Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Center For Internet Security Podcasts

show episodes
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
We Mean Business

BizJournalism

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Originally the “How to Cover Money” podcast series, ”We Mean Business” is produced by The Reynolds Center for Business Journalism, designed specifically for journalists who want to cover business better on their beats.
  continue reading
 
Artwork

1
Tech Bytes

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
  continue reading
 
Artwork

1
TED Tech

TED Tech

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
From the construction of virtual realities to the internet of things to the watches on our wrists—technology's influence is everywhere. Its role in our lives is evolving fast, and we're faced with riveting questions and tough challenges that sit at the intersection of technology and humanity. Listen in every Friday, with host, journalist Sherrell Dorsey, as TED speakers explore the way tech shapes how we think about society, science, design, business, and more. Follow Sherrell on Instagram @ ...
  continue reading
 
Artwork

1
The Nation Podcasts

The Nation Magazine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Here's where to find podcasts from The Nation. Political talk without the boring parts, featuring the writers, activists and artists who shape the news, from a progressive perspective.
  continue reading
 
Artwork

1
Over The Edge

Caspian Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
  continue reading
 
Artwork

1
The LA Report

LAist Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The L.A. Report is a breakdown of the day's top news from Southern California, featuring the award-winning reporting of LAist 89.3 FM – L.A.'s number one NPR station. Hosted by Austin Cross in the morning and Julia Paskin in the afternoon, it's the smart way to start and end your day. This program is made possible in part by the Corporation for Public Broadcasting, a private corporation funded by the American people.
  continue reading
 
Loading …
show series
 
SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://…
  continue reading
 
Donald Trump, found guilty of sexual assault and defamation, owes E. Jean Carroll $88 million. She explains how she beat him in court, twice, proving that he attacked her in a Bergdorf dressing room and then lied about it. Her new book is Not My Type: One Woman vs. a President. Also, the leading autopsies on the 2024 defeat of Democrats are missing…
  continue reading
 
How do you get more from GitHub in your work routine? Richard chats with April Yoho about how sysadmins can take advantage of more GitHub features to make better quality scripts and more! April discusses the capabilities of GitHub Copilot to assist administrators in comprehending the intricacies of source management, including branching and merging…
  continue reading
 
A man accused of aiding in the Palm Springs fertility clinic bombing has died in custody. A plan to sell off millions of acres of California's public lands may be off the table. What a monthly stipend can mean for LA's community college students. Plus, more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.com Vis…
  continue reading
 
In this episode, we dive into the 2024 McLaren Health Care data breach that compromised the sensitive information of over 743,000 individuals—just one year after a similar ransomware attack impacted 2.2 million. We’ll unpack the timeline of the attack: how cybercriminals gained unauthorized access between July 17 and August 3, exploiting vulnerabil…
  continue reading
 
SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each s…
  continue reading
 
This podcast dives deep into one of the most pressing vulnerabilities in modern AI — the rise of sophisticated "jailbreaking" attacks against large language models (LLMs). Our discussion unpacks a critical briefing on the evolving landscape of these attacks, with a spotlight on the novel “Echo Chamber” technique discovered by NeuralTrust. Echo Cham…
  continue reading
 
Today on the Tech Bytes podcast, sponsored by HPE, we get a preview of HPE Discover. We talk about networking, security, and agentic AI announcements coming out of the event. We’ll also talk about how HPE is converging network and security in its product portfolio, and HPE’s approach to AI both as a tool being... Read more »…
  continue reading
 
In this episode, we dive deep into the alarming revelations about Salt Typhoon—a Chinese state-sponsored advanced persistent threat (APT) actor, also known as RedMike, Earth Estries, FamousSparrow, GhostEmperor, and UNC2286. Backed by China’s Ministry of State Security (MSS), this group has been running extensive cyber espionage operations since at…
  continue reading
 
Protesters in LA call for regime change in Iran. LA's police chief defends his officers in the face of anti-ICE protests. California's new tool that treats extreme heat like a hurricane or tornado. Plus more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.com Visit www.preppi.com/LAist to receive a FREE Preppi E…
  continue reading
 
In this eye-opening episode, we break down a sophisticated new trend in tech support scams (TSS) that’s catching even the most cautious users off guard. Scammers are now hijacking Google Ads and manipulating search results to funnel users—who are simply looking for help—to malicious phone numbers injected directly into legitimate websites like Appl…
  continue reading
 
Ben Freeman and Nick Cleveland-Stout from the Quincy Institute join the program to talk about their Think Tank Funding Tracker, a repository that tracks funding from foreign governments, the U.S. government, and Pentagon contractors to the top 50 think tanks in the United States over the past five years. The group discusses think tanks’ role in the…
  continue reading
 
A new bill would require law enforcement officers operating in California to identify themselves. The debris cleanup from 2023's Tustin hangar fire is almost finished. We have a guide to help connect immigrant communities with food, remote jobs, financial aid, and legal resources. Plus, more. Support The L.A. Report by donating at LAist.com/join an…
  continue reading
 
In this episode, we take a deep dive into the Qilin ransomware group — now regarded as the world’s leading ransomware-as-a-service (RaaS) operation — and explore how it’s reshaping the cybercrime landscape in 2025. Qilin, also known as Agenda, burst onto the scene in 2022 with a Go-based ransomware. It has since evolved into a highly evasive Rust-b…
  continue reading
 
SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%…
  continue reading
 
In this episode, we dive deep into the story behind CVE-2025-27363, a critical zero-click vulnerability in the widely used FreeType font rendering library. Initially discovered by Facebook’s security team and patched by Google in May 2025, this flaw allowed attackers to execute arbitrary code on Android devices—without any user interaction—by explo…
  continue reading
 
In this episode, we take a deep dive into the June 2025 cyberattack on Aflac, one of the latest strikes in a growing wave of sophisticated, AI-driven cyber campaigns targeting the insurance industry. On June 12, Aflac detected suspicious activity within its U.S. network—a breach attributed to a highly organized cybercrime group and part of a larger…
  continue reading
 
Demonstrators hit the streets of LA to protest the military strikes on Iran. The legal battle over who controls the National Guard in LA throws it back to the 70s... the 1870s. LA City Council is gearing up for its own legal fight over the ICE arrests. Plus more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.co…
  continue reading
 
In May 2025, a ransomware attack forced Nucor — one of America’s largest steel producers — to halt its metal production operations. This wasn’t just a corporate IT incident: it disrupted a critical link in the nation’s industrial supply chain. In this episode, we take an in-depth look at the Nucor attack: how cybercriminals targeted operational tec…
  continue reading
 
On a recent trip to El Salvador, writer Viet Thanh Nguyen noticed striking parallels between the small Central American nation and his own country of origin, Vietnam. Both endured the atrocities of war, each fueled by anti-communist U.S. intervention. And both conflicts—the Vietnam War and El Salvador’s civil war—triggered refugee and migrant crise…
  continue reading
 
SANS Stormcast Monday, June 23rd, 2025: ADS and Python; More Secure Cloud PCs; Zend.to Path Traversal; Parser Differentials ADS & Python Tools Didier explains how to use his tools cut-bytes.py and filescanner to extract information from alternate data streams. https://isc.sans.edu/diary/ADS%20%26%20Python%20Tools/32058 Enhanced security defaults fo…
  continue reading
 
A staggering $225 million in illicit cryptocurrency was recently seized by U.S. authorities in what has become the largest digital asset recovery in Secret Service history. This episode unpacks the mechanics, methods, and forensics that made this possible—and how a sprawling network of scams, labor compounds, and fake identities in Southeast Asia u…
  continue reading
 
State and local officials say they're monitoring security threats after the U.S. struck three Iran nuclear sites on Saturday. Foot traffic is down in popular Asian ethnic enclaves out of fear of immigration actions. Sherman Oaks residents react to a new neighborhood Trader Joe's. Plus, more. Support The L.A. Report by donating at LAist.com/join and…
  continue reading
 
Ransomware groups are no longer just encrypting data — they're going straight for the backups. And if those backups aren’t properly protected, recovery becomes impossible, and ransom payouts more likely. In this episode, we dive deep into how threat actors are exploiting critical vulnerabilities in widely used backup systems, focusing on the recent…
  continue reading
 
Donald Trump has betrayed his promise to be a pro-peace president. Prodded by Washington hawks and the Israeli government, he has green-lit Israel’s attack on Iran, which the Untied States might soon join directly. A new Middle Eastern war would be a catastrophe. In order to stop it, Democrats will need to recover the anti-war politics that they ad…
  continue reading
 
Ransomware just bankrupted a 100-year-old manufacturer—and the world should take notice. In this episode, we dissect the cyberattack that brought down Fasana, a German paper napkin producer, and pushed it into insolvency. On May 19, 2025, employees arrived to find printers ejecting extortion notes. By the end of the week, systems were paralyzed, €2…
  continue reading
 
The latest on California versus Trump over the deployment of military troops. Fire weather warning on tap for parts of L.A. County. L.A. Opera opens its fabulous closet for a once-in-a-decade costume sale. We went searching for the origins of a cola in Japan named "Los Angeles" -- and found a story about growing up in Osaka. Support The L.A. Report…
  continue reading
 
In this episode, we break down the true scale and mechanics behind the largest credential leak ever recorded—over 16 billion login credentials, most of them exfiltrated by infostealer malware. We dive into how this happened: from the malware-as-a-service (MaaS) model enabling even low-skill threat actors to deploy powerful stealers, to how credenti…
  continue reading
 
We check in on businesses in Santa Ana, as a commercial corridor in the mostly Latino city has turned into a ghost town. Journalists and protesters are suing the Department of Homeland Security. Huge parcels of public lands in SoCal could be up for sale under Trump's "Big Beautiful Bill." Plus, more. Support The L.A. Report by donating at LAist.com…
  continue reading
 
A malware distribution network hiding in plain sight — on GitHub. This episode unpacks the Stargazers Ghost Network, a massive Distribution-as-a-Service (DaaS) infrastructure run by a threat actor known as Stargazer Goblin. Using over 3,000 GitHub accounts, this operation pushes dangerous information-stealing malware disguised as legitimate game mo…
  continue reading
 
Cybercriminals are increasingly turning GitHub into a malware distribution network. In this episode, we unpack two of the most alarming recent campaigns: Water Curse and Banana Squad — both targeting developers, red teams, and security professionals through poisoned open-source projects. Water Curse, a financially motivated group, used at least 76 …
  continue reading
 
A single vendor was compromised — and suddenly, internal records from UBS, Pictet, Manor, and Implenia were leaked. The Chain IQ cyberattack is a textbook example of how fragile the digital supply chain has become. This episode dissects the breach that exposed names, roles, phone numbers, even CEO contact details of over 137,000 UBS employees, and …
  continue reading
 
An appeals court lets President Trump stay in control of California's National Guard, for now. Families are struggling to make ends meet in the wake of recent ICE arrests. Pasadena's police want answers after this week's ICE action. Plus more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.com Visit www.preppi.c…
  continue reading
 
No ChatGPT here—our em dashes are organic. This week: in the Iran-Israel war, an update on the casualties and targets (1:52), US involvement remains in question (7:45), Ayatollah Khamenei refuses to surrender (14:47), and US and Israeli intelligence agencies disagree over “evidence” of Iran pursuing a nuclear weapon (18:14); Trump quits the G7 summ…
  continue reading
 
State and local governments are under cyber siege. In this episode, we break down how and why these public institutions have become top targets for attackers — and why the threats are getting worse. Digitization is expanding public access to services, but it's also opening new doors for threat actors. Many local authorities still rely on legacy IT …
  continue reading
 
The world is heading toward a massive copper shortage that could derail the clean energy transition, says mining expert Jeff More. He shows how advanced sensing technology could get us back on the right track, drastically cutting down on the wasted materials from traditional mining and helping meet the growing demand for essential metals. Want to h…
  continue reading
 
We bring you a report from Dodgers Stadium, where federal Homeland Security officials were present earlier today. Downtown L.A. businesses are welcoming the end of the city's curfew. We have some events you can check out to celebrate Juneteenth. Plus, more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.com Visi…
  continue reading
 
Two newly disclosed critical vulnerabilities—CVE-2025-5349 and CVE-2025-5777—have put Citrix NetScaler ADC and Gateway deployments at serious risk, exposing enterprise environments to potential data breaches and service disruptions. These flaws underscore the persistent challenges facing infrastructure teams, especially when balancing security patc…
  continue reading
 
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.s…
  continue reading
 
CVE-2025-1568, dubbed "GerriScary", has shaken the open-source ecosystem by exposing a fundamental weakness in Google’s Gerrit code review system—one that could have enabled attackers to infiltrate 18 of Google’s most widely used open-source projects, including Chromium, ChromiumOS, Dart, and Bazel. This episode breaks down how the vulnerability wa…
  continue reading
 
Cisco and Atlassian have both released urgent security advisories in response to newly discovered high-severity vulnerabilities—and the implications are serious. Cisco’s firmware flaws impact Meraki MX and Z Series devices running AnyConnect VPN. A bug in the SSL VPN process allows authenticated attackers to crash the VPN server, causing repeated d…
  continue reading
 
Pasadena protesters hit the streets to denounce ICE arrests. There's justice for taxpayers in the aftermath of the Andrew Do scandal. And now that the school year is over, the verdict seems to be in on L-A Unified cell phone ban. Plus more. Support The L.A. Report by donating at LAist.com/join and by visiting https://laist.com Visit www.preppi.com/…
  continue reading
 
A deep dive into one of the most aggressive ransomware groups operating today—Play—and their latest high-profile target: Krispy Kreme. Operating since 2022, the Play ransomware group has become notorious for its double extortion model, where sensitive data is exfiltrated before systems are encrypted. Victims are pressured not just by digital ransom…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play