show episodes
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork

1
7 Minute Security

Brian Johnson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Artwork

1
TestGuild News Show

Joe Colantonio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly show dedicated to helping you kick off your week right with all the latest in automation testing, performance & SRE testing, security testing, and DevOps-related news and updates that you need to know for this week. So grab your favorite cup of coffee or test, and let's do this!
  continue reading
 
Artwork

1
Razorwire Cyber Security

Razorthorn Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
  continue reading
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
  continue reading
 
Artwork
 
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
  continue reading
 
True Spies takes you inside the world's greatest espionage and detective operations. Our hosts Hayley Atwell, Vanessa Kirby, Sophia Di Martino, Daisy Ridley and Rhiannon Neads talk to the real spies behind the missions. What do they know? What are their skills? And what would you do in their position? We explore and investigate real life thrillers, mysteries and crimes - stories that prove truth is stranger than fiction! These stories cover lies, murder, theft, sex, drugs and rock ‘n roll. Y ...
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Artwork

1
The Manhood Experiment

Devon Wesley, Jason Sani, Tarek Statico

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We are often distracted in life and never really dive deep into the real foundation of self improvement, goal achieving, and wellbeing. - Join our team of experts every week as we discuss the real facets of manhood. Topics like: How to develop more self esteem, self love, deeper relationships. How to improve our wellbeing, mental toughness, resilience, and productivity. How to develop critical skills, become better leaders, expand our careers/business, create financial security and contribut ...
  continue reading
 
Artwork

1
CISSP Cyber Training Podcast - CISSP Training Program

Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Artwork

1
SMC Journal

SMC Journal

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The SMC Journal is a podcast about all things related to Software Engineering, Performance, DevOps, Observability, Cloud Computing, Security, AI, and much more.
  continue reading
 
Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecurity author and educa ...
  continue reading
 
Artwork

1
Drupal Brief

Drupal Brief

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Drupal Brief is the go-to podcast for quick and insightful AI generated summaries of the latest Drupal news, blogs, and podcasts. Stay informed and inspired in just a few minutes as we distill the most important updates and trends in the Drupal community! Drupal Brief is a podcast of Drupal Forge.
  continue reading
 
Artwork
 
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
  continue reading
 
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
Power & Politics is the arena where decision-makers answer the questions that matter. Featuring hard-hitting political interviews and a cast of regular political panelists and critical thinkers, the program gives an insider's view of the continuously unfolding drama of the Canadian political scene.
  continue reading
 
Joe Murphy and the team bring everything you need to know about retirement and income planning in a fast paced format. Each week, the hosts and guests on the show reveal the latest developments in the financial world to keep you informed of changes that may affect you personally, while sharing some common sense strategies that will help you make the most out of your retirement savings. We are focused on helping investors preserve and grow their assets, increase their income, and reduce taxes ...
  continue reading
 
I'm always fascinated by new technology, especially AI. One of my biggest regrets is not taking AI electives during my undergraduate years. Now, with consumer-grade AI everywhere, I’m constantly discovering compelling use cases far beyond typical ChatGPT sessions. As a tech founder for over 22 years, focused on niche markets, and the author of several books on web programming, Linux security, and performance, I’ve experienced the good, bad, and ugly of technology from Silicon Valley to Asia. ...
  continue reading
 
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
  continue reading
 
Artwork

1
Up and Vanished

Tenderfoot TV

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Host Payne Lindsey heads to the edge of the arctic circle to investigate two mysterious disappearances from Nome, Alaska. Up and Vanished investigates mysterious cold case disappearances with each new season of the hit true crime franchise. Season 1: The case of missing South Georgia teacher, Tara Grinstead, led to two arrests. Season 2: The disappearance of Kristal Reisinger, a young mother who disappeared from a remote Colorado mountain town. Season 3: The North West Montana disappearance ...
  continue reading
 
Artwork

1
SOCTales

Matt Ford

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
  continue reading
 
Loading …
show series
 
The value of a penetration test is closely tied to how realistic the environment is—and in this episode, we examine the types of environments in which pen tests are conducted: known, partially known, and unknown. A known environment test, also called white-box testing, gives the tester full knowledge of systems, code, or architecture—allowing them …
  continue reading
 
Twitter: Global Manipulation Machine The discussion provided is from a twitter space titled "Twitter IS COMPLETELY COMPROMISED," where the hosts and participants express profound concern over the alleged manipulation and compromise of Twitter's platform. A primary focus revolves around the leakage of Twitter API keys, potentially enabling unauthori…
  continue reading
 
Ukraine's Ambassador to Canada Yuliya Kovaliv says Russia is increasingly attacking civilians after it targeted Kyiv overnight with waves of drones and missiles in its largest aerial assault since the full-scale invasion. Kovaliv responds to concerns about Ukraine's decision to pull out of an anti-landmine treaty. Plus, economist Don Drummond break…
  continue reading
 
Ley de Vigilancia en México: Privacidad, Poder y Alarma Pública Las fuentes abordan la reciente aprobación de una "Ley Espía" en México, que modifica varias leyes de seguridad y telecomunicaciones, generando controversia y preocupación entre la oposición, defensores de derechos humanos y la sociedad civil. Esta nueva legislación, aprobada sin ampli…
  continue reading
 
Today’s episode is a downer! We talk about things you might want to have buttoned up for when you are eventually not alive anymore: Living will Buried vs. cremated? Funeral plans Funeral PHOTOS? I also talk about how my dad broke his ribs while trying to break a chimpmunk, and how a freak 4-wheeler accident also had my ribs in agony.…
  continue reading
 
Mexico's Surveillance Law: Privacy, Power, and Public Alarm The source discusses a newly approved "spy law" in Mexico that grants broad access to personal data, including biometrics and financial information, to security agencies like the SSPC and Guardia Nacional. While proponents argue the law is for combating serious crimes and includes judicial…
  continue reading
 
Joe Murphy discusses the common financial mistakes that baby boomers make as they approach retirement, particularly focusing on Social Security and the importance of strategic planning. He emphasizes the need for a well-thought-out election strategy for Social Security benefits, the impact of taxes on retirement withdrawals, and the significance of…
  continue reading
 
Alberto Daniel Hill: A Celebration of Resilience, Transparency, and Systemic Change on Twitter Spaces. The provided sources offer a multifaceted look at Alberto Daniel Hill, a computer engineer and cybersecurity expert, focusing on his wrongful imprisonment in Uruguay—a pivotal event detailed in his book Log into Hell. They chronicle how this exper…
  continue reading
 
Jeff Cayley joins Adam to talk about selling mountain bikes all over the planet and making some of the best outdoor and mountain bike gear, parts, and accessories you can buy. They have a killer YouTube channel as well. Join the discussion Changelog++ members save 5 minutes on this episode because they made the ads disappear. Join today! Sponsors: …
  continue reading
 
In this episode, we dive into the unique cybersecurity challenges faced by the financial services sector, from high-value targets and strict compliance requirements to the constant threat of phishing and ransomware. Whether you're on the red team, blue team, or in leadership, this episode will help you strengthen your security posture in one of the…
  continue reading
 
Uruguay's Digital Surveillance Landscape and Cybersecurity Regulations These sources collectively examine the multifaceted landscape of digital surveillance and cybersecurity in Uruguay, highlighting both governmental initiatives and their human rights implications. One source details Decree 66/025, Uruguay's effort to enhance cybersecurity for pub…
  continue reading
 
NSO: El Grupo de Spyware Pegasus La fuente principal es un resumen de un episodio de podcast de "Darknet Diaries" sobre el NSO Group y su spyware Pegasus, que permite el acceso a datos de teléfonos móviles y es vendido a agencias gubernamentales. El texto menciona la investigación de John Scott-Railton y Citizen Lab, además de listar patrocinadores…
  continue reading
 
Ciberseguridad en Uruguay: Estado, Delitos y Defensa. Las fuentes proporcionadas ofrecen una visión integral de la ciberseguridad en Uruguay, destacando tanto los desafíos como las respuestas adoptadas. El informe de Datasec (2024-2025) revela una preocupante brecha entre la conciencia y la implementación de medidas de protección cibernética, mostr…
  continue reading
 
This week, we dive into the world of Meshtastic and LoRa—two technologies empowering secure, long-range, and infrastructure-free communication. We'll talk about the origins of Meshtastic, how LoRa radio works, and why mesh networking is revolutionizing off-grid messaging for adventurers, hackers, emergency responders, and privacy advocates alike. W…
  continue reading
 
Ciberincidentes en Uruguay: Justicia, Medios y Narrativas en Conflicto El texto examina una serie de incidentes cibernéticos en Uruguay, centrándose en las defacement de sitios web importantes como El País Uruguay y Buquebus Turismo, y la posterior detención de un joven hacker conocido como "Vlatty". La narrativa explora la perspectiva de un hacker…
  continue reading
 
Reflections on Hacking, Justice, and Cybersecurity in Latin America. This extensive transcript from a discussion with Alberto Daniel Hill, a self-proclaimed hacker, alongside a co-host and a cybersecurity expert named Héctor. The primary focus revolves around the arrest and ongoing detention of Hill's associate, "Vladi," in Uruguay, stemming from a…
  continue reading
 
Cybersecurity Lessons on the Path to Private Equity Dive into the world of private equity and cybersecurity with Paul Harragan, Global Cybersecurity Lead at KKR. In this episode, we cover strategies for managing risks, navigating M&A diligence, and aligning security with business growth. + + + Find more episodes on YouTube or wherever you listen to…
  continue reading
 
The Injustice of Responsible Disclosure The compelling story of Alberto Daniel Hill, a Uruguayan cybersecurity expert and ethical hacker, who became the first individual in his country to be imprisoned for a computer-related crime he asserts he did not commit. The texts collectively explain how his responsible disclosure of vulnerabilities within a…
  continue reading
 
Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Ready to master data classification for your CISSP exam? This episode delivers exactly what you need through fifteen practical questions that mirror real exam scenarios, all focused …
  continue reading
 
As today’s vehicles evolve into software-defined data hubs, concerns over national security have extended deep into automotive supply chains. In this episode of Cars, Hackers, and Cyber Security, we unpack the U.S. government’s sweeping new ban on connected vehicle systems originating from China and Russia-and what it means for automakers, supplier…
  continue reading
 
Auto sector executives met with Prime Minister Mark Carney to discuss the impact of U.S. tariffs on Wednesday, but also advocate for the cancellation of the electric vehicle mandate. Canada's former chief NAFTA negotiator John Weekes evaluates the state of talks with the U.S. after a suspension over the weekend, arguing the president 'likes to show…
  continue reading
 
Panelists: Air Force Maj. Gen. Mark Piper, Deputy Director of Operations at North American Aerospace Defense Command (NORAD); Masao Dahlgren, fellow at the Center for Strategic and International Studies’ Missile Defense Project; Doug Loverro, president of Loverro Consulting; And Patrick Tucker, Defense One’s science and technology editor. View any …
  continue reading
 
Thorsten Ball returned to Sourcegraph to work on Amp because he believes being able to talk to an alien intelligence that edits your code changes everything. On this episode, Thorsten joins us to discuss exactly how coding agents work, recent advancements in AI tooling, Amp’s uniqueness in a sea of competitors, the divide between believers and skep…
  continue reading
 
In this episode of The SOC Brief, Andrew and Dax dive into the world of false positives – those misleading alerts that flood security teams with noise. They discuss how misconfigurations, lack of context, and overly sensitive rules can lead to alert fatigue. With practical tips on investigation, tuning tools, and understanding your environment, the…
  continue reading
 
New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
  continue reading
 
New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
  continue reading
 
New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
  continue reading
 
Revelaciones: Vulnerabilidades de Confianza en Dispositivos Móviles. Esta discusión en YouTube presenta a Jonathan Scott, un ingeniero de seguridad móvil que afirma haber descubierto vulnerabilidades graves y persistentes en los sistemas operativos de Apple y Android, que permiten la extracción sigilosa de datos. Scott comparte su experiencia labor…
  continue reading
 
El "Síndrome de La Habana," también conocido como Incidentes de Salud Anómalos (AHIs). Este fenómeno, caracterizado por síntomas neurológicos inexplicables que afectaron inicialmente a diplomáticos estadounidenses y canadienses en Cuba, se ha extendido globalmente, lo que ha llevado a un cambio en la terminología. La fuente analiza diversas teorías…
  continue reading
 
On the morning of June 26th, Hawaiian Airlines reported a major cybersecurity incident that disrupted its IT systems. Travel alerts were posted by 10:45 a.m. local time, confirming issues that impacted digital check-in, employee portals, and internal communications. The airline's Honolulu-based operations hub was at the center of the disturbance. W…
  continue reading
 
México: Corrupción Digital, Ciberataques y Llama Violeta. Este material examina a México a principios de 2025, detallando los riesgos de una rápida digitalización que se enfrenta a una corrupción sistémica y arraigada. La combinación de infraestructura cibernética deficiente y una corrupción rampante creó un entorno propicio para ciberataques, con …
  continue reading
 
Redes Celulares Clandestinas del Cartel: Innovación Criminal. Un análisis reciente sugiere que los cárteles mexicanos de la droga podrían estar desarrollando redes celulares privadas altamente sofisticadas, superando el uso de teléfonos desechables y aplicaciones cifradas comerciales. Esta supuesta evolución se remonta a la necesidad de evadir la v…
  continue reading
 
Este texto examina la "Ley Espía" de México, una legislación aprobada el 26 de junio de 2025 que otorga al gobierno acceso amplio a datos personales para fines de seguridad. Se discuten las implicaciones para la privacidad y los derechos civiles, ya que los críticos temen vigilancia masiva y una posible autocensura ciudadana. La ley se enmarca en u…
  continue reading
 
Crímenes Cibernéticos y Estafas de Romance. En una discusión sobre las estafas románticas y la ciberseguridad, el presentador y varios expertos, incluyendo a un ex-ciberdelincuente, una víctima convertida en defensora y un activista "black hat", comparten sus perspectivas. Se explora cómo los estafadores construyen confianza a través de la manipula…
  continue reading
 
Quantum computing is here, and it’s being used for more than cracking encryption. On today’s Packet Protector we get a primer on quantum, how it differs from classical computing, its applications for difficult computing problems, why quantum will be the death of blockchain, and how to think about quantum risks. Our guest, Johna Johnson, is... Read …
  continue reading
 
Brian Demers, Developer Advocate at Gradle, speaks with host Giovanni Asproni about the importance of having observability in the toolchain. Such information about build times, compiler warnings, test executions, and any other system used to build the production code can help to reduce defects, increase productivity, and improve the developer exper…
  continue reading
 
In the inaugural episode of the Simply Offensive podcast, host Phillip Wylie interviews Michael Kim, a cybersecurity professional with a diverse background. Michael shares his journey from music to cybersecurity, emphasizing the importance of networking, certifications, and continuous learning. He discusses the challenges of breaking into pen testi…
  continue reading
 
MCP servers everywhere in tech feeds these days, and while it's becoming a crucial part of AI agents communicating with software and utilizing their services to perform powerful tasks. On today's show we talk about how much the MCP Server phenomena is impacting the developer experience. My gues is Ricky Robinett from Cloudflare. 👋 Connect With Me 📫…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play