Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cybersecurity News Podcasts

show episodes
 
Get ready for your aha moment: Every weekday, host Meghna Chakrabarti pierces your news bubble to expose the whole story. Getting answers to the questions that need to be asked, examining our history and the human condition. No topic is too complicated or off the table. It’s all On Point.
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Welcome to the podcast from 404 Media where Joseph, Sam, Emanuel, and Jason catch you up on the stories we published this week. 404 Media is a journalist-owned digital media company exploring the way technology is shaping–and is shaped by–our world. We bring you unparalleled access to hidden worlds both online and IRL through investigative reporting, smart blogging, and breaking news. At 404 Media you’ll read, and hear, stories you can’t find anywhere else written by journalists who are lead ...
  continue reading
 
Artwork

1
Click Here

Recorded Future News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Artwork

1
Lock and Code

Malwarebytes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
  continue reading
 
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
  continue reading
 
Artwork

1
Tech Talks Daily

Neil C. Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
  continue reading
 
Artwork

1
Security Weekly News (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork
 
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Artwork

1
Security Breach

Eric Sorensen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Each weekday morning we bring you the tech news you need today, and then in the afternoon we showcase stories about the technology, science, and culture that will influence tomorrow, all brought to you by Engadget.
  continue reading
 
Artwork

1
Security Weekly News (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork

1
Interpreting India

Carnegie India

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In Season 4 of Interpreting India, we continue our exploration of the dynamic forces that will shape India's global standing. At Carnegie India, our diverse lineup of experts will host critical discussions at the intersection of technology, the economy, and international security. Join us as we navigate the complexities of geopolitical shifts and rapid technological advancements. This season promises insightful conversations and fresh perspectives on the challenges and opportunities that lie ...
  continue reading
 
Artwork

1
Dirty South Security Podcast

VerSprite Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
  continue reading
 
Artwork

1
Industrial Cybersecurity Insider

Industrial Cybersecurity Insider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Loading …
show series
 
-Since large language models are often trained to produce the response that seems to be desired, they can become increasingly likely to provide sycophancy or state hallucinations with total confidence. -After blowback from Apple, Samsung and opposition leaders, the Modi government issued a statement saying it "has decided not to make the pre-instal…
  continue reading
 
How might Trump’s new National Security Strategy impact cyber? The UK’s NCSC warns LLMs may never get over prompt injection. At least 18 U.S. universities were hit by a months-long phishing campaign. Russia blocks FaceTime. A bipartisan group of senators reviving efforts to strengthen protections across the health sector. Portugal provides legal sa…
  continue reading
 
“I will be doing a ONE RULE Executive Order this week,” Trump posted on social media. “You can’t expect a company to get 50 Approvals every time they want to do something.” Paramount Skydance on Monday launched a hostile, $108.4 billion bid to buy Warner Bros. Discovery, days after Warner Bros. agreed to be acquired by Netflix for $82.7 billion. Le…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-quantum-computers-threaten-bitcoin-and-the-entire-internet-simply-explained. Learn how Shor's Algorithm breaks RSA, ECC, and Bitcoin. Understand the 'Decrypt Later' threat and the urgent global race for Post-Quantum Cryptography (PQC). Check more stories related to cyb…
  continue reading
 
-Just a day after receiving a roughly $140 million fine, X has terminated the ad account of the European Commission. Nikita Bier, X's head of product, accused the European Commission of using an exploit to artificially boost the reach of its post announcing the major fine. -After Netflix announced that it was acquiring Warner Bros. Discovery last w…
  continue reading
 
This week Sam is in conversation with Noelle Perdue. Noelle is a writer, producer, and internet porn historian whose works has been published in Wired, the Washington Post, Slate, and more, and you’re probably familiar with her work if you’ve been paying attention to the plot in your favorite pornographic films. She’s writing on Stubstack so look h…
  continue reading
 
On today's podcast: 1) President Donald Trump raised potential antitrust concerns around Netflix Inc.’s planned $72 billion acquisition of Warner Bros. Discovery Inc., noting that the market share of the combined entity may pose problems. 2) The Trump administration on Monday plans to unveil a long-awaited farm aid package, according to a White Hou…
  continue reading
 
The $82.7 billion deal to acquire Warner Bros., and the acquisition has already been described as sending Hollywood into “full-blown panic mode,” “possibly a death blow to theatrical filmmaking,” and maybe even “the end of Hollywood” itself. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
In a live conversation on YouTube, Lawfare Executive Editor Natalie Orpett sat down with Lawfare Senior Editors Anna Bower, Michael Feinberg, Molly Roberts, Roger Parloff and Eric Columbus and Lawfare Contributing Editor James Pearce to discuss the arrest of a suspect in the attempted bombing on Jan. 6, 2021, a hearing in NPR’s lawsuit over the Tru…
  continue reading
 
New wave of VPN login attempts on Palo Alto portals NATO holds its largest-ever cyberdefense exercise Chinese hackers exploiting React2Shell bug Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Deepfakes aren't science fiction anymore; they'r…
  continue reading
 
Your morning briefing, the business news you need in just 15 minutes. On today's podcast: (1) JPMorgan Chief Executive Officer Jamie Dimon called out slow bureaucracy in Europe in a warning that a “weak” continent poses a major economic risk to the US. (2) Keir Starmer will host Ukrainian President Volodymyr Zelenskiy in London on Monday as the UK …
  continue reading
 
A pocket guide offering a comprehensive overview of over 600 concepts, terminologies, and processes in the fields of machine learning and deep learning. Published in 2021, it aims to clarify the logic and mechanisms behind these concepts for data scientists, acting as a non-linear reference for both beginners and experienced practitioners. The guid…
  continue reading
 
Explosive React Vulnerability and AI Tool Flaws Uncovered: Major Implications for Cybersecurity In this episode of Cybersecurity Today, host David Shipley discusses a new significant React vulnerability, React2Shell, that has caused widespread confusion and debate in the security community. This major flaw, affecting a widely used web framework, po…
  continue reading
 
Episode 14 – Leadership in the AI Era with Ruby Agarwal (VP Cloud Platform & Operations @ Avaya) The game has permanently changed. AI isn’t coming for your job tomorrow; it’s already rewriting the operating system of every security and technology organization today. In this no-BS episode, Tony UV sits down with Ruby Agarwal to separate leadership t…
  continue reading
 
What does learning look like when technology shifts faster than most university systems can adapt? That question shaped my conversation with Rob Telfer, who leads education strategy for D2L across Europe, the Middle East, and Africa. Rob returned to the show with a clear view of how AI is transforming higher education and why so many institutions a…
  continue reading
 
From January 24, 2023: In 2019, investigative journalist and photographer Lynzy Billing went to Afghanistan to investigate a very personal story: her own past. In the process, she discovered what she came to call a classified war, one with lines of accountability so obscured that no one had to answer publicly for operations that went wrong. Lawfare…
  continue reading
 
Please enjoy this encore of Career Notes. Chief security strategist from Analyst1, Jon DiMaggio shares his story on how he grew to become a part of the cybersecurity world. He describes different jobs that paved the way to the knowledge he has in the industry right now, and he even shares about an experience that led him to a path that split and wh…
  continue reading
 
A structured approach to managing third-party risk. The book covers fundamental concepts such as the CIA Triad (Confidentiality, Integrity, Availability), various cybercrime types (phishing, ransomware), and the five phases of a breach (research, intrusion, lateral movement, privilege escalation, exfiltration). It further explores the impact of the…
  continue reading
 
*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]" dir="auto" tabindex="-1" data-turn-id= "request-WEB:221c7553-c733-4456-a06c-c66c0626b35b-7" data-testid= "conversation-turn-16" data-scroll-anchor="true" data-turn= "assistant"> How do you guide a workforce through the fastest shift in technology most of us ha…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/$146-million-in-rwa-hacks-this-year-reveals-the-gap-between-tokenization-hype-and-reality. RWA tokenization hit $35.68B in 2025, but $14.6M in hacks exposed security gaps. Can the industry scale to $2 trillion by 2028 amid regulatory fragmentation? Check more stories relat…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-invisible-breach-how-ai-is-quietly-creating-new-security-blind-spots-in-modern-tech. We're watching organizations introduce sophisticated machine learning systems to reduce risk, only to discover its creating entirely new categories of risk. Check more stories related …
  continue reading
 
Did you know that when many people hear "Orange," they still ask if it involves SIM cards? That was the perfect place to begin my conversation with Sahem Azzam, President for IMEA and Inner Asia at Orange Business. Once we cleared that up, it opened the door to a much richer story about what enterprise innovation looks like across one of the fastes…
  continue reading
 
From April 5, 2024: A new report from the POPVOX Foundation focuses on a little-known and hugely under-appreciated congressional effort: that of congressional staffers helping Afghan allies flee the country during the U.S. withdrawal from Afghanistan. Lawfare Executive Editor Natalie Orpett sat down with the report’s author, Anne Meeker. They talke…
  continue reading
 
Jaron Bradley, Director of Jamf Threat Labs, is sharing their work on "ChillyHell: A Deep Dive into a Modular macOS Backdoor." Jamf Threat Labs uncovers a newly notarized macOS backdoor called ChillyHell, tied to past UNC4487 activity and disguised as a legitimate applet. The malware showcases robust host profiling, multiple persistence mechanisms,…
  continue reading
 
A comprehensive guide for technical interviews in the software industry, particularly focusing on algorithm, coding, and design questions. It offers detailed strategies for interview preparation, including how to approach problems, optimize solutions, and understand time and space complexity (Big O notation). The text provides interview-specific ad…
  continue reading
 
Jaron Bradley, Director of Jamf Threat Labs, is sharing their work on "ChillyHell: A Deep Dive into a Modular macOS Backdoor." Jamf Threat Labs uncovers a newly notarized macOS backdoor called ChillyHell, tied to past UNC4487 activity and disguised as a legitimate applet. The malware showcases robust host profiling, multiple persistence mechanisms,…
  continue reading
 
Cybersecurity Today: The Rise of Living Off the Land Strategies & More In this episode of Cybersecurity Today's Month in Review, host Jim Love is joined by Laura Payne from White Tuque and David Shipley from Beauceron Security. They discuss several pressing cybersecurity issues, including the growing threat of 'living off the land' strategies where…
  continue reading
 
Guest host Behnam Ben Taleblu is joined by former U.S. intelligence official Norman Roule to examine Iran’s postwar moment: from puncturing the comforting illusion created by viral clips of loosened social activity (or, as Norm puts it, why “a few videos of dancing and hijab-free afternoons don’t outweigh 21,000 arrests and expedited executions”) t…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play