Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Information Security Podcasts
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
1
DoD Secure-Working with National Industrial Security Program
jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC
Interviews and topics centering on security clearances and National Industrial Security Clearance Operating Manual (NISPOM) compliance.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Security DNA is a podcast brought to you by SecurityInfoWatch.com, covering subjects of interest to security stakeholders in the industry. Topics range from security industry news, trends and analysis to technology solutions, policy risk analysis and management, and more. Our editorial team, along with industry experts and consultants, fill each podcast episode with information that is of value to security professionals.
…
continue reading
Podcast by Alex Wood & Robb Reck
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
The International Association of Privacy Professionals is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge. Founded in 2000, the IAPP is a not-for-profit association with more than 70,000 ...
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Bitcoin and crypto news by Protos. Read more at protos.com
…
continue reading
The monthly podcast for security professionals, by security professionals.Two self proclaimed grumpy security professionals talk security risk, how they’ve managed it in the past and forward looking discussions with guests working in information security and risk management.
…
continue reading
Candid conversations with leading CIOs.
…
continue reading
The ISF Podcast brings you cutting-edge conversation, tailored to CISOs, CTOs, CROs, and other global security pros. In every episode of the ISF Podcast, Chief Executive, Steve Durbin speaks with rule-breakers, collaborators, culture builders, and business creatives who manage their enterprise with vision, transparency, authenticity, and integrity. From the Information Security Forum, the leading authority on cyber, information security, and risk management.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Canada's intelligence landscape is as unique as the country itself. In an evolving global threat environment, fostering informed discussions on intelligence has become increasingly vital to the national security discourse. Secure Line Podcast is designed to influence and inform the national dialogue on security and intelligence in Canada, and internationally. Secure Line is brought to you by the Canadian Association for Security & Intelligence Studies (CASIS).
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
WAR ROOM: Pandemic is the first and most comprehensive program to bring the most up to the minute information on the news of the day. Stephen K. Bannon brings medical experts, politicians, business leaders, and those on the front lines for a comprehensive look at the latest news from all and provide their insider insights.
…
continue reading
The Virtual CISO Moment dives into the stories of information security, information technology, and risk management pros; what drives them and what makes them successful while helping small and midsized business (SMB) security needs. No frills, no glamour, no transparent whiteboard text, no complex graphics, and no script - just honest discussion of SMB information security risk issues. Brought to you by vCISO Services, LLC, a leading provider of vCISO and information security risk managemen ...
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
The New CISO is hosted by Exabeam Chief Security Strategist, Steve Moore. A former IT security leader himself, Steve sits down with Chief Information Security Officers to get their take on cybersecurity trends, what it takes to lead security teams and how things are changing in today’s world.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Welcome to Security Breaks, the go-to podcast for professionals, enthusiasts, and anyone interested in the intersection of automotive technology and security. In an era where vehicles are not just modes of transportation but sophisticated networks on wheels, understanding and safeguarding against potential threats is more critical than ever. In each episode, we dive deep into the latest trends, technologies, and challenges facing the automotive security industry. From cybersecurity measures ...
…
continue reading
U.S. foreign policy for the future. Security Dilemma brings you conversations with the experts, policymakers, and thinkers charting new paths forward from the wreckage of recent decades and toward a national security and defense policy guided by prudence and restraint. Cohosts John Allen Gay and A.J. Manuzzi bring you the information you need to shape a wiser approach. Security Dilemma is a podcast of the John Quincy Adams Society, an independent nonprofit organization dedicated to advancing ...
…
continue reading
Weekly privacy and security news podcast - Presented by Techlore & The New Oil. The goal of Surveillance Report is keep the world updated on the latest privacy & security news to empower individuals to remain safe with the newest information. Join us for the ride! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Your dose of tips about all things Information Security, ICT Legislation and Risk. South African podcast.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
SecureAfrique - A Bi-weekly podcast that brings you the latest Cyber Security Headlines across the world, with a focus on Information Security, Information Systems Security and Governance, Risk and Compliance (GRC) across the African continent. Each episode always end with a fun fact in the Cyber Security field.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Weekly Information Security News. Stay up to date on what’s going on in the InfoSec world in about 40 minutes. Join us for InfoSec news and stay for some friendly banter, guest interviews, gadget reviews, tech interview tips, and hilarious dad jokes! New episodes every Monday.
…
continue reading
1
Ransomware Victims Stop Paying Hackers – 2025-11-03
1:03:33
1:03:33
Play later
Play later
Lists
Like
Liked
1:03:33Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — Musical Views of the Universe 04:05 - – BHIS - Talkin’ Bout [infosec] News 2025-11-03 04:39 - Story # 1: Ransomware profits drop as victims stop paying hackers 06:22 - Chart since 2019 16:06 - Story # 2: More than a million people every we…
…
continue reading
1
Episode 232 - iCloud Backups Expose Online Betting Scam, Ransomware Payment Rate Hits All Time Low, Hyperscaler Outages, Halloween Memories
50:58
50:58
Play later
Play later
Lists
Like
Liked
50:58Welcome to this week's episode of the PEBCAK Podcast! We’ve got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! iClou…
…
continue reading
1
280 - 11/3 - Chazz Gifford, VP Information Security @ Intrado
1:37:06
1:37:06
Play later
Play later
Lists
Like
Liked
1:37:06Our featured guest this month is Chazz Gifford, VP Information Security @ Intrado, interviewed by Frank Victory. News from Palantir, Lumen, the State of Colorado, Red Canary, Optiv, and a lot more!Come join us on the Colorado = Security Slack channel to meet old and new friends.Sign up for our mailing list on the main site to receive weekly updates…
…
continue reading
1
Ledger faces backlash for charging fees on ‘free’ security upgrade
5:13
5:13
Play later
Play later
Lists
Like
Liked
5:13Ledger fine print revealed that the “free” service would cost $10 per transaction or 0.05% of the amount transferred, on top of gas costs.
…
continue reading
1
Unsecurity Episode 249: Navigating Holiday Threats with AI and VPN Vulnerabilities w/ Pinky
37:04
37:04
Play later
Play later
Lists
Like
Liked
37:04In this episode of the Unsecurity Podcast, hosted by Megan Larkins and Brad Nigh from FRSecure, we are joined by Pinky from the IR team to dive deep into the pressing cybersecurity challenges as the holiday season approaches. From early breaches to the increasing sophistication of AI in phishing attacks, discover how attackers are evolving their ta…
…
continue reading
1
Lawfare Archive: Waxman and Ramsey on Delegating War Power
52:20
52:20
Play later
Play later
Lists
Like
Liked
52:20There is much debate among academics and policy experts over the power the Constitution affords to the president and Congress to initiate military conflicts. But as Michael Ramsey and Matthew Waxman, law professors at the University of San Diego and Columbia, respectively, point out in a recent law review article, this focus misses the mark. In fac…
…
continue reading
Episode 4913: Live From CHD Conference 2025 Day 2 Cont.By WarRoom.org
…
continue reading
Episode 4912: Live From CHD Conference 2025 Day 2By WarRoom.org
…
continue reading
1
Weekly Cyber News Rollup, November 7th, 2025
16:03
16:03
Play later
Play later
Lists
Like
Liked
16:03This is this week’s cyber news for November third through November seventh, twenty twenty-five. The week unfolded with relentless attacks on edge infrastructure, high-stakes data breaches, and fresh discoveries in global espionage campaigns. Cisco faced active exploitation of its Secure Firewalls and routers, SonicWall confirmed a state-backed back…
…
continue reading
This is today’s cyber news for November 7th, 2025. We lead with a confirmed incident at the Congressional Budget Office, where compromised mailboxes and files could expose draft budget work and internal policy discussions. Nevada’s rare after-action report then maps a ransomware crew’s path from a trojanized admin tool to encrypting roughly sixty a…
…
continue reading
1
Lawfare Archive: The Dangers of Deploying the Military on U.S. Soil
1:33:52
1:33:52
Play later
Play later
Lists
Like
Liked
1:33:52From November 6, 2024: For today’s special episode, Lawfare General Counsel and Senior Editor Scott R. Anderson held a series of conversations with contributors to a special series of articles on “The Dangers of Deploying the Military on U.S. Soil” that Lawfare recently published on its website, in coordination with our friends at Protect Democracy…
…
continue reading
WarRoom Battleground EP 887: Live From The CHD Conference Day 1 Cont.By WarRoom.org
…
continue reading
Episode 4911: Live From The CHD Conference Day 1By WarRoom.org
…
continue reading
Episode 4910: Ending the Filibuster; Hundreds Of Subpoenas Sent Against The Deep StateBy WarRoom.org
…
continue reading
Episode 4909: Making The US The Dominant Player To Build ManufacturingBy WarRoom.org
…
continue reading
Today is episode 700 of the 7MinSec podcast! Oh my gosh. My mom didn't think we could do it, but we did. Instead of a big blowout with huge news, giveaways and special guests, today is a pretty standard issue episode with a (nearly) 7-minute run time! The topic of today's episode is Pretender (which you can download here and read a lot more about h…
…
continue reading
1
Guest pod: Alex LaCasse talks AI governance with Brenda Leong and Andrew Burt
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12As artificial intelligence continues to coalesce in the modern economy, AI governance only grows in significance. Brenda Leong, director of ZwillGen's AI division, and Andrew Burt, CEO of Luminos, have long been on the front lines of AI's emergence and busy helping organizations navigate this space. In a first for The Privacy Advisor Podcast, we're…
…
continue reading
1
Lawfare Daily: Supreme Court Oral Arguments on President Trump’s Tariffs
1:02:24
1:02:24
Play later
Play later
Lists
Like
Liked
1:02:24In a live conversation on November 5, Lawfare Senior Editor Scott R. Anderson sat down with Lawfare Contributing Editor Peter Harrell and Georgetown Law Professors Marty Lederman and Kathleen Claussen to discuss what occurred during oral arguments in the legal challenge to President Trump’s tariffs at the Supreme Court and how the justices may rule…
…
continue reading
1
Hackers use Hyper-V, Cisco UCCX flaw, The Louvre's password
7:58
7:58
Play later
Play later
Lists
Like
Liked
7:58Hackers use Windows Hyper-V to evade EDR detection Critical Cisco UCCX flaw lets attackers run commands as root The Louvre's video security password was reportedly Louvre Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatL…
…
continue reading
1
WarRoom Battleground EP 886: Hungarian Prime Minister Viktor Orbán Goes To See POTUS And German “Justice” Persecutes AfD Euro-MP
WarRoom Battleground EP 886: Hungarian Prime Minister Viktor Orbán Goes To See POTUS And German “Justice” Persecutes AfD Euro-MPBy WarRoom.org
…
continue reading
Episode 4908: Bringing Brennan To Account; Failure Of The Capitalist System With No CapitalistsBy WarRoom.org
…
continue reading
1
SANS Stormcast Friday, November 7th, 2025: PowerShell Log Correlation; RondoBox Disected; Google Chrome and Cisco Patches (#)
5:31
5:31
Play later
Play later
Lists
Like
Liked
5:31SANS Stormcast Friday, November 7th, 2025: PowerShell Log Correlation; RondoBox Disected; Google Chrome and Cisco Patches Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/d…
…
continue reading
1
Ep 154: How DORA Will Impact US Companies with Dejan Kosutic
33:56
33:56
Play later
Play later
Lists
Like
Liked
33:56By John Verry
…
continue reading
1
Turning To The Darkside & AI Cyberslop - PSW #899
2:07:54
2:07:54
Play later
Play later
Lists
Like
Liked
2:07:54This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
…
continue reading
1
How AI is Expanding the CIO Role with Chetna Mahajan of Webflow
31:30
31:30
Play later
Play later
Lists
Like
Liked
31:30In this episode, Chetna explains how new automation strategies are evolving not only productivity, but the role of the CIO. Chetna emphasizes the importance of data quality and security when scaling a fast-growing company, as well as transparency and partnership in vendor relationships. About the Guest: Chetna is an award winning CIO, board member,…
…
continue reading
Episode 4907: Vaccine Injury And Long Covid Continue Years After The PandemicBy WarRoom.org
…
continue reading
Episode 4906: Basic Fundamentals Of Driving An Economy; Redfields WarningBy WarRoom.org
…
continue reading
This is today’s cyber news for November 6th, 2025. We open with zero-click prompt issues that could make large language models leak prior chats, then move to Hyundai AutoEver’s exposure of sensitive identifiers in U.S. systems. A fresh cloud study underscores that most breaches still start with credentials and misconfiguration, while a Control Web …
…
continue reading
1
Lawfare Daily: Seeking Meaning at the Soviet Collapse, with Joseph Kellner
37:57
37:57
Play later
Play later
Lists
Like
Liked
37:57On today’s episode, Lawfare Managing Editor Tyler McBrien sits down with Joseph Kellner, an assistant professor of history at the University of Georgia to discuss his latest book, “The Spirit of Socialism: Culture and Belief at the Soviet Collapse,” which examines the millions of Soviet people who embarked on a “spirited and highly visible search f…
…
continue reading
1
Richard Heart allegedly funnels $500M in ETH through Tornado Cash
3:48
3:48
Play later
Play later
Lists
Like
Liked
3:48It’s alleged that wallets benefiting from the launch of Heart’s HEX, Pulsechain, and/or PulseX are mixing over $500M dollars worth of ETH.
…
continue reading
1
Google uncovers PROMPFLUX, CISA warns of CentOS Web Panel bug, Threat group targets academics
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56Google uncovers PROMPTFLUX malware CISA warns of CentOS Web Panel bug Threat group targets academics Huge thanks to our sponsor, ThreatLocker Cybercriminals don't knock — they sneak in through the cracks other tools miss. That's why organizations are turning to ThreatLocker. As a zero-trust endpoint protection platform, ThreatLocker puts you back i…
…
continue reading
Today we are joined by Dr. Sasha O'Connell, Senior Director for Cybersecurity Programs at Aspen Digital, discussing "10 Years of Cybersecurity Progress & What Comes Next." Ben talks about a couple of instances of AI companies reigning in their chatbots. Dave's got the story of ICE’s controversial facial recognition operations. While this show cover…
…
continue reading
1
Seeing the unseen: why geospatial intelligence is important
41:57
41:57
Play later
Play later
Lists
Like
Liked
41:57What are the origins of AGO and how has the organisation developed within the National Intelligence Community? How does AGO contribute to the broader remit of Australian statecraft, the work done by other NIC agencies, and the Five Eyes partnership? What are some of the biggest challenges in Australia’s immediate region that AGO is working towards?…
…
continue reading
WarRoom Battleground EP 885: Shining Light On Scandals In The Catholic ChurchBy WarRoom.org
…
continue reading
Episode 4905: SCOTUS Listens To Oral Arguments On Trump's TariffsBy WarRoom.org
…
continue reading
1
SANS Stormcast Thursday, November 6th, 2025: Domain API Update; Teams Spoofing; VShell Report (#)
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SANS Stormcast Thursday, November 6th, 2025: Domain API Update; Teams Spoofing; VShell Report Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing V…
…
continue reading
1
Redefining Security in 2025 Part 1: Breaking Leadership Barriers with GMR CEO Mary Gates
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46Technology isn’t the only aspect of the security industry that’s evolving. The very definition of “security” is changing, so the way practitioners approach security must change with it. SecurityInfoWatch Associate Editor Samantha Schober brings Mary Gates, CEO of GMR Security Consulting Group, to the table to discuss the company’s rebranding effort…
…
continue reading
Episode 4904: The Great Unmasking; Socialism Takes On Capitalist CapitolBy WarRoom.org
…
continue reading
Episode 4903: Blowout Across America's Elections; SCOTUS Hear Oral Arguments On TariffsBy WarRoom.org
…
continue reading
This week, Scott sat down with co-hosts emeritus Benjamin Wittes and Alan Rozenshtein, and Senior Editor Kate Klonick, to talk through the week’s big national security news stories, including: “Cracks in the Foundation.” The conservative Heritage Foundation—and the broader conservative movement it plays a central role in—has been going through a ve…
…
continue reading
1
Rational Security: The “Wea Culpa” Edition
1:14:26
1:14:26
Play later
Play later
Lists
Like
Liked
1:14:26This week, Scott sat down with co-hosts emeritus Benjamin Wittes and Alan Rozenshtein, and Senior Editor Kate Klonick, to talk through the week’s big national security news stories, including: “Cracks in the Foundation.” The conservative Heritage Foundation—and the broader conservative movement it plays a central role in—has been going through a ve…
…
continue reading
1
Strategy needs to pay $689M a year to not sell bitcoin
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45Strategy has to pay $689M to not sell any of its BTC, and those costs have increased every quarter since 2021.
…
continue reading
1
LLM crypto trading contest finds LLMs can’t trade crypto
4:19
4:19
Play later
Play later
Lists
Like
Liked
4:19Four out of the six large language models in the Alpha Arena crypto trading competition finished in the red.
…
continue reading
1
China is sentencing pig butchering scammers to death
3:18
3:18
Play later
Play later
Lists
Like
Liked
3:18China has sentenced nearly 20 people, including members of prominent mafia families, to death over pig butchering scams in recent months.
…
continue reading
1
STRE is nothing like what Michael Saylor promised on Thursday
3:18
3:18
Play later
Play later
Lists
Like
Liked
3:18Strategy founder Michael Saylor repeatedly promised a roll-out of STRC counterparts but instead he launched STRE.
…
continue reading