Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Hackers World Podcasts
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading

1
Culture Hackers
Robbe Richman and a cast of hackers, troublemakers, movers and shakers, Robbe Richman
A show all about culture hacking - at companies, in business and the world. The first episodes are the free audio book of Robert Richman's "Culture Blueprint."
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Learn all the hacks to upgrade your life, money and travel – all while spending less and saving more. Host Chris Hutchins is a life hacker who has saved millions by breaking down every aspect of life, looking to maximize happiness at the lowest cost. Chris and guests like Tim Ferriss, Tony Hawk, Codie Sanchez and Gary Vaynerchuk will help you learn the strategies and tactics they used to shape their success.
…
continue reading
Arvid Kahl talks about starting and bootstrapping businesses, how to build an audience, and how to build in public.
…
continue reading
MAD Warfare™️ is a science-driven deep dive into the wild, weird, and sometimes wicked world of the “weaponization of everything.” But don’t worry—IT WILL BE FUN. Think of it as your covert ops manual for spotting how cyber hackers, rogue AI agents, and shady “bad actors” (who’d be terrible in a buddy comedy) are messing with our minds. Often in ways that evade detection… until it’s too late. With expert interviews from unexpected places and plenty of offbeat insights, this podcast reveals t ...
…
continue reading
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 18:00 UTC.
…
continue reading
This is a Podcast syncs with Hacker News (https://news.ycombinator.com) automatically
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Hacker Anthology is what happens when you inject fiction into the command line of reality. Faction stories — part fact, part fiction — spun from real-world headlines, startup chaos, cyber leaks, and tech drama. Imagine HackerNews got drunk with Black Mirror, and they started roleplaying historical fiction. That’s us. We take raw internet lore — a GitHub repo flame war, a VC meltdown, an obscure RFC gone rogue — and remix it into cinematic short stories told from the POV of AI misfits, termin ...
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
Download This Show is your weekly guide to the world of media, culture, and technology. From social media to gadgets, streaming services to privacy issues. Each week Rae Johnston and guests take a fun, deep dive into how technology is reshaping our lives.
…
continue reading
Building a company is hard. We share real, grounded conversations with people doing just that. From solo devs to venture-backed founders. Hosted by Dave Berner (co-founder of Kinde), this podcast skips the playbook talk and gets into what building actually looks like day to day.
…
continue reading
The World Crypto Network is an independent media organization that keeps you up to date with the latest news on Bitcoin and cryptocurrency.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Legitimate Cybersecurity Podcast - designed to empower you with real-world cybersecurity information, stories, and advice.
…
continue reading
Life is hard. This podcast will help. Lessons from the greatest thinkers on the planet with Chris Williamson. Including guests like David Goggins, Dr Jordan Peterson, Naval Ravikant, Sam Harris, Jocko Willink, Dr Andrew Huberman, Dr Julie Smith, Steven Bartlett, Ryan Holiday, Robert Greene, Matthew McConaughey, Alain de Botton, Alex Hormozi, Tony Robbins, Chris Bumstead, Mark Manson and more.
…
continue reading
Join tech veterans Graham Cluley and Mark Stockley as they dive headfirst into the hilarious, bizarre, and downright mind-boggling world of artificial intelligence, looking into deepfakes, machine learning, and whether it’s too late to make peace with our robot overlords. It’s not your typical AI podcast… Winner of Best New Podcast 2025. https://theaifix.show Support the show and gain access to ad-free episodes by becoming a supporter: Join The AI Fix Plus at https://theaifix.show/plus
…
continue reading
In the shadows of the digital world, where anonymity is power and information is currency, battle lines are drawn not with bullets but with code. This show takes listeners deep into the heart of cyberspace’s most high-stakes confrontations — where rogue programmers exploit vulnerabilities, corporations scramble to secure their data empires, and government agencies wage invisible wars across invisible lines. It’s a realm shaped by encryption, espionage, whistleblowers, and wild ambition. From ...
…
continue reading
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through news, research, and real-world examples. Join us for a thought-provoking journey into a world where anything can be faked, truth is increasingly elusive, and human nature meets artificial intelligence head-on.
…
continue reading
Hi! I'm a self development coach, meditation teacher, and Idea Incubator based in San Francisco. Join me as I speak with the bright minds that light up my world
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
The Peabody Award-winning On the Media podcast is your guide to examining how the media sausage is made. Hosts Brooke Gladstone and Micah Loewinger examine threats to free speech and government transparency, cast a skeptical eye on media coverage of the week’s big stories and unravel hidden political narratives in everything we read, watch and hear.
…
continue reading
Are workers really losing a measurable amount of brain power—the kind leaders rely on to innovate? Are CEOs really turning to a secretive world of underground negotiators to pay off millions of dollars to hackers? And what's the real reason people won't return to work? In this new podcast, we'll be hitting top-of-mind subjects for corporate leaders. Hosted by Korn Ferry CMO Jill Wiltfong, listeners and viewers will be treated to recreated scenes, special audio clips and intriguing interviews ...
…
continue reading
Everyday society depends more on electronics, social media etc, and by doing so they expose their private data to the public eye. Each Saturday, join Hackers Con Calle is a group of Cyber Security professionals dedicated to inform the audience of current trends and a how to protect the digital life.
…
continue reading
Buzz My Biz provides an innovative platform that simplifies cybersecurity with a scalable, all-in-one approach—delivering enterprise-grade protection tailored to businesses of all sizes. Whether it’s safeguarding your data, endpoints, or cloud infrastructure, we’re equipped to help you stay secure in today’s digital landscape. Recently, our cybersecurity platform has been recognized with prestigious accolades, including three 2024 Cybersecurity Excellence Awards—most notably as the Fastest G ...
…
continue reading
David Bombal interviews people in the networking world to learn about life, hacks, technology and networking and ways to improve your life!
…
continue reading
Join Art and Ashton as they dive into the world of scams, true crime, and everything in between. From exposing fraudsters to raw, unfiltered discussions with fascinating guests, this is Trilogy Media—bold, honest, and unapologetically real.
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Host Jean Ponzi presents information, education and conversation with activists and experts on environmental issues and all things "green." Produced in the studios of KDHX Community Media in St. Louis, MO.
…
continue reading
The API Hour is your front-row seat to where APIs meet InfoSec. Hosted by Dan Barahona and brought to you by APIsec University, each episode dives into real-world breaches, testing tactics, and the tools shaping AppSec. Whether you're building, breaking, or securing APIs, you'll get practical insights from the experts redefining API security. Plug in, lock down, and decode what’s really going on behind the APIs—because in a connected world, security is everything.
…
continue reading
You can afford anything, but not everything. We make daily decisions about how to spend money, time, energy, focus and attention – and ultimately, our life. How do we make smarter decisions? How do we think from first principles? On the surface, Afford Anything seems like a podcast about money and investing. But under the hood, this is a show about how to think critically, recognize our behavioral blind spots, and make smarter choices. We’re into the psychology of money, and we love metacogn ...
…
continue reading
Podcast by Junseth
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading

1001
The Controversial World of Jonathan Scott's Cybersecurity Claims
33:16
33:16
Play later
Play later
Lists
Like
Liked
33:16The provided text analyzes Jonathan Scott, also known as @jonathandata1, a figure in cybersecurity known for his polarizing claims. Scott presents himself as an expert in mobile malware and digital forensics, despite facing widespread criticism from his peers who label his work as disinformation and pseudoscience. While he possesses some verifiable…
…
continue reading

1
#502: Hacker Explains VPN Hacking: ADMIN access without password (real world demo)
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55Big thank you to DeleteMe for sponsoring this video. Go to joindeleteme.com/Bombal to receive a 20% discount. Discover how attackers exploit enterprise VPNs like Fortinet to gain admin access and compromise networks. In this video, OTW exposes a real authentication bypass exploit, explains the risks of outdated VPN devices, and shares expert tips o…
…
continue reading

1
Chinese agent tried to recruit Stanford Student - 2025-09-02
56:13
56:13
Play later
Play later
Lists
Like
Liked
56:13Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — It’s 8ft skeleton season. 02:18 - BHIS - Talkin’ Bout [infosec] News 2025-09-02 03:07 - Story # 1: Salesloft breached to steal OAuth tokens for Salesforce data-theft attacks 07:35 - Story # 2: DSLRoot, Proxies, and the Threat of ‘Legal Bot…
…
continue reading

1
Don’t trust that app! [Research Saturday]
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth a…
…
continue reading

1
#990 - Dr Tara Swart - How to Use Your Intuition as a Superpower
1:24:39
1:24:39
Play later
Play later
Lists
Like
Liked
1:24:39Dr Tara Swart is a neuroscientist, senior lecturer at MIT Sloan, and an author. What is intuition? We’ve all heard the phrase “trust your gut,” but where does that feeling actually come from? Is it grounded in neuroscience or something more mysterious? And most importantly, can you rely on it, and how do you get better at listening to it? Expect to…
…
continue reading

1
No, Trump Isn't Cracking Down on Crime. Plus, How Ukrainians Tell Their Story of the War.
54:39
54:39
Play later
Play later
Lists
Like
Liked
54:39President Trump is preparing to send the National Guard to cities across the country. On this week’s On the Media, what the press is missing about the president’s so-called “crackdown” on crime. Plus, in the aftermath of a Russian attack, a Ukrainian town asks journalists to record the atrocities. [01:00] Host Micah Loewinger speaks with Jamison Fo…
…
continue reading

1
From Submarines to Cybersecurity: Chris Adkins’ Wild Journey Into Cyber Defense
48:42
48:42
Play later
Play later
Lists
Like
Liked
48:42What do submarines, Linux servers, Apple X Servers, and SOC analysts all have in common? They were all part of Chris Adkins’ path into cybersecurity. In this episode of Legitimate Cybersecurity, Frank and Dustin dive deep with Chris as he shares his unique journey from being a sonar technician in the U.S. Navy to breaking into cyber through a SOC—a…
…
continue reading

1
Wheels left spinning after cyber incident.
29:42
29:42
Play later
Play later
Lists
Like
Liked
29:42A cyberattack disrupts Bridgestone’s manufacturing operations. CISA warns of critical vulnerabilities in products used across multiple sectors. Additional cybersecurity firms confirm data exposure in the recent Salesforce–Salesloft Drift attack. A configuration vulnerability in Sitecore products leads to remote code execution. HHS promises stricter…
…
continue reading

1
Briefings: Is There a Doctor in the House?
15:29
15:29
Play later
Play later
Lists
Like
Liked
15:29Can technology solve the physician shortage? Healthcare systems are facing a critical challenge: too few doctors and too much demand. While technology could be the answer, 0% of physician executives say their organizations are truly on the “leading edge” of innovation. In this episode, three experts break down how innovation, technology, and leader…
…
continue reading

1
First Friday: Jerome Powell's Remarks at Jackson Hole
17:58
17:58
Play later
Play later
Lists
Like
Liked
17:58The jobs report came out this morning and it was a painful one. The US added only 22,000 new jobs in August, according to the latest BLS report. And unemployment ticked up to 4.3%. What does this mean? Find out in today's First Friday episode! Timestamps: Note: Timestamps will vary on individual listening devices based on dynamic advertising run ti…
…
continue reading

1
Satoshi's Bride: Reconstruction of a Lost Narrative The original complete manuscript of the story was "left on the system lost".
51:36
51:36
Play later
Play later
Lists
Like
Liked
51:36The book "The Indelible Mark: A Protocol for the Heart" was created through a unique collaboration between its author, Alberto Daniel Hill, and an artificial intelligence (AI). The creation process itself is deeply intertwined with the book's core themes.Here's a breakdown of how the book was created:• Reconstruction of a Lost Narrative The origina…
…
continue reading
Explore the latest in technology, social media, consumer electronics, digital culture and more. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy ABC listen
…
continue reading
You know that moment when you realize the ground has shifted beneath your feet? I had one of those moments recently. I was watching an AI agent build out a complex feature for Podscan in about twenty minutes – something that would have taken me days to code properly just a year ago. And it hit me: the rules of the game have fundamentally changed. T…
…
continue reading

1
Satoshi's bride. Anna's Digital Heartbreak: A Soundtrack of Love and Loss.
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35The story of Anna, Satoshi, and Alberto Daniel Hill, titled "The Indelible Mark: A Protocol for the Heart," came into existence through a unique collaboration between its author, Alberto Daniel Hill, and an artificial intelligence. The creation process itself is deeply intertwined with the book's core themes, mirroring the very concepts that animat…
…
continue reading
The Kremlin has mastered controlling the message online. But now, tens of thousands of soldiers are coming home from Ukraine with stories the state can’t erase. Kateryna Stepanenko, a Russia analyst with the Institute for the Study of War, explains why those voices scare Vladimir Putin — and how far he’ll go to keep them quiet. Learn about your ad …
…
continue reading

1
Hacking Consciousness and Ordering Chaos
1:07:54
1:07:54
Play later
Play later
Lists
Like
Liked
1:07:54Welcome back to The FAIK Files! In this week's episode: HexStrike - the AI-powered hacking tool that can exploit zero-day vulnerabilities in minutes instead of months Diverging expert opinions on AI consciousness and welfare Switzerland's ambitious new open-source AI model "Apertus" Taco Bell is experiencing indigestion after several embarrassing v…
…
continue reading

1
TNW 403: Google Dodges Chrome Sale - Ruling in Google's Antitrust Case
1:10:00
1:10:00
Play later
Play later
Lists
Like
Liked
1:10:00Abrar Al-Heeti of CNET joins Mikah Sargent this week for Tech News Weekly! Apple plans to build its own AI search engine to rival OpenAI. OpenAI is working on improving its models to help users in mental distress. Apple's September event is right around the corner. And the judge in the antitrust case against Google ruled this week! Abrar talks abou…
…
continue reading
Salt Typhoon marks China’s most ambitious campaign yet. A major Google outage hit Southeastern Europe. A critical zero-day flaw in FreePBX gets patched. Scattered Lapsus$ Hunters claim the Jaguar Land Rover hack. Researchers uncover a major evolution in the XWorm backdoor campaign. GhostRedirector is a new China-aligned threat actor. CISA adds a pa…
…
continue reading

1
Anatomy of a Twitter Space: A Multi-Layered Analysis of "Casual Sunday" Discourse.
12:22
12:22
Play later
Play later
Lists
Like
Liked
12:22The analysis of the "Casual Sunday" Twitter Space reveals a complex and dynamic conversational ecosystem that defies simple categorization. It is not merely a social chat, a political debate, or a shared entertainment stream, but a hybrid environment that fluidly integrates elements of all three. This space functions as a dynamic intersection of a …
…
continue reading

1
Book: Satoshi's bride "THE WEIRDEST @Tinder DATE EVER!"
13:06
13:06
Play later
Play later
Lists
Like
Liked
13:06PREVIEW OF THE FIRST CHAPTER OF THE BOOK "Satoshi's bride" inspired on @satoshisbride @actjust "THE WEIRDEST @Tinder DATE EVER!" Here is a list of very short and funny quotes from the first chapter of "The Byzantine General's Problem with Love," which serves as the "Genesis Block" for "The Satoshi Variant: An Accidental Genesis Block":• For Valenti…
…
continue reading

51
Public Vulnerability and Disillusionment.
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46Midnight Musings and Capitalist Critiques6 sources The provided transcript captures an extended, multi-participant audio conversation occurring in a social audio space. The discussion spans a wide array of topics, beginning with a segment where participants try to identify 1980s songs from brief intros. The conversation then transitions into discus…
…
continue reading

1
The Rise of the Autonomous Blue Team with Vineet Edupuganti
37:24
37:24
Play later
Play later
Lists
Like
Liked
37:24What if defenders had their own AI-powered task force, always on, always adapting, and finally one step ahead of attackers? In this episode, Ron welcomes Vineet Edupuganti, Founder and CEO of Cogent Security, to discuss how AI agents are rewriting the rules of cybersecurity. Vineet shares why traditional vulnerability management is fundamentally br…
…
continue reading

1
Deepfakes and Deception: Cyvore on the Future of Cyber Threats
47:55
47:55
Play later
Play later
Lists
Like
Liked
47:55Send us a text In this episode of Secure Insights, Rosie talks with Cyvore about the overlooked risks shaping the modern digital landscape. They share stories on why today’s chat channels may actually be less secure than email, the industry’s biggest blind spots, and how attackers use long-term psychological manipulation to earn trust before launch…
…
continue reading

1
#82 - The Phishing Paradox: Why Security Training Might Be Making You MORE Vulnerable
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14Discover the surprising reason security training may be making you an easy target for hackers, and the better way to fight back. With CyberHoot CEO Craig Taylor.By Extra Something Media
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
…
continue reading

1
#989 - James Kimmel Jr. - Why Violence & Revenge Fantasies Feel Good
1:38:57
1:38:57
Play later
Play later
Lists
Like
Liked
1:38:57James Kimmel Jr. is a professor at Yale, a psychiatrist, and an author. Why are we drawn to revenge? From playground grudges to epic betrayals, the urge to strike back is universal. But is it a survival mechanism, or an ancient drive that no longer fits the modern age? Expect to learn why the feeling of revenge exists and how it is adaptive, what t…
…
continue reading
Jaguar Land Rover suffers a major cyberattack. ICE gains access to a powerful spyware tool. Researchers find Fancy Bear snuffling around a new Outlook backdoor. Cloudflare and Palo Alto Networks confirm compromised Salesforce data. A researcher discovers an unsecured Navy Federal Credit Union (NFCU) server. A new ClickFix scam spreads MetaStealer m…
…
continue reading

1
The Viral Outrage Over Peanut the Squirrel
30:04
30:04
Play later
Play later
Lists
Like
Liked
30:04A beloved squirrel named Peanut was seized in a raid by New York environmental officers last year. A maelstrom of online outrage ensued, upending New York wildlife enforcement in the process. In conversation with NYC Now's Janae Pierre, our colleague, reporter Jon Campbell, unravels the saga -- revealing a story about mistaken identities and the po…
…
continue reading

1
Storytelling, Culture and Cyber Resilience - Ep 165
31:31
31:31
Play later
Play later
Lists
Like
Liked
31:31Cyber resilience goes beyond checkboxes. In this episode, cybersecurity veteran Jerod Brennen (virtual CISO, executive advisor, and indie filmmaker) joins Rob Aragao to explore how storytelling, culture, and business alignment turn security into a true business enabler. Real-world lessons and practical steps help you shift from traditional cybersec…
…
continue reading

1
#61 How to Level Up Fast in Your First Cybersecurity Role ft. Ryan Daub
34:47
34:47
Play later
Play later
Lists
Like
Liked
34:47In this episode of The Hacker’s Cache, returning guest Ryan Daub shares his journey from IT support to offensive security and reveals practical advice on how to level up fast in your first cybersecurity role. We cover the importance of mastering fundamentals, documenting your work, learning from failures, and asking questions without fear. Ryan als…
…
continue reading
#244: I'll explain how I saved over $10k on luxury hotels in Costa Rica and Carmel Valley using points, free nights, and elite perks. I’ll walk you through every step, from how to book with points, when to buy them on sale, how to stack hotel credits, which hotel programs give you upgrades and free breakfast, and more! Link to Full Show Notes: http…
…
continue reading

1
Revenue day 1: Excel sheet to $1M (solo founder story)
1:02:42
1:02:42
Play later
Play later
Lists
Like
Liked
1:02:42Former HR executive and psychology lecturer Nikki Tugano reveals how she transformed being fired into building a profitable SaaS company, starting with just an Excel spreadsheet and bootstrapping to $1M in funding. Nikki is the founder and CEO of SeenCulture, a people analytics platform that identifies untapped talent within organizations. With a d…
…
continue reading

1
Why this startup said no to the world's biggest mining company (and won)
1:17:47
1:17:47
Play later
Play later
Lists
Like
Liked
1:17:47David Press was down to his last $7,000 with payroll due when a critical enterprise deal saved Risk Talk from collapse. After years of grinding through COVID lockdowns and cancelled flights, he and co-founder Stuart Farquharson built a voice-first safety reporting tool that now serves three of the world's five largest mining companies. David is the…
…
continue reading

1
Blizzard warning: Amazon freezes midnight hack.
32:11
32:11
Play later
Play later
Lists
Like
Liked
32:11Researchers disrupt a cyber campaign by Russia’s Midnight Blizzard. The Salesloft Drift breach continues to ripple outward. WhatsApp patches a critical flaw in its iOS and Mac apps. A fake PDF editing tool delivers the TamperChef infostealer. A hacker finds crash data Tesla claimed not to have. Spain cancels a €10 million contract with Huawei. A fr…
…
continue reading

1
OpenAI and Anthropic test each other, and everyone fails the apocalypse test
42:40
42:40
Play later
Play later
Lists
Like
Liked
42:40In episode 66 of The AI Fix, ChatGPT gives Mark and Graham a terrible lesson in anatomy, boffins at Stanford ruin sushi, Google Gemini has a self-loathing meltdown, DeepSeek gets an "F" in stopping existential threats to humanity, a robot doesn’t give birth, and a team of AI agents stuns our hosts with an amazing medical breakthrough. Plus, Graham …
…
continue reading

1
Q&A: How to Invest in Your Community (by Finding the Third Option)
48:36
48:36
Play later
Play later
Lists
Like
Liked
48:36#639: Aisha is excited to share how some life-changing advice has played out for her career. She wonders now: what limiting beliefs has Paula and Joe had to overcome in their businesses? Lesley is attracted to community bonds as a way to build collective wealth for the underserved. But do the same risks exist as they do in the traditional bond mark…
…
continue reading

1
Uruguayan National Anthem: A Nation's Song of Liberty..
18:11
18:11
Play later
Play later
Lists
Like
Liked
18:11When comparing the National Anthem of Uruguay with other anthems around the world, especially those born in the revolutionary fervor of the 19th century, its unique characteristics are revealed. Many anthems from that era are war songs or hymns to freedom, particularly in Latin America, where nations were emerging from anti-colonial struggles. Howe…
…
continue reading
The Kremlin claims it’s slowing mobile internet to keep Ukrainian drones at bay. But that’s just the cover story. What’s really happening is Vladimir Putin’s long-imagined plan for a walled-off Russian internet — a plan that’s fast becoming a model for strongmen around the world. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading
In 2019, Ola Bini, a Swedish programmer and privacy advocate, was arrested in Ecuador for being a Russian hacker. Find Ola on X: https://x.com/olabini. Or visit his website https://olabini.se/blog/. Or check out his non-profit https://autonomia.digital/. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint…
…
continue reading

1
Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join Selena Larson, Proofpoint intelligence analyst and host of their po…
…
continue reading
Please enjoy this encore of Word Notes. The set of people, process, technology, and cultural norms that integrates software development and IT operations into a system-of-systems. CyberWire Glossary link: https://thecyberwire.com/glossary/devops Audio reference link: "10+ Deploys Per Day: Dev and Ops Cooperation at Flickr," by John Allspaw and …
…
continue reading

1
Hot sauce and hot takes: An Only Malware in the Building special. [OMITB]
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37Welcome in! You’ve entered, Only Malware in the Building — but this time, it’s not just another episode. This is a special edition you won’t want to miss. For the first time, our hosts are together in-studio — and they’re turning up the heat. Literally. Join Selena Larson, Proofpoint intelligence analyst and host of their po…
…
continue reading