Five times winner of the Publisher Podcast Awards, including Best Technology Podcast, Engineering Matters celebrates the work of engineers who use ingenuity, practicality, science, theory and determination to build a better world. In the UK alone 5.7million people work in engineering related enterprises from manufacturing and agriculture to construction and transportation. Their work ensures that the country has sustainable power supplies, better connectivity between cities, increasing effic ...
…
continue reading
Bio Engineering Podcasts
Hosted by Richard C. Hoagland, Exposing Suppressed Science, Cutting Edge of Science and Thought
…
continue reading
Welcome to Bio Bytes! Tune in for interviews with prominent scientists working at the intersection of Biology, Engineering, Medicine, Computer Science, and Mathematics. Check out our sister podcast "BioWorks" (https://anchor.fm/bioworks) for great discussions on life science-related business, investing, and policy. To support our podcast: https://securepay.cuit.columbia.edu/payment/pub/sponsor-sbi/https://securepay.cuit.columbia.edu/payment/pub/sponsor-sbi/ Please email sophiadeng0321@icloud ...
…
continue reading
These podcasts will give you insight into exclusive sessions with students who have pursued science for higher education, doctors and specialists which may help you navigate through your interests and help you choose what you're most passionate about. We will be posting a new podcast every 2 weeks. If you have any suggestions, or topics that you want us to talk about please feel free to contact us on our website or on instagram. Link to our website: https://biowithoutboundari.wixsite.com/bio ...
…
continue reading
This podcast is produced and hosted by the Iowa State University Extension and Outreach Field Agricultural Engineering Team. We are a group of agricultural engineers that work with farmers and agribusiness professionals to help improve the efficiency, profitability, and environmental outcomes on farms. This podcast will feature information and interviews with ISU Extension field ag engineers and others with expertise in engineering and environmental issues in agriculture. We will cover a var ...
…
continue reading
A myriad of AI, science, and technology experts explore the real challenges and enormous opportunities facing entrepreneurs who are building the future of health. Raising Health, a podcast by a16z Bio + Health and hosted by Kris Tatiossian and Olivia Webb, dives deep into the heart of biotechnology and healthcare innovation. Join veteran company builders, operators, and investors Vijay Pande, Julie Yoo, Vineeta Agarwala, and Jorge Conde, along with distinguished guests like Mark Cuban, Greg ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Explore the ways in which AI will transform healthcare, biotech, and medicine through conversations with entrepreneurs, investors and scientists. Hosted by Pranav Rajpurkar and Adriel Saporta. Produced by Oishi Banerjee and Marc Robbins.
…
continue reading
Join award-winning, indie author, Dianne Burckhardt, as she chats with fellow authors and industry insiders around the world about their work, inspirations, greatest challenges, and triumphs. Writing is often the easy part, and the real work begins once the author writes, "The End." Dianne and her guests shed light on what it takes to be a successful author in today's markets whether as an indie author or traditionally published. Dianne's guests share their insights on their personal journey ...
…
continue reading
Tired of all the Doom & Gloom news from mainstream media? You'll get none of that here... Instead, you’ll find Great News, inspiring stories, and developments that are making the world a better place. This is the Great News Podcast.
…
continue reading
Mission Shunya (Shunya=Zero) is all about the transition to a zero carbon economy. The podcast features conversations related to clean-tech and sustainability. A new podcast episode is released every fortnight. Experts from around the world are featured along with people whose businesses and actions are having a positive impact and aims to inspire every individual take action to do their bit for the planet. Renewable energy, electric vehicles, sustainable development, climate change, circula ...
…
continue reading
✈️ The Zero To Travel Podcast has been downloaded 12+ million times and named a "Best Travel Podcast" by The Washington Post, Travel + Leisure, The Telegraph, and Forbes. Packed with life-changing perspectives, inspiration, and practical advice for everyone from travel newbies to nomads, this podcast will give you everything you need to travel the world on your terms, regardless of your situation or experience. Welcome to our amazing global listening community! Since 2013, "Travel Ambassador ...
…
continue reading
BIOS Podcast brings together cutting-edge insights from Life Science industry leaders at the forefront of innovation. Join us in hearing from Founders, Investors, Professors, & Pharma operating at the intersection of Technology & Biology. By Alix Ventures: Driving Patient Impact - Supporting early stage Life Science startups engineering biology to drive radical advances in human health. Learn more @ BIOS.community / Alix.vc __________________________________ Alix Ventures, by way of BIOS Com ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A few years ago, we were just two mainstream, everyday American women who both had very little interest in federal or global politics. But like many of you, the onslaught of cancel culture, virtue signaling, censorship, and the twisted narrative of patriotic Americans being a “threat to democracy” that started being forced down our throats by the federal government and mainstream media back in 2021 made us feel frustrated, isolated, and angry. Instead of sitting back and quietly taking it as ...
…
continue reading

1
S4 EP185: Qin Sun Stubis, Multi Award-Winning Memoir Author of Once Our Lives
1:00:09
1:00:09
Play later
Play later
Lists
Like
Liked
1:00:09Join the conversation, text us now. Bleeped words: k!lled (twice), d!ed, Hello My Happy People, This week on Book Banter with Dianne Burckhardt – Book Talk Podcast, I sit down with Qin (“Ching”) Sun Stubis, award-winning author of Once Our Lives. Her memoir shares the unforgettable story of four generations of Chinese women who endured war, revolut…
…
continue reading

1
vCISO Benefits as the CISO Becomes Strategic and the Board's Responsible for Security - Brian Haugli - BSW #410
59:29
59:29
Play later
Play later
Lists
Like
Liked
59:29Securing top-tier cybersecurity leadership is not just a necessity but a significant challenge, especially when working within budget constraints. Should you hire a full-time CISO or outsource to a vCISO provider? Brian Haugli, CEO at SideChannel, joins BSW to discuss how organizations can hire a Virtual CISO (vCISO) to benefit from their expertise…
…
continue reading

1
SANS Stormcast Wednesday, August 27th, 2025: Analyzing IDNs; Netscaler 0-Day Vuln; Git Vuln Exploited;
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabil…
…
continue reading

1
Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet... - SWN #506
33:44
33:44
Play later
Play later
Lists
Like
Liked
33:44Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-506
…
continue reading

1
100 Documentaries Project: Traveling the Globe to Find Extraordinary Humans + Changing the World One Story at a Time with Robin Danehav
1:05:33
1:05:33
Play later
Play later
Lists
Like
Liked
1:05:33What can happen when a filmmaker decides to spotlight invisible geniuses and hidden stories that change how we see the world? Robin Danehav is a Swedish documentary filmmaker known for embarking on a bold quest to create 100 short films revealing the everyday impact-makers whose stories remain untold. Based in Stockholm and often traveling worldwid…
…
continue reading

1
Translating Security Regulations into Secure Projects - Roman Zhukov, Emily Fox - ASW #345
1:13:31
1:13:31
Play later
Play later
Lists
Like
Liked
1:13:31The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
…
continue reading

1
SANS Stormcast Tuesday, August 26th, 2025: Decoding Word Reading Location; Image Downscaling AI Vulnerability; IBM Jazz Team Server Vuln
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%20Value%20in%20Microsoft%20Word%20Documents/32224 Weaponizing image scaling against production AI systems AI systems often downscale imag…
…
continue reading

1
Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
…
continue reading

1
SANS Stormcast Monday, August 25th, 2025: IP Cleanup; Linux Desktop Attacks; Malicious Go SSH Brute Forcer; Onmicrosoft Domain Restrictions
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .d…
…
continue reading

1
Humans extinct: 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Aaran Leyland.. - SWN #505
34:12
34:12
Play later
Play later
Lists
Like
Liked
34:12Humans wiped out by 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Philip K. Dick, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-505
…
continue reading

1
SANS Stormcast Friday, August 22nd, 2025: The -n switch; Commvault Exploit; Docker Desktop Escape Vuln;
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the …
…
continue reading

1
What We’ve Learned from LockBit and Black Basta Leaks (and News) - Ian Gray - PSW #888
2:15:17
2:15:17
Play later
Play later
Lists
Like
Liked
2:15:17This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
…
continue reading

1
Disrupting Travel and Building Community with Beth Santos
1:01:21
1:01:21
Play later
Play later
Lists
Like
Liked
1:01:21Do you ever feel limited by society’s expectations and stereotypes surrounding travel? When Beth Santos started a travel blog, her goal was to challenge norms by exploring the diverse and shared experiences of women traveling the world. It has since morphed into Wanderful, an international community and social network with over 40,000 active member…
…
continue reading

1
SANS Stormcast Thursday, August 21st, 2025: Airtel Scans; Apple Patch; Microsoft Copilot Audit Log Issue; Password Manager Clickjacking
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
…
continue reading

1
S4 EP184: Marcia Peck, Accomplished Musician and Author of Water Music: A Cape Cod Story
39:59
39:59
Play later
Play later
Lists
Like
Liked
39:59Join the conversation, text us now. Hello My Happy People, This week on Book Banter with Dianne Burckhardt – Book Talk Podcast, I am joined by Marcia Peck, an award-winning author and lifelong musician who has spent over 50 years as a cellist with the Minnesota Orchestra. Marcia brings her love of rhythm, melody, and storytelling together in her de…
…
continue reading

1
Misconfiguration, The Forgotten Vulnerability and the Power and Failure of "Yes" - Danny Jenkins - BSW #409
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
…
continue reading

1
SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
…
continue reading

1
The cult of Doug, Crime, Pipemagic, Clickfix, Cats in Space, Josh Marpet, and more... - SWN #504
34:06
34:06
Play later
Play later
Lists
Like
Liked
34:06The cult of Doug, Crime, Pipemagic, Clickfix, Cats in Space, Uncle Silvio, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-504
…
continue reading

1
The 5 Best Hacks of “All the Hacks”: Travel, Money & Life Optimization with Chris Hutchins
1:23:43
1:23:43
Play later
Play later
Lists
Like
Liked
1:23:43What if the secret to unlocking a better life and travel experience lies not in more, but in smarter choices? Chris Hutchins is the host of the “All the Hacks” podcast, where he distills practical strategies across life, money, and travel. An optimizer by nature, Chris has saved millions by breaking down every aspect of life to maximize happiness a…
…
continue reading

1
Managing the Minimization of a Container Attack Surface - Neil Carpenter - ASW #344
1:08:17
1:08:17
Play later
Play later
Lists
Like
Liked
1:08:17A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
…
continue reading

1
SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln;
5:10
5:10
Play later
Play later
Lists
Like
Liked
5:10Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
…
continue reading

1
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
1:55:35
1:55:35
Play later
Play later
Lists
Like
Liked
1:55:35Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
…
continue reading

1
SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
…
continue reading

1
114: Engineering Nuclear Safety: Risk, Reliability, and the Role of PRA
37:18
37:18
Play later
Play later
Lists
Like
Liked
37:18What does it take to build trust in nuclear energy? Behind every advanced reactor design, every regulatory approval, and every safety system lies a complex web of risk analysis — and that’s where Probabilistic Risk Assessment (PRA) comes in. In this episode, we sit down with Jenifer Avellaneda Díaz, a PRA & Risk Analysis Engineer, to explore the fo…
…
continue reading

1
Creepy chatbots, Fortinet, CISA, Agentic AI, FIDO, EDR, Aaran Leyland, and More... - SWN #503
35:09
35:09
Play later
Play later
Lists
Like
Liked
35:09Creepy chatbots, Fortinet, CISA, Agentic AI, FIDO, EDR, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-503
…
continue reading

1
SANS Stormcast Friday, August 15th, 2025: Analysing Attack with AI; Proxyware via YouTube; Xerox FreeFlow Vuln; Evaluating Zero Trust @SANS_edu
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12AI and Faster Attack Analysis A few use cases for LLMs to speed up analysis https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198 Proxyware Malware Being Distributed on YouTube Video Download Site Popular YouTube download sites will attempt to infect users with proxyware. https://asec.ahnlab.com/en/89574/ Xero…
…
continue reading

1
Hackberry PIs and Other Hacker Things - PSW #887
2:08:42
2:08:42
Play later
Play later
Lists
Like
Liked
2:08:42We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You nee…
…
continue reading

1
#342 Real Solutions and the Industrial Metaverse
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42The metaverse is often thought of as an alternative virtual space, a world separate from reality where we can hang out with avatars of our friends and families, or shop at virtual stores. But the industrial metaverse ties the physical and the virtual much more closely together, with a focus that is less on photorealism, and more on using connected …
…
continue reading

1
SANS Stormcast Thursday, August 14th, 2025: Equation Editor; Kerberos Patch; XZ-Utils Backdoor; ForitSIEM/FortiWeb patches
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16CVE-2017-11882 Will Never Die The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email. https://isc.sans.edu/diary/CVE-2017-11882%20Will%20Never%20Die/32196 Windows Kerberos El…
…
continue reading

1
S4 EP183: Alison Beder Solway, Author of The Miles We Run: Lessons from the Arena of Resilience
49:11
49:11
Play later
Play later
Lists
Like
Liked
49:11Join the conversation, text us now. Hello Happy People, In this episode of Book Banter with Dianne Burckhardt – Book Talk Podcast, I sit down with Alison Beder Solway, author of The Miles We Run, for an emotional and deeply moving conversation. Alison opens up about her personal journey through the challenges, heartbreaks, and triumphs of surrogacy…
…
continue reading

1
Defending Trust & Reputation as CISOs and Leaders Prepare Their AI Strategy - Santosh Nair - BSW #408
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
…
continue reading

1
SANS Stormcast Wednesday, August 13th, 2025: Microsoft Patch Tuesday; libarchive vulnerability upgrade; Adobe Patches
8:55
8:55
Play later
Play later
Lists
Like
Liked
8:55Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression…
…
continue reading

1
300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet... - SWN #502
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-502
…
continue reading

1
7 Ways to Improve Your Next Road Trip (Lessons from our Norway Family Road Trip) with Anne Dorthe
45:34
45:34
Play later
Play later
Lists
Like
Liked
45:34Could a loosely planned road trip actually turn out better than a perfectly mapped itinerary? Anne Dorthe is my wife and travel partner of over 11 years, and a Norwegian local with roots in Trøndelag. In this episode, Anne and I share the story of our recent open-ended family road trip through Norway. We talk about the lessons we learned along the …
…
continue reading

1
The Future of Supply Chain Security - Janet Worthington - ASW #343
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
…
continue reading

1
SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto;
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of…
…
continue reading

1
ESW at BlackHat and the weekly enterprise security news - ESW #419
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
…
continue reading

1
SANS Stormcast Monday, August 11th, 2025: Fake Tesla Preorders; Bad USB Cameras; Win-DoS Epidemic
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07Google Paid Ads for Fake Tesla Websites Someone is setting up fake Tesla lookalike websites that attempt to collect credit card data from unsuspecting users trying to preorder Tesla products. https://isc.sans.edu/diary/Google%20Paid%20Ads%20for%20Fake%20Tesla%20Websites/32186 Compromising USB Devices for Persistent Stealthy Access USB devices, like…
…
continue reading

1
SonicWall, Informants Exposed, Cisco Vishing, Perplexity, GPT‑5, Josh Marpet–SWN #501 - SWN #501
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23This week we have, SonicWall, Confidential Informants Exposed, Cisco Vishing, Perplexity vs robots.txt, Microsoft’s Project Ire, Meta–Flo Jury Verdict, GPT‑5 Lands, TeaOnHer Data Leak, Josh Marpet, and more on the Security Weekly News.. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-…
…
continue reading

1
SANS Stormcast Friday, August 8th, 2025:: ASN43350 Mass Scans; HTTP1.1 Must Die; Hyprid Exchange Vuln; Sonicwall Update; SANS.edu Research: OSS Security and Shifting Left
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59Mass Internet Scanning from ASN 43350 Our undergraduate intern Duncan Woosley wrote up aggressive scans from ASN 43350 https://isc.sans.edu/diary/Mass+Internet+Scanning+from+ASN+43350+Guest+Diary/32180/#comments HTTP/1.1 Desync Attacks Portswigger released details about new types of HTTP/1.1 desync attacks it uncovered. These attacks are particular…
…
continue reading
Why should hate AI When firmware attacks The 300 second breach Old ways still work, AI might help And so begins the crawler wars Turn off your SonicWall VPN Your Pie may be wrapped in PII Attackers will find a way Signed kernel drivers D-Link on the KEV Rasperry PIs attack Stealthy LoRa LLM's don't commit code, people do Jame's Bond style rescue wi…
…
continue reading

1
#341 Opening the Door to Engineering – Engineering Matters Awards winners
19:47
19:47
Play later
Play later
Lists
Like
Liked
19:47Alan Lusty founded adi Group, a multidisciplinary engineering business supporting major manufacturers. He is part of a group that offers engineering services in 23 sectors, with over 750 employees. But he left school at 16 without qualifications, instead pursuing an apprenticeship. At adi Group, more than 10% of employees are apprentices: double th…
…
continue reading

1
Top 6 Hidden Gems in Riga, Latvia (From Ancient Saunas to Secret Markets) with Lelde Benke-Lungevica
59:53
59:53
Play later
Play later
Lists
Like
Liked
59:53What are the best hidden gems in Riga, Latvia, and how can you experience this Baltic city like a local? Lelde Benke-Lungevica is a Latvian writer and cultural storyteller who was born in Australia and moved back to Riga in her teens. Since 2013, she’s run the blog Life in Riga, offering a personal and authentic look at life in Latvia’s capital thr…
…
continue reading

1
SANS Stormcast Thursday, August 7th, 2025: Sextortion Update; Adobe and Trend Micro release emergency patches
5:06
5:06
Play later
Play later
Lists
Like
Liked
5:06Do Sextortion Scams Still Work in 2025? Jan looked at recent sextortion emails to check if any of the crypto addresses in these emails received deposits. Sadly, some did, so these scams still work. https://isc.sans.edu/diary/Do%20sextortion%20scams%20still%20work%20in%202025%3F/32178 Akira Ransomware Group s use of Drivers Guidepoint Security obser…
…
continue reading

1
The Consumer Becomes the Payor: How ICHRA Unlocks a New Era in Healthcare
28:05
28:05
Play later
Play later
Lists
Like
Liked
28:05In this episode, Julie Yoo and Jay Rughani are joined by Thatch cofounders Chris Ellis and Adam Stevenson to explore why ICHRA—a more recent policy innovation—might quietly revolutionize employer-sponsored health benefits. Unpacking the surprising history of how U.S. healthcare became entangled with employment, they make the case for a defined-cont…
…
continue reading

1
S4 EP182: Risa August, Author of The Road Unpaved: Border to Border with a Brain Tumor and a Bike
43:49
43:49
Play later
Play later
Lists
Like
Liked
43:49Join the conversation, text us now. Hello My Happy People, Have I got a show for you today! In this inspiring episode of Book Banter with Dianne Burckhardt – Book Talk Podcast, I share my interview with the effervescent Risa August—award-winning author, speaker, Gestalt practitioner, and rare disease warrior with sparkles in her hair and a tutu in …
…
continue reading

1
AI UNLEASHED: THE SILENT COUP OF TECH ELITES, BRAIN HACKS, AND BIO CONTROL
59:08
59:08
Play later
Play later
Lists
Like
Liked
59:08🚨Become a beta tester for our new Unapologetically Outspoken GPT! Use the link here or head over to our website: https://www.thelawofattractiontribe.com/a/2148108179/MpCJCAPZ Want to join the conversation? Connect with Tara and Stephanie on TikTok, X, Rumble, YouTube, Truth Social, Facebook, and IG. https://msha.ke/unapologeticallyoutsp…
…
continue reading

1
Say Easy, Do Hard - AI Governance in the Supply Chain - Richard Bird, Nick Mistry - BSW #407
54:55
54:55
Play later
Play later
Lists
Like
Liked
54:55Recent findings of AI ecosystem insecurities and attacks show the importance of needing AI governance in the supply chain. And this supply chain is rapidly expanding to include not only open-source software but also collaborative platforms where custom models, agents, prompts, and other AI resources are used. And with this expansion of third-party …
…
continue reading

1
SANS Stormcast Wednesday, August 6th, 2025: Machinekeys and VIEWSTATEs; Perplexity Unethical Learning; SonicWall Updates
7:41
7:41
Play later
Play later
Lists
Like
Liked
7:41Stealing Machinekeys for fun and profit (or riding the SharePoint wave) Bojan explains in detail how .NET uses Machine Keys to protect the VIEWSTATE, and how to abuse the VIEWSTATE for code execution if the Machine Keys are lost. https://isc.sans.edu/diary/Stealing%20Machine%20Keys%20for%20fun%20and%20profit%20%28or%20riding%20the%20SharePoint%20wa…
…
continue reading

1
MFA Bypass, SonicWall, BIOS Shade, Sex Toys, FBI Warning, Claude v GPT-5, Josh Marpet - SWN #500
32:30
32:30
Play later
Play later
Lists
Like
Liked
32:30MFA Bypass, SonicWall, BIOS Shade, Sex Toys, FBI Warnings, Claude vs GPT-5, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-500
…
continue reading