Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of SpinRite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Daily update on current cyber security threats
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
Narrators read our favorite written stories. You can listen to them anywhere, including on your smart speaker. Play for audio versions of WIRED's Security stories, featuring the latest on cybersecurity, hacking, privacy, national security, and keeping yourself safe online.
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion.
D
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec


1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
S
Security. Cryptography. Whatever.


1
Security. Cryptography. Whatever.
Deirdre Connolly, Thomas Ptacek, David Adrian
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. See acast.com/privacy for privacy and opt-out information.
The SecurityMetrics Podcast, hosted by Jen Stone (Principal Security Analyst, QSA, CISSP, CISA), will help you understand current data security and compliance trends. Each episode will feature a different security professional offering tips and security best practices.
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security.
Exclusive, insightful audio interviews by our staff with banking/security leading practitioners and thought-leaders. Transcripts are also available on our site!
Global Security Briefing provides regular insights from leading international experts to help you make sense of the far-reaching changes affecting international security around the globe. Hosted by analysts from RUSI's International Security Studies team, the podcast looks at how the UK can best shape its foreign and security policies in an increasingly dynamic international environment.
In diesem Podcast sprechen wir über die Grundlagen von IT-Security. Ein praktischer Einstieg für alle, die an Software arbeiten.
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Produced with the support of Policy Forum. See acast.com/privacy for privacy and opt-out information.
Der Security-Insider Podcast ist ein Podcast für Security-Profis mit Infos, Nachrichten und Meinungen rund um die IT-Sicherheit. Hier unterhält sich Chefredakteur Peter Schmitz mit seinem Co-Host Dirk Srocke und manchmal auch mit spannenden Gästen. Zum Gespräch stehen alle Themen rund um die IT-Sicherheit, Datenschutz und Compliance.
T
The Azure Security Podcast


1
The Azure Security Podcast
Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://azsecuritypodcast.net/ ©2020-2022 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over eight million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
B
Black Hills Information Security


1
Black Hills Information Security
Black Hills Information Security
Penetration testing for Fortune 50 companies since 2008.
Without trust, society stagnates, economies decline, and businesses fail. This podcast series keeps abreast of the latest trends and challenges in cyber and physical security with interviews, event updates, industry suppliers & government initiatives.
Security Nation is a podcast dedicated to celebrating the champions in the cybersecurity community who are advancing security in their own ways. We also cover the latest developments in infosec that you should know about.
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhino Security.
S
Symantec Cyber Security Brief Podcast


1
Symantec Cyber Security Brief Podcast
Security Response Team
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
Security news, interviews, how-to technical segments. For security professionals by security professionals. We Hack Naked.
Der RZ10 Podcast über SAP Basis und SAP Security
T
The Official Offensive Security Podcast

1
The Official Offensive Security Podcast
Offensive Security, Inc.
The one and only official podcast from Offensive Security, Inc. -- creators of the Kali OS, the OSCP certification, and the world's leading cybersecurity training
With the powers of enhanced vision (a.k.a. glasses) and impervious buns, Jim and A.Ron have teamed up to form the Department of Homelander Security, the only podcast dedicated to doing whatever it takes to monitor the notorious "supe" called Homelander in an effort to keep the public informed and safe. Join us each week immediately after the episode for a recap and analysis of Amazon's streaming hit, The Boys.
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
Jenny Radcliffe interviews experts about human behaviour, social engineering, business, security and life.
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!
Welcome to The Security Podcasts from Security, where security and risk professionals can stay up to date on the latest issues affecting the enterprise. Stay informed on: *Cybersecurity and Geopolitical issues affecting global enterprises *Security trends and technologies for risk mitigation *Advice and tips from physical security and cybersecurity thought leaders
A look at the current state of enterprise security solutions, including new products, features and industry reporting. Hosted by Paul Asadoorian and John Strand.
The straight up security news in 20 minutes or less! Links to all news articles are included here.
Just two people trying to do IT and Security the right way.
This podcast series is brought to you by Lookout – the leader in mobile security. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
Security Today is a podcast centered around physical security and the security industry. From articles to philosophies to trending topics, Baer leads you down the info hole of Security Today. @securitybaer on IG and Twitter @securitytodaypodcast on IG Support this podcast: https://anchor.fm/security-today/support
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
Interviews and fun with professionals, hackers, and everything in between
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
D
Down the Security Rabbithole Podcast


1
Down the Security Rabbithole Podcast
Rafal Los (Wh1t3Rabbit)
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
The Digital Supply Chain is broken and getting challenging to fix. In this "What to LookOut for in 2022" series - we interviewed experts at RSA and BSidesSF on the Broken Digital Supply Chain and ways in which we can fix it. Watch the video for this episode on You Tube - Fix the Broken Digital Supply Chain Episode ShowNotes, Links and Transcript on…
P
Paul's Security Weekly TV


1
Attack Surface Management & Experience in the Age of Security - ESW #279
27:48
27:48
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
27:48
Over the past year, we’ve seen more buzz develop around attack surface management. In fact, major analyst firms Forrester and Gartner recently released research about this topic. But what exactly is it? In this segment, join Mark St. John, LookingGlass’s SVP of Product, to learn more about how to define your attack surface, how to manage it, and ho…
Users of the Strava running app can use fake routes to track other users wherever they are!Carl Franklin による
Overview From the deep-web to encryption we decode more cybersecurity buzzwords,plus we cover security updates for Squid, Vim, the Linux kernel, curl andmore. This week in Ubuntu Security Updates 16 unique CVEs addressed [USN-5491-1] Squid vulnerability [00:29] 1 CVEs addressed in Bionic (18.04 LTS), Focal (20.04 LTS), Impish (21.10), Jammy (22.04 …
S
Security Weekly News (Video)


1
Ant-Man, IOT APTs, Open Sea, Microsoft, Jenkins, SFC, & Zuo Rat - Wrap Up - SWN #221
28:53
28:53
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
28:53
This week in the Security News Dr. Doug talks: Ant-Man Anal Attack, IOTAPTs, OpenSea, Microsoft, Jenkins, SFC, and Zuorat, as well as all the show Wrap Ups from this week! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn221
OT security has been at the center of the security conversation ever since the Colonial Pipeline attacks. Scott Flower, the founder of Pareto Cyber and a former global intelligence officer at FS-ISAC, discusses the challenges in OT security and where the industry needs to go.BankInfoSecurity.com による
T
The Privacy, Security, & OSINT Show


1
268-CCW Permits, UNREDACTED 003, & Linux Questions
42:44
42:44
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
42:44
This week I discuss the California CCW leak, release the latest issue of UNREDACTED Magazine, and answer several listeners' Linux questions.Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and Open Source Intelligence Techniques (9th Edition). More details can be…
S
Security Confidential


1
SC S6 E7 - Erika C - Veteran, CISO, Mentor, and C-Suite Executive
52:50
52:50
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
52:50
Rory Meikle hosts this episode of Security Confidential with Erika Carrara. Erika is an influential, strategic, business-focused, and highly accomplished C-Suite executive. She has accomplished many things such as being a CISO, Director of Information Technology, Penetration Tester, an IT Security Specialist, and many more. Erika is also a Veteran …
In today's episode we talk about Purple Knight, a free tool to help assess your organization's Active Directory security. I stuck Purple Knight in our Light Pentest LITE pentest training lab and did an informal compare-and-contrast of its detection capabilities versus PingCastle, which we talked about in depth in episode #489.…
N
New Books in National Security


1
Roberto J. González, "War Virtually: The Quest to Automate Conflict, Militarize Data, and Predict the Future" (U California Press, 2022)
1:03:15
1:03:15
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
1:03:15
A critical look at how the US military is weaponizing technology and data for new kinds of warfare—and why we must resist. War Virtually: The Quest to Automate Conflict, Militarize Data, and Predict the Future (University of California Press, 2022) is the story of how scientists, programmers, and engineers are racing to develop data-driven technolo…
A new sophisticated malware is attacking SOHO routers New study shows over half of employees use prohibited apps Google battles bots, puts Workspace admins on alert Thanks to today’s episode sponsor, Optiv The modern enterprise needs a solution as unique as its business. Optiv’s Advanced Detection and Response (ADR) works with your organization to …
Case Study: Cobalt Strike Server Lives on After its Domain is Suspended https://isc.sans.edu/forums/diary/Case+Study+Cobalt+Strike+Server+Lives+on+After+Its+Domain+Is+Suspended/28804/ CVE-2022-28219: Unauthenticated XXE to RCE and Domain Compromise in ManageEngine ADAudit Plus https://www.horizon3.ai/red-team-blog-cve-2022-28219/ CWE Top 25 Update …
D
Department of Homelander Security


1
S03E07 - Here Comes a Candle to Light You to Bed
1:24:27
1:24:27
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
1:24:27
What happens when you cross demented nursery rhymes and Empire Strikes Back? This episode of The Boys. With the members of the show living out different plot lines, it doesn’t quite feel like the boys are back in town. But that doesn’t stop the classic “Boys” antics of beating the living daylights out of each other. We’re seeing great characterizat…
P
Paul's Security Weekly (Video-Only)


1
Destructive Firmware, Keys to the Kingdom, the Device Level, & 5 CyberSec Myths - PSW #746
1:59:38
1:59:38
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
1:59:38
In the Security News for this week: ICS training bill, 5 myths, VoIP devices and ransomware, miracle exploits, UnRAR and Zimbra, guess what the most common weakness is, security at the device level is NOT simple, keys to the kingdom, and HP says Destructive firmware attacks pose a significant threat to businesses! Visit https://www.securityweekly.c…
T
The Security Podcasts


1
Why Current Security Approaches Do Not Protect Supply Chains
17:21
17:21
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
17:21
Why are supply chains increasingly vulnerable? Why are current security approaches not working? We sit down with Ev Kontsevoy, CEO and co-founder of Teleport, to discuss this complex problem, as well as how securing machine-to-machine communication can help keep supply chains safe.
S
Security Soapbox | Privacy, Security and Everything in Between


1
Fast and Furious: How to Tackle Speed and Complexity in Security with Ramy Houssaini (BNP Paribas)
16:53
16:53
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
16:53
Cybersecurity challenges are moving at cloud speed and leaving legacy approaches in the dust. On this week’s episode, host Hank Schless is joined by Ramy Houssaini, head of privacy and cyber risk at BNP Paribas, to discuss the top security considerations CISOs should be aware of in this rapidly changing security environment. --- Send in a voice mes…
S
Symantec Cyber Security Brief Podcast


1
Bumblebee loader analysis, Raccoon Stealer returns, and LockBit launches a new version
23:17
23:17
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
23:17
In this week’s Cyber Security Brief, Dick O’Brien and Brigid O Gorman are joined by Symantec threat researcher Chris Kiefer to discuss our latest blog about the Bumblebee loader. We discuss this new malware’s place on the cyber crime landscape, its capabilities, and how it is being leveraged by ransomware actors. We also discuss the appearance of n…
ORIGINALLY AIRED ON JUNE 27, 2022 Articles discussed in this episode: 02:13 – Story # 1: The #1 Period Tracker on the App Store Will Hand Over Data Without a […] The post Talkin’ About Infosec News – 6/27/2022 appeared first on Black Hills Information Security.Black Hills Information Security による
W
WIRED Security: News, Advice, and More


1
How to Use Microsoft Defender on All Your Devices
3:51
3:51
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
3:51
If you use a mix of Apple, Android, and Windows gadgets, you're in luck: The security tool is now available to any Microsoft 365 subscriber.
Teslas, Ransomware und ethische Bedenken Security-Insider Podcast - Folge 56: Bot oder Bürgermeister Teslas, Ransomware und ethische Bedenken Die aktuelle Ausgabe des Security-Insider Podcast steckt wieder voller spannender Themen rund um Deep Fakes, Ransomware, den Datenschutz und vieles mehr. Zudem begrüßen wir Fachautor und IT-Consultant Götz Gü…
Während ich noch jedes Wort handverlesen in die Google Suchmaschine tippe, nutzen vermeintlich weniger digital native Menschen diese Dienste bereits mit natürlicher Sprache. Und kommen damit weiter, als ich es aktuell in manchen Science-Fiction-Romanen lese. Ganzer Beitrag mit allen Links: https://rz10.de/1-noch/perspektive-sap-it-juni-2022/ Viel S…
T
The National Security Podcast


1
Women in National Security: Julie-Ann Guivarra of the National Indigenous Australians Agency
42:25
42:25
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
42:25
In this episode of the National Security Podcast, we bring you the fifth instalment of the Women in National Security mini-series, produced in collaboration with Accenture. In this episode of the National Security Podcast, hosts Gai Brodtmann, National Security College Futures Council member, and Meg Tapia, Principal Director for Defence and Nation…
N
Naked Security Podcast


1
S3 Ep89: Sextortion, blockchain blunder, and an OpenSSL bugfix
25:02
25:02
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
25:02
Memories of the iPhone 1. Sextortion scams target LGBTQ+ daters. Yet another blockchain blunder. OpenSSL fixes the bug missed in the last bugfix. And what became of Little Bobby Tables?https://nakedsecurity.sophos.com/ftc-warns-of-lgbtq-extortion-scamshttps://nakedsecurity.sophos.com/harmony-blockchain-loses-nearly-100mhttps://nakedsecurity.sophos.…
S
Smashing Security


1
281: Debug ransomware and win $1,000,000, period-tracking apps, and AI gets emotional
59:47
59:47
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
59:47
A new version of the LockBit ransomware offers a bug bounty, women uninstall period-tracking apps in fear of how their data might be used against them, and Microsoft's facial recognition tech no longer wants to know how you're feeling. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer secu…
S
Security Today


1
ST.025 "A problem well put, is a problem half solved"
27:46
27:46
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
27:46
Look, this one get's a lil explicit. When your ole' unc starts gabber jawing about HIK he sounds like he's a bigoted 80yo man. But push past that because @securitybaer is here to help you. Baer goes over shorts, opens and grounds. Trying to help those who are newer to the game with a little bit of immediate deterrence highlight and like I said some…
This week, Alan, Quinta, and Scott were joined by star New York Times reporter Katie Benner to talk through some of this week's biggest national security news stories, including: “The Masked Ringer.” We’re about half way through the Jan. 6 committee’s public hearings—and, despite originally planning a weeks-long pause, the committee is now holding …
This episode considers the agenda for the NATO Madrid Summit as the organisation faces an unprecedented challenge in responding to the war against Ukraine and the wider threats that Russia, as well as China, present to the Alliance. In this episode, Dr Thierry Tardy, Director of the Research Division at the NATO Defence College, discusses with Dr N…
S
Security Now (Audio)


Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing T…
Michael and Sara talk to Matt Soseman about his take on practical Zero Trust and Michael goes on a rant about Zero Trust's Assume Breach pillar. We also cover Azure news about Azure SQL DB, Container Apps, Bastion, Sentinel and Microsoft Entra.
Prologue As some of you know, I've been either in the AppSec space, or adjacent, since the fairly early days. I built a program at GE a million years ago, and worked selling dynamic web app testing software for many years. If you've been in the space, you can feel a little bit hopeless with all the different options, tools, and advice only to look …
C
Cloud Security Podcast by Google


1
EP72 What Does Good Detection and Response Look Like in the Cloud? Insights from Expel MDR
32:04
32:04
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
32:04
Guests: Dave “Merk” Merkel, CEO @ Expel Peter Silberman, CTO @ Expel Topics: Many MDRs claim to be “security from the cloud”, but they actually don’t know much about cloud security. What does good looks like for MDR in the cloud (cloud being a full range from IaaS to SaaS)? What are the key challenges for clients picking an MDR for their cloud envi…
Unfair über die Seitenlinie Van-Eck-Phreaking GPG RSA-Schlüssel aus der Ferne mit dem Mobiltelefon rekonstruieren Abhören mittels Lampenflackern OpenSSL Fehlermeldungen ermöglichen Seitenkanalangriffe XBox360 Glitch Hack Meltdown und Spectre Spectre mittels JavaScript String-Vergleich gegen Timing-Angriffe härten INNOQ Security Podcast: Passwörter …
Zero trust vs. castle and the moat What does zero trust have to do with electric cars? For this episode, Robby is joined by Tony Fergusson CISO – EMEA at Zscaler. Tony has more than 25 years of experience in IT networking and security in Manufacturing, Information Technology and Financial Services, and even more importantly, he loves talking about …
Developers want bug-free code -- it frees up their time and is easier to maintain. They want secure code for the same reasons. Matias Madou joins to talk about how the definition of secure coding varies among developers and appsec teams, why it's important to understand those perspectives, and how training is just one step towards building a securi…
S
Security Nation


1
Steve Micallef of SpiderFoot on Open-Source Intelligence
30:02
30:02
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
30:02
Interview Links Follow Steve on Twitter, and give the SpiderFoot official account a follow while you’re at it. Check out the SpiderFoot website and GitHub page, and learn more about the SaaS version, SpiderFoot HX. Learn about the latest SpiderFoot 4.0 release with YAML correlation rules. Read Steve’s blog, especially his posts on the 10 years deve…
T
The Official Offensive Security Podcast

1
#32: Election Integrity & Critical Infrastructure with Lester Godsey
41:00
41:00
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
41:00
In this week’s special episode, Dr. Heather Monthie sits down with Lester Godsey, CISO of Maricopa County, Arizona. Lester begins by explaining how he got into the cybersecurity field and shares a fun fact about himself. He then shares his role as a CISO, how security supports different departments, and the biggest risks he sees in critical infrast…
Side channels! Frequency scaling! Key encapsulation, oh my! We're talking about the new Hertzbleed paper, but also cryptography conferences, 'passkeys', and end-to-end encrypting yer twitter.com DMs. Transcript: https://share.descript.com/view/lPM4lsxha63 Links: Hertzbleed Attack | ellipticnews (wordpress.com) https://www.hertzbleed.com/hertzbleed.…
Philippe Humeau founded CrowdSec in 2020, where they got to work on their open-source massively multi-player firewall which utilises IP behaviour AND reputation to help tackle mass scale hacking. Listen in as he talks about the benefits of actual collaboration, the human side of security and some brilliant stories. To find out more about CrowdSec o…
Exclusive Networks has joined forces with security leaders in calling on the industry to take global action in a bid to end the recruitment crisis in cybersecurity, which is currently faced with an estimated shortfall of 2.7 million professionals. The Paris-headquartered global cybersecurity specialist is one of the founding partners supporting an …
Chat with Sandeep Lahane, CEO of Deepfence, on how ThreatStryker is changing the game for Cloud Workload Protection. We go deep in to the product's unique full SSL decryption and packet capture capability, identification of an organizations most vulnerable endpoints, and automated workflows to remediate compromised systems. Episode Show Notes: Sand…
S
SECTION 9 Cyber Security


1
Kali Linux, Nmap, Shodan, Gophish, Zap and Burp Suite - 244
19:09
19:09
「あとで再生する」
「あとで再生する」
リスト
気に入り
気に入った
19:09
Time to dig in and start learning the tools. LINKS 1. Kali Linux 2. Nmap 3. Shodan 4. Gophish 5. Zap 6. Burp Suite FIND US ON 1. Twitter - DamienHull 2. YouTubeSECTION 9 による
https://www.csoonline.com/article/3660560/uber-cisos-trial-underscores-the-importance-of-truth-transparency-and-trust.html https://thehackernews.com/2022/06/conti-leaks-reveal-ransomware-gangs.html?m=1 https://www.bleepingcomputer.com/news/security/new-symbiote-malware-infects-all-running-processes-on-linux-systems/ https://doublepulsar.com/bpfdoor…