Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Crypto Security Podcasts

show episodes
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
As digital threats intensify and compliance requirements grow more demanding, Trust.ID Talk is your critical source for mastering digital identity and PKI management. Brought to you by GlobalSign, this podcast targets the real-world challenges faced by IT security leaders, cybersecurity managers, and tech executives in industries like finance, healthcare, education, government and insurance. Each episode offers a front-row seat to conversations with industry pioneers, thought leaders, and su ...
  continue reading
 
Cybersecurity. Privacy. Blockchain. Unfiltered. The Efani Features Podcast is your trusted guide to the evolving world of digital security. Hosted by Mark Kreitzman of Efani, each episode dives deep into the critical issues shaping our digital future - from SIM swap threats and mobile privacy to crypto security and blockchain innovation. Join leading experts, ethical hackers, founders, and privacy advocates as we unpack real-world threats, explore cutting-edge solutions, and share practical ...
  continue reading
 
Artwork
 
Welcome to Crypto News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about Bitcoin, Ethereum, blockchain technology, DeFi, NFTs, and more. Whether you're a crypto enthusiast, investor, or simply curious about the potential of digital currencies, this podcast is your go-to source for all things crypto. Tune ...
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Crypto Weekly Recap is your go-to podcast for the latest news, trends, and developments in the cryptocurrency world. From major market moves to emerging projects and regulatory updates, we break it all down. Stay informed, stay ahead, and join us as we navigate the fast-paced world of crypto!
  continue reading
 
Artwork

1
Hacked

Hacked

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
  continue reading
 
Welcome to Wirex News - Your Crypto Podcast, where we have engaging conversations with experts, thought leaders, and innovators exploring wide-ranging topics around cryptocurrency, financial management, security, and many more interesting subjects.
  continue reading
 
I sit down every week with the most based people in crypto. My goal is to create a safe space to have the deepest and most real conversations with the biggest builders and investors in the industry, as well as to help educate the mainstream people, politicians, celebrities and big Web2 entrepreneurs coming into Web3. Hopefully this platform does its little part in onboarding as many people as possible into the incredible world of opportunities that Web 3 offers, while staying true to crypto’ ...
  continue reading
 
Artwork

1
The Security Repo

Mackenzie Jackson & Dwayne McDaniel

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
  continue reading
 
Artwork

1
Blockcast

Blockhead

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Blockcast delivers unfiltered analysis of crypto's most compelling narratives. Each week, seasoned industry insider Takatoshi Shibayama sits down with founders, CEOs, and key players shaping the blockchain landscape to dissect emerging projects, market dynamics, and institutional moves. From trending protocols to strategic industry shifts, get an insider's take on the forces driving decentralized innovation and the decisions that matter. No fluff, no hype—just deep dives into what's really h ...
  continue reading
 
Artwork
 
Technology is reshaping society—but how are users included in the conversation? The Brave Technologist explores how emerging technologies like artificial intelligence, machine learning, and Web3 are influencing our lives, our choices, and our collective future. Unlike many tech podcasts that focus on hype and disruption, this show puts users at the center of the conversation. Each episode features thoughtful discussions with technologists working to ensure that innovation serves the public i ...
  continue reading
 
Artwork

1
Crypto Voices

Matthew Mezinskis

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Podcast covering diverse trends in Bitcoin and blockchain tech, decentralization, entrepreneurship, cryptoeconomics and liberty. Author note: All authors, whose content is featured on Crypto Voices, are contacted beforehand for permission, regardless of copyright or license such as Creative Commons. If you are an author whose work is reproduced here and you have not heard from Crypto Voices, it's because we couldn't find a way to contact you. However, in this situation your work was already ...
  continue reading
 
Artwork

1
I, Degen

Zak & Hunt

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome! I, Degen is a podcast about crypto technology, security, and culture. With a healthy balance of enthusiasm and skepticism, we cut through the misinformation and hype in search of a signal in the noise. Our weekly round-up will keep you updated on the latest in crypto hacks and security. With our open-source audio audits, we interview founders and hackers to surface relevant info about how to stay safe in crypto land.
  continue reading
 
Welcome to this podcast series from Cummings Pepperdine. Cummings Pepperdine advises on the three key areas of law, tax and FCA in alternative assets. Each Pep Pod looks at one or more of these areas of advice, with the aim of providing our listeners with useful updates, insights and information which will help your business. If you have any questions, just get in touch with us. Our contact details are all on our website, cummingspepperdine.com. Enjoy the Pod!
  continue reading
 
Artwork

1
Crypto Current

Richard Carthon

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Known for providing unparalleled access to the most diverse offering of expert voices in the Cryptocurrency & Blockchain Industry - Crypto Current is bridging the gap between the curious newcomers who are just discovering the space and the thought leaders who are shaping its future. Join us every week to hear from featured guests and learn about all the recent developments and trending stories that impact the future of money.
  continue reading
 
Artwork

1
Bullish & Beyond

Bullish and Beyond, LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to Bullish & Beyond, the ultimate podcast for stock market enthusiasts, crypto believers, and anyone looking to live life on the bullish side! Join Beary the Bull, Brian The Mac Man, and JT as they break down the latest market trends, investment strategies, and personal growth tips to help you thrive in finance and beyond. With each episode, you’ll gain actionable insights to fuel your success in stocks, crypto, and a fulfilling lifestyle. Get ready to amplify your financial knowledg ...
  continue reading
 
Ledger is the gold standard of security in the crypto space. Our hardware wallets are essential for anyone wanting to take control of their digital value. At the heart of this ecosystem, Ledger connects you with everything in the digital assets space, providing access to services and freedom from compromise on security, ownership or user experience. On 'The Ledger Podcast', we have conversations with some of the most interesting thought leaders in crypto, cybersecurity and culture to discuss ...
  continue reading
 
Artwork

1
Law of Code

Jacob Robinson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Discussions with regulators, top lawyers and entrepreneurs about the legal framework for blockchain technology. We look at international regulations, trends, and jurisprudence impacting crypto and its related parts.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
Monero Talk

Monero Talk

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Monero Talk broadcasts weekly conversations on YouTube (https://www.youtube.com/c/monerotalk) with topical guests to understand what the Monero cryptocurrency is today and what it hopes to become. We strive to give birth to new Monero users by simply reporting on the facts in our search to answer the question--Is Monero the truest cryptocurrency of them all? In staying true to the Monero ethos, we aim to always be skeptical. While we are Monero Talk by name, and Monero devotees at heart, the ...
  continue reading
 
🎙 The #1 Daily Bitcoin Podcast - Raw, Unfiltered, Uncensored Livestreaming 7 days a week on Rumble w/ video. No BS. No altcoins. Just BTC. Endorsed by the High Priest of Bitcoin himself: Max Keiser. Here, stackin’ sats isn’t advice - it's a way of life. Stack hard. Stay sovereign. 🟧
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
Artwork

1
The Index Podcast

Index Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
What’s indexing this week in crypto, blockchain, and open-source AI? Find out on The Index, where we feature exclusive conversations that go beyond code. Each week, host and entrepreneur Alex Kehaya talks with founders, developers, and investors who are shaping the future of Web3. From startup advice to breakthrough strategies, our guests share their stories and take a deep dive into the decentralized future.
  continue reading
 
"Slice of the Crypto Pie" is designed to serve up the freshest, most engaging cryptocurrency news and insights, making the complex world of digital currencies accessible and enjoyable to both novices and experts. This podcast aims to demystify the volatile yet fascinating realm of cryptocurrencies, offering listeners a well-rounded perspective on everything from market trends to technological innovations, investment strategies, and beyond.
  continue reading
 
Artwork
 
Hardcore crypto nuance and developments for degens and bigbrains alike. Conversations and interviews with the top minds across blockchain, venture capital, defi, consumer apps, and gaming.
  continue reading
 
Loading …
show series
 
The U.S. Department of Justice has closed the chapter on one of the most audacious cloud fraud and cryptojacking schemes in recent years. Charles O. Parks III, known online as “CP3O” and the self-styled “MultiMillionaire,” has been sentenced for orchestrating a multimillion-dollar scam that defrauded leading cloud providers out of more than $3.5 mi…
  continue reading
 
(0:10): Coinbase Acquires Deribit for $2.9B to Expand Crypto Derivatives and Boost EBITDA (2:52): Mesh Secures $130M from PayPal, Coinbase to Expand Global Crypto Payments Network (4:58): Wells Fargo Boosts Bitcoin ETF Stake to $160M, Signaling Institutional Confidence in Digital Assets (6:51): Mawari Network Launches Decentralized XR Platform Brid…
  continue reading
 
North Korean crypto theft Microsoft rolls out PC back up during attack U.S. charges four in $100M global fraud scheme Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-…
  continue reading
 
Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of…
  continue reading
 
SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto; Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they obs…
  continue reading
 
Sam Blackshear is the Co-founder and CTO of Mysten Labs, the company behind the Sui Network, and creator of the Move programming language that's revolutionizing smart contract development. From his academic roots in programming language research to his pivotal role at Facebook's Libra project, Sam shares the untold story of how he identified fundam…
  continue reading
 
In this episode of the Security Repo Podcast, software engineer and newly minted CISSP Matt Olmsted joins us to explore cryptographic fundamentals and why understanding them matters for anyone in security. From explaining symmetric vs. asymmetric encryption to the real-world implications of side-channel attacks, Matt delivers practical insights for…
  continue reading
 
When a crypto hack strikes, the clock starts ticking. In this episode of the Wirex Podcast, we sit down with Lex Fisun, CEO and Co-Founder of Global Ledger, to explore what really happens when things go wrong in Web3—and how fast, smart reactions can make all the difference. From the first cracks in a system to the split-second decisions that defin…
  continue reading
 
This week on Crypto Weekly Recap, we dig deep into the dark side of July—over $1.5 billion drained from centralized exchanges, a new wave of DeFi exploits, and AI scams that are smarter (and sneakier) than ever. From rug pulls disguised as memecoins to slow liquidity drains stealing millions, this episode maps out where crypto security failed—and w…
  continue reading
 
Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
  continue reading
 
SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32…
  continue reading
 
In July 2025, Allianz Life Insurance Company of North America confirmed a data breach impacting over 1.1 million customers, financial professionals, and employees—a stark reminder of how vulnerable even the most established financial institutions remain to evolving cyber threats. The breach stemmed from a third-party vendor compromise, specifically…
  continue reading
 
David Bailey’s KindlyMD ignites a massive $679M Bitcoin treasury buy - signaling Wall Street’s deeper pivot into BTC. Meanwhile, analysts lay out 6 powerful reasons why Bitcoin is headed to $1,000,000, from institutional adoption to global reserve demand. President Trump doubles down on Bitcoin’s importance, clashing with Max Keiser over its true i…
  continue reading
 
A new wave of state-sponsored cyber espionage is sweeping across South Korea, targeting foreign embassies through highly tailored, multi-stage spearphishing campaigns. Security researchers at Trellix have uncovered that this operation—likely linked to North Korea’s Kimsuky (APT43) group but with indicators of Chinese involvement—has been active sin…
  continue reading
 
This episode explores the mysterious world of random number generators (RNGs) in video games. Looking at popular games like Minecraft, Stardew Valley, and Diablo II, we describe how players hack these random numbers in the same ways hackers hack encryption keys. This episode lays the groundwork for Part 2, a discussion of RNGs in encryption. Resour…
  continue reading
 
A groundbreaking security study from the Singapore University of Technology and Design has revealed a major vulnerability in 5G networks that allows attackers to bypass traditional defenses—without even needing a rogue base station. The newly released Sni5Gect attack framework demonstrates how adversaries within range of a victim can intercept and …
  continue reading
 
(0:10): Illinois Tightens Crypto Regulations, Criticizes Federal Leniency, Mandates Consumer Protections (2:25): BlackRock's Bitcoin Influence Grows: Concerns Over Institutional Dominance and Market Volatility Rise (4:55): U.S. Treasury Seeks Public Input on Digital Identity in DeFi to Combat Crypto Crime (7:27): ETHZilla Shifts Focus to Ethereum, …
  continue reading
 
If you think privacy is dead, think again. In this critical episode of the Efani Features Podcast, host Mark Kreitzman sits down with Glenn Meder, founder of Privacy Academy, to discuss the rising threat of digital surveillance and what you can actually do to protect your liberty. From data brokers and corporate spyware to government-backed digital…
  continue reading
 
SAP NetWeaver, one of the world’s most critical enterprise platforms, is under active attack from both ransomware groups and state-backed hackers. A newly released exploit combines two devastating vulnerabilities—CVE-2025-31324 and CVE-2025-42999—to bypass authentication and execute malicious code with full administrative privileges. With CVSS scor…
  continue reading
 
In this episode of the AI Daily Podcast, we explore a significant transformation in the tech industry landscape driven by major players Nvidia and Foxconn. Nvidia's stock has soared by over 30% this year, fueled by innovations like its new Blackwell architecture. This rise is accompanied by heightened expectations for Nvidia's upcoming earnings, wi…
  continue reading
 
Workday confirms data breach An alliance to unify post-quantum cryptography New Chinese threat actor targeting Taiwan Huge thanks to our sponsor, Conveyor If the thought of logging into a portal questionnaire makes you want to throw your laptop away, you’re not alone. Most solutions just give you a browser extension to copy and paste answers, still…
  continue reading
 
Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
  continue reading
 
SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln; Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by “bombing” users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosyst…
  continue reading
 
Ransomware gangs are no longer just encrypting files and demanding payment—they are actively targeting the very defenses meant to stop them. Recent reports reveal a dramatic surge in the use of EDR killer tools, specialized malware designed to disable Endpoint Detection and Response (EDR) and antivirus systems at the kernel level. By silencing thes…
  continue reading
 
🇳🇱 Dutch firm Amdax has unveiled plans to accumulate 1% of the entire Bitcoin supply through a newly launched treasury company, AMBTS B.V. - a move that would require over $25B at current prices. This marks the most ambitious European Bitcoin treasury strategy to date, signaling the start of a continental race to secure BTC reserves. Meanwhile: 🟠 S…
  continue reading
 
Taiwan continues to face an unprecedented wave of cyberattacks, with new intelligence exposing two distinct but sophisticated campaigns linked to Chinese threat actors. Together, they underscore Beijing’s increasingly aggressive cyber posture against Taiwan’s digital and critical infrastructure. The first campaign, attributed to UAT-7237, a subgrou…
  continue reading
 
Colt Technology Services, a major UK-based telecommunications provider with operations in over 40 countries, has confirmed that the WarLock ransomware group is behind the cyberattack that struck its systems on August 12, 2025. The attack caused multi-day outages across Colt’s hosting, porting, Voice API, and customer support services, while sparing…
  continue reading
 
Workday, one of the world’s leading providers of human resources and financial management software, has confirmed a data breach that exposed business contact information through a third-party CRM platform, not its core HR or financial systems. Discovered on August 6, 2025, the breach revealed names, email addresses, and phone numbers—data that, whi…
  continue reading
 
The U.S. Department of Justice has successfully dismantled a major operator behind the notorious Zeppelin ransomware, charging Russian national Ianis Aleksandrovich Antropenko with conspiracy to commit computer fraud, money laundering, and extortion. Antropenko, known online as “china.helper,” allegedly deployed Zeppelin ransomware in targeted camp…
  continue reading
 
Welcome to the AI Daily Podcast, your go-to source for the latest news and innovations in artificial intelligence technology. In our latest episode, we delve into the dual realms of professional advancement and personal enrichment that AI is currently transforming. Artificial Intelligence has quickly become a cornerstone of modern life, akin to dig…
  continue reading
 
(0:10): Japan Set to Approve First Yen-Pegged Stablecoin, JPYC, Revolutionizing Digital Finance in Asia (2:12): Crypto Market Leverage Soars, Exposing Fragility Amid $1 Billion Bitcoin Liquidation (4:44): MicroStrategy's Bold Bitcoin Bet: 628,946 BTC Holdings Surge Amid Market Rally (7:04): U.S. Eyes Bitcoin as Strategic Reserve Amid Economic Shift…
  continue reading
 
Cisco warns of maximum-severity defect in firewall software UK’s Colt Telecom suffers cyberattack CISA implores OT environments to lock down critical infrastructure Huge thanks to our sponsor, Conveyor Have you been personally victimized by portal security questionnaires? Conveyor is here to help. Endless clicks, bad navigation, and expanding quest…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley reports from Fredericton, New Brunswick, amidst severe forest fires. The main story covers a data breach in Canada’s House of Commons involving parliamentary employee information, attributed to a recent Microsoft vulnerability. The episode also discusses Fortinet’s recent high-severity vuln…
  continue reading
 
SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
  continue reading
 
A new model projects Bitcoin could surge to $400,000 by year-end, as institutions and “forced buyers” drive unprecedented supply pressure. Meanwhile, Taiwan makes history with its first Bitcoin treasury - Top Win raises $10 million to stack BTC. And in Washington, Treasury Secretary Scott Bessent backpedals on his earlier stance, now saying U.S. Bi…
  continue reading
 
47e6GvjL4in5Zy5vVHMb9PQtGXQAcFvWSCQn2fuwDYZoZRk3oFjefr51WBNDGG9EjF1YDavg7pwGDFSAVWC5K42CBcLLv5U OR DONATE HERE: https://www.monerotalk.live/donate GUEST LINKS: TIMESTAMPS Coming soon! NEWS SEGMENT LINKS: https://x.com/frankcorva/status/1953893622367105150?s=46 https://x.com/valkenburgh/status/1954923844164280641?s=46 https://x.com/theragetech/statu…
  continue reading
 
SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, l…
  continue reading
 
In this episode of Bullish and Beyond, Brian and JT discuss the current bullish trends in stocks and cryptocurrencies, focusing on Bitcoin's recent surge, the impact of macroeconomic factors, and the growing demand for AI and hyperscalers like Nvidia. The conversation also highlights Apple's strategic investments and Robinhood's innovative trading …
  continue reading
 
In this episode of 'Cybersecurity Today,' the host welcomes Tammy Harper from Flair.io for an in-depth exploration into the ransomware ecosystem. Tammy, a seasoned threat intelligence researcher and certified dark web investigator, shines a light on the complex world of ransomware, its history, business models, and the various threat actor groups i…
  continue reading
 
We discuss the rise of China’s early patriotic hacking scene, and a new report that unravels how some of its most skilled members eventually found their way into more formal, state-aligned cyber operations. This episode is brought to you by Push Security. Check them out at Pushsecurity.com Learn more about your ad choices. Visit podcastchoices.com/…
  continue reading
 
The U.S. Department of the Treasury has announced sweeping sanctions against Grinex, a Russian-linked cryptocurrency exchange identified as the direct successor to the previously sanctioned Garantex. Garantex, operational since 2019, was a major hub for laundering billions of dollars in criminal proceeds, including payments from some of the world’s…
  continue reading
 
Any donation is greatly appreciated! 47e6GvjL4in5Zy5vVHMb9PQtGXQAcFvWSCQn2fuwDYZoZRk3oFjefr51WBNDGG9EjF1YDavg7pwGDFSAVWC5K42CBcLLv5U OR DONATE HERE: https://www.monerotalk.live/donate TODAY'S SHOW: Monero’s network is facing coordinated selfish-mining “marathons” by Cubic, causing multi-block reorganizations that disrupt transactions but haven’t le…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Steve Zalewski, co-host, Defense in Depth Thanks to our show sponsor, Vanta Do you know the status of your compliance controls right now? Like…right now? We know that real-time visibility is critical for security, but when it comes to…
  continue reading
 
On August 8th, 2025, hackers breached the Canadian House of Commons by exploiting a critical Microsoft SharePoint zero-day vulnerability—CVE-2025-53770—with a severity score of 9.8. The attack compromised a database containing sensitive employee information, including names, job titles, office locations, email addresses, and technical details about…
  continue reading
 
Three Buddy Problem - Episode 58: The buddies react to the Brandon Dixon episode, digging into what it’s really like to scale products inside a tech giant, navigate politics, and bring features to millions of machines. Plus, an exploration of the AI cybersecurity gold rush, the promise and hype, and the gamble for startups versus the slow-moving ad…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play