Hosted by Michael J. Feuer, Dean of GW's Graduate School of Education and Human Development (GSEHD), EdFix highlights the effective strategies and provocative ideas of researchers, practitioners and policymakers on how to improve our education system. Listen in as Dean Feuer connects their worlds to take on some of education's most complex issues.
…
continue reading
HackrLife, is a podcast about personal growth, mental models, life hacks and technology. In my day job I work for Google. In my spare time I create products, content and designs to learn new things by doing them. HackrLife is a compilation of these learnings. A way of life where we are always learning.
…
continue reading
Honest conversations with the engineering leaders, CTOs, founders, and engineers building real software with real teams. No fluff, no hype — just the messy, human side of getting great products out the door.
…
continue reading
Weekly interviews with world-class engineering leaders about writing great software and working well with humans.
…
continue reading
This is a podcast about Philosophy and its relation to the story of human life. Hosted by Alex Sachon. Find links to my publications and more at my website: www.alexsachon.com
…
continue reading
There's a lot on the line for developers. Writing clean code, tracking down and removing bugs, AND shipping features to millions of customers? It's a lot—and devs are people too! The Dev Morning Show (At Night) shares the human side of software development with interviews that start lighthearted but get to the heart of what it takes to perform in the delightfully weird world of software. Join us on the journey!
…
continue reading
A new perspective on software development. Brought to you by the team @ Codebuddy.
…
continue reading
If you could ask some of the world's brightest minds and biggest hearts any question... what would it be? That very question is the essence of our newest adventure into the exploration of love and consciousness... The Jai Dev Show. In this semi-weekly podcast, I'll be talking to some of the most inspiring people I've met throughout my years of traveling and teaching around the world. They are people who have concentrated their life-force. They have pointed the energy of their life into a sin ...
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Zenly Organized s'adresse aux personnes qui veulent apprendre à mieux se connaitre et s’organiser pour vivre de manière plus alignée et sereine. Je t'y partage des outils de connaissance de soi (ex: astrologie et Human Design) et des méthodes d’organisation qui t'aideront à te reconnecter à toi-même et à mieux t'organiser pour construire la vie que tu désires (chronotypes, cycle menstruel, saisons, Bullet Journal, méditation, oracles, et plus encore) ! Retrouve plus de ressources gratuites p ...
…
continue reading
I am an engineer, turned school teacher, turned a trainer/org dev coach, turned HR Professional and now a content creator. In my experience of about 14+ years of work, I've noticed myself and many around me struggling with stereotypes, conventional ideas, and patterns we sometimes inherit without even questioning them especially, with aspects of Self-Development, Improvement and Growth Mindset. Eventually, leading to a state where either such aspects get trivialised or ignored. This compelle ...
…
continue reading
פודקאסט על כל מה שעושה כיף לנשות ואנשי תוכנה בהנחיית ויקי קלמנוביץ!
…
continue reading
Welcome to "The Grind 24/7," the ultimate podcast for all things sports, performance, and culture. Join your hosts Gee and Dev, the dynamic duo behind the renowned Level 40 sports performance facility, as they take you on an exhilarating journey through the world of elite athleticism and human potential. In "The Grind 24/7," Gee and Dev bring you unparalleled access to the realm of professional sports and the inner workings of the training community. With a guest list that includes professio ...
…
continue reading
The intersection of Data Analysis and Passion. Casual Conversations with Data Pros + Artists and Bite-Sized Data Stories
…
continue reading
"web3 with a16z" is a show about the next generation of the internet, and about how builders and users -- whether artists, coders, creators, developers, companies, organizations, or communities -- now have the ability to not just "read" (web1) + "write" (web2) but "own" (web3) pieces of the internet, unlocking a new wave of creativity and entrepreneurship. Brought to you by a16z crypto, this show is the definitive resource for understanding and going deeper on all things crypto and web3. Fro ...
…
continue reading
Deeply Well Where higher consciousness meets the complexity of being human. Hosted by Well-Being Master Teacher and multi-disciplinary healer Devi Brown, Deeply Well is a soft place to land for those navigating the quiet, courageous work of becoming whole. Through soul-expanding conversations, guided meditations, and our signature Soul Work, each episode explores what it truly means to heal, to rewire, and to return—to your body, your truth, and your unique path. Created for the seekers, the ...
…
continue reading
NOT 97 is a home for discovering new music from talented, under-the-radar artists around the world. Biweekly episodes feature intimate conversation with rising artists from around the world, as well as exclusive in-studio live performances. Season Ten of NOT 97 will include a range of artists from Amindi, to FELIX!, Shae Universe, and more. NOT 97 is produced in partnership with The Orchard & Human Re Sources.
…
continue reading
The "Savage Perspective Podcast" is hosted by Robert Sikes, WNBF Pro Natural Bodybuilder. Robert has been deconstructing human performance and is willing to push the envelope to see what is possible. He's been following a ketogenic lifestyle for over a decade, is the founder and formulator of Keto Brick, and has a passion for helping others achieve their highest potential. In the show, he brings on guests to dive deeper into what has led to their successes and failures in all walks of life f ...
…
continue reading
Welcome to Preparing for AI. The AI podcast for everybody. We explore the human and social impacts of AI, including the effect of AI on jobs, safe development of AI, and where AI overlaps with sustainability. We dig deep into the barriers to change, the backlash that’s coming and put forward ideas for solutions and actions which individuals, organisations and society can take, and how you as an individual can get ready for what’s coming next !
…
continue reading
At LOL Adulthood (LOLA), we're your Lifenauts dishing out the 411 to help you navigate adulting chaos. We're all about fueling creativity, curiosity, and adventure. So best believe we will be talking about EVERYTHING. Come along for the ride as we explore the whack waters of adulthood, sharing stories, digging up hidden treasures, and empowering you to embrace the madness, tomfoolery and mysticism that comes with being a human. At LOLA we're all #4Lifers.
…
continue reading

1
"The Cognitive Revolution" | AI Builders, Researchers, and Live Player Analysis
Erik Torenberg, Nathan Labenz
A biweekly podcast where hosts Nathan Labenz and Erik Torenberg interview the builders on the edge of AI and explore the dramatic shift it will unlock in the coming years. The Cognitive Revolution is part of the Turpentine podcast network. To learn more: turpentine.co
…
continue reading
We sit down with developers to talk about the latest and greatest in web development. These conversations will take you deeper into the human side of coding web applications and deliver insight that you might not expect.
…
continue reading
Learn to write effective prompts for ChatGPT, Bard, Midjourney, DALLE, and other AI systems. Also hosting bi-weekly prompt engineering masterminds, where you bring a prompt and we all colaborate to improve it. Each episode we explore prompting techniques, interviews with experts and newbies, and tips on selling your prompts. Released weekly! Let me know who you'd like me to interview at PromptEngineeringPodcast.com Keep in touch: - https://www.linkedin.com/groups/14231334/ - https://t.me/Pro ...
…
continue reading
Stay current on the latest innovations and technologies in the React community by listening to our panel of React and Web Development Experts. Become a supporter of this podcast: https://www.spreaker.com/podcast/react-round-up--6102072/support.
…
continue reading
"Great Software People" is a cutting-edge podcast hosted by Richard Bundock, aimed at spotlighting people in the realm of software development. Recognising that software is as ubiquitous as sunlight, the podcast delves into the intriguing narratives and invaluable insights from industry veterans, covering a broad spectrum from historical analytical engines to futuristic quantum programming. The podcast specifically targets ex-developers who have now ascended into roles such as CTOs, Heads of ...
…
continue reading
Kids AtoZ strives to endow parents with knowledge and skills to empower children to thrive. We share information professionals wish parents knew about child development. Dr. Teresa and guests address the five areas of human development including physical, intellectual, social-emotional, emotional, and moral in children birth to five years. Dr. Teresa is a child development specialist and speech-language pathologist. She is the former Director of the Smadbeck Communication & Learning Center a ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
“Thinking Machines,” hosted by Daniel Reid Cahn, bridges the worlds of artificial intelligence and philosophy - aimed at technical audiences. Episodes explore how AI challenges our understanding of topics like consciousness, free will, and morality, featuring interviews with leading thinkers, AI leaders, founders, machine learning engineers, and philosophers. Daniel guides listeners through the complex landscape of artificial intelligence, questioning its impact on human knowledge, ethics, a ...
…
continue reading
This riveting podcast delves into the depths of topics that matter to Hindus across the globe, including the United States. Join me as I uncover the truth on Hinduphobia, champion Hindu Human Rights, unravel Indology, dissect Politics, and unveil the rich History of Hindus and India. In concise 5-10 minute episodes, I'll explore the essence of Dharma, focusing on the social order, ethical behavior, and the sacred duty that guides our conversations. Tune in to be informed, inspired, and empow ...
…
continue reading
A podcast where I speak with people about their career path. Focusing on their decisions, success, advice, key traits, career moves, mentoring and listening to interesting stories. This podcast is an interesting perspective on how careers can take a linear path to success, but all often career paths take a zig-zag path. Fun Stuff to learn about. Enjoy!
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Sant Rampal Ji Satsang on Sikhism The light has come to clear the darkness about the Supreme God, the father of all souls, which we address as immortal and almighty god. The secret information about supreme God has been showcased via this article, and the information has been taken from the holy book, "Shri Guru Granth Sahib" (Sikhism). Here is a list of some important questions about Sikhism or Sikh religion, which you must know. ■ What is Sikhism? (Brief History & Information about Sikh Re ...
…
continue reading
Devotion & Spirituality are two sides of the same coin - the coin of faith which has been the foundation of the human civilisation for ages. We plan to focus on the wealth of the Indian influence of Devotional flow, with a flavour of rituals, culture, festivities and more. From traditions to remedies and festivities to temple trotting, this is the perfect combination of the essence - Devotion Unplugged By Temple Connect spreading the power of positive karma A Hub Hopper Original with Giresh ...
…
continue reading
Welcome to the Rethinking Revenue podcast, where we unbox the secrets to turbocharging the profitable growth of your company. Hosted by seasoned revenue expert Ed Porter, founder and chief revenue officer at Blue Chip CRO. Each episode features in-depth interviews with CEOs who share hard-fought lessons of success and failure, revenue leaders who are reshaping their profession, and other experts influencing the revenue go-to-market landscape. Sustaining profitable revenue growth is more than ...
…
continue reading
Explore the human side of sales and business with host Tyler Lindley. Leaders in their field share a dose of inspiration through stories about life and business. Sales professionals provide tactical tips you can put into practice today. It all comes together to help you chart your path forward. Achieve your goals on your terms — get inspired by stories from extraordinary people, elevate your performance with the latest outbound tactics, and find the lift you need to take your career to the n ...
…
continue reading

1
Psychological Manipulation and AI Fraud: How Spain Exposed a $12M Scam
17:21
17:21
Play later
Play later
Lists
Like
Liked
17:21In this episode, we examine a growing threat reshaping financial crime in Europe: sophisticated, technology-driven investment fraud. Spanish law enforcement has recently dismantled a fraud operation that spanned multiple years, deceived over 300 victims, and resulted in more than $11.8 million in losses. What made this case particularly notable was…
…
continue reading

1
The Work Episode 14 - Car Talk and Biz Dev
38:11
38:11
Play later
Play later
Lists
Like
Liked
38:11In this episode, Greg and I kick things off with a walk down memory lane, sharing every car we've ever owned—from 1980s minivans and old farm trucks to Teslas and our current rigs. You'll hear some hilarious stories, including Greg flipping his first Bronco just a block from home and me hauling Keto Bricks in a cargo van that died en route to KetoC…
…
continue reading

1
CVE-2025-20309: Critical Cisco Root Access Flaw Threatens VoIP Security
41:32
41:32
Play later
Play later
Lists
Like
Liked
41:32A devastating vulnerability—CVE-2025-20309—has been discovered in Cisco’s Unified Communications Manager (Unified CM) and its Session Management Edition (SME), threatening the security of over a thousand internet-exposed VoIP systems globally. In this episode, we break down this critical flaw, which scores a perfect CVSS 10.0, and explore why it's …
…
continue reading

1
macOS Under Siege: NimDoor Malware Targets Telegram, Wallets, and Keychains
43:09
43:09
Play later
Play later
Lists
Like
Liked
43:09A new, highly advanced malware strain—NimDoor—has emerged as the latest cyber weapon in the arsenal of North Korean state-sponsored hackers, specifically targeting macOS systems used by cryptocurrency and Web3 organizations. This episode explores the complex tactics and alarming capabilities of NimDoor, a malware family showcasing a blend of C++ an…
…
continue reading

1
Exploring Meshtastic and LoRa Mesh Networks - Rob Allen - PSW #881
1:08:14
1:08:14
Play later
Play later
Lists
Like
Liked
1:08:14This week, we dive into the world of Meshtastic and LoRa—two technologies empowering secure, long-range, and infrastructure-free communication. We'll talk about the origins of Meshtastic, how LoRa radio works, and why mesh networking is revolutionizing off-grid messaging for adventurers, hackers, emergency responders, and privacy advocates alike. W…
…
continue reading

1
Taking Time to Date GOD with Andy Allo
1:05:28
1:05:28
Play later
Play later
Lists
Like
Liked
1:05:28In this nourishing episode of Deeply Well, Devi sits down with the radiant Andy Allo - a multi-hyphenate artist whose creativity flows through music, acting, and the sacred art of cooking. Together, we explore how storytelling shows up in various forms: in lyrics, in lineage, and in the meals we prepare for the people we love. Andy opens up about h…
…
continue reading

1
Cisco Unified CM Vulnerability: Root Access Risk for Enterprise VoIP Networks
56:02
56:02
Play later
Play later
Lists
Like
Liked
56:02A newly disclosed vulnerability—CVE-2025-20309—in Cisco's Unified Communications Manager (Unified CM) and Session Management Edition has sent shockwaves through enterprise VoIP and IT security teams. The flaw stems from hardcoded root SSH credentials that could allow unauthenticated remote attackers to gain full control of affected systems. In this…
…
continue reading

1
Forminator Flaw Exposes WordPress Sites to Takeover Attacks: Vulnerability Threatens 600,000+ Sites
50:32
50:32
Play later
Play later
Lists
Like
Liked
50:32A critical new WordPress vulnerability—CVE-2025-6463—has been discovered in the widely used Forminator plugin, affecting over 600,000 active installations and putting hundreds of thousands of websites at risk of full compromise. In this episode, we dive deep into the mechanics, risks, and remediation of this arbitrary file deletion flaw and explain…
…
continue reading

1
Kelly Benefits Breach: Over 550,000 Victims and the Rising Identity Theft Crisis
1:08:04
1:08:04
Play later
Play later
Lists
Like
Liked
1:08:04In one of the latest large-scale data breaches to hit the U.S. private sector, Kelly Benefits, a provider of payroll and benefits administration services, disclosed a significant cybersecurity incident impacting over 553,000 individuals. The breach, which occurred in December 2024 but was only revealed in April 2025, exposed sensitive personal info…
…
continue reading

1
FileFix, HTA, and MotW Bypass—The Alarming Evolution of HTML-Based Attacks
46:04
46:04
Play later
Play later
Lists
Like
Liked
46:04A newly disclosed exploit dubbed FileFix is redefining how attackers bypass Microsoft Windows' built-in security protections—specifically the Mark-of-the-Web (MotW) mechanism. Developed and detailed by security researcher mr.d0x, this attack takes advantage of how browsers save HTML files and how Windows handles HTA (HTML Application) files. The re…
…
continue reading

1
Sophisticated Cyberattack on the International Criminal Court: Justice in the Crosshairs
19:37
19:37
Play later
Play later
Lists
Like
Liked
19:37The International Criminal Court (ICC), the world’s foremost tribunal for prosecuting war crimes, genocide, and crimes against humanity, has confirmed yet another sophisticated cyberattack, highlighting the persistent threat facing high-profile global institutions. This marks the second targeted intrusion against the ICC in recent years, and althou…
…
continue reading

1
The AI Village: Previewing the Giga-Agent Future with Adam Binksmith, Founder of AI Digest
1:28:22
1:28:22
Play later
Play later
Lists
Like
Liked
1:28:22Adam Binksmith, founder of AI Digest, discusses his AI Village experiment where four frontier AI agents (Claude, o3, and Gemini models) collaborate in a shared environment with persistent memory and group chat access to pursue concrete goals over weeks. The conversation explores fascinating multi-agent dynamics from their completed seasons, includi…
…
continue reading

1
Critical Flaws in Microsens NMP Web+ Threaten Industrial Network Security
43:40
43:40
Play later
Play later
Lists
Like
Liked
43:40In a major red flag for the industrial cybersecurity community, three newly disclosed vulnerabilities in Microsens NMP Web+, a popular network management solution used across critical infrastructure, have revealed just how fragile many ICS environments remain. The flaws—two rated critical and one high—allow unauthenticated attackers to bypass authe…
…
continue reading

1
Qantas Data Breach: Third-Party Hack Exposes Millions of Frequent Flyers
24:36
24:36
Play later
Play later
Lists
Like
Liked
24:36In a stark reminder of the aviation industry's growing exposure to cyber threats, Australian airline Qantas recently confirmed a serious data breach—this time not from its own systems, but from a third-party platform used by one of its customer contact centers. The breach exposed personal data for up to six million customers, including names, dates…
…
continue reading

1
The Value of Zero Trust - Rob Allen - BSW #402
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
…
continue reading

1
What We're Reading & Technology Changing Reading
1:19:52
1:19:52
Play later
Play later
Lists
Like
Liked
1:19:52with @rhhackett @smc90 @stephbzinn @tim_org In a now-annual tradition, the a16z crypto editorial team discuss themes (and picks) from a16z crypto's latest reading list, as well as books we keep re-reading, childhood favorites, classics, adaptations on adaptations -- in book and movie form -- and more. What genres are we reading now, how, and why? H…
…
continue reading

1
From Expecting to Arriving: Navigating the Rollercoaster of Pregnancy Emotions
42:57
42:57
Play later
Play later
Lists
Like
Liked
42:57Discover how Crystal and Robert Sikes approach the emotional challenges and daily realities of pregnancy on the Savage Perspective Podcast. In episode 793, Crystal shares her experiences preparing for their new arrival, discussing family support, fitness, work-life balance, and mindset. This episode offers practical insights into navigating persona…
…
continue reading

1
Built by Humans – The Rise of AI, the Decline of Juniors, and What Teams Need Next | Zhenya Rozinskiy, Marko Vasiljevic
24:50
24:50
Play later
Play later
Lists
Like
Liked
24:50AI isn’t just changing how we work — it’s changing who gets to work. In this episode, Mirigos CEO, Zhenya Rozinskiy, sits down with Ghost's CTO, Marko Vasiljevic, to talk about the real consequences of AI on hiring, remote team culture, and the future of engineering talent. They discuss: • Why some companies are already replacing interns with AI • …
…
continue reading

1
Berlin Regulator Targets DeepSeek AI Over Data Transfers to China
43:41
43:41
Play later
Play later
Lists
Like
Liked
43:41Germany’s battle over digital sovereignty and data privacy has intensified, with the Berlin Commissioner for Data Protection formally requesting that Google and Apple remove the DeepSeek AI application from their app stores. The move stems from allegations that DeepSeek, a Chinese-developed generative AI platform, violates the EU’s General Data Pro…
…
continue reading

1
Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet.. - SWN #490
31:11
31:11
Play later
Play later
Lists
Like
Liked
31:11Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-490
…
continue reading

1
CISA Flags Citrix NetScaler Flaws: What CVE-2025-6543 Means for Federal and Private Networks
56:41
56:41
Play later
Play later
Lists
Like
Liked
56:41The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added multiple Citrix NetScaler vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog—an urgent signal for federal agencies and private enterprises alike. At the center of this update is CVE-2025-6543, a memory overflow flaw affecting NetScaler ADC and Gateway appli…
…
continue reading

1
Cato Networks Secures $359M to Fuel AI-Powered SASE Expansion
17:12
17:12
Play later
Play later
Lists
Like
Liked
17:12Cato Networks just raised $359 million in Series G funding, pushing its valuation past $4.8 billion and its total funding beyond the $1 billion mark—a milestone that cements its place as one of the most formidable players in the rapidly expanding Secure Access Service Edge (SASE) market. In this episode, we unpack what this massive investment means…
…
continue reading

1
Chrome’s Latest Zero-Day: CVE-2025-6554 and Remote Code Execution Risks
54:24
54:24
Play later
Play later
Lists
Like
Liked
54:24A new high-severity zero-day vulnerability in Google Chrome—CVE-2025-6554—has sent shockwaves across the cybersecurity landscape. This episode dives into the technical details, real-world impact, and broader implications of this actively exploited flaw. Tracked as a type confusion bug in Chrome’s V8 JavaScript engine, the vulnerability allows attac…
…
continue reading

1
Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
…
continue reading

1
Russia’s 16KB Curtain: Cloudflare Throttling and the Future of the RuNet
1:45:31
1:45:31
Play later
Play later
Lists
Like
Liked
1:45:31Russia has entered a new phase of digital authoritarianism. In a sweeping move, Russian Internet Service Providers (ISPs) have begun systematically throttling access to Cloudflare and other Western-backed services, including infrastructure giants Hetzner and DigitalOcean. This throttling is so severe that it restricts downloads to just 16 kilobytes…
…
continue reading

1
Ahold Delhaize Data Breach: 2.2 Million Employee Records Exposed
37:44
37:44
Play later
Play later
Lists
Like
Liked
37:44Ahold Delhaize, one of the world’s largest food retailers, is now the subject of one of the most significant ransomware breaches in recent U.S. history. Affecting over 2.2 million current and former employees, this incident—claimed by the cybercrime group INC Ransom—highlights the rising threat posed by ransomware-as-a-service operations targeting …
…
continue reading

1
Why Canada Banned Hikvision: National Security vs. Geopolitics
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07Canada has taken a definitive stance in the escalating global scrutiny of Chinese technology, ordering surveillance giant Hikvision to cease all operations within its borders. Citing national security concerns and acting on the advice of intelligence agencies, the Canadian government has banned the use of Hikvision products across its public sector…
…
continue reading

1
Scattered Spider Takes Flight: Inside the Cybercrime Group’s Move into Aviation
43:38
43:38
Play later
Play later
Lists
Like
Liked
43:38As the aviation industry becomes more digitally interconnected, its exposure to sophisticated cyber threats continues to grow. One of the most dangerous actors in this space—Scattered Spider, a financially motivated and technically skilled cybercrime group—has recently shifted its focus to target the aviation sector. With recent incidents involving…
…
continue reading

1
The Illusion of Control: Shadow IT, SSO Shortcomings, and the True Path to Security - Dave Lewis - ESW #413
1:52:05
1:52:05
Play later
Play later
Lists
Like
Liked
1:52:05Interview with Dave Lewis Organizations believe they have a firm grip on security with SSO and corporate IT policies, but in reality, shadow IT lurks in the background—expanding attack surfaces and exposing sensitive data. Employees bypass security controls for the sake of convenience, while SSO fails to provide the comprehensive security net organ…
…
continue reading

1
Menopause Management: Why Many Professionals Are Choosing Natural Solutions Over HRT
56:45
56:45
Play later
Play later
Lists
Like
Liked
56:45Are you managing menopause naturally or wondering if hormone treatments are truly the best solution? In this eye-opening episode of the Savage Perspective Podcast, host Robert Sikes sits down with Robin Switzer to uncover why many professionals are choosing natural approaches over HRT. From balancing fitness and business to integrating ancestral he…
…
continue reading

1
CONFLICT FAKES, LOVERS TIFF & AI IMPACT ON THE BRAIN: Jimmy & Matt debate their favourite AI stories from June 2025
59:16
59:16
Play later
Play later
Lists
Like
Liked
59:16Send us a text The digital battlefield has a new weapon. As AI-generated deepfakes flood social media during the Iran-Israel conflict, we're witnessing perhaps the first mass deployment of synthetic media in global warfare. With fake videos amassing over 100 million views and even AI systems like Grok failing to detect these fabrications, how can w…
…
continue reading

1
402 Payment Required: a New Way for AI Agents to Pay, with Nemil Dalal, Dev Platform Lead @ Coinbase
1:25:21
1:25:21
Play later
Play later
Lists
Like
Liked
1:25:21Nemil Dalal from Coinbase discusses the x402 protocol, a new open standard that enables AI agents to make cryptocurrency payments for online resources using the long-dormant HTTP 402 "Payment Required" status code. The conversation covers stablecoin fundamentals, including how they work and who maintains their stability, before exploring how crypto…
…
continue reading

1
Fortnite and the FTC: How Epic Games Misled Players into Unwanted Purchases
54:56
54:56
Play later
Play later
Lists
Like
Liked
54:56In a landmark case that reshapes the conversation around digital ethics, the Federal Trade Commission’s $520 million settlement with Epic Games over its Fortnite monetization tactics highlights a critical issue facing the modern digital economy: the weaponization of interface design to manipulate users. Central to the case is the use of “dark patte…
…
continue reading

1
Broadcom, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and more... - SWN #489
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Broadcom is coming for you, Direct Send, N0auth, UNFI, Cisco, Oneclik, Russ Beauchemin, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-489
…
continue reading

1
Microsoft 365 Direct Send Exploited: How Phishing Emails Masquerade as Internal Messages
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44Phishing has long been a favored weapon of cybercriminals, but a recent revelation about Microsoft 365’s Direct Send feature has elevated the threat to a new level—from inside the firewall. Designed for internal systems to send notifications without authentication, Direct Send can be abused by malicious actors to spoof emails that appear to origina…
…
continue reading

1
Open VSX Registry Flaw Exposes Millions of Developers to Supply Chain Risk
47:26
47:26
Play later
Play later
Lists
Like
Liked
47:26A critical flaw in the Open VSX Registry—an open-source alternative to the Visual Studio Code Marketplace—recently put over 8 million developers at risk of mass compromise. This vulnerability, discovered in the platform’s GitHub Actions workflow, exposed a super-admin publishing token that could have enabled malicious actors to overwrite or inject …
…
continue reading

1
The Work Episode 13 - Prep, Stress, Sleep
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20In this episode, we dive into the nitty-gritty of contest prep, metabolic strategy, and managing life when the intensity ramps up. Robert breaks down the results from his 4:1 ketogenic macro experiment—4,000+ calories a day with only 9% protein—and how it might be used as a short-term metabolic reset during long preps. Greg's about to try it too, r…
…
continue reading

1
CitrixBleed 2: Critical NetScaler Vulnerability Enables Session Hijacking and MFA Bypass
18:41
18:41
Play later
Play later
Lists
Like
Liked
18:41A new critical vulnerability in Citrix NetScaler ADC and Gateway systems, dubbed CitrixBleed 2 (CVE-2025-5777), has emerged as a serious threat to remote access infrastructure. This memory exposure flaw allows unauthenticated attackers to extract session tokens directly from device memory — enabling session hijacking and even bypassing multi-factor…
…
continue reading

1
Building AI-Powered Podcast Learning 🎧 — with Kevin Smith
50:42
50:42
Play later
Play later
Lists
Like
Liked
50:42Today's guest is Kevin Smith, who is co-founder of Snipd, one of the world's most popular podcast apps.With Kevin, we talked about his journey in tech, starting from quantitative finance and then running an AI team in a high-growth startup up to actually founding one with Snipd. Then we segued into talking about Snipd itself and what are the techni…
…
continue reading

1
OneClik Cyberattack Campaign Targets Energy Sector Using Microsoft ClickOnce and AWS
1:18:25
1:18:25
Play later
Play later
Lists
Like
Liked
1:18:25A sophisticated cyber-espionage campaign named OneClik is actively targeting energy, oil, and gas organizations using a combination of legitimate cloud infrastructure and novel attack techniques. The campaign, attributed to an unknown but likely state-affiliated actor, leverages Microsoft's ClickOnce deployment technology to deliver custom Golang-b…
…
continue reading

1
Is Vuln Management Dead? - HD Moore - PSW #880
2:16:08
2:16:08
Play later
Play later
Lists
Like
Liked
2:16:08This conversation explores the intersection of cybersecurity and emerging technologies, focusing on innovative hacking techniques, the evolution of vulnerability management, and the critical importance of asset discovery. The discussion also delves into the implications of cyber warfare, the persistent threat of default passwords, and the integrati…
…
continue reading

1
Central Kentucky Radiology’s 2024 Data Breach Affects 167,000
51:40
51:40
Play later
Play later
Lists
Like
Liked
51:40In October 2024, Central Kentucky Radiology (CKR), a Lexington-based imaging provider, became the latest victim of a growing trend in healthcare cyberattacks. An unauthorized actor accessed CKR’s systems over a two-day period, compromising sensitive data for approximately 167,000 individuals. The stolen information includes names, Social Security n…
…
continue reading

1
Bonfy.AI Launches $9.5M Adaptive Content Security Platform to Govern AI and Human Data
1:09:30
1:09:30
Play later
Play later
Lists
Like
Liked
1:09:30In a major development at the intersection of cybersecurity and AI governance, Israeli startup Bonfy.AI has officially launched its adaptive content security platform, backed by $9.5 million in seed funding. The company’s mission is bold and timely: to secure content generated by both humans and AI across modern SaaS ecosystems — including high-ris…
…
continue reading

1
Zero-Day Level Cisco ISE Flaws: Urgent Patch Required for Enterprise Security
54:30
54:30
Play later
Play later
Lists
Like
Liked
54:30Cisco has disclosed two critical security vulnerabilities in its Identity Services Engine (ISE) and ISE Passive Identity Connector (ISE-PIC) products, both earning a maximum CVSS severity score of 10.0. These flaws—CVE-2025-20281 and CVE-2025-20282—allow unauthenticated remote attackers to execute arbitrary commands on the underlying operating syst…
…
continue reading

1
The Great Year and the Rebirth of Civilization | important new information on cosmic cycles
1:12:14
1:12:14
Play later
Play later
Lists
Like
Liked
1:12:14In this episode, I read through an extended portion of the Conclusion essay that wraps my new book, The Coming World Nation. It reveals important new information about how our planet is now entering into a period of profound transformation, one heralded by the Summer Solstice sun intersecting the point on the zodiac interfacing with the "galactic a…
…
continue reading

1
U.S. Government Pushes Back on Meta: WhatsApp Labeled a High-Risk App
45:38
45:38
Play later
Play later
Lists
Like
Liked
45:38The U.S. House of Representatives has officially banned the use of WhatsApp on all House-managed devices, citing significant data security risks. This move places WhatsApp alongside other restricted applications like TikTok, ChatGPT, and Microsoft Copilot, reflecting an intensifying government focus on digital security and the reliability of consum…
…
continue reading