Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Security Patching Podcasts

show episodes
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Artwork
 
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
Security Breach

Eric Sorensen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
Brutally Honest Security

Barricade Cyber Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
  continue reading
 
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
  continue reading
 
Verbose Mode is a bi-weekly podcast from the team at TuxCare, where IT pros Eric Hendricks and Chris DeMars dig into open source, enterprise IT, and cybersecurity without the jargon. Each episode blends real-world stories, practical insights, and a bit of geeky humor to keep sysadmins, developers, IT leaders, and open-source enthusiasts informed and inspired.
  continue reading
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
  continue reading
 
Artwork

1
The Small Business Cyber Security Guy

The Small Business Cyber Security Guy

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Host Noel Bradford teams up with cybersecurity experts to deliver essential tech insights for UK small businesses and consumers. Cutting through jargon with wit and authority, each episode tackles real-world cyber threats, updates, and digital security challenges that actually matter to your business. From patch management to data protection, get actionable advice that doesn't require a computer science degree.Where cybersecurity meets practicality.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Master the CompTIA Server+ exam with the Server+ Audio Course—your complete audio companion for learning server hardware, administration, security, storage, and troubleshooting. Each episode breaks down the official exam objectives into clear, practical lessons designed for listening and learning on the go. You’ll gain a deep understanding of physical and virtual server environments, network integration, performance monitoring, and disaster recovery planning—all explained in simple, direct l ...
  continue reading
 
Artwork

1
CISO Tradecraft®

G Mark Hardy & Ross Young

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
You are not years away from accomplishing your career goals, you are skills away. Learn the Tradecraft to Take Your Cybersecurity Skills to the Executive Level. © Copyright 2025, National Security Corporation. All Rights Reserved
  continue reading
 
Artwork

1
Acquisitions Anonymous - #1 for business buying, selling and operating

Bill D'Alessandro, Mills Snell, Heather Endresen, and Michael Girdley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Jump into the world of business acquisitions with hosts Bill D'Alessandro, Mills Snell, Heather Endresen, and Michael Girdley. We review real businesses for sale in each episode, providing expert insights, strategies, and tips to make savvy business moves like the pros. Perfect for entrepreneurs, investors, and anyone interested in buying and selling businesses.
  continue reading
 
The UK's leading small business cybersecurity podcast helping SMEs protect against cyber threats without breaking the bank. Join cybersecurity veterans Noel Bradford (CIO at Boutique Security First MSP) and Mauven MacLeod (ex-UK Government Cyber Analyst) as they translate enterprise-level security expertise into practical, affordable solutions for UK small businesses. 🎯 WHAT YOU'LL LEARN: - Cyber Essentials certification guidance - Protecting against ransomware & phishing attacks - GDPR comp ...
  continue reading
 
Artwork

1
The Therapy Spot

Beth Rogerson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
No matter what's holding you back, therapist Beth Rogerson wants to help you live a better, more balanced life. Are you and your partner going through a rough patch? Do you struggle with anxiety or depression? Or do you simply need some guidance on your journey to become your best Self? Beth often uses the Internal Family Systems (or IFS) model to help listeners understand and navigate their inner world. She frequently interviews other experienced therapists on subjects like security, shame, ...
  continue reading
 
Artwork

1
Privacy Please

Cameron Ivey

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to "Privacy Please," a podcast for anyone who wants to know more about data privacy and security. Join your hosts Cam and Gabe as they talk to experts, academics, authors, and activists to break down complex privacy topics in a way that's easy to understand. In today's connected world, our personal information is constantly being collected, analyzed, and sometimes exploited. We believe everyone has a right to understand how their data is being used and what they can do to protect the ...
  continue reading
 
Artwork

1
Hacking Your Health

Hacking Your Health

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Hacking Your Health Podcast with Ben Canning and Dave Kennedy - Two guys setting out to hack body, mind, business and beyond. We are here to provide a single source, bullshit free guide to understanding your body and how you can live better, for longer.
  continue reading
 
Artwork

1
Silent Mode Cafe

Silent Mode Cafe

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to Silent Mode Cafe, the podcast where we translate the digital realm into plain English. From data privacy and basic internet security to smart home gadgets and the latest AI developments, we serve up tech insights with a side of caffeine.
  continue reading
 
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep ​network visibility to not only protect against sophisticated cyber- ...
  continue reading
 
Welcome to the Flexera Security Vulnerability Insight Podcast, your go-to source for all things related to cybersecurity, software vulnerabilities, and threat intelligence. In this engaging podcast series, we will dive deep into the ever-evolving world of digital security, providing you with valuable insights, expert interviews, and the latest industry trends. Hosted by Jeroen Braak and leading experts in the field, each episode explores critical topics such as: Vulnerability Management: Sta ...
  continue reading
 
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
  continue reading
 
Artwork

1
The HR Huddle

WRKdefined Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to the HR Huddle, the ultimate resource for all things HR. This podcast is comprised of two unique mini-shows where we will be: Spilling The Tea On HR Tech with Chief Research Officer and HR tech market influencer, Stacey Harris and Cliff Stevenson, Sapient Insights Group, Director of Research, AND breaking down the messy stories that everyone in human resources has in HR - HR We Have a Problem, with Teri Zipper - global HR consulting expert and Sapient Insights Group CEO featuring w ...
  continue reading
 
Artwork

1
The CyberDap Podcast

Daniel Agyemang Prempeh - TheCyberDap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
  continue reading
 
Artwork

1
CTRLPhreaks

Clarissa Lucas & Bill Bensing

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Dial into a frequency where the meticulous world of auditing and the rebellious spirit of hacking collide! Meet Clarissa and Bill, your audacious hosts, navigating you through the labyrinth of traditional auditing and into a realm where controls aren’t just checkboxes but catalysts for change. Steer away from the monotonous audit routines and venture into a world where compliance and managing risk is not a battle but a collaborative journey toward organizational excellence. Clarissa, author ...
  continue reading
 
Artwork

1
CodeBlueTech

CodeBlueTech

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Mid-Atlantic’s Best IT services company. Helping Business Owners create, improve and scale their Technology strategy. IT services, IT Security and IT Support advice and leadership from expert professionals. Q&A with Senior Engineers, Service Managers and Business Development.
  continue reading
 
Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.
  continue reading
 
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
  continue reading
 
Artwork

1
The Daily Threat

QIT Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to "The Daily Threat" podcast, your daily dose of curated content around cybersecurity news, advice, and best practices. With the increasing frequency of cyber attacks and data breaches, it's more important than ever to stay informed and prepared. This podcast provides you with the latest updates on cybersecurity threats and trends, along with expert insights and practical advice to help you protect yourself and your organization. Our team of cybersecurity experts scours the latest n ...
  continue reading
 
Loading …
show series
 
Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React server components. Exploitation is likely imminent. https://react.dev/blog/2025/12/03/critical-se…
  continue reading
 
SANS Stormcast Thursday, December 4th, 2025: CDN Headers; React Vulnerabiity; PickleScan Patch Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React se…
  continue reading
 
Microsoft to block unauthorized scripts in Entra ID logins with 2026 CSP update New legislation targets scammers that use AI to deceive ASUS firmware patches critical AiCloud vulnerability Huge thanks to our episode sponsor, KnowBe4 Cybersecurity isn't just a tech problem—it's a human one. That's why KnowBe4's Human Risk Management platform allows …
  continue reading
 
Got a question or comment? Message us here! This week’s #SOCBrief dives into the FortiWeb zero-day that’s letting attackers create admin accounts with a single unauthenticated HTTP request. With exploitation spiking and Fortinet pushing out a quiet fix, SOC teams are under pressure to lock down configs, audit firewalls, and patch fast. We break dow…
  continue reading
 
TL;DR: We heard RSnake's take on CVSS and CVEs and such, now let's hear Brian "Jericho" Martin's take. The gloves are off, and the opinions go native when we take this episode live. Brian doesn't pull any punches, and apparently I'm the only one without a pocket full of $2 bills? Sorry for the explicit rating, that's Brian's fault. YouTube Video: h…
  continue reading
 
Send us a text Perhaps you’re familiar with the quote, “The greatest trick the Devil ever pulled was convincing the world he didn’t exist.” While its use in the movie The Usual Suspects might resonate with most, the original attribution goes to French poet Charles Baudelaire. The quote came to mind in preparing for my conversation with Tim Chase, P…
  continue reading
 
In this episode of HR, We Have a Problem, Teri Zipper and guest Bonnie Tinder, Founder and CEO at Raven Intelligence, explore how too many HR tech projects fail not because of the software itself, but because of poor implementation planning and partner selection. Bonnie shares how to evaluate system integrators, spot red flags during the selection …
  continue reading
 
Record-breaking DDoS attack React bug puts servers at risk RansomHouse attack Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasi…
  continue reading
 
Got a question or comment? Message us here! In this episode of the #SOCBrief, we dig into how world events can trigger cyber fallout that lands directly on the desks of security teams. From ransomware crews capitalizing on instability to hacktivists launching DDoS attacks and opportunistic actors going after vulnerable sectors, we talk through why …
  continue reading
 
Samantha Brown, founder of Pro Organizers Coach, reveals how to start and scale a professional organizing business by pairing mindset with action. From using Google effectively to embracing imperfect action, she shares simple, powerful ways to turn passion into purpose in just 7 minutes. https://getresultsology.com/podcast/samantha_brown/…
  continue reading
 
This is today’s cyber news for December third, 2025. Attackers are turning hacked home cameras, developer tools, and mobile phones into powerful surveillance and access channels that traditional controls struggle to cover. Leaders who understand these overlaps can better prioritize resilience, privacy, and vendor risk. Listeners will hear about sma…
  continue reading
 
Microsoft Defender outage disrupts threats Apple resists India's state-run app order MuddyWater strikes Israel with MuddyViper Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, …
  continue reading
 
SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-3670629826 https://github.com/yuliskov/SmartTube/releases/tag/notification Two Years, 17K Downloads: The NPM Malware That Tried to Gas…
  continue reading
 
SANS Stormcast Wednesday, December 3rd, 2025: SmartTube Compromise; NPM Malware Prompt Injection Attempt; Angular XSS Vulnerability SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-36…
  continue reading
 
Got a question or comment? Message us here! 📱 This #SecureAF episode covers the everyday questions and concerns people have when they think something unusual is happening with their devices or accounts. Hickman and Peters talk through typical scenarios, common misunderstandings, and the foundational steps that help people regain control of their ac…
  continue reading
 
Form being told he was going to being in a wheelchair by 30, to completing the Rouge 1000lb club challenge. A conversation about confidence, identity, self-worth, imposter syndrome and overcoming adversity. Want more? Cyber Pro 8 week system reset Join 1600+ others on discord Support the show Want to know more about coaching? Book a call with Ben h…
  continue reading
 
In this episode the hosts walk through evaluating a potential acquisition of a Houston‑area elevator services company, debating whether a 7.5× EBITDA asking price can pencil out given the financing constraints and growth challenges. Business Listing - https://www.bizbuysell.com/business-opportunity/strong-cash-flow-elevator-services-business-housto…
  continue reading
 
TL;DR: This week's pod features a conversation with the Jay Jacobs, whom had previously been on the show talking about this very topic (vulnerability ranking/scoring) many, many years ago. If you missed Episode 297 check it out, it's crazy how far (or not) we've come since that conversation. YouTube Video: https://youtube.com/live/cpL9ZYbwkes Have …
  continue reading
 
This is today’s cyber news for December 2nd, 2025. The brief highlights how everyday tools like browsers, developer extensions, mobile apps, and public Wi Fi are being bent into silent surveillance and credential theft channels that hit both consumers and enterprises. Listeners will hear how popular browser extensions turned into spying implants, h…
  continue reading
 
India orders web safety app Arrests over IP camera snooping Albiriox shows up on dark web Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you can stop sweating over spreads…
  continue reading
 
Hunting for SharePoint In-Memory ToolShell Payloads A walk-through showing how to analyze ToolShell payloads, starting with acquiring packets all the way to decoding embedded PowerShell commands. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Hunting%20for%20SharePoint%20In-Memory%20ToolShell%20Payloads/32524 Android Security Bulletin December 20…
  continue reading
 
SANS Stormcast Tuesday, December 2nd, 2025: Analyzing ToolShell from Packdets; Android Update; Long Game Malicious Browser Ext. Hunting for SharePoint In-Memory ToolShell Payloads A walk-through showing how to analyze ToolShell payloads, starting with acquiring packets all the way to decoding embedded PowerShell commands. https://isc.sans.edu/diary…
  continue reading
 
Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Mathew Biby, director, cybersecurity, TixTrack, and Derek Fisher, Director of the Cyber Defense and Information Assurance Program, Temple University Thanks to our show sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do…
  continue reading
 
This week on Brutally Honest Security, host Eric Taylor flags a timely and critical risk: the surge in holiday-season scams. As festive shopping, deliveries, and goodwill ramp up, so do scams targeting unsuspecting shoppers, families, and well-meaning gift-givers. Topics covered: 🎯 The most common holiday scams - from fake retail sites and spoofed …
  continue reading
 
In this episode of CISO Tradecraft, host G Mark Hardy is joined by Neatsun Ziv from Ox Security to discuss the evolving landscape of vibe coding and its security implications. The conversation delves into the risks and opportunities surrounding vibe coding, how it can enhance productivity while maintaining security, and the importance of embedding …
  continue reading
 
Feeling overwhelmed and out of balance? Time management coach Anna Dearmon Kornick shares how to move from chaos to calm using her heart-centred approach. Discover why true productivity starts with clarity, not color-coding — and how to design your own version of balance that actually feels good. https://getresultsology.com/podcast/anna_dearmon_kor…
  continue reading
 
This is today’s cyber news for December 1st, 2025. The briefing opens on the holiday crush, where industrial-scale fake shopping sites and cloned Cyber Monday stores quietly skim cards and personal details while banks and brands eat the fallout. From there it moves into the developer stack, with tens of thousands of live secrets sitting in public G…
  continue reading
 
Japanese brewer Asahi provides details regarding October ransomware attack California law regulating web browsers might impact national data privacy Microsoft to speed up Teams Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors s…
  continue reading
 
Fake adult websites pop realistic Windows Update screen to deliver stealers via ClickFix The latest variant of ClickFix tricks users into copy/pasting commands by displaying a fake blue screen of death. https://www.acronis.com/en/tru/posts/fake-adult-websites-pop-realistic-windows-update-screen-to-deliver-stealers-via-clickfix/ B2B Guest Access Cre…
  continue reading
 
SANS Stormcast Monday, December 1st, 2025: More ClickFix; Teams Guest Access; Geoserver XXE Vulnerablity Fake adult websites pop realistic Windows Update screen to deliver stealers via ClickFix The latest variant of ClickFix tricks users into copy/pasting commands by displaying a fake blue screen of death. https://www.acronis.com/en/tru/posts/fake-…
  continue reading
 
Ben & John talk on the lifestyle crisis that the cybersecurity industry face, the difficulty maintaining a healthy lifestyle in a high demand, 'always on' industry. Burnout and their own personal experiences as well as role models - people within the industry that are in a position to shape the future of the space and rewrite the narrative. The imp…
  continue reading
 
In this episode the hosts dissect a bankruptcy‑sale opportunity involving dolphin‑habitat real estate in the Riviera Maya, Mexico — and explore whether the outsized risk of “ditch‑risk” is worth the potential payoff. Business Listing – https://www.keen-summit.com/project/bankruptcy-sale-dolphin-aquariums-real-estate/ Welcome to Acquisitions Anonymo…
  continue reading
 
This is today’s cyber news for November 28th, 2025. Today’s brief opens with millions of phones still following abandoned calendar links that attackers can quietly reclaim, turning old sync feeds into tracking and phishing channels. We move through an analytics vendor breach exposing OpenAI developer account details, a ransomware hit on Asahi affec…
  continue reading
 
Trademark lawyer Kelli Jones reveals how to protect your brand the smart way — without the stuffiness, sky-high fees, or confusion. Learn her top tips for avoiding copycats, saving money, and boosting productivity on your own terms. Don’t miss this 7-minute masterclass for entrepreneurs! https://getresultsology.com/podcast/kelli_jones/…
  continue reading
 
AWS outage botnet smacks 28 countries LLMs help malware authors evade detection Anthropic questioned over Claude espionage Huge thanks to our episode sponsor, KnowBe4 Cybersecurity isn't just a tech problem—it's a human one. That's why KnowBe4's Human Risk Management platform allows you to measure, quantify and actually reduce human risk across you…
  continue reading
 
In this episode of Spilling the Tea on HR Tech, Susan Richards, Teri Zipper, and Cliff Stevenson, discuss how HR technology is shifting from functional systems to workforce tech that connects HR, IT, and finance. The conversation covers what's driving AI adoption beyond the hype, why learning platform vendors were notably absent from the show floor…
  continue reading
 
This is today’s cyber news for November 26th, 2025. Today’s rundown connects a cyberattack that silenced emergency alerts, critical flaws in a tiny cloud logging agent, and fresh warnings that secure messaging apps can still be turned into surveillance tools when phones are compromised. We also cover long-running credential leaks from online code h…
  continue reading
 
CISA warns of app break-ins StealC V2 spread through blender files Russia arrests cybersecurity entrepreneur for treason Huge thanks to our episode sponsor, KnowBe4 Cybersecurity isn't just a tech problem—it's a human one. That's why KnowBe4's Human Risk Management platform allows you to measure, quantify and actually reduce human risk across your …
  continue reading
 
Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications Spyware attacks messaging applications in part by triggering vulnerabilities in messaging applications but also by deploying tools like keystroke loggers and screenshot applications. https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-targ…
  continue reading
 
SANS Stormcast Wednesday, November 26th, 2025: Attacks Against Messaging; Passwords in Random Websites; Fluentbit Vuln; #thanksgiving Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications Spyware attacks messaging applications in part by triggering vulnerabilities in messaging applications but also by deploying tools like key…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play