Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Data Breaches Podcasts
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
The cyber war is upon us. We are here to talk about how to keep your business from going bankrupt after a data breach, the legal obligations associated with cyber and privacy law, and all things in between! We welcome questions and comments - call us at 4109175189 or email [email protected]
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
A bite-sized show about big ideas. From the people who make Planet Money, The Indicator helps you make sense of what's happening in today's economy. It's a quick hit of insight into money, work, and business. Monday through Friday, in 10 minutes or less.
…
continue reading
Guardian columnist John Harris, political editor Pippa Crerar, and political correspondent Kiran Stacey analyse the week's politics news
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
The Rivial Data Security team discusses all things cybersecurity while enjoying their favorite brews. We keep it fun and laidback with special guests, personal stories, and some great advice for anyone managing a cybersecurity program.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
…
continue reading
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
…
continue reading
China Insider is a weekly podcast project from Hudson Institute's China Center, hosted by Miles Yu, who provides weekly news that mainstream American outlets often miss, as well as in-depth commentary and analysis on the China challenge and the free world’s future.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Our panel of Paris-based journalists review the week's international news: the stories that made the headlines and also those you may have missed! Join us every Friday at 7:10pm Paris time.
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Cybersecurity and Hacking related news like Hacks, Bugs, Vulnerabilities, Data Breaches of the last 7 days on every Wednesday.
…
continue reading
The Podcast of Brushbeater.org, dedicated to training in small group communications, operations and intelligence tradecraft with a splash of current events.
…
continue reading
Kitecast features interviews with security, IT, compliance, and risk management leaders and influencers, highlighting best practices, trends, and strategic analysis and insights.
…
continue reading
InfoSec Battlefield is a premier weekly podcast spearheaded by Carl B. Johnson, the President and vCISO at Cleared Systems. Dive deep into the ever-evolving landscape of cybersecurity and information compliance with Carl as he unpacks the latest threats and challenges. Featuring enlightening conversations with esteemed leaders from the cyber realm and compliance industry, it's your go-to source for insights and expertise. Stay informed, stay secure—tune in every week!
…
continue reading
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
…
continue reading
For those who are interested in the hottest field in a technology world. Whether you are a professional who wants to learn more about privacy, data protection, or cyber law or someone who just finds this fascinating, we have topics for you from data management to cybersecurity to social justice and data ethics and AI. In-depth information on serious privacy topics. This podcast, hosted by Dr. K Royal, Paul Breitbarth and Ralph O'Brien, features open, unscripted discussions with global privac ...
…
continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
The Legal Face-off Podcast from WGN Plus
…
continue reading
Cybersecurity, compliance, security policy enforcement, and data privacy remain constant concerns, and a breach could irrevocably impact the profitability and sustainability of your company. Join Maurice Hamilton, CEO of Infinavate, each week as he interviews CEOs and CIOs to discuss real-life solutions to cybersecurity, data management, and advanced digital solutions. If you have concerns about cybersecurity, compliance, security policy enforcement, and data privacy, this podcast is for you ...
…
continue reading
Welcome to the Breach Report! Ephraim Ebstein, CEO of FIT Solutions, hosts different guests to talk about cybersecurity threats, the current challenges in the industry, and what organizations can do to strengthen their defenses against data breaches and cyber attacks.
…
continue reading
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
Who knew rich people committed crime? Not the American justice system! Join Chicago based comedians Nina Kern and Kishan Batcheldor as they talk some of the most prolific crimes committed by the wealthy. Checkout our Merch!: https://www.teepublic.com/stores/white-collars-red-hands?ref_id=23248
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
Bite-sized business news. 5 minute breakdown of the top 3 Australian or global business stories of the day. Tailor made for busy humans. Hosted by Brett Joffe and Justin Joffe, co-founders of Flux.
…
continue reading
Starring Jameela Jamil and Manny Jacinto! After crash-landing on a mysterious planet with no memory and a sentient AI implant in his brain keeping him alive, a soldier searches for answers about his past. There are only four things Lucan knows with certainty: his name, his rank, that the droll AI implant speaking to him inside his mind is named Ven, and finally, that she is the only thing keeping him from dying. With no other memories or connection to their pasts, Lucan and Ven must navigate ...
…
continue reading
The American Health Law Association (AHLA) is the largest nonprofit, nonpartisan educational organization devoted to legal issues in the health care field. AHLA's Speaking of Health Law podcasts offer thoughtful analysis and insightful commentary on the legal and policy issues affecting the American health care system.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Want to stay in the loop but don’t have time to scroll through endless headlines? This podcast has your back. Each week, we break down the hottest topics — from news and pop culture to tech trends and viral moments — and give you just what you need to sound informed, interesting, and maybe even a little wiser in your next conversation. No fluff, no noise, just what matters (with a few laughs along the way). Subscribe and stay in the conversation.
…
continue reading
Podcasts summarising important cases in privacy and data law in the UK and Europe.
…
continue reading
This Audio Course is your complete audio-first companion to the CIPP/US certification. Across structured episodes, it breaks down U.S. privacy law from federal and state frameworks to workplace rules and international overlaps, all aligned with the official IAPP Body of Knowledge. You’ll get guided walkthroughs of statutes, enforcement themes, case law, and key regulatory agencies, plus study strategies, glossary deep dives, and exam skills to build lasting confidence. Designed for on-the-go ...
…
continue reading
1. Gain a deep understanding of data privacy regulations and compliance requirements 2. Learn proven strategies for building a robust privacy framework tailored to your organization’s needs 3. Access practical resources and tools to streamline your data management processes 4. Connect with a community of like-minded business leaders for support and networking opportunities
…
continue reading
Daily bulletins reporting the latest news from the world of science and technology, from the Standard. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A podcast that explores how advertising, technology, and the internet is shaping the world around us and impacting our daily lives. Have you ever wondered why that pair of shoes is following you around the internet? Or is my phone really listening to me to inform the advertising I see? Or maybe you want to learn more about what laws and legislation are being put in place to protect you and your data? In every You're On Mute episode we will try to answer questions, uncover truths, and provide ...
…
continue reading

1
Episode 16 - The Irony of Crypto: Why Key Management Causes Massive Data Breaches
27:54
27:54
Play later
Play later
Lists
Like
Liked
27:54This episode explores the central irony of cryptography: while the underlying mathematical algorithms are incredibly strong, most real-world data breaches occur due to poor key management and implementation flaws. The consensus among security experts is that the theoretical strength of modern ciphers like AES or RSA is sound, but this technical rob…
…
continue reading

1
CTRL, ALT, HACKED. Discord Data Breach. Xbox Game Pass Price Hike.
16:32
16:32
Play later
Play later
Lists
Like
Liked
16:32Services like Lootlock offer parental controls to prevent kids from spending too much on video games. In this episode, host Paul John Spaulding, Kyle Haglund, VP, Audio Engineering at Cybercrime Magazine, and Sam White, Video Producer at Cybercrime Magazine, discuss this trend, alongside a discussion about the Xbox Game Pass price increase and the …
…
continue reading
Around 70,000 users of Discord globally could have had sensitive data stolen by hackers. The platform says criminals targeted a third-party service called 5CA, hired for age verification appeals. Data stolen includes official ID photographs, and potentially personal information such as partial credit card numbers and messages. A new tool is being d…
…
continue reading

1
Guzman y Gomez's $100 million burrito buy back | Costco and Aldi take on Coles | Salesforce may have a data breach
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22Guzman y Gomez has launched $100 million share buy back as its sales continue to pick up for the big burrito. Costco and Aldi are chipping away at Australia’s major supermarkets with more than $17.5 billion in annual sales. Salesforce, the global cloud-based software giant, has found itself caught in a major cybersecurity storm. _ Download the free…
…
continue reading
It may seem like data breaches have gotten a heck of a lot more common. Well, there’s something to that. The bad guys are getting badder faster than the good guys are getting better. This week, we’re bringing you five episodes on the evolving business of crime. Today on the show, we look at why the evolution of data breaches has been supercharged a…
…
continue reading

1
ParkMobile Data Breach Ends in $32.8M Settlement — and a $1 Payout
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55By Daily Security Review
…
continue reading

1
Massive data breach: what information about you is at risk?
7:11
7:11
Play later
Play later
Lists
Like
Liked
7:11Summary:The episode by Andrés Díaz explains that mass data breaches expose millions of records and can dramatically affect your life, including identity theft and data resale on the dark web. Breaches arise from a mix of human and technical weaknesses, such as misconfigured systems, insecure third parties, phishing, and malware. Regulatory efforts …
…
continue reading

1
Episode 17 - Beyond the Math: Dissecting Crypto's Achilles' Heel
35:34
35:34
Play later
Play later
Lists
Like
Liked
35:34This episode investigates the most common causes of cryptographic system failure, highlighting that the true vulnerability lies not in broken math, but in flawed engineering and implementation errors. Modern cryptographic algorithms like AES and RSA are mathematically robust, but they are often undermined by common software bugs, such as buffer ove…
…
continue reading

1
Episode 15 - The Math, The Mallory, and the Mode Misuse
40:58
40:58
Play later
Play later
Lists
Like
Liked
40:58This episode examines why even mathematically strong cryptographic systems often fail in the real world, concluding that the primary vulnerabilities stem not from broken math, but from implementation flaws, misuse of modes, and flawed protocol design. The security of any system must be viewed as a chain, where the core cryptographic algorithm is on…
…
continue reading

1
Episode 14 - Crypto-Agility Nightmare: Why Trillions of Systems Can't Easily Swap Keys
40:25
40:25
Play later
Play later
Lists
Like
Liked
40:25This episode focuses on the immense, often-overlooked logistical challenge of maintaining security and achieving crypto-agility across trillions of interconnected systems, even without a catastrophic future threat. The foundations of digital trust were revolutionized by Public Key Cryptography (PKC), with RSA becoming the initial standard for encry…
…
continue reading

1
Episode 13 - Why Bad Code, Not Broken Math, Is the Real Security Threat
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15This episode argues that the biggest threat to digital security is not broken cryptography math, but implementation flaws and bad code written by humans. The mathematical foundations of modern cryptography, such as RSA's reliance on factoring large numbers and AES's diffusion and confusion properties, are fundamentally strong and buy defenders time…
…
continue reading

1
Episode 12 - Cryptography and Systemic Cyber Defense
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01This episode explores the new frontiers in cryptography, focusing on tools that allow functionality and secure collaboration without revealing underlying data. This advanced field is formalized as Secure Multi-Party Computation (MPC), with the objective of allowing multiple parties to jointly compute a function based on their private inputs while m…
…
continue reading

1
Episode 11 - Zero-Knowledge, Quantum Chaos, and Unmanageable Complexity
27:14
27:14
Play later
Play later
Lists
Like
Liked
27:14This episode dives into advanced cryptography and the foundations of digital security, starting with the counter-intuitive concept of Zero-Knowledge Proofs (ZKPs), which allow a system to prove a fact, like a valid request or knowing a password, without revealing the sensitive underlying data. The core idea of ZKPs and blind signatures is to establ…
…
continue reading

1
CONTESTED GROUND: The information and financial risks to national unity
28:33
28:33
Play later
Play later
Lists
Like
Liked
28:33In this episode of the Contested Ground podcast, hosts Phil Tarrant, Liam Garman, and Major General (Ret’d) Dr Marcus Thompson unpack how Australia’s shifting information and economic environment is deepening social rifts and reshaping national security. Tarrant opens with the housing debate, questioning whether allowing buyers into the market with…
…
continue reading

1
Episode 10 - The Bit, The Seed, and the Paradox of Data Flow
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37This episode begins by exploring the cryptographic ideal of unconditional security, which is only truly achieved by the theoretical One-Time Pad (OTP), a cipher that is mathematically unbreakable. The impracticality of the OTP lies in the difficulty of creating, distributing, and securely managing a perfectly random, one-time key as long as the mes…
…
continue reading
This episode delves into the deep ambiguity and complexity of cyber conflict, using the Stuxnet malware attack as a pivotal case study that highlighted the vulnerability of critical infrastructure. Stuxnet demonstrated the risk of integrity attacks, where the goal is not to steal data, but to manipulate physical processes, such as causing nuclear c…
…
continue reading
This episode tackles the complex problem of software supply chain security, where trust must be established across a long chain of potentially vulnerable steps, from development to deployment. The core challenge is the lack of transparency about what actually happens to code between the programmer's keyboard and the end user's system. The proposed …
…
continue reading
This episode asserts that unreliability is fundamental insecurity and that the best security posture isn't about preventing every attack, but building a foundation of resilience to survive compromise. This foundational work starts with strong cryptography, which is often brittle; for instance, the security of a cryptographic system relies on unpred…
…
continue reading
This episode focuses on defensive cryptography, moving beyond mere confidentiality to explore the essential safeguards needed for data integrity, key management, and robust system architecture. The session begins by highlighting that encryption alone is insufficient for security; weak historical practices like simple password encryption failed beca…
…
continue reading
This episode dissects the "designer's mind," focusing on why secure cryptographic algorithms often fail in the real world due to subtle implementation blunders and design flaws, rather than mathematical weaknesses. Cryptography relies on hard math problems, like factoring and discrete logarithms, which are computationally infeasible to reverse with…
…
continue reading

1
Episode 4 - PKI, Quantum Threats, and the Configuration Crisis
29:23
29:23
Play later
Play later
Lists
Like
Liked
29:23This episode takes a deep dive into the Public Key Infrastructure (PKI), the mathematical bedrock of digital trust, starting with asymmetric cryptography which uses public and private key pairs to solve the problem of securely sharing a secret key. Because asymmetric algorithms like RSA are computationally slow, they are paired with much faster sym…
…
continue reading

1
Episode 3 - The Secret History of Encryption, Power, and the Race for Digital Keys
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14This episode traces the history of cryptography through three major shifts, highlighting the constant arms race between code-makers and code-breakers. The first shift was from simple manual substitution ciphers to mechanized secrecy, perfectly embodied by the Enigma machine. Enigma achieved its massive complexity through rotating scramblers and a r…
…
continue reading

1
Episode 2 - Cryptography's Engineering of Trust
45:03
45:03
Play later
Play later
Lists
Like
Liked
45:03This episode explores the core principles of cryptography, emphasizing that true security is rooted not just in strong math but in meticulous engineering and key management. The efficiency of modern encryption largely relies on symmetric ciphers like AES and 3DES, which use the same secret key for both encryption and decryption. A critical challeng…
…
continue reading

1
Episode 1 - The Protocol Paradox in Cryptography and System Security
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:54This episode dives into the Protocol Paradox, which states that the security of systems built on the mathematical bedrock of cryptography is constantly undermined by flaws in the implementation and surrounding processes. Cryptographic algorithms are theoretically strong because they rely on computationally hard math problems, but successful attacks…
…
continue reading

1
Trailer - Secure Math Collapses in the Real World
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04This episode explores the significant gap between the theoretical security of cryptography, based on complex mathematics like modular arithmetic and computationally hard problems, and the messy reality of real-world digital security. Cryptographic algorithms are tested against theoretical attacks, aiming to make it mathematically impossible to reve…
…
continue reading

1
Cybercrime Wire For Oct. 11-12, 2025. Weekend Update. WCYB Digital Radio.
1:02
1:02
Play later
Play later
Lists
Like
Liked
1:02The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
The Role and Evolution of Virtual CISOs with Craig Taylor
51:54
51:54
Play later
Play later
Lists
Like
Liked
51:54In this episode of Cybersecurity Today, Jim hosts Craig Taylor, a seasoned virtual Chief Information Security Officer (vCISO) with over 25 years of experience. They discuss the evolution and significance of the vCISO role, Taylor's career path, and the founding of his company, Cyber Hoot, which provides cybersecurity education and vCISO services. T…
…
continue reading

1
End to the war in Gaza? Revolving door of French PMs, Nobel Peace Prize
45:07
45:07
Play later
Play later
Lists
Like
Liked
45:07In the week that marked the second anniversary of the Gaza war and saw a breakthrough in peace talks. A ceasefire was agreed on Thursday, which should mean the imminent releasing of the 48 hostages who are still held by Hamas, in exchange for almost 2000 Palestinian prisoners. Israeli troops are also expected to pull back of Israeli troops to an ag…
…
continue reading

1
Ransomware Minute. Job Shop Data Breach Exposes Sensitive Info. Scott Schober, WCYB Digital Radio
2:54
2:54
Play later
Play later
Lists
Like
Liked
2:54The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.By Cybercrime Magazine
…
continue reading
This week we discuss Bill Mastro, who helped build the multi-million dollar industry of sports memorabilia trading with his auction site Mastro Auctions. However, he also helped to build the massive corruption that lurked behind these sites by cheating the buyers and hawking fake merchandise before eventually striking out.…
…
continue reading

1
Cybercrime Wire For Oct. 10, 2025. Lottery Tech Provider Hit By Data Breach. WCYB Digital Radio.
1:25
1:25
Play later
Play later
Lists
Like
Liked
1:25The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading

1
Cybercrime News For Oct. 10, 2025. Hackers Use Zendesk Breach to Extort Discord. WCYB Digital Radio.
2:33
2:33
Play later
Play later
Lists
Like
Liked
2:33The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading

1
Quantum Minute. Virtual Classroom For Aspiring Quantum Professionals. Sponsored by Applied Quantum.
1:37
1:37
Play later
Play later
Lists
Like
Liked
1:37UK quantum infrastructure company Q-CTRL has partnered with the Estonia-based QUCAN global computing center to offer a global virtual classroom experience for aspiring quantum professionals through the QC101 program. This collaboration combines Q-CTRL's interactive quantum education platform, Black Opal, with live expert instruction from prestigiou…
…
continue reading

1
Regulators In the Waiting Room: What to Do When Health Care Investigations Begin
43:38
43:38
Play later
Play later
Lists
Like
Liked
43:38Miriam Swedlow, Associate, Davis Wright Tremaine LLP, Ryan Belton, Senior Counsel, PeaceHealth, and Kris Deyerle, General Counsel, Confluence Health, explore the tools the government uses to initiate and conduct potential enforcement actions and best practices for health care organizations to mitigate risk. They cover audits, subpoenas, civil inves…
…
continue reading

1
Weekly Cyber News Rollup, October 10th, 2025
17:19
17:19
Play later
Play later
Lists
Like
Liked
17:19This week’s wrap cuts through the noise. We break down North Korea’s multi-billion-dollar crypto theft problem, the Salesforce-adjacent extortion wave targeting customer exports, and active exploitation against Oracle E-Business Suite. We also cover a critical Redis flaw with app-wide blast radius, Cisco edge firewall abuse with public exploit code…
…
continue reading
This is today’s cyber news for October 10th, 2025. Today’s brief leads with SonicWall confirming its cloud firewall backups were accessed for all users of its backup service—turning configuration data into a roadmap for attackers. We also cover an actively exploited WordPress authentication bypass, an Android spyware family impersonating WhatsApp a…
…
continue reading

1
Scam compounds, sewing patterns and stolen dimes
10:37
10:37
Play later
Play later
Lists
Like
Liked
10:37As Vice Week wraps up here at The Indicator, we wanted to take a slightly different perspective on the evolving business of crime and take a look at TRUE crime. As in the genre. Because look, people are obsessed with it! Today on the show, our hosts favorite pieces of true crime content. Darian Woods: The Economist’s Scam Inc. Wailin Wong: Wednesda…
…
continue reading

1
Teenage Ransomware Arrest In Day Care Ransom
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Cybersecurity Today: Teenage Ransomware Arrests, GoAnywhere Critical Flaw, and Google AI Vulnerability In this episode of Cybersecurity Today, hosted by Jim Love, two teenagers were arrested in London for a ransomware attack on Kiddo International preschools, involving child data extortion. The show discusses a critical vulnerability in GoAnywhere …
…
continue reading

1
Aussie fined over deepfakes, Scattered Lapsus$ Hunters goes wild, and Asahi hacker revealed
47:03
47:03
Play later
Play later
Lists
Like
Liked
47:03In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth walk through the latest in AI news, with Deloitte paying money back to the NSW government for an AI report, hacking news, with a deep dive into just who Scattered Lapsus$ Hunters might be, and the Qilin ransomware gang taking responsibility for the Asahi hack. Croft and…
…
continue reading
Seyfarth Partner and former Federal Prosecutor Leon Rodriguez explains the Trump administration’s H-1B visas and their intended policy. Social Media Victims Law Center Founding Attorney Matthew Bergman returns to discuss the lawsuits involving AI chatbots coaching teen suicides. Krill Strategies Principal and Founder Patrick Krill joins Legal Face-…
…
continue reading

1
The Once and Future Rules of Cybersecurity | A Black Hat SecTor 2025 Conversation with HD Moore | On Location Coverage with Sean Martin and Marco Ciappelli
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine’s on-location event coverage, Moore breaks …
…
continue reading

1
Labour’s Bridget Phillipson on Gaza, child poverty and the deputy leadership race
26:12
26:12
Play later
Play later
Lists
Like
Liked
26:12Pippa Crerar and Kiran Stacey speak to the education secretary and Labour deputy leadership candidate Bridget Phillipson about the plan for a ceasefire in Gaza, as well as why she is pushing the prime minister and chancellor to get rid of the two-child limit on benefits. Plus, she explains why she believes she is the best candidate to become the ne…
…
continue reading

1
Exposing America’s First Cyber Spy. His Investigation Into Robert Hanssen. Eric O’Neill, Author.
16:23
16:23
Play later
Play later
Lists
Like
Liked
16:23Eric O'Neill is the author of "Gray Day: My Undercover Mission to Expose America’s First Cyber Spy," which details his undercover role in investigating Robert Hanssen, a senior FBI agent who was secretly spying for Russia. In this episode, O'Neill joins host Scott Schober to discuss the investigation, how he ultimately took down Hanssen, and more. …
…
continue reading

1
REPLAY: Dame Helen Mirren 'It's sad Kurt Cobain never got to see GPS' | Brave New World
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12On this replay preview of Brave New World, Evgeny Lebedev is in conversation with the Oscar-winning actor, Dame Helen Mirren. Now, this is a bit of a break from the usual guests on Tech & Science Daily, but in this wide ranging conversation Evgeny and Dame Helen discuss everything from the evolution of technology, ageing, to the contemporary media …
…
continue reading

1
Cybercrime Wire For Oct. 9, 2025. Radio Maker BK Reports Breach. WCYB Digital Radio.
1:24
1:24
Play later
Play later
Lists
Like
Liked
1:24The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
“Flow State” isn’t just a nod to the psychological zone of peak focus — it reflects Yuriy Sibere’s entire approach to life and work. From tinkering with a ZX Spectrum in Ukraine to managing cross-functional security products at ThreatLocker, Yuriy embodies adaptability, alignment, and precision amid complexity. He thrives where vision meets impleme…
…
continue reading

1
Cybercrime News For Oct. 9, 2025. Salesforce Denies Hacker Extortion. WCYB Digital Radio.
2:30
2:30
Play later
Play later
Lists
Like
Liked
2:30The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading