Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Incident Response Podcasts

show episodes
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Artwork

1
Forensic Focus

Forensic Focus: Digital Forensics, Incident Response, DFIR

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
  continue reading
 
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, and software supply chain security. Hosted by Paul Roberts, director of editorial and content at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
  continue reading
 
Come listen to an extension of some of the excellent utility safety & ops safety content published in Incident Prevention magazine. Dive deeper into insightful safety topics by hearing interviews with the some of the best and brightest minds in the industry! Learn more about Incident Prevention magazine at incident-prevention.com
  continue reading
 
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
  continue reading
 
Artwork

1
F for Forensics

Ben & Alex

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to F for Forensics — the ultimate digital forensic podcast for cybersecurity professionals, investigators, and tech sleuths! Hosted by Ben and Alex, each episode explores the tools, techniques, and real-world cases behind computer forensics, file system analysis, data recovery, incident response, and more. Whether you're into NTFS carving, malware artifacts, or forensic imaging, this is your byte-sized boost of expert insight and geeky banter. Subscribe now for deep dives into digita ...
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
The Bare Metal Cyber CISM Audio Course is your comprehensive, exam-focused audio companion for mastering the Certified Information Security Manager (CISM) certification. Designed to guide aspiring security leaders through all four domains of the CISM exam, this prepcast translates complex risk, governance, and incident response concepts into clear, structured, and easy-to-follow episodes. Whether you're transitioning from a technical role or already managing security programs, the series off ...
  continue reading
 
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
  continue reading
 
Interviews, stories and lessons learned from experienced crisis leaders. Email the show at [email protected]. Being an effective leader in a corporate or public crisis situation requires knowledge, tenacity, and influencing skills. Unfortunately, most of us don't get much training or real experience dealing with crisis situations. On this podcast, we will talk with people who have lived through major crisis events and we will tap their experience and stories from the front lines of cr ...
  continue reading
 
Learn about the latest threat and cybersecurity trends on The Defender’s Advantage Podcast! Hear from experts in the field as Host Luke McNamara, from Google Threat Intelligence Group, interviews analysts, researchers and other guests on the frontlines of the latest attacks. Episodes dive deep into various topics, including nation-state activity, cybercrime, malware and tradecraft, incident response, defensive guidance, and more. Don't forget to subscribe!
  continue reading
 
The Defender’s Log Podcast: Stories from the Cybersecurity Frontlines The Defender’s Log is your front-row seat to the real-world battles shaping today’s cybersecurity landscape. Hosted by seasoned professionals, each episode brings you face-to-face with the sharpest minds in digital defense, MSP/MSSP founders, CISOs, threat researchers, and architects, who are redefining what it means to secure our connected world. From zero-trust frameworks to ransomware takedowns, from DNS hardening to in ...
  continue reading
 
The CYSA+ Audio Course is your complete, exam-focused companion for mastering the CompTIA Cybersecurity Analyst (CYSA+) certification. Designed for learners who are always on the move, this Audio Course transforms the official exam objectives into clear, structured, and easy-to-follow lessons. Each episode helps you understand, retain, and apply key cybersecurity analysis skills—covering threat detection, vulnerability management, security architecture, and incident response. Whether you’re ...
  continue reading
 
Artwork
 
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
  continue reading
 
Artwork

1
RSAC

RSAC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
RSAC™ is a premier global cybersecurity event and community brand dedicated to empowering professionals at every level. We bring together industry experts to share insights, tackle emerging threats, and showcase cutting-edge innovations. Beyond the Conference, we offer continuous resources, educational programs, and networking opportunities to foster collaboration and resilience in an ever-evolving field, all while staying true to our mission of creating a safer, more connected future.
  continue reading
 
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
  continue reading
 
The Bare Metal Cyber CCISO Audio Course is your complete, executive-level training companion for mastering the Certified Chief Information Security Officer (CCISO) certification. Built for experienced cybersecurity professionals and strategic leaders, this Audio Course delivers over seventy focused episodes covering every domain, concept, and competency area tested on the official EC-Council exam. From governance, risk, and compliance to strategic planning, vendor oversight, and technical co ...
  continue reading
 
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
  continue reading
 
Artwork

1
Cyber Defense Indonesia

Cyber Defense Indonesia

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
  continue reading
 
Certified - Security+ 701 is your completely free audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Developed by BareMetalCyber.com, this immersive Audio Course transforms every domain of the official exam objectives into clear, practical, and exam-ready lessons you can learn anywhere—whether commuting, exercising, or studying at home. Each episode delivers focused explanations, real-world examples, and proven study strategies designed to build confidence and he ...
  continue reading
 
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
  continue reading
 
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
  continue reading
 
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
  continue reading
 
Artwork

1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™

Startuprad.io – Europe’s Startup & VC Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
  continue reading
 
Cybersecurity on the Front Lines is a podcast devoted to helping the IT and security people charged with the difficult task of protecting their small and midsize organizations. Hosted by Nomic Networks' CEO Ted Gruenloh, each episode takes a peek into customers’ network security strategies, how they prioritize their budget decisions, and the various tools that they use.
  continue reading
 
Artwork

1
Tech Unboxed

BBD Software

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Stay ahead of the curve with BBD's Tech Unboxed, the podcast that unpacks the latest trends, innovations, and transformative digital solutions driving tomorrow's world.
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
  continue reading
 
Artwork
 
How AI products come to life—straight from the builders themselves. In each episode, we dive deep into how teams spotted a customer problem, experimented with AI, prototyped solutions, and shipped real features. We dig into everything from workflows and agents to RAG and evaluation strategies, and explore how their products keep evolving. If you’re building with AI, these are the stories for you.
  continue reading
 
Artwork

1
Getting Into Infosec

Ayman Elsawah

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
  continue reading
 
Artwork
 
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
  continue reading
 
The Long Island Daily, formerly Long Island Morning Edition, with host Michael Mackey provides regional news stories and special features that speak to the body politic, the pulse of our planet, and the marketplace of life.
  continue reading
 
Artwork

1
CMMC Academy

Armada Cyber Defense LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
CMMC Academy is a podcast dedicated to helping businesses understand and achieve Cybersecurity Maturity Model Certification (CMMC) compliance. Each episode offers practical insights, expert advice, and the latest updates for organizations supporting the federal government.
  continue reading
 
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
  continue reading
 
Artwork

1
All Things MSP

Justin Esgar and Eric Anthony

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join hosts Justin Esgar and Eric Anthony as they discuss weekly the many facets of the IT services business and have some fun along the way. There will also be a steady flow of guests to provide their unique insights into the topic of the week.
  continue reading
 
Artwork

1
C.S. Cyber

Shawn Waldman and Chad Robinson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Your go-to podcast for demystifying the complex world of cybersecurity. Join Shawn Waldman and Chad Robinson as we delve into the latest trends, threats, and innovations in the cyber realm.
  continue reading
 
Loading …
show series
 
As the grid transitions to green energy, battery energy storage systems (BESS) are popping up everywhere—from utility substations to residential neighborhoods. But what happens when lithium-ion technology fails? In this episode of The Voice of Experience, host Danny Raines and Fire Test Specialist Josh Dinaburg from the CSA Group dive deep into the…
  continue reading
 
A strong incident response (IR) program isn’t just about processes—it’s about mindset. In this episode, Lincare Holdings’ Head of Information Security, Prentis Brooks, joins RSAC Executive Chairman Dr. Hugh Thompson to unpack what true IR maturity looks like. From building agile teams to aligning strategy and technology, they reveal how leading org…
  continue reading
 
Guests Lawrence Jones, Founding Engineer at Incident.io Ed Dean Product Lead for AI at Incident.io Key Takeaways AI’s biggest impact comes from compressing time—identifying causes minutes instead of hours. Retrieval-augmented reasoning still benefits from simplicity: deterministic tagging and re-ranking often beat complex vector setups. Post-incide…
  continue reading
 
This is today’s cyber news for December 2nd, 2025. The brief highlights how everyday tools like browsers, developer extensions, mobile apps, and public Wi Fi are being bent into silent surveillance and credential theft channels that hit both consumers and enterprises. Listeners will hear how popular browser extensions turned into spying implants, h…
  continue reading
 
Please enjoy this encore of Word Notes. Software designed to prevent cheating in video games. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/anti-cheat-software⁠ Audio reference link: “⁠The BIG Problem with Anti-Cheat⁠,” by Techquickie, YouTube, 5 June 2020 Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
AI agents are rapidly moving into production, creating a fundamentally new and complex attack surface for enterprises. While the promise of "digital teammates" is immense, the security risks they introduce, from prompt injection, hijacked tool use to multi-agent collusion, are unprecedented. How can security leaders move beyond traditional framewor…
  continue reading
 
Question? Text our Studio direct. Experts Nick Mullen and Nick Oles discuss artificial intelligence and the impact of ai on business cyber risk. They share their personal stories of how they got into the field and highlight the importance of understanding the analogies between physical and cybersecurity controls. Nick Oles is author of How to Catch…
  continue reading
 
As New Yorkers scroll, surf and search their way to digital deals on Cyber Monday they have certain unique protections. Last month, New York became the first state to enact a law targeting a practice, typically called personalized pricing or surveillance pricing, in which retailers use artificial intelligence and customers’ personal data to set pri…
  continue reading
 
This is today’s cyber news for December 1st, 2025. The briefing opens on the holiday crush, where industrial-scale fake shopping sites and cloned Cyber Monday stores quietly skim cards and personal details while banks and brands eat the fallout. From there it moves into the developer stack, with tens of thousands of live secrets sitting in public G…
  continue reading
 
Read the article - https://incident-prevention.com/blog/safety-by-design-human-and-organizational-performance/ In this installment of the Safety by Design podcast series, host Nick sits down with Pam Tompkins, President and CEO of SET Solutions, to explore the transformative philosophy of Human and Organizational Performance (HOP). Based on her lat…
  continue reading
 
Question? Text our Studio direct. In this shocking monthly cyber update, the Cyber Crime Junkies (David, Dr. Sergio E. Sanchez, and Zack Moscow) expose the craziest, must-know stories in tech and security. What's Inside This Episode: The AI Threat is Real: Dr. Sergio reveals how Chinese threat actors manipulated Anthropic's Claude AI system to stag…
  continue reading
 
Send us a text Presenters: Julian Lee, Publisher, Community Builder, Speaker, Channel Ecosystem Developer with a focus on cybersecurity, AI and Digital Transformation Nim Nadarajah, C.CISO, Cyber Security, Compliance & Transformation Expert | Executive Board Member | Keynote Speaker Evgeniy Kharam, Publisher, Community Builder, Speaker, Channel Eco…
  continue reading
 
Question? Text our Studio direct. Can Brett Johnson Help You SPOT Fraud Before it's Too Late? Brett Johnson joins us to talk about spotting fraud before its too late. We discuss how to limit cyber risk for small business, ways to identify refund fraud, AI implications in cyber security today, best policies to limit cyber liability and how can we sp…
  continue reading
 
In this powerful episode, host David Redekop sits down with Joshua Domagalski, Chief Information Security Officer and former offensive operator, to explore the real complexities of modern cyber defense. Joshua opens up about his journey from the military to cybersecurity leadership, the shift from attacking systems to protecting them, and why defen…
  continue reading
 
This is today’s cyber news for November 28th, 2025. Today’s brief opens with millions of phones still following abandoned calendar links that attackers can quietly reclaim, turning old sync feeds into tracking and phishing channels. We move through an analytics vendor breach exposing OpenAI developer account details, a ransomware hit on Asahi affec…
  continue reading
 
Welcome to a very special, slightly hungry, and arguably chaotic episode of the All Things MSP podcast! This week, Justin Esgar and Eric Anthony go solo to bring you a crossover event nobody asked for but everyone needs: Off Menu: MSP Edition. Inspired by the hit podcast with Ed Gamble and James Acaster, your hosts enter the dream restaurant to sel…
  continue reading
 
Europe's startup narrative is changing fast — from apps and valuations to sovereignty, infrastructure and resilience. In this month's DACH Startup News, we unpack the moves that made European tech sovereignty the defining theme of 2025. What you’ll learn: – Why sovereign cloud is becoming foundational for startups and enterprise buyers – How AI, ro…
  continue reading
 
The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! On this episode, Accidental CISO is joined by guest host Mike Simmons. Mike is a consultant, leadership coach, speaker, and podcaster. He combines systems thinking with a people focuse…
  continue reading
 
A Suffolk County judge has cleared the Shinnecock Nation Board of Trustees of contempt of court over the operation of two electronic billboards on Sunrise Highway in Hampton Bays, in defiance of a 2019 restraining order — but instead held two commercial advertising companies that built and operate the billboards in contempt. Michael Wright reports …
  continue reading
 
This is today’s cyber news for November 26th, 2025. Today’s rundown connects a cyberattack that silenced emergency alerts, critical flaws in a tiny cloud logging agent, and fresh warnings that secure messaging apps can still be turned into surveillance tools when phones are compromised. We also cover long-running credential leaks from online code h…
  continue reading
 
#326: Microservices architecture has evolved far beyond simple distributed systems, but most development teams are still rebuilding the same foundational patterns over and over again. Mark Fussell, co-founder of Dapr and Diagrid, explains how his team at Microsoft identified this repetitive reinvention problem and created a solution that abstracts …
  continue reading
 
Thank you for visiting our podcasts on CMMC Cybersecurity! Explore more insights, updates, and expert discussions on our blog: https://cybercomply.us/blog-list Luis G. Batista C.P.M., CPSM Founder & CEO, Armada Cyber Defense | CyberComply [email protected] Office: (305) 306-1800 Ext. 800 CAGE: 9QG33 UEI: K6UZHLE1WUA7 Schedule Introduction: https:…
  continue reading
 
Long Island’s native nations gathered at a Kew Gardens cemetery Saturday morning to honor the lives and mark the premature deaths of two boys sent to a Pennsylvania boarding school for Indian "assimilation" more than 125 years ago. Mark Harrington reports in NEWSDAY that leaders of the Unkechaug and Matinecock nations, and members of the Shinnecock…
  continue reading
 
Question? Text our Studio direct. We discuss How ransomware can kill and ways to build security resilience with Chris Loehr, SVP of Solis Security. Ransomware Attacks Can Be DEADLY What Makes You SAFE? Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done with full cyber chaos: 🔥 Int…
  continue reading
 
In this episode we break down one of the most essential skills in digital forensics: forensic imaging. Learn why bit-for-bit acquisitions matter, how write-blockers protect evidence, which tools professionals rely on (from FTK Imager to Cellebrite), and the real-world mistakes that can make or break a case. Whether you're imaging a laptop, server, …
  continue reading
 
Hello everyone, a big thanks to all of you who joined the patreon and voted for this to be the next episode, you all are awesome. This is a part 2 about Hirohito’s responsibility during the wars of 1931-1945, so if you have not heard part 1, perhaps go do so, or maybe you just don’t care about 1931-1940 and just want to hear about the 1941-1945 per…
  continue reading
 
What happens when your to-do list keeps growing but your budget doesn’t? Hazel is joined by three Cisco Talos Incident Response experts to talk about the reality many organizations face: rising threats, aging infrastructure, and fewer people to defend it all. From configuring what you already have, to open-source strategies, to the impact of cybers…
  continue reading
 
This is today’s cyber news for November 25th, 2025. The brief follows a sweeping set of stories: a self-spreading JavaScript supply-chain attack leaking developer secrets, AI clusters hijacked through exposed orchestration tools, and quiet flaws in cloud logging and Windows update infrastructure that can turn basic plumbing into a takeover path. We…
  continue reading
 
Please enjoy this encore of Word Notes. Malware, in the guise of ransomware, that destroys data rather than encrypts. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/pseudoransomware⁠ Audio reference link: “⁠Some Men Just Want to Watch the World Burn | the Dark Knight⁠,” by YouTube, 2 November 2019. Learn more about your ad choices. Vis…
  continue reading
 
Question? Text our Studio direct. Discover the shocking story of Charlie Javice, the entrepreneur who went from being featured on the cover of Forbes to facing a federal indictment. Learn about her rise to fame and the events that led to her downfall. Get the inside scoop on the controversies surrounding her business ventures and the charges brough…
  continue reading
 
Pope Leo XIV, the first ever U.S. Pope, addressed a group of 16,000 teens at the National Catholic Youth Conference in Indianapolis this past Friday. Students from Our Lady of the Hamptons tuned in for the livestream. Pope Leo in Rome, using technology to address the students in Indiana, listed many good things technology does. For example, "it let…
  continue reading
 
Justin Tolman from Exterro joins the Forensic Focus Podcast to talk about the future of FTK and the role FTK Imager still plays in everyday casework. He explains why the original free version remains available, and what prompted the introduction of Imager Pro with added capabilities like BitLocker decryption and iOS collections. Justin also reflect…
  continue reading
 
This is today’s cyber news for November twenty fourth, twenty twenty five. Today’s brief walks through a Gainsight supply chain breach that puts Salesforce customer data in play, an actively exploited flaw in Oracle Identity Manager, and a critical Azure Bastion bug that weakens a key cloud safety rail. You will also hear how a Grafana Enterprise i…
  continue reading
 
Question? Text our Studio direct. 🔥New Episode🔥 dives into a famous betrayal case, showcasing the breach movie trailer as an example of Hollywood's take on espionage. This story highlights the perilous nature of insider threat and the critical importance of **counterintelligence**. We explore this true spy narrative, bringing you another compelling…
  continue reading
 
A large group of teachers walked into the gymnasium on Wednesday night at the Bridgehampton School during a Board of Education meeting, wearing matching black and yellow Bridgehampton Teachers Association shirts, in a show of solidarity, reminding those in the gym that they’ve been working without a new contract since the end of the last school ter…
  continue reading
 
Question? Text our Studio direct. What Happens in Your BRAIN During Social Engineering Attacks We Speak with expert, Dr Abbie Marono on cognitive neuroscience, Brain Reactions During Social Engineering. We discuss the science of social engineering, brain reactions during social engineering, and brain reactions during phishing. Season 8 is officiall…
  continue reading
 
This is today’s cyber news for November 21st, 2025. Today’s brief connects front-line cyber operations to real-world impact, from Iran-aligned hackers using ship tracking data to support a failed missile strike to China-linked BadAudio espionage quietly harvesting government and telecom secrets. We spotlight active exploitation of Fortinet’s FortiW…
  continue reading
 
What if the biggest cyber risk inside your company wasn’t malware — but identity? In this episode, I sit down with Santhosh Jayaprakash, founder & CEO of UnoSecur, to unpack one of the fastest-moving transformations in cybersecurity: the rise of identity as the new perimeter. Attackers don’t break in anymore — they log in. And with AI agents, LLM w…
  continue reading
 
The first week of the new traffic patterns on County Road 39 in Southampton…especially between the North Sea Road intersection and Magee Street…brought long backups at times and struggles to keep traffic flowing westward swiftly, as had been hoped when the town and Southampton Village convinced Suffolk County to restripe the roadway. Michael Wright…
  continue reading
 
Question? Text our Studio direct. LOCKBIT Cyber Crime Takedown Uncovered! Jon DiMaggio, Senior Security Strategist with https://analyst1.com and former NSA analyst, author of The Art of Cyber Warfare (https://a.co/d/72qKbc4) joins us for an exclusive discussion on the cyber crime take down story of LOCKBIT. Chapters 00:00 Introduction and Backgroun…
  continue reading
 
This is today’s cyber news for November 20th, 2025. Today’s brief tracks how fragile our internet plumbing has become, from hijacked home routers and a major Cloudflare outage to record-setting attacks against Azure and a fresh browser flaw already under exploitation. You will hear how a massive botnet built from aging ASUS routers, a FortiWeb zero…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play