show episodes
 
Artwork

1
Hacked

Hacked

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
  continue reading
 
Official Website: https://psysecure.com/podcast/ Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
  continue reading
 
Artwork

1
All Things Secured | Online Privacy & Security on Odysee

All Things Secured | Online Privacy & Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
  continue reading
 
Artwork

1
Security Insights - Cybersecurity for Real-World Workplaces

Ivanti: Cybersecurity and Information Technology Solutions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
  continue reading
 
Artwork

1
Happy Hour Hang Out

Big Blend Radio & Magazines

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Step into Big Blend Radio’s virtual speakeasy, pull up a seat and enjoy lighthearted yet success-driven Happy Hour Hang Out conversations between people and experts from across the country, around the world, and all walks of life. PS: The speakeasy password is Wiggie!
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork

1
SSO

Waleedkhankheshki

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
The Rajasthan SSO ID Portal offers a single sign-on system for accessing over 100 government services online, simplifying access with one username and password. It provides services like e-Mitra, Bhamashah Card, and more, with registration options via Jan Aadhaar or Google Account.
  continue reading
 
Artwork

1
Dashboard Diaries

Atypical Artists

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome soft, sad freaks! Once a month, writer and longtime Tumblr user Lauren Shippen and longtime user-slash-Tumblr-employee Cher McAnelly dive deep into our favorite fandom site. We talk trending topics, share our new ships, and forecast upcoming fandoms. If you’ve ever gone feral over a fic or bonkers about one of your blorbos, this podcast is for you! And remember: the password to the secret clubhouse is “shoelaces”. This podcast is not produced by, nor officially affiliated with Tumblr ...
  continue reading
 
In this episode, Tyler and Bob break down cybersecurity in a fun, human way—no tech jargon overload, just real tips and tricks to keep your business safe. From password tricks and phishing scams to the importance of backups and cloud security, they share easy-to-follow advice with plenty of humour and relatable insights. If you’ve ever ignored an update or used ”password123,” this one’s for you. Tune in, laugh a little, and learn how to become a cybersecurity rockstar!
  continue reading
 
Artwork

1
Pudding On The Wrist

Frozen Lazuras

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Pudding On The Wrist is: It’s a car crash on television at 3:00 in the morning. A backward secret message carved into an oak tree at the edge of town. A whispered password between the washer woman and the fish monger.
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Artwork

1
ChinesePod - Beginner

ChinesePod LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
ChinesePod makes learning Mandarin fun and easy. It isn't your typical language learning resource - we think you'll be entertained as well! If you’re just trying to learn some survival Chinese or looking to start a lifelong relationship with the language, this ChinesePod - Beginner Level Podcast Channel is where to start. Expand your Mandarin Chinese learning experience by also SUBSCRIBING to ChinesePod - Intermediate and ChinesePod - Advanced Podcast channels. For more lessons, go to www.ch ...
  continue reading
 
The Gathering’s talks are generally tied to one or more of the 12 Steps, but are always guided by spiritual concepts, principles and ideas common to most faiths. Topics are drawn from a variety of sources: the 12 steps, many of the well-known wisdom texts, science and other teachers that speak to a spiritual solution to life's challenges. About Roger B. Roger has been in recovery for over 46 years and has spent thousands of hours in service, sharing his experience, strength and hope. He has ...
  continue reading
 
Artwork

1
Rapidlikes

balesapatricks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
We use an agile approach to test assumptions and connect with the needs of your audience early and often. To start the promotion, we only need a link to the song you want us to promote. We will never ask you for your password.
  continue reading
 
Artwork

1
The Best One Yet

Nick & Jack Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Feel brighter every day with our 20-minute pop-biz news podcast. The 3 business stories you need, with fresh takes you can pretend you came up with — Pairs perfectly with your morning oatmeal ritual. Hosted by Jack Crivici-Kramer & Nick Martell. Formerly known as “Snacks Daily”, Nick and Jack continue their podcast independent from Robinhood.
  continue reading
 
Artwork

1
ITech Insights

PICS ITech

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
ITech Insights are short easy to understand video's meant to provide further education on many of the technologies we already use in our day to day business, as well as to introduce new and useful tools for saving time, money, and above all aggravation.
  continue reading
 
Artwork
 
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
  continue reading
 
Artwork
 
Have you ever wanted to send classified information within your work environment, to family or friends, but were afraid to do it through the Online, due to the fact that some malicious hacker was able to spy on you? Tornote is a free web service that allows you to submit completely hidden articles through the Online. It’s quick, elementary, and generally not obtrusive asking for a password or user registration.
  continue reading
 
Artwork

1
Knowledgers

sebtiskills176

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Welcome to Knowledgers, the informational podcast for all of you who are looking to navigate the world of online portal logins, registration, and account management. We provide deep knowledge about the processes of various websites, telling about how to sign up, login, and troubleshoot common issues users face and provide solution. From password recovery and id recovery to dealing with blocked accounts and security concerns, we provide step-by-step processes and details to expert insights.
  continue reading
 
This ministry is designed to spread the gospel of Jesus Christ throughout the world overseen by Pastor Ronnie and Prophet Tonya Cantrell. Hidden Riches Ministries, Inc P.O. Box 41 Gladeville, TN 37071 Email: [email protected] Website: www.hiddenrichesministries.com 615-530-0725 Services: Tuesday 7 PM: Prayer Call in 603-663-5504 no password required Thursday 7 PM: ZOOM meeting ID: 7851177424 password: Anointed Call in: 312-626-6799 password: 96683778 https://us02web.zoom.us/j/ ...
  continue reading
 
Dr. Alex Peroff and Dr. Neil Spinner host the electrochemistry podcast where we discuss all things electrochemistry. We discuss troubleshooting electrochemistry problems in a light hearted and fun way. We also have interviews with other electrochemists and play electrochemistry based games such as madlibs, 2 truths and a lie, and password (all electrochemistry themed).
  continue reading
 
Artwork

1
Single Sign-On ID

SSOID Rajasthan

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Welcome to our podcast! Today, we're discussing the SSO ID, a Single Sign-On portal launched by the Government of Pakistan. With SSO ID, citizens can access multiple government services, including pension, tax, health insurance, education, and passport services, using just one username and password. To get started, visit the official website and register. It's easy, convenient, and secure. Thanks for tuning in!
  continue reading
 
Artwork

1
The Real Swing

The small town couple next door.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to: The Real Swing Podcast Real People. Real Life. Real Swingers. We are just your average, small-town, middle-aged married couple, sharing our journey into the lifestyle of swinging. Come along with us while we share our sexy adventures, wild experiences, and questionable decisions with you. Want to share some of your questions or stories with us? We love to share. Email us at [email protected].
  continue reading
 
This is a repository for recordings for Gridcoin community hangouts held on mumble. Thanks to the beyond bitcoin community we're able to hold these mumble meetings, we are optimistic regarding our future community collaboration. If you'd like to participate, download Mumble and setup using these details: Label: Beyond Bitcoin - Gridcoin Address: mumble.grcnode.co.uk Port: 64738 Username: Password: w0rldCh@NG3rsUN!t3
  continue reading
 
Loading …
show series
 
In this episode, we unpack two newly disclosed Linux vulnerabilities—CVE-2025-5054 and CVE-2025-4598—discovered by the Qualys Threat Research Unit (TRU). These race condition flaws impact Ubuntu’s apport and Red Hat/Fedora’s systemd-coredump, exposing a little-known but critical attack vector: core dumps from crashed SUID programs. We dive into how…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Steve Knight, former CISO, Hyundai Capital America Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks …
  continue reading
 
The most trusted news brand in America? It’s… The Weather Channel (for the 4th straight year). Netflix presented all its new content at a big unveil called “Tadum”… and it highlights the Netflix Paradox. Dr. Squatch is the biggest soap startup in America… because of “The Jester’s Privilege.” Plus, Tinder’s newest feature is a height filter… #SaveTh…
  continue reading
 
Meta and Yandex are de-anonymizing Android users’ web browsing identifiers LummaC2 fractures as Acreed malware becomes top dog Hewlett Packard Enterprise warns of critical StoreOnce auth bypass Huge thanks to our sponsor, Conveyor Tired of herding cats to complete customer security questionnaires? Your team probably spends hours daily juggling the …
  continue reading
 
vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%…
  continue reading
 
In this episode, we dissect Google's recent and upcoming decisions to distrust several Certificate Authorities (CAs) within the Chrome Root Store, including Entrust, Chunghwa Telecom, and Netlock. These high-impact moves are rooted in Chrome's strict enforcement of compliance, transparency, and security standards for public trust. We explore the ro…
  continue reading
 
Two critical, actively exploited vulnerabilities in vBulletin forum software—CVE-2025-48827 and CVE-2025-48828—have put thousands of websites at immediate risk of full system compromise. In this episode, we dissect how these flaws, triggered by insecure usage of PHP’s Reflection API and abuse of vBulletin’s template engine, allow unauthenticated at…
  continue reading
 
Your real job isn’t just launching ads—it’s influencing the people who say yes to them. In this episode, Josh and John talk leadership, compliance, and why being strategic inside your bank matters just as much as what you put out into the world. The post Episode 188 | Why Leadership Matters More Than Likes appeared first on Marketing Money Podcast.…
  continue reading
 
In this episode, we dissect the JINX-0132 cryptojacking campaign — a real-world example of how threat actors are exploiting cloud and DevOps environments to mine cryptocurrency at scale. We unpack how cybercriminals targeted misconfigured Docker APIs, publicly exposed HashiCorp Nomad and Consul servers, and vulnerable Gitea instances — turning ente…
  continue reading
 
Steve Madden’s controversial founder boosted the stock 25% last week… because of a podcast interview. Costco’s biggest selling product? Gasoline (by far)... We think gas is like diapers, but for adults. Ukraine’s crazy self-thinking drone attack on Russia changes warfare forever… It’s tech Pearl Harbor. Plus, the untold origin story of the Tommy Ba…
  continue reading
 
Microsoft and CrowdStrike partner to link threat actor names Qualcomm sees Adreno bugs under active exploitation New details on proposed CISA cuts Huge thanks to our sponsor, Conveyor Does trying to get the security questionnaire done and back to your customer ever feel like you’re herding cats? It’s not answering questions - most of you have autom…
  continue reading
 
Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play