mirror of
https://github.com/swisskyrepo/PayloadsAllTheThings.git
synced 2024-12-18 10:26:09 +00:00
Added Podcasts and Updated Youtube
This commit is contained in:
parent
38716075f0
commit
84e6571939
60
_LEARNING_AND_SOCIALS/PODCASTS.md
Normal file
60
_LEARNING_AND_SOCIALS/PODCASTS.md
Normal file
@ -0,0 +1,60 @@
|
||||
# Cybersecurity Podcasts
|
||||
|
||||
> Explore some of the best cybersecurity podcasts to stay informed, entertained, and up-to-date with the latest in information security.
|
||||
|
||||
## Podcasts
|
||||
|
||||
- **[Cyber Work](https://www.infosecinstitute.com/podcast/cyber-work-podcast)**
|
||||
- **[Click Here](https://clickhereshow.com/)**
|
||||
- **[Defrag This](https://www.imperva.com/blog/defrag-this-podcast/)**
|
||||
- **[Security Now](https://twit.tv/shows/security-now)**
|
||||
- **[InfoSec Real](https://www.youtube.com/channel/UC2flvup7giBpysO-4wdynMg)**
|
||||
- **[InfoSec Live](https://www.info-sec.live/)**
|
||||
- **[Simply Cyber](https://www.simplycyber.io/)**
|
||||
- **[OWASP Podcast](https://owasp.org/www-project-podcast/)**
|
||||
- **[We Talk Cyber](https://wetalkcyber.buzzsprout.com/)**
|
||||
- **[Risky Business](https://risky.biz/)**
|
||||
- **[Malicious Life](https://malicious.life/)**
|
||||
- **[Hacking Humans](https://thecyberwire.com/podcasts/hacking-humans)**
|
||||
- **[What The Shell](https://whattheshellpod.com/)**
|
||||
- **[Life of a CISO](https://lifeofaciso.libsyn.com/)**
|
||||
- **[H4unt3d Hacker](https://www.hauntedhacker.com/)**
|
||||
- **[2 Cyber Chicks](https://www.itspmagazine.com/2-cyber-chicks)**
|
||||
- **[The Hacker Mind](https://thehackermind.com/)**
|
||||
- **[Security Weekly](https://securityweekly.com/)**
|
||||
- **[Cyberside Chats](https://www.cybersidechats.com/)**
|
||||
- **[Darknet Diaries](https://darknetdiaries.com/)**
|
||||
- **[CyberWire Daily](https://thecyberwire.com/podcasts/daily-podcast)**
|
||||
- **[Absolute AppSec](https://absoluteappsec.com/)**
|
||||
- **[Security in Five](https://securityinfive.libsyn.com/)**
|
||||
- **[The Cyber Queens](https://www.cyberqueenspodcast.com/)**
|
||||
- **[Smashing Security](https://www.smashingsecurity.com/)**
|
||||
- **[401 Access Denied](https://www.itspmagazine.com/401-access-denied)**
|
||||
- **[7 Minute Security](https://7minsec.com/)**
|
||||
- **[8th Layer Insights](https://8thlayerinsights.com/)**
|
||||
- **[Adopting Zero Trust](https://www.forrester.com/podcasts/adopting-zero-trust/)**
|
||||
- **[Cyber Crime Junkies](https://www.cybercrimejunkies.com/)**
|
||||
- **[Cyber Security Sauna](https://www.f-secure.com/en/consulting/podcast)**
|
||||
- **[The Cyberlaw Podcast](https://www.lawfaremedia.org/topic/cyberlaw-podcast)**
|
||||
- **[Unsupervised Learning](https://danielmiessler.com/podcast/)**
|
||||
- **[Naked Security Podcast](https://nakedsecurity.sophos.com/podcasts/)**
|
||||
- **[Identity at the Center](https://www.identityatthecenter.com/)**
|
||||
- **[Breaking Down Security](https://www.breakingsecurity.com/)**
|
||||
- **[The Shellsharks Podcast](https://www.shellsharks.com/)**
|
||||
- **[The Virtual CISO Moment](https://virtualciso.buzzsprout.com/)**
|
||||
- **[The Cyber Ranch Podcast](https://www.cyberranchpodcast.com/)**
|
||||
- **[The Cyber Tap (cyberTAP)](https://engineering.purdue.edu/CyberTAP/podcast)**
|
||||
- **[The Shared Security Show](https://sharedsecurity.net/)**
|
||||
- **[The Social-Engineer Podcast](https://www.social-engineer.org/podcast/)**
|
||||
- **[The 443 Security Simplified](https://www.secplicity.org/)**
|
||||
- **[Adventures of Alice and Bob](https://www.humanlayersecurity.com/podcast)**
|
||||
- **[Cybersecurity Today by ITWC](https://www.itworldcanada.com/podcasts)**
|
||||
- **[Crypto-Gram Security Podcast](https://www.schneier.com/cryptogram/)**
|
||||
- **[Open Source Security Podcast](https://opensourcesecurity.io/)**
|
||||
- **[Hacker Valley Studio Podcast](https://hackervalley.com/)**
|
||||
- **[The Hacker Chronicles Podcast](https://thehackerchroniclespodcast.com/)**
|
||||
- **[BarCode Cybersecurity Podcast](https://www.barcode-security.com/podcast)**
|
||||
- **[Task Force 7 Cyber Security Radio](https://www.tf7radio.com/)**
|
||||
- **[The Privacy, Security, & OSINT Show](https://www.inteltechniques.com/podcast.html)**
|
||||
- **[Cyber Security Headlines by the CISO Series](https://cisoseries.com/category/cyber-security-headlines/)**
|
||||
- **[SANS Internet Stormcenter Daily Cyber Podcast (Stormcast)](https://isc.sans.edu/podcast.html)**
|
@ -6,30 +6,59 @@
|
||||
|
||||
- [0xdf](https://www.youtube.com/@0xdf)
|
||||
- [Assetnote - Surfacing Security Podcast](https://www.youtube.com/@assetnote2016)
|
||||
- [Black Hat](https://www.youtube.com/@BlackHatEvents)
|
||||
- [Black Hills Information Security](https://www.youtube.com/@BHInfoSecurity)
|
||||
- [BlackPerl](https://www.youtube.com/@BlackPerl)
|
||||
- [Bug Bounty Reports Explained](https://www.youtube.com/@BugBountyReportsExplained)
|
||||
- [Bugcrowd](https://www.youtube.com/@Bugcrowd)
|
||||
- [Codingo](https://www.youtube.com/@codingo)
|
||||
- [Computerphile](https://www.youtube.com/@Computerphile)
|
||||
- [Critical Thinking - Bug Bounty Podcast](https://www.youtube.com/@criticalthinkingpodcast)
|
||||
- [Cyrill Gössi](https://www.youtube.com/@cyrillgoessi)
|
||||
- [Cyber CDH](https://www.youtube.com/@CyberCDH)
|
||||
- [Cyberspatial](https://www.youtube.com/@Cyberspatial)
|
||||
- [David Bombal](https://www.youtube.com/@DavidBombal)
|
||||
- [DC CyberSec](https://www.youtube.com/@DCCyberSec)
|
||||
- [DEFCON Conference](https://www.youtube.com/user/DEFCONConference/videos)
|
||||
- [Embrace The Red - wunderwuzzi](https://www.youtube.com/@embracethered)
|
||||
- [GynvaelEN - Podcasts about CTFs, computer security, programming and similar things.](https://www.youtube.com/channel/UCCkVMojdBWS-JtH7TliWkVg)
|
||||
- [Hack eXPlorer](https://www.youtube.com/@hackexplorer)
|
||||
- [Hackerone](https://www.youtube.com/channel/UCsgzmECky2Q9lQMWzDwMhYw)
|
||||
- [Hackersploit](https://www.youtube.com/channel/UC0ZTPkdxlAKf-V33tqXwi3Q)
|
||||
- [Hacksplained - A Beginner Friendly Guide to Hacking](https://www.youtube.com/c/hacksplained)
|
||||
- [Hak5](https://www.youtube.com/channel/UC3s0BtrBJpwNDaflRSoiieQ)
|
||||
- [IppSec Channel - Hack The Box Writeups](https://www.youtube.com/channel/UCa6eh7gCkpPo5XXUDfygQQA)
|
||||
- [InsiderPHD](https://www.youtube.com/@InsiderPHD)
|
||||
- [Infosec Institute](https://www.youtube.com/@InfosecInstitute)
|
||||
- [InfoSec Live](https://www.youtube.com/@InfoSecLive)
|
||||
- [ITProTV](https://www.youtube.com/@ITProTV)
|
||||
- [Jack Rhysider - Darknet Diaries](https://www.youtube.com/@JackRhysider)
|
||||
- [Joe Collins](https://www.youtube.com/@JoeCollins)
|
||||
- [John Hammond - Wargames and CTF writeups](https://www.youtube.com/channel/UCVeW9qkBjo3zosnqUbG7CFw)
|
||||
- [Laluka - OffenSkill - Sharing is Caring](https://www.youtube.com/@TheLaluka)
|
||||
- [LiveOverflow - Explore weird machines...](https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w)
|
||||
- [MalwareTechBlog](https://www.youtube.com/@MalwareTechBlog)
|
||||
- [Murmus CTF - Weekly live streamings](https://www.youtube.com/channel/UCUB9vOGEUpw7IKJRoR4PK-A)
|
||||
- [Nahamsec](https://www.youtube.com/c/Nahamsec)
|
||||
- [Network Chuck](https://www.youtube.com/@NetworkChuck)
|
||||
- [Null Byte](https://www.youtube.com/@NullByteW0)
|
||||
- [OJ Reeves](https://www.youtube.com/channel/UCz2aqRQWMhJ4wcJq3XneqRg)
|
||||
- [Outpost Gray](https://www.youtube.com/@OutpostGray)
|
||||
- [OWASP Foundation](https://www.youtube.com/@OWASP)
|
||||
- [Pentester Academy TV](https://www.youtube.com/@PentesterAcademyTV)
|
||||
- [Peter Yaworski](https://www.youtube.com/@PeterYaworski)
|
||||
- [Professor Messer](https://www.youtube.com/@ProfessorMesser)
|
||||
- [PwnFunction](https://www.youtube.com/channel/UCW6MNdOsqv2E9AjQkv9we7A)
|
||||
- [stacksmashing / Ghidra Ninja](https://www.youtube.com/channel/UC3S8vxwRfqLBdIhgRlDRVzw)
|
||||
- [SANS Offensive Operations](https://www.youtube.com/@SANSBlueTeam)
|
||||
- [Security Now](https://www.youtube.com/@SecurityNow)
|
||||
- [STÖK](https://www.youtube.com/c/STOKfredrik)
|
||||
- [stacksmashing / Ghidra Ninja](https://www.youtube.com/channel/UC3S8vxwRfqLBdIhgRlDRVzw)
|
||||
- [Simply Cyber](https://www.youtube.com/@SimplyCyber)
|
||||
- [The Cyber Mentor](https://www.youtube.com/channel/UC0ArlFuFYMpEewyRBzdLHiw)
|
||||
- [The Hated one](https://www.youtube.com/channel/UCjr2bPAyPV7t35MvcgT3W8Q)
|
||||
- [The PC Security Channel](https://www.youtube.com/@ThePCSecurity)
|
||||
- [xct hacks](https://www.youtube.com/@xct_de)
|
||||
|
||||
- [Z-winK University](https://www.youtube.com/@ZwinKUniversity)
|
||||
|
||||
## Conferences
|
||||
|
||||
@ -46,7 +75,6 @@
|
||||
- [Recon Village](https://www.youtube.com/@ReconVillage)
|
||||
- [x33fcon Conference](https://www.youtube.com/c/x33fcon)
|
||||
|
||||
|
||||
## Curated Videos
|
||||
|
||||
- [BSidesSF 101 The Tales of a Bug Bounty Hunter - Arne Swinnen](https://www.youtube.com/watch?v=dsekKYNLBbc)
|
||||
|
Loading…
Reference in New Issue
Block a user