The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and follow us! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
The Financial Findings podcast discusses recent research on financial wellness, retirement, disability, and other key financial issues that American households face every day. Episodes contain interviews with researchers and evidence-based strategies that policy makers and practitioners can implement to strengthen financial well-being for individuals at all stages of life.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
The International Food Policy Research Institute (IFPRI) provides research-based policy solutions to sustainably reduce poverty and end hunger and malnutrition in developing countries. Established in 1975, IFPRI currently has more than 600 employees working in over 50 countries. It is a research center of CGIAR, a worldwide partnership engaged in agricultural research for development.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
The Nature Podcast brings you the best stories from the world of science each week. We cover everything from astronomy to zoology, highlighting the most exciting research from each issue of the Nature journal. We meet the scientists behind the results and provide in-depth analysis from Nature's journalists and editors. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
ForeCast is a podcast from Forethought, where we hear from the authors about new research.
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
From the Foundation for Middle East Peace (FMEP), Occupied Thoughts amplifies the voices of FMEP grantees and partners, offers critical framing, and promote new ideas and new angles on the many issues connected to achieving justice, security, and peace for Palestinians and Israelis. FMEP works to defend and support Palestinian rights, end Israel’s occupation of the West Bank, Gaza Strip, and East Jerusalem, and ensure a just and secure future for Palestinians and Israelis. FMEP advances this ...
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Podcasts from The National Bureau of Asian Research (NBR) covering the critical issues that leaders need to understand – because the decisions they make matter and the stakes are high.
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
The Sound of Economics brings you insights, debates, and research-based discussions on economic policy in Europe and beyond. The podcast is produced by Bruegel, an independent and non-doctrinal think tank based in Brussels. It seeks to contribute to European and global economic policy-making through open, fact-based, and policy-relevant research, analysis, and debate.
…
continue reading
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Senior Intelligence Analysts Chris Morgan and Kim Bromley bring together over 30 years of experience in threat intelligence across government, military, and telecommunications. Along with their guests, they provide practical perspectives on t ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
This podcast features content produced by the Secure World Foundation (SWF), an endowed, private operating foundation that promotes cooperative solutions for space sustainability and the peaceful uses of outer space. The Foundation acts as a research body, convener and facilitator to promote key space security, and other related topics, and to examine their influence on governance and international development.
…
continue reading
Interviews and Discussions With Fascinating People Who are Creating A Better Tomorrow For All Of Us - Host - Ira S. Pastor
…
continue reading
Through the course of this series we’ll bring in some of IDA's top experts to share their perspectives on cutting-edge research and issues of importance to the U.S national security and science policy community.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
AnthroDish explores the intersections between our foods, cultures, and identities. Host Dr. Sarah Duignan sits down one-on-one with people in academia, hospitality, farming and agriculture, and more to learn about their food knowledge and experiences. If you're interested in the unique lives of everyday people who have been shaped by their relationship with food, this show is for you!
…
continue reading
At this moment of inflection in technology, co-hosts Elad Gil and Sarah Guo talk to the world's leading AI engineers, researchers and founders about the biggest questions: How far away is AGI? What markets are at risk for disruption? How will commerce, culture, and society change? What’s happening in state-of-the-art in research? “No Priors” is your guide to the AI revolution. Email feedback to [email protected]. Sarah Guo is a startup investor and the founder of Conviction, an investment f ...
…
continue reading
Sharing Ideas Shaping Policy. The Institute of International and European Affairs is an independent policy research think-tank based in Dublin.
…
continue reading
This podcast is for sharing summaries of research and publications by Eric Kaufman and his colleagues.
…
continue reading
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading

1
SANS Stormcast Thursday, May 1st: More Steganography; Malicious Python Packages GMail C2; BEC to Steal Rent Payments
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
…
continue reading

1
AI Tips, Tricks, and Traps! - PSW #872
1:37:21
1:37:21
Play later
Play later
Lists
Like
Liked
1:37:21The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
…
continue reading

1
AI Tips, Tricks, and Traps! - PSW #872
1:37:21
1:37:21
Play later
Play later
Lists
Like
Liked
1:37:21The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
…
continue reading

1
AI Tips, Tricks, and Traps! - PSW #872
1:37:21
1:37:21
Play later
Play later
Lists
Like
Liked
1:37:21The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
…
continue reading
Updates from RSAC 2025. Former NSA cyber chief Rob Joyce warns that AI is rapidly approaching the ability to develop high-level software exploits. An FBI official warns that China is the top threat to U.S. critical infrastructure. Mandiant and Google raise alarms over widespread infiltration of global companies by North Korean IT workers. France ac…
…
continue reading

1
IIEA Insights with Dan O'Brien and David O'Sullivan - 1st of May 2025
32:11
32:11
Play later
Play later
Lists
Like
Liked
32:11'War, sanctions and western disunity' As Russia’s invasion of Ukraine is in its fourth year and efforts to pause the conflict have both intensified and become more complex, David O’Sullivan, the EU’s Sanctions Envoy since January 2023, discusses the use of sanctions by the EU and others on Russia. Since the invasion in 2022, sixteen packages of san…
…
continue reading

1
O3 and the Next Leap in Reasoning with OpenAI’s Eric Mitchell and Brandon McKinzie
39:13
39:13
Play later
Play later
Lists
Like
Liked
39:13This week on No Priors, Elad and Sarah sit down with Eric Mitchell and Brandon McKinzie, two of the minds behind OpenAI’s O3 model. They discuss what makes O3 unique, including its focus on reasoning, the role of reinforcement learning, and how tool use enables more powerful interactions. The conversation explores the unification of model capabilit…
…
continue reading

1
How do you gain “experience” in cyber without a job in cyber? [CISO Persepctives]
41:47
41:47
Play later
Play later
Lists
Like
Liked
41:47We're sharing a episode from another N2K show we thought you might like. It's the third episode of the new season of the show CISO Perspectives with Kim Jones. Enjoy! Show Notes: While the cybersecurity industry has expanded and grown in recent years, newcomers still struggle to gain relevant "experience" before officially beginning their cyber car…
…
continue reading

1
Building Readiness for AI Agents in Healthcare Systems - with Raheel Retiwalla of Productive Edge
33:22
33:22
Play later
Play later
Lists
Like
Liked
33:22Today’s guest is Raheel Retiwalla, Chief Strategy Officer at Productive Edge — a digital transformation consultancy focused on healthcare. Productive Edge works with payers, providers, and health tech firms to leverage AI, data, and modern platforms to streamline operations, cut costs, and improve outcomes. With two decades of experience in digital…
…
continue reading

1
CR096 TechnoVision 2025: Your gateway to cutting-edge innovation with Data-Powered Innovation Jam podcast
1:31:45
1:31:45
Play later
Play later
Lists
Like
Liked
1:31:45TechnoVision 2025 by Capgemini helps business leaders and technologists understand and prioritize emerging technologies. It provides a clear view of tech trends, guiding decision-makers to enhance organizational effectiveness. TechnoVision acts as a beacon in the evolving technology landscape. In this very special episode, Dave, Esmee, and Rob talk…
…
continue reading

1
SANS Stormcast Thursday, May 1st: Sonicwall Attacks; Cached Windows RDP Credentials
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
…
continue reading
In her address to the IIEA, Professor Marie Jull Sørensen discusses consumer protection in the digital age. Professor Sørensen discusses some of the risks that consumers face in the digital environment and considers some of the challenges relating to digital contracts and automated decision-making. Professor Sørensen also discusses the possible rol…
…
continue reading

1
Democracy and political dissatisfaction in Latin America: How do we renew and concretise the promises of democracy?
1:01:53
1:01:53
Play later
Play later
Lists
Like
Liked
1:01:53A keynote address by Dr Gloria de la Fuente, Undersecretary of Foreign Affairs of Chile.This event has been organised in conjunction with the Embassy of Chile, Ireland.About the Speaker: Dr Gloria de la Fuente is a Chilean Political Scientist with a Ph.D. in Social Science from the Universidad de Chile. She currently serves as Undersecretary for Fo…
…
continue reading
DHS Secretary Kristi Noem justifies budget cuts in her RSAC keynote. The EFF pens an open letter to Trump backing Chris Krebs. Scattered Spider is credited with the Marks & Spencer cyberattack. Researchers discover a critical flaw in Apple’s AirPlay protocol. The latest CISA advisories. On our Industry Voices segment, we are joined by Neil Gad, Chi…
…
continue reading
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Marco Ivaldi, co-founder and technical director of HN Security, a boutique company specializing in offensive security services, shares his journey from hacking as a teenager in the '80s to becoming a key figure in the security research community. With nearly …
…
continue reading

1
Demystifying CVE-2025-31324, The New Critical SAP NetWeaver Flaw
24:31
24:31
Play later
Play later
Lists
Like
Liked
24:31Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss: ReliaQuest's Discovery of Critical SAP NetWeaver Vulnerability AI Upgrade for Darcula Phishing Kit DragonForce's New Cartel Business Model Maximum Severity Commvault flaw Kim Bromley: Senior Cyber Threa…
…
continue reading

1
The dismantling of US science: can it survive Trump 2.0?
27:52
27:52
Play later
Play later
Lists
Like
Liked
27:52In this episode: 00:46 What will be left of US science after Trump 2.0? 100 days into his term, President Donald Trump and his administration have already caused the biggest shakeup in modern scientific history, slashing funding, bringing large swathes of US research to a standstill and halting many clinical trials. But many fear these actions are …
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
Europe’s autonomy amid the US-China trade clash
39:03
39:03
Play later
Play later
Lists
Like
Liked
39:03In this episode of The Sound of Economics, Yuyun Zhan sits down with Bruegel’s own Alicia García-Herrero and Finbarr Bermingham, EU correspondent of South China Morning Post to unpack the latest developments in the US-China trade war and what they mean for the European Union. With Trump’s volatile approach to tariffs, China’s charm offensive toward…
…
continue reading
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Marco Ivaldi, co-founder and technical director of HN Security, a boutique company specializing in offensive security services, shares his journey from hacking as a teenager in the '80s to becoming a key figure in the security research community. With nearly …
…
continue reading

1
CYFIRMA Research- Hannibal Stealer: A Rebranded Threat Born from Sharp and TX Lineage
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Read CYFIRMA’s report on the Hannibal Stealer, a rebranded variant of SHARP and TX Stealers, which has re-emerged with expanded data exfiltration capabilities and an updated command-and-control infrastructure. Hannibal Stealer is built in C# on the .NET framework. It targets a wide range of data sources, including browsers, cryptocurrency wallets, …
…
continue reading

1
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
…
continue reading

1
Dr. Michelle I. Cardel, PhD, MS, RD - Chief Nutrition Officer, WeightWatchers - Evidence-Based Nutrition And Behavior Change Science
51:51
51:51
Play later
Play later
Lists
Like
Liked
51:51Send us a text Dr. Michelle I. Cardel, PhD, MS, RD is Chief Nutrition Officer of WeightWatchers ( https://www.weightwatchers.com/us/science-center/team/michelle-cardel?srsltid=AfmBOooheyN06Ngdf86tF274AuTsCjebrDKN1ccjFWOsyMk8hZPs_IRw ), where she oversees the company’s academic research partnerships and clinical trials, nutrition portfolio, and scie…
…
continue reading
In this conversation, Matthew Chavira, CEO of Profits of AI,discusses his journey in the AI industry, particularly focusing on the evolution of humanoid robots like Sophia. He explores the rapid advancements in humanoid robotics, the integration of AI capabilities, and the public's perception of these technologies. Chavira emphasizes the importance…
…
continue reading

1
Episode 40 - Rise of Enterprise Security Browsers
4:40
4:40
Play later
Play later
Lists
Like
Liked
4:40The emergence of the enterprise browser represents a significant step forward in cyber security innovation. Ignoring this evolution is no longer an option for security-conscious organizations looking to stay ahead of the curve in the ongoing cyber arms race
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472
…
continue reading

1
Future Constitutional Change: The Need to Prepare
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33The political landscape across the island of Ireland has been changing over the past decade. Demographic changes, Brexit, polling data, and the realignment of traditional politics in the Oireachtas all point to the need to prepare for the increasing inevitability of substantial constitutional change in the future. Dialogue around the potential for …
…
continue reading

1
Global Trends in Ending Violence against Women and Girls
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32Violence against women and girls is a persistent and escalating crisis and remains one of the most pervasive human rights violations worldwide. From femicide and domestic abuse to online harassment and conflict-related sexual violence, the scale and severity of gender-based violence continues to deepen across every region. Despite international com…
…
continue reading
RSAC 2025 is well under way, and Kevin the Intern files his first report. Authorities say Spain and Portugal’s massive power outage was not a cyberattack. Concerns are raised over DOGE access to classified nuclear networks. The FS-ISAC launches the Cyberfraud Prevention Framework. Real-time deepfake fraud is here to stay. On today’s Threat Vector, …
…
continue reading

1
Neil Steinberg, Executive Producer/Director And Mark Jonathan Harris, Producer - Aging in America: Survive or Thrive
53:51
53:51
Play later
Play later
Lists
Like
Liked
53:51Send us a text Neil Steinberg and Mark Jonathan Harris are both acclaimed filmmakers and through a partnership with Generation Entertainment, The John A. Hartford Foundation ( https://www.johnahartford.org/resources/view/new-pbs-documentary-film-release-and-screenings-aging-in-america---survive-or-thrive ) and PBS SoCal ( https://www.pbssocal.org/s…
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
The Art of the Innocent Ask: How Threat Actors Use Benign Conversations
58:09
58:09
Play later
Play later
Lists
Like
Liked
58:09Hello to all our Cyber Spring Chickens! Join host Selena Larson and guest hosts, Tim Kromphardt and Sarah Sabotka, both Senior Threat Researchers at Proofpoint. These top sleuths crack open Proofpoint’s new Human Factor series and explore one of the most deceptively dangerous tactics in a threat actor’s playbook: the benign conversation. What exact…
…
continue reading

1
151: What Can Local and Seasonal Food Networks Look Like? with Colin Fontaine
28:53
28:53
Play later
Play later
Lists
Like
Liked
28:53Perhaps now more than ever, there’s renewed appreciation for the intricacies of our food systems' deep dependence on a global supply chain. However, that also raises challenges around our relationships with producers and understanding of food value. My guest today, Colin Fontaine, is here to discuss how to reorient American concepts of food and cul…
…
continue reading

1
How Responsible AI is Shaping the Future of Banking and Finance - with Shub Agarwal of U.S. Bank and USC
21:28
21:28
Play later
Play later
Lists
Like
Liked
21:28On today’s episode, we’re joined by Shub Agarwal, author of Successful AI Product Creation: A 9-Step Framework available from Wiley and a professor of the University of Southern California teaching AI and Generative AI product management to graduate students. He is also Senior Vice President of Product Management for AI and Generative AI at U.S. Ba…
…
continue reading

1
CYFIRMA Research- Technical Malware Analysis Report: Python-based RAT Malware
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12A New Breed of Python-Based RATs is Abusing Discord for C2 The CYFIRMA research team has investigated an emerging class of Python malware that is turning popular platforms into weaponized control panels. One recent variant showcases just how accessible and disruptive these tools have become. This lightweight Remote Access Trojan (RAT) uses Discord …
…
continue reading

1
SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
…
continue reading