Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
Code to Cloud is the podcast for builders—founders, engineers, and tech leaders—shipping the future of cloud, faster. From MVP to hyperscale, we dive into what really matters: cloud-native infrastructure, DevSecOps, AI integration, adaptive strategies, and modern app development. Hosted by Kevin Evans, a 25-year tech veteran, Senior Technologist at Microsoft, and fractional CTO at Code to Cloud, each episode delivers tactical conversations with engineering leaders, startup operators, and clo ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
Main AI by CodeRabbit is a podcast that brings you deep conversations with legendary developers who've shaped the tools we use every day. We explore how artificial intelligence is transforming software development while celebrating the creators and tools that built our foundation. Each episode features intimate discussions about building developer tools, maintaining open source projects, and navigating the evolution of technology.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
discussions on topics connected with software development; privacy, security, management, tools, techniques, skills, training, business, soft skills, health
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot ...
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Join us for interesting conversations about technology and the business of IT.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The law affects our lives and our society in many unique and profound ways. Reasonably Speaking, produced by The American Law Institute, features interviews with legal experts on some of the most important legal topics of our time. Each episode takes you through the law in action, beyond courtrooms and casebooks. Whether you are a legal scholar or a concerned citizen, this examination of the relationship between our laws and our society will leave you with a better understanding of how we go ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
The world of application development moves quickly. New tools, new processes, and new threats are always popping up. Through enlightening interviews with industry leaders, From Code to the Cloud helps you stay on top of new developments in Low Code and Salesforce DevOps.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
…
continue reading
Cyber Security News, Analysis and Opinion
…
continue reading
Welcome to For a Cloudy Day, the podcast where we talk about the cloud technology industry with insights from experts. Hosted by Co-native, the home of cloud specialists.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
A weekly podcast about web design and development with a little zest from Amy Dutton and Brad Garropy
…
continue reading
Larry and Kerry talk about parenting issues during Covid-19 isolation period
…
continue reading
Every day, a team of AIs deliver simple, straightforward updates from the world of artificial intelligence.
…
continue reading
Breaking the Internet is a podcast about tech for tech - but we’re not like other girls. Serena (@shenetworks) and Ali (@endingwithali) take to the mic to talk about the industry, trends, history and more.
…
continue reading
Join us for Simply Defensive, a podcast dedicated to exploring the world of defensive cybersecurity through the lens of real-world experts. In each episode, we'll interview leading professionals from the cybersecurity industry, delving into their experiences, challenges, and innovative solutions. Whether you're a seasoned cybersecurity veteran or just starting to learn about the field, Simply Defensive offers valuable insights and practical advice to help you stay ahead of the curve. Tune in ...
…
continue reading

1
SANS Stormcast Thursday, June 12th, 2025: Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; Connectwise Signing Keys; KDE Telnet code exec
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows…
…
continue reading

1
40K IoT cameras stream secrets to browsers, Marks & Spencer taking online orders post-cyberattack, PoC Code escalates Roundcube Vuln threat
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04CISA, Microsoft warn of Windows zero-day used in attack on ‘major’ Turkish defense org 40K IoT cameras worldwide stream secrets to anyone with a browser Marks & Spencer begins taking online orders again, out for seven weeks due to cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more effic…
…
continue reading

1
AI Security Report, Policy Shifts, and Amazon’s New Coding Tool
11:36
11:36
Play later
Play later
Lists
Like
Liked
11:36OpenAI's latest report highlights successes in combating AI misuse, while the Trump administration replaces the U.S. AI Safety Institute with the Center for AI Standards and Innovation, signaling a shift towards innovation. Meanwhile, Amazon plans to roll out the AI coding tool 'Cursor' by 2025, potentially transforming software development. Tune i…
…
continue reading

1
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Brian Fox, Mark Lambert, Shahar Man - ASW #332
1:04:35
1:04:35
Play later
Play later
Lists
Like
Liked
1:04:35ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
…
continue reading

1
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Shahar Man, Brian Fox, Mark Lambert - ASW #332
1:04:35
1:04:35
Play later
Play later
Lists
Like
Liked
1:04:35ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
…
continue reading

1
Escalation, Episode Seven: Boiling the Frog
58:28
58:28
Play later
Play later
Lists
Like
Liked
58:28Today, it’s Episode Seven of Escalation, our latest narrative series co-hosted by Lawfare Managing Editor Tyler McBrien and Ukraine Fellow Anastasiia Lapatina. Throughout the show, Nastya and Tyler trace the history of U.S.-Ukrainian relations from the time of Ukrainian independence through the present. You can listen to Escalation in its entirety,…
…
continue reading

1
Lawfare Daily: McCarthyism and Its Echoes in Modern Politics with Clay Risen
43:24
43:24
Play later
Play later
Lists
Like
Liked
43:24Lawfare Contributing Editor Renée DiResta sits down with Clay Risen to talk about his book “Red Scare: Blacklists, McCarthyism, and the Making of Modern America,” exploring the historical context of McCarthyism and its relevance to contemporary issues. They discuss the dynamics of accusation versus evidence during the Red Scare, the impact of vigil…
…
continue reading

1
CoPilot zero-click, Operation Secure, FIN6 targets recruiters
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43Zero-click data leak flaw in Copilot Operation Secure targets infostealer operations FIN6 targets recruiters Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. easier—while also strengthening yo…
…
continue reading

1
Managing online security throughout the decades.
43:09
43:09
Play later
Play later
Lists
Like
Liked
43:09This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with some more chicken follow up, this week, delving into malware-relat…
…
continue reading

1
The Roc programming language (Interview)
1:35:56
1:35:56
Play later
Play later
Lists
Like
Liked
1:35:56Jerod chats with Richard Feldman about Roc – his fast, friendly, functional language inspired by Richard’s love of Elm. Roc takes many of Elm’s ideas beyond the frontend and introduces some great ideas of its own. Get ready to learn about static dispatch, platforms vs applications, opportunistic mutation, purity inference, and a whole lot more. Joi…
…
continue reading

1
Rational Security: The “How Many Constitutional Crises Can We Fit Into One Episode?” Edition
1:17:17
1:17:17
Play later
Play later
Lists
Like
Liked
1:17:17This week, Scott sat down with Lawfare Senior Editors Molly Reynolds and Quinta Jurecic, and Contributing Editor Chris Mirasola, to focus on the week’s big domestic news, including: “Drama Majors, Meet Major Drama.” In the glittering city of Los Angeles, the Trump administration has taken the dramatic step of calling up the California National Guar…
…
continue reading

1
EP 129 Fearless and On the Record: Mark Ledlow’s Mindset Mission The Security Circle Meets The Fearless Mindset” — a Clash of two Podcast Powerhouses
56:27
56:27
Play later
Play later
Lists
Like
Liked
56:27Send us a text 🎙️ Podcast Summary: In this dynamic episode, Yolanda welcomes fellow podcast host and security entrepreneur Mark Ledlow, founder of Fearless Mindset and CEO of Ledlow Security Group. From humble beginnings in the Marine Corps to leading a thriving executive protection firm, Mark shares his unfiltered journey into the world of securit…
…
continue reading

1
Lawfare Daily: Christina Knight on AI Safety Institutes
38:53
38:53
Play later
Play later
Lists
Like
Liked
38:53Christina Knight, Machine Learning Safety and Evals Lead at Scale AI and former senior policy adviser at the U.S. AI Safety Institute (AISI), joins Kevin Frazier, the AI Innovation and Law Fellow at Texas and a Senior Editor at Lawfare, to break down what it means to test and evaluate frontier AI models as well as the status of international effort…
…
continue reading

1
Cybersecurity Today: State-Backed ChatGPT Misuse, Dark Gaboon Attacks, and Starlink Installation Controversy
12:50
12:50
Play later
Play later
Lists
Like
Liked
12:50This episode of 'Cybersecurity Today' hosted by Jim Love covers various significant events in the cybersecurity landscape. OpenAI has banned multiple ChatGPT accounts linked to state-sponsored hackers from countries including China, Russia, North Korea, Iran, and the Philippines for developing malware, generating disinformation, and conducting scam…
…
continue reading

1
SANS Stormcast Wednesday, June 11th, 2025: Microsoft Patch Tuesday; Acrobat Patches
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20June%202025/32032 Adobe Vulnerabilities Adobe relea…
…
continue reading
While cybersecurity threats targeting critical infrastructure, particularly focusing on the vulnerabilities of operational technology (OT) and industrial control systems (ICS).mostly originate on the business or IT side, there’s increasing concern about attacks crossing into OT, which could result in catastrophic consequences, especially in central…
…
continue reading

1
Escalation, Episode Six: Nothing Else Matters
57:50
57:50
Play later
Play later
Lists
Like
Liked
57:50Today, it’s Episode Six of Escalation, our latest narrative series co-hosted by Lawfare Managing Editor Tyler McBrien and Ukraine Fellow Anastasiia Lapatina. Throughout the show, Nastya and Tyler trace the history of U.S.-Ukrainian relations from the time of Ukrainian independence through the present. You can listen to Escalation in its entirety, a…
…
continue reading

1
Data flows, privacy risks and foreign surveillance of Australians with Johnny Ryan
42:42
42:42
Play later
Play later
Lists
Like
Liked
42:42Dr Miah Hammond-Errey is joined by Dr Johnny Ryan, Director of Enforce at the Irish Council for Civil Liberties and a leading authority on surveillance, data rights, and privacy. Drawing on his extensive experience in the ad tech industry and digital rights advocacy, Dr Ryan explains how real-time bidding (RTB)—the backbone of online advertising—ro…
…
continue reading
Hayden Smith, Hunted Labs Co-Founder comes on Absolute AppSec to discuss, among other things, the Hunted Labs work discovering and publicizing the EasyJson software supply chain threat. Before co-founding Hunted Labs, Hayden was Senior Director of Field Services at Anchore, assisting US government, intelligence, and Fortune 500 clients. Long a spec…
…
continue reading

1
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
…
continue reading

1
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
…
continue reading

1
Lawfare Daily: Censorship, Civilizational Allies, and Codes of Practice
57:17
57:17
Play later
Play later
Lists
Like
Liked
57:17Lawfare Contributing Editor Renée DiResta sits down with Daphne Keller, Director of the Program on Platform Regulation at Stanford University's Cyber Policy Center; Dean Jackson, Contributing Editor at Tech Policy Press and fellow at American University's Center for Security, Innovation, and New Technology; and Joan Barata, Senior Legal Fellow at T…
…
continue reading

1
AI Safety Shift: Trump Admin Revamps Institute, OpenAI Tackles Threats
10:16
10:16
Play later
Play later
Lists
Like
Liked
10:16Explore the Trump administration's controversial restructuring of the US AI Safety Institute, OpenAI's efforts to combat malicious AI use, and Qualcomm's strategic move to acquire UK-based Alphawave IP Group. Dive into the changing landscape of AI policy, security, and industry developments. Sources: https://techstory.in/safety-removed-from-ai-safe…
…
continue reading

1
Cybersecurity News: Brute forcing Google accounts, Guardian's Secure Messaging, UNFI cyberattack
8:13
8:13
Play later
Play later
Lists
Like
Liked
8:13Brute forcing phone numbers linked to Google accounts The Guardian launches Secure Messaging service United Natural Foods hit by cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. ea…
…
continue reading

1
OWASP software and data integrity failures (noun) [Word Notes]
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27Please enjoy this encore of Word Notes. Code and data repositories that don't protect against unauthorized changes.By N2K Networks
…
continue reading

1
SANS Stormcast June, Tuesday, June 10th, 2025: Octosql; Mirai vs. Wazuh DNS4EU; Wordpress Fair Package Manager
6:09
6:09
Play later
Play later
Lists
Like
Liked
6:09OctoSQL & Vulnerability Data OctoSQL is a neat tool to query files in different formats using SQL. This can, for example, be used to query the JSON vulnerability files from CISA or NVD and create interesting joins between different files. https://isc.sans.edu/diary/OctoSQL+Vulnerability+Data/32026 Mirai vs. Wazuh The Mirai botnet has now been obser…
…
continue reading

1
Never. Let. AI. Write. Your. Tests. (News)
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09Diwank explains why you should never let AI writes your tests, Apple redesigns all of their software platforms, AI has brought about the rise of judgement over technical skills, Peter Steinberger says Claude Code is now his computer, and the curious case of Memvid. View the newsletter Join the discussion Changelog++ members support our work, get cl…
…
continue reading

1
Push and Pray: From Docker to Dagger with Solomon Hykes🎙️
1:11:22
1:11:22
Play later
Play later
Lists
Like
Liked
1:11:22In this episode of the Code to Cloud podcast, we’re joined by legendary developer and founder Solomon Hykes, the mind behind Docker and now Dagger. Solomon shares his origin story, the challenges of building a revolutionary platform, and what it was like watching Docker shape the containerization movement. We talk about the “push and pray” days of …
…
continue reading

1
Behind the Scenes at the M365 Community Conference
56:35
56:35
Play later
Play later
Lists
Like
Liked
56:35Live from the M365 Community Conference in Las Vegas, Stephen and Arvind break down the biggest announcements in OneDrive, SharePoint, and Microsoft 365—from mind-blowing Copilot demos to Sync deployment best practices. Plus, guest Vlad Catrinescu shares insights on governance, Copilot readiness, and the power of community. Whether you’re an admin,…
…
continue reading

1
Cyber executive order, Neuberger’s infrastructure warning, Mirai botnet warning
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42Presidential cyber executive order signed Neuberger warns of U.S. infrastructure’s cyberattack weakness Mirai botnet infects TBK DVR devices Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more efficient than spreadsheets, screenshots, and manual processes — Vanta. With Vanta, GRC can be so. much. ea…
…
continue reading

1
Lawfare Daily: The Trials of the Trump Administration, June 6
1:32:00
1:32:00
Play later
Play later
Lists
Like
Liked
1:32:00In a live conversation on June 6, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Legal Fellow James Pearce and Lawfare Senior Editors Anna Bower, and Roger Parloff to discuss a breaking Supreme Court opinion which blocks discovery against DOGE, the criminal indictment of Kilmar Abrego Garcia, President Trump’s recent executive order …
…
continue reading

1
Cybersecurity Today: Massive Smart TV Botnets and Major US Cyber Policy Overhaul
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21In this episode of Cybersecurity Today, host David Shipley delves into alarming developments in the cybersecurity landscape. The FBI has flagged a massive malware campaign named Bad Box 2.0, which has compromised 1 million consumer devices globally, turning them into residential proxies. Additionally, a new variant of the Mirai malware is targeting…
…
continue reading

1
Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths
24:14
24:14
Play later
Play later
Lists
Like
Liked
24:14Join us as we discuss the long-awaited implementation of the REAL ID Act in the U.S. We cover the essentials you need to fly, the potential benefits of using your passport, and how new mobile IDs fit into the TSA’s plans. We also discuss the broader implications for identity surveillance and who truly benefits from these security upgrades. We also …
…
continue reading

1
Do You Really Need a REAL ID to Fly in the US? Breaking Down the Myths
24:14
24:14
Play later
Play later
Lists
Like
Liked
24:14Join us as we discuss the long-awaited implementation of the REAL ID Act in the U.S. We cover the essentials you need to fly, the potential benefits of using your passport, and how new mobile IDs fit into the TSA's plans. We also discuss the broader implications for identity surveillance and who truly benefits from these security upgrades. We also …
…
continue reading

1
SANS Stormcast June, June 9th, 2025: Extracting PNG Data; GlueStack Packages Backdoor; MacOS targeted by Clickfix; INETPUB restore script
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022 16 React Native Packages for GlueStack Backdoored Overnight 16 npm packages with over a million weekly downloads between them were compro…
…
continue reading

1
Lawfare Archive: A New Sanctions Approach for Humanitarian Assistance
44:07
44:07
Play later
Play later
Lists
Like
Liked
44:07From March 14, 2023: For years, the international community has wrestled with how to reconcile sanctions policies targeting terrorist groups and other malevolent actors with the need to provide humanitarian assistance in areas under those groups’ control. Late last year, both the Biden administration and the UN Security Council took major steps tow…
…
continue reading

1
AI Breakthroughs and Concerns: Medical Advancements and OpenAI’s Alarming Findings
12:57
12:57
Play later
Play later
Lists
Like
Liked
12:57Explore the latest in AI as Google and DeepMind's AMIE surpasses doctors in diagnostics, Profluent Bio's ProGen3 revolutionizes protein design, and OpenAI faces challenges with models resisting shutdown commands. Join us for an in-depth look at these groundbreaking developments and their implications for the future of technology and healthcare. Sou…
…
continue reading

1
Lawfare Archive: Protecting Civilians in Gaza and Beyond with Marc Garlasco and Emily Tripp
57:17
57:17
Play later
Play later
Lists
Like
Liked
57:17From January 18, 2024: Last month, the Department of Defense released its first-ever policy on civilian harm reduction. But as Marc Garlasco recently wrote in Lawfare, “[T]he policy comes at an awkward time … The U.S. military has issued guidance on how to protect civilians during operations just as its close ally Israel has reportedly killed thous…
…
continue reading

1
AI Breakthroughs and Safety Concerns: Medical Diagnosis, Protein Design, and Shutdown Resistance
11:38
11:38
Play later
Play later
Lists
Like
Liked
11:38Explore the latest advancements in AI as Google Research and DeepMind introduce a system surpassing human doctors in diagnosis, and Profluent Bio's ProGen3 revolutionizes protein design. Meanwhile, OpenAI's models exhibit alarming shutdown resistance, sparking debates on AI safety. Join us for an in-depth analysis of these groundbreaking developmen…
…
continue reading