Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Code Security Podcasts
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot ...
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast, and so are the conversations that shape it. Welcome to The Security Champions Podcast, the go-to resource for insights from the front lines of application security. The podcast is cohosted by Michael Burch, Director of Application Security for Security Journey, and Dustin Lehr, the Director of AppSec Advocacy. Each month, one of them shares a candid conversation with security leaders, engineering voic ...
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
discussions on topics connected with software development; privacy, security, management, tools, techniques, skills, training, business, soft skills, health
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
Main AI by CodeRabbit is a podcast that brings you deep conversations with legendary developers who've shaped the tools we use every day. We explore how artificial intelligence is transforming software development while celebrating the creators and tools that built our foundation. Each episode features intimate discussions about building developer tools, maintaining open source projects, and navigating the evolution of technology.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Artificial Intelligence has too much hype. In this podcast, linguist Emily M. Bender and sociologist Alex Hanna break down the AI hype, separate fact from fiction, and science from bloviation. They're joined by special guests and talk about everything, from machine consciousness to science fiction, to political economy to art made by machines.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
Tech Disruptors by Bloomberg Intelligence features conversations with thought leaders and management teams on disruptive trends. Topics covered in this series include cloud, e-commerce, cybersecurity, AI, 5G, streaming, advertising, EVs, automation, crypto, fintech, AR/VR, metaverse and Web 3.0. This podcast is intended for professional investors only. It is being prepared solely for informational purposes only and does not constitute an offer or investment advice.
…
continue reading
The world of application development moves quickly. New tools, new processes, and new threats are always popping up. Through enlightening interviews with industry leaders, From Code to the Cloud helps you stay on top of new developments in Low Code and Salesforce DevOps.
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security
…
continue reading
Welcome to For a Cloudy Day, the podcast where we talk about the cloud technology industry with insights from experts. Hosted by Co-native, the home of cloud specialists.
…
continue reading
Cyber Security News, Analysis and Opinion
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
…
continue reading
Discussions with regulators, top lawyers and entrepreneurs about the legal framework for blockchain technology. We look at international regulations, trends, and jurisprudence impacting crypto and its related parts.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Larry and Kerry talk about parenting issues during Covid-19 isolation period
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
Breaking the Internet is a podcast about tech for tech - but we’re not like other girls. Serena (@shenetworks) and Ali (@endingwithali) take to the mic to talk about the industry, trends, history and more.
…
continue reading
Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps — all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A show about the perils & pitfalls of creative intellectual automation; and why the future of good Internet vibes is for the humans, by the humans.
…
continue reading
The opportunity to delve into the 'mindsz' of industry leaders in technology and cyber security.
…
continue reading
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
Struggling to keep pace with the ever-changing world of technology? For experienced tech professionals, making sense of this complexity to find real strategic advantages is key. This series offers a clear path, featuring insightful, casual conversations with leading global experts, innovators, and key voices from Red Hat, all cutting through the hype. Drawing from Red Hat's deep expertise in open source and enterprise innovation, each discussion delves into new and emerging technologies-- fr ...
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
ThePrint.in is a news, analysis, opinion & knowledge media company that sharply focuses on politics, policy, government and governance. Start your mornings with our journalists who bring you the big story of the day in ThePrintAM. ThePrintPod offers you our special reports and opinions for when you‘re on the go. End your day with our most popular show ‘Cut The Clutter’ by Editor-in-Chief Shekhar Gupta. But that’s not all. We also have Pure Science, National Interest, ThePrint Uninterrupted, ...
…
continue reading
Podcast by Skyscanner
…
continue reading

1
Security Code: Trump’s love affair with Asim Munir is driven by his plans to rebuild the Middle East security
16:26
16:26
Play later
Play later
Lists
Like
Liked
16:26Trump’s love affair with Asim Munir is driven by his plans to rebuild the Middle East securityBy ThePrint
…
continue reading

1
Vibe Coding: Four Security Nightmares in a Trenchcoat (with Susanna Cox), 2025.07.21
59:00
59:00
Play later
Play later
Lists
Like
Liked
59:00After many months of making fun of the term "vibe coding," Emily and Alex tackle the LLMs-as-coders fad head-on, with help from security researcher Susanna Cox. From one person's screed that proclaims everyone not on the vibe-coding bandwagon to be crazy, to the grandiose claim that LLMs could be the "opposable thumb" of the entire world of computi…
…
continue reading

1
DARPA code prize, ScarCruft adds ransomware, Columbia breach tally
8:21
8:21
Play later
Play later
Lists
Like
Liked
8:21DARPA awards $4 million prize for AI code review at DEF CON North Korea ScarCruft group adds ransomware to its activities Columbia University hack affects over 860,000 Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when…
…
continue reading

1
From Code to Crypto: How Learning Fundamentals Empowers Security Pros – Matt Olmsted
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58In this episode of the Security Repo Podcast, software engineer and newly minted CISSP Matt Olmsted joins us to explore cryptographic fundamentals and why understanding them matters for anyone in security. From explaining symmetric vs. asymmetric encryption to the real-world implications of side-channel attacks, Matt delivers practical insights for…
…
continue reading

1
Safe, Secure, and Trustworthy? Nope, Uh-Uh, and Heavens No!
43:14
43:14
Play later
Play later
Lists
Like
Liked
43:14In this episode I talk about the shocking decline in AI safety, why AI is becoming a religion and that shouldn’t surprise us, software developer reluctance and growing impatience in using these tools, and the LMDs of Marvel’s Agents of S.H.I.E.L.D. Oh yes, we’re going there! Hosted by Jared White Produced by Intuitive Future // Join Intuitive+ Toda…
…
continue reading

1
#151 - SEC Commissioner Hester Peirce and Crypto Task Force Chief Counsel Mike Selig on Tokenizing Securities & Market Structure rules
27:29
27:29
Play later
Play later
Lists
Like
Liked
27:29SEC Commissioner Hester Peirce and Crypto Task Force Chief Counsel Mike Selig return to the podcast to share updates from the SEC’s Crypto Task Force — plus their thoughts on tokenized securities, market structure legislation, exemptive relief, and the role of decentralization in regulatory design. Timestamps: ➡️ 00:00 — Intro ➡️ 00:46 — Sponsor: D…
…
continue reading

1
Existential Dread, MCP, Cloudflare, ESXI, QR Codes, Salt Typhoon, Aaran Leyland... - SWN #495
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42Existential Dread and Seawater, MCP, Cloudflare, ESxi, QR Codes, Salt Typhoon, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-495
…
continue reading

1
CutTheClutter: Enter US, Exit Iran & Russia: Armenia-Azerbaijan 'peace', Trump corridor & the South Caucasus shift
20:53
20:53
Play later
Play later
Lists
Like
Liked
20:53#cuttheclutter Armenia & Azerbaijan last week signed joint declaration in the US, agreeing to respect each other’s territorial integrity. The highlight of the ‘peace’ move brokered by Trump is the creation of the 43-km Zangezur corridor, which will be developed by American companies and called Trump Route For International Peace & Prosperity. ThePr…
…
continue reading

1
Security Onion - From Classroom To SOC, Open Source and Education - Matt Gracie
22:32
22:32
Play later
Play later
Lists
Like
Liked
22:32In this episode of the Security Repo Podcast, we’re joined by Matt Gracie, a seasoned blue team expert and senior engineer at Security Onion Solutions. Matt dives deep into the architecture and practical deployment of Security Onion, a powerful open-source enterprise security monitoring tool. He also shares insights from his role as a cybersecurity…
…
continue reading

1
Ep. 17: Dmitri Alperovitch, Co-founder Crowdstrike Part 1
21:31
21:31
Play later
Play later
Lists
Like
Liked
21:31In this episode of Code and Country, Ian Paterson sits down with Dmitri Alperovitch, CrowdStrike co-founder, Silverado Policy Accelerator executive chairman, and author of World on the Brink. Dmitri shares his journey from teenage encryption entrepreneur to leading some of the most consequential cyber investigations in history, including Operation …
…
continue reading

1
ThePrintPod: 3 yrs after being made legal guardian, Delhi man still struggling to bring adopted Nigerian child home
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48Mohd Wasi alleges his adopted son’s case is stuck as India’s adoption agency was dragging its feet even though laws give High Commission the power to issue visas or OCIs.By ThePrint
…
continue reading

1
GEOPOLITICS: How India can navigate Trump, trade with US, Palestinians' stand on Hamas & more| Ep 26
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45In this edition of Geopolitics with Swasti, ThePrint Consulting Editor Swasti Rao discusses what India-US trade looks like and how India can navigate Trump . She also discusses the Israel-Gaza war and what lies next.By ThePrint
…
continue reading

1
303 - A look at Microsoft Sentinel in 2025
26:49
26:49
Play later
Play later
Lists
Like
Liked
26:49Back in 2020 we did our first episode on Microsoft Sentinel. We feel it's time to revisit Sentinel after five years, and take a look at where it stands today. What's relevant, what's new, and what's happening with Sentinel? (00:00) - Intro and catching up. (04:29) - Show content starts. Show links - Microsoft Sentinel Quickstart - Sentinel Data Lak…
…
continue reading

1
ThePrintUnscripted: Delhi Minister backs SC order on removal of stray dogs, says 'attack victims have the right to live'
45:00
45:00
Play later
Play later
Lists
Like
Liked
45:00Delhi minister Ashish Sood hits out at the previous AAP govt over delays in implementing the National Education Policy and accuses it of politicising education and dismantling systems. Speaking to ThePrint’s senior associate editor, Neelam Pandey, Sood also speaks at length on the SC order over removal of stray dogs.…
…
continue reading

1
Defending Trust & Reputation as CISOs and Leaders Prepare Their AI Strategy - Santosh Nair - BSW #408
50:05
50:05
Play later
Play later
Lists
Like
Liked
50:05As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
…
continue reading

1
ThePrintPod: US tags BLA as foreign terrorist group days after Pakistan army chief Munir’s visit. What it means
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10US had earlier designated BLA as Specially Designated Global Terrorist group & has now upgraded it to Foreign Terrorist Organisation, adding its militant wing Majeed Brigade to SDGT separately.By ThePrint
…
continue reading

1
Fortinet SSL VPNs getting hammered, The Netherlands critical infrastructure compromise, Africa the most targeted for cyber attacks
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26The hits just keep on coming Where's the Little Dutch Boy when you need him? I felt the ransomware down in Africa Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time…
…
continue reading

1
ThePrintAM: What has SC said on old vehicles in Delhi-NCR?
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41https://theprint.in/judiciary/sc-hits-pause-on-coercive-action-against-owners-of-end-of-life-petrol-diesel-cars-in-delhi-ncr/2719727/By ThePrint
…
continue reading

1
SANS Stormcast Wednesday, August 13th, 2025: Microsoft Patch Tuesday; libarchive vulnerability upgrade; Adobe Patches
8:55
8:55
Play later
Play later
Lists
Like
Liked
8:55Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression…
…
continue reading

1
300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet... - SWN #502
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-502
…
continue reading

1
300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet... - SWN #502
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14300 Baud, Buddy Hackett Nudes, Dell, badUSB, Exchange, Erlang/OTP, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-502
…
continue reading

1
Language, meaning, human connection and the AI hype with Prof Emily Bender
38:42
38:42
Play later
Play later
Lists
Like
Liked
38:42In this episode, Dr Miah Hammond-Errey is joined by Professor Emily Bender—A renowned AI commentator, professor of linguistics at the University of Washington and co-author of The AI Con: How to Fight Big Tech Hype and Create the Future We Want. In this episode we explore the complex relationship between language, large language models, and the ris…
…
continue reading

1
CutTheClutter: As Pakistan issues war threat over Indus Waters,understanding the treaty India paused after Pahalgam
24:52
24:52
Play later
Play later
Lists
Like
Liked
24:52#cuttheclutter Pakistan's former foreign minister Bilawal Bhutto-Zardari on 11 August, issued a warning over India's action on the Indus Waters Treaty following the Pahalgam terror attack. Calling India's decision to pause the Indus Waters Treaty an attack on Indus Valley Civilisation & Culture, Bilawal Bhutto-Zardari said that Pakistan would have …
…
continue reading

1
PwC’s Take on the Future AI-Enhanced Workforce
51:43
51:43
Play later
Play later
Lists
Like
Liked
51:43Generative AI is transforming how enterprises and consultants create value, and on this episode of Tech Disruptors, Matt Wood, PwC’s global and US commercial technology and innovation officer, explains how it’s doing so. Wood tells Bloomberg Intelligence senior technology analyst Anurag Rana that it’s a “golden era” for professional services, where…
…
continue reading

1
The Future of Supply Chain Security - Janet Worthington - ASW #343
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
…
continue reading

1
The Future of Supply Chain Security - Janet Worthington - ASW #343
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
…
continue reading

1
The Future of Supply Chain Security - Janet Worthington - ASW #343
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
…
continue reading

1
PoliticallyCorrect: 'BJP vs BJP' battle in Constitution Club is a prelude to bigger battles in India’s ruling party
10:58
10:58
Play later
Play later
Lists
Like
Liked
10:58UP CM Yogi Adityanath is under siege from within, with his ministers targeting him with impunity. What’s making BJP a ‘party with differences’, ThePrint Political Editor DK Singh elaborates in this episode of #PoliticallyCorrect----more----Read this week's Politically Correct here: https://theprint.in/opinion/politically-correct/bjp-vs-bjp-constitu…
…
continue reading
Please enjoy this encore of Word Notes. The flagship product of the controversial Israeli spyware vendor, the NSO Group, use for remotely hacking mobile devices, most notably iPhones, via zero-click exploits. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:“Cybersecurity beyond the Headlines: A Conversatio…
…
continue reading

1
North Korean crypto theft, Microsoft rolls out back up, four charged in global scheme
9:07
9:07
Play later
Play later
Lists
Like
Liked
9:07North Korean crypto theft Microsoft rolls out PC back up during attack U.S. charges four in $100M global fraud scheme Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-…
…
continue reading

1
ThePrintPod: In Mohammed Siraj, the Pasmanda Muslims have a hero
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25Mohammed Siraj is an exceptional Indian cricketer, and as a Pasmanda Muslim, Siraj is also being pulled into symbolic service. Known for his climb from modest beginnings, 31-year-old Siraj has become one of the most reliable fast bowlers in Indian cricket — across formats, conditions, and pressure. His exceptional performance has placed him to be a…
…
continue reading

1
SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto;
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of…
…
continue reading

1
ThePrintAM: How has India responded to Asim Munir's comments in US?
4:14
4:14
Play later
Play later
Lists
Like
Liked
4:14By ThePrint
…
continue reading

1
CutTheClutter: Making sense of Pakistan Army Chief Asim Munir’s reckless nuclear rant against India in 10 points
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:39#cuttheclutter ThePrint Exclusive newsbreak on Sunday detailed the nuclear threat & statements by Pakistan Army Chief Asim Munir in US. He was speaking at a black-tie dinner in Tampa, US. He said, 'We are a nuclear nation, if we think we are going down, we will take half the world down with us.' India responded to Munir’s threats and said that nucl…
…
continue reading

1
ThePrintPod: How mining, manufacturing & power sectors weighed on India’s industrial output since January 2024
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10India’s industrial output growth saw a 10-month low in June, with Index of Industrial Production (IIP) growing by mere 1.5% as against 1.9% in May 2025.By ThePrint
…
continue reading

1
ThePrintPod: Blockbuster semaglutide set to go off patent, Indian pharma sees a multi-billion-dollar opportunity
3:24
3:24
Play later
Play later
Lists
Like
Liked
3:24Pharma firms are pouncing on opportunity as patents on world’s second-bestselling drug, which goes by brand names Ozempic and Wegovy, are expiring in nearly 100 nations.By ThePrint
…
continue reading

1
ESW at BlackHat and the weekly enterprise security news - ESW #419
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
…
continue reading

1
#515: Durable Python Execution with Temporal
1:10:54
1:10:54
Play later
Play later
Lists
Like
Liked
1:10:54What if your code was crash-proof? That's the value prop for a framework called Temporal. Temporal is a durable execution platform that enables developers to build scalable applications without sacrificing productivity or reliability. The Temporal server executes units of application logic called Workflows in a resilient manner that automatically h…
…
continue reading

1
SANS Stormcast Monday, August 11th, 2025: Fake Tesla Preorders; Bad USB Cameras; Win-DoS Epidemic
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07Google Paid Ads for Fake Tesla Websites Someone is setting up fake Tesla lookalike websites that attempt to collect credit card data from unsuspecting users trying to preorder Tesla products. https://isc.sans.edu/diary/Google%20Paid%20Ads%20for%20Fake%20Tesla%20Websites/32186 Compromising USB Devices for Persistent Stealthy Access USB devices, like…
…
continue reading

1
ThePrintAM: What did Asim Munir say about India & nuclear war at a black-tie dinner in Tampa?
7:15
7:15
Play later
Play later
Lists
Like
Liked
7:15By ThePrint
…
continue reading

1
How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber | Reflections from Black Hat USA 2025 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE3 ...
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44Black Hat 2025 was a showcase of cybersecurity innovation — or at least, that’s how it appeared on the surface. With more than 60 vendor announcements over the course of the week, the event floor was full of “AI-powered” solutions promising to integrate seamlessly, reduce analyst fatigue, and transform SOC operations. But after walking the floor, t…
…
continue reading

1
National Interest Pod: Trump trade war: Modi’s moment for Farm reform despite personal risk
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25Trump’s 50% tariffs will hit the farmers, artisans, spices growers, & fishing & dairying communities. Speaking at the M.S. Swaminathan centenary commemorations PM Modi vowed to protect them whatever the risks or costs, & whatever price he might have to pay for it personally. The question: what is the price he & the country may have to pay? – Watch …
…
continue reading

1
ThePrintAM: Why did Modi govt withdraw Income Tax Bill 2025?
3:32
3:32
Play later
Play later
Lists
Like
Liked
3:32By ThePrint
…
continue reading

1
Week in Review: UK LegalAid collapse, public ransomware approval, Salesforce breach impact
30:03
30:03
Play later
Play later
Lists
Like
Liked
30:03Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Montez Fitzpatrick, CISO, Navvis Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. Th…
…
continue reading

1
SonicWall, Informants Exposed, Cisco Vishing, Perplexity, GPT‑5, Josh Marpet–SWN #501 - SWN #501
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23This week we have, SonicWall, Confidential Informants Exposed, Cisco Vishing, Perplexity vs robots.txt, Microsoft’s Project Ire, Meta–Flo Jury Verdict, GPT‑5 Lands, TeaOnHer Data Leak, Josh Marpet, and more on the Security Weekly News.. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-…
…
continue reading

1
SonicWall, Informants Exposed, Cisco Vishing, Perplexity, GPT‑5, Josh Marpet–SWN #501 - SWN #501
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23This week we have, SonicWall, Confidential Informants Exposed, Cisco Vishing, Perplexity vs robots.txt, Microsoft’s Project Ire, Meta–Flo Jury Verdict, GPT‑5 Lands, TeaOnHer Data Leak, Josh Marpet, and more on the Security Weekly News.. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-…
…
continue reading
Alright, buckle up, buttercups, because this week's "Spicy Mode" episode of Grumpy Old Geeks proves that while things change, they mostly stay the same—just with more AI and less common sense. First up in FOLLOW UP, some poor schmoe automaker actually got a federal exemption for automated vehicles. Because what could possibly go wrong when we let r…
…
continue reading

1
CutTheClutter: Palantir, the $400bn tech 'upstart' with Indian CTO, & why Trump trusts it for security,defence,data
20:02
20:02
Play later
Play later
Lists
Like
Liked
20:02CutTheClutter: Palantir, the $400bn tech 'upstart' with Indian CTO, & why Trump trusts it for security,defence,dataBy ThePrint
…
continue reading