Podcasts about Cyber

  • 8,535PODCASTS
  • 31,796EPISODES
  • 35mAVG DURATION
  • 6DAILY NEW EPISODES
  • Sep 1, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories




    Best podcasts about Cyber

    Show all podcasts related to cyber

    Latest podcast episodes about Cyber

    Murphy, Sam & Jodi
    FLASHBACK: MONDAY 9/1: Ms. Judy's wisdom on her 86th birthday / Should you cyber-snoop before a date? / Best treats for an overweight dog

    Murphy, Sam & Jodi

    Play Episode Listen Later Sep 1, 2025 32:12


    Sam's mom, Ms. Judy, shares some wisdom with us on her 86th birthday!How MUCH should you cyber-snoop a person before a date?!The best treats for an overweight dog.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    David Bombal
    #506: ZERO Coding: How She Broke Into Cyber

    David Bombal

    Play Episode Listen Later Sep 1, 2025 28:22


    To try everything Brilliant has to offer for free for a full 30 days, visit https://brilliant.org/davidbombal or scan the QR code onscreen – You'll also get 20% off an annual premium subscription. Recorded at Black Hat with David Bombal, this conversation with Caitlin Sarian (@CybersecurityGirl) traces her path from aerospace engineering and LA Galaxy cheerleading to cybersecurity leader and viral creator. She explains how posting 3×daily on TikTok led to ~500K followers and a role at TikTok (global cybersecurity advocacy & culture), why she left after a year, and how she's now helping others via Cyber Career Club. // Caitlin Sarian's SOCIALS // Website: https://www.cybersecuritygirl.com/ Instagram: / cybersecuritygirl YouTube: / cybersecuritygirl LinkedIn: / caitlin-sarian TikTok: / cybersecuritygirl // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming Up 0:29 - Intro 01:01 - Brilliant Ad 02:22 - Caitlin's History with TikTok 06:25 - Caitlin's Story 10:19 - Caitlin's Professional Journey 18:09 - How to be an Influencer 19:42 - Why you Need a Team 21:22 - Why you Need to Network 23:58 - All the Areas of Cyber 24:49 - Caitlin's Advice to her Younger Self 27:22 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. #cybersecurity #blackhat #cybersecuritygirl

    Defence Connect Podcast
    CYBER UNCUT: OpenAI under fire, WSU cyber attack update, and letters of marque for hackers

    Defence Connect Podcast

    Play Episode Listen Later Sep 1, 2025 42:53


    In this episode of the Cyber Uncut podcast, David Hollingworth and Daniel Croft discuss a pair of lawsuits targeting ChatGPT's maker, cyber crime news, and one US politician's novel solution to combat hackers. Hollingworth and Croft kick things off by addressing a pair of lawsuits targeting OpenAI and the tragic case of a teenager who was allegedly aided in their suicide by ChatGPT's advice. The pair then catch up with the latest news: from a string of cyber attacks that targeted Western Sydney University to Google's warning of increased Iranian cyber attacks and a round-up of this week's local ransomware attacks targeting Aussie businesses. Hollingworth and Croft end the podcast discussing Australia's “right to disconnect” laws and the bold plan of one American politician to bring back the Age of Sail's letters of marque to recruit cyber privateers. Enjoy the episode, The Cyber Uncut team

    AFT Construction Podcast
    Protecting Builders and Mitigating Risk with Tyler Woodruff

    AFT Construction Podcast

    Play Episode Listen Later Aug 31, 2025 60:26


    Sponsors:• ◦ Visit Buildertrend to get a 60-day money-back guarantee on your Buildertrend account• ◦ Marvin Windows and Doors• ◦ Sub-Zero Wolf Cove Showroom PhoenixConnect with Tyler Woodruff:https://www.leavitt.com/woodruff/staff/tyler-woodruffConnect with Brad Leavitt:Website | Instagram | Facebook | Houzz | Pinterest | YouTube

    Better Than Sex Podcast
    Episode 208: Cerebral!

    Better Than Sex Podcast

    Play Episode Listen Later Aug 31, 2025 116:51


    On this episode of SDP TopicsYoung Thug “snitch” accusations Will Smith A.I concerts.Bel Air trailer comingCardi be testimony in courtSkip bayless & Gilbert arenas new showDJ Khaled dropped new singlesNetflix docs - Jussie- Degrassi Doc- Dallas cowboys - The biggest loser doc - Cyber bully catfish doc Boosie pleads guiltyMichah Parsons to the packers Drake fake death Row chainDrake vs Rob MarkmanMark Wahlberg & Lakeith StanfeildMakkonan working in the kitchen Pat Mahomes stalkers

    Serious Privacy
    Mish mash a privacy splash

    Serious Privacy

    Play Episode Listen Later Aug 30, 2025 27:59


    Send us a textOn this episode of seriousprivacy, Paul Breitbarth is away, so Ralph O' Brien and Dr. K Royal bring you a mish mash week in privacy. Topics include current news and a little bit about the differences in GDPR compliance vs what the US privacy laws require.  If you have comments or questions, find us on LinkedIn and Instagram @seriousprivacy, and on BlueSky under @seriousprivacy.eu, @europaulb.seriousprivacy.eu, @heartofprivacy.bsky.app and @igrobrien.seriousprivacy.eu, and email podcast@seriousprivacy.eu. Rate and Review us! From Season 6, our episodes are edited by Fey O'Brien. Our intro and exit music is Channel Intro 24 by Sascha Ende, licensed under CC BY 4.0. with the voiceover by Tim Foley.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Friday, August 29th, 2025: Scans for ZIP Files; FreePBX 0-Day; Passwordstate Patch

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Aug 29, 2025 5:45


    Increasing Searches for ZIP Files Attackers are scanning our honeypots more and more for .zip files. They are looking for backups of credential files and the like left behind by careless administrators and developers. https://isc.sans.edu/diary/Increasing%20Searches%20for%20ZIP%20Files/32242 FreePBX Vulnerability An upatched vulnerability in FreePBX is currently being exploited. FreePBX offers mitigation advice and has also just released a beta patch. https://community.freepbx.org/t/security-advisory-please-lock-down-your-administrator-access/107203 Passwordstate Vulnerability Clickstudios patched an authentication bypass vulnerability in its password manager, Passwordstate. The vulnerability can be used to access the emergency password page. https://www.clickstudios.com.au/passwordstate-changelog.aspx

    Security Conversations
    Salt Typhoon IOCs, Google floats ‘cyber disruption unit', WhatsApp 0-click

    Security Conversations

    Play Episode Listen Later Aug 29, 2025 144:48


    Three Buddy Problem - Episode 60: We dissect a fresh multi-agency Salt Typhoon advisory (with IOCs and YARA rules!), why it landed late, why the wall of logos matters (and doesn't), and what's actually usable for defenders: new YARA, tool hashes, naming ambiguity across reports, the mention of Chinese vendors, and a Dutch note that smaller ISPs were hit. Plus, Costin details his hunting stack and philosophy (historic IOC/malware hoarding, fast pivots, and AI as analyst “wingman”) and a new Chinese APT report that may intersect with LightBasin and the murky PSOA world. We also debate Google's proposed “cyber disruption unit” versus Microsoft's DCU (legal vs. “ethical” takedowns, PR, and business models); react to Anthropic's report on real attacker use of Claude; note Amazon's APT29 watering-hole disruption; and close on a fresh WhatsApp-to-ImageIO zero-click chain and practical phone OPSEC. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).

    No Fluff MSP Marketing
    How Mike at Iceberg Cyber grew 500% in One Year!

    No Fluff MSP Marketing

    Play Episode Listen Later Aug 29, 2025 57:10


    Mike at Iceberg Cyber was struggling to find product market fit...He wasn't growing the way he wanted to.He decided to buckle down and learn all about marketing despite his technical background. He paired that with actually listening to his target market. That combination created a massive boom in his business - up 500% in a single year!Mike is a great dude and a good friend now. He was gracious enough to come visit our office while he was in Florida, so we had to get a podcast in!

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Thursday, August 28th, 2025: Launching Shellcode; NX Compromise; Volt Typhoon Report

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Aug 28, 2025 6:39


    Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallets and Credentials The popular open source NX build package was compromised. Code was added that uses the help of AI tools like Claude and Gemini to steal credentials from affected systems https://semgrep.dev/blog/2025/security-alert-nx-compromised-to-steal-wallets-and-credentials/ Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed the Global Espionage System Several law enforcement and cybersecurity agencies worldwide collaborated to release a detailed report on the recent Volt Typhoon incident. https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-239a

    The Tom Barnard Show
    Saint Paul got hacked? People are falling in love with AI? It's time to summon Cyber Sports Limited once again - #2840

    The Tom Barnard Show

    Play Episode Listen Later Aug 28, 2025 84:24


    For some completely unknown reason, we're morose today. So let's talk about dementia, CTE, and ransomware. Hey, they're important topics. We also talk about Naked Gun, so it's not all doom and gloom. One day we may even watch it.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

    Cyber Briefing
    August 28, 2025 - Cyber Briefing

    Cyber Briefing

    Play Episode Listen Later Aug 28, 2025 8:52


    If you like what you hear, please subscribe, leave us a review and tell a friend!

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Wednesday, August 27th, 2025: Analyzing IDNs; Netscaler 0-Day Vuln; Git Vuln Exploited;

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Aug 27, 2025 5:43


    Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabilities CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424 Citrix patched three vulnerabilities in Netscaler. One is already being exploited https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938&articleTitle=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2025_7775_CVE_2025_7776_and_CVE_2025_8424 git vulnerability exploited (CVE-2025-48384) A git vulnerability patched in early July is now being exploited https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9

    Joey Pinz Discipline Conversations
    #713 ChannelCon-Mathias Zeumer:

    Joey Pinz Discipline Conversations

    Play Episode Listen Later Aug 27, 2025 40:57 Transcription Available


    Send us a textWhat do cooking steaks, German football, and MSP automation have in common? In this enriching episode, Joey Pinz chats with Mathias Zeumer about how life in the kitchen, yoga, and cybersecurity intersect in surprising ways. From 10 summers in a private club to managing human risk in the digital world, Mathias brings a grounded, practical philosophy to everything he does.

    Joey Pinz Discipline Conversations
    #714 ChannelCon-Chris Loehr:

    Joey Pinz Discipline Conversations

    Play Episode Listen Later Aug 27, 2025 40:38 Transcription Available


    Send us a textIn this action-packed episode, Joey Pinz sits down with cybersecurity veteran and ex-MSP operator Chris Loehr. From his early days as a two-footed soccer midfielder to leading Solis Security through complex ransomware response cases, Chris shares insights forged in both cleats and crisis. ⚽

    Joey Pinz Discipline Conversations
    #719 ChannelCon-Nadav Shenker: From SCUBA to Secure Email: A CEO's Refreshing Take on Cyber

    Joey Pinz Discipline Conversations

    Play Episode Listen Later Aug 27, 2025 39:37 Transcription Available


    Send us a textIn this refreshingly candid episode of the Joey Pinz Discipline Conversations podcast, Joey dives deep with Nadav Shenker, CEO of Vircom, a leading provider of email security solutions.

    Joey Pinz Discipline Conversations
    #723 ChannelCon-Stan Ivanov: From Guitar Riffs to Red Teams: Automating Pen Tests with Purpose

    Joey Pinz Discipline Conversations

    Play Episode Listen Later Aug 27, 2025 39:58 Transcription Available


    Send us a textIn this thoughtful episode of the Joey Pinz Conversations podcast, Joey sits down with Stan Ivanov, founder and  CTO of ThreatMate, to explore a decades-long journey through software development, entrepreneurship, and personal evolution.

    Profiles in Risk
    Lucas Roberts, Wholesale Broker at Anzen Insurance - PIR Ep. 729

    Profiles in Risk

    Play Episode Listen Later Aug 27, 2025 21:55


    Tony chats with Lucas Roberts, Wholesale Broker at Anzen Insurance, they aim to offer the best technology combined with the best wholesale broker offering Cyber, Specialty Commercial, E&O, D&O and EPLI. Their software analyzes submission data and allows sending to various markets in one click while still having a broker that can really walk you through difficult risks.Lucas Roberts: https://www.linkedin.com/in/lucas-roberts-a70612a5/Anzen Insurance: https://anzen.com/

    This Week in Health IT
    Interview In Action: Threat Defense Centers and Cyber Communities with Dan Dodson

    This Week in Health IT

    Play Episode Listen Later Aug 27, 2025 17:10 Transcription Available


    August 27, 2025: Dan Dodson, CEO of Fortified Health Security, discusses how healthcare organizations are rethinking cybersecurity strategy amid mounting financial pressures. Dan shares insights from their Nashville Executive Briefing Center, where healthcare leaders are uncovering critical gaps in their security programs. As AI tools spread faster than anyone anticipated—with physicians using platforms that security experts haven't even heard of—how do organizations balance innovation with control? With Medicare cuts looming and every cybersecurity dollar representing money moved away from patient care, are healthcare systems getting real value from their fragmented tool investments?  Key Points: 01:31 Executive Briefing Center Experience 06:27 Cyber Survivor Podcast 11:02 Midyear Horizon Report Insights 13:47 Lightning Round Questions X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer

    Cybercrime Magazine Podcast
    Mastering Cyber. Protect Your Boarding Pass. Alissa “Dr Jay” Abdullah, Deputy CSO, Mastercard.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Aug 27, 2025 1:28


    Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/en-us.html

    UNSECURITY: Information Security Podcast
    Unsecurity Episode 245: DEF CON Recap w/ Matt Dowd, Matt Findlay, Pinky Thompson

    UNSECURITY: Information Security Podcast

    Play Episode Listen Later Aug 27, 2025 30:35


    Returning from this year's DEF CON, hear from our Offensive Team Managers, Dowd and Findlay, and Pinky, IR Manager and co-host of The Hackle Box. Hear about new highlights, CTF's, and villages, and reflection from Brad as a Blue Team member navigating past challenges. Have something to say? Contact us at unsecurity@frsecure.com and follow us for more!LinkedIn: frsecure Instagram: frsecureofficialFacebook: frsecureBlueSky: frsecureAbout FRSecure: https://frsecure.com/ FRSecure is a mission-driven information security consultancy headquartered in Minneapolis, MN. Our team of experts is constantly developing solutions and training to assist clients in improving the measurable fundamentals of their information security programs. These fundamentals are lacking in our industry, and while progress is being made, we can't do it alone. Whether you're wondering where to start, or looking for a team of experts to collaborate with you, we are ready to serve.

    Cyber Briefing
    August 27, 2025 - Cyber Briefing

    Cyber Briefing

    Play Episode Listen Later Aug 27, 2025 8:52


    If you like what you hear, please subscribe, leave us a review and tell a friend!

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Tuesday, August 26th, 2025: Decoding Word Reading Location; Image Downscaling AI Vulnerability; IBM Jazz Team Server Vuln

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Aug 26, 2025 5:01


    Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%20Value%20in%20Microsoft%20Word%20Documents/32224 Weaponizing image scaling against production AI systems AI systems often downscale images before processing them. An attacker can create a harmless looking image that would reveal text after downscaling leading to prompt injection https://blog.trailofbits.com/2025/08/21/weaponizing-image-scaling-against-production-ai-systems/ IBM Jazz Team Server Vulnerability CVE-2025-36157 IBM patched a critical vulnerability in its Jazz Team Server https://www.ibm.com/support/pages/node/7242925

    3 Takeaways
    Space: The Invisible Infrastructure Behind Modern Life — And Its Growing Risks (#264)

    3 Takeaways

    Play Episode Listen Later Aug 26, 2025 20:54 Transcription Available


    Space may look empty, but it's crowded, fragile, and under threat. Former Congresswoman Jane Harman and Lieutenant General (Ret.) Nina Armagno — former U.S. Space Force Director of Staff who oversaw missile warning, satellite operations, and space launches — reveal how satellites quietly keep the world running, and how quickly it could all go dark. Imagine waking up to no internet, no GPS, and no air travel. They share what's happening above our heads, and why we can't afford to ignore it.

    Radio Sweden
    Man found guilty of killing wife, Swedish Radio journalist injured in Gaza hospital attack, new cyber attack, Kiruna Church bell tower moved

    Radio Sweden

    Play Episode Listen Later Aug 26, 2025 2:51


    A round-up of the main headlines in Sweden on August 26th, 2025. You can hear more reports on our homepage www.radiosweden.se, or in the app Sveriges Radio. Presenter/Producer: Kris Boswell.

    Cyber Briefing
    August 26, 2025 - Cyber Briefing

    Cyber Briefing

    Play Episode Listen Later Aug 26, 2025 9:36


    If you like what you hear, please subscribe, leave us a review and tell a friend!

    Security Squawk
    AI Hype, Old-School Cyber Chaos: Ransomware & Breaches Surge

    Security Squawk

    Play Episode Listen Later Aug 26, 2025 43:49


    While everyone obsesses over AI security, the old-school cyber threats are piling up. In this episode of the Security Squawk Podcast, hosts Bryan Hornung and Randy Bryan break down four major incidents that prove ransomware, breaches, and network shutdowns aren't going anywhere. We cover: Nevada state offices crippled by a major security incident Farmers Insurance data breach affecting over 1 million people Data I/O ransomware attack shutting down systems Nissan's design studio breach claimed by the Qilin ransomware gang Plus, we connect the dots to show why ransomware attacks have surged nearly threefold in 2024 — and what businesses need to do to avoid being the next headline. Stay sharp, stay informed, and don't let the AI hype distract you from the real threats hitting businesses every day. ️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! https://streamyard.com/pal/d/65161790...

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Monday, August 25th, 2025: IP Cleanup; Linux Desktop Attacks; Malicious Go SSH Brute Forcer; Onmicrosoft Domain Restrictions

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Aug 25, 2025 6:04


    The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .desktop files used in an attack against Linux Desktops Pakistani attackers are using .desktop files to target Indian Linux desktops. https://www.cyfirma.com/research/apt36-targets-indian-boss-linux-systems-with-weaponized-autostart-files/ Malicious Go Module Disguised as SSH Brute Forcer Exfiltrates Credentials via Telegram A go module advertising its ability to quickly brute force passwords against random IP addresses, has been used to exfiltrate credentials from the person running the module. https://socket.dev/blog/malicious-go-module-disguised-as-ssh-brute-forcer-exfiltrates-credentials Limiting Onmicrosoft Domain Usage for Sending Emails Microsoft is limiting how many emails can be sent by Microsoft 365 users using the onmicrosoft.com domain. https://techcommunity.microsoft.com/blog/exchange/limiting-onmicrosoft-domain-usage-for-sending-emails/4446167

    Risky Business
    Wide World of Cyber: Microsoft's China Entanglement

    Risky Business

    Play Episode Listen Later Aug 25, 2025 45:43


    The Wide World of Cyber podcast is back! In this episode host Patrick Gray chats with Alex Stamos and Chris Krebs about Microsoft's entanglement in China. Redmond has been using Chinese engineers to do everything from remotely support US DoD private cloud systems to maintain the on premise version of the SharePoint code base. It's all blown up in the press over the last month, but how did we get here? Did Microsoft make these decisions to save money? Or was it more about getting access to the Chinese market? And how can we all make the world's most important software company stop doing things like this? Tune in to the Wide World of Cyber podcast to find out! This episode is also available on Youtube. Show notes

    PEBCAK Podcast: Information Security News by Some All Around Good People
    Episode 222 - Germany May Ban Ad Blockers, Jailtime For Crypto Mining Scam, Cybersecurity Insurance Wants CVE Exemptions, Alcohol Consumption Hits All-Time Low

    PEBCAK Podcast: Information Security News by Some All Around Good People

    Play Episode Listen Later Aug 25, 2025 54:10


    Welcome to this week's episode of the PEBCAK Podcast!  We've got four amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   Please share this podcast with someone you know!  It helps us grow the podcast and we really appreciate it!   Germany may ban adblockers https://www.bleepingcomputer.com/news/legal/mozilla-warns-germany-could-soon-declare-ad-blockers-illegal/   Nebraska man gets jailtime for crypto mining scam https://www.bleepingcomputer.com/news/security/nebraska-man-gets-1-year-in-prison-for-35m-cryptojacking-scheme/   Cyber insurers want CVE exemptions https://www.darkreading.com/cyber-risk/cyber-insurers-may-limit-payments-breaches-unpatched-cve   Drinking alcohol in the US hits all time low https://news.gallup.com/poll/693362/drinking-rate-new-low-alcohol-concerns-surge.aspx   Dad Joke of the Week (DJOW)   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Michael - https://www.linkedin.com/in/michael-chen-82098a2/

    Cloud Security Podcast by Google
    EP240 Cyber Resiliency for the Rest of Us: Making it Happen on a Real-World Budget

    Cloud Security Podcast by Google

    Play Episode Listen Later Aug 25, 2025 29:25


    Guest: Errol Weiss, Chief Security Officer (CSO) at Health-ISAC Topics: How adding digital resilience is crucial for enterprises? How to make the leaders shift from “just cybersecurity“  to “digital resilience”? How to be the most resilient you can be given the resources? How to be the most resilient with the least amount of money? How to make yourself a smaller target? Smaller target measures fit into what some call “basics.”  But “Basic” hygiene is actually very hard for many. What are your top 3 hygiene tips for making it happen that actually work? We are talking about under-resources orgs, but some are much more under-resourced, what is your advice for those with extreme shortage of security resources? Assessing vendor security - what is most important to consider today in 2025?  How not to be hacked via your vendor? Resources: ISAC history (1998 PDD 63) CISA Known Exploited Vulnerabilities Catalog Brian Krebs blog Health-ISAC Annual Threat Report  Health-ISAC Home  Health Sector Coordinating Council Publications Health Industry Cybersecurity Practices 2023 HHS Cyber Performance Goals (CPGs)  10 ways to make cyber-physical systems more resilient EP193 Inherited a Cloud? Now What? How Do I Secure It? EP65 Is Your Healthcare Security Healthy? Mandiant Incident Response Insights EP49 Lifesaving Tradeoffs: CISO Considerations in Moving Healthcare to Cloud EP233 Product Security Engineering at Google: Resilience and Security EP204 Beyond PCAST: Phil Venables on the Future of Resilience and Leading Indicators

    The Daily Scoop Podcast
    Lawmakers take aim at education requirements for federal cyber jobs; Navy to buy autonomous maritime drones from Saronic via $392M OTA

    The Daily Scoop Podcast

    Play Episode Listen Later Aug 25, 2025 4:55


    The top lawmakers on a key House cybersecurity panel are hoping to remove a barrier to entry for cyber jobs in the federal government. Introduced last week, the Cybersecurity Hiring Modernization Act from Reps. Nancy Mace, R-S.C., and Shontel Brown, D-Ohio, would prioritize skills-based hiring over educational requirements for cyber jobs at federal agencies. Mace and Brown — the chair and ranking member of the House Oversight Cybersecurity, Information Technology, and Government Innovation Subcommittee, respectively — said the legislation would ensure the federal government has access to a “broader pool of qualified applicants” as the country faces “urgent cybersecurity challenges.” Mace said in a press release Thursday: “As cyber threats against our government continue to grow, we need to make sure our federal agencies hire the most qualified candidates, not just those with traditional degrees. This bill cuts red tape, opens doors to skilled Americans without a four-year diploma but with the expertise to get the job done, and strengthens our nation's cybersecurity workforce.” Brown said in a statement that expanding the cyber workforce is “imperative” to “meet our nation's growing need for safe and secure systems.” The bill aims to “remove outdated hiring policies, expand workforce opportunities to a wider pool of talented applicants, and help agencies hire the staff that they need,” she added. The bill calls on the Office of Personnel Management to annually publish any education-related changes that are made to minimum qualification requirements for federal cyber roles. OPM would also be charged with aggregating data on educational backgrounds of new hires for those cyber positions. Texas-based defense startup Saronic Technologies will produce multiple batches of autonomous maritime drones for the U.S. Navy by mid-2031 under an other transaction agreement (OTA) worth more than $392 million, according to officials and public contracting documents viewed by DefenseScoop. Details are sparse regarding the specific features, types and quantities of unmanned vessels Saronic will deliver — but they'll likely mark a major component of the Navy's AI-enabled, hybrid fleet that's being designed to counter security threats in and around the Pacific. OTA contract vehicles offer Defense Department buyers more flexibility and speed than traditional Federal Acquisition Regulation-based acquisitions. They're a key element in the Navy's broader plan to modernize and incentivize accelerated technology adoption to prepare for future fights. According to records posted on the Federal Procurement Data System, Naval Sea Systems Command and Saronic Technologies formalized this $392 million OTA — which has a completion date of May 30, 2031 — on May 16. Two months later, in July, NAVSEA made an award to Saronic worth nearly $197 million under the agreement, or about half of the total award ceiling. It's unclear if more awards have been made to date.

    Cyber Briefing
    August 25, 2025 - Cyber Briefing

    Cyber Briefing

    Play Episode Listen Later Aug 25, 2025 9:54


    If you like what you hear, please subscribe, leave us a review and tell a friend!

    Carlton Fields Podcasts
    No Password Required: From Heavy Metal to the Front Lines of Cyber Innovation

    Carlton Fields Podcasts

    Play Episode Listen Later Aug 25, 2025


    Jon Schipp, the “Ric Flair of Cybersecurity,” is the senior director of inorganic growth strategy at Rapid7. Jon mixes cyber technical mastery, business acumen, and stage presence to identity mergers and partnerships for his company's growing cybersecurity platform. He shares his story with hosts Jack Clabby of Carlton Fields and Kayley Melton, executive director of […]

    T-Minus Space Daily
    Spaceports as smart hubs with Parsons.

    T-Minus Space Daily

    Play Episode Listen Later Aug 23, 2025 20:40


    As spaceports evolve into sophisticated hubs for space exploration, the integration of emerging technologies such as digital twins, artificial intelligence (AI), and robust cybersecurity measures is becoming essential for operational success. We speak to Guadalupe Casuso, Vice President, Technology & Innovation / Digital Labs & Strategic Partnerships at Parsons.  You can join Guada and Maria on August 27 for the Global Spaceport Alliance Webinar Spaceports as Smart Hubs. You can also read Guada's article on Harnessing Digital Twins, AI, and Cyber for Smarter Spaceport Operations Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at space@n2k.com to request more info. Want to join us for an interview? Please send your pitch to space-editor@n2k.com and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

    The Doctor's Watcher
    Weather or not to Cyber (or, The Moonbase Episode 3, s04e25)

    The Doctor's Watcher

    Play Episode Listen Later Aug 23, 2025 57:26


    The episode where we attempt to cleanse the earth via weather. Can severe head wounds be good sometimes? In this podcast, we speculate about the BJ ship, and so does Polly. This episode was recorded on 21 June 2025. Email us at thedoctorswatcher@gmail.com. I guess people listen to podcasts on YouTube now? Follow us on Tumblr at the-doctors-watcher. I finally made us a Bluesky account. Check out Circuit 23's music at http://soundcloud.com/circuit23 and email him at circuit.23@gmail.com. Listen to his album “Mens Vermis” at https://circuit23.bandcamp.com/album/mens-vermis.

    The Circuit Magazine Podcast
    Reimagining Security Convergence | Katie Barnett & Gavin Wilson

    The Circuit Magazine Podcast

    Play Episode Listen Later Aug 23, 2025 71:33


    What if convergence wasn't a single security professional but an interoperable partnership? We are delighted to speak with Toro Solution's Cyber lead Katie Barnett and Physical and Corporate Security Lead Gavin Wilson on their amazing partnership and converged service including:How to cross train in other security disciplines for operational successHow to sell converged or interoperable security services to a physical security focused clientWhen to look to a third party to augment your services and when to develop them in houseWhat 'cyber' security actually means and just how technical is it todayAbout Katie:LinkedInAbout Gavin:LinkedInMore about the Circuit:The Circuit Magazine is written and produced by volunteers, most of who are operationally active, working full time in the security industry. The magazine is a product of their combined passion and desire to give something back to the industry. By subscribing to the magazine you are helping to keep it going into the future. Find out more >Newsletter:If you liked this podcast, we have an accompanying weekly newsletter called 'On the Circuit' where we take a deeper dive into the wider industry. Opt in here >The Circuit team is:Jon MossShaun WestPhelim RoweElijah ShawConnect with Us: Circuit MagazineBBA ConnectNABA ProtectorBritish Bodyguard Association

    Breaking Analysis with Dave Vellante
    Cyber is Your #1 Risk and You're Likely Unprepared

    Breaking Analysis with Dave Vellante

    Play Episode Listen Later Aug 23, 2025 41:46


    Breaking Analysis with Dave Vellante, joined by theCube Research Principal Analyst - Cyber Resiliency, Data Protection, Data Management Christophe Bertrand 

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Friday, August 22nd, 2025: The -n switch; Commvault Exploit; Docker Desktop Escape Vuln;

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Aug 22, 2025 6:52


    Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the Commvault enterprise backup solution must patch now after watchTowr released details about recent vulnerabilities https://labs.watchtowr.com/guess-who-would-be-stupid-enough-to-rob-the-same-vault-twice-pre-auth-rce-chains-in-commvault/?123 Docker Desktop Vulnerability CVE-2025-9074 A vulnerability in Docker Desktop allows attackers to escape from containers to attack the host. https://docs.docker.com/desktop/release-notes/#4443

    Resilient Cyber
    Resilient Cyber w/ Michael Bargury - The AI Agent Security Imperative

    Resilient Cyber

    Play Episode Listen Later Aug 22, 2025 30:31


    In this episode I sit down with Michael Bargury, Co-Founder and CTO at Zenity to discuss all things AI Agent Security. Michael and the Zenity team have recently disclosed various AI agent risks, vulnerabilities and threats.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Thursday, August 21st, 2025: Airtel Scans; Apple Patch; Microsoft Copilot Audit Log Issue; Password Manager Clickjacking

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Aug 21, 2025 6:52


    Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerability in ImageIO. https://support.apple.com/en-us/124925 Microsoft Copilot Audit Logs A user retrieving data via copilot obscures the fact that the user may have had access to data in a specific file https://pistachioapp.com/blog/copilot-broke-your-audit-log Password Managers Susceptible to Clickjacking Many password managers are susceptible to clickjacking, and only few have fixed the problem so far https://marektoth.com/blog/dom-based-extension-clickjacking/

    Reboot IT - 501(c) Technology
    From Firewalls to Fail Fests: Lessons in IT Leadership and Security

    Reboot IT - 501(c) Technology

    Play Episode Listen Later Aug 21, 2025 31:36


    In this episode of Reboot IT, host Dave Coriale, President of DelCor, sits down with Adam Kuhn, IT Director and DelCor alum, to discuss the evolving role of IT in associations. From foundational infrastructure to advanced cybersecurity strategies, Adam shares lessons learned from both sides of the fence—being an internal influencer and a business partner. The conversation explores how IT leaders can move beyond “keeping the lights on” to proactively shaping organizational maturity, especially in the face of overwhelming system data and increasing security demands.Summary:Cybersecurity as a Strategic InvestmentCybersecurity tools like Arctic Wolf elevate IT maturity beyond basic infrastructure.Associations must move from reactive to proactive security strategies.Cyber insurance requirements are evolving and often unclear, requiring IT guidance.IT Maturity: From Core Requirements to ElectivesAdam compares IT infrastructure to college coursework—core requirements vs. electives.Core includes cloud migration, Microsoft 365, and basic security tools.Electives like threat detection systems represent strategic growth and investment.Information Overload & the Need for SynthesisDevices generate massive amounts of data that are impossible to interpret manually.Security operations centers help synthesize logs and alerts across systems.IT teams need tools to manage and interpret this data effectively.IT's Role in Business Decision-MakingIT should be a trusted advisor, not a gatekeeper or veto power.Excluding IT from technology selection leads to costly integration surprises.IT's involvement ensures better alignment, risk mitigation, and long-term success.Building Cross-Departmental PartnershipsIT needs access to systems it doesn't own to ensure full security coverage.Business units must understand their role in cybersecurity and collaborate with IT.Partnership is essential—not optional—for organizational safety and resilience.Influencing Leadership & Budget DecisionsIT leaders must make cogent cases for investment in security and infrastructure.Budget support depends on trust and clear communication with leadership.Adam emphasizes gratitude for working in a supportive environment that values IT input.

    Resilient Cyber
    Resilient Cyber w Andrew Carney DARPA AI Cyber Challenge AIxCC

    Resilient Cyber

    Play Episode Listen Later Aug 21, 2025 26:04


    In this episode, I sit down with Andrew Carney, Program Manager for DARPA's AI Cyber Challenge (AIxCC). DARPA's AIxCC recently concluded at Black Hat, and it brought together the industry's leading experts on AI and Cybersecurity with a focus on securing software that is critical to all Americans.Teams had to create novel AI systems to secure critical code, include software involved in critical infrastructure.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Aug 20, 2025 6:07


    Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patches with WSUS. There are also issues with certain SSDs if larger files are transferred. https://learn.microsoft.com/en-us/windows/release-health/status-windows-11-24h2#3635msgdesc https://www.tomshardware.com/pc-components/ssds/latest-windows-11-security-patch-might-be-breaking-ssds-under-heavy-workloads-users-report-disappearing-drives-following-file-transfers-including-some-that-cannot-be-recovered-after-a-reboot SAP Vulnerabilities Exploited CVE-2025-31324, CVE-2025-42999 Details explaining how to take advantage of two SAP vulnerabilities were made public https://onapsis.com/blog/new-exploit-for-cve-2025-31324/

    Dream Rare Podcast by An0maly
    Israeli Cyber Official Flies Back To Israel After Nevada Sting Arrest! Wild Story. Let's Chat.

    Dream Rare Podcast by An0maly

    Play Episode Listen Later Aug 20, 2025 199:03


    The first hour of this stream covers the title story & the last few hours are just a chat with the audience + a stream of consciousness. Hope you enjoy!

    Valuetainment
    "Let Him Go Back To Israel" - Israel Cyber Chief ARRESTED In FBI Sting Sparks COVER-UP Questions

    Valuetainment

    Play Episode Listen Later Aug 19, 2025 14:46


    A senior official from Israel's National Cyber Directorate was arrested in Las Vegas during an FBI sting targeting child exploitation. Charged with luring a minor online, he posted bail and returned to Israel. Patrick Bet-David and the panel react to the case, bail questions, and political ties.

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln;

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Aug 19, 2025 5:10


    Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Center Software RADIUS Remote Code Execution Vulnerability An OS command injection vulnerability may be abused to gain access to the Cisco Secure Firewall Management Center software. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79 F5 Access for Android vulnerability An attacker with a network position that allows them to intercept network traffic may be able to read and/or modify data in transit. The attacker would need to intercept vulnerable clients specifically, since other clients would detect the man-in-the-middle (MITM) attack. https://my.f5.com/manage/s/article/K000152049

    The Patriotically Correct Radio Show with Stew Peters | #PCRadio
    CONFIRMED: Grok NUKED by Israeli Pedophile-Controlled Cyber Group

    The Patriotically Correct Radio Show with Stew Peters | #PCRadio

    Play Episode Listen Later Aug 18, 2025 104:10


    Covid Whistleblower Ian Smith joins Stew to discuss Jewish Pedophiles getting CAUGHT shutting down GROK, and Israel's latest attacks on Americans John Jubilee of Energized Health joins Stew Peters show to discuss why so many Americans feel so weighed down and stuck, physically and in their lives — and how to transform their health and lives completely with My 555 Challenge Paul List, Author of the AI book “Mount Doom,” joins Stew to discuss the latest in the dystopian takeover of AI and the nightmare that is creating for humanity   Western civilization has been infected by a parasitic invasion of foreign ideals and values that have been introduced into our culture by strange and morally degenerate people whose goal is world domination. We have been OCCUPIED. Watch the film NOW! https://stewpeters.com/occupied/

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
    SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln

    SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

    Play Episode Listen Later Aug 18, 2025 5:43


    SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%205G%20Traffic%20Without%20Rogue%20Base%20Stations/32202 Plex Vulnerability Plex patched a vulnerability in the Plex Media Server. Make sure you have updated to at least 1.42.1. https://forums.plex.tv/t/plex-media-server-security-update/928341 FortiWeb Exploit Public A security researcher published details about the recent FortiWeb vulnerability, including demonstrating a PoC exploit. https://www.bleepingcomputer.com/news/security/researcher-to-release-exploit-for-full-auth-bypass-on-fortiweb/ Flowise OS vulnerability https://research.jfrog.com/vulnerabilities/flowise-os-command-remote-code-execution-jfsa-2025-001380578/