Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
InfoSec Podcasts
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. Join us live on YouTube, Monday's at 4:30PM ET
…
continue reading
Hosted by Accenture CISO Kris Burkhardt, the InfoSec Beat podcast is intended for cybersecurity and information security executives, and dives into current trends and tactics. In each episode, Kris and Accenture colleagues from InfoSec, IT and go-to-market teams discuss what it takes to keep client, business partner and enterprise data secure.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Weekly Information Security News. Stay up to date on what’s going on in the InfoSec world in about 40 minutes. Join us for InfoSec news and stay for some friendly banter, guest interviews, gadget reviews, tech interview tips, and hilarious dad jokes! New episodes every Monday.
…
continue reading
SecTools Podcast is a series of audio podcast featuring free or opensource tool authors from Information Security industry, sharing their interesting experience on developing and maintaining amazing tools for the security community. Hosted by Sanoop Thomas (s4n7h0) https://infoseccampus.com https://twitter.com/InfoSecCampus
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Join in on weekly podcasts that aim to illuminate how AI transforms cybersecurity—exploring emerging threats, tools, and trends—while equipping viewers with knowledge they can use practically (e.g., for secure coding or business risk mitigation).
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Hey everyone, Welcome to the Infosec Prep Podcast. We aim to bring you weekly Infosec news and bring some people on to interview! Join our discord at https://discord.gg/9xTqKTY
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
30-Day InfoSec, a monthly information security recap show for the latest news, stories, and happenings from around the cybersecurity community.
…
continue reading
Welcome to the Ctrl-Alt-Secure podcast, your guide to navigating the ever-changing landscape of cybersecurity. Join us as we delve into the latest trends, threats, and innovations shaping the infosec space.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
…
continue reading
Cyber Daily News is a fast, no nonsense cybersecurity podcast designed for professionals, builders, and anyone who wants to stay ahead of real world threats. Each episode delivers a concise breakdown of the most important cyber incidents, vulnerabilities, exploits, and security trends shaping the day. You will hear clear explanations of breaches, ransomware campaigns, zero day vulnerabilities, nation state activity, and major security advisories, without hype or filler. The focus is on what ...
…
continue reading
CYBR.HAK.CAST is the official podcast of CYBR.HAK.CON., where cybersecurity professionals, hackers, and thought leaders come together to share their stories, insights, and lessons from the front lines of the infosec world. Hosted by Michael Farnum and Phillip Wylie, the show dives deep into topics shaping the modern cybersecurity landscape - from red teaming and ethical hacking to threat intelligence, blue team tactics, and the human side of security. Each episode brings candid conversations ...
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
…
continue reading
Wait Just an Infosec is a weekly hour-long cybersecurity-focused broadcast produced by SANS Institute, streamed live on LinkedIn and YouTube, Tuesdays at 10am ET and available to listen to in podcast format on Wednesdays. Our hosts and invited guests are a rotating lineup of SANS faculty members and experts across all infosec domains – some of the brightest minds in cybersecurity, with decades of experience as practitioners. Each week will offer thought-provoking, rich content for a full ran ...
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
This "purple team" podcast will examine a mix of offensive "red team" and defensive "blue team" security issues and strategies. Your hosts, Darryl MacLeod and Grant Boudreau, will focus on stories, news, people, and tech from the East Coast of Canada. There is an abundance of talented people on the East Coast, and we want to showcase their abilities to the InfoSec world!
…
continue reading
Aimed at CISOs, CTOs, CROs and other global security professionals, the ISF Analyst Insight Podcast goes in-depth on the hottest topics in information security, and the extensive research conducted by the Information Security Forum, the leading authority on cyber, information security, and risk management. Drawing from our network of over 18,000 security professionals, our analysts hand selects active security professionals from ISF Member organisations to discuss how the implementation of I ...
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
…
continue reading
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
…
continue reading
1
Defensive Security Podcast Episode 334
1:07:21
1:07:21
Play later
Play later
Lists
Like
Liked
1:07:21Want to be the first to hear our episodes each week? Become a Patreon donor here. Merry Christmas and Happy Holidays! Links to this week’s stories: https://krebsonsecurity.com/2025/12/most-parked-domains-now-serving-malicious-content/ https://thehackernews.com/2025/12/russia-linked-hackers-use-microsoft-365.html?m=1 https://cybersecuritynews.com/am…
…
continue reading
1
Hot Take Predictions for Next Year – 2025-12-15
1:02:11
1:02:11
Play later
Play later
Lists
Like
Liked
1:02:11Join us LIVE on Mondays, 4:30pm EST. A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. https://www.youtube.com/@BlackHillsInformationSecurity Chat with us on Discord! - https://discord.gg/bhis 🔴live-chat 🔗 Register for FREE webcasts, summits, and workshops - ht…
…
continue reading
A critical issue is emerging as organizations embed AI agents into workflows: securing agentic AI requires a very different approach to security. In this episode, Accenture CISO Kris Burkhardt breaks down what's at stake with Daniel Kendzior who leads Security AI Reinvention for Accenture Cybersecurity and Wei Liu who leads Cyber Strategy, Risk, an…
…
continue reading
1
A city goes dark as cyber questions multiply.
24:15
24:15
Play later
Play later
Lists
Like
Liked
24:15Venezuela blames physical attacks for blackout as cyber questions swirl. Trump reverses a chip technology sale over national security issues, and removes sanctions linked to Predator spyware. Greek officials say an air traffic shutdown was not a cyberattack. The U.S. Army launches a new officer specialization in AI and machine learning. The Kimwolf…
…
continue reading
Cyber Daily News January 5, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Critical IBM API Connect Vulnerability Enables Authentication Bypasshttps://thecyberexpress.com/ibm-api-connect-security-vulnerability/- Sedgwick discloses data breach after TridentLocker…
…
continue reading
1
Palo Alto AI warning, Resecurity hack fiasco, Christmas ColdFusion attack
7:32
7:32
Play later
Play later
Lists
Like
Liked
7:32Palo Alto Networks boss calls AI agents biggest insider threat Hackers claim Resecurity hack, firm says it was a honeypot Thousands of ColdFusion exploit attempts spotted during Christmas holiday Huge thanks to our sponsor, Hoxhunt A small tip for CISOs: if you're unsure whether your security training is actually reducing phishing risk, check out w…
…
continue reading
1
Episode 236 - Adult Website Breached, Rainbow Six Goes Full Oprah, Meal Tracking App, 2025 Year in Search
1:02:56
1:02:56
Play later
Play later
Lists
Like
Liked
1:02:56Welcome to this week's episode of the PEBCAK Podcast! We’ve got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Adult…
…
continue reading
1
Your Next Hire Might Be a Deepfake With Brian Long CEO of Adaptive Security
44:24
44:24
Play later
Play later
Lists
Like
Liked
44:24Send us a text In this episode, Joe sits down with Brian Long, CEO of Adaptive Security, to delve into the evolving landscape of cybersecurity, focusing on the alarming rise of AI-powered social engineering attacks. Brian shares insights from his extensive experience, highlighting the sophisticated tactics used by attackers, including deep fake tec…
…
continue reading
1
Your ChatGPT Answers Are About to Get Sponsored
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42This week's Surveillance Report covers OpenAI's plan to prioritize sponsored content in ChatGPT answers, what to do if you're targeted by government spyware, Meta's secret playbook for avoiding scammer accountability, and more! This week's Surveillance Report covers: - OpenAI prioritizing new monetization models with obvious problems - How to see i…
…
continue reading
Cyber Daily News January 4, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- French authorities investigate AI ‘undressing’ deepfakes on Xhttps://securityaffairs.com/186460/ai/french-authorities-investigate-ai-undressing-deepfakes-on-x.html- President Trump blocks…
…
continue reading
1
Michael Scott: A team of humble intellects. [Information security] [Career Notes]
9:37
9:37
Play later
Play later
Lists
Like
Liked
9:37Please enjoy this encore of Career Notes. Chief Information Security Officer at Immuta, Michael Scott shares his story from working at a forgotten internet service provider to leading the security fight for major food chain restaurants. Michael explains how the different roles at various companies he has worked with paved his way to where he is now…
…
continue reading
1
It Fractured, Then Rebuilt Itself: The CISO Role Changed More in Five Years Than Ever Before, Setting the Stage for 2026 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9 ...
15:42
15:42
Play later
Play later
Lists
Like
Liked
15:42Across dozens of conversations centered on the CISO experience, one reality keeps surfacing: the role no longer exists to protect systems in isolation. It exists to protect the business itself. Today’s CISO operates at the intersection of operational risk, executive decision-making, and organizational trust. The responsibility is not just to identi…
…
continue reading
Cyber Daily News January 3, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Covenant Health data breach after ransomware attack impacted over 478,000 peoplehttps://securityaffairs.com/186439/data-breach/covenant-health-data-breach-after-ransomware-attack-impacted…
…
continue reading
While our team is out on winter break, please enjoy this episode of Research Saturday. Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishin…
…
continue reading
1
A special mailbag episode with book recommendations
3:01:15
3:01:15
Play later
Play later
Lists
Like
Liked
3:01:15(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 79: We cover MongoBleed (CVE‑2025‑14847), exposed MongoDB deployments, and the sad realization that zero-day attacks are a normal, ev…
…
continue reading
After sharing a recent story about how a phishing campaign went south, I heard feedback from a lot of you. You either commiserated with my story, told me I wussed out, and/or had a difficult story of your own to share. So I thought I'd keep this momentum up and share another story of fail with you – this time about a Web app pentest that went south…
…
continue reading
Cyber Daily News January 2, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- China’s New Cybersecurity Law Is Here — And It Changes Everything for Businesseshttps://thecyberexpress.com/china-cybersecurity-law-2026/- IBM warns of critical API Connect bug enabling r…
…
continue reading
1
NYC Inauguration bans Flipper Zero, UK taxes crypto, Finland seizes ship
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15NYC mayoral inauguration bans Flipper Zero and Raspberry Pi devices Crypto must now share account details with UK tax officials Finland seizes suspected cable sabotage ship Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to impleme…
…
continue reading
While our team is out on winter break, please enjoy this episode of Cyber Things from our partners at Armis. Welcome to Episode 2 of Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire in an homage to Stranger Things. Host Rebecca Cradick, VP of Global Communications at Armis, is joined by Curtis Simpson…
…
continue reading
1
Five Patterns From 152 Episodes That Reshaped How I Think About Security, Technology, and Work Heading into 2026 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9
13:26
13:26
Play later
Play later
Lists
Like
Liked
13:26Across 152 conversations this year, a set of recurring patterns kept surfacing, regardless of whether the discussion focused on application security, software supply chain risk, AI systems, or creative work. The industries varied. The roles varied. The challenges did not. One theme rises above the rest: visibility remains the foundation of everythi…
…
continue reading
Cyber Daily News January 1, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Shai-Hulud Supply Chain Attack Drained $8.5 Million from Trust Wallet Usershttps://thecyberexpress.com/shai-hulud-attack-trust-wallet/- Singapore CSA warns of maximun severity SmarterMail…
…
continue reading
1
Unleash Protocol hackers drain millions, DarkSpectre campaigns exposed, Shai-Hulud attack led Trust Wallet heist
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14Hackers drain millions from Unleash Protocol DarkSpectre campaigns exposed Shai-Hulud attack led Trust Wallet heist Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us …
…
continue reading
1
Confronting China’s Expanding Cyber Threats [Threat Vector]
22:55
22:55
Play later
Play later
Lists
Like
Liked
22:55While our team is out on winter break, please enjoy this episode of Threat Vector from our partners at Palo Alto Networks. In this episode of Threat Vector, host David Moulton talks with Wendi Whitmore, Chief Security Intelligence Officer at Palo Alto Networks, about the increasing scale of China-linked cyber threats and the vulnerabilities in outd…
…
continue reading
1
End-of-Year Wrap: 2025 Threat Trends and Bold Predictions for 2026 🎆
7:14
7:14
Play later
Play later
Lists
Like
Liked
7:14Got a question or comment? Message us here! In this special end-of-year SOC Brief, Andrew breaks down the biggest threat-actor and ransomware trends that shaped 2025, and what cybersecurity teams should be preparing for in 2026. From AI-powered ransomware and supply-chain attacks to the growing blur between nation-state operations and cybercrime, t…
…
continue reading
Cyber Daily News December 31, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Singapore CSA Warns of Critical SmarterMail Flaw Enabling Unauthenticated Remote Code Executionhttps://thecyberexpress.com/csa-alert-cve-2025-52691/- MongoBleed (CVE-2025-14847): the US…
…
continue reading
1
European Space Agency Breach Data for Sale, US Cybersecurity Experts Plead Guilty, Trust Wallet $8.5M Heist
20:01
20:01
Play later
Play later
Lists
Like
Liked
20:01🎙️ European Space Agency Breach Data for Sale, US Cybersecurity Experts Plead Guilty, Trust Wallet $8.5M Heist 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1036: Today's episode will discuss the latest news: Microsoft Azure Back Up After Global Meltdown and Service…
…
continue reading
1
Silver Fox targets Indian users, Mustang Panda deploys ToneShell, will prompt injection ever be 'solved'?
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25Silver Fox targets Indian users Mustang Panda deploys ToneShell Will prompt injection ever be 'solved'? Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in…
…
continue reading
1
Lorrie Cranor: Why Security Fails Real People [Afternoon Cyber Tea]
23:45
23:45
Play later
Play later
Lists
Like
Liked
23:45While our team is out on winter break, please enjoy this episode of Afternoon Cyber Tea with Ann Johnson from our partners at Microsoft Security. Dr. Lorrie Cranor, Director of the CyLab Security and Privacy Institute at Carnegie Mellon University joins Ann Johnson, Corporate Vice President, Microsoft, on this week's episode of Afternoon Cyber Tea …
…
continue reading
Cyber Daily News December 30, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Coupang Breach Suspect Tried to Hide Evidence by Throwing Laptop in Riverhttps://thecyberexpress.com/coupang-breach-suspect-threw-laptop-in-river/- Lithuanian suspect arrested over KMSA…
…
continue reading
1
Condé Nast 40M Records Stolen, Trust Wallet $7M Crypto Theft Hits 2,596 Wallets, and Korean Air Falls to Oracle EBS Campaign
17:04
17:04
Play later
Play later
Lists
Like
Liked
17:04🎙️ Conde Nast 40M Records Stolen, Trust Wallet $7M Crypto Theft 2,596 Wallets, Korean Air Oracle Hack 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1035: Today's episode will discuss the latest news: Former Coinbase Support Agent Arrested for Helping Hackers Hacker …
…
continue reading
1
DtSR Episode 686 - An Unexpected Windows XP Conversation
49:30
49:30
Play later
Play later
Lists
Like
Liked
49:30TL;DR: On today's pod, Rob Allen of ThreatLocker makes his triumphant return to derail us straight into a conversation about legacy systems and why he's still supporting WindowsXP. Right, you read that right. A great conversation ensued, and I'm glad we were able to record this one. Enjoy. From us to you, thank you for following along this year, an…
…
continue reading
1
Midnight Blizzard | How Russian Intelligence Breached Microsoft - w/ Alyssa Robinson, CISO @ HubSpot
32:38
32:38
Play later
Play later
Lists
Like
Liked
32:38Midnight Blizzard | How Russian Intelligence Breached Microsoft With guest CISO Co-Host Alyssa Robinson, CISO at HubSpot In late 2023, a Russian state-sponsored threat actor known as Midnight Blizzard (also called NOBELIUM and widely associated with APT29) began probing Microsoft the old-fashioned way: password spraying. No zero-day. No smash-and-g…
…
continue reading
1
The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report [Microsoft Threat Intelligence Podcast]
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29While our team is out on winter break, please enjoy this episode of The Microsoft Threat Intelligence Podcast from our partners at Microsoft. In this episode of the Microsoft Threat Intelligence Podcast, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a co…
…
continue reading
1
Coupang recovers laptop in river, Trust Wallet reports 2k+ wallets drained, Sax discloses 2024 data breach
6:46
6:46
Play later
Play later
Lists
Like
Liked
6:46Coupang recovers laptop allegedly thrown into river Trust Wallet reports 2k+ wallets drained Sax discloses 2024 data breach Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. …
…
continue reading
1
Season finale: Leading security in a brave new world. [CISOP]
43:59
43:59
Play later
Play later
Lists
Like
Liked
43:59In the season finale of CSO Perspectives, Ethan Cook and Kim Jones reflect on a season of conversations exploring what it means to lead security in a rapidly evolving “brave new world.” From the realities behind AI hype and the slow-burn impact of quantum computing to the business forces shaping cybersecurity innovation, they revisit key lessons an…
…
continue reading
1
The Department of Know: year in review and predictions
34:47
34:47
Play later
Play later
Lists
Like
Liked
34:47Link to episode page To end off a tumultuous year, our final Department of Know episode of 2025 features a chat between host Rich Stroffolino and producer Steve Prentice. Join them as they chat about the biggest stories of 2025, the trends we are seeing, and what we can expect in the new year. Thanks to our show sponsor, ThreatLocker Want real Zero…
…
continue reading
1
Unsecurity Episode 254: Journey to Becoming A CISO with Ted Peterson
33:48
33:48
Play later
Play later
Lists
Like
Liked
33:48A slow-rolling holiday episode featuring CISO at DataSite, Ted Peterson! Transitioning from a Director Role, Ted shares his journey to the CISO title and how his unique background informs his work approach. Tune in for insights on: Realities to navigating organizational leadership as a CISO Importance of diverse perspectives and backgrounds in the …
…
continue reading
Cyber Daily News December 29, 2025Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Critical ‘MongoBleed’ Flaw Exploited in the Wild to Leak Database Secretshttps://thecyberexpress.com/critical-mongobleed-flaw-exploited-in-the-wild/- Shai-Hulud Returns with ‘Golden Pat…
…
continue reading
1
Iranian Hacker Claims It Hacked Phone of Israeli PM's Chief of Staff, Hacker Claims to Leak Wired Database with 2.3 Million Records, LastPass 2022 Breach Led to Consequences, Pro-Russian Claim Cyberattack ...
16:16
16:16
Play later
Play later
Lists
Like
Liked
16:16🎙️ Iran Hackers Claim Israeli PM Staff Phone Hack, Wired Database 2.3M Records Leaked, LastPass 2022 Breach 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1034: Today's episode will discuss the latest news: Pro-Russian Hackers Claim Cyberattack on French Postal Servi…
…
continue reading
1
Rainbow Six Siege breach, backup generators for AI, LastPass reverberations
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Rainbow Six Siege suffers breach, gamers go shopping Diesel generators and aircraft engines in high demand to power AI LastPass 2022 breach reverberates through crypto world Huge thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implem…
…
continue reading
1
The Hidden Risk in Your Stack [Data Security Decoded]
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12While our team is out on winter break, please enjoy this episode of Data Security Decoded from our partners at Rubrik. In this episode of Data Security Decoded, host Caleb Tolin sits down with Hayden Smith, CEO of Hunted Labs, as he breaks down how software supply chain attacks really work, why open source dependencies create unseen exposure, and w…
…
continue reading
AI is undoubtedly the technology of the year for hacks and scams. While scammers are busy using AI to make scams more convincing, scam baiters are fighting back with ingenious grandma-style AIs that keep scammers busy for hours on end. There have also been some spectacular busts of scam centers. What’s next, AI scammers chatting with AI scam baiter…
…
continue reading