Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Infosec Community Podcasts
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
30-Day InfoSec, a monthly information security recap show for the latest news, stories, and happenings from around the cybersecurity community.
…
continue reading
Voices of the Vigilant is where bold conversations meet unflinching purpose. Hosted by Jess Vachon, cybersecurity leader, Buddhist minister, and founder of Vigilant Violet LLC, this podcast explores the front lines of digital resilience, ethical leadership, and equitable transformation in tech. Through authentic dialogue with boundary-pushers, disruptors, and unsung heroes, each episode dives deep into the human side of cybersecurity—where strategy meets values, and innovation is grounded in ...
…
continue reading
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
…
continue reading
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
SecTools Podcast is a series of audio podcast featuring free or opensource tool authors from Information Security industry, sharing their interesting experience on developing and maintaining amazing tools for the security community. Hosted by Sanoop Thomas (s4n7h0) https://infoseccampus.com https://twitter.com/InfoSecCampus
…
continue reading
CyberSpeaksLIVE is an InfoSec podcast series hosted by Duncan McAlynn (@infosecwar) and his special guest co-hosts, where YOU get to participate in the discussions with full video and audio. Following the live recording, we add the audio-only stream into our podcast feed for our awesome subscribers. CyberSpeaksLIVE gives YOU, the InfoSec community, a voice that can be heard around the world! Follow us on Twitter for upcoming guests announcements and live recording invites, @cyberspeakslive.
…
continue reading
Welcome to Security Happy Hour, where we interview new and established members of the cybersecurity community. In this show we cover where guests have come from and where they want to go, as well as current events and other security related items.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Information Security, InfoSec, CyberSec, Cyber, Security, whatever you call it, we talk about it! From mobiles and desktops to data centers and the cloud, Purple Squad Security is here to help and give back to our community of information security professionals. We cover security topics for the red team, blue team, purple team, whatever team! We are a community of professionals, and this is one man's attempt to give back. CISSP, CISM, CEH credits can be obtained here! Also happy to provide i ...
…
continue reading
Tripwire's cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire's VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
…
continue reading
Inspirational stories of black women in tech. Support this podcast: https://podcasters.spotify.com/pod/show/frauvis/support
…
continue reading
1
Mapping the InfoSec Community: Building InfoSecMap & Global Security Events – Martín Villalba
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04In this episode of the Security Repo Podcast, we sit down with Martín Villalba, founder of InfoSecMap, to explore how his platform is transforming the way InfoSec professionals discover global events, communities, and CFPs. We dive into the origin story of InfoSecMap, its recent growth surge, and its strategic partnerships with organizations like O…
…
continue reading
1
Why Technical CISOs Matter and How AI Is Shaping Security Ops - David Cross on Leading Security
21:09
21:09
Play later
Play later
Lists
Like
Liked
21:09In this episode of the Security Repo Podcast, David Cross, CISO at Atlassian and former Microsoft, Google, and Oracle security leader, shares his journey from Navy electronic warfare to global cybersecurity leadership. He offers hard-won insights on breaking into the industry, the evolving demands of the CISO role, and the practical impacts of AI o…
…
continue reading
1
The Rise of Citizen OSINT, and What to Do About It
42:43
42:43
Play later
Play later
Lists
Like
Liked
42:43In this episode, hosts Robert Vamosi and AJ Nash engage with Neil Ysart, a seasoned expert in cyber investigations and open source intelligence (OSINT). They discuss the Coalition of Cyber Investigators, its role in promoting OSINT, and the importance of establishing standards in the field. The conversation delves into the challenges and risks asso…
…
continue reading
1
Dartmouth College Data Breach, FBI Cybercriminals $262M Bank Fraud, Russia Disrupts National Alert
16:49
16:49
Play later
Play later
Lists
Like
Liked
16:49🎙️ Dartmouth College Data Breach, FBI Cybercriminals $262M Bank Fraud, Russia Disrupts National Alert 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1018: Today's episode will discuss the latest news: · ClickFix Attack Uses Fake Windows Update Screen to Push Malware …
…
continue reading
1
The Death of Passwords: The Future of Authentication
55:19
55:19
Play later
Play later
Lists
Like
Liked
55:19Is passwordless authentication finally ready for prime time, or are we just replacing one set of problems with another? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I'm Jim and in this episode, we're tackling one of the oldest chall…
…
continue reading
1
A Practical Look at Incident Handling: How a Sunday Night Bug Bounty Email Triggered a Full Investigation | A Screenly Brand Spotlight Conversation with Co-founder of Screenly, Viktor Petersson
17:48
17:48
Play later
Play later
Lists
Like
Liked
17:48This episode focuses on a security incident that prompts an honest discussion about transparency, preparedness, and the importance of strong processes. Sean Martin speaks with Viktor Petersson, Founder and CEO of Screenly, who shares how his team approaches digital signage security and how a recent alert from their bug bounty program helped validat…
…
continue reading
1
Inside the Economics That Shape Modern Cybersecurity Innovations: How the Cybersecurity Startup Engine Really Works | A Conversation with Investor and Author, Ross Haleliuk | Redefining CyberSecurity with ...
47:10
47:10
Play later
Play later
Lists
Like
Liked
47:10⬥EPISODE NOTES⬥ Understanding the Startup Engine Behind Cybersecurity This episode brings Sean Martin together with Ross Haleliuk, author, investor, product leader, and creator of Venture Insecurity, for a candid look at the forces shaping cybersecurity startups today. Ross shares how his decade of product leadership and long involvement in the sec…
…
continue reading
1
Harvard University Data Breach Alumni Donors, Mazda No Oracle Leak, Situsame Exposes 18M Properties
16:35
16:35
Play later
Play later
Lists
Like
Liked
16:35🎙️ Harvard University Data Breach Alumni Donors, Mazda No Oracle Leak, Situsame Exposes 18M Properties 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1017: Today's episode will discuss the latest news: · Hackers Knock Out Systems at Russia Operated Post in Ukraine · …
…
continue reading
1
Why Architect for Human Error When We Can Make People Feel Really Bad About It?
39:23
39:23
Play later
Play later
Lists
Like
Liked
39:23All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is Richard Rushing, CISO, Motorola Mobility. In this episode Mindset over tools When hygiene becomes risk Systems for actual humans Conversations over compliance Huge than…
…
continue reading
1
Iberia Discloses Customer Data Leak After Breach, CrowdStrike Catches Insider Feeding Threat Intelligence, Oracle Identity Manager Flaw Exploited as Zero-Day, Grafana SSIM Flaw
17:06
17:06
Play later
Play later
Lists
Like
Liked
17:06🎙️ Iberia Customer Data Leak After Vendor Breach, CrowdStrike Insider Feeding, Oracle Identity Zero-Day 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1016: Today's episode will discuss the latest news: · Cleveland County Oklahoma Attleboro Mass Law Enforcement Hit b…
…
continue reading
1
Fear into Fluency: Building Real Cyber Literacy
42:27
42:27
Play later
Play later
Lists
Like
Liked
42:27Panic is not a security strategy. We sit down with Craig Taylor, co-founder of Cyberhoot and longtime virtual CISO, to unpack a people-first blueprint that replaces shame and fear with positive reinforcement, practical safeguards, and repeatable habits. Craig draws on his psychology background to explain why short, gamified exercises build muscle m…
…
continue reading
1
Russia VAK Cyberattack Causes Widespread Outages, Amazon Details Iran Cyber-Enabled Kinetic Attacks Linking Digital Spying, Bulletproof Hosting Service Harbors Ransomware as a Service
16:32
16:32
Play later
Play later
Lists
Like
Liked
16:32🎙️ Russia VAK Cyberattack Outages, Amazon Iran Cyber-Enabled Kinetic Attacks, Bulletproof Hosting 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1015: Today's episode will discuss the latest news: · China Aligned Threat Actor Espionage Network Targets Devices Globall…
…
continue reading
1
Beg Bounty: The New Wave of Unrequested Bug Claims and What They Mean | A Conversation with Casey Ellis | Redefining CyberSecurity with Sean Martin
36:25
36:25
Play later
Play later
Lists
Like
Liked
36:25⬥EPISODE NOTES⬥ Understanding Beg Bounties and Their Growing Impact This episode examines an issue that many organizations have begun to notice, yet often do not know how to interpret. Sean Martin is joined by Casey Ellis, Founder of Bugcrowd and Co-Founder of disclose.io, to break down what a “beg bounty” is, why it is increasing, and how security…
…
continue reading
1
Identity Risks in Email: Your Inbox Might Be Lying About You – Amy Devine
24:18
24:18
Play later
Play later
Lists
Like
Liked
24:18In this episode of the Security Repo Podcast, Dwayne McDaniel sits down with Amy Devine, a systems architect who transitioned from embedded wireless systems to cybersecurity. Amy shares the eye-opening story behind her Blue Team Con talk on how misdirected emails exposed sensitive personal data and what that means for digital identity. The conversa…
…
continue reading
1
LG Energy Solution Ransomware Incident Hits Battery Maker Operations, Malware Backdoors Linked to Iran Affecting 30K Devices, Congressional Budget Office Director Testifies Hackers Expelled Swiftly
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39🎙️ Major Battery Maker Ransomware, Iran Backdoors 30K Systems, Crypto Mining Ray Attack 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1014: Today's episode will discuss the latest news: · Security Community Aims to Reach Chinese Hackers via LinkedIn for Dialogue · C…
…
continue reading
1
DoorDash Says Personal Information Stolen in Data Breach, PA AG Office Data Breach Sends Notifications, Eurofiber France Warns of Breach, Microsoft Aisuru Botnet Used 500,000 IPs in Ongoing Campaigns
11:12
11:12
Play later
Play later
Lists
Like
Liked
11:12🎙️ DoorDash Personal Info Stolen | Penn AG Office Breach | Microsoft Aisuru Botnet 500K IPs | Chrome Zero-Day 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1013: Today's episode will discuss the latest news: · Iranian Hackers Target Defense and Government Officials …
…
continue reading
1
Are You Implying This Line Graph Isn't a Compelling Cybersecurity Narrative?
41:01
41:01
Play later
Play later
Lists
Like
Liked
41:01All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining them is our sponsored guest, Nathan Hunstad, director, security, Vanta. In this episode: Metrics that matter Testing for real AI as an assistant Intelligence without context Hu…
…
continue reading
1
Anthropic Says Claude AI Powered 90% of Chinese Espionage Campaign, Checkout.com Discloses Data Breach, WaPo Says Nearly 10K Employees Impacted by Hack, JLR Breach Cost $220M
19:00
19:00
Play later
Play later
Lists
Like
Liked
19:00🎙️ Anthropic Claude AI Powered 90% Chinese Espionage, Checkout.com Breach, WaPo 10K Oracle Hack 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1012: Today's episode will discuss the latest news: · Jaguar Land Rover Cyberattack Cost the Company Over $220 Million · Aki…
…
continue reading
1
Synnovis Notifies Data Breach After 2024 Ransomware, Google Sues Chinese Phishing Scams, UK New Cyber Laws
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10🎙️ Synnovis Notifies Data Breach After 2024 Ransomware, Google Sues Chinese Phishing Scams, UK New Cyber Laws 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1011: Today's episode will discuss the latest news: · OpenAI Court Order Sparks NYT Copyright Dispute Over AI …
…
continue reading
In this episode, Michael DeBolt joins Robert Vamosi and AJ Nash to dive into the world of Cyber HUMINT — the application of traditional human intelligence (HUMINT) tradecraft in cyberspace. They discuss how investigators use digital personas (sometimes called “sock puppets”) to infiltrate online threat actor communities, collect intelligence, and e…
…
continue reading
1
From Military Intel to CISO: Navigating Security Leadership in the Age of AI – Darren Desmond
22:54
22:54
Play later
Play later
Lists
Like
Liked
22:54In this episode of the Security Repo Podcast, we sit down with Darren Desmond, a seasoned CISO with a background in UK military intelligence, to unpack his unconventional journey from fish and chips to threat intelligence. He shares how his military forensics experience shaped his InfoSec leadership and dives deep into the evolving role of the CISO…
…
continue reading
1
GlobalLogic Warns 10,000 Employees Data Theft, Asahi Japan Crippled, Adobe Patches 29 Flaws
15:45
15:45
Play later
Play later
Lists
Like
Liked
15:45🎙️ GlobalLogic Warns 10,000 Employees Data Theft, Asahi Japan Crippled, Adobe Patches 29 Flaws 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1010: Today's episode will discuss the latest news: · SAP Patches Critical Flaws in SQL Anywhere Monitor Solution Manager · F…
…
continue reading
1
How to Build Effective & Affordable Cyber Defences for SMEs
48:26
48:26
Play later
Play later
Lists
Like
Liked
48:26How can small and medium businesses protect themselves from cyber threats without spending a fortune or just ticking boxes for compliance? Welcome to Razorwire, the podcast where we share our take on the world of cybersecurity with direct, practical advice for professionals and business owners alike. I’m Jim and in this episode, we’re taking a look…
…
continue reading
1
Nearly 30 Oracle EBS Victims Named, Hackers Exploit Ivanti Flaw, APT37 Abuse Google Find Hub
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08🎙️ Nearly 30 Oracle EBS Victims Named, Hackers Exploit Ivanti Flaw, APT37 Abuse Google Find Hub 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1009: Today's episode will discuss the latest news: · CISA 2015 Information Sharing Law Renewal Bill Ending Shutdown Threat …
…
continue reading
1
Our CISO Certainly Puts the Tool in Multi-Tool (LIVE in LA)
45:26
45:26
Play later
Play later
Lists
Like
Liked
45:26All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Jeff Steadman, deputy CISO, Corning Incorporated. Joining them is Quincey Collins, CSO, Sheppard Mullin. This episode was recorded live at the ISSA LA Summit in Santa Monica, California. In this episode: The foundational debat…
…
continue reading
1
Nevada Ransomware Autopsy Reveals $1.3M Recovery, CBO Breached by Nation-State, and Samsung Zero-Day Spyware Campaign
16:54
16:54
Play later
Play later
Lists
Like
Liked
16:54🎙️ Nevada Ransomware Traced to Malware Developer, CBO Cyberattack, Samsung Landfall Android Spyware 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1008: Today's episode will discuss the latest news: · ClickFix Attacks Against macOS Users Evolving with New Techniques …
…
continue reading
1
Calm Under Fire: The Psychology of Thriving in Cybersecurity
40:37
40:37
Play later
Play later
Lists
Like
Liked
40:37Ever wonder why your brain feels sharp at 2 p.m. triaging alerts but foggy by 7 p.m. at home? We sit down with psychologist and behavioral scientist Dr. Sara Rabinovich to unpack the hidden cost of constant vigilance—and the small, evidence-based resets that bring your nervous system back online. Sara works with high-stress sectors like cybersecuri…
…
continue reading
1
Building a Real Security Culture: Why Most AppSec Champion Programs Fall Short | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 5 | A Musing On the Future of Cybersecurity with Sean Martin ...
2:24
2:24
Play later
Play later
Lists
Like
Liked
2:24Most organizations have security champions. Few have a real security culture. In this episode of AppSec Contradictions, Sean Martin explores why AppSec awareness efforts stall, why champion programs struggle to gain traction, and what leaders can do to turn intent into impact. 🔍 In this episode: Why compliance training doesn’t build culture The dat…
…
continue reading
1
Hyundai AutoEver America Breach 4 Drivers, UPenn Data Breach, Marks & Spencer Cyberattack, US Sanctions North Korea
19:06
19:06
Play later
Play later
Lists
Like
Liked
19:06🎙️ Hyundai AutoEver America Breach 4 Drivers, UPenn Data Breach, Marks & Spencer Cyberattack 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1007: Today's episode will discuss the latest news: · China Sentences 5 Myanmar Scam Kingpins to Death in Major Crackdown · Eur…
…
continue reading
1
Bridging the Cybersecurity Divide Between the Haves and Have-Nots: Lessons from Australia’s CISO Community | A Conversation with Andrew Morgan | Redefining CyberSecurity with Sean Martin
52:14
52:14
Play later
Play later
Lists
Like
Liked
52:14⬥GUEST⬥ Andrew Morgan, Chief Information Security Officer | On LinkedIn: https://www.linkedin.com/in/andrewmorgancism/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ The cybersecurity communi…
…
continue reading
1
🎙️ Nikkei Breach, Android Malware Surge, WordPress Exploit, React Native Flaw, and Global Cybercrime Merger
13:42
13:42
Play later
Play later
Lists
Like
Liked
13:42🎙️ Global Software Breaches, Android Apps Turn Malicious, Cybercrime Gangs Merge 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1006: Today's episode will discuss the latest news: · Apache OpenOffice disputes ransomware gang’s data-leak claims · IDF recalls Chinese-m…
…
continue reading
1
🎙️ $120M DeFi Heist, AI API Exploits, Water & Shipping Breaches, Apple Patches, and Cybercrime Indictments
18:07
18:07
Play later
Play later
Lists
Like
Liked
18:07🎙️ $120M DeFi Heist, AI Tools Abused for Attacks, Water & Shipping Systems Breached 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1005: Today's episode will discuss the latest news $120M DeFi Heist and more news below: · Claude AI and OpenAI APIs exploited for data exfiltration · …
…
continue reading
1
I Don't Just Guess About Effectiveness, I Make Educated Guesses!
39:26
39:26
Play later
Play later
Lists
Like
Liked
39:26All links and images can be found on CISO Series. This week's episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis (@csoandy), principal of Duha. Joining us is Sara Madden, CISO, Convera. In this episode: Optimizing for reality, not idealism Engineering governance instead of monitoring compliance When AI finds what humans mi…
…
continue reading
1
🎙️ U.S. Telecom Breach by Nation-State Hackers, China Zero-Day Exploits, FCC Cyber Rollback, and OT Security Guidance 🚨
16:23
16:23
Play later
Play later
Lists
Like
Liked
16:23🎙️ Nation-State Hackers Hit U.S. Telecom, China Exploits Firewalls & Zero-Days, FCC Rolls Back Cyber Rules 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1004: Today's episode will discuss the latest news Major US Telecom Backbone Hacked by Nation-State and more news below: · Unive…
…
continue reading
1
How to Stay Resilient When Cybercrime Becomes Your Competition | A Conversation with Author and Former FBI Agent, Eric O'Niell | Redefining CyberSecurity with Sean Martin
40:24
40:24
Play later
Play later
Lists
Like
Liked
40:24⬥GUEST⬥ Eric O'Neill, Keynote Speaker, Cybersecurity Expert, Spy Hunter, Bestselling Author. Attorney | On Linkedin: https://www.linkedin.com/in/eric-m-oneill/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com …
…
continue reading
1
Canada Hacktivists Breach Water & Energy, Microsoft DNS Outage Azure 365, Chrome 142 Patches 20 Flaws
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47🎙️ Canada Hacktivists Breach Water & Energy, Microsoft DNS Outage Azure 365, Chrome 142 Patches 20 Flaws 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1003: Today's episode will discuss the latest news Canada Hacktivists Breach Water & Energy and more news below: · Microsoft DNS O…
…
continue reading
1
Dealing with AI Slop in OSINT Investigations
57:44
57:44
Play later
Play later
Lists
Like
Liked
57:44In this episode, AJ Nash and Robert Vamosi discuss the challenges posed by misinformation and the rise of AI-generated content. They explore the evolution of journalism, the impact of social media on information consumption, and the importance of critical thinking and media literacy. The conversation also touches on the role of AI in content creati…
…
continue reading
1
Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx
29:34
29:34
Play later
Play later
Lists
Like
Liked
29:34Supply Chain Warfare: CI/CD Threats and Open Source Security with François Proulx In this episode of the Security Repo Podcast, François Proulx, VP of Security Research at Boost Security, discusses the evolving threats in software supply chain security, particularly focusing on attacks targeting CI/CD pipelines. He explains how open source tools li…
…
continue reading
1
Dentsu Data Breach, Schneider Electric Named Victims, Apache Tomcat RCE Flaw, CISA Warnings
18:02
18:02
Play later
Play later
Lists
Like
Liked
18:02🎙️ Dentsu Data Breach, Schneider Electric Named Victims, Apache Tomcat RCE Flaw, CISA Warnings 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1002: Today's episode will discuss the latest news highlighting Dentsu Data Breach and more news below: · Russia-Linked Breaches in Ukraine …
…
continue reading
1
How Cybercriminals are using AI - and How to Defend Against It
57:02
57:02
Play later
Play later
Lists
Like
Liked
57:02What happens when the dark side gets its hands on cutting-edge AI and why might even seasoned defenders find themselves playing catch-up? Welcome back to Razorwire, where I’m joined by Oliver Rochford and Richard Cassidy to discuss how criminals are using AI, what's actually working and how the threat landscape is changing. We explore how adversari…
…
continue reading
1
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 4 | A Musing On the Future of Cybersecurity ...
3:38
3:38
Play later
Play later
Lists
Like
Liked
3:38Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself. This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity. 🔍 In this episode: A 188% surge in malicious open-source packages (Sonatype 2025) 30% of 2024 cyberattacks…
…
continue reading
1
Sweden Power Grid Data Breach, Google Denies Gmail Hack, NK Targets EU Drones
16:24
16:24
Play later
Play later
Lists
Like
Liked
16:24🎙️ Sweden Power Grid Data Breach, Google Denies Gmail Hack, NK Targets EU Drones 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1001: Today's episode will discuss the latest news highlighting Sweden Power Grid Data Breach and more news below: · Hackers Target Perplexity Comet Brows…
…
continue reading
1
It's a Little Hard to Evaluate New Solutions When You're Screaming "AI" at Me All the Time (Live in Houston)
44:01
44:01
Play later
Play later
Lists
Like
Liked
44:01All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Jerich Beason, CISO, WM. Joining them on stage is Jack Leidecker, CISO, Gong. This episode was recorded live at HOU SEC CON 2025. In this episode: The open source sustainability problem AI levels the geopolitical playing field…
…
continue reading
1
CyberHub Episode 1000: When Trust Becomes the Target – WSUS Weaponized, Chrome Zero-Day Exploited, and Toys R Us Breached
18:39
18:39
Play later
Play later
Lists
Like
Liked
18:39🎙️ EPISODE 1000! Toys R Us Canada Leak, Windows WSUS Exploited, Chrome Zero-Day Spyware 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 1000: Today's episode will discuss the latest news as EPISODE 1000! Toys R Us Canada Leak and more news below: · Ransomware Payments Dropped in Q3 …
…
continue reading
1
Hospital Cyberattacks TX TN IN, Iran MuddyWater 100+ Targets, Adobe Magento SessionReaper Exploited
18:37
18:37
Play later
Play later
Lists
Like
Liked
18:37🎙️ Hospital Cyberattacks TX TN IN, Iran MuddyWater 100+ Targets, Adobe Magento SessionReaper Exploited 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 999: Today's episode will discuss the latest news as Hospital Cyberattacks TX TN IN and more news below: · MCP Server Platform Vulne…
…
continue reading
1
Fighting Tool Squatting And Prompt Injection & The Security Gaps In MCP – Srajan Gupta
23:41
23:41
Play later
Play later
Lists
Like
Liked
23:41In this episode of the Security Repo Podcast, we welcome Srajan Gupta, a security engineer exploring the evolving security implications of Model Context Protocol (MCP) servers. Shrojan breaks down how MCPs act as AI connectors to external systems and the alarming rise in attack surfaces, including tool squatting and indirect prompt injections. The …
…
continue reading
1
SnappyBee Malware Campaign, CISA Warns Apple Microsoft Exploited, Bitcoin Keys Exposed
18:55
18:55
Play later
Play later
Lists
Like
Liked
18:55🎙️ SnappyBee Malware Campaign, CISA Warns Apple Microsoft Exploited, Bitcoin Keys Exposed 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 998: Today's episode will discuss the latest news as SnappyBee Malware Campaign and more news below: · Threat Actors Leverage NPM Ecosystem for S…
…
continue reading
1
AWS Outage, US Nuclear Plant Breached via SharePoint, Muji Ransomware, 75K WatchGuard at Risk
17:57
17:57
Play later
Play later
Lists
Like
Liked
17:57🎙️ AWS Outage, US Nuclear Plant Breached via SharePoint, Muji Ransomware, 75K WatchGuard at Risk 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 997: Today's episode will discuss the latest news as AWS Outage more news below: · Dairy Farm Leaked Information After Ransomware Attack ·…
…
continue reading
1
Dear Abby: Why Should I Trust a Vendor Selling Me Zero Trust?
30:08
30:08
Play later
Play later
Lists
Like
Liked
30:08All links and images can be found on CISO Series. This week's episode is hosted by David Spark, producer of CISO Series and Dan Walsh, CISO, Datavant. Joining them is our sponsored guest, Rob Allen, chief product officer, ThreatLocker. In this episode: When EDR gets knocked out Red flags in vendor theater Configuration chaos The sticker problem Hug…
…
continue reading
1
American Airlines Envoy Air Oracle Hack, VW Ransomware, Prosper 17.6M Breach, NSO $4M Fine
17:09
17:09
Play later
Play later
Lists
Like
Liked
17:09🎙️ American Airlines Envoy Air Oracle Hack, VW Ransomware, Prosper 17.6M Breach, NSO $4M Fine 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 996: Today's episode will discuss the latest news as American Airlines Envoy Air Oracle Hack with more news below: · ConnectWise Fixes Automa…
…
continue reading