Join Nick & Tan as they converse with special guests with astronomical backgrounds about their own unique views through The Galactic Window.
…
continue reading
Galactic Window Space Podcasts
Just Tap In is a space to remember your place in the greatest awakening in human history. Gen-Z host, Emilio Ortiz, reveals illuminating conversations and deep insights alongside the pioneers in mindset, health, business, science, and spirituality. Together, we are bridging the new consciousness and empowering the next generation of leaders to level up and co-create the New Earth. Humanity’s next evolution begins inward, and this platform serves to accelerate your self-discovery and go withi ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
1
Episode 62: Justin Anderson (High Hopes Aurora)
1:18:18
1:18:18
Play later
Play later
Lists
Like
Liked
1:18:18Original air date: 11-17-2025 Nick & Tan bring on Justin Anderson (High Hopes Aurora) to discuss the epic solar storms and northern lights shows we got to experience last week. Send us Fan Mail! The Galactic Window Space Podcast originally streams live, every Monday night at 9pm Central on YouTube as a video podcast. You can find it on the @TheOrbi…
…
continue reading
1
Hacker Movies Then vs Now [Threat Vector]
47:06
47:06
Play later
Play later
Lists
Like
Liked
47:06We dive into a nostalgic yet revealing journey through classic hacker films, from WarGames to The Net and beyond, to assess what they got right, what they wildly imagined, and what those stories say about culture, fears, and cyber reality today. David Moulton, Senior Director of Thought Leadership for Unit 42 talks with Ben Hasskamp, Global Content…
…
continue reading
1
Identifying vulnerabilities in space with Bigbear.ai. [Deep Space]
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Please enjoy this encore of T-Minus Deep Space. BigBear.ai is at the forefront of innovation for national security, and is committed to supporting the critical infrastructure driving America’s competitive edge. The company deploys cutting-edge Al, machine learning, and computer vision solutions to defend critical operations and win with decision ad…
…
continue reading
Report sheds light on cyber activity targeting space-related organizations during the Gaza War. Russian threat actor targets US civil engineering firm. FBI says $262 million has been stolen in account takeover scams this year. HashJack attack tricks AI browser assistants. London councils disrupted by cyberattacks. Russia’s Gamaredon and North Korea…
…
continue reading
1
#247 Jamie Butler – Channeling Maitland & Grace: The New Children, Telepathic Evolution & Humanity’s Great Shift in Consciousness
1:55:09
1:55:09
Play later
Play later
Lists
Like
Liked
1:55:09In this soul-expanding interview, Jamie Butler joins Emilio Ortiz for one of the most profound conversations yet on Just Tap In Podcast. Jamie opens up about humanity’s ongoing awakening since 2020, the evolution of intuitive abilities, and how society is moving from a culture of constant “doing” to one of stillness and emotional intelligence. She …
…
continue reading
CISA warns of spyware targeting messaging apps. CodeRED, this is not a test. Infostealer campaign spreads via malicious Blender files. Shai-Hulud’s second coming. Real estate finance firm SitusAMC investigates breach. Dartmouth College discloses Oracle EBS breach. Dave Bittner is joined by Tim Starks, Senior reporter from CyberScoop, to discuss the…
…
continue reading
1
A midseason takeaway. [CISO Perspectives]
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37In this mid-season episode, Kim takes a step back to reflect on the conversations he has had so far. During the episode, Kim sits down with N2K's own Ethan Cook to connect the dots across episodes, diving into how new technologies are impacting longstanding challenges, both from a security standpoint and from an attacker's view. Whether you're catc…
…
continue reading
CrowdStrike fires an insider who allegedly shared screenshots with hackers. Google agrees, it wasn’t Salesforce. Cox Enterprises confirms Oracle EBS breach. Alleged Transport for London hackers plead not guilty. Hackers exploit new WSUS bug to deploy ShadowPad backdoor. Iberia discloses breach of customer data. Harvard discloses voice-phishing brea…
…
continue reading
1
How realistic is A House of Dynamite? [T-Minus Deep Space]
36:03
36:03
Play later
Play later
Lists
Like
Liked
36:03The new Netflix movie A House of Dynamite, chronicles what happens when the unthinkable unfolds. How realistic is it? We ask the movie’s advisor and expert, Lieutenant General Daniel Karbler (Ret.). Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. Want to hear your co…
…
continue reading
1
Satya Gupta: Rising to your contribution. [CTO] [Career Notes]
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55Please enjoy this encore of Career Notes. Co-founder and CTO of Virsec, Satya Gupta shares his story of how he has over 25 years of expertise in embedded systems, network security and systems architecture. He also talks about how a colleague of his told him something that resinated with him, he said " that was really a remarkable statement that I h…
…
continue reading
1
DataTribe's Cyber Innovation Day: Cyber: The Wake of Tech Innovation. [Special Edition]
47:53
47:53
Play later
Play later
Lists
Like
Liked
47:53On this Special Edition podcast, we share a panel from DataTribe's Cyber Innovation Day 2025, "Cyber: The Wake of Tech Innovation." The podcast tech host panel included Dave Bittner, host of CyberWire Daily podcast, Maria Varmazis, host of T-Minus Space Daily podcast, and Daniel Whitenack, co-host of Practical AI podcast, sharing a wide-ranging dis…
…
continue reading
1
Two RMMs walk into a phish… [Research Saturday]
24:00
24:00
Play later
Play later
Lists
Like
Liked
24:00Alex Berninger, Senior Manager of Intelligence at Red Canary, and Mike Wylie, Director, Threat Hunting at Zscaler, join to discuss four phishing lures in campaigns dropping RMM tools. Red Canary and Zscaler uncovered phishing campaigns delivering legitimate remote monitoring and management (RMM) tools—like ITarian, PDQ, SimpleHelp, and Atera—to gai…
…
continue reading
Cyber Command names a new head of AI. The UK introduces its long-delayed Cyber Security and Resilience Bill. Researchers highlight a critical Oracle Identity Manager flaw. Salesforce warns customers of a third-party data breach. Italy’s state-owned railway operator leaks sensitive information. SonicWall patches firewalls and email security devices.…
…
continue reading
1
Inside Jingle Thief Cloud Fraud Unwrapped [Threat Vector]
36:10
36:10
Play later
Play later
Lists
Like
Liked
36:10In this special episode of Threat Vector, host David Moulton, Senior Director of Thought Leadership for Unit 42, sits down with Stav Setty, Principal Researcher at Palo Alto Networks, to unpack Jingle Thief a cloud-only, identity-driven campaign that turned Microsoft 365 into a gift card printing press. Stav explains how the Morocco based group kno…
…
continue reading
The US and allies sanction Russian bulletproof hosting providers. The White House looks to sue states over AI regulations. The US Border Patrol flags citizens’ “suspicious” travel patterns. Lawmakers seek to strengthen the SEC’s cybersecurity posture. A new Android banking trojan captures content from end-to-end encrypted apps. A hidden browser API…
…
continue reading
1
The oversized file that stalled the internet.
29:46
29:46
Play later
Play later
Lists
Like
Liked
29:46Cloudflare’s outage is rooted in an internal configuration error. The Trump administration is preparing a new national cyber strategy. CISA gives federal agencies a week to secure a new Fortinet flaw. MI5 warns that China is using LinkedIn headhunters and covert operatives to target lawmakers. Experts question the national security risks of TP-Link…
…
continue reading
Cloudflare suffers a major outage. Google issues an emergency Chrome update. Logitech discloses a data breach. CISA plans a major hiring push. The House renews the State and Local Cybersecurity Grant Program. The GAO warns military personnel are oversharing online. Tech groups urge governments worldwide to reject proposals that weaken or bypass enc…
…
continue reading
Managing identity has been an evolving challenge as networks have only continued to grow and become more sophisticated. In this current landscape, these challenges have only become further exacerbated with new emerging technologies. In this episode of CISO Perspectives, host Kim Jones sits down with Richard Bird from Singular AI to discuss this e…
…
continue reading
The Pentagon is spending millions on AI hacking. The New York Times investigates illicit crypto funds. Researchers uncover widespread remote code execution flaws in AI inference engines. Police in India arrest CCTV hackers. Payroll Pirates use Google Ads to steal credentials and redirect salaries. A large-scale brand impersonation campaign delivers…
…
continue reading
1
Chenxi Wang: Overcoming the obstacle of fear. [Venture Capital] [Career Notes]
9:52
9:52
Play later
Play later
Lists
Like
Liked
9:52Please enjoy this encore of Career Notes. Founder and general partner of Rain Capital, Chenxi shares her story and how she conquered and got over the obstacle of fear to reach her goals in life. " I realized a lot of times my obstacle is my own fear rather than a real obstacle" Wang states, she also shares her story of breaking glass ceilings as a …
…
continue reading
1
When clicks turn criminal. [Research Saturday]
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25Dr. Renée Burton, Vice President of Threat Intelligence from Infoblox, is sharing the team's work on "Deniability by Design: DNS-Driven Insights into a Malicious Ad Network." Infoblox returns with new threat actor research uncovering Vane Viper, a Cyprus-based holding company behind PropellerAds—one of the world’s largest advertising networks. The …
…
continue reading
Anthropic reports China-linked hackers used Claude AI in an automated espionage campaign. Google reconsiders its upcoming “Developer Verification” policy for Android. AT&T customers affected by two data breaches in 2024 can now file claims. Nearly 10,000 Washington Post employees were affected by a data breach. ASUS and Imunify360 patch critical fl…
…
continue reading
Operation Endgame expands global takedowns. The U.S. is creating a Scam Center Strike Force. Microsoft rolls out its delayed “Prevent screen capture” feature for Teams. Proton Pass patches a clickjacking flaw. Researchers uncover previously undisclosed zero-day flaws in both Citrix and Cisco Identity Services Engine. Android-based digital picture f…
…
continue reading
Patch Tuesday. Google sues a “phishing-as-a-service” network linked to global SMS scams, and launches “private ai compute.” Hyundai notifies vehicle owners of a data breach. Amazon launches a bug bounty program for its AI models. The Rhadamanthys infostealer operation has been disrupted. An initial access broker is set to plead guilty in U.S. feder…
…
continue reading
1
Episode 61: Aurora, Meteors, and Comets!
1:08:52
1:08:52
Play later
Play later
Lists
Like
Liked
1:08:52Original air date: 11/12/2025. Nick & Tan share the hottest night sky events to see this November! Send us Fan Mail! The Galactic Window Space Podcast originally streams live, every Monday night at 9pm Central on YouTube as a video podcast. You can find it on the @TheOrbitalAlliance channel. We would love to have you join the fun by participating i…
…
continue reading
1
Transitioning from service to civilian life. [T-Minus Deep Space]
30:05
30:05
Play later
Play later
Lists
Like
Liked
30:05Lieutenant Rob Sarver and Alex Gendzier are the authors of Warrior to Civilian: The Field Manual for the Hero's Journey, the definitive guide to transition to civilian life for veterans and their spouses and families. The book aims to provide actionable advice to veterans looking for work, while coaching those in hiring positions to give veterans t…
…
continue reading
1
The changing face of fraud. [CISO Perspectives]
36:51
36:51
Play later
Play later
Lists
Like
Liked
36:51Fraud has always been a consistent challenge. As the world has continued to become increasingly interconnected and as new technologies have become widely available, threat actors have continued to evolve their tactics. In this episode of CISO Perspectives, host Kim Jones sits down with Mel Lanning from the Better Business Bureau to discuss fraud …
…
continue reading
1
Rebooting the government, one cyber law at a time.
29:54
29:54
Play later
Play later
Lists
Like
Liked
29:54Ending the government shutdown revives an expired cybersecurity law. The DoD finalizes a new model for building U.S. military cyber forces. A North Korean APT exploits Google accounts for full device control. The EU dials back AI protections in response to pressure from Big Tech companies and the U.S. government. Researchers discover a critical vul…
…
continue reading
1
#245 Rux – The 2027 Prophecy: How the Stars Foretell Humanity’s Next Leap in Evolution
1:33:08
1:33:08
Play later
Play later
Lists
Like
Liked
1:33:08We are standing on the edge of a massive energetic turning point. In this episode, top astrologer Rux from Written in the Stars joins Emilio Ortiz to decode the powerful astrology of 2026–2027, revealing how the upcoming planetary alignments — including Pluto in Aquarius, Uranus in Gemini, and the Saturn–Neptune conjunction in Aries — are setting t…
…
continue reading
1
Michael DeBolt: From acting to cyber. [Intelligence] [Career Notes]
7:38
7:38
Play later
Play later
Lists
Like
Liked
7:38Please enjoy this encore of Career Notes. Chief intelligence officer at Intel 471, Michael shares his story where he started as an actor and quickly changed over to intelligence and what the transition was like for him. Michael grew up wanting to be an actor and even was able to land some acting jobs, after going into the Marine Corps he decided to…
…
continue reading
1
#244 Nancy Rebecca – The 3I/ATLAS Transmission: Blue-Light DNA Activations, The Sleeping Dragon & Humanity’s 2025 Awakening
1:36:39
1:36:39
Play later
Play later
Lists
Like
Liked
1:36:39Humanity is in a pivotal energy window between October and December 19, as the interstellar object 3I/ATLAS passes through our solar field. In this powerful new episode, intuitive healer and clairvoyant nurse Nancy Rebecca reveals how this cosmic event is transmitting waves of blue-light frequency that are catalyzing DNA shifts, awakening multidime…
…
continue reading
1
A fine pearl gone rusty. [Research Saturday]
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59Tal Peleg, Senior Product Manager, and Coby Abrams, Cyber Security Researcher of Varonis, discussing their work and findings on Rusty Pearl - Remote Code Execution in Postgres Instances. The flaw could allow attackers to execute arbitrary commands on a database server’s operating system, leading to potential data theft, destruction, or lateral move…
…
continue reading
1
#243 Barbara Hand Clow – The 3I/ATLAS Comet: Catalyst for Humanity’s Awakening & the 2025–2027 Ascension Window
1:17:39
1:17:39
Play later
Play later
Lists
Like
Liked
1:17:39In this powerful new interview, astrologer and author Barbara Hand Clow returns to Just Tap In Podcast to decode the cosmic significance of the approaching 3I ATLAS comet and the extraordinary 2025–2027 energetic window it activates. Barbara explains how this fiery interstellar visitor interacts with Earth’s magnetic field and why ancient civilizat…
…
continue reading
The CBO was hacked by a suspected foreign actor. Experts worry Trump’s budget cuts weaken U.S. cyber defenses. Regulation shapes expectations. ClickFix evolves on macOS. Notorious cybercrime groups form a new “federated alliance.” Congressional leaders look to counter China’s influence in 6G networks. An EdTech firm pays $5.1 million to settle data…
…
continue reading
1
The role of AI in Zero Trust. [CyberWire-X]
23:25
23:25
Play later
Play later
Lists
Like
Liked
23:25Zero Trust has been top of mind for years, but how is AI changing what that actually looks like in practice? In this episode of CyberWire-X, Dave Bittner is joined by Deepen Desai, Chief Security Officer at Zscaler, to discuss the transformative impact of AI on Zero Trust security frameworks. The discussion outlines how AI enhances threat preventio…
…
continue reading
Cisco patches critical vulnerabilities in its Unified Contact Center Express (UCCX) software. CISA lays off 54 employees despite a federal court order halting workforce reductions. Gootloader malware returns. A South Korean telecom is accused of concealing a major malware breach. Russia’s Sandworm launches multiple wiper attacks against Ukraine. Ch…
…
continue reading
1
#242 Dana Kippel – Plasma Consciousness: The Living Intelligence Bridging Science, Spirit & The Rise of the New Human
1:41:48
1:41:48
Play later
Play later
Lists
Like
Liked
1:41:48In this groundbreaking interview, Dana Kippel — polymath and author of A New Force: Plasma Consciousness and New Human Potential — joins Emilio Ortiz to reveal how plasma consciousness is the next great discovery uniting science and spirit. Dana describes plasma as the living intelligence of the universe, the energetic bridge between matter and con…
…
continue reading
1
Episode 60: Ryan O'Neal (Sleeping At Last)
1:25:47
1:25:47
Play later
Play later
Lists
Like
Liked
1:25:47Original air date: 11/3/2025. Nick & Tan explore what happens when astronomy and music collide in this deep conversation with Ryan O'Neal, aka Sleeping At Last. Send us Fan Mail! The Galactic Window Space Podcast originally streams live, every Monday night at 9pm Central on YouTube as a video podcast. You can find it on the @TheOrbitalAlliance chan…
…
continue reading
Operation “Chargeback” takes down global fraud networks. An investigation reveals the dangers of ADINT. M&S profits plunge after a cyberattack. Google patches a critical Android flaw. Asian prosecutors seize millions from an accused Cambodian scam kingpin. Ohio residents are still guessing water bills months after a cyberattack. Houston firefighter…
…
continue reading
1
#241 Alexander Quinn – The 3I/ATLAS Prophecy: Arcturian Messages on Earth’s Cosmic Reset & Humanity’s Galactic Awakening
1:44:07
1:44:07
Play later
Play later
Lists
Like
Liked
1:44:07Join The Deep Dive(Life-changing teachings for spiritual mastery, guided sound journeys, and access to live community gatherings to share your most authentic self) https://iamemilioortiz.com/the-deep-d... As the interstellar object 3I/ATLAS draws closer to the Sun on October 29, 2025, the world stands at the threshold of a mysterious celestial mome…
…
continue reading
China-Linked hackers target Cisco firewalls. MIT Sloan withdraws controversial “AI-Driven Ransomware” paper. A new study questions the value of cybersecurity training. Hackers exploit OpenAI’s API as a malware command channel. Apple patches over 100 Security flaws across devices. A Florida-based operator of mental health and addiction treatment cen…
…
continue reading
1
#240 Lee Harris – Awakening the Future Human: The 2026 Shift & The Z’s Message for Humanity’s Evolution
1:21:10
1:21:10
Play later
Play later
Lists
Like
Liked
1:21:10In this transformative interview, spiritual teacher Lee Harris channels the Z’s to share a 2026 energy update about humanity’s accelerating evolution. Together with Emilio Ortiz, Lee explores how cosmic consciousness, technology, and the human heart are converging to reshape our future. The Z’s reveal why 2025–2026 marks a historic turning point fo…
…
continue reading
1
Privacy needs where you least expect it. [CISO Perspectives]
36:08
36:08
Play later
Play later
Lists
Like
Liked
36:08When discussing privacy risks, many often look to implementing strong encryption, secure data storage practices, and data sanitization processes to help ensure sensitive information remains protected. Though these practices are good and should be prioritized, many often miss other key areas that need just as much focus. As the internet of things ha…
…
continue reading
The FCC plans to roll back cybersecurity mandates that followed Salt Typhoon. The alleged cybercriminal MrICQ has been extradited to the U.S. Ransomware negotiators are accused of conducting ransomware attacks. Ernst & Young accidentally exposed a 4-terabyte SQL Server backup. A hacker claims responsibility for last week’s University of Pennsylvani…
…
continue reading
1
#239 Sarah Elkhaldy – The Turning of the Ages: 2026, Light Codes & The Alchemy of the Human Spirit
1:44:25
1:44:25
Play later
Play later
Lists
Like
Liked
1:44:25Join The Deep Dive(Life-changing teachings for spiritual mastery, guided sound journeys, and access to live community gatherings to share your most authentic self) https://iamemilioortiz.com/the-deep-d... The Alchemist, Sarah Elkhaldy joins Emilio Ortiz, as humanity moves through the most intense energetic passage of our time. Together in this inte…
…
continue reading
1
Arti Lalwani: Supporting and being the change. [Risk Management] [Career Notes]
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28Risk Management and Privacy Knowledge Leader at A-LIGN, Arti Lalwani shares her story from finance to risk management and how she made the transition. Arti started her career in finance after graduating with a finance degree. Quickly learning the field was not for her, she decided to dip her toes into the tech world. She credits her mentors for hel…
…
continue reading
1
Attack of the automated ops. [Research Saturday]
19:40
19:40
Play later
Play later
Lists
Like
Liked
19:40Today we are joined by Dario Pasquini, Principal Researcher at RSAC, sharing the team's work on WhenAIOpsBecome “AI Oops”: Subverting LLM-driven IT Operations via Telemetry Manipulation. A first-of-its-kind security analysis showing that LLM-driven AIOps agents can be tricked by manipulated telemetry, turning automation itself into a new attack vec…
…
continue reading
CISA says cooperation between federal agencies and the private sector remains steady. Long-standing Linux kernel vulnerability in active ransomware campaigns confirmed. A Chinese-linked group targets diplomatic organizations in Hungary, Belgium, and other European nations. A government contractor breach exposes data of over 10 million Americans. Lu…
…
continue reading
1
#238 Anjie Hipple – The Judah Transmission: Mastering Time, Energy & Attention to Awaken the True You
1:17:22
1:17:22
Play later
Play later
Lists
Like
Liked
1:17:22Join The Deep Dive(Life-changing teachings for spiritual mastery, guided sound journeys, and access to live community gatherings to share your most authentic self) https://iamemilioortiz.com/the-deep-d... In this activating interview, channeler Anjie Hipple brings through Judah, a collective of 350,000 angelic beings, to reveal how your Time, Energ…
…
continue reading
Happy Halloween from the team at N2K Networks! We hope you share in our Halloween tradition of listening to the Malware Mash. You can check out our video here. Lyrics I was coding in the lab late one night when my eyes beheld an eerie sight for my malware threat score began to rise and suddenly to my surprise... It did the Mash It did the Malware…
…
continue reading