THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Join us as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peek behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | Co-Host Twitter Handle: Andy @andylapteff
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
Learn how to think not what to think.
…
continue reading
A live podcast show, that’s like a morning radio show, just much better. Live from 6h00-8h00 Monday, Wednesday and Friday. Clever, funny, outrageous and sometimes very silly. Come for the guests, stay for the laughter. Also check out our other shows on The Real Network for more entertainment.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
SecurityGen
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
With nearly 30+ years of combined network marketing experience, this dynamic father/son duo has literally rewritten the blueprint & cracked the code of building teams in depth. Combining the power & speed of the digital revolution with proven "old school" fundamentals and principals that have stood the test of time, Chris & Dale McNelly will not only show you how to build your business at lightning speed, but also how to keep that team together for true passive income, & a legacy organization.
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Founded in 2022, securitygen is a global start-up focused on telecom security.
…
continue reading
DISCARDED: Tales from the Threat Research Trenches is a podcast for security practitioners, intelligence analysts, and threat hunters looking to learn more about the threat behaviors and attack patterns. Each episode you’ll hear real world insights from our researchers about the latest trends in malware, threat actors, TTPs, and more. Welcome to DISCARDED
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
09.05.25 Pt 2 - Gareth Cliff is joined by international wealth coach JT Foxx for a candid conversation that bridges continents. JT shares his American perspective on what it’s like walking through South African malls, dives into his ever-growing list of high-profile connections, and unpacks why Donald Trump—love him or hate him—is one of the greate…
…
continue reading
09.05.25 Pt 1 - Gareth Cliff and Ben Karpinski weigh in on the election of the new Pope and why preserving tradition still holds value in a fast-changing world. They also unpack the controversy around Julius Malema being denied entry into the UK, and what it says about South Africa's global standing and political self-respect. Plus, in an era where…
…
continue reading

1
62. Even a Security Expert Can Get Phished
30:16
30:16
Play later
Play later
Lists
Like
Liked
30:16Questions we answer in this episode Who is Troy Hunt? How did he get phished? What are some lessons we can learn from his story? Who will we be inviting as a guest to the podcast? Episode summary Troy Hunt, a security expert, got phished. He clicked a link in an email, and entered his password into a fake website. The hackers logged into his Mailch…
…
continue reading

1
SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch (#)
4:57
4:57
Play later
Play later
Lists
Like
Liked
4:57SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%…
…
continue reading

1
Wide World of Cyber: How state adversaries attack security vendors
52:42
52:42
Play later
Play later
Lists
Like
Liked
52:42In this edition of the Wide World of Cyber podcast Patrick Gray talks to SentinelOne’s Steve Stone and Alex Stamos about how foreign adversaries are targeting security vendors, including them. From North Korean IT workers to Chinese supply chain attacks, SentinelOne and its competitors are constantly fending off sophisticated hacking campaigns. Thi…
…
continue reading

1
SANS Stormcast Thursday, May 8th: Modular Malware; Sysaid Vuln; Cisco Wireless Controller Patch; Unifi Protect Camera Patch (#)
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42SANS Stormcast Thursday, May 8th: Modular Malware; Sysaid Vuln; Cisco Wireless Controller Patch; Unifi Protect Camera Patch Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%…
…
continue reading

1
289 - Expectations on Microsoft Build 2025
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35In this week's episode, we ponder what to expect from Microsoft Build 2025. Is it worth traveling to Seattle for the event, that takes place May 19-22? We reflect on the possible announcements, the breakout session topics, as well as the keynotes. (00:00) - Intro and catching up. (04:56) - Show content starts. Show links - Microsoft Build 2025 - DE…
…
continue reading
Send us a text Consulting Engineers (CEs) at networking vendors blend deep technical expertise with customer-facing skills to bridge the gap between account managers and specialized solution design. They operate as specialists who support Sales Engineers when customer requirements demand deeper technical knowledge. • CEs often join from traditional…
…
continue reading

1
Power Moves & Pretty Boys: Disrupting the Norms
50:16
50:16
Play later
Play later
Lists
Like
Liked
50:167.05.25 Pt 2 - Gareth and Kyle Worde unpack why Donald Trump might just be the ultimate case study in brand disruption — love him or hate him, the man changed the game. They also dig into the surprising story behind the most famous photo ever taken and what it sold for. Plus, a heated (and hilarious) debate: should men wear makeup, or is it still c…
…
continue reading

1
Status, Shelter & Snacks: What Really Counts?
1:09:47
1:09:47
Play later
Play later
Lists
Like
Liked
1:09:477.05.25 Pt 1 - Gareth is joined by Kyle Worde for a deep dive into the strange ways we measure ourselves against others — from status symbols to social media scorecards — and how that comparison becomes its own kind of currency. They also tackle a tough but eye-opening topic: why simply giving homeless people a house doesn’t always mean they can re…
…
continue reading

1
Risky Business #790 -- Bye bye Signal-gate, hello TeleMessage-gate
56:12
56:12
Play later
Play later
Lists
Like
Liked
56:12On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: White House’s off-brand Israeli Signal fork logs cleartext messages with hard coded creds while getting hacked (twice). Just … Wow. Ransomware attacks on UK retailers are linked, and Marks & Spencer has it extra bad After six years dormant, a Magento eCommerce …
…
continue reading

1
SANS Stormcast Wednesday, May 7th: Infostealer with Webserver; Android Update; CISA Warning (#)
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45SANS Stormcast Wednesday, May 7th: Infostealer with Webserver; Android Update; CISA Warning Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that, in addition to implementing typical infostealer functionality, includes a web server suitable to create local phishing sites. https://isc.sans.edu/diary/Python%…
…
continue reading

1
BONUS INTERVIEW: Senator Mark Warner on Signalgate, Volt Typhoon and tariffs
49:44
49:44
Play later
Play later
Lists
Like
Liked
49:44In this extended interview the Vice Chair of the Senate Select Committee on Intelligence, Senator Mark Warner, joins Risky Business host Patrick Gray to talk about: The latest developments in the Signalgate scandal Why America needs to be more aggressive in responding to Volt Typhoon How tariffs are affecting American alliances Why the Five Eyes al…
…
continue reading

1
SANS Stormcast Tuesday, May 6th: Mirai Exploiting Samsung magicInfo 9; Kali Signing Key Lost; (#)
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57SANS Stormcast Tuesday, May 6th: Mirai Exploiting Samsung magicInfo 9; Kali Signing Key Lost; Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung’s MagicInfo 9 CMS, was patched last August but attracted …
…
continue reading
05.05.25 Pt 2 - Gareth Cliff is joined by Colonel Chris Wyatt for a deep dive into the shifting state of affairs across the African continent. From rising tariffs and erratic policies to questions around whether the SANDF has been betrayed, the conversation pulls no punches. Chris also unpacks the current geopolitical landscape, revealing the compl…
…
continue reading
05.05.25 Pt 1 - Gareth and Leigh-Ann Mol dive into the growing debate around regulating podcasts following a new statement from Parliament — and why such control could harm independent media. They also spotlight a surprising and troubling fact: not all South African schools offer mathematics. Later, Dr Hanan joins the conversation to unpack attachm…
…
continue reading

1
SANS Stormcast Monday, May 5th: Steganography Challenge; Microsoft Makes Passkeys Default and Moves Away from Authenticator as Password Manager; Magento Components Backdoored. (#)
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57SANS Stormcast Monday, May 5th: Steganography Challenge; Microsoft Makes Passkeys Default and Moves Away from Authenticator as Password Manager; Magento Components Backdoored. Steganography Challenge Didier published a fun steganography challenge. A solution will be offered on Saturday. https://isc.sans.edu/diary/Steganography+Challenge/31910 Micro…
…
continue reading
02.05.25 Pt 2 - Gareth and Ben dig deep — literally — as they break down the types of people who truly belong “down in the mines” (if you know, you know). They also swipe through the chaos of modern dating: can you actually meet your forever person on an app, or is it just a circus of weirdos? And finally, the age-old debate: what is the ideal body…
…
continue reading

1
Ape Expectations: 100 Men Walk Into a Fight
55:36
55:36
Play later
Play later
Lists
Like
Liked
55:3602.05.25 Pt 1 - Gareth and Ben Karpinski dive headfirst into the internet’s most unhinged debate — who would win in a fight: 100 men or 1 gorilla? (Spoiler: things get heated.) They also unpack the curse of popularity and why being the most liked person might actually suck. Plus, they uncover one of the wildest, most chaotic sports to ever come out…
…
continue reading

1
61. How to Stop Hackers from Stealing Your Tax Refund
26:44
26:44
Play later
Play later
Lists
Like
Liked
26:44Questions we answer in this episode What is the website, ID.me used for? What are the two PIN numbers used in filing your taxes? How can I get an identity protection (IP) PIN? What does it mean (in online security) to plant your flag? Episode summary When filing your taxes, there are 2 different PINs you might use. The first is called your self-sel…
…
continue reading

1
SANS Stormcast Thursday, May 1st: More Steganography; Malicious Python Packages GMail C2; BEC to Steal Rent Payments (#)
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16SANS Stormcast Thursday, May 1st: More Steganography; Malicious Python Packages GMail C2; BEC to Steal Rent Payments Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using…
…
continue reading

1
SANS Stormcast Thursday, May 1st: Sonicwall Attacks; Cached Windows RDP Credentials (#)
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29SANS Stormcast Thursday, May 1st: Sonicwall Attacks; Cached Windows RDP Credentials Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API “login” and “domain” endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sa…
…
continue reading

1
288 - Review your environments with checklists!
30:46
30:46
Play later
Play later
Lists
Like
Liked
30:46This week, we take a look at Azure Review Checklists. Relatively unbeknownst to us, this interesting capability allows you to really supercharge the reviews on your Azure environments! (00:00) - Intro and catching up. (03:03) - Show content starts. Show links - Azure Review Checklists - Azure Resource Inventory - Give us feedback!…
…
continue reading
30.04.25 Pt 2 - Gareth Cliff and Tumi Morake take a hilarious trip down memory lane as they revisit the most iconic (and sometimes ridiculous) TV shows from their childhood—think Friends and an African Spiderman you’ve definitely never seen before. They unpack what’s coming up in the much-anticipated Roast of Helen Zille, with Tumi stepping into th…
…
continue reading
30.04.25 Pt 1 - Gareth Cliff and Tumi Morake aren’t here to whisper—they’re here to call out the idiots. In this episode, the duo dives into the uncomfortable yet necessary conversations we all try to avoid: holding people accountable when they deserve to lose their tongues. Tumi gets thrown off by a Catholic tradition tied to the death of a Pope, …
…
continue reading

1
Risky Business #789 -- Apple's AirPlay vulns are surprisingly awful
1:02:31
1:02:31
Play later
Play later
Lists
Like
Liked
1:02:31On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: British retail stalwart Marks & Spencer gets cybered South Korean telco sets out to replace all its subscriber SIMs after (we assume) it lost the keymat It’s a good exploit week! Bugs in Apple Airplay, SAP webservers, Erlang SSH and CommVault backups Juice jack…
…
continue reading

1
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities (#)
8:52
8:52
Play later
Play later
Lists
Like
Liked
8:52SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people’s credentials. https://isc.…
…
continue reading

1
The Art of the Innocent Ask: How Threat Actors Use Benign Conversations
58:09
58:09
Play later
Play later
Lists
Like
Liked
58:09Hello to all our Cyber Spring Chickens! Join host Selena Larson and guest hosts, Tim Kromphardt and Sarah Sabotka, both Senior Threat Researchers at Proofpoint. These top sleuths crack open Proofpoint’s new Human Factor series and explore one of the most deceptively dangerous tactics in a threat actor’s playbook: the benign conversation. What exact…
…
continue reading

1
SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC (#)
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows’ System Resource Usage Monitor (SRUM). This database logs how much resources software used…
…
continue reading

1
Snake Oilers: LimaCharlie, Honeywell Cyber Insights, CobaltStrike and Outflank
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50In this edition of the Snake Oilers podcast, three sponsors come along to pitch their products: LimaCharlie: A public cloud for SecOps Honeywell Cyber Insights: An OT security/discovery solution Fortra’s CobaltStrike and Outflank: Security tooling for red teamers This episode is also available on Youtube. Show notes…
…
continue reading

1
SANS Stormcast Monday, April 27th: Image Steganography; SAP Netweaver Exploited (#)
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56SANS Stormcast Monday, April 27th: Image Steganography; SAP Netweaver Exploited Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use…
…
continue reading
Questions we answer in this episode What is a DDoS attack? What social media platform was recently the target of a DDoS attack? How can your home network be impacted by one? What can you do to protect your home network? Episode summary DDoS attacks are growing faster than the squash in my garden - seriously, it's wild! The slaves in the army? Devic…
…
continue reading
25.04.25 Pt 2 - Gareth, Ben, and Simphiwe dive into the do’s and don’ts of sliding into DMs — is there actually a right way to shoot your shot? Ben shares the hilarious story of a relentless old man at his gym who clearly lives by the motto: “You miss 100% of the shots you don’t take.” And in a heated football debate, Ben lays out why the UEFA Cham…
…
continue reading
25.04.25 Pt 1 - Gareth, Ben, and Simphiwe unpack the whirlwind around the recent VAT retraction — was it a smart move or just political damage control? Then, in the ever-bizarre world of celebrity drama, could Diddy actually be Ye’s long-lost cousin? We try to make sense of Kanye’s latest headline moment. And finally, we cross over to Nigeria where…
…
continue reading

1
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues; (#)
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues; Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Tel…
…
continue reading

1
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco (#)
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP addr…
…
continue reading
In this week's episode, we look at recent Microsoft Tech updates. By popular request, we're expanding the scope beyond just Azure to include Microsoft 365, Power Platform, and similar Microsoft platforms and capabilities. What's new? What's interesting? What's retiring? (00:00) - Intro and catching up. (03:45) - Show content starts. Show links - Wh…
…
continue reading
Send us a text The divide between network engineers and developers has long been a source of frustration, misunderstanding, and blame in the tech world. When applications fail, the classic refrain "it's the network" often echoes through organizations, leaving network engineers scrambling to prove their innocence while developers remain convinced of…
…
continue reading