Learn something new every day! Everything Everywhere Daily is a daily podcast for Intellectually Curious People. Host Gary Arndt tells the stories of interesting people, places, and things from around the world and throughout history. Gary is an accomplished world traveler, travel photographer, and polymath. Topics covered include history, science, mathematics, anthropology, archeology, geography, and culture. Past history episodes have dealt with ancient Rome, Phoenicia, Persia, Greece, Chi ...
…
continue reading
Alexander Augustus Podcasts
Everywhere around us are echoes of the past. Those echoes define the boundaries of states and countries, how we pray and how we fight. They determine what money we spend and how we earn it at work, what language we speak and how we raise our children. From Wondery, host Patrick Wyman, PhD (“Fall Of Rome”) helps us understand our world and how it got to be the way it is. Listen to Tides of History on the Wondery App or wherever you get your podcasts. You can listen to bonus episodes available ...
…
continue reading
This 12 part audio series tells the story of Queen Elizabeth II entering a futuristic hellscape and fighting for justice in the covid-apocalypse. From award-winning visual Artist Alexander Augustus, serialised in galleries across Europe and Asia.
…
continue reading
Interview with scholars of the Ancient World about their new books
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
1
Cloudflare, Gh0stRAT, npm, North Koreans, Arch, Steam, Documentaries, Aaran Leyland.. - SWN #530
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24Cloudflare, Gh0stRAT, npm, North Korean Employees, Arch Linux Steam Machine, Documentaries, Aaran Leyland, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-530
…
continue reading
1
Cloudflare, Gh0stRAT, npm, North Koreans, Arch, Steam, Documentaries, Aaran Leyland.. - SWN #530
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24Cloudflare, Gh0stRAT, npm, North Korean Employees, Arch Linux Steam Machine, Documentaries, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-530
…
continue reading
In 1953, a newspaper delivery boy in Brooklyn, New York, made an odd discovery. One of his customers gave him a nickel that seemed lighter than the others. When he dropped it, it popped open, exposing a small piece of microfilm. It was the bizarre beginning of the exposure and discovery of a spy ring in the United States that ultimately contributed…
…
continue reading
1
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
…
continue reading
1
Secure Coding as Critical Thinking Instead of Vulnspotting - Matias Madou - ASW #357
1:03:41
1:03:41
Play later
Play later
Lists
Like
Liked
1:03:41Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
…
continue reading
1
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
1:56:50
1:56:50
Play later
Play later
Lists
Like
Liked
1:56:50Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
…
continue reading
1
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433
1:56:49
1:56:49
Play later
Play later
Lists
Like
Liked
1:56:49Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
…
continue reading
The Second World War saw the development of many new weapons. Perhaps none was more terrifying than the development of long-range strategic rockets. Rockets had been used in combat for centuries, dating back to their development in ancient China; however, the rockets developed by Germany were a different matter altogether. They terrorized civilians…
…
continue reading
Alexander Hamilton was a U.S founding father who has been growing in popularity due to the popular musical Hamilton, by Lin-Manuel Miranda. Hamilton was the first U.S Secretary of the Treasury and was foundational in the formation of American finance and government policies that remain in place to this day. He is featured on the US Ten Dollar Bill …
…
continue reading
Sometime around the year 1450, a monk living just outside of Venice created one of the greatest maps of the medieval world. It was an enormous map, even by modern standards, and it had a level of detail that had never been seen before. It took years to make and was a major advancement in cartography. Perhaps most importantly, it contained many deta…
…
continue reading
1
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, More... - SWN #529
28:45
28:45
Play later
Play later
Lists
Like
Liked
28:45Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-529
…
continue reading
1
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, More... - SWN #529
28:45
28:45
Play later
Play later
Lists
Like
Liked
28:45Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
…
continue reading
Located in Central Java, outside of the modern city of Yogyakarta, lies the world’s largest Buddhist temple, Borobudur. Borobudur doesn’t get as much attention as other great monuments in the world, but it should certainly be included among them. Unlike other great monuments, Borobudur has a distinction that no other monument has. It disappeared, q…
…
continue reading
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
…
continue reading
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
…
continue reading
Lego is one of the best-known toy brands in the world. Known for its fun and complex building process, the small plastic bricks encourage creativity and playability, and have become a staple in most households with kids. However, they aren’t just free-form toys for children. They have also graduated into high-end items for adults. In fact, some set…
…
continue reading
1
The Phoenicians, the Greeks, and the Iron Age Mediterranean
38:02
38:02
Play later
Play later
Lists
Like
Liked
38:02As the Bronze Age gave way to the Iron Age, the economy of the Mediterranean shifted dramatically. It expanded to encompass the entire sea for the first time, everywhere from the Levant to Iberia, and laid the foundations for what would eventually become the Roman Empire. Patrick's new book - Lost Worlds: The Rise and Fall of Human Societies from t…
…
continue reading
1
Eric H. Cline, "Love, War, and Diplomacy: The Discovery of the Amarna Letters and the Bronze Age World They Revealed" (Princeton UP, 2025)
1:07:05
1:07:05
Play later
Play later
Lists
Like
Liked
1:07:05From the acclaimed author of 1177 B.C., a spellbinding account of the archaeological find that opened a window onto the vibrant diplomatic world of the ancient Near East In 1887, an Egyptian woman made an astonishing discovery among the ruins of the heretic king Akhenaten’s capital city, a site now known as Amarna. She found a cache of cuneiform ta…
…
continue reading
1
Securing Model Context Protocol as Companies Plan to Replace Entry Roles with AI - Rahul Parwani - BSW #421
58:59
58:59
Play later
Play later
Lists
Like
Liked
58:59As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
…
continue reading
Just 60 years ago, Dubai was a sandy, underpopulated port on a minor creek emptying into the Persian Gulf. Today, it is one of the most important cities in the world. It is a global center for trade, finance, and transportation. How did a random sandy outpost location in the Middle East end up becoming such an important global city in such a short …
…
continue reading
1
Securing Model Context Protocol as Companies Plan to Replace Entry Roles with AI - Rahul Parwani - BSW #421
58:59
58:59
Play later
Play later
Lists
Like
Liked
58:59As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
…
continue reading
1
Miles, 10/8 time, Lost Phones, Whisper Leak, Quantum Route, AI Galore, Rob Allen... - Rob Allen - SWN #528
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
…
continue reading
1
Miles, 10/8 time, Lost Phones, Whisper Leak, Quantum Route, AI Galore, Rob Allen... - Rob Allen - SWN #528
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
…
continue reading
1
Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356
1:11:26
1:11:26
Play later
Play later
Lists
Like
Liked
1:11:26Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
…
continue reading
For thousands of years, human beings have created works of art. Many of these works are commissioned by rulers, merchants, or religious leaders. Over time, many of these great works have found their way into the hands of art museums. Museums allow everyone to enjoy and appreciate art that has been produced around the world over the course of centur…
…
continue reading
1
Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356
1:11:26
1:11:26
Play later
Play later
Lists
Like
Liked
1:11:26Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
…
continue reading
1
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432
1:38:17
1:38:17
Play later
Play later
Lists
Like
Liked
1:38:17Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
…
continue reading
In the mid-19th century, China experienced its greatest civil war. It was a conflict that set China on a course that eventually led to China’s Century of Humiliation and the fall of the Qing Dynasty. It wasn’t just a massive civil war; in terms of total lives lost, it was far and away the largest war in history up until that point, and by some esti…
…
continue reading
1
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432
1:38:17
1:38:17
Play later
Play later
Lists
Like
Liked
1:38:17Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the cha…
…
continue reading
1
Ellen Muehlberger, "Things Unseen: Essays on Evidence, Knowledge, and the Late Ancient World" (U California Press, 2025)
1:14:11
1:14:11
Play later
Play later
Lists
Like
Liked
1:14:11How do you know the nature of another person: who she is, or what she is capable of? In four exploratory essays, a seasoned historian examines the mechanisms by which ancient people came to have knowledge—not of the world and its myriad processes but about something more intimate, namely the individuals they encountered in close quarters, those the…
…
continue reading
During the Second World War, the Germans used what they thought was an uncrackable encryption system. It was a really good encryption system, and for the longest time, the Allies had a difficult time cracking the code. However, thanks to brilliant code breakers, a powerful computing machine, and German mistakes, the Allies were finally able to brea…
…
continue reading
Located on the Baltic Sea, sandwiched between the nations of Lithuania and Poland, is the Russian exclave of Kaliningrad. Kaliningrad, as it is today, does not have a deep history. For most of its history, it was known as Königsberg. The reason it exists at all dates back to the Teutonic Knights in the Middle Ages and the aftermath of two world war…
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-527
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527
…
continue reading
In the year 1950, the world was halfway through the 20th century. In the 25 years prior, the world had seen the greatest economic downturn in modern history and the greatest war the world had ever known. New technologies were being developed, and many previous technologies were making their way into the hands of regular people, radically transformi…
…
continue reading
1
Turning To The Darkside & AI Cyberslop - PSW #899
2:07:54
2:07:54
Play later
Play later
Lists
Like
Liked
2:07:54This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
…
continue reading
1
Turning To The Darkside & AI Cyberslop - PSW #899
2:07:54
2:07:54
Play later
Play later
Lists
Like
Liked
2:07:54This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
…
continue reading
One of the most powerful forces in economics and finance is compound interest. Not everyone understands compound interest, even though they may reap its benefits or suffer its consequences. Compounding has the potential to build fortunes and wreck empires. The effects of compounding are also not limited to interest payments. It can apply to a great…
…
continue reading
1
Love, War, and Diplomacy in the Late Bronze Age: Interview with Professor Eric Cline
53:44
53:44
Play later
Play later
Lists
Like
Liked
53:44Professor Eric Cline, author of the outstanding book 1177 BC: The Year Civilization Collapsed, returns to the show to discuss his new book: Love, War, and Diplomacy: The Discovery of the Amarna Letters and the Bronze Age World They Revealed. We talk about the dynamics of Bronze Age states, how such an extraordinary treasure trove of texts was disco…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
On May 7, 1915, nearly a year into the First World War, the British steamship RMS Lusitania was sunk by a German U-boat off the southern coast of Ireland. Over 1,100 people were killed, many of whom were civilians from the United States who were not participants in the war. Although the loss of life in the attack was great, the sinking of the Lusit…
…
continue reading
1
Listen Now: American History Tellers | The Mayflower
3:31
3:31
Play later
Play later
Lists
Like
Liked
3:31The Cold War, Prohibition, the Gold Rush, the Space Race. Every part of your life - the words you speak, the ideas you share - can be traced to our history, but how well do you really know the stories that made America? We'll take you to the events, the times and the people that shaped our nation. And we'll show you how our history affected them, t…
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple's AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Show Notes: https://securityweekly.com/swn-526
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
Many people think that the closest the world ever came to nuclear war was during the Cuban Missile Crisis. To be sure, that was a very tenuous point in history. However, there is a good argument to be made that the closest the world has come to nuclear war actually took place in 1969. The reason most people are unaware of what happened is that it h…
…
continue reading
1
Hugo Méndez, "The Gospel of John: A New History" (Oxford UP, 2025)
1:31:09
1:31:09
Play later
Play later
Lists
Like
Liked
1:31:09Throughout the centuries and into the present day, the Gospel of John has indelibly shaped Christian theology and thinkers in significant ways, but major new questions are being raised about the genesis of that gospel, its relationship to other Christian writings and influences, and especially the masked identity of its author. In The Gospel of Joh…
…
continue reading
In 1913, the United States created its third national bank. Unlike the previous two, this bank was organized in a completely different manner. It was organized differently, in an effort to avoid the problems of the previous national banks. Also, unlike the previous national banks, the creation of the Federal Reserve was not done openly and subject …
…
continue reading