<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>CyberSecPods – Latest Episodes</title>
    <link>https://cybersecpods.com</link>
    <atom:link href="https://cybersecpods.com/rss.xml" rel="self" type="application/rss+xml" />
    <description>The home of cybersecurity podcasts. Curated shows on threat intel, identity, cloud security, red team, blue team, and more — with the latest episodes always at your fingertips.</description>
    <language>en-us</language>
    <lastBuildDate>Tue, 05 May 2026 10:00:00 GMT</lastBuildDate>
    <item>
      <title>AI Confidence: It&apos;s a Trap! (LIVE in San Francisco)</title>
      <link>https://cybersecpods.com/podcasts/ciso-series-podcast/ai-confidence-its-a-trap-live-in-san-francisco/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/ciso-series-podcast/ai-confidence-its-a-trap-live-in-san-francisco/</guid>
      <pubDate>Tue, 05 May 2026 10:00:00 GMT</pubDate>
      <description>All links and images can be found on CISO Series This week&apos;s episode is hosted by David Spark , producer of CISO Series and Mike Johnson , CISO, Rivian . Joining is Sara Madden , CISO, Convera . This episode was recorded live at BSidesSF 2026. In this episode: Playing vendor roulette Confident and wrong Making conferences count The stakes problem in tabletops A huge thanks to our sponsor, QuilrAI Can you tell if an action in your environment was performed by a human — or an AI agent? QuilrAI&apos;s Decision Engine evaluates content, context, and intent before actions complete — across browsers, end</description>
      <category>CISO Series Podcast</category>
      <enclosure url="https://traffic.libsyn.com/secure/davidspark/CISO_Series_Podcast_05-05-26_LIVE_.mp3?dest-id=37324" type="audio/mpeg" />
    </item>
    <item>
      <title>DtSR Episode 704 - Market Saturation, Innovation and Procurement</title>
      <link>https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-704-market-saturation-innovation-and-procurement/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/down-the-security-rabbithole/dtsr-episode-704-market-saturation-innovation-and-procurement/</guid>
      <pubDate>Tue, 05 May 2026 10:00:00 GMT</pubDate>
      <description>TL;DR: Buckle up. Howard Holton, CEO of GigaOm , joins for a 2-part special on the cybersecurity market, innovation, market saturation, and more. What an absolute blast of a podcast. YouTube video (apologies for the crap quality): https://youtube.com/live/q15xAwcPur8 Have something to say? Let&apos;s hear it. Support the show &gt;&gt;&gt; Please consider clicking the link above to support the show! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= YouTube home: https://youtube.com/playlist?list=PLyo0dkKRvfVtWXjRxNISrhme1MgBj3C2U&amp;si=scHDiTuLXSEQ9qHq LinkedIn Page: https://www.linkedin.</description>
      <category>Down the Security Rabbithole Podcast (DtSR)</category>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.buzzsprout.com/2153215/episodes/19122673-dtsr-episode-704-market-saturation-innovation-and-procurement.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Keeping Up With the OWASP GenAI Project - Scott Clinton - ASW #381</title>
      <link>https://cybersecpods.com/podcasts/application-security-weekly/keeping-up-with-the-owasp-genai-project-scott-clinton-asw-381/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/application-security-weekly/keeping-up-with-the-owasp-genai-project-scott-clinton-asw-381/</guid>
      <pubDate>Tue, 05 May 2026 09:00:00 GMT</pubDate>
      <description>Speed is the most common theme among developers and appsec teams working with LLMs and agents, from trying to keep up with patterns for deploying agents to dealing with more code faster to how the latest models impact code quality and security. The OWASP GenAI Project is helping organizations keep up with the speed of those changes and engaging the appsec community for sharing effective ways to keep systems secure. Scott Clinton shares the latest progress on the the project, its roadmap for the year, and how appsec practitioners can shape its future. Resources: https://genai.owasp.org/2026/04/</description>
      <category>Application Security Weekly (Audio)</category>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/aswaudio/ASW_381_1--a5fffb61-dcfe-4c10-b50f-15e2ab346852--audio-converted--88dc51ac-96bb-4607-8565-65aee9da649b.mp3?dest-id=626765" type="audio/mpeg" />
    </item>
    <item>
      <title>It didn’t look like propaganda</title>
      <link>https://cybersecpods.com/podcasts/click-here/it-didnt-look-like-propaganda/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/click-here/it-didnt-look-like-propaganda/</guid>
      <pubDate>Tue, 05 May 2026 07:00:00 GMT</pubDate>
      <description>Propaganda works best when it disappears—into morning assemblies, lesson plans, even the alphabet on the wall. That’s what Pavel “Pasha” Talankin saw inside his classroom in Russia. So he started filming it all and what he captured became not just an Oscar-winning movie — but a record of how control settles in, one school day at a time. Learn about your ad choices: dovetail.prx.org/ad-choices</description>
      <category>Click Here</category>
      <enclosure url="https://tracking.swap.fm/track/sblTq32fyWAjsHzze2LG/mgln.ai/e/48/dts.podtrac.com/redirect.mp3/dovetail.prxu.org/8376/35f03402-2c9a-42d3-ada4-8dfd59b77a9b/V4-CH-Podcast_05.05.26-MrNobody.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Instructure discloses breach, DigiCert revokes certificates, Silver Fox targets Indian and Russian orgs</title>
      <link>https://cybersecpods.com/podcasts/cyber-security-headlines/instructure-discloses-breach-digicert-revokes-certificates-silver-fox-targets-in/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cyber-security-headlines/instructure-discloses-breach-digicert-revokes-certificates-silver-fox-targets-in/</guid>
      <pubDate>Tue, 05 May 2026 07:00:00 GMT</pubDate>
      <description>Instructure discloses breach amid leak threats DigiCert revokes certificates Silver Fox targets Indian and Russian orgs Get the show notes here: Thanks to our episode sponsor, Vanta Risk and regulation ramping up—and customers expect proof of security just to do business. Vanta&apos;s automation brings compliance, risk, and customer trust together on one AI-powered platform. So whether you&apos;re prepping for a SOC 2 or running an enterprise GRC program, Vanta keeps you secure—and keeps your deals moving. Learn more at vanta.com/ciso .</description>
      <category>Cybersecurity Headlines</category>
      <enclosure url="https://traffic.libsyn.com/secure/cisoseries/CSH_2026-05-05.mp3?dest-id=2260670" type="audio/mpeg" />
    </item>
    <item>
      <title>174: Pacific Rim</title>
      <link>https://cybersecpods.com/podcasts/darknet-diaries/174-pacific-rim/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/darknet-diaries/174-pacific-rim/</guid>
      <pubDate>Tue, 05 May 2026 07:00:00 GMT</pubDate>
      <description>For six years, Sophos fought a secret cyber war against a state-backed hacking group targeting its firewalls. This forced Sophos to drastically change tactics to properly secure their firewalls. Was it ethical? Was it effective? They disrupted nine zero-day attacks, exposed who was hacking them, and forced the hackers to change tactics. But at what cost? You have to listen to one of the most audacious corporate cyber defenses ever conducted. Sponsors Support for this show comes from ThreatLocker® . ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure </description>
      <category>Darknet Diaries</category>
      <enclosure url="https://www.podtrac.com/pts/redirect.mp3/dovetail.prxu.org/7057/9912ef67-3bb3-4233-acb9-f9b3eb213180/darknet-diaries-ep174-pacific-rim.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Mythbehavior under investigation. [OMITB]</title>
      <link>https://cybersecpods.com/podcasts/hacking-humans/mythbehavior-under-investigation-omitb/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/hacking-humans/mythbehavior-under-investigation-omitb/</guid>
      <pubDate>Tue, 05 May 2026 07:00:00 GMT</pubDate>
      <description>Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is ⁠⁠⁠⁠⁠⁠⁠⁠⁠Selena Larson⁠⁠⁠⁠⁠⁠⁠⁠⁠ , ⁠⁠⁠⁠⁠⁠⁠⁠⁠Proofpoint⁠⁠⁠⁠⁠⁠⁠⁠⁠ intelligence analyst and host of their podcast ⁠⁠⁠⁠⁠⁠⁠⁠⁠DISCARDED⁠⁠⁠⁠⁠⁠⁠⁠⁠ . Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by her co-hosts ⁠⁠⁠⁠⁠⁠⁠⁠⁠N2K Networks⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠Dave Bittner⁠⁠⁠⁠⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠⁠⁠⁠Keith Mularski⁠⁠⁠⁠⁠⁠⁠⁠ , former FBI cybercrime investigator and now Chief Global Ambassador at ⁠⁠⁠⁠⁠⁠⁠⁠Qintel⁠⁠</description>
      <category>Hacking Humans</category>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW6759657299.mp3?updated=1777919727" type="audio/mpeg" />
    </item>
    <item>
      <title>CIRT (noun) [Word Notes]</title>
      <link>https://cybersecpods.com/podcasts/hacking-humans/cirt-noun-word-notes/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/hacking-humans/cirt-noun-word-notes/</guid>
      <pubDate>Tue, 05 May 2026 07:00:00 GMT</pubDate>
      <description>Please enjoy this encore of Word Notes. A team responsible for responding to and managing cybersecurity incidents involving computer systems and networks in order to minimize the damage and to restore normal operations as quickly as possible. CyberWire Glossary link: ⁠https://thecyberwire.com/glossary/cirt⁠ Audio reference link: Avery, B., 2017. 24 TV May 05 Season4 [WWW Document]. YouTube. URL ⁠https://www.youtube.com/watch?v=Gq_2xPuqI-E&amp;#38;list=PLGHedLavrFoGsea1ZCHBm9-nK5FdM3_Kd&amp;#38;index=10.</description>
      <category>Hacking Humans</category>
      <enclosure url="https://pdst.fm/e/pdrl.fm/7d51b0/traffic.megaphone.fm/CYBW4076944409.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Security without a login screen.</title>
      <link>https://cybersecpods.com/podcasts/cyberwire-daily/security-without-a-login-screen/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cyberwire-daily/security-without-a-login-screen/</guid>
      <pubDate>Mon, 04 May 2026 20:30:00 GMT</pubDate>
      <description>Progress Software urges customers to patch a critical MOVEit authentication bypass. Washington worries about limited access to advanced AI tools. Paid influencers promote pro-American AI. CISA warns Copy Fail is under active exploitation. The Canvas educational platform suffers a data breach. The Lazarus Group uses ClickFix to target high-value enterprise users. U.S. and Chinese authorities raid scam centers in Dubai. Monday Business Brief. On Afternoon Cyber Tea with Ann Johnson: Tony Sager, Senior VP &amp; Chief Evangelist, Center for Internet Security, joins Ann to discuss the accelerating pace</description>
      <category>CyberWire Daily</category>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW5844349222.mp3?updated=1777924108" type="audio/mpeg" />
    </item>
    <item>
      <title>#282 - Top 10 Agentic AI Attacks (with Rock Lambros)</title>
      <link>https://cybersecpods.com/podcasts/ciso-tradecraft/282-top-10-agentic-ai-attacks-with-rock-lambros/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/ciso-tradecraft/282-top-10-agentic-ai-attacks-with-rock-lambros/</guid>
      <pubDate>Mon, 04 May 2026 20:13:21 GMT</pubDate>
      <description>In this CISO Tradecraft episode, host G Mark Hardy interviews recovering CISO Rock Lambros (Zenity) about securing Agentic AI and the emerging risks beyond LLM hallucinations. Lambros recounts his path from Oracle developer to CISO and AI standards work, then explains how agentic AI increases risk by connecting models to tools and actions. They discuss agentic AI supply chain attacks, including backdoored LiteLLM packages on PyPI and a compromised Amazon Q update, and the resulting shift from “patch fast” to more cautious dependency controls. The conversation highlights the OWASP Top 10 for Ag</description>
      <category>CISO Tradecraft®</category>
      <enclosure url="https://content.rss.com/episodes/352153/2793791/ciso-tradecraft/2026_05_04_20_12_59_d61c3481-4986-4ba9-be37-c720abea8e93.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Between Two Nerds: The wild wild west</title>
      <link>https://cybersecpods.com/podcasts/risky-bulletin/between-two-nerds-the-wild-wild-west/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/risky-bulletin/between-two-nerds-the-wild-wild-west/</guid>
      <pubDate>Mon, 04 May 2026 19:45:48 GMT</pubDate>
      <description>In this edition of Between Two Nerds Tom Uren and The Grugq discuss the breakdown of cyber norms. What would have been an unthinkable cyber operation just a few years ago is now a regular occurrence. This episode is also available on YouTube . Show notes Fast16 analysis by SentinelOne Fast16 malware Zero Day on the wiper targeting Venezuela&apos;s state oil company</description>
      <category>Risky Bulletin</category>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/BTN165.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>You Wouldn&apos;t Download a Shipment - The 443 Podcast - Episode 369</title>
      <link>https://cybersecpods.com/podcasts/the-443/you-wouldnt-download-a-shipment-the-443-podcast-episode-369/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/the-443/you-wouldnt-download-a-shipment-the-443-podcast-episode-369/</guid>
      <pubDate>Mon, 04 May 2026 15:04:43 GMT</pubDate>
      <description>This week on the podcast, we discuss a recent warning from the FBI about hacking leading to stolen shipments. Before that, we cover the Vercel software supply chain incident before discussing the Vect Ransomware-as-a-service turned accidental wiper.</description>
      <category>The 443 - Security Simplified</category>
      <enclosure url="https://mcdn.podbean.com/mf/web/3zagjvh54j28f8hc/The_443_369_050436.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Cybercrime Wire For May 4, 2026. DDoS Attack Strikes Linux OS Provider Ubuntu. WCYB Digital Radio.</title>
      <link>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-wire-for-may-4-2026-ddos-attack-strikes-linux-os-provider-ubuntu-wcyb/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-wire-for-may-4-2026-ddos-attack-strikes-linux-os-provider-ubuntu-wcyb/</guid>
      <pubDate>Mon, 04 May 2026 13:10:32 GMT</pubDate>
      <description>The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com</description>
      <category>Cybercrime Magazine Podcast</category>
      <enclosure url="https://feeds.soundcloud.com/stream/2314371014-cybercrimemagazine-ddos-attack-strikes-linux-os-provider-ubuntu.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Cybercrime News For May 4 2026. No Secrets in America’s New Surveillance Dragnet. WCYB Digital Radio</title>
      <link>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-news-for-may-4-2026-no-secrets-in-americas-new-surveillance-dragnet-w/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-news-for-may-4-2026-no-secrets-in-americas-new-surveillance-dragnet-w/</guid>
      <pubDate>Mon, 04 May 2026 12:52:02 GMT</pubDate>
      <description>The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don&apos;t miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today&apos;s news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop marke</description>
      <category>Cybercrime Magazine Podcast</category>
      <enclosure url="https://feeds.soundcloud.com/stream/2314344518-cybercrimemagazine-no-secrets-in-americas-new-surveillance-dragnet.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>How AI adoption in enterprise infrastructure has expanded the attack surface with Katherine McNamara from Cisco / Defender Fridays [#318]</title>
      <link>https://cybersecpods.com/podcasts/cybersecurity-defenders/how-ai-adoption-in-enterprise-infrastructure-has-expanded-the-attack-surface-wit/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cybersecurity-defenders/how-ai-adoption-in-enterprise-infrastructure-has-expanded-the-attack-surface-wit/</guid>
      <pubDate>Mon, 04 May 2026 10:00:19 GMT</pubDate>
      <description>Today on Defender Fridays, Katherine McNamara, Cybersecurity Technical Solutions Architect at Cisco, joins us to discuss how AI and ML adoption in enterprise infrastructure has expanded the attack surface for AI-driven systems. She&apos;ll walk through the security challenges unique to generative AI and ML-based architectures, and cover the four critical components: Model, Data, Application, and System, that organizations need to secure to maintain integrity. Katherine works for Cisco as a Cybersecurity Systems Engineer by day and by night, she&apos;s labbing and trying new things with the resources she</description>
      <category>The Cybersecurity Defenders Podcast</category>
      <enclosure url="https://podcast.wistia.com/deliveries/f4cdca8b6a34e4d34af687aa4a8c5ca14300d7f5.mp3?d=eyJtIjoxNDczNDA0MzksIm1kIjoyMTc0Ljk4LCJhIjoid2lzdGlhLXByb2R1Y3Rpb25fMTc5NzQ5OCIsImMiOjEwMDgxMSwiZSI6MjA5NTY1MCwiYiI6ImY0Y2RjYThiNmEzNGU0ZDM0YWY2ODdhYTRhOGM1Y2ExNDMwMGQ3ZjUiLCJtYiI6Mzg2NzAsIm9iIjoxNDQwMDE4LjA5NjcxODEzMDl9--1730997deac24e38952a9df40341ee29166d2aa4403e6752f48024b5e5262673" type="audio/mpeg" />
    </item>
    <item>
      <title>Post Quantum Migration Struggles, AI Threats, and Modern Defenses - HD Moore, Ramin Farassat, Eyal Benishti, Daniel dos Santos, Bobby Ford - ESW #457</title>
      <link>https://cybersecpods.com/podcasts/enterprise-security-weekly/post-quantum-migration-struggles-ai-threats-and-modern-defenses-hd-moore-ramin-f/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/enterprise-security-weekly/post-quantum-migration-struggles-ai-threats-and-modern-defenses-hd-moore-ramin-f/</guid>
      <pubDate>Mon, 04 May 2026 09:00:00 GMT</pubDate>
      <description>Interview with Daniel dos Santos: Post-Quantum Cryptography and the Risks No One Is Talking About Post-quantum cryptography (PQC) is quickly shifting from theory to inevitability. In this segment, Daniel dos Santos, VP of Research at Forescout, explains why PQC isn&apos;t the most immediate threat today—but still demands early attention as standards solidify and timelines accelerate. The discussion highlights overlooked risks beyond encrypted traffic, including digital signatures, firmware integrity, and blockchain systems. Daniel also emphasizes the real challenge: migration. While client-side ado</description>
      <category>Enterprise Security Weekly (Audio)</category>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/eswaudio/ESW_457_1--22d1017b-0a9e-4cab-8512-74ffa853fa42--audio-converted--49dd16f5-07a3-47c7-ad9e-3f767a33380f.mp3?dest-id=376653" type="audio/mpeg" />
    </item>
    <item>
      <title>#419 - Identity Management Day 2026 - IDAC Live</title>
      <link>https://cybersecpods.com/podcasts/identity-at-the-center/419-identity-management-day-2026-idac-live/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/identity-at-the-center/419-identity-management-day-2026-idac-live/</guid>
      <pubDate>Mon, 04 May 2026 09:00:00 GMT</pubDate>
      <description>Recorded live as part of the Identity Management Day 2026 streaming program, Jeff and Jim mark their fifth IMD episode. Introduced by Jeff Reich from the Identity Defined Security Alliance, they reflect on how the IAM industry has evolved since their first IMD episode in 2021 and grade overall progress a C. Topics include what has genuinely improved (passkeys, MFA adoption, broader awareness), what hasn&apos;t (compliance fatigue, security theater, persistent credential theft), the exploding challenge of non-human identity governance, whether AI will eventually need to certify other AI, and how AI-</description>
      <category>Identity at the Center</category>
      <enclosure url="https://anchor.fm/s/c5fefcc/podcast/play/118742117/https%3A%2F%2Fd3ctxlq1ktw2nl.cloudfront.net%2Fstaging%2F2026-3-20%2F5a5b6a27-349b-c872-658a-bc1b92882e86.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Telegram Mini Apps malware, cPanel is Sorry, patch wave warning</title>
      <link>https://cybersecpods.com/podcasts/cyber-security-headlines/telegram-mini-apps-malware-cpanel-is-sorry-patch-wave-warning/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cyber-security-headlines/telegram-mini-apps-malware-cpanel-is-sorry-patch-wave-warning/</guid>
      <pubDate>Mon, 04 May 2026 07:00:00 GMT</pubDate>
      <description>Telegram Mini Apps deliver Android malware CISA orders Federal agencies to patch cPanel bug by Sunday British cyber agency warns of looming &apos;patch wave&apos; due to speedy AI flaw discovery Get the show notes here: https://cisoseries.com/cybersecurity-news-telegram-mini-apps-malware-cpanel-is-sorry-patch-wave-warning/ Thanks to our episode sponsor, Vanta Risk and regulation ramping up—and customers expect proof of security just to do business. Vanta&apos;s automation brings compliance, risk, and customer trust together on one AI-powered platform. So whether you&apos;re prepping for a SOC 2 or running an ente</description>
      <category>Cybersecurity Headlines</category>
      <enclosure url="https://traffic.libsyn.com/secure/cisoseries/CSH-2026-05-04.mp3?dest-id=2260670" type="audio/mpeg" />
    </item>
    <item>
      <title>Risky Bulletin: DigiCert hacked with a malicious screensaver file</title>
      <link>https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-digicert-hacked-with-a-malicious-screensaver-file/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-digicert-hacked-with-a-malicious-screensaver-file/</guid>
      <pubDate>Mon, 04 May 2026 05:10:33 GMT</pubDate>
      <description>DigiCert got hacked via a malicious screensaver file, two ransomware negotiators each get four years in prison, Trellix discloses a security breach, and another Russian hacker gets arrested while vacationing in the wrong place. Show notes Risky Bulletin: DigiCert hacked with a malicious screensaver file</description>
      <category>Risky Bulletin</category>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS559.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Fake Party Invites and the Rise of Social Phishing Attacks</title>
      <link>https://cybersecpods.com/podcasts/shared-security-podcast/fake-party-invites-and-the-rise-of-social-phishing-attacks/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/shared-security-podcast/fake-party-invites-and-the-rise-of-social-phishing-attacks/</guid>
      <pubDate>Mon, 04 May 2026 04:00:54 GMT</pubDate>
      <description>Attackers are now impersonating invitation services to trick people into clicking malicious links and sharing sensitive information. These phishing attempts look like legitimate event invites, making them especially effective. In this episode, we discuss how these scams work and what steps you can take to stay protected. Special thanks to Guardsquare for sponsoring this episode! Guardsquare is the leader in mobile application security, with multi-layered protection for your Android and iOS apps. Learn more at Guardsquare.com. ** Links mentioned on the show ** New Phishing Scam: Fake Invitation</description>
      <category>Shared Security Podcast</category>
      <enclosure url="https://traffic.libsyn.com/socialmediasec/Shared_Security_E431.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>How to actually test a disaster plan with David Bernstein</title>
      <link>https://cybersecpods.com/podcasts/open-source-security/how-to-actually-test-a-disaster-plan-with-david-bernstein/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/open-source-security/how-to-actually-test-a-disaster-plan-with-david-bernstein/</guid>
      <pubDate>Mon, 04 May 2026 00:00:00 GMT</pubDate>
      <description>Josh and David finish up the disaster recovery and emergency planning trilogy. In this one David tells us how to test the plan he told us how to build in the last episode. There are some great ideas in this one about how to test the process not the people. How to construct the plan, and even some tips to go from a plan to some actual real world testing. It&apos;s another episode filled with great and practical advice. The show notes and blog post for this episode can be found at https://opensourcesecurity.io/2026/2026-05-testing-the-plan-david-bernstein/</description>
      <category>Open Source Security</category>
      <enclosure url="https://traffic.libsyn.com/secure/opensourcesecuritypodcast/2026-05-testing-the-plan-david-bernstein.mp3?dest-id=542864" type="audio/mpeg" />
    </item>
    <item>
      <title>Most Companies Aren&apos;t Anywhere Near Ready for AI</title>
      <link>https://cybersecpods.com/podcasts/unsupervised-learning/most-companies-arent-anywhere-near-ready-for-ai/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/unsupervised-learning/most-companies-arent-anywhere-near-ready-for-ai/</guid>
      <pubDate>Sun, 03 May 2026 23:37:38 GMT</pubDate>
      <description>Most Companies Aren&apos;t Anywhere Near Ready for AI. It&apos;s not that companies aren&apos;t using AI&amp;mdash;it&apos;s that they can&apos;t. Become a Member: https://danielmiessler.com/upgrade See omnystudio.com/listener for privacy information.</description>
      <category>Unsupervised Learning</category>
      <enclosure url="https://mgln.ai/e/p5837/pscrb.fm/rss/p/traffic.omny.fm/d/clips/070af456-729b-4a0f-9c09-a6c100397b59/3b159371-276d-429e-ae86-a6c1003b01c4/17c737f1-5f38-4638-9a61-b43f01843823/audio.mp3?utm_source=Podcast&amp;in_playlist=7b61d4e1-bd3d-4d3f-97c2-a6c1003b01c9" type="audio/mpeg" />
    </item>
    <item>
      <title>Sponsored: James Kettle built an AI hacker</title>
      <link>https://cybersecpods.com/podcasts/risky-bulletin/sponsored-james-kettle-built-an-ai-hacker/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/risky-bulletin/sponsored-james-kettle-built-an-ai-hacker/</guid>
      <pubDate>Sun, 03 May 2026 21:16:46 GMT</pubDate>
      <description>In this sponsored interview, James Wilson talks with James Kettle and Daf Stuttard from PortSwigger about the incredible research James will unveil at Black Hat US this July, and how that research will be productised into Burp Suite. It shouldn’t be surprising that when James Kettle bolts an LLM into his research methodology that insanely dangerous things happen. This interview is a window into the future of AI-enabled hacking and security testing. This interview is also available on YouTube . Show notes</description>
      <category>Risky Bulletin</category>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWSSI126.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Cyberattacks are raising your prices (feat. Eva Velasquez)</title>
      <link>https://cybersecpods.com/podcasts/lock-and-code/cyberattacks-are-raising-your-prices-feat-eva-velasquez/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/lock-and-code/cyberattacks-are-raising-your-prices-feat-eva-velasquez/</guid>
      <pubDate>Sun, 03 May 2026 15:45:00 GMT</pubDate>
      <description>Your prices could be going up because of a little something that one group has started calling the “cyber tax.” Not a “tax” in any regulatory sense of the word, this newly named “cyber tax” is instead a consequence of the growing number of cyberattacks on small businesses. According to the latest research from the Identity Theft Resource Center, 81% of small- and medium-sized businesses suffered a data breach, a security breach, or both, within the past year. And of those businesses, more than 50% of lost more than $250,000. According to the most recent data from the US Federal Reserve , the m</description>
      <category>Lock and Code</category>
      <enclosure url="https://episodes.captivate.fm/episode/2f52e083-ad54-4bd3-ad49-06dae8d6a9ed.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Kayla Williams: Not everything related to cybersecurity is a fire drill. [CISO] [Career Notes]</title>
      <link>https://cybersecpods.com/podcasts/cyberwire-daily/kayla-williams-not-everything-related-to-cybersecurity-is-a-fire-drill-ciso-care/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cyberwire-daily/kayla-williams-not-everything-related-to-cybersecurity-is-a-fire-drill-ciso-care/</guid>
      <pubDate>Sun, 03 May 2026 07:00:00 GMT</pubDate>
      <description>Please enjoy this encore of Career Notes. Kayla Williams, CISO of Devo, sits down to share her story, from graduating with a finance degree to rising to where she is now. She quickly learned that finance was not for her and changed paths, working towards gaining an information security certificate. From there she was able to excel and was offered the opportunity to move to England which changed her life. Working in her new role, she really enjoys thriving with her team. She says &quot;We really try to be the department of no problem versus the department of no.&quot; She mentions how her and her team wo</description>
      <category>CyberWire Daily</category>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW3732917771.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Rob King on OT Asset Exposures, Mitigations</title>
      <link>https://cybersecpods.com/podcasts/nexus-claroty/rob-king-on-ot-asset-exposures-mitigations/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/nexus-claroty/rob-king-on-ot-asset-exposures-mitigations/</guid>
      <pubDate>Sun, 03 May 2026 04:00:00 GMT</pubDate>
      <description>Rob King, Director of Applied Research at RunZero, joins the Nexus Podcast to discuss the security risks and exposures introduced by digital transformation to operational technology environments. As many OT and cyber-physical systems assets are connected online, there could be signification exposures introduced to these internet-facing devices and systems. Rob also discusses the effectiveness of popular mitigations such as segmentation and other controls. Subscribe and listen to the Nexus Podcast here .</description>
      <category>Nexus: A Claroty Podcast</category>
      <enclosure url="https://www.buzzsprout.com/1475533/episodes/19102776-rob-king-on-ot-asset-exposures-mitigations.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Insider Threats | When the Hacker Already Has a Badge</title>
      <link>https://cybersecpods.com/podcasts/cyber-crime-junkies/insider-threats-or-when-the-hacker-already-has-a-badge/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cyber-crime-junkies/insider-threats-or-when-the-hacker-already-has-a-badge/</guid>
      <pubDate>Sat, 02 May 2026 16:00:00 GMT</pubDate>
      <description>🔥The Cybercrime Junkies show debunks the myth of the typical cyber villain, focusing on how everyday situations can lead to significant `cyber security` breaches. We discuss real-world `cybercrime` scenarios involving `insider` threats and the critical need for `insider threat detection`. Understanding these risks is key to effective `risk management` in today&apos;s digital landscape. New Episode🔥Insider Threats | When Employees Become the BIGGEST Attackers! The Cybercrime Junkies show dives into the world of cybercrime and cybersecurity, offering insights for cybersecurity for beginners and sea</description>
      <category>Cyber Crime Junkies</category>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.buzzsprout.com/2014652/episodes/18405995-insider-threats-when-the-hacker-already-has-a-badge.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>How to Secure Copilot Agents, Azure DevOps &amp; Defender (+ more) with Maester 2.1 (Full Breakdown)</title>
      <link>https://cybersecpods.com/podcasts/entra-chat/how-to-secure-copilot-agents-azure-devops-and-defender-more-with-maester-21-full/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/entra-chat/how-to-secure-copilot-agents-azure-devops-and-defender-more-with-maester-21-full/</guid>
      <pubDate>Sat, 02 May 2026 15:58:15 GMT</pubDate>
      <description>Maester is back with one of its biggest release since launch. In this episode, we are joined by Sam Erde, Architect at Patriot Consulting and one of Maester’s core maintainers, to walk through everything that’s landed in Maester 2.1. Since the December release, the community has shipped 540 new commits , grown the test suite from 128 to 168 tests, and added coverage across entirely new product areas. Here’s a taste of what’s covered: 🤖 Securing Your AI Agents (Copilot Studio) With Microsoft’s Agent 365 going GA and organisations rapidly deploying Copilot Studio agents, Maester now includes te</description>
      <category>Entra.Chat</category>
      <enclosure url="https://api.substack.com/feed/podcast/196196833/85e5f89b4d9a5c91f6a11479e1157664.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Double-edged threat. [Research Saturday]</title>
      <link>https://cybersecpods.com/podcasts/cyberwire-daily/double-edged-threat-research-saturday/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cyberwire-daily/double-edged-threat-research-saturday/</guid>
      <pubDate>Sat, 02 May 2026 07:00:00 GMT</pubDate>
      <description>Today we are joined by Justin Albrecht , Principal Researcher at Lookout , discussing &quot;Attackers Wielding DarkSword Threaten iOS Users.&quot; DarkSword is a highly sophisticated iOS exploit chain discovered by Lookout that targets iPhones (iOS 18.4–18.6.2), enabling near zero-click compromise and rapid theft of sensitive data, including credentials and cryptocurrency wallet information. Likely deployed by a Russia-linked threat actor (UNC6353) against Ukrainian users, it uses watering hole attacks on compromised websites and operates in a “hit-and-run” fashion—exfiltrating data within minutes befor</description>
      <category>CyberWire Daily</category>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1180027346.mp3?updated=1777650720" type="audio/mpeg" />
    </item>
    <item>
      <title>Cybercrime Wire For May 2-3, 2026. Weekend Update. WCYB Digital Radio.</title>
      <link>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-wire-for-may-2-3-2026-weekend-update-wcyb-digital-radio/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-wire-for-may-2-3-2026-weekend-update-wcyb-digital-radio/</guid>
      <pubDate>Sat, 02 May 2026 05:00:17 GMT</pubDate>
      <description>The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com</description>
      <category>Cybercrime Magazine Podcast</category>
      <enclosure url="https://feeds.soundcloud.com/stream/2312785619-cybercrimemagazine-cybercrime-wire-for-may-2-3.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Wizard Spider</title>
      <link>https://cybersecpods.com/podcasts/hacked/wizard-spider/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/hacked/wizard-spider/</guid>
      <pubDate>Sat, 02 May 2026 03:59:00 GMT</pubDate>
      <description>Investigative journalist Geoff White has spent a lot of time inside the leaked communications of Conti — the Russian ransomware gang that ran like a corporation, hit Ireland&apos;s national health service, extorted the Costa Rican government, and pulled in $180 million in a single year. Geoff joins us to break down how Conti operated, the internal moral debate over hitting hospitals, the jewellery heist that spooked them into apologizing to Saudi royals, and how he tracked down rare video of the gang&apos;s elusive alleged boss, a man almost nobody had ever seen. It&apos;s a preview of his new BBC series Cyb</description>
      <category>Hacked</category>
      <enclosure url="https://www.podtrac.com/pts/redirect.mp3/pdst.fm/e/traffic.megaphone.fm/ADV3952249644.mp3?updated=1777662854" type="audio/mpeg" />
    </item>
    <item>
      <title>The Department of Know: GitHub drama, AI deletes production data, Claude Security Beta</title>
      <link>https://cybersecpods.com/podcasts/cyber-security-headlines/the-department-of-know-github-drama-ai-deletes-production-data-claude-security-b/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cyber-security-headlines/the-department-of-know-github-drama-ai-deletes-production-data-claude-security-b/</guid>
      <pubDate>Fri, 01 May 2026 21:17:00 GMT</pubDate>
      <description>This week&apos;s Department of Know is hosted by Rich Stroffolino , with guests Janet Heins , CISO, ChenMed , and TC Niedzialkowski , Head of IT &amp; Security, Opendoor . Missed the live show? Check it out on YouTube. The Department of Know is live every Friday at 4:00 p.m. ET. Join us each week by registering for the open discussion at CISOSeries.com . Get the show notes here: https://cisoseries.com/cybersecurity-news-critical-cpanel-zero-day-swiss-black-axe-arrests-hhs-data-center-questions/ Thanks to our episode sponsor, Guardsqaure Attackers are treating your mobile app like an open book. Sixty-th</description>
      <category>Cybersecurity Headlines</category>
      <enclosure url="https://traffic.libsyn.com/secure/cisoseries/department-of-know_-may-1-2026.mp3?dest-id=2260670" type="audio/mpeg" />
    </item>
    <item>
      <title>Think before you deploy the agent.</title>
      <link>https://cybersecpods.com/podcasts/cyberwire-daily/think-before-you-deploy-the-agent/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cyberwire-daily/think-before-you-deploy-the-agent/</guid>
      <pubDate>Fri, 01 May 2026 20:30:00 GMT</pubDate>
      <description>Five Eyes agencies issue agentic AI guidance. A federal database leaks Social Security numbers. A stealthy worm poisons open source packages. OT firms are sidelined from frontier cyber models. The FBI warns of a surge in cyber-enabled cargo theft. Officials flag likely election interference as security programs face cuts. Researchers uncover a covert Python backdoor. Ubuntu’s site takes Iranian-linked DDoS fire. Cyber pros are sentenced in a ransomware case. Our guest is Andrew Carr, Global Head of Threat Management at Booz Allen, discussing how AI is accelerating cyberattacks. OpenAI joins th</description>
      <category>CyberWire Daily</category>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW8410141818.mp3?updated=1777655119" type="audio/mpeg" />
    </item>
    <item>
      <title>Turning 30,000 Findings Into 50 That Matter with Dan Pagel and Brad Hibbert</title>
      <link>https://cybersecpods.com/podcasts/hacker-valley-studio/turning-30000-findings-into-50-that-matter-with-dan-pagel-and-brad-hibbert/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/hacker-valley-studio/turning-30000-findings-into-50-that-matter-with-dan-pagel-and-brad-hibbert/</guid>
      <pubDate>Fri, 01 May 2026 19:32:40 GMT</pubDate>
      <description>Mythos just found 30,000 new vulnerabilities, and now every security team is asking the same question: what actually matters? In this episode, Ron Eddings sits down with Dan Pagel, CEO at Brinqa, and Brad Hibbert COO &amp; CSO at Brinqa, to break down the Anthropic Mythos moment that rattled the security industry. From the panic of millions of new findings dropping overnight to the strategy of narrowing them down to the 50 that actually matter in YOUR environment, this episode is a masterclass in exposure management at machine speed. Dan and Brad share how Brinqa helps organizations make sense of </description>
      <category>Hacker Valley Studio</category>
      <enclosure url="https://mcdn.podbean.com/mf/web/3z4ugs5v2wxeqqz2/HVS26_EP425_Brinqa_Final.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>7MS #720: Tales of Pentest Pwnage – Part 84</title>
      <link>https://cybersecpods.com/podcasts/7-minute-security/7ms-720-tales-of-pentest-pwnage-part-84/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/7-minute-security/7ms-720-tales-of-pentest-pwnage-part-84/</guid>
      <pubDate>Fri, 01 May 2026 16:44:00 GMT</pubDate>
      <description>Hey friends! Today&apos;s another Tales of Pentest Pwnage! Quick tangent first on a couple side projects: I&apos;ve got a music thing at quack.house (like the duck noise, not the drug) and a podcast with my dancer son Atticus at DadOfADancer.com . Speaking of Atticus — he just landed a spot in Master Ballet Academy&apos;s summer program in Phoenix, and I am a very proud dance dad over here. OK, on to the pentest: A weird runas quirk: If your AD test account password ends in a percent sign, runas seems to misbehave (Claude thinks Windows is interpreting the % as a variable delimiter). Workaround: runascs.exe,</description>
      <category>7 Minute Security</category>
      <enclosure url="https://traffic.libsyn.com/secure/7minsec/7MS-720-Tales_of_Pentest_Pwnage-Part_84.mp3?dest-id=1921835" type="audio/mpeg" />
    </item>
    <item>
      <title>US Secret Service in Action. Exclusive.</title>
      <link>https://cybersecpods.com/podcasts/cyber-crime-junkies/us-secret-service-in-action-exclusive/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cyber-crime-junkies/us-secret-service-in-action-exclusive/</guid>
      <pubDate>Fri, 01 May 2026 16:00:00 GMT</pubDate>
      <description>Paul Eckloff was a US Secret Service Agent for 23 years. 14 of which were spent protecting the US Presidents. Before that? Paul was a High School Teacher. Today? Paul is one of the top cybersecurity, privacy and data experts in the world and a leader with Lexis/Nexis Risk Solutions. Questions? Text our Studio direct. We read these and when helpful we give a special shout out for those to contact us. New non-fiction Book Series is out! Moving Target: The Art of Online Camouflage drops April 14. Moving Target: The Obedient Machine drops April 21. Book 3 -- Ghost and the Machin e -- out soon! 4 y</description>
      <category>Cyber Crime Junkies</category>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/www.buzzsprout.com/2014652/episodes/14543435-us-secret-service-in-action-exclusive.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Cybercrime Wire For May 1, 2026. Amtrak Data Breach Leaks Millions Of Records. WCYB Digital Radio.</title>
      <link>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-wire-for-may-1-2026-amtrak-data-breach-leaks-millions-of-records-wcyb/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-wire-for-may-1-2026-amtrak-data-breach-leaks-millions-of-records-wcyb/</guid>
      <pubDate>Fri, 01 May 2026 13:54:17 GMT</pubDate>
      <description>The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com</description>
      <category>Cybercrime Magazine Podcast</category>
      <enclosure url="https://feeds.soundcloud.com/stream/2312777891-cybercrimemagazine-amtrak-data-breach-leaks-millions-of-records.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Cybercrime News For May. 1, 2026. US Troops Get Threats from Iran-Linked Hackers. WCYB Digital Radio</title>
      <link>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-news-for-may-1-2026-us-troops-get-threats-from-iran-linked-hackers-wc/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-news-for-may-1-2026-us-troops-get-threats-from-iran-linked-hackers-wc/</guid>
      <pubDate>Fri, 01 May 2026 13:15:47 GMT</pubDate>
      <description>The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don&apos;t miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today&apos;s news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop marke</description>
      <category>Cybercrime Magazine Podcast</category>
      <enclosure url="https://feeds.soundcloud.com/stream/2312762078-cybercrimemagazine-us-troops-get-threats-from-iran-linked-hackers.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Access, denied.</title>
      <link>https://cybersecpods.com/podcasts/click-here/access-denied/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/click-here/access-denied/</guid>
      <pubDate>Fri, 01 May 2026 07:00:00 GMT</pubDate>
      <description>You buy a phone. A car. A tractor. But what do you actually own? We talk to legal scholar Aaron Perzanowski about how software and contracts are reshaping ownership — and why the right-to-repair movement is gaining traction. Learn about your ad choices: dovetail.prx.org/ad-choices</description>
      <category>Click Here</category>
      <enclosure url="https://tracking.swap.fm/track/sblTq32fyWAjsHzze2LG/mgln.ai/e/48/dts.podtrac.com/redirect.mp3/dovetail.prxu.org/8376/08613bc0-fe81-4cb0-b6e8-cd9456d9c22a/V2_CH-Podcast_Pezanowski_20260501.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Critical cPanel zero-day, Swiss Black Axe arrests, HHS data center questions</title>
      <link>https://cybersecpods.com/podcasts/cyber-security-headlines/critical-cpanel-zero-day-swiss-black-axe-arrests-hhs-data-center-questions/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cyber-security-headlines/critical-cpanel-zero-day-swiss-black-axe-arrests-hhs-data-center-questions/</guid>
      <pubDate>Fri, 01 May 2026 07:00:00 GMT</pubDate>
      <description>Critical cPanel and WHM bug exploited as zero-day Swiss police arrest suspected members of Black Axe group HHS ponders government posture for protecting data centers Get the show notes here: https://cisoseries.com/cybersecurity-news-critical-cpanel-zero-day-swiss-black-axe-arrests-hhs-data-center-questions/ Thanks to our episode sponsor, Guardsqaure Attackers are treating your mobile app like an open book. Sixty-three percent of security leaders recently detected app tampering, cloning, or unauthorized modifications. When your code runs in an untrusted environment, you need runtime self-protec</description>
      <category>Cybersecurity Headlines</category>
      <enclosure url="https://traffic.libsyn.com/secure/cisoseries/CSH-2026-05-01.mp3?dest-id=2260670" type="audio/mpeg" />
    </item>
    <item>
      <title>Risky Bulletin: cPanel auth bypass exploited in wild</title>
      <link>https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-cpanel-auth-bypass-exploited-in-wild/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/risky-bulletin/risky-bulletin-cpanel-auth-bypass-exploited-in-wild/</guid>
      <pubDate>Fri, 01 May 2026 05:07:47 GMT</pubDate>
      <description>The Copy Fail vulnerability impacts all Linux distros going back to 2017, hackers are exploiting a cPanel auth bypass, every Moldovan citizen has their data stolen, and some scam compounds got raided raided… in Dubai. Show notes Risky Bulletin: The mysterious hack of Moldova&apos;s healthcare database</description>
      <category>Risky Bulletin</category>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/RBNEWS558.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Snake Oilers: Ent AI, Spacewalk and Mondoo</title>
      <link>https://cybersecpods.com/podcasts/risky-business/snake-oilers-ent-ai-spacewalk-and-mondoo/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/risky-business/snake-oilers-ent-ai-spacewalk-and-mondoo/</guid>
      <pubDate>Fri, 01 May 2026 00:58:34 GMT</pubDate>
      <description>In this edition of the Snake Oilers podcast three vendors stop by to pitch the audience on their products: Ent AI : Co-founder Brandon Dixon pitched Ent, an intent-aware, AI-powered endpoint security control. Spacewalk AI : Founders Chris Fuller and Tim Wenzlau pitch Spacewalk, an AI-powered incident response platform. Mondoo : Co-founder Dominik Richter pitches Mondoo, an AI-powered “service as software” in the vulnerability management space. This episode is also available on YouTube . Show notes</description>
      <category>Risky Business</category>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/media3.risky.biz/SNAKEOILERS23PT2.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>FIRESTARTER - PSW #924</title>
      <link>https://cybersecpods.com/podcasts/paul-s-security-weekly/firestarter-psw-924/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/paul-s-security-weekly/firestarter-psw-924/</guid>
      <pubDate>Thu, 30 Apr 2026 21:00:00 GMT</pubDate>
      <description>This week in the security news: Are you a FIRESTARTER? Eavesdropping via fiber-optic cables Copy Fail - more Linux LPE Github RCE Running Linux on a PS5 BadUSB tricks SilentGlass and HDMI threats Sonicwall and vague details Universities are for porn? The Banshee Before CVEs comes scanning Vendor addresses AirSnitch GitHub and not serious work Routers have country-specific backdoors Phones with Hotspot are fine Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-924</description>
      <category>Paul&apos;s Security Weekly (Audio)</category>
      <enclosure url="https://dts.podtrac.com/redirect.mp3/traffic.libsyn.com/secure/pswonly/PSW_924_1--5178b071-5a6f-4951-b46f-f2d218d58e1d--audio-converted--b6a6d8e1-3ee7-4bca-891f-362a9bc38448.mp3?dest-id=388575" type="audio/mpeg" />
    </item>
    <item>
      <title>One copy too many.</title>
      <link>https://cybersecpods.com/podcasts/cyberwire-daily/one-copy-too-many/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cyberwire-daily/one-copy-too-many/</guid>
      <pubDate>Thu, 30 Apr 2026 20:30:00 GMT</pubDate>
      <description>A critical Linux flaw dubbed “Copy Fail” raises alarm. The House moves to extend Section 702. The White House pushes back on expanded Mythos access. cPanel and SonicWall rush out security patches. Researchers warn AI agents may leak credentials. Smishing targets key industries. Ukrainian police arrest suspects in a massive Roblox account theft scheme. Our guest is Jamie Moles, technical manager at ExtraHop, discussing how the pace of vibe coding is creating major AI blind spots. Honeypot hijinks get halted by curious clicks. Remember to leave us a 5-star rating and review in your favorite podc</description>
      <category>CyberWire Daily</category>
      <enclosure url="https://pdst.fm/e/pdrl.fm/85df76/traffic.megaphone.fm/CYBW1517127149.mp3?updated=1777576947" type="audio/mpeg" />
    </item>
    <item>
      <title>Agentic AI-Powered Digital Executive Protection. Matt Polak, Founder &amp; CEO, VanishID.</title>
      <link>https://cybersecpods.com/podcasts/cybercrime-magazine/agentic-ai-powered-digital-executive-protection-matt-polak-founder-and-ceo-vanis/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cybercrime-magazine/agentic-ai-powered-digital-executive-protection-matt-polak-founder-and-ceo-vanis/</guid>
      <pubDate>Thu, 30 Apr 2026 19:43:34 GMT</pubDate>
      <description>An army of AI agents that never stops fighting. That&apos;s VanishID. Executive personal data is already out there, waiting to be weaponized. VanishID&apos;s agents hunt it down, remove it, and watch for it to resurface. Around the clock. VanishID provides solutions for Digital Executive Protection, Workforce Protection, Family Office Protection, and Public Sector Protection. Learn more at https://vanishid.com</description>
      <category>Cybercrime Magazine Podcast</category>
      <enclosure url="https://feeds.soundcloud.com/stream/2310925910-cybercrimemagazine-vanishid-agentic-ai-powered-digital-executive-protection-matt-polak-founder-ceo.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>CISO Confidential. Disruptive Defense. James Howley, Cummins &amp; Bobby Ford, Doppel.</title>
      <link>https://cybersecpods.com/podcasts/cybercrime-magazine/ciso-confidential-disruptive-defense-james-howley-cummins-and-bobby-ford-doppel/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cybercrime-magazine/ciso-confidential-disruptive-defense-james-howley-cummins-and-bobby-ford-doppel/</guid>
      <pubDate>Thu, 30 Apr 2026 18:50:40 GMT</pubDate>
      <description>James Howley is the Director of Cybersecurity Governance &amp; Risk Management at Cummins. In this episode, he joins host Scott Schober and Bobby Ford, Chief Strategy and Experience Officer at Doppel, to discuss disruptive defense, including AI&apos;s impact on phishing, implementing a successful human risk management model, and more. This episode of CISO Confidential is brought to you by Doppel. Learn more about our sponsor at https://doppel.com.</description>
      <category>Cybercrime Magazine Podcast</category>
      <enclosure url="https://feeds.soundcloud.com/stream/2311554623-cybercrimemagazine-ciso-confidential-disruptive-defense-james-howley-cummins-bobby-ford-doppel.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>French Credit Card Hacker Discusses His Crimes After Two Decades. A Conversation With Serge Humpich.</title>
      <link>https://cybersecpods.com/podcasts/cybercrime-magazine/french-credit-card-hacker-discusses-his-crimes-after-two-decades-a-conversation-/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cybercrime-magazine/french-credit-card-hacker-discusses-his-crimes-after-two-decades-a-conversation-/</guid>
      <pubDate>Thu, 30 Apr 2026 16:15:16 GMT</pubDate>
      <description>Serge Humpich is a hacker who discovered a flaw in the Carte Bleue system used in France for credit cards. He tried to warn banks, but was unsuccessful, and therefore decided to perform a public &quot;show&quot; where he bought subway tickets while using the flaw in the card system. He was convicted in 2000 to a ten months suspended sentence, and lost his job as a result of the case. In this episode, Humpich joins host Heather Engel to discuss his experience, the ethical hacking landscape over 25 years later, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com</description>
      <category>Cybercrime Magazine Podcast</category>
      <enclosure url="https://feeds.soundcloud.com/stream/2311575344-cybercrimemagazine-french-credit-card-hacker-discusses-crimes-serge-humpich.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Episode 127: Threat intel update and AI</title>
      <link>https://cybersecpods.com/podcasts/azure-security-podcast/episode-127-threat-intel-update-and-ai/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/azure-security-podcast/episode-127-threat-intel-update-and-ai/</guid>
      <pubDate>Thu, 30 Apr 2026 15:41:54 GMT</pubDate>
      <description>In this episode, Michael, Sarah and Mark talk with Sherrod DeGrippo about some of the latest tactics and strategies used by modern threat actors, we also wander into the AI security weeds! We only have one news item related to Azure SQL databases. https://aka.ms/azsecpod</description>
      <category>The Azure Security Podcast</category>
      <enclosure url="https://content.rss.com/episodes/8411/2781746/azsecpodcast/2026_04_30_15_18_31_c7ba707d-25a5-43a9-9dfc-1cdbe10521d0.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Ransomware Minute. McGraw Hill Hit, 13.5M Records Exposed. Scott Schober, WCYB Digital Radio.</title>
      <link>https://cybersecpods.com/podcasts/cybercrime-magazine/ransomware-minute-mcgraw-hill-hit-135m-records-exposed-scott-schober-wcyb-digita/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cybercrime-magazine/ransomware-minute-mcgraw-hill-hit-135m-records-exposed-scott-schober-wcyb-digita/</guid>
      <pubDate>Thu, 30 Apr 2026 14:22:59 GMT</pubDate>
      <description>The Ransomware Minute is a rundown of the latest ransomware attacks &amp; news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.</description>
      <category>Cybercrime Magazine Podcast</category>
      <enclosure url="https://feeds.soundcloud.com/stream/2312143715-cybercrimemagazine-mcgraw-hill-hit-13-5m-records-exposed.mp3" type="audio/mpeg" />
    </item>
    <item>
      <title>Cybercrime News For Apr. 30, 2026. Texas Man Gets 23 Years For $1B Crypto Scam. WCYB Digital Radio.</title>
      <link>https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-news-for-apr-30-2026-texas-man-gets-23-years-for-dollar1b-crypto-scam/</link>
      <guid isPermaLink="true">https://cybersecpods.com/podcasts/cybercrime-magazine/cybercrime-news-for-apr-30-2026-texas-man-gets-23-years-for-dollar1b-crypto-scam/</guid>
      <pubDate>Thu, 30 Apr 2026 13:48:55 GMT</pubDate>
      <description>The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don&apos;t miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today&apos;s news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop marke</description>
      <category>Cybercrime Magazine Podcast</category>
      <enclosure url="https://feeds.soundcloud.com/stream/2312100965-cybercrimemagazine-texas-man-gets-23-years-for-1b-crypto-scam.mp3" type="audio/mpeg" />
    </item>
  </channel>
</rss>