…
continue reading
1
Jaguar Land Rover Sales Down 43% After Cyberattack, Taiwan Energy Sector Attacks Up 10x, LockBit 5.0 Emerges
14:42
14:42
Play later
Play later
Lists
Like
Liked
14:42🎙️ Jaguar Land Rover Sales Down 43% After Cyberattack, Taiwan Energy Sector Attacks Up 10x, LockBit 5.0 Emerges 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1039: Today's episode will discuss the latest news: Critical Dolby Vulnerability Patched in Android Devices …
…
continue reading
Greenland’s sovereignty could be under threat, after the White House declared using the US military to take control of the island is ‘always an option.’ It comes after President Donald Trump revived his long-running push to seize the Arctic island. European leaders have hit back issuing a rare joint statement rejecting any threat to Greenland’s sov…
…
continue reading
1
SANS Stormcast Wednesday, January 7th, 2026: Tailsnitch Review; D-Link DSL EoL Vuln; TOTOLINK Unpatched Vuln
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44Tool Review: Tailsnitch Tailsnitch is a tool to audit your Tailscale configuration. It does a comprehensive analysis of your configuration and suggests (or even applies) fixes. https://isc.sans.edu/diary/Tool%20Review%3A%20Tailsnitch/32602 D-Link DSL Command Injection via DNS Configuration Endpoint A new vulnerability in very old D-Link DSL modems …
…
continue reading
Grok’s non-consensual imagery draws scrutiny from the European Commission. Researchers link several major data breaches to a single threat actor. The UK unveils a new Cyber Action Plan. A stealthy ClickFix campaign targets the hospitality sector. VVS Stealer malware targets Discord users. Covenant Health and AFLAC report data leaks. Google silences…
…
continue reading
1
Brightspeed Investigating Cyberattack, Ledger Third-Party Breach, NordVPN Denies Breach Claims
18:26
18:26
Play later
Play later
Lists
Like
Liked
18:26🎙️ Brightspeed Investigating Cyberattack, Ledger Third-Party Breach, NordVPN Denies Breach Claims 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1038: Today's episode will discuss the latest news: China Cyberattacks on Taiwan Escalate in Sophisticated Campaigns Russi…
…
continue reading
1
CYFIRMA Research- APT36: Multi-Stage LNK Malware Campaign Targeting Indian Government Entities
4:31
4:31
Play later
Play later
Lists
Like
Liked
4:31APT36 Targets Indian Entities Using Weaponized Windows Shortcut Files CYFIRMA has identified a coordinated cyber-espionage campaign attributed to APT36 (Transparent Tribe), a Pakistan-aligned threat actor persistently targeting Indian government entities and strategic sectors. This campaign highlights APT36’s evolving tradecraft, leveraging malicio…
…
continue reading
The deposed Venezuelan President, Nicolas Maduro, has appeared in a New York court, facing charges of narco-terrorism conspiracy and conspiracy to import cocaine. Both he and his wife Cilia Flores pleaded not guilty to all charges. Meanwhile, the US has been blasted for the attack on Venezuela by both allies and adversaries at a meeting of the UN S…
…
continue reading
1
SANS Stormcast Tuesday, January 6th, 2026: IPKVM Risks; Tailsnitch; Net-SNMP Vuln;
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08Risks of OOB Access via IP KVM Devices Recently, cheap IP KVMs have become popular. But their deployment needs to be secured. https://isc.sans.edu/diary/Risks%20of%20OOB%20Access%20via%20IP%20KVM%20Devices/32598 Tailsnitch Tailsnitch is a tool to review your Tailscale configuration for vulnerabilities https://github.com/Adversis/tailsnitch Net-SNMP…
…
continue reading
1
A city goes dark as cyber questions multiply.
24:15
24:15
Play later
Play later
Lists
Like
Liked
24:15Venezuela blames physical attacks for blackout as cyber questions swirl. Trump reverses a chip technology sale over national security issues, and removes sanctions linked to Predator spyware. Greek officials say an air traffic shutdown was not a cyberattack. The U.S. Army launches a new officer specialization in AI and machine learning. The Kimwolf…
…
continue reading
1
Sedgwick Cyber Incident Ransomware, Trump Orders $2.9M Chips Deal Divestment, 10K Fortinet Firewalls Exposed
16:19
16:19
Play later
Play later
Lists
Like
Liked
16:19🎙️ Sedgwick Cyber Incident Ransomware, Trump Orders $2.9M Chips Deal Divestment, 10K Fortinet Firewalls Exposed 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1037: Today's episode will discuss the latest news: Rondodox Botnet Exploiting React2Shell Vulnerability Cyb…
…
continue reading
1
Is Trump’s capture of Venezuela's president legal?
15:42
15:42
Play later
Play later
Lists
Like
Liked
15:42After a dramatic US military operation capping off months of escalating tensions, the former president of Venezuela, Nicolas Maduro is now in a New York prison. With Maduro gone, the Venezuelan military has endorsed the interim presidency of his former Vice President Delcy Rodriguez but Donald Trump has warned she could suffer a fate worse than Mad…
…
continue reading
1
SANS Stormcast Monday, January 5th, 2026: MongoBleed/React2Shell Recap; Crypto Scams; DNS Stats; Old Fortinet Vulns
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57Cryptocurrency Scam Emails and Web Pages As We Enter 2026 Scam emails are directing victims to confidence scams attempting to steal cryptocurrencies. https://isc.sans.edu/diary/Cryptocurrency%20Scam%20Emails%20and%20Web%20Pages%20As%20We%20Enter%202026/32594 Debugging DNS response times with tshark tshark is a powerful tool to debug DNS timing issu…
…
continue reading
1
Michael Scott: A team of humble intellects. [Information security] [Career Notes]
9:37
9:37
Play later
Play later
Lists
Like
Liked
9:37Please enjoy this encore of Career Notes. Chief Information Security Officer at Immuta, Michael Scott shares his story from working at a forgotten internet service provider to leading the security fight for major food chain restaurants. Michael explains how the different roles at various companies he has worked with paved his way to where he is now…
…
continue reading
While our team is out on winter break, please enjoy this episode of Research Saturday. Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishin…
…
continue reading
While our team is out on winter break, please enjoy this episode of Cyber Things from our partners at Armis. Welcome to Episode 2 of Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire in an homage to Stranger Things. Host Rebecca Cradick, VP of Global Communications at Armis, is joined by Curtis Simpson…
…
continue reading
1
2025 Picks: Why we need to move beyond BMI
15:31
15:31
Play later
Play later
Lists
Like
Liked
15:31BMI, or body mass index, has long been used as a simple calculation to determine if someone is underweight, a ‘healthy’ weight or obese. But when it was devised by a Belgian mathematician almost 200 years ago, it was never supposed to be a tool to measure health. Now, researchers are challenging the way obesity is defined and diagnosed. Today, a lo…
…
continue reading