Wrap your day with the world’s biggest stories. We set the bar on the daily news catch-up, going deeper on news stories that speak to the moment. An evening news podcast updated seven days a week, from CBC News. Sort out what's real, what's relevant and what’s truly new, from a Canadian perspective, with hosts Susan Bonner and Stephanie Skenderis. Context, analysis and surprise — all in about 25 minutes.
…
continue reading
Cybersecurity News Podcasts
A fun and informative cybersecurity audio glossary from N2K.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Welcome to the podcast from 404 Media where Joseph, Sam, Emanuel, and Jason catch you up on the stories we published this week. 404 Media is a journalist-owned digital media company exploring the way technology is shaping–and is shaped by–our world. We bring you unparalleled access to hidden worlds both online and IRL through investigative reporting, smart blogging, and breaking news. At 404 Media you’ll read, and hear, stories you can’t find anywhere else written by journalists who are lead ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
News, views, and insights into the cybersecurity realm produced by Greg Johnson, CEO of Webcheck Security. www.webchecksecurity.com
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
A national security and foreign policy podcast from the Foundation for Defense of Democracies (FDD).
…
continue reading
Every Saturday, we sit down with cybersecurity researchers to talk shop about the latest threats, vulnerabilities, and technical discoveries.
…
continue reading
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
The GovCIO Media & Research podcast network comprises GovCast, CyberCast and HealthCast featuring conversations with key leaders on timely issues impacting the federal IT landscape. Topics include cybersecurity, artificial intelligence, cloud computing, IT modernization, data analytics, workforce development and more. New episodes release each Tuesday.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by your friendly neighborhood cybersecurity gal Michele Bousquet.
…
continue reading
The latest foolishness from the AI bubble, every weekday. It can't be that stupid, you must be prompting it wrong.
…
continue reading
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and sta ...
…
continue reading
In Season 4 of Interpreting India, we continue our exploration of the dynamic forces that will shape India's global standing. At Carnegie India, our diverse lineup of experts will host critical discussions at the intersection of technology, the economy, and international security. Join us as we navigate the complexities of geopolitical shifts and rapid technological advancements. This season promises insightful conversations and fresh perspectives on the challenges and opportunities that lie ...
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
…
continue reading
Welcome to Tech News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news of all things tech, including the latest developments in areas such as artificial intelligence, robotics, cybersecurity, gadgets, apps, and more. Whether you're a tech enthusiast, industry professional, or simply curious about the potential ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Stories from the world of hacking, ransomware, cybersecurity, and rogue AI. Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten ...
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
1
Farewell Last Exchange Server, Copilot Memory Rolls Out, and Agentic AI Improvements – Practical 365 Podcast S04E44
45:34
45:34
Play later
Play later
Lists
Like
Liked
45:34In this episode of the Practical 365 Podcast, Steve Goodman and Paul Robichaux discuss major Exchange updates – including the fallout from a recent AWS outage, Microsoft’s new tools to finally remove your last on-premises Exchange server, the final patches for Exchange 2016/2019, and a new auto-archiving feature for Exchange Online. They also dive …
…
continue reading
1
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, More... - SWN #529
28:45
28:45
Play later
Play later
Lists
Like
Liked
28:45Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-529
…
continue reading
1
20251114 - Anthropic: Chinese AI hackers are after you! Security researchers call BS
5:40
5:40
Play later
Play later
Lists
Like
Liked
5:40Be VERY SCARED, okay? Patreon: https://www.patreon.com/davidgerard Ko-Fi: https://ko-fi.com/A1529D5 Buy me nice things: https://www.amazon.co.uk/hz/wishlist/ls/3Q8VZW46J6DM6 Get an extremely cool Pivot to AI shirt or mug: https://pivot-to-ai.redbubble.com Send in your story tips: [email protected] Sources: Disrupting the first reported AI-orchestra…
…
continue reading
Anthropic reports China-linked hackers used Claude AI in an automated espionage campaign. Google reconsiders its upcoming “Developer Verification” policy for Android. AT&T customers affected by two data breaches in 2024 can now file claims. Nearly 10,000 Washington Post employees were affected by a data breach. ASUS and Imunify360 patch critical fl…
…
continue reading
📺: Watch this episode on YouTube here. Filmmaker Michael Pack joins host Cliff May to tell the extraordinary story of The Last 600 Meters, his gripping documentary on the battles of Fallujah and Najaf. Though the film was finished in 2007, it sat on a shelf for 17 years before PBS finally aired it this Veterans Day. From young Americans fighting al…
…
continue reading
Send us a text While I’ll resist drawing comparisons about industrial cybersecurity to butterflies and bees, producing this episode did remind me of another great Muhammad Ali quote: "The hands can't hit what the eyes can't see.” This could provide an easy segue into the ongoing challenges about asset visibility, but really, it goes a bit deeper th…
…
continue reading
This is today’s cyber news for November 14th, 2025. Today’s brief connects travel scams, AI secrets, and live social engineering with active attacks on the edge of the network. You’ll hear how fake hotel booking sites quietly skim payment cards, why leading AI companies are leaking access keys from forgotten GitHub repos, and how WhatsApp screen-sh…
…
continue reading
1
Scaling Laws: The AI Economy and You: How AI Is, Will, and May Alter the Nature of Work and Economic Growth with Anton Korinek, Nathan Goldschlag, and Bharat Chander
44:44
44:44
Play later
Play later
Lists
Like
Liked
44:44Anton Korinek, a professor of economics at the University of Virginia and newly appointed economist to Anthropic's Economic Advisory Council; Nathan Goldschlag, Director of Research at the Economic Innovation Group; and Bharat Chander, Economist at Stanford Digital Economy Lab, join Kevin Frazier, the AI Innovation and Law Fellow at the University …
…
continue reading
1
Cyber laws reprieved, Microsoft screen capture, FBI highlights Akira
8:22
8:22
Play later
Play later
Lists
Like
Liked
8:22Two key cyber laws are back as president signs bill to end shutdown Microsoft's screen capture prevention for Teams users is finally rolling out FBI calls Akira top five ransomware variant out of 130 targeting U.S. businesses Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my…
…
continue reading
Car theft has gone digital. We talk to a white-hat hacker about how cars became computers on wheels—and why, in the race for smarter tech, safety is still trying to catch up. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading
1
Human Risk, Real Talk - Dan Thornton on Keeping Security Simple
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04We are back with another interview and this one is a proper conversation about what security awareness should feel like. Honest, simple and human. This week I sat down with Dan Thornton, founder and CEO of Goldphish. Dan’s path into cyber started in the Royal Marine Commandos and moved through physical security and crisis management before one atta…
…
continue reading
1
Cybersecurity Today: Oracle Breach, CrowdStrike Report, and New iPhone Scam
13:36
13:36
Play later
Play later
Lists
Like
Liked
13:36In this episode, host Jim Love discusses several significant cybersecurity events and updates. The Washington Post confirmed a security breach affecting nearly 10,000 individuals due to an exploited Oracle E-Business Suite vulnerability. CrowdStrike's 2025 Global Threat Report highlights the rise of 'enterprising adversaries' and a surge in malware…
…
continue reading
1
Risky Bulletin: Europol takes down Elysium, VenomRAT, and Rhadamanthys
7:48
7:48
Play later
Play later
Lists
Like
Liked
7:48Europol takes down servers behind three malware operations, the US sanctions another Burmese military group linked to scam compounds, Google backs down from mandatory Android developer registration, and Checkout-dot-com donates its ransom to cybercrime researchers instead of paying hackers. Show notes Risky Bulletin: Europol takes down Elysium, Ven…
…
continue reading
1
SANS Stormcast Friday, November 14th, 2025: SmartApeSG and ClickFix; Formbook Obfuscation Tricks; Sudo-rs Vulnerabilities; SANS Holiday Hack Challenge
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diar…
…
continue reading
1
3485: The Road to Predictable, Reliable Infrastructure with Nutanix
21:10
21:10
Play later
Play later
Lists
Like
Liked
21:10What does resilience look like when your business depends on keeping data, apps, and infrastructure running flawlessly in a world that never sleeps? At IGEL's Now & Next event in Frankfurt, I sat down with Sush Kajaria from Nutanix to explore how the company is helping organizations simplify their cloud strategies and strengthen their endpoint envi…
…
continue reading
1
Carney’s major projects—part 2, ultraprocessed foods and cancer, the Epstein files, and more
27:47
27:47
Play later
Play later
Lists
Like
Liked
27:47The Prime Minister has announced the second batch of major infrastructure projects. There is a focus on mining and energy. And that is raising concerns by some about the environmental impacts. And: The new study offering clues to a rise in colorectal cancer among young adults—both men and women alike. Also: The day after the release of emails sugge…
…
continue reading
1
20251113 - No, fake AI music bought onto a minor chart is not popular
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:02the market for AI bands is gullible journalists https://pivot-to-ai.com/2025/11/13/no-fake-ai-music-bought-onto-a-minor-chart-is-not-actually-popular/ - text Patreon: https://www.patreon.com/davidgerard Ko-Fi: https://ko-fi.com/A1529D5 Buy me nice things: https://www.amazon.co.uk/hz/wishlist/ls/3Q8VZW46J6DM6 Get an extremely cool Pivot to AI shirt …
…
continue reading
Operation Endgame expands global takedowns. The U.S. is creating a Scam Center Strike Force. Microsoft rolls out its delayed “Prevent screen capture” feature for Teams. Proton Pass patches a clickjacking flaw. Researchers uncover previously undisclosed zero-day flaws in both Citrix and Cisco Identity Services Engine. Android-based digital picture f…
…
continue reading
1
BEHIND SCENES of REAL Data Breach Response
1:00:09
1:00:09
Play later
Play later
Lists
Like
Liked
1:00:09What really happens during a cyber attack? Not the Hollywood version — the real one. The kind businesses experience every single day when a single compromised password, phishing email, or zero-day vulnerability ignites a full-scale crisis. In this full episode, we take you inside the anatomy of a real data breach with digital first responders from …
…
continue reading
1
Rational Security: The “Video Killed the Podcast Star” Edition
1:25:41
1:25:41
Play later
Play later
Lists
Like
Liked
1:25:41This week, Scott sat down with his Lawfare colleagues Natalie Orpett, Eric Columbus, and Molly Roberts, to talk through the week’s big national security news stories, including: “I Don’t Think You’re Ready for the Shutdown.” The record-setting shutdown of the U.S. government is set to come to an end after eight Democratic senators agreed to a conti…
…
continue reading
1
Synnovis Notifies Data Breach After 2024 Ransomware, Google Sues Chinese Phishing Scams, UK New Cyber Laws
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10🎙️ Synnovis Notifies Data Breach After 2024 Ransomware, Google Sues Chinese Phishing Scams, UK New Cyber Laws 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1011: Today's episode will discuss the latest news: · OpenAI Court Order Sparks NYT Copyright Dispute Over AI …
…
continue reading
This is today’s cyber news for November 13th, 2025. In this episode you’ll hear how a state-aligned group is abusing Cisco and Citrix identity platforms as quiet beachheads, while a fresh Windows kernel zero-day turns small footholds into full-system compromise if left unpatched. We also cover Google’s lawsuit against the Lighthouse phishing servic…
…
continue reading
All links and images can be found on CISO Series. Check out this post by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is our sponsored guest, Rob Allen, chief product officer, ThreatLocker. In th…
…
continue reading
1
How Attackers Use Your Own Tools Against You (IR trends Q3 2025)
11:21
11:21
Play later
Play later
Lists
Like
Liked
11:21In this episode of Talos Takes Hazel sits down with Talos' Bill Largent and Craig Jackson to discuss the latest Cisco Talos Incident Response Quarterly Trends Report (Q3 2025). From a wave of Toolshell events, to a rise in post-exploitation phishing, and the misuse of legitimate tools like Velociraptor, this quarter’s cases all point to a theme: at…
…
continue reading
1
Lawfare Daily: Revolutions and the Rule of Law
49:46
49:46
Play later
Play later
Lists
Like
Liked
49:46In this episode, Michael Feinberg interviews Fareed Zakaria, whose book “Age of Revolutions” has just been issued with a new afterword in light of the return of the Trump Administration. The two discuss intellectual, cultural, and populist revolutions from history and what those events have to teach us about our current political moment. To receive…
…
continue reading
1
Mobile blackout for Russian travelers, Windows 11 supports 3rd party passkeys, Synology patches BeeStation flaw
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23Mobile internet blackout for Russian travelers Windows 11 supports 3rd-party passkey apps Synology patches BeeStation flaw Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ....or the really scary one: "how do I get out from under these old tools and manual …
…
continue reading
1
Cloud Computing Simplified: Explore Application of Cloud, Cloud Deployment Models, Service Models and Mobile Cloud Computing
16:43
16:43
Play later
Play later
Lists
Like
Liked
16:43A comprehensive overview of cloud computing concepts, including its history, characteristics, advantages, and disadvantages. The book extensively details the cloud service models (SaaS, PaaS, IaaS) and deployment models (public, private, hybrid, and community), along with a comparative study of the latter. Furthermore, the source material explores …
…
continue reading
1
SANS Stormcast Thursday, November 13th, 2025: OWASP Top 10 Update; Cisco/Citrix Exploits; Test post quantum readiness
6:33
6:33
Play later
Play later
Lists
Like
Liked
6:33OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-disc…
…
continue reading
1
Srsly Risky Biz: Meta's fraud profit scandal
18:23
18:23
Play later
Play later
Lists
Like
Liked
18:23Tom Uren and Amberleigh Jack talk about a new Reuters’ report that reveals how Meta is knowingly raking in cash from scam advertisements. It’s around $16 billion worth, and in documents Meta calculates that it outweighs the costs of possible regulatory action. They also discuss recent state-backed supply chain attacks that have, so far, remained ta…
…
continue reading
1
Tinder’s camera roll and the Buffett deepfake
38:21
38:21
Play later
Play later
Lists
Like
Liked
38:21Tinder has got a plan to rummage through your camera roll, and Warren Buffett keeps popping up in convincing deepfakes dishing "number one investment tips." Meanwhile, will agentic AI replace your co-hosts before you can say "EDR for robots"? and why you should still read books. All this, plus Lily Allen's new album and Claude Code come up for disc…
…
continue reading
1
3484: How BDO Is Turning AI Investment Into Real Outcomes
33:47
33:47
Play later
Play later
Lists
Like
Liked
33:47Have you ever wondered what it looks like when a global professional services firm commits over one billion dollars to AI and expects it to reshape the way its people work across every corner of the business? That question sat with me as I spoke with Russ Ahlers, Chief Information Officer at BDO USA, and someone who has spent three decades building…
…
continue reading
1
Poilievre on his leadership, Epstein emails, Canadian tourists avoid U.S., and more
27:00
27:00
Play later
Play later
Lists
Like
Liked
27:00Conservative Leader Pierre Poilievre took questions today for the first time since losing two MPs. And he said he has no plans to change his leadership style. He says he’s the only leader trying to make life affordable for Canadians. And: Donald Trump "knew about the girls.” That’s one of the comments in emails released from convicted sex offender …
…
continue reading
Patch Tuesday. Google sues a “phishing-as-a-service” network linked to global SMS scams, and launches “private ai compute.” Hyundai notifies vehicle owners of a data breach. Amazon launches a bug bounty program for its AI models. The Rhadamanthys infostealer operation has been disrupted. An initial access broker is set to plead guilty in U.S. feder…
…
continue reading
1
The Nation-State Attacks Hiding in Your OT Network
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34In this episode of the Industrial Cybersecurity Insider, Craig Duckworth sits down with Matthew Carr, co-founder of Atumcell and OT penetration testing expert with fifteen years of experience securing operational technology systems. Matthew shares his journey from vulnerability research to specializing in cyber-physical security, recounting the piv…
…
continue reading
Discover the cutting-edge technology of CYBER EAGLE, a revolutionary system designed to defend against the threats of quantum warfare. As the world enters a new era of cybersecurity challenges, CYBER EAGLE is poised to be at the forefront of protecting sensitive information and national security. In this conversation, host David Mauro engages with …
…
continue reading
1
20251112 - GEMA wins against OpenAI on copying song lyrics
4:47
4:47
Play later
Play later
Lists
Like
Liked
4:47yo ho ho, rum, etc https://pivot-to-ai.com/2025/11/12/gema-wins-against-openai-on-copying-song-lyrics/ - text Patreon: https://www.patreon.com/davidgerard Ko-Fi: https://ko-fi.com/A1529D5 Buy me nice things: https://www.amazon.co.uk/hz/wishlist/ls/3Q8VZW46J6DM6 Get an extremely cool Pivot to AI shirt or mug: https://pivot-to-ai.redbubble.com Send i…
…
continue reading
1
GlobalLogic Warns 10,000 Employees Data Theft, Asahi Japan Crippled, Adobe Patches 29 Flaws
15:45
15:45
Play later
Play later
Lists
Like
Liked
15:45🎙️ GlobalLogic Warns 10,000 Employees Data Theft, Asahi Japan Crippled, Adobe Patches 29 Flaws 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1010: Today's episode will discuss the latest news: · SAP Patches Critical Flaws in SQL Anywhere Monitor Solution Manager · F…
…
continue reading
1
Signing Your Life Away: Subscriber Agreements
25:48
25:48
Play later
Play later
Lists
Like
Liked
25:48Do you tap "Accept" without reading subscriber agreements? Those long-winded documents can strip away your legal rights, and even hijack your face, your voice, and your life. Let's peek inside the dystopian world of Subscriber Agreements for streaming services and see what little goodies they hold for us. Netflix in Your Neighborhood Privacy Policy…
…
continue reading
1
Inside a Small Town's Fight Against a $1.2 Billion AI Datacenter
49:54
49:54
Play later
Play later
Lists
Like
Liked
49:54We start with Matthew Gault’s dive into a battle between a small town and the construction of a massive datacenter for America’s nuclear weapon scientists. After the break, Joseph explains why people are 3D-printing whistles in Chicago. In the subscribers-only section, Jason zooms out and tells us what librarians are seeing with AI and tech, and ho…
…
continue reading
1
Lawfare Daily: Tim Wu on ‘The Age of Extraction’
50:35
50:35
Play later
Play later
Lists
Like
Liked
50:35Lawfare Senior Editors Kate Klonick and Alan Rozenshtein talk to Columbia law professor Tim Wu about this new book, “The Age of Extraction: How Tech Platforms Conquered the Economy and Threaten Our Future Prosperity.” The book is the final part of what Wu calls his trilogy—building on his prior best selling books “The Master Switch” and “Attention …
…
continue reading
This is today’s cyber news for November 12th, 2025. A massive credential trove lands in Have I Been Pwned, pushing account takeover risk sharply higher. Microsoft’s monthly patches close sixty-three flaws, including one already exploited in the wild. Triofox is under live attack via a setup-route bypass, SAP fixes hardcoded credentials in SQL Anywh…
…
continue reading
1
Google's remote-wipe weapon, Qilin ransomware activity surges, GootLoader is back
8:08
8:08
Play later
Play later
Lists
Like
Liked
8:08Google's Find Hub turns into remote-wipe weapon Qilin ransomware activity surges GootLoader is back Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ....or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta.…
…
continue reading
1
Linux Device Driver Development: Everything you need to start with device driver development for Linux kernel and embedded Linux
15:56
15:56
Play later
Play later
Lists
Like
Liked
15:56This technical resource is intended for experienced users like embedded engineers and kernel hackers and requires prior knowledge of C programming and Linux commands. The content offers comprehensive instruction on developing Linux drivers for kernel version v5.10 and embedded Linux systems, covering essential topics such as setting up the developm…
…
continue reading
1
Industrial Phishing Kit QRR Discovered: New Cyber Threats Unveiled | Cybersecurity Today
16:30
16:30
Play later
Play later
Lists
Like
Liked
16:30In this episode of Cybersecurity Today, host David Shipley covers the latest threats in the cybersecurity landscape. Highlights include the emergence of the quantum root redirect (QRR) phishing kit, a sophisticated automated phishing platform targeting Microsoft 365 credentials across 90 countries. The hospitality industry is also being hit with a …
…
continue reading