Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
The teissPodcast is dedicated to cybersecurity. Weâll host interviews with industry experts whoâll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain whatâs going on and why it matters. But this isnât just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. Youâll get practical tips, real-world ...
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. Iâm Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
The Cyber Ways Podcast brings academic cyber security research into the "real world." We interview top academic researchers to find how their research can be put into practice by cyber security professionals. Our focus is on behavioral aspects of cyber security. Occasionally, we touch on related topics, such as information privacy and surveillance.Each episode discusses one published, peer-reviewed article to reveal the practical implications of the research. Your hosts, Tom Stafford and Cra ...
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Twice per month, Peter House and Mike Chmielewski discuss current cyberthreats and issues. Internet Weather Report is recorded at the studios of Big Cabbage Radio in Palmer, Alaska.
…
continue reading
Russia knows our weaknesses. But do you? A major five-part series from Sky News and Tortoise which imagines how a Russian attack on the UK could play out â and invites real-life former ministers, military chiefs and other experts to figure out how to defend the country. Written and presented by Sky News' security and defence editor, Deborah Haynes. This is Deborah's second podcast series for Sky News. In her first series, Into The Grey Zone, Deborah explores the murky evolution of warfare. W ...
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Mediaâs Phil Tarrant, defence and national security podcaster, Major General (Retâd) Dr Marcus Thompson AM â former head of the ADFâs Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
The Defenderâs Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executivesâ. Skills Gap: List ...
…
continue reading
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasnât already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
…
continue reading
Your Favorite Existentialist-Anarchist Internet Badass Commentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
Step into the world of digital forensics, mobile forensics, OSINT, and cybersecurity with The Cyber Sleuth Show! Hosted by Kevin DeLong, this podcast dives deep into the ever-evolving landscape of digital investigations, featuring expert guests, cutting-edge tools, real-world case insights, and, of course, the occasional terrible dad joke. From law enforcement investigators and forensic analysts to OSINT specialists and cybersecurity pros, we uncover the latest trends, techniques, and challe ...
…
continue reading
A place for everyday life, take a shot with me and vibe out. Adult Zone and content. Not for everyone... feel free to check out happs tv. for the live stream and much more. Instagram digiital vibes
…
continue reading
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
…
continue reading
The Dark Dive podcast is designed to demystify the dark web - arming you with everything you need to know about what the dark web is and how it is used. Join us for a deep dive into dark web markets, hacking forums, and ransomware leak sites. Listen to real life stories from experts that feature criminals buying and selling stolen data, trading exploits, and planning cyberattacks from the dark web. Most importantly, find out how the cybersecurity and law enforcement community can do somethin ...
…
continue reading
Signal over noise. The Ohmbudsman Digest filters global volatility into sharp, voice-driven briefings on geopolitics, digital power, surveillance, climate, and collapse. Each episode distills the dayâs tectonic shifts â from AI policy and cyber intrusions to sovereign bets, border tensions, and biofront breakthroughs. No clickbait. No hype. Just high-trust interpretation of a world reshuffling its rules. New episodes: Weekdays, under 5 minutes. Subscribe for context that cuts through the static.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
Bringing cyber security professionals together to share their expertise. CyberTech Talks is a podcast hosted by CREST.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
A BDSM Cyberpunk Audio Drama
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Cyber Sitrep brings you all the latest cybersecurity news, commentary, and threat intelligence. Focused on small to midsize businesses who we feel have been left behind. Hosted by Eric from Corvus Technologies and Mike from Digital Beachhead who bring their unique perspective based on their military and cybersecurity experience. If you want to understand more about how cybersecurity is important to your organization, enjoy funny tales or just want to learn more about the field of cybersecuri ...
…
continue reading
Cybersecurity Ally is Fortraâs cybersecurity podcast covering security, todayâs cyber threats, and everything you need for cyber news today. Listen now!
…
continue reading
Dive into the world of cybersecurity, book reviews, and effective management strategies, including how to communicate with a board. If this piques your interest, join the club!
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
Conversations with Entrepreneurs and People who do difficult things at the highest level.
…
continue reading

1
đ´ Aug 4âs Top Cyber News NOW! - Ep 933
1:28:45
1:28:45
Play later
Play later
Lists
Like
Liked
1:28:45The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services at https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow whatâŚ
…
continue reading

1
Is the UK Online Safety Act Flawed?
1:12:31
1:12:31
Play later
Play later
Lists
Like
Liked
1:12:31This week on The Awareness Angle, Anthony Davis and Luke Pettigrew untangle the weekâs biggest cybersecurity themesâfrom silent data breaches to AI tool mishaps and the slow-moving train of regulatory change. Whether itâs government policies, scam trends, or workplace surveillance, this episode covers the tensions between safety, privacy, and the râŚ
…
continue reading
It started as a going-away party⌠and became the most legendary hacker conference in the world. This week, Jeff Mossâaka Dark Tangentâtells us how DEF CON began, what it became, and why it still matters. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. CyberWire Glossary link: â https://thecyberwire.com/glossary/pegasusâ Audio reference link:"â Global Cyber Alliance's Phil Reitinger talks DMARC adoptioâŚ
…
continue reading

1
Microsoft & Google lead zero day exploits, Plague Linux malware maintains SSH access, panel to create US Cyber Force
8:20
8:20
Play later
Play later
Lists
Like
Liked
8:20Microsoft and Google among most affected as zero day exploits jump 46% Vietnamese hackers use PXA Stealer, hit 4,000 IPs and steal 200,000 passwords globally New Plague Linux malware stealthily maintains SSH access Huge thanks to our sponsor, ThreatLocker ThreatLockerÂŽ is a global leader in Zero Trust endpoint security, offering cybersecurity contrâŚ
…
continue reading

1
Work from home, malware included. [OMITB]
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Welcome in! Youâve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about todayâs most interesting threats. Your host is â â â Selena Larsonâ â â , â â â Proofpointâ â â intelligence analyst and host of their podcast â â â DISCARDEDâ â â . Inspired by the residents of a building in New Yorkâs exclusive upper west side, SelenaâŚ
…
continue reading

1
SANS Stormcast Tuesday, August 05, 2025: Daily Trends Report; NVidia Triton RCE; Cursor AI Misconfiguration
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48Daily Trends Report A new trends report will bring you daily data highlights via e-mail. https://isc.sans.edu/diary/New%20Feature%3A%20Daily%20Trends%20Report/32170 NVidia Triton RCE Wiz found an interesting information leakage vulnerability in NVidia s Triton servers that can be leveraged to remote code execution. https://www.wiz.io/blog/nvidia-trâŚ
…
continue reading

1
SANS Stormcast Tuesday, August 05, 2025: Daily Trends Report; NVidia Triton RCE; Cursor AI Misconfiguration (#)
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48SANS Stormcast Tuesday, August 05, 2025: Daily Trends Report; NVidia Triton RCE; Cursor AI Misconfiguration Daily Trends Report A new trends report will bring you daily data highlights via e-mail. https://isc.sans.edu/diary/New%20Feature%3A%20Daily%20Trends%20Report/32170 NVidia Triton RCE Wiz found an interesting information leakage vulnerability âŚ
…
continue reading
The Senate confirms a new national cyber director. A new commission explores the establishment of a separate Cyber Force. Cybercriminals exploit link wrapping to launch sophisticated phishing attacks. AI agents are hijacked, cameras cracked, and devs phished. Gene sequencers and period trackers settle allegations of oversharing personal data and inâŚ
…
continue reading

1
NIL and College Sports with Matt Baty
1:04:27
1:04:27
Play later
Play later
Lists
Like
Liked
1:04:27"I played the game different because I had too. I only knew one way." -- Matt Baty, former Div. I athlete and Entrepreneur The NCAA ruled college sports with an iron fist for decades-- it was unconstitutional. NCAA wants control. "The student athlete -- to me, the regulations need to be around the studentâ states Matt Baty, former Senior Associate âŚ
…
continue reading

1
Shadows Within: A Spy Unmasks How Insider Risk Affects Cyber Security
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07Former Spy and intelligence officer, Shawnee Delaney, join us. She is the founder and CEO of Vaillance Group (https://www.vaillancegroup.com) and spent nearly a decade with the Defense Intelligence Agency (DIA) as a decorated Clandestine Services Officer conducting Human Intelligence (HUMINT) operations all over the world. She served four combat zoâŚ
…
continue reading

1
DtSR Episode 664 - Everything You Wanted to Know About RaffCon
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Send the hosts a message - try it now! ** Early release, due to Black Hat Conference and RaffCon XVIII. TL;DR: This episode is all about #RaffCon. Ever wanted to know what the heck it is? Well, Raffael Marty and I break it down, give you a little history, and reminisce. As we got into Black Hat week, this is the perfect precursor to #RaffCon XVIII.âŚ
…
continue reading
From Chinaâs macaque-brained computer to Europeâs scorching Arctic, legal aid meltdowns, and digital phishing hidden inside trusted emailsâthis week delivers a tightly-packed global circuit. đ§ Highlights: ⢠Turkeyâs new Mastodon-based social app under fire ⢠AI-powered crowd control in Hong Kong ⢠Legal aid collapse post-cyberattack in the UK ⢠BoeâŚ
…
continue reading

1
Akiraâs SonicWall zero-day, UK Legal-Aid suffers, Luxembourg 5G attack
8:50
8:50
Play later
Play later
Lists
Like
Liked
8:50Huge thanks to our sponsor, ThreatLocker ThreatLockerÂŽ is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start yâŚ
…
continue reading

1
Finding Zero Days in Salesforce Industry Clouds
46:17
46:17
Play later
Play later
Lists
Like
Liked
46:17Send us a text SaaS platforms represent a significant security blind spot for many organizations, with misconceptions about the shared responsibility model leaving sensitive data vulnerable to exposure. Aaron Costello, Chief of SaaS Security Research at AppOmni, shares insights from his research uncovering five zero-day vulnerabilities in SalesforcâŚ
…
continue reading
We´re back from Summer break! To kick things off, weâre excited to have Armin Buescher and Einar Oftedal from RSAC join Robby for a dive into the most talked-about topic at this yearâs RSA Conference: the emergence of agentic AI. Agentic AI, the way they define it, are agents that complete tasks acting on behalf of a user. Unlike the traditional LLâŚ
…
continue reading

1
SANS Stormcast Monday, August 4th, 2025: Legacy Protocols; Sonicwall SSL VPN Possible 0-Day;
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17Scans for pop3user with guessable password A particular IP assigned to a network that calls itself Unmanaged has been scanning telnet/ssh for a user called pop3user with passwords pop3user or 123456 . I assume they are looking for legacy systems that either currently run pop3 or ran pop3 in the past, and left the user enabled. https://isc.sans.edu/âŚ
…
continue reading

1
CONTESTED GROUND: Regional flashpoints and economic headwinds â Australiaâs strategic dilemma
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45In this episode of the Contested Ground podcast, Major General (Retâd) Dr Marcus Thompson, Phil Tarrant and Liam Garman unpack the CambodiaâThai military confrontation and Australiaâs economic landscape. Tarrant and Thompson begin the podcast reflecting on Exercise Talisman Sabre, highlighting how the biennial drills continue to grow in scale and sâŚ
…
continue reading

1
SANS Stormcast Sunday, August 03, 2025: Legacy Protocols; Sonicwall SSL VPN Possible 0-Day; (#)
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18SANS Stormcast Sunday, August 03, 2025: Legacy Protocols; Sonicwall SSL VPN Possible 0-Day; Scans for pop3user with guessable password A particular IP assigned to a network that calls itself âUnmanagedâ has been scanning telnet/ssh for a user called âpop3userâ with passwords âpop3userâ or â123456â. I assume they are looking for legacy systems that âŚ
…
continue reading
Jospeh Hudson, Director of Growth at TCM Security join sus in the studio. An experienced recruiter, former teacher, involved parent and thought-leader in the cyber security space Joe shares insight into how to avoid land minds in job searching. Topics: landminds in job searching, land minds in job searching, job searching in security, job searchingâŚ
…
continue reading

1
Insider Secrets--Top 5 Human Resource Strategy and Leadership Skills
55:19
55:19
Play later
Play later
Lists
Like
Liked
55:19Host Dean Mauro interviews Amy Cappellanti-Wolf, CHRO with Dayforce, an experienced Chief Human Resources Officer, discussing the importance of AI in HR, HR Technology, Human Resource Strategy and Leadership Skills. Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or âŚ
…
continue reading

1
Hannah Kenney: Focused on people. [Risk] [Career Notes]
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16Please enjoy this encore of Career Notes. Manager in BARR Advisory's Cyber Risk Advisory Practice, Hannah Kenney, shares her journey from never considering technology as a career to having it click in an informations systems class in college. After noticing she was the only one in the room who enjoyed the lecture, Hannah knew she wanted to go down âŚ
…
continue reading

1
Baby Al Capone. New Wave of Online Violence Stories.
52:25
52:25
Play later
Play later
Lists
Like
Liked
52:25Shocking True Crime Stories. Baby Al Capone, Swatting & SIM Swaps Mind-blowing episode about Violence-as-a-service, Dark Web forums, Deadly Swatting events and the unbelievable story of a 15 year old affluent suburban child who became legendary as Baby Al Capone. Our mission is to keep you, your family and your organization's brand safe. Nothing teâŚ
…
continue reading

1
ARM YOURSELF Against Cyber Crime in 2025 đĽNew Playlists Revealed!đĽ
1:50
1:50
Play later
Play later
Lists
Like
Liked
1:50Welcome to Cyber Crime Junkiesâwhere cybersecurity finally meets binge-worthy storytelling. Join Our Community. Choose a PLAYLIST! Protect your personal data and online identity from cyber threats with this comprehensive guide to cybersecurity 101! In today's digital age, it's crucial to prioritize internet safety and secure browsing habits to avoiâŚ
…
continue reading

1
Digital Power Shifts, Cybercrime, & AI Conflict with Martin Hinton | DailyCyber 270
55:13
55:13
Play later
Play later
Lists
Like
Liked
55:13Digital Power Shifts, Cybercrime, & AI Conflict | DailyCyber 270 with Martin Hinton ~ Watch Now ~ In this episode of DailyCyber, Iâm joined by Martin Hinton, Executive Editor of Cyber Insurance News & Information and former Executive Producer at Fox News. With decades of experience in journalism, storytelling, and strategic communications, Martin bâŚ
…
continue reading

1
nOAuth-ing to see here. [Research Saturday]
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59This week, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications". Semperis researchers identified a critical authentication flaw known as nOAuth in 9 out of 104 tested SaaS applications integrated with Microsoft Entra ID. This low-complexiâŚ
…
continue reading
Show notes Follow Malik Uguntu https://www.linkedin.com/in/ssozi-malik-70114818b Like and Follow our LinkedIn page https://www.linkedin.com/company/thecyberweekly Like and Follow our X page https://twitter.com/thecyberweekly Follow Deogratius Okello https://www.linkedin.com/in/deo-okello/ https://twitter.com/deookello51 Follow Josephine Olok https:âŚ
…
continue reading

1
Week in Review: Surveillance camera vulnerabilities, data sovereignty conundrum, French submarine cyberattack
30:47
30:47
Play later
Play later
Lists
Like
Liked
30:47Link to episode page This weekâs Cyber Security Headlines â Week in Review is hosted by Rich Stroffolino with guest Derek Fisher, Director of the Cyber Defense and Information Assurance Program, Temple University â also check out Derekâs substack. Thanks to our show sponsor, Dropzone AI Security teams everywhere are drowning in alerts. Thatâs why câŚ
…
continue reading
A critical vulnerability in SUSE [SOO-suh] Manager allows attackers to run commands with root privilege. A joint CISA and U.S. Coast Guard threat hunt at a critical infrastructure site reveals serious cybersecurity issues. Healthcare providers across the U.S. report recent data breaches. Cybercriminals infiltrate a bank by physically planting a RasâŚ
…
continue reading

1
Ransomware Real Life Stories Effect On People. PART 2
47:03
47:03
Play later
Play later
Lists
Like
Liked
47:03Robert Cioffi, CEO of a leading NY MSP and discusses ransomware real life stories effect on people, ransomware shocking toll on people from a real life victim perspective, and the ransomware impact on real life small business. We discuss ransomware what it feels like to be a victim and the ransomware impact on real life individuals. A compelling emâŚ
…
continue reading

1
Ransomware Real Life Stories Effect On People. PART 1
34:17
34:17
Play later
Play later
Lists
Like
Liked
34:17Robert Cioffi, CEO of a leading NY MSP and discusses ransomware real life stories effect on people, ransomware shocking toll on people from a real life victim perspective, and the ransomware impact on real life small business. We discuss ransomware what it feels like to be a victim and the ransomware impact on real life individuals. A compelling emâŚ
…
continue reading

1
đ´ Aug 1âs Top Cyber News NOW! - Ep 932
1:32:31
1:32:31
Play later
Play later
Lists
Like
Liked
1:32:31The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber for #incidentresponse, #ransomware protection, and business recovery services at https://barricadecyber.com Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow whatâŚ
…
continue reading
đď¸ Whatâs Inside: A lightning-fast scan of the worldâs most urgent storiesâfrom cutting-edge weapons and cyber threats to diplomatic shifts, domestic crackdowns, and disappearing infrastructure. We cover 18 headlines across 5 continents, each in under 15 seconds. This is your news, distilled. Todayâs Highlights: ⢠Chinaâs 10GW microwave weapon unveâŚ
…
continue reading

1
Breaking Down Chaos: Tactics and Origins of a New RaaS Operation
15:33
15:33
Play later
Play later
Lists
Like
Liked
15:33Hazel is joined by threat intelligence researcher James Nutland to discuss Cisco Talosâ latest findings on the newly emerged Chaos ransomware group. Based on real-world incident response engagements, James breaks down Chaosâ fast, multi-threaded encryption, their use of social engineering and remote access tools like Quick Assist, and the groupâs lâŚ
…
continue reading
Australia wants to keep kids off social media. But to do that, it may have to crack open everyoneâs digital ID. Privacy advocates say this isnât just about protecting childrenâ it is about rewriting the social contract for the rest of us. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading