Security відкриті
[search 0]
більше

Download the App!

show episodes
 
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
 
T
The Azure Security Podcast

1
The Azure Security Podcast

Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos

Unsubscribe
Unsubscribe
Щомісяця+
 
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/ ©2020-2022 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
 
S
Smashing Security

1
Smashing Security

Graham Cluley & Carole Theriault

Unsubscribe
Unsubscribe
Щотижня
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Cybersecurity Podcast" in 2018 and 2019, and the "Most Entertaining" in 2022, Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter ...
 
S
Security-Insider Podcast

1
Security-Insider Podcast

Peter Schmitz und Dirk Srocke

Unsubscribe
Unsubscribe
Щомісяця
 
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
 
T
The Security Podcasts

1
The Security Podcasts

www.securitymagazine.com

Unsubscribe
Unsubscribe
Щомісяця
 
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
 
Discover real people, overcoming security problems. 30-minute interviews with entrepreneurs, engineers, and leaders that explore modern security dilemmas and how we overcome them. A shame-free space to engage in open and honest discussions about what‘s really going on in Security. Interviews of about 30 minutes in length explore the dilemmas and opportunities faced by real entrepreneurs, operators, engineers, and leaders. Join us and catch a glimpse into the proven technologies and technique ...
 
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
C
Cloud Security Podcast

1
Cloud Security Podcast

Cloud Security Podcast Team

Unsubscribe
Unsubscribe
Щотижня
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
 
G
Global Security Briefing

1
Global Security Briefing

The Royal United Services Institute

Unsubscribe
Unsubscribe
Щомісяця+
 
Global Security Briefing provides regular insights from leading international experts to help you make sense of the far-reaching changes affecting international security around the globe. Hosted by analysts from RUSI's International Security Studies team, the podcast looks at how the UK can best shape its foreign and security policies in an increasingly dynamic international environment.
 
Loading …
show series
 
This week Dr. Doug talks: UEFI, PyPI, vishing, VNC, Sova, Doom, Mailchimp, hiding photos, and is joined by Jason Wood on this episode of Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Show…
 
This week Dr. Doug talks: UEFI, PyPI, vishing, VNC, Sova, Doom, Mailchimp, hiding photos, and is joined by Jason Wood on this episode of Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn232
 
Companies continue to struggle with prioritizing which vulnerabilities present the greatest risk to the business and need to be remediated first since vulnerability scoring is too often based on a static set of what could happen if an issue is exploited, says Qualys President and CEO Sumedh Thakar.BankInfoSecurity.com
 
Chat app used as a backdoor PyPi package drops crytominer Access to corporate networks sees a value dip Thanks to today’s episode sponsor, 6clicks Protect your supply chain from third-party risk with the power of 6clicks. Organizations can better manage their vendor risk by automating the vendor assessment lifecycle and detecting vendor assessment …
 
After just one week, incredibly, we are back! And we’re joined by two of our fantastic Texas Law students. Ryan Brown and Adam Goodrum won the right to guest host at last year’s public-interest auction at Texas Law, and as it happens they signed up for the episode coinciding with the unsealing of the now-famous Mar-a-Lago search warrant! If you are…
 
Realtek CVE-2022-27255 Followup (snort signature and presentation) https://isc.sans.edu/diary/Realtek+SDK+SIP+ALG+Vulnerability%3A+A+Big+Deal%2C+but+not+much+you+can+do+about+it.+CVE+2022-27255/28940 MacOS Privilege Escalation https://sector7.computest.nl/post/2022-08-process-injection-breaking-all-macos-security-layers-with-a-single-vulnerability/…
 
Guest: John Stone, Chaos Coordinator @ Office of the CISO, Google Cloud Topics: So what is Autonomic Data Security, described in our just released paper? What are some notorious data security issues today? Perhaps common data security mistakes security leaders commit? What never worked in data security, like say manual data classification? How shou…
 
Part 2 of our discussion this week with Amanda, Brian, and Bryan on sysmon, We discuss use cases from her talk, and best ways to get sysmon integrated into your environment. BrakeSec is: Amanda Berlin @infosystir Brian Boettcher @boettcherpwned Bryan Brake @bryanbrake https://www.brakeingsecurity.com Our #twitch stream can be found at: Https://twit…
 
Moisés Naím's The Revenge of Power: How Autocrats Are Reinventing Politics for the 21st Century (St. Martin's Press, 2022) is an urgent, thrilling, and original look at the future of democracy. It illuminates one of the most important battles of our time: the future of freedom and how to contain and defeat the autocrats mushrooming around the world…
 
Time to get an accurate inventory of the devices on our network. Once we have an inventory, we can move on to policies and procedures. LINKS 1. runZero - Active discovery tool for asset inventory 2. Enterprise Asset Management Policy Template FIND US ON 1. Twitter - DamienHull 2. YouTubeSECTION 9
 
Security analysts can move past traditional Indicators of Compromise from threat intel like domains, hashes, URLs, and IP addresses. These indicators typically aren't valid shortly after the incidents happen. Modern threat hunting by doing things like reading recent and relevant security articles, pull out behaviors that attackers are doing like co…
 
This week Dr. Doug talks: OnlyFans strikes back, Paul's new post, Windows vs. Linux, Conti, CISA, Zeppelin, NHS, and show wrap-ups on the Security Weekly News! Follow us on Twitter: https://www.twitter.com/securityweekly Like us on Facebook: https://www.facebook.com/secweekly Visit https://www.securityweekly.com/swn for all the latest episodes! Sho…
 
This week, we start off the show by welcoming Ryan Fried to discuss how Security analysts can move past traditional Indicators of Compromise from threat intel like domains, hashes, URLs, and IP addresses. These indicators typically aren't valid shortly after the incidents happen. Modern threat hunting by doing things like reading recent and relevan…
 
Ok, ok, I know. I almost always say something like "Today is my favorite tale of pentest pwnage." And guess what? Today is my favorite tale of pentest pwnage, and I don't even know how it's going to end yet, so stay tuned to next week's (hopefully) exciting conclusion. For today, though, I've got some pentest tips to hopefully help you in your jour…
 
This week I explain some vital pfSense firewall modifications and offer a tip to prevent website chat apps from launching.Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and Open Source Intelligence Techniques (9th Edition). More details can be found at IntelTec…
 
#SecurityConfidential #DarkRhinoSecurity Joshua is the CISO at H&R Block. He has deep experience in designing and building information security programs. He is an expert on Zero Trust. His approach to information security is to transparently support and drive business initiatives, leveraging security capabilities to differentiate companies from the…
 
Welcome back to Source Code, Decipher’s weekly news wrap podcast with input from our sources. This week, the U.S. government announced sanctions against the Tornado Cash cryptocurrency mixer. In other news, Black Hat kicked off with keynotes from former CISA director Chris Krebs and investigative journalist Kim Zetter.…
 
Printer, Patches und Praxis Security-Insider Podcast - Folge 58: #AllesAnzünden. Mit Druckertinte. Printer, Patches und Praxis In der neuen Folge des Security-Insider Podcast greifen wir diesmal vorschnell totgesagte Themen auf und rücken die Argumente zur Cybersicherheitsagenda des BMI zurecht. Angesichts teils martialischer Wortmeldungen aus der …
 
Overview Finally, Ubuntu 22.04.1 LTS is released and we look at how best to upgrade,plus we cover security updates for NVIDIA graphics drivers, OpenJDK,Django, libxml, the Linux kernel and more. This week in Ubuntu Security Updates 52 unique CVEs addressed [USN-5547-1] NVIDIA graphics drivers vulnerabilities [00:43] 3 CVEs addressed in Bionic (18.0…
 
Following in the footsteps of an attacker and uncovering their digital footprints, this episode will uncover an attacker’s techniques used and how they went from zero to full domain admin compromise, which resulted in a nasty ransomware incident. It will also cover general lessons learned from Ransomware Incident Response. Visit https://www.securit…
 
We welcome the infamous Eclypsium security researchers Mickey and Jesse to talk about Secure Boot vulnerabilities. They walk us through the history of Secure Boot, how it works, previous research they've performed ("Boothole"), and some details on their current research presented at Defcon this year in a talk titled "One bootloader to rule them all…
 
We start off the show this week by welcoming the infamous Eclypsium security researchers Mickey and Jesse to talk about Secure Boot vulnerabilities. They walk us through the history of Secure Boot, how it works, previous research they've performed ("Boothole"), and some details on their current research presented at Defcon this year in a talk title…
 
Are the isogenies kaput?! There's a new attack that breaks all the known parameter sets for SIDH/SIKE, so Steven Galbraith helps explain where the hell this came from, and where isogeny crypto goes from here. Transcript: https://share.descript.com/view/Xiv307FvOPA Merch: https://merch.scwpodcast.com Links: https://eprint.iacr.org/2022/975.pdf https…
 
In the Security News, key fob hacks and stealing cars, the best Black hat and defcon talks of all-time, open redirects are still open, the keys to decrypt the wizard of oz are in a strange place, why the Linux desktop sucks, why businesses should all switch to Linux desktops, SGX attacks, let me send you an Uber to take you to the bank, 27-factor a…
 
In this episode of the National Security Podcast, Professor Joanne Wallis and Adjunct Professor Ian Kemish AM join Nicola Rosenblum to discuss the future of Australian diplomacy in the Pacific. It’s been a busy year for diplomacy in the Pacific, with visits to multiple countries by China’s Foreign Minster Wang Yi and Australia’s newly-minted Foreig…
 
Memories of the Blaster worm. Slack leaked password hashes for FIVE YEARS. Github showered with malware. Traffic lights and cybersecurity. Post-quantum cryptography.https://nakedsecurity.sophos.com/slack-admits-to-leaking-hashed-passwordshttps://nakedsecurity.sophos.com/github-blighted-by-researcherhttps://nakedsecurity.sophos.com/traffic-light-pro…
 
This week, Alan, Quinta, and Scott were joined by special guest Ravi Agrawal, editor-in-chief of Foreign Policy magazine, to hash through the week's big national security news, including: “Canned Strategy.” The war in Ukraine and tensions over Taiwan have led the Biden administration to further revise its long overdue National Security Strategy, wh…
 
Security magazine sits down with Meg West, cybersecurity influencer and X-Force Cybersecurity Incident Response Consultant, to answer reader questions about cybersecurity strategy, career moves and emerging threats. Listen to this AMA (Ask Me Anything) series premiere for cyberattack insights, a candid conversation about burnout and more!…
 
Picture of the Week. Crypto is Hard. VirusTotal: Deception at a scale. Windows 11 might damage encrypted data. Microsoft Defender External Attack Surface Management. Closing The Loop. Daniel Bernstein sues the NSA. The Maker's Schedule. We invite you to read our show notes at https://www.grc.com/sn/SN-883-Notes.pdf Hosts: Steve Gibson and Leo Lapor…
 
"In order for us to meet our end objective of risk mitigation on software and applications, we have to get the developers on our side. If you do not collaborate with the developers, you're not going to be able to manage that risk" Tune in this week as Jen Stone and Harshil Parikh discuss how to eliminate friction between development and security. L…
 
Threat Intelligence-Based Ethical Red-teaming In most organisations, there’s more to security than preventive measures. This means that testing your capabilities within detection, investigation and containment can be just as relevant as looking at preventive capabilities. One way of doing so, is by following the Threat Intelligence Based Ethical Re…
 
In this episode of the Virtual Coffee with Ashish edition, we spoke with Karthik Ramamoorthy (Karthik's Linkedin) about Container security with NIST Framework for financial services organizations. Episode ShowNotes, Links and Transcript on Cloud Security Podcast: www.cloudsecuritypodcast.tv Host Twitter: Ashish Rajan (@hashishrajan) Guest Twitter: …
 
Join me for a great conversation with Aaron Painter, the CEO of Nametag Inc, on the future of authentication and "Sign in with ID" as a more trusted alternative to passwords and device-based authentication.Jon McLachlan
 
Pornhub has a problem, the UK's Co-op supermarket is accused of big brother tactics, and we take a look at a security researcher's attempt to reveal the true identify of hackers. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined …
 
Interview links Learn all about Defaultinator. Read up on the Raspberry Pi default password vulnerability. Check out the GitHub repositories for Defaultinator. Rapid Rundown links Read Derek Abdine's disclosures on Arris and Arris-like routers. Check out the Security Boulevard article on keeping PoCs secret. Peruse Matt Blaze’s tweet thread on teac…
 
ORIGINALLY AIRED ON JULY 25, 2022 Articles discussed in this episode: 00:00 – BHIS – Talkin’ Bout [infosec] News 2022-07-25 03:59 – Story # 1: DOJ seized ransoms paid by […] The post Talkin’ About Infosec News – 8/1/2022 appeared first on Black Hills Information Security.Black Hills Information Security
 
We speak with Daniel O’Toole, Senior Adviser for Space within the Sector Team for Defence, Space and Infrastructure at the Australian Trade and Investment Commission (Austrade). In addition to his role at Austrade, Daniel has also served as partial secondee at the Australian Space Agency since 2018. In this capacity he works on joint Austrade-Space…
 
https://www.bleepingcomputer.com/news/security/cosmicstrand-uefi-malware-found-in-gigabyte-asus-motherboards/ https://www.bleepingcomputer.com/news/security/hackers-scan-for-vulnerabilities-within-15-minutes-of-disclosure/ https://www.techcircle.in/2022/07/31/paytm-mall-refutes-cyber-breach-report-says-users-data-safe…
 
In der IT ist man oft auf der Suche nach der besseren Einstellung. Denn egal ob was schlecht läuft oder nicht, es kann bestimmt optimiert werden. Blöd ist, wenn einem dazu das Handbuch fehlt oder die gewünschte Einstellung überhaupt nie vorgesehen war. Ganzer Beitrag mit allen Links: https://rz10.de/1-noch/perspektive-sap-it-juli-2022/ Viel Spaß eu…
 
Surf Kahuna (Ryan Chapman) shares his origin story about a series of events that occurred on AOL that rocked his world and led him down the path of digital forensics. Then Steve and Ryan talk espionage, multiple Advanced Persistent Threats, retro gaming, password spraying, ransomware, and what has helped Ryan be successful in Infosec. Guest: Surf K…
 
Loading …

Короткий довідник

Google login Twitter login Classic login