Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Daily update on current cyber security threats
…
continue reading
Tune in to the StationX Cyber Security Diaries for your dose of cyber security knowledge and career guidance. Whether you’re a seasoned professional or just starting out, our series provides valuable insights and inspiration to help you grow and excel in cyber security.
…
continue reading
北欧に居住していた古代民族にとって、サウナストーンと呼ばれる石の熱と、石に水をかけて立ち上る蒸気は、人間の生命力として考えられていました。サウナは今日でも、健康のためだけではなく、人々の意見交換の場としても使用されています WithSecureの日本語ポッドキャスト『Cyber SecurityサウナJapan』は、社内外のセキュリティエキスパートをホスト/ゲストとして、様々なことが起こっているセキュリティ業界でのホットなトレンドやテクノロジーに関する情報、そしてインサイトをお届けしていきます。
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
…
continue reading
Control System Cyber Security Association International, or (CS)²AI, is the premier global non-profit workforce development organization supporting professionals of all levels charged with securing control systems. With over 34,000 members worldwide, we provide the platform for members to help members, foster meaningful peer-to-peer exchange, continue professional education, and directly support OT and ICS cyber security professional development in every way. Our founder, Derek Harp, intervi ...
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address talkingcybersec@gmail.com to make comments, pose questions or even ask to be on ...
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
Welcome to the Razorwire podcast where we share information, best practices and up to date news in cyber security and infosec. Our mission is to help you become a better cyber security professional and support our vision of creating an agile community of cyber professionals who are stronger than ever before. This show is first and foremost about sharing knowledge and benefiting from collaboration. We bring you the advice and wisdom of both your host, James Rees, and his guests to build on th ...
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
1
DarkWeb.Today – Hackers and Cyber Security, Piercing the Veil, Empowering the Secure.
Alberto Daniel Hill
“DarkWeb.Today – Hackers & Cyber Security” is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that are central to our ...
…
continue reading
What is Cybersecurity? What are the available roles? How do you get started? What industry certifications should I pursue? Dr. Jeff Colburn has 30 years of experience in the Information Technology industry. For the past 11 years, he has been teaching his students how to start careers in this field within 6 months without a college degree and without any experience.
…
continue reading
Bop
…
continue reading
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
…
continue reading
A weekly podcast with short (15min) interviews around Cyber Security and Cyber Hygiene in the world of IoT
…
continue reading
The cyber security podcast from SE LABS Ⓡ - Understand cyber security and other security issues. Practical and insightful, our experts have experience in attacking and defending in the physical and digital worlds. Peek behind the curtain with Cyber Security DE:CODED.
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
…
continue reading
Iam Talking about the Information Security & Hacking in upcoming episodes. Im a Cyber Security Trainer https://instagram.com/chaudharypawansohlot
…
continue reading
1
CRECo.ai Roundtable: Technology, Marketing, Brokerage, Government Policy, Capital, Construction & Cyber Security in Real Estate with Andreas Senie
Andreas Senie
Your all in one comprehensive view of what is happening across the real estate industry -- straight from some of the industry's earliest technology adopters and foremost experts in Technology, Marketing, Government Policy, Brokerage, Capital, Construction & Cyber Security in Real Estate. The show is broken down into three parts: Part I: Introductions and what's new for each panelist and the business sector Part II: Sector Focus on the past month's most prominent news and paradigm shifts Part ...
…
continue reading
Welcome to Resilience: Voices in Cyber Security. The cyber threat landscape constantly evolves, and attacker's capabilities are growing in variety, volume, and sophistication. This podcast will provide the latest strategies and trends to ensure cyber resilience. I’m Yonatan Lipschitz, Director of Client Leadership at a leading cyber security consulting and incident response company. In each episode, a thought leader in the cyber sector will join me, sharing their insights, thoughts, and expe ...
…
continue reading
This is a podcast about my journey into information security it will be full of things that I've learned over the years and also things that I have researched and find interesting and want to present to you the audience.
…
continue reading
Selva Kumar is SAP Career Trainer specializing in SAP Career Coaching, identifying skills for getting a Job. You can reach me @ 302 494 9476 or Email: info@expressgrc.com Download Free SAP GRC Guide. http://expressgrc.com/sap-grc-10-1-step-step-guide/
…
continue reading
Cyber Security Course Arabic كيف ابدأ في مجال أمن المعلومات الأمن الإلكتروني كيفية شراء البيتكوين في المملكة العربية السعودية ببطاقة الائتمان أسرع طريقة في ثواني تذكر الاشتراك عبر هذا الرابط ، كي تحصل على خصم 10٪ من جميع رسوم شراء البيتكوين على بيانس https://www.binance.com/en/register?ref=F2IKGVD8 جزاكم الله خيرا
…
continue reading
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
…
continue reading
Cyber security focused discussions geared towards students, early professionals and individuals moving into the cyber security profession. I use my ~30 years' experience in industry and provide examples, stories, suggestions and answer questions. This podcast is designed to help listeners learn, grown and advance in the cyber security profession.
…
continue reading
Cyber Security Sauna brings you expert guests with sizzling insight into the latest information security trends and topics. WithSecure's Janne Kauhanen hosts the show to make sure you know all you need to about the hotter-than-ever infosec game. Join us as we sweat out the hot topics in security.
…
continue reading
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
…
continue reading
Interested in staying safe online or a cyber security professional? Leading cyber security consultant and advisor, Beverley Roche talks to global experts, academics and researchers to provide insights on the issues impacting the cyber security profession and our connected life. If you're interested in updates on current professional practice or protecting your online experience against criminal or unauthorised access, this podcast will help you with tips to protect your online identity and data.
…
continue reading
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
…
continue reading
Just two people trying to do IT and Security the right way.
…
continue reading
Today’s built environment we face ever increasing risk from cyber security. In this podcast we explore some of the challenges and or imports solutions Cover art photo provided by bharath g s on Unsplash: https://unsplash.com/@xen0m0rph
…
continue reading
1
Reduce Cyber Risk Podcast - Cyber Security Made Simple
Shon Gerber, vCISO, CISSP, Cyber Security Consultant, Author and Entrepreneur
Shon Gerber from the Reduce Cyber Risk podcast provides valuable insights, guidance, and training to you each week that only a senior cyber security expert and vCISO can perform. Shon has over 23+ years of experience in cyber security from large corporations, government, and as a college professor. Shon provides you the information, knowledge, and training needed to help protect your company from cyber security threats. Shon weekly provides cyber security training topics covering: Insider Th ...
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Welcome to the new realities of cyber security podcast series, where we'll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to GDPR, this series covers topical issues that matter.
…
continue reading
Arisen Technologies is the Best IT Company, which provides all IT services like Cyber Security, Web Designing, Development, etc. It’s founded in 2006.
…
continue reading
We believe in empowering security leaders to maximize their strengths, equip them with the skills needed for the top security job and inspire them to become the leaders that their organizations and teams require and deserve. In this podcast Jeff Snyder, Executive coach and Cybersecurity Recruiter since 1997, and Yaron Levi, CISO and Security Advisor will share their experiences and the lessons learned in order to empower others to become the best version of themselves. This is our way to giv ...
…
continue reading
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
…
continue reading
Welcome to the Do we need better Cyber Security policies In Asian Countries - By Mario96 podcast, where amazing things happen.
…
continue reading
The cyber security podcast from PwC UK covers the latest developments in cyber risk, resilience and threat intelligence. In each episode we’re joined by special guests to give you practical insight on how to improve your cyber security and create a more resilient business.
…
continue reading
Cyber Security happens all over the world. This podcast is focused on Cyber Security from the Asian perspective. Listen to interviews, discussions, insights and get to the issues that matters most, affecting business from the cyber perspective around the region. The episodes on this podcast is shorter than your drive home!
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 6:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
…
continue reading
1
EV Charging Security Vulnerability – PlaxidityX Ep 11
8:21
8:21
Spela senare
Spela senare
Listor
Gilla
Gillad
8:21
Automotive cybersecurity is becoming increasingly important as electric vehicles face new vulnerabilities. In this episode, we explore a major flaw discovered in the EVerest open-source charging firmware, which could allow attackers to take control of charging stations and potentially compromise vehicles themselves. This vulnerability serves as a s…
…
continue reading
1
Episode 87: Episode 87 - Leaning Forward - From 2024's stories to 2025's goals
21:51
21:51
Spela senare
Spela senare
Listor
Gilla
Gillad
21:51
In this episode, Richard does a bit of a reflection of 2024, and prompts your thinking for the upcoming year.
…
continue reading
1
Week in Review: Data breach impact study, US weighs TP-Link ban, BeyondTrust cyberattack
28:08
28:08
Spela senare
Spela senare
Listor
Gilla
Gillad
28:08
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Bethany De Lude, CISO, The Carlyle Group Thanks to our show sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps yo…
…
continue reading
1
Casual conversation about my experience in prison.
1:26:00
1:26:00
Spela senare
Spela senare
Listor
Gilla
Gillad
1:26:00
Casual conversation about my experience in prison.
…
continue reading
1
The 3 things most companies struggle with, when it comes to building a good security culture
27:37
27:37
Spela senare
Spela senare
Listor
Gilla
Gillad
27:37
In this episode i'm joined by Julie Dolleris. She's our security culture expert in CyberPilot. She's been measuring the security cultures in a bunch of companies. This has created quite a few learnings that we thought would be interesting to share with you all. Because what are learnings worth if not shared? She dives into: What it is that we've me…
…
continue reading
1
ISC StormCast for Friday, December 20th, 2024
5:59
5:59
Spela senare
Spela senare
Listor
Gilla
Gillad
5:59
PHPUnit and Androxgh0st https://isc.sans.edu/diary/Command%20Injection%20Exploit%20For%20PHPUnit%20before%204.8.28%20and%205.x%20before%205.6.3%20%5BGuest%20Diary%5D/31528 Mirai Attacks Session Smart Routers https://supportportal.juniper.net/s/article/2024-12-Reference-Advisory-Session-Smart-Router-Mirai-malware-found-on-systems-when-the-default-pa…
…
continue reading
1
Personal Branding Got Me $2,000/Day in Security | EP 18
1:26:25
1:26:25
Spela senare
Spela senare
Listor
Gilla
Gillad
1:26:25
Build your dream career in cyber security by mastering personal branding. In this episode of Cyber Security Diaries, Nathan from Station X talks with personal branding expert Ken Underhill—author, mentor, and guide to thousands of successful professionals—about leveraging personal branding to stand out in a competitive job market. Discover why pers…
…
continue reading
1
Defensive Security Podcast Episode 289
1:00:14
1:00:14
Spela senare
Spela senare
Listor
Gilla
Gillad
1:00:14
In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including a year-long supply chain attack that compromised 390,000 credentials, the U.S. government’s bounty for information on North Korean IT worker farms, and the alarming number of vulnerabilities found in software containe…
…
continue reading
1
Episode 432 - Cyber Security Protections for Critical Infrastructure
57:36
57:36
Spela senare
Spela senare
Listor
Gilla
Gillad
57:36
Are you prepared for a cyber-attack? Whether you’re managing a national or state-wide critical infrastructure organisation, or you’re a small rural provider with a lean team, the stakes are higher than ever for Australia’s Energy and Utility operators. Recorded on 20 November 2024 this webinar discusses the SOCI Act 2018 and the Essential Eight Fra…
…
continue reading
1
119: Revealing the OT Threat Landscape: Remote Access, Supply Chain, and Lateral Movement
19:37
19:37
Spela senare
Spela senare
Listor
Gilla
Gillad
19:37
Our host Derek Harp sits down with Adam Robbie, Head of OT Threat Research at Palo Alto Networks, live from Hack the Capitol 7.0. Adam shares critical insights into emerging cybersecurity challenges within Operational Technology (OT) environments, including findings from Palo Alto's extensive OT threat landscape research. Listeners will hear about …
…
continue reading
1
teissTalk: The emerging 2025 threat landscape
46:03
46:03
Spela senare
Spela senare
Listor
Gilla
Gillad
46:03
How evolving methods of work are expanding the attack surface Growth of supply chain attacks targeting devices touching sensitive data Increased nation-state targeting of Critical National Infrastructure This episode is hosted by Thom Langford: https://www.linkedin.com/in/thomlangford/ Richard Absalom, Principal Research Analyst, Information Securi…
…
continue reading
1
The Cost of Being A CISO Part 1: Personal, Professional & Organisational Challenges
58:38
58:38
Spela senare
Spela senare
Listor
Gilla
Gillad
58:38
Join us for part one of our two-part series examining the world of Chief Information Security Officers. This episode welcomes back Richard Cassidy, Field CISO at Rubrik, and Oliver Rochford, former Gartner analyst and founder of Cyberfuturist. This episode offers insights that will give you insight into what makes security leadership successful - a…
…
continue reading
1
AI - FACT OR FICTION AND WHAT IT MEANS FOR THE REAL ESTATE INDUSTRY, MLS, CPACE, & YOUR SECURITY
1:02:31
1:02:31
Spela senare
Spela senare
Listor
Gilla
Gillad
1:02:31
Send us a text Join the CRE Collaborative Roundtable hosts as they dive deep into AI, MLS and more for December 2024. This month's RoundTable Hosts: Andreas Senie, Host, Founder CRE Collaborative, Technology Growth Strategist, CRETech Thought Leader, Founder & Brokerage Owner Saul Klein, Realtor Emeritus, Data Advocate & Futurist, Original Real Est…
…
continue reading
1
$17m Stolen As Central Bank of Ugandan Got Hacked - Cyber Security Headlines 04/12
7:32
7:32
Spela senare
Spela senare
Listor
Gilla
Gillad
7:32
- Central Bank of Ugandan Hacked - Over 5000 Suspects Arrested In InterPol Cybercrime Operations. - 760,000 Employees Records Leaked Online - Russia Sentences Hydra Market Founder To life In PrisonAv Olu Faks
…
continue reading
1
Amazon health malware, BeyondTrust suffers cyberattack, FortiNet wireless vulnerability
7:47
7:47
Spela senare
Spela senare
Listor
Gilla
Gillad
7:47
Android malware found on Amazon Appstore disguised as health app BeyondTrust suffers cyberattack Fortinet warns of critical flaw in Wireless LAN Manager Thanks to today’s episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps…
…
continue reading
1
Interpol romance baiting, TikTok at court, TP-Link investigation
8:09
8:09
Spela senare
Spela senare
Listor
Gilla
Gillad
8:09
Interpol kills off Pig Butchering Supreme Court to hear TikTok ban challenge US weighs TP-Link ban Thanks to today’s episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, default-deny approach to cybers…
…
continue reading
1
ISC StormCast for Thursday, December 19th, 2024
7:05
7:05
Spela senare
Spela senare
Listor
Gilla
Gillad
7:05
A Deep Dive into TeamTNT and Spinning YARN https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20A%20Deep%20Dive%20into%20TeamTNT%20and%20Spinning%20YARN/31530 Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks https://www.trendmicro.com/en_us/research/24/l/earth-koshchei.html Okta Social Engineering Impersonation Report https://sec.okta.com/ar…
…
continue reading
1
"Cybercrimen y Cyberterrorismo en Mexico: A Growing Threat" by @HackersOIHEC
58:19
58:19
Spela senare
Spela senare
Listor
Gilla
Gillad
58:19
This segment provides a comprehensive understanding of the current state of cybercrime in Mexico. Key Points: Current Statistics: Discuss recent statistics on cybercrime rates in Mexico, highlighting significant increases and notable trends. Types of Cybercrime: Explain the various forms of cybercrimes prevalent in the region, such as ransomware at…
…
continue reading
1
CISA cloud directive, Texas Tech breach, Meta GDPR fine
8:17
8:17
Spela senare
Spela senare
Listor
Gilla
Gillad
8:17
CISA delivers new directive for securing cloud environments Texas Tech reports a data breach affecting 1.4 million people Meta fined $263 million for alleged GDPR violations Thanks to today’s episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocke…
…
continue reading
1
ISC StormCast for Wednesday, December 18th, 2024
5:15
5:15
Spela senare
Spela senare
Listor
Gilla
Gillad
5:15
Python Delivering AnyDesk Client as RAT https://isc.sans.edu/diary/Python+Delivering+AnyDesk+Client+as+RAT/31524/ Vishing via Microsoft Teams Facilitates DarkGate Malware Intrusion https://www.trendmicro.com/en_us/research/24/l/darkgate-malware.html SS7 Attacks https://www.404media.co/email/ac709882-1e4b-42fc-bcca-cf7ce4793716/ CrushFTP Vulnerabili…
…
continue reading
1
Serbian authorities use spyware, Ransomware impacts Rhode Island, ConnectOnCall breach
8:54
8:54
Spela senare
Spela senare
Listor
Gilla
Gillad
8:54
Serbian authorities accused of using Cellebrite to spy on journalists Ransomware attack shuts down Rhode Island’s public assistance system ConnectOnCall breach exposes close to a million patients Thanks to today’s episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your sec…
…
continue reading
1
ISC StormCast for Tuesday, December 17th, 2024
6:16
6:16
Spela senare
Spela senare
Listor
Gilla
Gillad
6:16
MUT-1244 Targeting Offensive Actors https://securitylabs.datadoghq.com/articles/mut-1244-targeting-offensive-actors/ Golang Crypto Vulnerability https://github.com/golang/crypto/commit/b4f1988a35dee11ec3e05d6bf3e90b695fbd8909 Meeten Malware: A Cross-Platform Threat to Crypto Wallets on macOS and Windows https://www.cadosecurity.com/blog/meeten-malw…
…
continue reading
1
Health chatbot exposed, credit union cyberattack, infrastructure cyberweapon attack
7:49
7:49
Spela senare
Spela senare
Listor
Gilla
Gillad
7:49
UnitedHealth’s AI-driven insurance claims chatbot left exposed to the internet South Carolina credit union suffers cyberattack IOCONTROL cyberweapon targets infrastructure in the US and Israel Thanks to today’s episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your securi…
…
continue reading
1
Episode 431 - New cybersecurity laws to have implications and expectations on Australian industry
6:43
6:43
Spela senare
Spela senare
Listor
Gilla
Gillad
6:43
Fortifying Australia’s Data Resilience and Security Luncheon held 31 October 2024 at the National Press Club in Canberra gathered industry leaders, government officials and cybersecurity experts to explore Australia’s pressing cyber security challenges. As one of the most attacked countries in the world, Australia faces significant threats that dem…
…
continue reading
1
ISC StormCast for Monday, December 16th, 2024
5:29
5:29
Spela senare
Spela senare
Listor
Gilla
Gillad
5:29
Exploit Attempts Inspired by Recent Struts 2 File Upload Vulnerability https://isc.sans.edu/diary/Exploit%20attempts%20inspired%20by%20recent%20Struts2%20File%20Upload%20Vulnerability%20%28CVE-2024-53677%2C%20CVE-2023-50164%29/31520 Citrix Netscaler Password Spraying Mitigation https://www.citrix.com/blogs/2024/12/13/password-spraying-attacks-netsc…
…
continue reading
1
MitM Attacks on SOME/IP Protocol - PlaxidityX Ep 10
8:26
8:26
Spela senare
Spela senare
Listor
Gilla
Gillad
8:26
Automotive networks face an alarming threat: Man-in-the-Middle (MITM) attacks exploiting the SOME/IP protocol. This episode explores how attackers intercept and manipulate communications between ECUs using in-vehicle Ethernet networks, enabling them to falsify data, disrupt services, and compromise safety. We outline the attack setup, flow, and the…
…
continue reading
1
Week in Review: Salt Typhoon saga, Microsoft MFA bypass, Yahoo cuts Paranoids
21:37
21:37
Spela senare
Spela senare
Listor
Gilla
Gillad
21:37
Link to episode page This week’s Cyber Security Headlines - Week in Review is hosted by Rich Stroffolino with guest Jimmy Sanders, president, ISSA International. ISSA International April 2025- will be celebrating its 40th Anniversary in April 2025. Watch for notifications at ISSA.org Thanks to today’s episode sponsor, ThreatLocker Do zero-day explo…
…
continue reading
1
Microsoft MFA bypass, cybercrime marketplace takedown, Sophos hacker charged
7:33
7:33
Spela senare
Spela senare
Listor
Gilla
Gillad
7:33
Microsoft MFA bypassed in AuthQuake attack Cybercrime marketplace Rydox taken down U.S. charges Chinese national for hacking thousands of Sophos firewall devices Thanks to today’s episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLoc…
…
continue reading
1
ISC StormCast for Friday, December 13th, 2024
6:18
6:18
Spela senare
Spela senare
Listor
Gilla
Gillad
6:18
Windows 11 and TPM https://techcommunity.microsoft.com/blog/windows-itpro-blog/tpm-2-0-%E2%80%93-a-necessity-for-a-secure-and-future-proof-windows-11/4339066 https://www.forbes.com/sites/zakdoffman/2024/12/12/microsoft-warns-400-million-windows-users-do-not-update-your-pc/ Microsoft Azure MFA Bypass https://www.oasis.security/resources/blog/oasis-s…
…
continue reading
1
Episode 430 - Legal framework changes for Australia's national cybersecurity
9:33
9:33
Spela senare
Spela senare
Listor
Gilla
Gillad
9:33
Fortifying Australia’s Data Resilience and Security Luncheon held 31 October 2024 at the National Press Club in Canberra gathered industry leaders, government officials and cybersecurity experts to explore Australia’s pressing cyber security challenges. As one of the most attacked countries in the world, Australia faces significant threats that dem…
…
continue reading
1
Cybersecurity Trends 2025 : The Hidden Threats You Need to Know
8:02
8:02
Spela senare
Spela senare
Listor
Gilla
Gillad
8:02
Unseen Cyber Threats of 2025: Convergence, AI, Quantum Computing, and Humanoid Robots In this episode of Cyber Security Diaries, Nathan from StationX explores the most significant and hidden cyber threats expected to emerge by 2025. He discusses the merging of digital and physical security, the rise of AI-driven social engineering and deepfakes, th…
…
continue reading
1
Operation PowerOFF, FCC telco rules, ZLoader returns
8:39
8:39
Spela senare
Spela senare
Listor
Gilla
Gillad
8:39
Operation PowerOFF hits DDoS sites FCC proposes new telco cybersecurity rules ZLoader returns Thanks to today’s episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, default-deny approach to cybersecuri…
…
continue reading
1
ISC StormCast for Thursday, December 12th, 2024
5:46
5:46
Spela senare
Spela senare
Listor
Gilla
Gillad
5:46
Vulnerability Symbiosis: vSphere's CVE-2024-38812 and CVE-2024-38813 https://isc.sans.edu/diary/Vulnerability%20Symbiosis%3A%20vSphere%3Fs%20CVE-2024-38812%20and%20CVE-2024-38813%20%5BGuest%20Diary%5D/31510 Apple Updates Everything (iOS, iPadOS, macOS, watchOS, tvOS, visionOS) https://isc.sans.edu/diary/Apple+Updates+Everything+iOS+iPadOS+macOS+wat…
…
continue reading
1
Telecom security bill, Google's quantum chip, Chinese cyber firm sanctions
8:50
8:50
Spela senare
Spela senare
Listor
Gilla
Gillad
8:50
Senator announces new bill to secure telecom companies Google unveils new quantum chip U.S. sanctions Chinese cybersecurity firm for firewall hacks Thanks to today’s episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you …
…
continue reading
1
ISC StormCast for Wednesday, December 11th, 2024
5:29
5:29
Spela senare
Spela senare
Listor
Gilla
Gillad
5:29
Microsoft Patch Tuesday December 2024 https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%3A%20December%202024/31508 Ivanty Security Advisory https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Services-Application-CSA-CVE-2024-11639-CVE-2024-11772-CVE-2024-11773?language=en_US Visual Studio Code Tunnels https://www.sentinelone.co…
…
continue reading
1
Episode 429 - Fortifying Australia’s Data Resilience and Security
5:42
5:42
Spela senare
Spela senare
Listor
Gilla
Gillad
5:42
Fortifying Australia’s Data Resilience and Security Luncheon held 31 October 2024 at the National Press Club in Canberra gathered industry leaders, government officials and cybersecurity experts to explore Australia’s pressing cyber security challenges. As one of the most attacked countries in the world, Australia faces significant threats that dem…
…
continue reading
1
Romanian energy attack, medical device disruption, Deloitte responds to data theft claims
8:40
8:40
Spela senare
Spela senare
Listor
Gilla
Gillad
8:40
Romanian energy giant battles ongoing attack Ransomware disrupts medical device maker Deloitte responds to data theft claims Thanks to today’s episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, defau…
…
continue reading
1
118: Preparing for Cyber Threats: A Strategic Discussion with Mark Montgomery on Securing Our Future
13:26
13:26
Spela senare
Spela senare
Listor
Gilla
Gillad
13:26
In this episode of the CS2AI Podcast, host Derek Harp dives deep into the evolving threats to national security and critical infrastructure with Mark Montgomery, Senior Fellow at the Foundation for Defense of Democracies. Recorded live at the Hack the Capitol 7.0 conference in Washington D.C., this episode sheds light on the increasing cyber vulner…
…
continue reading