Tales of supernatural horror and suspense, old and new, are brought to life in this series of audio narrations enhanced with spinetingling music and sound effects. Featuring stories by acknowledged masters of the genre like M. R. James, E. F. Benson and H. P. Lovecraft, alongside lesser-known authors of the early 20th century waiting to be rediscovered and contemporary talents, The EnCrypted Horror Podcast is your new home for horror, curated, read and produced by Jasper L'Estrange. Subscrib ...
…
continue reading
Encrypted Podcasts
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Discover the future of digital privacy with ZeroID — featuring a secure chat app, secure eSIM, and encrypted eSIM technology with no KYC or surveillance. Learn how to stay anonymous, connected, and in control using crypto-powered tools built on Solana.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading

1
Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.
Craig Petronella
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
…
continue reading
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Music and Words but mostly Bass.
…
continue reading
Scramblex.com has released a free encryption service that will protect sensitive data from unauthorised access and the potential for identity or financial theft.
…
continue reading
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
…
continue reading
The officially unofficial podcast for Mr. Robot on USA. Each week we hack into the episode with a full recap and listener feedback.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Some cryptography & security people talk about security, cryptography, and whatever else is happening.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Listen to articles handpicked by our editors, and stay updated on top technology news from TechCrunch.
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
A new beginning in IT
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
MacBreak Weekly covers all things Apple: Leo, Andy Ihnatko, Alex Lindsay, and Jason Snell analyze every bit of news from the most interesting company in tech. From AI to Vision Pro, iPad to iPhone, these Apple experts know-all and tell-all. Records live every Tuesday at 2:00pm Eastern / 11:00am Pacific / 18:00 UTC.
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
A series of shortcasts from the Internet Watch Foundation (IWF) about their leading non-profit work tackling online child sexual abuse. Our series of short podcasts feature discussions with leading experts and academics covering a wide variety of topics including tech, encryption, policy and how these impact the criminal circulation of child sexual imagery online. Find out more at iwf.org.uk
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Sound*Bytes is an award-winning national radio show feature distributed to the over 500 stations on the CBS News network. Founded by Jan Ziff and Allan Davidson and hosted by Jan Ziff during its first three decades, Sound*Bytes is now in its thirty-fourth year of continuous broadcast, with Allan hosting.
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
We are TheCyberSoul.io, a podcast and community of tech users in various industries sharing insights to the tech world and discussing real world topics in a hacked up world. We bring together tech enthusiasts from all backgrounds to share their experiences and expertise. Our platform is a place for real conversations about the ever-changing landscape of technology in today's world.
…
continue reading
Venture into the elusive world of intelligence collection and espionage to spot, assess and debrief: spies, handlers, catchers, analysts, cut-outs, dangles, diplomats, security experts and the storytellers who bring them all to life. Check your electronics and subscribe, do a thorough surveillance detection route, secure your Live Drop location, and after a mad-minute introduction, listen in on conversations with our fascinating guests who help to illuminate a complex universe. A HUMINT expe ...
…
continue reading
In a world where pessimism prevails, being hopeful is punk. Solarpunk Manifesto is a podcast dedicated to radical hope and imagination, inviting leading thinkers, artists, and activists to collectively explore alternative futures. Solarpunk is the counter-cultural movement our generation craves. Instagram: @solarpunk.manifesto
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
MacBreak Weekly covers all things Apple: Leo, Andy Ihnatko, Alex Lindsay, and Jason Snell analyze every bit of news from the most interesting company in tech. From AI to Vision Pro, iPad to iPhone, these Apple experts know-all and tell-all. Records live every Tuesday at 2:00pm Eastern / 11:00am Pacific / 18:00 UTC.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Today's Weather: Brighter in the North, like the people. Unrehearsed nonsense, de-rigeur fake news & plagiarised jokes. Bipedal humanoids, present your dilated aural canals to the assault that is: The Amish Inquisition...
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Our podcast covers current topics such as infection prevention and control, OSHA and HIPAA compliance for dentistry. We discuss the latest regulatory information, answer frequently asked questions and give suggestions for dental practices to make compliance easy and sustainable.The Compliance Divas are a trusted source for consistent, accurate information based upon current guidelines, standards, science, and recommendations.
…
continue reading
Unlike every other security podcast, we don’t get stuck down in the technical weeds. Our remit is to speak with experts around the globe at the strategic level – how security technology can improve the experience and risk optimisation for every organisation. The Voice of Cyber® - In Partnership with Vanta
…
continue reading
Politics in America is transforming. We’re embarking on a new series to deepen our understanding of who we are, how we got here, and how we rebuild without repeating the mistakes of the past. Ron Steslow hosts academics, behavioral economists, social psychologists, politicos, philosophers, anthropologists, journalists, poets, and storytellers—and more—to discuss America’s political present and future and dive into the deeper problems we face as a nation. Email us questions or comments: podca ...
…
continue reading
All Things Internal Audit is a new video podcast sharing news and practical knowledge for internal auditors. Produced by The Institute of Internal Auditors, each episode features insightful interviews with knowledgeable pros, timely tips and the latest news about the profession. All Things Internal Audit is available everywhere you get podcasts. IIA Members get more podcast content in each episode. Visit www.theiia.org for more information.
…
continue reading
The Treasury Update Podcast is your source for interesting treasury news, in your car, at the gym, or wherever you decide to tune in! Strategic Treasurer was formed in 2004 to provide corporate, educational, and government entities direct access to comprehensive and current assistance with their treasury and financial technology, control and process efficiency requirements. Strategic Treasurer publishes content via newsletters, white-papers, blogs, videos, e-books, infographics, and analyst ...
…
continue reading
The Untitled Linux Show covers the week's hottest Linux news for desktop, gaming, and even enterprise. ULS is the weekly update you don't want to miss, from the latest kernel development to the updates on your favorite apps! Each episode finishes with a killer command line tip from each host. You can join Club TWiT for $10 per month and get ad-free audio and video feeds for all our shows plus everything else the club offers...or get just this podcast ad-free for $5 per month. New episodes ar ...
…
continue reading

1
🔍Encrypted Reality (The Watch, Alberti and Phantom Time) - Michael Anthony Alberta : 388
2:56:37
2:56:37
Play later
Play later
Lists
Like
Liked
2:56:37📚 What if ancient history isn’t ancient at all? In this episode of The Amish Inquisition, we’re joined by Michael Anthony Alberta, author of Encrypted Reality, to explore the provocative idea that much of our historical timeline was intentionally compressed and fabricated during the Renaissance. Michael’s research uncovers a covert network known as…
…
continue reading

1
Stop Using Encrypted Email with William Woodruff
1:11:07
1:11:07
Play later
Play later
Lists
Like
Liked
1:11:07There was a bug in an OpenPGP library which finally gave us an excuse to tear encrypted email via PGP to shreds. Our special guest William Woodruff joined us to help explain the vuln and indulge our gnashing of teeth on why email was never meant to be encrypted and how other modern tools do the job much, much better. Watch on YouTube: https://www.y…
…
continue reading

1
Privacy Reimagined: ZeroID and the New Era of Secure, Anonymous Connectivity
2:25
2:25
Play later
Play later
Lists
Like
Liked
2:25Welcome to Privacy Reimagined, the official podcast of ZeroID — your front-row seat to the future of secure communication, encrypted connectivity, and total digital freedom. In a world where surveillance is the default and personal data is currency, ZeroID is building something radically different: an ecosystem of crypto-powered privacy tools that …
…
continue reading

1
Britain Backs Down: UK Drops Encryption Backdoor Demand on Apple
20:29
20:29
Play later
Play later
Lists
Like
Liked
20:29A major international clash over encryption has come to a dramatic resolution. Earlier this year, the U.K. government, acting under its controversial Investigatory Powers Act of 2016 (IPA)—better known as the “Snoopers’ Charter”—issued a secret Technical Capacity Notice to Apple, demanding that the company weaken its Advanced Data Protection (ADP) …
…
continue reading

1
Episode 330 Deep Dive: Marco Pereira | The Day Encryption Breaks: Are We Ready for the Quantum Threat?
39:59
39:59
Play later
Play later
Lists
Like
Liked
39:59In this episode, we sit down with Marco Pereira, Executive Vice President and Global Head of Cybersecurity at Capgemini, as he explores the looming risk posed by quantum computing to current encryption standards. Marco breaks down what could happen the day encryption breaks—referred to as “Q Day”—and highlights why the urgency to prepare for quantu…
…
continue reading

1
Allianz Life 1.1M Records Leaked, UK Drops Apple Encryption Fight, Embassies Hit by XenoRAT
18:51
18:51
Play later
Play later
Lists
Like
Liked
18:51🎙️ Allianz Life 1.1M Records Leaked, UK Drops Apple Encryption Fight, Embassies Hit by XenoRAT 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 964: Today's episode will discuss the latest news as Allianz Life 1.1M Records Leaked with more news below: · Hijacked Satellites and Orbiti…
…
continue reading
Ensure that your messages are encrypted — it’s effortless and it’s a wise security precaution. The post ENCRYPT YOUR TEXTS! appeared first on sound*bytes.By SoundBytes
…
continue reading

1
Why Hackers Are Stealing Encrypted Data Now To Decrypt Later | David Close
44:27
44:27
Play later
Play later
Lists
Like
Liked
44:27Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast David Close, Chief Solutions Architect at Futurex, discusses the reality facing our digital world: quantum computing will soon break the encryption protecting everything from …
…
continue reading

1
Exploring Homomorphic Encryption: Fundamentals and Potential Applications in Finance
20:49
20:49
Play later
Play later
Lists
Like
Liked
20:49In this episode, Craig Jeffery and Brian Weeks explore homomorphic encryption, an emerging encryption method that allows data to be processed while still encrypted. They discuss how it works, why it matters, and potential future applications in finance, benchmarking, and fraud detection. When will it become relevant to treasury? Listen in for a for…
…
continue reading
A sceptical researcher incurs the wrath of a sinister occultist and soon finds himself embroiled in strange, escalating events. As fear mounts and time runs short, he must uncover the truth behind the mysterious forces pursuing him. “CASTING THE RUNES” (1911) is a chilling tale of unseen menace and supernatural revenge.This original recording is an…
…
continue reading

1
Episode 5: Q-Day is Coming: Quantum, Encryption, and the End of Digital Trust with John Young
46:10
46:10
Play later
Play later
Lists
Like
Liked
46:10In this fascinating episode of The CyberSoul.io, host Keelin Conant explores the revolutionary world of quantum computingwith special guest John Young, COO of Quantum eMotion America. As quantum technology rapidly advances, it’s reshaping the landscape of cybersecurity, digital trust, and encryption as we know it. Whether you're a tech enthusiast, …
…
continue reading

1
Epstein, Encryption, and Vanishing Trust—The Weekly
1:24:23
1:24:23
Play later
Play later
Lists
Like
Liked
1:24:23Contribute to Politicology at politicology.com/donate To unlock Politicology+ visit politicology.com/plus This week, Ron Steslow and Hagar Chemali (Fmr. spokesperson for the U.S. Mission to the UN) examine how efforts to “protect democracy” can sometimes undermine its foundations. They unpack the ongoing Epstein investigation and what it reveals ab…
…
continue reading

1
Farmers Insurance Data Breach, Large Interpol Cybercrime Crackdown in Africa Leads to Arrest of Over 1,200 Suspects, Colt Confirms Customer Data Stolen, DataIO Hit by Ransomware Attack
19:17
19:17
Play later
Play later
Lists
Like
Liked
19:17🎙️ Farmers Insurance 1M+ Breach, Interpol Arrests 1,200+, Colt Data Auctioned, Censorship Battle 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 967: Today's episode will discuss the latest news as Belgian Telecom 850K Breach with more news below: · Tech Companies Face FTC Scrutiny …
…
continue reading

1
The Trump administration’s big Intel investment comes from already awarded grants ... and more Tech news
5:28
5:28
Play later
Play later
Lists
Like
Liked
5:28Intel officially announced an agreement with President Donald Trump’s administration on Friday afternoon, following Trump’s statement that the government would be taking a 10% stake in the struggling chipmaker. While Intel says the government is making an “$8.9 billion investment in Intel common stock,” the administration does not appear to be comm…
…
continue reading

1
ULS 217: Could You Export That to an Epub? - Thundermail, Anime Catgirls, and FFmpeg
1:47:03
1:47:03
Play later
Play later
Lists
Like
Liked
1:47:03LibreOffice is dumping Windows (OK, not all of Windows), there's anime catgirls keeping the kernel safe, and FFmpeg makes a major new release. Kdenlive has a release, Thunderbird has announced ThunderMail, and one of the hosts gives CachyOS a spin. For tips we're covering Gnome System Extensions, using WirePlumber for volume control, hacks for waki…
…
continue reading

1
This is the moment the internet changed forever
20:26
20:26
Play later
Play later
Lists
Like
Liked
20:26https://youtu.be/1DwOQwRn8_Y https://odysee.com/@NaomiBrockwell:4/KYC:9 A huge portion of the digital world now requires mandatory ID checks. New surveillance laws such as the UK’s Online Safety Act, the EU’s Chat Control proposal, and a wave of US state-level KYC mandates have transformed the internet from an open network into a system of checkpoi…
…
continue reading

1
Not everybody is happy about Meta’s $10B data center, Waymo will start testing in NYC, and more
5:31
5:31
Play later
Play later
Lists
Like
Liked
5:31When Meta selected a site in Louisiana for its largest data center to date, it signed a deal with Entergy to power the site with three massive natural gas power plants. Earlier this week a state regulator approved Entergy’s plans. The power plants are expected to come online in 2028 and 2029, and at full strength, they’ll generate 2.25 gigawatts of…
…
continue reading

1
Episode 8: Navigating AI’s Impact with Manish Bhardia
27:53
27:53
Play later
Play later
Lists
Like
Liked
27:53In this episode of TheCyberSoul.io, we explore the transformative world of artificial intelligence with Manish Bhardia, president and co-founder of Think AI Corporation. From breaking down AI myths to revealing its real-world business impact, Manish shares invaluable insights into how AI is reshaping industries and redefining leadership in the digi…
…
continue reading

1
Microsoft AI chief says it’s ‘dangerous’ to study AI consciousness, plus former X employees may get severance
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43The debate over whether AI models could one day be conscious — and merit legal safeguards — is dividing tech leaders. In Silicon Valley, this nascent field has become known as “AI welfare,” and if you think it’s a little out there, you’re not alone. Also, more than two years after leaving the company, some former Twitter employees may finally recei…
…
continue reading

1
Hackers who exposed North Korean government hacker explain why they did it
4:33
4:33
Play later
Play later
Lists
Like
Liked
4:33Earlier this year, two hackers broke into a computer and soon realized the significance of what this machine was. As it turned out, they had landed on the computer of a hacker who allegedly works for the North Korean government. The two hackers decided to keep digging and found evidence that they say linked the hacker to cyberespionage operations c…
…
continue reading

1
Belgian Telecom 850K Breach, Apple Zero-Day Exploited, North Korea Uses GitHub for Diplomat Attacks
22:45
22:45
Play later
Play later
Lists
Like
Liked
22:45🎙️ Belgian Telecom 850K Breach, Apple Zero-Day Exploited, North Korea Uses GitHub for IT Worker Scams 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 966: Today's episode will discuss the latest news as Belgian Telecom 850K Breach with more news below: · Russian Hackers Accused in W…
…
continue reading

1
Google, sorry, but that Pixel event was a cringefest
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Late-night host Jimmy Fallon shouted,“I P 6 8! I P 6 8!,” trying and failing to fake excitement about the new Pixel smartphones. Fallon, who likely had never heard the technical term before, didn’t seem to realize that IP68 — a rating that indicates phones can survive being submerged in water — isn’t all that interesting as a selling point, nor is …
…
continue reading
Ron Steslow and Katherine Mangu-Ward discuss surveillance pricing, the role of government in data collection, the third-party doctrine that allows the government to buy personal data, and the marriage of corporate and state centralized power. Related Reading: Vox - Delta is using AI to give you a personalized airfare. It could be the future of pric…
…
continue reading

1
PyPI Cracks Down on Domain Expiration Attacks to Protect Python Packages
45:01
45:01
Play later
Play later
Lists
Like
Liked
45:01The Python Package Index (PyPI), the backbone of the global Python ecosystem, has rolled out new security safeguards aimed at stopping a dangerous form of supply-chain attack: domain resurrection attacks. These attacks exploit a subtle but devastating weakness—when a maintainer’s email domain expires, attackers can re-register it, hijack the email,…
…
continue reading

1
AI Joins the Fight Against Exploits: Google and Mozilla Patch Dangerous Vulnerabilities
59:42
59:42
Play later
Play later
Lists
Like
Liked
59:42Both Google and Mozilla have rolled out urgent security updates to patch multiple high-severity vulnerabilities in their flagship browsers—Google Chrome and Mozilla Firefox—underscoring the constant arms race between developers and cyber attackers. Google’s update addresses a critical out-of-bounds write vulnerability (CVE-2025-9132) within Chrome’…
…
continue reading

1
Zoox taps ex-UberPool exec’s startup for routing software help, also Notion now works without an internet connection
5:59
5:59
Play later
Play later
Lists
Like
Liked
5:59When James Cox, the former leader of Uber’s ride-share product, UberPool, left that company in 2019, the Silicon Valley giant had abandoned its autonomous vehicle development and sold off the division entirely. While UberPool had struggled to take hold, Cox felt a massive opportunity had been missed: taking the core of UberPool’s tech and applying …
…
continue reading

1
PipeMagic Backdoor: How Ransomware Actors Exploited a Windows Zero-Day
54:55
54:55
Play later
Play later
Lists
Like
Liked
54:55In early 2025, Microsoft and security researchers uncovered PipeMagic, a modular and memory-resident backdoor that has been quietly leveraged in ransomware campaigns worldwide. Disguised as a legitimate ChatGPT desktop application, this sophisticated malware granted persistent access, precise control, and stealthy communication channels to its oper…
…
continue reading

1
Intel Employee Data Exposed, Australia's TPG Telecom Investigating iiNet Hack, Organizations Hit by SharePoint Attacks, Innotiv Reports Ransomware Attack to SEC
17:29
17:29
Play later
Play later
Lists
Like
Liked
17:29🎙️ Intel Employee Data Exposed, Australia TPG Telecom Hacked, UK SharePoint Breaches 🚨 Join us daily on the CyberHub Podcast as we delve into the latest headlines for cybersecurity practitioners Ep – 965: Today's episode will discuss the latest news as Intel Employee Data Exposed with more news below: · Elastic Rejects Claims of Zero-Day RCE Flaw i…
…
continue reading

1
270,000 Intel Employee Records at Risk from Authentication Bypass and Hardcoded Credentials
36:28
36:28
Play later
Play later
Lists
Like
Liked
36:28In late 2024, Intel faced a major cybersecurity wake-up call when security researcher Eaton Zveare uncovered a series of vulnerabilities inside the company’s internal systems—flaws that exposed employee and supplier data at unprecedented scale. These vulnerabilities, later confirmed and patched by Intel, included authentication bypasses in web appl…
…
continue reading

1
Appeals court says NLRB structure unconstitutional and Meta rolls out AI-powered translations to creators globally
5:36
5:36
Play later
Play later
Lists
Like
Liked
5:36A federal appeals court handed SpaceX a win on Tuesday, in a ruling that prevents the National Labor Relations Board from prosecuting unfair labor practices against the company. The ruling by the Fifth District Court of Appeals, which suggests the structure of the NLRB is likely unconstitutional, could have far-reaching effects. Also, Meta is rolli…
…
continue reading
The Institute of Internal Auditors Presents: All Things Internal Audit In this episode, Carey Blakeman talks with Doris Myles about why influence can be more powerful than authority in internal auditing. Doris shares lessons from more than 20 years leading audits across global organizations and mission-driven institutions, emphasizing relationship …
…
continue reading
What AI website summaries mean for Internet economics. Time to urgently update Plex Servers (again). Allianz Life stolen data gets leaked. Chrome test Incognito-mode fingerprint script blocking. Chrome 140 additions coming in 2 weeks. Data brokers hide opt-out pages from search engines. Secure messaging changes in Russia. NIST rolls-out lightweight…
…
continue reading
What AI website summaries mean for Internet economics. Time to urgently update Plex Servers (again). Allianz Life stolen data gets leaked. Chrome test Incognito-mode fingerprint script blocking. Chrome 140 additions coming in 2 weeks. Data brokers hide opt-out pages from search engines. Secure messaging changes in Russia. NIST rolls-out lightweight…
…
continue reading

1
How Social Engineering and Vendor Weaknesses Led to Allianz Life’s Massive Breach
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45In July 2025, Allianz Life Insurance Company of North America confirmed a data breach impacting over 1.1 million customers, financial professionals, and employees—a stark reminder of how vulnerable even the most established financial institutions remain to evolving cyber threats. The breach stemmed from a third-party vendor compromise, specifically…
…
continue reading

1
MBW 986: Movies on the Moon - Apple's Leaked Upcoming Products!
2:19:17
2:19:17
Play later
Play later
Lists
Like
Liked
2:19:17A slew of Apple's planned upcoming products got leaked in software code! Blood Oxygen for the Apple Watch is back, but with a unique twist. Are the upcoming iPhone 17s for the U.S. market all manufactured in India? And Samsung is slowly taking more market share from Apple with the growing demand for folding and slimmer phones. Liquid Glass. Why? Ev…
…
continue reading
A slew of Apple's planned upcoming products got leaked in software code! Blood Oxygen for the Apple Watch is back, but with a unique twist. Are the upcoming iPhone 17s for the U.S. market all manufactured in India? And Samsung is slowly taking more market share from Apple with the growing demand for folding and slimmer phones. Liquid Glass. Why? Ev…
…
continue reading

1
Cloud Computing Heist: $3.5 Million Fraud Leads to Prison for Fake Crypto Influencer
47:58
47:58
Play later
Play later
Lists
Like
Liked
47:58The U.S. Department of Justice has closed the chapter on one of the most audacious cloud fraud and cryptojacking schemes in recent years. Charles O. Parks III, known online as “CP3O” and the self-styled “MultiMillionaire,” has been sentenced for orchestrating a multimillion-dollar scam that defrauded leading cloud providers out of more than $3.5 mi…
…
continue reading

1
TikTok’s latest feature lets college students find and connect with classmates, Meta is shaking up it AI org again, and Google pays out $30M
4:54
4:54
Play later
Play later
Lists
Like
Liked
4:54In a move reminiscent of Facebook’s early days, TikTok is launching a new feature that allows college students to find and connect with others on their campus. The feature, called Campus Verification, lets users add their college campus to their TikTok profile and browse a list of students at their school. Also, On Friday, The Information reported …
…
continue reading

1
Embassy Espionage: Kimsuky and Suspected Chinese Partners Deploy XenoRAT in Seoul
1:04:58
1:04:58
Play later
Play later
Lists
Like
Liked
1:04:58A new wave of state-sponsored cyber espionage is sweeping across South Korea, targeting foreign embassies through highly tailored, multi-stage spearphishing campaigns. Security researchers at Trellix have uncovered that this operation—likely linked to North Korea’s Kimsuky (APT43) group but with indicators of Chinese involvement—has been active sin…
…
continue reading

1
GSMA Confirms Flaws: Researchers Unveil Dangerous 5G Sniffing and Injection Attack
51:18
51:18
Play later
Play later
Lists
Like
Liked
51:18A groundbreaking security study from the Singapore University of Technology and Design has revealed a major vulnerability in 5G networks that allows attackers to bypass traditional defenses—without even needing a rogue base station. The newly released Sni5Gect attack framework demonstrates how adversaries within range of a victim can intercept and …
…
continue reading

1
SAP NetWeaver Under Siege: New Exploit Chains Threaten Global Enterprises
44:53
44:53
Play later
Play later
Lists
Like
Liked
44:53SAP NetWeaver, one of the world’s most critical enterprise platforms, is under active attack from both ransomware groups and state-backed hackers. A newly released exploit combines two devastating vulnerabilities—CVE-2025-31324 and CVE-2025-42999—to bypass authentication and execute malicious code with full administrative privileges. With CVSS scor…
…
continue reading

1
X’s declining Android app installs are hurting subscription revenue plus Spotify’s latest feature
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:02Elon Musk’s X is struggling on Android devices in terms of new installs, even while App Store downloads grow, according to new data from app intelligence provider Appfigures. In July 2025, X downloads on Google Play saw a significant decline, as new installs dropped by 44% year-over-year worldwide, even as iOS downloads grew by 15%. In other news, …
…
continue reading

1
#211 HIV Discrimination - Does it Still Exist in Dentistry?
20:17
20:17
Play later
Play later
Lists
Like
Liked
20:17The Divas take a deep dive into the attitudes, stigmas and facts surrounding the treatment of patients with HIV/AIDS. This compelling discussion includes historical as well as current information about providing oral health care to this very deserving group of patients. Resources: Williams Institute Study on HIV Discrimination in Dental Care https:…
…
continue reading

1
Ransomware Gangs Deploy Kernel-Level EDR Killers to Evade Detection
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36Ransomware gangs are no longer just encrypting files and demanding payment—they are actively targeting the very defenses meant to stop them. Recent reports reveal a dramatic surge in the use of EDR killer tools, specialized malware designed to disable Endpoint Detection and Response (EDR) and antivirus systems at the kernel level. By silencing thes…
…
continue reading

1
Chinese APTs Target Taiwan: UAT-7237’s SoundBill Loader and Gelsemium’s FireWood Backdoor
25:50
25:50
Play later
Play later
Lists
Like
Liked
25:50Taiwan continues to face an unprecedented wave of cyberattacks, with new intelligence exposing two distinct but sophisticated campaigns linked to Chinese threat actors. Together, they underscore Beijing’s increasingly aggressive cyber posture against Taiwan’s digital and critical infrastructure. The first campaign, attributed to UAT-7237, a subgrou…
…
continue reading

1
‘Crazy conspiracist’ and ‘unhinged comedian’: Grok’s AI persona prompts exposed, also Grammarly gets a design overhaul with multiple AI features
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10xAI’s website for its Grok chatbot is exposing the system prompts for several of its AI personas, including a “crazy conspiracist” that seems designed to handhold a user into beliefs that “a secret global cabal” controls the world. Also, the new interface adopts a block-first approach, letting you insert tables, columns, separators, lists and heade…
…
continue reading