Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

ESim Podcasts

show episodes
 
🌍📶 eSIMo.io Comprehensive eSIM Guide https://esimo.onelink.me/MYeR/esimsupply Dive into the world of eSIM technology with our comprehensive eSIMo.io guide. This playlist covers everything from basic concepts to advanced applications, providing you with the knowledge to navigate and utilize eSIMo.io effectively. Whether you’re a beginner looking to understand the fundamentals or a professional seeking in-depth insights, this guide has you covered. Get your eSIM today https://esimo.onelink.me/ ...
  continue reading
 
Artwork

1
The Uncannies

The Uncannies

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Uncannies follows three YouTubers who explore haunted places in search of clicks and thrills… until they uncover something they can’t explain. It’s spooky. It’s funny. It’s addictive. Brought to you by GoMoWorld, the eSIM that keeps you connected, even in places you probably shouldn’t be.
  continue reading
 
eSIM Guide 2025: Everything You Need to Know In 2025, eSIM technology is revolutionizing the way we connect to mobile networks. Whether you’re a frequent traveler, a business professional, or a tech enthusiast, eSIM is making it easier and more convenient than ever to stay connected globally. In this guide, we’ll dive into everything you need to know about eSIM, including how it works, its benefits, how to activate it, and how to get the most out of it in 2025.
  continue reading
 
Telgoo5 Talks offers in‑depth explorations of mobile wireless services and the technologies powering global connectivity. From groundbreaking 5G and eSIM innovations to advanced SaaS billing platforms, cloud‑native architectures, and MVNO strategies, each episode unpacks the critical trends reshaping the industry. You’ll hear from leading experts, dive into real‑world case studies, and gain thoughtful analysis of regulatory shifts, market dynamics, and emerging opportunities. We cover everyt ...
  continue reading
 
Embark on your journeys with confidence using Maaltalk Travel eSIM, your gateway to unparalleled connectivity. As the No.1 choice for local carrier networks, we ensure that you experience lightning-fast 5G data speeds anytime, anywhere. Stay effortlessly connected with our best-in-class cost-effective global eSIM, a favorite among heavy data users. Choose from our daily fixed eSIM options or explore the convenience of our Local Regional eSIMs. Maaltalk eSIM Store is your key to seamless and ...
  continue reading
 
Dive into the cutting-edge world of IoT with "The Innovators of Things," a podcast series that profiles the builders and leaders of connected devices. Hosted by Jillian Kaplan, this series offers listeners an insider's look at the innovations and challenges shaping our connected future. Whether you're a tech enthusiast or an industry professional, "The Innovators of Things" is your source for inspiration and insight into the ever-evolving landscape of IoT. Join us to explore how these vision ...
  continue reading
 
Artwork

1
IoT Unplugged

IoT insider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Tune into the Internet of Things. In this podcast IoT Insiders' editor digs into the world of IoT; an ever-changing swarth of industry experts with each episodes, IoT Unplugged promises to be an equally informative and intriguing auditory journey that will keep its listeners up to date with all the issues surrounding IoT today and tomorrow.
  continue reading
 
Artwork

1
Contra*

Aimi Hamraie

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Contra* is a podcast about disability, design justice, and the lifeworld. Episodes will feature interviews, analyses of the built environment, reviews, and more. Visit cirticaldesignlab.com for more information.
  continue reading
 
Artwork

1
NomadTreneur

Author Adidas Wilson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
My name is Author Adidas Wilson and traveling has always been a passion of mine. The thrill of discovering new places, meeting new people, and experiencing different cultures is what drives me to pack my bags and hit the road. Whether it’s a budget trip to a nearby city or a luxury vacation to a far-off destination, I find joy in the journey and the adventure. I love the excitement of planning a trip, researching the best places to visit, and choosing the perfect itinerary. I also enjoy the ...
  continue reading
 
Are you a nutritional therapist or a student of nutritional therapy? The IHCAN magazine Podcast delivers the expert education, insights, and inspiration you love from our magazine and events—all in a digestible 45-minute format. Hosted by Kirsten Chick, a nutritional therapist with 20 years of experience in clinical practice, teaching, writing, and leading workshops. Brought to you in collaboration with IHCAN magazine, IHCAN Conferences, and the IHCAN Summit.
  continue reading
 
Mobile-tech talk and lame jokes from the informative yet unrefined team at Pocketnow. Covering smartphones, tablets, wearables and other gadgets you dreamed of owning when you were young. Stitcher Award winner: Best Technology Podcast, 2013
  continue reading
 
Artwork

1
Вечерний Сниппет

Вечерний Сниппет

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Подкаст про айти: сервисы, приложения и гаджеты. Много говорим про продукты Facebook, Apple, Amazon, Google и Microsoft. Иногда затрагиваем темы разработки и жизни в Сан-Франциско, Нью-Йорке и Москве. Телеграм канал: https://t.me/esnippet Support this podcast: https://podcasters.spotify.com/pod/show/esnippet/support
  continue reading
 
Artwork

1
The Othello Project

English Touring Theatre

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
English Touring Theatre is one of the UK's most successful and exciting production companies, widely regarded as England's National Theatre of Touring. Led by Director Richard Twyman, the company works with leading artists to stage an eclectic mix of new and classic work for audiences throughout the UK and overseas; theatre that is thrilling, popular and, above all, entertaining.
  continue reading
 
Loading …
show series
 
Richard and Ben analyse the feedback received from dangerous species Ben is not scared of…..and get even more scared in the process. Ben asks what does “going viral” even mean and shares a great tip to save money on mobile network charges while travelling. Richard then shares how to handle that bunch of old computer cables you have no idea what to …
  continue reading
 
eSIM technology has transformed the way we connect—but has it also introduced new vulnerabilities into the heart of modern telecommunications? In this deep-dive episode, we dissect the security architecture, remote provisioning systems, and critical attack surfaces of embedded SIM (eSIM) technology, now deployed in billions of mobile, consumer, and…
  continue reading
 
In this episode we break down how smart travelers are saving big in 2025 using eSIM technology. 🎁 Use coupon code BUYESIM save 20% OFF on first order visit : https://esimo.onelink.me/MYeR/rdtravel No more roaming fees no more SIM card stress. We’ll explain how eSIMs work why they’re cheaper and how services like eSIMo.io help you stay connected in …
  continue reading
 
A platform designed to protect women’s safety in dating has instead become a nightmare for its users. In this episode, we uncover the catastrophic Tea app data breach, which exposed more than 59 GB of highly sensitive user data due to a fundamental security failure: a completely public Firebase storage bucket with no authentication, no encryption, …
  continue reading
 
Deepfake technology has evolved from a fringe novelty into one of the most serious cybersecurity and national security threats of our time. In this episode, we examine how artificial intelligence–generated synthetic media is being weaponized to impersonate CEOs, manipulate elections, infiltrate corporate networks, and damage reputations worldwide. …
  continue reading
 
In this episode, we dive deep into Microsoft Threat Intelligence’s latest findings on two critical macOS vulnerabilities that shook Apple’s privacy defenses. The flaws, identified as CVE-2025-31199 (Sploitlight) and CVE-2024-44133 (HM Surf), specifically targeted Apple’s Transparency, Consent, and Control (TCC) framework, the system designed to gua…
  continue reading
 
On July 28, 2025, Aeroflot—Russia’s largest state-owned airline—was brought to its knees in one of the most severe cyberattacks since the country’s invasion of Ukraine in 2022. The sophisticated assault, carried out by Ukrainian hacktivist group Silent Crow and the Belarusian Cyber-Partisans, led to the cancellation of more than 100 flights, strand…
  continue reading
 
French defense contractor Naval Group, a cornerstone of Europe’s naval defense industry, is facing a high-stakes cybersecurity crisis. A threat actor known as “Neferpitou” claims to have exfiltrated 1TB of sensitive data, including combat management system (CMS) source code for submarines and frigates, technical documents, developer virtual machine…
  continue reading
 
In July 2025, a team of seasoned cybersecurity leaders launched Root Evidence, a Boise-based startup with a mission to revolutionize how organizations tackle vulnerability management. Armed with $12.5 million in seed funding led by Ballistic Ventures, founders Jeremiah Grossman, Robert Hansen, Heather Konold, and Lex Arquette are setting out to fix…
  continue reading
 
In April 2025, NASCAR became the latest victim of a major cyberattack, with hackers infiltrating its network between March 31 and April 3. During the breach, personal information—including names and Social Security numbers—was exfiltrated from NASCAR’s systems. In response, the organization has notified affected individuals, activated its incident …
  continue reading
 
In this episode, we examine the sophisticated operations of Scattered Spider—also known as Muddled Libra, UNC3944, and Octo Tempest—a financially motivated cybercriminal group that has redefined the ransomware threat landscape. Recently highlighted by Google’s Threat Intelligence Group (GTIG), Scattered Spider has escalated its attacks by targeting…
  continue reading
 
A new and highly sophisticated malware strain named Koske is redefining the threat landscape for Linux environments. Suspected to be partially developed using artificial intelligence, Koske introduces novel and highly evasive techniques, blending image files, rootkits, and adaptive cryptomining logic to create a stealthy and persistent backdoor int…
  continue reading
 
BlackSuit, the ransomware strain known for crippling critical sectors and demanding multi-million dollar payouts, has just suffered a devastating blow. In a coordinated international law enforcement operation codenamed "Operation Checkmate," authorities—including the U.S. Department of Justice, Homeland Security Investigations, FBI, Europol, the UK…
  continue reading
 
A new banking trojan called Coyote has emerged as a groundbreaking cyber threat, becoming the first known malware in the wild to exploit Microsoft’s User Interface Automation (UIA) framework—an accessibility tool originally designed to help users interact with Windows interfaces. But in the hands of attackers, UIA becomes a weapon of stealth and pr…
  continue reading
 
A newly disclosed critical vulnerability, CVE-2025-7742, is putting hundreds of LG Innotek LNV5110R security cameras at risk around the world—including within critical infrastructure. This high-severity authentication bypass flaw allows remote attackers to gain full administrative control without credentials, giving them access to live camera feeds…
  continue reading
 
In one of the most concerning state-sponsored cyber incidents of the year, Chinese hackers exploited zero-day vulnerabilities in Microsoft SharePoint to breach the networks of the National Nuclear Security Administration (NNSA)—the U.S. agency responsible for managing the nation's nuclear arsenal. The attackers, part of a suspected Chinese state-sp…
  continue reading
 
In this episode, we expose the alarming supply chain attack that compromised millions of JavaScript projects across the globe. This sophisticated breach targeted the NPM ecosystem, infecting widely-used packages like eslint-config-prettier and is, through a coordinated phishing campaign and the exploitation of non-expiring legacy access tokens. Att…
  continue reading
 
In one of the most dramatic cybersecurity legal battles of the past year, Clorox has filed a lawsuit against IT services giant Cognizant, accusing the company of gross negligence that allegedly enabled a catastrophic 2023 cyberattack. The breach wreaked havoc on Clorox's operations—causing widespread product shortages, a multibillion-dollar hit to …
  continue reading
 
In this episode, we dive deep into HeroDevs' recent $125 million strategic growth investment, a move that signals a major expansion in the fight against the vulnerabilities of end-of-life (EOL) open source software. Based in Salt Lake City, HeroDevs has carved out a critical niche—providing "Never-Ending Support" (NES) to ensure security, complianc…
  continue reading
 
In a landmark move to disrupt the financial engine powering ransomware attacks, the United Kingdom is pushing forward with legislation that would ban ransom payments across the public sector and critical national infrastructure (CNI). This sweeping proposal covers everything from local councils and schools to healthcare providers like the NHS, aimi…
  continue reading
 
Two newly added vulnerabilities in SysAid’s On-Prem IT support software — CVE-2025-2775 and CVE-2025-2776 — have officially joined the Cybersecurity and Infrastructure Security Agency (CISA)’s Known Exploited Vulnerabilities (KEV) catalog, signaling increased concern around their potential abuse. While there are no confirmed reports of public explo…
  continue reading
 
In this episode, we unpack the rapid and concerning resurgence of Lumma Stealer, a sophisticated Malware-as-a-Service (MaaS) platform, just months after a major international takedown. Despite Microsoft, the FBI, Europol, and global partners dismantling over 2,500 malicious domains and seizing critical infrastructure in May 2025, Lumma Stealer has …
  continue reading
 
Hackers are actively exploiting a trio of critical zero-day vulnerabilities in Cisco’s Identity Services Engine (ISE) and Passive Identity Connector (ISE-PIC), prompting urgent patching directives from the company. The flaws — CVE-2025-20281, CVE-2025-20282, and CVE-2025-20337 — each carry a maximum CVSS severity score of 10.0, indicating the highe…
  continue reading
 
A new wave of zero-day attacks—collectively known as ToolShell—is actively targeting Microsoft SharePoint servers, with two vulnerabilities (CVE-2025-53770 and CVE-2025-53771) allowing unauthenticated remote code execution and identity control bypass. First observed in high-value targets across government, critical infrastructure, and manufacturing…
  continue reading
 
A critical zero-day vulnerability in CrushFTP (CVE-2025-54309) is being actively exploited, giving attackers administrative access to over a thousand unpatched servers globally. This severe security flaw—caused by improper validation in the AS2 protocol—has exposed enterprise-managed file transfer (MFT) systems across the US, Europe, and Canada. Se…
  continue reading
 
Dell Technologies is the latest target in a growing trend of data extortion attacks as threat actors pivot away from traditional ransomware. The cybercrime group known as World Leaks—a rebrand of the former Hunters International gang—has claimed responsibility for breaching Dell’s Customer Solution Centers (CSC), a sandbox environment used primaril…
  continue reading
 
A critical vulnerability in ExpressVPN’s Windows client has put a spotlight on the often-overlooked dangers of debug code making its way into production software. This episode dives into how a debug configuration error allowed Remote Desktop Protocol (RDP) traffic to bypass the VPN tunnel, potentially exposing users’ real IP addresses and compromis…
  continue reading
 
In this episode, we unpack the January 2025 data breach at Dior, the iconic luxury fashion house, which exposed sensitive personal information of U.S. customers—including names, addresses, and even Social Security and passport numbers. Although payment data remained secure, the incident's impact is substantial, both in terms of customer trust and c…
  continue reading
 
In an era where generative AI is being used not just for productivity but for precision cybercrime, a San Francisco-based startup, StrongestLayer, is taking a bold stand. Backed by $5.2 million in seed funding from Sorenson Capital and others, the company is pioneering a radically new approach to cybersecurity with its AI-native platform TRACE (Thr…
  continue reading
 
In July 2024, The Alcohol & Drug Testing Service (TADTS), a Texas-based company handling sensitive employment-related data, suffered a catastrophic data breach. Nearly 750,000 individuals had personal information compromised—Social Security numbers, financial data, driver’s licenses, health insurance info, and even biometric identifiers. The attack…
  continue reading
 
A new attack technique is exposing just how vulnerable global mobile networks remain in 2025. Cybersecurity firm Enea has discovered a surveillance operation that bypasses SS7 firewalls by exploiting a subtle weakness in the TCAP encoding layer—allowing stealth location tracking of mobile users across borders. The method? Tampering with the IMSI fi…
  continue reading
 
In this Risky Business sponsored interview, Thinkst Canary CEO Haroon Meer chats to Casey Ellis about the company’s impressive growth over the past decade, and how it approached that path a little differently to other firms. Haroon’s advice for young startup founders: Is your problem worth solving? And can you actually solve it? And… Love your cust…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play