Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Id Software Podcasts

show episodes
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
  continue reading
 
Artwork

1
GDPR Now!

Karen Heaton/Data Protection 4 Business

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy. Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way. Our episodes provide insightful information for business leaders and privacy professionals alike. The hosts are joined by a range of specialists who discuss the lat ...
  continue reading
 
Artwork
 
Welcome to the Doom Is Dead? Podcast, brought to you by the Multiplayer Doom Federation & In The Keep. We want to take our listeners on an adventure throughout Doom & its history, speaking to the people that keep our beloved game alive. // https://doomfederation.com/ (doomfederation.com) //
  continue reading
 
Artwork

1
Sustain

SustainOSS

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Sustain brings together practitioners, sustainers, funders, researchers and maintainers of the open source ecosystem. We have conversations about the health and sustainability of the open source community. We learn about the ins and outs of what ‘open source’ entails in the real world. Open source means so much more than a license; we're interested in talking about how to make sure that the culture of open source continues, grows, and ultimately, sustains itself. #mcembedsignup{background:#f ...
  continue reading
 
Artwork

1
AI Risk Reward

Alec Crawford

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
I am your host, Alec Crawford, Founder and CEO of Artificial Intelligence Risk, Inc. and this is AI Risk-Reward, a podcast about balancing the risk and reward of using AI personally, professionally, and as a large organization! We will discuss hot topics such as, will AI take my job or make it better? When I ask Chat-GPT work questions, is that even safe? From an ethical perspective, is it enough for big companies to anonymize private data before using it? (Probably not.) I am discussing the ...
  continue reading
 
Artwork

4
VWIDTalk Podcast

VWIDTalk.com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Driven by ID owners, the VWIDTalk Podcast is operated by VW ID owners for VW ID owners, sharing best practices, tips, tricks, and mods in engaging, multi-participant discussions on everything to do with Volkswagen's lineup of electric vehicles. Dive deep, stay positive, and most importantly, enjoy the ride. Hosts: VWIDTalk.com moderators and ID.4 owners Jan Kalis and Wes Garrison.
  continue reading
 
Climate Confident is the podcast for business leaders, policy-makers, and climate tech professionals who want real, practical strategies for slashing emissions, fast. Every Wednesday at 7am CET, I sit down with the people doing the work, executives, engineers, scientists, innovators, to unpack how they’re driving measurable climate action across industries, from energy and transport to supply chains, agriculture, and beyond. This isn’t about vague pledges or greenwashing. It’s about what’s w ...
  continue reading
 
Artwork
 
Welcome to the DubaiView Real Estate Podcast, your source for clear, straightforward insights into Dubai’s property market. Whether you're an experienced investor or just exploring, we provide expert advice from industry professionals on market trends and smart investment strategies. Tune in for practical guidance to help you navigate Dubai’s ever-changing real estate landscape.
  continue reading
 
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
  continue reading
 
Artwork

1
No Reason

Nola J

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Nola J and No Reason Podcast, discussing things that happen for No Reason! This podcast uses the following third-party services for analysis: Chartable - https://chartable.com/privacy Podcorn - https://podcorn.com/privacy
  continue reading
 
Loading …
show series
 
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
  continue reading
 
SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diar…
  continue reading
 
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
  continue reading
 
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com Chapters 00:00 - PreShow Banter™ — Humans are Done 03:04 - Louvre’s video security password was ‘Louvre’ – BHIS - Talkin’ Bout [infosec] News 2025-11-10 05:11 - Story # 1: I Tried the Robot That’s Coming to Live With You. It’s Still Part Human. 15:14 - Story # 2: H…
  continue reading
 
OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-disc…
  continue reading
 
Captured live at Cosmoverse 2025, this episode brings host Sebastian in conversation with Michael (better known as Cryptocito, Cosmos investor via Cito Ventures) and Magnus (@0xMagmar, Co-CEO Cosmos Labs). Against a backdrop of institutional gravitas, central banks mingling alongside Revolut executives, the conversation traces Cosmos' arc across fi…
  continue reading
 
Welcome!...to 'Getting to Grips with Data Security' our podcast for anyone interested in learning more about how to 'beat the hackers' using the best types of information security controls. This new 5 part series covers all aspects of data security for businesses where we discuss: Ep 1: Strategy; Ep 2: Cloud Controls; Ep 3: People Risk; Ep 4: Using…
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
Send me a message Most people never think about industrial heat. Yet half of all manufacturing emissions come from it. My guest this week, Addison Stark, CEO and co-founder of AtmosZero, is on a mission to electrify one of the dirtiest, most overlooked pieces of infrastructure on Earth: the steam boiler. In this episode, Addison and I uncover how a…
  continue reading
 
Microsoft Patch Tuesday for November 2025 https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+for+November+2025/32468/ Gladinet Triofox Vulnerability Triofox uses the host header in lieu of proper access control, allowing an attacker to access the page managing administrators by simply setting the host header to localhost. https://cloud.google.com/b…
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
It isn t always defaults: Scans for 3CX Usernames Our honeypots detected scans for usernames that may be related to 3CX business phone systems https://isc.sans.edu/diary/It%20isn%27t%20always%20defaults%3A%20Scans%20for%203CX%20usernames/32464 Watchguard Default Password Controversy A CVE number was assigned to a default password commonly used in W…
  continue reading
 
Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
  continue reading
 
Show Description Steve Ruiz talks about what tldraw is and who it's for, how they've dealt with data on all the computers, what's new in the tldraw SDK, ideas for building on top of tldraw, tldraw's business model, and what the future holds for tldraw the company. Listen on Website Watch on YouTube Guests Steve Ruiz Guest's Main URL • Guest's Socia…
  continue reading
 
In the AI Risk Reward podcast, our host, Alec Crawford (@alec06830), Founder and CEO of Artificial Intelligence Risk, Inc. aicrisk.com, interviews guests about balancing the risk and reward of Artificial Intelligence for you, your business, and society as a whole. Podcast production and sound engineering by Troutman Street Audio. You can find them …
  continue reading
 
Honeypot Requests for Code Repository Attackers continue to scan websites for source code repositories. Keep your repositories outside your document root and proactively scan your own sites. https://isc.sans.edu/diary/Honeypot%3A%20Requests%20for%20%28Code%29%20Repositories/32460 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads Ne…
  continue reading
 
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/diary/Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%5BGuest%20…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — Musical Views of the Universe 04:05 - – BHIS - Talkin’ Bout [infosec] News 2025-11-03 04:39 - Story # 1: Ransomware profits drop as victims stop paying hackers 06:22 - Chart since 2019 16:06 - Story # 2: More than a million people every we…
  continue reading
 
Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
  continue reading
 
Brian Fabian Crain and Michael Egorov, Curve Finance founder, discuss Curve's origins: solving inefficient DAI/USDC swaps after MakerDAO borrows by creating a DeFi AMM for stablecoins and LSTs. It hit 1M TVL with a bonding curve concentrating liquidity at 1:1, more effective for pegged assets than Uniswap. Features grew to include BTC wrappers, stE…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
Send me a message What if business, not politics, held the real key to ending the climate crisis? In this week’s episode, I sit down with Rinaldo Brutoco, founder and CEO of the World Business Academy, to explore a radical but beautifully simple idea: that stakeholder capitalism - where companies serve people and planet, not just shareholders, can …
  continue reading
 
Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
  continue reading
 
XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Num…
  continue reading
 
Segment 1: Interview with Joel Burleson-Davis Frontline workers can’t afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
  continue reading
 
Show Description In this episode we sit down with Tyler Sticka to discuss upgrading his project, Colorpeek. We explore the practical applications of web components and CSS, and how they are shaping the future of web development. Tyler shares his experiences with prototyping and the challenges of maintaining simplicity in design. Listen on Website W…
  continue reading
 
In the AI Risk Reward podcast, our host, Alec Crawford (@alec06830), Founder and CEO of Artificial Intelligence Risk, Inc. aicrisk.com, interviews guests about balancing the risk and reward of Artificial Intelligence for you, your business, and society as a whole. Podcast production and sound engineering by Troutman Street Audio. You can find them …
  continue reading
 
Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https://isc.sans.edu/diary/Scans%20for%20Port%208530%208531%20%28TCP%29.%20Likely%20related%20to%20WSUS%20Vulnerability%20C…
  continue reading
 
AI Cheating?, O, Canada, npms, passkeys, Exchange, Solaris, the amazing Rob Allen of Threatlocker, and More on this edition of the Security Weekly News. Segment Resources: Ingram Micro Working Through Ransomware Attack by SafePay Group | MSSP Alert: https://www.msspalert.com/news/ingram-micro-working-through-ransomware-attack-by-safepay-group This …
  continue reading
 
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com The BHIS crew breaks down the latest cybersecurity stories making waves — from data breaches and malware campaigns to privacy issues, exploit trends, and tech policy shake-ups. Join our panel of security pros for expert analysis, sharp humor, and practical insights…
  continue reading
 
X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
  continue reading
 
In the security news this week: Cybersecurity is dead, and AI killed it Exploiting the patching system Apple makes it easier for spyware Who is patching Cisco ASA? Shove that DMCA somewhere HTTPS - a requirement Russia wants to own all the exploits Abandonware challenges Reversing at its hardest with Lua Hacking team is back, and leetspeak malware …
  continue reading
 
How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
  continue reading
 
Sci-fi titan Neal Stephenson, whose Snow Crash coined the term 'metaverse' and Cryptonomicon, which foreshadowed crypto in 1999, joins Friederike to discuss his "hard sci-fi" method: building immersive, consistent worlds, not prophecy. He's now co-founder of Lamina1, aiming to restore Web1's ethos and give creators IP sovereignty with direct microp…
  continue reading
 
Organizations that successfully earn and keep the trust of their customers, employees, and partners experience better business outcomes, more engagement, and competitive differentiation. But what does that trust look like and who's responsible for building and maintaining that trust? Jeff Pollard, Vice-President, Principal Analyst on the Security a…
  continue reading
 
Send me a message What if upgrading your home to be climate-friendly was as simple as scanning it with your phone? In this week’s episode of the Climate Confident Podcast, I talk with Grant Gunnison, founder and CEO of Zero Homes - a former NASA and MIT engineer who’s now tackling one of climate tech’s toughest challenges: decarbonising existing ho…
  continue reading
 
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play