show episodes
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
  continue reading
 
Welcome to Uncanny Valley—an insider look at the people, power, and influence of Silicon Valley—where each week, WIRED’s writers and editors bring you original reporting and analysis about some of the biggest stories in tech. On Tuesdays, WIRED’s Zoë Schiffer has an urgent conversation about this week in the news. And on Thursdays, WIRED’s Global Editorial Director Katie Drummond is joined by Lauren Goode, Michael Calore, to break down a recent story or phenomena bubbling up in Silicon Valle ...
  continue reading
 
Stay ahead of the latest cybersecurity trends with Cyberside Chats—your go-to cybersecurity podcast for breaking news, emerging threats, and actionable solutions. Whether you’re a cybersecurity pro or an executive who wants to understand how to protect your organization, cybersecurity experts Sherri Davidoff and Matt Durrin will help you understand and proactively prepare for today’s top cybersecurity threats, AI-driven attack and defense strategies, and more!
  continue reading
 
Artwork

1
Oblivion VPN

Ravins

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
Oblivion VPN provides top-tier online privacy and security with fast speeds, reliable encryption, and global server access. Protect your data and enjoy unrestricted browsing. Visit Oblivion VPN (https://oblivionvpn.com/) to start today! Hosted by Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
Artwork

1
The Cyber Cookie

CommSec Communications and Security Limited

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
  continue reading
 
Artwork

1
govtech.com Security News Podcast

Ira Victor with Samantha Stone

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
  continue reading
 
Artwork

1
The Is My Brand Protected? Podcast

AMD LAW Group: Brand Protection Lawyers

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
This is a podcast about innovation, game-changing, up-leveling and trailblazing business concepts and trends mostly technology focused. We discuss current events, news and provide interviews all centered on answering the crucial question, IS MY BRAND PROTECTED? Listening to this podcast is NOT to be construed as LEGAL ADVICE. Sometimes we do not discuss legal topics at all, sometimes we just chat about innovation but we are lawyers. We may help you realize that you really need to seek profes ...
  continue reading
 
Artwork

1
Distilled Security Podcast

Justin Leapline, Joe Wynn, and Rick Yocum

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
  continue reading
 
Artwork

1
Tech Talks Daily

Neil C. Hughes

icon
Unsubscribe
icon
Unsubscribe
Daily
 
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
  continue reading
 
The Agenda podcast explores the promises of crypto, blockchain and Web3, and how everyday people level up and improve their lives with these new technologies. It covers everything from new blockchain tech to Bitcoin mass adoption and cultural shifts in Web3. Every two weeks, Cointelegraph’s The Agenda podcast tackles a new topic by speaking with the innovators and experts building the Web3 the world actually needs. After all, crypto is for everyone, not just rocket scientists, venture capita ...
  continue reading
 
Loading …
show series
 
xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
  continue reading
 
What does it take to turn a moment of frustration into a global mission to tackle waste? At the AWS Summit in London, I sat down with Tessa Clarke, co-founder and CEO of Olio, to explore how a single idea born on a snowy Swiss street evolved into a powerful tech platform reshaping how communities think about consumption, sharing, and sustainability…
  continue reading
 
Holography has long lived in the shadow of science fiction, but what happens when it’s finally real and ready for the consumer market? In this episode recorded at Tech Talks Daily, I sit down with Darran Milne, co-founder and CEO of VividQ to unpack what sets true holography apart from the gimmicks. With a background in quantum physics and years of…
  continue reading
 
What if companies could tap into powerful behavioral AI without compromising user privacy or crossing legal lines? In this episode of Tech Talks Daily, I sit down with Frank Portman, CTO of Yobi, to explore how his team is building foundation models grounded in real user behavior, backed by ethically sourced and consented data. Frank shares how Yob…
  continue reading
 
Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
  continue reading
 
When we talk about the future of technology, it is easy to focus on the tools, trends, and innovations that dominate headlines. But behind every breakthrough is a human story, and behind every system are individuals navigating an industry that has not always welcomed them equally. That is why I sat down with Sue Harnett, founder and CEO of Rewritin…
  continue reading
 
Elon Musk says he’s stepping back from his role with the so-called Department of Government Efficiency to turn his attention to his businesses—most urgently to Tesla, which has faced global sales slumps in recent months. Today on the show, we discuss how our understanding of DOGE has evolved over the past five months and what we think will happen w…
  continue reading
 
Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
  continue reading
 
When we talk about the future of IT services, the conversation often revolves around the potential of AI and automation. But what does that really mean when applied at scale, across legacy infrastructure, evolving customer expectations, and real-world operational challenges? In today’s episode, I sat down with Manish Tandon, CEO of Zensar Technolog…
  continue reading
 
Send us a text Surgical robotics stands at the fascinating crossroads of cutting-edge technology and life-saving medical innovation. Dave Saunders, a seasoned technology leader with three decades of experience spanning from early internet protocols to modern surgical robotics, takes us deep into this revolutionary field. The stakes couldn't be high…
  continue reading
 
The state of Virginia passes an age-restriction law that has no chance. New Zealand also tries something similar, citing Australia's lead. A nasty Python package for Discord survived 3 years and 11K downloads. The FBI says it's a good idea to discard end-of-life consumer routers. What's in WhatsApp? Finding out was neither easy nor certain. The UK'…
  continue reading
 
Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.san…
  continue reading
 
What happens when automation grows and learns to think, reason, and adapt? That is precisely what I explored in today's episode with Bennet Kumar, Executive Vice President and Global Head of Business Process Services at Hexaware Technologies. As the enterprise world braces for rapid AI-driven change, Bennet joined me to unpack how agentic AI quietl…
  continue reading
 
Cybercriminals are exploiting outdated routers to build massive proxy networks that hide malware operations, fraud, and credential theft—right under the radar of enterprise defenses. In this episode, Sherri and Matt unpack the FBI’s May 2025 alert, the role of TheMoon malware, and how the Faceless proxy service industrializes anonymity for hire. Le…
  continue reading
 
Pornhub is currently not available in more than a third of US States, due to new age verification laws. And just last week, two Republican senators introduced a bill which could ban pornography across the country. The looming threat on the industry was not lost on some of the biggest names in the adult film industry at this year’s Pornhub Awards. I…
  continue reading
 
Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking d…
  continue reading
 
What happens when access to advanced AI models is no longer the real differentiator, and the true advantage lies in how businesses leverage their own data? At the AWS Summit in London, I sat down with Rahul Pathak, Vice President of Data and AI Go-to-Market at AWS, to unpack this question and explore how organisations are moving beyond experimentat…
  continue reading
 
Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/ FBI Warns of End-of-life routers The FBI is tracking larger…
  continue reading
 
In today’s episode of Tech Talks Daily, I sit down with Christian Reilly, Field CTO for EMEA at Cloudflare, the Connectivity Cloud company, to examine the latest findings from their cybersecurity research and what they reveal about how prepared different industries really are. While sectors like IT, gaming, and financial services have seen a higher…
  continue reading
 
In today's episode of Tech Talks Daily, I reconnect with Abnormal AI's CIO, Mike Britton, to explore one of the most pressing topics in the tech world—AI regulation and cybersecurity. Speaking from his base near Dallas, Mike brings a pragmatic perspective shaped by decades of experience at the intersection of enterprise technology and security. As …
  continue reading
 
As artificial intelligence continues to reshape how we work, lead, and interact, the need for emotionally intelligent and human-centered leadership has never been more urgent. In this episode of Tech Talks Daily, I sit down with Jen Croneberger, the Founder and Chief Inspiration Officer at The Human Leadership Institute, to explore how relational l…
  continue reading
 
No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932 SAMSUNG magicINFO 9 Server Flaw Still exploitable The SAMSUNG magicINFO 9 Serv…
  continue reading
 
How prepared is your business for a ransomware attack? Not just to prevent it, but to continue operating when it happens. In this episode, I sit down with Trevor Dearing, Director of Critical Infrastructure at Illumio, to discuss the latest findings from their global ransomware report and what they reveal about cyber resilience. Trevor shares insig…
  continue reading
 
In the days before his inauguration, President Trump announced his own cryptocurrency, TRUMP coin, a move that could stand to make the Trump family significantly wealthier. And now, Trump has offered investors something else– access to him, when he recently announced he’ll hold a private dinner with the largest investors in TRUMP coin. In this week…
  continue reading
 
Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%22Modular%22%20Malware/31928 Sysaid XXE Vulnerabilities IT Service Management Software Sysaid patched a number of XXE vulner…
  continue reading
 
Amid the buzz of the AWS Summit in London, I sat down with Eiso Kant, the CTO and Co-Founder of Poolside, to explore how his team is reshaping the future of software development through AI. This conversation was recorded right on the show floor inside a surprisingly sleek podcast booth at the ExCel, where Eiso unpacked what sets Poolside apart in a…
  continue reading
 
Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that, in addition to implementing typical infostealer functionality, includes a web server suitable to create local phishing sites. https://isc.sans.edu/diary/Python%20InfoStealer%20with%20Embedded%20Phishing%20Webserver/31924 Android Update Fixes Freetype 0…
  continue reading
 
Microsoft to officially abandon passwords and support their deletion. Meta's RayBan smart glasses weaken their privacy terms. 30% of Microsoft code is now being written by AI. Google says prying Chrome from it will damage its security. Nearly 1,000 six-year-old eCommerce backdoors spring to life. eM Client moves to version 10.3 A bunch of terrific …
  continue reading
 
What if the food you eat could not only affect how you feel today but also determine how many healthy years you’ll have in the future? In this episode of Tech Talks Daily, I sit down with Jonathan Wolf, the co-founder and CEO of Zoe, to explore how advanced science, AI, and data are reshaping our understanding of nutrition and health. Jonathan shar…
  continue reading
 
AI isn’t just revolutionizing business—it’s reshaping the threat landscape. Cybercriminals are now weaponizing AI to launch faster, more convincing, and more scalable attacks. From deepfake video scams to LLM-guided exploit development, the new wave of AI-driven cybercrime is already here. In this engaging and eye-opening session, Sherri and Matt s…
  continue reading
 
When former national security advisor Mike Waltz had a picture taken of him last week, he didn’t expect for the whole world to see that he was using TeleMessage, a messaging app similar to Signal. Now the app has been hacked, with portions of data linked to government entities like Customs and Border Protection (CBP) and companies like Coinbase. To…
  continue reading
 
Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung s MagicInfo 9 CMS, was patched last August but attracted new attention last week after being mostly ignored so far. https://isc.sans.edu/diary/Mirai+No…
  continue reading
 
How do you teach financial literacy to a generation that’s grown up swiping on social media, watching crypto rise and fall, and navigating economic uncertainty before they’ve even finished university? That’s the question Aleksandra Medina set out to answer when she co-founded Frich—a social finance app built with Gen Z in mind. In this episode, I s…
  continue reading
 
Steganography Challenge Didier published a fun steganography challenge. A solution will be offered on Saturday. https://isc.sans.edu/diary/Steganography+Challenge/31910 Microsoft Makes Passkeys Default Authentication Method Microsoft is now encouraging new users to use Passkeys as the default and only login method, further moving away from password…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play