Security відкриті
[search 0]
більше

Download the App!

show episodes
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over six million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, a ...
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
Discover the unique, inspiring, and often amusing stories behind what it takes to lead cybersecurity efforts in an organization. The Security Stories podcast features interviews with a diverse range of guests, each sharing their leadership experiences for the benefit of others in the cybersecurity industry. Discover more at https://www.cisco.com/c/en/us/products/security/securitystories.html
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Each week on The No Name Security Podcast, Matt Stephenson chats with people who secure the things, hack the things or write about securing and hacking the things that surround us in everyday life. From voting machines to social engineering to the critical infrastructure, if it can be secured, it can be hacked. On No Name Security, we meet the people who do one or the other… and sometimes both.
 
Loading …
show series
 
All links and images for this episode can be found on CISO Series If I'm going to be riding my team really hard, how much charisma will I need to keep the team frightened so they stay motivated, yet don't want to leave? This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson. Our guest is Jason Fruge (@j…
 
No More Ransom project five-years in Google Cloud Commits to APIs WhatsApp CEO details 2019 Pegasus spyware attack Thanks to our episode sponsor, Varonis What is your ransomware blast radius? The average user can access 17 million files. Varonis reduces your blast radius in days, not years. Combined with advanced detection that monitors every file …
 
Recovering Malspam Password https://isc.sans.edu/forums/diary/Failed+Malspam+Recovering+The+Password/27674/ Apple Patches 0-Day https://support.apple.com/en-us/HT201222 Attackers Adopt Exotic Programming Languages https://blogs.blackberry.com/en/2021/07/old-dogs-new-tricks-attackers-adopt-exotic-programming-languages LemonDuck/LemonCat Coinminers G…
 
This week on the podcast we cover the latest Microsoft Windows privilege escalation vulnerability, SeriousSAM aka HaveNightmare. Before that, we discuss NSO Group and their spyware software known as Pegasus and whether private organizations should be allowed to market and sell spyware to government agencies.…
 
Today's episode reports on phony Windows 11 downloads, how an insurance giant was hacked, Mac malware, a ransomware gang attacked and moreITWC
 
Two experts of extremist radicalization take us down the QAnon rabbit hole, exposing how the conspiracy theory ensnared countless Americans, and show us a way back to sanity. In January 2021, thousands descended on the U.S. Capitol to aid President Donald Trump in combating a shadowy cabal of Satan-worshipping pedophiles. Two women were among those…
 
In this edition of the Tin Foil Hat Club I speak with Fraud professionals Peter Taylor and Robert Brooker. We discuss fakes , frauds, cybercrime and the upcoming 15th annual fraud forum reference the following articles. Thanks to both for an awesome interview... To follow Robert on LinkedIn, click this link here. To follow Peter on LinkedIn, click …
 
Pegasus spyware and NSO Group are back in the news because of a data leak of 50,000 phone numbers, another “hacker” was arrested for the great Twitter hack of 2020, and how a 16 year old printer vulnerability is affecting millions of HP, Samsung, and Xerox printers. ** Links mentioned on the show ** New […] The post Pegasus Spyware is Back, Twitter…
 
Josh and Kurt talk about the news that the NSO Group is widely distributing spyware onto a large number of devices. This news should be a wake up call for anyone creating devices and systems that could be attacked, it's time to segment services. There's not a lot individuals can do at this point, but we have some ideas at the end of the episode. Sh…
 
https://therecord.media/using-vms-to-hide-ransomware-attacks-is-becoming-more-popular/ https://blog.erratasec.com/2021/07/ransomware-quis-custodiet-ipsos-custodes.html?m=1 https://www.databreachtoday.com/how-mespinoza-ransomware-group-hits-targets-a-17086 https://krebsonsecurity.com/2021/07/dont-wanna-pay-ransom-gangs-test-your-backups/ https://ars…
 
This week in the Security News: Trust no one, its all about the information, so many Windows vulnerabilities and exploits, so. many., Saudi Aramco data for sale, Sequoia, a perfectly named Linux vulnerability, is Microsoft a national security threat?, Pegasus and clickless exploits for iOS, homoglyph domain takedowns, when DNS configuration goes wr…
 
This week, we kick off the show with an interview featuring Jeff Tinsley, CEO of RealMe, to talk about The Online Safety and Security as it Pertains to Dating Apps and Online Marketplaces! Next up, we welcome Gordon Draper, Founder and CEO of CyberMarket.com, to talk about the Democratisation and Globalisation of CyberSecurity Consulting! In the Se…
 
This week in the Security Weekly News Wrap Up: Pornageddon, Pegasus, Kaseya, SeriousSam, The FBI Wants hackers dead or alive, SonicWall, HPrinters, Show Wrap Ups, and more! Show Notes: https://securityweekly.com/swn136 Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly …
 
We’ve been having a problem with people that want to play with Security Onion or RITA at home. If a home router does not have a mirror port it can be difficult to try cool/free network monitoring tools. Sure, one could buy another router that has those features. But it is far easier to not […] The post Webcast: No SPAN Port? No Tap? No Problem! app…
 
EPISODE 226-Personal Ransomware ExposureThis week I discuss the personal impact of published ransomware data and the OSINT potential for researchers. You might have more to lose than the companies being targeted by criminals, but there might be huge gains if your investigative target is within a leak.Direct support for this podcast comes from sales…
 
As ransomware continues to pummel organizations, if they do get hit, then from an incident response standpoint, what are the essential steps they should take to smooth their recovery? Veteran ransomware-battler Fabian Wosar, CTO of Emsisoft, shares essential steps and guidance for recovery.BankInfoSecurity.com
 
This week, in our first segment, we welcome Ed Rossi, Vice President of Product Management, Asset Inventory & Discovery at Qualys, to talk about Reinventing Asset Inventory for Security! Then, in the Enterprise News, SafeBreach adds support for new advanced attacks to the Microsoft Defender for Endpoint evaluation lab, Stellar Cyber XDR Kill Chain …
 
Niklas Kourtidis, SAP Solution Specialist für EMEA bei Splunk, war zu Gast und hat mit mir über die Möglichkeiten gesprochen, wie Splunk Geschäftsprozesse im SAP überwachen kann und sicherstellt, dass diese ordnungsgemäß laufen. Link zum ganzen Artikel: https://rz10.de/sap-security/verfuegbarkeit-im-sap-ueberwachen-mit-splunk/ Viel Spaß euch allen …
 
The shift away from web application security, caused by the pandemic and the focus on remote workforces, resulted in an increased number of web vulnerabilities. In this segment, Mark talks about the best starting point for organizations to get back on track and prioritize your web app security. This segment is sponsored by Acunetix. Visit https://s…
 
Learning from computer virus history. The PrintNightmare saga continues. Apple puts out a patch, but doesn't say why. Snitch on a crook and earn $10 million. Scammers do grammar. And the Business Email Compromise that wasn't.https://nakedsecurity.sophos.com/the-code-red-worm-20-years-onhttps://nakedsecurity.sophos.com/more-printnightmarehttps://nak…
 
Links: How to Bridge On-Premises and Cloud Identity: https://www.darkreading.com/vulnerabilities—threats/how-to-bridge-on-premises-and-cloud-identity-/a/d-id/1341512 How AWS is helping EU customers navigate the new normal for data protection: https://aws.amazon.com/blogs/security/how-aws-is-helping-eu-customers-navigate-the-new-normal-for-data-prot…
 
We speak with Kshira Saagar, Chief Data Officer of Latitude Financial Services about what is Data Literacy and why it is important. Kshira has been consecutively recognised among the Top 10 Analytics Leaders in Australia, for 2019, 2020 and 2021. He is focused on helping key decision-makers and CxOs make smarter decisions using data, and strongly b…
 
Spy software known as Pegasus has been used to carry out surveillance on the smartphones of journalists, activists, and political leaders. Can a "Freedom Phone" be trusted? And a ransomware-hit law firm demonstrates how not to keep its customers informed. All this and much much more is discussed in the latest edition of the "Smashing Security" podc…
 
Want to know more? Check out these links! The very best place to have a few beers while at Infosec Europe in person is, naturally, the Prince of Teck Follow up to the HSE attack in Ireland, from ZDNet's Danny Palmer Ireland's first CERT, co-founded by Brian Honan; they announced their intention for IRISSCON 2021 in November on Twitter Rob Wright, o…
 
Today we're talking about Cobalt Strike for newbs - including how to get it up and running, as well as some tools that will help you generate beacons while evading EDR at the same time! Some helpful things mentioned in today's episode: Wherever you spin up your CS instance, it's probably a good idea to lock down the firewall to only specific IPs. W…
 
Picture of the week Browser News The attacks on Google Chrome continue. Firefox special-cases anti-tracking for "Login With" functions. Security News iOS WiFi SSID bug We still can't awaken from the "PrintNightmare" It's not a bug, it's a feature! Patch Tuesday Review Update Acrobat and Reader Rolling your own Crypto Pegasus Errata Windows Extended…
 
-- Calvin and Hobbes courtesy of Bill Waterson None of us wants to be judged by our worst act on our worst day, and we consistently judge Burr for that. He was not a perfect man, but he's not a villain. He's a dude, just a guy. -- Leslie Odom, Jr. What if the worst day of your life ended up being just another Zoom meeting on someone else’s calendar…
 
Our guest today is Stuart Peck, director of cybersecurity strategy for Zero Day Lab. Stuart talks to Hazel about his various career roles within threat intelligence, social engineering and incident response. We also talk about how he went from a non technical background to a technical one, and overcoming imposter syndrome in the process. Stuart the…
 
Ransomware payment amounts have skyrocketed over the past year. As threat actors keep getting richer, they have more resources to fuel their operations. Many people argue that the way to discourage ransomware is to implement an outright ban on ransom payments. Is this suggestion idealistic or realistic? How would such a ban affect companies, and wh…
 
On this week’s Cyber Security Brief, Gavin O’Gorman joins us to discuss the Kaseya ransomware supply chain attack that occurred over the July 4 holiday weekend in the U.S. The REvil/Sodinokibi ransomware gang were behind this attack, and Gavin and Dick O’Brien discuss whether this is a sign that we now need to be aware of ransomware actors targetin…
 
Episode sponsored by SecurityWeek.com JupiterOne CISO Sounil Yu joins the show to sift through the noise and explain the value of SBOMs (software bill of materials), the U.S. government's response to software supply chain security gaps, and what every buyer and seller should be doing to prepare for major changes in the ecosystem.…
 
Host Luke McNamara is joined by Jeff Compton, Senior Manager for Mandiant’s Intelligence Capability Development team to discuss the focus of his team in helping customers build threat intelligence programs and how the needs of customers in this space continue to evolve, and how the regulatory landscape is driving change in particular regions and in…
 
[Updated to fix the audio issue with the original file…though I have to admit, it was very entertaining to hear the hosts speaking an octave too low!) We’re back with another round of discussion and debate featuring co-hosts Steve Vladeck and Bobby Chesney, working through the latest national security law developments. Tune in for: The end of the d…
 
#SecurityConfidential #DarkRhinoSecurity Strategist and best-selling author Michele Wucker coined the term “gray rhino” for obvious, probable, impactful risks, which we are surprisingly likely but not condemned to neglect. The metaphor has moved markets, shaped financial policies, and made headlines around the world. It became a frame for the ignor…
 
„Aus großer Kraft folgt große Verantwortung” Joy Buolamwini: Fighting algorithmic bias needs to be ‘a priority’ Invisible Women - Exposing Data Bias in a World Designed for Men Startschuss für intelligente Videoüberwachung in Mannheim MITRE ATT&CK Wired.com: An AI Used Facebook Data to Predict Mental Illness Paper: Depression detection from social …
 
Overview This week we look at some details of the 8 unique CVEs addressed across the supported Ubuntu releases and more. This week in Ubuntu Security Updates 8 unique CVEs addressed [USN-4905-2] X.Org X Server vulnerability 1 CVEs addressed in Trusty ESM (14.04 ESM) CVE-2021-3472 Episode 112 - Local user (X client) could crash the server via Xinput…
 
Loading …

Короткий довідник

Google login Twitter login Classic login