Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Internet Security Podcasts
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
…
continue reading
In this podcast, networking guru Mattias Fridström, Chief Evangelist at Arelion and industry experts discuss all things Internet, networks, cloud and connectivity.
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Internet safety, security, and digital parenting tips. You'll learn about protecting kids online (cybersafety), and general digital security and privacy (for adults as well as kids). https://DefendingDigital.com
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
computer help free. blogtvpccareman
…
continue reading
Johnny Ball is famous for knowing many things, so who better to tell you how to keep your computer safe from online fraud. Johnny's guides contain all you need to know about internet and email security. There are four wisdom-packed episodes to download onto your computer and portable audio player.
…
continue reading
A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. Join us live on YouTube, Monday's at 4:30PM ET https://www.youtube.com/@BlackHillsInformationSecurity Brought to you by Black Hills Information Security. https://www.blackhillsinfosec.com
…
continue reading
The Congressional Internet Caucus Academy works to educate policymakers on critical Internet policy issues. With funding and logistical support from the Internet Education Foundation, the Internet Caucus Advisory Committee hosts regular debates to discuss important Internet policy issues. Since its founding, the Internet Caucus Advisory Committee has built a membership of over 200 organizations from a broad cross-section of the public interest community and the Internet industry. The Interne ...
…
continue reading
The Pragmatic CSO podcast is a wide ranging discussion of information security topics, anchored by the 12-step Pragmatic CSO methodology to help security practitioners become more relevant in business operations.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Join Matthew Chapman, a Cybersecurity Expert, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Digital Politics with Karen Jagoda is a non-partisan podcast featuring thought leaders and industry pioneers with insights about innovative approaches to political campaigns, voter engagement, mobilization, fundraising, persuasion, and GOTV. Topics include the power of mobile devices, leveraging social networks, message testing and targeting, cross-media advertising, grassroots organizing, and big data.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
A podcast brought to you by Kosciusko Connect. On Connected Conversations, we talk about technology, the internet, and how to navigate the digital world in which we live.
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
This Week in NET is Cloudflare’s weekly roundup exploring the Internet’s past, present, and future. Hosted by João Tomé with expert guests, it shares insights that matter to developers, businesses, and Internet enthusiasts alike. Follow us on X: @CloudflareTV and @Cloudflare Read our blog posts at blog.cloudflare.com Watch our full video library at cloudflare.tv/ThisWeekInNet
…
continue reading
When you're focused on work, you don't expect your next hour on the clock to be the most horrifying in your life. In Tales from the Breakroom, folks from around the world send us their scariest workplace encounters and we narrate them to you. Enjoy, and try not to clock out forever... Submit your scariest work experiences at https://www.eeriecast.com/submit
…
continue reading
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
…
continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
continue reading
The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we're experts. Because this is the internet, and that's how it works now.
…
continue reading
TechDaily.ai is your go-to platform for daily podcasts on all things technology. From cutting-edge innovations and industry trends to practical insights and expert interviews, we bring you the latest in the tech world—one episode at a time. Stay informed, stay inspired!
…
continue reading
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
…
continue reading
Sean Hannity is a multimedia superstar, spending four hours a day every day reaching out to millions of Americans on radio, television and the Internet.
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
Welcome to the Fruitfulujah Podcast, your go-to weekly show delving into the realms of the internet, business, and, most importantly, you. Join us as we demystify technology for the everyday individual, empowering you to cultivate successful internet ventures. Tune in for insightful discussions that bridge the gap between the digital world and your personal and professional growth.
…
continue reading
This podcast will give you help you with passing your CompTIA exams. We also sprinkle different technology topics.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
1
SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack
6:56
6:56
Play later
Play later
Lists
Like
Liked
6:56Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 Mystery Google Chrome 0-Day Vulnerability Google released an update for Google Chrome fixing a vulne…
…
continue reading
1
SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack (#)
6:56
6:56
Play later
Play later
Lists
Like
Liked
6:56SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 "My…
…
continue reading
1
The Hidden Backbone of the Internet: Subsea Cable Security with Alex Botting
37:25
37:25
Play later
Play later
Lists
Like
Liked
37:25Undersea cables quietly carry almost all global internet traffic yet rarely feature in security debates. This episode explains how subsea infrastructure underpins the global economy, data flows, and modern military operations while facing frequent "accidental" disruptions and growing geopolitical risk. Listeners hear why chokepoints, island depende…
…
continue reading
1
Holiday Hack Challenge, AI, Internet of Trash - Ed Skoudis - PSW #903
2:10:41
2:10:41
Play later
Play later
Lists
Like
Liked
2:10:41This week we welcome Ed Skoudis to talk about the holiday hack challenge (https://sans.org/HolidayHack). In the security news: Oh Asus Dashcam botnets Weird CVEs being issued CodeRED, but not the worm Free IP checking Internet space junk and IoT Decade old Linux kernel vulnerabilities Breaking out of Claude code Malicious LLMs Hacker on a plan gets…
…
continue reading
Join Sean in this hour as he dives into pressing news topics, from low gas prices and a shrinking trade deficit to ongoing conversations about healthcare reform. He presents bold solutions to address issues impacting hardworking Americans while highlighting how leftist policies are failing residents in places like California. With a mix of humor an…
…
continue reading
In this hour of the Sean Hannity Show, Sean dives into the ongoing clash over parental rights in the classroom, focusing on a recent federal lawsuit against New York Attorney General Letitia James. Guests include parents and school board members from the Massapequa School District who are standing up against threats to free speech and advocacy for …
…
continue reading
In this hour of The Sean Hannity Show, Sean dives deep into the ongoing challenges posed by the Affordable Care Act, discussing its broken promises and the reality of rising healthcare costs. He highlights testimonies from experts who shed light on the fraud within federal contracting programs and the ineffectiveness of government-run healthcare sy…
…
continue reading
Just when I thought it couldn't get worse, it did. Two sitting members of Congress bashed the memories of two National Guard members attacked on 11.26.25. One is still in the hospital, and one lost her life. So many of the representatives who sat in that hearing today said offensive things, but these two take the cake. You have to hear it for yours…
…
continue reading
1
Cathy Chan: Post-Quantum Security and the Shift Toward Crypto-Agility
32:12
32:12
Play later
Play later
Lists
Like
Liked
32:12Quantum computing is moving from theory to reality, and with it comes a fundamental shift in how organizations must protect long-lived and sensitive data. In this episode, Cathy Chan from Cyberforce explains what Q-Day really means, why “harvest now, decrypt later” is already a live threat, and how enterprises can build crypto-agility before post-q…
…
continue reading
1
A Live Stream From inside Lazarus Group – 2025-12-08
1:03:30
1:03:30
Play later
Play later
Lists
Like
Liked
1:03:30🔗 Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com Join us LIVE on Mondays, 4:30pm EST. A weekly Podcast with BHIS and Friends. We discuss notable Infosec, and infosec-adjacent news stories gathered by our community news team. https://www.youtube.com/@BlackHillsInformationSecurity Chat with us on Discord! https:/…
…
continue reading
1
Tech Segment: MITM Automation + Security News - Josh Bressers - PSW #904
2:07:47
2:07:47
Play later
Play later
Lists
Like
Liked
2:07:47This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
…
continue reading
1
Tech Segment: MITM Automation + Security News - Josh Bressers - PSW #904
2:07:47
2:07:47
Play later
Play later
Lists
Like
Liked
2:07:47This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
…
continue reading
1
Tech Segment: MITM Automation + Security News - Josh Bressers - PSW #904
2:07:47
2:07:47
Play later
Play later
Lists
Like
Liked
2:07:47This week in our technical segment, you will learn how to build a MITM proxy device using Kali Linux, some custom scripts, and a Raspberry PI! In the security news: Hacking Smart BBQ Probes China uses us as a proxy LOLPROX and living off the Hypervisor Are we overreating to React4Shell? Prolific Spyware vendors EDR evaluations and tin foil hats Com…
…
continue reading
CISA warns that pro-Russia hacktivist groups are targeting US critical infrastructure. Google patches three new Chrome zero-day vulnerabilities. North Korean actors exploit React2Shell to deploy a new backdoor. Researchers claim Docker Hub secret leakage is now a systemic problem. Attackers exploit an unpatched zero-day in Gogs, the self-hosted Git…
…
continue reading
1
Why Sexual Abuse Victims Must Come Forward to Protect Others with John Fitch The Fitch Law Firm
13:22
13:22
Play later
Play later
Lists
Like
Liked
13:22John Fitch, The Fitch Law Firm, joins Deepak Puri, CEO of The Democracy Labs, to discuss the importance of victims reporting sexual abuse not only for their own justice but to break the cycle and prevent perpetrators from harming others. John warns that delayed reporting can lead to the loss of essential physical evidence, making the case harder to…
…
continue reading
1
Automating Incident Response: How to Reduce Malware Forensics Time by 99% with Python and VirusTotal
5:03
5:03
Play later
Play later
Lists
Like
Liked
5:03This story was originally published on HackerNoon at: https://hackernoon.com/automating-incident-response-how-to-reduce-malware-forensics-time-by-99percent-with-python-and-virustotal. Build a pipeline that aggressively removes "Safe" files using three layers. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. Yo…
…
continue reading
1
The 'Sudo' Problem: Why Google is Locking Down AI Agents Before They Break the Web
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57This story was originally published on HackerNoon at: https://hackernoon.com/the-sudo-problem-why-google-is-locking-down-ai-agents-before-they-break-the-web. Google has released a whitepaper on how they are architecting security for Chrome’s new Agentic capabilities. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecu…
…
continue reading
1
Cloud Security Made Simple: Your CompTIA Security+ Study Guide
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03[email protected] In this episode of Technology Tap: CompTIA Study Guide, we dive deep into cloud security fundamentals, perfect for those preparing for the CompTIA Security+ exam. Join our study group as we explore the shifting security landscape from locked server rooms to identity-based perimeters and data distributed across regions. This …
…
continue reading
A huge legislative effort has been underway, led by Rep. Tim Burchett of Tennessee. Finally, someone with a backbone, standing up to the RINOS and traitors in the House and Senate, sending American tax dollars to terrorist nations, and funding the Taliban. And to top it off, it's about $45 million a week, which is out of control on every level. Tod…
…
continue reading
Join Sean in this hour as he delivers a hard-hitting news roundup, digging into the alarming corruption uncovered in Minnesota's Somali welfare fraud scandal. With insights from House Oversight Committee Chairman James Comer and former Speaker of the House Newt Gingrich, Sean sheds light on how this situation may extend far beyond what has been rep…
…
continue reading
Join Sean in this festive episode as he playfully debates the merits of classic Christmas music, giving a nod to Grandma's favorite tunes versus his own preferences. The conversation takes a humorous turn as they discuss holiday traditions, from eggnog to the quirks of family gatherings. Listen in as Sean reveals his own experiences with holiday be…
…
continue reading
In this episode, Sean welcomes Bill O'Reilly to discuss the troubling rise of conspiracy theories and the personal attacks targeted at the family of the recently assassinated Charlie Kirk. Reflecting on comments made by Democrat John Fetterman, they emphasize the importance of letting the Kirk family grieve without the intrusion of vile rumors and …
…
continue reading
1
SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on. https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Comma…
…
continue reading
1
SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation (#)
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerab…
…
continue reading
1
Can Valve's Gabe Cube Compete with PS5 and Xbox in 2026?
12:52
12:52
Play later
Play later
Lists
Like
Liked
12:52Valve is back in the living room—with a bold second try. In this episode, we dive into the leaked specs of Valve’s upcoming gaming PC, unofficially dubbed the "Gabe Cube," slated for release in early 2026. Designed as a compact, Linux-based console alternative, the Gabe Cube aims to succeed where the 2015 Steam Machine failed—but is it enough? We u…
…
continue reading
1
AWS and Google Unite to Fix Multicloud—At a High Cost
11:56
11:56
Play later
Play later
Lists
Like
Liked
11:56In a move no one saw coming, AWS and Google Cloud have joined forces to tackle one of the biggest headaches in enterprise infrastructure: multicloud networking. On this episode, David and Sophia unpack the implications of this unprecedented partnership and what it means for cloud engineers, CTOs, and FinOps teams alike. Here’s what you’ll learn: • …
…
continue reading
1
Skild AI in the Spotlight: SoftBank and Nvidia Discuss $14 Billion Investment
12:51
12:51
Play later
Play later
Lists
Like
Liked
12:51SoftBank is no longer just playing in tech—it’s going all in on artificial super intelligence. In this episode, we break down how a staggering $13 billion return from its OpenAI stake catalyzed one of the boldest strategic pivots in the company’s history. From cashing out legacy assets to executing rapid-fire acquisitions, here’s how SoftBank is ra…
…
continue reading
1
AI, Creators & Agentic Commerce — A Conversation with Cloudflare CSO Stephanie Cohen
36:51
36:51
Play later
Play later
Lists
Like
Liked
36:51In this episode of This Week in NET, host João Tomé sits down with Stephanie Cohen, Cloudflare’s Chief Strategy Officer, for a candid conversation about AI, content creators, financial services, partnerships, and the future of the Internet. Stephanie shares how Cloudflare is helping keep the Internet open and resilient — from giving creators transp…
…
continue reading
1
Who Really Controls Your Social Media Feed?
11:15
11:15
Play later
Play later
Lists
Like
Liked
11:15Social media algorithms are doing more than curating your feed—they're shaping global discourse, politics, and even national security. In this thought-provoking episode, we unpack the complex duality of these systems: tools for managing overwhelming content, yet engines of division and misinformation. Key takeaways include: • Why engagement-based r…
…
continue reading
Patch Tuesday. Federal prosecutors charge a Houston man with smuggling Nvidia chips to China, a Ukrainian woman for targeting critical infrastructure, and an Atlanta activist for wiping his phone. The power sector sees cyber threats doubling. The new Spiderman phishing kit slings its way across the dark web. Our guest is Dick O'Brien, Principal Int…
…
continue reading
1
Network of Vetted Marketing Firms to Address Diverse Campaign Needs with CJAM The Marketing Connector
20:13
20:13
Play later
Play later
Lists
Like
Liked
20:13Behdad Jamshidi is the Founder of CJAM The Marketing Connector, which has vetted over 1,000 marketing agencies to identify those most qualified to deliver on their promises. The idea of a single agency handling all political and advocacy campaign needs is no longer realistic, as there are an increasing number of channels to reach voters and support…
…
continue reading
https://www.nationalgeographic.com/environment/article/chasing-tornadoes National Geographic article on Storm Chasing called Chasing Tornadoes.By Citation Needed Media
…
continue reading
1
INE Earns G2 Winter 2026 Badges Across Global Markets
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35This story was originally published on HackerNoon at: https://hackernoon.com/ine-earns-g2-winter-2026-badges-across-global-markets. Awards include Leader status in the Online Course Providers Grid Report, Momentum Leader recognition in two major training categories, and regional leadership. Check more stories related to cybersecurity at: https://ha…
…
continue reading
1
The Louvre Heist: Intimidation, DNA, and the Real Story Behind the Global Headline
8:45
8:45
Play later
Play later
Lists
Like
Liked
8:45This story was originally published on HackerNoon at: https://hackernoon.com/the-louvre-heist-intimidation-dna-and-the-real-story-behind-the-global-headline. Louvre heist and how the simple password is not the story. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
…
continue reading
1
Salesforce Security Risks, Boards Duty of Care, and Managing CISO Risks - Justin Hazard - BSW #425
52:57
52:57
Play later
Play later
Lists
Like
Liked
52:57Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
…
continue reading
In this episode of Sean's podcast, he dives deep into the contentious issues surrounding open borders and the current state of policing in America. With a focus on the alarming rise in drug-related deaths linked to cartels, Sean discusses President Trump's efforts to combat these threats and the legal aspects of targeting drug traffickers labeled a…
…
continue reading
Join Sean this hour as he tackles the challenges facing American farmers and the impact of recent economic policies. He welcomes Secretary of Agriculture Brooke Rollins, who highlights the devastating increases in agricultural input costs under the Biden administration, and discusses the urgent need for fair trade practices to support farmers. Hear…
…
continue reading
1
SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches.
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution in ColdFusion, as well as the code execution issue in Acrobat, will very likely see exploits soon. h…
…
continue reading
1
SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches. (#)
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches. Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution…
…
continue reading
1
Incident Management and the Crowdstrike Event with Liam Westley
41:02
41:02
Play later
Play later
Lists
Like
Liked
41:02On July 19, 2024, a misconfigured file sent as part of an update to the Falcon Sensor suite by CrowdStrike caused service outages worldwide. Liam Westley talks about his experiences executing the incident management plan at his company that day—even though his company did not use the software! Liam talks about dealing with the regulatory requiremen…
…
continue reading