Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Cyber News Podcasts
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every weekday. Gain expert insights on what you need to takeaway from each story, and why. Learn and laugh at the same time with #TeamSC. Join us live at 8 AM Eastern every weekday morning at https://simplycyber.io/streams. I’m Gerald Auger, Ph.D., a cybersecurity professional, college professor, and content creator with over two decades of expertise in GRC cybersecurity. This field is collabor ...
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
The teissPodcast is dedicated to cybersecurity. We’ll host interviews with industry experts who’ll share commentary and advice on the latest threats and challenges that currently face our world.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
The world's leading cyber security podcast, hosted by Gary Miliefsky, an internationally recognized cybersecurity expert, bestselling author, keynote speaker and Publisher of Cyber Defense Magazine. Gain new insights into cybersecurity from our always free monthy publication, no strings attached. Subscribe here: https://www.cyberdefensemagazine.com/free-subscription/ Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Russia knows our weaknesses. But do you? A major five-part series from Sky News and Tortoise which imagines how a Russian attack on the UK could play out – and invites real-life former ministers, military chiefs and other experts to figure out how to defend the country. Written and presented by Sky News' security and defence editor, Deborah Haynes.This is Deborah's second podcast series for Sky News. In her first series, Into The Grey Zone, Deborah explores the murky evolution of warfare.Wha ...
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
This podcast is dedicated for those who want to stay up to date with the Cybersecurity Maturity Model Certification news. It utilizes Notebook LM to synthesize news articles from Jun Cyber's blog as well as other official CMMC documentation and produces a podcast. Podcast Description Disclaimer: The content presented in CMMC News is generated by AI and is intended for informational and educational purposes only. It should not be taken as official guidance for Cybersecurity Maturity Model Cer ...
…
continue reading
A window into our world, through in-depth storytelling from the BBC. Investigating, reporting and uncovering true stories from everywhere. Award-winning journalism, unheard voices, amazing culture and global issues. From Trump's new world order, to war in Sudan, to the legacy of football icon Mo Salah, The Documentary investigates major global stories. We delve into social media, take you into the minds of the world's most creative people and explore personal approaches to spirituality. Ever ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Twice per month, Peter House and Mike Chmielewski discuss current cyberthreats and issues. Internet Weather Report is recorded at the studios of Big Cabbage Radio in Palmer, Alaska.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Your Favorite Existentialist-Anarchist Internet Badass Commentary and Interviews about anarchism, existentialism, and the broader fields of study including the former.
…
continue reading
David Aaronovitch and a panel of experts and insiders present in-depth explainers on big issues in the news
…
continue reading
A place for everyday life, take a shot with me and vibe out. Adult Zone and content. Not for everyone... feel free to check out happs tv. for the live stream and much more. Instagram digiital vibes
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
This is Cybersecurity's premier podcast. Running strong since 2011 Rafal Los, James Jardine, and Jim Tiller bring a no-nonsense, non-commercial approach to our profession. DtSR brings interviews and discussion with people you want to meet, and stories you have to hear. So whether you're just starting out, or are decades deep into your career, you'll always learn something on this show. On Twitter/X: https://twitter.com/@DtSR_Podcast On YouTube: https://youtube.com/playlist?list=PLyo0dkKRvfVt ...
…
continue reading
Saving you valuable time by providing the "Too Long Didn't Read" summary of Cyber Security topics and news.
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
CyberNorth's podcast, news and views of the cyber security industry from in and around the North East.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Bringing cyber security professionals together to share their expertise. CyberTech Talks is a podcast hosted by CREST.
…
continue reading
Geopolitics Decanted is a podcast featuring geopolitical analysis and in-depth expert interviews on topics ranging from War in Ukraine, Great Power Competition with China, changing nature of warfare, sanctions and export controls, semiconductors and cybersecurity. This is a podcast for people who care about the details and are seeking a comprehensive understanding of global issues, not just the sound bytes. It is hosted by Dmitri Alperovitch, Chairman of Silverado Policy Accelerator (www.sil ...
…
continue reading
A BDSM Cyberpunk Audio Drama
…
continue reading
Stay ahead in the dynamic world of cybersecurity with "To the Point Cybersecurity." This podcast offers in-depth discussions on the latest cyber threats, trends, and technologies impacting businesses, governments, and communities globally. Listeners will gain insights into how emerging technologies, such as AI and frameworks like data governance and expanded global cyber regulations, are shaping modern security practices. The podcast also provides practical strategies for navigating the ever ...
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Cybersecurity Ally is Fortra's cybersecurity podcast covering security, today's cyber threats, and everything you need for cyber news today. Listen now!
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
Carol Massar and Tim Stenovec bring you reporting from the magazine that helps global leaders stay ahead, plus insight on the people, companies and trends shaping today's complex economy. Watch us LIVE on YouTube: http://bit.ly/3vTiACF.
…
continue reading
The Dark Dive podcast is designed to demystify the dark web - arming you with everything you need to know about what the dark web is and how it is used. Join us for a deep dive into dark web markets, hacking forums, and ransomware leak sites. Listen to real life stories from experts that feature criminals buying and selling stolen data, trading exploits, and planning cyberattacks from the dark web. Most importantly, find out how the cybersecurity and law enforcement community can do somethin ...
…
continue reading
The Cyber Ways Podcast brings academic cyber security research into the "real world." We interview top academic researchers to find how their research can be put into practice by cyber security professionals. Our focus is on behavioral aspects of cyber security. Occasionally, we touch on related topics, such as information privacy and surveillance.Each episode discusses one published, peer-reviewed article to reveal the practical implications of the research. Your hosts, Tom Stafford and Cra ...
…
continue reading
1
Can Meta’s AI Scam Detector Actually Stop Them?
1:02:00
1:02:00
Play later
Play later
Lists
Like
Liked
1:02:00This week on The Awareness Angle, Ant Davis and Luke Pettigrew unpack a wave of global cyber stories — from telecom breaches and AI-powered defence tools to sextortion scams and the emotional risks of “friendly” chatbots. It’s a mix of human stories, technical takeaways, and practical lessons for anyone trying to stay safe in an AI-shaped world. 📡 …
…
continue reading
1
🔴 Oct 31’s Top Cyber News NOW! - Ep 996
1:42:14
1:42:14
Play later
Play later
Lists
Like
Liked
1:42:14The stories that matter most to #cybersecurity insiders, analysts, and business leaders. Delivered every day. Check out Barricade Cyber https://barricadecyber.com for #incidentresponse #ransomware and #BEC recovery. Register for BCS webinars! Check out John Strand's Pay What You Can Antisyphon Training: https://simplycyber.io/antisyphon Allow what …
…
continue reading
1
Weekly Cyber News Rollup, October 31st, 2025
11:58
11:58
Play later
Play later
Lists
Like
Liked
11:58This is this week’s cyber news for October 27th through October 31st, 2025. The week opens with trusted update lanes under attack and an emergency fix to protect enterprise patching. A zero day in Oracle E-Business Suite put finance and supply-chain records at risk, while a fresh B I N D issue threatened cache poisoning across hundreds of thousands…
…
continue reading
Send us a text Even with a government shutdown, the CMMC compliance clock keeps ticking. ⏰🔐 In this episode, we uncover the paradox facing defense contractors: while agencies pause, cybersecurity deadlines don’t. The DoD’s timelines, affirmations, and enforcement plans continue to move forward—leaving unprepared firms at risk when operations resume…
…
continue reading
Fanny Elahi, MD, PhD is a physician-scientist and Associate Professor in the Departments of Neurology, Neuroscience, and Pathology at the Icahn School of Medicine at Mount Sinai in New York City. She serves as Director of Fluid Biomarker Research at the Barbara and Maurice Deane Center for Wellness and Cognitive Health and is one of the leaders at …
…
continue reading
1
Australia BadCandy warning, Cisco firewall attack, Aardvark eats bugs
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25Australia warns of BADCANDY attacks exploiting Cisco IOS XE Chinese hackers exploiting Cisco ASA firewalls used by governments worldwide OpenAI's Aardvark GPT-5 agent finds and fixes code flaws automatically Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything…
…
continue reading
1
Cheat Sheet... A new podcast from Sky News
11:11
11:11
Play later
Play later
Lists
Like
Liked
11:11Sophy Ridge and Wilf Frost bring you the Cheat Sheet to the day’s news in 10 minutes. On this first episode, they look at the Huntington mass stabbing and hear from an eye witness. Sophy’s spoken to the sole survivor of the Air India crash which killed 241 people back in June. And Wilf’s heard from the US ambassador to the UK Warren Stephens, who w…
…
continue reading
Mobile Threat Alert: GhostGrab Malware! Cybercriminals are getting more sophisticated, and GhostGrab is a clear example. This Android malware doesn’t just steal banking credentials—it can also: Run hidden cryptocurrency mining that drains your battery and CPU Harvest debit card and online banking login information Intercept SMS messages, including …
…
continue reading
1
The Future Hides In Plain Sight: Will We See It In Time?
56:53
56:53
Play later
Play later
Lists
Like
Liked
56:53Send us a text We explore how to prepare for a post‑quantum world while dealing with today’s outages and social engineering risks. From zero trust on satellites to multi‑region cloud design, we share practical ways to trade brittle efficiency for real resilience. • mapping careers toward emerging security domains • zero trust for satellites and pat…
…
continue reading
1
SANS Stormcast Monday, November 3rd, 2025: Port 8530/8531 Scans; BADCANDY Webshells; Open VSX Security Improvements
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https://isc.sans.edu/diary/Scans%20for%20Port%208530%208531%20%28TCP%29.%20Likely%20related%20to%20WSUS%20Vulnerability%20C…
…
continue reading
1
SANS Stormcast Monday, November 3rd, 2025: Port 8530/8531 Scans; BADCANDY Webshells; Open VSX Security Improvements (#)
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27SANS Stormcast Monday, November 3rd, 2025: Port 8530/8531 Scans; BADCANDY Webshells; Open VSX Security Improvements Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https:/…
…
continue reading
Kurdish designer Lara Dizeyee is preparing a couture collection for Milan Fashion Week. Dizeyee fled Iraqi Kurdistan as a child, grew up in the US, and later returned to Erbil. Her designs draw on traditional Kurdish dress - layered garments, capes, and ornate headpieces - reimagined as bold evening wear. Her work is celebrated in Kurdistan, across…
…
continue reading
1
GodLoader Malware Loader: What You Need to Be Aware of
4:02
4:02
Play later
Play later
Lists
Like
Liked
4:02This story was originally published on HackerNoon at: https://hackernoon.com/godloader-malware-loader-what-you-need-to-be-aware-of. We would like to take this opportunity to remind users about some good security practices when it comes to downloading and executing software. Check more stories related to cybersecurity at: https://hackernoon.com/c/cy…
…
continue reading
New Episode🔥This one explores why news outlets focus on the aftermath of a data breach but rarely on the lives impacted. We discuss cybersecurity in the age of AI dangers and its impact on individuals. It's time we address what is cybercrime, the resulting cyber threats, and data protection including identity theft. Download your Take-Home Resource…
…
continue reading
1
Arti Lalwani: Supporting and being the change. [Risk Management] [Career Notes]
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28Risk Management and Privacy Knowledge Leader at A-LIGN, Arti Lalwani shares her story from finance to risk management and how she made the transition. Arti started her career in finance after graduating with a finance degree. Quickly learning the field was not for her, she decided to dip her toes into the tech world. She credits her mentors for hel…
…
continue reading
Blood spilled in Sudan's el-Fasher massacre is visible from space. What led to the latest dark turn of events that took place after the Rapid Support Forces seized the city in Northern Darfur from the Sudanese Armed Forces? In this episode, first recorded in 2024, the Global Jigsaw digs into the prehistory of Sudan’s civil war. We focus on the powe…
…
continue reading
1
What Powers a Leader LIKE Crowdstrike CTO to Climb to the TOP?
59:40
59:40
Play later
Play later
Lists
Like
Liked
59:40What Powers a Leader LIKE Crowdstrike CTO to Climb to the TOP? At 17, he left his Caribbean home and came to the US. After initial struggles she landed a job and after inserting his way into a tech issue, the trajectory of his career changed and he now sits as the Chief Field CTO for the Americas at Crowdstrike. Send us a text Growth without Interr…
…
continue reading
1
How Russian AI targets news organisations
26:28
26:28
Play later
Play later
Lists
Like
Liked
26:28Networks of bots - automated social media accounts - have been found to be targeting European elections including, in the last year, those in Moldova, Poland and Germany. But could their real intention be to tie up news organisations with fact-checking? Damien Sharkov from BBC Monitoring has been looking at how they operate. Earlier this year, news…
…
continue reading
1
Episode 99: Episode 99 - Quick AISA Melbourne Cybercon 2025 coverage
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04In this episode, Richard briefly gives his thoughts about CyberCon Melbourne 2025.
…
continue reading
1
Attack of the automated ops. [Research Saturday]
19:40
19:40
Play later
Play later
Lists
Like
Liked
19:40Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vec…
…
continue reading
Something unusual happened recently at the Miss USA beauty contest: Miss Nevada, 22-year-old Mary Sickler, walked on stage without any hair. She had lost it to a condition known as alopecia but, until that moment, had worn a wig in public. Tens of millions of women around the world suffer from some form of hair loss and the story has sparked a glob…
…
continue reading
1
Bloomberg Businessweek Weekend - October 31st, 2025
1:15:42
1:15:42
Play later
Play later
Lists
Like
Liked
1:15:42Featuring some of our favorite conversations of the week from our daily radio show "Bloomberg Businessweek Daily." Hosted by Carol Massar and Tim Stenovec Hear the show live at 2PM ET on WBBR 1130 AM New York, Bloomberg 92.9 FM Boston, WDCH 99.1 FM in Washington D.C. Metro, Sirius/XM channel 121, on the Bloomberg Business App, Radio.com, the iHeart…
…
continue reading
1
Trump Denies Reports That He’s Planning Strikes on Venezuela
38:57
38:57
Play later
Play later
Lists
Like
Liked
38:57Watch Carol and Tim LIVE every day on YouTube: http://bit.ly/3vTiACF. President Donald Trump denied that he is considering strikes on Venezuela, contradicting a media report that he’d given approval for such a move as well as his own past statements that he was preparing land attacks after a series of boat strikes. Trump replied “no” when asked by …
…
continue reading
CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Lu…
…
continue reading
President Trump just returned from a whirlwind week in Asia closing trade and investment deals and strengthening security alliances. Host Cliff May sits down with FDD’s Craig Singleton to discuss what Trump accomplished, as well as the challenges – and threats – that remain.By FDD
…
continue reading
1
New York Road Runners CEO on the TCS New York City Marathon
11:22
11:22
Play later
Play later
Lists
Like
Liked
11:22New York Road Runners is a nonprofit that aims to build healthier lives and stronger communities through the power of running. The organization has served communities across New York City for nearly 70 years through inclusive and accessible running experiences. It serves runners of all ages, abilities, and backgrounds year-round with 60 adult and y…
…
continue reading
This is today’s cyber news for October 31st, 2025. Today’s brief opens with a polished LinkedIn “board invite” lure stealing Microsoft logins from finance leaders, then shifts to a one-click Chromium crash that can stall kiosks and call floors. We cover hundreds of Android apps abusing near field communication relays, a C I S A deadline to patch a …
…
continue reading
1
LinkedIn AI opt-out, NSA leadership candidates, Python foundation withdraws
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25LinkedIn users have until Monday to opt out of its AI training program New names surface for NSA leadership Open-source security group pulls out of U.S. grant, citing DEI restrictions Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer re…
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
continue reading
Big Tech’s data centers are changing the landscape of small-town America, bringing new kinds of jobs and economic opportunity. This week, we hear from Shannon Wait, a data technician in South Carolina whose experience led to a rare labor settlement — offering a window into what life inside these facilities is really like. Learn about your ad choice…
…
continue reading
1
Cyfirma Research- CVE-2025-6541: TP-Link Omada Gateway Remote Command Injection Vulnerability Analysis
4:51
4:51
Play later
Play later
Lists
Like
Liked
4:51Critical Alert: CVE-2025-6541 – TP-Link Omada Gateway Remote Command Injection Organizations using TP-Link Omada Gateway devices must act immediately. This critical vulnerability allows attackers to execute arbitrary OS-level commands via the device web management interface. Exploitation can lead to full device compromise, exposure of credentials, …
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
continue reading
1
Why The China Trade Truce Is Unlikely to Last
23:42
23:42
Play later
Play later
Lists
Like
Liked
23:42Dmitri Alperovitch talks with Sarah Stewart, CEO at Silverado and former senior US trade negotiator, about the Trump-Xi meeting in South Korea. They discuss the details of the agreement reached and why it is a temporary trade truce at best. 00:00 Introduction 01:13 US Objectives for the Trump-Xi Meeting 08:43 The Rare Earths Truce 11:29 A Temporary…
…
continue reading
1
OpenAI and mental health, government agencies caught up in hack, and a copyright win for Aussie musos
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29In this episode of the Cyber Uncut podcast, Daniel Croft and David Hollingworth talk about the latest AI news, the week in cyber crime, Tasmanian government breach woes, and Australia signing an important UN cyber crime treaty. The pair kick things off with some AI news, including OpenAI opening up about how many of its users talk about their menta…
…
continue reading
51
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability
6:19
6:19
Play later
Play later
Lists
Like
Liked
6:19X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
…
continue reading
***This programme contains references to sexual abuse which some listeners may find upsetting***For decades, Larry Nassar was the doctor for the women’s Olympic Gymnastics team and also treated athletes at Michigan State University. He was the go-to practitioner for sports related injuries but saw many women and girls outside of the sport as well. …
…
continue reading
1
Apple Tops Sales Estimates Despite China Dip, Amazon Reports Cloud Unit Growth
55:37
55:37
Play later
Play later
Lists
Like
Liked
55:37Watch Carol and Tim LIVE every day on YouTube: http://bit.ly/3vTiACF. Apple Inc.’s fourth-quarter revenue edged past analysts’ estimates despite a surprise sales decline in China, where it’s been struggling to stage a comeback. Total sales rose 7.9% to $102.5 billion in the period, which ended Sept. 27, the company said in a statement Thursday. Tha…
…
continue reading
1
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability (#)
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are sup…
…
continue reading
1
Instant Reaction: Apple Shares Gain as Sales Top Estimates
9:38
9:38
Play later
Play later
Lists
Like
Liked
9:38Apple's fourth-quarter revenue edged past analysts’ estimates despite a surprise sales decline in China, where it’s been struggling to stage a comeback. Total sales rose 7.9% to $102.5 billion in the period, which ended Sept. 27, the company said in a statement Thursday. That slightly beat the $102.2 billion average estimate. The company benefited …
…
continue reading