Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Security Engineers Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Technical interviews about software topics.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
News and interviews covering all corners of infrastructure, from rail to roads to energy to tunnels and much more, with guests from all around the wide world of civil engineering chatting with NCE news editor Rob Hakimian and the rest of the NCE team
…
continue reading

1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
A weekly podcast about the electronics industry. Occasional guests. Lots of laughs.
…
continue reading
Host Russ Altman, a professor of bioengineering, genetics, and medicine at Stanford, is your guide to the latest science and engineering breakthroughs. Join Russ and his guests as they explore cutting-edge advances that are shaping the future of everything from AI to health and renewable energy. Along the way, “The Future of Everything” delves into ethical implications to give listeners a well-rounded understanding of how new technologies and discoveries will impact society. Whether you’re a ...
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
Join Senator Ted Cruz and co-host Ben Ferguson as they break down the most important news stories of the day and reveal what they mean for you. On "Verdict with Ted Cruz,” you will go behind the scenes of the political debates that define our country. "Verdict with Ted Cruz" is being brought to you by Jobs, Freedom, and Security PAC, a political action committee dedicated to supporting conservative causes, organizations, and candidates across the country. In 2022, Jobs, Freedom, and Security ...
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
An off-the-cuff radio show and podcast for electronics enthusiasts and professionals. Note: this is the "show only" version of the feed. To see the show notes, check out the main podcast feed: https://theamphour.com/feed/
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Your exploration inside Lawrence Livermore National Laboratory. Hear untold stories, meet boundary-pushing pioneers and get unparalleled access to groundbreaking science and technology. From national security challenges to computing revolutions, discover the innovations that are shaping tomorrow, today.
…
continue reading
Tech Takes podcast knows what matters to you. Thought-provoking interviews with industry leaders, government officials, academia and influencers on hot topics relevant to the engineering and applied science profession and the technologies that shape the world around us.
…
continue reading
In a world of short-form content, it's important to engage with long-form ideas. Book Overflow is a podcast created for software engineers, by software engineers to discuss the best technical books in the world. Join co-hosts Carter Morgan and Nathan Toups each week as they discuss a new technical book! New episodes every Monday!
…
continue reading
A podcast that helps us understand human vulnerability and how we can defend against the attacks that exploit us.
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Assistant Managing Editor, and Ken Briodagh, Editor-in-Chief of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology m ...
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
We share the most critical perspectives, habits & examples of great software engineering leaders to help evolve leadership in the tech industry. Join our community of software engineering leaders @ www.sfelc.com!
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
World-renowned aviation-industry consultants and former NTSB investigators John Goglia and Greg Feith have 100 years of worldwide aviation safety experience between them. In this hard-hitting podcast series they talk about everything aviation -- from the behind-the-scenes facts on deadly air crashes to topics of interest such as tips and tricks for navigating through airports and security, traveling with infants and children, unruly passengers, and packing your bags to ease through security.
…
continue reading
Eddie Miro brings years of social engineering experience to bear on an educational and entertaining program around all things social engineering.
…
continue reading
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
…
continue reading
Join Chris and Tim as they delve into the Cloud Networking world! The goal of this podcast is to help Network Engineers with their Cloud journey. Follow us on Twitter @Cables2Clouds | Co-Hosts Twitter Handles: Chris - @bgp_mane | Tim - @juangolbez
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Discover the people, ideas, and technological breakthroughs that are shaping the next iteration of human co-experience. Featuring a diverse cross-section of guest speakers from Roblox’s product and engineering teams, we’ll discuss how we got to where we are today, the road ahead, and the lessons we’ve learned along the way. Hosted by David Baszucki, founder and CEO of Roblox.
…
continue reading
The Platform Engineering Podcast is a show about the real work of building and running internal platforms — hosted by Cory O’Daniel, longtime infrastructure and software engineer, and CEO/cofounder of Massdriver. Each episode features candid conversations with the engineers, leads, and builders shaping platform engineering today. Topics range from org structure and team ownership to infrastructure design, developer experience, and the tradeoffs behind every “it depends.” Cory brings two deca ...
…
continue reading
A podcast for Architects and Engineers who want to thrive in this industry by creating more freedom, fulfillment and financial security. Join Scott Zurn, P.E. and guests in uncovering how to restore value and honor to the unique people who choose to be designers and caretakers of our built world and why it’s essential to the future of our society, our industry, and our planet.
…
continue reading
Join us as we discuss news and current events, trends, and controversies in the world of cybersecurity. We have strong feelings and they're not limited to FedRAMP, CMMC, FISMA, IRAP, security engineering, or documentation. Anything goes -- some of the things we say are probably even helpful! Interested in having words? Email us at [email protected].
…
continue reading
Discover the latest technology trends, meet technology enthusiasts, understand what’s behind talked about technological terms and get inspired by our passion for technology.
…
continue reading
Building AI: Securing the Future of Artificial Intelligence is the podcast for leaders navigating the security challenges of modern AI infrastructure. Host David Yacov speaks with CISOs, security engineers, and enterprise leaders building secure AI systems, from privacy-preserving synthetic data and MLOps security to AI governance, regulatory compliance, and infrastructure risk management. If you're securing AI infrastructure, managing AI compliance, or building trustworthy AI systems, this ...
…
continue reading
Welcome to Security Chipmunks where we talk about the development of cybersecurity skills. To stay up to date in today's world you need to be resilient, that’s why as Advanced Persistent Chipmunks we keep chipping away at it.
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
Heavy Wireless is a deep dive into Wi-Fi, IoT, wireless security, and more. Host Keith Parsons, CWNE#3, draws on his decades of experience to educate, entertain, and inspire those working in the WLAN industry. Each twice-monthly episode explores an aspect of wireless technology with guests including Wi-Fi engineers, industry experts, and vendors. Whether you're already a WLAN specialist or looking to expand your skills in this high-demand sector of IT, Heavy Wireless gives you the technical ...
…
continue reading

1
Navigating AI and Human Security: A Chat with ChatGPT
26:18
26:18
Play later
Play later
Lists
Like
Liked
26:18In Episode 7 of Simply Social Engineering, Eddie Miro talks with ChatGPT, an AI language model. They explore the human element in AI, social engineering tactics, the psychology of influence, and practical ways to defend against emerging threats like deepfakes and AI-powered phishing. They also discuss non-judgmental validation, identity verificatio…
…
continue reading

1
How Social Engineering and Vendor Weaknesses Led to Allianz Life’s Massive Breach
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45In July 2025, Allianz Life Insurance Company of North America confirmed a data breach impacting over 1.1 million customers, financial professionals, and employees—a stark reminder of how vulnerable even the most established financial institutions remain to evolving cyber threats. The breach stemmed from a third-party vendor compromise, specifically…
…
continue reading

1
Ep. 317 - Security Awareness Series - Are You Ready For A Breach? with Jowan and Chris
23:10
23:10
Play later
Play later
Lists
Like
Liked
23:10Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Jowan Joseph. Chris and Jowan discuss the importance of effective communication, role adaptation, and the psychological aspects of crisis situations. The discussion emphasizes the need for proactive preparedness and building trust within teams to navigate challe…
…
continue reading

1
SE Radio 680: Luke Hinds on Privacy and Security of AI Coding Assistants
45:37
45:37
Play later
Play later
Lists
Like
Liked
45:37Luke Hinds, CTO of Stacklok and creator of Sigstore, speaks with SE Radio's Brijesh Ammanath about the privacy and security concerns of using AI coding agents. They discuss how the increased use of AI coding assistants has improved programmer productivity but has also introduced certain key risks. In the area of secrets management, for example, the…
…
continue reading

1
Cybersecurity in Engineering: Building a Secure Future from the Ground Up
47:43
47:43
Play later
Play later
Lists
Like
Liked
47:43In this episode of Tech Takes, host Louis Savard, C.Tech, explores the ever-evolving landscape of cybersecurity—a discipline that has rapidly transformed from an IT concern into a core strategic priority for engineers and professionals across every industry. Joined by Tim McRae, CEO and Founder of Tailcraft Security, their conversation uncovers the…
…
continue reading

1
AI Joins the Fight Against Exploits: Google and Mozilla Patch Dangerous Vulnerabilities
59:42
59:42
Play later
Play later
Lists
Like
Liked
59:42Both Google and Mozilla have rolled out urgent security updates to patch multiple high-severity vulnerabilities in their flagship browsers—Google Chrome and Mozilla Firefox—underscoring the constant arms race between developers and cyber attackers. Google’s update addresses a critical out-of-bounds write vulnerability (CVE-2025-9132) within Chrome’…
…
continue reading
Microsoft releases emergency out-of-band (OOB) Windows updates. Trump targets NSA’s leading AI and cyber expert in clearance revocations. A breach may have compromised the privacy of Ohio medical marijuana patients. Cybercriminals exploit an AI website builder to rapidly create phishing sites. Warlock ransomware operators target Microsoft’s SharePo…
…
continue reading

1
Britain Backs Down: UK Drops Encryption Backdoor Demand on Apple
20:29
20:29
Play later
Play later
Lists
Like
Liked
20:29A major international clash over encryption has come to a dramatic resolution. Earlier this year, the U.K. government, acting under its controversial Investigatory Powers Act of 2016 (IPA)—better known as the “Snoopers’ Charter”—issued a secret Technical Capacity Notice to Apple, demanding that the company weaken its Advanced Data Protection (ADP) …
…
continue reading

1
⚠️ Crypto24 ⚠️ Ransomware: Bypassing EDR and Bolstering Defenses
8:22
8:22
Play later
Play later
Lists
Like
Liked
8:22Got a question or comment? Message us here! In this episode, we break down the emerging Crypto24 ransomware attacks that use living-off-the-land techniques to bypass EDR. We’ll explore how these attacks unfold and the defensive strategies SOCs and organizations can use, like layered security, enhanced monitoring, and rapid response, to stay ahead o…
…
continue reading

1
PipeMagic Backdoor: How Ransomware Actors Exploited a Windows Zero-Day
54:55
54:55
Play later
Play later
Lists
Like
Liked
54:55In early 2025, Microsoft and security researchers uncovered PipeMagic, a modular and memory-resident backdoor that has been quietly leveraged in ransomware campaigns worldwide. Disguised as a legitimate ChatGPT desktop application, this sophisticated malware granted persistent access, precise control, and stealthy communication channels to its oper…
…
continue reading

1
Embedded Executive: Minimize Power in Today’s Data Centers | Point2 Technology
8:49
8:49
Play later
Play later
Lists
Like
Liked
8:49Send us a text The boom coming from AI is requiring data centers to be built as fast as we can build them. To that end, there is a lot of discussion about the power that’s needed to drive these data centers. What there’s not a lot of discussion about are the interconnects that are used within these power-hungry computing camps. And that’s the speci…
…
continue reading

1
270,000 Intel Employee Records at Risk from Authentication Bypass and Hardcoded Credentials
36:28
36:28
Play later
Play later
Lists
Like
Liked
36:28In late 2024, Intel faced a major cybersecurity wake-up call when security researcher Eaton Zveare uncovered a series of vulnerabilities inside the company’s internal systems—flaws that exposed employee and supplier data at unprecedented scale. These vulnerabilities, later confirmed and patched by Intel, included authentication bypasses in web appl…
…
continue reading

1
40+ Reportable Aviation Events in 12 Days & NTSB Reports Fall Short - Episode 289
46:16
46:16
Play later
Play later
Lists
Like
Liked
46:16August in flight safety: at least 40 reportable events in just 12 days. The Flight Safety Detectives have reason to believe the number of events is even higher. Worse, the NTSB is putting out inadequate reports. They often provide the obvious cause and do not dig in to find the root cause. Significant questions are left with no answers. Greg Feith …
…
continue reading

1
Misconfiguration, The Forgotten Vulnerability and the Power and Failure of "Yes" - Danny Jenkins - BSW #409
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
…
continue reading

1
Beyond Cracking the Coding Interview with Mike Mroczka
1:08:35
1:08:35
Play later
Play later
Lists
Like
Liked
1:08:35Ever wondered how many “perfect” candidates simply learned the test—or how many great engineers get filtered out by bad interview design? Mike Mroczka, interview coach and ex-Googler, shares what really goes on behind technical hiring and how to navigate it to your advantage. What you’ll learn: How leaked question banks and standardized puzzles can…
…
continue reading

1
Trump Bringing Peace to the Ukraine War plus DC Crime Plummets
39:47
39:47
Play later
Play later
Lists
Like
Liked
39:47📰 1. Foreign Policy: Ukraine-Russia Peace Negotiations Main Theme: The podcast claims that President Donald Trump has made significant progress toward ending the war in Ukraine. Key Events Discussed: Trump’s meetings with Vladimir Putin in Alaska and Volodymyr Zelensky in Washington. European leaders, including those from Finland and the UK, expres…
…
continue reading

1
Producer Pick – Acuity: Company Expansion and Candidate Confidence
18:33
18:33
Play later
Play later
Lists
Like
Liked
18:33Welcome to this special edition of Security Cleared Jobs: Who’s Hiring & How. Today’s episode is a “producer pick” featuring a past episode with Peter Alcantara of Acuity. If you missed it the first time, enjoy learning about the company’s growth, proactive recruiting strategies, and the importance of confidence in your cleared job search. View the…
…
continue reading

1
How Vishay Optoelectronics Are Powering Smarter Designs
28:21
28:21
Play later
Play later
Lists
Like
Liked
28:21Invisible yet indispensable: optoelectronics are the silent enablers behind many of today’s smartest technologies. In this episode, experts from Vishay’s Opto division reveal how light is used as a signal, a sensor, and a switch to make machines more intuitive, efficient, and connected – from factory automation to automotive applications. For more …
…
continue reading

1
SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
…
continue reading

1
Cloud Computing Heist: $3.5 Million Fraud Leads to Prison for Fake Crypto Influencer
47:58
47:58
Play later
Play later
Lists
Like
Liked
47:58The U.S. Department of Justice has closed the chapter on one of the most audacious cloud fraud and cryptojacking schemes in recent years. Charles O. Parks III, known online as “CP3O” and the self-styled “MultiMillionaire,” has been sentenced for orchestrating a multimillion-dollar scam that defrauded leading cloud providers out of more than $3.5 mi…
…
continue reading

1
The cult of Doug, Crime, Pipemagic, Clickfix, Cats in Space, Josh Marpet, and more... - SWN #504
34:06
34:06
Play later
Play later
Lists
Like
Liked
34:06The cult of Doug, Crime, Pipemagic, Clickfix, Cats in Space, Uncle Silvio, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-504
…
continue reading
A researcher uncovers vulnerabilities across Intel’s internal websites that exposed sensitive employee and supplier data. The Kimsuky group (APT43) targets South Korean diplomatic missions. A new DDoS vulnerability bypasses the 2023 “Rapid Reset” fix. Drug development firm Inotiv reports a ransomware attack to the SEC. The UK drops their demand tha…
…
continue reading

1
Embassy Espionage: Kimsuky and Suspected Chinese Partners Deploy XenoRAT in Seoul
1:04:58
1:04:58
Play later
Play later
Lists
Like
Liked
1:04:58A new wave of state-sponsored cyber espionage is sweeping across South Korea, targeting foreign embassies through highly tailored, multi-stage spearphishing campaigns. Security researchers at Trellix have uncovered that this operation—likely linked to North Korea’s Kimsuky (APT43) group but with indicators of Chinese involvement—has been active sin…
…
continue reading

1
PP075: Kernel Vs. User Mode In Endpoint Security Software
43:39
43:39
Play later
Play later
Lists
Like
Liked
43:39Microsoft is rethinking allowing endpoint security software to run in the Windows kernel (including third-party and Microsoft’s own endpoint security software). While there are benefits to running security software in the kernel, there are also serious downsides (see the CrowdStrike outage). Dan Massameno joins JJ and Drew on Packet Protector to ta…
…
continue reading

1
GSMA Confirms Flaws: Researchers Unveil Dangerous 5G Sniffing and Injection Attack
51:18
51:18
Play later
Play later
Lists
Like
Liked
51:18A groundbreaking security study from the Singapore University of Technology and Design has revealed a major vulnerability in 5G networks that allows attackers to bypass traditional defenses—without even needing a rogue base station. The newly released Sni5Gect attack framework demonstrates how adversaries within range of a victim can intercept and …
…
continue reading

1
SAP NetWeaver Under Siege: New Exploit Chains Threaten Global Enterprises
44:53
44:53
Play later
Play later
Lists
Like
Liked
44:53SAP NetWeaver, one of the world’s most critical enterprise platforms, is under active attack from both ransomware groups and state-backed hackers. A newly released exploit combines two devastating vulnerabilities—CVE-2025-31324 and CVE-2025-42999—to bypass authentication and execute malicious code with full administrative privileges. With CVSS scor…
…
continue reading

1
7 steps to secure digital parenting with Alanna Powers from FOSI | SAFE SPACE CAR CONVERSATION
1:09:50
1:09:50
Play later
Play later
Lists
Like
Liked
1:09:50This episode is a family-friendly extravaganza as we unpack the secrets to secure digital parenting. We’re joined by Alanna Powers, a research specialist from the renowned Family Online Safety Institute (FOSI). 🧑🧑🧒🧒🎧 Whether you’re a parent, guardian, aunt, uncle, or family friend, today’s episode is fully loaded with tips and advice to help you…
…
continue reading

1
Empowering Cross-Functional Product Teams with Tobias Dunn-Krahn and Doug Peete
46:28
46:28
Play later
Play later
Lists
Like
Liked
46:28Modern software teams typically rely on a patchwork of tools to manage planning, development, feature rollout, and post-release analysis. This fragmentation is a known challenge that can create friction and slow down software development iteration. It’s especially problematic for cross-functional teams, where differences in roles, expertise, and wo…
…
continue reading

1
Managing the Minimization of a Container Attack Surface - Neil Carpenter - ASW #344
1:08:17
1:08:17
Play later
Play later
Lists
Like
Liked
1:08:17A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
…
continue reading

1
BONUS POD: Trump’s Art of the Deal WH Diplomacy Blitz
16:26
16:26
Play later
Play later
Lists
Like
Liked
16:26Media Criticism: The episode begins with claims that the mainstream media and the Democratic Party have misled the public about Trump’s diplomatic efforts and intentions. It portrays Trump as being unfairly criticized and underestimated. Diplomatic Developments: Trump allegedly initiated direct contact with Putin and facilitated a potential trilate…
…
continue reading

1
Rewriting the Engineering Leadership Playbook: An ELC Annual 2025 Preview #229
23:09
23:09
Play later
Play later
Lists
Like
Liked
23:09Engineering leadership is undergoing a seismic shift, requiring playbooks to be rewritten, in real-time. In this special episode, hosts Patrick Gallagher and Jerry Li give you an inside look at the ELC Annual 2025 experience, and how the two-day conference will equip you with new mental models, skills, and frameworks required to lead. Get a preview…
…
continue reading

1
Agile Software Development Method (noun) [Word Notes]
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45Please enjoy this encore of Word Notes. A software development philosophy that emphasizes incremental delivery, team collaboration, continual planning, and continual learning CyberWire Glossary link: https://thecyberwire.com/glossary/agile-software-development Audio reference link: "Velocity 09: John Allspaw and Paul Hammond, "10+ Deploys Pe," …
…
continue reading

1
SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln;
5:10
5:10
Play later
Play later
Lists
Like
Liked
5:10Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
…
continue reading

1
Ransomware Gangs Deploy Kernel-Level EDR Killers to Evade Detection
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36Ransomware gangs are no longer just encrypting files and demanding payment—they are actively targeting the very defenses meant to stop them. Recent reports reveal a dramatic surge in the use of EDR killer tools, specialized malware designed to disable Endpoint Detection and Response (EDR) and antivirus systems at the kernel level. By silencing thes…
…
continue reading

1
Chinese APTs Target Taiwan: UAT-7237’s SoundBill Loader and Gelsemium’s FireWood Backdoor
25:50
25:50
Play later
Play later
Lists
Like
Liked
25:50Taiwan continues to face an unprecedented wave of cyberattacks, with new intelligence exposing two distinct but sophisticated campaigns linked to Chinese threat actors. Together, they underscore Beijing’s increasingly aggressive cyber posture against Taiwan’s digital and critical infrastructure. The first campaign, attributed to UAT-7237, a subgrou…
…
continue reading
HR software giant Workday discloses a data breach. Researchers uncover a zero-day in Elastic’s EDR software. Ghost-tapping is an emerging fraud technique where cybercriminals use NFC relay attacks to exploit stolen payment card data. Germany may be on a path to ban ad blockers. A security researcher documents multiple serious flaws in McDonald’s sy…
…
continue reading

1
Colt Cyberattack: Multi-Day Outages After WarLock Ransomware Exploited SharePoint Zero-Day
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58Colt Technology Services, a major UK-based telecommunications provider with operations in over 40 countries, has confirmed that the WarLock ransomware group is behind the cyberattack that struck its systems on August 12, 2025. The attack caused multi-day outages across Colt’s hosting, porting, Voice API, and customer support services, while sparing…
…
continue reading

1
From stealing servers to saving lives: Working in red teaming | Jim Broome
56:50
56:50
Play later
Play later
Lists
Like
Liked
56:50Get your FREE Cybersecurity Salary Guide: https://www.infosecinstitute.com/form/cybersecurity-salary-guide-podcast/?utm_source=youtube&utm_medium=podcast&utm_campaign=podcast Jim Broome of Direct Defense has been doing red teaming since before it became a term — back when a "pentest" meant $25,000, no questions asked and walking out with a server u…
…
continue reading

1
Workday Breach Tied to Third-Party CRM Hack in ShinyHunters Campaign
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43Workday, one of the world’s leading providers of human resources and financial management software, has confirmed a data breach that exposed business contact information through a third-party CRM platform, not its core HR or financial systems. Discovered on August 6, 2025, the breach revealed names, email addresses, and phone numbers—data that, whi…
…
continue reading

1
DOJ Brings Down Zeppelin Ransomware Operator, Seizes Millions in Crypto
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35The U.S. Department of Justice has successfully dismantled a major operator behind the notorious Zeppelin ransomware, charging Russian national Ianis Aleksandrovich Antropenko with conspiracy to commit computer fraud, money laundering, and extortion. Antropenko, known online as “china.helper,” allegedly deployed Zeppelin ransomware in targeted camp…
…
continue reading

1
Rethinking risk based vulnerability management, Black Hat expo insights, and the news - Snehal Antani - ESW #420
1:55:35
1:55:35
Play later
Play later
Lists
Like
Liked
1:55:35Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
…
continue reading

1
Carter's Favorite Book? - Made To Stick by Chip Heath and Dan Heath
1:04:52
1:04:52
Play later
Play later
Lists
Like
Liked
1:04:52In this episode of Book Overflow, Carter and Nathan discuss the second half Made to Stick by Chip Heath and Dan Heath! Join them as they discuss how to make an idea credible, the power of stories, and how to "spot" sticky ideas in the wild! -- Want to talk with Carter or Nathan? Book a coaching session! -- ------------------------------------------…
…
continue reading

1
Trump & Putin in Alaska: What it Means & What's Next plus Standing up to the CCP in Africa
32:24
32:24
Play later
Play later
Lists
Like
Liked
32:241. Trump–Putin Meeting in Alaska A major focus is the one-on-one meeting between Donald Trump and Vladimir Putin in Alaska. The hosts frame it as a potential turning point in the Ukraine war, suggesting Trump is working toward a peace agreement. Trump claims progress was made and that a follow-up meeting involving President Zelensky is being planne…
…
continue reading

1
SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
…
continue reading

1
Cartels Now Terrorist Targets, Texas Pushes Back Against Blue Hypocrisy & Search Engine or Election Engine? Week In Review
27:06
27:06
Play later
Play later
Lists
Like
Liked
27:061. Military Action Against Drug Cartels The President (referred to as Trump) has authorized the U.S. military to use force against Latin American drug cartels. These cartels have been designated as foreign terrorist organizations, allowing for military engagement. Historical precedent is cited, such as Plan Colombia under President George W. Bush. …
…
continue reading