Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork
 
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork

1
The Breach Report

Robert Wortmann, Rense Buijen

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
  continue reading
 
Artwork

1
Shame Spiral

Ely Kreimendahl

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A comedy podcast about shame- because no one roasts you harder than yourself! Each week, psychotherapist-turned-comedian Ely Kreimendahl exploits her therapy skills to talk all-things-shame with a new special guest. Every guest shares a core story of something that once made them spiral HARD, answers both silly and emotionally complicated questions, and even if these conversations are ACCIDENTALLY therapeutic, it's not therapy.... Ely goes ALL IN on sharing her shame, too. Does coming togeth ...
  continue reading
 
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.
  continue reading
 
Human trafficking is one of the greatest injustices in our world today. It’s the exploitation of vulnerable people for their bodies and labor. It’s modern-day slavery, and it’s generating billions of dollars each year. In this podcast, we will unpack the problem of human trafficking, share powerful stories from the frontlines, hear from thought leaders in the fight for freedom, and equip you to make a difference–right where you are. A21 is a global anti-human trafficking organization operati ...
  continue reading
 
Artwork
 
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
  continue reading
 
Artwork
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
Eric Payne, a divorced dad and retired marriage & fatherhood blogger, tells the comedic tale of his "Chapter 2" — having to start life over brand new after a divorce he didn't want. What Does Starting Over Mean? Although "free” for the first time in 15 years, Eric has years of baggage and a stubborn desire to hold on to the past which initially keeps him stuck as he tries to move in a world way different than the one where he first met his ex-wife in the year 2000. From one-night stands to g ...
  continue reading
 
Artwork

1
15 Minutes with the Boss

The Australian Financial Review

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
15 Minutes with the Boss is a podcast that gives listeners exclusive access to some of the top CEOs in the country. Each week AFR BOSS editor Sally Patten sits down with a prominent leader and asks them to share the invaluable advice and wisdom they have accumulated throughout their careers. For stories of success and failure and everything in-between, search and follow 15 Minutes with the Boss. It’s 15 minutes you can’t afford to miss.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
Clarion Podcasts

Clarion Project

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Bringing you vital facts and perspectives on Islamist extremism and how to combat it directly from leading activists in the field. Clarion Podcast is brought to you by Clarion Project, dedicated to challenging Islamist extremism and promoting dialogue with Muslim human rights activists.
  continue reading
 
Artwork

1
The Mobile Security Show

AT&T Tech Channel

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
  continue reading
 
Artwork
 
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
  continue reading
 
A lively discussion of the threats affecting supply chain, specifically focused on firmware and low-level code that is a blind spot for many organizations. This podcast will feature guests from the cybersecurity industry discussing the problems surrounding supply chain-related issues and potential solutions.
  continue reading
 
Loading …
show series
 
🎙️ Japan Trading Account Hack, Windows NTLM Vulnerability Exploited, North Korea Cyberattacks, Info Sharing Bill 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 900: Today’s episode will discuss the latest news as Japan Trading Account Hack more news below: · Abilene, TX Cyberattack…
  continue reading
 
🎙️ Georgia School District Paralyzed by Ransomware, IT Help Desk Extortion, Wiper Malware Hidden in GitHub 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 905: Today’s episode will discuss the latest news as UK Georgia School District Paralyzed by Ransomware more news below: · Weste…
  continue reading
 
Signal clone gets hacked Sounding the alarm on easyjson Ransomware group takes credit for UK retail attacks Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default…
  continue reading
 
Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung s MagicInfo 9 CMS, was patched last August but attracted new attention last week after being mostly ignored so far. https://isc.sans.edu/diary/Mirai+No…
  continue reading
 
SANS Stormcast Tuesday, May 6th: Mirai Exploiting Samsung magicInfo 9; Kali Signing Key Lost; Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung’s MagicInfo 9 CMS, was patched last August but attracted …
  continue reading
 
In this week’s episode, Holly Masters, CEO of The McGrath Foundation talks about why having a non-linear career path is so enriching, how forming relationships and networking can lead to surprising results and why she left Estee Lauder to work in the for-purpose sector. This podcast is sponsored by Aussie Broadband. See omnystudio.com/listener for …
  continue reading
 
🎙️ UK Retailer Harrod’s Cyber Attack, E-Commerce Supply Chain Attacks, TikTok EU GDPR Fine 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 904: Today’s episode will discuss the latest news as UK Retailer Harrod’s Cyber Attack more news below: · Ransomware Attacks on Food · Black Kin…
  continue reading
 
Microsoft ends Authenticator password autofill in favor of Edge StealC malware enhanced with stealth upgrades and data theft White House proposes cutting $491M from CISA budget Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from …
  continue reading
 
Steganography Challenge Didier published a fun steganography challenge. A solution will be offered on Saturday. https://isc.sans.edu/diary/Steganography+Challenge/31910 Microsoft Makes Passkeys Default Authentication Method Microsoft is now encouraging new users to use Passkeys as the default and only login method, further moving away from password…
  continue reading
 
SANS Stormcast Monday, May 5th: Steganography Challenge; Microsoft Makes Passkeys Default and Moves Away from Authenticator as Password Manager; Magento Components Backdoored. Steganography Challenge Didier published a fun steganography challenge. A solution will be offered on Saturday. https://isc.sans.edu/diary/Steganography+Challenge/31910 Micro…
  continue reading
 
Welcome to AI Weekly Insights — your go-to podcast for the latest breakthroughs in artificial intelligence and machine learning! This episode covers the U.S. passing the landmark Take It Down Act to criminalize non-consensual deepfake content, Google’s powerful AI Mode in Search reshaping online queries, Amazon Web Services’ release of its most adv…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest DJ Schleen, Head of Security, Boats Group Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ranso…
  continue reading
 
UK retailer Co-Op suffers cyberattack FBI shares list of 42,000 LabHost phishing domains NSO group looking at hefty damages in WhatsApp case Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. Thr…
  continue reading
 
Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
  continue reading
 
SANS Stormcast Thursday, May 1st: More Steganography; Malicious Python Packages GMail C2; BEC to Steal Rent Payments Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using…
  continue reading
 
🎙️ Ascension Breach Linked to Cleo Hack, North Korea IT Fraud Hits Fortune 500, Clause AI Exploited 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 903: Today’s episode will discuss the latest news as Ascension Breach Linked to Cleo Hack more news below: · Co-op Retailer System Shut…
  continue reading
 
Alleged ‘Scattered Spider’ member extradited to U.S. Experts see little progress after major Chinese telecom hack Polish police take down impersonation scammers Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks…
  continue reading
 
Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
  continue reading
 
SANS Stormcast Thursday, May 1st: Sonicwall Attacks; Cached Windows RDP Credentials Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API “login” and “domain” endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sa…
  continue reading
 
Send us a text In Part 1 of this two-part MLSecOps Podcast, Principal Security Consultant Gavin Klondike joins Dan and Marcello to break down the real threats facing AI systems today. From prompt injection misconceptions to indirect exfiltration via markdown and the failures of ML Ops security practices, Gavin unpacks what the industry gets wrong—a…
  continue reading
 
Rapid7 Senior Director of Threat Analytics Christiaan Beek joins the Nexus Podcast to discuss the technical evolution and economic models that maintain ransomware's viability among threat actors. Ransomware became a for-profit threat more than a decade ago and has progressed into the No. 1 threat facing many critical infrastructure organizations. I…
  continue reading
 
🎙️ SAP Zero-Day, Nova Scotia Energy Provider Offline, SK Telecom Response, Leaked Git Secrets & Tokens 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 902: Today’s episode will discuss the latest news as SAP ZeroDay Exploit more news below: · France Blames Russia for Cyberattacks · …
  continue reading
 
Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi Google tracked 75 zero days exploited in the wild in 2024 France ties Russian APT28 hackers to 12 cyberattacks on French orgs Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect b…
  continue reading
 
More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
  continue reading
 
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people’s credentials. https://isc.…
  continue reading
 
Uyghur Language Software Hijacked to Deliver Malware Cloudflare sees a big jump in DDoS attacks 4chan back online Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a d…
  continue reading
 
Welcome to Cypher Tech Hacks, the podcast where host Alex Cipher takes you inside the most shocking, real-world hacks in digital history. In today’s episode, we uncover The CommBox Classroom Exploit—a ransomware attack that started with smartboards in schools. Attackers used unsecured CommBox devices to infiltrate school networks, encrypt critical …
  continue reading
 
SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
  continue reading
 
SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows’ System Resource Usage Monitor (SRUM). This database logs how much resources software used…
  continue reading
 
On this week's episode, AGL CEO Damien Nicks talks about the value of unwinding on weekends, the challenges of starting a business from scratch, and the importance of getting outside of his comfort zone and making mistakes. This podcast is sponsored by AICD See omnystudio.com/listener for privacy information.…
  continue reading
 
SAP zero-day vulnerability under widespread active exploitation Hackers abuse OAuth 2.0 workflows to hijack Microsoft 365 accounts Cybersecurity firm CEO charged with installing malware on hospital systems Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity control…
  continue reading
 
Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
  continue reading
 
SANS Stormcast Monday, April 27th: Image Steganography; SAP Netweaver Exploited Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use…
  continue reading
 
Enjoying the content? Let us know your feedback! This week's episode looks at the FBI’s 2024 Annual Internet Crime Report -an analysis that not only highlights the scale of cybercrime but also reveals the evolving tactics of cybercriminals and the staggering financial impact on individuals and businesses alike. This of course relates to US but it i…
  continue reading
 
This week’s AI developments are shaking up the tech world! Microsoft introduces Recall for Copilot+ PCs, Adobe unveils Firefly Image Model 4, and OpenAI expands its Deep Research tool to free users. Intel steps up to challenge Nvidia with new AI chip ambitions, while the White House launches a major AI education initiative. Plus, DeepMind’s updated…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bethany De Lude, CISO emeritus, The Carlyle Group Thanks to our show sponsor, Dropzone AI Alert investigation is eating up your security team’s day—30 to 40 minutes per alert adds up fast. Dropzone AI‘s SOC Analyst transforms this rea…
  continue reading
 
Once again, we're back with all the answers. Traditional vulnerability management comes with many pitfalls, and we're counting down the solutions to all the problems you might be running into. Ivanti's Chris Goettl and Robert Waters break down the back five on our list: a periodic approach to remediation, poor prioritization, lack of business conte…
  continue reading
 
Loading …
Listen to this show while you explore
Play