Novinky Magazín Security
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
世界最大の通信技術企業の一つベライゾンがグローバルな視点から、インターネットセキュリティーの今を伝えるプログラム。企業の情報セキュリティ担当者やリモート在宅ワーカーに向け、サイバー攻撃やネット犯罪から身を守るための様々な情報をVerizon Japan Sr Solutions Principal-Security Prod Sales 森マークがお届けします。 最近気になったサイバーニュースなどがあればメッセージフォームから是非お送りください! みなさんからのメッセージお待ちしてます。 https://form.audee.jp/websecurity/message
…
continue reading
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Podcasts on security, militancy, conflict, International Relations, and more.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
…
continue reading
Learn how to think not what to think.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
The Security Matters Podcast is published monthly and hosted by the magazine’s Editor Brian Sims. In each episode, Brian reports on and analyses the latest UK security industry news and also interviews leading professionals from the sector. The Security Matters Podcast is sponsored by The Security Event, which takes place on 8-10 April 2025 at the NEC in Birmingham. To register for your free pass to the show visit www.thesecurityevent.co.uk For all the latest security industry news and opini ...
…
continue reading
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading

1
Week in Review: Pentagon’s Chinese Engineers, Gemini’s email phish, 20-year-old railroad flaw persists
32:12
32:12
나중에 재생
나중에 재생
리스트
좋아요
좋아요
32:12Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Cyrus Tibbs, CISO, PennyMac Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatL…
…
continue reading

1
Existential Dread, MCP, Cloudflare, ESXI, QR Codes, Salt Typhoon, Aaran Leyland... - SWN #495
33:42
33:42
나중에 재생
나중에 재생
리스트
좋아요
좋아요
33:42Existential Dread and Seawater, MCP, Cloudflare, ESxi, QR Codes, Salt Typhoon, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-495
…
continue reading
Hey friends, today we start pwning Ninja Hacker Academy – cool CTF-style lab that has you start with no cred and try to conquer domain admin on two domains!
…
continue reading
Helpful episodes to listen to first Don't Let Websites Send You Notifications Give Every Website a Unique Email Questions we answer in this episode What bad stuff can happen when you are browsing a new shopping website? How has browser safety changed over the years? What are 4 rules to stay safe while browsing the web? Episode summary Browsing the …
…
continue reading

1
SANS Stormcast Friday, July 18th, 2025: Extended File Attributes; Critical Cisco ISE Patch; VMWare Patches; Quarterly Oracle Patches
4:55
4:55
나중에 재생
나중에 재생
리스트
좋아요
좋아요
4:55Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
…
continue reading

1
The UNFI Cyberattack: How Hackers Disrupted the U.S. Food Supply Chain
23:30
23:30
나중에 재생
나중에 재생
리스트
좋아요
좋아요
23:30In June 2025, United Natural Foods, Inc. (UNFI)—the primary distributor for Whole Foods and tens of thousands of retailers across North America—suffered a major cyberattack that halted deliveries, emptied shelves, and forced core operations offline. The financial damage? Between $350 and $400 million in net sales lost, and up to $60 million in redu…
…
continue reading
In the security news: The train is leaving the station, or is it? The hypervisor will protect you, maybe The best thing about Flippers are the clones Also, the Flipper Zero as an interrogation tool Threats are commercial and open-source Who is still down with FTP? AI bug hunters Firmware for Russian drones Merging Android and ChromOS Protecting you…
…
continue reading
In episode 426 of the "Smashing Security" podcast, Graham reveals how you can hijack a train’s brakes from 150 miles away using kit cheaper than a second-hand PlayStation. Meanwhile, Carole investigates how Grok went berserk, which didn't stop the Department of Defense signing a contract with Elon’s AI chatbot. So who is responsible when your chatb…
…
continue reading

1
From Cop to CEO: HiveWatch CEO Ryan Schonfeld's Mission to Modernize Security
30:49
30:49
나중에 재생
나중에 재생
리스트
좋아요
좋아요
30:49When Ryan Schonfeld began his security career as a D.C. law enforcement officer, he quickly became frustrated with traditional security methods. Tired of operational inefficiencies and determined to close longstanding security gaps, Schonfeld opted to drag the security industry into the modern day. Join host Steve Lasky on this episode of SecurityD…
…
continue reading
------------------------------------------------------------To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com------------------------------------------------------------SOCIAL MEDIA:Stay connected with us on our social media pages where we'll give you snippets, alerts for new podcasts, and even behind the scenes of o…
…
continue reading

1
Keeping Drupal Running With Static Code Analysis & Lessons From Drupalgeddon - Matt Glaman
20:00
20:00
나중에 재생
나중에 재생
리스트
좋아요
좋아요
20:00In this episode of the Security Repo Podcast, we sit down with Matt Glaman, a veteran developer in the Drupal community, to explore the role of static code analysis in maintaining secure, performant, and upgrade-ready PHP applications. We dive into tools like PHPStan and DrupalCheck, and how they help identify deprecations and prevent security risk…
…
continue reading
This week, Scott sat down with his Lawfare colleagues Benjamin Wittes and Eric Ciaramella to talk through the week’s big national security news stories, including: “With Arms Wide Open.” After years of open skepticism toward Ukraine (and uncharacteristic deference to Russia), it seems President Trump may have turned a page. His rhetoric has grown c…
…
continue reading

1
EP 134 From Cartels to Corporates: Meth Labs, Microsoft & Moral Dilemmas with Christopher Macolini DEA Veteran and Security Professional
47:15
47:15
나중에 재생
나중에 재생
리스트
좋아요
좋아요
47:15Send us a text "It wasn’t just about drugs — it was about removing violence from communities. That’s when you knew you were really doing good." – Christopher Macolini BIO Christopher T. Macolini is a recognized expert in investigations and security throughout Latin America, bringing nearly three decades of combined law enforcement and private-secto…
…
continue reading

1
Minimize SAP Migration Challenges, Cybersecurity Maturity, and Radical Transparency - Christopher Carter - BSW #404
58:31
58:31
나중에 재생
나중에 재생
리스트
좋아요
좋아요
58:31Are you running SAP? The clock is ticking... Standard maintenance end-of-life is set for the end of 2027. Migration to S/4HANA must be completed by then (or 2030 if you buy into SAP’s special three-year reprieve). While that may appear to be enough time, companies currently working toward an S/4HANA transition are finding the journey challenging, a…
…
continue reading

1
Lily Hamourtziadou, "Body Count: The War on Terror and Civilian Deaths in Iraq" (Bristol UP, 2021)
31:00
31:00
나중에 재생
나중에 재생
리스트
좋아요
좋아요
31:00Body Count: The War on Terror and Civilian Deaths in Iraq (Bristol University Press, 2021), Lily Hamourtziadou’s investigation into civilian victims during the conflicts that followed the US-led coalition’s 2003 invasion of Iraq provides important new perspectives on the human cost of the War on Terror. From early fighting to the withdrawal and ret…
…
continue reading

1
SN 1034: Introduction to Zero-Knowledge Proofs - Taking Down Quantum Factorization
2:55:37
2:55:37
나중에 재생
나중에 재생
리스트
좋아요
좋아요
2:55:37A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction t…
…
continue reading

1
Windows Kernel & AV/EDR, BSOD Rebrand, Easier 3rd Party Updates
23:26
23:26
나중에 재생
나중에 재생
리스트
좋아요
좋아요
23:26Summary In this episode of the Blue Security Podcast, hosts Andy and Adam discuss significant updates from Microsoft, focusing on security enhancements, the evolution of the blue screen of death, and new options for consumers regarding extended security updates. They also explore a new update orchestration platform aimed at improving the user exper…
…
continue reading
In this episode of Socializing Security, the hosts discuss the importance of trusting retailers when shopping online. They explore various strategies for evaluating the credibility of websites, the significance of payment methods in ensuring security, and the necessity of protecting personal information. The conversation also highlights warning sig…
…
continue reading
Want to support us? Want even MORE DefSec? Starting this week, we are providing more DefSec for our Patreon donors. Sign up to be a Patreon donor today: https://www.patreon.com/defensivesec Links: https://www.theregister.com/2025/07/10/cisa_citrixbleed_kev/ https://www.axios.com/2025/07/08/scattered-spider-cybercrime-hackers https://www.bleepingcom…
…
continue reading
Security orchestration sounds great in theory, but in practice, coordinating between different security tools remains a headache. As workflows need to move faster to keep pace with AI-driven attacks, security professionals find themselves overwhelmed with manual "muck work" rather than focusing on business enablement. In this episode, Matt Muller, …
…
continue reading
Sie beschäftigen Gerichte, Sicherheitsdienstleister und den deutschen Verfassungsschutz: Nordkoreanische Akteure, die auf dem IT-Arbeitsmarkt ihr Unwesen treiben und sich für Kim Jong-Uns Volksrepublik (DPRK) an Gehaltstöpfen oder Daten westlicher Unternehmen bedienen wollen. Welche Gefahr von den potentiellen Schläfern ausgeht, klären wir in unser…
…
continue reading

1
Monzy Merza, How Much AI is Too Much, and the Weekly News - Monzy Merza - ESW #415
1:43:41
1:43:41
나중에 재생
나중에 재생
리스트
좋아요
좋아요
1:43:41Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' p…
…
continue reading
最近のサイバー関連のニュースから気になるトピックを、 マークさんの視点でいくつか解説してきます。 ・情報セキュリティ10大脅威 個人篇 https://www.ipa.go.jp/security/10threats/eid2eo0000005231-att/kaisetsu_2025_kojin.pdf ・160億件のログイン情報流出 https://news.yahoo.co.jp/articles/301d83ae61b352a823182842fe908bffe791ade2 ・電話を使用したフィッシング詐欺 https://xtech.nikkei.com/atcl/nxt/column/18/00989/042200175/…
…
continue reading

1
Social Engineering, Career Development and Octopus Game: Insights from Eddie Miro
26:41
26:41
나중에 재생
나중에 재생
리스트
좋아요
좋아요
26:41Send us a text Eddie Miro joins us as a guest on the Security Chipmunks podcast, a social engineer, cybersecurity pro and a community leader, Eddie shares tips and advice for cybersecurity newcomers, shares his past and talks about the competition Octopus Game. At the heart of Eddie's current work is his involvement with DEF CON, where he runs "Oct…
…
continue reading

1
Ep. 10 - The Data Beneath the Breach: Analyzing Francis Odum’s Latest Report
19:36
19:36
나중에 재생
나중에 재생
리스트
좋아요
좋아요
19:36In Episode 10, we take an in-depth look at the latest report from cybersecurity researcher Francis Odum, uncovering the key insights behind the numbers. We discuss: How third-party and credential-based risks are evolving What the report reveals about attacker tactics and system intrusion trends The growing risk surface of browsers and unmanaged end…
…
continue reading
A 4th of July was had by both. An extension hijacking campaign that infected as many as 2.3 million users and software to protect the small web from AI scrapers with computational overhead. For fun we have car tipping (off a cliff!?), and evidence for even more water on Mars. 0:00 - Intro 13:06 - Hijacking Campaign 16:33 - Weighing the Soul of the …
…
continue reading
Call of Duty: WW2 pulled from PC following reports of remote code exploit trolling players with 'Notepad pop-ups, PC shutdowns' and desktop wallpaper of a lawyer저자 Carl Franklin
…
continue reading
PODCAST | Pakistan terrorism review | Ep # 447 (Urdu)
…
continue reading
In this episode, Michael, Sarah and Mark talk to Den Delimarksy about the current posture of Model Context Protocol. Den serves on the committee that oversees MCP. We also cover the latest security news about Azure Firewall, OpenTelemetry, Azure Front Door, Azure Database for PostgreSQL and Azure Kubernetes Service. https://aka.ms/azsecpod…
…
continue reading
Who are you? This episode dives into one of the most challenging cybersecurity topics currently on the docket – identity management. My conversation with Brandon Traffanstedt, Sr. Director and Global Technology Officer at CyberArk, took us in two equally important directions. The first deals with individuals and how to properly manage those accessi…
…
continue reading

1
EP2154: Forensic Day - The road of CyberSecurity Analyst Tier1
17:14
17:14
나중에 재생
나중에 재생
리스트
좋아요
좋아요
17:14Sponsor by SEC Playground
…
continue reading
Episode 35 of the Security Matters Podcast is framed by two exclusive interviews. Brian hears from Claire Humble (chair of The UK’s Security Commonwealth and founder and CEO of Nuology) and Paul Lotter (managing director of security guarding solutions specialist Corps Security). Claire turns her attentions towards several key subjects including The…
…
continue reading