Tales of supernatural horror and suspense, old and new, are brought to life in this series of audio narrations enhanced with spinetingling music and sound effects. Featuring stories by acknowledged masters of the genre like M. R. James, E. F. Benson and H. P. Lovecraft, alongside lesser-known authors of the early 20th century waiting to be rediscovered and contemporary talents, The EnCrypted Horror Podcast is your new home for horror, curated, read and produced by Jasper L'Estrange. Subscrib ...
…
continue reading
Encrypted Podcasts
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The world’s most controversial events, and the complex beliefs behind them. From Bigfoot sightings to bitcoin takeovers, alien landings to assassinations, who’s shaping the narrative — and why? Conspiracy Theories is a Spotify Podcast. New episodes Wednesdays. Watch episodes and more on YouTube: www.youtube.com/@ConspiracyTheoriesPodcast
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Venture into the elusive world of intelligence collection and espionage to spot, assess and debrief: spies, handlers, catchers, analysts, cut-outs, dangles, diplomats, security experts and the storytellers who bring them all to life. Check your electronics and subscribe, do a thorough surveillance detection route, secure your Live Drop location, and after a mad-minute introduction, listen in on conversations with our fascinating guests who help to illuminate a complex universe. A HUMINT expe ...
…
continue reading
Music and Words but mostly Bass.
…
continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
continue reading
Scramblex.com has released a free encryption service that will protect sensitive data from unauthorised access and the potential for identity or financial theft.
…
continue reading
1
Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.
Craig Petronella
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
…
continue reading
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
…
continue reading
Discover the future of digital privacy with ZeroID — featuring a secure chat app, secure eSIM, and encrypted eSIM technology with no KYC or surveillance. Learn how to stay anonymous, connected, and in control using crypto-powered tools built on Solana.
…
continue reading
The officially unofficial podcast for Mr. Robot on USA. Each week we hack into the episode with a full recap and listener feedback.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
A new beginning in IT
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Interviews with users, hackers, and staff of America Online (AOL), covering the 90’s/Early 2000’s.
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
In a world where pessimism prevails, being hopeful is punk. Solarpunk Manifesto is a podcast dedicated to radical hope and imagination, inviting leading thinkers, artists, and activists to collectively explore alternative futures. Solarpunk is the counter-cultural movement our generation craves. Instagram: @solarpunk.manifesto
…
continue reading
From courtroom dramas to miscarriages of justice, to how the law affects you — and so much more. The Law Report is your accessible guide to the big legal stories unfolding in Australia and across the world.
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
A series of shortcasts from the Internet Watch Foundation (IWF) about their leading non-profit work tackling online child sexual abuse. Our series of short podcasts feature discussions with leading experts and academics covering a wide variety of topics including tech, encryption, policy and how these impact the criminal circulation of child sexual imagery online. Find out more at iwf.org.uk
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
David Bombal interviews people in the networking world to learn about life, hacks, technology and networking and ways to improve your life!
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
Unspun is critical thinking about the news. Hear real examples, past and present, of newsmakers attempting to mislead you and understand how they manipulate the truth. Learn how to avoid being swayed by fake news and misinformation. Get Unspun, because you deserve the truth.
…
continue reading
Good morning! Indignity editor and longtime media critic Tom Scocca gets newsprint on his hands to give you a quick summary of the new day's current events, with commentary about how they're being covered.
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
Welcome to the Clear Crypto Podcast, straight talk on what crypto and blockchain do today, and what they're going to do tomorrow with Nathan Jeffay, Head of Media at StarkWare and Gareth Jenkinson, Head of Multimedia at Cointelegraph.
…
continue reading
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
…
continue reading
1
Best Of Reddit Stories 2025 Cheating, True Crime, AITA and NSFW Stories
Best Of Reddit Stories 2025 Cheating, True Crime, AITA and NSFW Stories
Best Of Reddit Stories 2025 Dive into the latest and greatest Reddit stories of 2025! From jaw-dropping "Am I the A**hole?" moments to heartwarming tales from r/HumansBeingBros, this collection brings together the most entertaining, shocking, and thought-provoking posts Reddit has to offer. We’re covering everything from dramatic revenge stories and awkward family confessions to inspiring life lessons and hilarious fails. Whether you’re here for the laughs, the drama, or the unexpected twist ...
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
…
continue reading
Today's Weather: Brighter in the North, like the people. Unrehearsed nonsense, de-rigeur fake news & plagiarised jokes. Bipedal humanoids, present your dilated aural canals to the assault that is: The Amish Inquisition...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
1
Jewett-Cameron Reports Ransomware Breach Involving Encryption and Data Theft
22:53
22:53
Play later
Play later
Lists
Like
Liked
22:53Oregon-based Jewett-Cameron Company, a manufacturer of fencing, kennels, and specialty wood products, has confirmed that it was the victim of a double-extortion ransomware attack on October 15, 2025, in an incident that disrupted operations and exposed sensitive corporate data. The attackers infiltrated the company’s IT network, deploying encryptio…
…
continue reading
1
From Knitting Codes to Encrypted Chats: The Evolution of Resistance Communication
22:05
22:05
Play later
Play later
Lists
Like
Liked
22:05In this episode of UnSpun, we trace the invisible architecture that keeps truth alive when communication is forbidden. From Phyllis Latour Doyle’s coded knitting in Nazi-occupied France to encrypted mesh networks during Hong Kong’s pro-democracy protests, “The Geometry of Trust” reveals how humans build secret systems of meaning under surveillance.…
…
continue reading
A shy novelist accepts an invitation to spend Christmas with another writer in a remote house in Penzance, Cornwall. He quickly regrets his decision… This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “MRS LUNT” by Hugh Walpole, 1926. 💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀 Supporting my work If you like, you candonate in the follo…
…
continue reading
1
Episode 557: Indignity Morning Podcast No. 557: Secrecy and encryption.
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08EASY LISTENING DEP’T.: Protesters showing up to wave Israeli flags outside the building does not mean that the "tension was spilling out of the synagogue." It's like when anti semitic protesters showed up on Broadway outside the fence of Columbia University, and their behavior was incorporated into the brief against the Columbia campus protesters, …
…
continue reading
1
Privacy 2.0 Unleashed: Encrypted Computing's Blockchain Revolution
24:27
24:27
Play later
Play later
Lists
Like
Liked
24:27What’s the real tension in blockchain, total transparency or total privacy, and how do we unlock both? Hosts Nathan and co-host Gareth dive deep with Yannik Schrade, CEO and co-founder of Arcium, on the privacy revolution: encrypted computing, zero-knowledge proofs, and multi-party magic that lets blockchains handle sensitive data like medical reco…
…
continue reading
1
Shakespeare’s Encrypted Map to Freemason Treasure
56:03
56:03
Play later
Play later
Lists
Like
Liked
56:03Shakespeare’s First Folio is an incredible historical treasure. It also might be an encrypted treasure map. According to the theories, the First Folio’s secret code reveals the “real” Shakespeare author, a royal cover-up, a Freemason conspiracy, and of course, a map to priceless buried treasure. Treasure that may still be out there. Keep up with Co…
…
continue reading
1
Episode 20 - ECC, Smart Grids, and Physical Sabotage
38:09
38:09
Play later
Play later
Lists
Like
Liked
38:09This episode is a deep dive into the mathematics, implementation, and vulnerabilities of modern digital security, focusing on the powerful role of Elliptic Curve Cryptography (ECC). ECC has largely superseded older algorithms like RSA because of its superior efficiency, providing equivalent security strength with significantly shorter keys, a cruci…
…
continue reading
1
High Court lets police access evidence from encrypted app used in global raids
29:04
29:04
Play later
Play later
Lists
Like
Liked
29:04The High Court has unanimously upheld the use of police evidence obtained by monitoring an encrypted messaging app used by organised criminals. The decision is a huge victory for policing, but does it raise questions about the breadth of Australia's surveillance laws?By Australian Broadcasting Corporation
…
continue reading
1
AITA for deleting my encryption key after my boss fired me right before the launch?
21:29
21:29
Play later
Play later
Lists
Like
Liked
21:29AITA for deleting my encryption key after my boss fired me right before the launch?
…
continue reading
1
$1 Million WhatsApp Exploit Withdrawn—Researcher Silent, Meta Calls It “Low-Risk”
20:22
20:22
Play later
Play later
Lists
Like
Liked
20:22The Pwn2Own Ireland 2025 hacking competition was set to feature one of its most anticipated moments — a $1 million zero-click remote code execution exploit against WhatsApp — but the demonstration never happened. Scheduled to be showcased by researcher Eugene of Team Z3, the exploit’s abrupt withdrawal stunned attendees and quickly became the most …
…
continue reading
1
OpenAI Atlas Omnibox Jailbreak Exposes New AI Security Flaw
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17A serious vulnerability has been discovered in the OpenAI Atlas omnibox, a hybrid interface designed to handle both URLs and user prompts. Researchers at NeuralTrust revealed that attackers can disguise malicious instructions as URLs to jailbreak the omnibox, taking advantage of how Atlas interprets malformed input. Unlike traditional browsers, Atl…
…
continue reading
1
Microsoft Rushes Emergency Fix for WSUS Remote Code Execution Flaw (CVE-2025-59287)
19:34
19:34
Play later
Play later
Lists
Like
Liked
19:34A critical remote code execution (RCE) flaw, tracked as CVE-2025-59287, has put thousands of enterprise networks at risk by exposing the Windows Server Update Service (WSUS) to active exploitation. The vulnerability, rooted in unsafe object deserialization, allows unauthenticated remote attackers to execute arbitrary code with System-level privileg…
…
continue reading
1
8 Disturbing True Stories That’ll Haunt You Forever
55:20
55:20
Play later
Play later
Lists
Like
Liked
55:208 Disturbing True Stories That’ll Haunt You Forever
…
continue reading
1
Perplexity Comet AI Browser Launch Exploited in Coordinated Impersonation Scam
23:37
23:37
Play later
Play later
Lists
Like
Liked
23:37The launch of Perplexity’s Comet AI browser — a major step forward in AI-assisted browsing — was almost immediately hijacked by cybercriminals. Within weeks of its July debut, threat intelligence firm BforeAI uncovered a coordinated impersonation campaign designed to exploit public interest in the new product. The campaign involved a web of fraudul…
…
continue reading
1
#7 - Martyn Dade-Robertson - "Growing Buildings & Designing with Life"
1:18:52
1:18:52
Play later
Play later
Lists
Like
Liked
1:18:52🥼🧪Martyn Dade-Robertson is an architect specializing in design computation and synthetic biology, and Professor of Emerging Technologies at Northumbria University. 🏠Martyn is the co-founder of the Hub for Biotechnology in the Built Environment (HBBE), a pioneering research centre exploring how living systems and biotechnologies can transform the wa…
…
continue reading
1
Lazarus Group Targets European UAV Firms in North Korea’s Drone Espionage Push
27:23
27:23
Play later
Play later
Lists
Like
Liked
27:23A new wave of cyber-espionage attacks reveals North Korea’s deepening effort to steal critical defense technologies from Europe. In a sophisticated campaign dubbed Operation Dream Job, the Lazarus Group — also known as Diamond Sleet and Hidden Cobra — has launched targeted attacks on European defense contractors and UAV (unmanned aerial vehicle) de…
…
continue reading
1
Cops, What s the Creepiest Thing You've Found During a House Search | Police Paranormal Stories
44:12
44:12
Play later
Play later
Lists
Like
Liked
44:12Cops, What s the Creepiest Thing You've Found During a House Search | Police Paranormal Stories Police officers see the darkest corners of humanity — but sometimes, what they find can’t be explained by logic. In this chilling episode, real cops share their most **terrifying paranormal encounters** during house searches and investigations. From ghos…
…
continue reading
1
SCARY Videos That'll Creep You Out #ScaryGhost #HauntedHouse #GhostSighting #RealGhostCaughtOnCamera
6:13
6:13
Play later
Play later
Lists
Like
Liked
6:13SCARY Videos That'll Creep You Out #ScaryGhost #HauntedHouse #GhostSighting #RealGhostCaughtOnCamera YOUTUBE VIDEO https://youtu.be/6oIH2Ykh5ok A family believes their house is **haunted** due to some **strange things** happening. The creepiest part is when their son says he saw a man in the window, which was **caught on camera**! Is this **m…
…
continue reading
1
Ghost or Demon Watching Kids Play #realghost #ghosts #ghost #demon #shorts #ghostvideo
0:20
0:20
Play later
Play later
Lists
Like
Liked
0:20Ghost or Demon Watching Kids Play #realghost #ghosts #ghost #demon #shorts #ghostvideo YOUTUBE VIDEO https://youtube.com/shorts/xywhi6VkeKA?si=uIx2j2NqZPpIhaL5
…
continue reading
1
When Did Your “Perfect Relationship” Turn Into a Full-Blown Crime Documentary?
46:35
46:35
Play later
Play later
Lists
Like
Liked
46:35When Did Your “Perfect Relationship” Turn Into a Full-Blown Crime Documentary?
…
continue reading
1
What is a science fact that not many people know that will change the way they look at life?
1:00:02
1:00:02
Play later
Play later
Lists
Like
Liked
1:00:02What is a science fact that not many people know that will change the way they look at life?
…
continue reading
https://youtu.be/IOa9tjoxsQ8 https://odysee.com/@NaomiBrockwell:4/Flock:3 They’re on street corners, utility poles, even garbage trucks... and they’re tracking everywhere you go. Welcome to the world of Automatic license plate readers. These aren't just cameras. They're part of a cloud-based surveillance network logging your movements in real time,…
…
continue reading
Alien Caught On Ring CameraThis strange event was *caught on camera* via a home *security cameras* setup. The footage is sure to give you *creepy videos* of a possible *alien news* event happening right here on *alien earth**, making this a truly bizarre addition to any **smart home* surveillance.
…
continue reading
1
Toys “R” Us Canada Confirms Customer Data Breach After Dark Web Leak
22:47
22:47
Play later
Play later
Lists
Like
Liked
22:47Toys “R” Us Canada has confirmed a customer data breach after records from its database appeared on the dark web on July 30, 2025, prompting a full-scale cybersecurity investigation and disclosure to privacy regulators. The company’s internal review, conducted in partnership with third-party experts, verified that an unauthorized party accessed and…
…
continue reading
1
Kyocera’s Motex Lanscope Hit by Active Attacks: Critical 9.8 Exploit Enables Remote Code Execution
18:05
18:05
Play later
Play later
Lists
Like
Liked
18:05A dangerous zero-day vulnerability in Kyocera Communications subsidiary Motex’s Lanscope Endpoint Manager has triggered a global cybersecurity alert after being actively exploited in real-world attacks. Tracked as CVE-2025-61932, this flaw carries a CVSS severity score of 9.8, allowing remote, unauthenticated attackers to execute arbitrary code sim…
…
continue reading
1
What terrifying secret has someone told you while drunk?
59:54
59:54
Play later
Play later
Lists
Like
Liked
59:54What terrifying secret has someone told you while drunk?
…
continue reading
1
BIND 9 Emergency Patches: ISC Fixes High-Severity Cache Poisoning and DoS Flaws
20:19
20:19
Play later
Play later
Lists
Like
Liked
20:19The Internet Systems Consortium (ISC) has released a series of critical BIND 9 updates to fix multiple high-severity vulnerabilities affecting DNS resolver systems worldwide. The flaws—tracked as CVE-2025-40780, CVE-2025-40778, and CVE-2025-8677—pose serious threats ranging from cache poisoning to denial-of-service (DoS) attacks. These vulnerabilit…
…
continue reading
1
Episode 562: Indignity Morning Podcast No. 562: Murders.
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48EASY LISTENING DEP’T.: On the website, the Times this morning published a piece that really digs into and emphasizes the point that its reporters keep making, down inside the incremental coverage of Donald Trump's ongoing campaign of slaughter at sea. It's a NEWS ANALYSIS piece by Charlie Savage, “The peril of a White House that flaunts its indiffe…
…
continue reading
1
Adobe Confirms Active Exploitation of SessionReaper Vulnerability in Commerce Platforms
29:23
29:23
Play later
Play later
Lists
Like
Liked
29:23A critical new vulnerability is wreaking havoc across the global e-commerce ecosystem. Tracked as CVE-2025-54236 and dubbed SessionReaper, this flaw affects Adobe Commerce and Magento Open Source platforms, allowing attackers to bypass security features and seize control of customer accounts through the Commerce REST API. Despite Adobe releasing em…
…
continue reading
1
AI Sidebar Spoofing: How Malicious Extensions Hijack ChatGPT and Perplexity Interfaces
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40Cybersecurity firm SquareX has unveiled a new and alarming threat to users of AI-enabled browsers — a technique called AI Sidebar Spoofing. This sophisticated attack uses malicious browser extensions to create visually identical replicas of legitimate AI sidebars, tricking users into believing they are interacting with trusted AI assistants like Ch…
…
continue reading
1
Star Blizzard’s Malware Makeover: From LostKeys to MaybeRobot
32:49
32:49
Play later
Play later
Lists
Like
Liked
32:49The Russian state-sponsored hacking group Star Blizzard — also tracked as ColdRiver, Seaborgium, and UNC4057 — has undergone a major transformation in its operations following public exposure earlier this year. After researchers at Google detailed its LostKeys malware and PowerShell-based infection chain in June 2025, the group swiftly abandoned th…
…
continue reading
1
Ex-cons, What Was The Hardest Prison Habit To Break After Being Released?
56:40
56:40
Play later
Play later
Lists
Like
Liked
56:40Ex-cons, What Was The Hardest Prison Habit To Break After Being Released?
…
continue reading
1
Episode 561: Indignity Morning Podcast No. 561: South America produces cocaine.
14:58
14:58
Play later
Play later
Lists
Like
Liked
14:58EASY LISTENING DEP’T.: The process of tearing down the East Wing,” the story continues, “was expected to be completed as soon as this weekend, two senior administration officials said, as Mr. Trump moved rapidly to carry out a passion project that he said was necessary to host state dinners and other events. But,” the story then says, “the previous…
…
continue reading
1
Keycard Emerges from Stealth with $38M to Secure the Identity of AI Agents
19:17
19:17
Play later
Play later
Lists
Like
Liked
19:17San Francisco-based Keycard has officially emerged from stealth mode, announcing $38 million in funding across seed and Series A rounds to build what may become one of the most critical infrastructure layers of the AI era — identity and access management (IAM) for AI agents. Founded in 2025 by former senior executives from Snyk and Okta, Keycard is…
…
continue reading
1
Critical TP-Link Omada Vulnerabilities Expose Networks to Remote Takeover
22:07
22:07
Play later
Play later
Lists
Like
Liked
22:07Security researchers are urging immediate action after TP-Link disclosed multiple critical vulnerabilities in its Omada gateway line, affecting a wide range of ER, G, and FR series devices. The flaws—now patched by TP-Link—expose organizations to remote code execution, privilege escalation, and full network compromise, making them among the most se…
…
continue reading
1
TARmageddon: The Rust Library Flaw Exposing Supply Chains to Remote Code Execution
29:58
29:58
Play later
Play later
Lists
Like
Liked
29:58A critical new vulnerability known as TARmageddon (CVE-2025-62518) has sent shockwaves through the Rust developer community and the broader cybersecurity world. This high-severity desynchronization flaw, discovered in the Async-tar and Tokio-tar libraries, exposes millions of downstream applications to the risk of remote code execution and supply c…
…
continue reading
1
Vidar 2.0: The C-Rewritten Stealer Poised to Dominate the Cybercrime Market
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42A new evolution in information-stealing malware has arrived — and it’s already drawing serious attention from researchers and defenders alike. The release of Vidar 2.0 represents a complete transformation of the long-running Vidar infostealer, which has been rewritten entirely in C and equipped with multi-threading and advanced anti-analysis mechan…
…
continue reading
1
Former Cult Members, What Is Your Creepiest, Scariest Or Most Disturbing Story?
57:48
57:48
Play later
Play later
Lists
Like
Liked
57:48Former Cult Members, What Is Your Creepiest, Scariest Or Most Disturbing Story?
…
continue reading
1
Dataminr Acquires ThreatConnect for $290M to Create the Next Generation of Tailored Threat Intelligence
23:01
23:01
Play later
Play later
Lists
Like
Liked
23:01Dataminr, the AI powerhouse known for its real-time risk and event detection platform, has announced plans to acquire ThreatConnect, a cybersecurity firm specializing in threat intelligence aggregation and response, for $290 million in cash and equity. This strategic move marks a major milestone in the ongoing consolidation of the threat intelligen…
…
continue reading
1
Veeam Acquires Securiti AI for $1.725 Billion to Unite Data Resilience, Security, and AI
28:44
28:44
Play later
Play later
Lists
Like
Liked
28:44In one of the largest cybersecurity acquisitions of 2025, Veeam Software has announced plans to acquire Securiti AI for $1.725 billion in cash and stock, signaling a fundamental shift in how enterprises will secure, manage, and govern their data in the age of artificial intelligence. The deal, expected to close in the fourth quarter, will bring tog…
…
continue reading
1
True Creepiest Haunted House Stories to Fall Asleep to
41:52
41:52
Play later
Play later
Lists
Like
Liked
41:52True Creepiest Haunted House Stories to Fall Asleep to
…
continue reading
1
Episode 560: Indignity Morning Podcast No. 560: White House demolition.
13:58
13:58
Play later
Play later
Lists
Like
Liked
13:58EASY LISTENING DEP’T.: Donald Trump's demolition of the East Wing of the White House continued yesterday, advancing well past the facade to smash the main structure. The New York Times belatedly realized that this was, in fact, front page news, and put the picture on the front page at the top, four columns wide. But, being the Times, decided that t…
…
continue reading
1
Defakto Raises $30.75 Million to Redefine Machine Identity Security
34:01
34:01
Play later
Play later
Lists
Like
Liked
34:01California-based cybersecurity firm Defakto has raised $30.75 million in Series B funding, led by XYZ Venture Capital, bringing its total investment to roughly $50 million. The new capital will power the company’s rapid expansion in product development and global market reach for its identity and access management (IAM) platform—one specifically de…
…
continue reading
1
True Encounters with Ghosts and Supernatural Beings Stories
43:14
43:14
Play later
Play later
Lists
Like
Liked
43:14True Encounters with Ghosts and Supernatural Beings Stories
…
continue reading
1
Dr. Allan Friedman Joins NetRise: The Father of SBOMs Goes Private to Fuse AI and Supply Chain Security
24:24
24:24
Play later
Play later
Lists
Like
Liked
24:24In a landmark move for the cybersecurity industry, Dr. Allan Friedman — often called the Father of SBOMs — has joined supply chain security firm NetRise as a strategic advisor. Friedman’s transition from his influential role at CISA marks a pivotal moment where public policy meets private innovation. His mission: to push the Software Bill of Materi…
…
continue reading
1
#6 - Mattie Colquhoun (xenogothic) - From Capitalist Realism to Acid Communism & Solarpunk
1:38:48
1:38:48
Play later
Play later
Lists
Like
Liked
1:38:48Mattie Colquhoun (pronounced kuh-hoon), known online as Xenogothic, is a writer and photographer from Hull, UK. They are best known for continuing the intellectual and cultural legacy of the late Mark Fisher, one of the most influential contemporary cultural theorists and political philosophers, and Mattie’s former teacher at Goldsmiths London in 2…
…
continue reading
1
Is An Alien Probe Really Coming in November?
39:10
39:10
Play later
Play later
Lists
Like
Liked
39:10In July 2025, researchers discovered an interstellar object entering our solar system. It’s only the third we’ve detected – ever – and it’s been dubbed Comet 3I/ATLAS. NASA says it does not pose a threat to us. But one Harvard scientist suggests 3I/ATLAS isn’t necessarily a comet – there are too many anomalies. He says, this object may not be natur…
…
continue reading
1
Episode 339 Deep Dive: M.K. Palmore | Leading Through Uncertainty: Security, Safety, and Cyber Awareness in a Time of Crisis
39:59
39:59
Play later
Play later
Lists
Like
Liked
39:59In this episode, we sit down with M.K. Palmore, Chief Executive Officer at Apogee Global RMS, as he explores strategies for leading through uncertainty with a focus on security, safety, and cyber awareness in times of crisis. M.K. emphasises the critical importance of practicing security response scenarios, noting that organisations truly respond b…
…
continue reading
Think your mouse is harmless? Steve and Leo uncover how modern optical mice might be secretly "listening" in, and reveal why satellite data pouring down on us is almost entirely unsecured. The long awaited lawsuit to block Texas SB2420. Embattled Texas SB2420 also impacts Google Play. At long last, NIST modernizes their password policy. Scattered L…
…
continue reading
1
SN 1048: Mic-E-Mouse - AWS Goes Down Hard
2:50:35
2:50:35
Play later
Play later
Lists
Like
Liked
2:50:35Think your mouse is harmless? Steve and Leo uncover how modern optical mice might be secretly "listening" in, and reveal why satellite data pouring down on us is almost entirely unsecured. The long awaited lawsuit to block Texas SB2420. Embattled Texas SB2420 also impacts Google Play. At long last, NIST modernizes their password policy. Scattered L…
…
continue reading