Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Iot Vulnerabilities Podcasts

show episodes
 
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, executives, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
  continue reading
 
“Intelligence at the Deep Edge” is a podcast exploring the fascinating intersection of embedded systems and artificial intelligence. Dive into the world of cutting-edge technology as we discuss how AI is revolutionizing edge devices, enabling smarter sensors, efficient machine learning models, and real-time decision-making at the edge. Discover more on Embedded AI (https://medium.com/embedded-ai) — our companion publication where we detail the ideas, projects, and breakthroughs featured on t ...
  continue reading
 
Artwork

1
Emerging Cyber Risk

Max Aulakh & Joel Yonts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
  continue reading
 
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep ​network visibility to not only protect against sophisticated cyber- ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
  continue reading
 
Artwork

1
Salted Hash

Salted Hash

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security writer Steve Ragan talks with experts about the latest in cybersecurity, ransomware, malware, hacking and more. Stay informed, minimize risk and protect your organization. Catch new episodes weekly. 284975
  continue reading
 
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
  continue reading
 
Loading …
show series
 
Send us a text In this episode, we explore how insecure Internet of Things (IoT) devices and AI-powered bots are colliding to create one of the fastest-growing cybersecurity threats in the world. With millions of low-cost devices shipped every year (many running default passwords, outdated firmware, or no update mechanism at all) the global IoT eco…
  continue reading
 
Send us a text This episode explores a research program that borrows ideas from computational psychiatry to improve the reliability of advanced AI systems. Instead of thinking about AI failures in abstract terms, the approach treats recurring alignment problems as if they were “clinical syndromes.” Deceptive behaviour, overconfidence, or incoherent…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analysts Alex and Hayden as they discuss: Scattered Lapsus$ Hunters Targeting Zendesk (1:14) Microsoft Teams Guest Access Phishing Bypass (3:37) Dark AI Tools Enhancing Threat Actors (6:08) Silver Fox’s Campaign: Chinese APT Spotlight (10:05) John Dilgen: Cyber Threat…
  continue reading
 
Send us a text This episode examines the growing evidence that ChatGPT will soon include advertising, driven by leaked internal references and OpenAI’s financial ambition to generate $25 billion in ad-based revenue within four years. With more than 800 million weekly users, ChatGPT offers a scale and level of conversational closeness unmatched by a…
  continue reading
 
Send us a text In this episode, we explore one of the most important architectural shifts happening in AI: the move from massive cloud-based models to small, Always-On “Cognitive Cores” running locally on personal devices. These compact models—usually just one to four billion parameters—are not designed to know everything; instead, they’re engineer…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Do you really need predictions to tackle cyber threats? Join host Kim along with intelligence analyst John & special guest CISO Rafal Baran as they discuss: New NPM Supply Chain Threat (1:13) China Manipulates AI for Initial Access (4:46) Cloud Gaps Bring IoT Takeover (7:29) 2026 Cyber-Threat Predic…
  continue reading
 
Send us a text In this episode, we break down what Quantum Neural Networks (QNNs) actually are and why they might eventually reshape the future of AI. QNNs combine quantum mechanics with classical neural architectures, replacing traditional neurons with qubits that can exist in multiple states at once. This gives them an extraordinary representatio…
  continue reading
 
Greg Garcia, Executive Director of the Health Sector Coordinating Council Cybersecurity Working Group, joins the Nexus Podcast to discuss the recent publication of the working group’s Sector Mapping and Risk Toolkit. The SMART toolkit is a methodology that helps healthcare providers visualize key services that support workflows in the industry and …
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim, intelligence analyst John, and threat hunter Tristan as they discuss: Fortinet Flaw Enables Admin Takeover Akira Ransomware Targets Nutanix VMs Smart Redirects Evade Phishing Detection Threat Hunter Hacks: SEO Hits Hard Listen on @Listennotes: https://lnns.co/mgbyVjXv7p6 Kim Bromley: …
  continue reading
 
Send us a text In this episode, we confront one of the most profound questions in the future of AI: What happens if our machines become conscious and capable of suffering? The discussion begins by looking at the scientific and philosophical challenge of artificial consciousness itself. Because we have no reliable way to detect or measure subjective…
  continue reading
 
O'Reilly coauthor of Evidence-Based Security and longtime healthcare CISO Christopher Frenz joins the Nexus podcast to describe his organization's approach to cybersecurity that is rooted in transforming security from an artform to a science. Frenz discusses how this process through how he tests the efficacy of controls in his environment, and how …
  continue reading
 
Send us a text In this episode, we talk about the Sorites Paradox: the ancient puzzle about vague boundaries (“When does a pile of sand stop being a heap?”). We then explore why it matters more than ever for modern executives using AI. The paradox reveals a fundamental truth: some concepts have no clear dividing line, yet AI systems force artificia…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Wondering why Gootloader is suddenly back in action? Join host Kim along with intelligence analyst Hayden & Systems Security Engineer Corey as they discuss: Gootloader Returns Using SEO Poisoning (1:27) New Android Spyware LANDFALL (6:33) Curly COMrades Hide in Windows Using Linux VMs (10:57) Sector…
  continue reading
 
Send us a text In this episode, we imagine a near future where every person is accompanied by a constant, all-knowing Artificial General Intelligence — a presence woven into daily life through wearables, ambient devices, and eventually neural interfaces. These systems promise effortless convenience: instant recall, continuous advice, and emotional …
  continue reading
 
Send us a text “The AI Paradox: How Machines Expand Creativity and Flatten Culture” In this episode, we explore what researchers are calling the AI Paradox, the strange duality where generative AI boosts individual creativity while simultaneously making culture more uniform. On one hand, these tools empower anyone to create music, stories, art, and…
  continue reading
 
Send us a text In this episode, we explore how artificial intelligence is reshaping the global economy, not in the distant future, but right now. Experts disagree on the scale of impact: optimistic forecasts predict multi-trillion-dollar productivity gains, while more cautious economists argue that near-term benefits will be confined to automating …
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Did you know 99% of cloud identities are over-privileged, creating the perfect storm for attackers to seamlessly infiltrate your environment? Join host Kim along with intelligence analysts John & Alex as they discuss: Chinese Nation-State Campaigns and Geopolitics (1:12) Malicious NPM Packages (7:20…
  continue reading
 
Send us a text In this episode, we explore a revolutionary idea in AI research; that today’s systems are too cortical, focused on reasoning and language, and missing the deeper why of intelligence. Drawing inspiration from the brain’s ancient subcortical structures, new models such as Limbic-Augmented AI (LAAI), SUBNET, and Homeostatic Affective Re…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Picture this: You close a $50M acquisition on Friday and by Monday, attackers are in your network. Sound far-fetched? It's not. Join host Kim along with intelligence analyst John & Threat Hunter Leo as they discuss: Attackers Exploit WSUS Flaw (1:15) Qilin Deploys Cross-Platform Attacks (4:21) Lazar…
  continue reading
 
Send us a text Across species, evolution “pre-installs” compact neural programs that deliver immediate, reliable behaviors (standing, pecking, web-building) with minimal learning. These behaviors arise from embodied control circuits (reflexes, central pattern generators, innate releasing mechanisms) tuned by morphology and neuromodulators, then ref…
  continue reading
 
Send us a text In this episode, we explore the shift from traditional web browsing to AI-powered conversational search. What does this mean for truth, transparency, and the way we think. As chatbots become the new gateway to information, content creators face economic disruption: “zero-click” answers threaten ad revenue, pushing the world from SEO …
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Wondering what makes ransomware operations successful? Join host Kim along with intelligence analyst John & former FBI Special Agent Keith Mularski as they discuss: Year-Long F5 Breach (2:42) North Korean Attacker Adopts EtherHiding (7:53) Phishing Attacks Target LastPass (12:11) Fighting Ransomware…
  continue reading
 
Send us a text This episode dives into one of the most debated questions in AI today: Are large language models actually reasoning, or are they just incredibly sophisticated parrots? Our discussion traces two schools of thought. On one side, new ideas like grokking and adaptive reward systems suggest that AI may soon cross the threshold into true p…
  continue reading
 
Send us a text In a world where AI can write code in seconds, what is the true role of a human engineer? Welcome to Embedded AI, the podcast that explores what is required to build robust, secure, and scalable software with artificial intelligence. Discover why up to 45% of AI code contains security vulnerabilities and why a mandatory, human-led au…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk How long could Flax Typhoon nestle silently in your networks? Join host Kim along with intelligence analysts John & Joey as they discuss: Velociraptor Abused in Ransomware Attacks (1:13) New Oracle E-business Suite Flaw (5:19) GitHub CamoLeak AI Attack (7:46) Year-Long Flax Typhoon ArcGIS Campaign (…
  continue reading
 
Send us a text In this episode, we explore why today’s AI agents, despite huge advances, still fall short of true, unsupervised autonomy. We break down the findings from two key studies that map out both the architectural and operational barriers to fully independent systems. First, we describe the four levels of agent autonomy, showing why most cu…
  continue reading
 
Send us a text In a move that's sending shockwaves through the maker community, Qualcomm has officially acquired Arduino. In this episode, we look at one of the biggest tech stories of October 2025. First, we explore the "why" behind this deal. While Arduino democratized electronics, its core technology was falling behind modern 32-bit competitors.…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst John and Threat Detection Engineer Marken as they discuss: Clop's Exploitation of Oracle E-Business Suite (1:09) Scattered Lapsus$ Hunters Return With Salesforce Leaks (5:27) Shutdown Threatens US Intel Sharing and Cyber Defense (10:02) Ransomware and Cy…
  continue reading
 
Send us a text In this episode, we ask: Is the rise of Artificial Intelligence as pivotal as the invention of electricity or the internet? We look at this history-shifting moment by tracing AI's evolution from the first "perceptron" in the 1950s, through the infamous "AI Winter," to today's deep learning revolution. We then peek under the hood of t…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Joey along with intelligence analysts Alex and Hayden as they discuss: Brickstorm Backdoor in U.S. Legal and Tech Sectors (1:17) Storm-1849 Targeting Cisco ASA Devices (4:38) Medusa Attempts to Pay Reporter for Initial Access (7:00) Debate Over Government Zero-Day Stockpiling (14:41) Josep…
  continue reading
 
Retired four-star U.S. Navy Admiral Michael S. Rogers joins the Nexus Podcast for a wide-ranging discussion on deterrence in cyberspace and an examination of adversarial tactics and strategies. Adm. Rogers explains that deterrence relies on having the will to employ tactics that will reshape the choices adversaries are making in the targeting of U.…
  continue reading
 
Send us a text In this episode, we explore why autonomous AI agents are being called the next frontier for business. We're moving beyond isolated AI projects and into the era of the "agentic enterprise," where intelligent, autonomous agents are woven directly into the fabric of daily operations. But what exactly is an AI agent? We break down their …
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts John and Joey as they discuss: Summer 2025 Attacker Trends (13:41) Self-Replicating 'Shai-hulud' Worm Targeting NPM Packages (1:05) Fortra Critical Patch for GoAnywhere MFT Vulnerability (3:49) Phishing Round Up: File Fix Campaign and Microsoft's Raccoo…
  continue reading
 
Send us a text In this episode, we dive into one of the biggest challenges in AI today, bias in large language models. The research shows that these models don’t represent all of humanity; instead, they overwhelmingly reflect the values and psychology of Western, Educated, Industrialized, Rich, and Democratic, or “WEIRD”, societies. One source fram…
  continue reading
 
Send us a text In this episode, we investigate the growing conversation around deterministic large language models (LLMs), models designed to always return the same output for the same input. We contrast this with the more common stochastic LLMs that rely on random sampling and parallel computation, making their outputs variable even with identical…
  continue reading
 
Send us a text In this episode, we explore the emerging reality of a "generative AI plateau." For years, the path to better AI has been a simple one: bigger models, more data, and more compute. But now, that brute-force approach is showing diminishing returns. We'll discuss why the industry is hitting this wall, what new strategies are emerging to …
  continue reading
 
Send us a text In today's episode, we're tackling one of the biggest questions facing modern businesses: What's the best way to introduce AI tools to your organization? Is it a top-down corporate mandate, or a bottom-up, grassroots movement? We'll explore the pros and cons of both, and reveal what the data shows is the most effective approach. The …
  continue reading
 
Bob Maley, Chief Security Officer at Black Kite and former CISO for the Commonwealth of Pennsylvania, joins the Nexus Podcast to discuss how critical infrastructure operators and state and local governments are meeting cybersecurity resourcing challenges. Whether it's budgets, workforce shortages, or technical debt, security leaders are facing vola…
  continue reading
 
Send us a text Exploring what it means for a system to converse like a human but forget like a goldfish. Today, we're diving into a topic that's both a technical puzzle and a philosophical mystery: the statelessness of large language models, or LLMs. Think about the last conversation you had with an AI. It felt real, didn't it? It seemed to underst…
  continue reading
 
Send us a text In this episode, we dive into the profound ways artificial intelligence (AI) is reshaping democracy and the global economy. The discussion looks at how AI-driven misinformation, digital authoritarianism, and the growing dominance of tech giants are eroding public trust and threatening the integrity of elections. On the economic front…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Thinking about whether you need more AI in SecOps? Join host Kim along with intelligence analyst Joey & systems security engineer Corey as they discuss: SAP S/4HANA Flaw Exploitation (2:09) AI-Powered Malware Exposes GitHub (4:24) APT28 Outlook Backdoor hits NATO (8:21) ReliaQuest Experts Answer You…
  continue reading
 
Send us a text In this episode, we explore the idea that Artificial Intelligence marks one of the great turning points in human history, on par with the Agricultural, Printing, and Industrial Revolutions. By looking back at how past revolutions reorganized labor, democratized resources, and reshaped societies, we frame AI as the next major epoch—on…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Need the latest information on Salesloft Drift? Join host Kim along with intelligence analyst John & detection engineer Marken as they discuss: Salesloft Drift Tokens Result in Salesforce Data Theft (1:31) Storm-0501 Shifts Ransomware Attacks to Cloud (6:36) APT29 Microsoft 365 Campaign Disrupted (1…
  continue reading
 
Send us a text In this episode, we explore the fascinating new trend of vibe coding, where Large Language Models transform natural language into a programming interface. We trace the history of programming languages and natural language processing to show how this approach represents the next big leap in software abstraction. Alongside the exciteme…
  continue reading
 
Pankaj Goyal, Chief Operating Officer at Safe Security, joins the Nexus Podcast to discuss the challenges cyber insurance carriers and brokers have in determing and providing coverage for asset heavy operational technology (OT) and cyber-physical systems (CPS) environments. Underwriters have prolific amounts of historical data and experience in cal…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Curious about the skills needed for modern cyber attacks? Join host Kim along with intelligence analysts John & Hayden as they discuss: Apple Patches Exploited Zero-Day (1:40) Hackers Abuse Linux Files to Drop Malware (3:50) Silk Typhoon Attacks Cloud Supply Chains (7:21) ReliaQuest Uncovers Cybercr…
  continue reading
 
Send us a text In this episode, we investigate Embodied Intelligence—the argument that true artificial intelligence can’t exist in isolation from the physical world. Unlike today’s Large Language Models, which lack grounded understanding and causal reasoning, embodied AI seeks to merge perception, action, and reasoning through direct interaction wi…
  continue reading
 
Rui Ataide, Managing Security Consultant at GuidePoint Security, joins the Nexus Podcast to discuss his experiences negotiating with ransomware gangs on behalf of victimized organizations. Ataide covers the nuances, processes, and methodology of negotiating with groups. He also explains how extortion and data theft has changed the risk management c…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play