Home Podcasts Page 10

Podcasts

Listen to the best cybersecurity podcasts on the cyberpost. Updated daily to bring you the best and most popular podcasts from the cyber security world. Listen to Darknet Diaries, Smashing Security, Security Now, Hacking Humans and more!

Trojan Source–a threat to the software supply chain. Ransomware goes to influence operations school....

0
Trojan Source--a threat to the software supply chain. Ransomware goes to influence operations school. Triple extortion? Criminal target selection. Researchers describe Trojan Source, a hard-to-detect threat to the software supply...

Disinformation at the UN. Phishing against Ukraine. Hydra Market taken down. Is someone carrying...

0
Disinformation at the UN. Phishing against Ukraine. Hydra Market taken down. Is someone carrying on for Lapsus$? Compromise at Mailchimp. FIN7 branches out into ransomware. Disinformation at the UN. Russian...

Influence operations in the grey zone. FSB raids REvil. Open Source Software Security Summit...

0
Influence operations in the grey zone. FSB raids REvil. Open Source Software Security Summit looks to public-private cooperation. Privateering and state-sponsored cybercrime. A large-scale cyberattack against Ukrainian websites looks like...

Cyber war: a continuing threat, a blurry line between combatants and noncombatants. Chinese cyberespionage...

Cyber war: a continuing threat, a blurry line between combatants and noncombatants. Chinese cyberespionage and its “plumbing.” CISA adds Known Exploited Vulnerabilities. News from Jersey. US officials continue to rate...

Electioneering, domestic, but with international implications. The Mirai botnet is exploiting OMIGOD. Container shipper...

0
Electioneering, domestic, but with international implications. The Mirai botnet is exploiting OMIGOD. Container shipper sustains data breach. Odd ads. Phishing with Mr. Musk’s name. Cyber electioneering, in Hungary and Russia,...

Srsly Risky Biz: Why did Russia deploy hackers to war zones?

0
In this podcast Patrick Gray and Tom Uren talk about how Ukraine has countered Russia’s cyber operations. They also look at various...

EP 135: The D.R. Incident

Full Transcript Omar Avilez worked in the CSIRT of the Dominican Republic when a major cyber security incident erupted. Omar walks us through what happened and the incident response procedures...

Between Two Nerds: The Balance between Offence and Defence

0
In this edition of Between Two Nerds Tom Uren and The Grugq look at the natural advantages that network defenders have....

Risky Business #649 — Java being a fiddly mess saves the day

0
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including: The log4j bug...

Article 5? It’s complicated. Influence ops for economic advantage. SOHO routers under attack. YTStealer...

0
Article 5? It’s complicated. Influence ops for economic advantage. SOHO routers under attack. YTStealer described. RansomHouse hits AMD. A NetWalker affiliate cops a plea. NATO's response to Killnet's cyberattacks on...
Error decoding the Instagram API json