Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Daily update on current cyber security threats
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address theaustralianciso@gmail.com to make comments, pose questions or even ask to be o ...
…
continue reading
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Welcome to the Cyber Security & Cloud Podcast #CSCP where we will explore the dark secret of cloud and cyber. The podcast focuses on people and their stories and explores the human element that brings so many people together Some episode will be for the well-seasoned cybersecurity veteran but most are about stories of infosec people and how they reach where they are now. The focus and various stream of the podcast is Cybersecurity, Cloud Security, Application Security Social Engineering, and ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
Welcome to the Razorwire podcast where we share information, best practices and up to date news in cyber security and infosec. Our mission is to help you become a better cyber security professional and support our vision of creating an agile community of cyber professionals who are stronger than ever before. This show is first and foremost about sharing knowledge and benefiting from collaboration. We bring you the advice and wisdom of both your host, James Rees, and his guests to build on th ...
…
continue reading
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
…
continue reading
北欧に居住していた古代民族にとって、サウナストーンと呼ばれる石の熱と、石に水をかけて立ち上る蒸気は、人間の生命力として考えられていました。サウナは今日でも、健康のためだけではなく、人々の意見交換の場としても使用されています WithSecureの日本語ポッドキャスト『Cyber SecurityサウナJapan』は、社内外のセキュリティエキスパートをホスト/ゲストとして、様々なことが起こっているセキュリティ業界でのホットなトレンドやテクノロジーに関する情報、そしてインサイトをお届けしていきます。
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Bop
…
continue reading
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
…
continue reading
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
A weekly podcast with short (15min) interviews around Cyber Security and Cyber Hygiene in the world of IoT
…
continue reading
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
…
continue reading
Iam Talking about the Information Security & Hacking in upcoming episodes. Im a Cyber Security Trainer https://instagram.com/chaudharypawansohlot
…
continue reading
1
CRECo.ai Roundtable: Technology, Marketing, Brokerage, Government Policy, Capital, Construction & Cyber Security in Real Estate with Andreas Senie
Andreas Senie
Your all in one comprehensive view of what is happening across the real estate industry -- straight from some of the industry's earliest technology adopters and foremost experts in Technology, Marketing, Government Policy, Brokerage, Capital, Construction & Cyber Security in Real Estate. The show is broken down into three parts: Part I: Introductions and what's new for each panelist and the business sector Part II: Sector Focus on the past month's most prominent news and paradigm shifts Part ...
…
continue reading
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 31,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
…
continue reading
The cyber security podcast from SE LABS ®. Understand cybersecurity and other security issues. Practical and insightful, our experts have experience in attacking and defending in the physical and digital worlds. Peek behind the curtain with DE:CODED. More at http://decodedcyber.com!
…
continue reading
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
…
continue reading
Selva Kumar is SAP Career Trainer specializing in SAP Career Coaching, identifying skills for getting a Job. You can reach me @ 302 494 9476 or Email: info@expressgrc.com Download Free SAP GRC Guide. http://expressgrc.com/sap-grc-10-1-step-step-guide/
…
continue reading
This is a podcast about my journey into information security it will be full of things that I've learned over the years and also things that I have researched and find interesting and want to present to you the audience.
…
continue reading
Cyber Security Course Arabic كيف ابدأ في مجال أمن المعلومات الأمن الإلكتروني كيفية شراء البيتكوين في المملكة العربية السعودية ببطاقة الائتمان أسرع طريقة في ثواني تذكر الاشتراك عبر هذا الرابط ، كي تحصل على خصم 10٪ من جميع رسوم شراء البيتكوين على بيانس https://www.binance.com/en/register?ref=F2IKGVD8 جزاكم الله خيرا
…
continue reading
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
…
continue reading
Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession.
…
continue reading
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
…
continue reading
Just two people trying to do IT and Security the right way.
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
…
continue reading
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
…
continue reading
Welcome to the new realities of cyber security podcast series, where we'll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to GDPR, this series covers topical issues that matter.
…
continue reading
We believe in empowering security leaders to maximize their strengths, equip them with the skills needed for the top security job and inspire them to become the leaders that their organizations and teams require and deserve. In this podcast Jeff Snyder, Executive coach and Cybersecurity Recruiter since 1997, and Yaron Levi, CISO and Security Advisor will share their experiences and the lessons learned in order to empower others to become the best version of themselves. This is our way to giv ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 6:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Arisen Technologies is the Best IT Company, which provides all IT services like Cyber Security, Web Designing, Development, etc. It’s founded in 2006.
…
continue reading
Welcome to the Do we need better Cyber Security policies In Asian Countries - By Mario96 podcast, where amazing things happen.
…
continue reading
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.
…
continue reading
1
DarkWeb.Today – Hackers & Cyber Security: Piercing the Veil, Empowering the Secure.
Alberto Daniel Hill
“DarkWeb.Today – Hackers & Cyber Security” is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that are central to our ...
…
continue reading
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
…
continue reading
DNS Debugging with nslookup https://isc.sans.edu/diary/nslookups+Debug+Options/30894/ Microsoft Plans DNS Lockdown https://techcommunity.microsoft.com/t5/networking-blog/announcing-zero-trust-dns-private-preview/ba-p/4110366 Microsoft Graph API Abuse https://symantec-enterprise-blogs.security.com/blogs/threat-intelligence/graph-api-threats SANSFIRE…
…
continue reading
1
Week in Review: Dropbox Sign breach, Cybersecurity consultant arrested, Ukraine Microsoft hack
26:24
26:24
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
26:24
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Phil Beyer, former CISO, Etsy Thanks to today’s episode sponsor, Dropzone.ai Dropzone.ai’s AI Autonomous Analyst is transforming cybersecurity as we know it. By replicating the techniques of elite analysts and autonomously investigating …
…
continue reading
https://isc.sans.edu/diary/Scans%20Probing%20for%20LB-Link%20and%20Vinga%20WR-AC1200%20routers%20CVE-2023-24796/30890 Scans Probing for LB-Link and Vinga WR-AC1200 routers CVE-2023-24796 Buffer Overflow Vulnerabilities in ArubaOS https://www.arubanetworks.com/support-services/security-bulletins/ The Cuttlefish Malware https://blog.lumen.com/eight-a…
…
continue reading
1
1031 EXCHANGES, BUSINESS CARDS, AND HOW TO REALLY GROW YOUR BUSINESS IN Q2 2024 FOR CRE PROFESSIONALS
1:00:29
1:00:29
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
1:00:29
Join Andreas, Rebekah, Chris, and Anna Maria as discuss the importance of getting out behind your screens and shaking hands to grow your business, the imminent threat of removing 1031 exchanges and their value to the community, and how the next generation is showing up ready to design/build/engineer into the future. Don't forget to claim your CRETe…
…
continue reading
1
teissTalk: Is privacy the source of your failing security?
44:38
44:38
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
44:38
The privacy challenges of using the network as your fundemental point of defence Whether InfoSec leaders can ever get full network visibility Setting privacy controls to reduce vulnerabilities and blindspots within your network This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Tom Ellis-Aziz, Associate Director, Cont…
…
continue reading
1
09. Why a security culture is so damn important and how to create one (with Julie Dolleris - Digital Learning Specialist at CyberPilot)
19:04
19:04
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
19:04
Why is a security culture important? And how do you create one? Julie has gone through a lot of research to answer those questions. And as she says at the beginning of the episode: "It's a cool topic". In this episode, Julie will tell us all: Why aware employees are not enough to drive secure cyber behavior in your company Why you need to convince …
…
continue reading
1
Hacking Cybersecurity Training: Escape Rooms & Entrepreneurial Thinking with Amy Stokes-Waters
36:41
36:41
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
36:41
On this week's edition of the Razorwire podcast, Jim sits down with Amy Stokes-Waters, CEO of The Cyber Escape Room Co. Amy brings her unique entrepreneurial perspective from a non-traditional background, transitioning into cybersecurity. The conversation provides valuable insights for security leaders as Amy candidly discusses her innovative appro…
…
continue reading
1
Episode 69: Episode 69 - Artificial Intelligence Revisited
11:20
11:20
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
11:20
Richard revisits the current capabilities of AI voice capabilities. He runs the same dialogue against 3 AI voice tools to determine whether they have improved since his last AI voice experiment 11 months ago.
…
continue reading
1
EPISODE 27: Ignore all previous instructions: Threat modelling AI Systems
37:09
37:09
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
37:09
Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! Welcome to the grand finale of season two of ‘Compromising Positions’, where we delve into the fascin…
…
continue reading
1
Governor Pat McCory: Cyber Challenges in Government
1:03:53
1:03:53
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
1:03:53
Join us for an illuminating journey into the world of cybersecurity and governance as we sit down with former Governor Pat McCrory, the 74th Governor of North Carolina. In this captivating episode, Governor McCrory offers his invaluable leadership insights on the pressing issue of cybersecurity, particularly within the context of state and local go…
…
continue reading
1
CSCP S4EP14 - Izar Tarandach - The Future of Threat Modeling and Product Security, with Izar Tarandach
39:00
39:00
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
39:00
This episode features guest Izar Tarandach, a seasoned security architect with extensive experience in application security, cloud security, and the development of comprehensive security frameworks. Our discussion navigates through the latest trends in application security, the pivotal role of DevSecOps, and the strategic integration of security pr…
…
continue reading
1
Episode 42 Defenders of the Cyberverse - Insights from Alexander Rogan and Christian Rogan of Platinum High Integrity Technologist.
1:01:28
1:01:28
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
1:01:28
Welcome to Episode 42 of the Cyber Security Happy Hour Podcast, with your host, Christie. In this gripping episode, I interview Alexander Rogan and Christian Rogan, co-founders of Platinum High Integrity Technologies. They discuss their disruptive Cyber Security solution, a technology that works at ring zero, effectively blocking unauthorised binar…
…
continue reading
1
The Role of Cyber Security in the Energy Sector : Javier García Quintela, CISO at RepSol
46:33
46:33
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
46:33
In this episode of the Resilience Podcast, Javier Garcia-Quintela, the CISO of Spanish energy giant, Repsol, discusses his personal journey into cybersecurity and the importance of building relationships and collaboration within the industry. He also addresses the energy sector's challenges, including the lack of cybersecurity skills and the growin…
…
continue reading
1
Episode 396 - Strategic Overview of AI and Homeland Security: Current States and Future Directions
What are the strategic directions for AI in homeland security. Attending Milipol APAC and TechX Summit 2024, we speak with Physicist and former Yale University Professor, Dimitri Kusnezov, Under Secretary for S&T, US Department of Homeland Security. Nominated by President Biden in 2021, Dimitri Kusnezov was the deputy under secretary for artificial…
…
continue reading
1
Goldoon exploits D-Link, CISA GitLab warning, Dropbox Sign breach
8:53
8:53
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
8:53
Goldoon botnet exploits D-Link routers CISA adds Gitlab flaw to its KEV catalog Dropbox discloses breach of digital signature service Thanks to our episode sponsor, Dropzone AI Dropzone.ai's AI Autonomous Analyst is transforming cybersecurity as we know it. By replicating the techniques of elite analysts and autonomously investigating every alert, …
…
continue reading
1
Chinese disinformation, NCSC AMS, new State Secrets law
6:52
6:52
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
6:52
Chinese disinformation proving ineffectual NCSC release Advanced Mobile Solutions risk model China implements new State Secrets Law Thanks to our episode sponsor, Dropzone AI Cybersecurity leaders, are you being asked to leverage the power of Gen AI in your SOC? Dropzone.ai's AI Autonomous Analyst empowers your team to thoroughly investigate every …
…
continue reading
1
ISC StormCast for Thursday, May 2nd, 2024
6:51
6:51
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
6:51
Linux Trojan - Xorddos with Filename eyshcjdmzg https://isc.sans.edu/diary/Linux%20Trojan%20-%20Xorddos%20with%20Filename%20eyshcjdmzg/30880 AWS S3 Denial of Wallet Amplification Attack https://medium.com/@maciej.pocwierz/how-an-empty-s3-bucket-can-make-your-aws-bill-explode-934a383cb8b1 https://blog.limbus-medtec.com/the-aws-s3-denial-of-wallet-am…
…
continue reading
1
ISC StormCast for Wednesday, May 1st, 2024
6:38
6:38
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
6:38
Another Day, Another NAS: Attacks against Zyxel NAS326 Devices CVE-2023-4473, CVE-2023-4474 https://isc.sans.edu/diary/Another%20Day%2C%20Another%20NAS%3A%20Attacks%20against%20Zyxel%20NAS326%20devices%20CVE-2023-4473%2C%20CVE-2023-4474/30884 R-Bitrary Code Execution: Vulnearbility in R's Deserialization https://hiddenlayer.com/research/r-bitrary-c…
…
continue reading
1
UnitedHealth Group CEO faces congress, U.S. wireless carriers face majors fine, Marriott backtracks protection claims
9:45
9:45
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
9:45
UnitedHealth Group CEO faces congress & cause of hack revealed Major U.S. wireless carriers face $200M FCC fine Marriott backtracks claims of encryption protection Thanks to our episode sponsor, Dropzone AI Dropzone.ai is proud to announce our selection as a Top 10 Finalist for the prestigious RSA Innovation Sandbox. Our AI Autonomous Analyst is re…
…
continue reading
1
USPS phishing, UK IoT law, industrial USB attacks
7:06
7:06
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
7:06
USPS phishing sites are popular UK bans bad IoT credentials USB malware attacks targeting industrial sites Thanks to our episode sponsor, Dropzone AI Attention cybersecurity professionals! Are you investigating 100% of the alerts from your IT and security systems? Dropzone.ai's AI Analyst autonomously investigates every alert without playbooks or c…
…
continue reading
1
ISC StormCast for Tuesday, April 30th, 2024
6:55
6:55
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
6:55
DLink NAS Exploit Variation https://www.qnap.com/en/security-advisory/qsa-24-09 Muddling Meerkat DNS Abuse https://blogs.infoblox.com/threat-intelligence/a-cunning-operator-muddling-meerkat-and-chinas-great-firewall/ Android TV Data Leakage https://www.youtube.com/watch?v=QiyBXXO8QpA https://www.404media.co/android-tvs-can-expose-user-email-inboxes…
…
continue reading
1
Kaiser Permanente breach, DSH Safety Board, Okta stuffing attack
7:45
7:45
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
7:45
Kaiser Permanente website tracking tools may have compromised customer data DHS announces AI safety board Okta warns of “unprecedented” credential stuffing attacks on customers Thanks to our episode sponsor, Dropzone AI Introducing Dropzone.ai, the industry's first AI Autonomous SOC Analyst. Their patented LLM replicates the techniques of elite ana…
…
continue reading
1
ISC StormCast for Monday, April 29th, 2024
6:36
6:36
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
6:36
Okta warns of increase in credential stuffing https://sec.okta.com/blockanonymizers Fake payment cards used by Police in Japan https://twitter.com/vxunderground/status/1783522097425211887 Phishing Campaigns Targeting USPS https://www.akamai.com/blog/security-research/phishing-usps-malicious-domains-traffic-equal-to-legitimate-traffic Chrome 124 Bre…
…
continue reading
1
Week in Review: GitHub comments abused, networkless” attack techniques, Police bodycam AI reports
23:20
23:20
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
23:20
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Christina Shannon, CIO, KIK Consumer Products Thanks to our show sponsor, Veracode Get ready to experience the future of application security at RSAC 2024 with Veracode. Join us as we unveil cutting-edge innovations and insights to tackl…
…
continue reading
1
Google postpones cookies, Brocade vulnerability warning, ICICI card gaffe
8:27
8:27
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
8:27
Google postpones third-party cookie deprecation Brocade SAN appliances and switches exposed to hacking ICICI Bank exposes credit cards to wrong users Thanks to this week's episode sponsor, Veracode Don't miss out on this opportunity to elevate your cybersecurity strategy. Build and scale secure software from code to cloud with speed and trust. Visi…
…
continue reading
1
ISC StormCast for Friday, April 26th, 2024
20:28
20:28
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
20:28
Does it matter if iptables isn't running on my honeypot? https://isc.sans.edu/forums/diary/Does%20it%20matter%20if%20iptables%20isn't%20running%20on%20my%20honeypot%3F/30862/ Unplugging PlugX: Singholing the PlugX USB worm botnet https://blog.sekoia.io/unplugging-plugx-sinkholing-the-plugx-usb-worm-botnet/ pfSense Updates https://docs.netgate.com/a…
…
continue reading
1
Chinese keyboard flaws, hacked news story, TikTok on the clock
6:41
6:41
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
6:41
Chinese keyboard app flaws exposed Threat actors plant fake assassination story ByteDance on the clock to divest TikTok Thanks to this week's episode sponsor, Veracode Research reveals AI-generated code mirrors human-written code's security flaws. Even seasoned programmers struggle to spot errors, with incorrect AI-generated answers abound. Veracod…
…
continue reading
1
teissTalk: Selling infosec as a business enabler
44:54
44:54
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
44:54
Proving that your infosec strategy delivers a competitive advantage Managing the risks and costs of a business-enabling infosec team Balancing business objectives with infosec needs to deliver security and growth This episode is hosted by Thom Langford https://www.linkedin.com/in/thomlangford/ Alan Jenkins, Principal Consultant, Cyber Security Navi…
…
continue reading
1
ISC StormCast for Thursday, April 25th, 2024
6:09
6:09
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
6:09
API Rug Pull - The NIST NVD Database and API https://isc.sans.edu/diary/API%20Rug%20Pull%20-%20The%20NIST%20NVD%20Database%20and%20API%20%28Part%204%20of%203%29/30868 Cisco Patches Vulnerabilities and Discovers Arcane Backdoor https://blog.talosintelligence.com/arcanedoor-new-espionage-focused-campaign-found-targeting-perimeter-network-devices/ Vul…
…
continue reading
1
Iranian hackers charged, Siemens fixing Palo bug, Russia hacks water plant
7:56
7:56
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
7:56
Iranian nationals charged with hacking U.S. companies and agencies Siemens working to fix device affected by Palo Alto firewall bug Russian hackers claim cyberattack on Indiana water plant Thanks to this week's episode sponsor, Veracode Are you truly listening to both your security and development teams? Make informed decisions with Veracode. Our d…
…
continue reading
1
ISC StormCast for Wednesday, April 24th, 2024
6:22
6:22
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
6:22
Struts2 devmode Still a Problem Ten Years Later https://isc.sans.edu/forums/diary/Struts%20%22devmode%22%3A%20Still%20a%20problem%20ten%20years%20later%3F/30866/ Analyzing Forest Blizard's Custom Post-Compromise Tool for exploiting CVE-2022-38028 https://www.microsoft.com/en-us/security/blog/2024/04/22/analyzing-forest-blizzards-custom-post-comprom…
…
continue reading
1
TikTok ban update, Sandworm hits Ukraine, North Korean streaming animators
7:03
7:03
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
7:03
TikTok ban passes the US House Sandworm targets critical Ukrainian orgs North Koreans animating streaming shows Thanks to this week's episode sponsor, Veracode AI coding companions assist in generating high-quality code snippets, while Veracode swoops in to conduct thorough security assessments, identifying and fixing vulnerabilities quickly. With …
…
continue reading
1
ISC StormCast for Tuesday, April 23rd, 2024
6:05
6:05
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
6:05
Number of Industrial Devices Accessible From Internet Up 30 Thousand over three years https://isc.sans.edu/diary/It%20appears%20that%20the%20number%20of%20industrial%20devices%20accessible%20from%20the%20internet%20has%20risen%20by%2030%20thousand%20over%20the%20past%20three%20years/30860 Evil XDR: Turning an XDR into an Offensive Tool https://www.…
…
continue reading
1
RedLine GitHub connection, MITRE Ivanti breach, E-ZPass spoof sites
7:29
7:29
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
7:29
RedLine stealer GitHub connection MITRE’s breached was through Ivanti zero-day vulnerabilities Researchers find dozens of fake E-ZPass toll websites following FBI warning Thanks to this week's episode sponsor, Veracode Imagine your intelligent coding companion, backed by the robust security expertise of Veracode. Together, we form the ultimate duo,…
…
continue reading
1
ISC StormCast for Monday, April 22nd, 2024
5:36
5:36
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
5:36
The CVE's They are A-Changing https://isc.sans.edu/diary/The%20CVE%27s%20They%20are%20A-Changing!/30850 CrushFTP 0-Day Vulnerability https://www.crushftp.com/crush11wiki/Wiki.jsp?page=Update https://www.reddit.com/r/crowdstrike/comments/1c88788/situational_awareness_20240419_crushftp_virtual/ GitHub Comment Bug Used to Distribute Malware https://ww…
…
continue reading
1
Episode 68: Episode 67 - Credential Stuffing - Part 3
21:54
21:54
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
21:54
Richard and his guest Olly Stimpson (CyberArk) complete their discussion on credential stuffing.
…
continue reading
1
Week in Review: Cisco MFA breach, Bad bots surge, Microsoft mail breach fallout
26:56
26:56
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
26:56
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Dan Walsh, CISO, Paxos Thanks to our show sponsor, Conveyor Happy Friday! Are you tired of hearing about Conveyor’s AI security review automation software? We’ll stop talking about it if you book a call. Ready to give the market leading …
…
continue reading
1
LabHost police bust, Michigan healthcare attack, Windows Fibers vulnerability
7:09
7:09
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
7:09
Police bust reveals sophisticated phishing-as-a-service platform Overlooked Windows Fibers offer handy route for malicious payload deployment Michigan healthcare organization suffers data breach Thanks to today's episode sponsor, Conveyor Happy Friday! Are you tired of hearing about Conveyor’s AI security review automation software? We’ll stop talk…
…
continue reading
1
ISC StormCast for Friday, April 19th, 2024
5:06
5:06
Nghe Sau
Nghe Sau
Danh sách
Thích
Đã thích
5:06
Delinea Secret Server Authn Authz Bypass https://straightblast.medium.com/all-your-secrets-are-belong-to-us-a-delinea-secret-server-authn-authz-bypass-adc26c800ad3 Ivanti Avalanche Poc/Details https://www.tenable.com/security/research/tra-2024-10 Advanced Phishing Campaign https://www.lookout.com/threat-intelligence/article/cryptochameleon-fcc-phis…
…
continue reading