Security 공개
[search 0]

Download the App!

show episodes
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
 
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the "Best Security Podcast 2018" and "Best Security Podcast 2019", Smashing Security has had over five million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on Twitter at @SmashinSecurity, ...
 
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
 
Security In 5 brings you security news, tips and opinions on information IT and general security in about five minutes. Straight and to the point information in a timeframe you can easily listen to in one sitting. Whether you are a security professional or someone that wants to keep personal data safe this podcast will cover everyone. Be aware, be safe, welcome to Security In 5.
 
Security Conversations covers the business of cybersecurity, from the lens of veteran journalist and storyteller Ryan Naraine. Thoughtful conversations with security practitioners on threat intelligence, zero trust, securing cloud deployments, penetration testing, bug bounties, advancements in offensive research and targeted malware espionage activity. Connect with Ryan on Twitter (Open DMs).
 
Follow the Wh1t3 Rabbit ... attention technology and business leaders! The "Down the Security Rabbithole" podcast is not your ordinary security podcast, primarily because we take a business perspective on the colorful and fast-paced world of information security. Bringing useful commentary on relevant events in the information security community, filtered through a no-nonsense business first approach, this is a podcast that helps you get the sane perspective on hacks, risks, threats and tech ...
 
The AI & Security Podcast introduces listeners to the most cutting edge technology and artificial intelligence (AI) that is impacting the security industry today. Listen to interviews, hosted by Dennis Crowley, with the leaders in the robotics, video detection, situational intelligence and users of the latest technology today.
 
Loading …
show series
 
This week in the Security Weekly News the crew talks: Pingback is back, was it ever really gone?, damn QNAP ransomeware, anti-anti-porn software, Qualcomm vulnerabilities, spreading pandas on Discord, the always popular Chinese APTs, exploits you should be concerned about, job expectations, westeal your crypto currency, quick and dirty python (with…
 
Risk-based vulnerability management is more than just a vulnerability scan or assessment. It incorporates relevant risk context and analysis to prioritize the vulnerabilities that pose the greatest risk to your organization This segment will explore the elements of a successful vulnerability management program and impactful ways to build upon your …
 
This week, Bob Erdman, Associate Director of Development at Core Security, joins us for an interview to talk about Building a Risk-Based Vulnerability Management Program! Then, Jim Langevin, US Congressman at the US House of Representatives, joins us for a discussion on Biden Administration EO on Cyber! In the Security News, Pingback is back, was i…
 
On Thursday, the residents of the poor Jacarezinho favela in the north end of Rio de Janeiro woke up to the sound of gunshots. All told, it was the deadliest Rio de Janeiro police operation — ever. At least 25 people were killed, including one police officer; three people were injured and two passengers were hit by stray bullets on a passing train.…
 
This week in the Security Weekly News Wrap Up Dr. Doug talks: Pings are bad, m'kay, Yahoo Answers, Python ipaddress bugs and the curse of octal, Deepfakes, Qualcom, Spectre, First Horizon Bank, & the show Wrap Ups for this week! Show Notes: https://securityweekly.com/swn120 Visit https://www.securityweekly.com/swn for all the latest episodes! Follo…
 
This week I offer a brief episode about the abuse of OSINT details which led to fraudulent unemployment claims, plus a detailed look at the ParkMobile data breach.Direct support for this podcast comes from sales of my books and the online video training. More details can be found at IntelTechniques.com. Your support eliminates any ads, sponsors, en…
 
Originally Aired on May 5, 2021 Articles discussed in this episode: https://thehackernews.com/images/-V6c2_ZHgMzI/YJFAaQl5RjI/AAAAAAAAA_8/wNs6d4zWc1MHLJ5VPaSpzHvXkFIIcwfZQCLcBGAsYHQ/s0/reset-passsword.jpg https://threatpost.com/dell-kernel-privilege-bugs/165843/ https://www.bleepingcomputer.com/news/security/new-windows-pingback-malware-uses-icmp-f…
 
This week, In the first segment, we welcome Steve Springett, Chair at CycloneDX SBOM Standard, Core Working Group, for a discussion on The Rise of SBOM! Next up, Carlos Morales, CTO Security Services at Neustar, joins for a discussion on how Applications Are Your Lifeblood – Understanding the Changing Attack! In the Enterprise Security News: Code42…
 
Being arguably each side’s most enduring international bond, the China-Korea relationship has long been of great practical and symbolic importance to both. Moreover, as Odd Arne Westad observes in his new book, this has in many ways also been a paradigmatic kind of tie between a large ‘empire’ and smaller (though by no means small) ‘nation’, and th…
 
The latest edition of the ISMG Security Report features an analysis of whether courts can trust evidence collected by Cellebrite's mobile device forensic tools. Also featured: Report shows attackers' dwell times plummeting; a call for partnership with law enforcement.저자 BankInfoSecurity.com
 
DOD announces expansion of bug bounty program Data leak uncovers Amazon product review scam DHS to embark on historic hiring initiative Thanks to our episode sponsor, Boxcryptor We think CISOs also have a right to sleep peacefully at night. Therefore, we recommend encrypting your sensitive business data for an extra layer of protection. Now in its …
 
We speak with Drago Gvozdanovic, CEO of Cynterra, based in Canberra. In an Australian first, cybersecurity and data analysis firm Cynterra, has won a major contract to provide the Australian Government’s Digital Transformation Agency (DTA) with a new generation Secure Internet Gateway (SIG). The first of its kind SIG is based on Cynterra’s fully IR…
 
In this interview Jenny talks to multiple Emmy award winning journalist Kerry Tomlinson who gives a masterclass in why hard work, discipline and professionalism pays off. We want to thank Kerry for her amazing work and a brilliant interview! To follow Kerry on LinkedIn, click this link here. To follow Kerry on Twitter, click here for the link to he…
 
Our latest episode is shorter than normal because…well, we recorded most of it and then lost the file. Suffice to say we were a bit tired by the time the re-recording was done! Or maybe we’re better off this way? Either way, tune in for our thoughts on the DC Circuit’s en banc grant in the al Hela GTMO detainee case (asking whether the Fifth Amendm…
 
Scans for Exposed Azure Storage Containers https://isc.sans.edu/forums/diary/Exposed+Azure+Storage+Containers/27396/ Qualcomm MSM Vulnerability https://research.checkpoint.com/2021/security-probe-of-qualcomm-msm/ Google to Automatically enroll users in 2SF https://blog.google/technology/safety-security/a-simpler-and-safer-future-without-passwords/ …
 
This week in the Enterprise Security News: Code42 enhances Incydr to help identify insider risk related to file uploads to unsanctioned websites, Imperva acquires CloudVector to provide visibility and security for API traffic, ThreatQuotient launches ThreatQ TDR Orchestrator to accelerate detection and response, KnowBe4 Launches Artificial Intellig…
 
Data collection by social media platforms is not a secret. The types of data and how they are used is still hazy. This episode talks about what Signal did with their targeted ads and what Facebook did to their account in response. Be aware, be safe. Become A Patron! Patreon Page *** Support the podcast with a cup of coffee *** - Ko-Fi Security In F…
 
Overview This week we look at the response from the Linux Technical Advisory Boardto the UMN Linux kernel incident, plus we cover the 21Nails Eximvulnerabilities as well as updates for Bind, Samba, OpenVPN and more. This week in Ubuntu Security Updates 40 unique CVEs addressed [USN-4928-1] GStreamer Good Plugins vulnerabilities [00:40] 2 CVEs addre…
 
On this week’s Cyber Security Brief podcast, Brigid O Gorman and Dick O’Brien discuss some research we have recently been working on at Symantec. First, we discuss a blog we published this week, which looks at multi-factor authentication and how it has become a headache for malicious actors, leading them to adopt new attack techniques in an attempt…
 
President Biden says he will raise the cap on refugees admitted to the United States. A federal judge accuses the Justice Department and former Attorney General Bill Barr of misleading her and Congress about the advice he got on whether to charge former President Trump. And an oversight board decides Facebook was right to suspend Donald Trump, but …
 
How did the SCAM cryptocurrency become a success? Why is Google allowing government rip-off ads to still appear on search results? And why on earth is everyone suddenly spending millions of dollars on NFTs? All this and much much more is discussed in the latest edition of the "Smashing Security" podcast by computer security veterans Graham Cluley a…
 
We look into Apple's recent emergency updates that closed off four in-the-wild browser bugs. We explain how the infamous "Flubot" home delivery scam works and how to stop it. We investigate a recent security bug that threatened the PHP ecosystem.https://nakedsecurity.sophos.com/apple-products-hit-by-fourfecta-of-zero-day-exploitshttps://nakedsecuri…
 
Welp, I need another security certification like I needed a bunch to the retinas, but even after all the fun (and pain) of CRTP I couldn't help but sign up for the maiden voyage of Attacking and Defending Azure AD Cloud - a.k.a. CARTP. This cert comes to us from our friends over at Pentester Academy, and is all about pwning things in Azure AD which…
 
Picture of the Week. REvil hacks Apple supplier Quanta Computer. World-famous Scripps Health taken down. The Big Emotet Botnet Takedown. Emotet's 4,324,770 eMail addresses. Have I Been Pwned domain-wide notifications. QNAP. Gravity NNTP Newsreader updated to v3.0.11.0 Just a bit more about Dan Kaminsky. Closing the Loop. The Ransomware Task Force. …
 
Prologue I honestly am having a difficult time understanding how this show has gone so long, so many episodes, without sitting down with Dave Marcus 1:1. It hurts my brain. So I rectified this situation and here you are. Dave is one of the best humans in the industry, has a few truckloads of knowledge, and you could stand to learn something from hi…
 
This week on the podcast, we mourn a Dan Kaminsky, a well-loved hacker responsible for identifying one of the biggest vulnerabilities in the history of the internet. Then, we continue our dive into web app security standards with a discussion on Same-Origin Policy and Cross Origin Resource Sharing (CORS) and how they help protect us against Cross S…
 
TechSpective Podcast Episode 057 We frequently see data referred to as the “new oil” or the “lifeblood of business.” Hyperbolic catch phrases aside, though, data is everywhere. All of the things are data. As the rate of data creation skyrockets exponentially, we are struggling as a global community with how to store it, or protect [...] The post Sa…
 
Wie Scraping die Datenhoheit gefährdet Security-Insider Podcast - Folge 37: Scraping bei Facebook, LinkedIn und Clubhouse Wie Scraping die Datenhoheit gefährdet Hacking-Angriff oder legitime Datensammlung? Das scheint bei den aktuellen Scraping-Vorfällen um hunderte Millionen Userdaten von Facebook, LinkedIn und Clubhouse Auslegungssache zu sein. D…
 
Josh and Kurt talk about the University of Minnesota experimenting on the Linux Kernel. There's a lot to unpack in this one, but the TL;DR is you probably don't want to experiment on the kernel. Show Notes Linux Bans University of Minnesota for Sending Buggy Patches in the Name of Research University of Minnesota security researchers apologize for …
 
Wir schauen heute nochmal kurz zurück auf die vorige Sendung. Jens hat eine Liste von weiteren Informationen zur Luca-App zusammengestellt. Jens und Tobias besprechen, welche Kommunikationswerkzeuge sie verwenden und wir stellen fest, dass wir nur geringen Schnittstellen haben. Insbesondere Signal ist eines der Werkzeuge, welches wir gemeinsam nutz…
 
Ich habe kürzlich bemerkt, wie schwierig es sein kann, sich an Regeln zu halten. Was mache ich eigentlich, wenn ich gerade nicht weiß, was die Vorschrift ist, obwohl ich mich an sie halten will? Und wenn ein Bürger einen Falschparker meldet, ist sie oder er dann eine Petze? Ganzer Beitrag mit allen Links: https://rz10.de/1-noch/best-of-april-2021/ …
 
Director of Internet Analyis at Kentik, Doug Madory, joins the podcast to shed light on the mysterious appearance of unused IPv4 space belonging to the US Department of Defense: the strange connection to a Florida company now managing the world's largest honeypot; the odd Inauguration Day timing of this discovery;, and why enterprise network defend…
 
Marina and int eighty talk about how they came up with the idea for the Twitch livestream, what they’ve learned along the way, and future plans for the games. We also speak with int eighty about his “hacker rapper” gig, Dual Core Music. This episode's Rapid Rundown comes with a rare content warning: We're discussing the life, impact, and passing of…
 
The role of a chief information security officer demands technical knowledge, but it also requires soft skills of leading and influencing - especially over the past year as cybersecurity has grown in visibility for companies. So how can CISOs get their security message across to boards, the business, employees and the security team? Joining Janne a…
 
Mandiant Advantage, our SaaS platform, was always intended to house more than just our threat intelligence—and now it does. With the addition of Mandiant Automated Defense and Mandiant Security Validation, we are continuing to roll out new features in a platform that is easily accessible, as well as easy to deploy and scale. Mike Armistead, SVP of …
 
All links and images for this episode can be found on CISO Series https://cisoseries.com/pushing-this-to-the-top-of-your-inbox-so-you-can-delete-it-again/ We're following up on our previous email because we love to engage in self-defeat. We assume you don't want to hear from me again, but just to make sure, I've delivered another email for you to d…
 
Loading …

빠른 참조 가이드

Google login Twitter login Classic login