The PBD Podcast, hosted by Patrick Bet-David, delivers engaging conversations on business, entrepreneurship, current events, politics, and sports. Live every Monday, Wednesday, and Friday at 9:00 AM EST with the Home Team and special guests, the show brings real-time reactions and dynamic discussions from the VAULT inside Valuetainment’s Fort Lauderdale studio. Every Tuesday and Thursday at 9:00 AM EST, tune in for exclusive interviews with top entrepreneurs, leaders, and newsmakers from aro ...
…
continue reading
Cybersecurity News Podcasts
Wrap your day with the world’s biggest stories. We set the bar on the daily news catch-up, going deeper on news stories that speak to the moment. An evening news podcast updated seven days a week, from CBC News. Sort out what's real, what's relevant and what’s truly new, from a Canadian perspective, with hosts Susan Bonner and Stephanie Skenderis. Context, analysis and surprise — all in about 25 minutes.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Welcome to the podcast from 404 Media where Joseph, Sam, Emanuel, and Jason catch you up on the stories we published this week. 404 Media is a journalist-owned digital media company exploring the way technology is shaping–and is shaped by–our world. We bring you unparalleled access to hidden worlds both online and IRL through investigative reporting, smart blogging, and breaking news. At 404 Media you’ll read, and hear, stories you can’t find anywhere else written by journalists who are lead ...
…
continue reading
News, views, and insights into the cybersecurity realm produced by Greg Johnson, CEO of Webcheck Security. www.webchecksecurity.com
…
continue reading
The Big Technology Podcast takes you behind the scenes in the tech world featuring interviews with plugged-in insiders and outside agitators. Alex Kantrowitz, a Silicon Valley journalist who's interviewed the world's top tech CEOs — from Mark Zuckerberg to Larry Ellison — is the host.
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
…
continue reading
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and sta ...
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
You already know the monthly OUCH! Newsletter brings you the latest cybersecurity tips—but now, we’re taking it even further. Tune in to the new OUCH! Podcast, where we go deeper on cybersecurity topics and give you extra insights to stay ahead of the threats.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The GovCIO Media & Research podcast network comprises GovCast, CyberCast and HealthCast featuring conversations with key leaders on timely issues impacting the federal IT landscape. Topics include cybersecurity, artificial intelligence, cloud computing, IT modernization, data analytics, workforce development and more. New episodes release each Tuesday.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Welcome to Tech News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news of all things tech, including the latest developments in areas such as artificial intelligence, robotics, cybersecurity, gadgets, apps, and more. Whether you're a tech enthusiast, industry professional, or simply curious about the potential ...
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
The highlights of Afternoons with Relebogile Mabotja, just in case you missed the show.
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
…
continue reading
Monday through Friday, Marketplace demystifies the digital economy in less than 10 minutes. We look past the hype and ask tough questions about an industry that's constantly changing.
…
continue reading
Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and ...
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through news, research, and real-world examples. Join us for a thought-provoking journey into a world where anything can be faked, truth is increasingly elusive, and human nature meets artificial intelligence head-on.
…
continue reading

1
3453: How Wolters Kluwer Is Building Trustworthy AI for Regulated Industries
31:47
31:47
Play later
Play later
Lists
Like
Liked
31:47What happens when an AI strategy meets the real-world complexity of healthcare, law, and finance? That’s the challenge at the heart of my conversation with Mark Sherwood, CIO of Wolters Kluwer, a global leader in professional information services. With over three decades in technology leadership across Microsoft, Symantec, and Nuance, Mark brings a…
…
continue reading

1
SANS Stormcast Wednesday, October 15th, 2025: Microsoft Patchday; Ivanti Advisory; Fortinet Patches
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivanti Advisory Ivanti released an advisory with some mitigation steps users can take until the recently m…
…
continue reading

1
Fragile ceasefire in Gaza, more U.S. lumber tariffs, Instagram goes PG-13, and more
26:53
26:53
Play later
Play later
Lists
Like
Liked
26:53Just days into a ceasefire between Israel and Hamas there are accusations from each side, and still more death. Hamas has not returned all of the bodies of hostages who have died, and the delivery of aid has yet to ramp up in earnest. Hamas battles Palestinian clans as the security situation remains tense. And: Lumber exporters brace themselves yet…
…
continue reading

1
Bikers, Apple, Storm-657, Astaroth, EES, Salesforce, Aaran Leyland, and more... - SWN #520
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37Bikers, Apple, Storm-657, Astaroth, EES, Salesforce, Aaran Leyland, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-520
…
continue reading

1
Bikers, Apple, Storm-657, Astaroth, EES, Salesforce, Aaran Leyland, and more... - SWN #520
32:37
32:37
Play later
Play later
Lists
Like
Liked
32:37Bikers, Apple, Storm-657, Astaroth, EES, Salesforce, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-520
…
continue reading
Fortra confirms an exploitation of the maximum-severity GoAnywhere flaw. Harvard investigates a claim of a breach. Banking Trojan targets Brazilian WhatsApp users. Reduction-in-force hits CISA. SimonMed says 1.2 million hit by Medusa ransomware. Netherlands invokes the Goods Availability Act against a Chinese company. We have our Business Breakdown…
…
continue reading

1
Dutch Blocks Chinese Nexperia, Australia Bans Youth Social Media, UK Battles Cyber Surge, Apple Launches iPhone Air, and more...
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44Dutch Government Blocks Chinese-Owned Nexperia Over National Security Concerns Amid Global Tensions Australia's Under-16 Social Media Ban Sparks Controversy Over Privacy, Enforcement, and Economic Impact UK Faces Unprecedented Cyber Attack Surge, Urges FTSE 350 to Bolster Defenses Amid Rising Threats Apple to Launch iPhone Air in China Amid Regulat…
…
continue reading

1
The state of passkeys in 2025 with Nick Steele | BEER SHORTAGE PUBLIC KEY
1:02:51
1:02:51
Play later
Play later
Lists
Like
Liked
1:02:51How is the transition to passkeys going in 2025? 🔑 This week, we’re joined by Nick Steele from the Product team at 1Password to talk all things passwordless. He walks us through the current state of adoption and a brand-new standard that will change the way we move and share passkeys. In Crash Course, we break down public-key encryption — the power…
…
continue reading

1
UK Record Cyberattacks, Salesforce Millions Leaked, Oracle Emergency Patch, 1.2M Patient Breach
18:25
18:25
Play later
Play later
Lists
Like
Liked
18:25🎙️ UK Record Cyberattacks, Salesforce Millions Leaked, Oracle Emergency Patch, 1.2M Patient Breach 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 993: Today's episode will discuss the latest news as UK Record Cyberattacks with more news below: · NPM Infrastructure Abused in Phishin…
…
continue reading

1
The Series Edition on the latest medical discoveries and breakthroughs-episode 2
20:19
20:19
Play later
Play later
Lists
Like
Liked
20:19Episode 2: AI in healthcare Relebogile Mabotja speaks to Prof. Ismail Kalla the Associate Professor in the Division of Pulmonology and Division of Critical Care Medicine at the University of the Witwatersrand about Al in healthcare. 702 Afternoons with Relebogile Mabotja is broadcast live on Johannesburg based talk radio station 702 every weekday a…
…
continue reading

1
Tech Feature: Cybersecurity and the safety net of the right insurance
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55Relebogile Mabotja speaks to Brendon Pillay the National Head of Business Development at Indwe Risk Services discussing Indwe as a specialist insurance expertise in cybersecurity and risk protection. 702 Afternoons with Relebogile Mabotja is broadcast live on Johannesburg based talk radio station 702 every weekday afternoon. Relebogile brings a lig…
…
continue reading

1
What are the privileges we never think of and take for granted when it comes to our parents?
29:07
29:07
Play later
Play later
Lists
Like
Liked
29:07Listeners respond to Relebogile Mabotja's open line question about the privileges we take for granted. 702 Afternoons with Relebogile Mabotja is broadcast live on Johannesburg based talk radio station 702 every weekday afternoon. Relebogile brings a lighter touch to some of the issues of the day as well as a mix of lifestyle topics and a peak into …
…
continue reading

1
CyberCast: Building Secure Systems Starts with the Right Questions, Says EXIM CISO
12:16
12:16
Play later
Play later
Lists
Like
Liked
12:16The Export-Import Bank of the United States (EXIM) facilitates trades of exports of goods and services and, in doing so, deals with massive troves of data. From the Billington Cybersecurity Summit, EXIM CISO, Chief Privacy Officer, and Deputy Chief AI Officer Darren Death tells CyberCast that his agency is centralizing data about user access and be…
…
continue reading

1
The Difference with AI Red Teaming is We Added the Word AI
37:31
37:31
Play later
Play later
Lists
Like
Liked
37:31All links and images can be found on CISO Series. This week’s episode is hosted by David Spark, producer of CISO Series and Andy Ellis, principal of Duha. Joining us is our sponsored guest, Khush Kashyap, senior director, GRC, Vanta. In this episode: Skip the Sermon When to coach versus command Making risk quantification useful Recognizing a distin…
…
continue reading

1
Is surveillance technology a more humane alternative to detaining immigrants?
11:44
11:44
Play later
Play later
Lists
Like
Liked
11:44Countries all over the world use technology to keep track of immigrants released from detention centers. The idea is to allow people to live in communities while their cases are adjudicated. But Petra Molnar of the Refugee Law Lab at York University said the technology is also often employed in ways that are too intrusive and can act like digital s…
…
continue reading

1
Lawfare Daily: How Technologists Can Help Regulators with Erie Meyer and Laura Edelson
44:26
44:26
Play later
Play later
Lists
Like
Liked
44:26Erie Meyer, Senior Fellow at Georgetown Law’s Institute for Technology Law & Policy and ABCD, and Laura Edelson, Assistant Professor of Computer Science at Northeastern University, who are coauthors of the recent toolkit, “Working with Technologists: Recommendations for State Enforcers and Regulators,” join Lawfare’s Justin Sherman to discuss how s…
…
continue reading
This is today’s cyber news for October 14th, 2025. We open with Microsoft tightening Internet Explorer mode in Edge after credible reports of real-world abuse. From there, we cover widespread SonicWall SSLVPN account compromises with stolen credentials, an emergency Oracle E-Business Suite fix following active exploitation, and a U.S.-focused botne…
…
continue reading
One unlocked phone can unravel the defenses of a billion-dollar enterprise—because in cybersecurity, small mistakes don’t stay small for long. Attackers can read notes, steal IDs, or impersonate you on WhatsApp. A reused password can launch a remote tool that looks completely legitimate. Rob Maas (Field CTO, ON2IT) and Luca Cipriano (Cyber Threat I…
…
continue reading

1
Salesforce data leak, SimonMed breach, Chipmaker vs. Dutch government
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Millions of records exposed in Salesforce data leak SimonMed breach grows from hundreds to over a million Dutch government freezes Chinese-owned chipmaker Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from u…
…
continue reading
You’ve likely received a scam call or text at some point. Some of these messages come from elaborate compounds found mostly in Southeast Asia. These compounds look like call centers but operate more like prisons. In this CyberMonday crossover with WAMU’s 1A, we return to an episode and hear from listeners — on how these centers cropped up and what’…
…
continue reading

1
FBI Shuts Down Breach Forums and New Cyber Threats Unveiled
12:45
12:45
Play later
Play later
Lists
Like
Liked
12:45In this episode of Cybersecurity Today, host David Shipley discusses several major events, including the FBI's takedown of the Breach Forums portal. This site was associated with a significant Salesforce data breach and extortion campaign led by groups like Shiny Hunters and Scattered Lapses Hunters. Oracle users are also warned about a new critica…
…
continue reading
Please enjoy this encore of Word Notes. A process of hiding the complexity of a system by providing an interface that eases its manipulation. CyberWire Glossary link: https://thecyberwire.com/glossary/abstraction-layer Audio reference link: “What Is Abstraction in Computer Science,” by Codexpanse, YouTube, 29 October 2018. Learn more about your…
…
continue reading
By Jason Edwards
…
continue reading

1
3452: How ServiceNow Turns AI Governance into a Strategic Advantage
24:08
24:08
Play later
Play later
Lists
Like
Liked
24:08What does it take to build AI that enterprises can actually trust? That’s the question I explored with Nirankush “Kush” Panchbhai, Senior Vice President of Platform Fundamentals at ServiceNow, in a conversation about AI governance, human-centered design, and how the company’s AI Control Tower is reshaping enterprise adoption. Kush describes the AI …
…
continue reading

1
SANS Stormcast Tuesday, October 14th, 2025: ESAFENET Scans; Payroll Priates; MSFT Edge IE Mode
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:02Scans for ESAFENET CDG V5 We do see some increase in scans for the Chinese secure document management system, ESAFENET. https://isc.sans.edu/diary/Heads%20Up%3A%20Scans%20for%20ESAFENET%20CDG%20V5%20/32364 Investigating targeted payroll pirate attacks affecting US universities Microsoft wrote about how payroll pirates redirect employee paychecks vi…
…
continue reading

1
Staff picks: Food insecurity, Churchill port expansion, Artemis moon mission, and more
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44As many Canadians gather to share a big meal and give thanks, more people than ever are going hungry. With the rising cost of groceries, one in four households is struggling to put food on the table. It has municipalities declaring hunger emergencies, food banks scrambling to meet the need, and experts calling for systemic change. And: The federal …
…
continue reading

1
Between Two Nerds: The Keyser Soze of Scattered Spider
22:34
22:34
Play later
Play later
Lists
Like
Liked
22:34In this edition of Between Two Nerds Tom Uren and The Grugq talk about how different cybercriminal groups are after insiders to provide network access. This episode is available on Youtube. Show notes Nebulock sponsor episode Scattered Spider insiders tweet BBC's Joe Tidy approached by ransomware gang…
…
continue reading

1
Elon Musk's xAI Enters Gaming, EY and Microsoft Launch AI Training, China's Export Controls Spare Taiwan, Mappls Launches 3D Navigation, and more...
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55(0:10): Elon Musk's xAI Ventures into Gaming: Revolutionizing AI with Advanced 'World Models' (1:53): EY & Microsoft Launch Global AI Training to Empower 40,000+ Indian Professionals with Essential Skills (3:20): China's Rare Earth Export Controls Unlikely to Impact Taiwan's Chip Industry (4:43): Mappls Launches 3D Navigation and Real-Time Alerts, …
…
continue reading

1
Israeli Hostages Freed, Katie Porter's Potato Crisis & Trump vs China w/ Adam Carolla | PBD Podcast | Ep. 666
2:27:06
2:27:06
Play later
Play later
Lists
Like
Liked
2:27:06Patrick Bet-David, Tom Ellsworth, Vincent Oshana, and Adam Sosnick break down the release of Israeli hostages amid the Gaza ceasefire, Katie Porter’s bizarre “mashed potato” controversy, and Trump’s escalating economic battle with China — joined by guest Adam Carolla. ------ 👞 GET THE NEW FLB 1'S: https://bit.ly/4mXV9gd Ⓜ️ PBD PODCAST CIRCLES: http…
…
continue reading

1
The End of Windows 10 Support Is an Environmental Disaster (With Nathan Proctor)
1:05:54
1:05:54
Play later
Play later
Lists
Like
Liked
1:05:54Jason is joined by US PIRG's right to repair campaign director Nathan Proctor, who explains why the imminent end of free support for Windows 10 computers is a ticking timebomb, with millions of computers slated for recycling centers and landfills. Nathan and Jason discuss the state of right to repair legislation all over the United States, the prog…
…
continue reading

1
Houston Suburb Cyberattack, Cisco Fortinet Palo Alto Coordinated Hit, FBI Takes BreachForums
16:29
16:29
Play later
Play later
Lists
Like
Liked
16:29🎙️ Houston Suburb Cyberattack, Cisco Fortinet Palo Alto Coordinated Hit, FBI Takes BreachForums 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 992: Today's episode will discuss the latest news as Houston Suburb Cyberattack with more news below: · New Oracle E-Business Suite Bug Cou…
…
continue reading

1
Parenting and Parents: The Default Parent Syndrome
21:56
21:56
Play later
Play later
Lists
Like
Liked
21:56Relebogile Mabotja speaks with Lesego Lekgothoane, Writer and Clinical Psychologist, about Default Parent Syndrome, a phenomenon where one parent, often the mother, becomes the primary caregiver and absorbs most of the emotional labour, household coordination, and childcare tasks. 702 Afternoons with Relebogile Mabotja is broadcast live on Johannes…
…
continue reading
Movies and What to Stream: Black Phone 2 See omnystudio.com/listener for privacy information.By Radio 702
…
continue reading

1
The Travel Feature: Destination Inspiration – Around the World in Blue and Green Spaces
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58702 Afternoons with Relebogile Mabotja is broadcast live on Johannesburg based talk radio station 702 every weekday afternoon. Relebogile brings a lighter touch to some of the issues of the day as well as a mix of lifestyle topics and a peak into the worlds of entertainment and leisure. Thank you for listening to a 702 Afternoons with Relebogile Ma…
…
continue reading

1
Which professions makes dating and relationships challenging and why?
17:34
17:34
Play later
Play later
Lists
Like
Liked
17:34702, 702 Afternoons, Relebogile Mabotja, Talk Radio, Dating Challenges, Relationship Dynamics, Professions, Work-Life Balance See omnystudio.com/listener for privacy information.By Radio 702
…
continue reading

1
AI companies are eyeing your shopping cart and your data
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28Open AI has added a checkout feature to ChatGPT, partnering with Etsy and Shopify to let users purchase some items from select merchants. OpenAI says ChatGPT's answers are still organic and unsponsored. But why not offer a seamless way to buy things that come up in certain responses? Eventually this could lead to so-called “agentic” shopping: letti…
…
continue reading

1
Lawfare Daily: The Trials of the Trump Administration, Oct. 10
1:42:29
1:42:29
Play later
Play later
Lists
Like
Liked
1:42:29In a live conversation on YouTube, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Public Service Fellow Loren Voss and Senior Editors Anna Bower, Roger Parloff, Eric Columbus, and Molly Roberts to discuss the legal challenges to the National Guard deployment in Portland and Chicago, a hearing over the attempted deportation of Kilmar …
…
continue reading
This is today’s cyber news for October 13th, 2025. The brief leads with fresh exploitation against Oracle E-Business Suite and reports of SonicWall customer backup configurations viewed by attackers, raising concerns about blueprint-level exposure and data theft. We also cover an actively exploited Gladinet CentreStack/Triofox zero-day, a record ~3…
…
continue reading

1
Velociraptor pushes LockBit, Spain dismantles crime group, SonicWall SSL VPN breach
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it “Do I have the right controls in place?” Or “Are my vendors secure?” ....or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, an…
…
continue reading

1
What Happened to Hacker Culture? [Threat Vector]
38:02
38:02
Play later
Play later
Lists
Like
Liked
38:02While the N2K team is observing Indigenous Peoples' Day, we thought you'd enjoy this episode of the Threat Vector podcast from our N2K Cyberwire network partner, Palo Alto Networks. New episodes of Threat Vector release each Thursday. We hope you will explore their catalog and subscribe to the show. Join David Moulton, Senior Director of Thought Le…
…
continue reading

1
The LinkedIn ‘Open to Work’ Trap: How Scammers Target Job Seekers
50:53
50:53
Play later
Play later
Lists
Like
Liked
50:53This week on The Awareness Angle, Ant Davis and Luke Pettigrew unpack the latest in cybersecurity and human risk — from fake job recruiters flooding LinkedIn to deepfake chaos and a nursery hack that shocked the UK. Whether it’s scams, software flaws, or stolen art, this episode is all about where human behaviour meets digital consequence. 🕵️♂️ Li…
…
continue reading

1
Risky Bulletin: Microsoft revamps Edge's "IE Mode" after zero-day attacks
7:24
7:24
Play later
Play later
Lists
Like
Liked
7:24Microsoft revamps Edge-IE-Mode after zero-day attacks, the FBI seizes the extortion site targeting Salesforce, a new round of layoffs hits CISA, and Apple doubles its bug bounty rewards. Show notes Risky Bulletin: Microsoft revamps Edge's "IE Mode" after zero-day attacks
…
continue reading