show episodes
 
In this season of Amidst the Ordinary, we talk about community and connection. This innately human urge to be a part of something – to feel seen, heard, and valued by those around us. With stories from small towns in Georgia to the heart of the UAE and countless places in between. We’re here to tell stories, real stories, from real people. We’ll reflect on these stories together, discuss how they inspired us, and discover practical ways to apply them to our lives. Whether you move to a new c ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
Artwork

1
Chromatography Life

Waters Corporation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Chromatography Life, a podcast presented by Waters Corporation. Join us as we dive into the world of chromatography with leading scientists to examine today’s critical challenges. As a hub for the chromatography community, we share the lived experiences, passions, and visions of these scientific innovators as they shape the future of analytical chemistry. Hear from experts across a wide range of topics, spanning chromatographic methods, laboratory solutions, column chemistry, and ...
  continue reading
 
Step back into a world of intrigue, passion, and ruthless ambition — welcome to Tudor England. Join historian and bestselling author Claire Ridgway as she uncovers the riveting stories of the Tudor dynasty. From the scandalous love affairs of King Henry VIII to the tragic fall of Anne Boleyn, the fierce reign of Elizabeth I, and the lesser-known secrets of Tudor court life, this podcast brings history to life in vivid detail. Hear dramatic tales of betrayal, execution, forbidden love, and po ...
  continue reading
 
Artwork

1
STEM Lab Podcast

Sabrina Walthall

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast highlighting Women in STEM, especially Women of Color. The STEM Lab Podcast is hosted by Dr. Sabrina Walthall a scientist/professor whose love for STEM (science, technology, engineering, and math) eventually led to a STEM career in academia. Dr. Walthall is an Associate Professor of Science, a Community Engagement Scientist and an advocate for women in STEM.
  continue reading
 
Loading …
show series
 
In a landmark decision, a California jury has ruled Meta guilty of violating user privacy laws in a class-action lawsuit tied to the popular Flo Health period tracking app. Plaintiffs alleged that Meta, through embedded software tools and tracking pixels, collected deeply personal menstrual and fertility data — from period dates to pregnancy goals …
  continue reading
 
Welcome to another chilling instalment of Tudor True Crime with me, historian and author Claire Ridgway. Today, we uncover the dark story of Charles Stourton, 8th Baron Stourton—a nobleman whose pride and rage ended in cold-blooded murder… and a very public hanging. What started as a bitter land feud Escalated into a siege at a church Ended with tw…
  continue reading
 
In a stunning development, Taiwanese authorities have arrested six individuals suspected of stealing trade secrets from Taiwan Semiconductor Manufacturing Co. (TSMC), the world’s most advanced semiconductor producer. At the heart of the case is TSMC’s 2-nanometer (2nm) chip technology, a crown jewel in the global race for next-generation AI and hig…
  continue reading
 
In a major step for mobile and API cybersecurity, Approov, the Edinburgh-based security firm specializing in real-time mobile attestation and API protection, has raised £5 million (approximately $6.7 million) in Series A funding. The round, led by the Investment Fund for Scotland with support from Souter Investments, Lanza techVentures, and Scottis…
  continue reading
 
This October, Pwn2Own Ireland 2025 will take over Cork with one of the most ambitious cybersecurity competitions yet. Co-sponsored by Meta and organized by Trend Micro’s Zero Day Initiative (ZDI), the event is putting record-breaking payouts on the line — including up to $1 million for a zero-click WhatsApp exploit that can deliver remote code exec…
  continue reading
 
A major warning has hit the AI community: Nvidia’s Triton Inference Server — one of the most widely used open-source platforms for deploying and scaling AI models — has been found to contain critical vulnerabilities that could allow attackers to take complete remote control of affected systems. The discovery, made by cloud security firm Wiz, reveal…
  continue reading
 
The Untold Story of Sir Reginald Bray - He wasn’t a king… but he helped make one. Sir Reginald Bray may not be a household name, but this quiet powerhouse of the Tudor court knew Henry VII from boyhood, helped plan the invasion that toppled Richard III, and then served as one of the most powerful men in England. - Chancellor of the Duchy of Lancast…
  continue reading
 
The U.S. Department of Homeland Security, through CISA and FEMA, has announced over $100 million in new cybersecurity grant funding for Fiscal Year 2025 — a critical investment aimed at protecting America’s most vulnerable digital frontlines. The funding is split between the State and Local Cybersecurity Grant Program (SLCGP), allocating $91.7 mill…
  continue reading
 
In this episode, we examine the rapidly growing threat of AI jailbreaks — a cybersecurity challenge reshaping the landscape of large language models (LLMs) and enterprise chatbots. According to the IBM 2025 Cost of a Data Breach Report, 13% of all data breaches now involve AI systems, with the vast majority stemming from jailbreak attacks that circ…
  continue reading
 
In this episode, we investigate the Northwest Radiologists data breach, a devastating cyberattack that compromised the personal and medical information of approximately 350,000 patients in Washington State between January 20 and January 25, 2025. What began as a so-called “network disruption” was later revealed to be a massive breach that exposed a…
  continue reading
 
He dreamt of invading Ireland with Spanish gold and papal blessing… Instead, he died in a Moroccan ditch, his legs blown off by cannon fire. This is the incredible, tragic, and chaotic story of Thomas Stukeley—Tudor adventurer, mercenary, spy, and the man rumoured to be King Henry VIII’s illegitimate son. I’m Claire Ridgway, historian and author, a…
  continue reading
 
You’re walking through a busy modern city—and then a towering Gothic church stops you in your tracks. That’s exactly what happened to me in Bristol, when I stumbled upon St Mary Redcliffe, a church Queen Elizabeth I herself called “the fairest, goodliest and most famous parish church in England.” I’m Claire Ridgway, historian and author, and in thi…
  continue reading
 
What connects legendary singer Kate Bush and Tudor queen Anne Boleyn? In this fascinating and inspiring interview, I chat with novelist Natalia Richards, author of The Falcon’s Rise and The Falcon’s Flight—two beautifully written novels exploring Anne Boleyn’s early life and rise to power. Natalia shares how she transitioned from the world of music…
  continue reading
 
On this day in Tudor history, 1st August 1534, Catholic gentleman Germain Gardiner published a scathing posthumous attack on Protestant martyr John Frith—over a year after Frith had been burned at the stake. But who was Frith? Why did Gardiner care enough to write such a fiery rebuttal after his death? And how did both men end up executed for their…
  continue reading
 
In this episode, we analyze the multiple vulnerabilities recently disclosed in Honeywell’s Experion Process Knowledge System (PKS), a widely deployed industrial control and automation solution that underpins operations in energy, chemical plants, manufacturing, healthcare, and transportation sectors worldwide. Reported by CISA and Positive Technolo…
  continue reading
 
In this episode, we uncover the Auto-Color Linux malware, a stealthy and highly persistent Remote Access Trojan (RAT) that is rapidly emerging as one of the most dangerous threats of 2025. First identified by Palo Alto Networks’ Unit 42 and later analyzed by Darktrace, Auto-Color has now been linked to active exploitation of CVE-2025-31324, a criti…
  continue reading
 
In this episode, we investigate the growing cybersecurity storm targeting the Python Package Index (PyPI) — the backbone of Python’s software distribution ecosystem. A recent phishing campaign in July 2025 has developers on high alert, as attackers impersonated PyPI using a deceptive domain (pypj.org) to trick maintainers into handing over their cr…
  continue reading
 
In this episode, we examine the alarming discovery of critical security vulnerabilities in Dahua smart cameras, one of the world’s most widely deployed surveillance systems. Researchers at Bitdefender uncovered two zero-click flaws — CVE-2025-31700 and CVE-2025-31701 — that allow unauthenticated remote attackers to gain root access to Dahua devices…
  continue reading
 
The Shocking End of a Tudor Baron - Edmund Sheffield’s Fall He was a baron, courtier, soldier, and poet... with powerful patrons like Thomas Cromwell and George Boleyn. But on 31st July 1549, during the chaos of Kett’s Rebellion, 28-year-old Edmund Sheffield met a shocking and brutal end—not on a battlefield, but in a muddy ditch at the hands of a …
  continue reading
 
In this episode, we dive into Dropzone AI’s landmark $37 million Series B funding round, bringing the company’s total raised to over $57 million. Backed by major investors, Dropzone AI is accelerating the development of its AI-powered SOC analysts — tools designed to autonomously investigate and resolve security alerts across critical threat catego…
  continue reading
 
In this episode, we explore Axonius’s landmark acquisition of Cynerio, a healthcare cybersecurity company specializing in protecting vulnerable medical devices like MRI machines, infusion pumps, and ventilators. The deal — valued at over $100 million in cash and stock — marks Axonius’s first-ever acquisition and signals a major strategic expansion …
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Curious how the latest CrushFTP exploit works? Join host Kim along with intelligence analyst Hayden and threat hunter Leo as they discuss: BreachForums Back, XSS Out (1:28) Warlock Ransomware Hits SharePoint (5:28) Fire Ant Stings ESXi (9:39) ReliaQuest Uncovers CrushFTP Attack Chain (13:35 Kim Brom…
  continue reading
 
In this episode, we examine a critical firmware security crisis shaking Lenovo devices worldwide. Security researchers at Binarly have uncovered six serious vulnerabilities in the Insyde BIOS firmware used in Lenovo’s IdeaCentre and Yoga product lines. Four of these flaws, rated high severity, reside in the System Management Mode (SMM) — a privileg…
  continue reading
 
In this episode, we dive into Promptfoo’s groundbreaking $18.4 million Series A funding round, led by Insight Partners and supported by Andreessen Horowitz, bringing the AI security startup’s total funding to $23.4 million. Founded in 2024, Promptfoo has quickly emerged as a leader in securing Large Language Models (LLMs) and generative AI applicat…
  continue reading
 
Storms at sea. Panic at court. And a queen under guard. On this day in Tudor history — 30th July 1588 — England’s fate shifted with the wind. The once-mighty Spanish Armada, already damaged by the Battle of Gravelines, was now scattered and driven northwards by violent storms. Many in England saw it as divine intervention — a “Protestant Wind” sent…
  continue reading
 
A platform designed to protect women’s safety in dating has instead become a nightmare for its users. In this episode, we uncover the catastrophic Tea app data breach, which exposed more than 59 GB of highly sensitive user data due to a fundamental security failure: a completely public Firebase storage bucket with no authentication, no encryption, …
  continue reading
 
Deepfake technology has evolved from a fringe novelty into one of the most serious cybersecurity and national security threats of our time. In this episode, we examine how artificial intelligence–generated synthetic media is being weaponized to impersonate CEOs, manipulate elections, infiltrate corporate networks, and damage reputations worldwide. …
  continue reading
 
In this episode, we dive deep into Microsoft Threat Intelligence’s latest findings on two critical macOS vulnerabilities that shook Apple’s privacy defenses. The flaws, identified as CVE-2025-31199 (Sploitlight) and CVE-2024-44133 (HM Surf), specifically targeted Apple’s Transparency, Consent, and Control (TCC) framework, the system designed to gua…
  continue reading
 
On July 28, 2025, Aeroflot—Russia’s largest state-owned airline—was brought to its knees in one of the most severe cyberattacks since the country’s invasion of Ukraine in 2022. The sophisticated assault, carried out by Ukrainian hacktivist group Silent Crow and the Belarusian Cyber-Partisans, led to the cancellation of more than 100 flights, strand…
  continue reading
 
French defense contractor Naval Group, a cornerstone of Europe’s naval defense industry, is facing a high-stakes cybersecurity crisis. A threat actor known as “Neferpitou” claims to have exfiltrated 1TB of sensitive data, including combat management system (CMS) source code for submarines and frigates, technical documents, developer virtual machine…
  continue reading
 
He didn’t wear a crown… but his choice may have changed the course of English history. On 29th July 1504, Thomas Stanley, 1st Earl of Derby, died quietly at his manor in Lancashire. But nearly two decades earlier, at the bloody Battle of Bosworth, his decision to support his stepson — Henry Tudor — was a turning point in English history, ending cen…
  continue reading
 
In July 2025, a team of seasoned cybersecurity leaders launched Root Evidence, a Boise-based startup with a mission to revolutionize how organizations tackle vulnerability management. Armed with $12.5 million in seed funding led by Ballistic Ventures, founders Jeremiah Grossman, Robert Hansen, Heather Konold, and Lex Arquette are setting out to fix…
  continue reading
 
In April 2025, NASCAR became the latest victim of a major cyberattack, with hackers infiltrating its network between March 31 and April 3. During the breach, personal information—including names and Social Security numbers—was exfiltrated from NASCAR’s systems. In response, the organization has notified affected individuals, activated its incident …
  continue reading
 
In this episode, we examine the sophisticated operations of Scattered Spider—also known as Muddled Libra, UNC3944, and Octo Tempest—a financially motivated cybercriminal group that has redefined the ransomware threat landscape. Recently highlighted by Google’s Threat Intelligence Group (GTIG), Scattered Spider has escalated its attacks by targeting…
  continue reading
 
Starved. Poisoned. Locked in a castle tower. In Tudor England, one woman endured unthinkable cruelty at the hands of her noble husband—imprisoned in a tower, reduced to drinking her own urine to survive, and desperate enough to smuggle a secret letter to Thomas Cromwell begging for rescue. Her name was Elizabeth Hungerford. Her husband? Walter Hung…
  continue reading
 
What if I told you that England’s very first official voyage of exploration to the New World didn’t begin in London—or even under an Englishman’s command? Join me, Claire Ridgway, historian and author, as I tell you about "The Matthew", the tiny replica ship moored in Bristol that once carried explorer John Cabot (Giovanni Caboto) across the Atlant…
  continue reading
 
Join me, Claire Ridgway, as I sit down with historian and bestselling author Toni Mount to celebrate the release of The Colour of Darkness — book 13 in the gripping Sebastian Foxley Medieval Mystery series. In this fascinating interview, Toni Mount takes us behind the scenes of her writing process, research into 15th-century London, and the creatio…
  continue reading
 
A new and highly sophisticated malware strain named Koske is redefining the threat landscape for Linux environments. Suspected to be partially developed using artificial intelligence, Koske introduces novel and highly evasive techniques, blending image files, rootkits, and adaptive cryptomining logic to create a stealthy and persistent backdoor int…
  continue reading
 
BlackSuit, the ransomware strain known for crippling critical sectors and demanding multi-million dollar payouts, has just suffered a devastating blow. In a coordinated international law enforcement operation codenamed "Operation Checkmate," authorities—including the U.S. Department of Justice, Homeland Security Investigations, FBI, Europol, the UK…
  continue reading
 
A new banking trojan called Coyote has emerged as a groundbreaking cyber threat, becoming the first known malware in the wild to exploit Microsoft’s User Interface Automation (UIA) framework—an accessibility tool originally designed to help users interact with Windows interfaces. But in the hands of attackers, UIA becomes a weapon of stealth and pr…
  continue reading
 
A newly disclosed critical vulnerability, CVE-2025-7742, is putting hundreds of LG Innotek LNV5110R security cameras at risk around the world—including within critical infrastructure. This high-severity authentication bypass flaw allows remote attackers to gain full administrative control without credentials, giving them access to live camera feeds…
  continue reading
 
Imagine stepping into court expecting justice… and instead walking into a death sentence. On this day in Tudor history, 25th July 1577, Queen Elizabeth I’s top lawyer, Nicholas Barham, died in Oxford—not by blade or betrayal, but from a silent, invisible killer: gaol fever. Within weeks, over 500 people were dead, including judges, jurors, sheriffs…
  continue reading
 
In one of the most concerning state-sponsored cyber incidents of the year, Chinese hackers exploited zero-day vulnerabilities in Microsoft SharePoint to breach the networks of the National Nuclear Security Administration (NNSA)—the U.S. agency responsible for managing the nation's nuclear arsenal. The attackers, part of a suspected Chinese state-sp…
  continue reading
 
In this episode, we expose the alarming supply chain attack that compromised millions of JavaScript projects across the globe. This sophisticated breach targeted the NPM ecosystem, infecting widely-used packages like eslint-config-prettier and is, through a coordinated phishing campaign and the exploitation of non-expiring legacy access tokens. Att…
  continue reading
 
In one of the most dramatic cybersecurity legal battles of the past year, Clorox has filed a lawsuit against IT services giant Cognizant, accusing the company of gross negligence that allegedly enabled a catastrophic 2023 cyberattack. The breach wreaked havoc on Clorox's operations—causing widespread product shortages, a multibillion-dollar hit to …
  continue reading
 
In this episode, we dive deep into HeroDevs' recent $125 million strategic growth investment, a move that signals a major expansion in the fight against the vulnerabilities of end-of-life (EOL) open source software. Based in Salt Lake City, HeroDevs has carved out a critical niche—providing "Never-Ending Support" (NES) to ensure security, complianc…
  continue reading
 
The Tragic Martyrdom of John Boste - They wouldn’t even let him speak. On this day in Tudor history, 24th July 1594, Catholic priest John Boste stood on the scaffold in Durham, condemned for treason simply for doing his job — ministering in secret during Elizabeth I’s reign. When guards silenced his final words, Boste prayed Psalm 116 in Latin inst…
  continue reading
 
In a landmark move to disrupt the financial engine powering ransomware attacks, the United Kingdom is pushing forward with legislation that would ban ransom payments across the public sector and critical national infrastructure (CNI). This sweeping proposal covers everything from local councils and schools to healthcare providers like the NHS, aimi…
  continue reading
 
Two newly added vulnerabilities in SysAid’s On-Prem IT support software — CVE-2025-2775 and CVE-2025-2776 — have officially joined the Cybersecurity and Infrastructure Security Agency (CISA)’s Known Exploited Vulnerabilities (KEV) catalog, signaling increased concern around their potential abuse. While there are no confirmed reports of public explo…
  continue reading
 
In this episode, we unpack the rapid and concerning resurgence of Lumma Stealer, a sophisticated Malware-as-a-Service (MaaS) platform, just months after a major international takedown. Despite Microsoft, the FBI, Europol, and global partners dismantling over 2,500 malicious domains and seizing critical infrastructure in May 2025, Lumma Stealer has …
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play