Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
True Spies takes you inside the world's greatest espionage and detective operations. Our hosts Hayley Atwell, Vanessa Kirby, Sophia Di Martino, Daisy Ridley and Rhiannon Neads talk to the real spies behind the missions. What do they know? What are their skills? And what would you do in their position? We explore and investigate real life thrillers, mysteries and crimes - stories that prove truth is stranger than fiction! These stories cover lies, murder, theft, sex, drugs and rock ‘n roll. Y ...
…
continue reading
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Welcome to The DevOps Toolchain Show – your go-to podcast for mastering the evolving world of DevOps! Previously known as The TestGuild Performance and SRE Podcast, we dive deep into the latest trends, must-know tools, and cutting-edge techniques shaping modern software delivery. Join industry experts, engineers, and thought leaders as we uncover insights on automation, performance testing, security, CI/CD, AI in DevOps, and everything in between. Whether you're a DevOps practitioner, SRE, o ...
…
continue reading
We are often distracted in life and never really dive deep into the real foundation of self improvement, goal achieving, and wellbeing. - Join our team of experts every week as we discuss the real facets of manhood. Topics like: How to develop more self esteem, self love, deeper relationships. How to improve our wellbeing, mental toughness, resilience, and productivity. How to develop critical skills, become better leaders, expand our careers/business, create financial security and contribut ...
…
continue reading
Are you looking to improve your overall testing and quality practices? Join your hosts Sérgio Freire and Cristiano Cunha, Solution Architects at Xray. Together, they tackle some of the most common testing and quality challenges with guests from the testing community. This podcast is sponsored by Xray - a native quality management app for Jira. See how Xray can help you deliver better software - together. https://hubs.li/Q01qBdZd0
…
continue reading
Fareed Zakaria GPS takes a comprehensive look at foreign affairs and global policies through in-depth, one-on-one interviews and fascinating roundtable discussions.
…
continue reading
David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
The SMC Journal is a podcast about all things related to Software Engineering, Performance, DevOps, Observability, Cloud Computing, Security, AI, and much more.
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
…
continue reading
A weekly show dedicated to helping you kick off your week right with all the latest in automation testing, performance & SRE testing, security testing, and DevOps-related news and updates that you need to know for this week. So grab your favorite cup of coffee or test, and let's do this!
…
continue reading
The Call Kent podcast is a regular podcast where you call in with a question and Kent answers. Call in with your questions right from your web browser with any device at https://kentcdodds.com/call
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
f
…
continue reading
This podcast contains security topics discussed by the Secure Ideas LLC. team.
…
continue reading
News, views, and insights into the cybersecurity realm produced by Greg Johnson, CEO of Webcheck Security. www.webchecksecurity.com
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
Investigative Security Unlimited
…
continue reading
Just Science is a podcast for justice professionals and anyone interested in learning more about forensic science, innovative technology, current research, and actionable strategies to improve the criminal justice system. This podcast deals with a range of issues, including human trafficking, firearms, policing, leadership in the crime lab, new technologies, sexual assault response, and broader challenges for science and public security. We cover various types of topics across RTI's Justice ...
…
continue reading
The Pastor's Bible Study is a Bible Study class taught by Chad Thompson on Wednesday Nights at South Union Baptist Church
…
continue reading
An open show powered by community LINUX Unplugged takes the best attributes of open collaboration and turns it into a weekly show about Linux.
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
Executive Protection and Secure Transportation podcast is provided by the International Security Driver Association. Every week we share secure transportation and executive protection headlines, news, trends, and educational content for today's practitioners.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
TechWell community manager Owen Gotimer travels the country connecting with agile, testing, DevOps, and security professionals to advance the global software community. Do you want to hear from an expert on the show? Email Owen at [email protected].
…
continue reading
"This show brings you the latest trends, tools, and techniques in test automation. Each week, we explore a range of topics related to quality assurance, including continuous integration, automation frameworks, and test-driven development. In addition to expert insights and real-world examples, we also feature interviews with industry leaders and members of the test automation community. These interviews offer a unique opportunity to learn from the experiences of others and ask questions abou ...
…
continue reading
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations' networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
…
continue reading
Welcome to Everyday Heroes, a podcast about the unsung heroes of the tech world. From the phone in your pocket to the world's most critical digital infrastructure, open-source software has a hand in it. These free technologies that shape our digital world wouldn't be anything without the Heroes that maintain them, promote them, and evolve them - these are their stories. Everyday Heroes is brought to you by HeroDevs.
…
continue reading

1
Accelerate QA Using AI, Appium MCP, Security Testing and More TGNS155
9:52
9:52
Play later
Play later
Lists
Like
Liked
9:52Do you know how to accelerate your QA Process with AI and Playwright? What is the latest must try MCP in automation Why would you ever use Reverse Mutation Testing Find out in this episode of the Test Guild New Shows for the week of April 27. So, grab your favorite cup of coffee or tea, and let's do this. 0:18 ZAPTEST AI https://testguild.me/ZAPTES…
…
continue reading

1
CCT 235: Practice CISSP Questions - Mastering Security Control Testing (CISSP Domain 6.2)
23:09
23:09
Play later
Play later
Lists
Like
Liked
23:09Send us a text The collision of artificial intelligence and cybersecurity takes center stage in this episode as we explore how Agentic AI is revolutionizing Security Operations Centers. Moving beyond simple assistant AI or co-pilots, this new generation of autonomous systems proactively investigates alerts, follows structured playbooks, and perform…
…
continue reading
In this episode, the hosts discuss the recent bankruptcy of 23andMe, exploring the implications for data privacy and genetic testing. They reflect on personal experiences with genetic testing, the risks associated with genetic material, and the ethical considerations surrounding consent and privacy. The conversation highlights the importance of reg…
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
True Spies Classic: The Ace of Spies | Historical
52:25
52:25
Play later
Play later
Lists
Like
Liked
52:25Who was Britain's Ace of Spies? The truth is, nobody really knows. But the name he used was Sidney Reilly - and nobody did it better. In this classic episode of True Spies, Vanessa Kirby follows Sidney on his dark and bloody path through the early 20th century, reckoning with oil barons, personal pride, and the rise of Communism. From SPYSCAPE, the…
…
continue reading

1
“We’re not replacing you; we’re with you”: Where AI meets infrastructure
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22The Geminus platform is built to automatically integrate data, physics, and computation for autonomous control of complex systems. Explore the platform or get in touch. Find Greg on LinkedIn.By Greg Fallon, Ryan Donovan
…
continue reading

1
Between Two Nerds: Releasing the hounds on scam compounds
31:23
31:23
Play later
Play later
Lists
Like
Liked
31:23In this edition of Between Two Nerds Tom Uren and The Grugq discuss the Southeast Asian criminal syndicates that run online scam compounds. Should organisations like US Cyber Command or the UK’s National Cyber Force target these gangs with disruption operations? This episode is also available on Youtube. Show notes UN Office of Drugs and Crime on S…
…
continue reading
Are you inbox zero? If not, here’s a simple way to get rid of all those junky emails.By Kim Komando
…
continue reading
I’m transitioning from SPAs with REST APIs to SSR applications using React Router Framework. While I’ve used layout routes and tools like SWR/React Query for route protection in React Router DOM, I just found out that actions in React Router Framework are still vulnerable to unauthorized POST requests. I use JWT auth with tokens stored in cookies—d…
…
continue reading

1
CCT 240: Cybersecurity Documentation: Policies, Standards, and Procedures (CISSP Domain 1.7)
49:36
49:36
Play later
Play later
Lists
Like
Liked
49:36Send us a text Ever wonder why organizations with robust cybersecurity teams still fall victim to devastating attacks? The answer often lies not in fancy technology but in something far more fundamental: documentation. In this eye-opening episode, Shon Gerber takes listeners into the critical world of cybersecurity documentation hierarchy, revealin…
…
continue reading
The Los Angeles Times uncovered a covert electioneering campaign involving over 500 social media creators. Here's the scoop.By Kim Komando
…
continue reading

1
The Future of Access Management - Jeff Shiner - ESW #404
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
…
continue reading

1
The Future of Access Management - Jeff Shiner - ESW #404
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
…
continue reading

1
Risky Bulletin: Top AI models all fall to new prompt injection technique
5:25
5:25
Play later
Play later
Lists
Like
Liked
5:25A new prompt injection attack is effective against all the big AI models, Poland says Facebook is failing to remove malicious ads, Africa’s largest telco discloses a security breach, and hackers breach Malaysian brokerage accounts. Show notes
…
continue reading

1
Zanny Minton Beddoes and Ray Dalio on America’s Flailing Economy Under President Trump
42:56
42:56
Play later
Play later
Lists
Like
Liked
42:56Today on the show, Fareed speaks with The Economist’s editor-in-chief Zanny Minton Beddoes and hedge fund billionaire Ray Dalio about America’s economic turmoil in the first 100 days of the Trump administration and President Trump’s problems with Fed Chair Jerome Powell. Next, Victoria Nuland, a former senior State Department official, joins the sh…
…
continue reading

1
612: 25 Years of LinuxFest Northwest
1:06:30
1:06:30
Play later
Play later
Lists
Like
Liked
1:06:30We're live from LinuxFest Northwest 2025. We're joined by guests from the audience, try our hand at Linux trivia and share our experiences from the best fest in the West. Sponsored By: Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Manage…
…
continue reading
Turns out, tons of people still don’t know how to do it. If that’s you, here’s the quick fix for iPhone and Android.By Kim Komando
…
continue reading

1
Dropzone AI on AI's impact and role for SOC teams
18:43
18:43
Play later
Play later
Lists
Like
Liked
18:43In this Risky Business News sponsor interview, Catalin Cimpanu talks with Edward Wu, founder and CEO of Dropzone AI. Edward talks about the impact AI in modern-day SOC teams and how its role slowly becomes a force multiplier and productivity boost rather than workforce replacement. Show notes
…
continue reading
Motorola unveiled a completely new Razr flip phone. But this time, the phone comes with Perplexity A.I. baked in.By Kim Komando
…
continue reading
Ever post a pic online? There's a good chance it was scraped and added to an AI dataset. Check this site to find out.By Kim Komando
…
continue reading
Two teens started flipping discarded items from landfills. Now they run a seven-figure resale business.By Kim Komando
…
continue reading
Looking for a way to get in touch with someone online? Try these pro tips.By Kim Komando
…
continue reading

1
Beating the AI Game, Ripple, Numerology, Darcula, Special Guests from Hidden Layer... - Malcolm Harkins, Kasimir Schulz - SWN #471
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
…
continue reading

1
7MS #672: Tales of Pentest Pwnage – Part 70
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07Today’s a fun tale of pentest pwnage where we leveraged a WinRM service ticket in combination with the shadow credentials attack, then connected to an important system using evil-winrm and make our getaway with some privileged Kerberos TGTs! I also share an (intentionally) vague story about a personal struggle I could use your thoughts/prayers/vibe…
…
continue reading
Older Americans lost nearly $5 billion to scams last year. Don’t let it happen to your loved ones.By Kim Komando
…
continue reading
Paul Dhaliwal is the founder and CEO of CodeConductor. Priya Joseph is the AI field CEO at DDN. Lizzie Siegle is a developer advocate at Cloudflare. Erin Mikail Staples is a developer experience engineer at Galileo. This episode was recorded at HumanX last month. Next year’s event will be April 6-9, 2026 in San Francisco. Register today!…
…
continue reading

1
Risky Bulletin: Cybercriminals stole more than $16 billion last year
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21Cybercriminals stole more than $16 billion last year, Iran tries to hack an EU official, the Lazarus Groups pulls off a successful watering hole and zero-day attack, and WhatsApp adds new chat privacy features. Show notes
…
continue reading
Not a fan of the grocery run? Use these quick tech tricks to stay organized, save money, and skip the hassle.By Kim Komando
…
continue reading

1
Hacking Crosswalks and Attacking Boilers - PSW #871
2:04:15
2:04:15
Play later
Play later
Lists
Like
Liked
2:04:15The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
…
continue reading

1
Ep. 8 – OTP Flaw & Remote Code Execution: When Small Flaws Go Critical
15:45
15:45
Play later
Play later
Lists
Like
Liked
15:45A broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 0…
…
continue reading

1
CCT 239: Practice CISSP Questions - Assess the Effectiveness of Software Security (D8.3)
28:20
28:20
Play later
Play later
Lists
Like
Liked
28:20Send us a text Cybersecurity isn't just for enterprises—small and medium businesses face increasingly sophisticated threats with fewer resources to combat them. In this information-packed episode, Shon Gerber explores why cybersecurity matters critically for SMBs while delivering practical CISSP exam questions focused on Domain 8.3. Shon begins by …
…
continue reading
Who will lead the Catholic Church next? ChatGPT, Gemini, and Grok all have guesses — but they can’t seem to agree.By Kim Komando
…
continue reading

1
Standardization and simplification as key to engineering excellence
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44They also discuss: Lloyds Banking Group's multi-year journey to drive simplification and standardization, reduce cognitive load & improve engineering efficiency, and enhance developer happiness. Challenges engineering teams face today, along with the cultural shifts in regulatory environments. Episode notes: Connect with Hilary Lanham and Tom Kelk.…
…
continue reading
Tom Uren and Adam Boileau talk about how scam compound criminal syndicates are responding to strong government action by moving operations overseas. It’s good they are being affected, but they are shifting into new countries that don’t have the ability to counter industrial-scale transnational organised crime. They also discuss CISA’s Secure by Des…
…
continue reading
A Michigan mom thought she found the perfect home to rent on Facebook. Instead, she walked into a scam that cost her $2,500.By Kim Komando
…
continue reading

1
SE Radio 665: Malcolm Matalka on Developing in OCaml with Zero Frameworks
56:10
56:10
Play later
Play later
Lists
Like
Liked
56:10Malcolm Matalka, founder of Terrateam, joins host Giovanni Asproni to talk about the reasoning behind the choice of a not-so-widespread language (OCaml) and the (almost) total avoidance of frameworks for the development of Terrateam. While discussing the reasons for choosing a specific programming language and the advantages and disadvantages of us…
…
continue reading

1
From SOCs to Threat Detection Engineering: Crafting Better Security Responses - Chris Kulakowski
20:03
20:03
Play later
Play later
Lists
Like
Liked
20:03In this episode of the Security Repo Podcast, Chris Kulakowski, a seasoned detection engineer from IBM, delves into the complexities of threat detection, from writing detection rules to collaborating with red teams for proactive security strategies. He shares insights on prioritizing security risks, the evolving role of AI in cybersecurity, and the…
…
continue reading

1
Making Performance Testing Accessible for All with k6 Studio with Mark Meier and Tom Miseur
29:50
29:50
Play later
Play later
Lists
Like
Liked
29:50In this awesome installment, host Joe Colantonio sits down with Mark Meier and Tom Miseur from Grafana Labs to dive deep into the world of performance testing and how their brand new open source Grafana k6 Studio is making these powerful practices accessible for everyone on your team—from developers to QA and SREs. Try out Insight Hub free for 14 d…
…
continue reading
Always feel like you're being watched or listened to? You are. But here's the part no one wants to admit…By Kim Komando
…
continue reading

1
ISO 42001 Certification, CIOs Struggle to Align Strategies, and CISOs Rethink Hiring - Martin Tschammer - BSW #392
1:03:55
1:03:55
Play later
Play later
Lists
Like
Liked
1:03:55AI Governance, the next frontier for AI Security. But what framework should you use? ISO/IEC 42001 is an international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS) within organizations. It is designed for entities providing or utilizin…
…
continue reading

1
Risky Bulletin: Russian military personnel targeted with Android spyware
6:09
6:09
Play later
Play later
Lists
Like
Liked
6:09Russian military personnel targeted with Android spyware, Trump defends Hegseth after second Signalgate scandal, CISA’s Secure by Design leaders depart the agency, and forced-labour cyber scam compounds expand globally. Show notes
…
continue reading
A photo of Mark Zuckerberg shows tape over his laptop camera and mic. There’s a good reason you might want to do the same.By Kim Komando
…
continue reading

1
Brains, Elusive Comet, AI Scams, Microsoft Dog Food, Deleting Yourself, Josh Marpet - SWN #470
31:59
31:59
Play later
Play later
Lists
Like
Liked
31:59Brains, Scams, Elusive Comet, AI Scams, Microsoft Dog Food, Deleting Yourself, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-470
…
continue reading

1
PP059: News Roundup – Oracle Plays Breach Word Games, Fast Flux Worries CISA, AI Package Hallucinations, and More
34:09
34:09
Play later
Play later
Lists
Like
Liked
34:09Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you’ve applied the patch for the original threat. Avanti VPNs... Read more »…
…
continue reading
Ok, so vulnerable MCP tools are a thing now? Ken demonstrates installing and running an intentionally vulnerable MCP server with a bunch of example issues. Following is a discussion of the recent article and research around hallucinations of 3rd party dependencies/libraries in AI-Generated Python and JavaScript. New attack targets all dependent on …
…
continue reading

1
E045 - Dialed In: Telemarketing, Compliance, and Consumer Protection
48:12
48:12
Play later
Play later
Lists
Like
Liked
48:12Telemarketing compliance isn’t exactly the hottest topic in tech circles… but maybe it should be. In this episode, Milou and Brian sit down with Kevin Mayfield, Manager of Marketing Compliance at CompliancePoint, to dig into the often-overlooked world of do-not-call laws, TCPA risks, and the real impact of telemarketing rules on tech companies (yes…
…
continue reading