show episodes
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Artwork

1
Hacked

Hacked

Unsubscribe
Unsubscribe
Щомісяця+
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
  continue reading
 
Have you ever clicked on a link you were unsure of, or downloaded a risky attachment? If so, then you are in danger of becoming part of a Botnet, also known as a ‘zombie army'. The term ‘zombie army’ is used to refer to a number of computer networks that have become infected as a result of malicious third party software sneaking onto a user’s computer and then linking it to others to send spam to, or steal data from. ‘How to Survive a Botnets Attack’ is a short animation that explains how to ...
  continue reading
 
Artwork

1
Radio Free Security

WatchGuard LiveSecurity Service

Unsubscribe
Unsubscribe
Щомісяця
 
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
  continue reading
 
Artwork

1
AOL Underground

Steve Stonebraker

Unsubscribe
Unsubscribe
Щомісяця
 
Interviews with users, hackers, and staff of America Online (AOL), covering the 90’s/Early 2000’s. Support this podcast: https://podcasters.spotify.com/pod/show/aolunderground/support
  continue reading
 
Artwork

1
Security Masterminds

Security Masterminds

Unsubscribe
Unsubscribe
Щомісяця
 
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
  continue reading
 
ReliaQuest's ShadowTalk is a weekly podcast featuring discussions on the latest cybersecurity news and threat research. ShadowTalk's hosts come from threat intelligence, threat hunting, security research, and leadership backgrounds providing practical perspectives on the week's top cybersecurity stories. www.reliaquest.com
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
  continue reading
 
Artwork

1
Trial By Wire

Denton Wood

Unsubscribe
Unsubscribe
Щомісяця
 
Struggling to understand all of the tech buzz words in the news? We break down complex technology concepts into bite-size pieces to talk about how to keep yourself safe online.
  continue reading
 
Artwork

1
Command Line Heroes

Red Hat

Unsubscribe
Unsubscribe
Щомісяця
 
Hear the epic true tales of how developers, programmers, hackers, geeks, and open source rebels are revolutionizing the technology landscape. Command Line Heroes is an award-winning podcast hosted by Saron Yitbarek and produced by Red Hat. Get root access to show notes, transcripts, and other associated content at https://redhat.com/commandlineheroes
  continue reading
 
Artwork

1
Safe Zone

Brussec Security

Unsubscribe
Unsubscribe
Щодня+
 
Welcome to the Safe Zone, a cyber security podcast by Brussec Security where we help businesses and individuals stay safe online. As professional cyber security consultants we help you secure your IT using the latest techniques.
  continue reading
 
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
  continue reading
 
Artwork

1
Tech Pulse

Tech Pulse Podcasters

Unsubscribe
Unsubscribe
Щомісяця
 
Hosted by experienced geeks, Tech Pulse is chock full of the hottest industry news, computer tips and tricks, software and hardware picks, and more! Mac or Windows user, professional or hobbyist, you're sure to like this podcast.
  continue reading
 
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
  continue reading
 
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings in Japan 2006 was held October 5-6 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/b ...
  continue reading
 
Loading …
show series
 
In this episode of ShadowTalk, host Chris and Kim are joined by detection researcher, Marken, to discuss the latest news in cybersecurity and threat research. Topics this week include: Cyber Threats Facing the Health Care and Social Assistance Sector Salt Typhoon Compromises US-based Telecoms Companies Microsoft and US DoJ Takedown Star Blizzard In…
  continue reading
 
In this episode, Rob Aragao talks about a recent joint cybersecurity advisory highlighting People's Republic of China-linked actors compromising routers and IoT devices for botnet operations. The advisory points to over 260,000 IoT devices, impacted by a botnet called Raptor Train. It’s being alleged that Integrity Technology Group (Integrity Tech)…
  continue reading
 
Harping on the Russian influence, but also making time for what China is up to these days according to the NSA. You may want to throw out your old smart toaster just to be safe from the botnet. Topics include: Russian influence on alternative media, Post Truth Movement World, shared interests, global propaganda matrix, governments, taking offense t…
  continue reading
 
A chatty chat episode where we discuss a Harvard research project turning Meta Ray-Bans into facial recognition hardware, an Irish court case resolution on a password breach, a live-action roleplaying game solved basically while we were talking, and much more. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
  continue reading
 
“We took what we know about nation-state actors... and we found that it was a really effective program. The program has about 1,000 companies enrolled in it to date, and it’s blocked 7 billion malicious domains since we started it.” This episode features Kristina Walter, a key figure behind the NSA's Cybersecurity Collaboration Center (CCC), as she…
  continue reading
 
Some thoughts on the many changes and many ages of transitions that we can look back on. Changing media and political trends have intertwined and brought us to a new marker post. Where do we go from here? Topics include: Age of Transitions, technology, change, subconscious, historical marking posts, Newt Gingrich, politics and media, online reality…
  continue reading
 
In this eye-opening episode of Exploit Brokers, your host Lauro dives deep into the recent cyberattacks that have compromised major U.S. telecommunications networks. Chinese state-sponsored hackers, known as Salt Typhoon, have exploited a 30-year-old backdoor mandated by U.S. law, targeting giants like AT&T, Lumen (formerly CenturyLink), and Verizo…
  continue reading
 
In this episode, we are joined by Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance (NCA), to discuss the NCA’s mission, current initiatives, and the importance of cybersecurity education. They highlight key programs, their collaboration with CISA on cybersecurity campaigns, and their efforts to simplify cybersecurity for t…
  continue reading
 
National security elites wish we were still living during the War on Terror years, but the glory days are gone for the US. Procuring government contracts to simply become wealthy is not good enough anymore. Meanwhile, those claiming to speak truth to power are simply recycling old tropes that no longer apply. Topics include: prophets, IronNet, nati…
  continue reading
 
Send us a text In this episode of Security Masterminds, we explore the critical intersection of artificial intelligence, security, and development teams. Our distinguished guest, Alison Cossette, CEO and founder of Patron, Inc., shares her expertise on responsible AI development and the importance of transparency in data sourcing. Key Topics Covere…
  continue reading
 
In this episode of ShadowTalk, host Chris and Kim are joined by guest Samantha Billy, AON U.S Broking Growth Leader, to discuss the latest news in cybersecurity and threat research. Topics this week include: The Critical Role of Cyber Insurance in Mitigating Cyber Risk Embargo Ransomware Targeting Cloud Iranian Threat Actors Conducting Influence Op…
  continue reading
 
In this episode of Reimagining Cyber, host Rob Aragao is joined by Tiffany Snyder, the Deputy Chief of Cybersecurity Mission Integration at NASA. Tiffany delves into her journey from the Air National Guard to leading cybersecurity efforts at NASA, where she oversees the protection of one of the most technologically advanced organizations in the wor…
  continue reading
 
We think Zeke Faux’s Number Go Up: Inside Crypto’s Wild Rise and Staggering Fall is one of the best modern books about crypto. It’s a globetrotting adventure and a great piece of reporting. To celebrate the paperback release, we sat down with Bloomberg investigative reporter and author Zeke Faux to dig into his experience writing it, what he learne…
  continue reading
 
Is Lauren Southern having a private crisis of conscience? Signs point to the probability of this, but only time, and Southern herself, may tell. Topics include: status of Ochelli Radio Network, Brady Bunch collective style video podcasts, agendas, taboo topics, shifts in alternative media, Tenet Media, Lauren Southern, Alt Right, women in media, Ch…
  continue reading
 
Imagine waking up to find that your trusted antivirus software has uninstalled itself and replaced itself with a completely different program—without your consent! 😱 In today's video, we dive deep into the shocking move by Kaspersky as it uninstalls itself and installs Ultra AV on users' computers. We'll explore why this happened, how users are rea…
  continue reading
 
Kath tells Pat about Albert Rosenberg, a man who had many of Toronto's elite fooled into believing he was a fellow power broker in the city's wealthiest neighborhood. Be sure to check out the documentary, The Talented Mr Rosenberg, produced by Courtney Shea, who wrote the Toronto Life article from which much of this story comes.…
  continue reading
 
It's a five-alarm fire in the fifth instalment of our call in show. We hear from a caller who accidentally won a naval war-game by unplugging a radio, a person whose company hired someone who clearly lied about their technical background, a very wholesome story about Counterstrike, and a person who decided to do a scavenger hunt by scavenging onlin…
  continue reading
 
In this episode of ShadowTalk, host Chris and Kim, along with Threat Hunter Brian, discuss the latest news in cybersecurity and threat research. Topics this week include: Telegram Pivot 180: Agree to Share IP and Phone Data on Legal Requests Kaspersky Auto-Replace Software with UltraAV Antivirus Dell Investigate Two Data Breaches ReliaQuest Data Ex…
  continue reading
 
Send us a text This is the bonus part of the episode where we go through and ask a speed round of questions for not only their insights into cybersecurity, but a little bit of their personal life too! Show Notes from Joe's Reponses: Favorite Cybersecurity Tool: Proxmark - https://proxmark.com/ Cybersecurity Books: Cuckoo's Egg, Clifford Stoll - htt…
  continue reading
 
In an unexpected turn of events, Apple has decided to drop its three-year-old lawsuit against the notorious spyware maker, NSO Group. What led to this shocking decision, and what does it mean for the future of cybersecurity and your personal data? 🤔 In today's video, we dive deep into the reasons behind Apple's surprising move. We'll explore how th…
  continue reading
 
In this episode of ShadowTalk, host Chris, along with Corey and Anna, discuss the latest news in cyber security and threat research. Topics this week include: Threat actors express difficulty in retrieving stolen Fortinet data Amadey malware's novel approach: Users locked in Kiosk Mode Aftermath of incident affecting Transport for London (TFL) Reli…
  continue reading
 
In the latest episode of Reimagining Cyber, Rob interviews Bindu Sundaresan, Director of Cybersecurity Solutions at Level Blue, about the evolution and significance of cyber resilience. Bindu, with over 20 years in cybersecurity, discusses how the field has shifted from a focus solely on prevention to a broader approach that includes resilience and…
  continue reading
 
In which we discuss alleged Spotify streaming ad fraud that brought in millions, extremely poor voter outreach and an extended tangent on AI. Correction: we failed to make the "Ramen Empire" joke. Our apologies. Learn more about your ad choices. Visit podcastchoices.com/adchoicesHacked
  continue reading
 
We cover music and video piracy and delve in deep into the many websites and schemes ShiZZa OaK was able to probe and exploit for profit. Coupon stacking, gift card re-use, OSX Upgrade disc enumeration, etc. Guest: ShiZZa Oak Host: Steve Stonebraker Audio Editor: Sam Fox CoverArt: Created by Broast (⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://broast.org⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠), original…
  continue reading
 
ShiZZa OaK tells us about his switch to IRC and joining one of the first mp3 ripping groups on the scene, Rabid Neurosis (RNS) and hosting an mp3 top site. We also talk about his phone hijinks when phreaking, calling Miss Cleo, and cracking passwords. Other MP3 ripping groups mentioned: Underground Music Alliance CDA - Compress 'Da Audio Guest: Shi…
  continue reading
 
Chuck joins the show to talk about the Russian propaganda influence over the alternative media. This is a topic that many would prefer to ignore, but it has to be taken seriously, and understood at a level that goes beyond opinion. Topics include: Russian propaganda money, patriot radio stations, RBN, 2015, alt media dramatically shifted to Trump s…
  continue reading
 
ShiZZa OaK talks about the early days on AOL, getting early access to a Windows 95 Beta CD, 0-day ftp site access, trolling MTV Yack Live and the first mp3 ripped and uploaded to the scene. Guest: ShiZZa Oak Host: Steve Stonebraker Audio Editor: Sam Fox CoverArt: Created by Broast (⁠⁠⁠⁠⁠⁠⁠⁠https://broast.org⁠⁠⁠⁠⁠⁠⁠⁠), original idea by LampGold. Epi…
  continue reading
 
Send us a text In the rapidly evolving landscape of cybersecurity, staying ahead of emerging threats and technologies is crucial. This episode delves into the intricate world of cybersecurity with Joseph Carson, Chief Security Scientist and Advisory CISO at Delinea, as we explore the latest advancements and challenges in the field. With over three …
  continue reading
 
In this episode of ShadowTalk, host Chris Morgan, along with Marken Teder, discuss the latest news in cyber security and threat research. Topics this week include: Russia's Military Intelligence target CNI, identified using "Non-Lethal Acoustic Weapons" New Sextortion scam targets spouses Privacy concerns with smart automobiles ReliaQuest research …
  continue reading
 
In this episode of "Reimagining Cyber," host Rob Aragao continues his insightful conversation with Craig Jones, former Director of Interpol’s Global Cybercrime Directorate. They delve into the countries most targeted by cybercrime and the regions where these crimes often originate. Craig highlights the challenges of combating cyber threats in areas…
  continue reading
 
Fourth times a charm. Share your strange tale of technology, true hack, or computer confession at hotlinehacked.com. We discuss stealing login credentials with microphones, hacking courses for cybersecurity classes for instant grades, and parking pits. Hotline Hacked is brought to you by DeleteMe. Take control of your data and keep your private lif…
  continue reading
 
Loading …

Короткий довідник