Speaking of Service uncovers practical ways to grow service revenue, control costs, and improve customer satisfaction. If you’re looking to innovate, gain a competitive edge, or just learn about the latest service trends, you’ve come to the right place! Also check: www.ptc.com/speakingofservice
…
continue reading
Iot Data Management Podcasts
The Industrial IoT Spotlight Podcast shines a light on digital solutions that are impacting businesses today. Our mission is to feature the companies that are building the next generation of enterprise technologies, from architecture design to data management to business model innovation. Our hosts, Peter Rohde-Chen and Erik Walenza, are friends and entrepreneurs based in Shanghai, China. The Industrial IoT Spotlight is produced by Asia Growth Partners, a group of technology experts and busi ...
…
continue reading
Valorem Reply, part of the Reply Group companies, is a business innovation and transformation firm focused on driving change with unique digital solutions, strategic technology investments and design-led user experiences. Through the expertise of our people and power of Microsoft technologies, our innovative strategies and solutions securely and rapidly transform the way our clients do business. Follow our podcast to get insights on the latest digital transformation trends & updates on Micro ...
…
continue reading
The IoT For All Podcast is focused on bringing together the smartest and most creative minds in the Internet of Things (IoT) industry to share their knowledge and experiences with the world. The ultimate goal is to help others succeed and educate the world on the benefits and inner workings of the Internet of Things industry.
…
continue reading
The We talk IoT podcast keeps you up to date with major developments in the world of the internet of things, IIoT, artificial intelligence, and cognitive computing. Our guests are leading industry experts, business professionals, and experienced journalists as they discuss some of today’s hottest tech topics and how they can help boost your bottom line. You can follow We talk IoT – the Internet of Things Business podcast anywhere you get your podcasts. About the host: Stefanie Ruth Heyduck i ...
…
continue reading
Define your digital roadmap. Weekly podcasts featuring specialists from across the S&P Global Market Intelligence research team offer deep insights into what’s new and what’s next in technology, industries and companies as they design and implement digital infrastructure. To learn more, visit: https://www.spglobal.com/marketintelligence/en/topics/tmt-news-insights
…
continue reading
Budget overruns. Bricked devices. Data breaches. Building connected products is hard. Join us every other Thursday for unfiltered conversations with executives about their AI journeys — the mistakes they made, the lessons they learned, and what they wish they’d known when they started. In each episode of Over the Air, our expert guests will make bold predictions, reveal unpopular opinions, and share stories you won’t hear anywhere else.
…
continue reading
This talk show is about the next big thing in value creation. It is for fund managers and corporate leadership investigating smart digital transformation for their companies, and for service providers, subject matter experts and vendors wanting to broaden their digital skills. Although the show’s focused on value creation in the context of private equity, it’s sector agnostic and can get pretty geeky, digging into IoT, data science (analytics & ML) and other high technology. At a high level, ...
…
continue reading
This feed is Light Reading's main podcast feed for "The Light Reading Podcast," "The Divide," "The Light Reading Extra," and "What's the Story?" Light Reading provides daily news, analysis and insight for the global communications networking and services industry. The publication was founded in 2000 and, since July 2016, has been a part of Informa Tech, a division of Informa PLC. We're part of a big team providing specialist research, media, events and training for businesses and professiona ...
…
continue reading
Move faster. Grow smarter. Explore how you make it happen with 5g, IoT, Edge, AI, and Cloud; and the role of the ecosystem. Join our Beyond Accelerators – dynamic interviews with leaders and innovators who are driving change in the B2B CSP landscape. Learn how, why, when and what’s next. Further. Faster. Beyond.
…
continue reading
Over The Edge is a podcast about edge computing and those in the industry who are creating the future of the internet. On the show we talk to corporate leaders, open-source experts, technologists, journalists, analysts, and the community at large, to discuss technological innovations, trends, practical applications, business models, and the occasional far-flung theory. Over the Edge is brought to you by the generous sponsorship of Dell Technologies.
…
continue reading
The future of insurance is a priority for everyone, especially for those within the insurance industry. How do you assess risk in the 21st century? How do you stay ahead of trends in order to ensure optimal coverage for our clients? Argo Group tackles these questions and many more in our new podcast series, The Future of Insurance. Subscribe now and tune in to hear about pertinent topics, such as how big data and IoT impact the insurance landscape.
…
continue reading
Darren Pulsipher, Chief Solution Architect for Public Sector at Intel, investigates effective change leveraging people, process, and technology. Which digital trends are a flash in the pan—and which will form the foundations of lasting change? With in-depth discussion and expert interviews, Embracing Digital Transformation finds the signal in the noise of the digital revolution. People Workers are at the heart of many of today’s biggest digital transformation projects. Learn how to transform ...
…
continue reading
Techrap is an enthusiastic podcast on technology advancements especially within the field of data, AI and new business models. Since I am also an entrepreneur I try to keep track on my thoughts with this podcast as well. Hope it is entertaining and that you get something out of it.
…
continue reading
Conversations with smart people exploring smart buildings technology, hosted by James Dice. www.nexuslabs.online
…
continue reading
The UPSTACK Podcast is an ever-evolving conversation on all things digital infrastructure, giving CTOs, CIOs, CISOs and other tech leaders "food for thought” as they push to stay ahead of the technology curve. Greg Moss, UPSTACK’s Partner and Managing Director, invites guests to talk candidly about the latest technology infrastructure topics. Co-hosted by SVP of Marketing, Alex Cole, this is sure to be a podcast worth listening to.
…
continue reading
Dinis Guarda Youtube Podcast Series - Powered by citiesabc and openbusinesscouncil is a fast growing Thought leadership channel focused on profiling global leading inspiring people, leaders, CEOs, authors, technologists, academics. We highlight the ideas, products, inventions, software, books & solutions to the multiple challenges / opportunities we face in our cities / nations with the advent of Society 5.0 digital transformation 4IR AI Blockchain Fintech IoT disruptive tech Dinis Guarda is ...
…
continue reading
Bringing you the latest news, views and experiences in Technology, Talent and Transformational change hosted by CTO, Author and leading Tech For Good advocate Prof. Sally Eaves @sallyeaves. With weekly episodes and an inspiring diversity of guests from some of the most pioneering organisations, projects and people of our time, this is Your engaging space to learn from C-Suite to Student, CIO to Academic and Enterprise to SME. Our shows focus on the latest innovations in emergent technology i ...
…
continue reading
Podcast by The IT Insider
…
continue reading

1
DigitalituM Podcast - At the Intersection of Manufacturing and Digital Transformation
DigitalituM - Digitalization tools for Manufacturing
Manufacturing has its challenges. Digital Transformation has its challenges. Welcome to the DigitalituM Podcast, where we delve into the intersection of manufacturing and digital transformation. Manufacturing, a cornerstone of our global economy, faces various challenges—from optimizing production processes to ensuring quality control and maintaining a skilled workforce. In parallel, the digital transformation journey presents its own set of hurdles. Integrating new technologies, managing da ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Strategy and Architecture, Leadership and Mentoring, Thought Leadership
…
continue reading
Welcome to the Sustainable Supply Chain podcast, hosted by Tom Raftery, a seasoned expert at the intersection of technology and sustainability. This podcast is an evolution of the Digital Supply Chain podcast, now with a laser-focused mission: exploring and promoting tech-led sustainability solutions in supply chains across the globe. Every Monday at 7 am CET, join us for insightful and organic conversations that blend professionalism with an informal, enjoyable tone. We don't script our epi ...
…
continue reading

1
Pwn2Own Ireland 2025: $1M WhatsApp Exploit Bounty Raises the Stakes
1:07:32
1:07:32
Play later
Play later
Lists
Like
Liked
1:07:32This October, Pwn2Own Ireland 2025 will take over Cork with one of the most ambitious cybersecurity competitions yet. Co-sponsored by Meta and organized by Trend Micro’s Zero Day Initiative (ZDI), the event is putting record-breaking payouts on the line — including up to $1 million for a zero-click WhatsApp exploit that can deliver remote code exec…
…
continue reading

1
Why Multi-Network SIM is a Game Changer for IoT | POND IoT's Alex Kotler | Internet of Things Podcast
18:58
18:58
Play later
Play later
Lists
Like
Liked
18:58In this episode of the IoT For All Podcast, Alex Kotler, SVP of Sales and Partnerships at POND IoT, joins Ryan Chacon to discuss multi-network SIMs and why they're a game-changer for IoT. The conversation covers multi-network SIM use cases in ATMs, vending machines, retail, and EV charging, the challenges companies face when transitioning from sing…
…
continue reading

1
What's the Story? Intel to spin off network biz
18:59
18:59
Play later
Play later
Lists
Like
Liked
18:59Light Reading's Iain Morris joins the podcast to unpack Intel's decision to spin off its network and edge assets business (dubbed NEX), what the implications are for equipment makers like Ericsson and what to expect next. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
🎧 #183: Agentic AI, Understanding Building Data, and Space Utilization Takeaways
38:34
38:34
Play later
Play later
Lists
Like
Liked
38:34Episode 183 is a conversation with James Dice and Brad Bonavida from Nexus Labs, as well as Devan Tracy from Lockheed Martin. In this episode of the Nexus Podcast, the Nexus Labs team breaks down the top stories relevant to energy managers, facility managers, IT/OT managers, and workplace managers. Find full show notes and episode transcript on The…
…
continue reading
While advertising is a fundamental part of business, the creator economy has become a fundamental part of advertising. Analyst Zach Ciampa joins host Eric Hanselman to explore the many facets of which it’s composed and look at the market impacts. Businesses are working to balance the mix of paid, earned and owned content that they’re putting to wor…
…
continue reading

1
Nvidia Triton Inference Server Vulnerabilities Expose AI Infrastructure to Attack
1:02:48
1:02:48
Play later
Play later
Lists
Like
Liked
1:02:48A major warning has hit the AI community: Nvidia’s Triton Inference Server — one of the most widely used open-source platforms for deploying and scaling AI models — has been found to contain critical vulnerabilities that could allow attackers to take complete remote control of affected systems. The discovery, made by cloud security firm Wiz, reveal…
…
continue reading

1
CISA & FEMA Release $100M in Cybersecurity Grants to Strengthen State, Local, and Tribal Defenses
43:50
43:50
Play later
Play later
Lists
Like
Liked
43:50The U.S. Department of Homeland Security, through CISA and FEMA, has announced over $100 million in new cybersecurity grant funding for Fiscal Year 2025 — a critical investment aimed at protecting America’s most vulnerable digital frontlines. The funding is split between the State and Local Cybersecurity Grant Program (SLCGP), allocating $91.7 mill…
…
continue reading

1
AI Jailbreaks on the Rise: How Hackers Are Extracting Training Data from LLMs
1:26:28
1:26:28
Play later
Play later
Lists
Like
Liked
1:26:28In this episode, we examine the rapidly growing threat of AI jailbreaks — a cybersecurity challenge reshaping the landscape of large language models (LLMs) and enterprise chatbots. According to the IBM 2025 Cost of a Data Breach Report, 13% of all data breaches now involve AI systems, with the vast majority stemming from jailbreak attacks that circ…
…
continue reading

1
350,000 Patient Records Exposed: Inside the Northwest Radiologists Data Breach
40:18
40:18
Play later
Play later
Lists
Like
Liked
40:18In this episode, we investigate the Northwest Radiologists data breach, a devastating cyberattack that compromised the personal and medical information of approximately 350,000 patients in Washington State between January 20 and January 25, 2025. What began as a so-called “network disruption” was later revealed to be a massive breach that exposed a…
…
continue reading

1
Procurement’s Evolution: Tactical Past, Strategic Present, Profitable Future
46:39
46:39
Play later
Play later
Lists
Like
Liked
46:39Send me a message Procurement’s role is changing, or at least, it should be. In this episode of the Sustainable Supply Chain podcast, I sat down with Conrad Snover, CEO of ProcureAbility, to unpack why procurement still struggles to evolve beyond a transactional role, and what it’ll take to transform it into a true driver of value. We covered a lot…
…
continue reading

1
Anthony Scaramucci - Founder & Managing Partner - SkyBridge
44:55
44:55
Play later
Play later
Lists
Like
Liked
44:55Anthony Scaramucci is an American financier, author, speaker and thought leader, and broadcaster who briefly served as the White House communications director. Anthony Scaramucci is the founder and managing partner of SkyBridge, a global alternative investment firm offering multi-strategy hedge fund products and advisory services for individuals an…
…
continue reading

1
Critical Honeywell Experion PKS Vulnerabilities Threaten Global Industrial Control Systems
1:16:35
1:16:35
Play later
Play later
Lists
Like
Liked
1:16:35In this episode, we analyze the multiple vulnerabilities recently disclosed in Honeywell’s Experion Process Knowledge System (PKS), a widely deployed industrial control and automation solution that underpins operations in energy, chemical plants, manufacturing, healthcare, and transportation sectors worldwide. Reported by CISA and Positive Technolo…
…
continue reading

1
Auto-Color Linux Malware Exploits SAP Zero-Day CVE-2025-31324
36:36
36:36
Play later
Play later
Lists
Like
Liked
36:36In this episode, we uncover the Auto-Color Linux malware, a stealthy and highly persistent Remote Access Trojan (RAT) that is rapidly emerging as one of the most dangerous threats of 2025. First identified by Palo Alto Networks’ Unit 42 and later analyzed by Darktrace, Auto-Color has now been linked to active exploitation of CVE-2025-31324, a criti…
…
continue reading

1
Inside the July 2025 PyPI Phishing Scam: How Hackers Stole Developer Credentials
54:17
54:17
Play later
Play later
Lists
Like
Liked
54:17In this episode, we investigate the growing cybersecurity storm targeting the Python Package Index (PyPI) — the backbone of Python’s software distribution ecosystem. A recent phishing campaign in July 2025 has developers on high alert, as attackers impersonated PyPI using a deceptive domain (pypj.org) to trick maintainers into handing over their cr…
…
continue reading

1
IoT Security Crisis: Dahua Smart Camera Vulnerabilities Expose Surveillance Systems
1:02:05
1:02:05
Play later
Play later
Lists
Like
Liked
1:02:05In this episode, we examine the alarming discovery of critical security vulnerabilities in Dahua smart cameras, one of the world’s most widely deployed surveillance systems. Researchers at Bitdefender uncovered two zero-click flaws — CVE-2025-31700 and CVE-2025-31701 — that allow unauthenticated remote attackers to gain root access to Dahua devices…
…
continue reading

1
Penny Power - Founder of Business is Personal - BIP100 Club
1:35:10
1:35:10
Play later
Play later
Lists
Like
Liked
1:35:10Penny Power is an entrepreneur, author, keynote speaker, and community builder with over 25 years of experience. Penny Power is the founder of Business is Personal, a platform dedicated to helping business owners thrive through authentic networking, emotional intelligence, and peer-powered growth. She is a co-founder of BIP100 Club, a private commu…
…
continue reading

1
Dropzone AI Secures $37M to Tackle Alert Fatigue with Autonomous SOC Analysts
17:11
17:11
Play later
Play later
Lists
Like
Liked
17:11In this episode, we dive into Dropzone AI’s landmark $37 million Series B funding round, bringing the company’s total raised to over $57 million. Backed by major investors, Dropzone AI is accelerating the development of its AI-powered SOC analysts — tools designed to autonomously investigate and resolve security alerts across critical threat catego…
…
continue reading

1
Axonius Buys Cynerio for $100M+: Closing Healthcare’s Biggest Cybersecurity Blind Spot
1:36:30
1:36:30
Play later
Play later
Lists
Like
Liked
1:36:30In this episode, we explore Axonius’s landmark acquisition of Cynerio, a healthcare cybersecurity company specializing in protecting vulnerable medical devices like MRI machines, infusion pumps, and ventilators. The deal — valued at over $100 million in cash and stock — marks Axonius’s first-ever acquisition and signals a major strategic expansion …
…
continue reading

1
Critical Lenovo Firmware Flaws Expose Millions to Persistent UEFI Attacks
42:00
42:00
Play later
Play later
Lists
Like
Liked
42:00In this episode, we examine a critical firmware security crisis shaking Lenovo devices worldwide. Security researchers at Binarly have uncovered six serious vulnerabilities in the Insyde BIOS firmware used in Lenovo’s IdeaCentre and Yoga product lines. Four of these flaws, rated high severity, reside in the System Management Mode (SMM) — a privileg…
…
continue reading

1
Promptfoo Secures $18.4M to Combat AI Security Threats in Generative AI
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50In this episode, we dive into Promptfoo’s groundbreaking $18.4 million Series A funding round, led by Insight Partners and supported by Andreessen Horowitz, bringing the AI security startup’s total funding to $23.4 million. Founded in 2024, Promptfoo has quickly emerged as a leader in securing Large Language Models (LLMs) and generative AI applicat…
…
continue reading
Bango's Giles Tongue joins the podcast to discuss the evolution of the bundle as subscription combinations extend well beyond streaming services to include fitness services, food boxes, music, gaming, social media and AI offerings. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
1.1 Million Private Messages Leaked: Inside the Tea App Privacy Disaster
23:58
23:58
Play later
Play later
Lists
Like
Liked
23:58A platform designed to protect women’s safety in dating has instead become a nightmare for its users. In this episode, we uncover the catastrophic Tea app data breach, which exposed more than 59 GB of highly sensitive user data due to a fundamental security failure: a completely public Firebase storage bucket with no authentication, no encryption, …
…
continue reading

1
Job Scams, Corporate Espionage, and Digital Deception: Inside the Deepfake Crisis
1:16:30
1:16:30
Play later
Play later
Lists
Like
Liked
1:16:30Deepfake technology has evolved from a fringe novelty into one of the most serious cybersecurity and national security threats of our time. In this episode, we examine how artificial intelligence–generated synthetic media is being weaponized to impersonate CEOs, manipulate elections, infiltrate corporate networks, and damage reputations worldwide. …
…
continue reading
In this captivating episode of "Embracing Digital Transformation," hosted by Dr. Darren Pulsipher, we dive deep into the world of IoT and its complexities with industry expert Lee. Lee, whose insights are deeply rooted in his dissertation on edge security, discusses the challenges faced in integrating IoT solutions in enterprise environments. Key t…
…
continue reading

1
Microsoft Exposes Major macOS Flaws in Transparency, Consent, and Control
1:23:13
1:23:13
Play later
Play later
Lists
Like
Liked
1:23:13In this episode, we dive deep into Microsoft Threat Intelligence’s latest findings on two critical macOS vulnerabilities that shook Apple’s privacy defenses. The flaws, identified as CVE-2025-31199 (Sploitlight) and CVE-2024-44133 (HM Surf), specifically targeted Apple’s Transparency, Consent, and Control (TCC) framework, the system designed to gua…
…
continue reading

1
Aeroflot in Chaos: How Hackers Crippled Russia’s Flagship Airline
24:25
24:25
Play later
Play later
Lists
Like
Liked
24:25On July 28, 2025, Aeroflot—Russia’s largest state-owned airline—was brought to its knees in one of the most severe cyberattacks since the country’s invasion of Ukraine in 2022. The sophisticated assault, carried out by Ukrainian hacktivist group Silent Crow and the Belarusian Cyber-Partisans, led to the cancellation of more than 100 flights, strand…
…
continue reading
Advertising is fundamental part of business and it’s one that has been buffeted by the impacts of technology in both the path to markets and the management of its delivery. Creating a brand reputation and influencing consumers is the core function and analyst Natalie Colakides and Ian Whittaker, managing director of Liberty Sky Advisors, join host …
…
continue reading

1
Neferpitou Claims Cyberattack on French Naval Defense Giant
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17French defense contractor Naval Group, a cornerstone of Europe’s naval defense industry, is facing a high-stakes cybersecurity crisis. A threat actor known as “Neferpitou” claims to have exfiltrated 1TB of sensitive data, including combat management system (CMS) source code for submarines and frigates, technical documents, developer virtual machine…
…
continue reading

1
Root Evidence Launches With $12.5M to Redefine Vulnerability Management
36:51
36:51
Play later
Play later
Lists
Like
Liked
36:51In July 2025, a team of seasoned cybersecurity leaders launched Root Evidence, a Boise-based startup with a mission to revolutionize how organizations tackle vulnerability management. Armed with $12.5 million in seed funding led by Ballistic Ventures, founders Jeremiah Grossman, Robert Hansen, Heather Konold, and Lex Arquette are setting out to fix…
…
continue reading

1
NASCAR Hit by Medusa Ransomware: 1TB of Data Stolen in April 2025 Cyberattack
41:21
41:21
Play later
Play later
Lists
Like
Liked
41:21In April 2025, NASCAR became the latest victim of a major cyberattack, with hackers infiltrating its network between March 31 and April 3. During the breach, personal information—including names and Social Security numbers—was exfiltrated from NASCAR’s systems. In response, the organization has notified affected individuals, activated its incident …
…
continue reading

1
DigitalituM Podcast Episode 19 - Holger Schlaps - Steve Forrest - The Future of Manufacturing with AI
1:03:01
1:03:01
Play later
Play later
Lists
Like
Liked
1:03:01Send us a text 🎙️ DigitalituM Podcast Episode At the Intersection of Manufacturing and Digital Transformation Topic: The Future of Manufacturing with AI Guests: 👤 Holger Schlaps, Head of R&D at SULZER GmbH 🔗 Connect with Holger on LinkedIn 👤 Steve Forrest, VP of Operations at AutoTool Inc. 🔗 Connect with Steve on LinkedIn 🎧 In this episode, host Ma…
…
continue reading

1
Scattered Spider Strikes Again: Inside the VMware ESXi Ransomware Tactics
55:59
55:59
Play later
Play later
Lists
Like
Liked
55:59In this episode, we examine the sophisticated operations of Scattered Spider—also known as Muddled Libra, UNC3944, and Octo Tempest—a financially motivated cybercriminal group that has redefined the ransomware threat landscape. Recently highlighted by Google’s Threat Intelligence Group (GTIG), Scattered Spider has escalated its attacks by targeting…
…
continue reading

1
From Data to Action: Embedding Climate Risk into Supply Chain Strategy
38:38
38:38
Play later
Play later
Lists
Like
Liked
38:38Send me a message In this episode of the Sustainable Supply Chain podcast, I sat down with Ollie Carpenter, Director of Environmental Risk Analytics at Risilience, to unpack how global businesses are moving from climate ambition to action, through risk-informed decision making. Ollie and his team work with companies like Nestlé, Burberry, and Maers…
…
continue reading

1
Koske Malware Hides in Panda Images, Weaponizes AI to Target Linux
44:03
44:03
Play later
Play later
Lists
Like
Liked
44:03A new and highly sophisticated malware strain named Koske is redefining the threat landscape for Linux environments. Suspected to be partially developed using artificial intelligence, Koske introduces novel and highly evasive techniques, blending image files, rootkits, and adaptive cryptomining logic to create a stealthy and persistent backdoor int…
…
continue reading

1
Operation Checkmate: BlackSuit Ransomware’s Dark Web Sites Seized
39:19
39:19
Play later
Play later
Lists
Like
Liked
39:19BlackSuit, the ransomware strain known for crippling critical sectors and demanding multi-million dollar payouts, has just suffered a devastating blow. In a coordinated international law enforcement operation codenamed "Operation Checkmate," authorities—including the U.S. Department of Justice, Homeland Security Investigations, FBI, Europol, the UK…
…
continue reading

1
Coyote Malware Exploits Microsoft UI Automation in First-Ever Wild Attack
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14A new banking trojan called Coyote has emerged as a groundbreaking cyber threat, becoming the first known malware in the wild to exploit Microsoft’s User Interface Automation (UIA) framework—an accessibility tool originally designed to help users interact with Windows interfaces. But in the hands of attackers, UIA becomes a weapon of stealth and pr…
…
continue reading

1
Giving data centers their due (diligence) on space, power and cooling
28:05
28:05
Play later
Play later
Lists
Like
Liked
28:05Misty Duckworth and Randy Kinsey join the podcast to explain how BSP's technical due diligence business is rapidly shifting to the data center market and how the rise of AI is driving demand for space, power and cooling in existing and new data center facilities. Hosted on Acast. See acast.com/privacy for more information.…
…
continue reading

1
No Fix Coming: Remote Code Execution Flaw in 1,300 LG Security Cameras
31:12
31:12
Play later
Play later
Lists
Like
Liked
31:12A newly disclosed critical vulnerability, CVE-2025-7742, is putting hundreds of LG Innotek LNV5110R security cameras at risk around the world—including within critical infrastructure. This high-severity authentication bypass flaw allows remote attackers to gain full administrative control without credentials, giving them access to live camera feeds…
…
continue reading

1
ToolShell Exploited: China-Linked Hackers Breach NNSA and U.S. Government Networks
1:14:36
1:14:36
Play later
Play later
Lists
Like
Liked
1:14:36In one of the most concerning state-sponsored cyber incidents of the year, Chinese hackers exploited zero-day vulnerabilities in Microsoft SharePoint to breach the networks of the National Nuclear Security Administration (NNSA)—the U.S. agency responsible for managing the nation's nuclear arsenal. The attackers, part of a suspected Chinese state-sp…
…
continue reading

1
Massive NPM Breach: Malicious Packages Spread via Compromised Maintainer Accounts
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44In this episode, we expose the alarming supply chain attack that compromised millions of JavaScript projects across the globe. This sophisticated breach targeted the NPM ecosystem, infecting widely-used packages like eslint-config-prettier and is, through a coordinated phishing campaign and the exploitation of non-expiring legacy access tokens. Att…
…
continue reading

1
Clorox Sues Cognizant Over $356M Cyberattack: Who's Really to Blame?
44:38
44:38
Play later
Play later
Lists
Like
Liked
44:38In one of the most dramatic cybersecurity legal battles of the past year, Clorox has filed a lawsuit against IT services giant Cognizant, accusing the company of gross negligence that allegedly enabled a catastrophic 2023 cyberattack. The breach wreaked havoc on Clorox's operations—causing widespread product shortages, a multibillion-dollar hit to …
…
continue reading

1
HeroDevs Secures $125M to Extend Life of Critical Open Source Software
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36In this episode, we dive deep into HeroDevs' recent $125 million strategic growth investment, a move that signals a major expansion in the fight against the vulnerabilities of end-of-life (EOL) open source software. Based in Salt Lake City, HeroDevs has carved out a critical niche—providing "Never-Ending Support" (NES) to ensure security, complianc…
…
continue reading

1
Keeping trains on track: How AXO Track prevents railway delays with IoT sensors - We talk IoT #70
28:12
28:12
Play later
Play later
Lists
Like
Liked
28:12In this episode, we explore the critical intersection of IoT technology and railway infrastructure with Oliver von Sperber, Managing Director at AXO Track, a German startup transforming railway switch maintenance. Twenty per cent of train delays stem from switch malfunctions, costing operators millions and frustrating passengers worldwide. Oliver a…
…
continue reading

1
Computing in the Cosmos: Sophia Space's Mission to Move Data Centers Into Orbit
22:04
22:04
Play later
Play later
Lists
Like
Liked
22:04In this episode of Over the Air, Ryan Prosser talks with Sophia Space CEO Rob DeMillo about moving computing infrastructure beyond Earth's atmosphere, the unique challenges of orbital data centers, and why the next frontier of space exploration might be driven more by commerce than curiosity. Editor’s Note: Rob meant to say 4 Kelvin, not “4 km,” wh…
…
continue reading

1
UK Moves to Ban Ransomware Payments for Public Sector and Critical Infrastructure
48:22
48:22
Play later
Play later
Lists
Like
Liked
48:22In a landmark move to disrupt the financial engine powering ransomware attacks, the United Kingdom is pushing forward with legislation that would ban ransom payments across the public sector and critical national infrastructure (CNI). This sweeping proposal covers everything from local councils and schools to healthcare providers like the NHS, aimi…
…
continue reading

1
New SysAid Vulnerabilities Added to CISA’s KEV List: XXE Flaws Could Enable RCE
26:10
26:10
Play later
Play later
Lists
Like
Liked
26:10Two newly added vulnerabilities in SysAid’s On-Prem IT support software — CVE-2025-2775 and CVE-2025-2776 — have officially joined the Cybersecurity and Infrastructure Security Agency (CISA)’s Known Exploited Vulnerabilities (KEV) catalog, signaling increased concern around their potential abuse. While there are no confirmed reports of public explo…
…
continue reading

1
Lumma Stealer Returns: Malware-as-a-Service Resurges After Global Takedown
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16In this episode, we unpack the rapid and concerning resurgence of Lumma Stealer, a sophisticated Malware-as-a-Service (MaaS) platform, just months after a major international takedown. Despite Microsoft, the FBI, Europol, and global partners dismantling over 2,500 malicious domains and seizing critical infrastructure in May 2025, Lumma Stealer has …
…
continue reading

1
Cisco ISE Critical Flaws Now Actively Exploited: No Workarounds, Just Root Access
37:32
37:32
Play later
Play later
Lists
Like
Liked
37:32Hackers are actively exploiting a trio of critical zero-day vulnerabilities in Cisco’s Identity Services Engine (ISE) and Passive Identity Connector (ISE-PIC), prompting urgent patching directives from the company. The flaws — CVE-2025-20281, CVE-2025-20282, and CVE-2025-20337 — each carry a maximum CVSS severity score of 10.0, indicating the highe…
…
continue reading