FX in Focus explores the realm of international B2B payments and market trends. We celebrate the talent and ideas that contribute to the cross-border payments industry and discuss issues facing CFOs and global businesses big and small, so there's a lot to talk about.
…
continue reading
Learn from today’s global leaders building the organizations that will dominate the 21st century in fintech, business, and beyond.
…
continue reading
This is the audio journal of Nomics.com CEO Clay Collins. The podcast tells stories from inside our cryptocurrency & bitcoin market data API company. Topics include Nomics’ product roadmap; new partnerships; company outlook; important new ideas shaping the future of Nomics.com and Nomics crypto market data API; as well as business strategy, philosophy, crypto investing & fundraising. Nomics.com launched in January of 2018 as an API-first company. The company was created in response to increa ...
…
continue reading
This Podcast by MEDICI is hosted by Amit Goel (Founder of MEDICI). And focuses on the part of FinTech innovation that is invisible to the end-customers. The e-plumbing and financial rewiring that is rewriting how financial services are delivered and experienced. Fintech, banking and tech folks come here to learn about how financial firms (old and new) are leveraging the power of open banking and APIs.
…
continue reading
Coronation Podcast Series is an ongoing engagement medium covering economic and market development trends. The podcast series is one of the many components that form the Coronation Podcast Series platform. Coronation Podcast Series aims to be a mix of informative and entertaining content for our listeners, to help them understand what's happening in the world economy. Join the conversation and stay up-to-date on global economic and market development.
…
continue reading
Conversations with the scientists and entrepreneurs who are building the future. Support this podcast: https://podcasters.spotify.com/pod/show/tomorrowscale/support
…
continue reading
Stay up-to-date on the latest QuickBooks news, tips, and updates with Certified QuickBooks ProAdvisor Alicia Katz Pollock, MAT. Alicia and guests break down need-to-know QuickBooks information in a fun and engaging format. Learn about new product features, accounting technology trends, integration how-tos, and best practices for getting the most out of QuickBooks all while earning NASBA-approved CPE.
…
continue reading
Dive into the world of Supply Chain Finance, FinTech Innovation, and B2B Payments with Vayana Dialogue - a thought leadership podcast by Vayana. In each episode, we bring you candid conversations with domain experts in B2B Trade, exploring the trends and opportunities shaping the financial ecosystem, in India and beyond. From managing liquidity and navigating regulatory shifts to leveraging AI and digital identity, these podcasts offer expert insights and real-world stories that matter to de ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Make better and faster decisions in response to far-reaching market shifts in business and technology. Featuring content from our 6Pages subscription service, a new kind of market intelligence for professional decision-makers. Learn more and sign up for free summaries of our deeply researched briefs on 6Pages.com.
…
continue reading

1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
Bank Automation News's podcast covers current trends and news in automation and and AI. Bank Automation News is at the forefront of tracking banking automation and AI. Automation is the next frontier of financial services technology. It transforms banking processes from customer experience to compliance, lending solutions and investment. This podcast charts that transformation.
…
continue reading
Welcome to Fintech Beat, the intersection of finance, technology, policy and regulation. Each episode features the latest trends, movers and shakers, ideas and policies in financial technology. Host Chris Brummer, a Georgetown law professor and world-renowned fintech expert, partners with the CQ Roll Call newsroom — Washington's leader for nonpartisan legislative and regulatory analysis — to bring insights that make this a must listen for anyone interested in finance.
…
continue reading
How can Fintech contribute to building a better world? In Season 4 of Fintech Files, we’re turning our focus to where financial technology meets social impact. This season, we explore financial inclusion, sustainable investing, and decarbonization with some of the brightest minds in the industry. As financial services touch every aspect of our lives, the opportunity to drive positive change is enormous. About Fintech Files: Join us on Fintech Files from BCG Platinion as we explore the cuttin ...
…
continue reading

1
Inside Nigeria’s Payment Revolution: APIs, Innovation & Interswitch
48:50
48:50
Play later
Play later
Lists
Like
Liked
48:50From recharge cards to real-time digital payments, how did we get here? In the latest episode of Coronation Conversations, our CTO Echezona Agubata sits down with Princess Edo-Osagie, Head of Product Leadership and Agile Transformation at Interswitch Group, to unpack how APIs have evolved from backend tools to strategic, revenue-generating products…
…
continue reading

1
Prompt Injection Nightmare: Critical AI Vulnerabilities in ChatGPT, Copilot, Gemini & More
56:52
56:52
Play later
Play later
Lists
Like
Liked
56:52Enterprise AI assistants are revolutionizing productivity—but they’re also opening new doors for cyberattacks. In this episode, we explore explosive research from Zenity Labs, which reveals that leading AI tools like ChatGPT, Microsoft Copilot, Google Gemini, Cursor, and Salesforce Einstein are vulnerable to prompt injection attacks—a class of expl…
…
continue reading

1
From Google to LVMH: ShinyHunters’ Salesforce Breaches Spark Global Ransom Crisis
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37A new wave of cyber extortion is sweeping across global enterprises, and the battlefield is Salesforce CRM. The notorious **ShinyHunters group—tracked internally by Google as UNC6040/UNC6240—**has launched a coordinated series of breaches using vishing (voice phishing) to compromise employee credentials, exfiltrate sensitive customer data, and dema…
…
continue reading

1
Cisco Hit by Vishing Attack: CRM Breach Exposes Millions of User Profiles
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43Cisco has confirmed a new data breach after a vishing (voice phishing) attack tricked a company representative into exposing access to a third-party CRM system. Detected on July 24, 2025, the breach compromised basic user details such as names, emails, and phone numbers of Cisco.com registrants. While the data was non-sensitive, the incident unders…
…
continue reading

1
From Zero to $120M: How Cashea Rebuilt Credit And Trust in Venezuela
38:24
38:24
Play later
Play later
Lists
Like
Liked
38:24Send us a text In a country where credit vanished, Cashea built a new system from scratch. CEO Pedro Vallenilla shares how they scaled BNPL to 3% of Venezuela’s GDP, through trust-based lending, merchant financing, and a bold vision for national impact.By Miguel Armaza
…
continue reading

1
Ox Security Unveils Agent Ox: AI Tool That Writes Tailored Fixes for Software Vulnerabilities
52:37
52:37
Play later
Play later
Lists
Like
Liked
52:37The world of application security is shifting dramatically as AI begins to move from simply flagging vulnerabilities to actively fixing them. Ox Security has launched Agent Ox, a groundbreaking AI-powered extension designed to automate secure, organization-specific code fixes. Unlike generic coding assistants that offer boilerplate advice, Agent Ox…
…
continue reading

1
Meta Deletes 6.8 Million Scam Accounts as AI-Powered Fraud Rings Exploit WhatsApp
34:45
34:45
Play later
Play later
Lists
Like
Liked
34:45Meta has removed 6.8 million accounts tied to criminal scam centers in the first half of 2025, marking one of the most aggressive crackdowns on digital fraud in the company’s history. The move comes amid an alarming surge in online scams that cost global victims $16.6 billion in 2024 alone, a 33% increase from the year before. Many of these scams a…
…
continue reading

1
Meta Found Liable: Jury Rules Against Tech Giant in Flo Health Privacy Case
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59In a landmark decision, a California jury has ruled Meta guilty of violating user privacy laws in a class-action lawsuit tied to the popular Flo Health period tracking app. Plaintiffs alleged that Meta, through embedded software tools and tracking pixels, collected deeply personal menstrual and fertility data — from period dates to pregnancy goals …
…
continue reading

1
TSMC Insider Threat: Six Arrested in Taiwan Over 2nm Chip Trade Secrets
1:06:45
1:06:45
Play later
Play later
Lists
Like
Liked
1:06:45In a stunning development, Taiwanese authorities have arrested six individuals suspected of stealing trade secrets from Taiwan Semiconductor Manufacturing Co. (TSMC), the world’s most advanced semiconductor producer. At the heart of the case is TSMC’s 2-nanometer (2nm) chip technology, a crown jewel in the global race for next-generation AI and hig…
…
continue reading

1
Approov Secures £5M to Fortify Mobile App and API Security Against AI-Driven Threats
55:37
55:37
Play later
Play later
Lists
Like
Liked
55:37In a major step for mobile and API cybersecurity, Approov, the Edinburgh-based security firm specializing in real-time mobile attestation and API protection, has raised £5 million (approximately $6.7 million) in Series A funding. The round, led by the Investment Fund for Scotland with support from Souter Investments, Lanza techVentures, and Scottis…
…
continue reading

1
Pwn2Own Ireland 2025: $1M WhatsApp Exploit Bounty Raises the Stakes
1:07:32
1:07:32
Play later
Play later
Lists
Like
Liked
1:07:32This October, Pwn2Own Ireland 2025 will take over Cork with one of the most ambitious cybersecurity competitions yet. Co-sponsored by Meta and organized by Trend Micro’s Zero Day Initiative (ZDI), the event is putting record-breaking payouts on the line — including up to $1 million for a zero-click WhatsApp exploit that can deliver remote code exec…
…
continue reading

1
Nvidia Triton Inference Server Vulnerabilities Expose AI Infrastructure to Attack
1:02:48
1:02:48
Play later
Play later
Lists
Like
Liked
1:02:48A major warning has hit the AI community: Nvidia’s Triton Inference Server — one of the most widely used open-source platforms for deploying and scaling AI models — has been found to contain critical vulnerabilities that could allow attackers to take complete remote control of affected systems. The discovery, made by cloud security firm Wiz, reveal…
…
continue reading

1
CISA & FEMA Release $100M in Cybersecurity Grants to Strengthen State, Local, and Tribal Defenses
43:50
43:50
Play later
Play later
Lists
Like
Liked
43:50The U.S. Department of Homeland Security, through CISA and FEMA, has announced over $100 million in new cybersecurity grant funding for Fiscal Year 2025 — a critical investment aimed at protecting America’s most vulnerable digital frontlines. The funding is split between the State and Local Cybersecurity Grant Program (SLCGP), allocating $91.7 mill…
…
continue reading

1
AI Jailbreaks on the Rise: How Hackers Are Extracting Training Data from LLMs
1:26:28
1:26:28
Play later
Play later
Lists
Like
Liked
1:26:28In this episode, we examine the rapidly growing threat of AI jailbreaks — a cybersecurity challenge reshaping the landscape of large language models (LLMs) and enterprise chatbots. According to the IBM 2025 Cost of a Data Breach Report, 13% of all data breaches now involve AI systems, with the vast majority stemming from jailbreak attacks that circ…
…
continue reading

1
350,000 Patient Records Exposed: Inside the Northwest Radiologists Data Breach
40:18
40:18
Play later
Play later
Lists
Like
Liked
40:18In this episode, we investigate the Northwest Radiologists data breach, a devastating cyberattack that compromised the personal and medical information of approximately 350,000 patients in Washington State between January 20 and January 25, 2025. What began as a so-called “network disruption” was later revealed to be a massive breach that exposed a…
…
continue reading

1
3 Shifts Edition (Aug 1 2025): Enterprises prefer Anthropic vs. OpenAI, EPA begins its repeal of the endangerment finding, Is autonomous trucking almost here?
21:04
21:04
Play later
Play later
Lists
Like
Liked
21:04Hi everyone – welcome to your 3 Shifts Edition [AI-generated audio version]. First, enterprises now prefer Anthropic’s Claude over OpenAI, according to Menlo Ventures. Anthropic is the new leader in enterprise AI with 32% of the market (in compute), while OpenAI’s share has fallen from 50% to 25% in just over a year and a half. Next, the EPA has fo…
…
continue reading

1
UMA & Across: Optimistic Oracles & Intent-Based Bridges for Unifying Ethereum - Hart Lambur
1:11:16
1:11:16
Play later
Play later
Lists
Like
Liked
1:11:16Universal Market Access (UMA) was founded by 2 ex Goldman Sachs traders that wanted to make global markets universally accessible through financial smart contracts that used synthetic assets on Ethereum. However, this was taking place long before the massive boom of DeFi summer of 2020. As a result, UMA shifted to building an optimistic oracle to p…
…
continue reading

1
Everything You Need to Know Before You Buy Your First Stock
23:04
23:04
Play later
Play later
Lists
Like
Liked
23:04Thinking of buying your first stock but not sure where to start? Or maybe you have started but want to do it smarter. In this episode, we break down the basics - what to look out for, mistakes to avoid, and how to start investing with confidence. It’s simple, practical, and made just for you
…
continue reading

1
Critical Honeywell Experion PKS Vulnerabilities Threaten Global Industrial Control Systems
1:16:35
1:16:35
Play later
Play later
Lists
Like
Liked
1:16:35In this episode, we analyze the multiple vulnerabilities recently disclosed in Honeywell’s Experion Process Knowledge System (PKS), a widely deployed industrial control and automation solution that underpins operations in energy, chemical plants, manufacturing, healthcare, and transportation sectors worldwide. Reported by CISA and Positive Technolo…
…
continue reading

1
Auto-Color Linux Malware Exploits SAP Zero-Day CVE-2025-31324
36:36
36:36
Play later
Play later
Lists
Like
Liked
36:36In this episode, we uncover the Auto-Color Linux malware, a stealthy and highly persistent Remote Access Trojan (RAT) that is rapidly emerging as one of the most dangerous threats of 2025. First identified by Palo Alto Networks’ Unit 42 and later analyzed by Darktrace, Auto-Color has now been linked to active exploitation of CVE-2025-31324, a criti…
…
continue reading

1
Are You Thinking About Your Family’s Security the Right Way?
13:27
13:27
Play later
Play later
Lists
Like
Liked
13:27Are You Thinking About Your Family’s Security the Right Way? Join Oreoluwa George, Internal Control Officer, Coronation Trustees Limited, and Abraham Oyebanji, Trust Advisor, Coronation Trustees Limited, as they explore what family security really means and how you can take practical steps today to protect your loved ones. This is a conversation ev…
…
continue reading

1
Inside the July 2025 PyPI Phishing Scam: How Hackers Stole Developer Credentials
54:17
54:17
Play later
Play later
Lists
Like
Liked
54:17In this episode, we investigate the growing cybersecurity storm targeting the Python Package Index (PyPI) — the backbone of Python’s software distribution ecosystem. A recent phishing campaign in July 2025 has developers on high alert, as attackers impersonated PyPI using a deceptive domain (pypj.org) to trick maintainers into handing over their cr…
…
continue reading

1
July 2025 QuickBooks Online Updates: AI Agents, New Bank Feeds, and Interface Changes:
1:00:02
1:00:02
Play later
Play later
Lists
Like
Liked
1:00:02Alicia and Dan break down Intuit's July 2025 "In the Know" session, covering the massive interface overhaul coming to QuickBooks Online this summer and fall. They dive deep into the new banking feeds with AI assistance, expanded categorization history, statement upload capabilities, and the introduction of "accounting agents" that can pre-select tr…
…
continue reading

1
IoT Security Crisis: Dahua Smart Camera Vulnerabilities Expose Surveillance Systems
1:02:05
1:02:05
Play later
Play later
Lists
Like
Liked
1:02:05In this episode, we examine the alarming discovery of critical security vulnerabilities in Dahua smart cameras, one of the world’s most widely deployed surveillance systems. Researchers at Bitdefender uncovered two zero-click flaws — CVE-2025-31700 and CVE-2025-31701 — that allow unauthenticated remote attackers to gain root access to Dahua devices…
…
continue reading

1
Can an Educational Trust Really Secure Your Child’s Future?
12:11
12:11
Play later
Play later
Lists
Like
Liked
12:11Tune in as Jephta Uwadiegwu, Legal and Compliance Officer, Coronation Trustees Limited, joins Solape Adegbie, Social Media Manager, Coronation Registrars Limited, to explore how educational trusts can help you plan ahead and safeguard your child’s future. Essential insights every parent and guardian should know.…
…
continue reading

1
Dropzone AI Secures $37M to Tackle Alert Fatigue with Autonomous SOC Analysts
17:11
17:11
Play later
Play later
Lists
Like
Liked
17:11In this episode, we dive into Dropzone AI’s landmark $37 million Series B funding round, bringing the company’s total raised to over $57 million. Backed by major investors, Dropzone AI is accelerating the development of its AI-powered SOC analysts — tools designed to autonomously investigate and resolve security alerts across critical threat catego…
…
continue reading

1
Axonius Buys Cynerio for $100M+: Closing Healthcare’s Biggest Cybersecurity Blind Spot
1:36:30
1:36:30
Play later
Play later
Lists
Like
Liked
1:36:30In this episode, we explore Axonius’s landmark acquisition of Cynerio, a healthcare cybersecurity company specializing in protecting vulnerable medical devices like MRI machines, infusion pumps, and ventilators. The deal — valued at over $100 million in cash and stock — marks Axonius’s first-ever acquisition and signals a major strategic expansion …
…
continue reading

1
Critical Lenovo Firmware Flaws Expose Millions to Persistent UEFI Attacks
42:00
42:00
Play later
Play later
Lists
Like
Liked
42:00In this episode, we examine a critical firmware security crisis shaking Lenovo devices worldwide. Security researchers at Binarly have uncovered six serious vulnerabilities in the Insyde BIOS firmware used in Lenovo’s IdeaCentre and Yoga product lines. Four of these flaws, rated high severity, reside in the System Management Mode (SMM) — a privileg…
…
continue reading

1
Promptfoo Secures $18.4M to Combat AI Security Threats in Generative AI
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50In this episode, we dive into Promptfoo’s groundbreaking $18.4 million Series A funding round, led by Insight Partners and supported by Andreessen Horowitz, bringing the AI security startup’s total funding to $23.4 million. Founded in 2024, Promptfoo has quickly emerged as a leader in securing Large Language Models (LLMs) and generative AI applicat…
…
continue reading

1
1.1 Million Private Messages Leaked: Inside the Tea App Privacy Disaster
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58A platform designed to protect women’s safety in dating has instead become a nightmare for its users. In this episode, we uncover the catastrophic Tea app data breach, which exposed more than 59 GB of highly sensitive user data due to a fundamental security failure: a completely public Firebase storage bucket with no authentication, no encryption, …
…
continue reading

1
Job Scams, Corporate Espionage, and Digital Deception: Inside the Deepfake Crisis
1:16:30
1:16:30
Play later
Play later
Lists
Like
Liked
1:16:30Deepfake technology has evolved from a fringe novelty into one of the most serious cybersecurity and national security threats of our time. In this episode, we examine how artificial intelligence–generated synthetic media is being weaponized to impersonate CEOs, manipulate elections, infiltrate corporate networks, and damage reputations worldwide. …
…
continue reading

1
Microsoft Exposes Major macOS Flaws in Transparency, Consent, and Control
1:23:13
1:23:13
Play later
Play later
Lists
Like
Liked
1:23:13In this episode, we dive deep into Microsoft Threat Intelligence’s latest findings on two critical macOS vulnerabilities that shook Apple’s privacy defenses. The flaws, identified as CVE-2025-31199 (Sploitlight) and CVE-2024-44133 (HM Surf), specifically targeted Apple’s Transparency, Consent, and Control (TCC) framework, the system designed to gua…
…
continue reading

1
Aeroflot in Chaos: How Hackers Crippled Russia’s Flagship Airline
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25On July 28, 2025, Aeroflot—Russia’s largest state-owned airline—was brought to its knees in one of the most severe cyberattacks since the country’s invasion of Ukraine in 2022. The sophisticated assault, carried out by Ukrainian hacktivist group Silent Crow and the Belarusian Cyber-Partisans, led to the cancellation of more than 100 flights, strand…
…
continue reading

1
Neferpitou Claims Cyberattack on French Naval Defense Giant
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17French defense contractor Naval Group, a cornerstone of Europe’s naval defense industry, is facing a high-stakes cybersecurity crisis. A threat actor known as “Neferpitou” claims to have exfiltrated 1TB of sensitive data, including combat management system (CMS) source code for submarines and frigates, technical documents, developer virtual machine…
…
continue reading

1
Root Evidence Launches With $12.5M to Redefine Vulnerability Management
36:51
36:51
Play later
Play later
Lists
Like
Liked
36:51In July 2025, a team of seasoned cybersecurity leaders launched Root Evidence, a Boise-based startup with a mission to revolutionize how organizations tackle vulnerability management. Armed with $12.5 million in seed funding led by Ballistic Ventures, founders Jeremiah Grossman, Robert Hansen, Heather Konold, and Lex Arquette are setting out to fix…
…
continue reading

1
NASCAR Hit by Medusa Ransomware: 1TB of Data Stolen in April 2025 Cyberattack
41:21
41:21
Play later
Play later
Lists
Like
Liked
41:21In April 2025, NASCAR became the latest victim of a major cyberattack, with hackers infiltrating its network between March 31 and April 3. During the breach, personal information—including names and Social Security numbers—was exfiltrated from NASCAR’s systems. In response, the organization has notified affected individuals, activated its incident …
…
continue reading

1
Scattered Spider Strikes Again: Inside the VMware ESXi Ransomware Tactics
55:59
55:59
Play later
Play later
Lists
Like
Liked
55:59In this episode, we examine the sophisticated operations of Scattered Spider—also known as Muddled Libra, UNC3944, and Octo Tempest—a financially motivated cybercriminal group that has redefined the ransomware threat landscape. Recently highlighted by Google’s Threat Intelligence Group (GTIG), Scattered Spider has escalated its attacks by targeting…
…
continue reading

1
Koske Malware Hides in Panda Images, Weaponizes AI to Target Linux
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03A new and highly sophisticated malware strain named Koske is redefining the threat landscape for Linux environments. Suspected to be partially developed using artificial intelligence, Koske introduces novel and highly evasive techniques, blending image files, rootkits, and adaptive cryptomining logic to create a stealthy and persistent backdoor int…
…
continue reading

1
Dragonfly: The Secrets of a Top-Tier Crypto VC - Haseeb Qureshi
1:29:13
1:29:13
Play later
Play later
Lists
Like
Liked
1:29:13Founded in 2018, Dragonfly has quickly become one of the most prestigious crypto VCs. Dragonfly was one of the first to adopt a global approach to backing founders and disruptive tech, all while building a strong brand that allowed them to secure top-tier deals. Join us for a fascinating discussion with Haseeb Qureshi, managing partner at Dragonfly…
…
continue reading

1
Operation Checkmate: BlackSuit Ransomware’s Dark Web Sites Seized
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19BlackSuit, the ransomware strain known for crippling critical sectors and demanding multi-million dollar payouts, has just suffered a devastating blow. In a coordinated international law enforcement operation codenamed "Operation Checkmate," authorities—including the U.S. Department of Justice, Homeland Security Investigations, FBI, Europol, the UK…
…
continue reading

1
Coyote Malware Exploits Microsoft UI Automation in First-Ever Wild Attack
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14A new banking trojan called Coyote has emerged as a groundbreaking cyber threat, becoming the first known malware in the wild to exploit Microsoft’s User Interface Automation (UIA) framework—an accessibility tool originally designed to help users interact with Windows interfaces. But in the hands of attackers, UIA becomes a weapon of stealth and pr…
…
continue reading

1
No Fix Coming: Remote Code Execution Flaw in 1,300 LG Security Cameras
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12A newly disclosed critical vulnerability, CVE-2025-7742, is putting hundreds of LG Innotek LNV5110R security cameras at risk around the world—including within critical infrastructure. This high-severity authentication bypass flaw allows remote attackers to gain full administrative control without credentials, giving them access to live camera feeds…
…
continue reading

1
3 Shifts Edition (Jul 25 2025): Smart jewelry is back in style, Uber and Lyft riders get more choices, Lab-cultured pork fat gets approval
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47Hi everyone – welcome to your 3 Shifts Edition [AI-generated audio version]. First, smart jewelry is suddenly one of the hottest fronts in the AI device race. Amazon just acquired Bee’s always-listening bracelet, Meta is working on gesture-control wristbands, Samsung is exploring more smart jewelry, and OpenAI’s hardware team (led by Jony Ive) is w…
…
continue reading

1
ToolShell Exploited: China-Linked Hackers Breach NNSA and U.S. Government Networks
1:14:36
1:14:36
Play later
Play later
Lists
Like
Liked
1:14:36In one of the most concerning state-sponsored cyber incidents of the year, Chinese hackers exploited zero-day vulnerabilities in Microsoft SharePoint to breach the networks of the National Nuclear Security Administration (NNSA)—the U.S. agency responsible for managing the nation's nuclear arsenal. The attackers, part of a suspected Chinese state-sp…
…
continue reading

1
Massive NPM Breach: Malicious Packages Spread via Compromised Maintainer Accounts
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44In this episode, we expose the alarming supply chain attack that compromised millions of JavaScript projects across the globe. This sophisticated breach targeted the NPM ecosystem, infecting widely-used packages like eslint-config-prettier and is, through a coordinated phishing campaign and the exploitation of non-expiring legacy access tokens. Att…
…
continue reading

1
Clorox Sues Cognizant Over $356M Cyberattack: Who's Really to Blame?
44:38
44:38
Play later
Play later
Lists
Like
Liked
44:38In one of the most dramatic cybersecurity legal battles of the past year, Clorox has filed a lawsuit against IT services giant Cognizant, accusing the company of gross negligence that allegedly enabled a catastrophic 2023 cyberattack. The breach wreaked havoc on Clorox's operations—causing widespread product shortages, a multibillion-dollar hit to …
…
continue reading

1
HeroDevs Secures $125M to Extend Life of Critical Open Source Software
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36In this episode, we dive deep into HeroDevs' recent $125 million strategic growth investment, a move that signals a major expansion in the fight against the vulnerabilities of end-of-life (EOL) open source software. Based in Salt Lake City, HeroDevs has carved out a critical niche—providing "Never-Ending Support" (NES) to ensure security, complianc…
…
continue reading
Alicia, Dan, and Margie celebrate the podcast's 100th episode with quick pop-in from special guest Hector Garcia, reflecting on their favorite moments from nearly two years of unofficial QuickBooks commentary. The conversation covers everything from desktop conversions and chart of accounts evolution to the challenges of training in an era of const…
…
continue reading
A lot of people think insurance is a scam or just for the rich, but is that really true? In this episode, Princess Aloma from Coronation Life Assurance, sits down with insurance expert, Ayodele Kumolu-Johnson, to talk about what insurance actually is, why people don’t trust it, and how it can really help when life gets tough. Real talk, real storie…
…
continue reading

1
UK Moves to Ban Ransomware Payments for Public Sector and Critical Infrastructure
48:22
48:22
Play later
Play later
Lists
Like
Liked
48:22In a landmark move to disrupt the financial engine powering ransomware attacks, the United Kingdom is pushing forward with legislation that would ban ransom payments across the public sector and critical national infrastructure (CNI). This sweeping proposal covers everything from local councils and schools to healthcare providers like the NHS, aimi…
…
continue reading