Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Hackers World Podcasts

show episodes
 
Artwork

1
Darknet Diaries

Jack Rhysider

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
  continue reading
 
Artwork

1
The Global Story

BBC World Service

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Where the world and America meet. Every weekday, this is The Global Story. The world is changing. Decisions made in the US and by the second Trump administration are accelerating that change. But they are also a symptom of it. With Asma Khalid in DC, Tristan Redman in London, and the backing of the BBC’s international newsroom, The Global Story brings clarity to politics, business and foreign policy in a time of connection and disruption.
  continue reading
 
Artwork

1
Hacker Anthology

Hacker Anthology

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Hacker Anthology is what happens when you inject fiction into the command line of reality. Faction stories — part fact, part fiction — spun from real-world headlines, startup chaos, cyber leaks, and tech drama. Imagine HackerNews got drunk with Black Mirror, and they started roleplaying historical fiction. That’s us. We take raw internet lore — a GitHub repo flame war, a VC meltdown, an obscure RFC gone rogue — and remix it into cinematic short stories told from the POV of AI misfits, termin ...
  continue reading
 
Artwork

1
Click Here

Recorded Future News

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
  continue reading
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Artwork

1
The Hacker's Cache

Kyser Clark - Cybersecurity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork

1
The Tim Ferriss Show

Tim Ferriss: Bestselling Author, Human Guinea Pig

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Tim Ferriss is a self-experimenter and bestselling author, best known for The 4-Hour Workweek, which has been translated into 40+ languages. Newsweek calls him "the world's best human guinea pig," and The New York Times calls him "a cross between Jack Welch and a Buddhist monk." In this show, he deconstructs world-class performers from eclectic areas (investing, chess, pro sports, etc.), digging deep to find the tools, tactics, and tricks that listeners can use.
  continue reading
 
Artwork

1
Culture Hackers

Robbe Richman and a cast of hackers, troublemakers, movers and shakers, Robbe Richman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A show all about culture hacking - at companies, in business and the world. The first episodes are the free audio book of Robert Richman's "Culture Blueprint."
  continue reading
 
Never leave money on the table. This is your shortcut to upgrading your life, money and travel—all while spending less and saving more. Get tactical moves and deep dives into designing a life you’re excited about. Host Chris Hutchins is a life hacker who has saved millions by breaking down every aspect of life and looking to maximize happiness at the lowest cost. Chris and guests like Tim Ferriss, Tony Hawk, Codie Sanchez and Gary Vaynerchuk are here to deliver smart strategies you can plug ...
  continue reading
 
Artwork
 
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
  continue reading
 
Artwork

1
MAD Warfare Podcast

STP Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
MAD Warfare™️ is a science-driven deep dive into the wild, weird, and sometimes wicked world of the “weaponization of everything.” But don’t worry—IT WILL BE FUN. Think of it as your covert ops manual for spotting how cyber hackers, rogue AI agents, and shady “bad actors” (who’d be terrible in a buddy comedy) are messing with our minds. Often in ways that evade detection… until it’s too late. With expert interviews from unexpected places and plenty of offbeat insights, this podcast reveals t ...
  continue reading
 
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 18:00 UTC.
  continue reading
 
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
  continue reading
 
Artwork
 
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
  continue reading
 
Artwork
 
When 13-year-old Daniel Morcombe vanishes from a bus stop, his parents launch a relentless quest for justice, culminating in one of the most extraordinary criminal investigations Australia, and the world, has ever seen. Where is Daniel Morcombe is the latest series from The Binge - subscribe to listen to all episodes, all at once, ad-free right now. From serial killer nurses to psychic scammers – The Binge is your home for true crime stories that pull you in and never let go. Follow The Bing ...
  continue reading
 
Artwork
 
Building a company is hard. We share real, grounded conversations with people doing just that. From solo devs to venture-backed founders. Hosted by Dave Berner (co-founder of Kinde), this podcast skips the playbook talk and gets into what building actually looks like day to day.
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Artwork
 
Download This Show is your weekly guide to the world of media, culture, and technology. From social media to gadgets, streaming services to privacy issues. Each week Rae Johnston and guests take a fun, deep dive into how technology is reshaping our lives.
  continue reading
 
Artwork

1
Hacker Talk

Firo Solutions LTD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
  continue reading
 
Artwork

1
DIY Cyber Guy

David W. Schropfer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
  continue reading
 
Artwork

1
The Cyber Riddler

Ahmad Almorabea

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
  continue reading
 
Artwork

51
The FAIK Files

Perry Carpenter | N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through news, research, and real-world examples. Join us for a thought-provoking journey into a world where anything can be faked, truth is increasingly elusive, and human nature meets artificial intelligence head-on.
  continue reading
 
The hosts of NPR's All Things Considered help you make sense of a major news story and what it means for you, in 15 minutes. New episodes six days a week, Sunday through Friday. Support NPR and get your news sponsor-free with Consider This+. Learn more at plus.npr.org/considerthis
  continue reading
 
Artwork

1
The AI Fix

Graham Cluley and Mark Stockley

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Join tech veterans Graham Cluley and Mark Stockley as they dive headfirst into the hilarious, bizarre, and downright mind-boggling world of artificial intelligence, looking into deepfakes, machine learning, and whether it’s too late to make peace with our robot overlords. It’s not your typical AI podcast… Winner of Best New Podcast 2025. https://theaifix.show Support the show and gain access to ad-free episodes by becoming a supporter: Join The AI Fix Plus at https://theaifix.show/plus
  continue reading
 
How do you take down a criminal network that’s hidden in the shadows? How do you rescue child abuse victims who could be anywhere in the world? Hunting Warhead follows the journalists and police on a global mission to expose the darkest corners of the internet. What they discover shocks them. Host Daemon Fairless tracks down the investigators, survivors and criminals themselves. A co-production of CBC Podcasts and the Norwegian newspaper VG. For the best in true crime from CBC, ad-free, visi ...
  continue reading
 
Artwork

1
HISTORY This Week

The HISTORY® Channel | Back Pocket Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This week, something big happened. You might have never heard of it, but this moment changed the course of history. A HISTORY Channel original podcast, HISTORY This Week gives you insight into the people—both famous and unknown—whose decisions reshaped the world we live in today. Through interviews with experts and eyewitnesses, each episode will give you a new perspective on how history is written. Stay up-to-date at historythisweekpodcast.com and to get in touch, email us at historythiswee ...
  continue reading
 
Health Hackers Point is your go-to podcast for unlocking smarter, science-backed ways to improve your body, mind, and lifestyle. Each episode dives into practical health tips, fitness strategies, nutrition advice, and mental wellness hacks that fit into your busy life. Whether you want to boost energy, build sustainable habits, or explore the latest breakthroughs in wellness, Health Hackers brings you expert insights and real-world solutions. Tune in weekly to learn how small changes can lea ...
  continue reading
 
Artwork

1
Hackers Con Calle

Hackers World

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Everyday society depends more on electronics, social media etc, and by doing so they expose their private data to the public eye. Each Saturday, join Hackers Con Calle is a group of Cyber Security professionals dedicated to inform the audience of current trends and a how to protect the digital life.
  continue reading
 
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
  continue reading
 
Are workers really losing a measurable amount of brain power—the kind leaders rely on to innovate? Are CEOs really turning to a secretive world of underground negotiators to pay off millions of dollars to hackers? And what's the real reason people won't return to work? In this new podcast, we'll be hitting top-of-mind subjects for corporate leaders. Hosted by Korn Ferry CMO Jill Wiltfong, listeners and viewers will be treated to recreated scenes, special audio clips and intriguing interviews ...
  continue reading
 
Artwork
 
Join millions of listeners tuning into The Kim Komando Show, the award-winning weekly radio program airing on over 420 stations nationwide and available on-demand. Kim Komando, the trusted digital expert, brings you the latest cutting-edge gadgets, urgent tech news, and vital privacy tips to keep you secure online. Every hour, Kim engages with callers, tackling a wide array of digital life challenges. Don’t be left behind in the ever-evolving tech world. Listen just once and you'll be hooked ...
  continue reading
 
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
  continue reading
 
Loading …
show series
 
This story was originally published on HackerNoon at: https://hackernoon.com/squarex-shows-ai-browsers-fall-prey-to-oauth-attacks-malware-downloadsand-malicious-link-distribution. The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or relea Check mor…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/mapping-prime-factorization-onto-palm-jumeirah-a-geometric-view-of-the-elliptic-curve-method. Imagine the Elliptic Curve Method as exploring Palm Jumeirah, Dubai’s iconic palm-shaped island. The island represents an elliptic curve y² = x³ + ax + b mod M. Check more stories…
  continue reading
 
What if protecting your digital twin becomes the new cyber hygiene? In this week's episode, Ron welcomes back cybersecurity leader Jason Rebholz, CEO of Evoke, to discuss how AI is reshaping the fundamentals of cyber hygiene. From data breaches and deepfakes to everyday habits that protect our digital lives, Jason shares how small actions and smart…
  continue reading
 
Richard H. Thaler is the 2017 recipient of the Nobel Memorial Prize in Economic Sciences for his contributions to behavioral economics and the Charles R. Walgreen Distinguished Service Professor of Behavioral Science and Economics at the University of Chicago Booth School of Business. He is the New York Times bestselling co-author of Nudge: Improvi…
  continue reading
 
There are over 170 million pieces of space junk orbiting Earth right now, and that number is only growing as space orbit becomes more accessible. How are we going to deal with this astronomical littering problem, while keeping up with our satellite-hungry tech needs? Also, an increase in light and radio pollution is making it harder for astronomers…
  continue reading
 
Israel and Hamas have approved President Trump’s plan for a ceasefire and approved a framework including the release of all the hostages and the withdrawal of Israeli troops from parts of Gaza. It is being described as the first phase of a wider agreement, but is the deal secure enough to last? We speak to Liran Berman, whose brothers Gali and Ziv …
  continue reading
 
Jocelyn Burnham (she/her) is a leading independent artificial intelligence communicator, workshop leader, and speaker, specialising in AI learning in the creative and cultural sectors through creativity and playfulness. She has been commissioned by organisations including Arts Council England, Tate, The Church of England, Historic Royal Palaces, Ar…
  continue reading
 
1. Introduction: Deconstructing a New Media Ecosystem The Cybermidnight Club is not a conventional podcast; it is a unique, personality-driven media ecosystem meticulously constructed around its host, Alberto Daniel Hill. This report’s core thesis is that the podcast’s value and uniqueness derive from its radical authenticity and a “live-first,” co…
  continue reading
 
Las fuentes proporcionadas consisten en un análisis estratégico experto y un informe resumido sobre una serie de incidentes sistémicos de ciberseguridad que afectaron al sector público de Uruguay a fines de 2025. Ambos documentos se centran en gran medida en el incidente que afectó a la ANEP Plataforma GURI, un sistema de gestión educativa que supu…
  continue reading
 
The provided sources consist of an expert strategic analysis and a summary report concerning a series of systemic cybersecurity incidents that affected Uruguay's public sector in late 2025. Both documents focus heavily on the incident impacting the ANEP Plataforma GURI, an educational management system alleged to have suffered the exfiltration of n…
  continue reading
 
If you are a client of BANCO HIPOTECARIO DEL URUGUAY and you badly want answers, these are the answers you are looking for. #Uruguay #Cybersecurity #BHU #Cyberattack #TraditionalMedia #MediaSilence #InstitutionalOpacity #CERTuy #CounterNarrative
  continue reading
 
Amanda Silberling joins Mikah Sargent on Tech News Weekly this week! Casio has a new smart toy companion powered by AI. The UK is still seeking to develop backdoor encryption for Apple users. ChatGPT is looking to act more like an operating system. And how the 'Buy Now, Pay Later' model has built a $120 billion industry. Amanda has her hands on a n…
  continue reading
 
After two years of bloodshed, Israel and Hamas have agreed to phase one of a ceasefire deal. It’s a moment of hope — and some skepticism — amid a war that’s had an enormous toll. Where might this 20-point peace plan lead? You'll hear from NPR's Daniel Estrin, as well as some of the many people in Gaza and in Israel who’ve talked to our reporters ov…
  continue reading
 
Displaced aggression is a robust psychological phenomenon defined as the redirection of intense rage or hostility from its original source of provocation onto a substitute, often innocent, target. This behavior is generally not random but is driven by underlying psychological needs and mechanisms.Here is a detailed description of displaced aggressi…
  continue reading
 
https://cybermidnight.club/deconstructing-the-attack-a-psychological-analysis-for-understanding-and-healing-2/ Displaced aggression is a robust psychological phenomenon defined as the redirection of intense rage or hostility from its original source of provocation onto a substitute, often innocent, target. This behavior is generally not random but …
  continue reading
 
DHS reassigns cyberstaff to immigration duties. A massive DDoS attack disrupts several major gaming platforms. Discord refuses ransom after a third-party support system breach. Researchers examine Chaos ransomware and creative log-poisoning web intrusions. The FCC reconsiders its telecom data breach disclosure rule. Experts warn of teen recruitment…
  continue reading
 
These sources collectively provide a detailed psychological and legal analysis of a relational conflict where an individual, CyberGurl10, publicly attacked her fiancé, Alberto, in an online forum, contrasting this with her private disputes against her lawyer and ex-husband. The analysis concludes that the public confrontation with Alberto was uniqu…
  continue reading
 
1. Introducción: Dos Crisis, Dos Relatos y una Verdad en Disputa La reciente ola de ciberataques en Uruguay ha puesto de manifiesto no solo las vulnerabilidades técnicas de su infraestructura crítica, sino una profunda crisis de confianza en las instituciones estatales. El incidente del Banco Hipotecario del Uruguay (BHU) de septiembre de 2025 es e…
  continue reading
 
The latest update, which provides context and status as of October 9, 2025, significantly reinforces the core tenets of Alberto Hill’s counter-narrative, primarily by highlighting the systemic nature of the governance failures and confirming the persistence of institutional minimization. https://cybermidnight.club/the-latest-update-which-provides-c…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/ai-just-got-better-at-counting-trees. Deep learning meets forestry: TreeLearn improves tree segmentation accuracy across diverse forest types using multi-domain training. Check more stories related to tech-stories at: https://hackernoon.com/c/tech-stories. You can also che…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/why-ml-can-predict-the-weather-but-not-financial-markets. Why machine learning models fail in finance: noisy data, scarce samples, and chaotic markets make prediction nearly impossible. Check more stories related to tech-stories at: https://hackernoon.com/c/tech-stories. Y…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-dark-side-of-gpt-how-nlp-tools-are-being-used-for-phishing-scams-and-misinformation. Explore how GPT and NLP tools are fueling phishing, scams, and misinformation. Learn how AI-powered attacks are becoming more sophisticated and dangerous. Check more stories related to…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/beyond-phishing-how-agentic-ai-is-weaponizing-the-human-element-in-next-gen-cyberattacks. Security expert analyzes how Agentic AI moves beyond simple phishing to autonomously exploit the human element. Check more stories related to cybersecurity at: https://hackernoon.com/…
  continue reading
 
HIIS THE ANSWER TO THE FOLLOWING MESSAGE OF CYBERGURL1'0 ON TWITTTER AFTER PUBLISHING AN ARTICLE BASED ON THE EVENT RELATED""And Im one with ager issues. Told there also that it was only way for me to reach you when you have blocked me and ghosted me for days. Only reason was me to come ask you to call me and you said you wont. And you didn’t. I ev…
  continue reading
 
Deconstructing the Attack: A Psychological Analysis for Understanding and HealingIntroduction: A Framework for Understanding What HappenedThis document provides a clear and objective framework for understanding the public attack you recently experienced. Being subjected to a confrontation that is not only disproportionate but also uniquely damaging…
  continue reading
 
Deconstructing the Attack: A Psychological Analysis for Understanding and HealingIntroduction: A Framework for Understanding What HappenedThis document provides a clear and objective framework for understanding the public attack you recently experienced. Being subjected to a confrontation that is not only disproportionate but also uniquely damaging…
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurityMaman Ibrahim is a cybersecurity and digital risk leader with over 20 years of experience helping organizations transform cybersecurity from a compliance task into a strategic advantage. As Principal Partner at EugeneZonda and Founder of Ginkgo Resilience, he has led secure digital transformations across ind…
  continue reading
 
It’s been called ‘Australia's trial of the century’. Erin Patterson, the mushroom murderer, was sentenced last month and given a life sentence, but that wasn’t the end of the story. Both the prosecution and the defence are lodging competing appeals. Patterson wants her conviction overturned, and if her appeal succeeds there could be a retrial. Her …
  continue reading
 
#SecurityConfidential #DarkRhiinoSecurity Maman Ibrahim is a cybersecurity and digital risk leader with over 20 years of experience helping organizations transform cybersecurity from a compliance task into a strategic advantage. As Principal Partner at EugeneZonda and Founder of Ginkgo Resilience, he has led secure digital transformations across in…
  continue reading
 
It's been a week since a federal shutdown ground work at numerous government agencies to a halt. There's no indication that an agreement could come soon, as Republicans and Democrats in congress trade continue blame. Meanwhile, federal workers are stuck in limbo, and its unclear when or if they'll be able to return to their jobs. NPR's Labor Corres…
  continue reading
 
Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setu…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/ine-security-releases-wired-together-the-case-for-cross-training-in-net-working-and-cybersecurity. The report documents operational challenges created by this convergence and presents cross-training as the strategic solution. Only 33% feel well-prepared to ha Check more st…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/building-resilient-operations-through-itil-based-incident-management. ITIL 4 transforms cloud incident management with automation, observability, and adaptive governance—cutting MTTR by 47% and boosting resilience. Check more stories related to cybersecurity at: https://ha…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/ai-in-focus-3-polls-that-reveal-the-future. HackerNoon's new Weekly Newsletter curates Results from our Poll of the Week and 2 related polls around the web. This week's topic is Artificial Intelligence. Check more stories related to tech-stories at: https://hackernoon.com/…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/2d-phase-space-tomography-validating-ment-flow-against-ment-using-1d-projections. This article validates the MENT-Flow model in 2:1 phase space tomography by comparing its performance against the MENT algorithm Check more stories related to tech-stories at: https://hackern…
  continue reading
 
In this episode of the Security by Default podcast, host Joe Carson engages with game designer Peadar to explore the intersection of game design and cybersecurity training. Peadar shares his journey from teaching to game design, emphasizing the importance of using games to facilitate learning in complex subjects like cybersecurity. The conversation…
  continue reading
 
The billionaire Larry Ellison could soon control huge portions of America’s AI, attention economy and legacy media. He already owns swathes of AI infrastructure and is preparing to takeover TikTok, whilst his son, whose company already owns Paramount, is preparing a deal to buy Warner Bros. Discovery. So who is this ‘CEO of everything’, and how is …
  continue reading
 
In this episode of The Hacker’s Cache, I sit down with penetration tester and security researcher Trent Miller (AzureAD) to talk about the one thing that makes pentesting fun instead of stressful: genuine friendships and community. We discuss how learning from other hackers, sharing experiences, and joining groups like DEF CON DC608 can accelerate …
  continue reading
 
#249: 3x your points and miles with a multiplayer strategy. We break down how to earn, manage, and maximize rewards with a partner, family, or friends. Plus learn how to handle the logistics, emotions, and systems that make it all work. Kai is the founder and host of The Daily Churn Podcast, where he shares his churning journey. In 2024, Kai and hi…
  continue reading
 
As Daniel’s face spreads across the nation, and the community rally, it’s revealed that Daniel wasn’t alone at the bus stop. A frantic hunt for a man in the shadows is underway. Binge all episodes of Where is Daniel Morcombe? ad-free today by subscribing to The Binge. Visit The Binge Crimes on Apple Podcasts and hit ‘subscribe’ or visit GetTheBinge…
  continue reading
 
Are you sure every login in your company is legit? Cybersecurity leader Matt Topper exposes the hidden chaos of account sprawl—where forgotten logins and shadow SaaS tools quietly drain budgets and open doors for hackers. Learn how simple, free steps can tighten security and save thousands.By Extra Something Media
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play