Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Decrypts Podcasts

show episodes
 
Artwork

1
The Decrypting Crypto Podcast

Matthew Howells-Barby & Austin Knight

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
We highlight the people, products, and protocols shaping the future of crypto, DeFi, and web3. Your hosts, Matthew Howells-Barby and Austin Knight, will take you on a journey of decrypting the various concepts related to blockchain and web3 technology, explaining them in a language that everyone can understand.
  continue reading
 
Artwork

1
gm from Decrypt

Decrypt Media: News about Bitcoin, blockchain, Ethereum, NFTs, Web3

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
gm! Host Stacy Elliott and other Decrypt journalists bring you candid deep-dive conversations with the biggest names in crypto. Get schooled on the latest in Bitcoin, Ethereum, DeFi, NFTs, DAOs, Metaverse, and all things Web3 culture. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Welcome to the Global Intelligence Knowledge Network Podcast, where real-world intelligence expertise meets insightful analysis. Join your host, Neil Bisson, a former Intelligence Officer with the Canadian Security Intelligence Service, for a weekly deep dive into the world of espionage, national security, foreign interference, terrorism, and all matters spy and intelligence related. With over 25 years of experience in intelligence and law enforcement, both domestically and internationally, ...
  continue reading
 
Artwork

1
Talking Success | The Home of Fintech

titc.io (formally TalentintheCloud)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Talking Success: Igniting the Global FinTech Revolution is a riveting podcast powered by titc.io (formally TalentintheCloud) with a laser focus on FinTech. Your host, Darren Franks, takes you on an exhilarating journey, engaging with titans of the industry – the visionaries who are CEOs, Founders, Investors, and Leaders shaping the FinTech landscape - with a special nod to FinTechs in Africa. Immerse yourself in the pulsating heart of the FinTech sector as we unravel its secrets, complexitie ...
  continue reading
 
Artwork
 
解密风云是由BSN国际团队打造的一档深度解析中国区块链、NFT、元宇宙行业政策、行业发展现状及未来趋势的音频节目。本节目主讲人为何亦凡先生,每期将邀请国内外相关领域的专家进行深度对谈。本节目将不定期更新,欢迎海外听众(包括大量华语人群)了解中国监管,获得准确的信息。 “China Decrypted” is a monthly podcast produced by BSN international team to deeply analyse China’s policies on the blockchain, NFT, and Metaverse, as well as industry development status, and future trends. Our host is Mr. Yifan He, CEO of Red Date Technology and Executive Director of BSN Development Association. Each episode will invite an expert worldwide in ...
  continue reading
 
Artwork

1
Foundering

Bloomberg

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Foundering is an award-winning, serialized podcast from the journalists at Bloomberg Technology. Each season, Foundering brings you inside a different high-stakes drama from the technology industry, where its companies are wielding unprecedented capital and power.
  continue reading
 
Welcome to Decrypted, Ars Technica's weekly podcast that follows TV shows like Mr. Robot and Westworld. We'll be diving into the shows in a way only Ars can—which is to say it'll be thorough, we'll talk with experts, and no detail is too minute or nerdy. Mr. Robot S2 starts 7/13/16. Westworld starts 10/2/16.
  continue reading
 
Artwork

1
Caveat

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
  continue reading
 
Artwork

1
Let's Decipher

Tushali Choudhary

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
There are times where we want to decrypt our lives and make it easier and simpler. We all have our ways to sort things out. Some prefer to listen while some wants to be heard. Let's Decipher is a podcast where you would get to listen to a very raw concoction of mind and heart. It is about decoding emotions practically, books, writings and a lot more related life's incidents. It would be enlightening, informal, organic and fun. So, tune for the thought provoking podcasts coming your way.
  continue reading
 
Enter the woods with NO BOOK CLUB: A YELLOWJACKETS PODCAST. Your hosts Matt Latham, Kurt North & A. J. Black deep dive into Showtime's Yellowjackets one episode at a time, with some specials along the way, as they try and decrypt the mystery of a plane crash, a missing football team, and the 90s teenager... A proud part of the Film Stories Podcast Network: www.filmstories.co.uk
  continue reading
 
Artwork

1
Princess and The Big Blue Podcast

Princess and The Big Blue

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
We are Princess and The Big Blue and this is our podcast where we talk about all things that interest us. We decided to start with the subject: Anarchism. When we met The Big Blue was surprised to hear that he considered himself to be an Anarchist, this led to many conversations over the years about anarchism which have been quite enlightening. Over the coming weeks we will delve into some topics on this subject which we hope will decrypt this way of thinking and hopefully inspire a few peop ...
  continue reading
 
Artwork

1
CX...Oh!

Supriya Sharma

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
What would a world illuminated with magical experiences look like, rather feel like? Well, having envisioned it, I curated this customer experience podcast CX...Oh! to help people serve better and concoct experiences that are memorably superlative in nature. Join me, Supriya Sharma, your fond host in making it a reality! Each episode contains didactic information to inspire you to capitalise on the experience ecosystem and sprinkle stardust in your profession, personal life, and community.
  continue reading
 
Artwork

1
Cyber Work

Infosec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
  continue reading
 
In TechMD we delve into the ever-evolving world of healthcare technology. Join us as we explore the latest trends, from AI-powered diagnostics to wearable health trackers. We interview industry leaders, unpack complex topics, and discuss how technology is transforming patient care, empowering individuals, and shaping the future of medicine. Tune in for insightful conversations, practical applications, and thought-provoking discussions that will keep you informed and engaged.
  continue reading
 
Bitcoin groundbreakers share personal stories of how Bitcoin is changing lives for the better. Host Mauricio Di Bartolomeo, co-founder and CSO of Ledn, speaks with leading Bitcoin voices, entrepreneurs, and human rights advocates to hear their unique journey and practical real-world examples of how Bitcoin has made a positive impact in their lives. Brought to you by Ledn, a leading financial services company built for Bitcoin & digital assets. Ledn offers a suite of lending, saving and tradi ...
  continue reading
 
Artwork

51
Security Voices

Security Voices

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
  continue reading
 
Bart Merrell from Monetize your mindset shares ideas and talks with entrepreneurs that have multiple streams of income. Discover how you can have multiple streams of income too by turning the things you are already doing into a stream of income whether you like doing those things are not. We ask these three questions: What do you like to do? What do you need to do? What are you already doing? Let's monetize it. The goal here is to create Financial Security by monetizing what you already know ...
  continue reading
 
Inspired by the latest educational platform in the tax and financial industries, we bring to you the Pilla Tax Academy Podcast! This podcast was specifically created for those that are hungry for information that is not common knowledge to nearly every person in the USA. Whether it is learning how to manage a small business, understanding the importance of mastering your taxes, or tax professional education and resources, this is the place for you. Founded by the world’s foremost authority o ...
  continue reading
 
Loading …
show series
 
Summary In this episode of the Decrypting Crypto podcast, hosts Matthew Howells-Barby and Austin Knight discuss the current state of the cryptocurrency market, review their predictions made at the beginning of the year, and analyze various economic factors influencing the market. They delve into Bitcoin and Ethereum price predictions, the Federal R…
  continue reading
 
Send us a text 🔍 Canada’s Cyber Defences Under Fire | Global Intelligence Weekly Wrap-Up This week on Global Intelligence Weekly Wrap-Up, Neil Bisson — retired CSIS intelligence officer and Director of the Global Intelligence Knowledge Network — examines how espionage, sabotage, and cyber warfare are converging to test the resilience of Western dem…
  continue reading
 
Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
  continue reading
 
This week on Caveat, Dave and Ben welcome back N2K’s own ⁠⁠⁠⁠⁠Ethan Cook⁠⁠⁠⁠⁠ for our latest policy deep dive segment. As our lead analyst, Ethan shares his knowledge of law, privacy, and surveillance on the latest policy developments shaping the cybersecurity and legal landscape. While this show covers legal topics, and Ben is a lawyer, the views …
  continue reading
 
webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
  continue reading
 
What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
  continue reading
 
Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
  continue reading
 
Forensic expert Heather Barnhart (SANS Institute) decoded Osama Bin Laden's phones and helped convict quadruple murderer Brian Kohberger. Learn how surviving her own harassment fueled her mission, plus the digital "pattern of life" hack and simple steps to combat AI deepfakes and stay safe online. Learn more about your ad choices. Visit megaphone.f…
  continue reading
 
Regulation is a double-edged sword. While it helps create structure, establish accountability, and set standards, it also creates unnecessary hurdles, slower response times, and overly rigid systems. With every administration, policy goals and subsequently regulatory stances change, which can have major impacts on business operations. In this episo…
  continue reading
 
Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/32384 AWS Outages AWS has had issues most of the day on Monday, affecting numerous services. http…
  continue reading
 
Send us a text In this episode, of Talking Success, Darren Franks sat down with Pauline Molloyi - Chief Product and Information Officer at OM Bank, to unpack what it looks like behind the scenes of their journey (Part 1) Pauline Molloyi's LinkedIn: https://www.linkedin.com/in/pauline-molloyi-7b76891/ OM Bank's Website: https://www.oldmutual.co.za/b…
  continue reading
 
TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Videos%20Promoting%20Malware%20Installation/32380 Google Ads Advertise Malware Targeting MacOS Developers Hun…
  continue reading
 
Send us a text 🔍 Chinese Espionage Targets Hydro-Québec | Global Intelligence Weekly Wrap-Up This week on Global Intelligence Weekly Wrap-Up, Neil Bisson — retired CSIS intelligence officer and Director of the Global Intelligence Knowledge Network — examines how espionage, secrecy, and accountability are colliding across the intelligence world. 🇨🇦 …
  continue reading
 
New DShield Support Slack Workspace Due to an error on Salesforce s side, we had to create a new Slack Workspace for DShield support. https://isc.sans.edu/diary/New%20DShield%20Support%20Slack/32376 Attackers Exploiting Recently Patched Cisco SNMP Flaw (CVE-2025-20352) Trend Micro published details explaining how attackers took advantage of a recen…
  continue reading
 
Summary In this episode, hosts Matthew Howells-Barby and Austin Knight discuss the recent significant market crash in the crypto space, dubbed 'Crypto's Black Friday.' They analyze the causes of the crash, including the unprecedented $19 billion in liquidations and the role of perpetual futures contracts. The conversation also touches on the influe…
  continue reading
 
This week, while Dave is on vacation, Ben Yelin, and Ethan Cook, N2K's Lead Analyst and editor of the Caveat newsletter, take the lead and share their stories. Ben's story is on the legal and ethical issues surrounding Sora, the tool being used to make AI-powered videos of deceased celebrities. Ethan covers the story about Taiwan’s security bureau …
  continue reading
 
Clipboard Image Stealer Xavier presents an infostealer in Python that steals images from the clipboard. https://isc.sans.edu/diary/Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer/32372 F5 Compromise F5 announced a wide-ranging compromise today. Source code and information about unpatched vulnerabilities were stolen. https://my.f5.co…
  continue reading
 
Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivanti Advisory Ivanti released an advisory with some mitigation steps users can take until the recently m…
  continue reading
 
Send us a text In this episode of Talking Success, The Best Fintech Podcast, Darren Franks sat down with Jim Marous- global banking influencer, co-publisher of The Financial Brand, host of Banking Transformed, and one of the most respected voices in digital banking. For decades, traditional banking has relied on physical presence - branches, teller…
  continue reading
 
Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
  continue reading
 
Marketing visionary Seth Godin explains how the Internet got hijacked by an attention-stealing spam economy that keeps us in an endless loop of badly targeted marketing. Godin's anti-spam playbook: demand companies earn your attention with awesomeness, and break the digital slop loop that broke the Internet. Learn more about your ad choices. Visit …
  continue reading
 
Scans for ESAFENET CDG V5 We do see some increase in scans for the Chinese secure document management system, ESAFENET. https://isc.sans.edu/diary/Heads%20Up%3A%20Scans%20for%20ESAFENET%20CDG%20V5%20/32364 Investigating targeted payroll pirate attacks affecting US universities Microsoft wrote about how payroll pirates redirect employee paychecks vi…
  continue reading
 
New Oracle E-Business Suite Patches Oracle released one more patch for the e-business suite. Oracle does not state if it is already exploited, but the timing of the patch suggests that it should be expedited. https://www.oracle.com/security-alerts/alert-cve-2025-61884.html Widespread Sonicwall SSLVPN Compromise Huntress Labs observed the widespread…
  continue reading
 
Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to…
  continue reading
 
Will Daugherty, US Head of Norton Rose Fulbright's Cybersecurity practice, discussing the upcoming expiration of CISA 2015. Ben discusses Apple’s decision to remove the ICEBlock app after pressure from the White House. Dave's got the story of the Secretary of Defense dialing back cyber training fro troops. While this show covers legal topics, and B…
  continue reading
 
Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnerability A user cloning a git repository may be tricked into executing arbitrary code via…
  continue reading
 
Oracle E-Business Suite 0-Day CVE-2025-61882 Last week, the Cl0p ransomware gang sent messages to many businesses stating that an Oracle E-Business Suite vulnerability was used to exfiltrate data. Initially, Oracle believed the root cause to be a vulnerability patched in June, but now Oracle released a patch for a new vulnerability. https://www.ora…
  continue reading
 
Send us a text 🚨🌍 This week on the Global Intelligence Weekly Wrap-Up 🎙️ From London to Manchester, Berlin to Ottawa, the headlines tell a chilling story: espionage, sabotage, foreign interference, and terrorism are no longer distant threats — they are reshaping our democracies right now. ⚖️ In the UK, Crown Prosecutors made history by charging a C…
  continue reading
 
More .well-known scans Attackers are using API documentation automatically published in the .well-known directory for reconnaissance. https://isc.sans.edu/diary/More%20.well-known%20Scans/32340 RedHat Patches Openshift AI Services A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, fo…
  continue reading
 
In this episode, Matthew Howells-Barby and Austin Knight explore the latest trends in the crypto world, focusing on the phenomenon of 'Uptober,' the competitive landscape of perpetual swaps, and the emerging intersection of AI and cryptocurrency. They discuss market dynamics, regulatory challenges, and the potential future of these technologies.…
  continue reading
 
Sarah Graham from the Atlantic Council’s Cyber Statecraft Initiative (CSI) discussing their work and findings on "Mythical Beasts: Diving into the depths of the global spyware market." Ben has the story of law enforcement agencies increasingly relying on AI to synthesize digital evidence. Dave's got the story of the Secretary of Commerce pressuring…
  continue reading
 
Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/…
  continue reading
 
Sometimes you don t even need to log in Applications using simple, predictable cookies to verify a user s identity are still exploited, and relatively recent vulnerabilities are still due to this very basic mistake. https://isc.sans.edu/diary/%22user%3Dadmin%22.%20Sometimes%20you%20don%27t%20even%20need%20to%20log%20in./32334 Western Digital My Clo…
  continue reading
 
Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
  continue reading
 
Former federal prosecutor Tom O’Malley takes us inside the strange, high-stakes world of modern fraud—where victims are presumed guilty, families lose fortunes, and the fight against global crime rings starts at home. Three lessons that could make a difference. Voting: https://vote.signalaward.com/PublicVoting?utm_campaign=signal4_finalists_finalis…
  continue reading
 
Kindbody, one of the largest fertility companies in the US, sought to disrupt egg freezing and IVF by combining spa vibes with Silicon Valley efficiency. The startup raised millions, opened dozens of clinics, and became a billion-dollar unicorn. But its ambition came with consequences. In IVF Disrupted: The Kindbody Story, reporter Jackie Davalos t…
  continue reading
 
Apple Patches Apple released patches for iOS, macOS, and visionOS, fixing a single font parsing vulnerability https://isc.sans.edu/diary/Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400/32330 Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400). Our honeypots detected an increase in scans for a Palo Alto Global Prot…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play