1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
History of REvil

History of REvil

The Book, “History of REvil”, is a detailed report that investigates the history of the REvil ransomware gang, a criminal enterprise based in Russia. The Book outlines the group's origins as an affil…
00:26:08  |   Fri 13 Dec 2024
Hiding from the Internet: Eliminating Personal Online Information

Hiding from the Internet: Eliminating Personal Online Information

The Book, "Hiding From The Internet," is a comprehensive guide to maintaining online privacy. The author, a former government employee who experienced a personal data breach, provides detailed instru…
00:20:50  |   Fri 13 Dec 2024
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

This is a Book that explains how to investigate covert communications and analyzes the tools and methods that criminals use to hide their communications. The book covers a broad landscape of technica…
00:21:04  |   Thu 12 Dec 2024
Hash Crack: Password Cracking Manual v.3

Hash Crack: Password Cracking Manual v.3

This Book, "HASH CRACK Password Cracking Manual v.3" is a comprehensive guide for cracking password hashes, written for network defenders and penetration testers. It provides a broad overview of the …
00:20:54  |   Thu 12 Dec 2024
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks

The Book is an early access excerpt from the Hardware Hacking Handbook by Jasper van Woudenberg and Colin O'Flynn. This excerpt focuses on embedded security, particularly the vulnerabilities in the h…
00:18:58  |   Thu 12 Dec 2024
Hardware Security: A Hands-on Learning Approach

Hardware Security: A Hands-on Learning Approach

This Book, "Hardware Security A Hands-on Learning Approach," is a comprehensive guide to hardware security. It focuses on the vulnerabilities and attacks that threaten hardware systems, including tho…
00:20:50  |   Thu 12 Dec 2024
Hands-On Penetration Testing on Windows

Hands-On Penetration Testing on Windows

The Book called "Hands-On Penetration Testing on Windows," which explains penetration testing concepts and techniques for those with intermediate to advanced skills. It covers a broad range of topics…
00:36:55  |   Wed 11 Dec 2024
Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

Hands-On Dark Web Analysis: Learn what goes on in the Dark Web, and how to work with it

The Book "Hands-On Dark Web Analysis" by Sion Retzkin. The book provides a comprehensive guide for understanding and navigating the Deep Web and Dark Web, covering topics such as the origins of the i…
00:16:01  |   Wed 11 Dec 2024
Hands-On Chatbots and Conversational UI Development

Hands-On Chatbots and Conversational UI Development

The Book "Hands-On Chatbots and Conversational UI Development," which is a guide for building chatbots and voice user interfaces. The book covers a range of topics including the history and architect…
00:22:53  |   Wed 11 Dec 2024
Hands-On Penetration Testing with Kali NetHunter

Hands-On Penetration Testing with Kali NetHunter

This excerpt is from a book that teaches ethical hacking and penetration testing using Kali Linux, specifically the NetHunter edition, designed for mobile devices. The text explains various technique…
00:20:01  |   Wed 11 Dec 2024
Handbook for CTFers

Handbook for CTFers

The Book is a handbook for CTF competitors, a type of cybersecurity competition. It provides information about various security vulnerabilities and attack techniques that are commonly used in CTF com…
00:19:24  |   Tue 10 Dec 2024
Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook

Hacklog Volume 1 Anonymity: IT Security & Ethical Hacking Handbook

The provided Book excerpts from "Hacklog: Volume 1" are a handbook on anonymity, IT security, and ethical hacking. The book guides readers on how to protect their privacy online, covering various top…
00:19:36  |   Tue 10 Dec 2024
Hacking: The Art of Exploitation, 2nd Edition

Hacking: The Art of Exploitation, 2nd Edition

This Book material is an excerpt from a book titled "Hacking: The Art of Exploitation." It explores the art of hacking through a combination of practical programming examples and theoretical explanat…
00:16:31  |   Tue 10 Dec 2024
Hacking Android

Hacking Android

The Book provides a comprehensive guide to hacking and securing Android applications, covering both static and dynamic analysis techniques. The source details various Android security vulnerabilities…
00:50:14  |   Tue 10 Dec 2024
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Hacking the Hacker: Learn From the Experts Who Take Down Hackers

This Book is a comprehensive guide to computer hacking, written by Roger A. Grimes, a seasoned computer security professional with decades of experience. The book delves into the various methods empl…
00:34:51  |   Sun 08 Dec 2024
Hacking Kubernetes: Threat-Driven Analysis and Defense

Hacking Kubernetes: Threat-Driven Analysis and Defense

This excerpt from the book "Hacking Kubernetes" by Andrew Martin and Michael Hausenblas is a guide for cybersecurity professionals working with Kubernetes. It covers the fundamentals of securing Kube…
00:48:49  |   Sun 08 Dec 2024
Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future

Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future

The provided Book, excerpts from "Hacking in the Humanities: Cybersecurity, Speculative Fiction, and Navigating a Digital Future" explores the relationship between cybersecurity and the humanities. T…
00:23:06  |   Sun 08 Dec 2024
Hacking Exposed: Malware & Rootkits Secrets & Solutions

Hacking Exposed: Malware & Rootkits Secrets & Solutions

The Book "Hacking Exposed: Malware & Rootkits provides a comprehensive examination of modern malware and rootkits, exploring their evolution, techniques, and countermeasures. The book explores how th…
00:15:31  |   Sun 08 Dec 2024
Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

Hacking: Computer Hacking, Security Testing,Penetration Testing, and Basic Secur

The Book "Hacking: Computer Hacking, Security Testing, Penetration Testing and Basic Security," written by Gary Hall and Erin Watson. The book is a guide to understanding hacking techniques, includin…
00:53:52  |   Sun 08 Dec 2024
Hacking APIs: Breaking Web Application Programming Interfaces

Hacking APIs: Breaking Web Application Programming Interfaces

This is an excerpt from "Hacking APIs: Breaking Web Application Programming Interfaces". The book provides a comprehensive guide to hacking APIs, covering topics like API discovery, endpoint analysis…
00:42:39  |   Sun 08 Dec 2024
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.