Home Podcasts Page 88

Podcasts

Listen to the best cybersecurity podcasts on the cyberpost. Updated daily to bring you the best and most popular podcasts from the cyber security world. Listen to Darknet Diaries, Smashing Security, Security Now, Hacking Humans and more!

Between Two Nerds: The US has it all wrong on cyber

0
In this edition of Between Two Nerds Tom Uren and The Grugq find that for most countries...

“Pantsdown” firmware vulnerability. ChromeLoader warning. Conti update. Ransomware at SpiceJet. CISA’s Known Exploited Vulnerabilities...

"Pantsdown" firmware vulnerability. ChromeLoader warning. Conti update. Ransomware at SpiceJet. CISA's Known Exploited Vulnerabilities Catalog expands. Kyiv honors Google. Reformed ID thief. "Pantsdown" in QCT Baseboard Management Controllers. A warning...

A call-up of Russian reserves, and more notes on the IT Army’s claimed hack...

0
A call-up of Russian reserves, and more notes on the IT Army's claimed hack of the Wagner Group. Netflix phishbait. The Rockstar Games and LastPass incidents. CISA releases eight...

A new loader variant for wiper campaigns. Sanctions, hacktivism, and disinformation. Conti’s toxic branding....

A new loader variant for wiper campaigns. Sanctions, hacktivism, and disinformation. Conti’s toxic branding. Happy birthday, US Cyber Command. There’s a new loader identified in wiper campaigns. President Putin complains...

Srsly Risky Biz: Microsoft deserves the stick

0
Normal Seriously Risky Biz correspondent Tom Uren is on leave this week, so there’s some lunatics-running-the-asylum energy in the episode. Patrick...

EP 119: Hot Wallets

0
Full Transcript In this episode we hear from journalist Geoff White who talks about some of the recent crypto currency heists that have been happening. Geoff has been tracking a...

Risky Biz News: Critical Exim patch remains unpatched

0
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read...

Log4j: new exploitation, new mitigations, new risk assessments. Service interruptions, Space Force’s capture-the-flag, and...

0
Log4j: new exploitation, new mitigations, new risk assessments. Service interruptions, Space Force’s capture-the-flag, and official interventions. Updates on Log4j vulnerabilities: new exploitation, new mitigations, new risk assessments, some good advice...

EP 105: Secret Cells

0
Joseph Cox, Senior Staff Writer at Motherboard, joins us to talk about the world of encrypted phones. Support for this show comes from IT Pro TV. Get 65 hours of...

Updates on the cyber phases of Russia’s hybrid war, including the role of DDoS...

Updates on the cyber phases of Russia's hybrid war, including the role of DDoS and cyber offensive operations. Ransomware, bad and sometimes bogus DDoS as a weapon in a hybrid...
Error decoding the Instagram API json