Security 公開
[search 0]
もっと

Download the App!

show episodes
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over six million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, a ...
 
Discover the unique, inspiring, and often amusing stories behind what it takes to lead cybersecurity efforts in an organization. The Security Stories podcast features interviews with a diverse range of guests, each sharing their leadership experiences for the benefit of others in the cybersecurity industry. Discover more at https://www.cisco.com/c/en/us/products/security/securitystories.html
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
Each week on The No Name Security Podcast, Matt Stephenson chats with people who secure the things, hack the things or write about securing and hacking the things that surround us in everyday life. From voting machines to social engineering to the critical infrastructure, if it can be secured, it can be hacked. On No Name Security, we meet the people who do one or the other… and sometimes both.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Loading …
show series
 
This week in the Security News: From a stolen laptop to inside the company network, the essential tool for hackers called "Discord", fixin' your highs, hacking DEF CON, an 11-year-old can show you how to get an RTX 30 series, broadcasting your password, to fuzz or not to fuzz, a real shooting war, evil aerobics instructors, the return of the PunkSp…
 
Alyssa will discuss the growing trend of organizations implementing Business Information Security Officers. We'll talk about how the BISO builds bridges between the security and business organizations that DevSecOps shared-responsibility culture. We'll dive into Alyssa's career progression and the lessons she learned along the way the prepared her …
 
This week, we kick off the show with an interview featuring Alyssa Miller, BISO at S&P Global, to talk about the how the “B” in BISO is for Business! Next up, we welcome Michael Welch, Managing Director at Morgan Franklin, to discuss Cyber-Physical Attacks!! In the Security News, From a stolen laptop to inside the company network, the essential too…
 
While much of the discussion around modern ransomware campaigns has centered on threat actors from Eastern Europe and Russia, this episode highlights some of the lesser-known activity in a different region and explores how nations may experiment with asymmetric cyber capabilities in the future. In this episode of the Eye on Security podcast, host L…
 
This week Dr. Doug talks: Patching, PetitPotam, Elon, Microsoft Defender, Ransomware rules, Meteor, and more, on this edition of the Security Weekly News Wrap up Show! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn138
 
EPISODE 227-Eleven TopicsThis week I present Eleven assorted topics surrounding privacy, security, and OSINT including a Pegasus recap, ID.Me challenges, more Airtag concerns, the Protonmail audit, results from a ProtonMail search warrant, new uBlock Origin features, another email masking option, upcoming Google Voice changes, GrapheneOS updates, L…
 
This week, in our first segment, we welcome Da-Wyone Haynes, Consultant in Data Analytics at Aegon & Transamerica, to talk about The Need for CyberSecurity Training Programs and the Role Cyber Professionals Play! Then we welcome Stephanie Aceves, Senior Director of Threat Response & SME Lead at Tanium, to discuss Tanium for Incidents! In the Enterp…
 
The latest edition of the ISMG Security Report features an analysis of the disappearance of ransomware-as-a-service groups, such as REvil and Darkside, and how that impacts the wider cybercrime ecosystem. Also featured: ransomware recovery tips; regulating cyber surveillance tools.BankInfoSecurity.com による
 
Biden warns that severe cyberattacks could escalate to an actual war New ransomware gangs emerge on cybercrime forums New Android malware uses VNC to spy and steal victim passwords Thanks to our episode sponsor, Varonis We all know devasting ransomware goes beyond the endpoint. Big game ransomware defense for your cloud and on-prem data is on every…
 
Overview It’s another week when too many security updates are never enough as wecover 240 CVE fixes across Avahi, QEMU, the Linux kernel, containerd,binutils and more, plus the Ubuntu 20.10 Groovy Gorilla end-of-life. This week in Ubuntu Security Updates 240 unique CVEs addressed [USN-5008-1, USN-5008-2] Avahi vulnerabilities [00:36] 2 CVEs address…
 
In our July monthly show we discuss gift card scams! What are the different scams that are out there, how do they work, and details on how to protect yourself from becoming a victim. ** Links mentioned on the show ** 8 Gift Card SCAMS you can SPOT and EASILY AVOID! https://www.giftcards.com/gcgf/giftcard-scams ** Watch this […] The post How to Prot…
 
Malicious Content Delivered Trhough archive.org https://isc.sans.edu/forums/diary/Malicious+Content+Delivered+Through+archiveorg/27688/ A Large-Scale Security-Oriented Static Analysis of Python Packages in PyPI https://arxiv.org/abs/2107.12699 Crimea "manifesto" deploys VBA Rat using double attack vectors https://blog.malwarebytes.com/threat-intell…
 
Hey friends, today we're continuing our discussion of password cracking by sharing some methodology that has helped us get a high cred yield, and some tips on taking cracked passwords from multiple sources and Frankensteining them into a beautiful report for your customer. For some background, when 7MS started as a biz, we used to crack passwords i…
 
On this week’s Cyber Security Brief, we discuss some recent ransomware stories, as well as giving a sneak peek into some research we have been doing into ransomware. We also talk about recent announcements from U.S. authorities that attributed some recent cyber attacks, including the Microsoft Exchange Server campaign, to Chinese actors, and we als…
 
Pygmy hippopotamus bugs, DEF CON's data slip-up, and phishing fraudsters have their collars felt. All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault, joined this week by Naked Security's Paul Ducklin. Visit https://www.smashingsecurity.co…
 
In this episode Michael, Sarah, Gladys and Mark talk with guest Carmichael Patton, a Senior Security Architect in the Digital Security and Resiliency group at Microsoft about Microsoft's journey to Zero Trust and some of the lessons learned along the way. We also discuss Azure Security news about: Azure Sentinel, Azure Automation, Azure SQL DB and …
 
Apple's emergency 0-day fix. Two sorts of Windows nightmare, neither involving printers. Twitter hacker busted. And our very own Doug ruins a brand new TV.https://nakedsecurity.sophos.com/apple-emergency-zero-day-fixhttps://nakedsecurity.sophos.com/windows-petitpotam-network-attackhttps://nakedsecurity.sophos.com/windows-hivenightmare-bughttps://na…
 
Philipp Amann is the Head of Strategy at European Cybercrime Center No More Ransom, an incredibly useful self-serve library of ransomware crackers, from Alpha to Ziggy Need some specific guidance on what to do if you suffer a ransomware attack? Check out NMR's publication! Also mentioned was Europol's annual Internet Organised Crime Threat Assessme…
 
Originally Aired on July 26, 2021 Articles discussed in this episode: 00:00 – BHIS | Talkin’ Bout News 2021-07-26 03:54 – Story # 1: https://cyberworkx.in/2021/07/24/new-windows-attack-petitpotam-forces-windows-hosts-to-share-ntlm-hashes/ 18:53 – Story # 2: https://thehackernews.com/2021/07/how-to-mitigate-microsoft-windows-10-11.html 30:26 – Story…
 
Picture of the Week. Faster and more efficient phishing detection in Chrome 92. A Universal Decryptor for all Kaseya victims. The printer driver used by millions of HP, Samsung and Xerox Printers is exploitable. Windows' Process Hacker. "GoLang" gains supply chain security features at GitHub. Closing the Loop. SeriousSAM & PetitPotam. We invite you…
 
Jane Lo, Singapore Correspondent speaks with Ms Lynette TAN, Chief Executive. Singapore Space and Technology Limited (SSTL). As Chief Executive and Board Member of SSTL, Lynette develops the organisation’s industry initiatives, leads its startup accelerator programmes and drives its consulting business, identifying opportunities for government orga…
 
All links and images for this episode can be found on CISO Series If I'm going to be riding my team really hard, how much charisma will I need to keep the team frightened so they stay motivated, yet don't want to leave? This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Mike Johnson. Our guest is Jason Fruge (@j…
 
Prologue Frankly, we have no idea how we got through 450 episodes without interviewing Rich. No clue. Rich is a man of many talents including a trained responder for situations like we've been facing. He's also a cloud security specialist, and happens to do a half-dozen other things in his "spare time" too. In this episode we chat about what the pa…
 
Sean Sweeney is a frequent author and speaker on cybersecurity. In this episode of Security Confidential Sean talks about cloud security. He has a deep background in cloud security. Sean currently leads the Field CISO and Cloud Security Advisor group within Oracle North America Cloud Engineering. In his prior role Sean was with Microsoft where he w…
 
This week on the podcast we cover the latest Microsoft Windows privilege escalation vulnerability, SeriousSAM aka HaveNightmare. Before that, we discuss NSO Group and their spyware software known as Pegasus and whether private organizations should be allowed to market and sell spyware to government agencies.…
 
Two experts of extremist radicalization take us down the QAnon rabbit hole, exposing how the conspiracy theory ensnared countless Americans, and show us a way back to sanity. In January 2021, thousands descended on the U.S. Capitol to aid President Donald Trump in combating a shadowy cabal of Satan-worshipping pedophiles. Two women were among those…
 
In this edition of the Tin Foil Hat Club I speak with Fraud professionals Peter Taylor and Robert Brooker. We discuss fakes , frauds, cybercrime and the upcoming 15th annual fraud forum reference the following articles. Thanks to both for an awesome interview... To follow Robert on LinkedIn, click this link here. To follow Peter on LinkedIn, click …
 
Josh and Kurt talk about the news that the NSO Group is widely distributing spyware onto a large number of devices. This news should be a wake up call for anyone creating devices and systems that could be attacked, it's time to segment services. There's not a lot individuals can do at this point, but we have some ideas at the end of the episode. Sh…
 
https://therecord.media/using-vms-to-hide-ransomware-attacks-is-becoming-more-popular/ https://blog.erratasec.com/2021/07/ransomware-quis-custodiet-ipsos-custodes.html?m=1 https://www.databreachtoday.com/how-mespinoza-ransomware-group-hits-targets-a-17086 https://krebsonsecurity.com/2021/07/dont-wanna-pay-ransom-gangs-test-your-backups/ https://ars…
 
Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Geoff Walton, Justin Bollinger, Alex Hamerstone and David Boyd. Stories Title: New Law Will Help Chinese Government Stockpile Zero-Days URL: https://www.securityweek.com/new…
 
Niklas Kourtidis, SAP Solution Specialist für EMEA bei Splunk, war zu Gast und hat mit mir über die Möglichkeiten gesprochen, wie Splunk Geschäftsprozesse im SAP überwachen kann und sicherstellt, dass diese ordnungsgemäß laufen. Link zum ganzen Artikel: https://rz10.de/sap-security/verfuegbarkeit-im-sap-ueberwachen-mit-splunk/ Viel Spaß euch allen …
 
-- Calvin and Hobbes courtesy of Bill Waterson None of us wants to be judged by our worst act on our worst day, and we consistently judge Burr for that. He was not a perfect man, but he's not a villain. He's a dude, just a guy. -- Leslie Odom, Jr. What if the worst day of your life ended up being just another Zoom meeting on someone else’s calendar…
 
Our guest today is Stuart Peck, director of cybersecurity strategy for Zero Day Lab. Stuart talks to Hazel about his various career roles within threat intelligence, social engineering and incident response. We also talk about how he went from a non technical background to a technical one, and overcoming imposter syndrome in the process. Stuart the…
 
Ransomware payment amounts have skyrocketed over the past year. As threat actors keep getting richer, they have more resources to fuel their operations. Many people argue that the way to discourage ransomware is to implement an outright ban on ransom payments. Is this suggestion idealistic or realistic? How would such a ban affect companies, and wh…
 
Loading …

クイックリファレンスガイド

Google login Twitter login Classic login