Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
…
continue reading
Want to learn more about how terrorists and violent extremists are using the internet to communicate and share propaganda? Perhaps you’re interested in why terrorists share their manifestos online and livestream their attacks? The Tech Against Terrorism podcast is a deep dive into the evolving use of the internet by terrorists and violent extremists, how this relates to real world harms, and what can be done to support the tech sector to disrupt this threat. Join us as we speak to the world’ ...
…
continue reading
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
A show about hacking the system, hosted by Patrick Tomasso and Gabi Pirraglia. Patrick is a content creator and Gabi is digital strategist, together they pull apart the internet and social media to reveal the hidden creative formulas for success.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
You can grab your weekly technology without having to geek out on TechTime with Nathan Mumm. The Technology Show for your commute, exercise, or drinking fun. Listen to the best 60 minutes of Technology News and Information in a segmented format while sipping a little Whiskey on the side. We cover Top Tech Stories with a funny spin, with information that will make you go Hmmm. Listen once a week and stay up-to-date on technology in the world without getting into the weeds. This Broadcast styl ...
…
continue reading
We Cover the Cyberspace.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
You already know the monthly OUCH! Newsletter brings you the latest cybersecurity tips—but now, we’re taking it even further. Tune in to the new OUCH! Podcast, where we go deeper on cybersecurity topics and give you extra insights to stay ahead of the threats.
…
continue reading
A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.
…
continue reading
The Technado crew covers a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Rob Wyatt and PJ McNerney discuss the latest and greatest news in the tech world and to figure out where things have been, where they are, and hopefully where they are going.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A podcast that helps us understand human vulnerability and how we can defend against the attacks that exploit us.
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
deep dive into Data-as-a-Service (DaaS) businesses. World of DaaS is a podcast for data enthusiasts, by data enthusiasts, where Auren Hoffman talks to business and technology leaders about all things data - building it, acquiring it, analyzing it, and everything in between.
…
continue reading
Tech news from Australia and abroad, with Mashable reporter/tech extraordinaire Johnny Lieu and FBi's Lucy Smith.
…
continue reading
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
…
continue reading
Where timely and relevant security meets puns and witty banter. Our goal is to keep defenders apprised of pertinent news and trends in under forty-five minutes.
…
continue reading
Crypto Weekly Recap is your go-to podcast for the latest news, trends, and developments in the cryptocurrency world. From major market moves to emerging projects and regulatory updates, we break it all down. Stay informed, stay ahead, and join us as we navigate the fast-paced world of crypto!
…
continue reading
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
…
continue reading
The Cyber Ways Podcast brings academic cyber security research into the "real world." We interview top academic researchers to find how their research can be put into practice by cyber security professionals. Our focus is on behavioral aspects of cyber security. Occasionally, we touch on related topics, such as information privacy and surveillance.Each episode discusses one published, peer-reviewed article to reveal the practical implications of the research. Your hosts, Tom Stafford and Cra ...
…
continue reading
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
…
continue reading
Daily overview of the Top 10 Hacker News posts. Post and comment summarization by AI.
…
continue reading
Interviews with users, hackers, and staff of America Online (AOL), covering the 90’s/Early 2000’s.
…
continue reading
The Doctor Chaos Security Podcast - Join us as we ramble on topics related to cyber security
…
continue reading
Join Dan and Dave on a journey to self-awareness, exploring morals and ethics. They highlight the importance of avoiding manipulation as a means of motivation in our daily lives. 🌟 Each episode, running for 30 minutes, offers a quick listen, allowing a week for reflection before the next show. Get ready to dive into thought-provoking discussions!
…
continue reading
Come join MrMario2011 talk about modding, exploiting, a bit of game/console hacking, and everything in between!
…
continue reading
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
…
continue reading
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
…
continue reading
As a civically engaged entrepreneur and mom, I understand the challenges of advocating for yourself and others while attempting to balance your personal and professional demands. I had to develop a personal system of success in every area of my life. Now I want to help you build your unique system and truly trust your voice, even if it shakes. That’s why this week I am launching my new podcast entitled “Trust Your Voice”, based on my new book, “Trust Your Voice”, A Roadmap to Focus and Influ ...
…
continue reading
Inside Towers Managing Editor Jim Fryer shares the Ethernet with some of Telecom's key players in this Tower and Wireless Infrastructure News Podcast. Subscribe to the Inside Towers daily newsletter here: https://insidetowers.com/subscription/
…
continue reading
Scheer Intelligence features thoughtful and provocative conversations with "American Originals" -- people who, through a lifetime of engagement with political issues, offer unique and often surprising perspectives on the day's most important issues.
…
continue reading
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
…
continue reading

1
How Hackers Took Over School Smartboards to Launch Ransomware | CommBox Classroom Exploit Explained
4:30
4:30
Play later
Play later
Lists
Like
Liked
4:30Welcome to Cypher Tech Hacks, the podcast where host Alex Cipher takes you inside the most shocking, real-world hacks in digital history. In today’s episode, we uncover The CommBox Classroom Exploit—a ransomware attack that started with smartboards in schools. Attackers used unsecured CommBox devices to infiltrate school networks, encrypt critical …
…
continue reading

1
5.22.25 | OpenAI acquires Jony Ive's AI startup, Devstral, Gemini Diffusion
12:35
12:35
Play later
Play later
Lists
Like
Liked
12:35This is a recap of the top 10 posts on Hacker News on May 22, 2025. OpenAI to buy AI startup from Jony Ive https://www.bloomberg.com/news/articles/2025-05-21/openai-to-buy-apple-veteran-jony-ive-s-ai-device-startup-in-6-5-billion-deal https://news.ycombinator.com/item?id=44053518 Devstral https://mistral.ai/news/devstral https://news.ycombinator.co…
…
continue reading

1
SANS Stormcast Thursday, May 22nd 2025: Crypto Confidence Scams; Extension Mayhem for VS Code and Chrome
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive VIP memberships to withdraw the money. https://isc.sans.edu/diary/New%20Variant%20of%20Crypto%20Confidence%20Scam/31968 Malicious Chrome Extensions Malici…
…
continue reading

1
#75 - The Dark Side of AI: When will Autonomous AI Cyber Weapons Begin?
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02AI is changing security fast—hear how Deep Sentinel stops crime in real time and why AI scams are the next big threat. Must-listen for staying ahead! With DeepSentinel CEO and AI expert Dave Selinger.By Extra Something Media
…
continue reading

1
Inside Jobs & Outside Threats: Who’s Guarding Your Wallet?
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59This week on Crypto Weekly Recap, we break down the Coinbase insider breach that exposed sensitive user data, an IMF hack proving fiat isn’t any safer, and a shocking real-world attack targeting a crypto CEO’s family. We also roll out our brand-new Beginner’s Corner with timeless tips for navigating crypto and finance. Plus, we spotlight HundredCoi…
…
continue reading

1
#37 Exposing Government Exploitation: How Loaded Language Controls the Masses
22:57
22:57
Play later
Play later
Lists
Like
Liked
22:57In this week's episode of Truthful Manipulation, H. Daniel Mujahid and Dave Kelsey delve into the complex world of manipulation tactics that are often used against us. They shed light on the concept of 'Emotional Hijacking,' how media and organizations exploit our emotions, and the psychology behind these tactics. Join the conversation as they expl…
…
continue reading

1
AI Agent Security: Threats & Defenses for Modern Deployments
31:39
31:39
Play later
Play later
Lists
Like
Liked
31:39Send us a text Researchers Yifeng (Ethan) He and Peter Rong join host Madi Vorbrich to break down their paper "Security of AI Agents." They explore real-world AI agent threats, like session hijacks and tool-based jailbreaks, and share practical defenses, from sandboxing to agent-to-agent protocols. Full transcript with links to resources available …
…
continue reading

1
The Threat Evolution: SAP Exploits, SEO Poisoning, and SkitNet Malware
29:03
29:03
Play later
Play later
Lists
Like
Liked
29:03Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Joey along with intelligence analysts John and Hayden as they discuss: ReliaQuest's investigation into hijacked routers and SEO poisoning fueling payroll heists Nation-state actors leveraging the SAP NetWeaver vulnerability en masse A new "Defendnot" tool that tricks Windows Defender into …
…
continue reading

1
253: AI Gone Wild - Google quietly unveils AI and accessibility upgrades. Phil Hennessy breaks down the unseen power of Large Language Modules. In the nugget, we dig into the secrets behind the upcoming ...
58:03
58:03
Play later
Play later
Lists
Like
Liked
58:03The boundary between technological innovation and absurdity blurs in this fascinating exploration of AI's growing influence on our lives. We kick off with Google's latest accessibility features for Android and Chrome, where Gemini AI now helps visually impaired users understand images and captures not just what people say, but how they say it—recog…
…
continue reading

1
5.21.25 | Veo 3 and Imagen 4 for filmmaking, Deep Learning in Applied Topology, AI driving Microsoft employees insane
12:06
12:06
Play later
Play later
Lists
Like
Liked
12:06This is a recap of the top 10 posts on Hacker News on May 21, 2025. Veo 3 and Imagen 4, and a new tool for filmmaking called Flow https://blog.google/technology/ai/generative-media-models-io-2025/ https://news.ycombinator.com/item?id=44044043 Deep Learning Is Applied Topology https://theahura.substack.com/p/deep-learning-is-applied-topology https:/…
…
continue reading
We may not always understand the evolution of the internet and how tech monopolies exist, but having digital freedom fighters is vital to making conscious change. Today's guest is Cory Doctorow. Cory is a science fiction author, activist, and journalist. He is the author of many books and most recently, Picks and Shovels, The Bezel, and The Lost Ca…
…
continue reading

1
Is Your Current Security Strategy Enough to Stop Sophisticated Cybersecurity Attacks?
30:52
30:52
Play later
Play later
Lists
Like
Liked
30:52“The types of attacks that we're seeing today are malicious in nature. They go to the very heart of the functioning of businesses,” stated Brett Ley, VP, Global Technical Sales at A10 Networks. This observation from Ley sets the stage for a crucial discussion on The Security Strategist podcast. Shubhangi Dua, podcast producer and Tech journalist at…
…
continue reading

1
Microsoft Emergency Patch, Pwn2Own Berlin 2025 Highlights, and Emerging Cybersecurity Threats
10:01
10:01
Play later
Play later
Lists
Like
Liked
10:01In this episode of 'Cybersecurity Today,' host Jim Love discusses several urgent cybersecurity topics. Microsoft has released an emergency patch after a recent Windows update caused BitLocker recovery mode on certain systems, locking users out without warning. The issue stems from the May security update affecting systems using Intel, vPro chips, a…
…
continue reading

1
Risky Business #792 -- Beware, Coinbase users. Crypto thieves are taking fingers now
53:01
53:01
Play later
Play later
Lists
Like
Liked
53:01On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: TeleMessage memory dumps show up on DDoSecrets Coinbase contractor bribed to hand over user data Telegram does seem to be actually cooperating with law enforcement Britain’s legal aid service gets 15 years worth of applicant data stolen Shocking no one, Ivanti …
…
continue reading

1
SANS Stormcast Wednesday, May 21st 2025: Researchers Scanning the Internet; Forgotten DNS Records; openpgp.js Vulneraiblity
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do offer lists of researchers and just added three new groups today https://isc.sans.edu/diary/Researchers%20Scanning%20the%20Intern…
…
continue reading

1
The LockBit Leak: When Hackers Get a Taste of Their Own Medicine
12:31
12:31
Play later
Play later
Lists
Like
Liked
12:31In this explosive episode of Cyberside Chats, we dive into one of the most shocking developments in ransomware history—LockBit got hacked. Join us as we unpack the breach of one of the world’s most notorious ransomware-as-a-service gangs. We explore what was leaked, why it matters, and how this leak compares to past takedowns like Conti. You'll als…
…
continue reading

1
5.20.25 | Windows Subsystem for Linux open source, Zod 4, Have I Been Pwned 2.0
11:57
11:57
Play later
Play later
Lists
Like
Liked
11:57This is a recap of the top 10 posts on Hacker News on May 20, 2025. The Windows Subsystem for Linux is now open source https://blogs.windows.com/windowsdeveloper/2025/05/19/the-windows-subsystem-for-linux-is-now-open-source/ https://news.ycombinator.com/item?id=44031385 Zod 4 https://zod.dev/v4 https://news.ycombinator.com/item?id=44030850 Have I B…
…
continue reading

1
US Secretary of the Army Dan Driscoll - modernizing military tech & fixing procurement
46:49
46:49
Play later
Play later
Lists
Like
Liked
46:49Dan Driscoll is the current Secretary of the U.S. Army, overseeing a military branch with approximately one million soldiers, 250,000 civilians, and an annual budget of $185 billion. In this episode of World of DaaS, Dan and Auren discuss: The Army Transformation Initiative Rapid defense innovation with Silicon Valley Modernizing obsolete military …
…
continue reading

1
SANS Stormcast Tuesday, May 20th 2025: AutoIT Code RAT; Fake Keepass Download; Procolored Printer Software Compromise
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960 RVTools compromise confirmed Robware.net, the site behind the popular tool RVTools now confirmed that it was compromi…
…
continue reading

1
#240 - Sitetracker - Beyond the Build: Managing Digital Infrastructure Efficiently
25:35
25:35
Play later
Play later
Lists
Like
Liked
25:35Building and managing digital infrastructure —whether it’s towers, fiber networks, or data centers—is a multifaceted challenge, requiring precise coordination across design, construction, and ongoing operations. Brant Carter, VP-Product at Sitetracker, discusses with John Celentano, Inside Towers Business Editor, overarching industry trends and how…
…
continue reading

1
Ep. 305 - Security Awareness Series - Using Empathy to Not Become a Mushroom with Julie Chatman
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Julie Chatman. Julie is a distinguished cybersecurity executive with nearly two decades of experience in cybersecurity strategy, risk management, and AI governance. She began her career in the U.S. Navy, serving on active duty as a Hospital Corpsman specializing…
…
continue reading

1
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
…
continue reading

1
5.18.25 | AR glasses and Linux on Android, Mystical, O2 VoLTE customer location
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17This is a recap of the top 10 posts on Hacker News on May 18, 2025. Coding without a laptop: Two weeks with AR glasses and Linux on Android https://holdtherobot.com/blog/2025/05/11/linux-on-android-with-ar-glasses/ https://news.ycombinator.com/item?id=43985513 Mystical https://suberic.net/~dmm/projects/mystical/README.html https://news.ycombinator.…
…
continue reading

1
5.17.25 | Push Ifs Up, JavaScript's Explicit Resource Management, Japan's IC Cards
11:43
11:43
Play later
Play later
Lists
Like
Liked
11:43This is a recap of the top 10 posts on Hacker News on May 17, 2025. Push Ifs Up and Fors Down https://matklad.github.io/2023/11/15/push-ifs-up-and-fors-down.html https://news.ycombinator.com/item?id=44013157 JavaScript's New Superpower: Explicit Resource Management https://v8.dev/features/explicit-resource-management https://news.ycombinator.com/it…
…
continue reading

1
ModChat 133 - Lapse Kernel Exploit for PS4 12.02 & PS5 10.05, PS3 BadWDSD, OG Xbox v1.6 Reflashed
52:28
52:28
Play later
Play later
Lists
Like
Liked
52:28A ton of awesome releases and advancements in this month's ModChat! First comes the release of the Lapse Kernel Exploit for both PS4 12.02 and PS5 10.05 firmwares. BadHTAB for the PS3 evolves into BadWDSD, a separate but better and more exciting development for PS3 owners allowing further access now on Super Slim variants! The original Xbox revisio…
…
continue reading

1
The Monthly Cybersecurity Review: Data Breaches, Ransomware, and Critical Infrastructure
56:44
56:44
Play later
Play later
Lists
Like
Liked
56:44In this episode of 'Cybersecurity Today', host Jim Love is joined by panelists Laura Payne from White Tuque and David Shipley from Beauceron Security to review significant cybersecurity events over the past month. The discussion covers various impactful stories such as the disappearance of a professor, a data breach at Hertz, and government officia…
…
continue reading

1
A Coinbase breach with bribes, rogue contractors and a $20M ransom demand
2:23:34
2:23:34
Play later
Play later
Lists
Like
Liked
2:23:34Three Buddy Problem - Episode 46: We dig into a Coinbase breach headlined by bribes, rogue contractors and a $20 million ransom demand. Plus, (another!) batch of Ivanti and Microsoft zero-days being exploited in the wild, a new 'Intrusion Logging' feature coming to Android, Apple's iOS 18.5 patches, and the EU announcing its own vulnerability datab…
…
continue reading

1
The Never-Ending Chess Game in Personnel Security
27:55
27:55
Play later
Play later
Lists
Like
Liked
27:55Takeaways #Personnelsecurity is crucial for organisations and individuals. There is a significant talent shortage in the #cybersecurityindustry. #AI can enhance security measures but cannot replace human instinct. Outsourcing security functions can be beneficial for smaller organisations. The pressure on cybersecurity roles is immense and can lead …
…
continue reading

1
Beyond The App Store: Cloud Marketplace Security
27:26
27:26
Play later
Play later
Lists
Like
Liked
27:26Takeaways #Cloudmarketplaces function like a digital mall for various services. Continuous monitoring and detection of threats are essential. Legislation like NIST 2 and Dora impacts cloud security practices. Zero trust methodology is advised in securing cloud connections. Regular penetration testing and vulnerability management are necessary. Data…
…
continue reading

1
5.16.25 | Baby healed with gene-editing, LLM agent loop effectiveness, leap year check instructions
12:39
12:39
Play later
Play later
Lists
Like
Liked
12:39This is a recap of the top 10 posts on Hacker News on May 16, 2025. Baby is healed with first personalized gene-editing treatment https://www.nytimes.com/2025/05/15/health/gene-editing-personalized-rare-disorders.html https://news.ycombinator.com/item?id=43997636 The unreasonable effectiveness of an LLM agent loop with tool use https://sketch.dev/b…
…
continue reading

1
Why is my government undermining my security?: targeted and betrayed
31:59
31:59
Play later
Play later
Lists
Like
Liked
31:59This week we're talking to Gus about his experience being targeted by the Russian government, how it felt at the time, and then how it felt when he found out the government may be trying to undermine the tool he uses to keep himself and his family safe. Read more about Privacy International's challenge against the UK's secret TCN powers.…
…
continue reading

1
Cybersecurity Updates: Major Ransomware Attacks Thwarted and Illegal Marketplaces Shut Down
8:13
8:13
Play later
Play later
Lists
Like
Liked
8:13In this episode, Jim Love discusses significant cybersecurity events including Coinbase's refusal to pay a $20 million ransom after a data breach, Broadcom's patch for VMware tools vulnerabilities, and Telegram's shutdown of two illegal marketplaces handling $35 billion in transactions. The episode also covers the Co-op’s preemptive measures to thw…
…
continue reading

1
SANS Stormcast Friday, May 16th: Increase in Sonicwall Scans; RVTools Compromised?; RountPress
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
…
continue reading

1
Risky Biz Soap Box: Push Security's browser-first twist on identity security
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24In this wholly sponsored Soap Box edition of the show, Patrick Gray chats with Adam Bateman and Luke Jennings from Push Security. Push has built an identity security platform that collects identity information and events from your users’ browsers. It can detect phish kits and shut down phishing attempts, protect SSO credentials, and find shadow/per…
…
continue reading

1
Data Backups: The Digital Safety Deposit Box
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04Takeaways #Databackups are essential for business continuity. The 3-2-1 backup #strategy is crucial for data protection. Testing backup systems is necessary to ensure data recovery. Businesses should back up all critical data sets. #AI can assist in data classification for backups. Avoid keeping backups in the same location as primary data. Underst…
…
continue reading

1
252: The Arctic World Archive, a place for your data? Who misused $40,000 to fund mobile gaming addictions. Handbags using reconstructed T-Rex DNA. Gwen Way shares the "Interrupt" device, a network testing ...
58:39
58:39
Play later
Play later
Lists
Like
Liked
58:39Deep beneath the frigid Arctic landscape, humanity's digital legacy sleeps in a vault carved into frozen rock. The Arctic World Archive, nestled in a decommissioned coal mine near the North Pole, represents our most ambitious attempt to preserve crucial data against time itself. With deposits from over 30 countries—including Vatican manuscripts and…
…
continue reading

1
DDoS Demystified: Understanding the Threat
24:38
24:38
Play later
Play later
Lists
Like
Liked
24:38Takeaways #DDoS can mimic legitimate traffic, making detection difficult. #Botnets are often created from compromised IoT devices. Motivations for DDoS attacks range from hacktivism to personal grievances. Residential IP proxy networks complicate DDoS defense. #AI is increasingly being used in both attacks and defenses. The future of cybersecurity …
…
continue reading

1
5.15.25 | AlphaEvolve: Gemini-powered coding agent, HDR explained, an unexpected server
12:26
12:26
Play later
Play later
Lists
Like
Liked
12:26This is a recap of the top 10 posts on Hacker News on May 15, 2025. AlphaEvolve: A Gemini-powered coding agent for designing advanced algorithms https://deepmind.google/discover/blog/alphaevolve-a-gemini-powered-coding-agent-for-designing-advanced-algorithms/ https://news.ycombinator.com/item?id=43985489 What is HDR, anyway? https://www.lux.camera/…
…
continue reading

1
SANS Stormcast Thursday, May 15th: Google Open Redirects; Adobe, Ivanti, and Samsung patches
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
…
continue reading

1
Blueprints for Violence: How Extremists Are Weaponising 3D Printing
42:05
42:05
Play later
Play later
Lists
Like
Liked
42:05Once a revolutionary manufacturing innovation, 3D printing has become a double-edged sword. While the technology is driving progress across sectors like medicine and aerospace, it’s also being exploited to produce untraceable, homemade firearms. In this episode, host Lucas Webber is joined by Yannick Veilleux-Lepage, Assistant Professor at the Roya…
…
continue reading

1
#36 "Decoding Manipulation: Recognize Language Tricks and Group Dynamics"
23:54
23:54
Play later
Play later
Lists
Like
Liked
23:54Join H. Daniel Mujahid and Dave Kelsey as they delve into the intricate world of manipulation, starting with a recent controversial decision by the Oklahoma Supreme Court. This episode explores the widespread impact of manipulative practices in society, politics, and everyday life. Discover how language, framing, and repetition play pivotal roles i…
…
continue reading
Scammers aren’t just phishing your inbox anymore—they’re impersonating your voice, your face, and even your coworkers. Deep fakes and social engineering have moved beyond clever tricks and become powerful tools that bad actors are using to infiltrate businesses, breach accounts, and dismantle trust at scale. What used to take a hacker hours and exp…
…
continue reading

1
$250M Vanished: Scams, Exploits & the Rise of Secure Crypto
8:00
8:00
Play later
Play later
Lists
Like
Liked
8:00This week on Crypto Weekly Recap:Over $250 million in exploits, scams, and suspicious activity rocked the crypto space. From BitForex’s mysterious disappearance to MetaMask phishing spikes and a Gala Games token dump—security is under fire. We break it all down, plus a bonus spotlight on HundredCoin’s 2-year streak of doing things right.…
…
continue reading

1
Will US Politics Reshape Russian Cyber Threats?
27:59
27:59
Play later
Play later
Lists
Like
Liked
27:59Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Hayden as they discuss: ReliaQuest's Forecast for How US Policy will Impact Russia-linked Cyber Threats Infostealers Spread by Fake AI Video Generators Kickidler Abuse by Ransomware Groups FBI Takedown of Huge Botnet Kim Bromley: Senior Cyber T…
…
continue reading
Send us a text Part 2 with Gavin Klondike dives into autonomous AI agents—how they really work, the attack paths they open, and practical defenses like least-privilege APIs and out-of-band auth. A must-listen roadmap for anyone building—or defending—the next generation of AI applications. Full transcript with links to resources available at https:/…
…
continue reading