Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Socializing Cybersecurity. Translating Cyber into business terms. Newest AI, Social Engineering and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manages cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Every week, host Jon Munshaw brings on a new guest from Talos or the broader Cisco Secure world to break down a complicated security topic in just five or 10 minutes. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 22-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
Simply Cyber is an information security YouTube channel designed to help individuals go further, faster in the information security field. I’m Gerald Auger, a full time cyber security professional with a passion for the field. The field is collaborative in nature, and I would like to help others successfully drive their career. This podcast is audio extracted from SimplyCyber interviews and made available. Check out SimplyCyber.io or SimplyCyber on YouTube for more information.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The Cyber Social Hub is an online community of digital investigators. Join your host, Kevin DeLong as he discusses with a variety of guests on topics in the field of digital investigations and sometimes terrible ”dad” jokes. We talk to investigators, researchers, and vendors to get you the information you need to find the truth about digital incidents! Join us at https://cybersocialhub.com for FREE and be part of the community. If you want to see the video version of this podcast, watch us o ...
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address talkingcybersec@gmail.com to make comments, pose questions or even ask to be on ...
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Bringing you the latest news on the Cyber Security and initiatives that focus on development of the Cyber Security economics.
…
continue reading
CTE (Career Technical Education) Interviews Cybersecurity Tutorials Cyber World News Computer Science & Tech Topics Career Hacks, Education Trends, and More! The preferred podcast show for CTE students, the high school community, magnet students, academic experts, and cyber educators.
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
The DtSR Podcast is dedicated to the cyber security profession - with news, personalities, topics of interest, and discussion you won't find elsewhere. Running since 2011 - founded by Rafal Los (aka "@Wh1t3Rabbit"), and co-hosted by James Jardine - the weekly show will entertain you while you're learning something. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&si=scHDiTuLXSEQ9qHq On LinkedIn: https://www.linke ...
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
…
continue reading
Interviews, conversations, and content from professionals in the cybersecurity industry providing you with valuable tips, tools, techniques, training, and resources to make you a top cyber pro.Connect with more from Top Cyber Pro at: Website: https://topcyberpro.com/ Facebook: https://www.facebook.com/TopCyberPro/ Instagram: https://www.instagram.com/topcyberpro/ Twitter: https://twitter.com/TopCyberPro TikTok: https://www.tiktok.com/@topcyberpro LinkedIn: https://www.linkedin.com/company/to ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Welcome to the Razorwire podcast where we share information, best practices and up to date news in cyber security and infosec. Our mission is to help you become a better cyber security professional and support our vision of creating an agile community of cyber professionals who are stronger than ever before. This show is first and foremost about sharing knowledge and benefiting from collaboration. We bring you the advice and wisdom of both your host, James Rees, and his guests to build on th ...
…
continue reading
A BDSM Cyberpunk Audio Drama
…
continue reading
The Security Ledger: Cyber Security News & Analysis for The Internet of Things
…
continue reading
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet. howhackshappen.net
…
continue reading
Daily update on current cyber security threats
…
continue reading
Join CovertSwarm and special guests, as they discuss the latest Cyber Security news, trends, 0-day exploits and research. www.covertswarm.com
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
A place for everyday life, take a shot with me and vibe out. Adult Zone and content. Not for everyone... feel free to check out happs tv. for the live stream and much more. Instagram digiital vibes Support this podcast: https://podcasters.spotify.com/pod/show/richard-campbell/support
…
continue reading
Bringing cyber security professionals together to share their expertise. CyberTech Talks is a podcast hosted by CREST.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
A successful cyber-attack has taken your company off-line. The FBI and CISA have been contacted. What now? As you know, if this hasn’t already impacted your business (either directly or indirectly), it will. How can you make yourself a harder target, mitigating against cyber-attacks? What does all the terminology mean and why does it matter? What happens if an attack is successful? Join DTC, Inc. as we outline, in a straight-forward manner, many of the issues surrounding cyber security which ...
…
continue reading
Your Favorite Existentialist-Anarchist Internet BadassCommentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
Join Matthew Chapman, a Cybersecurity Expert, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
…
continue reading
The Liquidmatrix Security Digest Podcast - Information Security News and Commentary from Professionals.
…
continue reading
The Cyber Ways Podcast brings academic cyber security research into the "real world." We interview top academic researchers to find how their research can be put into practice by cyber security professionals. Our focus is on behavioral aspects of cyber security. Occasionally, we touch on related topics, such as information privacy and surveillance.Each episode discusses one published, peer-reviewed article to reveal the practical implications of the research. Your hosts, Tom Stafford and Cra ...
…
continue reading
1
🔴 Sep 10s Top Cyber News NOW! - Ep 705
2:05:26
2:05:26
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
2:05:26
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber if you need an incident response, ransomware protection, or business recovery assistance https://barricadecyber.com. Take control of your data and keep your private life private by signing up for DeleteMe. Go to ht…
…
continue reading
1
Between Three Nerds: How the MSS became a cyber juggernaut
39:51
39:51
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
39:51
In this edition of Between Three Nerds Tom Uren and The Grugq talk to Alex Joske, author of a book about how the Chinese Ministry of State Security (MSS) has shaped Western perceptions of China. They discuss the MSS’s position in the Chinese bureaucracy, its increasing role in cyber espionage, its use of contractors and the PRC’s vulnerability disc…
…
continue reading
1
When Ransomware Turns Deadly: Breaking Cyber Crime News and Essential Security Tips for Businesses
29:21
29:21
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
29:21
Cyber Flash Point on the following topics: how ransomware kills in real life, latest cyber crime news, top cyber crime news, when ransomware kills in real life, best ways to keep up to date on security news, best ways to protect business from cyber crime, breaking cyber crime news, breaking cyber crime news to know, cyber crime global news today, c…
…
continue reading
1
Lazarus spoofs CapitalOne, Mastercard buys RecordedFuture, WordPress imposes 2FA
8:10
8:10
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
8:10
Lazarus Group’s VMConnect campaign spoofs CapitalOne Mastercard buys security firm Recorded Future WordPress to require two-factor authentication for plugin developers Huge thanks to our sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and more. Wit…
…
continue reading
The Russian-speaking cyber gang, FIN7, has fooled red team hackers into doing their dirty work by masquerading as legitimate cybersecurity companies just looking for talent. Silent Push’s Zach Edwards talks about the scam.Bởi Recorded Future News
…
continue reading
1
CONTESTED GROUND: Developing true sovereign capability, with shadow defence minister Andrew Hastie MP
22:08
22:08
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
22:08
In this episode of the Contested Ground podcast, Andrew Hastie MP, shadow minister for defence and shadow minister for defence industry, joins hosts Phil Tarrant and Liam Garman to discuss how Australia must develop sovereign capability amid growing geopolitical uncertainty. The trio begin the podcast discussing how Australia needs to support Defen…
…
continue reading
The CYFIRMA research team presents an analysis of a new malware, the BLX Stealer, also known as XLABB Stealer, which is targeting sensitive data like credentials, browser information, cryptocurrency wallets, and Discord tokens. Actively promoted on Telegram and Discord, this malware can persist through system reboots and even uses Discord Webhook f…
…
continue reading
1
Fortinet hacked, a data breach in New Zealand, and new privacy laws in Australia
28:44
28:44
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
28:44
In this episode of Cyber Uncut, host David Hollingworth is joined by Daniel Croft to unpack the week in cyber security. From hacks abroad and closer to home, the changing tactics of the once prolific LockBit ransomware gang, to new Australian laws introduced to protect our privacy and stop the spread of misinformation, the pair cover a lot of groun…
…
continue reading
1
Measuring Cyber Risk Today: Guidelines Leaders Need to Know
1:05:23
1:05:23
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
1:05:23
What can we learn from some of the largest breaches in the news? That is what we will cover today in one of the most practical inside looks at the cutting edge of cyber security today. Understanding Cyber Risk Today: Top Security Guidelines Every CISO Needs to Know Ryan Leirvik who joins us in the studio. Ryan is the CEO of Neuvik & author of Under…
…
continue reading
1
ISC StormCast for Friday, September 13th, 2024
5:13
5:13
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
5:13
Compromise of old hostname .mobi whois server https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/ Microsoft Reconsidering Security Tool API https://blogs.windows.com/windowsexperience/2024/09/12/taking-steps-that-drive-resiliency-and-security-for-windows-customers/ Microsoft implents PQC in SymCrypt htt…
…
continue reading
1
Risky Biz News: Vo1d infects 1.3 million Android TV boxes
11:13
11:13
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
11:13
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast here. Show notes Risky Biz News: Vo1d infects 1.3 million Android TV boxes
…
continue reading
1
Network Security News Summary for Saturday September 14th, 2024
5:13
5:13
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
5:13
Whois Trust Issues; MSFT Security APIs; MSFT PQC Implementation; GitLbab Patch Compromise of old hostname .mobi whois server https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/ Microsoft Reconsidering Security Tool API https://blogs.windows.com/windowsexperience/2024/09/12/taking-steps-that-drive-resili…
…
continue reading
The UK designates data centers as Critical National Infrastructure. Cisco releases patches for multiple vulnerabilities in its IOS XR network operating system. BYOD is a growing security risk. A Pennsylvania healthcare network has agreed to a $65 million settlement stemming from a 2023 data breach.Google Cloud introduces air-gapped backup vaults. T…
…
continue reading
1
Importantance of Cyber Education and Security Awareness Training with May Brooks-Kempler
52:59
52:59
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
52:59
In this episode, TopCyberPro.com Founder and CEO Jim West sits down with May Brooks-Kempler to discuss Cyber Education and Training.
…
continue reading
1
CCT 175: Practice CISSP Questions - API Security, Gateways, and Risk Reduction Partnerships for the CISSP (Domain 8.5)
16:09
16:09
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
16:09
Send us a text Can API gateways really be the ultimate shield against cyber threats? Prepare to uncover the secrets of API security as we dissect CISSP Domain 8.5 in this episode of the CISSP Cyber Training Podcast. We'll walk you through practice questions that decode the most common API vulnerabilities and why denial of service isn't always the p…
…
continue reading
1
$20 WHOIS vulnerability, India's Cyber Commandos, Word hits drone makers
7:25
7:25
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
7:25
The $20 WHOIS vulnerability India training thousands of “cyber commandos” A Word of warnings for Taiwanese drone makers Huge thanks to our sponsor, Vanta When it comes to ensuring your company has top-notch security practices, things can get complicated, fast. Vanta automates compliance for SOC 2, ISO 27001, and more, saving you time and money. Wit…
…
continue reading
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story on the "Hello pervert" sextortion scam, where scammers now use threats of Pegasus spyware and photos of victims' homes to intensify their demands. We have quite a bit of follow-up today. Scott from Australia shared how self-service checkouts now display sc…
…
continue reading
1
CYFIRMA Research- Tracking Ransomware – August 2024
5:07
5:07
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
5:07
Stay informed with CYFIRMA's Tracking Ransomware-August 2024 Report, highlighting critical shifts in ransomware activities. Emerging groups like RansomHub and Lynx surged, with RansomHub seeing a 57.78% rise in victims and Lynx skyrocketing by 900%. In contrast, established actors like LockBit3 faced a 23.68% decline. The Manufacturing, Finance, an…
…
continue reading
1
CONTESTED GROUND: Irregular operations in Afghanistan and grey zone warfare in the APAC region, with MAJGEN (Ret’d) Gus McLachlan
28:52
28:52
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
28:52
In this episode of the Contested Ground podcast, Major General (Ret’d) Gus McLachlan, former Commander Forces Command, joins hosts Major General (Ret’d) Dr Marcus Thompson and Liam Garman to unpack modern asymmetrical warfare: from the Taliban in Afghanistan to Chinese Coast Guard vessels in the Philippine Sea, and even how social media is spurring…
…
continue reading
1
Srsly Risky Biz: The three I's in Spyware
17:54
17:54
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
17:54
In this podcast Tom Uren and Patrick Gray talk about the structure of the spyware ecosystem. It’s concentrated, with lots of vendors in India, Israel and Italy. And its a small pool of talent, with many companies being founded by just a few individuals. They also talk about the US government’s actions against Russia’s disinformation ecosystem. The …
…
continue reading
Patch Tuesday rundown. Microsoft integrates post-quantum cryptography (PQC) algorithms into its SymCrypt cryptographic library.The FTC finalizes rules to combat fake reviews and testimonials. A payment card thief pleads guilty. On our latest CertByte segment, N2K’s Chris Hare and George Monsalvatge share questions and study tips from the Microsoft …
…
continue reading
Content generated by AI (artificial intelligence) is all around us: on the internet, in advertising, and worst of all, in your DMs. Come on down for a wild ride through the world of AI-generated images, and how scammers are taking advantage of the technology to run their schemes. Resources: Families Scammed by AI Images That Promised Willy Wonka-St…
…
continue reading
1
Slim CD data breach, International sextortion bust, TfL mixed messages
8:13
8:13
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
8:13
Slim CD notifies 1.7M customers of data breach Delaware men charged in international sextortion scheme London transit agency drops claim it has ‘no evidence’ of customer data theft Huge thanks to our sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, …
…
continue reading
1
A CSO's 9/11 Story: CSO Perspectives Bonus.
30:27
30:27
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
30:27
For the 20th anniversary of 9/11 in 2021, Rick Howard, the CyberWire’s CSO, Chief Analyst, and Senior Fellow, recounts his experience from inside the Pentagon running the communications systems for the Army Operations Center. Read Rick's related essay and check out his original notes of 9/11/01 written in the weeks following the attacks. Learn more…
…
continue reading
1
Solution Spotlight: Mary Haigh, Global CISO of BAE Systems, on building a cybersecurity team.
29:11
29:11
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
29:11
On this Solution Spotlight, guest Dr. Mary Haigh, Global CISO of BAE Systems, speaks with N2K President Simone Petrella about moving beyond the technical to build a cybersecurity team. Learn more about your ad choices. Visit megaphone.fm/adchoicesBởi N2K Networks
…
continue reading
1
Cyber Resiliency on a Global Scale: More INTERPOL insights - Ep 114
37:47
37:47
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
37:47
In this episode of "Reimagining Cyber," host Rob Aragao continues his insightful conversation with Craig Jones, former Director of Interpol’s Global Cybercrime Directorate. They delve into the countries most targeted by cybercrime and the regions where these crimes often originate. Craig highlights the challenges of combating cyber threats in areas…
…
continue reading
1
ISC StormCast for Wednesday, September 11th, 2024
6:00
6:00
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
6:00
Microsoft Patches https://isc.sans.edu/diary/Microsoft%20September%202024%20Patch%20Tuesday/31254 Adobe Patches https://helpx.adobe.com/security/security-bulletin.html Ivanti Patches https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022?language=en_USBởi Dr. Johannes B. Ullrich
…
continue reading
1
Risky Biz News: UK NCA "on its knees" and bleeding staff
8:07
8:07
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
8:07
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast here. Show notes Risky Biz News: UK NCA "on its knees," bleeding staff, seriously underpaid
…
continue reading
1
Network Security News Summary for Wednesday September 11th, 2024
6:01
6:01
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
6:01
Microsoft, Adobe and Ivanti Patches Microsoft Patches https://isc.sans.edu/diary/Microsoft%20September%202024%20Patch%20Tuesday/31254 Adobe Patches https://helpx.adobe.com/security/security-bulletin.html Ivanti Patches https://forums.ivanti.com/s/article/Security-Advisory-EPM-September-2024-for-EPM-2024-and-EPM-2022?language=en_US keywords: ivanti;…
…
continue reading
1
Stealth, command, exfiltrate: The three-headed cyber dragon of Crimson Palace.
30:46
30:46
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
30:46
Crimson Palace targets Asian organizations on behalf of the PRC. Europe’s AI Convention has lofty goals and legal loopholes. The NoName ransomware gang may be working as a RansomHub affiliate. Wisconsin Physicians Service Insurance Corporation, SLIM CD, and Acadian Ambulance Service each suffer significant data breaches. CISA adds three vulnerabili…
…
continue reading
In this episode, host Paul Roberts chats with Beau Woods, Founder & CEO of Stratigos Security, about the history of the software bill of materials (SBOM) – from its beginnings, to its modern-day use, to efforts underway to adapt it for the future. SBOMs have exploded in popularity within the past two years, and are oftentimes considered synonymous …
…
continue reading
In the Information Age, we're more connected than ever, with vast amounts of data at our fingertips. Yet, this same technology that empowers us also exposes us to crazy levels of misinformation and disinformation, spreading faster and further than ever before. Navigating this digital landscape means becoming more vigilant, and informed to separate …
…
continue reading
The CYFIRMA research team explores a new malware, dubbed "Ailurophile Stealer" that targets sensitive browser data, such as passwords, cookies, and browsing history. Distributed via GitHub, this threat uses advanced tactics like UPX packing and command-and-control communication via Telegram to evade detection. The attackers, likely operating from V…
…
continue reading
1
164. The Hunt for FIN7: Hot on the trail of a notorious cyber gang
37:13
37:13
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
37:13
Investigators have been chasing the Russian-speaking cyber gang for years — and they’ve stayed just one step ahead. Threat researcher Zach Edwards lays out why bringing gangs like this to justice has always been so hard.Bởi Recorded Future News
…
continue reading
1
Payment processing breach, dark web admins charged, Predator spyware resurges
7:41
7:41
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
7:41
1.7 million impacted in payment processing breach Dark web administrators charged in U.S. Resurgence of Predator Spyware sparks privacy concerns Huge thanks to our sponsor, Vanta When it comes to ensuring your company has top-notch security practices, things can get complicated, fast. Vanta automates compliance for SOC 2, ISO 27001, and more, savin…
…
continue reading
Enjoy this special encore episode. The process of turning raw information into intelligence products that leaders use to make decisions with.Bởi N2K Networks
…
continue reading
1
DtSR Episode 618 - Jeff Collins Microservices Killed the Vulnerability Scan
40:12
40:12
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
40:12
Send the hosts a message - try it now! TL;DR: This week's episode sees the return of Mr Jeff Collins (of WanAware fame) as we talk over the long-prophesied death of vulnerability scanning. Maybe. What does the cloud have to do with the demise of vulnerability scanning? Listen and find out... I think you may find this relevant. This time, YouTube Vi…
…
continue reading