Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Internet Security Podcasts
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
…
continue reading
In this podcast, networking guru Mattias Fridström, Chief Evangelist at Arelion and industry experts discuss all things Internet, networks, cloud and connectivity.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
Internet safety, security, and digital parenting tips. You'll learn about protecting kids online (cybersafety), and general digital security and privacy (for adults as well as kids). https://DefendingDigital.com
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
computer help free. blogtvpccareman
…
continue reading
Johnny Ball is famous for knowing many things, so who better to tell you how to keep your computer safe from online fraud. Johnny's guides contain all you need to know about internet and email security. There are four wisdom-packed episodes to download onto your computer and portable audio player.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
The Pragmatic CSO podcast is a wide ranging discussion of information security topics, anchored by the 12-step Pragmatic CSO methodology to help security practitioners become more relevant in business operations.
…
continue reading
This Week in NET is Cloudflare’s weekly roundup exploring the Internet’s past, present, and future. Hosted by João Tomé with expert guests, it shares insights that matter to developers, businesses, and Internet enthusiasts alike. Follow us on X: @CloudflareTV and @Cloudflare Read our blog posts at blog.cloudflare.com Watch our full video library at cloudflare.tv/ThisWeekInNet
…
continue reading
'Creepypastas' are the urban legends of the internet. A new age of horror told through digital word of mouth.
…
continue reading
Join Matthew Chapman, a Cybersecurity Expert, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
The Congressional Internet Caucus Academy works to educate policymakers on critical Internet policy issues. With funding and logistical support from the Internet Education Foundation, the Internet Caucus Advisory Committee hosts regular debates to discuss important Internet policy issues. Since its founding, the Internet Caucus Advisory Committee has built a membership of over 200 organizations from a broad cross-section of the public interest community and the Internet industry. The Interne ...
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
…
continue reading
When you're focused on work, you don't expect your next hour on the clock to be the most horrifying in your life. In Tales from the Breakroom, folks from around the world send us their scariest workplace encounters and we narrate them to you. Enjoy, and try not to clock out forever... Submit your scariest work experiences at https://www.eeriecast.com/submit
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Glen Kendell sits down with industry experts to explore the often-murky waters of data in various sectors. Each episode breaks down how complex, overwhelming, or just plain confusing data can be—and, more importantly, how to make sense of it. Data and Confused offers insightful conversations, real-world examples, and practical takeaways to help bring clarity to the chaos. For business inquiries email [email protected]
…
continue reading
A podcast brought to you by Kosciusko Connect. On Connected Conversations, we talk about technology, the internet, and how to navigate the digital world in which we live.
…
continue reading
The Tyler Woodward Project is a weekly show about the way technology, science, and culture actually collide in real life, told through the lens of an elder millennial who grew up alongside the internet and watched it get corporate. Each episode breaks down the systems, tools, and ideas shaping how we work, communicate, and live, without the buzzwords, posturing, or fake hype. Expect smart, grounded conversations, a bit of sarcasm, and clear explanations that make complex topics feel human an ...
…
continue reading
The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we're experts. Because this is the internet, and that's how it works now.
…
continue reading
The definitive podcast for the business of digital infrastructure
…
continue reading
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
…
continue reading
In "Surfacing Security," we explore a variety of cybersecurity topics relevant to Attack Surface Management and beyond. Your co-hosts are Michael Gianarakis (Assetnote Co-Founder/CEO) and Shubham Shah (Assetnote Co-Founder/CTO).
…
continue reading
The Mint Techcetra podcast is your navigator into the mesmerizing maze that is technology today. From decoding technologies, policies, enterprises, and legal decisions to sci-fi and pop culture, this podcast will cover it all. Every week hosts - Leslie D'Monte, Shouvik Das and Deepti Ahuja - will talk about important developments in tech and how they transform our lives, work and play as we know it. If you have any questions or suggestions you can reach out to the hosts on LinkedIn via their ...
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
Join Internet Society Foundation's Program Director, Shayna Robinson, in exploring the many facets of the Internet and its power as a force for good in the world. Listen as she and her guest hosts copy you in on interviews with experts, thoughtful stories from around the globe, and trending topics about everyday digital life.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
1
SANS Stormcast Thursday, January 15th, 2026: Luma Streal Repeat Infection; ServiceNow Broken Auth; Starlink/GPS Jamming
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Infection repeatedly adds scheduled tasks and increases traffic to the same C2 domain https://isc.sans.edu/diary/Infection%20repeatedly%20adds%20scheduled%20tasks%20and%20increases%20traffic%20to%20the%20same%20C2%20domain/32628 BodySnatcher (CVE-2025-12420): A Broken Authentication and Agentic Hijacking Vulnerability in ServiceNow https://appomni.…
…
continue reading
1
SANS Stormcast Thursday, January 15th, 2026: Luma Streal Repeat Infection; ServiceNow Broken Auth; Starlink/GPS Jamming (#)
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11SANS Stormcast Thursday, January 15th, 2026: Luma Streal Repeat Infection; ServiceNow Broken Auth; Starlink/GPS Jamming Infection repeatedly adds scheduled tasks and increases traffic to the same C2 domain https://isc.sans.edu/diary/Infection%20repeatedly%20adds%20scheduled%20tasks%20and%20increases%20traffic%20to%20the%20same%20C2%20domain/32628 B…
…
continue reading
1
Ep. 36 - Rebuilding Internet Routes and Securing Data Infrastructure, with Bevan Slattery
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Bevan Slattery, Australian entrepreneur and founder of multiple telecommunications ventures, spoke at The Tech Capital the 3rd annual APAC Finance Forum in Singapore on the evolving digital infrastructure landscape in Australia and Asia. Slattery noted the extensive rebuilding of internet connectivity over the past 12 to 24 months. “When you look a…
…
continue reading
Hundreds of proposed amendments to the United States Constitution are introduced during each session of the United States Congress. From 1789 through January 3, 2025, approximately 11,985 measures have been proposed to amend the United States Constitution.[1] Collectively, members of the House and Senate typically propose around 200 amendments duri…
…
continue reading
1
Is Your Resume Invisible to AI? What Job Seekers Need to Know
27:26
27:26
Play later
Play later
Lists
Like
Liked
27:26In this episode of Mint Techcetra, host Nelson John sits down with Madhu Kurup, Vice President of Engineering at Indeed, to explore how artificial intelligence is transforming India’s hiring ecosystem. Madhu unpacks the growing role of AI in improving job matching, supporting recruiters, and empowering job seekers through greater efficiency and pro…
…
continue reading
1
The Future Of Proactive Security Before Building an AI Enabled Enterprise - Erik Nost - BSW #430
55:30
55:30
Play later
Play later
Lists
Like
Liked
55:30The three proactive security principles of visibility, prioritization, and remediation have always been the foundation of vulnerability management teams. But these teams face continuous challenges. How do you address these challenges? Erik Nost, Senior Analyst at Forrester, joins Business Security Weekly to break down the six questions that need to…
…
continue reading
1
SANS Stormcast Wednesday, January 14th, 2026: Microsoft, Adobe and Fortinet Patches; ConsentFix
7:58
7:58
Play later
Play later
Lists
Like
Liked
7:58Microsoft Patch Tuesday January 2026 Microsoft released patches for 113 vulnerabilities. This includes one already exploited vulnerability, one that was made public before today and eight critical vulnerabilities. https://isc.sans.edu/diary/January%202026%20Microsoft%20Patch%20Tuesday%20Summary/32624 Adobe Patches Adobe released patches for five pr…
…
continue reading
1
SANS Stormcast Wednesday, January 14th, 2026: Microsoft, Adobe and Fortinet Patches; ConsentFix (#)
7:58
7:58
Play later
Play later
Lists
Like
Liked
7:58SANS Stormcast Wednesday, January 14th, 2026: Microsoft, Adobe and Fortinet Patches; ConsentFix Microsoft Patch Tuesday January 2026 Microsoft released patches for 113 vulnerabilities. This includes one already exploited vulnerability, one that was made public before today and eight critical vulnerabilities. https://isc.sans.edu/diary/January%20202…
…
continue reading
What's coming in 2026 for Azure? Richard chats with CVP and Chief Product Officer for Azure, Jeremy Winter, about the announcements at Ignite and what we can expect in Azure over the next year. Jeremy talks about new features for migrating workloads to Azure, creating more reliable application implementations, the vast array of AI-related technolog…
…
continue reading
1
Are you dead?, AI Hellscape, Copilot, Blue Delta, Quishing, Confer, Aaran Leyland... - SWN #546
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35Are you dead? AI Hellscape, Copilot Uninstalled?, Blue Delta, 2026 predictions, Quishing, Confer, Aaran Leyland, and More on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-546
…
continue reading
1
The Hammer and the Anvil: Offensive Cyber Strategy with Chris Inglis
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05Chris Inglis joins Frank Cilluffo to break down what offensive cyber strategy should look like in an era of strategic competition. Drawing from the McCrary Institute's new report on U.S. cyber policy, Inglis argues that resilience and consequences are not competing theories—they have to work together. He explains why "defend forward" and persistent…
…
continue reading
1
198 - What We Found in the Mountains - 5 TRUE Horror Stories
58:23
58:23
Play later
Play later
Lists
Like
Liked
58:23A state trooper confesses his most disturbing encounter in the wooded mountains of North America. This and 4 other true horror stories in today's episode. Get you our Tales from the Break Room coffee: https://eeriecast.store/products/mourning-brew-coffee-tales-from-the-break-room Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading
1
The Clash Between Grok’s Spicy Mode and India’s Local Laws, Plus Our Favourite Tech Gadgets from CES 2026
21:08
21:08
Play later
Play later
Lists
Like
Liked
21:08“This is not really a question of morality; it’s about respecting the laws of the land.” In this episode, hosts Leslie D'Monte and Shouvik Das break down why Elon Musk’s Grok found itself in trouble across nations like India, Malaysia, and the European Union. We examine the controversy surrounding its "Spicy Mode" within India’s legal framework, de…
…
continue reading
1
Secure By Design Is Better Than Secure By Myth - Bob Lord - ASW #365
53:33
53:33
Play later
Play later
Lists
Like
Liked
53:33Not all infosec advice is helpful. Bad advice wastes time, makes people less secure, and takes focus away from making software more secure. Bob Lord talks about his efforts to tamp down hacklore -- the security myths and mistakes that crop up in news stories and advice to users. He talks about how these myths come about, why they're harmful, and ho…
…
continue reading
1
SANS Stormcast Tuesday, January 13th, 2026: n8n got npm’ed; Gogs exploit; telegram proxy links
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45n8n supply chain attack Malicious npm pagackages were used to attempt to obtain user OAUTH credentials for NPM. https://www.endorlabs.com/learn/n8mare-on-auth-street-supply-chain-attack-targets-n8n-ecosystem Gogs 0-Day Exploited in the Wild An at the time unpachted flaw in Gogs was exploited to compromise git repos. https://www.wiz.io/blog/wiz-rese…
…
continue reading
1
SANS Stormcast Tuesday, January 13th, 2026: n8n got npm'ed; Gogs exploit; telegram proxy links (#)
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46SANS Stormcast Tuesday, January 13th, 2026: n8n got npm'ed; Gogs exploit; telegram proxy links n8n supply chain attack Malicious npm pagackages were used to attempt to obtain user OAUTH credentials for NPM. https://www.endorlabs.com/learn/n8mare-on-auth-street-supply-chain-attack-targets-n8n-ecosystem Gogs 0-Day Exploited in the Wild An at the time…
…
continue reading
1
AI and the Myth of the Unicorn Hire with expert Chris Brown - Ep19
58:18
58:18
Play later
Play later
Lists
Like
Liked
58:18In this episode of Data and Confused, Glen is joined by Chris Brown of WoW Remote Teams to explore what actually makes remote and nearshore hiring succeed or fail. Chris shares hard-earned lessons from scaling teams across Latin America, including why communication and expectations matter more than cost savings, how to avoid hiring “unicorns,” and …
…
continue reading
This week Dave and Gunnar talk about diverse AI opinions and the wisdom of crowds! Trinity and Low-background Steel Hardcore History Slate Political Gabfest Google Vids! Researchers find adding this one simple sentence to prompts makes AI models way more creative D&G This Week in Bad Ideas Kalshi Becomes CNN’s Official Prediction Market Partner Aft…
…
continue reading
1
The State of Cybersecurity Hiring, 2026 content plans, and the weekly news - ESW #441
1:35:49
1:35:49
Play later
Play later
Lists
Like
Liked
1:35:49First Topic - Podcast Content Plans for 2026 Every year, I like to sit down and consider what the podcast should be focusing on. Not doing so ensures every single episode will be about AI and nobody wants that. Least of all, me. If I have one more all-AI episode, my head is going to explode. With that said, most of what we talk about in this segmen…
…
continue reading
1
Packets, Phone Books, And The Fragile Chain Behind Every Click
19:01
19:01
Play later
Play later
Lists
Like
Liked
19:01The conversation provides a practical overview of how the internet works, covering the basics of IP, DNS, TCP, UDP, and HTTPS, the play-by-play of typing a URL, content delivery, network routing, internet problems, real-life scenarios, physical reality, cultural impact, and practical takeaways for internet issues. Views expressed are solely those o…
…
continue reading
In this episode of You Gotta Hack That, Felix sits down with Emily, a principal industrial cyber security consultant and former national utility cyber lead, to demystify ISA/IEC 62443. Why do so many teams treat it like a silver bullet and why does that backfire fast? Emily breaks down what 62443 actually is (spoiler: it’s a family of standards), w…
…
continue reading
1
SANS Stormcast Monday, January 12th, 2026: PEB Manipulation; YARA Update; VideoLAND and Apache NimBLE Patches
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16Malicious Process Environment Block Manipulation The process environment block contains metadata about particular processes, but can be manipulated. https://isc.sans.edu/diary/Malicious+Process+Environment+Block+Manipulation/32614/ YARA-X 1.11.0 Release: Hash Function Warnings The latest version of YARA will warn users if a hash rule attempts to ma…
…
continue reading
1
SANS Stormcast Monday, January 12th, 2026: PEB Manipulation; YARA Update; VideoLAND and Apache NimBLE Patches (#)
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17SANS Stormcast Monday, January 12th, 2026: PEB Manipulation; YARA Update; VideoLAND and Apache NimBLE Patches Malicious Process Environment Block Manipulation The process environment block contains metadata about particular processes, but can be manipulated. https://isc.sans.edu/diary/Malicious+Process+Environment+Block+Manipulation/32614/ YARA-X 1…
…
continue reading
1
17.5M Instagram accounts compromised: Take action now!
1:53
1:53
Play later
Play later
Lists
Like
Liked
1:53The episode discusses the Instagram data leak affecting 17.5 million accounts and the potential risks of scams. It also provides tips on protecting against such scams and emphasizes the importance of multi-factor authentication. All views and opinions expressed in this show are solely those of the creator and do not represent or reflect the views, …
…
continue reading
Welcome back to the digital wasteland, fellow survivors. We kick things off in the FOLLOW UP by marking a year since the LA Fires—hello, PTSD—alongside a 4th Strokiversary and three years of sobriety, all while wondering why America is currently obsessed with shooting its own civilians in the face. In the IN THE NEWS segment, Wired is finally teach…
…
continue reading
1
Nudification, Spying, Ni8mare, Cisco, Chat-GPT, Chrome, SaaS, CES, Josh Marpet & More - SWN #545
38:11
38:11
Play later
Play later
Lists
Like
Liked
38:11Grok Nudification, Spying, Ni8mare, Cisco, Chat-GPT, Chrome, SaaS, CES, Josh Marpet, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-545
…
continue reading
1
Record-Breaking DDoS Attacks & the Security Landscape Heading Into 2026
33:59
33:59
Play later
Play later
Lists
Like
Liked
33:59In this end-of-year episode of This Week in NET, host João Tomé is joined by Omer Yoachimik, Senior Product Manager for DDoS Protection at Cloudflare, to break down the realities of the 2025 DDoS threat landscape — and what’s coming next. They discuss how DDoS attacks reached previously “theoretical” scales in 2025, including record-breaking 31 Tbp…
…
continue reading
1
SANS Stormcast Friday, January 9th, 2026: Gephi Analysis; zlib vuln; GnuPG Vulns; Cisco/Cloudflare DNS Issue
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12Analysis using Gephi with DShield Sensor Data Gephi is a neat tool to create interactive data visualizations. It can be applied to honeypot data to find data clusters. https://isc.sans.edu/diary/Analysis%20using%20Gephi%20with%20DShield%20Sensor%20Data/32608 zlib v1.3.1.2 Global Buffer Overflow in TGZfname() of zlib untgz Utility The untgz utility …
…
continue reading
1
Steve Santorelli: Trust, Community, and the Reality of Cybercrime Investigation
34:18
34:18
Play later
Play later
Lists
Like
Liked
34:18What really happens when a cyberattack becomes a criminal investigation? In this episode of THEOS Cybernova, Paul Jackson speaks with Steve Santorelli, a formerly of Scotland Yard, whose career spans Microsoft’s Internet Crimes Investigation Team and Team Cymru. They explore how cybercrime investigations succeed in the real world: why trust and com…
…
continue reading
1
SANS Stormcast Friday, January 9th, 2026: Gephi Analysis; zlib vuln; GnuPG Vulns; Cisco/Cloudflare DNS Issue (#)
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12SANS Stormcast Friday, January 9th, 2026: Gephi Analysis; zlib vuln; GnuPG Vulns; Cisco/Cloudflare DNS Issue Analysis using Gephi with DShield Sensor Data Gephi is a neat tool to create interactive data visualizations. It can be applied to honeypot data to find data clusters. https://isc.sans.edu/diary/Analysis%20using%20Gephi%20with%20DShield%20Se…
…
continue reading
This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting we…
…
continue reading
This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting we…
…
continue reading
This week in the security news: Supply chain attacks and XSS PS5 leaked keys Claude tips for security pros No Flipper Zeros allowed, or Raspberry PIs for that matter Kimwolf and your local network Linux is good now Removing unremovable apps without root Detecting lag catches infiltrators Defending your KVM Fixing some of the oldest code Deleting we…
…
continue reading
1
Your Company Is Sitting on a Data Goldmine (Here’s How to Unlock It)
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54Most organizations are sitting on mountains of documents, PDFs, emails, and images they still cannot fully search, organize, or understand. In this episode of IT Visionaries, host Chris Brandt sits down with Tim McIntire, CTO of Hyland, to unpack why unstructured data is still one of the biggest blockers between AI hype and real results. Tim breaks…
…
continue reading
1
SANS Stormcast Thursday, January 8th, 2026: HTML QR Code Phishing; n8n vulnerability; Powerbank Feature Creep
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23A phishing campaign with QR codes rendered using an HTML table Phishing emails are bypassing filters by encoding QR codes as HTML tables. https://isc.sans.edu/diary/A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table/32606 n8n vulnerabilities In recent days, several new n8n vulnerabilities were disclosed. Ensure that …
…
continue reading