Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
Step into the world of digital forensics, mobile forensics, OSINT, and cybersecurity with The Cyber Sleuth Show! Hosted by Kevin DeLong, this podcast dives deep into the ever-evolving landscape of digital investigations, featuring expert guests, cutting-edge tools, real-world case insights, and, of course, the occasional terrible dad joke. From law enforcement investigators and forensic analysts to OSINT specialists and cybersecurity pros, we uncover the latest trends, techniques, and challe ...
…
continue reading
Welcome to my Cyber Security Podcast. To give you a better idea of what you can expect, I’ll be covering a wide range of topics in the cyber security field, including what you can do to protect yourself from cyber threats. This podcast is for everyone, from the most experienced cybersecurity professional to the complete beginner. So stay tuned for the latest updates in cyber security!
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
This show features an interactive discussion, expert hosts, and guests focused on solving cyber security and privacy challenges in innovative and creative ways. Our goal is for our audience to learn and discover real, tangible, usable ideas that don't require a huge budget to accomplish. Shows like “How It’s Made” have become popular because they explain complicated or largely unknown things in easy terms. This show brings the human element to cyber security and privacy.
…
continue reading
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
Produced by AI and based on articles published in ICAEW's Insights section.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
ICAEW is a professional membership organisation that provides insight and leadership to the global accountancy and finance profession.
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
Welcome to UAB TechKnow! We are here to help the UAB community better connect with technology on campus. We introduce tips to keep you secure and cover things like new software and updates.
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
Industry experts break down the latest news & trends in employee benefits, healthcare reform, regulations and compliance, designed to empower executive decisions.
…
continue reading
The IT Business Podcast is a show for MSPs (Managed Service Providers) and IT Professionals providing business network support and managed services. The podcast aims to provide actionable advice and tips that help IT businesses survive and grow in the competitive tech industry. The podcast features guest interviews with seasoned IT professionals, business owners, vendors and industry leaders who share their experiences, insights, and strategies for success. These discussions often cover topi ...
…
continue reading
U.S. Army Garrison Bavaria's Better in Bavaria podcast, where we share stories and highlight the people behind them - the Soldiers and Army civilians who support our readiness mission all while making our community a great place to work, live and raise a family. - Hosted by Linda A. Read and Andreas Kreuzer - Produced by Kayla Overton, Natalie Simmel, and Ella Händel
…
continue reading
“WHERE ARE THE WOMEN IN CYBER?” The Landscape In 2022 the cyber security field still consists of 24% women and only 2.2% LGBTQ+ minorities. Long-perpetuated gender, age, and demographic biases held by the ‘Baby Boomer’ and Gen-X groups have led to a severe gap in the representation and advancement of women and minorities in this field. Millennials entered the workforce and attempted to forge a new way by asking for small changes; but definitely conceding others. Currently the Boomers/Gen-X a ...
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
🎙️ Dive into the world of cybersecurity with Cubic Lighthouse Podcast - your expert companion in navigating the latest developments and crucial topics in the field. We dissect complexities, provide strategic insights, and ensure you stay abreast of cutting-edge trends. Whether you're a seasoned professional or a cybersecurity enthusiast, join us for concise expertise and actionable intelligence to enhance your security posture. 🌐🔐
…
continue reading
The Cloud Gambit Podcast unravels the state of cloud computing, markets, strategy, and emerging trends. Join William Collins and Eyvonne Sharp for valuable conversations with industry mavens that educate and empower listeners on the intricate field of innovation and opportunity.
…
continue reading
Bite-sized information about cybersecurity for not-for-profit boards and leaders. In each episode we help leaders of not-for-profits to understand the information security risks to their organisations and they leave with at least one actionable insight that they can put into practice. It also features interviews with not-for-profit leaders sharing their cybersecurity journey, insights and lessons learned.
…
continue reading
A podcast where I speak with people about their career path. Focusing on their decisions, success, advice, key traits, career moves, mentoring and listening to interesting stories. This podcast is an interesting perspective on how careers can take a linear path to success, but all often career paths take a zig-zag path. Fun Stuff to learn about. Enjoy!
…
continue reading
Designed to challenge old-school business practices and the traditional business suit culture, on unsuitable on Rea Radio you'll hear industry professionals speak about meaningful, modern solutions to help you enhance your company’s growth. Hosted by Doug Houser.
…
continue reading
The BCI Podcast features conversations with business continuity & resilience professionals from around the world offering insight and guidance on current affairs topics affecting businesses around the globe, as well as tips and insight into career development within the industry.
…
continue reading
The Social-Engineer Podcast is about humans. Understanding how we interact, communicate and relay information can help us protect, mitigate and understand social engineering attacks
…
continue reading
Unhackable - a virtually impossible state of being only made plausible through consistent cybersecurity best practices by everyone simultaneously. This is Unhackable, the authoritative Security podcast about deception and personal security. Can you ever be truly Unhackable? No, nobody can. But every episode is designed to help you move forward using actionable cybersecurity best practices that are within reach of everyone. We help you take the steps needed to solve your most important Cybers ...
…
continue reading
Closing The Gender Pay Gap is the podcast for thoughtful HR leaders in technology and cybersecurity companies who want to do more to develop and retain their female talent. Sharing tips, techniques and talent pipeline strategies to help technology companies do more to attract, develop and retain female talent to strengthen the female talent pipeline and close the gender pay gap. From promotions to pay cheques, latest figures reveal men are still out-earning women at work in the technology se ...
…
continue reading

1
Magic, Mindset, and Metrics - Harley Sugarman on Rethinking Training
1:01:55
1:01:55
Play later
Play later
Lists
Like
Liked
1:01:55This week on The Awareness Angle: Interviews, Anthony is joined by Harley Sugarman, co-founder of Anagram Security, a company taking a fresh, no-nonsense approach to security awareness. Think short, sharp challenges, real behaviour change, and zero tolerance for checkbox compliance. We talk about why so much training still misses the mark—and how H…
…
continue reading

1
Episode 95: Episode 95 - Security Awareness - What works?
22:42
22:42
Play later
Play later
Lists
Like
Liked
22:42In this episode, Richard has a deep dive into Security Awareness. What works? What doesn't?
…
continue reading

1
Ransomware Real Life Stories Effect On People. PART 2
47:03
47:03
Play later
Play later
Lists
Like
Liked
47:03Robert Cioffi, CEO of a leading NY MSP and discusses ransomware real life stories effect on people, ransomware shocking toll on people from a real life victim perspective, and the ransomware impact on real life small business. We discuss ransomware what it feels like to be a victim and the ransomware impact on real life individuals. A compelling em…
…
continue reading

1
Ransomware Real Life Stories Effect On People. PART 1
34:17
34:17
Play later
Play later
Lists
Like
Liked
34:17Robert Cioffi, CEO of a leading NY MSP and discusses ransomware real life stories effect on people, ransomware shocking toll on people from a real life victim perspective, and the ransomware impact on real life small business. We discuss ransomware what it feels like to be a victim and the ransomware impact on real life individuals. A compelling em…
…
continue reading
In this episode of The Tax Track we look at the challenges HMRC faces, from improving its services to taxpayers and agents to closing the tax gap; its plans for new and improved digital services; and the possible implications of the proposed changes for agents in particular as MTD and agent registration begin to take effect.…
…
continue reading

1
Famous Hacker Reveals! True Ethical Hacking Stories.
49:03
49:03
Play later
Play later
Lists
Like
Liked
49:03🚨New Episode 🚨We’re joined in-studio by Bryan Seely— World Famous Hacker who Reveals True Ethical Hacking Storie. Bryan is a cybersecurity expert, and media commentator featured on CNBC, Fox News, CNN, and WSJ. He’s also the author of Cyber Fraud: The Web of Lies! We discuss: true ethical hacking stories, data brokers and privacy risks, wiretapping…
…
continue reading

1
Ubiquiti in 2025: MSP Ready? (EP 886)
1:00:30
1:00:30
Play later
Play later
Lists
Like
Liked
1:00:30Thinking about adding Ubiquiti to your MSP stack? Hear my firsthand experience deploying their latest network and security hardware, plus insights from an industry pro managing thousands of devices. We cut through the marketing hype, evaluating features, pitfalls, and integration strategies. Hear the honest pros and cons comparing Ubiquiti with Syn…
…
continue reading

1
FBI Most Wanted. Ruja Ignatova. Story of OneCoin.
32:39
32:39
Play later
Play later
Lists
Like
Liked
32:39By Cyber Crime Junkies by David Mauro
…
continue reading
Artificial Intelligence is reshaping the MSP landscape, and no one knows it better than Gregg Lalle of Synthreo. Tune in as Gregg breaks down how MSPs can move beyond automation to build intelligent AI agents that help clients grow their businesses and improve operational efficiency. Synthreo isn't just another AI tool. Gregg explains how their no-…
…
continue reading
In this episode of the ICAEW Student Insights podcast, host Jag Dhaliwal explores how ACA students can ensure they can make a great impression in the workplace, as well as working towards their longer-term career goals.By ICAEW
…
continue reading

1
🔥 Leadership Secrets REVEALED 🔥 AI in Health Sector
54:14
54:14
Play later
Play later
Lists
Like
Liked
54:14🔥 Leadership Secrets REVEALED 🔥 AI in Health Sector. Unlock the secrets of to overcoming Healthcare IT's most pressing challenges! In this video, we'll dive into the leadership strategies and best practices that top healthcare organizations use to navigate the industry's biggest dilemmas. Dean Mauro and healthcare IT Director, and Sheriff deputy, S…
…
continue reading

1
From Compliance to Community: Meeting CRA Requirements Together
31:44
31:44
Play later
Play later
Lists
Like
Liked
31:44In this episode of 'What's in the SOSS” CRob dives deep into the Erlang ecosystem with Jonatan Männchen (CISO, Erlang Ecosystem Foundation), Ulf (Product Owner, Herrmann Ultraschall), and Michael Winser (Alpha Omega). This episode explores the critical importance of security in open source, particularly in light of regulations like the CRA. Hear ho…
…
continue reading

1
# 58 Maya Doueihi - Project Manager WhatsApp / Growing up in Beirut and being political / News Anchor for Dad (Age 5) / "Never Give Up"
1:02:16
1:02:16
Play later
Play later
Lists
Like
Liked
1:02:16I'm your host Gary Nowak and what a wonderful conversation I had with my guest Maya Doueihy. Maya brought so much energy, passion and beautiful perspective to her career and I know you'll enjoy it. Career Background: Grew up in Beirut, Lebanon Studied at the Lebanese American University studying International Relations and affairs Worked as a proje…
…
continue reading
In this conversation, Jeff Severino and Nathan Borghardt discuss the importance of cyber insurance for small businesses. They share their background and approach to cyber insurance, emphasizing the need for risk transfer. They highlight 12 low-cost measures that small businesses can implement to reduce their cyber risk. The conversation also explor…
…
continue reading

1
Why Jack in the Box Might Have the Best Security Team in Fast Food
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58How does a Navy fire control tech who once wrangled a six-barrel death robot become the head of security operations at Jack in the Box? In this episode of Simply Defensive, we sit down with Chris Julio — SOC Manager, veteran, and self-proclaimed lover of both metrics and munchie meals. Chris shares his journey from Windows NT and dot-matrix printer…
…
continue reading

1
Hackers Asked for a Password... and Got It?
1:14:39
1:14:39
Play later
Play later
Lists
Like
Liked
1:14:39This week on The Awareness Angle, Anthony Davis and Luke Pettigrew dig into everything from dodgy data startups to accidental database wipes by AI tools. Whether it’s passwords, passkeys, or privacy, this episode covers the real-world risks that slip through the cracks of digital life—and what security professionals can learn from them. 🔍 Farnswort…
…
continue reading

1
Ep. 314 - The 4th Monday Series - What Can You Do If Your Accounts Are Hacked? with Congressman Darren Soto
31:27
31:27
Play later
Play later
Lists
Like
Liked
31:27Welcome to the Social-Engineer Podcast: The 4th Monday Series with Chris Hadnagy and Mike Holfeld. Chris and Mike will be covering cutting edge global news to help people remain safe, secure and knowledgeable in a world where it is hard to know what is real and what is fake news. Today Chris and Mike are joined by Congressman Darren Soto. Darren So…
…
continue reading

1
Death in Crypto Land. Ultimate Exit Scam.
45:42
45:42
Play later
Play later
Lists
Like
Liked
45:42This is the story of a notorious death in cryptoland. Many say it’s the ultimate exist scam. Gerald Cotten, the founder of QuadrigaCX, died in 2018 under mysterious circumstances, leading to the loss of $215 million in cryptocurrency. Despite claims that he passed away due to what is medically considered non-fatal Crohn’s disease while in India, ma…
…
continue reading
From Rupert Murdoch's global entertainment ambition to a dead hacker found hanging from a tree in a park in Germany, this true cyber crime story spans over a decade in the cut-throat Satellite TV wars, involving colorful characters, pirates, big business, technology advances and failures and those who entered the darker side to try and get what the…
…
continue reading

1
Visualizing MSP Workflows with Kanban Power (EP 884)
21:13
21:13
Play later
Play later
Lists
Like
Liked
21:13Visual thinkers, this one's for you! On this episode, Wim Kerkhoff walks us through the evolution of project management in the MSP world—starting with sticky notes and ending with an intuitive, web-based Kanban board purpose-built for real IT teams. We talk about integration headaches, boosting technician engagement, and why color-coding and swim l…
…
continue reading

1
CYFIRMA Research: EdskManager RAT- Multi-Stage Malware with HVNC and Evasion Capabilities
5:15
5:15
Play later
Play later
Lists
Like
Liked
5:15CYFIRMA research provides an analysis of a newly identified Remote Access Trojan, EdskManager RAT, which exhibits stealthy infection mechanisms and covert control using HVNC. Key Capabilities: · Multi-stage infection using signed binaries and encrypted config · HVNC-based hidden window interaction · Browser extension profiling (Chrome, Edge, Brave)…
…
continue reading
What does it take to go from a one-man IT shop to a thriving 10-person business rooted in trust and professionalism? In this episode, I talk with Jason Thomas about his journey, the value of honest communication, and the tight-knit Chicago IT community that supports one another. You’ll hear how empathy, transparency, and taking time to recharge out…
…
continue reading

1
SonicWall Unplugged: MRR and No-Commit Contracts (EP 882)
57:21
57:21
Play later
Play later
Lists
Like
Liked
57:21Uncle Marv hosts SonicWall’s finest—Lisa Compton and Julian Agapitos—for a packed roundtable all about the latest in firewall tech, MSP best practices, and business flexibility. We cover the move from Gen 6.5 to Gen 7 (and 8!), the new $99 TZ80 firewall, and how SonicWall’s cyber insurance and warranty options stack up. The conversation brings out …
…
continue reading

1
Episode 073 - Chief Persuasion Officer: The New CISO Mindset - Rick McElroy
28:33
28:33
Play later
Play later
Lists
Like
Liked
28:33Chief Persuasion Officer: The New CISO Mindset NetSPI Field CISO and host of Agent of Influence podcast Nabil Hannan sat down with Rick McElroy to talk about the role of the CISO, leveraging AI in the cybersecurity space, vendor collaboration, and career advice. + + + Find more episodes on YouTube or wherever you listen to podcasts, as well as at n…
…
continue reading
Summary This conversation shines a light on the dark web, discussing its purpose, dangers, and what is available on it. It explores the increase in dark web activity and the sale of stolen data, including passwords and personal information. The conversation also delves into the operations of cybercrime gangs and their recruitment of cyber mercenari…
…
continue reading
Ever wonder how to protect sensitive data when you don't have an IT department? In this revealing conversation, two pharmaceutical industry veterans who recently launched their own consulting businesses share the cybersecurity challenges they never anticipated after leaving corporate America. Katie Hewitt, founder of BioVenture Advisors, and Laura …
…
continue reading

1
TurboDocx: AI Power for MSP Proposals (EP 881)
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37What if you could move from a client call to an executive proposal in five minutes? In this eye-opening episode, Nicolas Fry explains how TurboDocx leverages AI, cryptography, and creative automation to streamline every step of the MSP sales process. Learn how you can stand toe-to-toe with the big IT firms, all while saving money and time. Plus, di…
…
continue reading

1
CYFIRMA Research: CVE-2025-5777– Pre-Auth Memory Leak in Citrix NetScaler (CitrixBleed 2)
5:00
5:00
Play later
Play later
Lists
Like
Liked
5:00Critical Alert: CVE-2025-5777 – Pre-Auth Memory Leak in Citrix NetScaler (CitrixBleed 2)! Organizations relying on Citrix NetScaler ADC and Gateway for secure remote access must act immediately. This newly uncovered vulnerability allows unauthenticated attackers to leak sensitive memory—including session tokens—by sending malformed authentication r…
…
continue reading

1
Coffee Is Your Top Supply Chain Risk: A Conversation with Kyle Kelly
28:56
28:56
Play later
Play later
Lists
Like
Liked
28:56SOC analysts, detection engineers, and pentesters—you’re not imagining it: software supply chain security is a dumpster fire 🔥. In this episode of Simply Defensive, we sit down with Kyle Kelly, engineering manager at GitHub and author of Crime Hacks, to unpack the chaos. We cover: - Why malicious packages are sneaking past defenders - The truth abo…
…
continue reading

1
Winning Clients with Automated Pen Testing (EP 880)
21:53
21:53
Play later
Play later
Lists
Like
Liked
21:53Discover how security can actually win you new clients! In this can’t-miss episode, Anup Ghosh of ThreatMate reveals exactly how automated pen testing and attack simulations not only close deals but also create ongoing revenue for MSPs. Learn the difference between a basic scan and a “real” pen test, what MSPs must do to stay ahead in compliance, a…
…
continue reading

1
Why Was an Elevator Held Hostage by Windows?
1:14:36
1:14:36
Play later
Play later
Lists
Like
Liked
1:14:36This week on The Awareness Angle, Anthony Davis and Luke Pettigrew dive into some of the most unexpected and revealing cyber stories of the week. From job offers to gym selfies to your dog’s microchip, this week’s stories prove no part of daily life is off-limits to cyber risk. 📸 Fitness App Photo Leak – A design flaw exposed thousands of users’ ne…
…
continue reading

1
Ep. 313 - Security Awareness Series - The Importance of Securing Virtual Events With Trent Waterhouse
27:56
27:56
Play later
Play later
Lists
Like
Liked
27:56Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Trent Waterhouse. Trent is the CMO of GlobalMeet, a leading virtual event technology company with a scalable, flexible, and secure hybrid event streaming platform built and supported by experienced event experts. Trent has a proven track record of driving growth…
…
continue reading

1
Who Do Hackers Target The Most? Real Truth About Cyber Crime. FBI vs Cyber Crime.
30:09
30:09
Play later
Play later
Lists
Like
Liked
30:09In this episode of Cyber Crime Junkies, host Dean Mauro explores listener question of who do hackers target the most. He explains the real truth about cyber crime, recent examples of Cyber crime This year, Small business cyber attacks, and he evaluates FBI IC3 Report 2025 Send us a text Growth without Interruption. Get peace of mind. Stay Competiti…
…
continue reading

1
You Can Stop Breaches. Exclusive CISO Insight.
57:57
57:57
Play later
Play later
Lists
Like
Liked
57:57Joining us is Matthew Rosenquist, a massively followed thought leader and Top Voice. A renowned CISO, Cybersecurity leader and strategist, we discuss the role of security leadership, cultural differences on data privacy, importance of choosing trustworthy vendors, and how to stop zero day attacks. Send us a text Growth without Interruption. Get pea…
…
continue reading

1
Making Compliance Simple for MSPs (EP 879)
20:37
20:37
Play later
Play later
Lists
Like
Liked
20:37Are you tired of customers dreading compliance and security talk? In this episode, I chat with Jared Casner of Blacksmith InfoSec, who’s making compliance accessible for every MSP and SMB. Discover their “paint-by-numbers” approach to policy management, seamless ConnectWise integrations, and how their flexible platform creates new revenue streams f…
…
continue reading
CYFIRMA exposes Octalyn Forensic Toolkit, a malicious GitHub-hosted tool masquerading as a legitimate forensic utility. In reality, it functions as a credential stealer with Telegram-based C2, targeting browser data, crypto wallets, Discord, and VPN configs. Built with Delphi and C++, Octalyn enables even low-skilled actors to exfiltrate sensitive …
…
continue reading

1
AP2T Labs: Rethinking Cybersecurity Awareness (EP 878)
23:28
23:28
Play later
Play later
Lists
Like
Liked
23:28In this episode, I get the inside scoop from Reese Tuttle, whose passion for stopping cybercrime is rooted in family and real-world experience. We discuss AP2T Labs’ patent-pending training platform: from social media and business-based attacks to text, voice, and even physical mail scams. Reese details how their “edu moments” and instant feedback …
…
continue reading

1
Marketing Muscle Memory In Cybersecurity
1:09:17
1:09:17
Play later
Play later
Lists
Like
Liked
1:09:17This week on The Awareness Angle Interviews, Anthony chats with Lori Steuart—a cybersecurity marketer with a passion for storytelling, content that resonates, and turning awareness from a box-tick into something people actually care about. From synthesisers to password managers, from yoga habits to ransomware planning, Lori brings a refreshingly hu…
…
continue reading
Join me and Kip Fanta as we reveal how MSPs can break free from the “vendor” label and become true business partners. Learn why strategic management, AI-powered insights, and a collaborative approach are the keys to thriving in today’s IT landscape. Kip shares how their two-sided platform enables both MSPs and clients to collaborate, capture ideas,…
…
continue reading

1
CYFIRMA Research- Tracking Ransomware- June 2025
4:54
4:54
Play later
Play later
Lists
Like
Liked
4:54Stay ahead with CYFIRMA’s Monthly Ransomware Report – June 2025. June saw 463 ransomware victims globally, a 15% decline from May. Qilin led the threat landscape, exploiting Fortinet flaws and adding legal pressure tactics. New players like Fog and Anubis adopted stealthy, modular toolkits and file-wipers for maximum damage. Emerging groups Teamxxx…
…
continue reading