The Threatpost Podcast-logo

The Threatpost Podcast

Technology Podcasts >

Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.

Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
More Information


United States


Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.




Why Cities Are a Low-Hanging Fruit For Ransomware (Part 1)

Why do cities appear to be a low hanging fruit when it comes to ransomware attacks? What hurdles do state and local governments face when securing their systems and responding to attacks? In the first of a two part series, Threatpost talks to Shawn Taylor, the senior systems engineer at Forescout who covers state and local governments across the country. Taylor was in the trenches during the infamous 2018 Atlanta ransomware attack and recounts what the experience taught him about...


The Threatpost Podcast: What the Next Generation of Bug Bounty Looks Like

Threatpost talks to Bugcrowd chief security officer David Baker about the challenges, trends and future of bug bounty programs.


The Threatpost Podcast: Thousands of IoT Devices Bricked By Silex Malware

A 14-year-old hacker used a new strain of malware this week to brick up to 4,000 insecure Internet of Things (IoT) devices - before abruptly shutting down. The malware, dubbed Silex, was first discovered by Larry Cashdollar, senior Security Intelligence Response engineer at Akamai, on his honeypot. Threatpost discusses the new malware with Cashdollar - and what malware strains like this one and BrickerBot mean for the insecure IoT device landscape.


News Wrap Podcast For June 21

Beyond the regular humdrum of security vulnerabilities and patches this week, a slew of stories covered varying topics ranging from NASA to Tinder. The Threatpost team broke down the top stories of the week, including:


The Threatpost Podcast: It's Time to Throw Out Insecure IoT Devices

What can be done with 2 million connected security cameras, baby monitors and more that are vulnerable to serious flaws - but don't have a patch? Security researcher Paul Marrapese, whodisclosed the flaws in April and has yet to hear back from any impacted vendors, recommends that consumers throw them in the trash. "I 100 percent suggest that people throw them out," he told Threatpost in a podcast interview. "I really, I don't think that there's going to be any patch for this. The issues...


News Wrap Podcast For June 14

Beyond Patch Tuesday, this week was crammed with privacy and security related news. In this week's Threatpost podcast, editors Tara Seals and Lindsey O'Donnell discussed the top news from the week. That includes: federal lawsuitsquarely at Chinacritical flaw


News Wrap Podcast for June 7

This week cybersecurity news was overshadowed by research, talks and discussion from Infosecurity Europe, which took place in London. During the Threatpost news wrap for the week ended June 7, the team breaks down the top news from the show, as well as other breaking security news covered over the past few days. Those include: data miningBlueKeep vulnerabilityTap ‘n Ghost


The Threatpost Podcast: Behind-the-Scenes Look at Scattered Canary BEC Cybergang

At Infosecurity Europe, Threatpost caught up with Agari researchers to discuss their threat research unveiled at the show about a newly-unveiled business email compromise (BEC) cybergang. The cybercriminal group, which researchers called Scattered Canary, has been evolving for over 10 years - starting from a "one man shop" launching Craigslist and romance scams, to a high-level, sophisticated BEC group with dozens of employees targeting enterprises. Threatpost talks to Ronnie Tokazowski,...


The Threatpost Podcast: Nansh0u Cryptojacking Campaign Infects 50K Servers

At Infosecurity Europe, which kicks off Tuesday in London, UK, Threatpost gets a behind-the-scenes look at the Nansh0u campaign, a cryptojacking campaign that has infected 50,000 servers with malware that mines an open source cryptocurrency called TurtleCoin. Dave Klein, senior director of engineering architecture with Guardicore, discusses cryptojacking and other trends he's looking out for at the show.


The Threatpost Podcast: The Challenges Behind 5G Security

Threatpost talks to Nils Ahrlich, head of end-to-end security solutions at Nokia, at the GSMA Mobile 360 Security for 5G conference last week in the Netherlands. When it comes to 5G there are a slew of use cases being utilized at the bleeding edge - from smart factories to IoT - but these are also opening up security risks.


The Threatpost Podcast: Enterprise Security Risks of 5G

During the GSMA Mobile360 conference on 5G security, Threatpost editor Tara Seals talks to Patrick Donegan, founder and principle analyst at HardenStance, about the enterprise risks involved in 5G.


The Threatpost Podcast: '5G is Coming,' What Does it Mean For Security?

With the advent of 5G, the tech community is bracing itself for new applications like self-driving cars and IoT. But what does that mean for the security landscape? At the GSMA Mobile 360 Conference, Threatpost editor Tara Seals talks to Fred Streefland, CISO for the Benelux and Nothern East Europe region at Palo Alto Networks, about the security challenges - and opportunities - that 5G is presenting.


News Wrap Podcast For May 24

The Threatpost team breaks down the top data privacy-related news this week, including: acknowledgement The database of golfing app Game Golf left misconfigured, exposing millions of data points on games played plus sensitive information. Firefox 67Threatpost webinaryou can register here


The Threatpost Podcast: Behind the Intel CPU ZombieLoad Attack

After Intel on Tuesday revealed a new class of speculative execution vulnerabilities, which impact all its modern CPUs, the researcher who was part of the team that discovered one of these flaws is sounding off on the disclosure process behind it. The speculative execution flaw, ZombieLoad, is an attack related to CVE-2018-12130, the flaw in the Fill Buffer of Intel CPUs. That's because this attack leaks the most data – attackers are able to siphon data from system applications, operating...


News Wrap Podcast For May 17

This week was filled with flaws, flaws and more flaws: From a zero-day under active exploit in the WhatsApp messaging app, to Patch Tuesday glitches addressed by Microsoft. Threatpost breaks down the top vulnerabilities of the week, including: A WhatsApp zero-day vulnerability being exploited in targeted spyware attacks Cisco vulnerabilitiesdisclosed on MondayA new class of speculative execution vulnerabilities in all modern Intel CPUs, dubbed Microarchitectural Data Sampling (MDS) A...


News Wrap Podcast For May 10

Threatpost editors Lindsey O'Donnell and Tom Spring break down this week's biggest news, including: -Facebook co-founder Chris Hughes wrote a blistering op-ed about the need for regulation around the social media giant -Verizon's data breach investigations report 2019, released this week, which outlined the top data breach trends to look out for -A firestorm surrounding Airbnb after a guest discovered that her host was secretly recording her in the flat's bedroom.


News Wrap Podcast For May 3

The Threatpost team discusses a slew of strange security news that made headlines this week, including: -The Cartoon Network being hacked to play Brazilian stripper videos -The Catholic Church falling victim to a $1.75 business email compromise scam -A scammer pretending to be Jason Statham tricking a fan out of money


The Threatpost Podcast: What is the Future of IoT Security?

What is the future of IoT security? Will consumers continue to face insecure technology, disturbing privacy concerns, and DDoS attacks? Or will the efforts of consortiums, legislations and industry pressure help set connected device security straight? Threatpost sits down with Jason Soroco with Sectigo, the Chief Technology Officer of IoT, to get his opinion.


News Wrap Podcast For April 26

The Threatpost team talks about recent data privacy news - including the Facebook's FTC fine potentially reaching $5 billion, facial recognition concerns, and Amazon's Echo auditing team.


The Threatpost Podcast: Spotting Social Media Influence Campaigns at SAS 2019

Threatpost editor Tara Seals sits down with Staffan Truvé, the co-founder and CTO of Recorded Future, at the Security Analyst Summit in Singapore this week. Truvé discussed the rise of influence campaigns on social media, and one campaign in particular that researchers have recently spotted that has focused not on fake news, but on old news that aims to influence victims.