Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Cybersecurity News Podcasts

show episodes
 
Wrap your day with the world’s biggest stories. We set the bar on the daily news catch-up, going deeper on news stories that speak to the moment. An evening news podcast updated seven days a week, from CBC News. Sort out what's real, what's relevant and what’s truly new, from a Canadian perspective, with hosts Susan Bonner and Stephanie Skenderis. Context, analysis and surprise — all in about 25 minutes.
  continue reading
 
Artwork

1
The Lawfare Podcast

The Lawfare Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork

1
Click Here

Recorded Future News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Welcome to the podcast from 404 Media where Joseph, Sam, Emanuel, and Jason catch you up on the stories we published this week. 404 Media is a journalist-owned digital media company exploring the way technology is shaping–and is shaped by–our world. We bring you unparalleled access to hidden worlds both online and IRL through investigative reporting, smart blogging, and breaking news. At 404 Media you’ll read, and hear, stories you can’t find anywhere else written by journalists who are lead ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
  continue reading
 
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
  continue reading
 
Artwork

1
Lock and Code

Malwarebytes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Lock and Code tells the human stories within cybersecurity, privacy, and technology. Rogue robot vacuums, hacked farm tractors, and catastrophic software vulnerabilities—it’s all here.
  continue reading
 
Artwork

1
Tech Talks Daily

Neil C. Hughes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
If every company is now a tech company and digital transformation is a journey rather than a destination, how do you keep up with the relentless pace of technological change? Every day, Tech Talks Daily brings you insights from the brightest minds in tech, business, and innovation, breaking down complex ideas into clear, actionable takeaways. Hosted by Neil C. Hughes, Tech Talks Daily explores how emerging technologies such as AI, cybersecurity, cloud computing, fintech, quantum computing, W ...
  continue reading
 
Artwork

4
Security Weekly News (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork

1
Security Weekly News (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
  continue reading
 
Artwork
 
IT and Cybersecurity news geared towards people involved in the IT industry including vendors, VARs, MSPs, MSSPs, SOCs, NOCs, Resellers, and other industry professionals. Our topics cover industry news, partner programs, cybersecurity, AI and more.
  continue reading
 
Artwork

1
Security Breach

Eric Sorensen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
Industrial Cybersecurity Insider

Industrial Cybersecurity Insider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
  continue reading
 
Artwork

1
GovCIO Media & Research Podcasts

GovCIO Media & Research

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The GovCIO Media & Research podcast network comprises GovCast, CyberCast and HealthCast featuring conversations with key leaders on timely issues impacting the federal IT landscape. Topics include cybersecurity, artificial intelligence, cloud computing, IT modernization, data analytics, workforce development and more. New episodes release each Tuesday.
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Artwork
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
Threat Talks is your cybersecurity knowledge hub. Unpack the latest threats and explore industry trends with top experts as they break down the complexities of cyber threats. We make complex cybersecurity topics accessible and engaging for everyone, from IT professionals to every day internet users by providing in-depth and first-hand experiences from leading cybersecurity professionals. Join us for monthly deep dives into the dynamic world of cybersecurity, so you can stay informed, and sta ...
  continue reading
 
Artwork

1
Interpreting India

Carnegie India

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In Season 4 of Interpreting India, we continue our exploration of the dynamic forces that will shape India's global standing. At Carnegie India, our diverse lineup of experts will host critical discussions at the intersection of technology, the economy, and international security. Join us as we navigate the complexities of geopolitical shifts and rapid technological advancements. This season promises insightful conversations and fresh perspectives on the challenges and opportunities that lie ...
  continue reading
 
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
  continue reading
 
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
  continue reading
 
The Awareness Angle makes cybersecurity make sense. Hosted by Anthony and Luke, we break down the biggest cyber stories of the week. From phishing scams and AI fraud to major data breaches and the sneaky ways people get hacked, we explain what’s going on and why it matters. But this isn’t just another tech podcast. We focus on the human side of cybersecurity. How scams actually work, why people fall for them, and what we can all do to stay safer online. You’ll get practical tips, real-world ...
  continue reading
 
Artwork
 
Welcome to Tech News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news of all things tech, including the latest developments in areas such as artificial intelligence, robotics, cybersecurity, gadgets, apps, and more. Whether you're a tech enthusiast, industry professional, or simply curious about the potential ...
  continue reading
 
Artwork

4
Dirty South Security Podcast

VerSprite Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Dirty South Security Podcast! 🌍🔒 Join us as we dive into the hottest takes and latest trends in cybersecurity from around the globe. Whether you're a seasoned professional or just curious about the digital world's inner workings, our podcast offers insightful discussions, expert interviews, and thought-provoking analysis on the most pressing security issues today. Stay ahead of the curve with our no-nonsense approach to all things cybersecurity. Subscribe now and never miss an ...
  continue reading
 
Artwork

1
Risky Business

Patrick Gray

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
  continue reading
 
Artwork

1
CyberSecurity Summary

CyberSecurity Summary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
CyberSecurity Summary is your go-to podcast for concise and insightful summaries of the latest and most influential books in the field of cybersecurity. Each episode delves into the core concepts, key takeaways, and practical applications of these books, providing you with the knowledge you need to stay ahead in the ever-evolving world of cybersecurity. Whether you’re a seasoned professional or just starting out, CyberSecurity Summary offers valuable insights and discussions to enhance your ...
  continue reading
 
Artwork

1
Cyber Crime Junkies

Cyber Crime Junkies. Host David Mauro.

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
  continue reading
 
Artwork

1
Smashing Security

Graham Cluley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Stories from the world of hacking, ransomware, cybersecurity, and rogue AI. Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten ...
  continue reading
 
Artwork

1
Defense in Depth

David Spark, Steve Zalewski, Geoff Belknap

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
  continue reading
 
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
  continue reading
 
Loading …
show series
 
In this episode of the Practical 365 Podcast, Steve Goodman and Paul Robichaux discuss major Exchange updates – including the fallout from a recent AWS outage, Microsoft’s new tools to finally remove your last on-premises Exchange server, the final patches for Exchange 2016/2019, and a new auto-archiving feature for Exchange Online. They also dive …
  continue reading
 
Be VERY SCARED, okay? Patreon: https://www.patreon.com/davidgerard Ko-Fi: https://ko-fi.com/A1529D5 Buy me nice things: https://www.amazon.co.uk/hz/wishlist/ls/3Q8VZW46J6DM6 Get an extremely cool Pivot to AI shirt or mug: https://pivot-to-ai.redbubble.com Send in your story tips: [email protected] Sources: Disrupting the first reported AI-orchestra…
  continue reading
 
Anthropic reports China-linked hackers used Claude AI in an automated espionage campaign. Google reconsiders its upcoming “Developer Verification” policy for Android. AT&T customers affected by two data breaches in 2024 can now file claims. Nearly 10,000 Washington Post employees were affected by a data breach. ASUS and Imunify360 patch critical fl…
  continue reading
 
📺: Watch this episode on YouTube here. Filmmaker Michael Pack joins host Cliff May to tell the extraordinary story of The Last 600 Meters, his gripping documentary on the battles of Fallujah and Najaf. Though the film was finished in 2007, it sat on a shelf for 17 years before PBS finally aired it this Veterans Day. From young Americans fighting al…
  continue reading
 
Send us a text While I’ll resist drawing comparisons about industrial cybersecurity to butterflies and bees, producing this episode did remind me of another great Muhammad Ali quote: "The hands can't hit what the eyes can't see.” This could provide an easy segue into the ongoing challenges about asset visibility, but really, it goes a bit deeper th…
  continue reading
 
This is today’s cyber news for November 14th, 2025. Today’s brief connects travel scams, AI secrets, and live social engineering with active attacks on the edge of the network. You’ll hear how fake hotel booking sites quietly skim payment cards, why leading AI companies are leaking access keys from forgotten GitHub repos, and how WhatsApp screen-sh…
  continue reading
 
Anton Korinek, a professor of economics at the University of Virginia and newly appointed economist to Anthropic's Economic Advisory Council; Nathan Goldschlag, Director of Research at the Economic Innovation Group; and Bharat Chander, Economist at Stanford Digital Economy Lab, join Kevin Frazier, the AI Innovation and Law Fellow at the University …
  continue reading
 
Two key cyber laws are back as president signs bill to end shutdown Microsoft's screen capture prevention for Teams users is finally rolling out FBI calls Akira top five ransomware variant out of 130 targeting U.S. businesses Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my…
  continue reading
 
We are back with another interview and this one is a proper conversation about what security awareness should feel like. Honest, simple and human. This week I sat down with Dan Thornton, founder and CEO of Goldphish. Dan’s path into cyber started in the Royal Marine Commandos and moved through physical security and crisis management before one atta…
  continue reading
 
In this episode, host Jim Love discusses several significant cybersecurity events and updates. The Washington Post confirmed a security breach affecting nearly 10,000 individuals due to an exploited Oracle E-Business Suite vulnerability. CrowdStrike's 2025 Global Threat Report highlights the rise of 'enterprising adversaries' and a surge in malware…
  continue reading
 
Europol takes down servers behind three malware operations, the US sanctions another Burmese military group linked to scam compounds, Google backs down from mandatory Android developer registration, and Checkout-dot-com donates its ransom to cybercrime researchers instead of paying hackers. Show notes Risky Bulletin: Europol takes down Elysium, Ven…
  continue reading
 
SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diar…
  continue reading
 
What does resilience look like when your business depends on keeping data, apps, and infrastructure running flawlessly in a world that never sleeps? At IGEL's Now & Next event in Frankfurt, I sat down with Sush Kajaria from Nutanix to explore how the company is helping organizations simplify their cloud strategies and strengthen their endpoint envi…
  continue reading
 
The Prime Minister has announced the second batch of major infrastructure projects. There is a focus on mining and energy. And that is raising concerns by some about the environmental impacts. And: The new study offering clues to a rise in colorectal cancer among young adults—both men and women alike. Also: The day after the release of emails sugge…
  continue reading
 
the market for AI bands is gullible journalists https://pivot-to-ai.com/2025/11/13/no-fake-ai-music-bought-onto-a-minor-chart-is-not-actually-popular/ - text Patreon: https://www.patreon.com/davidgerard Ko-Fi: https://ko-fi.com/A1529D5 Buy me nice things: https://www.amazon.co.uk/hz/wishlist/ls/3Q8VZW46J6DM6 Get an extremely cool Pivot to AI shirt …
  continue reading
 
Operation Endgame expands global takedowns. The U.S. is creating a Scam Center Strike Force. Microsoft rolls out its delayed “Prevent screen capture” feature for Teams. Proton Pass patches a clickjacking flaw. Researchers uncover previously undisclosed zero-day flaws in both Citrix and Cisco Identity Services Engine. Android-based digital picture f…
  continue reading
 
What really happens during a cyber attack? Not the Hollywood version — the real one. The kind businesses experience every single day when a single compromised password, phishing email, or zero-day vulnerability ignites a full-scale crisis. In this full episode, we take you inside the anatomy of a real data breach with digital first responders from …
  continue reading
 
This week, Scott sat down with his Lawfare colleagues Natalie Orpett, Eric Columbus, and Molly Roberts, to talk through the week’s big national security news stories, including: “I Don’t Think You’re Ready for the Shutdown.” The record-setting shutdown of the U.S. government is set to come to an end after eight Democratic senators agreed to a conti…
  continue reading
 
🎙️ Synnovis Notifies Data Breach After 2024 Ransomware, Google Sues Chinese Phishing Scams, UK New Cyber Laws 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1011: Today's episode will discuss the latest news: · OpenAI Court Order Sparks NYT Copyright Dispute Over AI …
  continue reading
 
This is today’s cyber news for November 13th, 2025. In this episode you’ll hear how a state-aligned group is abusing Cisco and Citrix identity platforms as quiet beachheads, while a fresh Windows kernel zero-day turns small footholds into full-system compromise if left unpatched. We also cover Google’s lawsuit against the Lighthouse phishing servic…
  continue reading
 
All links and images can be found on CISO Series. Check out this post by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is our sponsored guest, Rob Allen, chief product officer, ThreatLocker. In th…
  continue reading
 
In this episode of Talos Takes Hazel sits down with Talos' Bill Largent and Craig Jackson to discuss the latest Cisco Talos Incident Response Quarterly Trends Report (Q3 2025). From a wave of Toolshell events, to a rise in post-exploitation phishing, and the misuse of legitimate tools like Velociraptor, this quarter’s cases all point to a theme: at…
  continue reading
 
In this episode, Michael Feinberg interviews Fareed Zakaria, whose book “Age of Revolutions” has just been issued with a new afterword in light of the return of the Trump Administration. The two discuss intellectual, cultural, and populist revolutions from history and what those events have to teach us about our current political moment. To receive…
  continue reading
 
Mobile internet blackout for Russian travelers Windows 11 supports 3rd-party passkey apps Synology patches BeeStation flaw Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ....or the really scary one: "how do I get out from under these old tools and manual …
  continue reading
 
A comprehensive overview of cloud computing concepts, including its history, characteristics, advantages, and disadvantages. The book extensively details the cloud service models (SaaS, PaaS, IaaS) and deployment models (public, private, hybrid, and community), along with a comparative study of the latter. Furthermore, the source material explores …
  continue reading
 
OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-disc…
  continue reading
 
Tom Uren and Amberleigh Jack talk about a new Reuters’ report that reveals how Meta is knowingly raking in cash from scam advertisements. It’s around $16 billion worth, and in documents Meta calculates that it outweighs the costs of possible regulatory action. They also discuss recent state-backed supply chain attacks that have, so far, remained ta…
  continue reading
 
Tinder has got a plan to rummage through your camera roll, and Warren Buffett keeps popping up in convincing deepfakes dishing "number one investment tips." Meanwhile, will agentic AI replace your co-hosts before you can say "EDR for robots"? and why you should still read books. All this, plus Lily Allen's new album and Claude Code come up for disc…
  continue reading
 
Have you ever wondered what it looks like when a global professional services firm commits over one billion dollars to AI and expects it to reshape the way its people work across every corner of the business? That question sat with me as I spoke with Russ Ahlers, Chief Information Officer at BDO USA, and someone who has spent three decades building…
  continue reading
 
Conservative Leader Pierre Poilievre took questions today for the first time since losing two MPs. And he said he has no plans to change his leadership style. He says he’s the only leader trying to make life affordable for Canadians. And: Donald Trump "knew about the girls.” That’s one of the comments in emails released from convicted sex offender …
  continue reading
 
Patch Tuesday. Google sues a “phishing-as-a-service” network linked to global SMS scams, and launches “private ai compute.” Hyundai notifies vehicle owners of a data breach. Amazon launches a bug bounty program for its AI models. The Rhadamanthys infostealer operation has been disrupted. An initial access broker is set to plead guilty in U.S. feder…
  continue reading
 
In this episode of the Industrial Cybersecurity Insider, Craig Duckworth sits down with Matthew Carr, co-founder of Atumcell and OT penetration testing expert with fifteen years of experience securing operational technology systems. Matthew shares his journey from vulnerability research to specializing in cyber-physical security, recounting the piv…
  continue reading
 
Discover the cutting-edge technology of CYBER EAGLE, a revolutionary system designed to defend against the threats of quantum warfare. As the world enters a new era of cybersecurity challenges, CYBER EAGLE is poised to be at the forefront of protecting sensitive information and national security. In this conversation, host David Mauro engages with …
  continue reading
 
yo ho ho, rum, etc https://pivot-to-ai.com/2025/11/12/gema-wins-against-openai-on-copying-song-lyrics/ - text Patreon: https://www.patreon.com/davidgerard Ko-Fi: https://ko-fi.com/A1529D5 Buy me nice things: https://www.amazon.co.uk/hz/wishlist/ls/3Q8VZW46J6DM6 Get an extremely cool Pivot to AI shirt or mug: https://pivot-to-ai.redbubble.com Send i…
  continue reading
 
🎙️ GlobalLogic Warns 10,000 Employees Data Theft, Asahi Japan Crippled, Adobe Patches 29 Flaws 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1010: Today's episode will discuss the latest news: · SAP Patches Critical Flaws in SQL Anywhere Monitor Solution Manager · F…
  continue reading
 
Do you tap "Accept" without reading subscriber agreements? Those long-winded documents can strip away your legal rights, and even hijack your face, your voice, and your life. Let's peek inside the dystopian world of Subscriber Agreements for streaming services and see what little goodies they hold for us. Netflix in Your Neighborhood Privacy Policy…
  continue reading
 
We start with Matthew Gault’s dive into a battle between a small town and the construction of a massive datacenter for America’s nuclear weapon scientists. After the break, Joseph explains why people are 3D-printing whistles in Chicago. In the subscribers-only section, Jason zooms out and tells us what librarians are seeing with AI and tech, and ho…
  continue reading
 
Lawfare Senior Editors Kate Klonick and Alan Rozenshtein talk to Columbia law professor Tim Wu about this new book, “The Age of Extraction: How Tech Platforms Conquered the Economy and Threaten Our Future Prosperity.” The book is the final part of what Wu calls his trilogy—building on his prior best selling books “The Master Switch” and “Attention …
  continue reading
 
This is today’s cyber news for November 12th, 2025. A massive credential trove lands in Have I Been Pwned, pushing account takeover risk sharply higher. Microsoft’s monthly patches close sixty-three flaws, including one already exploited in the wild. Triofox is under live attack via a setup-route bypass, SAP fixes hardcoded credentials in SQL Anywh…
  continue reading
 
Google's Find Hub turns into remote-wipe weapon Qilin ransomware activity surges GootLoader is back Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ....or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta.…
  continue reading
 
This technical resource is intended for experienced users like embedded engineers and kernel hackers and requires prior knowledge of C programming and Linux commands. The content offers comprehensive instruction on developing Linux drivers for kernel version v5.10 and embedded Linux systems, covering essential topics such as setting up the developm…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley covers the latest threats in the cybersecurity landscape. Highlights include the emergence of the quantum root redirect (QRR) phishing kit, a sophisticated automated phishing platform targeting Microsoft 365 credentials across 90 countries. The hospitality industry is also being hit with a …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play