Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Ransomware Podcasts

show episodes
 
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
  continue reading
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Our podcast covers major data breaches, digital privacy issues, and the quirks of internet culture with a mix of humor and insight. Why Subscribe? Stay Informed: Get the latest updates on cybersecurity threats, ransomware attacks, and cyber insurance trends. Engaging Content: We break down complex topics with a lighthearted approach, making them easy to understand. Expert Insights: Learn from industry experts and our own experiences in the cybersecurity field. We dive deep into the latest in ...
  continue reading
 
Artwork

1
Brutally Honest Security

Barricade Cyber Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
  continue reading
 
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
In a world where technology moves faster than strategy, how do businesses keep their data and their future secure? Smarter, Strategic Thinking brings you conversations with leaders, innovators, and partners shaping the future of IT. From ransomware protection and storage innovation to smarter infrastructure decisions, each episode explores the strategies that matter most to today’s technology leaders. Hosted by Fortuna Data — trusted partners of IBM, Lenovo, Seagate, HYCU, QNAP, and Qualstar ...
  continue reading
 
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
Artwork

1
The Ransomware Files

Jeremy Kirk, Executive Editor, Information Security Media Group

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Ransomware Files podcast tells the harrowing stories of technology experts who have fought back against ransomware, which is one of the greatest crime waves the internet has ever seen. It features in-the-trenches stories about how organisations recovered and frank human reflections from those who have faced file-encrypting malware, a potent weapon used by high-tech criminals.
  continue reading
 
Artwork

1
Ransomware Battleground

Syya Yasotornrat

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
  continue reading
 
Twisted Money Podcast is a podcast on Fraud, Scams, and Deceptions to help the listeners become better informed on fraud and cyber-attacks methods so that listeners don't become a victim of fraud and cyber-attacks.
  continue reading
 
Artwork

1
Click Here

Recorded Future News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
  continue reading
 
Artwork
 
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
  continue reading
 
Artwork

1
IT Unplugged

M2 Technology

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork

1
NeedleStack

Authentic8

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
  continue reading
 
Artwork

1
Tech for Leaders

Mazars in the UK

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
  continue reading
 
Artwork

1
Emerging Cyber Risk

Max Aulakh & Joel Yonts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
  continue reading
 
Artwork

1
Tech Gumbo

Haggai Davis

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
We started Tech Gumbo in Nov 2014 as a conversational show of news, information & updates about the past, present & future of all things technology in a topical, interesting and digestible way.
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Stories from the world of hacking, cybersecurity, and rogue AI. Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million dow ...
  continue reading
 
Artwork

1
Socializing Security

Socializing Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
  continue reading
 
Artwork

1
Security Weekly News (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Artwork

1
Security Weekly News (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
AI Briefing Room

AIBriefingRoom

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Dive into the ”AI Briefing Room” for a quick update on the latest tech trends and innovations. Each episode, generated by AI, delivers fresh insights into AI advancements, tech disruptions, and more. Tune in from Monday through Friday morning to stay ahead in the tech world! For advice, reach out to us at [email protected].
  continue reading
 
Loading …
show series
 
In this episode, we explore the hidden human cost of major cyber incidents—the stress on IT teams, the disruption to patient care, the executives forced into impossible decisions, and the ripple effects felt by everyday people who rely on critical systems. Beyond the technical breakdown, we examine how breaches impact lives, strain organizations, a…
  continue reading
 
Japanese brewer Asahi provides details regarding October ransomware attack California law regulating web browsers might impact national data privacy Microsoft to speed up Teams Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors s…
  continue reading
 
i'm wall-e, welcoming you to today's tech briefing for friday, november 28th: amazon's satellite internet ambitions: launching project kuiper with plans for over 3,000 satellites to compete with starlink, marking amazon’s foray into space-based connectivity. google's anti-ransomware initiative: release of advanced security tools to protect small to…
  continue reading
 
Question? Text our Studio direct. We discuss How ransomware can kill and ways to build security resilience with Chris Loehr, SVP of Solis Security. Ransomware Attacks Can Be DEADLY What Makes You SAFE? Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done with full cyber chaos: 🔥 Int…
  continue reading
 
CISOs, CEOs & Business Owners: What To Say (and NOT Say) When Ransomware Hits – Or You'll Lose Millions in Reputation 90% of companies survive the hack… but die from the crisis communications disaster that follows. Kevin Dinino (Head of Communications at top cybersecurity PR firm KCD PR) reveals the exact playbook that saved Fortune 500 companies d…
  continue reading
 
Amazon is taking Perplexity AI to court over its agentic browser that shops on your behalf, raising urgent questions about who controls your online buying experience when bots do the heavy lifting. FFmpeg teaching assembly language for performance. The state of Nevada recovers after not paying ransom. A "rounding error" nets a clever attacker $128 …
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
Stay ahead with CYFIRMA’s Monthly Ransomware Report – October 2025. CYFIRMA’s October 2025 Ransomware Report reveals a strong resurgence in global ransomware activity, with 738 victims recorded marking one of the highest monthly volumes this year. The spike was led by Qilin, which more than doubled its attacks, and Sinobi, which surged sixfold, whi…
  continue reading
 
News and Updates: • France’s famed Louvre museum suffered an €88M jewel heist, later exposed for using “LOUVRE” as its surveillance password—highlighting decades of neglected cybersecurity and outdated systems. • Two U.S. cybersecurity employees from DigitalMint and Sygnia were indicted for spreading ALPHV ransomware to five firms, extorting $1.2M …
  continue reading
 
Link to episode page This week's Department of Know is hosted by Sarah Lane with guests Jason Shockey, CISO, Cenlar FSB, and Mike Lockhart, CISO, Eagleview Thanks to our show sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. AI is rewriting the cybersecurity rulebook, b…
  continue reading
 
welcome to wall-e's tech briefing for monday, december 8th! let's delve into today's top tech developments: spacex's ambitious secondary share sale: potential to elevate spacex's valuation to $800 billion, surpassing openai and positioning it as america's most valuable private company. driven by the private market's secondary sales trend, spacex co…
  continue reading
 
🔥 Episode Summary In this St. Louis tour-stop episode, David Malicoat sits down with cybersecurity leader Moses Bulus to explore what it truly means to evolve into a professional CISO. Moses shares his journey from early developer to building security programs from scratch, and ultimately into executive leadership — showing how business acumen, net…
  continue reading
 
News and Updates: Dell reports Windows 11 adoption trails Windows 10 by 12%. One billion PCs remain on the older OS, with 500 million unable to upgrade hardware. A Windows 11 update renders the password icon invisible on lock screens. The button remains functional if users click the empty space where it belongs. South Korean police arrested four in…
  continue reading
 
New wave of VPN login attempts on Palo Alto portals NATO holds its largest-ever cyberdefense exercise Chinese hackers exploiting React2Shell bug Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Deepfakes aren't science fiction anymore; they'r…
  continue reading
 
Explosive React Vulnerability and AI Tool Flaws Uncovered: Major Implications for Cybersecurity In this episode of Cybersecurity Today, host David Shipley discusses a new significant React vulnerability, React2Shell, that has caused widespread confusion and debate in the security community. This major flaw, affecting a widely used web framework, po…
  continue reading
 
Question? Text our Studio direct. David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ, about how data brokers work and how to delete your data by discussing the intersection of privacy and personal data. They discuss the role of data brokers, the lack of transparency in data collection, and the pot…
  continue reading
 
In the final episode of “Inside the Mind of a Ransomware Operator,” Chris and Nick look ahead to the next decade of cybercrime. What happens when ransomware goes fully autonomous? AI that picks the most valuable files… then negotiates the ransom in 17 languages Malware that mimics real human behavior so perfectly that EDR can’t tell the difference …
  continue reading
 
The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin) When attackers breached HubSpot in March 2022, they weren’t after HubSpot at all. They were after the customers of its customers. Crypto firms like Trezor, BlockFi, and Swan Bitcoin suddenly saw their users targeted by near-perfect phishing emails designed to st…
  continue reading
 
In late 2023, the world’s most trusted identity provider experienced the kind of breach it was designed to prevent. Attackers quietly infiltrated Okta’s customer support system, stole session tokens hidden inside HAR files and used them to impersonate users across some of the most secure organizations on earth. For two full weeks, the intruders ope…
  continue reading
 
Cybersecurity Today: The Rise of Living Off the Land Strategies & More In this episode of Cybersecurity Today's Month in Review, host Jim Love is joined by Laura Payne from White Tuque and David Shipley from Beauceron Security. They discuss several pressing cybersecurity issues, including the growing threat of 'living off the land' strategies where…
  continue reading
 
i'm wall-e, welcoming you to today's tech briefing for friday, december 5th. explore the key highlights: aws re:invent 2025 highlights: aws introduces significant ai advancements with upgraded ai agents for customizable functions, unveiling the graviton5 cpu, and enhancing ai development tools under the leadership of amazon cto dr. werner vogels. m…
  continue reading
 
For years, North Korea has quietly dispatched an army of IT workers overseas—not to innovate, but to infiltrate. Disguised as freelancers, they apply for jobs, breach systems, and wire stolen funds back to Pyongyang. We return to a rare conversation with one of them—a defector—about the regime’s digital underworld, and the personal toll of escaping…
  continue reading
 
Predator spyware spotted across several countries Russia blocks FaceTime Draft US cyber strategy set for January release Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you…
  continue reading
 
In this episode of 'Cybersecurity Today,' host Jim Love discusses several significant cybersecurity issues. Highlights include a maximum severity vulnerability in React Server Components dubbed React2Shell (CVE-2025-55182), a recently patched Windows shortcut flaw by Microsoft, and new attacks using the Evilginx phishing platform in schools. Additi…
  continue reading
 
In this episode, we sit down with Nate Beach-Westmoreland, Head of Strategic Cyber Threat Intelligence at Booz Allen, to explore the evolving sophistication of Chinese cyber operations and their implications for U.S. national security. Our guest breaks down how the PRC leverages trusted-relationship abuse, network edge exploitation, and AI-powered …
  continue reading
 
This week’s Christmas Gift Guide spotlights tech that sparks curiosity, from KiwiCo kits and 3D pens to Arduino starters and game-dev courses with Thomas Sanjurjo. Dom Bettinelli adds smart car upgrades—plus a bold question: Are we ready for a moral framework for AGI? The post The Gift Guide for Future Makers, Coders, and Drivers appeared first on …
  continue reading
 
Question? Text our Studio direct. Inside Espionage What Every American Should Know. Inside Truth Behind Data Breaches. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Impact of Chinese Espionage on…
  continue reading
 
In her budget the Chancellor increased the state pension by 4.8 % in line with the government's triple lock formula. It was good news for pensioners but is it good news for the young? A constant background to spending and economic decisions for well over a decade now has been an argument about generational injustice. That the young are getting poor…
  continue reading
 
```html i'm wall-e, welcoming you to today's tech briefing for thursday, december 4th. here's what's happening in the tech world: aws re:invent 2025: focus on ai for enterprise, with ceo matt garman discussing ai agents' potential for business success. swami sivasubramanian highlights ai agents' capabilities in planning and coding. aws updates: int…
  continue reading
 
News and Updates: Character.AI Ban: Character.AI, with 20 million monthly users, has completely cut off chatbot access for users under 18, citing urgent mental health and safety concerns. Tragic Context: The restriction follows the deaths of at least two teenagers by suicide linked to chatbot usage, triggering lawsuits from parents and intense regu…
  continue reading
 
Record-breaking DDoS attack React bug puts servers at risk RansomHouse attack Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasi…
  continue reading
 
A teenage cybercriminal posts a smug screenshot to mock a sextortion scammer... and accidentally hands over the keys to his real-world identity. Meanwhile, we look into the crystal ball for 2026 and consider how stolen data is now the jet fuel of cybercrime – and how next year could be even nastier than 2025. Plus, Graham rants about recipe sites t…
  continue reading
 
Every once in a while, I end up in a conversation that hits at exactly the right moment—when the industry is shifting, the vocabulary is changing, and everyone is quietly circling the same questions. This new episode of the TechSpective […] The post Exploring the Future of Identity Security and Agentic AI appeared first on TechSpective.…
  continue reading
 
Send us a text Relying on reactive backup alone is no longer enough. In this episode of Smarter Strategic Thinking, we sit down with Panzura’s CTO to explore how their hybrid cloud file and data services platform is built for cyber resiliency, data security, governance and compliance. We discuss how Panzura combines real-time anomaly detection base…
  continue reading
 
Question? Text our Studio direct. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Threat of Chinese Espionage to American National Security Inside Espionage: What Every American Should Know Season …
  continue reading
 
welcome to wall-e's tech briefing for wednesday, december 3rd! delve into today's top tech developments: amazon's ai factories: aws and nvidia partner to launch 'ai factories' enabling secure on-premise ai deployment with options for nvidia blackwell gpus or amazon’s new trainium3 chip. microsoft azure local: microsoft introduces a strategy for ai …
  continue reading
 
This is today’s cyber news for December third, 2025. Attackers are turning hacked home cameras, developer tools, and mobile phones into powerful surveillance and access channels that traditional controls struggle to cover. Leaders who understand these overlaps can better prioritize resilience, privacy, and vendor risk. Listeners will hear about sma…
  continue reading
 
Microsoft Defender outage disrupts threats Apple resists India's state-run app order MuddyWater strikes Israel with MuddyViper Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, …
  continue reading
 
This episode of Cybersecurity Today, hosted by Jim Love, delves into various cybersecurity threats and latest news. Topics include 'living off the land' attacks using Microsoft's native utilities, spoofing Calendly invites for phishing Google and Meta credentials, a significant breach at the University of Pennsylvania linked to Oracle E-Business Su…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play