Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Open Source Security is a media project to help showcase and educate on open source security. Our goal is to give the community a platform educate both developers and users on how open source security works. There’s a lot of good work happening that doesn’t get attention because there’s no marketing department behind it, they don’t have a developer relations team posting on LinkedIn every two hours. Let’s focus on those people and teams then learn what they do and how they do it. The goal is ...
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading

1
The NDS Show - An Intelligence Community Podcast covering Geospatial Intelligence, Open Source Intelligence OSINT, Human Intelligence HUMINT, Military & National Security
The NDS Show
Unlock a world of valuable insights and thought-provoking discussions related to the Special Forces, Military, and Intelligence Community (CIA, NSA, NGA, FBI, Military Intelligence). Things we discuss: GEOINT, OSINT, HUMINT, SIGINT, SOF, Special Forces, Military, Veterans Issues, Army, Navy, Marines, Air Force, Entrepreneurship, Geopolitics, News, Politics, Technology, Artificial Intelligence, Augmented Reality, Cloud Computing, Data Analytics, Government Contracting, Defense Contracting, Bu ...
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
The Dynamist, a podcast by the Foundation for American Innovation, brings together the most important thinkers and doers to discuss the future of technology, governance, and innovation. The Dynamist is hosted by Evan Swarztrauber, former Policy Advisor at the Federal Communications Commission. Subscribe now!
…
continue reading
David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
…
continue reading
Chris Romeo and Robert Hurlbut dig into the tips, tricks, projects, and tactics that make various application security professionals successful. They cover all facets of application security, from threat modeling and OWASP to DevOps+security and security champions. They approach these stories in an educational light, explaining the details in a way those new to the discipline can understand. Chris Romeo is the CEO of Devici and a General Partner at Kerr Ventures, and Robert Hurlbut is a Prin ...
…
continue reading
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
…
continue reading
Welcome to Opt Out, where I sit down with passionate people to learn why privacy matters to them, the tools and techniques they’ve found and leveraged, and where we encourage and inspire others towards personal privacy and data-sovereignty.
…
continue reading
Allison Sheridan's technology geek podcast with an EVER so slight Apple bias
…
continue reading
Marcel Gagne and Evan Leibovitch riff on Linux, Open Source, computers, technology, privacy, the digital economy, movies, video games, the Internet, security, breakfast cereal, and anything else related to the modern, open world.
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
The Open at Intel podcast is about all things open source, from software to security to artificial intelligence to Linux and beyond. Each episode brings you fresh perspectives with sophisticated, leading-edge, free-ranging conversations from some of the best minds in the open source community.
…
continue reading
Calling all .NET developers! Dive into the heart of modern .NET technology with us. We are the go-to podcast for all .NET developers worldwide; providing an audio toolbox for developers who use modern .NET. Our show, previously known as The .NET Core Podcast, is all about keeping you up-to-date and empowered in this ever-evolving field. Tune in for engaging interviews with industry leaders, as we discuss the topics every .NET developer should be well-versed in. From cross-platform wonders to ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Are you sick of the establishment corporate media manipulating the truth in America? We are. The Benny Show is 100% INDEPENDENT and your source for breaking news and raw commentary. Benny Johnson is an award-winning storyteller who hits back in the culture wars. Benny has spent his entire life working at the center of the bare-knuckles brawl for the future of America and has the scars to prove it. Benny delivers cutting, behind-the-scenes insight into the global conflict for freedom in our time.
…
continue reading
Secure Talk reviews the latest threats, tips, and trends on security, innovation, and compliance. Host Justin Beals interviews leading privacy, security and technology executives to discuss best practices related to IT security, data protection and compliance. Based in Seattle, he previously served as the CTO of NextStep and Koru, which won the 2018 Most Impactful Startup award from Wharton People Analytics. He is the creator of the patented Training, Tracking & Placement System and the auth ...
…
continue reading
The New Stack Podcast is all about the developers, software engineers and operations people who build at-scale architectures that change the way we develop and deploy software. For more content from The New Stack, subscribe on YouTube at: https://www.youtube.com/c/TheNewStack
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
The FINOS Open Source in Finance Podcast celebrates open source projects and interesting topics at the cross section of financial services and open source. So far, our industry experts have discussed practical applications of and their real-world experiences with a range of open source projects including desktop interoperability, low code platforms, synthetic data, and data modeling. They’ve also discussed best practices for inner source, common myths about open source and why commercial com ...
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
discussions on topics connected with software development; privacy, security, management, tools, techniques, skills, training, business, soft skills, health
…
continue reading
Signal Jam is a podcast about regaining and maintaining privacy in the face of pervasive corporate and government surveillance. Co-hosts, Jay and Michael, discuss practical steps that anyone can take toward achieving that outcome— no matter how 'tech-savvy' they may be.
…
continue reading

1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
…
continue reading
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
Welcome to Open Comments hosted by The Open Group*, where we’ll discuss things openly with our guests from a variety of backgrounds and from different walks of life. Through this podcast, we hope to give you an inside look into a variety of topics with an equal mix of humor and candor. In this series so far, we have touched on the following topics: Healthcare, HR, Diversity + Access to Technology, Cybersecurity, and lots more. We hope you enjoy our show and look forward to bringing more topi ...
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
Podcast on enterprise technologies including cloud native, GenAI, Security, Data Protection and more.
…
continue reading
Welcome to Betatalks the podcast, in which we talk with friends from the development community. We chat not only about technology, but what drives them, inspires them and makes them unique. Rick (Cloud Solution Architect at Microsoft) and Oscar (CTO at Virtual Vaults), invite developers, makers, Open Source maintainers and other amazing people from the .NET and Azure development community. Looking for more content? Have a look at our Betatalks video's.
…
continue reading
Global Bob who is a cyber security expert and political science hobbyist brings you a show that fuses these topics together to explain in simple terms the interaction between the two. He uses his years of experience in both the government, commercial and private sector to give a unique perspective on these topics.
…
continue reading
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
…
continue reading
Open source is different. How different would the world be if we used open source concepts more widely? This micro podcast looks at the open source philosophy and how open source can change the world. Each episode is just over two minutes long. Watch video versions on YouTube and Twitter.
…
continue reading
Revenera experts are joined by industry leaders for discussions on all the latest talking points in the world of software.
…
continue reading
From global technology consulting firm Tag1 Consulting, Tag1 Team Talks are wide-ranging, in-depth conversations about implementing various open-source technologies, including the business prerogatives and technical ins and outs with leading web developers and technologists. Join us as we explore trends in open source. About Tag1 At Tag1, we are redefining the boundaries of digital possibilities. As a leading name in the industry, we are committed to delivering innovative and tailored soluti ...
…
continue reading
Jaron Swab, a software engineer, shares tips around Linux, programming, and open source. So you can stay on top of your privacy, security, and productivity. Discover what it means to be a hacker from a self taught software engineer. You'll learn how to land a tech job, amp up your computer efficiency, and leave behind the walled gardens of big tech. Since 2005, Jaron has exercised his love for coding and taking technology into his own hands. It's Jaron and a microphone; a one on one approach ...
…
continue reading

1
HeroDevs Secures $125M to Extend Life of Critical Open Source Software
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36In this episode, we dive deep into HeroDevs' recent $125 million strategic growth investment, a move that signals a major expansion in the fight against the vulnerabilities of end-of-life (EOL) open source software. Based in Salt Lake City, HeroDevs has carved out a critical niche—providing "Never-Ending Support" (NES) to ensure security, complianc…
…
continue reading

1
OSINT AI Tech Predicts Global Threats and Powers Risk Strategies - SEERIST's John Goolgasian
1:14:55
1:14:55
Play later
Play later
Lists
Like
Liked
1:14:55Open Source Intelligence powered by Artificial Intelligence to track global security threats, empower military intelligence operations, mitigate environmental disasters, and predict operational risks. John Goolgasian, President of SEERIST federal shares his journey from the intelligence community with Geospark Analytics and leading innovation at Se…
…
continue reading

1
Open source microprocessors with Jan Pleskac
30:51
30:51
Play later
Play later
Lists
Like
Liked
30:51In this episode Jan Pleskac, CEO and co-founder of Tropic Square, shares insights on the challenges and innovations in creating open and auditable hardware. While most hardware is very closed, Tropic Square is working to change this. WE discuss how open source can enhance security, the complexities of integrating third-party technologies, and the f…
…
continue reading

1
Building India's Open Source Security Community: From Developer Nation to Security Champions
18:46
18:46
Play later
Play later
Lists
Like
Liked
18:46Join CRob as he sits down with Ram Iyengar, OpenSSF's India community representative, to explore the unique challenges and opportunities of promoting open source security in one of the world's largest developer communities. Ram shares his journey from computer science professor to developer evangelist, discusses the launch of LF India, and reveals …
…
continue reading

1
Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein
1:00:00
1:00:00
Play later
Play later
Lists
Like
Liked
1:00:00Open Source vs Commercial: How "Winning Culture" Has Made Us More Vulnerable | Greg Epstein Silicon Valley's shift from collaborative open-source principles to winner-take-all commercial dominance hasn't just changed business models—it's made us fundamentally more vulnerable. When companies prioritize winning everything over building secure, collab…
…
continue reading

1
Episode 158: Reality 2025: Bridging AI, Security, and Open Source Challenges
34:08
34:08
Play later
Play later
Lists
Like
Liked
34:08In this episode of Reality 2.0, Doc and Katherine return after a long hiatus to discuss a range of topics including AI and security concerns, the evolution of cloud-native technologies, and the growing complexity of AI-related projects within various Linux Foundation groups. The conversation also touches on approaches to AI and privacy, the potenti…
…
continue reading

1
Koske Malware Hides in Panda Images, Weaponizes AI to Target Linux
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03A new and highly sophisticated malware strain named Koske is redefining the threat landscape for Linux environments. Suspected to be partially developed using artificial intelligence, Koske introduces novel and highly evasive techniques, blending image files, rootkits, and adaptive cryptomining logic to create a stealthy and persistent backdoor int…
…
continue reading
International law enforcement arrest the suspected operator of a major Russian dark web cybercrime forum. DHS is said to be among the agencies hit by the Microsoft SharePoint zero-day. The Fire Ant cyberespionage group targets global enterprise infrastructure. A Steam game is compromised to distribute info-stealing malware. Mitel Networks issues se…
…
continue reading

1
Dragonfly: The Secrets of a Top-Tier Crypto VC - Haseeb Qureshi
1:29:13
1:29:13
Play later
Play later
Lists
Like
Liked
1:29:13Founded in 2018, Dragonfly has quickly become one of the most prestigious crypto VCs. Dragonfly was one of the first to adopt a global approach to backing founders and disruptive tech, all while building a strong brand that allowed them to secure top-tier deals. Join us for a fascinating discussion with Haseeb Qureshi, managing partner at Dragonfly…
…
continue reading

1
Operation Checkmate: BlackSuit Ransomware’s Dark Web Sites Seized
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19BlackSuit, the ransomware strain known for crippling critical sectors and demanding multi-million dollar payouts, has just suffered a devastating blow. In a coordinated international law enforcement operation codenamed "Operation Checkmate," authorities—including the U.S. Department of Justice, Homeland Security Investigations, FBI, Europol, the UK…
…
continue reading

1
PANIC: Trump Just REVEALED Horrifying Clinton Epstein Ties | Maxwell Handing Feds BOXES of Evidence, With Guests Alina HabbaRep. Pat Harrigan and TX Land Commissioner Dawn Buckingham
2:01:02
2:01:02
Play later
Play later
Lists
Like
Liked
2:01:02Ghislaine Maxwell to meet with DOJ again today after she answered 'every single question' yesterday, Former Biden Chief of Staff Ron Klain cooperates in health coverup probe, Alina Habba, Rep. Pat Harrigan and TX Land Commissioner Dawn Buckingham join the show. Check Out Our Partners:American Financing: Save with https://www.americanfinancing.net/b…
…
continue reading

1
Coyote Malware Exploits Microsoft UI Automation in First-Ever Wild Attack
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14A new banking trojan called Coyote has emerged as a groundbreaking cyber threat, becoming the first known malware in the wild to exploit Microsoft’s User Interface Automation (UIA) framework—an accessibility tool originally designed to help users interact with Windows interfaces. But in the hands of attackers, UIA becomes a weapon of stealth and pr…
…
continue reading

1
No Fix Coming: Remote Code Execution Flaw in 1,300 LG Security Cameras
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12A newly disclosed critical vulnerability, CVE-2025-7742, is putting hundreds of LG Innotek LNV5110R security cameras at risk around the world—including within critical infrastructure. This high-severity authentication bypass flaw allows remote attackers to gain full administrative control without credentials, giving them access to live camera feeds…
…
continue reading

1
How Fal.ai Went From Inference Optimization to Hosting Image and Video Models
52:41
52:41
Play later
Play later
Lists
Like
Liked
52:41Fal.ai, once focused on machine learning infrastructure, has evolved into a major player in generative media. In this episode of The New Stack Agents, hosts speak with Fal.ai CEO Burkay Gur and investor Glenn Solomon of Notable Capital. Originally aiming to optimize Python runtimes, Fal.ai shifted direction as generative AI exploded, driven by tool…
…
continue reading

1
Privacy 101: Passwords, 2FA, and Passkeys
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55SIGNAL JAM // EPISODE 2 // Privacy 101: Passwords, 2FA, and Passkeys Original Air Date: 2025-07-25 In this episode, we discuss securing your digital accounts with strong passwords, using password managers, two factor authentication, and passkeys. / / / – – SHOW NOTES – – / / / Intro: The Office - 'WUPHF.com' - S07E09 Updates: Chat with us on Signal…
…
continue reading

1
Episode 30 - From Public Posts to Private Profiles: The Art of Open Source Intelligence
31:33
31:33
Play later
Play later
Lists
Like
Liked
31:33Send us a text Your digital footprint reveals far more about you than you might realize. From vacation photos that pinpoint your exact hotel to scattered social media posts that unveil your daily routines, the breadcrumbs we leave across the internet create a comprehensive map of our lives for anyone who knows how to read them. This week, we dive i…
…
continue reading

1
ToolShell Exploited: China-Linked Hackers Breach NNSA and U.S. Government Networks
1:14:36
1:14:36
Play later
Play later
Lists
Like
Liked
1:14:36In one of the most concerning state-sponsored cyber incidents of the year, Chinese hackers exploited zero-day vulnerabilities in Microsoft SharePoint to breach the networks of the National Nuclear Security Administration (NNSA)—the U.S. agency responsible for managing the nation's nuclear arsenal. The attackers, part of a suspected Chinese state-sp…
…
continue reading
The White House unveils its plan for global AI dominance. Microsoft warns that recent SharePoint server exploitation may extend to ransomware. A phishing campaign targeting the U.S. Department of Education’s grants portal. The FBI issues a warning about “The Com” cybercriminal group. SonicWall urges users to patch a critical vulnerability. A new su…
…
continue reading

1
Massive NPM Breach: Malicious Packages Spread via Compromised Maintainer Accounts
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44In this episode, we expose the alarming supply chain attack that compromised millions of JavaScript projects across the globe. This sophisticated breach targeted the NPM ecosystem, infecting widely-used packages like eslint-config-prettier and is, through a coordinated phishing campaign and the exploitation of non-expiring legacy access tokens. Att…
…
continue reading

1
🚨US House Votes to SUBPOENA Bill and Hillary Clinton Over Epstein | DOJ Meeting Maxwell Right NOW, with Guests Chairman Jim Jordan Rep. Chip Roy and Rep. Mark Harris
1:51:01
1:51:01
Play later
Play later
Lists
Like
Liked
1:51:01House panel votes to subpoena Bill and Hillary Clinton over links to Jeffrey Epstein as DOJ meets with Ghislaine Maxwell, Justice Department Announces Formation of Strike Force to Assess Evidence Publicized by Tulsi Gabbard, Chairman Jim Jordan, Rep. Chip Roy and Rep. Mark Harris join the show. Check Out Our Partners: MASA CHIPS: Go to http://masac…
…
continue reading

1
Clorox Sues Cognizant Over $356M Cyberattack: Who's Really to Blame?
44:38
44:38
Play later
Play later
Lists
Like
Liked
44:38In one of the most dramatic cybersecurity legal battles of the past year, Clorox has filed a lawsuit against IT services giant Cognizant, accusing the company of gross negligence that allegedly enabled a catastrophic 2023 cyberattack. The breach wreaked havoc on Clorox's operations—causing widespread product shortages, a multibillion-dollar hit to …
…
continue reading

1
A Free Speech Recession? w/Ashkhen Kazaryen and Jacob Mchangamaa
1:01:54
1:01:54
Play later
Play later
Lists
Like
Liked
1:01:54Is free speech in global decline? A new survey suggests public support for free expression is dropping worldwide, with citizens in authoritarian countries like Venezuela and Hungary showing stronger commitment to free speech than many living in democracies. From the unfulfilled digital promises of the Arab Spring to Europe's controversial Digital S…
…
continue reading

1
UK Moves to Ban Ransomware Payments for Public Sector and Critical Infrastructure
48:22
48:22
Play later
Play later
Lists
Like
Liked
48:22In a landmark move to disrupt the financial engine powering ransomware attacks, the United Kingdom is pushing forward with legislation that would ban ransom payments across the public sector and critical national infrastructure (CNI). This sweeping proposal covers everything from local councils and schools to healthcare providers like the NHS, aimi…
…
continue reading
The National Nuclear Security Administration was among the organizations impacted by the SharePoint zero-day. Experts testify before congress that OT security still lags.The FBI warns healthcare and critical infrastructure providers about Interlock ransomware. New York proposes new cybersecurity regulations for water and wastewater systems along wi…
…
continue reading

1
New SysAid Vulnerabilities Added to CISA’s KEV List: XXE Flaws Could Enable RCE
26:10
26:10
Play later
Play later
Lists
Like
Liked
26:10Two newly added vulnerabilities in SysAid’s On-Prem IT support software — CVE-2025-2775 and CVE-2025-2776 — have officially joined the Cybersecurity and Infrastructure Security Agency (CISA)’s Known Exploited Vulnerabilities (KEV) catalog, signaling increased concern around their potential abuse. While there are no confirmed reports of public explo…
…
continue reading

1
Trump Just Dropped The Smoking Gun Evidence EXPOSING Treason | Obama, Comey React in PANIC, with Guests Senator Josh Hawley, George Papadopolous and RNC Chair Michael Whatley
2:06:13
2:06:13
Play later
Play later
Lists
Like
Liked
2:06:13DNI Tulsi Gabbard drops new docs exposing Barack Obama’s role in Russiagate, Obama responds in panic, George Papadopoulos, Sen. Josh Hawley, RNC Chair Michael Whatley join the show. JOIN The Benny Brigade: https://www.bennyjohnson.com/brigade Check Out Our Partners: Advantage Gold: Get your FREE wealth protection kit https://www.abjv1trk.com/F6XL22…
…
continue reading

1
Lumma Stealer Returns: Malware-as-a-Service Resurges After Global Takedown
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16In this episode, we unpack the rapid and concerning resurgence of Lumma Stealer, a sophisticated Malware-as-a-Service (MaaS) platform, just months after a major international takedown. Despite Microsoft, the FBI, Europol, and global partners dismantling over 2,500 malicious domains and seizing critical infrastructure in May 2025, Lumma Stealer has …
…
continue reading

1
Embedded Executive: Where To Place the Compute In a Car | NXP
12:04
12:04
Play later
Play later
Lists
Like
Liked
12:04Compute in the automobile is (again) moving toward consolidation and away from the discrete nature of multiple processors around the vehicle. Is this a trend that’s going to stick? I guess it depends on who you ask. In this case, I asked Robert Moran, the GM & VP for Automotive Processors at NXP Semiconductors. As we add AI and autonomous drive to …
…
continue reading

1
Cisco ISE Critical Flaws Now Actively Exploited: No Workarounds, Just Root Access
37:32
37:32
Play later
Play later
Lists
Like
Liked
37:32Hackers are actively exploiting a trio of critical zero-day vulnerabilities in Cisco’s Identity Services Engine (ISE) and Passive Identity Connector (ISE-PIC), prompting urgent patching directives from the company. The flaws — CVE-2025-20281, CVE-2025-20282, and CVE-2025-20337 — each carry a maximum CVSS severity score of 10.0, indicating the highe…
…
continue reading

1
Risky Business #799 -- Everyone's Sharepoint gets shelled
1:13:55
1:13:55
Play later
Play later
Lists
Like
Liked
1:13:55Risky Biz returns after two weeks off, and there sure is cybersecurity news to catch up on. Patrick Gray and Adam Boileau discuss: Microsoft tried to make outsourcing the Pentagon’s cloud maintenance to China okay (it was not) She shells Sharepoint by the sea-shore (by ‘she’ we mean ‘China’) Four (alleged) Scattered Spider members arrested (and bai…
…
continue reading

1
ToolShell: SharePoint Zero-Day Chain Gives Hackers Full Remote Access
58:23
58:23
Play later
Play later
Lists
Like
Liked
58:23A new wave of zero-day attacks—collectively known as ToolShell—is actively targeting Microsoft SharePoint servers, with two vulnerabilities (CVE-2025-53770 and CVE-2025-53771) allowing unauthenticated remote code execution and identity control bypass. First observed in high-value targets across government, critical infrastructure, and manufacturing…
…
continue reading
Confusion persists over the Microsoft Sharepoint zero-days. CrushFTP confirms a zero-day under active exploitation. The UK government proposes a public sector ban on ransomware payments. A new ransomware group is using an AI chatbot to handle victim negotiations. Australia’s financial regulator accuses a wealth management firm of failing to manage …
…
continue reading

1
CVE-2025-54309: CrushFTP Zero-Day Exploited in Global Admin Access Attacks
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13A critical zero-day vulnerability in CrushFTP (CVE-2025-54309) is being actively exploited, giving attackers administrative access to over a thousand unpatched servers globally. This severe security flaw—caused by improper validation in the AS2 protocol—has exposed enterprise-managed file transfer (MFT) systems across the US, Europe, and Canada. Se…
…
continue reading

1
Episode 073 - Chief Persuasion Officer: The New CISO Mindset - Rick McElroy
28:33
28:33
Play later
Play later
Lists
Like
Liked
28:33Chief Persuasion Officer: The New CISO Mindset NetSPI Field CISO and host of Agent of Influence podcast Nabil Hannan sat down with Rick McElroy to talk about the role of the CISO, leveraging AI in the cybersecurity space, vendor collaboration, and career advice. + + + Find more episodes on YouTube or wherever you listen to podcasts, as well as at n…
…
continue reading

1
Ghislaine Maxwell Breaks SILENCE: Will Expose EVERYTHING on Epstein Clients | We Have Inside Scoop, with Guests Brett Tolman and Viva Frei
2:07:28
2:07:28
Play later
Play later
Lists
Like
Liked
2:07:28DOJ to meet with Ghislaine Maxwell on Epstein Clients, Department of Justice Honors Senate Judiciary Committee Request for Information Related to Clinton Email Investigation, Viva Frei and Brett Tolman join the show Check Out Our Partners:BUNKR: Go to https://bunkr.life/BENNY and use code “BENNY” to get your 25% off your family plan American Financ…
…
continue reading

1
Dell Breach by World Leaks: Extortion Attempt Hits Demo Platform
23:49
23:49
Play later
Play later
Lists
Like
Liked
23:49Dell Technologies is the latest target in a growing trend of data extortion attacks as threat actors pivot away from traditional ransomware. The cybercrime group known as World Leaks—a rebrand of the former Hunters International gang—has claimed responsibility for breaching Dell’s Customer Solution Centers (CSC), a sandbox environment used primaril…
…
continue reading

1
Critical VPN Vulnerability: ExpressVPN Exposed IPs via RDP Misrouting
59:16
59:16
Play later
Play later
Lists
Like
Liked
59:16A critical vulnerability in ExpressVPN’s Windows client has put a spotlight on the often-overlooked dangers of debug code making its way into production software. This episode dives into how a debug configuration error allowed Remote Desktop Protocol (RDP) traffic to bypass the VPN tunnel, potentially exposing users’ real IP addresses and compromis…
…
continue reading

1
Aram Hovsepyan -- Your Security Dashboard is Lying to You: The Science of Metrics
40:52
40:52
Play later
Play later
Lists
Like
Liked
40:52Aram Hovsepyan joins the podcast today to chat about the misconceptions behind common security metrics. Aram tells us how total vulnerability counts and CVSS scores can be misleading and he introduces us to the Goal Question Metric framework, this framework is a better approach to building truly effective security dashboards. Learn about the critic…
…
continue reading
Uncover the truth behind NATO’s recent defence spending plans and the strategic implications of the organisation’s ambitious 5% GDP target. Janes experts Andrew MacDonald and Guy Anderson join hosts Harry Kemsley and Sean Corbett to discover how open-source intelligence uncovers the reality behind political declarations and spending plans. Can coun…
…
continue reading

1
Dior Data Breach Exposes U.S. Customer Info in LVMH Vendor Attack
41:11
41:11
Play later
Play later
Lists
Like
Liked
41:11In this episode, we unpack the January 2025 data breach at Dior, the iconic luxury fashion house, which exposed sensitive personal information of U.S. customers—including names, addresses, and even Social Security and passport numbers. Although payment data remained secure, the incident's impact is substantial, both in terms of customer trust and c…
…
continue reading

1
StrongestLayer Raises $5.2M to Fight AI-Powered Phishing with TRACE
52:49
52:49
Play later
Play later
Lists
Like
Liked
52:49In an era where generative AI is being used not just for productivity but for precision cybercrime, a San Francisco-based startup, StrongestLayer, is taking a bold stand. Backed by $5.2 million in seed funding from Sorenson Capital and others, the company is pioneering a radically new approach to cybersecurity with its AI-native platform TRACE (Thr…
…
continue reading
Microsoft issues emergency updates for zero-day SharePoint flaws. Alaska Airlines resumes operations following an IT outage. The UK government reconsiders demands for Apple iCloud backdoors. A French Senate report raises concerns over digital sovereignty. Meta declines to sign the EU’s new voluntary AI code of practice. A new report claims last yea…
…
continue reading

1
750,000 Records Exposed: Inside the TADTS Data Breach by BianLian
1:03:29
1:03:29
Play later
Play later
Lists
Like
Liked
1:03:29In July 2024, The Alcohol & Drug Testing Service (TADTS), a Texas-based company handling sensitive employment-related data, suffered a catastrophic data breach. Nearly 750,000 individuals had personal information compromised—Social Security numbers, financial data, driver’s licenses, health insurance info, and even biometric identifiers. The attack…
…
continue reading

1
🚨Obama-Gate Breakdown DEEP Dive: Will Obama Be Arrested Soon? Intel Community Labels Him ‘TRAITOR’ with Guests General Michael Flynn, Mike Davis, Julie Kelly, And David Schoen
2:09:34
2:09:34
Play later
Play later
Lists
Like
Liked
2:09:34Trump posts video showing Obama getting arrested after intel community accuses him of treason, Adam Schiff faces calls for prosecution over mortgage fraud, General Michael Flynn, Mike Davis, Julie Kelly and David Schoen join the show Check Out Our Partners: BUNKR: Go to https://bunkr.life/BENNY and use code “BENNY” to get your 25% off your family p…
…
continue reading

1
SS7 Is Still Broken: How Surveillance Firms Are Bypassing Telco Defenses
50:12
50:12
Play later
Play later
Lists
Like
Liked
50:12A new attack technique is exposing just how vulnerable global mobile networks remain in 2025. Cybersecurity firm Enea has discovered a surveillance operation that bypasses SS7 firewalls by exploiting a subtle weakness in the TCAP encoding layer—allowing stealth location tracking of mobile users across borders. The method? Tampering with the IMSI fi…
…
continue reading

1
#730: The Frugal Architect w/ Werner Vogels: At Too Good To Go, Practical Engineering Keeps Food Out of the Bin
36:16
36:16
Play later
Play later
Lists
Like
Liked
36:16In the fifth episode of "The Frugal Architect" podcast, Werner and co-host Simon Elisha welcome Morten Keldebaek (CTO) and Robert Hjertmann from Too Good To Go. Too Good To Go is the world's largest marketplace for surplus food, connecting consumers with restaurants, cafes, and grocery stores to rescue food that would otherwise go to waste. The dis…
…
continue reading