Arun kumar public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Hacker Hacks

Arun kumar Krishna

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Welcome to ’Hacker Hacks,’ the podcast where we dive deep into the mysterious world of cybersecurity. Each episode unveils the tactics, techniques, and procedures used by both ethical and malicious hackers, empowering you with knowledge to defend your digital realm. Whether you’re a seasoned IT professional, an emerging tech enthusiast, or just curious about the digital shadows, ’Hacker Hacks’ is your ultimate guide to understanding the tricks of the trade and the tools to thwart them. Subsc ...
  continue reading
 
Artwork
 
Finance is being pulled apart by the forces of frontier technology. From AI, to blockchain and DeFi, mixed reality, chatbots, neobanks, and roboadvisors — the industry will never be the same. Here is the blueprint for navigating the shift.
  continue reading
 
Artwork
 
The Opportunist is a podcast series by Story Cast that dives into successful careers of well known creatives, Brand Builders and Startup Founders from various corner of culture. We learn about the realities behind the dreams they've built with encouraging words of advice peppered along the way.
  continue reading
 
Artwork

1
The YIF Podcast

Young India Fellowship

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The YIF Podcast plays host to a core element of what the Young India Fellowship (YIF), the flagship postgraduate diploma programme in Liberal Studies at Ashoka University, has to offer - the life experiences and knowledge of Ashoka University's founders, Young India Fellows, faculty, our alumni across diverse fields, and thought leaders across the world. At The YIF Podcast, we bring you exclusive conversations with some of the brightest minds of the world about their journeys of transformati ...
  continue reading
 
Loading …
show series
 
In this episode, Arun Kumar reviews Kenneth Anderson's set of 7 books giving us a gist of each book through tales recounted in them, in a very engaging manner. Kenneth Douglas Stewart Anderson was an Indian writer and hunter who wrote books about his adventures in the jungles of South India. Background Music Credit : Olexy from Pixabay…
  continue reading
 
In this episode,20 year old Swami takes us through Kalki's historical fiction novel setup in the Chola kingdom. He gives us a glimpse into the storyline, characters and how the author has written a beautiful story through the eyes of a messenger, the protagonist, Vallavaraiyan Vandiyadevan. Do listen to the episode and share your thoughts. Backgrou…
  continue reading
 
Lex chats with Stani Kulechov - founder and CEO of Aave, a leading decentralized finance (DeFi) protocol. They explore the evolution of DeFi, Aave’s growth, and its architectural shift from a peer-to-peer model to pooled liquidity. Stani reflects on the early days of DeFi, the impact of the FTX collapse, and the increasing adoption of DeFi over cen…
  continue reading
 
Lex chats with Avlok Kohli - the CEO of AngelList, about the company's significant evolution. Initially a platform for startups to connect with venture capitalists, AngelList has transformed into a comprehensive fintech entity encompassing private equity and cryptocurrency. Avlok discusses the strategic pivots, including the introduction of syndica…
  continue reading
 
In this episode, 12 year old Saagarika has reviewed the classic "Little Women" written by Louisa May Alcott. The story follows the lives of the four March sisters—Meg, Jo, Beth, and Amy and their journey from childhood to womanhood. Saagarika has reviewed the book in a beautiful way describing the characters, the plot etc. thereby giving us a glimp…
  continue reading
 
In this episode, Kishore reviews an amazing book "Before we forget kindness" written by Toshikazu Kawaguchi. In the fifth book in the Before the Coffee Gets Cold series, Kishore tells us about the mysterious café which welcomes four new guests who go into their past to move on their present, finding closure and comfort so they can start on a fresh …
  continue reading
 
In this episode, 14 year old, Anika Madangeri speaks about this amazing book "Still Alive: A Wild Life of Rediscovery" written by Forrest Galante. A wildlife enthusiast herself, Anika loves exploring the wild side of the planet with her parents and other like minded groups. The book is a part memoir, part biological adventure where Galante takes re…
  continue reading
 
Lex chats with Jamie Burke - founder of Outlier Ventures, about the current state and future of Web3, decentralized finance, and the metaverse. Jamie highlights Outlier Ventures' impressive growth, with a portfolio of around 400 startups, and discusses successful projects like IOTA and Fetch.ai. The conversation delves into the open metaverse, emph…
  continue reading
 
In this episode, 13 year old Anish, reviews the book" The Upside-Down King: Unusual Tales about Rama and Krishna " written by Sudha Murthy. A book written by Sudha Murthy is always a pleasure to read and especially when kids talk about stories from the book, it feels like the purpose is fulfilled. That's what Anish does here. He shares few stories …
  continue reading
 
Lex interviews Josh Reeves, co-founder of Gusto, a company specializing in payroll, HR, and benefits solutions for small businesses. Josh shares his journey from academia to entrepreneurship, highlighting the challenges and strategies involved in building Gusto. The discussion covers the evolution of technology from Web 2.0, the importance of under…
  continue reading
 
In this episode, my guest KMAK reviews the book "The Remains Of The Day" written by nobel prize winning author, Kazuo Ishiguro. KMAK gives us a glimpse into Mr.Steven's world, a butler and the main protagonist of the story which is setup in 1956.She highlights how important issues have been touched upon throughout the story in a very subtle but sig…
  continue reading
 
Lex interviews David Snider - founder and CEO of Harness Wealth. David shares his extensive fintech journey, including his pivotal role at Compass, a real estate technology firm. He discusses the challenges of aligning agents with new technology and the evolution of Compass's business model to empower agents with better tools and incentives. Transi…
  continue reading
 
In this episode, my guest Anupama talks about this interesting book giving us a gist of the plot, protagonist, other characters and how it was so relatable to her while reading the same. Do listen to the episode and share your thoughts. Background Music Credit : Olexy from Pixabay
  continue reading
 
Hackers found a new Windows 11 setup bypass after Microsoft blocked the old one. Apple ID phishing scams are on the rise, targeting 2B users. A Canon printer flaw (CVE-2025-1268) allows code execution. The FBI raided IU cybersecurity expert XiaoFeng Wang’s homes, but details remain undisclosed. Israel’s new cyber chief, Yossi Karadi, takes over ami…
  continue reading
 
In this episode, my guest Gayathri reviews an amazing book 'Rich Dad Poor Dad" written by Robert Kiyosaki, which talks about the importance of financial education. Gayathri takes us through different aspects of the book in a very interesting way, highlighting important ones as mentioned by the author. Do listen to the episode and share your thought…
  continue reading
 
Security firms confirm Oracle Cloud’s potential breach, affecting 140,000 tenants. A critical Windows zero-day threatens NTLM credentials, while Google patches Chrome’s first 2025 zero-day. VMware fixes a privilege escalation flaw, and Signal is now pre-installed on government devices. Meanwhile, a Chinese hacking group has been linked to global cy…
  continue reading
 
A Signal chat leak involving Trump officials raised security concerns. Oracle’s data breach was confirmed, while a Canadian hacker was extradited for major cybercrimes. KLIA faced a cyberattack with a $10M ransom demand. India pushes for cybersecurity self-reliance, while Dragos expands OT security in Canada. VMware and Veeam patched major vulnerab…
  continue reading
 
A Kubernetes vulnerability exposes 6,500+ clusters to RCE attacks, while KLIA faces a cyber threat with a $10M ransom demand. Next.js patches a critical security flaw, and Oracle denies claims of a major cloud breach. Microsoft deploys AI agents for cybersecurity automation. India rejects social media rumors about a military drone hack. Meanwhile, …
  continue reading
 
Lex interviews Scott Woody, CEO and founder of Metronome, a usage-based billing platform. Scott shares his journey from academia to entrepreneurship, detailing his experiences at UC Berkeley, D.E. Shaw, and Stanford, where he studied biophysics. His tenure at Dropbox, where he tackled billing system challenges, inspired the creation of Metronome. T…
  continue reading
 
Oracle denies an SSO breach despite hacker claims. AI-powered attacks are rising, with leaders overestimating cyber readiness. Kaspersky leads OT security in Asia, while Trend Micro open-sources an AI-driven cybersecurity model. South Africa’s Astral Foods suffers cyber losses, and Singapore boosts AI and quantum defense. Inforte expands cybersecur…
  continue reading
 
In this episode, Vyjayanthi ma'am talks about one of her favourite authors work " I Have Got You Under My Skin". This book written by American Thriller author, Mary Higgins Clark, is a suspenseful journey into finding out the murderer through twists and turns wherein Vyajanthi ma'am gives us a glimpse of the plot in her words. Do listen to the epis…
  continue reading
 
This episode covers Microsoft's unpatched zero-day flaw exploited by 11 APT groups, the $1.4B Bybit hack by Lazarus Group, and the growing risks of quantum hacking. We analyze the impact of DOGE’s cybersecurity cuts, Fortinet’s exploited vulnerability, IBM’s critical AIX flaws, and Hong Kong’s new cyber law. We also discuss Google’s $32B Wiz acquis…
  continue reading
 
China’s MirrorFace (APT10) used ANEL & AsyncRAT for cyber espionage. GitHub supply chain attacks compromised 23,000 repos. A ChatGPT SSRF exploit targeted U.S. government agencies. Apache Tomcat RCE and Apple’s Passwords app flaw exposed users. Google’s OSV-Scanner 2.0 boosts open-source security, while Singapore’s HSA pushes medical device cyberse…
  continue reading
 
Lazarus hackers tried laundering $100M via OKX, prompting a DEX shutdown. Apache Tomcat’s CVE-2025-24813 was exploited 30 hours after disclosure. Google is in talks to acquire Wiz for $30B. A Kolkata tailor hacked ATMs using YouTube tutorials. A GitHub supply chain attack exposed thousands of secrets. Operant AI expands to India, while Linux kernel…
  continue reading
 
Hackers are exploiting Gmail lockouts, AI-driven phishing, and Medusa ransomware to target users. China’s quantum satellite link reshapes cybersecurity, while North Korea’s Bitcoin stash grows after the Bybit hack. OKX faces regulatory scrutiny, and private equity firms struggle with cyber defenses. TP-Link routers remain vulnerable to attacks. Wit…
  continue reading
 
The White House urges agencies to retain cybersecurity teams amid budget cuts, warning of national security risks. GitHub uncovered high-severity ruby-saml flaws enabling account takeovers. A critical WordPress plugin vulnerability threatens 5M+ sites. Microsoft patched a zero-day exploited since 2023, while Apple released an emergency iOS update f…
  continue reading
 
China-linked UNC3886 hacked Juniper routers using custom backdoors, while Microsoft patched six actively exploited zero-days, including a ChatGPT-trojan exploit. Apple fixed a WebKit flaw targeting iPhones, and the Ballista botnet exploited TP-Link routers. CISA cut $10M in cyber funding, and OKX denied Bybit hack allegations. Ledger helped Trezor …
  continue reading
 
In this episode, 15 year old Prayag Prem reviews an amazing book, "The Divine Comedy" written by Dante Alighieri as a poem in 3 volumes. The epic poem, The Divine Comedy, is about the author's journey which has three parts: Inferno (Hell), Purgatorio (Purgatory), and Paradiso (Heaven).Prayag takes us through the different levels of the poem in a ve…
  continue reading
 
Apple patched a WebKit zero-day (CVE-2025-24201) exploited in targeted attacks. CISA cut election security funding, citing cost savings. EU regulators probed OKX after Bybit’s $1.5B hack. The University of South Florida received $40M for a cybersecurity-focused college. A mass-exploited PHP flaw fueled global cyberattacks. Trump nominated Sean Plan…
  continue reading
 
Iran-linked hackers leaked Israeli gun owners’ data, while the Trump administration cut $10M in election cybersecurity funding. X (formerly Twitter) faced a large-scale cyberattack, and PHP vulnerability CVE-2024-4577 is being mass-exploited worldwide. Nova Scotia Power proposed $6.8M in cybersecurity upgrades, and CISA added new exploited flaws to…
  continue reading
 
North Korea’s Lazarus Group laundered $300M from the ByBit hack, while Ripple’s Chris Larsen lost $661M in an XRP theft linked to a LastPass breach. A Python library vulnerability exposed 43M installations, and India faced a surge in hacktivist attacks. AI-driven cybersecurity advances with Getvisibility’s acquisition, and Mphasis partners with Sec…
  continue reading
 
Lex interviews Sam Williams - founder of Arweave. This episode delves into the innovative aspects of Arweave, a protocol designed for permanent data storage and computation within the Web3 ecosystem. The discussion covers a range of topics, from the economic models underpinning Arweave to its potential applications in decentralized finance (DeFi) a…
  continue reading
 
Broadcom patches actively exploited VMware flaws, while Windows KDC Proxy RCE threatens remote takeovers. Bybit’s $1.4B hack linked to North Korea’s Lazarus Group, with 77% of funds still traceable. Google’s March Android update fixes 40+ vulnerabilities, and Samsung patches 58 bugs. Lloyds Bank patents AI-driven security tech, and a survey ranks c…
  continue reading
 
Cybersecurity hiring is tightening, prioritizing generalists over specialists. Opus Security’s AI-driven platform automates vulnerability management, while hackers exploit a Paragon Partition Manager zero-day for ransomware. CISA denies refocusing away from Russian threats, and the EU’s new liability law forces stricter cybersecurity compliance. Tr…
  continue reading
 
Verizon & Accenture joined forces to tackle cyber threats, while the U.S. allegedly eased pressure on Russia in cybersecurity policies. Poland’s space agency was hacked, with fingers pointing at Russia. BlackBerry sold its Cylance security assets to Arctic Wolf but remains a player in critical cybersecurity. Meanwhile, a wrongful arrest in an Austr…
  continue reading
 
The Orissa High Court raises concerns over Aadhaar’s security risks. Hackers exploit a Confluence vulnerability to deploy LockBit ransomware. An AI-generated Trump-Musk video hijacks HUD systems. Russia warns its financial sector of a major IT provider hack. CISA alerts on Oracle Agile PLM vulnerability being actively exploited. Netflix’s Zero Day …
  continue reading
 
Lex interviews Andrew Jamison - CEO and Co-founder of Extend - a financial infrastructure platform that helps banks innovate financial product development with capabilities while working with their existing systems, starting with virtual cards. Andrew shares his journey into fintech, detailing his experiences at American Express and the evolution o…
  continue reading
 
Bybit suffered a $2.4B hack, the biggest in crypto history, linked to the Lazarus Group. OpenText launched AI-powered Cybersecurity Cloud to tackle evolving threats. A critical F5 BIG-IP vulnerability (CVE-2025-20029) allows attackers to gain root access. The US Treasury was hacked using a PostgreSQL zero-day. Research exposed security flaws in sma…
  continue reading
 
This week on Hacker Hacks, Microsoft patched two critical vulnerabilities, including an actively exploited Power Pages flaw. Warby Parker faces a $1.5M HIPAA fine, and Medusa ransomware targets UK healthcare giant HCRG. AI infrastructure remains vulnerable due to subsea cable risks, while a Juniper Networks exploit threatens enterprise security. Iv…
  continue reading
 
In this episode, my guest, Digangana Mukherjee talks about a beautiful book "The Home And The World" written by Rabindranath Tagore. She takes us through the character setup,setting of the plot,giving us a glimpse into Tagore's writing and the way how he brilliantly shaped them weaving amazing stories. Digangana also throws light on "Geetanjali",se…
  continue reading
 
Palo Alto’s firewall flaw (CVE-2025-0108) is under attack, while Juniper routers face an authentication bypass issue (CVE-2025-21589). CISA layoffs raise security concerns, and OpenSSH vulnerabilities threaten encryption integrity. Microsoft is investing $700M in Poland’s cybersecurity, Telangana launches new cyber policies, and Dream raises $100M …
  continue reading
 
In this episode, we cover the recent breach of Elon Musk’s DOGE website and concerns about its security flaws, including possible classified data leaks. We discuss the critical vulnerabilities found in government infrastructure management tools, such as Trimble’s Cityworks, and the risks they pose. We also dive into the AI craze, examining the secu…
  continue reading
 
Lex interviews Jayendra Jog - co-founder of Sei Labs, about his professional journey and the innovative Sei protocol—a high-performance parallel blockchain. Jay shares insights from his time at Robinhood, emphasizing the importance of distribution over technology and the challenges of scaling a fintech company. He discusses the limitations of Ether…
  continue reading
 
This episode covers major cybersecurity threats, including Fortinet and CrowdStrike vulnerabilities requiring urgent patches, and China-backed Salt Typhoon’s attacks on telecoms. We discuss Valentine’s Day scams, Google Chrome’s security flaws, and the aftermath of the Optus hack. We also explore AI-driven salary hikes in India, cybersecurity regul…
  continue reading
 
In this episode, author and book lover, Prasanthi has reviewed the amazing book "Ahalya's Awakening" written by Kavita Kane. Prasanthi has very well brought out the essence of the book by taking us through Ahalya's story in an interesting way.She also mentions that reading this book and reviewing it has given her immense joy as this was her first K…
  continue reading
 
This episode covers a Linux OS running inside a PDF, over 1,300 APT attacks on China, Apple’s emergency patch for an iOS zero-day exploit, and Andesite’s $23M AI-powered cybersecurity funding. We also discuss election security staff layoffs at CISA, BBC’s Nick Robinson’s crypto-related Twitter hack, Google Gemini’s AI memory vulnerability, a critic…
  continue reading
 
A man pleaded guilty to hacking the SEC’s X account, falsely announcing Bitcoin ETF approvals. Elon Musk’s influence led to cybersecurity cuts at Citrix, triggering cyberattacks. CISA placed 17 staffers on leave, sparking election security concerns. Cloudflare patched a QUIC vulnerability, while 2.8M devices were used in a major brute-force attack.…
  continue reading
 
Hackers are using 2.8M compromised devices to brute-force security networks. Google Chrome users face a malware threat from fake downloads. A new AnyDesk flaw enables local privilege escalation. WhatsApp’s zero-click spyware attack targeted 90 users. India cancels a defense drone deal over cybersecurity risks. Health NZ’s IT layoffs raise cyberatta…
  continue reading
 
In this episode, my guest Upasana wonderfully captures the essence of 3 books written by Matt Haig. The first one is Midnight Library,second one "The Life Impossible" and the last one " The Comfort Book".Each one is different in the kind of stories potrayed but with similar themes and a focus on Mental Health. Do listen to the episode and share you…
  continue reading
 
U.S. lawmakers propose banning DeepSeek AI from federal devices over China-linked security risks. Hackers use malicious apps to steal crypto wallet phrases via OCR. IMI engineering firm faces a cyber breach. CISA warns of a critical Linux zero-day vulnerability. Russia exploits a 7-Zip flaw in Ukraine. Aadhaar amendments raise privacy concerns. Wor…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play