Welcome to the Arun Kumar Achari podcast, where amazing things happen.
…
continue reading
My podcast is basically relatable to real life which we can easily be experienced on our daily life. It gives you some value in your lifes.
…
continue reading
Malayalam books review
…
continue reading
Welcome to ’Hacker Hacks,’ the podcast where we dive deep into the mysterious world of cybersecurity. Each episode unveils the tactics, techniques, and procedures used by both ethical and malicious hackers, empowering you with knowledge to defend your digital realm. Whether you’re a seasoned IT professional, an emerging tech enthusiast, or just curious about the digital shadows, ’Hacker Hacks’ is your ultimate guide to understanding the tricks of the trade and the tools to thwart them. Subsc ...
…
continue reading
Hello everyone! This is Kiran Singh, host of the podcast ”The Book Talks”. In each episode, my guests will review one book and recommend book titles for listeners.
…
continue reading
Finance is being pulled apart by the forces of frontier technology. From AI, to blockchain and DeFi, mixed reality, chatbots, neobanks, and roboadvisors — the industry will never be the same. Here is the blueprint for navigating the shift.
…
continue reading
All things pop culture!
…
continue reading
The Opportunist is a podcast series by Story Cast that dives into successful careers of well known creatives, Brand Builders and Startup Founders from various corner of culture. We learn about the realities behind the dreams they've built with encouraging words of advice peppered along the way.
…
continue reading
The YIF Podcast plays host to a core element of what the Young India Fellowship (YIF), the flagship postgraduate diploma programme in Liberal Studies at Ashoka University, has to offer - the life experiences and knowledge of Ashoka University's founders, Young India Fellows, faculty, our alumni across diverse fields, and thought leaders across the world. At The YIF Podcast, we bring you exclusive conversations with some of the brightest minds of the world about their journeys of transformati ...
…
continue reading
Bollywood Songs & Dialogues. Experience India. Transcripts of the Hindi to English translations and links to music and movies are available at http://housefull.cuttingchai.com
…
continue reading

1
Episode 43 : Arun Kumar's review of the books " Kenneth Andersons Omnibus: Man Eaters And Western Ghats"
44:53
44:53
Play later
Play later
Lists
Like
Liked
44:53In this episode, Arun Kumar reviews Kenneth Anderson's set of 7 books giving us a gist of each book through tales recounted in them, in a very engaging manner. Kenneth Douglas Stewart Anderson was an Indian writer and hunter who wrote books about his adventures in the jungles of South India. Background Music Credit : Olexy from Pixabay…
…
continue reading

1
Episode 44 : Swaminathan's review of the book "Ponniyin Selvan" written by Kalki Krishnamurthy
24:36
24:36
Play later
Play later
Lists
Like
Liked
24:36In this episode,20 year old Swami takes us through Kalki's historical fiction novel setup in the Chola kingdom. He gives us a glimpse into the storyline, characters and how the author has written a beautiful story through the eyes of a messenger, the protagonist, Vallavaraiyan Vandiyadevan. Do listen to the episode and share your thoughts. Backgrou…
…
continue reading

1
Forty Billion Reasons to Trust the Future of DeFi, with Aave Founder Stani Kulechov
42:43
42:43
Play later
Play later
Lists
Like
Liked
42:43Lex chats with Stani Kulechov - founder and CEO of Aave, a leading decentralized finance (DeFi) protocol. They explore the evolution of DeFi, Aave’s growth, and its architectural shift from a peer-to-peer model to pooled liquidity. Stani reflects on the early days of DeFi, the impact of the FTX collapse, and the increasing adoption of DeFi over cen…
…
continue reading

1
Inside the Platform Powering +$171B in Private Capital, with AngelList CEO Avlok Kohli
43:06
43:06
Play later
Play later
Lists
Like
Liked
43:06Lex chats with Avlok Kohli - the CEO of AngelList, about the company's significant evolution. Initially a platform for startups to connect with venture capitalists, AngelList has transformed into a comprehensive fintech entity encompassing private equity and cryptocurrency. Avlok discusses the strategic pivots, including the introduction of syndica…
…
continue reading

1
Episode 42 : Saagarika's review of the book " Little Women" written by Louisa May Alcott
30:21
30:21
Play later
Play later
Lists
Like
Liked
30:21In this episode, 12 year old Saagarika has reviewed the classic "Little Women" written by Louisa May Alcott. The story follows the lives of the four March sisters—Meg, Jo, Beth, and Amy and their journey from childhood to womanhood. Saagarika has reviewed the book in a beautiful way describing the characters, the plot etc. thereby giving us a glimp…
…
continue reading

1
Episode 41 : Kishore's review of the book " Before We Forget Kindness" written by Toshikazu Kawaguchi
29:54
29:54
Play later
Play later
Lists
Like
Liked
29:54In this episode, Kishore reviews an amazing book "Before we forget kindness" written by Toshikazu Kawaguchi. In the fifth book in the Before the Coffee Gets Cold series, Kishore tells us about the mysterious café which welcomes four new guests who go into their past to move on their present, finding closure and comfort so they can start on a fresh …
…
continue reading

1
Episode 40 : Anika Madangeri's review of the book "Still Alive: A Wild Life of Rediscovery" written by Forrest Galante
34:52
34:52
Play later
Play later
Lists
Like
Liked
34:52In this episode, 14 year old, Anika Madangeri speaks about this amazing book "Still Alive: A Wild Life of Rediscovery" written by Forrest Galante. A wildlife enthusiast herself, Anika loves exploring the wild side of the planet with her parents and other like minded groups. The book is a part memoir, part biological adventure where Galante takes re…
…
continue reading

1
400 Startups Building the Post-Web Economy, with Outlier Ventures Founder Jamie Burke
1:01:30
1:01:30
Play later
Play later
Lists
Like
Liked
1:01:30Lex chats with Jamie Burke - founder of Outlier Ventures, about the current state and future of Web3, decentralized finance, and the metaverse. Jamie highlights Outlier Ventures' impressive growth, with a portfolio of around 400 startups, and discusses successful projects like IOTA and Fetch.ai. The conversation delves into the open metaverse, emph…
…
continue reading

1
Episode 39 : Anish's review of the book " The Upside-Down King: Unusual Tales about Rama and Krishna " written by Sudha Murthy
25:06
25:06
Play later
Play later
Lists
Like
Liked
25:06In this episode, 13 year old Anish, reviews the book" The Upside-Down King: Unusual Tales about Rama and Krishna " written by Sudha Murthy. A book written by Sudha Murthy is always a pleasure to read and especially when kids talk about stories from the book, it feels like the purpose is fulfilled. That's what Anish does here. He shares few stories …
…
continue reading

1
The $500MM Startup Making Payroll Painless, with Gusto Co-Founder Joshua Reeves
42:44
42:44
Play later
Play later
Lists
Like
Liked
42:44Lex interviews Josh Reeves, co-founder of Gusto, a company specializing in payroll, HR, and benefits solutions for small businesses. Josh shares his journey from academia to entrepreneurship, highlighting the challenges and strategies involved in building Gusto. The discussion covers the evolution of technology from Web 2.0, the importance of under…
…
continue reading

1
Episode 38 : KMAK's review of the book " The Remains Of The Day" written by Kazuo Ishiguro
25:03
25:03
Play later
Play later
Lists
Like
Liked
25:03In this episode, my guest KMAK reviews the book "The Remains Of The Day" written by nobel prize winning author, Kazuo Ishiguro. KMAK gives us a glimpse into Mr.Steven's world, a butler and the main protagonist of the story which is setup in 1956.She highlights how important issues have been touched upon throughout the story in a very subtle but sig…
…
continue reading

1
Reinventing Traditional Services through Modern Platforms, with David Snider CEO of Harness Wealth
38:59
38:59
Play later
Play later
Lists
Like
Liked
38:59Lex interviews David Snider - founder and CEO of Harness Wealth. David shares his extensive fintech journey, including his pivotal role at Compass, a real estate technology firm. He discusses the challenges of aligning agents with new technology and the evolution of Compass's business model to empower agents with better tools and incentives. Transi…
…
continue reading

1
Episode 37 : Anupama's review of the book " Norwegian Wood" written by Haruki Murakami
22:03
22:03
Play later
Play later
Lists
Like
Liked
22:03In this episode, my guest Anupama talks about this interesting book giving us a gist of the plot, protagonist, other characters and how it was so relatable to her while reading the same. Do listen to the episode and share your thoughts. Background Music Credit : Olexy from Pixabay
…
continue reading

1
Windows 11 Bypass Hack—What Microsoft Doesn’t Want You to Know
6:15
6:15
Play later
Play later
Lists
Like
Liked
6:15Hackers found a new Windows 11 setup bypass after Microsoft blocked the old one. Apple ID phishing scams are on the rise, targeting 2B users. A Canon printer flaw (CVE-2025-1268) allows code execution. The FBI raided IU cybersecurity expert XiaoFeng Wang’s homes, but details remain undisclosed. Israel’s new cyber chief, Yossi Karadi, takes over ami…
…
continue reading

1
Episode 36 : Gayathri's review of the book " Rich Dad Poor Dad" written by Robert Kiyosaki
28:25
28:25
Play later
Play later
Lists
Like
Liked
28:25In this episode, my guest Gayathri reviews an amazing book 'Rich Dad Poor Dad" written by Robert Kiyosaki, which talks about the importance of financial education. Gayathri takes us through different aspects of the book in a very interesting way, highlighting important ones as mentioned by the author. Do listen to the episode and share your thought…
…
continue reading

1
Google Patches First Chrome Zero-Day of 2025
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53Security firms confirm Oracle Cloud’s potential breach, affecting 140,000 tenants. A critical Windows zero-day threatens NTLM credentials, while Google patches Chrome’s first 2025 zero-day. VMware fixes a privilege escalation flaw, and Signal is now pre-installed on government devices. Meanwhile, a Chinese hacking group has been linked to global cy…
…
continue reading

1
H3C Routers Under Attack – No Fix Available!
9:53
9:53
Play later
Play later
Lists
Like
Liked
9:53A Signal chat leak involving Trump officials raised security concerns. Oracle’s data breach was confirmed, while a Canadian hacker was extradited for major cybercrimes. KLIA faced a cyberattack with a $10M ransom demand. India pushes for cybersecurity self-reliance, while Dragos expands OT security in Canada. VMware and Veeam patched major vulnerab…
…
continue reading

1
UAE Cybersecurity Alert: Oracle Breach and Global Impact
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14A Kubernetes vulnerability exposes 6,500+ clusters to RCE attacks, while KLIA faces a cyber threat with a $10M ransom demand. Next.js patches a critical security flaw, and Oracle denies claims of a major cloud breach. Microsoft deploys AI agents for cybersecurity automation. India rejects social media rumors about a military drone hack. Meanwhile, …
…
continue reading

1
How Metronome is Building the Revenue Engine for AI, with CEO Scott Woody
49:32
49:32
Play later
Play later
Lists
Like
Liked
49:32Lex interviews Scott Woody, CEO and founder of Metronome, a usage-based billing platform. Scott shares his journey from academia to entrepreneurship, detailing his experiences at UC Berkeley, D.E. Shaw, and Stanford, where he studied biophysics. His tenure at Dropbox, where he tackled billing system challenges, inspired the creation of Metronome. T…
…
continue reading

1
Kaspersky’s OT Cybersecurity: Leading Asia’s Defense
8:39
8:39
Play later
Play later
Lists
Like
Liked
8:39Oracle denies an SSO breach despite hacker claims. AI-powered attacks are rising, with leaders overestimating cyber readiness. Kaspersky leads OT security in Asia, while Trend Micro open-sources an AI-driven cybersecurity model. South Africa’s Astral Foods suffers cyber losses, and Singapore boosts AI and quantum defense. Inforte expands cybersecur…
…
continue reading

1
Episode 35 : Vyjayanthi's review of the book "I Have Got You Under My Skin" written by Mary Higgins Clark
49:29
49:29
Play later
Play later
Lists
Like
Liked
49:29In this episode, Vyjayanthi ma'am talks about one of her favourite authors work " I Have Got You Under My Skin". This book written by American Thriller author, Mary Higgins Clark, is a suspenseful journey into finding out the murderer through twists and turns wherein Vyajanthi ma'am gives us a glimpse of the plot in her words. Do listen to the epis…
…
continue reading

1
DOGE & CISA Cuts: The Risk of Government Cyber Weakness
8:01
8:01
Play later
Play later
Lists
Like
Liked
8:01This episode covers Microsoft's unpatched zero-day flaw exploited by 11 APT groups, the $1.4B Bybit hack by Lazarus Group, and the growing risks of quantum hacking. We analyze the impact of DOGE’s cybersecurity cuts, Fortinet’s exploited vulnerability, IBM’s critical AIX flaws, and Hong Kong’s new cyber law. We also discuss Google’s $32B Wiz acquis…
…
continue reading

1
MirrorFace Strikes Again: China’s APT10 Returns with ANEL & AsyncRAT
6:05
6:05
Play later
Play later
Lists
Like
Liked
6:05China’s MirrorFace (APT10) used ANEL & AsyncRAT for cyber espionage. GitHub supply chain attacks compromised 23,000 repos. A ChatGPT SSRF exploit targeted U.S. government agencies. Apache Tomcat RCE and Apple’s Passwords app flaw exposed users. Google’s OSV-Scanner 2.0 boosts open-source security, while Singapore’s HSA pushes medical device cyberse…
…
continue reading

1
OKX Hack, Tomcat Exploit, Google-Wiz Deal, GitHub Breach, AI Security, Linux Flaw
9:15
9:15
Play later
Play later
Lists
Like
Liked
9:15Lazarus hackers tried laundering $100M via OKX, prompting a DEX shutdown. Apache Tomcat’s CVE-2025-24813 was exploited 30 hours after disclosure. Google is in talks to acquire Wiz for $30B. A Kolkata tailor hacked ATMs using YouTube tutorials. A GitHub supply chain attack exposed thousands of secrets. Operant AI expands to India, while Linux kernel…
…
continue reading

1
Gmail Lockout Attacks: You Have 7 Days to Act!
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18Hackers are exploiting Gmail lockouts, AI-driven phishing, and Medusa ransomware to target users. China’s quantum satellite link reshapes cybersecurity, while North Korea’s Bitcoin stash grows after the Bybit hack. OKX faces regulatory scrutiny, and private equity firms struggle with cyber defenses. TP-Link routers remain vulnerable to attacks. Wit…
…
continue reading

1
Cybersecurity in Crisis: Threats, Patches, and the Global Fight Against Cyber Attacks
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15The White House urges agencies to retain cybersecurity teams amid budget cuts, warning of national security risks. GitHub uncovered high-severity ruby-saml flaws enabling account takeovers. A critical WordPress plugin vulnerability threatens 5M+ sites. Microsoft patched a zero-day exploited since 2023, while Apple released an emergency iOS update f…
…
continue reading

1
Cyber Battlefield: Router Attacks, Zero-Day Exploits & the Future of Digital Security
7:58
7:58
Play later
Play later
Lists
Like
Liked
7:58China-linked UNC3886 hacked Juniper routers using custom backdoors, while Microsoft patched six actively exploited zero-days, including a ChatGPT-trojan exploit. Apple fixed a WebKit flaw targeting iPhones, and the Ballista botnet exploited TP-Link routers. CISA cut $10M in cyber funding, and OKX denied Bybit hack allegations. Ledger helped Trezor …
…
continue reading

1
Episode 34 : Prayag Prem's review of the book " The Divine Comedy" by Dante Alighieri
28:28
28:28
Play later
Play later
Lists
Like
Liked
28:28In this episode, 15 year old Prayag Prem reviews an amazing book, "The Divine Comedy" written by Dante Alighieri as a poem in 3 volumes. The epic poem, The Divine Comedy, is about the author's journey which has three parts: Inferno (Hell), Purgatorio (Purgatory), and Paradiso (Heaven).Prayag takes us through the different levels of the poem in a ve…
…
continue reading

1
From Apple’s Zero-Day Nightmare to CISA Cuts & Cyber Burnout: The Rising Threats, Hacks, and the Future of Cyber Defense
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39Apple patched a WebKit zero-day (CVE-2025-24201) exploited in targeted attacks. CISA cut election security funding, citing cost savings. EU regulators probed OKX after Bybit’s $1.5B hack. The University of South Florida received $40M for a cybersecurity-focused college. A mass-exploited PHP flaw fueled global cyberattacks. Trump nominated Sean Plan…
…
continue reading

1
Cyber Battlegrounds: Election Security Cuts, Global Hacks & Rising Digital Threats
7:46
7:46
Play later
Play later
Lists
Like
Liked
7:46Iran-linked hackers leaked Israeli gun owners’ data, while the Trump administration cut $10M in election cybersecurity funding. X (formerly Twitter) faced a large-scale cyberattack, and PHP vulnerability CVE-2024-4577 is being mass-exploited worldwide. Nova Scotia Power proposed $6.8M in cybersecurity upgrades, and CISA added new exploited flaws to…
…
continue reading

1
Chris Larsen’s $661M XRP Hack: A LastPass Disaster
5:37
5:37
Play later
Play later
Lists
Like
Liked
5:37North Korea’s Lazarus Group laundered $300M from the ByBit hack, while Ripple’s Chris Larsen lost $661M in an XRP theft linked to a LastPass breach. A Python library vulnerability exposed 43M installations, and India faced a surge in hacktivist attacks. AI-driven cybersecurity advances with Getvisibility’s acquisition, and Mphasis partners with Sec…
…
continue reading

1
Building a Trustless Supercomputer for Web3 and AI, with Arweave's Founder Sam Williams
46:04
46:04
Play later
Play later
Lists
Like
Liked
46:04Lex interviews Sam Williams - founder of Arweave. This episode delves into the innovative aspects of Arweave, a protocol designed for permanent data storage and computation within the Web3 ecosystem. The discussion covers a range of topics, from the economic models underpinning Arweave to its potential applications in decentralized finance (DeFi) a…
…
continue reading

1
Cybersecurity Under Siege: VMware Attacks, $1.4B Crypto Heist, Android Zero-Days & More!
7:41
7:41
Play later
Play later
Lists
Like
Liked
7:41Broadcom patches actively exploited VMware flaws, while Windows KDC Proxy RCE threatens remote takeovers. Bybit’s $1.4B hack linked to North Korea’s Lazarus Group, with 77% of funds still traceable. Google’s March Android update fixes 40+ vulnerabilities, and Samsung patches 58 bugs. Lloyds Bank patents AI-driven security tech, and a survey ranks c…
…
continue reading

1
**"Cybersecurity in Turmoil: AI, Threats, Policy Shifts & the Battle for Digital Defense"**
8:11
8:11
Play later
Play later
Lists
Like
Liked
8:11Cybersecurity hiring is tightening, prioritizing generalists over specialists. Opus Security’s AI-driven platform automates vulnerability management, while hackers exploit a Paragon Partition Manager zero-day for ransomware. CISA denies refocusing away from Russian threats, and the EU’s new liability law forces stricter cybersecurity compliance. Tr…
…
continue reading

1
Cybersecurity in Flux: Big Tech Moves, Global Hacks & The Future of Digital Defense
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01Verizon & Accenture joined forces to tackle cyber threats, while the U.S. allegedly eased pressure on Russia in cybersecurity policies. Poland’s space agency was hacked, with fingers pointing at Russia. BlackBerry sold its Cylance security assets to Arctic Wolf but remains a player in critical cybersecurity. Meanwhile, a wrongful arrest in an Austr…
…
continue reading

1
CISA Alerts: Another Major Exploit Targeting Enterprises
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16The Orissa High Court raises concerns over Aadhaar’s security risks. Hackers exploit a Confluence vulnerability to deploy LockBit ransomware. An AI-generated Trump-Musk video hijacks HUD systems. Russia warns its financial sector of a major IT provider hack. CISA alerts on Oracle Agile PLM vulnerability being actively exploited. Netflix’s Zero Day …
…
continue reading

1
The Virtual Card Revolution Powering $7 Billion in Transactions, with Extend CEO Andrew Jamison
41:39
41:39
Play later
Play later
Lists
Like
Liked
41:39Lex interviews Andrew Jamison - CEO and Co-founder of Extend - a financial infrastructure platform that helps banks innovate financial product development with capabilities while working with their existing systems, starting with virtual cards. Andrew shares his journey into fintech, detailing his experiences at American Express and the evolution o…
…
continue reading

1
US Treasury Hacked – PostgreSQL Zero-Day Exploited
9:47
9:47
Play later
Play later
Lists
Like
Liked
9:47Bybit suffered a $2.4B hack, the biggest in crypto history, linked to the Lazarus Group. OpenText launched AI-powered Cybersecurity Cloud to tackle evolving threats. A critical F5 BIG-IP vulnerability (CVE-2025-20029) allows attackers to gain root access. The US Treasury was hacked using a PostgreSQL zero-day. Research exposed security flaws in sma…
…
continue reading

1
Ivanti Exploit Released – A New Risk for Enterprises
9:42
9:42
Play later
Play later
Lists
Like
Liked
9:42This week on Hacker Hacks, Microsoft patched two critical vulnerabilities, including an actively exploited Power Pages flaw. Warby Parker faces a $1.5M HIPAA fine, and Medusa ransomware targets UK healthcare giant HCRG. AI infrastructure remains vulnerable due to subsea cable risks, while a Juniper Networks exploit threatens enterprise security. Iv…
…
continue reading

1
Episode 33 : Digangana Mukherjee's review of the book " The Home And The World" written by Rabindranath Tagore
34:20
34:20
Play later
Play later
Lists
Like
Liked
34:20In this episode, my guest, Digangana Mukherjee talks about a beautiful book "The Home And The World" written by Rabindranath Tagore. She takes us through the character setup,setting of the plot,giving us a glimpse into Tagore's writing and the way how he brilliantly shaped them weaving amazing stories. Digangana also throws light on "Geetanjali",se…
…
continue reading

1
AI-Powered Security: Kaspersky’s MWC 2025 Reveal
7:01
7:01
Play later
Play later
Lists
Like
Liked
7:01Palo Alto’s firewall flaw (CVE-2025-0108) is under attack, while Juniper routers face an authentication bypass issue (CVE-2025-21589). CISA layoffs raise security concerns, and OpenSSH vulnerabilities threaten encryption integrity. Microsoft is investing $700M in Poland’s cybersecurity, Telangana launches new cyber policies, and Dream raises $100M …
…
continue reading

1
"Hacked Websites, Leaked Data: The New Face of Cyber Threats"
4:59
4:59
Play later
Play later
Lists
Like
Liked
4:59In this episode, we cover the recent breach of Elon Musk’s DOGE website and concerns about its security flaws, including possible classified data leaks. We discuss the critical vulnerabilities found in government infrastructure management tools, such as Trimble’s Cityworks, and the risks they pose. We also dive into the AI craze, examining the secu…
…
continue reading

1
How Sei is Breaking Ethereum's Limits with Co-Founder Jayendra Jog
42:16
42:16
Play later
Play later
Lists
Like
Liked
42:16Lex interviews Jayendra Jog - co-founder of Sei Labs, about his professional journey and the innovative Sei protocol—a high-performance parallel blockchain. Jay shares insights from his time at Robinhood, emphasizing the importance of distribution over technology and the challenges of scaling a fintech company. He discusses the limitations of Ether…
…
continue reading

1
Critical Security Patches You Can’t Ignore – Hacker Hacks Podcast
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26This episode covers major cybersecurity threats, including Fortinet and CrowdStrike vulnerabilities requiring urgent patches, and China-backed Salt Typhoon’s attacks on telecoms. We discuss Valentine’s Day scams, Google Chrome’s security flaws, and the aftermath of the Optus hack. We also explore AI-driven salary hikes in India, cybersecurity regul…
…
continue reading

1
Episode 32 : Prasanthi's review of the book " Ahalya's Awakening" by Kavita Kane
42:49
42:49
Play later
Play later
Lists
Like
Liked
42:49In this episode, author and book lover, Prasanthi has reviewed the amazing book "Ahalya's Awakening" written by Kavita Kane. Prasanthi has very well brought out the essence of the book by taking us through Ahalya's story in an interesting way.She also mentions that reading this book and reviewing it has given her immense joy as this was her first K…
…
continue reading

1
Google Gemini’s AI Memory Hack: Can We Trust AI?
11:11
11:11
Play later
Play later
Lists
Like
Liked
11:11This episode covers a Linux OS running inside a PDF, over 1,300 APT attacks on China, Apple’s emergency patch for an iOS zero-day exploit, and Andesite’s $23M AI-powered cybersecurity funding. We also discuss election security staff layoffs at CISA, BBC’s Nick Robinson’s crypto-related Twitter hack, Google Gemini’s AI memory vulnerability, a critic…
…
continue reading

1
Hacks, Vulnerabilities & Cyber Wars—A Digital Battlefield
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25A man pleaded guilty to hacking the SEC’s X account, falsely announcing Bitcoin ETF approvals. Elon Musk’s influence led to cybersecurity cuts at Citrix, triggering cyberattacks. CISA placed 17 staffers on leave, sparking election security concerns. Cloudflare patched a QUIC vulnerability, while 2.8M devices were used in a major brute-force attack.…
…
continue reading

1
Google Patches Android Vulnerability Exploited by Forensic Tools
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15Hackers are using 2.8M compromised devices to brute-force security networks. Google Chrome users face a malware threat from fake downloads. A new AnyDesk flaw enables local privilege escalation. WhatsApp’s zero-click spyware attack targeted 90 users. India cancels a defense drone deal over cybersecurity risks. Health NZ’s IT layoffs raise cyberatta…
…
continue reading

1
Episode 31: Upasana's review of the books "The Midnight Library ","The Life Impossible" and "The Comfort Book" written by Matt Haig
38:39
38:39
Play later
Play later
Lists
Like
Liked
38:39In this episode, my guest Upasana wonderfully captures the essence of 3 books written by Matt Haig. The first one is Midnight Library,second one "The Life Impossible" and the last one " The Comfort Book".Each one is different in the kind of stories potrayed but with similar themes and a focus on Mental Health. Do listen to the episode and share you…
…
continue reading
U.S. lawmakers propose banning DeepSeek AI from federal devices over China-linked security risks. Hackers use malicious apps to steal crypto wallet phrases via OCR. IMI engineering firm faces a cyber breach. CISA warns of a critical Linux zero-day vulnerability. Russia exploits a 7-Zip flaw in Ukraine. Aadhaar amendments raise privacy concerns. Wor…
…
continue reading