🌍📶 eSIMo.io Comprehensive eSIM Guide https://esimo.onelink.me/MYeR/esimsupply Dive into the world of eSIM technology with our comprehensive eSIMo.io guide. This playlist covers everything from basic concepts to advanced applications, providing you with the knowledge to navigate and utilize eSIMo.io effectively. Whether you’re a beginner looking to understand the fundamentals or a professional seeking in-depth insights, this guide has you covered. Get your eSIM today https://esimo.onelink.me/ ...
…
continue reading
ESim Podcasts
The Uncannies follows three YouTubers who explore haunted places in search of clicks and thrills… until they uncover something they can’t explain. It’s spooky. It’s funny. It’s addictive. Brought to you by GoMoWorld, the eSIM that keeps you connected, even in places you probably shouldn’t be.
…
continue reading
eSIM Guide 2025: Everything You Need to Know In 2025, eSIM technology is revolutionizing the way we connect to mobile networks. Whether you’re a frequent traveler, a business professional, or a tech enthusiast, eSIM is making it easier and more convenient than ever to stay connected globally. In this guide, we’ll dive into everything you need to know about eSIM, including how it works, its benefits, how to activate it, and how to get the most out of it in 2025.
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
Telgoo5 Talks offers in‑depth explorations of mobile wireless services and the technologies powering global connectivity. From groundbreaking 5G and eSIM innovations to advanced SaaS billing platforms, cloud‑native architectures, and MVNO strategies, each episode unpacks the critical trends reshaping the industry. You’ll hear from leading experts, dive into real‑world case studies, and gain thoughtful analysis of regulatory shifts, market dynamics, and emerging opportunities. We cover everyt ...
…
continue reading
Embark on your journeys with confidence using Maaltalk Travel eSIM, your gateway to unparalleled connectivity. As the No.1 choice for local carrier networks, we ensure that you experience lightning-fast 5G data speeds anytime, anywhere. Stay effortlessly connected with our best-in-class cost-effective global eSIM, a favorite among heavy data users. Choose from our daily fixed eSIM options or explore the convenience of our Local Regional eSIMs. Maaltalk eSIM Store is your key to seamless and ...
…
continue reading
Dive into the cutting-edge world of IoT with "The Innovators of Things," a podcast series that profiles the builders and leaders of connected devices. Hosted by Jillian Kaplan, this series offers listeners an insider's look at the innovations and challenges shaping our connected future. Whether you're a tech enthusiast or an industry professional, "The Innovators of Things" is your source for inspiration and insight into the ever-evolving landscape of IoT. Join us to explore how these vision ...
…
continue reading
Every week Richard and Ben explore what opened their eyes, share travel tips, discuss listener feedback and debate conundrums in 12 and a half minutes. Join us!
…
continue reading
Tune into the Internet of Things. In this podcast IoT Insiders' editor digs into the world of IoT; an ever-changing swarth of industry experts with each episodes, IoT Unplugged promises to be an equally informative and intriguing auditory journey that will keep its listeners up to date with all the issues surrounding IoT today and tomorrow.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Contra* is a podcast about disability, design justice, and the lifeworld. Episodes will feature interviews, analyses of the built environment, reviews, and more. Visit cirticaldesignlab.com for more information.
…
continue reading
http://rizkyprawinto.com
…
continue reading
The weekly nerdiest podcast with episodes that cover a variety of discussions. Mobile Tech Telecom, 80s - 90s Gaming, Movies Discussions.
…
continue reading
My name is Author Adidas Wilson and traveling has always been a passion of mine. The thrill of discovering new places, meeting new people, and experiencing different cultures is what drives me to pack my bags and hit the road. Whether it’s a budget trip to a nearby city or a luxury vacation to a far-off destination, I find joy in the journey and the adventure. I love the excitement of planning a trip, researching the best places to visit, and choosing the perfect itinerary. I also enjoy the ...
…
continue reading
Are you a nutritional therapist or a student of nutritional therapy? The IHCAN magazine Podcast delivers the expert education, insights, and inspiration you love from our magazine and events—all in a digestible 45-minute format. Hosted by Kirsten Chick, a nutritional therapist with 20 years of experience in clinical practice, teaching, writing, and leading workshops. Brought to you in collaboration with IHCAN magazine, IHCAN Conferences, and the IHCAN Summit.
…
continue reading
Doing more with iPad. Check out ipadguild.com
…
continue reading
Mobile-tech talk and lame jokes from the informative yet unrefined team at Pocketnow. Covering smartphones, tablets, wearables and other gadgets you dreamed of owning when you were young. Stitcher Award winner: Best Technology Podcast, 2013
…
continue reading
Подкаст про айти: сервисы, приложения и гаджеты. Много говорим про продукты Facebook, Apple, Amazon, Google и Microsoft. Иногда затрагиваем темы разработки и жизни в Сан-Франциско, Нью-Йорке и Москве. Телеграм канал: https://t.me/esnippet Support this podcast: https://podcasters.spotify.com/pod/show/esnippet/support
…
continue reading
With "The Counterpoint Podcast" we aim to deliver deeper and unique, fact-based insights on various industry trends and topics in multiple engaging ways.
…
continue reading
English Touring Theatre is one of the UK's most successful and exciting production companies, widely regarded as England's National Theatre of Touring. Led by Director Richard Twyman, the company works with leading artists to stage an eclectic mix of new and classic work for audiences throughout the UK and overseas; theatre that is thrilling, popular and, above all, entertaining.
…
continue reading

1
008 - bcc goes viral, eSims, listener feedback gets dangerous and what to do with that bunch of old computer cables you never use.
15:02
15:02
Play later
Play later
Lists
Like
Liked
15:02Richard and Ben analyse the feedback received from dangerous species Ben is not scared of…..and get even more scared in the process. Ben asks what does “going viral” even mean and shares a great tip to save money on mobile network charges while travelling. Richard then shares how to handle that bunch of old computer cables you have no idea what to …
…
continue reading

1
Cracking eSIM: Exposing the Hidden Threats in Next-Gen Mobile Security
16:43
16:43
Play later
Play later
Lists
Like
Liked
16:43eSIM technology has transformed the way we connect—but has it also introduced new vulnerabilities into the heart of modern telecommunications? In this deep-dive episode, we dissect the security architecture, remote provisioning systems, and critical attack surfaces of embedded SIM (eSIM) technology, now deployed in billions of mobile, consumer, and…
…
continue reading

1
Risky Bulletin: Two billion eSIMs receive crucial security patch
8:20
8:20
Play later
Play later
Lists
Like
Liked
8:20Two billion eSIMs receive crucial security patches, China’s cyber militias go on the offensive, four Scattered Spider members detained over UK retail attacks, and a Russian basketball player is arrested in a ransomware case. Show notes
…
continue reading

1
How to Save Money While Traveling in 2025 with eSIM Technology
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43In this episode we break down how smart travelers are saving big in 2025 using eSIM technology. 🎁 Use coupon code BUYESIM save 20% OFF on first order visit : https://esimo.onelink.me/MYeR/rdtravel No more roaming fees no more SIM card stress. We’ll explain how eSIMs work why they’re cheaper and how services like eSIMo.io help you stay connected in …
…
continue reading

1
Risky Bulletin: Russia's Aeroflot cancels flights after hack
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37Russia’s national airline cancels more than 100 flights following a cyberattack, the FBI seizes $2.4 million from the Chaos ransomware, Kazakhstan arrests a ransomware suspect, and Kyrgyzstan nationalizes internet access. Show notes Risky Bulletin: US seizes Chaos ransomware funds
…
continue reading

1
1.1 Million Private Messages Leaked: Inside the Tea App Privacy Disaster
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58A platform designed to protect women’s safety in dating has instead become a nightmare for its users. In this episode, we uncover the catastrophic Tea app data breach, which exposed more than 59 GB of highly sensitive user data due to a fundamental security failure: a completely public Firebase storage bucket with no authentication, no encryption, …
…
continue reading

1
Job Scams, Corporate Espionage, and Digital Deception: Inside the Deepfake Crisis
1:16:30
1:16:30
Play later
Play later
Lists
Like
Liked
1:16:30Deepfake technology has evolved from a fringe novelty into one of the most serious cybersecurity and national security threats of our time. In this episode, we examine how artificial intelligence–generated synthetic media is being weaponized to impersonate CEOs, manipulate elections, infiltrate corporate networks, and damage reputations worldwide. …
…
continue reading

1
Microsoft Exposes Major macOS Flaws in Transparency, Consent, and Control
1:23:13
1:23:13
Play later
Play later
Lists
Like
Liked
1:23:13In this episode, we dive deep into Microsoft Threat Intelligence’s latest findings on two critical macOS vulnerabilities that shook Apple’s privacy defenses. The flaws, identified as CVE-2025-31199 (Sploitlight) and CVE-2024-44133 (HM Surf), specifically targeted Apple’s Transparency, Consent, and Control (TCC) framework, the system designed to gua…
…
continue reading

1
Aeroflot in Chaos: How Hackers Crippled Russia’s Flagship Airline
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25On July 28, 2025, Aeroflot—Russia’s largest state-owned airline—was brought to its knees in one of the most severe cyberattacks since the country’s invasion of Ukraine in 2022. The sophisticated assault, carried out by Ukrainian hacktivist group Silent Crow and the Belarusian Cyber-Partisans, led to the cancellation of more than 100 flights, strand…
…
continue reading

1
Neferpitou Claims Cyberattack on French Naval Defense Giant
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17French defense contractor Naval Group, a cornerstone of Europe’s naval defense industry, is facing a high-stakes cybersecurity crisis. A threat actor known as “Neferpitou” claims to have exfiltrated 1TB of sensitive data, including combat management system (CMS) source code for submarines and frigates, technical documents, developer virtual machine…
…
continue reading

1
Root Evidence Launches With $12.5M to Redefine Vulnerability Management
36:51
36:51
Play later
Play later
Lists
Like
Liked
36:51In July 2025, a team of seasoned cybersecurity leaders launched Root Evidence, a Boise-based startup with a mission to revolutionize how organizations tackle vulnerability management. Armed with $12.5 million in seed funding led by Ballistic Ventures, founders Jeremiah Grossman, Robert Hansen, Heather Konold, and Lex Arquette are setting out to fix…
…
continue reading

1
NASCAR Hit by Medusa Ransomware: 1TB of Data Stolen in April 2025 Cyberattack
41:21
41:21
Play later
Play later
Lists
Like
Liked
41:21In April 2025, NASCAR became the latest victim of a major cyberattack, with hackers infiltrating its network between March 31 and April 3. During the breach, personal information—including names and Social Security numbers—was exfiltrated from NASCAR’s systems. In response, the organization has notified affected individuals, activated its incident …
…
continue reading

1
Scattered Spider Strikes Again: Inside the VMware ESXi Ransomware Tactics
55:59
55:59
Play later
Play later
Lists
Like
Liked
55:59In this episode, we examine the sophisticated operations of Scattered Spider—also known as Muddled Libra, UNC3944, and Octo Tempest—a financially motivated cybercriminal group that has redefined the ransomware threat landscape. Recently highlighted by Google’s Threat Intelligence Group (GTIG), Scattered Spider has escalated its attacks by targeting…
…
continue reading

1
Risky Bulletin: Microsoft investigates MAPP leak
5:23
5:23
Play later
Play later
Lists
Like
Liked
5:23Microsoft investigates a MAPP leak as the source of the SharePoint zero-day, US law enforcement takes down the BlackSuit ransomware portal, an Arizona woman is imprisoned for running a North Korean laptop farm, and Allianz life insurance suffers a security breach. Show notes
…
continue reading

1
Sponsored: Nucleus Security on the evolution of vulnerability management
19:14
19:14
Play later
Play later
Lists
Like
Liked
19:14In this sponsored interview, Nucleus Security co-founder and COO, Scott Kuffer joins Casey Ellis to chat about how vulnerability management evolved into quite a lot more than just patch prioritization. Show notes
…
continue reading

1
Koske Malware Hides in Panda Images, Weaponizes AI to Target Linux
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03A new and highly sophisticated malware strain named Koske is redefining the threat landscape for Linux environments. Suspected to be partially developed using artificial intelligence, Koske introduces novel and highly evasive techniques, blending image files, rootkits, and adaptive cryptomining logic to create a stealthy and persistent backdoor int…
…
continue reading

1
Operation Checkmate: BlackSuit Ransomware’s Dark Web Sites Seized
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19BlackSuit, the ransomware strain known for crippling critical sectors and demanding multi-million dollar payouts, has just suffered a devastating blow. In a coordinated international law enforcement operation codenamed "Operation Checkmate," authorities—including the U.S. Department of Justice, Homeland Security Investigations, FBI, Europol, the UK…
…
continue reading

1
Coyote Malware Exploits Microsoft UI Automation in First-Ever Wild Attack
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14A new banking trojan called Coyote has emerged as a groundbreaking cyber threat, becoming the first known malware in the wild to exploit Microsoft’s User Interface Automation (UIA) framework—an accessibility tool originally designed to help users interact with Windows interfaces. But in the hands of attackers, UIA becomes a weapon of stealth and pr…
…
continue reading

1
No Fix Coming: Remote Code Execution Flaw in 1,300 LG Security Cameras
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12A newly disclosed critical vulnerability, CVE-2025-7742, is putting hundreds of LG Innotek LNV5110R security cameras at risk around the world—including within critical infrastructure. This high-severity authentication bypass flaw allows remote attackers to gain full administrative control without credentials, giving them access to live camera feeds…
…
continue reading

1
Risky Bulletin: Microsoft rolls out linkable token identifiers to help IR teams
7:02
7:02
Play later
Play later
Lists
Like
Liked
7:02Microsoft rolls out better logging for incident responders, the SharePoint hacking spree hits major US agencies, Ukraine arrests the admin of a well-known hacking forum, and China launches a national Digital ID system. Show notes
…
continue reading

1
ToolShell Exploited: China-Linked Hackers Breach NNSA and U.S. Government Networks
1:14:36
1:14:36
Play later
Play later
Lists
Like
Liked
1:14:36In one of the most concerning state-sponsored cyber incidents of the year, Chinese hackers exploited zero-day vulnerabilities in Microsoft SharePoint to breach the networks of the National Nuclear Security Administration (NNSA)—the U.S. agency responsible for managing the nation's nuclear arsenal. The attackers, part of a suspected Chinese state-sp…
…
continue reading

1
Massive NPM Breach: Malicious Packages Spread via Compromised Maintainer Accounts
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44In this episode, we expose the alarming supply chain attack that compromised millions of JavaScript projects across the globe. This sophisticated breach targeted the NPM ecosystem, infecting widely-used packages like eslint-config-prettier and is, through a coordinated phishing campaign and the exploitation of non-expiring legacy access tokens. Att…
…
continue reading

1
Clorox Sues Cognizant Over $356M Cyberattack: Who's Really to Blame?
44:38
44:38
Play later
Play later
Lists
Like
Liked
44:38In one of the most dramatic cybersecurity legal battles of the past year, Clorox has filed a lawsuit against IT services giant Cognizant, accusing the company of gross negligence that allegedly enabled a catastrophic 2023 cyberattack. The breach wreaked havoc on Clorox's operations—causing widespread product shortages, a multibillion-dollar hit to …
…
continue reading

1
HeroDevs Secures $125M to Extend Life of Critical Open Source Software
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36In this episode, we dive deep into HeroDevs' recent $125 million strategic growth investment, a move that signals a major expansion in the fight against the vulnerabilities of end-of-life (EOL) open source software. Based in Salt Lake City, HeroDevs has carved out a critical niche—providing "Never-Ending Support" (NES) to ensure security, complianc…
…
continue reading

1
UK Moves to Ban Ransomware Payments for Public Sector and Critical Infrastructure
48:22
48:22
Play later
Play later
Lists
Like
Liked
48:22In a landmark move to disrupt the financial engine powering ransomware attacks, the United Kingdom is pushing forward with legislation that would ban ransom payments across the public sector and critical national infrastructure (CNI). This sweeping proposal covers everything from local councils and schools to healthcare providers like the NHS, aimi…
…
continue reading

1
New SysAid Vulnerabilities Added to CISA’s KEV List: XXE Flaws Could Enable RCE
26:10
26:10
Play later
Play later
Lists
Like
Liked
26:10Two newly added vulnerabilities in SysAid’s On-Prem IT support software — CVE-2025-2775 and CVE-2025-2776 — have officially joined the Cybersecurity and Infrastructure Security Agency (CISA)’s Known Exploited Vulnerabilities (KEV) catalog, signaling increased concern around their potential abuse. While there are no confirmed reports of public explo…
…
continue reading

1
Lumma Stealer Returns: Malware-as-a-Service Resurges After Global Takedown
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16In this episode, we unpack the rapid and concerning resurgence of Lumma Stealer, a sophisticated Malware-as-a-Service (MaaS) platform, just months after a major international takedown. Despite Microsoft, the FBI, Europol, and global partners dismantling over 2,500 malicious domains and seizing critical infrastructure in May 2025, Lumma Stealer has …
…
continue reading

1
Cisco ISE Critical Flaws Now Actively Exploited: No Workarounds, Just Root Access
37:32
37:32
Play later
Play later
Lists
Like
Liked
37:32Hackers are actively exploiting a trio of critical zero-day vulnerabilities in Cisco’s Identity Services Engine (ISE) and Passive Identity Connector (ISE-PIC), prompting urgent patching directives from the company. The flaws — CVE-2025-20281, CVE-2025-20282, and CVE-2025-20337 — each carry a maximum CVSS severity score of 10.0, indicating the highe…
…
continue reading
🎧 IoT Unplugged Season 6, Episode 9 is now live — tune in! ⏰ In Episode 9, Caitlin Gittins, Editor at IoT Insider, sits down with Fabio Zaniboni, Founder and CEO of BubblyNet, to discuss an overview of the smart building market.By IoT insider
…
continue reading
Camila discovers important things about the strange neighbor...By The Uncannies
…
continue reading

1
Risky Bulletin: Three Chinese APTs are behind the SharePoint zero-day attacks
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41Three Chinese APTs are behind the recent SharePoint zero-day attacks, the UK wants to ban the public sector from paying ransoms, Russia takes down a malware operation, and South Korea charges airline employees over selling celebrity data. Show notes
…
continue reading

1
ToolShell: SharePoint Zero-Day Chain Gives Hackers Full Remote Access
58:23
58:23
Play later
Play later
Lists
Like
Liked
58:23A new wave of zero-day attacks—collectively known as ToolShell—is actively targeting Microsoft SharePoint servers, with two vulnerabilities (CVE-2025-53770 and CVE-2025-53771) allowing unauthenticated remote code execution and identity control bypass. First observed in high-value targets across government, critical infrastructure, and manufacturing…
…
continue reading

1
CVE-2025-54309: CrushFTP Zero-Day Exploited in Global Admin Access Attacks
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13A critical zero-day vulnerability in CrushFTP (CVE-2025-54309) is being actively exploited, giving attackers administrative access to over a thousand unpatched servers globally. This severe security flaw—caused by improper validation in the AS2 protocol—has exposed enterprise-managed file transfer (MFT) systems across the US, Europe, and Canada. Se…
…
continue reading

1
Dell Breach by World Leaks: Extortion Attempt Hits Demo Platform
23:49
23:49
Play later
Play later
Lists
Like
Liked
23:49Dell Technologies is the latest target in a growing trend of data extortion attacks as threat actors pivot away from traditional ransomware. The cybercrime group known as World Leaks—a rebrand of the former Hunters International gang—has claimed responsibility for breaching Dell’s Customer Solution Centers (CSC), a sandbox environment used primaril…
…
continue reading

1
Critical VPN Vulnerability: ExpressVPN Exposed IPs via RDP Misrouting
59:16
59:16
Play later
Play later
Lists
Like
Liked
59:16A critical vulnerability in ExpressVPN’s Windows client has put a spotlight on the often-overlooked dangers of debug code making its way into production software. This episode dives into how a debug configuration error allowed Remote Desktop Protocol (RDP) traffic to bypass the VPN tunnel, potentially exposing users’ real IP addresses and compromis…
…
continue reading

1
Dior Data Breach Exposes U.S. Customer Info in LVMH Vendor Attack
41:11
41:11
Play later
Play later
Lists
Like
Liked
41:11In this episode, we unpack the January 2025 data breach at Dior, the iconic luxury fashion house, which exposed sensitive personal information of U.S. customers—including names, addresses, and even Social Security and passport numbers. Although payment data remained secure, the incident's impact is substantial, both in terms of customer trust and c…
…
continue reading

1
StrongestLayer Raises $5.2M to Fight AI-Powered Phishing with TRACE
52:49
52:49
Play later
Play later
Lists
Like
Liked
52:49In an era where generative AI is being used not just for productivity but for precision cybercrime, a San Francisco-based startup, StrongestLayer, is taking a bold stand. Backed by $5.2 million in seed funding from Sorenson Capital and others, the company is pioneering a radically new approach to cybersecurity with its AI-native platform TRACE (Thr…
…
continue reading

1
Between Two Nerds: How China's cyber militia make sense
33:20
33:20
Play later
Play later
Lists
Like
Liked
33:20In this edition of Between Two Nerds Tom Uren and The Grugq discuss whether China’s ‘cyber militia’ make sense and what they could be good for. This episode is also available on Youtube. Show notes Mobilizing Cyber Power: The Growing Role of Cyber Militias in China’s Network Warfare Force Structure
…
continue reading

1
750,000 Records Exposed: Inside the TADTS Data Breach by BianLian
1:03:29
1:03:29
Play later
Play later
Lists
Like
Liked
1:03:29In July 2024, The Alcohol & Drug Testing Service (TADTS), a Texas-based company handling sensitive employment-related data, suffered a catastrophic data breach. Nearly 750,000 individuals had personal information compromised—Social Security numbers, financial data, driver’s licenses, health insurance info, and even biometric identifiers. The attack…
…
continue reading

1
SS7 Is Still Broken: How Surveillance Firms Are Bypassing Telco Defenses
50:12
50:12
Play later
Play later
Lists
Like
Liked
50:12A new attack technique is exposing just how vulnerable global mobile networks remain in 2025. Cybersecurity firm Enea has discovered a surveillance operation that bypasses SS7 firewalls by exploiting a subtle weakness in the TCAP encoding layer—allowing stealth location tracking of mobile users across borders. The method? Tampering with the IMSI fi…
…
continue reading

1
Risky Bulletin: Iranian security firm behind airline hacking spree
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07An Iranian security firm is behind an airline hacking spree, Chinese hackers breach Singapore’s critical infrastructure, new SharePoint and CrushFTP zero-days are being used in the wild, and Japan releases free ransomware decrypters. Show notes
…
continue reading

1
Sponsored: Haroon Meer's secret to business success is… love
20:53
20:53
Play later
Play later
Lists
Like
Liked
20:53In this Risky Business sponsored interview, Thinkst Canary CEO Haroon Meer chats to Casey Ellis about the company’s impressive growth over the past decade, and how it approached that path a little differently to other firms. Haroon’s advice for young startup founders: Is your problem worth solving? And can you actually solve it? And… Love your cust…
…
continue reading