Podcasts about hackers

Computing term

  • 9,849PODCASTS
  • 28,304EPISODES
  • 43mAVG DURATION
  • 6DAILY NEW EPISODES
  • Aug 19, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories




    Best podcasts about hackers

    Show all podcasts related to hackers

    Latest podcast episodes about hackers

    1010XL Jax Sports Radio
    Hacker After Dark 8-18-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Aug 19, 2025 81:12


    Hacker After Dark 8-18-25 by 1010 XL Jax Sports Radio

    The Segment: A Zero Trust Leadership Podcast
    The Monday Microsegment for the week of 8/18/2025

    The Segment: A Zero Trust Leadership Podcast

    Play Episode Listen Later Aug 18, 2025 8:18


    The Monday Microsegment for the week of August 18th. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Windows admins, start your updates — the latest Patch Tuesday is a doozy.Hackers are packing RomCom exploits into a popular file-archiving app, but no one's laughing.And phishers are turning stolen logins into stock pump-and-dump scams.And Christer Swartz joins us for an "Ask the Expert" segment. Head to The Zero Trust Hub: hub.illumio.comRegister to attend The Illumio World Tour: https://www.illumio.com/illumio-world-tour

    1010XL Jax Sports Radio
    Hacker After Dark 8-14-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Aug 15, 2025 81:06


    Hacker After Dark 8-14-25 by 1010 XL Jax Sports Radio

    Tech News Weekly (MP3)
    TNW 400: How Security Experts Hacked the Hackers - Inside the Darcula Toll Scam Ring

    Tech News Weekly (MP3)

    Play Episode Listen Later Aug 14, 2025 67:11


    Jennifer Pattison Tuohy of The Verge joins Mikah Sargent on this episode of Tech News Weekly! Apple is rumored to launch a series of AI-powered devices, the upcoming Pebble Time 2's design is shown off, a look into a global SMS phishing scam ring, and the blood oxygen feature is returning to Apple Watches? Apple is seeking to expand its product offerings into AI-powered robots, home security, and smart displays, according to a report from Bloomberg's Mark Gurman. Eric Migicovsky, founder of Pebble smartwatches, unveils the design of the company's Pebble Time 2* watch. Harrison Sand, Senior Security Consultant for mnemonic, unveils Darcula. This global SMS phishing-as-a-scam ring sends SMS messages hoping to steal credentials from those who click on the links in the messages. And Apple announces that it's bringing back the Blood Oyxgen feature for Apple Watches, which was a clever workaround following a recent U.S. Customs ruling against Masimo. Hosts: Mikah Sargent and Jennifer Pattison Tuohy Guest: Harrison Sand Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/tnw cachefly.com/twit

    Tech News Weekly (Video HI)
    TNW 400: How Security Experts Hacked the Hackers - Inside the Darcula Toll Scam Ring

    Tech News Weekly (Video HI)

    Play Episode Listen Later Aug 14, 2025 67:11


    Jennifer Pattison Tuohy of The Verge joins Mikah Sargent on this episode of Tech News Weekly! Apple is rumored to launch a series of AI-powered devices, the upcoming Pebble Time 2's design is shown off, a look into a global SMS phishing scam ring, and the blood oxygen feature is returning to Apple Watches? Apple is seeking to expand its product offerings into AI-powered robots, home security, and smart displays, according to a report from Bloomberg's Mark Gurman. Eric Migicovsky, founder of Pebble smartwatches, unveils the design of the company's Pebble Time 2* watch. Harrison Sand, Senior Security Consultant for mnemonic, unveils Darcula. This global SMS phishing-as-a-scam ring sends SMS messages hoping to steal credentials from those who click on the links in the messages. And Apple announces that it's bringing back the Blood Oyxgen feature for Apple Watches, which was a clever workaround following a recent U.S. Customs ruling against Masimo. Hosts: Mikah Sargent and Jennifer Pattison Tuohy Guest: Harrison Sand Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/tnw cachefly.com/twit

    All TWiT.tv Shows (MP3)
    Tech News Weekly 400: How Security Experts Hacked the Hackers

    All TWiT.tv Shows (MP3)

    Play Episode Listen Later Aug 14, 2025 67:11


    Jennifer Pattison Tuohy of The Verge joins Mikah Sargent on this episode of Tech News Weekly! Apple is rumored to launch a series of AI-powered devices, the upcoming Pebble Time 2's design is shown off, a look into a global SMS phishing scam ring, and the blood oxygen feature is returning to Apple Watches? Apple is seeking to expand its product offerings into AI-powered robots, home security, and smart displays, according to a report from Bloomberg's Mark Gurman. Eric Migicovsky, founder of Pebble smartwatches, unveils the design of the company's Pebble Time 2* watch. Harrison Sand, Senior Security Consultant for mnemonic, unveils Darcula. This global SMS phishing-as-a-scam ring sends SMS messages hoping to steal credentials from those who click on the links in the messages. And Apple announces that it's bringing back the Blood Oyxgen feature for Apple Watches, which was a clever workaround following a recent U.S. Customs ruling against Masimo. Hosts: Mikah Sargent and Jennifer Pattison Tuohy Guest: Harrison Sand Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/tnw cachefly.com/twit

    Matt Cox Inside True Crime Podcast
    STARBUCKS SCAM! Dark Web Hacker Steals $260K from Prison

    Matt Cox Inside True Crime Podcast

    Play Episode Listen Later Aug 14, 2025 91:47


    Stop leaving yourself vulnerable to data breaches. Go to my sponsor https://aura.com/matt to get a 14-day free trial and see if any of your data has been exposed⁣ ⁣ Get 10% sitewide for a limited time. Just visit https://GhostBed.com/cox and use code COX at checkout.⁣ ⁣ ⁣ Matt Cox interviews Rob Yeager, who recounts his wild journey from teenage dealing and club promotion to elaborate prison scams—including a $260,000 Starbucks gift card scheme—surviving Alabama's violent prison system, and ultimately rebuilding his life into a legitimate business career.⁣ ⁣ Rob's links⁣ https://fusiondataco.com⁣ https://www.instagram.com/robyeager1105/⁣ https://www.facebook.com/robert.yeager.1105/⁣ ⁣ ⁣ Do you want to be a guest? Fill out the form https://forms.gle/5H7FnhvMHKtUnq7k7⁣ ⁣ Send me an email here: insidetruecrime@gmail.com⁣ ⁣ Do you extra clips and behind the scenes content?⁣ Subscribe to my Patreon: https://patreon.com/InsideTrueCrime ⁣ ⁣ ⁣ Follow me on all socials!⁣ Instagram: https://www.instagram.com/insidetruecrime/⁣ TikTok: https://www.tiktok.com/@matthewcoxtruecrime⁣ ⁣ ⁣ Do you want a custom painting done by me? Check out my Etsy Store: https://www.etsy.com/shop/coxpopart⁣ ⁣ Listen to my True Crime Podcasts anywhere: https://anchor.fm/mattcox ⁣ ⁣ Check out my true crime books! ⁣ Shark in the Housing Pool: https://www.amazon.com/dp/B0851KBYCF⁣ Bent: https://www.amazon.com/dp/B0BV4GC7TM⁣ It's Insanity: https://www.amazon.com/dp/B08KFYXKK8⁣ Devil Exposed: https://www.amazon.com/dp/B08TH1WT5G⁣ Devil Exposed (The Abridgment): https://www.amazon.com/dp/1070682438⁣ The Program: https://www.amazon.com/dp/B0858W4G3K⁣ Bailout: https://www.barnesandnoble.com/w/bailout-matthew-cox/1142275402⁣ Dude, Where's My Hand-Grenade?: https://www.amazon.com/dp/B0BXNFHBDF/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1678623676&sr=1-1⁣ ⁣ Checkout my disturbingly twisted satiric novel!⁣ Stranger Danger: https://www.amazon.com/dp/B0BSWQP3WX⁣ ⁣ If you would like to support me directly, I accept donations here:⁣ Paypal: https://www.paypal.me/MattCox69⁣ Cashapp: $coxcon69 Learn more about your ad choices. Visit megaphone.fm/adchoices

    Paul's Security Weekly
    Hackberry PIs and Other Hacker Things - PSW #887

    Paul's Security Weekly

    Play Episode Listen Later Aug 14, 2025 128:42


    We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You need approval AI: Shield or Spear? No authentication? That's a problem Transient Bugs: A realistic threat? You can run Linux And who still uses AOL dial-up? Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-887

    1010XL Jax Sports Radio
    Hacker After Dark 8-13-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Aug 14, 2025 84:14


    Hacker After Dark 8-13-25 by 1010 XL Jax Sports Radio

    Tech News Weekly (Video LO)
    TNW 400: How Security Experts Hacked the Hackers - Inside the Darcula Toll Scam Ring

    Tech News Weekly (Video LO)

    Play Episode Listen Later Aug 14, 2025 67:11


    Jennifer Pattison Tuohy of The Verge joins Mikah Sargent on this episode of Tech News Weekly! Apple is rumored to launch a series of AI-powered devices, the upcoming Pebble Time 2's design is shown off, a look into a global SMS phishing scam ring, and the blood oxygen feature is returning to Apple Watches? Apple is seeking to expand its product offerings into AI-powered robots, home security, and smart displays, according to a report from Bloomberg's Mark Gurman. Eric Migicovsky, founder of Pebble smartwatches, unveils the design of the company's Pebble Time 2* watch. Harrison Sand, Senior Security Consultant for mnemonic, unveils Darcula. This global SMS phishing-as-a-scam ring sends SMS messages hoping to steal credentials from those who click on the links in the messages. And Apple announces that it's bringing back the Blood Oyxgen feature for Apple Watches, which was a clever workaround following a recent U.S. Customs ruling against Masimo. Hosts: Mikah Sargent and Jennifer Pattison Tuohy Guest: Harrison Sand Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/tnw cachefly.com/twit

    Snax Pax
    #214: Oops! More AI

    Snax Pax

    Play Episode Listen Later Aug 14, 2025 99:24


    Join Snaxton & Goose for another episode of Snax Pax! In this weeks episode they discuss, more AI, their luscious facial hair, this weeks cult classic "Hackers", and read your messages! Don't forget to rate, review, and subscribe!

    Influencer Confidential
    Influencers: How to Protect Your Instagram Account From Hackers #263

    Influencer Confidential

    Play Episode Listen Later Aug 14, 2025 9:48 Transcription Available


    Your social media platforms = your storefront! If you're a creator or influencer, your Instagram isn't just for posting pretty pictures. It's your business, your livelihood, your INCOME STREAM. Which means… you need to protect it like you would a physical shop, right? In this episode, I'm walking you through simple, easy-to-implement strategies to keep your Instagram safe from hackers, scams, and sneaky security breaches — so your content (and income) stays in your hands. I'm talking about: ➜ How to create strong, unique passwords (and test their strength)➜ The non-negotiable security setting every creator should turn on ASAP➜ Tools to manage your passwords without losing your mind➜ How to spot and remove shady third-party apps linked to your account➜ Extra tips for travel creators & public Wi-Fi usersLet's keep your platform safe (and "horror" stories free) so you can focus on creating what you love!

    Tech News Weekly (Video HD)
    TNW 400: How Security Experts Hacked the Hackers - Inside the Darcula Toll Scam Ring

    Tech News Weekly (Video HD)

    Play Episode Listen Later Aug 14, 2025 67:11


    Jennifer Pattison Tuohy of The Verge joins Mikah Sargent on this episode of Tech News Weekly! Apple is rumored to launch a series of AI-powered devices, the upcoming Pebble Time 2's design is shown off, a look into a global SMS phishing scam ring, and the blood oxygen feature is returning to Apple Watches? Apple is seeking to expand its product offerings into AI-powered robots, home security, and smart displays, according to a report from Bloomberg's Mark Gurman. Eric Migicovsky, founder of Pebble smartwatches, unveils the design of the company's Pebble Time 2* watch. Harrison Sand, Senior Security Consultant for mnemonic, unveils Darcula. This global SMS phishing-as-a-scam ring sends SMS messages hoping to steal credentials from those who click on the links in the messages. And Apple announces that it's bringing back the Blood Oyxgen feature for Apple Watches, which was a clever workaround following a recent U.S. Customs ruling against Masimo. Hosts: Mikah Sargent and Jennifer Pattison Tuohy Guest: Harrison Sand Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/tnw cachefly.com/twit

    Paul's Security Weekly TV
    Hackberry PIs and Other Hacker Things - PSW #887

    Paul's Security Weekly TV

    Play Episode Listen Later Aug 14, 2025 128:42


    We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You need approval AI: Shield or Spear? No authentication? That's a problem Transient Bugs: A realistic threat? You can run Linux And who still uses AOL dial-up? Show Notes: https://securityweekly.com/psw-887

    Autonomous IT
    CISO IT — Hacker Summer Camp 2025: A Recap of Black Hat & DEF CON, E19

    Autonomous IT

    Play Episode Listen Later Aug 14, 2025 6:17


    Join Automox CISO and SVP of Product Jason Kikta for a recap of Black Hat and DEF CON 2025. In this episode, Jason shares his take on the conversation around AI in cybersecurity shifting from hype to practical tools for defenders. Hear why integrating AI into your CI/CD pipeline, alert triage, and vulnerability management could be a game changer, plus thoughts on choosing the right security events for your personality and goals. Whether you're a conference veteran or a curious first-timer, this episode offers insights, humor, and encouragement to get more involved in the security community.

    All TWiT.tv Shows (Video LO)
    Tech News Weekly 400: How Security Experts Hacked the Hackers

    All TWiT.tv Shows (Video LO)

    Play Episode Listen Later Aug 14, 2025 67:11 Transcription Available


    Jennifer Pattison Tuohy of The Verge joins Mikah Sargent on this episode of Tech News Weekly! Apple is rumored to launch a series of AI-powered devices, the upcoming Pebble Time 2's design is shown off, a look into a global SMS phishing scam ring, and the blood oxygen feature is returning to Apple Watches? Apple is seeking to expand its product offerings into AI-powered robots, home security, and smart displays, according to a report from Bloomberg's Mark Gurman. Eric Migicovsky, founder of Pebble smartwatches, unveils the design of the company's Pebble Time 2* watch. Harrison Sand, Senior Security Consultant for mnemonic, unveils Darcula. This global SMS phishing-as-a-scam ring sends SMS messages hoping to steal credentials from those who click on the links in the messages. And Apple announces that it's bringing back the Blood Oyxgen feature for Apple Watches, which was a clever workaround following a recent U.S. Customs ruling against Masimo. Hosts: Mikah Sargent and Jennifer Pattison Tuohy Guest: Harrison Sand Download or subscribe to Tech News Weekly at https://twit.tv/shows/tech-news-weekly. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: zocdoc.com/tnw cachefly.com/twit

    Paul's Security Weekly (Podcast-Only)
    Hackberry PIs and Other Hacker Things - PSW #887

    Paul's Security Weekly (Podcast-Only)

    Play Episode Listen Later Aug 14, 2025 128:42


    We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You need approval AI: Shield or Spear? No authentication? That's a problem Transient Bugs: A realistic threat? You can run Linux And who still uses AOL dial-up? Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-887

    1010XL Jax Sports Radio
    Hacker After Dark 8-12-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Aug 13, 2025 80:44


    Hacker After Dark 8-12-25 by 1010 XL Jax Sports Radio

    Data Hackers
    ChatGPT-5 decepciona no lançamento, mas OpenAI reativa ChatGpt-4 de volta; Elon Musk libera Grok grátis nos EUA e sugere VPN para usuários de outros países - Data Hackers News #88

    Data Hackers

    Play Episode Listen Later Aug 13, 2025 9:19


    Está no ar, o Data Hackers News !! Os assuntos mais quentes da semana, com as principais notícias da área de Dados, IA e Tecnologia, que você também encontra na nossa Newsletter semanal, agora no Podcast do Data Hackers !!Aperte o play e ouça agora, o Data Hackers News dessa semana !Para saber tudo sobre o que está acontecendo na área de dados, se inscreva na Newsletter semanal:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.datahackers.news/⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Acesse os links:⁠Inscrições do Data Hackers Challenge 2025⁠⁠Live Zoho: Decisões Baseadas em Dados: Aplicando Machine Learning com o Zoho AnalyticsConheça nossos comentaristas do Data Hackers News:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Monique Femme⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Matérias/assuntos comentados:Live finalistas do Data Hackers Challenge 2025;Evento Mettup ItaúMatéria lançamento ChatGpt5;Matéria Elon Musk libera Grok grátis nos EUA. Demais canais do Data Hackers:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Site⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Linkedin⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Instagram⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Tik Tok⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠You Tube⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

    The CyberWire
    Kimsuky gets kim-sunk.

    The CyberWire

    Play Episode Listen Later Aug 12, 2025 28:12


    Hackers leak backend data from the North Korean state-sponsored hacking group Kimsuky. A ransomware attack on a Dutch clinical diagnostics lab exposes medical data of nearly half a million women. One of the world's largest staffing firms suffers a data breach. Saint Paul, Minnesota, confirms the Interlock ransomware gang was behind a July cyberattack. Researchers jailbreak ChatGPT-5. A cyber incident takes the Pennsylvania Attorney General's Office entirely offline. A new report quantifies global financial exposure from Operational Technology (OT) cyber incidents. Finnish prosecutors charge a Russian captain for allegedly damaging five critical subsea cables in the Baltic Sea. On our Industry Voices segment, we are joined by Sean Deuby, Semperis' Principal Technologist, with insights on the global state of ransomware. Hackers take smart buses for a virtual joyride. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Industry Voices segment, we are joined by Sean Deuby, Semperis' Principal Technologist, who is sharing insights and observations on the state of ransomware around the globe. If you want to hear the full conversation, check it out here. Selected Reading Kimsuky APT Hackers Exposed in Alleged Breach Revealing Phishing Tools and Operational Data (TechNadu) Ransomware attack on dutch medical lab exposes cancer screening data of almost 500K women (Beyond Machines) Manpower discloses data breach affecting nearly 145,000 people (Bleeping Computer) Saint Paul cyberattack linked to Interlock ransomware gang (Bleeping Computer) Tenable Jailbreaks GPT-5, Gets It To Generate Dangerous Info Despite OpenAI's New Safety Tech (Tenable) Pennsylvania Attorney General's Office hit by cybersecurity incident, shuts down digital infrastructure (Beyond Machines) New Dragos Report Estimates Over $300 Billion in Potential Global OT Cyber Risk Exposure (Business Wire) The 2025 OT Security Financial Risk Report (Dragos) Finland charges captain of suspected Russian ‘shadow fleet' tanker for subsea cable damage (The Record) Free Wi-Fi Leaves Buses Vulnerable to Remote Hacking (SecurityWeek) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

    1010XL Jax Sports Radio
    Hacker After Dark 8-11-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Aug 12, 2025 79:43


    Hacker After Dark 8-11-25 by 1010 XL Jax Sports Radio

    ITSPmagazine | Technology. Cybersecurity. Society
    Stellar Cyber Revolutionizes SOC Cybersecurity Operations with Human-Augmented Autonomous Platform at Black Hat 2025 | A Stellar Cyber Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Subo Guha

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Aug 12, 2025 17:40


    Stellar Cyber Revolutionizes SOC Cybersecurity Operations with Human-Augmented Autonomous Platform at Black Hat 2025 A Stellar Cyber Event Coverage of Black Hat USA 2025 Las VegasAn ITSPmagazine Brand Story with Subo Guha, Senior Vice President Product, Stellar Cyber____________________________Security operations centers face an unprecedented challenge: thousands of daily alerts overwhelming analyst teams while sophisticated threats demand immediate response. At Black Hat USA 2025 in Las Vegas, Stellar Cyber presented a revolutionary approach that fundamentally reimagines how SOCs operate in the age of AI-driven threats.Speaking with ITSPmagazine's Sean Martin, Subo Guha, Senior Vice President of Products at Stellar Cyber, outlined the company's vision for transforming security operations through their human-augmented autonomous SOC platform. Unlike traditional approaches that simply pile on more automation, Stellar Cyber recognizes that effective security requires intelligent collaboration between AI and human expertise.The platform's three-layer architecture ingests data from any source – network devices, applications, identities, and endpoints – while maintaining vendor neutrality through open EDR integration. Organizations can seamlessly work with CrowdStrike, SentinelOne, Sophos, or other preferred solutions without vendor lock-in. This flexibility proves crucial for enterprises navigating complex security ecosystems where different departments may have invested in various endpoint protection solutions.What sets Stellar Cyber apart is their autonomous SOC concept, which dramatically reduces alert volume from hundreds of thousands to manageable numbers within days rather than weeks. The platform's AI-driven auto-triage capability identifies true positives among thousands of false alarms, presenting analysts with prioritized "verdicts" that demand attention. This transformation addresses one of security operations' most persistent challenges: alert fatigue that leads to missed threats and burned-out analysts.The revolutionary AI Investigator copilot enables natural language interaction, allowing analysts to query the system conversationally. An analyst can simply ask, "Show me all impossible travel incidents between midnight and 4 AM," and receive actionable intelligence immediately. This democratization of security operations means junior analysts can perform at senior levels without extensive coding knowledge or years of experience navigating complex query languages.Identity threat detection and response (ITDR) emerged as another critical focus area during the Black Hat presentation. With identity becoming the new perimeter, Stellar Cyber integrated sophisticated user and entity behavior analytics (UEBA) directly into the platform. The system detects impossible travel scenarios, credential attacks, and lateral movement patterns that indicate compromise. For instance, when a user logs in from Portland at 11 PM and then appears in Moscow 30 minutes later, the platform immediately flags this physical impossibility.The identity protection extends beyond human users to encompass non-human identities, addressing the growing threat of automated attacks powered by large language models. Hackers now leverage generative AI to create credential attacks at unprecedented scale and sophistication, making robust identity security more critical than ever.Guha emphasized that AI augmentation doesn't displace security professionals but elevates them. By automating mundane tasks, analysts focus on strategic decision-making and complex threat hunting. MSSPs report dramatic efficiency gains, scaling operations without proportionally increasing headcount. Where previously a hundred thousand alerts might take weeks to process, requiring extensive junior analyst teams, the platform now delivers actionable insights within days with smaller, more focused teams.The platform's unified approach eliminates tool sprawl, providing CISOs with real-time visualization of their security posture. Executive reporting becomes instantaneous, with high-priority verdicts clearly displayed for rapid decision-making. This visualization capability transforms how security teams communicate with leadership, replacing lengthy reports with dynamic dashboards that convey risk and response status at a glance.Real-world deployments demonstrate significant operational improvements. Organizations report faster mean time to detection and response, reduced false positive rates, and improved analyst satisfaction. The platform's learning capabilities mean it becomes more intelligent over time, adapting to each organization's unique threat landscape and operational patterns.As organizations face increasingly sophisticated threats powered by generative AI, Stellar Cyber's human-augmented approach represents a paradigm shift. By combining AI intelligence with human intuition, the platform delivers faster threat detection, reduced false positives, and empowered security teams ready for tomorrow's challenges. The company's commitment to continuous innovation, evidenced by rapid feature releases between RSA and Black Hat, positions them at the forefront of next-generation security operations. Learn more about Stellar Cyber: https://itspm.ag/stellar-cyber--inc--357947Note: This story contains promotional content. Learn more.Guest: Subo Guha, Senior Vice President Product, Stellar Cyber | https://www.linkedin.com/in/suboguha/ResourcesLearn more and catch more stories from Stellar Cyber: https://www.itspmagazine.com/directory/stellarcyberLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

    Adam and Jordana
    Hackers release stolen info from St Paul

    Adam and Jordana

    Play Episode Listen Later Aug 12, 2025 10:55


    Eric Ebner with 360Security Service joins Adam and Jordana to talk about the cyber attack against the city of St Paul.

    Typical Skeptic Podcast
    Dream Hackers & Draco: Indigo Angel Exposes the Reptilian Nightmare Agenda - TSP # 2120

    Typical Skeptic Podcast

    Play Episode Listen Later Aug 11, 2025 59:48


    Cyber Work
    Why Hackers Are Stealing Encrypted Data Now To Decrypt Later | David Close

    Cyber Work

    Play Episode Listen Later Aug 11, 2025 44:27 Transcription Available


    Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcastDavid Close, Chief Solutions Architect at Futurex, discusses the reality facing our digital world: quantum computing will soon break the encryption protecting everything from mobile banking to satellite communications. But here's the twist — hackers aren't waiting. They're harvesting encrypted data now, betting that quantum computers will eventually crack today's "unbreakable" codes in a strategy called "harvest now, decrypt later." David explains how NIST's new post-quantum cryptography standards are already being deployed by companies like Google and CloudFlare, why crypto agility is essential for future-proofing your security infrastructure, and how you can break into the exciting field of cryptography — even without a PhD in mathematics.0:00 - Intro 1:00 - Cybersecurity Salary Guide3:06 - Meet David Close from Futurex3:52 - David's journey from embedded systems to cryptography5:05 - What Futurex does and 40 years of crypto innovation6:39 - The role of Chief Solutions Architect8:21 - Evolution of cryptography from payments to enterprise10:13 - How David discovered his passion for cryptography13:23 - Post-quantum cryptography explained15:16 - Why quantum computers break current encryption16:05 - The "harvest now, decrypt later" threat18:19 - NIST's new quantum-resistant algorithms20:02 - Real-world quantum threats to satellites and IP22:43 - What organizations can do now25:25 - Crypto agility and future-proofing systems28:41 - Resources for staying current on cryptography30:45 - Career paths in cryptography beyond algorithm development32:18 - Getting started in cryptography careers34:26 - The cryptography landscape in 15 years37:34 - Regulatory enforcement of new crypto standards39:43 - Best career advice: Finding the right vehicle41:29 - David's current reading and recommendations42:35 - Where to find David and Futurex onlineView Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcastAbout InfosecInfosec's mission is to put people at the center of cybersecurity. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber-safe at work and home. More than 70% of the Fortune 500 have relied on Infosec to develop their security talent, and more than 5 million learners worldwide are more cyber-resilient from Infosec IQ's security awareness training. Learn more at infosecinstitute.com.

    Cyber Security Today
    Cyber Attacks, Jailbreaking GPT-5, and Hacker Summer Camp 2025 Highlights

    Cyber Security Today

    Play Episode Listen Later Aug 11, 2025 14:34 Transcription Available


    In today's episode of Cybersecurity Today, host David Shipley covers critical updates on recent cyber attacks and breaches impacting the US Federal judiciary's case management systems, and SonicWall firewall compromises. He also discusses researchers' new jailbreak method against GPT-5, which bypasses ethical guardrails to produce harmful instructions. Shipley shares insights and standout sessions from Hacker Summer Camp 2025, including BSides Las Vegas, the I Am the Cavalry track, and Defcon, highlighting ongoing efforts and challenges in the cybersecurity landscape. Stay informed, stay secure, and join the conversation in this detailed overview of current cybersecurity issues and innovations. 00:00 Introduction and Headlines 00:31 US Federal Judiciary Cyber Attack 02:29 SonicWall Ransomware Attacks 04:14 AI Jailbreak Techniques 07:44 Hacker Summer Camp 2025 Highlights 08:10 BSides Las Vegas and Community Insights 09:29 Healthcare Cybersecurity and Crash Cart Project 12:11 Defcon Reflections and Final Thoughts 13:45 Conclusion and Listener Engagement

    Dark Rhino Security Podcast
    S17 E09 (VIDEO) The Hacker's Playbook

    Dark Rhino Security Podcast

    Play Episode Listen Later Aug 11, 2025 40:38


    Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren't bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren't using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam------------------------------------------------------------To learn more about Husam visit https://www.linkedin.com/in/husamshbib/To learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com

    The Lockdown - Practical Privacy & Security
    032 - No Salt Required: Listener Questions Before the Break

    The Lockdown - Practical Privacy & Security

    Play Episode Listen Later Aug 11, 2025 21:40


    In this episode I address listener feedback and questions, from clarifying my stance on the “Tea” controversy to sharing practical tips from the community about Privacy.com workarounds. This episode covers some loose ends before I take a brief hiatus. I also discuss why I won't be at Black Hat this year, share thoughts on minimalism versus practicality in privacy, and reveal my favorite Indian restaurant in Vegas for those attending Black Hat!In this week's episode:Addressing the “Tea” controversy and clarifying my positions on doxingCommunity solution for Privacy.com and Plaid privacy concernsContact information protection strategies when family uses social mediaFuture of capture-the-flag challenges and OSINT considerationsConference attendance updates and travelMatrix Community RoomsMatrix Community Space - https://matrix.to/#/#psysecure:matrix.orgIndividual Room Links:https://matrix.to/#/#lockdown-general:matrix.orghttps://matrix.to/#/#lockdown-podcast:matrix.orghttps://matrix.to/#/#lockdown-intro:matrix.orgShow Links:Tea app leak article - https://www.bleepingcomputer.com/news/security/tea-app-leak-worsens-with-second-database-exposing-user-chats/OSMOSIS Institute - https://osmosisinstitute.org/events/Privacy.com - https://privacy.com“There are no facts, only interpretations.”- Friedrich Nietzsche ★ Support this podcast on Patreon ★

    La chronique de Benaouda Abdeddaïm
    Caroline Loyer : Iran/Israël, l'autre guerre - 11/08

    La chronique de Benaouda Abdeddaïm

    Play Episode Listen Later Aug 11, 2025 3:28


    Ce lundi 11 août, la cyberguerre qui se poursuit actuellement entre l'Iran et Israël a été abordée par Caroline Loyer dans sa chronique, dans l'émission Good Morning Business, présentée par Erwan Morice, sur BFM Business. Retrouvez l'émission du lundi au vendredi et réécoutez la en podcast.

    1010XL Jax Sports Radio
    Hacker After Dark 8-8-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Aug 9, 2025 83:43


    Hacker After Dark 8-8-25 by 1010 XL Jax Sports Radio

    1010XL Jax Sports Radio
    Hacker After Dark 8-7-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Aug 8, 2025 80:02


    Hacker After Dark 8-7-25 by 1010 XL Jax Sports Radio

    RNZ: Country Life
    The Soil Hacker - one farmer's quest to outsmart the weather

    RNZ: Country Life

    Play Episode Listen Later Aug 8, 2025 14:52


    Kaipara farmer Stephen Newman is intent on improving soils and pasture in low cost, natural ways. He's now helping others too and hopes these methods will become even more useful as the country experiences more and more intense weather events like flooding, heavy rainfall and drought. You can find photos and read more about the stories in this episode on our webpage, here.You can find our previous episode on City to Farm, here, or learn more on their website.With thanks to:Stephen NewmanGo to this episode on rnz.co.nz for more details

    Cybercrime Magazine Podcast
    Teenage Hacker Stole $243M In Bitcoin. How It Happened. Luka Ivezic, Information Security Forum.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Aug 8, 2025 8:54


    Luka Ivezic is the Advisory Services Lead Cybersecurity Regulations and Emerging Technologies at the Information Security Forum (ISF). In this episode, he joins host Charlie Osborne to discuss the latest on a $243 million bitcoin theft by a teenage hacker, highlighting how advanced attacks often begin with simple vulnerabilities. This episode is sponsored by Cryptosec, a leading cybersecurity firm specializing in the protection of the decentralized future of finance, governance, and more. To learn more, visit https://cryptosec.com.

    bitcoin hackers teenage stole emerging technologies information security forum information security forum isf
    Data Hackers
    Inteligência Artificial generativa na análise de dados não-estruturados - Data Hackers Podcast #111

    Data Hackers

    Play Episode Listen Later Aug 8, 2025 59:17


    Problemas antigos. Novas Ferramentas.Neste episódio, vamos mostrar como você pode utilizar a Inteligência Artificial Generativa (GenAI) para te auxiliar na análise dados não-estruturados e aumentar sua produtividade. Reunimos Felipe Fiamozzini e Lara Marinelli, especialistas da Bain & Company que vivem o dia a dia da área, para explorar os desafios que existiam antes da chegada da GenAI, os métodos e frameworks recomendados e como o ciclo da análise de dados está sendo adaptado com essas novas tecnologias.Também discutimos o papel das lideranças nesse cenário de transformação e damos dicas práticas para quem está começando na área de dados e quer desenvolver habilidades em GenAI.Vem com a gente entender como extrair valor de dados não-estruturados com o apoio da GenAI!Lembrando que você pode encontrar todos os podcasts da comunidade Data Hackers no Spotify, iTunes, Google Podcast, Castbox e muitas outras plataformas.Convidados:Felipe Fiamozzini - Sócio na Bain Company focado em dados e IALara Marinelli - Gerente de Machine Learning EngineeringNossa Bancada Data Hackers:Paulo Vasconcellos — Co-founder da Data Hackers e Principal Data Scientist na Hotmart.Gabriel Lages - Co-founder da Data Hackers e Data & Analytics Sr. Director na Hotmart.

    Hacker Public Radio
    HPR4440: The HOPE conference.

    Hacker Public Radio

    Play Episode Listen Later Aug 8, 2025


    This show has been flagged as Clean by the host. Hackers on Planet Earth Now an annual conference Inspired by 2600 magazine, a creative and diverse event. You'll see villages, live performances, demonstrations, vintage computers, ham radio, lockpicking, learn to solder. Too much to see. It's reasonably priced, always fun. August 15-17th in Queens New York. More details at https://hope.net If you're in the area, try to make it!Provide feedback on this episode.

    1010XL Jax Sports Radio
    Hacker After Dark 8-6-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Aug 7, 2025 82:37


    Hacker After Dark 8-6-25 by 1010 XL Jax Sports Radio

    The Cloud Pod
    315: EC2’s New Shutdown Shortcut: Because Sometimes You Just Need to Pull the Plug

    The Cloud Pod

    Play Episode Listen Later Aug 7, 2025 80:37


     Welcome to episode 315 of The Cloud Pod, where the forecast is always cloudy! Your hosts, Justin and Matt, are here to bring you the latest in cloud and AI news, including news about AI from the White House, the newest hacker exploits, and news from CloudWatch, CrowdStrike, and GKE – plus so much more. Let's get into it!  Titles we almost went with this week: SharePoint and Tell: Government Secrets at Risk Zero-Day Hero: How Hackers Found SharePoint’s Achilles’ Heel Amazon Q Gets an F in Security Class Spark Joy: GitHub’s Marie Kondo Approach to App Development No Code? No Problem! GitHub Lights a Spark Under App Creation GKE Turns 10: Still Not Old Enough to Deploy Itself A Decade of Containers: Pokémon GO Caught Them All Kubernetes Engine Hits Double Digits, Still Can’t Count Past 9 Pods Account Names: The Missing Link in AWS Cost Optimization Flash Gordon Saves Your VMs from the Azure-verse The Flash: Fastest VM Monitor in the Multiverse Ctrl+AI+Delete: Rebooting America’s Artificial Intelligence Strategy The AImerican Dream: White House Plots Path to Silicon Supremacy CrowdStrike’s Year of Living Resiliently Kernel Panic at the Disco: A Recovery Story The Search is Over (But Your Copilot License Isn’t) Ground Control to Major Tom: You’re Fired GPU Booking.com: Reserve Your Neural Network’s Next Vacation Calendar Man Strikes Again: This Time He’s Scheduling Your TPUs AirBnB for AI: Short-Term Rentals for Your Machine Learning Models  Claude’s World Tour: Now Playing in Every Region Going Global: Claude Gets Its Passport Stamped on Vertex AI SQS Finally Learns to Share: No More Queue Hogging The Noisy Neighbor Gets Shushed: Amazon’s Fair Play for Queues CloudWatch Gets Its AI Degree in Observability Teaching Old Logs New Tricks: CloudWatch Goes GenAI The Agent Whisperer: CloudWatch’s New AI Monitoring Powers NotebookLM Gets Its PowerPoint License Slides, Camera, AI-ction: NotebookLM Goes Visual The SSL-ippery Slope: Azure’s Managed Certs Go Public or Go Home Breaking Bad Certificates: DigiCert’s New Rules Leave Some Apps High and Dry Firewall Rules: Now with a Rough Draft Feature Azure’s New Policy: Think Before You Deploy General News  00:50 Hackers exploiting a SharePoint zero-day are seen targeting government agencies | TechCrunch Microsoft SharePoint servers are being actively exploited through a zero-day vulnerability (CVE-2025-53770), with initial attacks primarily targeting government agencies, universities, and energy companies, according to security researchers. The vulnerability affects on-premises SharePoint installations only, not cloud versions, with researchers identifying 9,000-10,000 vulnerable instances accessible from the internet that require immediate patching or disconnection. Initial exploitation appears t

    Microsoft Threat Intelligence Podcast
    How Microsoft Stays Ahead of the World's Most Dangerous Hackers

    Microsoft Threat Intelligence Podcast

    Play Episode Listen Later Aug 7, 2025 77:33


    In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is joined by Aarti Borkar, Simeon Kakpovi, and Andrew Rapp for a behind-the-scenes look at how Microsoft Threat Intelligence and Microsoft Incident Response teams collaborate as part of a closed-loop system, the emotional toll of breaches, and how organizations of any size can build resilience through preparation and psychological safety. By listening to this segment, you'll get a preview of what this group brought to the main stage of Black Hat this year.  Later, Sherrod chats with Snow, co-founder of the Social Engineering Community Village at DEF CON, about her journey from special effects makeup to elite social engineer, and how empathy, creativity, and even a ladder can be powerful tools in physical security testing.  In this episode you'll learn:       How Microsoft's Digital Crimes Unit uses legal tactics to disrupt threat actors  Why rehearsing your incident response plan can save weeks of recovery time  How AI is being trained to make social engineering phone calls on its own  Some questions we ask:      How would you describe the overall health of the global cybersecurity landscape?  Why does tailoring AI prompts sometimes feel like social engineering?  What is the feedback loop between incident response, intelligence, and product protections?    Resources:   View Aarti Borkar on LinkedIn  View Simeon Kakpovi on LinkedIn   View Andrew Rapp on LinkedIn    View Sherrod DeGrippo on LinkedIn   Microsoft at Black Hat USA 2025    Related Microsoft Podcasts:                    Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast  Uncovering Hidden Risks        Discover and follow other Microsoft podcasts at microsoft.com/podcasts     Get the latest threat intelligence insights and guidance at Microsoft Security Insider    The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  

    Cyber Security Headlines
    Gemini AI hijacked, Nvidia rejects AI chip backdoors, phishers abuse Microsoft 365

    Cyber Security Headlines

    Play Episode Listen Later Aug 7, 2025 6:23


    Hackers hijacked Google's Gemini AI with a poisoned calendar invite to take over a smart home Nvidia rejects US demand for backdoors in AI chips Google says hackers stole its customers' data by breaching its Salesforce database Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO.

    1010XL Jax Sports Radio
    Hacker After Dark 8-5-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Aug 6, 2025 86:20


    Hacker After Dark 8-5-25 by 1010 XL Jax Sports Radio

    Today in Health IT
    2 Minute Drill: Hacker Infiltration, Corporate Leaks, and North Korean Updates with Drex DeFord

    Today in Health IT

    Play Episode Listen Later Aug 6, 2025 4:19 Transcription Available


    This episode covers three critical cybersecurity developments affecting healthcare organizations. First, FBI warnings about Scattered Spider ransomware group targeting employees through Slack and Microsoft Teams, including their alarming tactic of creating fake identities to join incident response calls and monitor remediation efforts. Second, leaked chat logs from the Conti ransomware group reveal these criminal organizations operate like structured tech startups with HR policies, management layers, and performance reviews - highlighting the sophisticated nature of modern cyber threats. Finally, CrowdStrike intelligence reveals over 900 North Korean operatives have quietly embedded themselves in US companies using deepfakes and fake identities, wiring paychecks back to the regime. The episode also mentions CISA's new free Thorium tool for malware analysis and forensic investigations.X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer

    Thema des Tages
    Wie schwer wurde das Außenministerium gehackt?

    Thema des Tages

    Play Episode Listen Later Aug 6, 2025 26:16 Transcription Available


    Ein österreichischer Botschafter in Brüssel soll jahrelang einen Blog betrieben haben, der voll von sexistischen und frauenfeindlichen Postings war. Dieser Blog könnte jetzt zum Einfallstor für Hacker geworden sein. Im Außenministerium steht die Welt derzeit Kopf. Wie sicher das Außenministerium noch ist und wie verheerend der IT-Angriff sein könnte, darüber sprechen Fabian Schmid, leitender Redakteur Investigativ beim STANDARD, und Thomas Mayer, Europakorrespondent beim STANDARD. **Hat Ihnen dieser Podcast gefallen?** Mit einem STANDARD-Abonnement können Sie unsere Arbeit unterstützen und mithelfen, Journalismus mit Haltung auch in Zukunft sicherzustellen. Alle Infos und Angebote gibt es hier: [abo.derstandard.at](https://abo.derstandard.at/?ref=Podcast&utm_source=derstandard&utm_medium=podcast&utm_campaign=podcast&utm_content=podcast)

    Dark Rhino Security Podcast
    S17 E09 The Hacker's Playbook

    Dark Rhino Security Podcast

    Play Episode Listen Later Aug 6, 2025 40:38


    Husam Shbib is a cybersecurity consultant specializing in penetration testing, digital forensics, malware analysis, programming, and OSINT. He holds multiple certifications, including ICMDE, CCE, CCD, CCDFA, IWM, 3CE/I, eCDFP, etc. He spoke at conferences and events such as BlackHat MEA, ASFSFM, 3D Forensics and others. He is committed to cybersecurity awareness, as he shares knowledge through LinkedIn, YouTube, and personal mentoring 00:00 Intro02:14 All hackers aren't bad?04:38 How is cybersecurity in the Middle East 06:03 To become an Ethical hacker, should you focus on penetration testing first?07:14 How does a hackers mind work?12:04 How do you not get discovered in the scanning phase?14:16 Hackers prefer to work alone15:10 Hackers aren't using the same tools19:05 If you want in, you could get in28:57 Any companies that are well defended? 30:45 Air gapping correctly39:10 More about Husam

    The CyberWire
    Hello, hacker speaking.

    The CyberWire

    Play Episode Listen Later Aug 5, 2025 30:45


    Cisco reveals a phishing related data breach. SonicWall warns users to disable SSLVPN services after reports of ransomware gangs exploiting a likely zero-day.  Researchers uncover a stealthy Linux backdoor and new vulnerabilities in Nvidia's Triton Inference Server. A new malware campaign targets Microsoft 365 users with fake OneDrive emails. The U.S. Treasury warns of rising criminal activity involving cryptocurrency ATMs. Cloudflare accuses an AI startup of using stealthy methods to bypass restrictions on web scraping. A global infostealer campaign compromises over 4,000 victims across 62 countries. Marty Momdjian, General Manager of Ready1 by Semperis, tells us about Operation Blindspot, a tabletop exercise taking place this week at Black Hat. On this week's Threat Vector segment, host David Moulton speaks with ⁠Nigel Hedges⁠ from ⁠Sigma Healthcare⁠ about how CISOs can shift cybersecurity from a technical problem to a business priority. One hospital's data ends up in the snack aisle. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We are joined by Marty Momdjian, General Manager of Ready1 by Semperis, who is talking about Operation Blindspot, a tabletop exercise simulating a cyberattack against a rural water utility based in Nevada taking place this week at Black Hat USA 2025. Threat Vector Segment On this week's Threat Vector segment, host David Moulton speaks with ⁠Nigel Hedges⁠, Executive General Manager of Cyber & Risk at ⁠Chemist Warehouse⁠ and ⁠Sigma Healthcare⁠. Nigel shares how CISOs can shift cybersecurity from a technical problem to a business priority. You can listen to the full discussion on Threat Vector here and catch new episodes every Thursday on your favorite podcast app. Selected Reading Cisco discloses data breach impacting Cisco.com user accounts (Bleeping Computer) SonicWall urges admins to disable SSLVPN amid rising attacks (Bleeping Computer) Antivirus vendors fail to spot persistent, nasty, stealthy Linux backdoor (The Register) Nvidia Triton Vulnerabilities Pose Big Risk to AI Models (SecurityWeek) Discord CDN Link Abused to Deliver RAT Disguised as OneDrive File (Hackread) Crypto ATMs fueling criminal activity, Treasury warns (The Record) AI company Perplexity is sneaking to get around blocks on crawlers, Cloudflare alleges (CyberScoop) Python-powered malware grabs 200K passwords, credit cards (The Register) Thai hospital fined 1.2 million baht for data breach via snack bags (DataBreaches.Net) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

    The Cisco Learning Network
    Inside Cisco's Ethical Hacker Certificate

    The Cisco Learning Network

    Play Episode Listen Later Aug 5, 2025 47:42


    Learn how Ethical Hackers think Cisco's new Certificate in Ethical Hacking is designed to teach just that, combining offensive security techniques with immersive Capture the Flag challenges that help learners validate their knowledge in real-world scenarios. In this episode, Jozef Janitor, Product Manager with Cisco Networking Academy, joins Business Architecture Manager Garrett Marling and Cisco U. Product Manager Kate Dignan to discuss the Ethical Hacker program with Cisco Learning Network Community Manager Tanner Swift. Together, they break down how this certificate fits into a learner's cybersecurity journey, what to expect from Cisco U., and how hands-on challenges like Capture the Flag: Operation SMB Exploit can help prepare you for a career in offensive security. • Cisco Certificate in Ethical Hacking: https://www.netacad.com/courses/ethical-hacker?courseLang=en-US • Capture the Flag: Operation SMB Exploit: https://u.cisco.com/challenges/capture-flag-operation-smb-exploit-26593 • Cisco Learning Network: https://learningnetwork.cisco.com/s/certification/ethical-hacker

    1010XL Jax Sports Radio
    Hacker After Dark 8-4-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Aug 5, 2025 87:19


    Hacker After Dark 8-4-25 by 1010 XL Jax Sports Radio

    Bill Handel on Demand
    What Are Quishing' Scams | Las Vegas Tourism Drops

    Bill Handel on Demand

    Play Episode Listen Later Aug 4, 2025 25:48 Transcription Available


    (August 04,2025)‘Quishing' scams dupe millions of Americans as hackers turn QR codes into traps. Las Vegas is down on its luck as tourism drops… why it's kind of California's fault. American consumers are getting thrifty again. How flying on a private jet became the #1 marker of real wealth.

    ITSPmagazine | Technology. Cybersecurity. Society
    From Hacker Defense to Civil Liberties: Threat Modeling Meets Constitutional Law | A Black Hat USA 2025 Keynote Conversation with Jennifer Granick | On Location Coverage with Sean Martin and Marco Ciappelli

    ITSPmagazine | Technology. Cybersecurity. Society

    Play Episode Listen Later Aug 4, 2025 22:47


    At Black Hat USA 2025, Jennifer Granick—Surveillance and Cybersecurity Counsel at the American Civil Liberties Union—takes the keynote stage to make a bold case: we are long overdue for a new threat model, one that sees government surveillance not as a background risk, but as a primary threat to constitutional privacy.Granick draws from decades of experience defending hackers, fighting surveillance overreach, and engaging with the security community since DEFCON 3. She challenges the audience to reconsider outdated assumptions about how the Fourth Amendment is interpreted and applied. While technology has made it easier than ever for governments to collect data, the legal system hasn't kept pace—and in many cases, fails to recognize the sheer scope and sensitivity of personal information exposed through modern services.Her talk doesn't just raise alarm; it calls for action. Granick suggests that while legal reform is sluggish—stymied by a lack of political will and lobbying power—there's an urgent opportunity for the technical community to step up. From encryption to data minimization and anonymization, technologists have the tools to protect civil liberties even when the law falls short.The session promises to be a wake-up call for engineers, designers, policymakers, and privacy advocates. Granick wants attendees to leave not only more informed, but motivated to build systems that limit the unnecessary collection, retention, and exposure of personal data.Her keynote also surfaces a critical cultural shift: from the “Spot the Fed” days of DEFCON to a more nuanced understanding of government roles—welcoming collaboration where it serves the public good, but not at the expense of unchecked surveillance.This conversation reframes privacy as a design problem as much as a legal one—and one that requires collective effort to address. If the law can't fix it, the question becomes: will the technology community rise to the challenge?___________Guest:Jennifer Granick, Surveillance and Cybersecurity Counsel at American Civil Liberties Union | On LinkedIn: https://www.linkedin.com/in/jennifergranick/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesKeynote: Threat Modeling and Constitutional Law: https://www.blackhat.com/us-25/briefings/schedule/index.html#keynote-threat-modeling-and-constitutional-law-48276Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

    Matt Cox Inside True Crime Podcast
    Dark Web Hackers Steal Millions From Casino | Cyber Extortion

    Matt Cox Inside True Crime Podcast

    Play Episode Listen Later Aug 3, 2025 156:26


    Stop leaving yourself vulnerable to data breaches. Go to my sponsor https://aura.com/matt to get a 14-day free trial and see if any of your data has been exposed⁣ ⁣ Get 10% sitewide for a limited time. Just visit https://GhostBed.com/cox and use code COX at checkout.⁣ ⁣ Ricoh Danielson, a cybersecurity incident responder recounts how unsecured devices and vulnerable networks—particularly in hospitals—are easily exploited by organized ransomware gangs that infiltrate systems through credential theft or phishing, often remain undetected for months, and then demand millions in ransom based on the value of stolen data.⁣ ⁣ Ricoh's links ⁣ https://www.ricohd.us/about⁣ https://www.instagram.com/ricoh_danielson_/?hl=en⁣ https://www.youtube.com/user/dricoh22/videos⁣ ⁣ Do you want to be a guest? Fill out the form https://forms.gle/5H7FnhvMHKtUnq7k7⁣ ⁣ Send me an email here: insidetruecrime@gmail.com⁣ ⁣ Do you extra clips and behind the scenes content?⁣ Subscribe to my Patreon: https://patreon.com/InsideTrueCrime ⁣ ⁣ ⁣ Follow me on all socials!⁣ Instagram: https://www.instagram.com/insidetruecrime/⁣ TikTok: https://www.tiktok.com/@matthewcoxtruecrime⁣ ⁣ ⁣ Do you want a custom painting done by me? Check out my Etsy Store: https://www.etsy.com/shop/coxpopart⁣ ⁣ Listen to my True Crime Podcasts anywhere: https://anchor.fm/mattcox ⁣ ⁣ Check out my true crime books! ⁣ Shark in the Housing Pool: https://www.amazon.com/dp/B0851KBYCF⁣ Bent: https://www.amazon.com/dp/B0BV4GC7TM⁣ It's Insanity: https://www.amazon.com/dp/B08KFYXKK8⁣ Devil Exposed: https://www.amazon.com/dp/B08TH1WT5G⁣ Devil Exposed (The Abridgment): https://www.amazon.com/dp/1070682438⁣ The Program: https://www.amazon.com/dp/B0858W4G3K⁣ Bailout: https://www.barnesandnoble.com/w/bailout-matthew-cox/1142275402⁣ Dude, Where's My Hand-Grenade?: https://www.amazon.com/dp/B0BXNFHBDF/ref=tmm_pap_swatch_0?_encoding=UTF8&qid=1678623676&sr=1-1⁣ ⁣ Checkout my disturbingly twisted satiric novel!⁣ Stranger Danger: https://www.amazon.com/dp/B0BSWQP3WX⁣ ⁣ If you would like to support me directly, I accept donations here:⁣ Paypal: https://www.paypal.me/MattCox69⁣ Cashapp: $coxcon69 Learn more about your ad choices. Visit megaphone.fm/adchoices