מפגשים עם האנשים בחזית הגנת הסייבר לתעשייה ותשתיות קריטיות Meetings with the people at the forefront of cyber defense for industry and critical infrastructure ICS SCADA OT IoT
…
continue reading
Critical Infrastructure Security Podcasts
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
The Critical Assets Podcast covers important OT and ICS security topics with an eye toward standards and regulation to keep you ahead of your adversaries... and your auditors. Ampyx Cyber. Securing your world. See our other content such as blogs, cybersecurity news and more at www.ampyxcyber.com
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
The Business of Cybersecurity is a podcast from the Tech Talks Network that explores where security and business strategy converge. Hosted by Neil C. Hughes, creator of the Tech Talks Daily Podcast, this series examines how today’s enterprises are managing cyber risk while still moving fast and innovating. Through insightful conversations with industry leaders, CISOs, product strategists, and security architects, the podcast brings clarity to the real-world decisions shaping cybersecurity in ...
…
continue reading
Freedom over censorship, truth over narrative. Follow ReFlex on Instagram: https://www.instagram.com/re.flex.world
…
continue reading
Catch up on the biggest stories of the day from Washington with interviews and analysis from leading journalists. Posted weekdays at 6:30 pm ET. From C-SPAN, the network that brings you the "Q&A" podcast.
…
continue reading
We talk about the latest diplomatic strategies, next-generation critical infrastructure technologies, and trade missions throughout the United States, Europe, Southeast Asia, and Latin America.The Embassy Row Project was founded by international energy and infrastructure technology advisor, James Scott. ERP strives to unify the next generation of leaders & initiatives that are hyper-focused on instigating positive change on issues that impact the environment, human rights, technological inno ...
…
continue reading
Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
ISNR is the only event in Europe that allows you to network and do business with high security end users and sector professionals. ISNR brings together government, public sector, police and emergency response, transport and critical national infrastructure stakeholders with commercial and private security organisations. This focused event delivers a unique opportunity to learn from a comprehensive seminar program and high-level, industry leading conference. Showcasing the complete range of t ...
…
continue reading
Welcome to 'Community Connect,' this is the space where we dive into the benefits of seamlessly integrating security products using open source software and standards, all with the goal of fostering a more interoperable security ecosystem. In each episode, we'll embark on a journey into the heart of the OCA community, engaging in insightful conversations with the individuals who are actively shaping the open source security landscape. Expect to stay up-to-date with the very latest developmen ...
…
continue reading
Welcome to Everyday Heroes, a podcast about the unsung heroes of the tech world. From the phone in your pocket to the world's most critical digital infrastructure, open-source software has a hand in it. These free technologies that shape our digital world wouldn't be anything without the Heroes that maintain them, promote them, and evolve them - these are their stories. Everyday Heroes is brought to you by HeroDevs.
…
continue reading
Civil Defense Radio – bringing you news, commentary, and the views of subject matter experts on what is happening in the emergency preparedness, community resiliency and critical infrastructure protection movement.
…
continue reading
AI Realized Podcast Join hosts Christina Ellwood and David Yakobovitch as they dive deep into the cutting-edge world of enterprise AI deployment. Drawing inspiration from the annual AI Realized Summit, this podcast brings you the insights, strategies, and real-world experiences of Fortune 2000 leaders who are reshaping their organizations through AI. Each episode of AI Realized tackles the most pressing challenges and opportunities in AI implementation: Discover how industry giants like Bank ...
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
Tough Tech Vets is a podcast series focused on veteran entrepreneurs solving hard problems at the intersection of hardware and software. Hosted by Chris Ricks, a former Naval Submarine Officer and Founder of Starcube, a small modular reactor company that’s focused on building microreactors for critical infrastructure. While there’s a lot of education around traditional startups for veterans, the Touch Tech landscape is a lot less clear. Whether you’re currently building a tough tech product ...
…
continue reading
The Society of American Military Engineers leads collaborative efforts to identify and resolve national security infrastructure-related challenges. Founded in 1920, SAME unites public and private sector individuals and organizations from across the architecture, engineering, construction, environmental and facility management, cyber security, project planning, contracting and acquisition, and related disciplines in support of national security. Headquartered in Alexandria, Va., SAME provides ...
…
continue reading
Building better software, one incident at a time. Host Kevin Riggle talks with software engineers about that time they broke production. Whether you're an industry professional, or just curious about what makes the modern Internet run and what happens when it breaks, we bring you stories you haven't heard elsewhere. This is the audio version of the podcast. Watch on YouTube: https://youtube.com/@critical-point Produced by Complex Systems Group (https://complexsystems.group). Part of Critical ...
…
continue reading
Welcome to "The CvCISO Podcast" - an extension of SecurityStudio's vCISO training program. Designed to keep the conversation alive beyond the confines of traditional training, this podcast is your ongoing resource for all things related to Virtual Chief Information Security Officers (vCISOs). This podcast is a space where vCISOs can continue to explore, discuss, and evolve their understanding of the cybersecurity landscape. Join us as we delve into the experiences, perspectives, and challeng ...
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
Control Loop is the OT Cybersecurity Podcast, your terminal for ICS security, intelligence, and learning. Every two weeks, we bring you the latest news, strategies, and technologies that industry professionals rely on to safeguard civilization.
…
continue reading
Astonishing growth. Resiliency. Quantum security. Imagine what could happen when “The data center strikes back?”... Join us global innovation leaders Kyndryl and Nokia for our new three-part podcast series as we explore the industry trends, customer use cases and game-changing technology solutions set to rock your data center’s world. In each episode, Peter Nass, an offering Manager from Kyndryl, will be joined by experts from Kyndryl and Nokia – two of today’s global leaders in technology, ...
…
continue reading
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
…
continue reading
PublicPowerX is the new podcast from the American Public Power Association where key vendors and service providers explain their role in keeping public power safe, reliable, and secure. Subscribe to this feed to get these stories from public power’s service providers as they become available. If you are a company that does business with public power utilities and would like to host an episode of Public Power X, go to publicpower.org/podcasts to learn more.
…
continue reading
Welcome to Tech in Translation, the podcast where we break down the complexities of today's most innovative technologies into something we can all understand. Brought to you by Iron Bow Technologies, a next-generation solutions provider, we're committed to helping our customers across the government, education, commercial, and healthcare sectors turn their tech challenges into real, actionable outcomes. At Iron Bow, we believe that technology should be a tool for empowerment, not a source of ...
…
continue reading
The Jedburgh Podcast empowers leaders to achieve success on their journey to transform themselves and their organizations. Creator, Host and Special Forces Green Beret Fran Racioppi interviews the world’s most prominent visionaries, drivers of change, and those dedicated to winning. Each episode is an in-depth discussion with trailblazers who’ve earned success through a dedication to talent development, preparation, introspection, and the drive to get things done. Our conversation will empow ...
…
continue reading

1
CEO Stories: Conversations with Greater Birmingham business leaders
Greater Birmingham Chambers of Commerce
CEO Stories is a podcast series that delves into the stories behind some of the Greater Birmingham region's leading or up-and-coming CEOs. The series is hosted by Henrietta Brealey, who in 2021 became the youngest CEO in the Greater Birmingham Chambers of Commerce's 208-year history. Listen to find out what makes some of the region's finest leaders tick, who inspired them and what advice they would offer to aspiring CEOs. Greater Birmingham Chambers of Commerce is the West Midlands' leading ...
…
continue reading
Adopting Zero Trust offers an ongoing conversation that elevates cybersecurity conversations that encourages you to rethink how you build strategies, defend against threat actors, and implement new technology. We go beyond the millions in marketing budgets fueled by VCs, and chat with practitioners like you who want to make a difference (or hack the planet, which ever happens first).
…
continue reading
A Broad array of topics in the technology space Informative, relevant, and engaging. Without the self-serving narrative. We aim to share industry best practices, drive awareness, and discuss what thought leaders share. Companies or manufacturers often only focus on their area of interest, which is short-sighted, limiting, and siloed. Our diversity and partner network offers substantial, informative value. Similar challenges and growth aspirations exist in the b2b and b2c space. This podcast ...
…
continue reading
Welcome to Fintech Beat, the intersection of finance, technology, policy and regulation. Each episode features the latest trends, movers and shakers, ideas and policies in financial technology. Host Chris Brummer, a Georgetown law professor and world-renowned fintech expert, partners with the CQ Roll Call newsroom — Washington's leader for nonpartisan legislative and regulatory analysis — to bring insights that make this a must listen for anyone interested in finance.
…
continue reading
Simply ICS Cyber podcast features veteran OT security experts Don and Tom, delivering practical insights on securing critical infrastructure and industrial automation systems. With episodes covering essential topics from ICS fundamentals to advanced security frameworks, our show reaches a dedicated audience of operators, security professionals, and decision-makers actively implementing industrial cybersecurity control solutions. Connect with your ideal customers through targeted sponsorships ...
…
continue reading
Hospitality Property School Podcast is written and produced by travel authorities that have come together with decades of hotel, resort, inn and bed & breakfast visitation experience. We have spent thousands of hotel nights in properties of all sizes and classes worldwide, conducting countless site inspections for a number of world-class tour and travel companies, as well as receiving feedback from 100,000s of customers. This knowledge has given us a unique insight into the wants, needs and ...
…
continue reading
Despite the growing attention on industrial cybersecurity, there is still much work to be done to keep pace with the increasing risks. To mature and comprehensively protect against cyber threats to operational technology (OT), it will take collaboration among key players from various sectors and industries. The PrOTect OT Cybersecurity podcast brings together experts in the field of cybersecurity for critical infrastructure and industrial organizations. Join Aaron Crow, the Chief Technology ...
…
continue reading

1
UK Moves to Ban Ransomware Payments for Public Sector and Critical Infrastructure
48:22
48:22
Play later
Play later
Lists
Like
Liked
48:22In a landmark move to disrupt the financial engine powering ransomware attacks, the United Kingdom is pushing forward with legislation that would ban ransom payments across the public sector and critical national infrastructure (CNI). This sweeping proposal covers everything from local councils and schools to healthcare providers like the NHS, aimi…
…
continue reading

1
ReVault: Critical Dell Firmware Flaws Allow Windows Login Bypass and Persistent Implants
48:07
48:07
Play later
Play later
Lists
Like
Liked
48:07In a powerful reminder that hardware security is just as critical as software defense, Cisco Talos researchers have uncovered “ReVault,” a collection of five high-severity firmware vulnerabilities in Dell’s ControlVault3 subsystem. These flaws impact over 100 Dell laptop models, including the Latitude, Precision, and XPS series—devices used widely …
…
continue reading

1
Dow falls 200 on first day of President Trump's global tariffs; President nominates new Fed Board member
49:38
49:38
Play later
Play later
Lists
Like
Liked
49:38President Donald Trump announces he is nominating Stephen Miran, current chair of the Council of Economic Advisers, to Federal Reserve Board, to replace a board member who has resigned; Wall Street Journal's Gavin Bade on first day with President Donald Trump's tariffs in effect on more than 90 countries (6); Sen. John Cornyn (R-TX) says FBI has ag…
…
continue reading

1
Air France–KLM Data Breach Exposes Customer Info via Compromised Third-Party Platform
36:56
36:56
Play later
Play later
Lists
Like
Liked
36:56The aviation industry has suffered yet another major cybersecurity incident. Air France and KLM have confirmed a data breach impacting customer records via an external customer service platform. While no sensitive financial or identity documents were compromised, attackers successfully accessed unspecified customer data—prompting both airlines to n…
…
continue reading

1
EU’s digital dependency on US tech leaves it vulnerable, experts warn
4:48
4:48
Play later
Play later
Lists
Like
Liked
4:48A new report reveals that 75% of European companies depend on US tech giants like Microsoft and Google for core services. Former US Cyber Command contractor Kevin Michelizzi explains how decades of underinvestment have made Europe digitally dependent and now it’s paying the price. Meanwhile, Russia raises the alarm on widespread cybercrime through …
…
continue reading

1
Critical Flaws in CyberArk Conjur and HashiCorp Vault Put Enterprise Secrets at Risk
37:29
37:29
Play later
Play later
Lists
Like
Liked
37:29Enterprise secrets managers—long considered the most secure components in modern infrastructure—are now under fire. In a groundbreaking report, cybersecurity firm Cyata revealed 14 critical zero-day vulnerabilities across CyberArk Conjur and HashiCorp Vault, exposing flaws that allow unauthenticated attackers to achieve remote code execution (RCE),…
…
continue reading

1
Ukraine's SBU hired teens for poison plot in Siberia – FSB foils attempt
3:46
3:46
Play later
Play later
Lists
Like
Liked
3:46Russian security services say Ukraine's SBU recruited minors via Telegram to carry out a chemical assassination attempt in Novosibirsk — 3,000 km from the front. The alleged plan? To smear deadly toxins on the car of a Russian officer in broad daylightBy RT
…
continue reading

1
Lumumba’s Africa | Telecommunication in Africa
12:41
12:41
Play later
Play later
Lists
Like
Liked
12:41In this episode of Lumumba’s Africa, we delve into the dynamic world of African telecommunications, where multinational giants dominate the market, shaping economies, politics, and daily life across the continent. These telecom behemoths are more than just service providers — they are gatekeepers of information, influencers of policy, and key drive…
…
continue reading

1
Lumumba’s Africa | Sanctioned South Africa
14:47
14:47
Play later
Play later
Lists
Like
Liked
14:47In this episode of Lumumba’s Africa, professor P.L.O. Lumumba examines the sanctions that were once imposed on South Africa and their far-reaching consequences. We look at the motivations behind the punitive measures — from trade restrictions to financial blacklisting — and ask: were these sanctions a legitimate response to policy disagreements, or…
…
continue reading

1
Prompt Injection Nightmare: Critical AI Vulnerabilities in ChatGPT, Copilot, Gemini & More
56:52
56:52
Play later
Play later
Lists
Like
Liked
56:52Enterprise AI assistants are revolutionizing productivity—but they’re also opening new doors for cyberattacks. In this episode, we explore explosive research from Zenity Labs, which reveals that leading AI tools like ChatGPT, Microsoft Copilot, Google Gemini, Cursor, and Salesforce Einstein are vulnerable to prompt injection attacks—a class of expl…
…
continue reading

1
From Google to LVMH: ShinyHunters’ Salesforce Breaches Spark Global Ransom Crisis
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37A new wave of cyber extortion is sweeping across global enterprises, and the battlefield is Salesforce CRM. The notorious **ShinyHunters group—tracked internally by Google as UNC6040/UNC6240—**has launched a coordinated series of breaches using vishing (voice phishing) to compromise employee credentials, exfiltrate sensitive customer data, and dema…
…
continue reading

1
U.S. Army Sergeant suspected in shooting & wounding five soldiers; President Trump imposes 25% extra tariff on India (50% total) for buying Russian oil
54:30
54:30
Play later
Play later
Lists
Like
Liked
54:30Five soldiers are shot and wounded at Fort Stewart in Georgia… the suspected shooter, an Army Sergeant, is in custody; Texas Senate Committee on Congressional redistricting meets on the proposedRepublican-drawn district lines map designed to win Republicans five more U.S. House seats, while Texas House Democrats continue to remain out-of-state to k…
…
continue reading

1
Cisco Hit by Vishing Attack: CRM Breach Exposes Millions of User Profiles
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43Cisco has confirmed a new data breach after a vishing (voice phishing) attack tricked a company representative into exposing access to a third-party CRM system. Detected on July 24, 2025, the breach compromised basic user details such as names, emails, and phone numbers of Cisco.com registrants. While the data was non-sensitive, the incident unders…
…
continue reading

1
Shaya Feedman Ex Head of Information Security @Porsche Digital about cars functional safety & cyber
41:54
41:54
Play later
Play later
Lists
Like
Liked
41:54כשאתם נכנסים לרכב שלכם כמה מחשבה אתם מקדישים לעובדה שאתם בתוך דאטה-סנטר עצום, איך מתמודדים בטיחותית וסייברית עם מפעל שיש בו עשרות רבות ולעיתים מאות מחשבים עם שתי רשתות תקשורת שלפחות אחת מוגדרת כקריטית וכול זה ממוזער ונדחס לרכב אחד אין ספק שבטיחות והגנת סייבר בתעשיית הרכב היא אחד האתגרים הקשיים שיש החל משלב התכנון, דרך שרשרת אספקה ועד הרכב עצמו. נחש…
…
continue reading

1
1000 Ukrainian POWs Kiev refuses to exchange
2:57
2:57
Play later
Play later
Lists
Like
Liked
2:57Around 1,000 Ukrainian citizens have been abandoned by Vladimir Zelensky’s administration despite claims it wants “all-for-all” POW swaps RT spoke with themBy RT
…
continue reading

1
Ox Security Unveils Agent Ox: AI Tool That Writes Tailored Fixes for Software Vulnerabilities
52:37
52:37
Play later
Play later
Lists
Like
Liked
52:37The world of application security is shifting dramatically as AI begins to move from simply flagging vulnerabilities to actively fixing them. Ox Security has launched Agent Ox, a groundbreaking AI-powered extension designed to automate secure, organization-specific code fixes. Unlike generic coding assistants that offer boilerplate advice, Agent Ox…
…
continue reading

1
Sanchez Effect | Former Ukrainian Security Service Colonel Prozorov
39:12
39:12
Play later
Play later
Lists
Like
Liked
39:12In the latest episode of 'Sanchez Effect', Mr. Prozorov pulls back the curtain on how, following the 2014 coup in Kiev, Ukrainian neo-Nazi battalions steadily amassed power and redirected their hatred from Eastern Ukrainians to Russians. He says those extremist group have become nearly untouchable by the local authorities. He recounts harrowing sto…
…
continue reading

1
Hiroshima cover-up: What Japan won’t say 80 years later
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:5780 years after Hiroshima and Nagasaki, Japan honors the memory of the atomic bombings... without naming the country that dropped them This film reveals the uncomfortable truths airbrushed out of history: who was responsible, why the bombs were used, and why Japan’s leadership now calls out Russia, but not the US…
…
continue reading

1
Meta Deletes 6.8 Million Scam Accounts as AI-Powered Fraud Rings Exploit WhatsApp
34:45
34:45
Play later
Play later
Lists
Like
Liked
34:45Meta has removed 6.8 million accounts tied to criminal scam centers in the first half of 2025, marking one of the most aggressive crackdowns on digital fraud in the company’s history. The move comes amid an alarming surge in online scams that cost global victims $16.6 billion in 2024 alone, a 33% increase from the year before. Many of these scams a…
…
continue reading

1
'Gutul more popular than Maia Sandu, that's why they jailed her' — Dzhabarov
8:46
8:46
Play later
Play later
Lists
Like
Liked
8:46Vladimir Dzhabarov, First Deputy Chair of the Russian Federation Council’s Foreign Affairs Committee, joins RT to respond to the sentencing of Gagauzia's leader Yevgenia Gutsul to seven years in prisonBy RT
…
continue reading

1
CvCISO Podcast Episode 57: Incident Response
53:50
53:50
Play later
Play later
Lists
Like
Liked
53:50Summary In this episode, the hosts explore key elements of effective cybersecurity incident response. They emphasize the importance of distinguishing between events and incidents, properly classifying incidents by severity, and understanding the strategic role of a vCISO (Virtual Chief Information Security Officer). The conversation highlights the …
…
continue reading

1
Meta Found Liable: Jury Rules Against Tech Giant in Flo Health Privacy Case
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59In a landmark decision, a California jury has ruled Meta guilty of violating user privacy laws in a class-action lawsuit tied to the popular Flo Health period tracking app. Plaintiffs alleged that Meta, through embedded software tools and tracking pixels, collected deeply personal menstrual and fertility data — from period dates to pregnancy goals …
…
continue reading

1
Texas House Dems deny quorum to block vote on Republican redistricting map for second straight day; President Trump says GOP is 'entitled to five more seats'
51:47
51:47
Play later
Play later
Lists
Like
Liked
51:47Texas Democratic House Members' boycott leads to Texas House of Representatives failing for a second day in a row to establish a quorum blocking Republicans from passing their Congressional districting plan; President Donald Trump says an interview Republicans are “entitled to five more seats” in Texas and that states which voted Democratic in nati…
…
continue reading

1
TSMC Insider Threat: Six Arrested in Taiwan Over 2nm Chip Trade Secrets
1:06:45
1:06:45
Play later
Play later
Lists
Like
Liked
1:06:45In a stunning development, Taiwanese authorities have arrested six individuals suspected of stealing trade secrets from Taiwan Semiconductor Manufacturing Co. (TSMC), the world’s most advanced semiconductor producer. At the heart of the case is TSMC’s 2-nanometer (2nm) chip technology, a crown jewel in the global race for next-generation AI and hig…
…
continue reading

1
Sanchez Effect | Youtube show host Danny Haiphong: 'China should not be underestimated'
56:45
56:45
Play later
Play later
Lists
Like
Liked
56:45On the latest ‘Sanchez Effect’ Danny Haiphong delves into how U.S. policies have nudged China into a corner, making it ready to respond with whatever it takes. But before resorting to missiles and tanks, China might opt for a blockade that could disrupt global trade as we know it. He debates with Rick Sanchez how Trump’s supposed peacemaking effort…
…
continue reading

1
'UK is still the engine' behind operations destabilizing Europe — Slovak ex-general Viktorin
1:33
1:33
Play later
Play later
Lists
Like
Liked
1:33Retired Slovak Army General and former military attaché Jozef Viktorin accuses British intelligence of orchestrating covert operations to destabilize Eastern EuropeBy RT
…
continue reading

1
EP 68: Hacking Cruise Ships and Data Centers
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21This is a story where one maritime company found multiple vendors maintaining unrestricted VPN access to systems across a cruise vessel, exposing safety-critical functions to potential compromise. Bill Moore, CEO of Xona Systems, returns to Error Code to talk about how that company and others, such as data center operators, are recognizing their la…
…
continue reading

1
'None of his business' — ex-ambassador MK Bhadrakumar blasts Trump's tariff threats to India
1:26
1:26
Play later
Play later
Lists
Like
Liked
1:26Former Indian Ambassador to Turkey and Uzbekistan, M.K. Bhadrakumar, responds to President Trump's announcement of new tariffs on India over its oil trade with EuropeBy RT
…
continue reading

1
Approov Secures £5M to Fortify Mobile App and API Security Against AI-Driven Threats
55:37
55:37
Play later
Play later
Lists
Like
Liked
55:37In a major step for mobile and API cybersecurity, Approov, the Edinburgh-based security firm specializing in real-time mobile attestation and API protection, has raised £5 million (approximately $6.7 million) in Series A funding. The round, led by the Investment Fund for Scotland with support from Souter Investments, Lanza techVentures, and Scottis…
…
continue reading

1
'South Africa govt doesn't know how to deal with lunatic Trump' — EFF MP Mhlongo
10:11
10:11
Play later
Play later
Lists
Like
Liked
10:11South African MP Nqobile Mhlongo from the Economic Freedom Fighters (EFF) delivers a critique of Donald Trump’s global tariff policies. She argues that these tariffs are part of a broader strategy of economic domination by the United States but one that’s isolating America insteadBy RT
…
continue reading

1
'Death traps', not aid points — Hamas official slams Israel's Gaza siege
11:35
11:35
Play later
Play later
Lists
Like
Liked
11:35Dr Basem Naim, a senior member of the Hamas Political Bureau and former Health Minister in Gaza, responds to Israel's claims that there is no famine in GazaBy RT
…
continue reading

1
Russian intel warns of new Nord Stream-style operation by UK on Russian oil tankers
3:58
3:58
Play later
Play later
Lists
Like
Liked
3:58Russia’s Foreign Intelligence Service (SVR) has sounded the alarm: UK secret services are allegedly preparing acts of sabotage against Russia’s so-called shadow fleet of oil tankersBy RT
…
continue reading

1
'Half-complete democracy, if at all' — fmr. amb. Rajiv Dogra on Moldova's opposition crackdown
4:56
4:56
Play later
Play later
Lists
Like
Liked
4:56Former Indian diplomat Rajiv Dogra joins us live to react to the shocking 7-year sentence handed down to a Moldovan opposition MPBy RT
…
continue reading

1
Pwn2Own Ireland 2025: $1M WhatsApp Exploit Bounty Raises the Stakes
1:07:32
1:07:32
Play later
Play later
Lists
Like
Liked
1:07:32This October, Pwn2Own Ireland 2025 will take over Cork with one of the most ambitious cybersecurity competitions yet. Co-sponsored by Meta and organized by Trend Micro’s Zero Day Initiative (ZDI), the event is putting record-breaking payouts on the line — including up to $1 million for a zero-click WhatsApp exploit that can deliver remote code exec…
…
continue reading

1
Mossad sabotage the ICC? Shocking case against prosecutor Kareem Khan
5:16
5:16
Play later
Play later
Lists
Like
Liked
5:16International Criminal Court (ICC) Prosecutor Kareem Khan moved to charge Israeli Prime Minister Netanyahu and former Defense Minister Gallant with war crimes. Then, out of nowhere, he's hit with a sexual misconduct allegation. The source? A US advisor with direct links to Israel. Rachel Marsden explores…
…
continue reading

1
'Black day for justice in Moldova' — MP Fotescu on opposition crackdown
9:36
9:36
Play later
Play later
Lists
Like
Liked
9:36Moldovan MP Vadim Fotescu of the Victory Party joins RT to denounce what he calls a politically motivated verdict against Yevghenia GutulBy RT
…
continue reading

1
'No legal basis, no evidence, nothing' — Moldovan MP Tauber slams Gagauzia leader's sentence
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59Moldovan MP Marina Tauber joins us live to react to the controversial sentencing of Gagauzia leader Yevghenia GutsulBy RT
…
continue reading

1
'That wasn't a trial. That was a public execution' — Gutsul's lawyer on Moldova verdict
6:24
6:24
Play later
Play later
Lists
Like
Liked
6:24Yevghenia Gutsul, the elected leader of Moldova’s autonomous region of Gagauzia, has been sentenced to seven years in prison for allegedly financing her 2023 campaign illegally Gutsul’s lawyer Sergey Moraru breaks down why the trial was a 'public execution', how similar cases are being duplicated to silence opposition, and what the legal team plans…
…
continue reading

1
'Show trial for opposition' — lawyer slams 7-year sentence for Gagauzia leader in Moldova
5:00
5:00
Play later
Play later
Lists
Like
Liked
5:00Gagauzia’s governor Yevghenia Gutsul has been sentenced to 7 years in prison by a Moldovan court over alleged illegal campaign financing. Her lawyer, Natalia Bayram, calls the ruling a politically motivated 'show trial', claiming no evidence was presented, and that state media knew the verdict before the court even ruled…
…
continue reading

1
When the Plant Can't Stop: Securing Systems That Never Sleep
33:18
33:18
Play later
Play later
Lists
Like
Liked
33:18In this episode of Industrial Cybersecurity Insider, Craig Duckworth sits down with Ian Bramson, VP of Global Industrial Cybersecurity at Black & Veatch, to explore what it really takes to secure complex industrial systems. Whether you're retrofitting legacy brownfield environments or designing cybersecurity into greenfield builds, Ian unpacks the …
…
continue reading

1
Russia’s FSB foils assassination plot against a defense firm chief in Belgorod
0:42
0:42
Play later
Play later
Lists
Like
Liked
0:42A Russian citizen was arrested — linked to a pro-Ukrainian group via Telegram He planned to use weapons and explosives on orders from his handlers FSB footageBy RT
…
continue reading

1
Nvidia Triton Inference Server Vulnerabilities Expose AI Infrastructure to Attack
1:02:48
1:02:48
Play later
Play later
Lists
Like
Liked
1:02:48A major warning has hit the AI community: Nvidia’s Triton Inference Server — one of the most widely used open-source platforms for deploying and scaling AI models — has been found to contain critical vulnerabilities that could allow attackers to take complete remote control of affected systems. The discovery, made by cloud security firm Wiz, reveal…
…
continue reading

1
Govs Hochul, Pritzker support Texas Democrats while Gov. Abbott threatens to arrest them; Trump Admin. defends BLS firing while economists criticize the move
38:05
38:05
Play later
Play later
Lists
Like
Liked
38:05New York Governor Kathy Hochul and Illinois Governor JB Pritzker are backing a group of Texas Democrats who left their state yesterday to block a vote on new Republican-drawn congressional maps. It comes while Texas' Republican Gov. Greg Abbott threatens to remove lawmakers who didn’t show up at today's Texas House of Representatives session. The T…
…
continue reading

1
CISA & FEMA Release $100M in Cybersecurity Grants to Strengthen State, Local, and Tribal Defenses
43:50
43:50
Play later
Play later
Lists
Like
Liked
43:50The U.S. Department of Homeland Security, through CISA and FEMA, has announced over $100 million in new cybersecurity grant funding for Fiscal Year 2025 — a critical investment aimed at protecting America’s most vulnerable digital frontlines. The funding is split between the State and Local Cybersecurity Grant Program (SLCGP), allocating $91.7 mill…
…
continue reading

1
AI Jailbreaks on the Rise: How Hackers Are Extracting Training Data from LLMs
1:26:28
1:26:28
Play later
Play later
Lists
Like
Liked
1:26:28In this episode, we examine the rapidly growing threat of AI jailbreaks — a cybersecurity challenge reshaping the landscape of large language models (LLMs) and enterprise chatbots. According to the IBM 2025 Cost of a Data Breach Report, 13% of all data breaches now involve AI systems, with the vast majority stemming from jailbreak attacks that circ…
…
continue reading

1
350,000 Patient Records Exposed: Inside the Northwest Radiologists Data Breach
40:18
40:18
Play later
Play later
Lists
Like
Liked
40:18In this episode, we investigate the Northwest Radiologists data breach, a devastating cyberattack that compromised the personal and medical information of approximately 350,000 patients in Washington State between January 20 and January 25, 2025. What began as a so-called “network disruption” was later revealed to be a massive breach that exposed a…
…
continue reading

1
'Extremists are the government' — Ex-Knesset Member Sami Abou Shahadeh
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28Balad Party leader and former Knesset member Sami Abou Shahadeh joins RT to call out Netanyahu for alleged genocide in Gaza, and expose decades-long attacks on Muslim and Christian holy sitesBy RT
…
continue reading

1
'Industrial terrorism' — analyst Krapivnik on alleged UK sabotage against Russian oil infrastructure
4:12
4:12
Play later
Play later
Lists
Like
Liked
4:12Stanislav Krapivnik, former US Army officer and geopolitical analyst, reacts to reports that British intelligence and Ukraine were allegedly planning attacks on Russian oil exportsBy RT
…
continue reading

1
'It would be an act of war' — Ex-Pentagon analyst on UK plot to attack Russian ships via Ukraine
3:45
3:45
Play later
Play later
Lists
Like
Liked
3:45Michael Maloof, former senior security policy analyst at the US Department of Defense, reacts to Russia’s allegations that the UK and Ukraine were plotting attacks on Russian ships and portsBy RT
…
continue reading

1
Zelensky, like Hitler, is allowed to do whatever he pleases – Kherson governor
31:24
31:24
Play later
Play later
Lists
Like
Liked
31:24RT has exclusively spoken to Kherson Region Governor Vladimir Saldo about atrocities committed by Ukraine in new Russian regions, the role of the West in the conflict, and the minerals Ukraine has given the US access to.By RT
…
continue reading