Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Tech Exploits Podcasts

show episodes
 
Artwork
 
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
  continue reading
 
Artwork

1
Tech Against Terrorism

Tech Against Terrorism

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Want to learn more about how terrorists and violent extremists are using the internet to communicate and share propaganda? Perhaps you’re interested in why terrorists share their manifestos online and livestream their attacks? The Tech Against Terrorism podcast is a deep dive into the evolving use of the internet by terrorists and violent extremists, how this relates to real world harms, and what can be done to support the tech sector to disrupt this threat. Join us as we speak to the world’ ...
  continue reading
 
Artwork

1
Exploit

Exploit Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
A show about hacking the system, hosted by Patrick Tomasso and Gabi Pirraglia. Patrick is a content creator and Gabi is digital strategist, together they pull apart the internet and social media to reveal the hidden creative formulas for success.
  continue reading
 
Artwork

1
Click Here

Recorded Future News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork
 
Scheer Intelligence features thoughtful and provocative conversations with "American Originals" -- people who, through a lifetime of engagement with political issues, offer unique and often surprising perspectives on the day's most important issues.
  continue reading
 
The Elite Dangerous Podcast from America!! Our (sometimes) merry cast of "professional podcasters" play Elite: Dangerous and bring you news, tips, guides, opinions, and some crazy stuff now and then. All about the best space sim ever made. http://loosescrewsed.com Join us on discord! And check out the merch store! PROMO CODES https://discord.gg/3Vfap47Rea Support us on Patreon: https://www.patreon.com/LooseScrewsED Or on youtube https://www.youtube.com/@LooseScrewsED
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
OUCH!

Joel Anker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
You already know the monthly OUCH! Newsletter brings you the latest cybersecurity tips—but now, we’re taking it even further. Tune in to the new OUCH! Podcast, where we go deeper on cybersecurity topics and give you extra insights to stay ahead of the threats.
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Artwork

1
Technado

ACI Learning

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Technado crew covers a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
  continue reading
 
Artwork

1
Future Commerce

Phillip Jackson, Brian Lange

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Future Commerce is the culture magazine for Commerce. Hosts Phillip Jackson and Brian Lange help brand and digital marketing leaders see around the next corner by exploring the intersection of Culture and Commerce. Trusted by the world's most recognizable brands to deliver the most insightful, entertaining, and informative weekly podcasts, Future Commerce is the leading new media brand for eCommerce merchants and retail operators. Each week, we explore the cultural implications of what it me ...
  continue reading
 
Artwork

1
ABA on Call

CentralReach

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
ABA on Call presented by CentralReach, explores the Applied Behavior Analysis/Healthcare Technology industries through thought-provoking conversation. Watch to explore ideas and trends in the field with renowned ABA experts, Rick Kubina Jr., Ph.D, BCBA-D & Doug Kostewicz, Ph.D, BCBA-D. Earn BACB CEUs to support your ongoing certification for Season 4 and future episodes.
  continue reading
 
Artwork

1
Day[0]

dayzerosec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Artwork

1
Daily Crypto Report

Daily Crypto Report

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The longest-running daily podcast briefing for news about bitcoin, blockchain, NFTs, and all other global cryptocurrency, digital asset, metaverse, and DLT updates. A daily, 2-4 minute report of everything you need to know to be informed about the cryptocurrency and blockchain space including prices, policy, developments, and governance. The information presented should be considered developing news and not investment advice.
  continue reading
 
Artwork

1
Lost Debate

The Branch

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Lost Debate is a weekly podcast from The Branch that brings you news, ideas, and arguments from around the political spectrum. We engage in the good-faith discussions that too much of our society and media miss. It's hosted by Ravi Gupta, a former Obama staffer turned school principal.
  continue reading
 
Artwork

1
The Mobile Security Show

AT&T Tech Channel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
  continue reading
 
Artwork
 
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
  continue reading
 
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
  continue reading
 
Artwork
 
The Cyber Ways Podcast brings academic cyber security research into the "real world." We interview top academic researchers to find how their research can be put into practice by cyber security professionals. Our focus is on behavioral aspects of cyber security. Occasionally, we touch on related topics, such as information privacy and surveillance.Each episode discusses one published, peer-reviewed article to reveal the practical implications of the research. Your hosts, Tom Stafford and Cra ...
  continue reading
 
Artwork

1
Easy Prey

Chris Parker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
  continue reading
 
Loading …
show series
 
Welcome to Scheer Intelligence, where insight meets honesty. I'm Robert Scheer, and in this episode, we're taking a deep dive into the shadowy world of nuclear technology with acclaimed author Thomas Bass. We'll explore the ongoing disaster at Fukushima, the dangerous illusions of peaceful nuclear energy, and the profound geopolitical and environme…
  continue reading
 
"The thing to challenge is the fact that fraud prevention is a vertical by itself," says Guido Ronchetti, CTO at XTN Cognitive Security. He stresses that recent fraudulent trends exhibit "no real separation between fraud, cybersecurity, and AML.” In this episode of The Security Strategist podcast, Jonathan Care discusses fraud prevention with Ronch…
  continue reading
 
NHS confirms patient death linked to ransomware attack BreachForums busted again Thousands of SaaS apps still vulnerable to nOAuth Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operate…
  continue reading
 
Mass layoffs, AI court cases, and unsatisfied customers are all the rage today, but you know what else is cool? Noctua's got a new fan coming out. Heck ya.NEWS SOURCES: https://linustechtips.com/topic/1616193-mass-layoffs-dbrands-killswitch-woes-ai-training-isnt-piracy-more/► GET MERCH: https://lttstore.com► GET EXCLUSIVE CONTENT ON FLOATPLANE: htt…
  continue reading
 
NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 Remote code execution in CentOS Web Panel - CVE-2025-48703 An arbitrary file upload vulnerab…
  continue reading
 
Cybercriminals target financial institutions across Africa using open-source tools. Threat actors are using a technique called Authenticode stuffing to abuse ConnectWise remote access software. A fake version of SonicWall’s NetExtender VPN app steals users’ credentials. CISA and the NSA publish a guide urging the adoption of Memory Safe Languages. …
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst Hayden and Threat Hunter Leo as they discuss: New Scattered Spider Attack Chain Israel and Iran Cyber Threat Deep Dive Top Iran-linked Threat Groups & How to Mitigate Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research…
  continue reading
 
Ravi is joined by Bradley Tusk to break down one of the wildest political upsets in recent memory: Zohran Mamdani’s decisive win in the New York City mayoral primary. They unpack how it happened, why Cuomo flamed out so badly, and what Mamdani needs to do next if he wants to govern the city. From campaign strategy to trash collection, rent freezes …
  continue reading
 
People used to think fraud was something that happened in the shadows, rare, distant, and mostly affecting big companies. But after talking to PJ Rohall, it’s clear that fraud is evolving fast, and it’s showing up in places most of us don’t even think to look. In this episode, I sit down with PJ Rohall, Head of Fraud Strategy and Education at SEON …
  continue reading
 
Hackers target over 70 Microsoft Exchange servers to steal credentials via keyloggers Apple, Netflix, Microsoft sites ‘hacked’ for tech support scams The 2022 initiative by Cloudflare, CrowdStrike and Ping Identity provided cybersecurity support to critical infrastructure sectors seen as potential targets of Russia-linked attacks Huge thanks to our…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love discusses various pressing issues and trends in the realm of cybersecurity. The episode starts with a revelation from Okta's 2025 Customer Identity Trends report, which highlights the conflicting digital behaviors of Canadians who, despite their fear of identity theft, often reuse passwords acro…
  continue reading
 
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: We roll our eyes over the “16 billion credentials” leak hitting mainstream news Some interesting cyber angles emerge from the conflict in Iran Opensource maintainer of libxml2 is fed up with this hacker crap Shockingly, there are yet more ways to trick people i…
  continue reading
 
Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each scans than they used to, but the average length of passwords did not change. https://isc.sans.edu/diary/Quick%20Pass…
  continue reading
 
Cybersecurity warnings about possible Iranian retaliation have surged. A potential act of sabotage disrupts the NATO Summit in The Hague. Canadian cybersecurity officials discover Salt Typhoon breached a major telecom provider. The U.S. House bans WhatsApp from all government devices. APT28 uses Signal chats in phishing campaigns targeting Ukrainia…
  continue reading
 
NEWS SOURCES: Look Ma, No Hands https://www.theverge.com/tesla/691061/yep-thats-a-tesla-robotaxi-driving-on-the-wrong-side-of-the-road https://www.theverge.com/news/690846/tesla-robotaxi-first-reaction-austin https://www.bbc.com/news/articles/cjwnlje3yp1o https://www.reuters.com/business/autos-transportation/tesla-tiptoes-into-long-promised-robotax…
  continue reading
 
Today's blockchain and cryptocurrency news Bitcoin is down slightly at $105,281 Eth is down slightly at $2,411 XRP, is up slightly at $2.18 Ledger launches Recovery Key Canton Network developer raises $135 million. Smarter Web Company buys $20M in BTC. Nano Labs plans BNB trove. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
Today: A story about a technology that began in the fields — tracking cattle — and is now on the ankles of immigrants. It’s part of a program called “alternatives to detention.” And these ankle monitors, smartphone apps, GPS check-ins have changed. They’re not just tools to monitor. Increasingly, they’re being used to entrap. And for some immigrant…
  continue reading
 
DHS warns of retaliatory Iranian cyberattacks Steel giant Nucor confirms breach Ransomware hits healthcare system again Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a de…
  continue reading
 
Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%20AtHome%20IP%20Cameras/32062 Critical Netscaler Security Update CVE-2025-5777 CVE 2025-5777 is a critical severity vu…
  continue reading
 
US warns of heightened risk of Iranian cyberattacks. Cyber warfare has become central to Israel and Iran’s strategies. Oxford City Council discloses data breach. Europe aiming for digital sovereignty. Michigan hospital network says data belonging to 740,000 was stolen by ransomware gang. RapperBot pivoting to attack DVRs. A picture worth a thousand…
  continue reading
 
"What we're seeing now is a lot of the vendors that were traditionally one of the identity pillars are kind of expanding into other pillars,” says Kevin Converse, Vice President, Identity and Access Management, GuidePoint Security. In this episode of The Security Strategist podcast, Richard Stiennon speaks with Converse, VP at GuidePoint Security. …
  continue reading
 
In this episode of Cybersecurity Today, hosted by David Shipley, key cybersecurity incidents and threats are discussed. The Canadian Center for Cybersecurity revealed a breach by Chinese state-sponsored hackers of a Canadian telco, with further threats expected to continue targeting Canadian critical infrastructure. The U.S. braces for potential Ir…
  continue reading
 
CMC officially points finger at Scattered Spider for Marks & Spencer and Co-op attacks Aflac investigating suspicious activity on its U.S. network Russian dairy producers suffer cyberattack Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses…
  continue reading
 
Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Lisa Miller, a former Deputy Insur…
  continue reading
 
ADS & Python Tools Didier explains how to use his tools cut-bytes.py and filescanner to extract information from alternate data streams. https://isc.sans.edu/diary/ADS%20%26%20Python%20Tools/32058 Enhanced security defaults for Windows 365 Cloud PCs Microsoft announced more secure default configurations for its Windows 365 Cloud PC offerings. https…
  continue reading
 
Please enjoy this encore of Career Notes. Jadee Hanson, CIO and CISO at Code 42, started her technology journey thanks to the help of a teacher in high school. She began college studying computer science and ended with a degree in computer information systems as it had more of the business side. Working in the private sector for companies such as D…
  continue reading
 
Enjoying the content? Let us know your feedback! In today’s interconnected world, the security of our digital infrastructure relies heavily on cryptography—the science of protecting information by transforming it into unreadable formats for unauthorized users. But how do we know the cryptographic solutions we use are truly secure? That’s where stan…
  continue reading
 
Today's blockchain and cryptocurrency news Bitcoin is up slightly at $103,897 Eth is down slightly at $2,442 XRP, is down slightly at $2.13 Reddit considers using World orb for iris scanning Nakamoto raises funds for BTC treasury French crypto investor kidnapped. Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the M…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play