Tune into the Internet of Things. In this podcast IoT Insiders' editor digs into the world of IoT; an ever-changing swarth of industry experts with each episodes, IoT Unplugged promises to be an equally informative and intriguing auditory journey that will keep its listeners up to date with all the issues surrounding IoT today and tomorrow.
…
continue reading
IoT Leaders is a podcast from Eseye that shares real IoT stories from the field about digital transformation swings and misses, lessons learned, and innovation strategies that work.In each episode, you’ll hear our conversations with top digitization leaders on how IoT is changing the world for the better. Let IoT Leaders be your guide to IoT, digital transformation, and innovation. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Proximity and location technologies are key to the Internet of Things (IoT) and are causing our digital and physical worlds to converge. Mr. Beacon is a series of interviews with the leaders of companies that are at the center of this revolution. Steve Statler wrote "Beacon Technologies", a survival guide for people that want to design solutions that use Bluetooth beacons to create experiences that combine location awareness with the power of cloud computing. Hosted on Acast. See acast.com/p ...
…
continue reading
IoT Talks and Tales The IoT Podcast is joined by the most influential leaders in IoT every Thursday to break down the current and up & coming IoT trends, unravel the misconceptions, doubts and forecast predictions on the ongoing journey for the Internet of Things. This podcast will have something for everyone, whether you’re an entrepreneur searching for fresh ideas or the lessons learned, an engineer always looking to be one step ahead with the latest solutions, or someone with a pure enthu ...
…
continue reading
The We talk IoT podcast keeps you up to date with major developments in the world of the internet of things, IIoT, artificial intelligence, and cognitive computing. Our guests are leading industry experts, business professionals, and experienced journalists as they discuss some of today’s hottest tech topics and how they can help boost your bottom line. You can follow We talk IoT – the Internet of Things Business podcast anywhere you get your podcasts. About the host: Stefanie Ruth Heyduck i ...
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Arman Dezfuli-Arjomandi and guests discuss the fast-growing Helium network, providing worldwide coverage for mobile phones and IoT devices.
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Associate Editor, and Rich Nass, EVP, of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology marketplaces in a light ...
…
continue reading
Podcast by The IT Insider
…
continue reading
Budget overruns. Bricked devices. Data breaches. Building connected products is hard. Join us every other Thursday for unfiltered conversations with executives about their AI journeys — the mistakes they made, the lessons they learned, and what they wish they’d known when they started. In each episode of Over the Air, our expert guests will make bold predictions, reveal unpopular opinions, and share stories you won’t hear anywhere else.
…
continue reading
Musing On Society, Technology, and Cybersecurity | Hosted by Marco Ciappelli Let’s face it: the future is now. We live in a hybrid analog-digital society, and it’s time to stop ignoring the profound impact technology has on our lives. The line between the physical and virtual worlds? It’s no longer real — just a figment of our imagination. We’re constantly juggling convenience, privacy, freedom, security, and even the future of humanity in a precarious balancing act. There’s no better place ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizations of all sizes with their cybersecurity needs. If you’re an AppSec professional looking for an opportunity to work with some of the best in the ...
…
continue reading
The Windows Insider Team is taking the podcast airwaves to share all things future of Windows, Insider community and beyond. Transcripts provided with each episode.
…
continue reading
The official podcast of Fobi AI Inc. (FOBI: TSXV FOBIF: OTCQB). Get the latest updates on what's happening at Fobi.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
This podcast features interviews of CTOs and other technical leadership figures and topics range from technology (AI, blockchain, cyber, DevOps, Web Architecture, etc.) to management (e.g. scaling, structuring teams, mentoring, technical recruiting, product etc.). Guests from leading tech companies share their best practices and knowledge. The goal is to support other CTOs on their journey through tech and engineering, inspire and allow a sneak-peek into other successful companies to underst ...
…
continue reading
At Accenture, we work at the frontier of the technology defining our lives today and tomorrow. Tune in to hear our people share opinions and perspectives on the technology trends impacting our world, their own experiences on the front line of innovation, and how Accenture is harnessing the potential of these technologies to create meaningful change.
…
continue reading
Smart People Podcast is a biweekly, interview-based podcast that features today's most well respected thought leaders engaging in authentic, insightful conversation for the benefit of the listener. The host, Chris Stemp, and his co-host/producer Jon Rojas, utilize their insatiable curiosity and relatable charm to provoke their guests into giving the interview of a lifetime. Every single guest has achieved a high level of recognition within their arena and in doing so has collected a wealth o ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
The UPSTACK Podcast is an ever-evolving conversation on all things digital infrastructure, giving CTOs, CIOs, CISOs and other tech leaders "food for thought” as they push to stay ahead of the technology curve. Greg Moss, UPSTACK’s Partner and Managing Director, invites guests to talk candidly about the latest technology infrastructure topics. Co-hosted by SVP of Marketing, Alex Cole, this is sure to be a podcast worth listening to.
…
continue reading
A monthly podcast for physical security professionals to hear from leading figures and influencers in the industry and gain valuable insight into the sector’s latest trends and initiatives, as well as the many challenges facing the profession and how they can be overcome. On the agenda will be everything from security technology, such as video surveillance and access control, through to risk management strategies and building a holistic security organisational culture – and plenty more!
…
continue reading
The Smart Life is a podcast looking at all things Smart Home and IoT. From the latest tech to the bigger questions around the role tech has to play in our lives, each episode, hosts Jess and Thomas will be joined by industry experts to break down the news behind the headlines.
…
continue reading
Welcome to the Sustainable Supply Chain podcast, hosted by Tom Raftery, a seasoned expert at the intersection of technology and sustainability. This podcast is an evolution of the Digital Supply Chain podcast, now with a laser-focused mission: exploring and promoting tech-led sustainability solutions in supply chains across the globe. Every Monday at 7 am CET, join us for insightful and organic conversations that blend professionalism with an informal, enjoyable tone. We don't script our epi ...
…
continue reading

1
Connecting Everything, Inside Volvo's Massive IoT Strategy
39:10
39:10
Play later
Play later
Lists
Like
Liked
39:10Most industrial IoT deployments struggle with the same challenge: dozens of pilot projects that never reach production scale. Volvo Group broke this cycle with a strategic transformation connecting hundreds of millions of assets across 140 factories worldwide. The secret wasn't just technology — it was organizational change that unified scattered e…
…
continue reading

1
3356: What Moodle Teaches Us About the Future of Open Learning
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42What if the key to global access to high-quality education isn't policy reform or private investment, but open source software? In this episode of Tech Talks Daily, I sit down with Scott Anderberg, CEO of Moodle, to explore how one of the world’s most widely used learning platforms is quietly transforming education in ways that extend far beyond th…
…
continue reading

1
ToolShell: SharePoint Zero-Day Chain Gives Hackers Full Remote Access
58:23
58:23
Play later
Play later
Lists
Like
Liked
58:23A new wave of zero-day attacks—collectively known as ToolShell—is actively targeting Microsoft SharePoint servers, with two vulnerabilities (CVE-2025-53770 and CVE-2025-53771) allowing unauthenticated remote code execution and identity control bypass. First observed in high-value targets across government, critical infrastructure, and manufacturing…
…
continue reading

1
Donatello, SharePoint, CrushFTP, WordPress, Replit, AllaKore, Rob Allen, and more... - Rob Allen - SWN #496
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57Donatello, SharePoint, CrushFTP, WordPress, Replit, AllaKore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.darkreading.com/threat-intelligence/matanbuchus-loader-ransomware-infections This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Visit https://ww…
…
continue reading

1
CVE-2025-54309: CrushFTP Zero-Day Exploited in Global Admin Access Attacks
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13A critical zero-day vulnerability in CrushFTP (CVE-2025-54309) is being actively exploited, giving attackers administrative access to over a thousand unpatched servers globally. This severe security flaw—caused by improper validation in the AS2 protocol—has exposed enterprise-managed file transfer (MFT) systems across the US, Europe, and Canada. Se…
…
continue reading

1
Dell Breach by World Leaks: Extortion Attempt Hits Demo Platform
23:49
23:49
Play later
Play later
Lists
Like
Liked
23:49Dell Technologies is the latest target in a growing trend of data extortion attacks as threat actors pivot away from traditional ransomware. The cybercrime group known as World Leaks—a rebrand of the former Hunters International gang—has claimed responsibility for breaching Dell’s Customer Solution Centers (CSC), a sandbox environment used primaril…
…
continue reading

1
Critical VPN Vulnerability: ExpressVPN Exposed IPs via RDP Misrouting
59:16
59:16
Play later
Play later
Lists
Like
Liked
59:16A critical vulnerability in ExpressVPN’s Windows client has put a spotlight on the often-overlooked dangers of debug code making its way into production software. This episode dives into how a debug configuration error allowed Remote Desktop Protocol (RDP) traffic to bypass the VPN tunnel, potentially exposing users’ real IP addresses and compromis…
…
continue reading

1
Rise of Compromised LLMs - Sohrob Kazerounian - ASW #340
1:06:35
1:06:35
Play later
Play later
Lists
Like
Liked
1:06:35AI is more than LLMs. Machine learning algorithms have been part of infosec solutions for a long time. For appsec practitioners, a key concern is always going to be how to evaluate the security of software or a system. In some cases, it doesn't matter if a human or an LLM generated code -- the code needs to be reviewed for common flaws and design p…
…
continue reading

1
Dior Data Breach Exposes U.S. Customer Info in LVMH Vendor Attack
41:11
41:11
Play later
Play later
Lists
Like
Liked
41:11In this episode, we unpack the January 2025 data breach at Dior, the iconic luxury fashion house, which exposed sensitive personal information of U.S. customers—including names, addresses, and even Social Security and passport numbers. Although payment data remained secure, the incident's impact is substantial, both in terms of customer trust and c…
…
continue reading

1
3355: How TravelPerk Is Balancing AI and Empathy in Business Travel
30:56
30:56
Play later
Play later
Lists
Like
Liked
30:56In this episode, I sit down with Robin Smith, Chief Technology Officer at TravelPerk, to hear how one of Europe’s fastest-growing travel platforms is blending automation with empathy in a sector built on unpredictability. Robin shares how that continuity has shaped his view of disruption, from the rise of web and mobile booking to the rapid acceler…
…
continue reading

1
StrongestLayer Raises $5.2M to Fight AI-Powered Phishing with TRACE
52:49
52:49
Play later
Play later
Lists
Like
Liked
52:49In an era where generative AI is being used not just for productivity but for precision cybercrime, a San Francisco-based startup, StrongestLayer, is taking a bold stand. Backed by $5.2 million in seed funding from Sorenson Capital and others, the company is pioneering a radically new approach to cybersecurity with its AI-native platform TRACE (Thr…
…
continue reading

1
750,000 Records Exposed: Inside the TADTS Data Breach by BianLian
1:03:29
1:03:29
Play later
Play later
Lists
Like
Liked
1:03:29In July 2024, The Alcohol & Drug Testing Service (TADTS), a Texas-based company handling sensitive employment-related data, suffered a catastrophic data breach. Nearly 750,000 individuals had personal information compromised—Social Security numbers, financial data, driver’s licenses, health insurance info, and even biometric identifiers. The attack…
…
continue reading

1
SS7 Is Still Broken: How Surveillance Firms Are Bypassing Telco Defenses
50:12
50:12
Play later
Play later
Lists
Like
Liked
50:12A new attack technique is exposing just how vulnerable global mobile networks remain in 2025. Cybersecurity firm Enea has discovered a surveillance operation that bypasses SS7 firewalls by exploiting a subtle weakness in the TCAP encoding layer—allowing stealth location tracking of mobile users across borders. The method? Tampering with the IMSI fi…
…
continue reading

1
The Cyber Canon, ditching the SOC 2, and the weekly enterprise news - Helen Patton - ESW #416
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Segment 1 - Interview with Helen Patton: Introducing the Cybersecurity Canon Did you know that there’s a hall-of-fame for cybersecurity books? Over the past decade, the Cybersecurity Canon has published reviews on dozens of cybersecurity books and established a hall of fame. Hall of fame books are defined as titles that all cybersecurity profession…
…
continue reading

1
Inside the Industrial Metaverse: Practical Use Cases That Cut Costs and Emissions
41:58
41:58
Play later
Play later
Lists
Like
Liked
41:58Send me a message How do you show a customer the inside of a wind turbine nacelle, or onboard engineers to hazardous industrial equipment, without ever leaving their desks? In this episode of the Sustainable Supply Chain podcast, I’m joined by Matt Trubow, Commercial Director at Hidden Creative, to explore how immersive technology is changing the w…
…
continue reading

1
3354: Inside Mediaocean and its Vision for AI and Ad Tech
27:11
27:11
Play later
Play later
Lists
Like
Liked
27:11What happens when the world’s most popular AI tools become ad platforms? That’s the question I put to Aaron Goldman, CMO of Mediaocean, in a candid conversation about the future of advertising, search, and AI-native experiences. Aaron brings over two decades of industry insight to the table, sharing his perspective on how platforms like ChatGPT are…
…
continue reading

1
3353: Why the Human Experience Still Matters in a Machine-Led World
42:48
42:48
Play later
Play later
Lists
Like
Liked
42:48In this thought-provoking conversation, I’m joined by Kate O’Neill, author, speaker, and founder of KO Insights, to explore how leaders can make meaningful, human-centered decisions in a time of rapid AI adoption and organisational change. Known as the “Tech Humanist,” Kate has helped everyone from Google and IBM to city governments navigate the ev…
…
continue reading

1
The Hybrid Species — When Technology Becomes Human, and Humans Become Technology | A Musing On Society & Technology Newsletter Written By Marco Ciappelli | Read by TAPE3
10:53
10:53
Play later
Play later
Lists
Like
Liked
10:53⸻ Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com _____________________________ This Episode’s Sponsors BlackCloak provides concierge cybersecurity protection to corporate executives and high-net-worth individuals to protect against hacking, reputational loss, financial loss, and the impacts of a corpora…
…
continue reading

1
3352: IoT, AI, and the Race for Supply Chain Visibility
22:52
22:52
Play later
Play later
Lists
Like
Liked
22:52In today’s episode of Tech Talks Daily, I sit down with Ed Nabrotzky, CEO of Dot AI, to find out how a new generation of asset tracking technology is reshaping what’s possible in logistics, operations, and enterprise strategy. Ed brings decades of experience as an executive and innovator in RF and IoT systems, and now leads Dot Ai at the intersecti…
…
continue reading

1
3351: Human-AI Collaboration Starts With Education
40:37
40:37
Play later
Play later
Lists
Like
Liked
40:37What happens when you bring together a practicing monk, a seasoned tech entrepreneur, and an AI education pioneer? In this episode of The Tech Talks Daily Podcast, I sit down with Prashant Raizada, the driving force behind Lumi Network, to explore how we can build a workforce ready for the AI era, not just in skills, but in mindset and purpose. Pra…
…
continue reading

1
Existential Dread, MCP, Cloudflare, ESXI, QR Codes, Salt Typhoon, Aaran Leyland... - SWN #495
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42Existential Dread and Seawater, MCP, Cloudflare, ESxi, QR Codes, Salt Typhoon, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-495
…
continue reading

1
3350: Make the Problem the Purpose: Rethinking Innovation with Colin Scott of Innventure
27:43
27:43
Play later
Play later
Lists
Like
Liked
27:43Is innovation failing because we're starting in the wrong place? In this episode of Tech Talks Daily, I'm joined by Colin Scott, Senior Vice President of DownSelect at Innventure, to challenge the default tech-first mindset that dominates R&D and corporate innovation. Instead of asking what a technology can do, Innventure flips the question: what r…
…
continue reading

1
The Human Side of Technology with Abadesi Osunsade — From Diversity to AI and Back Again | Guest: Abadesi Osunsade | Redefining Society And Technology Podcast With Marco Ciappelli
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42⸻ Podcast: Redefining Society and Technology https://redefiningsocietyandtechnologypodcast.com Title: The Human Side of Technology with Abadesi Osunsade — From Diversity to AI and Back Again Guest: Abadesi Osunsade Founder @ Hustle Crew WebSite: https://www.abadesi.com On LinkedIn: https://www.linkedin.com/in/abadesi/ Host: Marco Ciappelli Co-Found…
…
continue reading

1
The UNFI Cyberattack: How Hackers Disrupted the U.S. Food Supply Chain
23:30
23:30
Play later
Play later
Lists
Like
Liked
23:30In June 2025, United Natural Foods, Inc. (UNFI)—the primary distributor for Whole Foods and tens of thousands of retailers across North America—suffered a major cyberattack that halted deliveries, emptied shelves, and forced core operations offline. The financial damage? Between $350 and $400 million in net sales lost, and up to $60 million in redu…
…
continue reading
In the security news: The train is leaving the station, or is it? The hypervisor will protect you, maybe The best thing about Flippers are the clones Also, the Flipper Zero as an interrogation tool Threats are commercial and open-source Who is still down with FTP? AI bug hunters Firmware for Russian drones Merging Android and ChromOS Protecting you…
…
continue reading

1
Zuckerberg on Trial: The $8 Billion Data Privacy Reckoning
21:28
21:28
Play later
Play later
Lists
Like
Liked
21:28More than five years after the Cambridge Analytica scandal, the legal and financial consequences are still playing out—this time in Delaware’s Chancery Court, where Mark Zuckerberg and Meta executives are being sued by investors seeking over $8 billion in damages. This landmark class-action lawsuit argues that Meta’s leadership knowingly violated a…
…
continue reading

1
Operation Eastwood: Inside the Takedown of NoName057(16)
21:17
21:17
Play later
Play later
Lists
Like
Liked
21:17A major Europol-led crackdown—Operation Eastwood—has disrupted one of the most active pro-Russian hacktivist collectives in Europe: NoName057(16). Known for a relentless barrage of DDoS attacks targeting NATO allies and Ukraine-supporting nations, this ideologically driven group ran a global network powered by gamified recruitment, cryptocurrency i…
…
continue reading

1
Phished and Exposed: What the Co-op Hack Reveals About Retail Cybersecurity
21:37
21:37
Play later
Play later
Lists
Like
Liked
21:37In April 2025, The Co-op—one of the UK’s largest retailers—confirmed a data breach that exposed the personal information of 6.5 million members. No financial data was taken, but the attack hit at the core of trust, with CEO Shirine Khoury-Haq calling it a “personal attack on our members and colleagues.” This wasn’t just a technical failure—it was a…
…
continue reading

1
3349: IBM Consulting on Agentic AI and the Reinvention of Business Processes
25:44
25:44
Play later
Play later
Lists
Like
Liked
25:44When AI enters the boardroom, it tends to arrive with big promises: productivity, automation, efficiency. But for Francesco Brenna, Global Leader of AI Integration Services at IBM Consulting, the real opportunity isn’t just faster workflows—it’s rebuilding how business gets done from the ground up. In this episode, recorded in the heat of a New Yor…
…
continue reading

1
FileFix Attacks Are Here: How Interlock’s Ransomware is Skipping Your Defenses
21:52
21:52
Play later
Play later
Lists
Like
Liked
21:52In this episode, we break down how Interlock, a fast-moving ransomware group launched in late 2024, has evolved from using web injectors and clipboard tricks (like ClickFix) to an even more covert social engineering technique that abuses Windows File Explorer’s address bar to execute malicious code without triggering security prompts or downloads. …
…
continue reading

1
Ontinue Uncovers SVG-Based Phishing: Why Your Browser Could Be the Weak Link
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58Ontinue has uncovered a stealthy new phishing campaign that’s flipping conventional defenses on their head—weaponizing SVG image files to silently redirect victims to malicious websites, without requiring file downloads, macros, or even user clicks. In this episode, we break down how attackers are exploiting the JavaScript-capable structure of Scal…
…
continue reading

1
Exein Raises €70M: Defending the IoT-AI Frontier with Embedded Security
17:35
17:35
Play later
Play later
Lists
Like
Liked
17:35Exein, the Italian cybersecurity company specializing in embedded IoT defense, has raised €70 million in Series C funding, marking a significant milestone in the race to secure AI-connected infrastructure. Backed by Balderton and a roster of prominent investors, this round pushes Exein’s total funding past $106 million and fuels its global expansio…
…
continue reading

1
Salt Typhoon Strikes Again: National Guard, Telecoms, and a Crisis in U.S. Cyber Defense
21:58
21:58
Play later
Play later
Lists
Like
Liked
21:58Salt Typhoon, a sophisticated Chinese state-sponsored cyber threat actor, is conducting one of the most aggressive and sustained espionage campaigns ever uncovered against U.S. critical infrastructure. This episode explores how the group—linked to China's Ministry of State Security—compromised a U.S. state’s Army National Guard, infiltrated telecom…
…
continue reading
🎧 IoT Unplugged Season 6, Episode 8 is now live! ⏰ In Episode 8, Caitlin Gittins, Editor at IoT Insider, sits down with Stephen Keetley, Head of Design at Pressac Communications Ltd, to discuss an overview of energy-harvesting sensors.By IoT insider
…
continue reading

1
Minimize SAP Migration Challenges, Cybersecurity Maturity, and Radical Transparency - Christopher Carter - BSW #404
58:31
58:31
Play later
Play later
Lists
Like
Liked
58:31Are you running SAP? The clock is ticking... Standard maintenance end-of-life is set for the end of 2027. Migration to S/4HANA must be completed by then (or 2030 if you buy into SAP’s special three-year reprieve). While that may appear to be enough time, companies currently working toward an S/4HANA transition are finding the journey challenging, a…
…
continue reading

1
3348: How Twilio Is Redefining Voice AI for Real-World Customer Support
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17Voice has always been a powerful way to connect with customers, but until recently, voice AI struggled to deliver the kind of seamless experience we associate with great service. That is starting to change. In this episode, I catch up with Sam Richardson from Twilio to discuss the renewed momentum behind voice AI and what it means for the future of…
…
continue reading

1
DragonForce Ransomware Hits Belk: 150GB Data Leak and Operational Chaos
1:20:33
1:20:33
Play later
Play later
Lists
Like
Liked
1:20:33In this episode, we dive into the May 2025 ransomware attack on Belk, the iconic U.S. department store chain, orchestrated by the DragonForce ransomware group—a fast-rising player in the ransomware-as-a-service (RaaS) ecosystem. The cyberattack brought down Belk’s online and in-store operations for days, exfiltrated over 156GB of sensitive data, an…
…
continue reading

1
AI meltdowns, Gigabyte, NCSC, Rowhammer, Gravity Form, Grok, AsyncRat, Josh Marpet... - SWN #494
30:02
30:02
Play later
Play later
Lists
Like
Liked
30:02AI meltdowns, Gigabyte, NCSC, Rowhammer, Gravity Form, Grok, AsyncRat, Josh Marpet and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-494
…
continue reading

1
NVIDIA Issues Urgent Rowhammer Warning: Enable ECC or Risk AI Integrity
40:39
40:39
Play later
Play later
Lists
Like
Liked
40:39In this episode, we dissect a major hardware-level cybersecurity warning issued by NVIDIA, one that directly affects data center operators, AI researchers, and enterprise IT teams using GPU infrastructure. The threat: Rowhammer—a physical DRAM vulnerability that’s now been successfully exploited on GPUs through a new attack method known as GPUHamme…
…
continue reading

1
Zip Security Secures $13.5M to Simplify and Scale Cyber Defense
48:43
48:43
Play later
Play later
Lists
Like
Liked
48:43In this episode, we spotlight Zip Security, a rising New York-based cybersecurity startup that just closed a $13.5 million Series A funding round, led by Ballistic Ventures. This brings the company’s total raised to $21 million, underscoring growing investor confidence in Zip’s mission: to make enterprise-grade cybersecurity accessible, automated, …
…
continue reading

1
Century Support Services Breach: 160,000 Identities Compromised in Silent Cyberattack
32:03
32:03
Play later
Play later
Lists
Like
Liked
32:03In this episode, we examine the major data breach at Century Support Services—also operating under the name Next Level Finance Partners—that exposed the personal information of over 160,000 individuals. While the company discovered indicators of a cyberattack as early as November 2023, it wasn’t until May 2024 that investigators confirmed sensitive…
…
continue reading