Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cyber Security News Podcasts
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
A window into our world, through in-depth storytelling from the BBC. Investigating, reporting and uncovering true stories from everywhere. Award-winning journalism, unheard voices, amazing culture and global issues. From Trump's new world order, to war in Sudan, to the legacy of football icon Mo Salah, The Documentary investigates major global stories. We delve into social media, take you into the minds of the world's most creative people and explore personal approaches to spirituality. Ever ...
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Russia knows our weaknesses. But do you? A major five-part series from Sky News and Tortoise which imagines how a Russian attack on the UK could play out – and invites real-life former ministers, military chiefs and other experts to figure out how to defend the country. Written and presented by Sky News' security and defence editor, Deborah Haynes.This is Deborah's second podcast series for Sky News. In her first series, Into The Grey Zone, Deborah explores the murky evolution of warfare.Wha ...
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Discussions over drinks with security, defense, and foreign policy insiders and experts. The original War on the Rocks podcast series.
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
A critical look at new technologies, new approaches and new ways of thinking, from politics to media to environmental sustainability.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Cyber Security Compliance and IT Jobs
…
continue reading
In this chilling Halloween special of Reimagining Cyber, cybersecurity expert Tyler Moffitt counts down the nastiest pieces of malware that defined 2025 — and the identity-driven attacks reshaping the threat landscape. From AI-powered social engineering to ransomware “lawyer buttons”, this year’s cybercriminals blurred the line between hacking netw…
…
continue reading
1
Risky Business #812 -- Alleged Trenchant exploit mole is ex-ASD
1:06:14
1:06:14
Play later
Play later
Lists
Like
Liked
1:06:14In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: L3Harris Trenchant boss accused of selling exploits to Russia once worked at the Australian Signals Directorate Microsoft WSUS bug being exploited in the wild Dan Kaminsky DNS cache poisoning comes back because of a bad PRNG SpaceX finally starts dis…
…
continue reading
1
SN 1049: DNS Cache Poisoning Returns - Ransomware Payments Plummet
3:11:25
3:11:25
Play later
Play later
Lists
Like
Liked
3:11:25Just when you thought DNS cache poisoning was a thing of the past, Steve and Leo reveal why this 17-year-old bug is making a dramatic comeback—and why most DNS resolvers still can't manage high-quality random numbers after all this time. The unsuspected sucking power of a Linux-based robot vacuum. Russia to follow China's vulnerability reporting la…
…
continue reading
1
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
…
continue reading
1
Lockpick chaos, CoPhish, Atlas, Turing, ForumTroll, PKD, Kilgore Trout, Aaran Leyland - SWN #524
34:35
34:35
Play later
Play later
Lists
Like
Liked
34:35Lockpicks, Microsoft, CoPhish, Atlas, Turing, ForumTroll, PKD, even Kilgore Trout, the Amazing Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-524
…
continue reading
WSUS attacks escalate as emergency patch fails to fully contain exploited flaw. Schneider Electric and Emerson are listed among victims in the Oracle EBS cyberattack. Google debunks reports of a massive GMail breach. A new banking trojan mimics human behavior for stealth. Sweden’s power grid operator confirms a cyberattack. Italian spyware targets …
…
continue reading
Army Chief Technology Officer Alex Miller joined Ryan at a live event to talk about what countering improvised explosive devices taught him about defeating drones, what the Army is learning from the southern border about emerging threats, and what he wants to see from industry. He makes the case for deeper collaboration between companies, sharper f…
…
continue reading
1
Lawfare Daily: State Cyber Corps and Volunteer Programs
41:48
41:48
Play later
Play later
Lists
Like
Liked
41:48Sarah Powazek, Director of the Public Interest Cybersecurity Program at UC Berkeley’s Center for Long-Term Cybersecurity, and Michael Razeeq, Nonresident Fellow at the Public Interest Cybersecurity Program, join Lawfare’s Justin Sherman to discuss the cyber threats facing states, what options and resources states currently have to address cybersecu…
…
continue reading
This is today’s cyber news for October 28th, 2025. We lead with a fix-now warning on Windows update servers after confirmed abuse, a reminder that whoever shapes your patches shapes your posture. Google knocked down rumors of a massive Gmail breach, underscoring how misinformation burns time even when core services are fine. X set a hard deadline t…
…
continue reading
1
Quantum Computing Isn’t A Threat To Blockchains - Yet - Martha Bennett, Sandy Carielli - ASW #354
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
continue reading
When Big Tech brought plans for a giant data center to St. Charles, Missouri, one college student decided to fight back. And it raises a question small towns all over the US are asking: what happens when the cloud touches ground? Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading
1
Atlas browser hijacked, Bye, bye Twitter birdie, Dante spyware surfaces
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15Atlas browser hijacked Bye, bye Twitter birdie Dante spyware surfaces Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Conveyor takes all that chaos and turns it into calm. AI fills in the que…
…
continue reading
1
Identity access management (IAM) (noun) [Word Notes]
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55Please enjoy this encore of Word Notes. A set of solutions for ensuring that the right users can only access the appropriate resources. CyberWire Glossary link: https://thecyberwire.com/glossary/identity-and-access-management Audio reference link: “The Wrath of Khan (1982) ‘Kirk’s Response,’” by Russell, YouTube, 16 May 2017.…
…
continue reading
1
The impact of data privacy on cyber. [CISO Perspectives]
42:04
42:04
Play later
Play later
Lists
Like
Liked
42:04Privacy is one of the most universally valued rights. Yet, despite its importance, data breaches exposing millions of people's sensitive information have become routine. Many have come to assume that their personal data has already been, or inevitably will be, compromised. Despite this reality, prioritizing privacy is more important than ever. In t…
…
continue reading
1
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
…
continue reading
They steal billions: Cyber Hack investigates the alleged cyber gangs and the heists and hacks they’re accused of carrying out. No one is said to be safe. From Hollywood studios, to international banks, from crypto exchanges to small businesses and health care companies, law enforcement agencies say they cause chaos around the globe. Who will be nex…
…
continue reading
1
Department of Know: Promoting passphrases, questioning international security conferences, gift card hackers
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Link to episode page This week's edition of The Department of Know is hosted by Rich Stroffolino with guests Bil Harmer, operating partner and CISO, Craft Ventures, and Sasha Pereira, CISO, WASH Thanks to our show sponsor, ThreatLocker If security questionnaires make you feel like you're drowning in chaos, you're not alone. Endless spreadsheets, po…
…
continue reading
1
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection (#)
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vul…
…
continue reading
1
Free AWS book and other convocourses projects Oct 25 2025
2:04:37
2:04:37
Play later
Play later
Lists
Like
Liked
2:04:37SIGN UP FOR FREE COURSES 📚 http://convocourses.com (Join the Group) http://convocourses.net (Shop) JOIN THE NEWSLETTER 📨 https://dashboard.mailerlite.com/forms/1328320/146086011895547193/share CHECK US OUT HERE 🌐 Website: http://convocourses.org Instagram: https://instagram.com/convocourses TikTok: https://www.tiktok.com/@convocourses Facebook: htt…
…
continue reading
1
The UN’s big push for global cybercrime rules.
24:41
24:41
Play later
Play later
Lists
Like
Liked
24:41The UN launches the world’s first global treaty to combat cybercrime. A House Democrats’ job portal left security clearance data exposed online. A new data leak exposes 183 million email addresses and passwords. Threat actors target Discord users with an open-source red-team toolkit. A new campaign targets unpatched WordPress plugins. The City of G…
…
continue reading
1
Defensive Security Podcast Episode 327
1:00:23
1:00:23
Play later
Play later
Lists
Like
Liked
1:00:23Want to be the first to hear our episodes each week? Become a Patreon donor here. Links to this week’s stories: https://www.cybersecurity-insiders.com/how-ai-will-shape-the-future-of-cyber-defense-a-one-three-and-five-year-outlook/ https://www.helpnetsecurity.com/2025/10/15/f5-big-ip-data-breach/ https://www.bleepingcomputer.com/news/security/fake-…
…
continue reading
1
Cybersecurity Secrets Schools Never Teach
1:37:40
1:37:40
Play later
Play later
Lists
Like
Liked
1:37:40New Episode🔥We explore the often overlooked connection between a significant data breach and mental health, focusing on the resulting anxiety and cyber security concerns. We discuss how data security impacts identity theft and the rising rates of cyber attack. It's time we address the emotional fallout from these incidents. Learn Cybersecurity Secr…
…
continue reading
1
Securing AI Agents with Dave Lewis, Enterprise News, and interviews from Oktane 2025 - Mike Poole, Conor Mulherin, Dave Lewis - ESW #430
1:39:12
1:39:12
Play later
Play later
Lists
Like
Liked
1:39:12Segment 1: Interview with Dave Lewis from 1Password In this week's sponsored interview, we dive into the evolving security landscape around AI agents, where we stand with AI agent adoption. We also touch on topics such as securing credentials in browser workflows and why identity is foundational to AI agent security. 1Password Addresses a Critical …
…
continue reading
This is today’s cyber news for October 27th, 2025. We cover an emergency push by Microsoft to protect Windows Server Update Services from active attacks, Amazon’s explanation for a Domain Name System failure inside Amazon Web Services that rippled across major apps, and a cache-poisoning risk in BIND that threatens the trust behind logins and payme…
…
continue reading
1
Lawfare Daily: The Trials of the Trump Administration, Oct. 24
1:34:10
1:34:10
Play later
Play later
Lists
Like
Liked
1:34:10In a live conversation on YouTube, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Contributor James Pearce and Senior Editors Scott R. Anderson, Molly Roberts, Roger Parloff and Eric Columbus to discuss the arraignment of Letitia James, legal challenges to the appointments of Lindsey Halligan and Alina Habba to be U.S. attorneys, lit…
…
continue reading
1
Microsoft WSUS vulnerability, LastPass death hoax, Copilot phishing technique
9:36
9:36
Play later
Play later
Lists
Like
Liked
9:36Microsoft WSUS vulnerability could allow for remote code execution Fake LastPass death claims used to breach password vaults New CoPhish attack steals OAuth tokens via Copilot Studio agents Huge thanks to our sponsor, Conveyor If security questionnaires make you feel like you're drowning in chaos, you're not alone. Endless spreadsheets, portals, an…
…
continue reading
1
Inside Offensive AI: From MCP Servers To Real Security Risks
1:06:01
1:06:01
Play later
Play later
Lists
Like
Liked
1:06:01Send us a text Security gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defenders are using language models today, where they fall apart, and how to build guardrails that hold up under pressure. From MCP servers that look a lot …
…
continue reading
In this episode of the mnemonic security podcast, we take a closer look at a tension that remains invisible to most of us, yet is very real: the quiet conflict unfolding within our critical infrastructure. This topic gave us the perfect excuse to once again invite one of our favorite guests, for the fourth time, Joe Slowik. Joe brings over 15 years…
…
continue reading
1
Pwn2Own Ireland 2025: Major Cybersecurity Revelations & Critical Vulnerabilities
13:45
13:45
Play later
Play later
Lists
Like
Liked
13:45In this episode of Cybersecurity Today, host David Shipley covers the latest updates from the Pwn2Own 2025 event in Ireland, where top hackers earned over $1 million for uncovering 73 zero-day vulnerabilities. Despite significant hype, AI's impact on cybersecurity remains limited. We also dive into a critical Microsoft WSUS flaw under active exploi…
…
continue reading
1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
…
continue reading
The espionage TV series, Homeland, brought David Harewood international fame but he is also known as the first Black actor to play Othello at the UK’s National Theatre when he was in his early 30s. Now, aged almost 60, he is reprising the role of the Moor in Shakespeare’s tragedy. The character of Othello is a skillful General, and the only person …
…
continue reading
1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE (#)
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysi…
…
continue reading
1
Undercover Investigation. Top Cyber Crime Ransomware Gang EXPOSED. LOCKBIT
27:16
27:16
Play later
Play later
Lists
Like
Liked
27:16A story like a crime thriller--all true. Legendary Security Researcher and Author, Jon DiMaggio, of Analyst1, joins us to discuss his undercover investigation and exposure of the inner working of one of the top cyber crime gangs on the planet: LOCKBIT. Jon DiMaggio’s latest blockbuster report Ransomware Diaries VOL 3: https://analyst1.com/ransomwar…
…
continue reading
1
The Cyber Café Playbook: Safety Is a Story We Tell Ourselves
9:27
9:27
Play later
Play later
Lists
Like
Liked
9:27This special Playbook episode distills the most important lessons from previous discussions — not as stories, but as rules. A framework for those who still believe digital safety is something they possess rather than something they must earn. If you think you understand the risk, start here and test that belief. Click here to send future episode re…
…
continue reading
1
Lawfare Archive: CYBERCOM Legal Conference: The Role of the Private Sector in Conflict
57:55
57:55
Play later
Play later
Lists
Like
Liked
57:55From April 24, 2024: The annual U.S. Cyber Command (USCYBERCOM) Legal Conference convenes lawyers across government and the private sector working on cyber issues. This year’s conference focused on the power of partnerships. Executive Editor Natalie Orpett moderated a panel, titled “The Business of Battle: Navigating the Role of the Private Sector …
…
continue reading
1
Derek Manky: Putting the rubber to the road. [Threat Intelligence] [Career Notes]
9:38
9:38
Play later
Play later
Lists
Like
Liked
9:38Please enjoy this encore of Career Notes. Chief Security Strategist and VP of Global Threat Intelligence at FortiGuard Labs, Derek Manky, shares his story from programmer to cybersecurity and how it all came together. Derek started his career teaching programming because he had such a passion for it. When he joined Fortinet, Derek said putting wher…
…
continue reading
Drone surveillance, sign language and 'looking American' are all suggestions that Brazilian immigrants are making to each other as ways to avoid being deported. Since the beginning of President Donald Trump's second term, there have been increased Immigration and Customs Enforcement or 'ICE' raids all over the country. These raids are designed to c…
…
continue reading
1
Lawfare Archive: Gabe Rottman on the Justice Department's New Guidelines on Press Subpoenas
40:51
40:51
Play later
Play later
Lists
Like
Liked
40:51From June 5, 2023: It's been about six months since the attorney general issued new guidelines on compulsory process to members of the press in criminal and national security investigations, and two officials of the Reporters Committee for Freedom of the Press—Bruce Brown and Gabe Rottman—wrote a detailed analysis of the document in two parts for L…
…
continue reading
1
A look behind the lens. [Research Saturday]
24:30
24:30
Play later
Play later
Lists
Like
Liked
24:30Noam Moshe, Claroty’s Vulnerability Research Team Lead, joins Dave to discuss Team 82's work on "Turning Camera Surveillance on its Axis." Team82 disclosed four vulnerabilities in Axis.Remoting—deserialization, a MiTM “pass-the-challenge” NTLMSSP flaw, and an unauthenticated fallback HTTP endpoint—that enable pre-auth remote code execution against …
…
continue reading