Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Prof G Markets breaks down the news that’s moving the capital markets, helping you build financial literacy and security. Join Scott Galloway and Ed Elson every weekday for no mercy, no malice insight on high flying stocks, booming sectors, and master of the universe CEOs. Like it or not, we live in a capitalist society. The key to navigating it? Talk about money. New episodes every Monday through Friday. Part of the Vox Media Podcast Network.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Jen Psaki tackles the biggest issues of the week and features one-on-one interviews with newsmakers.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
On Mondays, Jon Stewart hosts The Daily Show, but on Thursdays, he's back in your ears with The Weekly Show -- a podcast featuring in-depth conversations with a range of special guests. From experts and advocates, to stakeholders and thought leaders, we discuss the challenges, changes, and ideas that are shaping our world.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Americast is the authoritative US news and politics podcast from the BBC. Each week we provide audiences with the best analysis from across the BBC, with on-the-ground observations and big picture insights about the stories which are defining America right now. The podcast is hosted by trusted BBC journalists including the BBC’s North America editor, Sarah Smith, BBC Radio 4 presenter, Justin Webb, the BBC’s disinformation and social media correspondent, Marianna Spring, and BBC North Americ ...
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Off The Wall is a weekly show on WUSB radio, Stony Brook - Long Island, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Join Senator Ted Cruz and co-host Ben Ferguson as they break down the most important news stories of the day and reveal what they mean for you. On "Verdict with Ted Cruz,” you will go behind the scenes of the political debates that define our country. "Verdict with Ted Cruz" is being brought to you by Jobs, Freedom, and Security PAC, a political action committee dedicated to supporting conservative causes, organizations, and candidates across the country. In 2022, Jobs, Freedom, and Security ...
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
To defend democracy, one has to believe in it. To believe in democracy, one has to understand it. Where it came from. How it works. What’s true. What’s not. What others did before you. How it could be better. How to make a difference. Each week, The David Frum Show digs deep into the big questions people have about our society, explains the progress Americans have made together, and reminds us that the American idea is worth defending.
…
continue reading
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
"What the Hack with Adam Levin" is the award-winning weekly true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading

1
CISO Cyber Insurance Empowerment - Morey Haber, Peter Hedberg, Stephan Jou - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
…
continue reading

1
CISO Cyber Insurance Empowerment - Peter Hedberg, Stephan Jou, Morey Haber - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
…
continue reading

1
AI Zombie Lawyer, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet - SWN #486
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26AI Zombie Lawyers, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-486
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading
BADBOX 2.0 Android malware infects millions of consumer devicesBy Carl Franklin
…
continue reading

1
Week in Review: Google and Cloudflare outages, Copilot Zero-Click, Cloudflare's Claude flair
25:20
25:20
Play later
Play later
Lists
Like
Liked
25:20Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Christina Shannon, CIO, KIK Consumer Products Thanks to our show sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GR…
…
continue reading

1
UEFI Vulnerabilities Galore - PSW #878
2:10:48
2:10:48
Play later
Play later
Lists
Like
Liked
2:10:48This week: You got a Bad box, again Cameras are expose to the Internet EU and connected devices Hydrophobia NVRAM variables Have you heard about IGEL Linux? SSH and more NVRAM AI skeptics are nuts, and AI doesn't make you more efficient Trump Cybersecurity orders I think I can root my Pixel 6 Decentralized Wordpres plugin manager Threat actor namin…
…
continue reading

1
EP2137: Chill Chill Security - Example of n8n and Cybersecurity News Weekly
6:24
6:24
Play later
Play later
Lists
Like
Liked
6:24Sponsor by SEC Playground
…
continue reading

1
S17 E06 (VIDEO) Disaster Recovery Isn't Optional
45:51
45:51
Play later
Play later
Lists
Like
Liked
45:51Santosh Kaveti is the CEO and Founder of ProArch. He has over 18 years of experience as a technologist, entrepreneur, investor, and advisor. Santosh’s vision and leadership have propelled ProArch to become a dominant force in key industry verticals, such as Energy, Healthcare & Lifesciences, and Manufacturing, where he leverages his expertise in ma…
…
continue reading
Santosh Kaveti is the CEO and Founder of ProArch. He has over 18 years of experience as a technologist, entrepreneur, investor, and advisor. Santosh’s vision and leadership have propelled ProArch to become a dominant force in key industry verticals, such as Energy, Healthcare & Lifesciences, and Manufacturing, where he leverages his expertise in ma…
…
continue reading

1
Lawfare Archive: Jack Goldsmith and Bob Bauer on Reforming the Insurrection Act
57:58
57:58
Play later
Play later
Lists
Like
Liked
57:58From April 12, 2024: The Insurrection Act is a provision that allows the president to deploy the U.S. military for domestic law enforcement. It’s been invoked dozens of times by presidents to respond to crises in the over 230 years that it’s been around, but it hasn’t been reformed in centuries. In recent years, the Insurrection Act has come back i…
…
continue reading

1
Nippon & U.S. Steel Deal Closes, Fed Holds Steady, and YouTube Wins Over Older Viewers
28:28
28:28
Play later
Play later
Lists
Like
Liked
28:28Ed breaks down how a “golden share” helped seal Nippon Steel’s $14 billion takeover of U.S. Steel, and explains why the Fed chose to hold interest rates steady. Then, he and Scott dig into new data showing that Americans now watch more TV via streaming than they watch via broadcast and cable combined. Subscribe to the Prof G Markets newsletter Orde…
…
continue reading

1
BONUS POD: America Backs Trump as 70% Support No Nukes for Iran
13:50
13:50
Play later
Play later
Lists
Like
Liked
13:50The episode provides a detailed account of rapidly escalating tensions between Iran, Israel, and the United States, marked by strong public statements and military posturing. Former President Donald Trump has declared a firm stance against Iran’s nuclear ambitions, repeatedly stating that Iran “cannot have a nuclear weapon” and emphasizing that the…
…
continue reading
Amid growing fears about where the Israel-Iran conflict leads, Jon is joined by Ben Rhodes, co-host of "Pod Save the World" and former Deputy National Security Advisor, and Christiane Amanpour, CNN's Chief International Anchor and host of "Christiane and The Ex Files with Jamie Rubin." Together, they trace the complex history that brought us to thi…
…
continue reading

1
Episource Breach, Predatory Sparrow strikes again, Swiss banks data leak
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Over 5 million impacted by Episource breach Predatory Sparrow strikes Iran again Data leak at Swiss banks Huge thanks to our sponsor, Adaptive Security — OpenAI’s first cybersecurity investment As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing simulations featuring realistic personalized deepfakes …
…
continue reading
Please enjoy this encore of Caveat. Camille Stewart Gloster, Former Deputy National Cyber Director at the White House, is sharing a retrospective of her public service career. Ben discusses a new lawsuit in Illinois challenging automatic license plate readers. Dave's got the story of an AI hotline between the US and China. While this show covers le…
…
continue reading

1
Trump's lack of foreign policy principles tears MAGA apart on Iran
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45Jen Psaki looks at the various influences manipulating Donald Trump as he makes decisions on the war between Israel and Iran without having any personal principles mooring his thinking, and how his lack of leadership is leaving his supporters to fight with each other.By NBC News
…
continue reading

1
EP2145: Chill Chill Security - DNS log and use case
10:00
10:00
Play later
Play later
Lists
Like
Liked
10:00Sponsor by SEC Playground
…
continue reading

1
Is Donald Trump about to put the US at war with Iran?
31:47
31:47
Play later
Play later
Lists
Like
Liked
31:47Donald Trump is considering how far the United States should go in joining Israel’s attacks on Iran. Sarah and Anthony - who were both at the G7 summit in Canada on Monday, with Anthony travelling on Air Force One with Trump - discuss whether the U.S. is on the brink of another Middle East war. The president held an emergency Situation Room meeting…
…
continue reading

1
Rational Security: The "Middle East War to End Middle East Wars" Edition
1:14:24
1:14:24
Play later
Play later
Lists
Like
Liked
1:14:24This week, Scott sat down with Lawfare Managing Editor Tyler McBrien and Foreign Policy Editors Daniel Byman and Dana Stuster to talk through the week’s big news in Israel and Iran, including: “The Nuclear Option.” Israel crossed the rubicon late last week and took direct military action against Iran’s nuclear weapons program, among other targets, …
…
continue reading

1
The "Middle East War to End Middle East Wars" Edition
1:14:24
1:14:24
Play later
Play later
Lists
Like
Liked
1:14:24This week, Scott sat down with Lawfare Managing Editor Tyler McBrien and Foreign Policy Editors Daniel Byman and Dana Stuster to talk through the week’s big news in Israel and Iran, including: “The Nuclear Option.” Israel crossed the rubicon late last week and took direct military action against Iran’s nuclear weapons program, among other targets, …
…
continue reading
Join us for an insightful episode as we delve into the critical realm of product security within the Medtech industry. The digital revolution is transforming patient care, but it also introduces significant security risks to medical devices. We'll explore the complex security environment where devices like pacemakers and diagnostic systems are incr…
…
continue reading

1
EP2144: Chill Chill Security - Incident ที่เกิดขึ้นมันความผิดใคร
18:21
18:21
Play later
Play later
Lists
Like
Liked
18:21Sponsor by SEC Playground
…
continue reading

1
CISO Cyber Insurance Empowerment - Morey Haber, Peter Hedberg, Stephan Jou - BSW #400
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Segment description coming soon! This month BeyondTrust released it's 12th annual edition of the Microsoft Vulnerabilities Report. The report reveals a record-breaking year for Microsoft vulnerabilities, and helps organizations understand, identify, and address the risks within their Microsoft ecosystems. Segment Resources: Insights Security Assess…
…
continue reading

1
Lawfare Daily: The Israel/Iran Conflict: What Do We Know So Far?
1:01:12
1:01:12
Play later
Play later
Lists
Like
Liked
1:01:12On today's episode, Lawfare Executive Editor Natalie Orpett discussed the ongoing hostilities between Israel and Iran with Suzanne Maloney, Director of the Foreign Policy Program at the Brookings Institution, and Joel Braunold, Managing Director of the S. Daniel Abraham Center for Middle East Peace. They talked about how the conflict is unfolding, …
…
continue reading

1
EP 130 The Hidden Muscle Every Leader Needs: Resilience with Rick Cudworth
48:03
48:03
Play later
Play later
Lists
Like
Liked
48:03Send us a text “Resilience doesn’t stop you falling off the bike — it helps you get back on.” – Rick Cudworth In this powerful episode of The Security Circle, host Yolanda is joined by organizational resilience expert Rick Cudworth, whose career spans engineering, technology, strategic risk, and leadership across some of the most complex environmen…
…
continue reading

1
OpenAI & Microsoft Feud, Homebuilder Vibes Slump, and WBD Cuts Zaslav’s Pay
28:08
28:08
Play later
Play later
Lists
Like
Liked
28:08Ed breaks down why homebuilder sentiment fell in June and takes a look at the growing tensions between OpenAI and Microsoft. He and Scott then unpack why Warner Bros. Discovery is slashing CEO David Zaslav’s pay. Subscribe to the Prof G Markets newsletter Order "The Algebra of Wealth" out now Subscribe to No Mercy / No Malice Follow Prof G Markets …
…
continue reading

1
Israel vs. Iran, Who's Winning, What's Next & Will America Bomb Fordow
30:18
30:18
Play later
Play later
Lists
Like
Liked
30:18Israel-Iran Conflict: Israel has reportedly conducted highly effective military operations against Iran, targeting military leadership and nuclear facilities. Iran is retaliating with ballistic missile attacks aimed at Israeli civilians. The discussion emphasizes Israel’s precision and success in degrading Iran’s military capabilities. U.S. Involve…
…
continue reading

1
Hackers exploit Langflow flaw, TP-Link routers still vulnerable, Russia detects SuperCard malware attacks
8:52
8:52
Play later
Play later
Lists
Like
Liked
8:52Hackers exploit critical Langflow flaw to unleash Flodrix botnet Organizations warned of vulnerability exploited against discontinued TP-Link routers Russia detects first SuperCard malware attacks skimming bank data via NFC Huge thanks to our sponsor, Adaptive Security — OpenAI’s first cybersecurity investment As deepfake scams and GenAI phishing e…
…
continue reading

1
Outrage grows over ICE overreach as public gets wise to Trump's dirty tactics to round up immigrants
41:28
41:28
Play later
Play later
Lists
Like
Liked
41:28Jen Psaki reports on yet another public official being arrested by ICE in the course of their heavy-handed tactics in rounding up immigrants. But each new instance of abuse of power by ICE is met with more vocal outrage and louder public protests.By NBC News
…
continue reading

1
Risky Business #796 -- With special guest co-host Chris Krebs
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04On this week’s show Patrick Gray and Adam Boileau are joined by special guest Chris Krebs to discuss the week’s cybersecurity news. They talk through: Israeli “hacktivists” take out an Iranian state-owned bank Scattered-spider and friends pivot into attacking insurers Securing identities in a cloud-first world keeps us awake at night Microsoft take…
…
continue reading
On this episode of The David Frum Show, The Atlantic’s David Frum urges an end to wishful thinking about Iran, and a focus instead on the regime’s threatening words and murderous actions. Then David is joined by the Carnegie Endowment scholar Karim Sadjadpour for an urgent conversation about the internal decay of Iran’s theocracy. They discuss the …
…
continue reading

1
SN 1030: Internet Foreground Radiation - The NPM Repository is Under Siege
2:48:29
2:48:29
Play later
Play later
Lists
Like
Liked
2:48:29An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40…
…
continue reading

1
SN 1030: Internet Foreground Radiation - The NPM Repository is Under Siege
2:48:29
2:48:29
Play later
Play later
Lists
Like
Liked
2:48:29An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40…
…
continue reading
By Emmanuel Goldstein
…
continue reading

1
AI Zombie Lawyer, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet - SWN #486
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26AI Zombie Lawyers, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-486
…
continue reading

1
Bonus: Daily Review With Clay and Buck - Jun 17 2025
1:02:08
1:02:08
Play later
Play later
Lists
Like
Liked
1:02:08Meet my friends, Clay Travis and Buck Sexton! If you love Verdict, the Clay Travis and Buck Sexton Show might also be in your audio wheelhouse. Politics, news analysis, and some pop culture and comedy thrown in too. Here’s a sample episode recapping four Tuesday takeaways. Give the guys a listen and then follow and subscribe wherever you get your p…
…
continue reading

1
E053 - Building a Data Governance Strategy Part 1
42:20
42:20
Play later
Play later
Lists
Like
Liked
42:20In this episode, Perry Correll joins us to demystify data governance—framing it not as a source of fear, but as a framework for smarter, safer business practices. We explore how different teams within an organization view data through different lenses, and how compliance can serve as a bridge between them to enable both innovation and accountabilit…
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading

1
Lawfare Daily: Evaluating January 6 Prosecutions with Greg Rosen
55:03
55:03
Play later
Play later
Lists
Like
Liked
55:03Greg Rosen, now an attorney at Rogers Joseph O’Donnell, spoke with James Pearce, Lawfare Legal Fellow, about his time prosecuting federal crimes in the U.S. Attorney’s Office for the District of Columbia. He focused mostly on the investigation and prosecution that followed the attack of the U.S. Capitol on January 6, 2021. He discussed how the U.S.…
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading

1
Israel-Iran Conflict Drives Oil Prices, Meta Monetizes WhatsApp, & Tron’s IPO Grift
25:05
25:05
Play later
Play later
Lists
Like
Liked
25:05Ed takes a look at how oil prices reacted to the conflict between Israel and Iran, why Meta is bringing ads to WhatsApp, and how crypto platform Tron plans to go public via reverse merger. Subscribe to the Prof G Markets newsletter Order "The Algebra of Wealth" out now Subscribe to No Mercy / No Malice Follow Ed on Instagram and X Follow Scott on …
…
continue reading

1
BONUS POD: Trump Leaves G7 & has a Consistent Message Against a Nuclear Iran
12:14
12:14
Play later
Play later
Lists
Like
Liked
12:141. Escalation of the Iran-Israel Conflict Ongoing missile exchanges and attacks on infrastructure, including Iranian oil refineries. Daily life in both countries disrupted by sirens and sonic booms. Speculation about Iran potentially using unconventional retaliation methods. 2. U.S. President Trump's Response Trump left the G7 summit early, citing …
…
continue reading

1
2FA middleman, Archetyp seized, Zoomcar hacked
7:35
7:35
Play later
Play later
Lists
Like
Liked
7:35Beware the SMS 2FA middleman Police seize Archetyp Market Zoomcar hack impacts 8.4 million users Huge thanks to our sponsor, Adaptive Security As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing simulations featuring realistic personalized deepfakes and engaging security awareness training. Their new…
…
continue reading