Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Web Security Podcasts

show episodes
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Artwork

1
Grumpy Old Geeks

Jason DeFillippo & Brian Schulmeister with Dave Bittner

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
  continue reading
 
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
Web 3 Native

LongHash Ventures

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted by Emma and Shi Khai of LongHash Ventures, we chat with the most innovative founders of Web 3.0 building more open, inclusive, and equitable financial and social infrastructure.
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork

1
Reality 2.0

Katherine Druckman and Doc Searls

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Brutally Honest Security

Barricade Cyber Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
  continue reading
 
Artwork

1
The Stack Overflow Podcast

The Stack Overflow Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
  continue reading
 
Artwork
 
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
  continue reading
 
Artwork

1
Security Boulevard Chat

Security Boulevard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
Artwork

1
Irregular Warfare Podcast

Irregular Warfare Initiative

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Irregular Warfare Podcast explores an important component of war throughout history. Small wars, drone strikes, special operations forces, counterterrorism, proxies—this podcast covers the full range of topics related to irregular war and features in-depth conversations with guests from the military, academia, and the policy community. The podcast is a collaboration between the Modern War Institute at West Point and Princeton University’s Empirical Studies of Conflict Project.
  continue reading
 
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
  continue reading
 
Every week Wayne Scott from brings together a team of technology journalists from http://www.ITProPortal.com to discuss, share analysis and argue about the biggest Tech News stories of the past week. From enterprise and business technology, to tech start ups, consumer gadgets, office IT and mobile you can get informed here. Plus join us live at some of the many technology shows around the world like CeBit, IFA, Infosec, The Gadget Show and much more !
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
The Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the ever-evolving realm of technology and digital innovation. Each episode is a treasure trove of knowledge, focusing on critical areas such as cybersecurity, the intricacies of SEO, and the latest advances in the digital world. Greg's expertise as a technical advisor shines through as he explores the nuances of digital marketing, offering listeners an in-depth understanding of the skills needed to stay ahead in t ...
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork
 
Sharing the work we do around the open web, information security and user privacy is an important role of Mozilla Security. The Mozilla Security Bytes podcast discuss various topics and technologies implemented in Firefox and other Mozilla products and initiatives.
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Artwork

1
Everyday Heroes

Hayden Baillio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to Everyday Heroes, a podcast about the unsung heroes of the tech world. From the phone in your pocket to the world's most critical digital infrastructure, open-source software has a hand in it. These free technologies that shape our digital world wouldn't be anything without the Heroes that maintain them, promote them, and evolve them - these are their stories. Everyday Heroes is brought to you by HeroDevs.
  continue reading
 
Healthcare is complicated. Joe Gellatly and the Medcurity team are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more. HIPAA laws continue to evolve. Go to hhs.gov for the latest information.
  continue reading
 
Artwork
 
Welcome to DataNext Podcast, every week our CEO Zeeshan Baig talks about latest Tools and Technologies, shares his experience, Best practices on Cloud computing, Big data, DevOps, Security. Tips on work-life balance, Professional Career and much much more. Subscribe and stay up to date with what's Next in Enterprise IT.
  continue reading
 
Artwork

1
WebInnovationX

Dr. Rachel Yager

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
WebInnovationX Web Innovation Center is a Global Think Tank in Digital Transformation of Businesses, the Study of the Social and Economic Impacts of the World Wide Web, and home to the World Wide Web Consortium W3C NY Metro Chapter. Join Our Thought Leaders at SymposiumX CertificationX AccelerationX. Meet the Experts and Get Inspired on Innovation Thought Leadership, Strategy, and Tactics. Powered by FortuneTimes Group.
  continue reading
 
Artwork

1
AWS Executive Insights

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Executive Insights podcast, brought to you by AWS (Amazon Web Services), features peer-to-peer conversations between business executives on innovating for growth, building resiliency, and shaping the future of their organizations. Learn more at AWS Executive Insights and follow us on LinkedIn. For video versions of these and other conversations, subscribe to our YouTube playlist.
  continue reading
 
Artwork

1
JavaScript Jabber

Charles M Wood

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
CodeNoobs

Danny, Randall, and Russell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
A podcast for new programmers and developers. Join CodeNoobs co-creators Danny, Randall, and Russell weekly to explore topics that anyone interested in programming and learning to code will find valuable.
  continue reading
 
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
  continue reading
 
Artwork

1
AWS Industrial Insights

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
  continue reading
 
Artwork

1
METAPHOR BY LIVEPLEX

Liveplex Marketing Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Our mission at Liveplex is to be the catalyst for transformation in the digital landscape. We empower enterprises with the tools and expertise needed to embrace Web 3.0 effortlessly. Through our APIs and services, we enable efficiency, data-driven decision-making, personalization, security, and trust, allowing our customers to not only thrive in the digital age but also lead with innovation. We are dedicated to enhancing customer experiences, helping businesses evolve, and shaping the future ...
  continue reading
 
Artwork

1
Drupal Brief

Drupal Brief

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Drupal Brief is the go-to podcast for quick and insightful AI generated summaries of the latest Drupal news, blogs, and podcasts. Stay informed and inspired in just a few minutes as we distill the most important updates and trends in the Drupal community! Drupal Brief is a podcast of Drupal Forge.
  continue reading
 
Artwork
 
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
  continue reading
 
Loading …
show series
 
This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on di…
  continue reading
 
Got a question or comment? Message us here! 🔎 This episode of The #SOCBrief dives into the world of dark web monitoring in digital forensics and incident response. Learn why leaked credentials are a top threat, how to safely detect exposures, and what steps SOC teams can take to stay proactive. Support the show Watch full episodes at youtube.com/@a…
  continue reading
 
Episode 139: In this episode of Critical Thinking - Bug Bounty Podcast Justin finally sits down with the great James Kettle to talk about HTTP Proxys, metagaming research, avoiding burnout, and why HTTP/1.1 must die! Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback here: info@critic…
  continue reading
 
Episode 143: In this episode of Critical Thinking - Bug Bounty Podcast Justin brings Brandyn back to announce him as our newest co-host. We chat about recent LHE experiences, and then break down some news. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingp…
  continue reading
 
The evolving role of technology in modern defense environments, highlighting innovations in communications, automation, and open-source frameworks. Drawing from personal experience, the conversation emphasizes how real-world conflicts are reshaping how tech is deployed, adopted, and understood across military operations. This week, Dave, Esmee, and…
  continue reading
 
Enforcement is active, policy is tightening, and threats continue to evolve. This episode looks ahead to what 2026 will bring for healthcare compliance—how recent OCR settlements, proposed HIPAA Security Rule updates, and CMS’s 2026 payment rule all point to one clear expectation. Hear what strong compliance looks like going forward, from mapping e…
  continue reading
 
In this episode of Reality 2.0, Katherine Druckman talks with Lori Lorusso from the Rust Foundation about the critical importance of sustainable stewardship for open source infrastructure. They discuss a joint statement from the OpenSSF, the Rust Foundation, and other community organizations emphasizing the need for financial support of package man…
  continue reading
 
Got a question or comment? Message us here! What’s the real difference between a penetration test and a red team engagement, and how can each benefit your SOC? In this episode, Andrew is joined by Tanner, to unpack how pentests uncover vulnerabilities, how red teams stress-test defenders, and why every organization should be leveraging these exerci…
  continue reading
 
Cyber Flash Point on the following topics: how ransomware kills in real life and latest cyber crime news, Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show 🔥New Special Offers! 🔥 Remove Your Private Data Online …
  continue reading
 
Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
  continue reading
 
At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today’s AI-driven enterprises. As SaaS adoption accelerates and AI agents proliferate, organizations face an explosion of human and non-human identities—and with it, growing risks like misconfigured access, orphaned accounts, a…
  continue reading
 
Show Description Who's the person to hire when your home network isn't working as reliably as it should? And while we're at it - can you also fix Dave's Find My notifications? What's the plan with Firefox in 2025? And Dave blogs (and mouth blogs) about his struggles with the MVP car. Listen on Website Links Why I hate the MVP car - daverupert.com T…
  continue reading
 
The provided source context paints a complex and multifaceted picture of the modern digital world, revealing it as an environment of profound dualities, offering unprecedented connection alongside significant peril. The materials span a wide spectrum, from deeply personal and often disturbing anecdotes of online dating to high-level analyses of cyb…
  continue reading
 
The provided texts offer two distinct sets of narratives: the first comprises several true crime stories focused on the dangers of online dating platforms like Tinder, detailing incidents ranging from near-abductions and physical attacks by scorned ex-partners to a murder committed by a date. The second source is a detailed media analysis of the "C…
  continue reading
 
BHU (Banco Hipotecario del Uruguay)The bank's initial public response severely minimized the true gravity of the digital threat by characterizing it as a routine technical issue, while in reality, the institution was the victim of a large-scale data theft, cryptocurrency ransom demand, and digital extortion.The contradictions between the official s…
  continue reading
 
ADVANCE: MORE TO COME SOON. The provided sources center on the dire state of cybersecurity in Uruguay, particularly highlighting the outspoken ethical hacker Alberto Daniel Hill (ADH) and two catastrophic cyber incidents. Several transcripts detail Hill's career, which includes being unjustly imprisoned in 2017 for responsibly reporting a security …
  continue reading
 
SECTION I: Resumen Ejecutivo e Implicaciones Estratégicas de la Extorsión Confirmada Este informe experto proporciona un análisis exhaustivo y actualizado del incidente cibernético que afectó al Banco Hipotecario del Uruguay (BHU), una institución financiera estatal crítica. El informe sintetiza la estrategia inicial de minimización institucional (…
  continue reading
 
This expert analysis report examines the actions of an individual identified as CyberGurl10 (CG10), focusing on her severe pattern of displaced aggression directed at her fiancé, Alberto, rather than the true sources of her chronic stress. The source asserts that CG10’s rage stemmed from feelings of structural powerlessness related to an unresponsi…
  continue reading
 
In the world of cybersecurity, there are big lies that have been perpetuated about compliance, fixability and communication--and it's time to burn it all down and start over. Many experts see one main cybersecurity truth, especially about AI, SIEM, EDR and related business technology. By examining the intersection of AI, cybersecurity, and complian…
  continue reading
 
Expert Analysis Report: The Weaponization of Intimate Vulnerability and Displaced Aggression in a High-Conflict Environment I. Executive Summary: The Crisis Nexus of Stress and Directed Aggression This analysis examines the severe, externally driven pressures faced by the individual identified as CyberGurl10 (CG10) and the resulting pattern of disp…
  continue reading
 
The world is a dumpster fire, confirmed. Following California's landmark AI safety bill SB 53, the head of Nvidia is allegedly "quaking in his boots"—which is a good sign, unlike the news that the "Nirvana Baby" Spencer Elden's lawsuit was finally dismissed. Meanwhile, corporate America continues its pivot to chaos: Spotify shuffled its execs, Meta…
  continue reading
 
Jamey Davidson, Partner at international law firm O’Hagan Meyer concentrates on top ways to reduce risk in cyber breach litigation, defending businesses in cyber breach class-action law suits and how to build defenses to reduce cyber breach liability. We discuss: Cyber Attack Lawsuits: How to Avoid the Litigation How Cyber Breach Litigation Works W…
  continue reading
 
Episode 135 of the Irregular Warfare Podcast examines the fate of victorious rebel groups after civil wars—and why some remain loyal to post-war governments while others fragment, defect, or even overthrow the regimes they helped create. Our guests begin by exploring the core puzzle: conventional wisdom suggests that decisive victory produces stabi…
  continue reading
 
Gil Feig, co-founder and CTO of Merge, joins the show to explore Merge’s approach for reducing third-party APIs to a single call, the complexities of and need for data normalization, and the role that AI and MCP plays in the future of API functionality. Episode notes: Merge connects you to any third-party system for fast, secure integrations for yo…
  continue reading
 
The Banco Hipotecario del Uruguay (BHU) experienced a significant operational disruption, formally termed an "incidente informático" 1, durante las últimas horas del martes 30 de septiembre de 2025.1Este incidente fue detectado mientras la institución se encontraba ejecutando tareas operativas críticas, específicamente “los procesos de cierre de fi…
  continue reading
 
I. Strategic Overview and Executive Summary of the Crisis ContextI.1. Incident Synthesis: Timeline and Operational Definition The Banco Hipotecario del Uruguay (BHU) experienced a significant operational disruption, formally termed an “incidente informático” 1, during the late hours of Tuesday, September 30, 2025.1 This incident was detected while …
  continue reading
 
In addition to some fun news, we get a Mary Ann Davidson as a surprise guest. We even get a great quote from her of "You're never going to have enough cybersecurity people to defend what was never built to be defensible.". Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-894…
  continue reading
 
In addition to some fun news, we get a Mary Ann Davidson as a surprise guest. We even get a great quote from her of "You're never going to have enough cybersecurity people to defend what was never built to be defensible.". Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-894…
  continue reading
 
The catastrophic cyberattack that validated Alberto Daniel Hill's prophecy involved the theft of 30,000 of Uruguay's national PKI certificates. This event, described as a "devastating nationaltering crisis" and a "catastrophic cyber failure," occurred a few years after ADH's initial public warning.1. Nature of the Attack: A hacker, calling themselv…
  continue reading
 
Fraud Expert Ayelet Biger joins us. Find her at her site: https://scamranger.ai/ Chapters 00:00 Introduction and Overview 02:49 Shining a Light on the Victim's Perspective 10:00 Creating a Seamless User Experience 12:23 The Role of Behavioral Biometrics in Fraud Detection 15:16 Distinguishing Between Legitimate Users and Cyber Criminals 20:06 The E…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play