Listen to podcasts from the Open Data Institute – discussing the impacts of data across areas including health, cities, the built environment, government and finance. Speakers also delve into issues around data ethics, trust, art, culture, corruption and accountability.
…
continue reading
A podcast about Open Science, Open Access, Open Education, Open Data, Open Software ... pretty much «open anything». Produced by the University Library at UIT The Arctic University of Norway. Founder and host of episodes 1-31: Erik Lieungh. Host from episode 32 onwards: Per Pippin Aspaas.
…
continue reading
AI and digital expert Suchi Srinivasan and fintech practice leader Kamila Rakhimova from Boston Consulting Group (BCG) talk to the women at the vanguard of business, digital, and technology. They’re digging into how these powerhouse leaders got where they are—everything from the joy of projects gone right to the realities of family responsibilities. And crucially, asking: what was that moment you knew you weren't merely getting there...you had arrived? That's when you know you're in your ele ...
…
continue reading
AI lab podcast, "decrypting" expert analysis to understand Artificial Intelligence from a policy making point of view.
…
continue reading
Ending hunger, poverty and reducing inequality will take a whole lot more than what has been business as usual for us. We bring African voices to share their take on what the future holds.
…
continue reading
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
…
continue reading
How can Fintech contribute to building a better world? In Season 4 of Fintech Files, we’re turning our focus to where financial technology meets social impact. This season, we explore financial inclusion, sustainable investing, and decarbonization with some of the brightest minds in the industry. As financial services touch every aspect of our lives, the opportunity to drive positive change is enormous. About Fintech Files: Join us on Fintech Files from BCG Platinion as we explore the cuttin ...
…
continue reading
Your #1 podcast to turn your crypto curiosity into clarity. We discuss topics like: Blockchain Tech, Investing Strategies, Onchain Analysis, Web3 Applications and Use Cases plus cover ecosystems like: Bitcoin, Ethereum, Solana, Cosmos and so much more! 🥛 Get smarter about crypto in 5 minutes with our daily, free newsletter: https://link.milkroad.com/pod-newsletter 💰 Go PRO and Become a better investor with the #1 crypto research and analysis: https://link.milkroad.com/pro-podcast
…
continue reading
Who Belongs? was launched in Fall 2018 as the Othering & Belonging Institute's official podcast. The question of who belongs in our societies, whether local, national, or global, is one of the central drivers that underpin how people are othered, or how the conditions of belonging are created. Our podcast addresses this foundational question to open pathways to explore a range of policies, movements, scholarship, and narratives that get us closer to the goal we seek, which is to advance a so ...
…
continue reading
Learn the latest finance updates in the tech world.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
An exploration of diversity in research management and international research collaborations. We cover how we make research environments more inclusive and why doing this helps us to solve global challenges through research. Based in Europe but talking to the world of academic research.
…
continue reading

1
Archetyp Market Seized: €250M Drug Empire Toppled by Operation Deep Sentinel
54:53
54:53
Play later
Play later
Lists
Like
Liked
54:53In this episode, we unpack the dramatic takedown of Archetyp Market, a darknet marketplace that dominated the online drug trade since its launch in May 2020. With over €250 million ($290 million) in drug transactions, more than 600,000 users, and 17,000 listings, Archetyp wasn’t just another darknet forum—it was the largest dedicated drug market on…
…
continue reading

1
KillSec Exploits Zero-Day to Breach Ocuco: 241K Patients Exposed
1:07:13
1:07:13
Play later
Play later
Lists
Like
Liked
1:07:13In this episode, we break down one of 2025’s most significant healthcare cybersecurity incidents: the ransomware attack on Ocuco, a global eyecare software provider. On April 1st, 2025, threat actors from the KillSec ransomware group exploited CVE-2024-41197 — a critical authentication bypass in Ocuco’s INVCLIENT.EXE — to gain Administrator-level a…
…
continue reading

1
Kraken Co-CEO Reveals 3 Massive Shifts Coming to the Crypto Markets w/ Arjun Sethi
41:55
41:55
Play later
Play later
Lists
Like
Liked
41:55What does the co-CEO of one of the world’s largest crypto exchanges see coming next? In this episode, Arjun Sethi (Kraken) pulls back the curtain on the three seismic shifts he believes are about to reshape global markets and why most investors aren’t ready for them. ~~~~~ 🏦 Borrow against your Bitcoin with Ledn, fast, secure, and without selling a…
…
continue reading

1
DragonForce Ransomware: The Evolving Threat to Healthcare Data
39:12
39:12
Play later
Play later
Lists
Like
Liked
39:12In this episode, we dive deep into the current state of cybersecurity in healthcare, where the growing sophistication of cyber threats has led to increasingly devastating breaches. We begin with a close look at the rise of Ransomware-as-a-Service (RaaS), focusing on DragonForce, a ransomware group that has transitioned from politically motivated at…
…
continue reading

1
Google’s $32B Bid for Wiz Faces DOJ Fire: A Cloud Security Power Play or Market Grab?
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01In this episode, we break down the seismic implications of Google’s proposed $32 billion acquisition of Wiz, the world’s largest cybersecurity unicorn—and why this isn’t just another tech deal. At the core is the U.S. Department of Justice's antitrust investigation, triggered by concerns that the deal could tighten Google’s grip on a critical secto…
…
continue reading

1
SimpleHelp Exploit Fallout: Ransomware Hits Utility Billing Platforms
1:03:42
1:03:42
Play later
Play later
Lists
Like
Liked
1:03:42In this critical episode, we dive into the alarming exploitation of CVE-2024-57727, a vulnerability in SimpleHelp Remote Monitoring and Management (RMM) software actively leveraged by ransomware operators since early 2025. This isn't just a theoretical risk—it's already being used to compromise utility billing providers and downstream MSP customers…
…
continue reading

1
TeamFiltration and Token Theft: The Cyber Campaign Microsoft Never Saw Coming
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04In this episode, we dissect UNK_SneakyStrike—a major account takeover campaign targeting Microsoft Entra ID users with precision and scale. Tracked by Proofpoint, this campaign began in December 2024 and has since escalated, leveraging TeamFiltration, a legitimate penetration testing tool, to enumerate users and launch password spraying attacks tha…
…
continue reading

1
When Altseason in 2025? The Signals You Need to Know About w/ Jesse Eckel
40:05
40:05
Play later
Play later
Lists
Like
Liked
40:05Is altseason coming in 2025 or is the crypto market still sleepwalking? In this episode, we sit down with legendary investor Jesse (the guy who turned $3K into $600K) to unpack the real signals that drive crypto cycles… From the “11 Rings of Power” to why memecoins are mostly noise, Jesse breaks down where we are in the macrocycle, when altseason c…
…
continue reading

1
Three CVEs, One Risk: Arbitrary Code Execution in Nessus Agent for Windows
44:04
44:04
Play later
Play later
Lists
Like
Liked
44:04In this episode, we dive deep into one of the most critical attack techniques in modern cyber warfare: privilege escalation—and how it recently hit center stage with three high-severity vulnerabilities discovered in Tenable’s Nessus Agent for Windows. We break down CVE-2025-36631, CVE-2025-36632, and CVE-2025-36633, which, when exploited, allow a n…
…
continue reading

1
WestJet Cyberattack: Cracks in Aviation’s Digital Armor
25:52
25:52
Play later
Play later
Lists
Like
Liked
25:52A major cyberattack has rocked Canada's second-largest airline, WestJet—crippling internal systems and prompting warnings for customers to monitor their accounts and change passwords. But this is more than just a corporate incident. It’s the latest sign of a broader, escalating crisis in aviation cybersecurity. In this episode, we examine the WestJ…
…
continue reading

1
Silent Surveillance: The Hidden Risks in 40,000+ Unsecured Cameras
49:37
49:37
Play later
Play later
Lists
Like
Liked
49:37In this episode, we dig into a disturbing yet underreported national security threat: the exploitation of internet-connected surveillance cameras—especially those manufactured in the People’s Republic of China—as a cyber weapon against U.S. critical infrastructure. Drawing from recent DHS intelligence briefings and independent cybersecurity analyse…
…
continue reading

1
Paragon’s Promise vs. Reality: How Graphite Is Being Used Against Journalists and Activists
1:10:32
1:10:32
Play later
Play later
Lists
Like
Liked
1:10:32In this episode, we dive deep into the alarming revelations surrounding Graphite, a powerful spyware tool developed by Israeli firm Paragon Solutions. Promoted as a “responsible alternative” to the NSO Group’s Pegasus, Graphite is now implicated in the surveillance of journalists, humanitarian activists, and civil society figures—contrary to the ve…
…
continue reading

1
zeroRISC Secures $10M to Commercialize OpenTitan and Reinvent Supply Chain Security
51:51
51:51
Play later
Play later
Lists
Like
Liked
51:51zeroRISC just raised $10 million to bring OpenTitan—the first open-source silicon Root of Trust—to market. In this episode, we break down what this funding means for the future of supply chain security, and why investors are betting on open hardware to fix vulnerabilities baked into modern chips. We explore how geopolitical tension, forced labor en…
…
continue reading

1
Fog, RedFox, and the Rise of Silent Intruders: Cyberattacks Surge Against Financial Institutions
34:42
34:42
Play later
Play later
Lists
Like
Liked
34:42The financial services industry is under siege. In this episode, we unpack the latest findings from Radware’s 2025 Financial Threat Analysis and multiple intelligence reports detailing a relentless rise in cyberattacks targeting banks and financial institutions across the globe. We examine the surge in sophisticated attacks that blend legitimate to…
…
continue reading

1
9.8 Severity and Counting: Inside Trend Micro’s Latest Security Emergency
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08In this episode, we break down Trend Micro’s urgent June 10th security update that patched ten high- and critical-severity vulnerabilities—some with CVSSv3.1 scores as high as 9.8—across Apex Central and Endpoint Encryption PolicyServer (TMEE). While no active exploitation has been observed, the risks are too severe to ignore. We spotlight the most…
…
continue reading

1
Milk Road Mid-Year Crypto Predictions Update for 2025
50:07
50:07
Play later
Play later
Lists
Like
Liked
50:07In this episode, the team revisits their Bitcoin, Ethereum, and Solana price targets. Some targets got crushed early. Others look even more realistic. But one thing’s clear: the cycle isn’t over… and we may be headed for an even bigger run. ~~~~~ 🏦 Borrow against your Bitcoin with Ledn, fast, secure, and without selling a sat: …
…
continue reading

1
Zero-Day in the Call Center: Mitel MiCollab Exploited in Active Attacks
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27In this episode, we dissect the critical vulnerabilities plaguing Mitel MiCollab, a widely used unified communications platform, and explore how attackers are exploiting these flaws in the wild. Recently, security researchers uncovered a trio of dangerous vulnerabilities, including CVE-2024-35286 (a SQL injection flaw), CVE-2024-41713 (an authentic…
…
continue reading

1
The Info-Stealer Sting: A Deep Dive into INTERPOL's Operation Secure
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:39Join us for a gripping discussion on "Operation Secure," a landmark international crackdown that reverberated through the dark corners of the cybercriminal world between January and April 2025. Led by INTERPOL and involving law enforcement from 26 countries, primarily across the Asia-Pacific region, this massive coordinated effort, bolstered by cri…
…
continue reading

1
The World Is Changing and It’s Bullish for Bitcoin w/ Jeff Park
48:50
48:50
Play later
Play later
Lists
Like
Liked
48:50Today’s guest is Jeff Park, Head of Alpha Strategies at Bitwise and one of the sharpest macro minds in crypto. In this episode, Jeff breaks down why the traditional 60/40 portfolio is officially obsolete, how the global carry trade is unraveling, and why Bitcoin is quickly becoming the most important macro asset of our generation. ~~~~~ 🏦 Borrow ag…
…
continue reading

1
Tomcat Manager Attacks: 400 IPs in Coordinated Brute-Force Attack
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49On June 5, 2025, GreyNoise flagged a massive spike in coordinated brute-force login attempts targeting Apache Tomcat Manager interfaces. Nearly 400 unique IP addresses, many traced back to DigitalOcean infrastructure, were involved in a widespread and opportunistic campaign. In this episode, we dissect the attack pattern, what makes Apache Tomcat a…
…
continue reading

1
How to Win Big in High-Risk Crypto Markets w/ LG Doucet
48:16
48:16
Play later
Play later
Lists
Like
Liked
48:16In today’s episode, we bring on Milk Road Degen creator LG Doucet, a battle-tested expert in navigating the riskiest corners of the market. We unpack how LG spots early winners, flips lunch money into life-changing gains, and avoids getting rekt in a market where thousands of tokens can launch in a day. ~~~~~ 🏦 Borrow against your Bitcoin with Ledn…
…
continue reading
On May 12, 2025, the Texas Department of Transportation (TxDOT) disclosed a significant data breach that compromised crash reports containing personal data of over 423,000 individuals. In this episode, we take a forensic look at what went wrong, how one compromised account enabled unauthorized downloads of sensitive crash data, and what this means …
…
continue reading

1
Ghost Students and AI Scams: How Identity Theft is Gutting Financial Aid
43:49
43:49
Play later
Play later
Lists
Like
Liked
43:49What happens when hundreds of thousands of college applications are submitted—not by hopeful students, but by bots using stolen identities? In this episode, we dive deep into the alarming rise of financial aid fraud in U.S. higher education, driven by "ghost students" and increasingly sophisticated scams powered by AI. From fraud rings applying for…
…
continue reading

1
Inside the React Native NPM Supply Chain Breach: 16 Packages, 1 Million+ Downloads, and a RAT in the Code
41:15
41:15
Play later
Play later
Lists
Like
Liked
41:15In this episode, we break down the massive supply chain attack that rocked the React Native ecosystem beginning on June 6, 2025. Over 16 NPM packages, collectively downloaded over one million times per week, were silently weaponized with a Remote Access Trojan (RAT) embedded in obfuscated code. The attack, linked to the same threat actor behind the…
…
continue reading

1
Investors Using AI Will Outperform Everyone Else w/ Alex Svanevik
43:04
43:04
Play later
Play later
Lists
Like
Liked
43:04Crypto markets move fast, too fast for humans to keep up. In today’s episode, we sit down with Alex Svanevik, CEO of Nansen, to explore how artificial intelligence is reshaping the way investors discover alpha, analyze tokens, and outperform the crowd. ~~~~~ 🏦 Borrow against your Bitcoin with Ledn, fast, secure, and without selling a sat: …
…
continue reading

1
Mirai Strikes Again: Spring4Shell, Wazuh, and TBK DVRs Exploited in Live Campaigns
43:52
43:52
Play later
Play later
Lists
Like
Liked
43:52In this episode, we dive into the latest wave of active Mirai botnet campaigns exploiting high-severity remote code execution (RCE) vulnerabilities in critical enterprise and IoT systems. The Mirai malware—still evolving nearly a decade after its first appearance—has adapted its tactics to weaponize recent CVEs with CVSS scores of 9.8 and 9.9, impa…
…
continue reading

1
UNFI Breach: How One Cyberattack Shook the North American Food Supply
36:53
36:53
Play later
Play later
Lists
Like
Liked
36:53On June 5, 2025, United Natural Foods Inc. (UNFI)—North America's largest publicly traded wholesale food distributor and primary supplier for Whole Foods—was struck by a major cyberattack that forced the company to shut down key IT systems. The result: widespread delivery disruptions to over 30,000 locations across the U.S. and Canada, eerily empty…
…
continue reading

1
The $260B Crypto Opportunity (And How to Invest in It) w/ Sam Broner
36:28
36:28
Play later
Play later
Lists
Like
Liked
36:28In today’s episode, investor Sam Broner of a16z joins the Milk Road Show to break down the most underhyped sector in crypto: stablecoins. From Circle’s explosive IPO to Stripe expanding from 42 to 160 countries overnight, the writing’s on the wall: traditional finance is being reprogrammed. But here’s the twist: most investors have no idea how to g…
…
continue reading

1
The Power of Hope in High-Stakes Leadership with BCG’s Kirsten Rulf
27:39
27:39
Play later
Play later
Lists
Like
Liked
27:39We want to hear from you! Email us at [email protected] with a voice memo describing your In Your Ellement moment. We might feature your story in an upcoming episode! *** What can ancient Greek myths teach us about modern leadership? Kirsten Rulf has spent her career at the intersection of tech, policy, and public service. In this episode, K…
…
continue reading

1
Malware-as-Code: The Rise of DaaS on GitHub and the Collapse of Open-Source Trust
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46In this episode, we dissect one of the most sophisticated ongoing cybercrime trends—malware campaigns weaponizing GitHub repositories to compromise developers, gamers, and even rival hackers. By abusing GitHub’s search functionality and reputation signals, threat actors are pushing backdoored code under the guise of popular tools, game cheats, and …
…
continue reading

1
The Biggest Bubble in Crypto Is Coming w/ Rizzo
47:39
47:39
Play later
Play later
Lists
Like
Liked
47:39In this episode, we’re joined by Pete Rizzo, OG Bitcoin historian, and host of Supply Shock, to unpack a growing trend no one’s watching closely enough: Bitcoin treasury companies. From MicroStrategy’s playbook to a wave of new IPOs, this might be the next mania phase just dressed in a suit and traded on the stock market. ~~~~~ 🏦 Borrow against you…
…
continue reading

1
ClickFix: How Fake Browser Errors Became the Internet’s Most Dangerous Trap
47:15
47:15
Play later
Play later
Lists
Like
Liked
47:15In this episode, we dive deep into ClickFix, also tracked as ClearFix or ClearFake—a highly effective and deceptive malware delivery tactic that emerged in early 2024. ClickFix exploits the human tendency to trust browser prompts by using fake error messages, CAPTCHA pages, and verification requests to convince users to execute malicious PowerShell…
…
continue reading

1
Exposed and Extorted: The ViLE Hackers and the Legal Gaps Enabling Doxing
47:31
47:31
Play later
Play later
Lists
Like
Liked
47:31Cybercrime is rapidly evolving—and so are its tactics. In this episode, we dissect the findings of SoSafe’s Cybercrime Trends 2025 report and explore the six key trends reshaping the global threat landscape, including AI as an attack surface, multichannel intrusions, and the rising exploitation of personal identities. But we don’t stop at theory. W…
…
continue reading

1
Mark Yusko Reveals How to Build a Bulletproof Crypto Investment Portfolio
48:52
48:52
Play later
Play later
Lists
Like
Liked
48:52In this episode, legendary macro investor Mark Yusko delivers a blunt diagnosis of the global economy: fiat is failing and Bitcoin is the only escape hatch left. With governments drowning in debt and central banks printing like there’s no tomorrow, Yusko explains why we’re heading straight into a global currency collapse… and how you can survive it…
…
continue reading

1
Chrome Under Fire: Three Zero-Days, One Month, and Nation-State Exploits
28:23
28:23
Play later
Play later
Lists
Like
Liked
28:23In this episode, we dive deep into three actively exploited zero-day vulnerabilities discovered in Google Chrome in 2025, each of which was patched in rapid succession following targeted attacks. At the center is CVE-2025-5419, a high-severity out-of-bounds read/write flaw in the V8 JavaScript engine that allows attackers to exploit heap corruption…
…
continue reading

1
How One Company Is Using Solana to Outperform Bitcoin Treasuries w/ Leah Wald & Max Kaplan
50:45
50:45
Play later
Play later
Lists
Like
Liked
50:45What if MicroStrategy’s Bitcoin play isn’t the most profitable crypto treasury strategy anymore? In today’s episode, we sit down with Leah Wald and Max Kaplan from SOL Strategies, a public company going all-in on Solana, not just by holding it, but by building real infrastructure and revenue streams on top of it. ~~~~~ 🏦 Borrow against your Bitcoin…
…
continue reading

1
Australia Forces Transparency: The World’s First Mandatory Ransomware Payment Reporting Law
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01Australia just made cyber history. On May 30, 2025, the nation became the first in the world to enforce mandatory ransomware payment reporting under the newly enacted Cyber Security Act 2024. In this episode, we dissect what this means for businesses, law enforcement, and the global cybersecurity landscape. We break down the key aspects of the legi…
…
continue reading

1
$25M for AI Email Security: Trustifi’s Big Bet on the MSP Market
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00In this episode, we dive into Trustifi’s recent $25 million Series A funding round, led by growth equity firm Camber Partners. Specializing in AI-powered email security, Trustifi has now raised a total of $29 million to accelerate its product development, go-to-market strategy, and global marketing initiatives—especially in the MSP space. We unpack…
…
continue reading

1
Google Chrome vs. Failing CAs: The Policy Behind the Distrust
55:25
55:25
Play later
Play later
Lists
Like
Liked
55:25In this episode, we dissect Google's recent and upcoming decisions to distrust several Certificate Authorities (CAs) within the Chrome Root Store, including Entrust, Chunghwa Telecom, and Netlock. These high-impact moves are rooted in Chrome's strict enforcement of compliance, transparency, and security standards for public trust. We explore the ro…
…
continue reading

1
America's Debt Crisis Will Lead to a Mega Asset Boom w/ Lawrence Lepard
43:29
43:29
Play later
Play later
Lists
Like
Liked
43:29In today’s episode, legendary investor and sound money advocate Lawrence Lepard joins The Milk Road Show to explain why the U.S. monetary system is spiraling into a crisis… and how that collapse could kick off the biggest asset boom of our lifetime. ~~~~~ 🏦 Borrow against your Bitcoin with Ledn, fast, secure, and without selling a sat: …
…
continue reading

1
CVE-2025-48827 & 48828: How vBulletin’s API and Template Engine Got Weaponized
1:35:55
1:35:55
Play later
Play later
Lists
Like
Liked
1:35:55Two critical, actively exploited vulnerabilities in vBulletin forum software—CVE-2025-48827 and CVE-2025-48828—have put thousands of websites at immediate risk of full system compromise. In this episode, we dissect how these flaws, triggered by insecure usage of PHP’s Reflection API and abuse of vBulletin’s template engine, allow unauthenticated at…
…
continue reading

1
JINX-0132: How Cryptojackers Hijacked DevOps Infrastructure via Nomad and Docker
1:07:22
1:07:22
Play later
Play later
Lists
Like
Liked
1:07:22In this episode, we dissect the JINX-0132 cryptojacking campaign — a real-world example of how threat actors are exploiting cloud and DevOps environments to mine cryptocurrency at scale. We unpack how cybercriminals targeted misconfigured Docker APIs, publicly exposed HashiCorp Nomad and Consul servers, and vulnerable Gitea instances — turning ente…
…
continue reading

1
Password Hashes Leaked via Linux Crash Handlers: The Truth Behind CVE-2025-5054 & 4598
16:11
16:11
Play later
Play later
Lists
Like
Liked
16:11In this episode, we unpack two newly disclosed Linux vulnerabilities—CVE-2025-5054 and CVE-2025-4598—discovered by the Qualys Threat Research Unit (TRU). These race condition flaws impact Ubuntu’s apport and Red Hat/Fedora’s systemd-coredump, exposing a little-known but critical attack vector: core dumps from crashed SUID programs. We dive into how…
…
continue reading

1
The Bitcoin Floodgates Are About to Open w/ Olivier Roussy Newton
39:37
39:37
Play later
Play later
Lists
Like
Liked
39:37In today’s episode, we sit down with Olivier Roussy Newton, OG Bitcoiner and CEO of DeFi Technologies, to explore a seismic shift quietly building under the surface: sovereign wealth funds, central banks, and pension funds are gearing up to enter Bitcoin… but most still can’t buy yet. The big money is moving silently, are you positioned to front-ru…
…
continue reading

1
Multi-Stage Phishing Attacks Now Use Google Infrastructure—Here’s How
13:51
13:51
Play later
Play later
Lists
Like
Liked
13:51Recent phishing campaigns have entered a new phase—one where trust is weaponized. In this episode, we break down how cybercriminals are exploiting legitimate services like Google Apps Script and Google Firebase Storage to host phishing pages, evade detection, and steal credentials. Using cleverly crafted lures such as fake DocuSign notifications, i…
…
continue reading

1
Inside the AVCheck Takedown: How Law Enforcement Disrupted a Key Cybercrime Tool
17:34
17:34
Play later
Play later
Lists
Like
Liked
17:34In this episode, we unpack the international takedown of AVCheck, one of the largest counter antivirus (CAV) services used by cybercriminals to test and fine-tune malware before deployment. Led by Dutch authorities and supported by agencies from the U.S., Germany, France, and others, this operation marks a major win in Operation Endgame—a sweeping …
…
continue reading

1
Ethereum Gets a MicroStrategy + Bitcoin Arms Race Begins w/ Milk Road PRO
59:21
59:21
Play later
Play later
Lists
Like
Liked
59:21Corporate Bitcoin buying just hit a new level: Trump Media is dropping $2.5 billion to ape into BTC, Saylor-style. But that’s not all. Joseph Lubin just backed a $425M Ethereum treasury strategy that could make ETH the next reserve asset…Meanwhile, Kaido is turning Twitter influence into money printers, and Virtuals is back from the dead with a poi…
…
continue reading

1
ConnectWise Breach: Nation-State Exploits CVE-2025-3935 in ScreenConnect
15:06
15:06
Play later
Play later
Lists
Like
Liked
15:06ConnectWise has confirmed a cyberattack targeting ScreenConnect, its remote access solution used by thousands of Managed Service Providers (MSPs). The breach is reportedly tied to a sophisticated nation-state actor and linked to CVE-2025-3935, a critical ViewState code injection vulnerability that could allow Remote Code Execution (RCE). In this ep…
…
continue reading

1
Bitcoin Is Winning the Macro Game w/ Coinbase Head of Research David Duong
49:06
49:06
Play later
Play later
Lists
Like
Liked
49:06In today’s episode, Coinbase’s Head of Research David Duong joins us to break down why Bitcoin is emerging as the ultimate macro asset in a world of trade wars, fiscal fireworks, and corporate treasury revolutions. From $5B in FTX repayments hitting the market to nation-states eyeing BTC as a strategic reserve, we dig into the biggest forces shapin…
…
continue reading

1
Browser vs. GPU: Firefox 139 Collides with NVIDIA Drivers
14:10
14:10
Play later
Play later
Lists
Like
Liked
14:10In this episode, we dive into the graphical corruption saga triggered by Firefox version 139, released on May 27, 2025. Aimed at uncovering what went wrong, we review reports from across the web detailing how the update wreaked havoc for Windows users running NVIDIA graphics cards—particularly those with multi-monitor setups using mixed refresh rat…
…
continue reading