The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Computer Hacker Podcasts
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
The story of the world's most secret agents...the backups. For the first time in his career, Special Agent Chet Phillips has discovered that he can choose NOT to accept a mission! That means there's no choice but to send in the "B Team": A nervous pencil pusher promoted to the field, a computer hacker working off her sentence, a fading former sitcom star and a recently reassigned White House intern. A full cast comedy audio adventure with a new episode debuting each month!
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Catch up on all the best stories and discussion on Hacker New each week. Hosted by Colin (a YC-backed founder and typescript fanatic) and Kenny (a human-computer interaction whiz who just wants software to be fast).
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Founder Reality with George Pu. Real talk from a technical founder building AI-powered businesses in the trenches. No highlight reel, no startup theater – just honest insights from someone who codes, ships, and scales. Every week, George breaks down the messy, unfiltered decisions behind building a bootstrap software company. From saying yes to projects you don't know how to build, to navigating AI hype vs. reality, to the mental models that actually matter for technical founders. Whether yo ...
…
continue reading
Download This Show is your weekly guide to the world of media, culture, and technology. From social media to gadgets, streaming services to privacy issues. Each week Rae Johnston and guests take a fun, deep dive into how technology is reshaping our lives.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Introducing Motherlode, a Ranieri & Co. production. The gripping story about the birth of computer hacking from an unlikely centre - Melbourne Australia. It was here teenage boys, and they were mostly boys, hacked into some of the biggest organisations in the world. It’s also where a young hacker, Julian Assange, cut his teeth on computers and went on to develop Wikileaks, the most disruptive website the world has seen. But Wikileaks didn’t just spring up out of nowhere. It was 20 years in t ...
…
continue reading
Information you will not read about in the press... by @adanielhill 1st hacker that served time in prision in #uruguay for a computer crime. https://my.darkweb.today/mydarkweb/
…
continue reading
Jaron Swab, a software engineer, shares tips around Linux, programming, and open source. So you can stay on top of your privacy, security, and productivity. Discover what it means to be a hacker from a self taught software engineer. You'll learn how to land a tech job, amp up your computer efficiency, and leave behind the walled gardens of big tech. Since 2005, Jaron has exercised his love for coding and taking technology into his own hands. It's Jaron and a microphone; a one on one approach ...
…
continue reading
Följ med på en resa in i internets mörkaste hörn. Vill du höra mer? Stöd mig gärna på https://www.patreon.com/natetsmorkasida och få tillgång till exklusiva avsnitt, videos och mycket mer. Frågor, förslag, affärer? Kontakta mig på [email protected] Support till showen http://supporter.acast.com/natets-morka-sida. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A new beginning in IT
…
continue reading
Legitimate Cybersecurity Podcast - designed to empower you with real-world cybersecurity information, stories, and advice.
…
continue reading
We Cover the Cyberspace.
…
continue reading
מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
30-Day InfoSec, a monthly information security recap show for the latest news, stories, and happenings from around the cybersecurity community.
…
continue reading
Take a trip into the future that will challenge the way you think and act today. In each episode, BCG's Patricia Sabga and her AI co-host GENE delve into disruptive scenarios that could define the coming decades. BCG experts join the conversation, probing the possibilities and implications for leaders. Human and machine work together to explore the very real actions CEOs could take today to prepare. This podcast uses the following third-party services for analysis: Podtrac - https://analytic ...
…
continue reading
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
…
continue reading
Welcome to Tech News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news of all things tech, including the latest developments in areas such as artificial intelligence, robotics, cybersecurity, gadgets, apps, and more. Whether you're a tech enthusiast, industry professional, or simply curious about the potential ...
…
continue reading
Threatpost writers Mike Mimoso and Chris Brook discuss security threats, attacks, vulnerability research and trends with a variety of industry executives, researchers and experts.
…
continue reading
We demystify cutting edge technology from experts in the trenches and provide actionable next steps.
…
continue reading
7th Son: 7 Days is a audio prequel anthology to J.C. Hutchins' thriller novel, 7th Son: Descent. Set two weeks before Descent’s extraordinary events, the series reveals the lives of seven seemingly unrelated men, and their everyday challenges. In the world of 7th Son, "everyday challenges" are far from ordinary. Each of these seven stories stars a unique John Michael Smith. Witness criminal profiler Dr. Mike's quest to hunt an unstoppable serial killer. Watch blue-collar musician John realiz ...
…
continue reading
Stay on the cutting edge of technology with in-depth discussions and the latest news. From emerging trends to industry secrets, Tech Pulse brings you the heartbeat of the tech world.
…
continue reading
A podcast about tech (mostly computer hardware but also mobile and consoles) made for non techy people. We won't use jargon or assume you know why a GT1630 is a horrible GPU or that it's a big deal that ETH has moved to POS from POW. We use plain, sometimes humorous, language to keep you up to date with all things tech.
…
continue reading
That Great Business Show with Conall Ó Móráin - officially Ireland's TOP Business Podcast, UCD Smurfit's Business Podcast of the Year! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
…
continue reading
Everything tech.
…
continue reading
Dive into the electrifying world of electrical engineering with Circuit Break, a MacroFab podcast hosted by Parker Dillmann and Stephen Kraig. This dynamic duo, armed with practical experience and a palpable passion for tech, explores the latest innovations, industry news, and practical challenges in the field. From DIY project hurdles to deep dives with industry experts, Parker and Stephen's real-world insights provide an engaging learning experience that bridges theory and practice for eng ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and ...
…
continue reading
A gumbo of cybersecurity insights about Data Protection, Data Governance, and Data Backup
…
continue reading
Synchronicity machines. Difference engines melded with the iChing. Geomancy: the art of making stone float with sound. The hacker collective 'Anonymous'. Secret societies … This is the world of ARMAND PTOLEMY, a new action-adventure hero. Facing an enemy armed with the Golden Aleph -- a mystical device that allows its wielder to see holographically into every point in time and space, Ptolemy must use every trick of his Oxford-educated mind and circus-trained body to succeed. But how do you f ...
…
continue reading
The world wide web, as we know it today, has been around for over 30 years. In that time, most of us have created many dozens, perhaps hundreds, of online accounts. How many of those accounts are still alive somewhere? What data do they hold? And how good are the passwords you used? Today we’re going to start on the path to finding all those accoun…
…
continue reading

1
Oktane Preview with Harish Peri, Invisible Prompt Attacks, and the weekly news! - Harish Peri - ESW #421
1:49:28
1:49:28
Play later
Play later
Lists
Like
Liked
1:49:28Interview with Harish Peri from Okta Oktane Preview: building frameworks to secure our Agentic AI future Like it or not, Agentic AI and protocols like MCP and A2A are getting pushed as the glue to take business process automation to the next level. Giving agents the power and access they need to accomplish these lofty goals is going to be challengi…
…
continue reading
Send us a text In this episode, we delve into the transformative journey of artificial intelligence and its profound impact on job markets worldwide. From automation to innovation, AI is reshaping industries, creating new opportunities, and challenging traditional employment paradigms. Join us as we explore how AI is redefining work, the skills nee…
…
continue reading

1
Your VPN Extension Might Be Watching You Right Now
59:05
59:05
Play later
Play later
Lists
Like
Liked
59:05This week on The Awareness Angle, Anthony Davis and Luke Pettigrew unpack the latest mix of cyber weirdness, policy drama, and awareness lessons—from fake law firm emails dropping malware to pro-Russian hackers playing with dam floodgates. It’s a week of scams, slips, and security culture stories you’ll want to hear. 🇬🇧 Age Verification Laws – UK a…
…
continue reading

1
Image-Based Sexual Abuse: Global Analysis and Legal Responses.
52:39
52:39
Play later
Play later
Lists
Like
Liked
52:39This comprehensive document analyzes image-based sexual abuse (IBSA), moving beyond the misnomer of "revenge porn" to define it as the non-consensual distribution of intimate images (NDII), often driven by power and control rather than simple revenge. It explores the diverse motivations of perpetrators, ranging from financial gain to misogyny, and …
…
continue reading

1
Julian Waits: Find a way to help society. [Serial Entrepreneur] [Career Notes]
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04Please enjoy this encore of Career Notes. Senior Vice President and Executive in Residence with Rapid7 and Chairman for Cyversity, Julian Waits, grew up in the era of the Justice League and Superman and it shaped his career. Julian always wanted to do something where he could find a way to help society to basically help others. Starting out as a Ba…
…
continue reading

1
Book overview: The Satoshi Variant: An Accidental Genesis Block.
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21This is an overview of a fictional narrative about a woman named Ana, a "Digital Thanatologist" who specializes in decommissioning AI, and her unexpected relationship with an entity calling himself Satoshi, the decentralized, multi-persona embodiment of the Bitcoin creator. This narrative explores themes of identity, technology, and connection thro…
…
continue reading

1
Email Spoofing: Deception, Detection, and Defense.
38:46
38:46
Play later
Play later
Lists
Like
Liked
38:46The provided text examines the fundamental vulnerability of email spoofing, stemming from the original design of the Simple Mail Transfer Protocol (SMTP) which separates the sender's transport address from the displayed "From" address. It illustrates how this flaw can be exploited through basic command-line tools like Telnet or automated scripts us…
…
continue reading

1
The Controversial World of Jonathan Scott's Cybersecurity Claims
33:16
33:16
Play later
Play later
Lists
Like
Liked
33:16The provided text analyzes Jonathan Scott, also known as @jonathandata1, a figure in cybersecurity known for his polarizing claims. Scott presents himself as an expert in mobile malware and digital forensics, despite facing widespread criticism from his peers who label his work as disinformation and pseudoscience. While he possesses some verifiable…
…
continue reading

1
An Alberto Birthday Roast and Celebration
25:51
25:51
Play later
Play later
Lists
Like
Liked
25:51The provided text captures an audio space conversation celebrating Alberto's birthday, with various participants sharing personal anecdotes and well-wishes. The discussion covers a wide range of topics, including Alberto's past experiences, his involvement in cybersecurity and online spaces, and his quirky personality. The speakers also engage in m…
…
continue reading

1
Beyond the smoke screen. [Research Saturday]
22:22
22:22
Play later
Play later
Lists
Like
Liked
22:22This week, we are joined by Dr. Renée Burton, VP of Infoblox Threat Intel, who is discussing their work on VexTrio, a notorious traffic distribution system (TDS) involved in digital fraud. The VexTrio investigation uncovers a massive global ad fraud and scam operation powered by just 250 virtual machines, tying it directly to named individuals and …
…
continue reading

1
Underground: Hacking, Madness, and Obsession on the Electronic Frontier.
36:32
36:32
Play later
Play later
Lists
Like
Liked
36:32The provided sources analyze the extraordinary activity of Alberto Daniel Hill (adanielhill) on X Spaces, highlighting his unprecedented hosting frequency and engagement. Since 2021, he has hosted nearly 2,000 spaces, averaging over one per day, which positions him among the top 30 global hosts. Beyond hosting, Hill has also co-hosted over 200 spac…
…
continue reading

1
Free Vlady: Cybersecurity and the Law in Uruguay.
35:42
35:42
Play later
Play later
Lists
Like
Liked
35:42These sources consist of transcripts from YouTube videos by the channel "CYBERMIDNIGHT CLUB," primarily focusing on interviews and statements from a hacker known as Gob or Gob Etherium. The central topic is the arrest and imprisonment of Gob's 18-year-old friend, Vlady, who is accused of various cybercrimes in Uruguay, including the defacement of t…
…
continue reading
The provided text explores the origins and evolution of the hacker collective Anonymous, tracing its roots from humorous pranks within MIT's Model Railroad Club to the unfiltered environment of 4chan's "/b/" board. It highlights Anonymous's shift from random trolling to more organized "hactivism", with key operations targeting figures like Neo-Nazi…
…
continue reading

1
Apple TV+ Price Increase, Insta360 Launches Go Ultra, Tesla Under Crash Report Probe, FTC Issues Privacy Warning, and more...
12:14
12:14
Play later
Play later
Lists
Like
Liked
12:14(0:10): Apple TV+ Price Hike to $12.99: Can Premium Content Justify the Cost? (2:47): Insta360 Unveils Go Ultra: 4K Action Camera Revolutionizes Portability and Performance (5:17): Tesla Probed by NHTSA for Delayed Crash Reports Amidst Autonomous Vehicle Strategy Scrutiny (7:35): FTC Warns Tech Giants: Foreign Laws Threaten U.S. Privacy and Securit…
…
continue reading

1
Humans extinct: 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Aaran Leyland.. - SWN #505
34:12
34:12
Play later
Play later
Lists
Like
Liked
34:12Humans wiped out by 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Philip K. Dick, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-505
…
continue reading
The FTC warns one country’s “online safety” may be another’s “censorship.” A new bipartisan bill aims to reduce barriers to federal cyber jobs. MURKY PANDA targets government, technology, academia, legal, and professional services in North America. MITRE updates their hardware weaknesses list. Customs and Border Protection conducts a record number …
…
continue reading

1
Cartel Surveillance: FBI Informants Targeted in Mexico City.
45:44
45:44
Play later
Play later
Lists
Like
Liked
45:44Cartel Surveillance: FBI Informants Targeted in Mexico City2 sources The sources explore two distinct facets of digital activity: cybersecurity and its misuse. One source focuses on "Spydirbyte," a self-proclaimed hacker whose biography details a complex past of trauma, black-hat activities, and later, politically motivated activism, often associat…
…
continue reading

1
E7: Stop Learning About Startups and Just Start One (Why I Failed 3 Times Before SimpleDirect)
22:10
22:10
Play later
Play later
Lists
Like
Liked
22:10I failed at 3 startups before SimpleDirect worked. A ride-sharing app that got destroyed at pitch competitions. A travel planning app that went nowhere. A cashback app that hit #2 on Product Hunt but still died. Each failure taught me more than years of reading startup books ever could. The biggest barrier to founder success isn't lack of knowledge…
…
continue reading

1
Chasing Edward Snowden: A Whistleblower's Hunt.
12:39
12:39
Play later
Play later
Lists
Like
Liked
12:39The provided text chronicles the global manhunt for Edward Snowden after he leaked classified National Security Agency (NSA) documents. It details the risks Snowden took to expose mass surveillance programs, highlighting his initial meeting with journalists in Hong Kong and the immediate international reaction. The narrative also captures the inten…
…
continue reading

1
How do you protect yourself against AI voice scams?
30:06
30:06
Play later
Play later
Lists
Like
Liked
30:06Explore the latest in technology, social media, consumer electronics, digital culture and more. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy ABC listen
…
continue reading

1
The Symbiotic State: Mexico's Political-Criminal Networks.
20:19
20:19
Play later
Play later
Lists
Like
Liked
20:19This report examines the intricate and systemic corruption within Mexico's political landscape, highlighting the concept of "narcopolíticos" — individuals who protect or collaborate with organized crime. It analyzes how criminal enterprises have deeply integrated with state functions, ranging from drug trafficking and human exploitation to arms dea…
…
continue reading

1
From Corridos to #CartelTikTok: The Rise of the Narco-Influencer in Mexico.
27:48
27:48
Play later
Play later
Lists
Like
Liked
27:48The source discusses the pervasive influence of drug cartels in Mexico, specifically focusing on the phenomenon of "narcoinfluencers" who use social media to promote cartels by justifying their actions and denigrating rivals. It details the murder of an influencer, Camilo Ochoa, highlighting the use of hackers to locate targets and the brutal metho…
…
continue reading

1
Cartel's Underground Cellular Networks: Criminal Innovation.
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23The provided source discusses allegations that Mexican drug cartels are developing their own sophisticated cellular networks, moving beyond simple encrypted apps or burner phones. These networks are purportedly built using modified commercial hardware, open-source software, and advanced, custom encryption methods like "geolock" which reportedly use…
…
continue reading

1
Target CEO Resigns, Microsoft Pushes Quantum-Safe Cryptography, FieldAI Raises 405M, FBI and Cisco Warn of Russian Hackers, and more...
10:54
10:54
Play later
Play later
Lists
Like
Liked
10:54(0:10): Target CEO Steps Down as New Leadership Tackles Challenges and Embraces AI-Driven Transformation (2:19): Microsoft Leads Quantum-Safe Revolution: Integrating Post-Quantum Cryptography by 2029 (4:40): FieldAI Secures $405M, Hits $2B Valuation with Support from Gates, Bezos, and Nvidia (6:46): FBI & Cisco Warn of Russian Hackers Exploiting 7-…
…
continue reading

1
What We’ve Learned from LockBit and Black Basta Leaks (and News) - Ian Gray - PSW #888
2:15:17
2:15:17
Play later
Play later
Lists
Like
Liked
2:15:17This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
…
continue reading

1
What We’ve Learned from LockBit and Black Basta Leaks (and News) - Ian Gray - PSW #888
2:15:17
2:15:17
Play later
Play later
Lists
Like
Liked
2:15:17This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
…
continue reading

1
Cybermidnight Club Podcast Analytics Report.
42:22
42:22
Play later
Play later
Lists
Like
Liked
42:22The provided sources document the extraordinary journey of Alberto Daniel Hill, a Uruguayan cybersecurity expert. They detail his wrongful imprisonment in 2017 for a computer-related crime he denies, an ordeal that led to profound personal trauma, including a coma, and the loss of millions in cryptocurrency assets. Following his release, Hill trans…
…
continue reading
Zero-day clickjacking flaws affect major password managers. The FBI warns that Russian state-backed hackers are exploiting a long-known Cisco flaw. Apple releases emergency patches for a zero-day flaw in the Image I/O framework. Home Depot faces a proposed class action lawsuit accusing it of secretly using facial recognition at self-checkout kiosks…
…
continue reading

1
Unpacking Government Cyber Failures and Cover-ups.
29:08
29:08
Play later
Play later
Lists
Like
Liked
29:08The sources present an extensive discussion between two individuals, Alberto Hill and JAY, along with other participants, concerning a significant cybersecurity breach and data exploitation within the U.S. federal government, specifically targeting the Office of Personnel Management (OPM). Shay, a cybersecurity expert with 29 years of experience, d…
…
continue reading

1
E6: I Tried Vibe Coding for 6 Months and Nearly Destroyed My Products (Why AI-Assisted Development Is Not What You Think)
20:11
20:11
Play later
Play later
Lists
Like
Liked
20:11I fell hard for "vibe coding" - using AI to build apps based on vibes rather than understanding. Spent 6 months with Cursor and Claude, paying $200/month. Built 3 projects. One succeeded, two failed spectacularly. - Project 1 (Success): Rebuilt our dormant mobile app in 2 days using Figma designs and Claude. Looked perfect, worked great, solved a r…
…
continue reading

1
E258 That Great Business Show - Lend money to yourself, borrow from a Credit Union & US Morrison Visa holder? Say Thanks!
53:56
53:56
Play later
Play later
Lists
Like
Liked
53:56E258 That Great Business Show UCD Smurfit, 'Podcast of the Year'. David Malone, CEO, Irish League of Credit Unions, new SME loans from your Credit Union. New rules mean Credit Unions can treble the amount they lend to businesses. You could end up lending money to yourself, as every borrower must become a CU member (but David is very, very keen to b…
…
continue reading

1
Eliaz Vakenin Head of Sectoral Guidance Team on "what is the next step" for Pro mid-level managers
39:26
39:26
Play later
Play later
Lists
Like
Liked
39:26רבות מדובר על ג'וניורים והכניסה הקשה לתחום הסייבר למי שלא הגיע מהיחידות הטכנולוגיות בצבא, מה קורה עם אותם אלו שכבר נמצאים בתחום ומנסים לפלס את דרכם מעלה. מה הדרך להמשיך לרכוש ידע וכלים על מנת להתקדם לתפקידים ניהוליים והאם לימודי המשך מומלצים נחשון פינקו מארח את אליעז ועקנין ראש צוות הנחייה מגזרי וארכיטקט סייבר בשיחה על "מה השלב הבא" של מנהלים מקצוע…
…
continue reading

1
The Evolving Landscape of Hacking and Cybersecurity Podcasts
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04These sources offer an extensive overview of the cybersecurity podcast landscape, categorizing and profiling numerous shows. They highlight the evolution of cybersecurity content from niche technical discussions to highly produced, narrative-driven true crime stories and even shows focused on the human element of security. The texts discuss how pod…
…
continue reading

1
"Doge" initiative. Unpacking Government Cyber Failures and Cover-ups.
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17The source provided is a transcript of an audio discussion primarily centered on cybersecurity vulnerabilities within the U.S. federal government, specifically focusing on the Office of Personnel Management (OPM). The conversation features an anonymous cybersecurity expert discussing a data compromise and system manipulation he and his group uncove…
…
continue reading
Microsoft releases emergency out-of-band (OOB) Windows updates. Trump targets NSA’s leading AI and cyber expert in clearance revocations. A breach may have compromised the privacy of Ohio medical marijuana patients. Cybercriminals exploit an AI website builder to rapidly create phishing sites. Warlock ransomware operators target Microsoft’s SharePo…
…
continue reading

1
Nintendo Reveals Kirby Air Riders, Adobe Unveils Acrobat Studio, Firecrawl Raises 14.5M, Eight Sleep Secures Funding, and more...
11:00
11:00
Play later
Play later
Lists
Like
Liked
11:00(0:10): Nintendo Direct Unveils Kirby Air Riders for Switch 2: New Features, Modes & Characters (2:06): Adobe Launches Acrobat Studio: AI-Powered PDF Management Platform for Enhanced Productivity and Collaboration (4:11): Firecrawl Secures $14.5M to Revolutionize Web Data Extraction, Boost AI with Faster, Ethical Solutions (6:20): Eight Sleep Secur…
…
continue reading

1
FULL 47 MINUTES OVERVIEW, OPM.gov: Official Federal Employment and Benefits Portal.
47:21
47:21
Play later
Play later
Lists
Like
Liked
47:21Know about the federal employee privacy concerns and government efficiency initiatives, primarily focusing on the Department of Government Efficiency (DOGE), established by a presidential Executive Order. Several court documents detail lawsuits alleging that the Office of Personnel Management (OPM) and other agencies unlawfully disclosed personally…
…
continue reading

1
Misconfiguration, The Forgotten Vulnerability and the Power and Failure of "Yes" - Danny Jenkins - BSW #409
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
…
continue reading

1
When Quantum Computing Brings Breakthroughs...or Chaos (First Aired: November 13, 2024)
32:11
32:11
Play later
Play later
Lists
Like
Liked
32:11Quantum computers harness the almost mystical properties of subatomic particles to solve problems that are beyond even the most powerful “classical” computers available today. Will these computers usher in a new generation of custom pharmaceuticals and sustainable materials—or will they be used to crack every password and create global chaos? BCG’s…
…
continue reading

1
The cult of Doug, Crime, Pipemagic, Clickfix, Cats in Space, Josh Marpet, and more... - SWN #504
34:06
34:06
Play later
Play later
Lists
Like
Liked
34:06The cult of Doug, Crime, Pipemagic, Clickfix, Cats in Space, Uncle Silvio, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-504
…
continue reading
A researcher uncovers vulnerabilities across Intel’s internal websites that exposed sensitive employee and supplier data. The Kimsuky group (APT43) targets South Korean diplomatic missions. A new DDoS vulnerability bypasses the 2023 “Rapid Reset” fix. Drug development firm Inotiv reports a ransomware attack to the SEC. The UK drops their demand tha…
…
continue reading

1
X Under Siege: Data Leaks, Bots, and Security Failures.
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44These sources collectively examine the complex and often turbulent landscape of the Twitter/X platform. They highlight significant data breaches and cybersecurity vulnerabilities, with one report indicating that a hacker claims to have released 200 million user records and exfiltrated 2.8 billion Twitter IDs, potentially including sensitive informa…
…
continue reading

1
LulzSec: Laughing at Your Security Since 2011
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41The provided sources offer a comprehensive overview of LulzSec, a prominent black-hat hacking group that operated in 2011. They detail the group's origins as a splinter from Anonymous, its unique "for the lulz" ideology, and its evolution into politically motivated hacktivism through Operation Anti-Security. The texts extensively document LulzSec's…
…
continue reading

1
Managing the Minimization of a Container Attack Surface - Neil Carpenter - ASW #344
1:08:17
1:08:17
Play later
Play later
Lists
Like
Liked
1:08:17A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
…
continue reading