PodcastsNewsCybersecurity Headlines

Cybersecurity Headlines

CISO Series
Cybersecurity Headlines
Latest episode

1693 episodes

  • Cybersecurity Headlines

    FCC router ban, drone hit AWS, Crunchroll leak

    25/03/2026 | 6 mins.
    FCC bans foreign routers
    Drone activity disrupts AWS region
    Crunchyroll confirmed data leak
    Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-fcc-router-ban-drone-hit-aws-crunchroll-leak/
    Huge thanks to our sponsor, ThreatLocker

    Least privilege isn't about distrusting users — it's about limiting blast radius. Many attacks succeed because malware inherits excessive permissions. Enforcing least privilege helps ensure that even if something goes wrong, attackers can't easily escalate access or move laterally across the environment. Learn more at ThreatLocker.com
  • Cybersecurity Headlines

    DarkSword exploit hits GitHub, Gemini AI agents scour dark web, Trivy supply chain attack expands

    24/03/2026 | 8 mins.
    New DarkSword exploit hits GitHub
    Gemini AI agents scour the dark web
    Trivy supply chain attack expands
    Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-darksword-exploit-hits-github-gemini-ai-agents-scour-dark-web-trivy-supply-chain-attack-expands/
    Huge thanks to our sponsor, ThreatLocker

    Ransomware doesn't need to be sophisticated if it's allowed to execute. A growing number of security teams are shifting focus from detecting ransomware to preventing execution in the first place — controlling applications, scripts, and installers so unauthorized code never gets the chance to run. Learn more at ThreatLocker.com
  • Cybersecurity Headlines

    Department of Know: SaaS apps enable breaches, real-time cyber protection, IoT botnet takedown

    23/03/2026 | 32 mins.
    Link to episode page
    This week's Department of Know is hosted by Rich Stroffolino with guests Bil Harmer, CISO, Supabase, and Chris Ray, Field CTO, GigaOm
    Thanks to our show sponsor, ThreatLocker

    Many security strategies still assume everything is allowed until proven malicious. Attackers understand that model well. That's why more organizations are rethinking endpoint security — shifting from detection-first tools to control-first approaches that reduce attack surface before an incident occurs. Learn more at ThreatLocker.com
    All links and the video of this episode can be found on CISO Series.com
  • Cybersecurity Headlines

    International botnet takedown, California city ransomed, Azure Monitor phishing

    23/03/2026 | 8 mins.
    Law enforcement seizes botnet infrastructure
    California city and LA transit agency report cybersecurity issues
    Microsoft Azure Monitor alerts used for callback phishing attacks 
    Check out our show notes for all story links: https://cisoseries.com/cybersecurity-news-cybersecurity-news-international-botnet-takedown-california-city-ransomed-azure-monitor-phishing/
    Huge thanks to our sponsor, ThreatLocker

    Most breaches don't start with a zero-day — they start because something unexpected was allowed to run. One way organizations reduce risk is by shrinking the attack surface: deciding what software should be allowed to execute and blocking everything else by default. Fewer unknowns means fewer opportunities for attackers. Learn more at ThreatLocker.com
  • Cybersecurity Headlines

    Critical SharePoint flaw, real-time cyberattack prevention, CISA's Intune warning

    20/03/2026 | 8 mins.
    Critical Microsoft SharePoint flaw now exploited in attacks
    1stProtect reveals endpoint security platform intended to prevent cyberattacks in real time
    CISA urges U.S. organizations to secure Microsoft Intune systems following Stryker breach
    Get links to all our stories in the show notes: https://cisoseries.com/cybersecurity-news-critical-sharepoint-flaw-real-time-cyberattack-prevention-cisas-intune-warning/
    Huge thanks to our episode sponsor, Adaptive Security

    This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Picture a "new hire" who interviews well… except they're synthetic: AI video, AI voice, AI backstory. Once they're in, they go after payroll, internal docs, and access. That's the new reality: the attack surface is trust itself. Adaptive fights back with realistic deepfake simulations and training that actually sticks. Learn more at  adaptivesecurity.com.

More News podcasts

About Cybersecurity Headlines

Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Podcast website

Listen to Cybersecurity Headlines, The Rest Is Politics: Leading and many other podcasts from around the world with the radio.net app

Get the free radio.net app

  • Stations and podcasts to bookmark
  • Stream via Wi-Fi or Bluetooth
  • Supports Carplay & Android Auto
  • Many other app features

Cybersecurity Headlines: Podcasts in Family

Social
v8.8.3 | © 2007-2026 radio.de GmbH
Generated: 3/25/2026 - 4:50:55 PM