Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Crypto Security Podcasts
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
…
continue reading
Cybersecurity. Privacy. Blockchain. Unfiltered. The Efani Features Podcast is your trusted guide to the evolving world of digital security. Hosted by Mark Kreitzman of Efani, each episode dives deep into the critical issues shaping our digital future - from SIM swap threats and mobile privacy to crypto security and blockchain innovation. Join leading experts, ethical hackers, founders, and privacy advocates as we unpack real-world threats, explore cutting-edge solutions, and share practical ...
…
continue reading
Bringing you the latest in Crypto News 🚀
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to Crypto News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about Bitcoin, Ethereum, blockchain technology, DeFi, NFTs, and more. Whether you're a crypto enthusiast, investor, or simply curious about the potential of digital currencies, this podcast is your go-to source for all things crypto. Tune ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading

1
Cybersecurity, Privacy, Risk Management, Cryptocurrencies, Fintech, Information Technology
Shahid Sharif
Career guidance & consulting services in Information Technology, Cybersecurity, Privacy, Risk Management, Cryptocurrencies, & Fintech #self improvement # productivity #cybersecurity #security #privacy #risk #fintech #blockchain #cryptocurrencies
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Crypto Weekly Recap is your go-to podcast for the latest news, trends, and developments in the cryptocurrency world. From major market moves to emerging projects and regulatory updates, we break it all down. Stay informed, stay ahead, and join us as we navigate the fast-paced world of crypto!
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Welcome to Wirex News - Your Crypto Podcast, where we have engaging conversations with experts, thought leaders, and innovators exploring wide-ranging topics around cryptocurrency, financial management, security, and many more interesting subjects.
…
continue reading
Podcast by Aacorn Productions
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
I sit down every week with the most based people in crypto. My goal is to create a safe space to have the deepest and most real conversations with the biggest builders and investors in the industry, as well as to help educate the mainstream people, politicians, celebrities and big Web2 entrepreneurs coming into Web3. Hopefully this platform does its little part in onboarding as many people as possible into the incredible world of opportunities that Web 3 offers, while staying true to crypto’ ...
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Blockcast delivers unfiltered analysis of crypto's most compelling narratives. Each week, seasoned industry insider Takatoshi Shibayama sits down with founders, CEOs, and key players shaping the blockchain landscape to dissect emerging projects, market dynamics, and institutional moves. From trending protocols to strategic industry shifts, get an insider's take on the forces driving decentralized innovation and the decisions that matter. No fluff, no hype—just deep dives into what's really h ...
…
continue reading
Technology is reshaping society—but how are users included in the conversation? The Brave Technologist explores how emerging technologies like artificial intelligence, machine learning, and Web3 are influencing our lives, our choices, and our collective future. Unlike many tech podcasts that focus on hype and disruption, this show puts users at the center of the conversation. Each episode features thoughtful discussions with technologists working to ensure that innovation serves the public i ...
…
continue reading
Podcast covering diverse trends in Bitcoin and blockchain tech, decentralization, entrepreneurship, cryptoeconomics and liberty. Author note: All authors, whose content is featured on Crypto Voices, are contacted beforehand for permission, regardless of copyright or license such as Creative Commons. If you are an author whose work is reproduced here and you have not heard from Crypto Voices, it's because we couldn't find a way to contact you. However, in this situation your work was already ...
…
continue reading
Welcome! I, Degen is a podcast about crypto technology, security, and culture. With a healthy balance of enthusiasm and skepticism, we cut through the misinformation and hype in search of a signal in the noise. Our weekly round-up will keep you updated on the latest in crypto hacks and security. With our open-source audio audits, we interview founders and hackers to surface relevant info about how to stay safe in crypto land.
…
continue reading

1
The Smart Economy Podcast: Real-World Blockchain Applications with Crypto, DeFi, NFTs, and DAOs
Ragnarok Digital, LLP
The Smart Economy Podcast features interviews with some of the most interesting people within the blockchain industry, working to make the new smart economy a reality.
…
continue reading
Welcome to this podcast series from Cummings Pepperdine. Cummings Pepperdine advises on the three key areas of law, tax and FCA in alternative assets. Each Pep Pod looks at one or more of these areas of advice, with the aim of providing our listeners with useful updates, insights and information which will help your business. If you have any questions, just get in touch with us. Our contact details are all on our website, cummingspepperdine.com. Enjoy the Pod!
…
continue reading
Known for providing unparalleled access to the most diverse offering of expert voices in the Cryptocurrency & Blockchain Industry - Crypto Current is bridging the gap between the curious newcomers who are just discovering the space and the thought leaders who are shaping its future. Join us every week to hear from featured guests and learn about all the recent developments and trending stories that impact the future of money.
…
continue reading
Welcome to Bullish & Beyond, the ultimate podcast for stock market enthusiasts, crypto believers, and anyone looking to live life on the bullish side! Join Beary the Bull, Brian The Mac Man, and JT as they break down the latest market trends, investment strategies, and personal growth tips to help you thrive in finance and beyond. With each episode, you’ll gain actionable insights to fuel your success in stocks, crypto, and a fulfilling lifestyle. Get ready to amplify your financial knowledg ...
…
continue reading
Ledger is the gold standard of security in the crypto space. Our hardware wallets are essential for anyone wanting to take control of their digital value. At the heart of this ecosystem, Ledger connects you with everything in the digital assets space, providing access to services and freedom from compromise on security, ownership or user experience. On 'The Ledger Podcast', we have conversations with some of the most interesting thought leaders in crypto, cybersecurity and culture to discuss ...
…
continue reading
Discussions with regulators, top lawyers and entrepreneurs about the legal framework for blockchain technology. We look at international regulations, trends, and jurisprudence impacting crypto and its related parts.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
The Crypto Brew Show is a YouTube Channel and Podcast about cryptocurrency, blockchain and beer!
…
continue reading
Everything that's happening in the rapidly changing world of Artificial Intelligence, OpenAI, Bard, Bing, Midjourney, and more.
…
continue reading
Exploring cross-chain composability in a multi-chain world. Composable is a bi-weekly podcast hosted by Alysia and Ellie. Brought to you by Espresso Pods.
…
continue reading
Monero Talk broadcasts weekly conversations on YouTube (https://www.youtube.com/c/monerotalk) with topical guests to understand what the Monero cryptocurrency is today and what it hopes to become. We strive to give birth to new Monero users by simply reporting on the facts in our search to answer the question--Is Monero the truest cryptocurrency of them all? In staying true to the Monero ethos, we aim to always be skeptical. While we are Monero Talk by name, and Monero devotees at heart, the ...
…
continue reading
🎙 The #1 Daily Bitcoin Podcast - Raw, Unfiltered, Uncensored Livestreaming 7 days a week on Rumble w/ video. No BS. No altcoins. Just BTC. Endorsed by the High Priest of Bitcoin himself: Max Keiser. Here, stackin’ sats isn’t advice - it's a way of life. Stack hard. Stay sovereign. 🟧
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Henri Arslanian brings you in-depth discussions and constructive analyses of the developments shaping the future of money and finance from Bitcoin and cryptocurrencies to CBDCs and DeFi
…
continue reading
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you!
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
What’s indexing this week in crypto, blockchain, and open-source AI? Find out on The Index, where we feature exclusive conversations that go beyond code. Each week, host and entrepreneur Alex Kehaya talks with founders, developers, and investors who are shaping the future of Web3. From startup advice to breakthrough strategies, our guests share their stories and take a deep dive into the decentralized future.
…
continue reading
Get the lowdown from innovators and business leaders from the “off-chain” and “on-chain” world.
…
continue reading
$Culture & $Cryptos | What's the wave with crypto, and what even is Bitcoin? Let's talk about it..
…
continue reading
A web3 podcast focused on Monad, the new Layer 1 that has fundamentally optimized the EVM.
…
continue reading
"Slice of the Crypto Pie" is designed to serve up the freshest, most engaging cryptocurrency news and insights, making the complex world of digital currencies accessible and enjoyable to both novices and experts. This podcast aims to demystify the volatile yet fascinating realm of cryptocurrencies, offering listeners a well-rounded perspective on everything from market trends to technological innovations, investment strategies, and beyond.
…
continue reading
Hardcore crypto nuance and developments for degens and bigbrains alike. Conversations and interviews with the top minds across blockchain, venture capital, defi, consumer apps, and gaming.
…
continue reading

1
Cloud Computing Heist: $3.5 Million Fraud Leads to Prison for Fake Crypto Influencer
47:58
47:58
Play later
Play later
Lists
Like
Liked
47:58The U.S. Department of Justice has closed the chapter on one of the most audacious cloud fraud and cryptojacking schemes in recent years. Charles O. Parks III, known online as “CP3O” and the self-styled “MultiMillionaire,” has been sentenced for orchestrating a multimillion-dollar scam that defrauded leading cloud providers out of more than $3.5 mi…
…
continue reading

1
Coinbase Buys Deribit, Mesh Secures Funding Boost, Wells Fargo Increases Bitcoin ETF Investment, Mawari Network Unveils XR Platform, and more...
11:47
11:47
Play later
Play later
Lists
Like
Liked
11:47(0:10): Coinbase Acquires Deribit for $2.9B to Expand Crypto Derivatives and Boost EBITDA (2:52): Mesh Secures $130M from PayPal, Coinbase to Expand Global Crypto Payments Network (4:58): Wells Fargo Boosts Bitcoin ETF Stake to $160M, Signaling Institutional Confidence in Digital Assets (6:51): Mawari Network Launches Decentralized XR Platform Brid…
…
continue reading

1
North Korean crypto theft, Microsoft rolls out back up, four charged in global scheme
9:07
9:07
Play later
Play later
Lists
Like
Liked
9:07North Korean crypto theft Microsoft rolls out PC back up during attack U.S. charges four in $100M global fraud scheme Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-…
…
continue reading

1
SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto;
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of…
…
continue reading

1
SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto; (#)
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto; Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they obs…
…
continue reading

1
E133: SUI Network CoFounder: The Real Problem With Crypto Security
1:16:31
1:16:31
Play later
Play later
Lists
Like
Liked
1:16:31Sam Blackshear is the Co-founder and CTO of Mysten Labs, the company behind the Sui Network, and creator of the Move programming language that's revolutionizing smart contract development. From his academic roots in programming language research to his pivotal role at Facebook's Libra project, Sam shares the untold story of how he identified fundam…
…
continue reading

1
From Code to Crypto: How Learning Fundamentals Empowers Security Pros – Matt Olmsted
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58In this episode of the Security Repo Podcast, software engineer and newly minted CISSP Matt Olmsted joins us to explore cryptographic fundamentals and why understanding them matters for anyone in security. From explaining symmetric vs. asymmetric encryption to the real-world implications of side-channel attacks, Matt delivers practical insights for…
…
continue reading

1
10 Minutes to React: What Crypto Hacks Teach Us About Speed, Security, and Trust
33:07
33:07
Play later
Play later
Lists
Like
Liked
33:07When a crypto hack strikes, the clock starts ticking. In this episode of the Wirex Podcast, we sit down with Lex Fisun, CEO and Co-Founder of Global Ledger, to explore what really happens when things go wrong in Web3—and how fast, smart reactions can make all the difference. From the first cracks in a system to the split-second decisions that defin…
…
continue reading

1
DeFi Drains, AI Deception & the Rise of Real Security
12:18
12:18
Play later
Play later
Lists
Like
Liked
12:18This week on Crypto Weekly Recap, we dig deep into the dark side of July—over $1.5 billion drained from centralized exchanges, a new wave of DeFi exploits, and AI scams that are smarter (and sneakier) than ever. From rug pulls disguised as memecoins to slow liquidity drains stealing millions, this episode maps out where crypto security failed—and w…
…
continue reading

1
SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
…
continue reading

1
SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues (#)
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32…
…
continue reading

1
How Social Engineering and Vendor Weaknesses Led to Allianz Life’s Massive Breach
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45In July 2025, Allianz Life Insurance Company of North America confirmed a data breach impacting over 1.1 million customers, financial professionals, and employees—a stark reminder of how vulnerable even the most established financial institutions remain to evolving cyber threats. The breach stemmed from a third-party vendor compromise, specifically…
…
continue reading

1
2081: $679M Bitcoin Treasury Buy - $1M BTC Forecast, Trump & Max Clash on Dollar
34:32
34:32
Play later
Play later
Lists
Like
Liked
34:32David Bailey’s KindlyMD ignites a massive $679M Bitcoin treasury buy - signaling Wall Street’s deeper pivot into BTC. Meanwhile, analysts lay out 6 powerful reasons why Bitcoin is headed to $1,000,000, from institutional adoption to global reserve demand. President Trump doubles down on Bitcoin’s importance, clashing with Max Keiser over its true i…
…
continue reading

1
Embassy Espionage: Kimsuky and Suspected Chinese Partners Deploy XenoRAT in Seoul
1:04:58
1:04:58
Play later
Play later
Lists
Like
Liked
1:04:58A new wave of state-sponsored cyber espionage is sweeping across South Korea, targeting foreign embassies through highly tailored, multi-stage spearphishing campaigns. Security researchers at Trellix have uncovered that this operation—likely linked to North Korea’s Kimsuky (APT43) group but with indicators of Chinese involvement—has been active sin…
…
continue reading

1
Random Number Generators Pt 1: Cheating at Video Games
24:15
24:15
Play later
Play later
Lists
Like
Liked
24:15This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hack encryption keys. This episode lays the groundwork for Part 2, a discussion of RNGs in encryption. Resour…
…
continue reading

1
GSMA Confirms Flaws: Researchers Unveil Dangerous 5G Sniffing and Injection Attack
51:18
51:18
Play later
Play later
Lists
Like
Liked
51:18A groundbreaking security study from the Singapore University of Technology and Design has revealed a major vulnerability in 5G networks that allows attackers to bypass traditional defenses—without even needing a rogue base station. The newly released Sni5Gect attack framework demonstrates how adversaries within range of a victim can intercept and …
…
continue reading

1
Illinois Tightens Crypto Rules, BlackRock Expands Bitcoin Power, Treasury Pushes Digital Identity, ETHZilla Expands and Rebrands, and more...
12:01
12:01
Play later
Play later
Lists
Like
Liked
12:01(0:10): Illinois Tightens Crypto Regulations, Criticizes Federal Leniency, Mandates Consumer Protections (2:25): BlackRock's Bitcoin Influence Grows: Concerns Over Institutional Dominance and Market Volatility Rise (4:55): U.S. Treasury Seeks Public Input on Digital Identity in DeFi to Combat Crypto Crime (7:27): ETHZilla Shifts Focus to Ethereum, …
…
continue reading

1
Escape Big Tech: Glenn Meder’s Blueprint for Digital Freedom (Privacy Academy)
18:09
18:09
Play later
Play later
Lists
Like
Liked
18:09If you think privacy is dead, think again. In this critical episode of the Efani Features Podcast, host Mark Kreitzman sits down with Glenn Meder, founder of Privacy Academy, to discuss the rising threat of digital surveillance and what you can actually do to protect your liberty. From data brokers and corporate spyware to government-backed digital…
…
continue reading

1
SAP NetWeaver Under Siege: New Exploit Chains Threaten Global Enterprises
44:53
44:53
Play later
Play later
Lists
Like
Liked
44:53SAP NetWeaver, one of the world’s most critical enterprise platforms, is under active attack from both ransomware groups and state-backed hackers. A newly released exploit combines two devastating vulnerabilities—CVE-2025-31324 and CVE-2025-42999—to bypass authentication and execute malicious code with full administrative privileges. With CVSS scor…
…
continue reading

1
**Title: "Tech Titans Transforming AI and the Rocky Road of GPT-5"**
8:33
8:33
Play later
Play later
Lists
Like
Liked
8:33In this episode of the AI Daily Podcast, we explore a significant transformation in the tech industry landscape driven by major players Nvidia and Foxconn. Nvidia's stock has soared by over 30% this year, fueled by innovations like its new Blackwell architecture. This rise is accompanied by heightened expectations for Nvidia's upcoming earnings, wi…
…
continue reading

1
Workday breach, post-quantum alliance, Chinese group targets Taiwan
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15Workday confirms data breach An alliance to unify post-quantum cryptography New Chinese threat actor targeting Taiwan Huge thanks to our sponsor, Conveyor If the thought of logging into a portal questionnaire makes you want to throw your laptop away, you’re not alone. Most solutions just give you a browser extension to copy and paste answers, still…
…
continue reading

1
SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln;
5:10
5:10
Play later
Play later
Lists
Like
Liked
5:10Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
…
continue reading

1
SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln; (#)
5:11
5:11
Play later
Play later
Lists
Like
Liked
5:11SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln; Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by “bombing” users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosyst…
…
continue reading

1
Ransomware Gangs Deploy Kernel-Level EDR Killers to Evade Detection
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36Ransomware gangs are no longer just encrypting files and demanding payment—they are actively targeting the very defenses meant to stop them. Recent reports reveal a dramatic surge in the use of EDR killer tools, specialized malware designed to disable Endpoint Detection and Response (EDR) and antivirus systems at the kernel level. By silencing thes…
…
continue reading

1
2080: Dutch Firm to Buy 1% of ALL Bitcoin - $25B BTC Treasury Move
33:10
33:10
Play later
Play later
Lists
Like
Liked
33:10🇳🇱 Dutch firm Amdax has unveiled plans to accumulate 1% of the entire Bitcoin supply through a newly launched treasury company, AMBTS B.V. - a move that would require over $25B at current prices. This marks the most ambitious European Bitcoin treasury strategy to date, signaling the start of a continental race to secure BTC reserves. Meanwhile: 🟠 S…
…
continue reading

1
Chinese APTs Target Taiwan: UAT-7237’s SoundBill Loader and Gelsemium’s FireWood Backdoor
25:50
25:50
Play later
Play later
Lists
Like
Liked
25:50Taiwan continues to face an unprecedented wave of cyberattacks, with new intelligence exposing two distinct but sophisticated campaigns linked to Chinese threat actors. Together, they underscore Beijing’s increasingly aggressive cyber posture against Taiwan’s digital and critical infrastructure. The first campaign, attributed to UAT-7237, a subgrou…
…
continue reading

1
Colt Cyberattack: Multi-Day Outages After WarLock Ransomware Exploited SharePoint Zero-Day
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58Colt Technology Services, a major UK-based telecommunications provider with operations in over 40 countries, has confirmed that the WarLock ransomware group is behind the cyberattack that struck its systems on August 12, 2025. The attack caused multi-day outages across Colt’s hosting, porting, Voice API, and customer support services, while sparing…
…
continue reading

1
Workday Breach Tied to Third-Party CRM Hack in ShinyHunters Campaign
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43Workday, one of the world’s leading providers of human resources and financial management software, has confirmed a data breach that exposed business contact information through a third-party CRM platform, not its core HR or financial systems. Discovered on August 6, 2025, the breach revealed names, email addresses, and phone numbers—data that, whi…
…
continue reading

1
DOJ Brings Down Zeppelin Ransomware Operator, Seizes Millions in Crypto
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35The U.S. Department of Justice has successfully dismantled a major operator behind the notorious Zeppelin ransomware, charging Russian national Ianis Aleksandrovich Antropenko with conspiracy to commit computer fraud, money laundering, and extortion. Antropenko, known online as “china.helper,” allegedly deployed Zeppelin ransomware in targeted camp…
…
continue reading

1
AI's Double Impact: Reshaping Careers and Revolutionizing Travel
7:48
7:48
Play later
Play later
Lists
Like
Liked
7:48Welcome to the AI Daily Podcast, your go-to source for the latest news and innovations in artificial intelligence technology. In our latest episode, we delve into the dual realms of professional advancement and personal enrichment that AI is currently transforming. Artificial Intelligence has quickly become a cornerstone of modern life, akin to dig…
…
continue reading

1
Japan Approves Yen Stablecoin, Crypto Leverage Risks, MicroStrategy Accumulates Bitcoin, U S Considers Bitcoin Reserve, and more...
12:00
12:00
Play later
Play later
Lists
Like
Liked
12:00(0:10): Japan Set to Approve First Yen-Pegged Stablecoin, JPYC, Revolutionizing Digital Finance in Asia (2:12): Crypto Market Leverage Soars, Exposing Fragility Amid $1 Billion Bitcoin Liquidation (4:44): MicroStrategy's Bold Bitcoin Bet: 628,946 BTC Holdings Surge Amid Market Rally (7:04): U.S. Eyes Bitcoin as Strategic Reserve Amid Economic Shift…
…
continue reading

1
Cisco firewall warning, Colt Telecom cyberattack, CISA’s OT request
7:49
7:49
Play later
Play later
Lists
Like
Liked
7:49Cisco warns of maximum-severity defect in firewall software UK’s Colt Telecom suffers cyberattack CISA implores OT environments to lock down critical infrastructure Huge thanks to our sponsor, Conveyor Have you been personally victimized by portal security questionnaires? Conveyor is here to help. Endless clicks, bad navigation, and expanding quest…
…
continue reading

1
Breaking Cybersecurity News: Canada's House of Commons Breached and Windows 10 Support Ending Soon
9:51
9:51
Play later
Play later
Lists
Like
Liked
9:51In this episode of Cybersecurity Today, host David Shipley reports from Fredericton, New Brunswick, amidst severe forest fires. The main story covers a data breach in Canada’s House of Commons involving parliamentary employee information, attributed to a recent Microsoft vulnerability. The episode also discusses Fortinet’s recent high-severity vuln…
…
continue reading

1
SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
…
continue reading

1
2079: $400K Bitcoin by Year-End - Taiwan Stacks BTC While U.S. Flip-Flops
20:48
20:48
Play later
Play later
Lists
Like
Liked
20:48A new model projects Bitcoin could surge to $400,000 by year-end, as institutions and “forced buyers” drive unprecedented supply pressure. Meanwhile, Taiwan makes history with its first Bitcoin treasury - Top Win raises $10 million to stack BTC. And in Washington, Treasury Secretary Scott Bessent backpedals on his earlier stance, now saying U.S. Bi…
…
continue reading

1
The attacks on Monero’s POW consensus system continue + Price, News & More! | EPI 227
4:57:28
4:57:28
Play later
Play later
Lists
Like
Liked
4:57:2847e6GvjL4in5Zy5vVHMb9PQtGXQAcFvWSCQn2fuwDYZoZRk3oFjefr51WBNDGG9EjF1YDavg7pwGDFSAVWC5K42CBcLLv5U OR DONATE HERE: https://www.monerotalk.live/donate GUEST LINKS: TIMESTAMPS Coming soon! NEWS SEGMENT LINKS: https://x.com/frankcorva/status/1953893622367105150?s=46 https://x.com/valkenburgh/status/1954923844164280641?s=46 https://x.com/theragetech/statu…
…
continue reading

1
SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln (#)
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, l…
…
continue reading

1
Bullish & Beyond EP 31: Bitcoin and Beyond
35:11
35:11
Play later
Play later
Lists
Like
Liked
35:11In this episode of Bullish and Beyond, Brian and JT discuss the current bullish trends in stocks and cryptocurrencies, focusing on Bitcoin's recent surge, the impact of macroeconomic factors, and the growing demand for AI and hyperscalers like Nvidia. The conversation also highlights Apple's strategic investments and Robinhood's innovative trading …
…
continue reading

1
Exploring the Ransomware Ecosystem with Tammy Harper
1:13:55
1:13:55
Play later
Play later
Lists
Like
Liked
1:13:55In this episode of 'Cybersecurity Today,' the host welcomes Tammy Harper from Flair.io for an in-depth exploration into the ransomware ecosystem. Tammy, a seasoned threat intelligence researcher and certified dark web investigator, shines a light on the complex world of ransomware, its history, business models, and the various threat actor groups i…
…
continue reading
We discuss the rise of China’s early patriotic hacking scene, and a new report that unravels how some of its most skilled members eventually found their way into more formal, state-aligned cyber operations. This episode is brought to you by Push Security. Check them out at Pushsecurity.com Learn more about your ad choices. Visit podcastchoices.com/…
…
continue reading

1
U.S. Sanctions Grinex, the Russian Crypto Exchange Born from Garantex’s Ashes
38:12
38:12
Play later
Play later
Lists
Like
Liked
38:12The U.S. Department of the Treasury has announced sweeping sanctions against Grinex, a Russian-linked cryptocurrency exchange identified as the direct successor to the previously sanctioned Garantex. Garantex, operational since 2019, was a major hub for laundering billions of dollars in criminal proceeds, including payments from some of the world’s…
…
continue reading

1
Strengthening Monero Amid Attacks – With Xenu of Anti Moonboy News | EPI 359
1:09:12
1:09:12
Play later
Play later
Lists
Like
Liked
1:09:12Any donation is greatly appreciated! 47e6GvjL4in5Zy5vVHMb9PQtGXQAcFvWSCQn2fuwDYZoZRk3oFjefr51WBNDGG9EjF1YDavg7pwGDFSAVWC5K42CBcLLv5U OR DONATE HERE: https://www.monerotalk.live/donate TODAY'S SHOW: Monero’s network is facing coordinated selfish-mining “marathons” by Cubic, causing multi-block reorganizations that disrupt transactions but haven’t le…
…
continue reading

1
Week in Review: ShinyHunters-Scattered Spider merge, DARPA AI prize, Water infrastructure volunteers
30:29
30:29
Play later
Play later
Lists
Like
Liked
30:29Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Steve Zalewski, co-host, Defense in Depth Thanks to our show sponsor, Vanta Do you know the status of your compliance controls right now? Like…right now? We know that real-time visibility is critical for security, but when it comes to…
…
continue reading

1
Canadian House of Commons Breach Tied to Microsoft SharePoint Zero-Day
10:49
10:49
Play later
Play later
Lists
Like
Liked
10:49On August 8th, 2025, hackers breached the Canadian House of Commons by exploiting a critical Microsoft SharePoint zero-day vulnerability—CVE-2025-53770—with a severity score of 9.8. The attack compromised a database containing sensitive employee information, including names, job titles, office locations, email addresses, and technical details about…
…
continue reading

1
On AI’s future, security’s failures, and what comes next...
1:57:44
1:57:44
Play later
Play later
Lists
Like
Liked
1:57:44Three Buddy Problem - Episode 58: The buddies react to the Brandon Dixon episode, digging into what it’s really like to scale products inside a tech giant, navigate politics, and bring features to millions of machines. Plus, an exploration of the AI cybersecurity gold rush, the promise and hype, and the gamble for startups versus the slow-moving ad…
…
continue reading