Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
A podcast that explores the stories of real people, their work, and its impact on the information security industry. Join security expert Caroline Wong as she focuses on the human side of security. Don't forget to follow the podcast on Twitter: https://twitter.com/humansofinfosec
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
Modem Mischief tells the true stories of the outlaws of cyberspace. Hackers, dark web lurkers and cybercrime perpetrators of the digital underground are explored in this true crime series.
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter ...
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec


1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
Conversations with CISOs and other important thought leaders offering advice for those wanting to enter the field, grow in the field.
Join hacker maker Phillip Wylie and his guests as they discuss and unveil the “secrets” of professional hacking — a mysterious, intriguing, and often misunderstood occupation, even by those in the field of cybersecurity. With the rising need for professional hackers, those entering the infosec world are drawn to it, and understandably so — it is an exciting and fascinating career. Still, it sure has nothing to do with magic. Join these conversations to discover what the role entails, the dif ...
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
B
Black Hills Information Security


1
Black Hills Information Security
Black Hills Information Security
Weekly infosec news podcast with the pen testers and friends of Black Hills Information Security.
Kaspersky Lab’s security experts discuss recent news and give their advice on the topics of computer and smartphone protection.
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues. In a virtual world Reality 2.0 unfolds Minds are expanded -ChatGPT
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Alias Secure AF Cybersecurity Podcast. Join our host, Teddie Underkoffler of Alias, as she covers a variety of cybersecurity topics with coworkers and special guests. No matter where you are on the cybersecurity knowledge ladder, there's an episode here for you.
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
Data compliance is broken. Increasing regulations, high public expectations, and real business needs have made the data layer exceedingly complex. It’s not balanced with its surroundings anymore. We have to rethink the function and organisation of compliance — and in this podcast we invite you to join that conversation. Host: Jacob Høedt Larsen By: Wired Relations - www.wiredrelations.com
U
UNSECURITY: Information Security Podcast


1
UNSECURITY: Information Security Podcast
InfoSec Missionaries
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
Bringing cyber security professionals together to share their expertise. CyberTech Talks is a podcast hosted by CREST.
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
Catch up on the latest information security news with our fortnightly podcast. Also, keep an eye out for webinars and author interviews, where we speak with industry experts about information security, cyber security, data privacy and much, much more.
T
The Host Unknown Podcast


1
The Host Unknown Podcast
Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
Iron Sysadmin is a podcast about being a sysadmin, with a healthy dose of paranoia. We talk about IT news, and have a tendancy toward information security, as it applies to Operations. Our hosts have decades of experience in the field, from desktop support, networking, architecture, network engineering, windows, linux, and even some industrial automation.
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
Welcome to The MLSecOps Podcast, presented by Protect AI. Your hosts “D” Dehghanpisheh, President and Co-Founder of Protect AI, and Charlie McCarthy, MLSecOps Community Leader, explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. This is MLSecOps. Learn more at MLSecOps.com.
A podcast about cybersecurity and the people that keep the internet safe.The podcast is built as a series of segments: we will be looking back at the last couple of weeks in cybersecurity news, talking to different people in the industry about their thoughts and experiences, we're going to break apart some of the TTPs being used by adversaries, and we will even cover a little bit of hacker history.
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
How does GDPR, data privacy and data protection impact your business? In this podcast, Tom Fox, the Voice of Compliance hosts Data Privacy/Data Security expert Jonathan Armstrong, co-founder of Cordery Compliance. They use the framework of GDPR to discuss a wide range of issues relating to data privacy and data protection. If you are a compliance professional, business leader or InfoSec security expert this is the podcast to learn about what is happening in the UK, EU, US and beyond.
The seemingly endless stream of cyberattacks and data breaches have put enterprises and the information security industry on their heels. TechTarget SearchSecurity editors Rob Wright and Peter Loshin travel through this dark world of hacks, vulnerabilities and repeated infosec failings to discuss why we’ve arrived at this point, and what can be done to improve things.
Security Nation is a podcast dedicated to celebrating the champions in the cybersecurity community who are advancing security in their own ways. We also cover the latest developments in infosec that you should know about.
Security, Tech, and Society in 10 Minutes A weekly 10-minute update on the most critical stories in cybersecurity, technology, and society. Includes analysis, original ideas, and the best links from around the web. Part of the NEWS, ANALYSIS & DISCOVERY SERIES. Additional standalone episodes include: Conversations with one or more guests around a particular idea in the IDEA SERIES. Interviews with special guests to talk about a particular idea or topic, part of the INTERVIEW SERIES. Short, i ...
Lighthearted security advice and banter from 1Password and guests.
Hey everyone, Welcome to the Infosec Prep Podcast. We aim to bring you weekly Infosec news and bring some people on to interview! Join our discord at https://discord.gg/9xTqKTY
The ThinkstScapes podcast aims to distill and disseminate the cybersecurity research published worldwide. Our researchers track and review hundreds and thousands of talks (so you don't have to) and then bring this to you in small, digestible chunks.
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest in risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9 AM EST Monday through Thursday on YouTube, LinkedIn and Twitter. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecurity practitioners in their mission to keep their organizations secure.
Podcast by InfoSec Campus
Just two people trying to do IT and Security the right way.
SecTools Podcast is a series of audio podcast featuring free or opensource tool authors from Information Security industry, sharing their interesting experience on developing and maintaining amazing tools for the security community. Hosted by Sanoop Thomas (s4n7h0) https://infoseccampus.com https://twitter.com/InfoSecCampus
Trace Labs is a Canadian based non profit specializing in the crowd sourcing of open source intelligence collection. In this series, we explore the topics, techniques and tools that relate to OSINT collection.
H
Humans of InfoSec


1
Episode 85: The CISO Whisperer | Yael Nagler
22:44
22:44
Play later
Play later
Lists
Like
Liked
22:44
Carving an unconventional path towards information security, Yael advises many a CISO, CIO and CRO. Leadership roles at BlackRock and JPMorgan during periods of crisis and growth have given her a unique technical and business perspective — instead of saying “Here’s why that won’t work.”, she asks “But what if we tried this?” In this episode you’ll …
B
Black Hills Information Security


1
Talkin’ About Infosec News – 3/16/2023
1:00:36
1:00:36
Play later
Play later
Lists
Like
Liked
1:00:36
00:00 – PreShow Banter™ — Tossing Money at Problems00:58 – BHIS – Talkin’ Bout [infosec] News 2023-03-1301:41 – Story # 1: Silicon Valley Bank collapse: Treasury, Fed, and FDIC announce […] The post Talkin’ About Infosec News – 3/16/2023 appeared first on Black Hills Information Security.By Black Hills Information Security
I
ITSPmagazine


1
Conversation With Jess Vachon @infosec_jess | Securing Bridges Podcast With Alyssa Miller | Episode 37
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16
Guest: Jess Vachon, Chief Information Security Officer, Context Labs BV [@contextlabsbv] On Mastodon | https://infosec.exchange/@infosec_jess On Twitter | https://twitter.com/infosec_jess On LinkedIn | https://www.linkedin.com/in/jessvachon1/ ________________________________ Host: Alyssa Miller On ITSPmagazine 👉 https://www.itspmagazine.com/itspmag…
S
Smashing Security


1
Crypto hacker hijinks, government spyware, and Utah social media shocker
47:33
47:33
Play later
Play later
Lists
Like
Liked
47:33
A cryptocurrency hack leads us down a maze of twisty little passages, Joe Biden's commercial spyware bill, and Utah gets tough on social media sites. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by The Register's I…
C
CYBER


1
The DEA Is Skipping Warrants and Buying Data from Rogue Employees
34:11
34:11
Play later
Play later
Lists
Like
Liked
34:11
In America, no one can protect you from a transportation employee being paid off by the feds. The Drug Enforcement Agency has a single remit: to prosecute America’s long-failed war on drugs. Joseph Cox is on today’s episode of Cyber to talk about one its shadier practices and the senators who want answers from the Department of Justice. It turns ou…
C
CyberWire Daily


1
Traffers and the threat to credentials. WiFi protocol flaw. Cross-chain bridge attacks. A shift in Russian cyber operations. Piracy is patriotic.
24:39
24:39
Play later
Play later
Lists
Like
Liked
24:39
Traffers and the threat to credentials. A newly discovered WiFi protocol flaw. Cross-chain bridge attacks. A shift in Russian cyber operations. Ann Johnson from Afternoon Cyber Tea chats with EY principal Adam Malone. Our guest is Toni Buhrke from Mimecast with a look at the State of Email Security. And is piracy patriotic? For links to all of toda…
This episode of the Cybersecurity Defenders podcast is the first part in a two-part mini-series about the greatest cyber attack ever conceived: Stuxnet Joining to help us tell the story is Kim Zetter, Journalist and Author - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Stuxnet is a malicious computer worm first …
C
Cyber Security Headlines


1
Microsoft unveils OpenAI-based cyber tools, Google accused of destroying antitrust evidence, A million pen tests show security is getting worse
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03
Microsoft unveils OpenAI-based chat tools to combat cyberattacks Google accused of willfully destroying evidence in antitrust battle A million pen tests show companies' security postures are getting worse Thanks to today's episode sponsor, Trend Micro Cybersecurity is not just about protection, it’s about foresight, agility, and resilience. Navigat…
S
Sustainable Compliance


1
The #1 skill job seeking privacy pros should learn — career advice from top recruiter
41:48
41:48
Play later
Play later
Lists
Like
Liked
41:48
Are you looking to break in to privacy? Or take your privacy career to the next level? Don't miss this privacy career advice from Michael Jared Coseglia of TRU Staffing Partners. He has placed over 5,000 privacy pros in jobs over the years. We talk about important skills for privacy professionals and Jared reveals THE most important one. Jacob Hoed…
I
ITSPmagazine


1
How to avoid the use of Toxic Chemicals in our Waterways? And why have people become so dependent on shortcuts that often create bigger problems in the long run? | A Conversation with Tara Lordi | Audio ...
37:08
37:08
Play later
Play later
Lists
Like
Liked
37:08
Guest: Tara Lordi, President and CEO at WeeDoo Greenboat [@weedooworkboat] On LinkedIn | https://www.linkedin.com/in/tara-lordi-08286b153 On TikTok | https://www.tiktok.com/@chiefcxofficer On YouTube | https://www.youtube.com/channel/UC5yhuAVP7pdd7U0KxkRh1_w _____________________________ Hosts: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmaga…
T
The MLSecOps Podcast


1
Just How Practical Are Data Poisoning Attacks? With Guest: Dr. Florian Tramèr
47:35
47:35
Play later
Play later
Lists
Like
Liked
47:35
ETH Zürich's Assistant Professor of Computer Science, Dr. Florian Tramèr, joins us to talk about data poisoning attacks and the intersection of Adversarial ML and MLSecOps (machine learning security operations). Thanks for listening! Find more episodes at MLSecOps.com.By Dr. Florian Tramèr
T
The MLSecOps Podcast


1
A Closer Look at "Adversarial Robustness for Machine Learning" With Guest: Pin-Yu Chen
38:39
38:39
Play later
Play later
Lists
Like
Liked
38:39
In this episode of The MLSecOps podcast, the co-hosts interview Pin-Yu Chen, Principal Research Scientist at IBM Research, about his book co-authored with Cho-Jui Hsieh, "Adversarial Robustness for Machine Learning." Chen explores the vulnerabilities of machine learning (ML) models to adversarial attacks and provides examples of how to enhance thei…
T
The MLSecOps Podcast


1
A Closer Look at "Securing AIML Systems in the Age of Information Warfare" With Guest: Disesdi Susanna Cox
30:50
30:50
Play later
Play later
Lists
Like
Liked
30:50
Security researcher, AI/ML architect, & former political operative, Disesdi Susanna Cox, talks with us about her research, some of which can be accessed via her website: anglesofattack.io. Thanks for listening! Find more episodes at MLSecOps.com.By Disesdi Susanna Cox
U
UNSECURITY: Information Security Podcast


1
An Interview w/ the Creators of Hack Space Con - the Mission, Neurodiversity, and More!
38:16
38:16
Play later
Play later
Lists
Like
Liked
38:16
This week, Oscar and Brad sit down with the creators of Hack Space Con to discuss the mission behind the conference, the unique venue, how the event came to be, and more! Links: https://www.hackspacecon.com/ Send any questions, comments, or feedback to unsecurity@protonmail.com. Don't forget to like and subscribe!…
C
CyberWire Daily


1
Twitter looks for a leaker. Insider risks. The state of resilience. Russian auxiliaries briefly disrupt a French National Assembly website. Cyber trends in the hybrid war. DPRK hacking, as it is.
24:45
24:45
Play later
Play later
Lists
Like
Liked
24:45
Twitter gets a subpoena for a source-code leaker’s information. The insider risk to data. Russian hacktivist auxiliaries target the French National Assembly. Recent trends in cyberattacks sustained by Ukraine. Ben Yelin unpacks the White House executive order on spyware. Mr. Security Answer Person John Pescatore ponders the permanence of ransomware…
I
ITSPmagazine


1
Who are Kayla and Taylor? | Meet your Hosts of the New Locked Down Show: Making Sense of Security! | Locked Down Podcast With Kayla Williams and Taylor Parsons
54:47
54:47
Play later
Play later
Lists
Like
Liked
54:47
Hosts: Kayla Williams On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/kayla-williams Taylor Parsons On ITSPmagazine | https://itspmagazine.com/itspmagazine-podcast-radio-hosts/taylor-parsons ________________________________ This Episode’s Sponsors Are you interested in sponsoring an ITSPmagazine Channel? 👉 https://ww…
T
The CyberHub Podcast

1
Cyber News: Outlook ZeroDay Exploit, Apple ZeroDay Patched, Tesla Hacked in Minutes & US Cyber Force
15:45
15:45
Play later
Play later
Lists
Like
Liked
15:45
Cyber News: Outlook ZeroDay Exploit, Apple ZeroDay Patched, Tesla Hacked in Minutes & US Cyber Force Cybersecurity News CyberHub Podcast March 28th, 2023 Today's Headlines and the latest #cybernews from the desk of the #CISO: No-Interaction Outlook Zero Day Exploited Since Last April Apple fixes recently disclosed WebKit zero-day on older iPhones N…
I
ITSPmagazine


1
Safeguarding the C-Suite | Pioneering the Future of the Executive Digital Protection Revolution | A Their Story Conversation from RSA Conference 2023 | A BlackCloak Story With Chris Pierson and Daniel ...
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10
Welcome to another exciting episode of our podcast, where we dive into the fascinating world of cybersecurity and explore the challenges faced by businesses and individuals alike. Today, we have an extraordinary story to share, one that sheds light on the ever-evolving landscape of cyber threats and the innovative solutions being developed to prote…
Katherine Druckman and Doc Searls talk to Kyle Rankin and Shawn Powers about Shawn's head's appearance at the recent SCaLE conference and 3D printing, all while having a little too much fun. Hit play if you always wondered about our Myers-Briggs types. Site/Blog/Newsletter FaceBook Twitter Mastodon Special Guests: Kyle Rankin and Shawn Powers. Supp…
C
CISO Series Podcast


1
Why Aren’t You On Slack Where I Can Interrupt You?
36:32
36:32
Play later
Play later
Lists
Like
Liked
36:32
All links and images for this episode can be found on CISO Series. In order to get any work done we try to shut out all possible distractions. That includes messaging apps. But those people who want to connect become annoyed that they can't reach you. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis…
C
Cyber Security Headlines


1
Pinduoduo malware, CFTC sues Binance, Twitter takes down source code
7:09
7:09
Play later
Play later
Lists
Like
Liked
7:09
Pinduoduo malware confirmed Binance sued by CFTC Twitter source code takedown Thanks to today's episode sponsor, Trend Micro Cybersecurity is not just about protection, it’s about foresight, agility, and resilience. Navigating a new era of cyber risk demands evolved strategies, new frameworks, and integrated tools to equip security teams to anticip…
I
ITSPmagazine


1
Cosmic Care: AI-Driven Healthcare, Space Medicine, And Their Role In the Future Of Space Exploration | The High Alert Institute Series | A Conversation With Dr. Maurice Ramirez and Allison A. Sakara ...
49:17
49:17
Play later
Play later
Lists
Like
Liked
49:17
Guests Allison A. Sakara, Executive Director, High Alert Institute [@High-Alert-Inst] On ITSPmagazine | http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/allison-a-sakara Dr. Maurice A Ramirez, Founder and President, High Alert Institute [@High-Alert-Inst] On ITSPmagazine | http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/dr-…
I
ITSPmagazine


1
Come Fly with us to the Aerospace Village | ITSPmagazine Event Coverage: RSAC 2023 San Francisco, USA | A Conversation with Steve Luczynski and Henry Danielson
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29
Guests Steve Luczynski, Senior Manager / Critical Infrastructure Security, Accenture Federal Services [@Accenture] and Chairman of the Board for the Aerospace Village [@secureaerospace] On LinkedIn | https://www.linkedin.com/in/steveluczynski/ On Twitter | https://twitter.com/cyberpilot22 Henry Danielson, Adjunct Professor/Lecturer, Cal Poly Colleg…
C
CyberWire Daily


1
Evolution of criminal scams (especially BEC). Law enforcement honeypots. ChatGPT data leak. Hybrid war updates.
31:13
31:13
Play later
Play later
Lists
Like
Liked
31:13
IcedID is evolving away from its banking malware roots. An Emotet phishing campaign spoofs IRS W9s. The FBI warns of BEC scams. A Fake booter service as a law enforcement honeypot. Phishing in China's nuclear energy sector. Reports of an OpenAI and a ChatGPT data leak. Does Iran receive Russian support in cyberattacks against Albania? My conversati…
C
Cyber Work

1
Overcoming burnout in cybersecurity and VMware’s XDR announcement | Guest Karen Worstell
58:41
58:41
Play later
Play later
Lists
Like
Liked
58:41
Karen Worstell is a 25-year veteran of the tech, IT and security space; she’s a senior cybersecurity strategist at VMware and a chaplain. This episode goes to many fascinating places, from her days learning coding on a TRS-80 computer, how her extremely visual and right-brained approach to learning has influenced her security journey, her experienc…
U
Unsupervised Learning


1
NO. 375 — 6 Post-GPT Phases, Github's Private Key, New Assistant Interfaces
17:20
17:20
Play later
Play later
Lists
Like
Liked
17:20
6 Post-GPT Phases, Github's Private Key, New Assistant Interfaces Become a Member: https://danielmiessler.com/subscribe/ See omnystudio.com/listener for privacy information.By Daniel Miessler
T
The CyberHub Podcast

1
Cyber News: Twitter Source Code Leaked, P&G Data Theft, ChatGPT Chrome Hack, & More
13:57
13:57
Play later
Play later
Lists
Like
Liked
13:57
Cyber News: Twitter Source Code Leaked, P&G Data Theft, ChatGPT Chrome Hack, & More Cybersecurity News CyberHub Podcast March 27th, 2023 Today's Headlines and the latest #cybernews from the desk of the #CISO: GitHub Suspends Repository Containing Leaked Twitter Source Code Emotet malware distributed as fake W-9 tax forms from the IRS Procter & Gamb…
C
Cyber Security Headlines


1
UK bans TikTok, Windows Snipping patch, Puerto Rico hack
7:42
7:42
Play later
Play later
Lists
Like
Liked
7:42
UK bans TikTok from government mobile phones Microsoft pushes OOB security updates for Windows Snipping tool flaw Vice Society claims attack on Puerto Rico Aqueduct and Sewer Authority Thanks to today's episode sponsor, Trend Micro Cybersecurity is not just about protection, it’s about foresight, agility, and resilience. Navigating a new era of cyb…
C
CyberWire Daily


1
An introduction to the National Cryptologic Museum. [Special Edition]
27:27
27:27
Play later
Play later
Lists
Like
Liked
27:27
Rick Howard, N2K’s CSO and The CyberWire’s Chief Analyst and Senior Fellow, sits down with Director of the National Cryptologic Museum, Dr. Vince Houghton. The National Cryptologic Museum is the NSA's affiliated museum sharing the nation's best cryptologic secrets with the public. In this special episode, Rick interviews Dr. Houghton from within th…
In this episode I talk with Matthew Devost who built his career on hacking the U.S. Military. Did you ever wonder how to pen test an aircraft carrier? In this episode we talk about that and much more. If you enjoy this episode please leave a review & share the podcast! If you enjoy this podcast then please consider becoming a subscriber at the link…
I
ITSPmagazine


1
Understanding What a Research Culture Is with Dr. Stephen J. Scotti and NASA's Return-to-Flight | Leading Edge Discovery Podcast with Astronaut Charlie Camarda Ph.D
1:08:45
1:08:45
Play later
Play later
Lists
Like
Liked
1:08:45
Guest: Dr. Stephen J. Scotti, Distinguished Research Associate at NASA [@NASA] Langley Research Center [@NASA_Langley] and STEM Education Advisor for Brilliant Star Magazine On LinkedIn | https://www.linkedin.com/in/stephen-scotti-12a2056/ On Facebook | https://www.facebook.com/stephen.j.scotti ______________________ Host: Charlie Camarda Ph.D On I…
C
CyberWire Daily


1
Tanya Janca: Find a community who supports you. [CEO] [Career Notes]
9:56
9:56
Play later
Play later
Lists
Like
Liked
9:56
Tanya Janca, CEO and Founder of We Hack Purple, sits down to talk about her exciting path into the field of cybersecurity. Trying several different paths in high school, she soon found she was good at computer science. When it came to picking a college, she knew that was the field she wanted to get into. After college, she was able to use her skill…
C
CyberWire Daily


1
Two viewpoints on the National Cybersecurity Strategy. [Special Edition]
35:03
35:03
Play later
Play later
Lists
Like
Liked
35:03
Earlier this month, the White House released the National Cybersecurity Strategy, the first issued since 2018. The strategy refocuses roles, responsibilities, and resource allocations in the digital ecosystem, with a five pillar approach. Those pillars are: defending critical infrastructure, disrupting threat actors, shaping market forces to drive …
C
CyberWire Daily


1
Popunders are not the good kind of ads. [Research Saturday]
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37
On this episode, Jérôme Segura, senior threat researcher at Malwarebytes, shares his team's work, "WordPress sites backdoored with ad fraud plugin." WordPress is an immensely popular content management system (CMS) powering over 43% of all websites. Many webmasters will monetize their sites by running ads and need to draw particular attention to se…
C
Cyber Security Headlines


1
Week in Review: post-ransomware lawsuits, cybersecurity as a hindrance, ChatGPT imposters
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, March 20-24, is hosted by David Spark with our guest, Kurt Sauer, VP, Information security, Workday Thanks to today’s episode sponsor, Conveyor Does the thought of answering another security questionnaire make you want to beat the stuffing out of 32 pinatas? Then you might wan…
C
CyberWire Daily


1
Tools, alerts, and advisories from CISA. Reply phishing scams. Cl0p goes everywhere with GoAnywhere. EW in the hybrid war, and shields stay up.
29:13
29:13
Play later
Play later
Lists
Like
Liked
29:13
A CISA tool helps secure Microsoft clouds.JCDC and pre-ransomware notification. CISA releases six ICS advisories. Reply phishing. Cl0p goes everywhere exploiting GoAnywhere. Russian electronic warfare units show the ability to locate Starlink terminals. Betsy Carmelite from Booz Allen Hamilton on the DoD's zero trust journey. Analysis of the Nation…
America is thinking about banning the most popular social media app in the world. TikTok has exploded in the past few years and whether you love it or hate it, you can’t deny its huge influence. Legislators in America are concerned about that influence, especially because of TikTok’s connections to China. On Thursday, TikTok’s CEO testified before …