The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Twisted Money Podcast is a podcast on Fraud, Scams, and Deceptions to help the listeners become better informed on fraud and cyber-attacks methods so that listeners don't become a victim of fraud and cyber-attacks.
…
continue reading
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
Welcome to the Cyber Threat Intelligence Podcast—your go-to source for staying ahead in the ever-evolving world of cybersecurity by harnessing the full potential of CTI. In each episode, we dive into the latest cyber threats, emerging trends, best practices, and real-world experiences—all centered around how CTI can help us defend against cybercrime. Whether you’re a seasoned CTI analyst, a CTI leader, or simply curious about the digital battlefield, our expert guests and host break down com ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Is the post-Cold War era over? In this brave new world, nothing is too small, or big, to be digitalised…including acts of war. Russian ransomware attacks almost doubled last year. At this very moment, cybercriminals are crippling schools, supermarkets, dentists, kindergartens, hospitals, oil pipelines - all in the name of money. Katie Puckrik wants to know who, and why. You can listen to the previous series of dot com on this same feed. Series 1 unveils the hidden army of volunteers behind t ...
…
continue reading
HIPAA compliance is complicated, confusing and easy to get wrong. Violations, data breaches and ransomware attacks are everywhere in healthcare. HIPAA Critical brings interviews with leaders in cybersecurity, InfoSec, healthcare, and compliance straight to you. Each 30-minute episode is designed to keep you informed and entertained. A new episode is released on the first three Wednesdays of every month.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Introducing a hub for conversations on all topics you could think of. Technology, Movies, Celebs, Sports, Anime, Animals, Fashion, spilling the tea and all that shiz. New episodes Monday + Wednesday + Friday https://linktr.ee/thealooneshow Podcast is based in Manchester, England
…
continue reading
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Modern adversaries are relentless. Today’s threat actors target organizations around the world with sophisticated cyberattacks. Who are they? What are they after? And most importantly, how can you defend against them? Welcome to the Adversary Universe podcast, where CrowdStrike answers all of these questions — and more. Join our hosts, a pioneer in adversary intelligence and a specialist in cybersecurity technology, as they unmask the threat actors targeting your organization.
…
continue reading
"Cyberside Chat" is your go-to source for daily cybersecurity news, providing listeners with a comprehensive rundown of the latest threats, vulnerabilities, and attacks in the digital world. Hosted by expert cybersecurity professionals, each episode of "Cyberside Chat" offers a concise and informative overview of the day's top headlines, covering everything from malware and ransomware attacks to data breaches and cyber espionage. Our team of experienced analysts and researchers keeps a close ...
…
continue reading
Your Microsoft Cloud News from a couple of IT Pros
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
https://petronellatech.com and our sponsor at https://compliancearmor.com present Cybersecurity and Compliance with Craig Petronella Podcast. Learn the latest on the CMMC 2.0, DFARS, NIST, HIPAA, GDPR, ISO27001 and more. Learn about the most current IT security threats in ransomware, phishing, business email compromise, cybercrime tactics, cyberheist schemes, and social engineering scams, as well as tips and tricks from leading professionals to help you prevent hackers from penetrating your ...
…
continue reading
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
…
continue reading
It aims at creating awareness around hackers stealing financial information and how cyber crime continues to evolve, with new threats surfacing every year. They can, in effect, destroy businesses and damage your financial and personal lives — especially if you’re the victim of identity theft. Cyber attacks are an evolving danger to organizations, employees and consumers. They may be designed to access or destroy sensitive data or extort money. At Hidden Files, hope listeners will be able to ...
…
continue reading
Podcasts focused on animal nutrition best practices, feed industry trends and offbeat agriculture news relevant to the global animal feed industry.
…
continue reading
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
A roundtable podcast with your hosts, Dr. Pam Maragliano-Muniz and Dr. David Rice. Join us as we bring notable guest contributors from all parts of dentistry every week. We discuss the topics that every business owner wants to know, including practice management, discussions for students and new grads, new and existing technologies and products, and hot-button issues circulating in our dental forums.
…
continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
continue reading
The Placing You First Podcast spans a diverse spectrum of insurance industry issues to keep you and your clients informed.
…
continue reading
We talk about technology and professional development
…
continue reading
The Reminger Report Podcast: Emerging Technologies examines how innovations in technology and business models affect our daily lives, and how the law is adapting to respond to these changes. View video versions of our podcast here https://www.youtube.com/@remingerFor more information about Reminger Co., LPA, visit https://www.reminger.com/
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
“This Week Health: NewsRoom” showcases our commitment to transforming healthcare one connection at a time, providing a dedicated space for timely discussions on industry news. Featuring programs like Today in Health IT, Newsday, UnHack (the News), and This Week Health: Live; this channel caters to healthcare professionals who face the constant challenge of staying informed despite their demanding roles. Guided by the seasoned insights of CEO and Host Bill Russell, and co-hosts Drex DeFord an ...
…
continue reading

1
SentinelOne Discloses Ongoing Attacks by Nation-State Hackers and Ransomware Gangs
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50In a rare move, SentinelOne has publicly confirmed that it is under persistent attack from nation-state threat actors and ransomware gangs. This episode breaks down their recent report detailing how these adversaries—some believed to be backed by China and North Korea—are targeting SentinelOne to gain insight into how thousands of environments are …
…
continue reading

1
S25 E05: Medusa Ransomware Attack, School Sign Ban, Snow White Secrets & Wildlife Scandal
48:45
48:45
Play later
Play later
Lists
Like
Liked
48:45The regulars discuss the Medusa Ransomware attacks on billions of email accounts, removal of signs from schools regardless of its message, what goes on behind the scenes of the live action Snow White Movie as well as an influencer interfering with wildlife that’ll cost their freedom of movement amongst other things. *most, if not all of what’s been…
…
continue reading

1
2 Minute Drill: Yale New Haven and Blue Shield of California Data Exposures with Drex DeFord
3:41
3:41
Play later
Play later
Lists
Like
Liked
3:41Drex covers essential cybersecurity reports including the HIMSS Survey, Cincinnati's Healthcare Cybersecurity Benchmarking Study, CrowdStrike's 2025 Global Threat Report, and Verizon's DBIR. Also highlighted: an Oracle engineering error affecting 45 hospitals' EHRs, Yale New Haven's breach impacting 5.5 million patients, and Blue Shield of Californ…
…
continue reading

1
Cybersecurity Today: Insights from BSides and RSAC
55:17
55:17
Play later
Play later
Lists
Like
Liked
55:17In this episode of Cybersecurity Today, host Jim Love is joined by roving correspondent David Shipley to discuss his experiences at the BSides and RSAC conferences. They dive into the significant takeaways from BSides, including highlights from notable presentations such as Truffle Hog's AI Apocalypse and Eva Galperin's talk on the 'World's Dumbest…
…
continue reading

1
Security Weekly News Interviews Leaders of NECCDC competition - SWN #473
32:02
32:02
Play later
Play later
Lists
Like
Liked
32:02Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-473
…
continue reading

1
Nova Scotia Power, a Canadian Utility, Breached: A Global Warning for Critical Infrastructure
11:46
11:46
Play later
Play later
Lists
Like
Liked
11:46On April 25, 2025, Nova Scotia Power, the province’s primary electricity provider, confirmed what many suspected: a cyber incident involving unauthorized access had compromised customer data. But what looked at first like an isolated disruption is, in reality, a single node in a much broader—and much more dangerous—global pattern. In this episode, …
…
continue reading

1
S25 E12: Privacy Wars & De-Extinction: Global Alliances, S. Korea's Leadership Crisis
56:54
56:54
Play later
Play later
Lists
Like
Liked
56:54The regulars discuss the concern for people’s privacy and safety, the forming of military alliances against foreign forces, the sudden progress of genetic engineering to revive extinct species as well as South Korea looking for a new leader amongst other things. *most, if not all of what’s been said is entirely satirical and has no intention of bei…
…
continue reading

1
OpenEoX and the Future of End-of-Life Standardization in IT
12:01
12:01
Play later
Play later
Lists
Like
Liked
12:01In this episode, we unpack the evolving landscape of Product Lifecycle Management (PLM) and why it's become a strategic cornerstone in modern IT environments. From conception to retirement, managing a product’s lifecycle is now about more than just operations—it's about security, compliance, innovation, and cost. We explore the critical milestones …
…
continue reading

1
Cybersecurity News Roundup: Book Deals, Retail Attacks, Apple Spyware Alerts, and More
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32In this episode, host Jim Love discusses various cybersecurity topics including a book deal from CRC Press for those interested in cybersecurity, auditing, and leadership. Major cyber incidents involving two UK retailers, Co-op and Marks & Spencer's, are detailed, highlighting the challenges they face. Apple's notifications to users in 100 countrie…
…
continue reading

1
Mic Drop: Gen. Charlie "Tuna" Moore: Cyber Wars Don’t Wait for Consensus
16:21
16:21
Play later
Play later
Lists
Like
Liked
16:21Military decisions used to take months — maybe even years. Cyber warfare decisions can happen in milliseconds. Lt. General Charlie “Tuna” Moore, former Deputy Commander of U.S. Cyber Command, explains soldiers without cyber skills are already a step behind. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading

1
SANS Stormcast Friday, May 2nd: More Steganography; Malicious Python Packages GMail C2; BEC to Steal Rent Payments
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
…
continue reading

1
AI Tips, Tricks, and Traps! - PSW #872
1:37:21
1:37:21
Play later
Play later
Lists
Like
Liked
1:37:21The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
…
continue reading

1
Recorded Future’s Alexander Leslie on the ‘MarkoPolo’ traffer team
32:57
32:57
Play later
Play later
Lists
Like
Liked
32:57In this episode, Greg talks with Alexander Leslie, Threat Intelligence Analyst for Recorded Future’s Insikt Group and his research on “Marko Polo” – a notorious cybercriminal empire that orchestrates an array of scams, primarily using infostealer malware. Discover how this sophisticated syndicate has victimized tens of thousands worldwide and raked…
…
continue reading

1
Year in Review special pt. 4: How AI is influencing the threat landscape?
32:19
32:19
Play later
Play later
Lists
Like
Liked
32:19A jam packed episode of guests means a slightly longer Talos Takes for your feed today! We welcome Amy Chang and Omar Santos from Cisco, Vitor Ventura from Talos, and Ryan Fetterman from Splunk. Together, we discuss how AI isn't rewriting the cybercrime playbook, but it is turbo charging some of the old tricks, particularly on the social engineerin…
…
continue reading

1
Ransomware on the Rise: Why SMBs Are Today’s Prime Target
5:56
5:56
Play later
Play later
Lists
Like
Liked
5:56In the digital battleground of cybersecurity, small and medium businesses are now the ultimate prey for ransomware attackers, with a staggering 126% surge in targeted attacks. This explosive episode of The Daily Threat exposes the alarming tactics cybercriminals are using to exploit SMBs’ vulnerabilities, turning them into prime targets for devasta…
…
continue reading

1
SANS Stormcast Thursday, May 1st: Sonicwall Attacks; Cached Windows RDP Credentials
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
…
continue reading

1
How Hackers Think.🔥Chris Roberts🔥Latest AI Risks for Business
58:38
58:38
Play later
Play later
Lists
Like
Liked
58:38Rural Healthcare and small/midsized businesses are being tipped over the edge. Not by Tariffs or high interest rates, but by investments needed into protecting their people and systems from disruption. How can you protect yourself from something you don’t know? A risk you don’t understand. What if you could think like a hacker… and use that power t…
…
continue reading

1
LayerX Secures $45M Total to Battle Data Leaks, One Browser at a Time
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46LayerX just raised another $11 million — and it’s not to build another antivirus. With $45 million in total funding, the company is betting that your browser is the most vulnerable—and most overlooked—part of your cybersecurity stack. In this episode, we explore how LayerX turns everyday browsers like Chrome and Firefox into intelligent defense age…
…
continue reading

1
S25 E11: TikTok’s 75-Day Fight | Soldier’s 80s Secret | Ukraine War End | Meta Axes Fact-Checks
51:54
51:54
Play later
Play later
Lists
Like
Liked
51:54The regulars discuss the TikTok extension lasting another 75 days, the secret behind a former military soldier’s longevity into his 80s, plans to end the Ukraine-Russia War as well as Meta ending their fact checkers for new community notes amongst other things. *most, if not all of what’s been said is entirely satirical and has no intention of bein…
…
continue reading

1
2 Minute Drill: Ransomware Surge, JP Morgan's Warning, and Screenshot Breach with Drex DeFord
3:50
3:50
Play later
Play later
Lists
Like
Liked
3:50Drex covers three critical cybersecurity stories: The FBI's annual Internet Crime Complaints Center report revealing a 9% increase in ransomware attacks and 67 new ransomware variants; JP Morgan Chase's CISO's open letter on third-party supply chain vulnerabilities; and a major data breach at Work Composer exposing 21 million employee screenshots s…
…
continue reading

1
$10.5M to Fight AI-Phishing: The Rise of Pistachio’s Cybersecurity Training Platform
13:04
13:04
Play later
Play later
Lists
Like
Liked
13:04In this episode, we dive into the story of Pistachio, the Norwegian cybersecurity startup that just raised $7 million in new funding—bringing its total to $10.5 million. Pistachio isn’t building another firewall or antivirus tool; it’s targeting the weakest link in most security systems: people. With AI-powered phishing attacks becoming increasingl…
…
continue reading

1
Christiaan Beek on Ransomware's Evolution and Economics
30:05
30:05
Play later
Play later
Lists
Like
Liked
30:05Rapid7 Senior Director of Threat Analytics Christiaan Beek joins the Nexus Podcast to discuss the technical evolution and economic models that maintain ransomware's viability among threat actors. Ransomware became a for-profit threat more than a decade ago and has progressed into the No. 1 threat facing many critical infrastructure organizations. I…
…
continue reading

1
AirBorne: How a Zero-Click Bug Threatens Millions of Apple and Third-Party Devices
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23In this episode, we dive deep into AirBorne — a critical set of vulnerabilities in Apple’s AirPlay protocol and SDK, recently uncovered by security researchers at Oligo. These flaws enable zero-click, wormable remote code execution (RCE) attacks across iPhones, Macs, Apple TVs, CarPlay systems, and millions of third-party devices. Even more alarmin…
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
Cybersecurity Incidents: Musk's Staffers, Canadian Power Utility Attack, and Massive Password Leak
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43In this episode of Cybersecurity Today, host Jim Love discusses several major cybersecurity events. Two members of Elon Musk's 'Department of Government Efficiency' reportedly gained access to classified US nuclear networks, though accounts were never activated. Nova Scotia Power faces a cyber attack affecting customer services but not critical inf…
…
continue reading

1
Risky Business #789 -- Apple's AirPlay vulns are surprisingly awful
1:02:31
1:02:31
Play later
Play later
Lists
Like
Liked
1:02:31On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: British retail stalwart Marks & Spencer gets cybered South Korean telco sets out to replace all its subscriber SIMs after (we assume) it lost the keymat It’s a good exploit week! Bugs in Apple Airplay, SAP webservers, Erlang SSH and CommVault backups Juice jack…
…
continue reading

1
CYFIRMA Research- Hannibal Stealer: A Rebranded Threat Born from Sharp and TX Lineage
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Read CYFIRMA’s report on the Hannibal Stealer, a rebranded variant of SHARP and TX Stealers, which has re-emerged with expanded data exfiltration capabilities and an updated command-and-control infrastructure. Hannibal Stealer is built in C# on the .NET framework. It targets a wide range of data sources, including browsers, cryptocurrency wallets, …
…
continue reading

1
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
…
continue reading

1
PP060: Subsea Cables and the Watery Risks to Critical Infrastructure
44:43
44:43
Play later
Play later
Lists
Like
Liked
44:43Submarine cables are a hidden wonder. These fiber optic bundles carry data and voice traffic around the world and serve as critical global links for communication and commerce. Today on Packet Protector, guest Andy Champagne dives into the history of submarine cables, the technological and operational advancements that allow voice and data to trave…
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472
…
continue reading

1
The Silent Majority: Why 51% of Internet Traffic Is Now Bots
13:03
13:03
Play later
Play later
Lists
Like
Liked
13:03The bots have taken over—and they’re not just crawling your website. In this episode, we dig into the alarming reality that automated bots now generate over half of all internet traffic. Armed with artificial intelligence and cloaked in residential proxies, these bots are evolving beyond simple scripts into highly evasive, persistent threats target…
…
continue reading

1
Uncovering Hidden Challenges: Navigating Problematic Healthcare Exposures
29:38
29:38
Play later
Play later
Lists
Like
Liked
29:38The healthcare insurance landscape is rapidly evolving beyond traditional pain points, creating new challenges for retail agents seeking coverage for specialized risks. From ketamine clinics to advanced med spas, these emerging sectors require specialist navigation to secure appropriate protection. Healthcare has always presented unique insurance c…
…
continue reading

1
From 1,382 to 4 Million: What VeriSource Didn’t Know (or Say)
9:02
9:02
Play later
Play later
Lists
Like
Liked
9:02In this episode, we investigate the massive data breach at VeriSource Services, Inc. (VSI), a Houston-based HR outsourcing and employee benefits administrator. Initially reported as affecting fewer than 2,000 individuals, the breach has now ballooned to a confirmed 4 million affected people. We trace the timeline from the initial detection of suspi…
…
continue reading

1
Actively Exploited: Commvault Web Shells, Active! mail RCE, and Brocade Code Injection Now in KEV
17:21
17:21
Play later
Play later
Lists
Like
Liked
17:21Three actively exploited vulnerabilities—CVE-2025-42599 (Qualitia Active! mail), CVE-2025-3928 (Commvault Web Server), and CVE-2025-1976 (Broadcom Brocade Fabric OS)—have been added to CISA’s KEV catalog. The Qualitia flaw is a remote stack-based buffer overflow (CVSS 9.8) allowing code execution without authentication. Commvault's vulnerability pe…
…
continue reading

1
The problem with dental therapy with Dr. Rick Huot
30:08
30:08
Play later
Play later
Lists
Like
Liked
30:08Dental therapy: groundbreaking solution or dangerous shortcut? In this episode, David and Pam explored the pro-therapy side by sitting down with Dr. Rick Huot, a dentist who says "no way" to dental therapy and brings bold alternatives to the table. Think you’ve heard it all? Think again. Tune in to hear a fiery take on one of dentistry’s most divis…
…
continue reading

1
Quantum Shift: How Cybersecurity Must Evolve Now
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41Quantum computing is advancing rapidly—and with it, the potential to break today’s most widely used encryption standards. In this episode of Cyberside Chats, Sherri and Matt cut through the hype to explore the real-world cybersecurity implications of quantum technology. From the looming threat to encryption to the emerging field of post-quantum cry…
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
The Art of the Innocent Ask: How Threat Actors Use Benign Conversations
58:09
58:09
Play later
Play later
Lists
Like
Liked
58:09Hello to all our Cyber Spring Chickens! Join host Selena Larson and guest hosts, Tim Kromphardt and Sarah Sabotka, both Senior Threat Researchers at Proofpoint. These top sleuths crack open Proofpoint’s new Human Factor series and explore one of the most deceptively dangerous tactics in a threat actor’s playbook: the benign conversation. What exact…
…
continue reading
In late 2023, Nick Lawler got a call from someone claiming to be an FBI agent. The man said that the utility Nick ran in Littleton, Massachusetts, was the target of an elaborate, international hacking operation. It set off an unlikely series of events that involved a small community, Chinese state hackers and the quiet threat hiding in our most bas…
…
continue reading

1
Season 1 - Episode 5 (Pedro Kertzman & Josh Darby MacLellan)
43:21
43:21
Play later
Play later
Lists
Like
Liked
43:21What does it take to succeed in cyber threat intelligence today? Josh Darby McLellan draws from his unique journey through geopolitical risk into the CTI space to reveal practical insights for both aspiring analysts and established professionals. The conversation opens with Josh's unexpected path into threat intelligence, highlighting a crucial rev…
…
continue reading

1
CYFIRMA Research- Technical Malware Analysis Report: Python-based RAT Malware
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12A New Breed of Python-Based RATs is Abusing Discord for C2 The CYFIRMA research team has investigated an emerging class of Python malware that is turning popular platforms into weaponized control panels. One recent variant showcases just how accessible and disruptive these tools have become. This lightweight Remote Access Trojan (RAT) uses Discord …
…
continue reading

1
Ransomware Reality Check: Cleo Breach Puts Third-Party Risks in the Spotlight
4:50
4:50
Play later
Play later
Lists
Like
Liked
4:50In a stark wake-up call for businesses across the U.S., the recent Cleo ransomware breach exposes the critical vulnerabilities lurking in third-party vendor networks. This eye-opening episode of The Daily Threat dissects the sophisticated attack that sent shockwaves through the cybersecurity landscape, revealing how even seemingly secure organizati…
…
continue reading