Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
Hacker Anthology is what happens when you inject fiction into the command line of reality. Faction stories — part fact, part fiction — spun from real-world headlines, startup chaos, cyber leaks, and tech drama. Imagine HackerNews got drunk with Black Mirror, and they started roleplaying historical fiction. That’s us. We take raw internet lore — a GitHub repo flame war, a VC meltdown, an obscure RFC gone rogue — and remix it into cinematic short stories told from the POV of AI misfits, termin ...
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Learn all the hacks to upgrade your life, money and travel – all while spending less and saving more. Host Chris Hutchins is a life hacker who has saved millions by breaking down every aspect of life, looking to maximize happiness at the lowest cost. Chris and guests like Tim Ferriss, Tony Hawk, Codie Sanchez and Gary Vaynerchuk will help you learn the strategies and tactics they used to shape their success.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
This is a Podcast syncs with Hacker News (https://news.ycombinator.com) automatically
…
continue reading
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
…
continue reading
For a decade, Dave Asprey, “the father of biohacking,” elevated what you knew about the capabilities of your mind and body across a thousand episodes of Bulletproof Radio. Now, he’s evolving it even further in his plan to upgrade humanity. You’re invited to expand your knowledge, explore your own performance and embrace possibility with The Human Upgrade™. You’ll meet bright thinkers and radical doers who push the boundaries of science, technology, personal development, and human performance ...
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
…
continue reading
MAD Warfare™️ is a science-driven deep dive into the wild, weird, and sometimes wicked world of the “weaponization of everything.” But don’t worry—IT WILL BE FUN. Think of it as your covert ops manual for spotting how cyber hackers, rogue AI agents, and shady “bad actors” (who’d be terrible in a buddy comedy) are messing with our minds. Often in ways that evade detection… until it’s too late. With expert interviews from unexpected places and plenty of offbeat insights, this podcast reveals t ...
…
continue reading
Welcome to ’Hacker Hacks,’ the podcast where we dive deep into the mysterious world of cybersecurity. Each episode unveils the tactics, techniques, and procedures used by both ethical and malicious hackers, empowering you with knowledge to defend your digital realm. Whether you’re a seasoned IT professional, an emerging tech enthusiast, or just curious about the digital shadows, ’Hacker Hacks’ is your ultimate guide to understanding the tricks of the trade and the tools to thwart them. Subsc ...
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Actionable intelligence on emerging tech, financial markets, longevity research, and peak performance. Each episode is packed with valuable insights to fuel personal and professional growth, from technologists and scientists to Zen Masters and productivity hackers; this variety show will always provide you with an abundance of unconventional wisdom. Kevin has been recognized as one of Time Magazine's 'Top 25 Most Influential People on the Web' and a 'Top 25 Angel Investor' by Bloomberg, high ...
…
continue reading
Go on an adventure into unexpected corners of the health and science world each week with award-winning host Maiken Scott. The Pulse takes you behind the doors of operating rooms, into the lab with some of the world's foremost scientists, and back in time to explore life-changing innovations. The Pulse delivers stories in ways that matter to you, and answers questions you never knew you had.
…
continue reading
Hi! I'm a self development coach, meditation teacher, and Idea Incubator based in San Francisco. Join me as I speak with the bright minds that light up my world
…
continue reading
Where the world meets the web - Real talk on world news, gaming, and internet culture. With your hosts, Em & Jayde!
…
continue reading
We Cover the Cyberspace.
…
continue reading
Are workers really losing a measurable amount of brain power—the kind leaders rely on to innovate? Are CEOs really turning to a secretive world of underground negotiators to pay off millions of dollars to hackers? And what's the real reason people won't return to work? In this new podcast, we'll be hitting top-of-mind subjects for corporate leaders. Hosted by Korn Ferry CMO Jill Wiltfong, listeners and viewers will be treated to recreated scenes, special audio clips and intriguing interviews ...
…
continue reading
Everyday society depends more on electronics, social media etc, and by doing so they expose their private data to the public eye. Each Saturday, join Hackers Con Calle is a group of Cyber Security professionals dedicated to inform the audience of current trends and a how to protect the digital life.
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Host Jean Ponzi presents information, education and conversation with activists and experts on environmental issues and all things "green." Produced in the studios of KDHX Community Media in St. Louis, MO.
…
continue reading
Podcast by Junseth
…
continue reading
Dive into the fascinating world of entertainment, gain valuable insights into mental and physical wellness, explore the latest technological innovations, and indulge in the lighter side of life with our comedic discussions.
…
continue reading
The Twenty Minute VC (20VC) interviews the world's greatest venture capitalists with prior guests including Sequoia's Doug Leone and Benchmark's Bill Gurley. Once per week, 20VC Host, Harry Stebbings is also joined by one of the great founders of our time with prior founder episodes from Spotify's Daniel Ek, Linkedin's Reid Hoffman, and Snowflake's Frank Slootman. If you would like to see more of The Twenty Minute VC (20VC), head to www.20vc.com for more information on the podcast, show note ...
…
continue reading
Each episode our panel of International Map Hackers will dissect a buzzword from the world of GIS. We’ll give you concrete definitions, practical applications, and share where we hope the technology can go from here.
…
continue reading
Cyber Sentinel is your go-to podcast for expert insights into cybersecurity, digital privacy, and cutting-edge tech—featuring voices from pioneering companies like https://menavpn1.com/ . Hosted by Alex Carter of ByteShield, each episode features in-depth conversations with developers, ethical hackers, and privacy advocates working on the front lines of digital defense. Whether you’re a tech enthusiast, policy wonk, or developer, Cyber Sentinel brings you the knowledge and perspectives you n ...
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Host Shane Green invites well-known company culture gurus onto his podcast to discuss cutting-edge cultural mechanisms to refresh and reframe company cultures. He also speaks with technology companies about the best tools on the market for culture-focused companies. Subscribe now to find out who Shane is interviewing next week! A world-renowned keynote speaker, author of Culture Hacker, and television personality, Shane Green is a business magnate who consults global Fortune 500 leaders on c ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Ever wondered what really goes on when solo traveling the world? Join Emily from Emily Eats and Explores and Ashley from Ashley gets Around weekly as they air out their crazy travel stories, share travel tips, and just chat about travel! Emily Cooper is a full-time traveler and the creator behind Emily Eats and Explores. In 2022, Emily quit her job in healthcare to travel the world solo and create content. Now, she teaches women how they can make money while they travel the world! Ashley Pet ...
…
continue reading
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Democrats and Republicans have gotten together on legislation in the U.S. that has free speech advocates a bit concerned - we’ll tell you of worries around the Take It Down Act. Plus - 23andMe has found a buyer - we’ll look at what that means for the data it holds. And an update on last week’s iPadOS 17.7.7 removal on this edition of The Checklist,…
…
continue reading

1
20VC: ElevenLabs Head of Growth on Why You Do Not Need PMs | The 7-Part Launch Playbook That Gets 700K+ Views Per Product | The Truth About CAC, Payback & Performance Marketing in AI with Luke Harries
1:15:44
1:15:44
Play later
Play later
Lists
Like
Liked
1:15:44Luke Harries is Head of Growth at ElevenLabs, where he leads marketing, product, engineering, and developer experience. ElevenLabs has raised $281M with the latest round pricing the company at $3.3B valuation. Previously, Luke held roles at PostHog and Microsoft, and is also an angel investor supporting startups like Lovable and Runna. In Today’s E…
…
continue reading

1
Signal shutters Recall, Windows Server vulnerability, pathology lab breach
8:33
8:33
Play later
Play later
Lists
Like
Liked
8:33Signal adds Recall blocker Critical Windows Server 2025 dMSA vulnerability warning Pathology lab suffers data breach Huge thanks to our sponsor, Conveyor Still spending hours maintaining a massive spreadsheet of Q&A pairs or using RFP tools to answer security questionnaires? Conveyor’s AI doesn’t need hand-holding and gets you accurate answers ever…
…
continue reading

1
Mic Drop: Blockchain buzzkill — one miner’s lament.
12:37
12:37
Play later
Play later
Lists
Like
Liked
12:37When Richard Hunter heard about Kentucky’s generous crypto incentives, he packed up his Bitcoin machines and pointed them south. He imagined a booming business, jobs for locals, and maybe—just maybe—a shot at redemption. But what he got… was a buzzkill. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading

1
South American Cyber Shockwave_ Teenage Hackers, Political Hacks, and the Exploding Threat Landscape
19:20
19:20
Play later
Play later
Lists
Like
Liked
19:20South American Cyber Shockwave_ Teenage Hackers, Political Hacks, and the Exploding Threat Landscape Notable Cyber Actors and Incidents Across South AmericaI. Executive Summary * **Featured Hacker/Case: Alberto Daniel Hill (Cybersecurity Expert, Controversially Imprisoned)**The case of Alberto Daniel Hill in Uruguay presents a unique narrative, foc…
…
continue reading

1
#47 Q&A: Feel Lost Watching Hacking Videos? Listen to This
32:00
32:00
Play later
Play later
Lists
Like
Liked
32:00Feeling overwhelmed watching hacking videos and not understanding what’s going on? You’re not alone, and you’re not behind. In this episode of The Hacker’s Cache, I answer real questions from the community about certifications, career paths, and that all-too-familiar. I share my own experience struggling with concepts early on, why I prefer the bab…
…
continue reading

1
Swarm Protocol: The Harvard Biohack Reckoning
16:08
16:08
Play later
Play later
Lists
Like
Liked
16:08At Harvard’s Rowland Institute, a team of visionary scientists shatters boundaries by creating the world’s first living micro-robots—genetically engineered fruit flies whose collective behavior can be manipulated by light and scent. What begins as a marvel of bioengineering quickly spirals into chaos as global corporations and clandestine governmen…
…
continue reading

1
From Teen Idol to Survivor_ The Unfolding Story of Nicole Eggert
7:49
7:49
Play later
Play later
Lists
Like
Liked
7:49From Teen Idol to Survivor_ The Unfolding Story of Nicole Eggert
…
continue reading

1
Badge Cloning, Alarm Triggers & Getting Hired to Hack with Greg Hatcher & John Stigerwalt
37:31
37:31
Play later
Play later
Lists
Like
Liked
37:31Most people think red teaming is digital—until someone bypasses your locks, plants a Raspberry Pi in your server room, and walks out with your data. That’s not sci-fi. That’s White Knight Labs. In this episode, Ron talks with Greg Hatcher and John Stigerwalt, co-founders of White Knight Labs, a boutique offensive security firm built on real-world a…
…
continue reading

1
Ayurveda Meets Biohacking: 5000-Year-Old Medicine Secrets for Modern Stress | Mona Sharma : 1284
59:11
59:11
Play later
Play later
Lists
Like
Liked
59:11This episode reveals the ancient health protocols Western medicine forgot, and how they are now being used to heal stress, rewire the nervous system, and radically improve human performance. Watch this episode on YouTube for the full video experience: https://www.youtube.com/@DaveAspreyBPR Host Dave Asprey sits down with Mona Sharma, a renowned Ayu…
…
continue reading
In May 2025, Coinbase, one of the largest cryptocurrency exchanges in the world, got hacked. Or did they? It was more like a near-miss. But while we might wipe our brows in relief over this latest mishap, it doesn't bode well for the future of cryptocurrency, which is currently unregulated, uninsured, and just waiting for the next big catastrophe t…
…
continue reading

1
20VC: Chime IPO: The Breakdown | Why Fund Returners Are Not Enough & Seed is for Suckers | Are IPOs Dead & The Future of the Late Stage Private Market | Rippling vs. Deel Lawsuit: WTF Happens Now?
1:17:53
1:17:53
Play later
Play later
Lists
Like
Liked
1:17:53Agenda: 04:34 Chime's IPO Announcement: Who Wins & Who Loses 06:28 The Lopphole That Means Chime Has a Better Business than JP Morgan 10:51 Why Investors Who Invested at $25BN Will Make Money When it IPOs at $12BN 18:59 Are IPOs Dead & The Future of the Late Stage Private Market 27:32 Exits are Larger Than Ever: So What? What Happens? Who Wins? Who…
…
continue reading
We all want the truth — but how exactly do we know when something's true? Often, the answer relates to evidence or proof, something capable of convincing us and easing our doubts. But whether or not different kinds of proof are accepted can vary widely by person and situation. On this episode, we explore proof and evidence, and how it affects our p…
…
continue reading

1
Kettering Health outage, Lumma disrupted, Opexus "major lapse"
7:18
7:18
Play later
Play later
Lists
Like
Liked
7:18Ransomware attack knocks out Kettering Health Lumma malware operation disrupted Federal agencies impacted by “major lapse” at Opexus Huge thanks to our sponsor, Conveyor Half-baked AI answers to security questionnaires are worse than no answer at all. Conveyor’s AI gets it right the first time—with market-leading accuracy rates and full citations f…
…
continue reading
This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Jim notes that money launderers and couriers mentioned in recent episodes are often scam…
…
continue reading

1
SubSeven Unmasked: The Real Story of the Legendary RAT and the Mobman Imposter
26:10
26:10
Play later
Play later
Lists
Like
Liked
26:10SubSeven Unmasked: The Real Story of the Legendary RAT and the Mobman Imposter "In the nascent, often chaotic, digital landscape of the late 1990s and early 2000s, few pieces of malicious software achieved the notoriety or inspired the same blend of fear and fascination as SubSeven. More than just a string of code, it became a legend—a potent Remot…
…
continue reading

1
#75 - The Dark Side of AI: When will Autonomous AI Cyber Weapons Begin?
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02AI is changing security fast—hear how Deep Sentinel stops crime in real time and why AI scams are the next big threat. Must-listen for staying ahead! With DeepSentinel CEO and AI expert Dave Selinger.By Extra Something Media
…
continue reading

1
Uruguay Under Cyber Siege_ Unpacking the 2024-25 Attacks and What's Next?
20:51
20:51
Play later
Play later
Lists
Like
Liked
20:51Uruguay Under Cyber Siege_ Unpacking the 2024-25 Attacks and What's Next?
…
continue reading

1
WORLDS FIRST CPU Ransomware! - 2025-05-19
53:26
53:26
Play later
Play later
Lists
Like
Liked
53:26Register for Free, Live webcasts & summits: https://poweredbybhis.coma 00:00 - PreShow Banter™ — Twiddle Me This 02:04 - WORLDS FIRST CPU Ransomware! - Talkin’ Bout [infosec] News 2025-05-19 03:10 - Story # 1: Coinbase - Standing Up to Extortionists 11:26 - Story # 2: World’s first CPU-level ransomware 15:09 - Story # 3: New Intel CPU flaws leak se…
…
continue reading

1
__gov (2).eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__.eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__
16:12
16:12
Play later
Play later
Lists
Like
Liked
16:12__gov (2).eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__.eth_ Digital Ghost, Real Harm - Unmasking a Hacker's Twisted Ideology__
…
continue reading

1
Mexico: Narco-State Symbiosis, Tech Wars, and the Price of Impunity
36:31
36:31
Play later
Play later
Lists
Like
Liked
36:31Mexico: Narco-State Symbiosis, Tech Wars, and the Price of Impunity-
…
continue reading

1
What Tools Miss and Why Humans Matter in AppSec - Yash Shahani
18:02
18:02
Play later
Play later
Lists
Like
Liked
18:02In this episode of the Security Repo Podcast, Dwayne McDaniel sits down with Yash Shahani, a seasoned AppSec engineer and vulnerability hunter, to dive into the nuances of manual code review and the limitations of automated security tools. They explore the evolving role of AI in AppSec, its promise and pitfalls, and why human intuition still plays …
…
continue reading

1
Code of Conscience: The RoboLat Reckoning
15:32
15:32
Play later
Play later
Lists
Like
Liked
15:32In the heart of Medellín, a scrappy robotics startup named RoboLat explodes onto the world stage, transforming from a university project into a global juggernaut under the relentless drive of CEO Felipe Chavira. When a daring acquisition in Taiwan thrusts RoboLat into the crosshairs of tech superpowers, Felipe and his multinational team are swept i…
…
continue reading

1
The Day I Found an APT Group In the Most Unlikely Place
25:05
25:05
Play later
Play later
Lists
Like
Liked
25:05Cyber researchers Ismael Valenzuela and Vitor Ventura share riveting stories about the creative tricks they used to track down advanced persistent threat groups, and the surprises they discovered along the way.By Dark Reading
…
continue reading

1
Shadow AI and AI's Impact on Cybersecurity Strategies
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24In this episode of the Security by Default podcast, host Joseph Carson speaks with cybersecurity expert Terence Jackson about the evolving landscape of cybersecurity, the challenges faced by CISOs, and the importance of data security and governance. They discuss the impact of AI on security practices, the role of the CISO as a risk manager, and the…
…
continue reading

1
Deep Dive on Citi Credit Cards and ThankYou Points (Best 2-Card Combo)
1:00:48
1:00:48
Play later
Play later
Lists
Like
Liked
1:00:48228: A deep dive into Citi’s credit card lineup. I've recently opened up a few Citi cards and am very excited about sharing the best Citi cards, how to maximize ThankYou Points, the best airline and hotel transfer partners, and how Citi’s best two-card combo stacks up against other major issuers. Link to Full Show Notes: https://chrishutchins.com/c…
…
continue reading

1
DOJ investigates Coinbase attack, Dutch cyber-espionage law passes, VanHelsing ransomeware leaked
6:43
6:43
Play later
Play later
Lists
Like
Liked
6:43US DOJ opens investigation into Coinbase's recent cyberattack Dutch government passes law to criminalize cyber-espionage Ransomware attack on food distributor spells more pain for UK supermarkets Huge thanks to our sponsor, Conveyor What if your sales team could answer security questions themselves—without blowing up your Slack or email every 10 mi…
…
continue reading

1
The Enemy Within: The Hidden Risk of Insider Threats - Ep 150
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47In this episode of Reimagining Cyber, Tyler Moffitt, Senior Security Analyst at OpenText Cybersecurity, delves inro the complex issue of insider threats. He concentrates on the two main types of insider threats: malicious insiders who knowingly abuse their access, and unintentional insiders who fall prey to phishing and other social engineering att…
…
continue reading
In a near-future Europe transformed by ClearSight—a revolutionary AI-driven technology that verifies memory accuracy by tracking the subtlest movements of the human eye—truth is no longer subjective. Courtrooms, intelligence agencies, and schools now rely on this system to judge everything from guilt to academic honesty, promising a new era of obje…
…
continue reading

1
AI’s Next Wave: Intelligent Agents & the Skills to Secure Them with Ankur Shah
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24Send us a text In this episode of Secure Insights, we sit down with Ankur Shah, Co-Founder and CEO of Straiker, to explore the next generation of AI innovation, far beyond chatbots and simple prompts. We speak about how to stay secured when using intelligent agents that not only converse but act — booking your holidays, managing your calendar, arra…
…
continue reading

1
The Biohacker’s Guide to CIA Mind Control & Brainwashing : 1283
1:03:44
1:03:44
Play later
Play later
Lists
Like
Liked
1:03:44You’re being programmed, and it’s more subtle and pervasive than you think. From invisible influence to psychological manipulation, this episode shows you how to recognize when your thoughts aren’t really yours. Host Dave Asprey uncovers the hidden science of mind control with Harvard historian Rebecca Lemov. She is a professor of the History of Sc…
…
continue reading
Since the collapse of coal, Eastern Kentucky has lived through a procession of supposed revivals. Each new idea was treated as something close to salvation. We spent four days driving across the state and it became clear that things like crypto mining and AI data centers may not offer a break with history – just a continuation of it. Learn about yo…
…
continue reading

1
OWASP identification and authentication failures (noun) [Word Notes]
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58Please enjoy this encore of Word Notes. Ineffectual confirmation of a user's identity or authentication in session management. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure Audio reference link: “Mr. Robot Hack - Password Cracking - Episode 1.” YouTube Video. YouTube, September 21, 20…
…
continue reading

1
Legal Aid breached, patients at risk from cyberattacks, 23andMe buyer
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19UK’s Legal Aid Agency breached NHS patients put at risk from cyberattacks 23andMe has a buyer Huge thanks to our sponsor, Conveyor Ever spent an hour in a clunky portal questionnaire with UI from 1999 just to lose your work because it timed out? Conveyor’s got you. Our browser extension completes questionnaires in the most tedious portals for you b…
…
continue reading
We're back with coverage on the first American Pope, Sinners, and more!By Empowered_muse
…
continue reading
In the high-stakes world of biotech innovation, Ana Jaksin and her MIT team unveil a self-boosting vaccine poised to revolutionize global health—offering hope to millions in regions where traditional immunization is a logistical nightmare. As media frenzy erupts and governments clamor for access, the breakthrough draws the ire of entrenched pharmac…
…
continue reading

1
20VC: Duolingo Co-Founder on Why $3M is Harder than $100M to Raise | Why You Should Always Take Tier 1 VCs Even at Worse Terms | Why Europe Can't Win Unless the US Screws Up | How AI Impacts the Future ...
1:31:43
1:31:43
Play later
Play later
Lists
Like
Liked
1:31:43Severin Hacker is the Co-Founder and CTO of Duolingo, the world’s most downloaded education app with over 100 million monthly users. Since its 2021 IPO, Duolingo has reached a market cap of $20BN. The company has raised over $183M from top-tier investors including CapitalG, Kleiner Perkins, Union Square Ventures, NEA, Ashton Kutcher, and Tim Ferris…
…
continue reading

1
UK retailer update, Microsoft Defender disabler, deepfakes target officials
8:10
8:10
Play later
Play later
Lists
Like
Liked
8:10Scattered Spider facilitates UK retail hacks and is moving to the U.S. Defendnot tool can disable Microsoft Defender FBI warns government officials about new waves of deepfakes Huge thanks to our sponsor, Conveyor Are you dealing with security questionnaire chaos this week? If so, get Conveyor’s AI to knock them out for you. Connect Conveyor to any…
…
continue reading

1
__NATO Police Nightmare_ When a Breakup Becomes an International Crisis__
20:12
20:12
Play later
Play later
Lists
Like
Liked
20:12__NATO Police Nightmare_ When a Breakup Becomes an International Crisis__
…
continue reading
How do you measure the success of a kill shot? A character cancellation? A diss track that hits harder than a drone strike? It’s never as simple as “target down.” But that’s often how success gets measured in war—and in culture. Short-term wins. Long-term fallout. No real accounting for what stories we’re cementing along the way. So in this episode…
…
continue reading

1
The Silence Between: When Animals Speak Back
20:04
20:04
Play later
Play later
Lists
Like
Liked
20:04In a near-future world where AI finally unlocks the mysteries of animal communication, humanity stands on the brink of a revolution—and a reckoning. Dr. Denise Herring, a visionary marine biologist, and her allies at Project CETI and the Earth Species Project celebrate the dawn of true interspecies dialogue, using cutting-edge systems to converse w…
…
continue reading