Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
A weekly show dedicated to helping you kick off your week right with all the latest in automation testing, performance & SRE testing, security testing, and DevOps-related news and updates that you need to know for this week. So grab your favorite cup of coffee or test, and let's do this!
…
continue reading
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Avoiding hackers. Easy? With our podcast it can be. Stay in the know on cybersecurity tips, tools, and more in the Secure AF Cyber Security Podcast. Join our hosts, Donovan Farrow and Jonathan Kimmitt, as they cover all things cybersecurity with Alias and outside guests. No matter where you are in your cybersecurity expertise, there’s an episode here for you. The views, information, or opinions expressed during this podcast are solely those of the individuals involved and do not necessarily ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
True Spies takes you inside the world's greatest espionage and detective operations. Our hosts Hayley Atwell, Vanessa Kirby, Sophia Di Martino, Daisy Ridley and Rhiannon Neads talk to the real spies behind the missions. What do they know? What are their skills? And what would you do in their position? We explore and investigate real life thrillers, mysteries and crimes - stories that prove truth is stranger than fiction! These stories cover lies, murder, theft, sex, drugs and rock ‘n roll. Y ...
…
continue reading
A podcast about the global securitization markets from GlobalCapital
…
continue reading
News, views, and insights into the cybersecurity realm produced by Greg Johnson, CEO of Webcheck Security. www.webchecksecurity.com
…
continue reading
A show about the technology, strategy, media and business trends defining the future of national security.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Fareed Zakaria GPS takes a comprehensive look at foreign affairs and global policies through in-depth, one-on-one interviews and fascinating roundtable discussions.
…
continue reading
We are often distracted in life and never really dive deep into the real foundation of self improvement, goal achieving, and wellbeing. - Join our team of experts every week as we discuss the real facets of manhood. Topics like: How to develop more self esteem, self love, deeper relationships. How to improve our wellbeing, mental toughness, resilience, and productivity. How to develop critical skills, become better leaders, expand our careers/business, create financial security and contribut ...
…
continue reading

1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
The SMC Journal is a podcast about all things related to Software Engineering, Performance, DevOps, Observability, Cloud Computing, Security, AI, and much more.
…
continue reading
Certify – Security+ 701 is your complete audio companion for mastering the CompTIA Security+ SY0-701 certification exam. Designed for aspiring cybersecurity professionals, this narrated series breaks down every domain of the official exam objectives with clarity, focus, and real-world context. Whether you’re commuting, exercising, or studying at home, each episode delivers concise, engaging, and exam-relevant content to help you pass with confidence. Created by cybersecurity author and educa ...
…
continue reading
…
continue reading
f
…
continue reading
Drupal Brief is the go-to podcast for quick and insightful AI generated summaries of the latest Drupal news, blogs, and podcasts. Stay informed and inspired in just a few minutes as we distill the most important updates and trends in the Drupal community! Drupal Brief is a podcast of Drupal Forge.
…
continue reading
Know a Person's Interests Before They've Said a Word Ask socialprofiler explores how social media behavior reveals real, actionable insights about people’s values, interests, and intentions—often before you’ve even met them. Powered by the cutting-edge platform Socialprofiler.com, this podcast breaks down how digital footprints can help you protect your family, choose better partners, and make confident, informed decisions. From tech deep dives to real-world case studies, we help you see bey ...
…
continue reading
This podcast contains security topics discussed by the Secure Ideas LLC. team.
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
Power & Politics is the arena where decision-makers answer the questions that matter. Featuring hard-hitting political interviews and a cast of regular political panelists and critical thinkers, the program gives an insider's view of the continuously unfolding drama of the Canadian political scene.
…
continue reading
Joe Murphy and the team bring everything you need to know about retirement and income planning in a fast paced format. Each week, the hosts and guests on the show reveal the latest developments in the financial world to keep you informed of changes that may affect you personally, while sharing some common sense strategies that will help you make the most out of your retirement savings. We are focused on helping investors preserve and grow their assets, increase their income, and reduce taxes ...
…
continue reading
I'm always fascinated by new technology, especially AI. One of my biggest regrets is not taking AI electives during my undergraduate years. Now, with consumer-grade AI everywhere, I’m constantly discovering compelling use cases far beyond typical ChatGPT sessions. As a tech founder for over 22 years, focused on niche markets, and the author of several books on web programming, Linux security, and performance, I’ve experienced the good, bad, and ugly of technology from Silicon Valley to Asia. ...
…
continue reading
Investigative Security Unlimited
…
continue reading
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
…
continue reading
An open show powered by community LINUX Unplugged takes the best attributes of open collaboration and turns it into a weekly show about Linux.
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
Host Payne Lindsey heads to the edge of the arctic circle to investigate two mysterious disappearances from Nome, Alaska. Up and Vanished investigates mysterious cold case disappearances with each new season of the hit true crime franchise. Season 1: The case of missing South Georgia teacher, Tara Grinstead, led to two arrests. Season 2: The disappearance of Kristal Reisinger, a young mother who disappeared from a remote Colorado mountain town. Season 3: The North West Montana disappearance ...
…
continue reading
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
…
continue reading
TechWell community manager Owen Gotimer travels the country connecting with agile, testing, DevOps, and security professionals to advance the global software community. Do you want to hear from an expert on the show? Email Owen at [email protected].
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
test
…
continue reading
The value of a penetration test is closely tied to how realistic the environment is—and in this episode, we examine the types of environments in which pen tests are conducted: known, partially known, and unknown. A known environment test, also called white-box testing, gives the tester full knowledge of systems, code, or architecture—allowing them …
…
continue reading
Twitter: Global Manipulation Machine The discussion provided is from a twitter space titled "Twitter IS COMPLETELY COMPROMISED," where the hosts and participants express profound concern over the alleged manipulation and compromise of Twitter's platform. A primary focus revolves around the leakage of Twitter API keys, potentially enabling unauthori…
…
continue reading

1
Russia's largest aerial attack on Ukraine since the war began
44:31
44:31
Play later
Play later
Lists
Like
Liked
44:31Ukraine's Ambassador to Canada Yuliya Kovaliv says Russia is increasingly attacking civilians after it targeted Kyiv overnight with waves of drones and missiles in its largest aerial assault since the full-scale invasion. Kovaliv responds to concerns about Ukraine's decision to pull out of an anti-landmine treaty. Plus, economist Don Drummond break…
…
continue reading

1
North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran - SWN #491
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50North Korea, ransomware, social engineering, AI, Apple, Drugs & Iran on this edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-491
…
continue reading

1
Cyber Incidents in Uruguay: Justice, Media, and Conflicting Narratives.
48:38
48:38
Play later
Play later
Lists
Like
Liked
48:38Cyber Incidents in Uruguay: Justice, Media, and Conflicting Narratives.
…
continue reading

1
Ley de Vigilancia en México: Privacidad, Poder y Alarma Pública
7:18
7:18
Play later
Play later
Lists
Like
Liked
7:18Ley de Vigilancia en México: Privacidad, Poder y Alarma Pública Las fuentes abordan la reciente aprobación de una "Ley Espía" en México, que modifica varias leyes de seguridad y telecomunicaciones, generando controversia y preocupación entre la oposición, defensores de derechos humanos y la sociedad civil. Esta nueva legislación, aprobada sin ampli…
…
continue reading

1
7MS #682: Securing Your Family During and After a Disaster – Part 7
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59Today’s episode is a downer! We talk about things you might want to have buttoned up for when you are eventually not alive anymore: Living will Buried vs. cremated? Funeral plans Funeral PHOTOS? I also talk about how my dad broke his ribs while trying to break a chimpmunk, and how a freak 4-wheeler accident also had my ribs in agony.…
…
continue reading

1
Mexico's Surveillance Law: Privacy, Power, and Public Alarm
45:37
45:37
Play later
Play later
Lists
Like
Liked
45:37Mexico's Surveillance Law: Privacy, Power, and Public Alarm The source discusses a newly approved "spy law" in Mexico that grants broad access to personal data, including biometrics and financial information, to security agencies like the SSPC and Guardia Nacional. While proponents argue the law is for combating serious crimes and includes judicial…
…
continue reading

1
Joe Murphy discusses the common financial mistakes that baby boomers make as they approach retirement.
52:31
52:31
Play later
Play later
Lists
Like
Liked
52:31Joe Murphy discusses the common financial mistakes that baby boomers make as they approach retirement, particularly focusing on Social Security and the importance of strategic planning. He emphasizes the need for a well-thought-out election strategy for Social Security benefits, the impact of taxes on retirement withdrawals, and the significance of…
…
continue reading

1
Alberto Daniel Hill: A Celebration of Resilience, Transparency, and Systemic Change on Twitter Spaces
28:16
28:16
Play later
Play later
Lists
Like
Liked
28:16Alberto Daniel Hill: A Celebration of Resilience, Transparency, and Systemic Change on Twitter Spaces. The provided sources offer a multifaceted look at Alberto Daniel Hill, a computer engineer and cybersecurity expert, focusing on his wrongful imprisonment in Uruguay—a pivotal event detailed in his book Log into Hell. They chronicle how this exper…
…
continue reading

1
Selling mountain bikes all over the planet (Friends)
1:11:06
1:11:06
Play later
Play later
Lists
Like
Liked
1:11:06Jeff Cayley joins Adam to talk about selling mountain bikes all over the planet and making some of the best outdoor and mountain bike gear, parts, and accessories you can buy. They have a killer YouTube channel as well. Join the discussion Changelog++ members save 5 minutes on this episode because they made the ads disappear. Join today! Sponsors: …
…
continue reading

1
Episode 139: Financial Services Cybersecurity Challenges & How to Address Them - Part 1
41:12
41:12
Play later
Play later
Lists
Like
Liked
41:12In this episode, we dive into the unique cybersecurity challenges faced by the financial services sector, from high-value targets and strict compliance requirements to the constant threat of phishing and ransomware. Whether you're on the red team, blue team, or in leadership, this episode will help you strengthen your security posture in one of the…
…
continue reading

1
Uruguay's Digital Surveillance Landscape and Cybersecurity Regulations
43:51
43:51
Play later
Play later
Lists
Like
Liked
43:51Uruguay's Digital Surveillance Landscape and Cybersecurity Regulations These sources collectively examine the multifaceted landscape of digital surveillance and cybersecurity in Uruguay, highlighting both governmental initiatives and their human rights implications. One source details Decree 66/025, Uruguay's effort to enhance cybersecurity for pub…
…
continue reading
NSO: El Grupo de Spyware Pegasus La fuente principal es un resumen de un episodio de podcast de "Darknet Diaries" sobre el NSO Group y su spyware Pegasus, que permite el acceso a datos de teléfonos móviles y es vendido a agencias gubernamentales. El texto menciona la investigación de John Scott-Railton y Citizen Lab, además de listar patrocinadores…
…
continue reading

1
Ciberseguridad en Uruguay: Estado, Delitos y Defensa.
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57Ciberseguridad en Uruguay: Estado, Delitos y Defensa. Las fuentes proporcionadas ofrecen una visión integral de la ciberseguridad en Uruguay, destacando tanto los desafíos como las respuestas adoptadas. El informe de Datasec (2024-2025) revela una preocupante brecha entre la conciencia y la implementación de medidas de protección cibernética, mostr…
…
continue reading

1
Exploring Meshtastic and LoRa Mesh Networks - Rob Allen - PSW #881
1:08:14
1:08:14
Play later
Play later
Lists
Like
Liked
1:08:14This week, we dive into the world of Meshtastic and LoRa—two technologies empowering secure, long-range, and infrastructure-free communication. We'll talk about the origins of Meshtastic, how LoRa radio works, and why mesh networking is revolutionizing off-grid messaging for adventurers, hackers, emergency responders, and privacy advocates alike. W…
…
continue reading

1
Ciberincidentes en Uruguay: Justicia, Medios y Narrativas en Conflicto
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07Ciberincidentes en Uruguay: Justicia, Medios y Narrativas en Conflicto El texto examina una serie de incidentes cibernéticos en Uruguay, centrándose en las defacement de sitios web importantes como El País Uruguay y Buquebus Turismo, y la posterior detención de un joven hacker conocido como "Vlatty". La narrativa explora la perspectiva de un hacker…
…
continue reading

1
Reflections on Hacking, Justice, and Cybersecurity in Latin America
28:09
28:09
Play later
Play later
Lists
Like
Liked
28:09Reflections on Hacking, Justice, and Cybersecurity in Latin America. This extensive transcript from a discussion with Alberto Daniel Hill, a self-proclaimed hacker, alongside a co-host and a cybersecurity expert named Héctor. The primary focus revolves around the arrest and ongoing detention of Hill's associate, "Vladi," in Uruguay, stemming from a…
…
continue reading

1
Episode 072 - Cybersecurity Lessons on the Path to Private Equity - Paul Harragan
31:40
31:40
Play later
Play later
Lists
Like
Liked
31:40Cybersecurity Lessons on the Path to Private Equity Dive into the world of private equity and cybersecurity with Paul Harragan, Global Cybersecurity Lead at KKR. In this episode, we cover strategies for managing risks, navigating M&A diligence, and aligning security with business growth. + + + Find more episodes on YouTube or wherever you listen to…
…
continue reading
The Injustice of Responsible Disclosure The compelling story of Alberto Daniel Hill, a Uruguayan cybersecurity expert and ethical hacker, who became the first individual in his country to be imprisoned for a computer-related crime he asserts he did not commit. The texts collectively explain how his responsible disclosure of vulnerabilities within a…
…
continue reading

1
CCT 259: CISSP Practice Questions - Data Classification (Domain 2.1)
25:30
25:30
Play later
Play later
Lists
Like
Liked
25:30Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Ready to master data classification for your CISSP exam? This episode delivers exactly what you need through fifteen practical questions that mirror real exam scenarios, all focused …
…
continue reading

1
Auto Tech at a Crossroads: Navigating the U.S. Ban on Foreign Vehicle Systems – PlaxidityX Ep 24
14:42
14:42
Play later
Play later
Lists
Like
Liked
14:42As today’s vehicles evolve into software-defined data hubs, concerns over national security have extended deep into automotive supply chains. In this episode of Cars, Hackers, and Cyber Security, we unpack the U.S. government’s sweeping new ban on connected vehicle systems originating from China and Russia-and what it means for automakers, supplier…
…
continue reading

1
Automakers pressure Carney to kill electric vehicle mandate
48:32
48:32
Play later
Play later
Lists
Like
Liked
48:32Auto sector executives met with Prime Minister Mark Carney to discuss the impact of U.S. tariffs on Wednesday, but also advocate for the cancellation of the electric vehicle mandate. Canada's former chief NAFTA negotiator John Weekes evaluates the state of talks with the U.S. after a suspension over the weekend, arguing the president 'likes to show…
…
continue reading

1
Tech Summit talks: Golden Dome, hypersonics and missile defense
41:01
41:01
Play later
Play later
Lists
Like
Liked
41:01Panelists: Air Force Maj. Gen. Mark Piper, Deputy Director of Operations at North American Aerospace Defense Command (NORAD); Masao Dahlgren, fellow at the Center for Strategic and International Studies’ Missile Defense Project; Doug Loverro, president of Loverro Consulting; And Patrick Tucker, Defense One’s science and technology editor. View any …
…
continue reading
Thorsten Ball returned to Sourcegraph to work on Amp because he believes being able to talk to an alien intelligence that edits your code changes everything. On this episode, Thorsten joins us to discuss exactly how coding agents work, recent advancements in AI tooling, Amp’s uniqueness in a sea of competitors, the divide between believers and skep…
…
continue reading
George Smith and Tom Hall discuss a pair of CMBS deals and whether you can trade an SRTBy Gerald Hayes
…
continue reading
In this episode of The SOC Brief, Andrew and Dax dive into the world of false positives – those misleading alerts that flood security teams with noise. They discuss how misconfigurations, lack of context, and overly sensitive rules can lead to alert fatigue. With practical tips on investigation, tuning tools, and understanding your environment, the…
…
continue reading

1
Decoding Digital Deception: Scams, Cybersecurity, and Safeguards
27:28
27:28
Play later
Play later
Lists
Like
Liked
27:28Decoding Digital Deception: Scams, Cybersecurity, and Safeguards
…
continue reading

1
The Value of Zero Trust - Rob Allen - BSW #402
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
…
continue reading

1
The Value of Zero Trust - Rob Allen - BSW #402
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
…
continue reading

1
The Value of Zero Trust - Rob Allen - BSW #402
32:29
32:29
Play later
Play later
Lists
Like
Liked
32:29New research estimates the value of Zero Trust. Using the Marsh McLennan Cyber Risk Intelligence Center’s proprietary cyber losses dataset from the past eight years, researchers estimated that overall cyber losses could have been potentially reduced by up to 31% had the organizations widely deployed zero-trust security. This adds up to a projected …
…
continue reading
Anna's new experience, trust, ricks.
…
continue reading

1
Revelaciones: Vulnerabilidades de Confianza en Dispositivos Móviles
6:55
6:55
Play later
Play later
Lists
Like
Liked
6:55Revelaciones: Vulnerabilidades de Confianza en Dispositivos Móviles. Esta discusión en YouTube presenta a Jonathan Scott, un ingeniero de seguridad móvil que afirma haber descubierto vulnerabilidades graves y persistentes en los sistemas operativos de Apple y Android, que permiten la extracción sigilosa de datos. Scott comparte su experiencia labor…
…
continue reading
El "Síndrome de La Habana," también conocido como Incidentes de Salud Anómalos (AHIs). Este fenómeno, caracterizado por síntomas neurológicos inexplicables que afectaron inicialmente a diplomáticos estadounidenses y canadienses en Cuba, se ha extendido globalmente, lo que ha llevado a un cambio en la terminología. La fuente analiza diversas teorías…
…
continue reading

1
Hawaiian Airlines Cyberattack: Flights Safe, Systems Targeted
2:45
2:45
Play later
Play later
Lists
Like
Liked
2:45On the morning of June 26th, Hawaiian Airlines reported a major cybersecurity incident that disrupted its IT systems. Travel alerts were posted by 10:45 a.m. local time, confirming issues that impacted digital check-in, employee portals, and internal communications. The airline's Honolulu-based operations hub was at the center of the disturbance. W…
…
continue reading

1
México: Corrupción Digital, Ciberataques y Llama Violeta
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00México: Corrupción Digital, Ciberataques y Llama Violeta. Este material examina a México a principios de 2025, detallando los riesgos de una rápida digitalización que se enfrenta a una corrupción sistémica y arraigada. La combinación de infraestructura cibernética deficiente y una corrupción rampante creó un entorno propicio para ciberataques, con …
…
continue reading

1
Redes Celulares Clandestinas del Cartel: Innovación Criminal
9:08
9:08
Play later
Play later
Lists
Like
Liked
9:08Redes Celulares Clandestinas del Cartel: Innovación Criminal. Un análisis reciente sugiere que los cárteles mexicanos de la droga podrían estar desarrollando redes celulares privadas altamente sofisticadas, superando el uso de teléfonos desechables y aplicaciones cifradas comerciales. Esta supuesta evolución se remonta a la necesidad de evadir la v…
…
continue reading
Este texto examina la "Ley Espía" de México, una legislación aprobada el 26 de junio de 2025 que otorga al gobierno acceso amplio a datos personales para fines de seguridad. Se discuten las implicaciones para la privacidad y los derechos civiles, ya que los críticos temen vigilancia masiva y una posible autocensura ciudadana. La ley se enmarca en u…
…
continue reading
Crímenes Cibernéticos y Estafas de Romance. En una discusión sobre las estafas románticas y la ciberseguridad, el presentador y varios expertos, incluyendo a un ex-ciberdelincuente, una víctima convertida en defensora y un activista "black hat", comparten sus perspectivas. Se explora cómo los estafadores construyen confianza a través de la manipula…
…
continue reading

1
Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet.. - SWN #490
31:11
31:11
Play later
Play later
Lists
Like
Liked
31:11Sony, Scattered Spider, Hikvision, Cybercrime, Iran, BSODs, Cloudflare, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-490
…
continue reading

1
PP069: A Quantum Primer: It’s More Than Cracking Crypto
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44Quantum computing is here, and it’s being used for more than cracking encryption. On today’s Packet Protector we get a primer on quantum, how it differs from classical computing, its applications for difficult computing problems, why quantum will be the death of blockchain, and how to think about quantum risks. Our guest, Johna Johnson, is... Read …
…
continue reading

1
SE Radio 675: Brian Demers on Observability into the Toolchain
47:41
47:41
Play later
Play later
Lists
Like
Liked
47:41Brian Demers, Developer Advocate at Gradle, speaks with host Giovanni Asproni about the importance of having observability in the toolchain. Such information about build times, compiler warnings, test executions, and any other system used to build the production code can help to reduce defects, increase productivity, and improve the developer exper…
…
continue reading

1
Cracking The Offensive Security Career Code with Michael Kim
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26In the inaugural episode of the Simply Offensive podcast, host Phillip Wylie interviews Michael Kim, a cybersecurity professional with a diverse background. Michael shares his journey from music to cybersecurity, emphasizing the importance of networking, certifications, and continuous learning. He discusses the challenges of breaking into pen testi…
…
continue reading
MCP servers everywhere in tech feeds these days, and while it's becoming a crucial part of AI agents communicating with software and utilizing their services to perform powerful tasks. On today's show we talk about how much the MCP Server phenomena is impacting the developer experience. My gues is Ricky Robinett from Cloudflare. 👋 Connect With Me 📫…
…
continue reading