Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders responsible for the security and protection of cyber-physical systems. Guests include cybersecurity researchers, executives, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
…
continue reading
Iot Vulnerabilities Podcasts
“Intelligence at the Deep Edge” is a podcast exploring the fascinating intersection of embedded systems and artificial intelligence. Dive into the world of cutting-edge technology as we discuss how AI is revolutionizing edge devices, enabling smarter sensors, efficient machine learning models, and real-time decision-making at the edge. Discover more on Embedded AI (https://medium.com/embedded-ai) — our companion publication where we detail the ideas, projects, and breakthroughs featured on t ...
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
We Cover the Cyberspace.
…
continue reading
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep network visibility to not only protect against sophisticated cyber- ...
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
…
continue reading
Security writer Steve Ragan talks with experts about the latest in cybersecurity, ransomware, malware, hacking and more. Stay informed, minimize risk and protect your organization. Catch new episodes weekly. 284975
…
continue reading
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
1
The Convergence of IoT Vulnerabilities and AI Bots
15:19
15:19
Play later
Play later
Lists
Like
Liked
15:19Send us a text In this episode, we explore how insecure Internet of Things (IoT) devices and AI-powered bots are colliding to create one of the fastest-growing cybersecurity threats in the world. With millions of low-cost devices shipped every year (many running default passwords, outdated firmware, or no update mechanism at all) the global IoT eco…
…
continue reading
1
Can Mental Illness Research Improve AI Alignment?
12:51
12:51
Play later
Play later
Lists
Like
Liked
12:51Send us a text This episode explores a research program that borrows ideas from computational psychiatry to improve the reliability of advanced AI systems. Instead of thinking about AI failures in abstract terms, the approach treats recurring alignment problems as if they were “clinical syndromes.” Deceptive behaviour, overconfidence, or incoherent…
…
continue reading
1
Scattered Lapsus$ Hunters, SilverFox's ValleyRat Campaign, and More
25:01
25:01
Play later
Play later
Lists
Like
Liked
25:01Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analysts Alex and Hayden as they discuss: Scattered Lapsus$ Hunters Targeting Zendesk (1:14) Microsoft Teams Guest Access Phishing Bypass (3:37) Dark AI Tools Enhancing Threat Actors (6:08) Silver Fox’s Campaign: Chinese APT Spotlight (10:05) John Dilgen: Cyber Threat…
…
continue reading
1
Why Rumours of intent driven advertising for ChatGPT is a Problem
14:41
14:41
Play later
Play later
Lists
Like
Liked
14:41Send us a text This episode examines the growing evidence that ChatGPT will soon include advertising, driven by leaked internal references and OpenAI’s financial ambition to generate $25 billion in ad-based revenue within four years. With more than 800 million weekly users, ChatGPT offers a scale and level of conversational closeness unmatched by a…
…
continue reading
1
The Death of the Oracle and the Birth of the Core
14:08
14:08
Play later
Play later
Lists
Like
Liked
14:08Send us a text In this episode, we explore one of the most important architectural shifts happening in AI: the move from massive cloud-based models to small, Always-On “Cognitive Cores” running locally on personal devices. These compact models—usually just one to four billion parameters—are not designed to know everything; instead, they’re engineer…
…
continue reading
1
Are Cyber Predictions Worth It? Plus Chinese AI Attacks, IoT Takeovers
27:53
27:53
Play later
Play later
Lists
Like
Liked
27:53Resources: https://linktr.ee/ReliaQuestShadowTalk Do you really need predictions to tackle cyber threats? Join host Kim along with intelligence analyst John & special guest CISO Rafal Baran as they discuss: New NPM Supply Chain Threat (1:13) China Manipulates AI for Initial Access (4:46) Cloud Gaps Bring IoT Takeover (7:29) 2026 Cyber-Threat Predic…
…
continue reading
1
Quantum Neural Networks: Theoretical Heaven, Practical Hell
15:47
15:47
Play later
Play later
Lists
Like
Liked
15:47Send us a text In this episode, we break down what Quantum Neural Networks (QNNs) actually are and why they might eventually reshape the future of AI. QNNs combine quantum mechanics with classical neural architectures, replacing traditional neurons with qubits that can exist in multiple states at once. This gives them an extraordinary representatio…
…
continue reading
1
Greg Garcia on the Sector Mapping and Risk Toolkit for Healthcare
36:56
36:56
Play later
Play later
Lists
Like
Liked
36:56Greg Garcia, Executive Director of the Health Sector Coordinating Council Cybersecurity Working Group, joins the Nexus Podcast to discuss the recent publication of the working group’s Sector Mapping and Risk Toolkit. The SMART toolkit is a methodology that helps healthcare providers visualize key services that support workflows in the industry and …
…
continue reading
1
Fortinet Flaw Exposed and Exploited! Plus, Threat Hunter Hacks: SEO Hits Hard
29:35
29:35
Play later
Play later
Lists
Like
Liked
29:35Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim, intelligence analyst John, and threat hunter Tristan as they discuss: Fortinet Flaw Enables Admin Takeover Akira Ransomware Targets Nutanix VMs Smart Redirects Evade Phishing Detection Threat Hunter Hacks: SEO Hits Hard Listen on @Listennotes: https://lnns.co/mgbyVjXv7p6 Kim Bromley: …
…
continue reading
1
Does Artificial Consciousness require Synthetic Suffering?
12:26
12:26
Play later
Play later
Lists
Like
Liked
12:26Send us a text In this episode, we confront one of the most profound questions in the future of AI: What happens if our machines become conscious and capable of suffering? The discussion begins by looking at the scientific and philosophical challenge of artificial consciousness itself. Because we have no reliable way to detect or measure subjective…
…
continue reading
1
Christopher Frenz on Evidence-Based Security
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30O'Reilly coauthor of Evidence-Based Security and longtime healthcare CISO Christopher Frenz joins the Nexus podcast to describe his organization's approach to cybersecurity that is rooted in transforming security from an artform to a science. Frenz discusses how this process through how he tests the efficacy of controls in his environment, and how …
…
continue reading
1
The Sorites Paradox and AI Decision Making
13:46
13:46
Play later
Play later
Lists
Like
Liked
13:46Send us a text In this episode, we talk about the Sorites Paradox: the ancient puzzle about vague boundaries (“When does a pile of sand stop being a heap?”). We then explore why it matters more than ever for modern executives using AI. The paradox reveals a fundamental truth: some concepts have no clear dividing line, yet AI systems force artificia…
…
continue reading
1
Gootloader's Return, LANDFALL Android Spyware, Sector-by-Sector Cyber Trends
34:17
34:17
Play later
Play later
Lists
Like
Liked
34:17Resources: https://linktr.ee/ReliaQuestShadowTalk Wondering why Gootloader is suddenly back in action? Join host Kim along with intelligence analyst Hayden & Systems Security Engineer Corey as they discuss: Gootloader Returns Using SEO Poisoning (1:27) New Android Spyware LANDFALL (6:33) Curly COMrades Hide in Windows Using Linux VMs (10:57) Sector…
…
continue reading
1
Cognitive Collapse: Outsourcing the Neocortex
15:48
15:48
Play later
Play later
Lists
Like
Liked
15:48Send us a text In this episode, we imagine a near future where every person is accompanied by a constant, all-knowing Artificial General Intelligence — a presence woven into daily life through wearables, ambient devices, and eventually neural interfaces. These systems promise effortless convenience: instant recall, continuous advice, and emotional …
…
continue reading
1
The AI Paradox: Homogenization, Blandness, and Model Collapse
14:14
14:14
Play later
Play later
Lists
Like
Liked
14:14Send us a text “The AI Paradox: How Machines Expand Creativity and Flatten Culture” In this episode, we explore what researchers are calling the AI Paradox, the strange duality where generative AI boosts individual creativity while simultaneously making culture more uniform. On one hand, these tools empower anyone to create music, stories, art, and…
…
continue reading
1
The AI Economy: Disruption, Inequality, and Economic Restructuring
15:56
15:56
Play later
Play later
Lists
Like
Liked
15:56Send us a text In this episode, we explore how artificial intelligence is reshaping the global economy, not in the distant future, but right now. Experts disagree on the scale of impact: optimistic forecasts predict multi-trillion-dollar productivity gains, while more cautious economists argue that near-term benefits will be confined to automating …
…
continue reading
1
Why Cloud Threats Are Escalating: Identity Risks, Automation Flaws, and Legacy Vulnerabilities, Plus the Latest on Chinese APT Campaigns and NPM Package Abuse
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18Resources: https://linktr.ee/ReliaQuestShadowTalk Did you know 99% of cloud identities are over-privileged, creating the perfect storm for attackers to seamlessly infiltrate your environment? Join host Kim along with intelligence analysts John & Alex as they discuss: Chinese Nation-State Campaigns and Geopolitics (1:12) Malicious NPM Packages (7:20…
…
continue reading
Send us a text In this episode, we explore a revolutionary idea in AI research; that today’s systems are too cortical, focused on reasoning and language, and missing the deeper why of intelligence. Drawing inspiration from the brain’s ancient subcortical structures, new models such as Limbic-Augmented AI (LAAI), SUBNET, and Homeostatic Affective Re…
…
continue reading
1
Why Cyber Threats Surge 20% During M&A, Plus the Latest on Qilin and Lazarus Group Campaigns
31:05
31:05
Play later
Play later
Lists
Like
Liked
31:05Resources: https://linktr.ee/ReliaQuestShadowTalk Picture this: You close a $50M acquisition on Friday and by Monday, attackers are in your network. Sound far-fetched? It's not. Join host Kim along with intelligence analyst John & Threat Hunter Leo as they discuss: Attackers Exploit WSUS Flaw (1:15) Qilin Deploys Cross-Platform Attacks (4:21) Lazar…
…
continue reading
Send us a text Across species, evolution “pre-installs” compact neural programs that deliver immediate, reliable behaviors (standing, pecking, web-building) with minimal learning. These behaviors arise from embodied control circuits (reflexes, central pattern generators, innate releasing mechanisms) tuned by morphology and neuromodulators, then ref…
…
continue reading
Send us a text In this episode, we explore the shift from traditional web browsing to AI-powered conversational search. What does this mean for truth, transparency, and the way we think. As chatbots become the new gateway to information, content creators face economic disruption: “zero-click” answers threaten ad revenue, pushing the world from SEO …
…
continue reading
1
Automate to Defend: A Former FBI Agent's Ransomware Guide for CISOs
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08Resources: https://linktr.ee/ReliaQuestShadowTalk Wondering what makes ransomware operations successful? Join host Kim along with intelligence analyst John & former FBI Special Agent Keith Mularski as they discuss: Year-Long F5 Breach (2:42) North Korean Attacker Adopts EtherHiding (7:53) Phishing Attacks Target LastPass (12:11) Fighting Ransomware…
…
continue reading
1
Grokking: Can AI Solve New Problems or is it all Memorization?
16:35
16:35
Play later
Play later
Lists
Like
Liked
16:35Send us a text This episode dives into one of the most debated questions in AI today: Are large language models actually reasoning, or are they just incredibly sophisticated parrots? Our discussion traces two schools of thought. On one side, new ideas like grokking and adaptive reward systems suggest that AI may soon cross the threshold into true p…
…
continue reading
1
DevEx Machina: Coding with AI and fixing the 45% Problem
16:25
16:25
Play later
Play later
Lists
Like
Liked
16:25Send us a text In a world where AI can write code in seconds, what is the true role of a human engineer? Welcome to Embedded AI, the podcast that explores what is required to build robust, secure, and scalable software with artificial intelligence. Discover why up to 45% of AI code contains security vulnerabilities and why a mandatory, human-led au…
…
continue reading
1
Is Your Software a Secret Backdoor? Flax Typhoon's Latest Campaign Unwrapped
22:21
22:21
Play later
Play later
Lists
Like
Liked
22:21Resources: https://linktr.ee/ReliaQuestShadowTalk How long could Flax Typhoon nestle silently in your networks? Join host Kim along with intelligence analysts John & Joey as they discuss: Velociraptor Abused in Ransomware Attacks (1:13) New Oracle E-business Suite Flaw (5:19) GitHub CamoLeak AI Attack (7:46) Year-Long Flax Typhoon ArcGIS Campaign (…
…
continue reading
Send us a text In this episode, we explore why today’s AI agents, despite huge advances, still fall short of true, unsupervised autonomy. We break down the findings from two key studies that map out both the architectural and operational barriers to fully independent systems. First, we describe the four levels of agent autonomy, showing why most cu…
…
continue reading
1
The Acquisition of Arduino: Innovation or Absorption?
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39Send us a text In a move that's sending shockwaves through the maker community, Qualcomm has officially acquired Arduino. In this episode, we look at one of the biggest tech stories of October 2025. First, we explore the "why" behind this deal. While Arduino democratized electronics, its core technology was falling behind modern 32-bit competitors.…
…
continue reading
1
Cl0p's Latest Heist: Exploiting Oracle's Critical Vulnerability
35:08
35:08
Play later
Play later
Lists
Like
Liked
35:08Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst John and Threat Detection Engineer Marken as they discuss: Clop's Exploitation of Oracle E-Business Suite (1:09) Scattered Lapsus$ Hunters Return With Salesforce Leaks (5:27) Shutdown Threatens US Intel Sharing and Cyber Defense (10:02) Ransomware and Cy…
…
continue reading
By David Such
…
continue reading
1
Demystifying AI and Practical Applications
18:25
18:25
Play later
Play later
Lists
Like
Liked
18:25Send us a text In this episode, we ask: Is the rise of Artificial Intelligence as pivotal as the invention of electricity or the internet? We look at this history-shifting moment by tracing AI's evolution from the first "perceptron" in the 1950s, through the infamous "AI Winter," to today's deep learning revolution. We then peek under the hood of t…
…
continue reading
1
Should Governments Hoard Zero Days? Analyzing Brickstorm Malware and Storm-1849
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Joey along with intelligence analysts Alex and Hayden as they discuss: Brickstorm Backdoor in U.S. Legal and Tech Sectors (1:17) Storm-1849 Targeting Cisco ASA Devices (4:38) Medusa Attempts to Pay Reporter for Initial Access (7:00) Debate Over Government Zero-Day Stockpiling (14:41) Josep…
…
continue reading
1
Adm. Michael Rogers on Deterrence in Cyberspace
34:44
34:44
Play later
Play later
Lists
Like
Liked
34:44Retired four-star U.S. Navy Admiral Michael S. Rogers joins the Nexus Podcast for a wide-ranging discussion on deterrence in cyberspace and an examination of adversarial tactics and strategies. Adm. Rogers explains that deterrence relies on having the will to employ tactics that will reshape the choices adversaries are making in the targeting of U.…
…
continue reading
1
Why Autonomous AI Agents Are the Next Frontier
14:31
14:31
Play later
Play later
Lists
Like
Liked
14:31Send us a text In this episode, we explore why autonomous AI agents are being called the next frontier for business. We're moving beyond isolated AI projects and into the era of the "agentic enterprise," where intelligent, autonomous agents are woven directly into the fabric of daily operations. But what exactly is an AI agent? We break down their …
…
continue reading
1
Attacker Breakout Time Hits 18 Minutes, New Shai-hulud NPM Worm
28:59
28:59
Play later
Play later
Lists
Like
Liked
28:59Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts John and Joey as they discuss: Summer 2025 Attacker Trends (13:41) Self-Replicating 'Shai-hulud' Worm Targeting NPM Packages (1:05) Fortra Critical Patch for GoAnywhere MFT Vulnerability (3:49) Phishing Round Up: File Fix Campaign and Microsoft's Raccoo…
…
continue reading
1
LLM Bias: Implications for Corporations rolling out AI
15:44
15:44
Play later
Play later
Lists
Like
Liked
15:44Send us a text In this episode, we dive into one of the biggest challenges in AI today, bias in large language models. The research shows that these models don’t represent all of humanity; instead, they overwhelmingly reflect the values and psychology of Western, Educated, Industrialized, Rich, and Democratic, or “WEIRD”, societies. One source fram…
…
continue reading
1
Deterministic LLMs: Claims and Challenges
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03Send us a text In this episode, we investigate the growing conversation around deterministic large language models (LLMs), models designed to always return the same output for the same input. We contrast this with the more common stochastic LLMs that rely on random sampling and parallel computation, making their outputs variable even with identical…
…
continue reading
1
LLM Scaling Plateau and the Future of AI Innovation
21:23
21:23
Play later
Play later
Lists
Like
Liked
21:23Send us a text In this episode, we explore the emerging reality of a "generative AI plateau." For years, the path to better AI has been a simple one: bigger models, more data, and more compute. But now, that brute-force approach is showing diminishing returns. We'll discuss why the industry is hitting this wall, what new strategies are emerging to …
…
continue reading
Send us a text In today's episode, we're tackling one of the biggest questions facing modern businesses: What's the best way to introduce AI tools to your organization? Is it a top-down corporate mandate, or a bottom-up, grassroots movement? We'll explore the pros and cons of both, and reveal what the data shows is the most effective approach. The …
…
continue reading
Host, Kim, alongside ReliaQuest's Threat Research experts, cut through the noise to bring you the cyber insights that matter most. Get news, research and actionable strategies from industry leaders, to help you stay ahead of attackers. New episodes every Wednesday at 1pm EST.By ReliaQuest
…
continue reading
1
Bob Maley on Resource Challenges in Cybersecurity
32:41
32:41
Play later
Play later
Lists
Like
Liked
32:41Bob Maley, Chief Security Officer at Black Kite and former CISO for the Commonwealth of Pennsylvania, joins the Nexus Podcast to discuss how critical infrastructure operators and state and local governments are meeting cybersecurity resourcing challenges. Whether it's budgets, workforce shortages, or technical debt, security leaders are facing vola…
…
continue reading
Send us a text Exploring what it means for a system to converse like a human but forget like a goldfish. Today, we're diving into a topic that's both a technical puzzle and a philosophical mystery: the statelessness of large language models, or LLMs. Think about the last conversation you had with an AI. It felt real, didn't it? It seemed to underst…
…
continue reading
1
Impact of AI on Democracy and the Global Economy
17:49
17:49
Play later
Play later
Lists
Like
Liked
17:49Send us a text In this episode, we dive into the profound ways artificial intelligence (AI) is reshaping democracy and the global economy. The discussion looks at how AI-driven misinformation, digital authoritarianism, and the growing dominance of tech giants are eroding public trust and threatening the integrity of elections. On the economic front…
…
continue reading
1
Do You Need AI to Fight AI? Plus Supply-Chain Attacks and Russia's Latest Backdoor
27:49
27:49
Play later
Play later
Lists
Like
Liked
27:49Resources: https://linktr.ee/ReliaQuestShadowTalk Thinking about whether you need more AI in SecOps? Join host Kim along with intelligence analyst Joey & systems security engineer Corey as they discuss: SAP S/4HANA Flaw Exploitation (2:09) AI-Powered Malware Exposes GitHub (4:24) APT28 Outlook Backdoor hits NATO (8:21) ReliaQuest Experts Answer You…
…
continue reading
Send us a text In this episode, we explore the idea that Artificial Intelligence marks one of the great turning points in human history, on par with the Agricultural, Printing, and Industrial Revolutions. By looking back at how past revolutions reorganized labor, democratized resources, and reshaped societies, we frame AI as the next major epoch—on…
…
continue reading
1
Salesforce Attack Fallout, Axios Abuse, and Cloud Ransomware
23:19
23:19
Play later
Play later
Lists
Like
Liked
23:19Resources: https://linktr.ee/ReliaQuestShadowTalk Need the latest information on Salesloft Drift? Join host Kim along with intelligence analyst John & detection engineer Marken as they discuss: Salesloft Drift Tokens Result in Salesforce Data Theft (1:31) Storm-0501 Shifts Ransomware Attacks to Cloud (6:36) APT29 Microsoft 365 Campaign Disrupted (1…
…
continue reading
1
Vibe Coding: English as a Programming Language
10:15
10:15
Play later
Play later
Lists
Like
Liked
10:15Send us a text In this episode, we explore the fascinating new trend of vibe coding, where Large Language Models transform natural language into a programming interface. We trace the history of programming languages and natural language processing to show how this approach represents the next big leap in software abstraction. Alongside the exciteme…
…
continue reading
1
Pankaj Goyal on Cyber Insurance Coverage for OT Environments
29:30
29:30
Play later
Play later
Lists
Like
Liked
29:30Pankaj Goyal, Chief Operating Officer at Safe Security, joins the Nexus Podcast to discuss the challenges cyber insurance carriers and brokers have in determing and providing coverage for asset heavy operational technology (OT) and cyber-physical systems (CPS) environments. Underwriters have prolific amounts of historical data and experience in cal…
…
continue reading
1
New Silk Typhoon Attacks, the Cybercriminal Recruitment Underworld, and More!
26:26
26:26
Play later
Play later
Lists
Like
Liked
26:26Resources: https://linktr.ee/ReliaQuestShadowTalk Curious about the skills needed for modern cyber attacks? Join host Kim along with intelligence analysts John & Hayden as they discuss: Apple Patches Exploited Zero-Day (1:40) Hackers Abuse Linux Files to Drop Malware (3:50) Silk Typhoon Attacks Cloud Supply Chains (7:21) ReliaQuest Uncovers Cybercr…
…
continue reading
1
Embodied Intelligence: A Necessary Next Step?
23:47
23:47
Play later
Play later
Lists
Like
Liked
23:47Send us a text In this episode, we investigate Embodied Intelligence—the argument that true artificial intelligence can’t exist in isolation from the physical world. Unlike today’s Large Language Models, which lack grounded understanding and causal reasoning, embodied AI seeks to merge perception, action, and reasoning through direct interaction wi…
…
continue reading
1
Rui Ataide on Navigating Ransomware Negotiations
28:39
28:39
Play later
Play later
Lists
Like
Liked
28:39Rui Ataide, Managing Security Consultant at GuidePoint Security, joins the Nexus Podcast to discuss his experiences negotiating with ransomware gangs on behalf of victimized organizations. Ataide covers the nuances, processes, and methodology of negotiating with groups. He also explains how extortion and data theft has changed the risk management c…
…
continue reading