Podcast Episodes

Back to Search
How 2025  Shaped the Future of Cybersecurity With Rebecca Taylor & Will Thomas

How 2025 Shaped the Future of Cybersecurity With Rebecca Taylor & Will Thomas



This year, cybercrime got a teenage makeover. Groups like Scattered Lapsus$ Hunters, part of the loose collective ‘The Com’ and filled with young, radicalized hackers, became a top threat. Their aggr…


Published on 3 hours ago

Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations

Beyond Bug Bounties: How Private Researchers Are Taking Down Ransomware Operations



Just in time for spooky season, this episode takes you into the darkest corners of the cyber underworld, where the real monsters aren’t ghosts or goblins, but ransomware gangs lurking in the shadows.…


Published on 1 month ago

Can AI Solve the Vulnerability Problem in Critical Infrastructure?

Can AI Solve the Vulnerability Problem in Critical Infrastructure?



Generative AI is poised to revolutionize vulnerability discovery in critical infrastructure, but will it actually fix the problem, or just shift the burden? The recent AI Cybersecurity Challenge (AIx…


Published on 2 months, 1 week ago

ToolShell Deep Dive: The SharePoint Exploit Crisis Uncovered

ToolShell Deep Dive: The SharePoint Exploit Crisis Uncovered



In this special episode of the Infosecurity Magazine podcast, we dive deep into the rapidly evolving story surrounding Microsoft SharePoint On-Premises. Recent disclosures have revealed a series of v…


Published on 4 months, 1 week ago

Unpacking Trump's Cybersecurity Executive Order

Unpacking Trump's Cybersecurity Executive Order



In this Infosecurity podcast episode, the team dive into the details of Donald Trump's June 2025 Cybersecurity Executive Order (EO). This EO revises previous orders from both Barack Obama and Joe Bid…


Published on 4 months, 3 weeks ago

Your Guide to Infosecurity Europe: Insider Tips from Leading Cybersecurity Experts

Your Guide to Infosecurity Europe: Insider Tips from Leading Cybersecurity Experts



In this episode of the Infosecurity Magazine podcast we dive into the exciting world of Infosecurity Europe. Two veteran cybersecurity pros share their expert advice on how to get the most out of y…


Published on 6 months, 2 weeks ago

Vulnerability Overload: The NVD and CVE Challenges Ahead

Vulnerability Overload: The NVD and CVE Challenges Ahead



In this episode of Infosecurity Magazine's podcast, we delve into the critical realm of vulnerability management, exploring the pivotal roles played by two US government-funded security programs that…


Published on 7 months, 2 weeks ago

The Information Heist: Cracking the Code on Infostealers

The Information Heist: Cracking the Code on Infostealers



With 4.3 million devices infected and 3.9 billion stolen passwords shared by hackers, infostealers have emerged as one of the dominant malware threats of 2024. According to recent reports from Kela a…


Published on 8 months, 3 weeks ago

Unlocking Infosecurity Europe: Must-See Sessions & Pro Tips

Unlocking Infosecurity Europe: Must-See Sessions & Pro Tips



Listen to this episode of the Infosecurity Magazine podcast for your comprehensive guide to Infosecurity Europe 2024, taking place at the Excel London from 2-6 June. This episode dives deep into Eur…


Published on 1 year, 6 months ago

Change Healthcare Cyber-Attack: Inside the Disruption and the Lessons Learned

Change Healthcare Cyber-Attack: Inside the Disruption and the Lessons Learned



This episode of the Infosecurity Magazine Podcast dives deep into the recent cyber-attack on Change Healthcare, a major player in US healthcare billing and data. The attack's impact went beyond data …


Published on 1 year, 7 months ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate