1. EachPod

CyberSecurity Summary - Podcast

CyberSecurity Summary

CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity.
Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity.
Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your understanding and keep you informed.

You can listen and download our episodes for free on more than 10 different platforms:
https://linktr.ee/cyber_security_summary

Books News Tech News Arts Education
Update frequency
every day
Average duration
24 minutes
Episodes
1008
Years Active
2024 - 2025
Share to:
Hacking SaaS: An Insider's Guide to Managing Software Business Success

Hacking SaaS: An Insider's Guide to Managing Software Business Success

The Book is an excerpt from "Hacking SaaS: An Insider’s Guide to Managing Software Business Success," a book written by Eric Mersch, an experienced CFO with a long career in the subscription software…
00:19:21  |   Sun 08 Dec 2024
Hacking Multifactor Authentication

Hacking Multifactor Authentication

This excerpt from the book "Hacking Multifactor Authentication" provides a comprehensive look at the various ways attackers can bypass multifactor authentication (MFA). The book explores different ty…
00:21:15  |   Sun 08 Dec 2024
HACKING!: 3 books in 1: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX

HACKING!: 3 books in 1: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX

This excerpt from a hacking guidebook provides comprehensive information about ethical hacking, penetration testing, and cybersecurity. It delves into different types of hackers, including black hat,…
00:24:54  |   Sat 07 Dec 2024
Hacking VoIP: Protocols, Attacks, and Countermeasures

Hacking VoIP: Protocols, Attacks, and Countermeasures

The Book, "Hacking VoIP: Protocols, Attacks, and Countermeasures" by Himanshu Dwivedi, is a book that details the security vulnerabilities of Voice over Internet Protocol (VoIP) networks. The book co…
00:15:59  |   Sat 07 Dec 2024
Hacking the Xbox: An Introduction to Reverse Engineering

Hacking the Xbox: An Introduction to Reverse Engineering

"Hacking the Xbox: An Introduction to Reverse Engineering" is a guide for hackers interested in learning about reverse engineering, specifically focusing on the Xbox gaming console. The book begins w…
00:22:16  |   Sat 07 Dec 2024
Hacking Gps

Hacking Gps

This excerpt from the book "Hacking GPS" by Kathie Kingsley-Hughes covers a wide range of topics relating to Global Positioning Systems (GPS) including hardware modifications, software hacking, and d…
00:24:41  |   Sat 07 Dec 2024
Hacking For Dummies

Hacking For Dummies

The source Book provides a comprehensive guide to understanding and mitigating information security risks. It covers a range of topics, including common hacking techniques, vulnerability assessment m…
00:41:55  |   Sat 07 Dec 2024
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It

This excerpt is from the book "Hacking and Securing iOS Applications" by Jonathan Zdziarski. The book provides a comprehensive guide to the vulnerabilities of iOS devices and applications. It explore…
00:20:18  |   Sat 07 Dec 2024
Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous

The excerpt is from a book exploring the complex, multifaceted nature of Anonymous, a decentralized online collective known for its hacktivism and trolling activities. The author provides a detailed …
00:28:25  |   Fri 06 Dec 2024
Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition

Gray Hat Hacking: The Ethical Hacker's Handbook, Sixth Edition

The Book provide a comprehensive guide to ethical hacking, covering a wide range of topics from basic programming concepts to advanced techniques for exploiting vulnerabilities in various systems. Th…
00:25:04  |   Fri 06 Dec 2024
Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools

Gray Hat C#: A Hacker's Guide to Creating and Automating Security Tools

The source Book is from the book "Gray Hat C# : A Hacker's Guide to Creating and Automating Security Tools" by Brandon Perry. This book teaches readers how to write C# security tools for Windows, OS …
00:14:37  |   Fri 06 Dec 2024
Gray Hat Python: Python Programming for Hackers and Reverse Engineers

Gray Hat Python: Python Programming for Hackers and Reverse Engineers

The provided Book are excerpts from the book "Gray Hat Python" by Justin Seitz, which aims to teach readers how to use Python for hacking and reverse engineering. The text focuses on a variety of top…
00:23:25  |   Thu 05 Dec 2024
Google Hacking for Penetration Testers

Google Hacking for Penetration Testers

This is a guide to Google hacking, focusing on how Google can be used to find sensitive information on the internet. The book covers topics like locating exploits and targets, profiling web servers, …
00:14:12  |   Thu 05 Dec 2024
Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo

Google Cloud Certified Professional Cloud Network Engineer Guide: Design, implement, manage, and secure a network architecture in Google Clo

This book, Google Cloud Certified Professional Cloud Network Engineer Guide, is a comprehensive guide to Google Cloud Platform (GCP) networking. It covers a wide range of topics, including designing,…
00:39:01  |   Thu 05 Dec 2024
Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense

This excerpt from the book "Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense" by Bryson Payne is a guide to ethical hacking that teaches readers about common cyber attacks and how…
00:51:24  |   Thu 05 Dec 2024
Go Programming Language For Dummies

Go Programming Language For Dummies

This excerpt from the book "Go Programming Language For Dummies" provides a detailed introduction to the Go programming language, focusing on core concepts such as data types, variables, control flow…
00:20:13  |   Thu 05 Dec 2024
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

Ghost in the Wires: My Adventures as the World's Most Wanted Hacker

"Ghost in the Wires: My Adventures as the World's Most Wanted Hacker" is Kevin Mitnick's autobiography detailing his life as a computer hacker. The text provides excerpts from his book where Mitnick …
00:16:21  |   Thu 05 Dec 2024
Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy

Ghidra Software Reverse Engineering for Beginners: Analyze, identify, and avoid malicious code and potential threats in your networks and sy

This is a comprehensive guide to Ghidra, a reverse engineering tool developed by the National Security Agency (NSA). The book covers a wide range of topics, including Ghidra's installation and setup,…
00:27:56  |   Thu 05 Dec 2024
Get Programming with Go

Get Programming with Go

A book that teaches the Go programming language. It provides a step-by-step guide to Go, starting with the basics, such as declaring variables and performing math operations, and moving on to more ad…
00:33:27  |   Thu 05 Dec 2024
Game Hacking: Developing Autonomous Bots for Online Games by Cano

Game Hacking: Developing Autonomous Bots for Online Games by Cano

This is a comprehensive guide on game hacking, outlining the various tools and techniques used to manipulate and modify online games. The book covers memory scanning, debugging, code injection, hooki…
00:29:25  |   Thu 05 Dec 2024
Disclaimer: The podcast and artwork embedded on this page are the property of CyberSecurity Summary. This content is not affiliated with or endorsed by eachpod.com.