Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Alexander Augustus Podcasts

show episodes
 
Learn something new every day! Everything Everywhere Daily is a daily podcast for Intellectually Curious People. Host Gary Arndt tells the stories of interesting people, places, and things from around the world and throughout history. Gary is an accomplished world traveler, travel photographer, and polymath. Topics covered include history, science, mathematics, anthropology, archeology, geography, and culture. Past history episodes have dealt with ancient Rome, Phoenicia, Persia, Greece, Chi ...
  continue reading
 
Artwork

1
Tides of History

Wondery / Patrick Wyman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Everywhere around us are echoes of the past. Those echoes define the boundaries of states and countries, how we pray and how we fight. They determine what money we spend and how we earn it at work, what language we speak and how we raise our children. From Wondery, host Patrick Wyman, PhD (“Fall Of Rome”) helps us understand our world and how it got to be the way it is. Listen to Tides of History on the Wondery App or wherever you get your podcasts. You can listen to bonus episodes available ...
  continue reading
 
Artwork

1
ANGER

Alexander Augustus

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
This 12 part audio series tells the story of Queen Elizabeth II entering a futuristic hellscape and fighting for justice in the covid-apocalypse. From award-winning visual Artist Alexander Augustus, serialised in galleries across Europe and Asia.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

451
Security Weekly Podcast Network (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
In 1953, a newspaper delivery boy in Brooklyn, New York, made an odd discovery. One of his customers gave him a nickel that seemed lighter than the others. When he dropped it, it popped open, exposing a small piece of microfilm. It was the bizarre beginning of the exposure and discovery of a spy ring in the United States that ultimately contributed…
  continue reading
 
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
  continue reading
 
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
  continue reading
 
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
The Second World War saw the development of many new weapons. Perhaps none was more terrifying than the development of long-range strategic rockets. Rockets had been used in combat for centuries, dating back to their development in ancient China; however, the rockets developed by Germany were a different matter altogether. They terrorized civilians…
  continue reading
 
Alexander Hamilton was a U.S founding father who has been growing in popularity due to the popular musical Hamilton, by Lin-Manuel Miranda. Hamilton was the first U.S Secretary of the Treasury and was foundational in the formation of American finance and government policies that remain in place to this day. He is featured on the US Ten Dollar Bill …
  continue reading
 
Sometime around the year 1450, a monk living just outside of Venice created one of the greatest maps of the medieval world. It was an enormous map, even by modern standards, and it had a level of detail that had never been seen before. It took years to make and was a major advancement in cartography. Perhaps most importantly, it contained many deta…
  continue reading
 
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
  continue reading
 
Located in Central Java, outside of the modern city of Yogyakarta, lies the world’s largest Buddhist temple, Borobudur. Borobudur doesn’t get as much attention as other great monuments in the world, but it should certainly be included among them. Unlike other great monuments, Borobudur has a distinction that no other monument has. It disappeared, q…
  continue reading
 
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
  continue reading
 
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
  continue reading
 
Lego is one of the best-known toy brands in the world. Known for its fun and complex building process, the small plastic bricks encourage creativity and playability, and have become a staple in most households with kids. However, they aren’t just free-form toys for children. They have also graduated into high-end items for adults. In fact, some set…
  continue reading
 
As the Bronze Age gave way to the Iron Age, the economy of the Mediterranean shifted dramatically. It expanded to encompass the entire sea for the first time, everywhere from the Levant to Iberia, and laid the foundations for what would eventually become the Roman Empire. Patrick's new book - Lost Worlds: The Rise and Fall of Human Societies from t…
  continue reading
 
From the acclaimed author of 1177 B.C., a spellbinding account of the archaeological find that opened a window onto the vibrant diplomatic world of the ancient Near East In 1887, an Egyptian woman made an astonishing discovery among the ruins of the heretic king Akhenaten’s capital city, a site now known as Amarna. She found a cache of cuneiform ta…
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
Just 60 years ago, Dubai was a sandy, underpopulated port on a minor creek emptying into the Persian Gulf. Today, it is one of the most important cities in the world. It is a global center for trade, finance, and transportation. How did a random sandy outpost location in the Middle East end up becoming such an important global city in such a short …
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
For thousands of years, human beings have created works of art. Many of these works are commissioned by rulers, merchants, or religious leaders. Over time, many of these great works have found their way into the hands of art museums. Museums allow everyone to enjoy and appreciate art that has been produced around the world over the course of centur…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
  continue reading
 
In the mid-19th century, China experienced its greatest civil war. It was a conflict that set China on a course that eventually led to China’s Century of Humiliation and the fall of the Qing Dynasty. It wasn’t just a massive civil war; in terms of total lives lost, it was far and away the largest war in history up until that point, and by some esti…
  continue reading
 
Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the cha…
  continue reading
 
How do you know the nature of another person: who she is, or what she is capable of? In four exploratory essays, a seasoned historian examines the mechanisms by which ancient people came to have knowledge—not of the world and its myriad processes but about something more intimate, namely the individuals they encountered in close quarters, those the…
  continue reading
 
During the Second World War, the Germans used what they thought was an uncrackable encryption system. It was a really good encryption system, and for the longest time, the Allies had a difficult time cracking the code. However, thanks to brilliant code breakers, a powerful computing machine, and German mistakes, the Allies were finally able to brea…
  continue reading
 
Located on the Baltic Sea, sandwiched between the nations of Lithuania and Poland, is the Russian exclave of Kaliningrad. Kaliningrad, as it is today, does not have a deep history. For most of its history, it was known as Königsberg. The reason it exists at all dates back to the Teutonic Knights in the Middle Ages and the aftermath of two world war…
  continue reading
 
In the year 1950, the world was halfway through the 20th century. In the 25 years prior, the world had seen the greatest economic downturn in modern history and the greatest war the world had ever known. New technologies were being developed, and many previous technologies were making their way into the hands of regular people, radically transformi…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
One of the most powerful forces in economics and finance is compound interest. Not everyone understands compound interest, even though they may reap its benefits or suffer its consequences. Compounding has the potential to build fortunes and wreck empires. The effects of compounding are also not limited to interest payments. It can apply to a great…
  continue reading
 
Professor Eric Cline, author of the outstanding book 1177 BC: The Year Civilization Collapsed, returns to the show to discuss his new book: Love, War, and Diplomacy: The Discovery of the Amarna Letters and the Bronze Age World They Revealed. We talk about the dynamics of Bronze Age states, how such an extraordinary treasure trove of texts was disco…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
On May 7, 1915, nearly a year into the First World War, the British steamship RMS Lusitania was sunk by a German U-boat off the southern coast of Ireland. Over 1,100 people were killed, many of whom were civilians from the United States who were not participants in the war. Although the loss of life in the attack was great, the sinking of the Lusit…
  continue reading
 
The Cold War, Prohibition, the Gold Rush, the Space Race. Every part of your life - the words you speak, the ideas you share - can be traced to our history, but how well do you really know the stories that made America? We'll take you to the events, the times and the people that shaped our nation. And we'll show you how our history affected them, t…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Many people think that the closest the world ever came to nuclear war was during the Cuban Missile Crisis. To be sure, that was a very tenuous point in history. However, there is a good argument to be made that the closest the world has come to nuclear war actually took place in 1969. The reason most people are unaware of what happened is that it h…
  continue reading
 
Throughout the centuries and into the present day, the Gospel of John has indelibly shaped Christian theology and thinkers in significant ways, but major new questions are being raised about the genesis of that gospel, its relationship to other Christian writings and influences, and especially the masked identity of its author. In The Gospel of Joh…
  continue reading
 
In 1913, the United States created its third national bank. Unlike the previous two, this bank was organized in a completely different manner. It was organized differently, in an effort to avoid the problems of the previous national banks. Also, unlike the previous national banks, the creation of the Federal Reserve was not done openly and subject …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play