Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Security Response Team Podcasts
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj AI Research CEO Daniel Faggella and team interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
On The Arms Room we discuss firearms, gun rights, hunting, competition shooting, personal protection, training, and emergency response.
…
continue reading
Sea Control is CIMSEC's Flagship podcast. We focus on maritime security, naval affairs, and defense and foreign policy.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Get involved in the exciting world of Digital Forensics and Incident Response with: Traffic Light Protocol. The Digital Forensics Podcast. In each episode, we sit down with seasoned DFIR professionals, the blueteamers who work around the clock to investigate cyber intrusions. From data breaches to cyberattacks, they share firsthand accounts of some of the most intense investigations they've ever tackled, how they deal with burnout and the added pressure of cat and mouse while they learn abou ...
…
continue reading
Security Done Different is a cybersecurity podcast hosted by CloudGuard experts, featuring conversations with leading industry professionals. In each episode, our team of specialists speaks with cybersecurity thought leaders and innovators to explore strategies, emerging threats and practical solutions.
…
continue reading
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Discussion about Incident Response topics, Malware, Blue Team, Detection, Logging, Forensics, and catching the bad actors
…
continue reading
From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Behind the Shield is a monthly webinar hosted by Virtual Guardian, an ESI family company. Our team of experts are veteran threat smashers, ethical hackers, and experienced security professionals who speak in terms of lessons learned – and how identification, protection, response and resilience help organizations stay ahead of digital criminals. After each live webinar, the content is reproduced as a podcast for your listening enjoyment. Check out virtualguardian.com/events to register to par ...
…
continue reading
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
…
continue reading
Hi, I'm Kris P. Moloney. I am a Police Officer with over 18 years of experience in Law Enforcement and a retired Army Captain and Company Commander. On my podcast, we talk about Church Security. Including discussions about Active Shooter Response, Deescalating Disruptive Persons, Protecting Children from Abuse, and various other challenges that our places of worship face. My company Sheepdog Church Security is a Private Online Academy that provides both Distance and Self-Paced Learning to Sa ...
…
continue reading
Entrepreneur Andy Frisella and his guests discuss, debate, and laugh their way through trending topics and hot-button issues. (This is also the home of Andy's other show, the top-ranked MFCEO Project Podcast)
…
continue reading
In our age of digital transformation, everything is moving to the cloud, including the management of devices, users and applications. The Infoblox ThreatTalk podcast brings you the latest thinking on how to tap the full potential of the cloud while making the most of your existing network security solutions. In each episode, leading cybersecurity experts share insights and practical advice on how to raise network security and automation to the next level across diverse on-premises, virtual a ...
…
continue reading
The Echo Valor Podcast is where courage meets storytelling. Hosted by David Burnell—a U.S. military veteran, special operations team leader, and rescue operator—the show dives into the real stories of those who serve in the shadows and on the front lines. With a high-threat security and humanitarian response background, David brings raw insight and deep respect to each episode. Through powerful interviews, battlefield reflections, and original tribute music, Echo Valor honors the warriors, m ...
…
continue reading
In an increasingly unpredictable world, knowledge and preparation are your best defense. Brought to you by the Preparedness Protocol Experts (P.P.E Team), this is an educational podcast delivering expert insights on Chemical, Biological, Radiological, and Nuclear (CBRN) threats, cutting-edge survival tactics, and comprehensive disaster preparedness strategies for today's complex risk landscape. Each episode features in-depth analysis of historical disasters, emerging threats, practical survi ...
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
The American Truth Project, a non-profit (501c3) organization was launched because America’s national security is being threatened as never before. Our republic and the rights guaranteed by our constitution are facing dangerous new enemies, both foreign and domestic. The facts are clear: We are under attack! Our solution is to educate the public on the truths regarding critical security risks facing America, as well as our most strategic ally, Israel. There are few quality sources dedicated ...
…
continue reading
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecurity-mission Learn More About KirkpatrickPrice: https://kirkpatrickprice.com/about-us/
…
continue reading
The Collier County Sheriff's Office is a law enforcement agency in Southwest Florida. Under the direction of Sheriff Kevin Rambosk, we are launching this podcast to communicate with residents and the public at large on a new and different type of platform. In this podcast, we'll discuss local issues and those affecting public safety on a larger scale. To learn more about our agency and the podcast, visit www.colliersheriff.org/news/sworn-statement
…
continue reading
When it comes to securing your home or business, LockSmith And Door is the best locksmith in Tampa, FL. Renowned for their fast response times and expert services, they offer everything from emergency lockouts to high-security system installations. Whether you’re locked out, need a lock rekeyed, or want to upgrade your security, LockSmith And Door has you covered. With a team of certified technicians, they deliver top-notch service tailored to your specific needs. In addition to their except ...
…
continue reading
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
…
continue reading
Discovering Responsible Wealth will help you discover the principles of Responsible Wealth – principles that can change your life, to be good stewards of all the God has blessed us with, and to live life to its fullest potential.Frank’s message is simple: Finances have an impact on every aspect of your life. However, to have the life that God desires for us, your life must be in balance and money must be placed in the proper context. Discovering Responsible Wealth focuses on life’s “Wealth B ...
…
continue reading
The AI CEO Podcast Host: Seema Alexander, Co-founder & President of Virgent AI | Co-Chair, DC Startup & Tech Week AI isn’t just another tool—it’s the next frontier of business. The AI CEO Podcast explores the intersection of AI, business strategy, and leadership, equipping CEOs, founders, and executives with the insights they need to navigate and leverage AI effectively. Hosted by Seema Alexander, Co-founder & President of Virgent AI—a company specializing in AI-powered solutions and AI agen ...
…
continue reading

1
SANS Stormcast Monday, October 13th, 2025: More Oracle Patches; Sonicwall Compromisses; Unpatched Gladinet; 7-Zip Patches
5:56
5:56
Play later
Play later
Lists
Like
Liked
5:56New Oracle E-Business Suite Patches Oracle released one more patch for the e-business suite. Oracle does not state if it is already exploited, but the timing of the patch suggests that it should be expedited. https://www.oracle.com/security-alerts/alert-cve-2025-61884.html Widespread Sonicwall SSLVPN Compromise Huntress Labs observed the widespread…
…
continue reading

1
Incident Response of Kubernetes and how to Automate Containment
52:22
52:22
Play later
Play later
Lists
Like
Liked
52:22How do you perform incident response on a Kubernetes cluster when you're not even on the same network? In this episode, Damien Burks, Senior Security engineer breaks down the immense challenges of container security and why most commercial tools are failing at automated response. While many CNAPPs provide runtime detection, they lack a "sophisticat…
…
continue reading

1
949. Andy, Chad Robichaux & DJ CTI: Trump Tells The Post He’ll Visit The Middle East, Candace Owens On Charlie Kirk's Last Messages & Trump Considers Invoking Insurrection Act
2:25:32
2:25:32
Play later
Play later
Lists
Like
Liked
2:25:32On today’s episode, Andy & DJ are joined in the studio by Author, speaker, and former Force Recon Marine and DoD Contractor, Chad Robichaux. They discuss Trump telling The Post that he’ll visit the Middle East after the ceasefire agreement, Candace Owens discussing Charlie Kirk's last text messages, and Trump considering invoking the Insurrection A…
…
continue reading

1
Enabling Strategic Procurement with AI, From Frustration to Foresight - with Rob DeSantis of Arkestro
28:35
28:35
Play later
Play later
Lists
Like
Liked
28:35When finance leaders push for measurable savings and supply chain leaders prioritize continuity and resilience, technology adoption often gets caught in the middle. Procurement teams, operating with risk-averse cultures and outdated tools, face growing complexity while pressure mounts from both sides of the business. In this episode of the AI in Bu…
…
continue reading

1
Connecting the Dots Across Discovery - with Ben Ninio of Deloitte
22:04
22:04
Play later
Play later
Lists
Like
Liked
22:04On this episode of the AI in Business podcast, Emerj Editorial Director Matthew DeMello speaks with Ben Ninio, Principal in Strategy at Deloitte, about how enterprises are rethinking the fundamentals of scientific discovery in the AI era. Ben explains why language itself has become the “hack” for unifying frameworks across R&D domains—from pharmace…
…
continue reading

1
SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike “Issues”; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper)
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to…
…
continue reading

1
Fixing Ticket Noise with AI in Enterprise MSP Operations - with Steve Taczala of Impact Networking
18:16
18:16
Play later
Play later
Lists
Like
Liked
18:16Today’s guest is Steve Taczala, VP of Service Operations at Impact Networking. Impact Networking is a managed service provider founded in 1999, with more than 20 US offices, supporting organizations in IT, cybersecurity, and applying AI to business operations. Taczala brings extensive experience in managing MSP service operations and improving IT w…
…
continue reading

1
Data Volume, Quality, and Model Degradation for AI at Scale - with Sunitha Rao of Hitachi Vantara
21:46
21:46
Play later
Play later
Lists
Like
Liked
21:46Today’s guest is Sunitha Rao, SVP and General Manager for Hybrid Cloud Business at Hitachi Vantara. Hitachi Vantara is a wholly owned subsidiary of Hitachi, Ltd. that provides data infrastructure foundations that help leading innovators manage and leverage their data at scale. Through data storage, infrastructure systems, cloud management, and digi…
…
continue reading

1
CR111: From mission-driven to tech-driven with Ben Sparke, Microsoft
46:45
46:45
Play later
Play later
Lists
Like
Liked
46:45The evolving role of technology in modern defense environments, highlighting innovations in communications, automation, and open-source frameworks. Drawing from personal experience, the conversation emphasizes how real-world conflicts are reshaping how tech is deployed, adopted, and understood across military operations. This week, Dave, Esmee, and…
…
continue reading

1
SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln;
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnerability A user cloning a git repository may be tricked into executing arbitrary code via…
…
continue reading

1
🛡️ Pen Test Potential: How Organizations Are Missing Out on Fortifying the SOC 🛡️
20:08
20:08
Play later
Play later
Lists
Like
Liked
20:08Got a question or comment? Message us here! What’s the real difference between a penetration test and a red team engagement, and how can each benefit your SOC? In this episode, Andrew is joined by Tanner, to unpack how pentests uncover vulnerabilities, how red teams stress-test defenders, and why every organization should be leveraging these exerci…
…
continue reading
KirkpatrickPrice is on a mission to help 10,000 people elevate the standards for cybersecurity and compliance. In this episode, founder and President Joseph Kirkpatrick shares the why behind the mission of delivering quality audits and what sets KirkpatrickPrice apart. Join Our Cybersecurity Mission: https://www.linkedin.com/showcase/our-cybersecur…
…
continue reading

1
The Future of AI Agents in Consumer Goods Operations - with Padma Hari of Nestlé Purina
26:24
26:24
Play later
Play later
Lists
Like
Liked
26:24
…
continue reading

1
Practical AI for In-House Patent Legal - with Kevin Ahlstrom of Meta
18:32
18:32
Play later
Play later
Lists
Like
Liked
18:32
…
continue reading

1
SANS Stormcast Wednesday, October 8th, 2025: FreePBX Exploits; Disrupting Teams Threats; Kibana and QT SVG Patches
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57By Dr. Johannes B. Ullrich
…
continue reading
By Alias Cybersecurity
…
continue reading

1
Securing the Courtroom: The Role of Bailiffs
18:11
18:11
Play later
Play later
Lists
Like
Liked
18:11By Sworn Statement Podcast
…
continue reading

1
948. Andy & DJ CTI: ICE Rolls Portland Protester Away On Flatbed Cart, Bloody Mark Sanchez Seen Stumbling Down Indianapolis Sidewalk & AI Or Nah
1:19:22
1:19:22
Play later
Play later
Lists
Like
Liked
1:19:22
…
continue reading

1
The Expanding Role of Video and Visual Data From Footage to Forensics in Retail - with Naveen Kumar of Walmart
16:56
16:56
Play later
Play later
Lists
Like
Liked
16:56
…
continue reading

1
SANS Stormcast Tuesday, October 7th, 2025: More About Oracle; Redis Vulnerability; GoAnywhere Exploited
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33By Dr. Johannes B. Ullrich
…
continue reading
By The Arms Room Show
…
continue reading

1
947. Q&AF: Navigating The Fear Of Uncertainty, Anxiety About Getting Older & Restoring Your Hunger
1:05:01
1:05:01
Play later
Play later
Lists
Like
Liked
1:05:01On today’s episode, Andy answers live call-in questions on how to face uncertainty when life moves fast, managing the fear of aging while chasing new goals, and how to reignite ambition when your drive starts fading.
…
continue reading

1
SANS Stormcast Monday, October 6th, 2025: Oracle 0-Day
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Oracle E-Business Suite 0-Day CVE-2025-61882 Last week, the Cl0p ransomware gang sent messages to many businesses stating that an Oracle E-Business Suite vulnerability was used to exfiltrate data. Initially, Oracle believed the root cause to be a vulnerability patched in June, but now Oracle released a patch for a new vulnerability. https://www.ora…
…
continue reading

1
Brad Carson: The AI Action Plan Every CEO Must Know! | The AI CEO Podcast
1:42:10
1:42:10
Play later
Play later
Lists
Like
Liked
1:42:10The AI CEO is a podcast where business leaders, entrepreneurs, and innovators uncover how artificial intelligence is transforming strategy, leadership, and growth. Each episode breaks down complex AI trends into clear insights, helping CEOs and decision-makers stay ahead in the age of disruption. ----------------------------------------------------…
…
continue reading

1
The Truth About AI in the SOC: From Alert Fatigue to Detection Engineering
45:39
45:39
Play later
Play later
Lists
Like
Liked
45:39"The next five years are gonna be wild." That's the verdict from Forrester Principal Analyst Allie Mellen on the state of Security Operations. This episode dives into the "massive reset" that is transforming the SOC, driven by the rise of generative AI and a revolution in data management. Allie explains why the traditional L1, L2, L3 SOC model, lon…
…
continue reading

1
946. Andy & DJ CTI: Prosecutors Hammer Charlie Kirk Assassination Suspect, Government Showdown & Netflix Gay Propaganda
1:30:10
1:30:10
Play later
Play later
Lists
Like
Liked
1:30:10On today’s episode, Andy & DJ discuss prosecutors hammering the Charlie Kirk assassination suspect with DNA, gun, text and rooftop evidence, the government shutdown, and Netflix showcasing young students coming together to set up and celebrate their teacher’s gay wedding in a cartoon.
…
continue reading

1
SANS Stormcast Friday, October 3rd, 2025: More .well-known Scans; RedHat Openshift Patch; TOTOLINK Vuln;
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35More .well-known scans Attackers are using API documentation automatically published in the .well-known directory for reconnaissance. https://isc.sans.edu/diary/More%20.well-known%20Scans/32340 RedHat Patches Openshift AI Services A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, fo…
…
continue reading

1
How AI Is Reshaping Patent Strategy and Portfolio Management - with Shandon Quinn of Clarivate
22:19
22:19
Play later
Play later
Lists
Like
Liked
22:19Today’s guest is Shandon Quinn, Vice President of Patent Intelligence, Search and Analytics at Clarivate. Quinn joins Emerj Editorial Director Matthew DeMello to examine how AI-powered workflows are helping IP leaders deliver strategic impact, smarter decision-making, and tangible results for data-centric enterprises. Shandon also shares proven cha…
…
continue reading

1
CR110: The genesis of the virtual assistant with Kevin Surace
1:12:34
1:12:34
Play later
Play later
Lists
Like
Liked
1:12:34Before Siri had sass and Alexa started judging your music taste, the original virtual assistant was quietly revolutionizing the '90s—powered by many patents and a whole lot of foresight. Now, as AI goes from buzzword to boss, we ask, will it transform your job, your home… or just steal your knowledge? This week, Dave, Esmee and Rob speak with Kevin…
…
continue reading

1
SANS Stormcast Thursday, October 2nd, 2025: Honeypot Passwords; OneLogin Vuln; Breaking Intel SGX; OpenSSL Patch
8:11
8:11
Play later
Play later
Lists
Like
Liked
8:11Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/…
…
continue reading

1
Joe Sullivan on Why Now Is the Best Time to Be in Cybersecurity
1:27:57
1:27:57
Play later
Play later
Lists
Like
Liked
1:27:57Episode Summary: Joe Sullivan returns to The Professional CISO Show for a wide-ranging discussion with host David Malicoat. Together, they unpack the Salesforce hack, SaaS application blind spots, identity and access management, AI noise versus real use cases, and how security teams must evolve. Joe also shares candid lessons from crisis leadership…
…
continue reading

1
🚨 Ransomware Rising: Variants, Tactics, and Defenses in 2025 🚨
7:29
7:29
Play later
Play later
Lists
Like
Liked
7:29Got a question or comment? Message us here! Ransomware is evolving faster than ever, from double extortion tactics to lightning-fast attack chains. In this episode, we break down how these threats work, why every organization is a target, and the layered defenses SOCs can use to detect and stop attacks early. Support the show Watch full episodes at…
…
continue reading

1
945. Andy & DJ CTI: Trump's N-Word Joke Falls Flat, Trump Vows Border Patrol Taking No Nonsense & Grieving Dad Slams Lawmakers
1:36:13
1:36:13
Play later
Play later
Lists
Like
Liked
1:36:13On today's episode, Andy & DJ discuss Trump's N-word joke falls flat as America's top generals laugh awkwardly at gag about firing them, Trump vowing border patrol agents will take no nonsense as feds march into downtown Chicago, and the grieving dad slamming lawmakers for crime policies that freed daughter's suspected career criminal killer.…
…
continue reading

1
SANS Stormcast Wednesday, October 1st, 2025: Cookie Auth Issues; Western Digtial Command Injection; sudo exploited;
5:10
5:10
Play later
Play later
Lists
Like
Liked
5:10Sometimes you don t even need to log in Applications using simple, predictable cookies to verify a user s identity are still exploited, and relatively recent vulnerabilities are still due to this very basic mistake. https://isc.sans.edu/diary/%22user%3Dadmin%22.%20Sometimes%20you%20don%27t%20even%20need%20to%20log%20in./32334 Western Digital My Clo…
…
continue reading

1
Achieving Personalization and Compliance in Med Tech Solutions - with Faithe Toomy of Insulet
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53Today’s guest is Faithe Toomy, Director of Voice of the Customer and Insights at Insulet. Insulet is a medical device company specializing in wearable drug delivery systems for diabetes care, combining engineering, clinical research, and digital health capabilities to develop automated therapeutic solutions. Faithe joins Emerj Editorial Director Ma…
…
continue reading

1
SANS Stormcast Tuesday, September 30th, 2025: Apple Patch; PAN Global Protect Scans; SSL.com signed malware
5:06
5:06
Play later
Play later
Lists
Like
Liked
5:06Apple Patches Apple released patches for iOS, macOS, and visionOS, fixing a single font parsing vulnerability https://isc.sans.edu/diary/Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400/32330 Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400). Our honeypots detected an increase in scans for a Palo Alto Global Prot…
…
continue reading
Today, we'll be discussing how teamwork makes the dream work when you're out and about with someone who has similar training and tools.By The Arms Room Show
…
continue reading

1
944. Q&AF: Rethinking Success, Redefining Life’s Mission & Balancing Business Responsibilities
52:37
52:37
Play later
Play later
Lists
Like
Liked
52:37On today’s episode, Andy answers live call-in questions on how to rethink success when your job is going well but feels unfulfilling, how to discover your real purpose in life, and how to work through the difficulties of co-owning a small business.
…
continue reading

1
SANS Stormcast Monday, September 29th, 2025: Convert Timestamps; Cisco Compromises; GitHub Notification Phishing
8:36
8:36
Play later
Play later
Lists
Like
Liked
8:36Converting Timestamps in .bash_history Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This new tool converts these timestamps into a more readable format. https://isc.sans.edu/diary/New%20tool%3A%20convert-ts-bash-history.py/32324 Cisco ASA/FRD Compromises Ex…
…
continue reading

1
Sea Control 587: 20 Years Past the military response to Hurricane Katrina
30:14
30:14
Play later
Play later
Lists
Like
Liked
30:14Guest bio: Elaine Helm is communications professional and former journalist who lives and works in the Seattle area. She was the military reporter for the Kitsap Sun and the founder and editor of the pioneering Northwest Navy News site. Links:https://www.linkedin.com/in/elainehelm/By Elaine Helm, J Overton
…
continue reading

1
Human Compatible AI and AGI Risks - with Stuart Russell of the University of California
1:03:19
1:03:19
Play later
Play later
Lists
Like
Liked
1:03:19In this special weekend edition of the ‘AI in Business’ podcast’s AI Futures series, Emerj CEO and Head of Research Daniel Faggella speaks with Stuart Russell, Distinguished Professor of Computational Precision Health and Computer Science at the University of California and President of the International Association for Safe & Ethical AI. Widely co…
…
continue reading

1
943. Andy & DJ CTI: Anti-ICE Gunman Joshua Jahn Carefully Plotted Dallas shooting, Former FBI Director James Comey Indicted & California HS Girls' Volleyball Trans Athlete
1:28:40
1:28:40
Play later
Play later
Lists
Like
Liked
1:28:40On today's episode, Andy & DJ discuss Anti-ICE gunman Joshua Jahn carefully plotting the fatal Dallas shooting, Former FBI director James Comey indicted for lying to congress, and the California HS girls' volleyball team with a trans athlete forfeiting games amid growing controversy.
…
continue reading

1
SANS Stormcast Friday, September 26th, 2025: Webshells in .well-known; Critical Cisco Vulns Exploited; XCSSET Update; GoAnywhere MFT Exploit Details
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Webshells Hiding in .well-known Places Our honeypots registered an increase in scans for URLs in the .well-known directory, which appears to be looking for webshells. https://isc.sans.edu/diary/Webshells%20Hiding%20in%20.well-known%20Places/32320 Cisco Patches Critical Exploited Vulnerabilities Cisco released updates addressing already-exploited vu…
…
continue reading

1
CR109: Season 5 Kick Off with Dave, Esmee and Rob
51:16
51:16
Play later
Play later
Lists
Like
Liked
51:16We’re back! In this Season 5 premiere, the team reunites after their summer break to kick off an exciting new chapter. Join us as we catch up, share bold predictions for the year ahead, and explore big questions, like whether 2026 will be the year of the autonomous organization. Expect candid reflections, lively discussion, and a sneak peek at what…
…
continue reading

1
SANS Stormcast Thursday, September 25th, 2025: Hikvision Exploits; Cisco Patches; Sonicawall Anit-Rootkit Patch; Windows 10 Support
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send credentials as part of the URL. https://isc.sans.edu/diary/Exploit%20Attempts%20Against%20Older%20Hikvision%20Camera%20Vulnerability/323…
…
continue reading

1
💢 FileFix Fiasco 💢 Steganography's Stealthy StealC Drop
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53Got a question or comment? Message us here! In this episode of The #SOCBrief, we break down the rising FileFix attack, a new social engineering technique using steganography to deliver info-stealing malware. Learn how attackers disguise malicious PowerShell commands, the risks this poses for browsers, messengers, and crypto wallets, and the proacti…
…
continue reading

1
942. Andy & DJ CTI: Erika Kirk Forgives Charlie's Assassin, Trump At United Nations & Dominican Republic Seizes Cocaine
1:52:31
1:52:31
Play later
Play later
Lists
Like
Liked
1:52:31On today's episode, Andy & DJ discuss Erika Kirk forgiving her husband Charlie Kirks assassin at his memorial service, Trump calling out the United Nations for doing nothing, and the Dominican Republic saying it seized 377 packages of cocaine on a speedboat destroyed by the US Navy.
…
continue reading

1
SANS Stormcast Wednesday, September 24th, 2025: DoS against the Analyst; GitHub Improvements; Solarwinds and Supermicro BMC vulnerabilities
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22Distracting the Analyst for Fun and Profit Our undergraduate intern, Tyler House analyzed what may have been a small DoS attack that was likely more meant to distract than to actually cause a denial of service https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Distracting%20the%20Analyst%20for%20Fun%20and%20Profit/32308 GitHub s plan for a more secur…
…
continue reading