Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
Penetration Podcasts
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
A Raptors Podcast
…
continue reading
…
continue reading
J and T team up to bring you the latest issues in Information Security Cover art photo provided by NESA by Makers on Unsplash: https://unsplash.com/@nesabymakers
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
This podcast explores the different facets of sexuality and relationships; along with some raunchy stories & human interest pieces, were just a bunch of friends forgetting about the microphones. Support this podcast: https://podcasters.spotify.com/pod/show/Triplelexpenetration/support
…
continue reading
This podcast contains security topics discussed by the Secure Ideas LLC. team.
…
continue reading
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Emergency Medicine Cases – Where the Experts Keep You in the Know. For show notes, quizzes, videos and more learning tools please visit emergencymedicinecases.com
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Become a Paid Subscriber: https://creators.spotify.com/pod/show/dennis3211/subscribe This podcast and website is dedicated to the healthcare professional who needs to provide high quality care in a very austere location. For more content: www.prolongedfieldcare.org Consider supporting us on: patreon.com/ProlongedFieldCareCollective
…
continue reading
For Emergency Responders at All Levels
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Nothing BUTT sex is a podcast hosted by former MAXIM AUSTRALIA sex columnist Vanessa de Largie. Raw, fierce and unashamed, join de Largie each episode while she discusses Nothing BUTT Sex.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
This Line Isn’t Secure is an actual play Delta Green podcast blending high production value, immersive sound design, and slow-burning dread. Inspired by Archive 81 and Malevolent, it drags listeners into a world of conspiracies, cosmic horror, and paranoia. Nothing stays hidden forever.
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
Podcast by BK
…
continue reading
Point of Convergence is a weekly podcast addressing inter-related topics such as UFOs, the Phenomenon, alien abductions, remote viewing, near death experiences, out of body experiences, interdimensionality, and high strangeness. In addition to discussing these and related topics, host ExoAcademian will discuss their apparent connection as contact modalities within the bedrock of entangled Consciousness. Subscribe for all bonus episodes: https://creators.spotify.com/pod/profile/pointofconverg ...
…
continue reading
Smol Der explores how AI is burning through work—leaving just enough embers to build something better. Practical chats with pros on AI unlocks, stacks, promp...
…
continue reading
After 40 years of being an industry standard, Music Connection Magazine is hitting the Mics! Hosts Randy Thomas--the first-ever woman to announce the Rock N' Roll Hall of Fame, the Academy Awards and Tony Awards--and Arnie Wohl who has worked in Management & Promotion of artists like Michael Jackson, Paula Abdul and Coldplay, are bringing the stories off the cover and into the studio. Each week you can expect exclusive interviews with Rock Icons like Sting, Daryl Hall and Jimmy Page, and cut ...
…
continue reading
We think we know how computer systems work, but how come they keep surprising us? We also think we know how humans behave, but we keep finding out we don’t. This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers. We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today. Get ready to be caught off guard as we debunk misconceptions, diss ...
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
A weekly wrap of the “must-know” developments in Marketing, Media, Agency and Technology for leaders and emerging leaders in the industry. Veteran industry journalist and Mi3 Executive Editor Paul McIntyre talks each week with guest marketers who are in the know on what matters at the nexus of marketing, agencies, media and technology. Powered mostly by Human Intelligence (HI).
…
continue reading
Tich and RPJ, a Canadian couple watch and review adult films of the past. This comedy adult podcast dives into the acting, directing, script, and action. Come for the sexy, stay for the laughs.
…
continue reading
In Physiotherapy Trauma Talks we discuss the key roles that physiotherapists and other healthcare practitioners play in the management and rehabilitation of patients with traumatic injury. Experts in trauma care offer their insights about in-hospital patient care and post-discharge follow up service delivery. New research in the field of trauma care and rehabilitation is shared to provide answers to your questions.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
An educational podcast covering a wide variety of topics for the paramedics of the Southwestern Ontario Region.
…
continue reading
Empowering Your IT Career Journey – From the first step to success! With a passion for technology and a mission to uplift others, I’m here to guide you through the dynamic IT industry. Whether you're just starting or looking to advance, you’ve found a community dedicated to your growth. Advice & Insights: From Help Desk to Director of Network Operations in 3 years, I share strategies to fast-track your career. Expert Conversations: Gain exclusive insights from industry leaders. Let’s make IT ...
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Welcome to Opportunity Minded, a series about business growth for forward thinkers like you. Each episode tackles a strategic approach or topic on corporate agendas. You’ll hear from experts who share best practices, real-world scenarios and data-driven insights to help you make informed decisions that can deliver impactful results. Tune in to Opportunity Minded today and get ready to make your next move with confidence. Opportunity Minded is brought to you by Euromonitor International—the f ...
…
continue reading
Podcasts for http://www.secpoint.com
…
continue reading
Reay Reid pesim and Owen talk about dumbshit with occasional guests
…
continue reading
A podcast with three dumb dumbs talking about who knows what.
…
continue reading
Taking the Fandoms you love and building worlds to play Dungeons and Dragons in. Homebrew Avengers, Percy Jackson & the Olympians, and Star Wars so far - what will we do next?
…
continue reading
Podcast by CyberTalk
…
continue reading
Recorded while I ride my bike to work in Mid-City New Orleans
…
continue reading
Podcast by Russ Shaw
…
continue reading
Inspirational stories of black women in tech. Support this podcast: https://podcasters.spotify.com/pod/show/frauvis/support
…
continue reading
Join us each week for recaps and reviews of the 90s classic cartoon ExoSquad! New episodes every Saturday!
…
continue reading
How to radically transform your business. Real business owners send in their problems in this weekly question and answer show with acclaimed consultant-coach Berry Schwartz.
…
continue reading
1
#9 of 2025 Top Ten: Penetrating Neck Trauma
1:12:24
1:12:24
Play later
Play later
Lists
Like
Liked
1:12:24In this episode of the PFC Podcast, Dennis and Max discuss the evolving landscape of modern combat injuries, focusing on neck and upper chest injuries. They delve into the anatomy of the neck, the importance of understanding different zones for surgical intervention, and effective hemorrhage control techniques. The conversation emphasizes the criti…
…
continue reading
1
#10 – Penetration Testing, Fiction Writing, and LLMs With Cybersecurity Expert and Author Alex Fox
1:06:19
1:06:19
Play later
Play later
Lists
Like
Liked
1:06:19Penetration testing is changing fast—but not always in the ways the hype suggests. James Wagenheim sits down with fiction author and pentest lead Alex Fox to unpack modern pentesting, real-world escalation paths, and what LLMs mean for both attackers and defenders. We also discuss how LLMs are a poor substitute for human creativity. In this episode…
…
continue reading
1
Cybersecurity Today: Apple Security Updates, AI Search Engine Scams, Torrent Malware, and Stanford's AI Penetration Testing
14:48
14:48
Play later
Play later
Lists
Like
Liked
14:48In this episode of Cybersecurity Today, host David Shipley discusses significant developments in the cybersecurity landscape. Apple releases security updates to address two actively exploited WebKit vulnerabilities. Scammers manipulate AI-powered search tools to recommend fake support numbers, reflecting a growing security risk. Bitdefender uncover…
…
continue reading
1
107: From Beginner to Pro: A Roadmap for Penetration Testing Careers
1:06:20
1:06:20
Play later
Play later
Lists
Like
Liked
1:06:20Meter: Visit https://meter.com/itcareer to book a demoEveryone wants to be a pen tester until they find out what the job actually looks like. This video offers a reality check on the daily grind of a professional pentester, emphasizing that the job differs significantly from Hollywood portrayals and standard certification courses.Tyler, a professio…
…
continue reading
1
108: Don't Let AI Replace You—Learn This First
1:00:54
1:00:54
Play later
Play later
Lists
Like
Liked
1:00:54Learn how Itential is bringing AI into network automation the right way — with governance, visibility, and control. https://bit.ly/itential-overview Many fear that artificial intelligence is coming for their jobs, but the reality is very different. Understanding how AI is implemented is quickly becoming a career advantage. This video explores how A…
…
continue reading
1
Arrests In 0365 Scheme: Cybersecurity Today With David Shipley
13:09
13:09
Play later
Play later
Lists
Like
Liked
13:09Global Cybercrime Crackdowns and Rising Threats This episode of 'Cybersecurity Today' hosted by David Shipley covers significant cybersecurity news. Nigerian police arrested three suspects linked to a Microsoft 365 phishing platform known as Raccoon O365. U.S. prosecutors charged 54 individuals in an ATM malware scheme tied to a Venezuelan criminal…
…
continue reading
1
Podcast#476: Australia mass shooting, India elephant attack, Georgia female cop produced horse porn
3:49:40
3:49:40
Play later
Play later
Lists
Like
Liked
3:49:40Last regular podcast of the year... started out with all the details we have so far on the Australia Islamic terror shooing, and then talked about the Taiwan mass stabbing. Plus a train in India kills 7 elephants, Chile election results, US immigration judge convicted of obstructing ICE, and a female Georgia police officer arrested after producing …
…
continue reading
1
Year-End Review: The Highs and Lows of Cybersecurity in 2025
55:25
55:25
Play later
Play later
Lists
Like
Liked
55:25Cybersecurity Today brings you a special year-end episode, featuring noteworthy guests Tammy Harper from Flare, Laura Payne from White Tuque, David Shipley from Beauceron Security, and John Pinard, co-host of Project Synapse. This episode delves into the pivotal cybersecurity stories of 2025, including a detailed discussion on MFA phishing attacks,…
…
continue reading
1
Episode 162: Before the Breach How Attackers Profile Your Organization
36:22
36:22
Play later
Play later
Lists
Like
Liked
36:22In this episode, Brad and Spencer from SecurIT360's Offensive Security group delve into the crucial reconnaissance phase attackers undertake before launching an attack. They discuss the real-world impact of seemingly harmless data leaks, how attackers chain them together to build a profile of your organization, and common misconceptions about what …
…
continue reading
1
On the Zero Day of Christmas - Cisco Devices Under Attack
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35Cybersecurity Today: Cisco Zero Day Exploited & Maritime Cyber Attack Unfolds In this episode of Cybersecurity Today, host David Shipley discusses a series of critical cybersecurity incidents, including the exploitation of a zero-day flaw in Cisco email security infrastructure by a China-linked group, a Hollywood-style attack on an Italian ferry in…
…
continue reading
1
The importance of application security in small businesses
1:10:52
1:10:52
Play later
Play later
Lists
Like
Liked
1:10:52The Mindful Business Security Show is a call-in radio style podcast for small business leaders. Join our hosts as they take questions from business leaders like you! On this episode, Accidental CISO is joined by guest host Tanya Janca, @shehackspurple. Tanya is a hacker, software developer, author, and educator. She is passionate about application …
…
continue reading
1
#10 of 2025 Top Ten: Mastering Shock Management in Trauma
1:29:03
1:29:03
Play later
Play later
Lists
Like
Liked
1:29:03In this episode of the PFC Podcast, Dennis and Max delve into the complexities of managing shock, particularly hemorrhagic shock, in trauma patients. They discuss the importance of mental status as a key indicator of a patient's condition, the critical role of early intervention, and the protocols surrounding massive transfusions. The conversation …
…
continue reading
1
Episode 077 – What Security Leaders Do for Fun
15:59
15:59
Play later
Play later
Lists
Like
Liked
15:59From Spartan races to culinary arts, discover the hobbies and passions that keep CISOs balanced and inspired in this behind-the-scenes edition of Agent of Influence. Welcome to a special edition of the Agent of Influence podcast! In this episode, we step away from the usual cybersecurity deep dives to explore the personal side of security leaders, …
…
continue reading
1
React2Shell Vulnerability, Black Force Phishing Kit, Microsoft OAuth Attacks, and PornHub Data Breach
14:46
14:46
Play later
Play later
Lists
Like
Liked
14:46In this episode of Cybersecurity Today, host Jim Love discusses a range of pressing cybersecurity threats. The show covers the escalating React2Shell vulnerability, which has led to widespread automated exploitation campaigns involving crypto miners and back doors. Additionally, Jim reports on the Black Force phishing kit, which bypasses multifacto…
…
continue reading
1
Risky Business #819 -- Venezuela (credibly?!) blames USA for wiper attack
54:05
54:05
Play later
Play later
Lists
Like
Liked
54:05In the final show of 2025, Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: React2Shell attacks continue, surprising no one The unholy combination of OAuth consent phishing, social engineering and Azure CLI Venezuela’s state oil firm gets ransomware’d, blames US… but what if it really is a US cyber op?! Russian junk-h…
…
continue reading
1
Ep 210 Decompensated Hypothyroidism Recognition and Management
1:12:13
1:12:13
Play later
Play later
Lists
Like
Liked
1:12:13In the ED, we regularly care for sick patients presenting acutely with abnormal vital signs, altered mental status, and end organ dysfunction. Oftentimes, the culprit ends up being sepsis, or overdose, or organ failure. But it is important that we consider rarer endocrine presentations like decompensated hypothyroidism. In this Part 1 of this two-p…
…
continue reading
1
Spreadsheets to AI Agents The Next Era of Enterprise GRC with Richa Kaul
46:11
46:11
Play later
Play later
Lists
Like
Liked
46:11In episode 47 of Cybersecurity America, host Joshua Nicholson is joined by Richa Kaul, CEO and Founder of Complyance, to explore how agentic AI and intelligent automation are reshaping enterprise Governance, Risk, and Compliance (GRC). Richa breaks down why traditional, spreadsheet-driven GRC programs are failing at scale—and how organizations are …
…
continue reading
1
PFC Podcast 259: Mastering Arctic Medicine
42:35
42:35
Play later
Play later
Lists
Like
Liked
42:35The conversation delves into the complexities of medication stability, particularly focusing on how environmental factors can affect the efficacy of pharmaceuticals. It highlights the stringent storage parameters set by pharmaceutical companies and the lack of testing in combat-simulated environments, raising concerns about medication reliability i…
…
continue reading
1
Podcast#475: U.S. troops KIA Syria, Venezuela oil tanker, CO deputy caught pleasuring self in gym parking lot
3:25:41
3:25:41
Play later
Play later
Lists
Like
Liked
3:25:41Got started this week with the breaking news of 3 Americans killed by ISIS in Syria, and then talked about the Yemen civil war getting worse. Also the Venezuelan oil tanker seized, Mexico VBIED kills 3 cops, France First Lady under fire for feminist slur, and a Colorado sheriff's deputy was caught pleasuring himself in his car outside a public gym.…
…
continue reading
1
The Hidden Danger of Storing Secrets Online | Interview with Jake Knott from Watchtower
38:16
38:16
Play later
Play later
Lists
Like
Liked
38:16In this episode of Cybersecurity Today, host Jim Love discusses the shocking discovery of over 80,000 leaked credentials and secrets in online code formatting tools with Jake Knott, a principal security researcher from Watchtower. They delve into the vulnerabilities exposed by these tools, the inadvertent leaking of sensitive information, and how a…
…
continue reading
1
Most Recent Clinical Research — Elevated CPR Discussion Part 5
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01Kurt Bramer from Advanced CPR Solutions comes back for a final look at Head-Up CPR as we pull all the pieces from the earlier four episodes together. Dr. Joe Holley is back to bring in the latest research into the process as well. We will tie all this back to the global health disaster that is sudden cardiac arrest. Recent research from across the …
…
continue reading
Cybersecurity Today: Spider-Man Phishing Kit, Gogs Zero-Day Exploits, and Recent Patches In this episode, host Jim Love discusses recent cybersecurity issues including the Spider-Man phishing kit targeting European banks and cryptocurrency users, a zero-day vulnerability in the self-hosted Git service Gogs, and various security updates. The Spider-…
…
continue reading
1
Episode 161: The Evolution of Pentesting Going Into 2026
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50In this episode Brad and Spencer discuss the rapid technology shift that's happening in cybersecurity, hybrid pentesting models and the overall evolution of pen testing as we head into 2026. Need a pentest before the end of the year? Learn how here... Blog: https://offsec.blog/ Youtube: https://www.youtube.com/@cyberthreatpov Twitter: https://x.com…
…
continue reading
1
Episode 62: Premenstrual Dysphoric Disorder & the hatred of men
5:25
5:25
Play later
Play later
Lists
Like
Liked
5:25Vanessa de Largie talks about PMDD.By Vanessa de Largie
…
continue reading
1
Paper Tiger | This Line Isn't Secure S1 E23 | Delta Green Impossible Landscapes Actual Play
59:13
59:13
Play later
Play later
Lists
Like
Liked
59:13New episodes premiere every other Thursday at 6 PM EST. All Links and Social Media: https://linktr.ee/nullproj ---------- #DeltaGreen #ActualPlay #TTRPG #CosmicHorror #Lovecraftian #HorrorPodcast #TabletopRPG #RPGPodcast #Unnatural #NullProject #HorrorCommunity #RoleplayingGames #TabletopGames #AudioDrama What is Delta Green? Delta Green is a moder…
…
continue reading
In this sponsored Soap Box edition of the Risky Business podcast, Patrick Gray chats with Jared Atkinson, CTO of SpecterOps, about BloodHound OpenGraph. OpenGraph enumerates attack paths across platforms and services, not just your primary directories. A compromised GitHub account to on-prem AD compromise attack path? It’s a thing, and OpenGraph wi…
…
continue reading
1
PFC Podcast: Patient Loss in Combat Medicine
42:50
42:50
Play later
Play later
Lists
Like
Liked
42:50In this episode of the PFC Podcast, Dennis and Rick discuss the sensitive and often overlooked topic of what to do with patients after they die. They explore the emotional and cultural complexities involved in handling death in a medical context, particularly in military settings. The conversation covers the importance of cultural sensitivity, lega…
…
continue reading
Cybersecurity Today: Google Chrome's AI Safety Plan, React2Shell Fixes, & New Ransomware Tactics In this episode of Cybersecurity Today, host Jim Love discusses Google's new security blueprint for AI-powered Chrome agents, highlighting measures against indirect prompt injections and model errors. Learn about Next JS's new tool for addressing the cr…
…
continue reading
1
Risky Business #818 -- React2Shell is a fun one
58:27
58:27
Play later
Play later
Lists
Like
Liked
58:27In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: There’s a CVSS 10/10 remote code exec in the React javascript server. JS server? U wot mate? China is out popping shells with it Linux adds support for PCIe bus encryption Amnesty International says Intellexa can just TeamViewer into its customers’ s…
…
continue reading
1
Redundancy repercussions: How marketing and media execs Liana Dubois, Katie Dally, Josh Slighting and Amy de Groot navigated the five stages of grief after job loss – then tapped lateral, imaginative thinking ...
1:02:41
1:02:41
Play later
Play later
Lists
Like
Liked
1:02:41Redundancy is rife across the marketing and agency ecosystem right now. And whether you have an inkling your job could be on the line, as Liana Dubois did when management consultants entered the Nine building, or it's a complete shock – such as Josh Slighting experienced when he left a growing REA Group, or Katie Dally felt after surviving a first …
…
continue reading
1
DevelopmentTools May Allow Remote Compromise
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08Explosive React Vulnerability and AI Tool Flaws Uncovered: Major Implications for Cybersecurity In this episode of Cybersecurity Today, host David Shipley discusses a new significant React vulnerability, React2Shell, that has caused widespread confusion and debate in the security community. This major flaw, affecting a widely used web framework, po…
…
continue reading
1
PFC Podcast 258: Medical Safety in Ukraine
31:49
31:49
Play later
Play later
Lists
Like
Liked
31:49In this episode of the PFC Podcast, Dennis interviews Nicholas Samuels, a humanitarian worker in Ukraine, discussing the critical aspects of medic safety, planning for evacuations, and the importance of understanding the broader context of the ongoing war. Nicholas shares insights on the challenges faced by medical volunteers, the necessity of bein…
…
continue reading
1
The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin)
30:14
30:14
Play later
Play later
Lists
Like
Liked
30:14The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin) When attackers breached HubSpot in March 2022, they weren’t after HubSpot at all. They were after the customers of its customers. Crypto firms like Trezor, BlockFi, and Swan Bitcoin suddenly saw their users targeted by near-perfect phishing emails designed to st…
…
continue reading
In late 2023, the world’s most trusted identity provider experienced the kind of breach it was designed to prevent. Attackers quietly infiltrated Okta’s customer support system, stole session tokens hidden inside HAR files and used them to impersonate users across some of the most secure organizations on earth. For two full weeks, the intruders ope…
…
continue reading
In this episode of Point of Convergence, we explore the uncanny phenomenon of synchronicity—what it is, how to engage with it, and what kind of reality it may be pointing toward. What role does the higher self play here, and might this indicate an interplay between different levels of reality?
…
continue reading
1
The Science and Physiology of Head-up CPR – Elevated CPR Discussion Part 4
54:51
54:51
Play later
Play later
Lists
Like
Liked
54:51Kurt Bramer from Advanced CPR Solutions returns again this week to continue the series on Head-Up CPR and other promising sudden cardiac arrest treatments. There are three previous episodes in this series. Elevated CPR Series Episode One Elevated CPR Series Episode Two Elevated CPR Series Episode Three Elevated CPR Series Episode Five After the sev…
…
continue reading
1
Cybersecurity Today Month In Review - December 5th, 2025
54:06
54:06
Play later
Play later
Lists
Like
Liked
54:06Cybersecurity Today: The Rise of Living Off the Land Strategies & More In this episode of Cybersecurity Today's Month in Review, host Jim Love is joined by Laura Payne from White Tuque and David Shipley from Beauceron Security. They discuss several pressing cybersecurity issues, including the growing threat of 'living off the land' strategies where…
…
continue reading