SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Security Operations Podcasts
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Your Weekly Source for Linux GNews from the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
The talk of the Apple Community
…
continue reading
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
A podcast made by people who love running Linux.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
This is daily Apple news. Monday through Friday, Ken Ray brings a short shot of tech happenings to your day. If it's Apple news, Apple-related news, or news related to Apple-related news, you'll hear about it here. News you'll like... this is Mac OS Ken.
…
continue reading
A podcast about all things energy, brought to you by the Australian Energy Market Operator.
…
continue reading
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
…
continue reading
Interviews with Scholars of National Security about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/national-security
…
continue reading
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android’s a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
The best-curated wisdom from founders, operators, & investors on executing at startups | Hosted by Roshan Cariappa | Head down, execute hard. 🔥 Millions of listeners seek out Bingepods (Ideabrew Studios Network content) every day. Get in touch with us to advertise, join the network or click listen to enjoy content by some of India's top audio creators. [email protected] Android | Apple
…
continue reading
ClearanceJobs is the largest career networking site for individuals with active federal clearances. Get security clearance, intelligence community, espionage, national security and defense contracting updates in our exclusive interviews with IC and government leaders. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Welcome to Ragnar365 Nuggets, Ragnar Heil's short news and personal insights about Microsoft 365 Intelligent Workplace. Focus Areas: Microsoft Teams, SharePoint, Outlook, OneDrive, Copilot, Microsoft Viva, Employee Experience, Governance, Compliance, Power Platform etc)
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
An improved audio format version of our written content. Get your defence and security perspectives now through this podcast.
…
continue reading
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
Technology continues to advance at an increasingly rapid pace, so how can you stay on top of it? Learn from those who are pioneering new technologies and promoting entrepreneurial spirit! The Connect podcast encourages people to join prominent thought leaders as they explore today’s most timely and important topics around technology and network solutions. Connect brings listeners an engaging program featuring luminaries and trailblazers—from private industry, the public sector, and professio ...
…
continue reading

1
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and ...
…
continue reading
Welcome to covert actions and national security podcast. Welcome to covert and national security podcast. A podcast where we discuss a spectrum of activities concerning covert operations, intelligence, counterintelligence, unconventional warfare, assassination issues, espionage spy craft technology and more. Enter the operational world with Dr. Carlos
…
continue reading
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
…
continue reading

1
DOJ Brings Down Zeppelin Ransomware Operator, Seizes Millions in Crypto
36:35
36:35
Play later
Play later
Lists
Like
Liked
36:35The U.S. Department of Justice has successfully dismantled a major operator behind the notorious Zeppelin ransomware, charging Russian national Ianis Aleksandrovich Antropenko with conspiracy to commit computer fraud, money laundering, and extortion. Antropenko, known online as “china.helper,” allegedly deployed Zeppelin ransomware in targeted camp…
…
continue reading

1
Checklist 436 - Operation Secure St. Paul
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12It’s week three of the Saint Paul cyberattack. There’s a known culprit now, and an operation underway to secure the city’s information infrastructure. All of that plus mitigation tips everyone can use on this edition of The Checklist brought to you by SecureMac. Check out our show notes: SecureMac.com/Checklist And get in touch with us: Checklist@S…
…
continue reading

1
Aviva Guttmann, "Operation Wrath of God: The Secret History of European Intelligence and Mossad's Assassination Campaign" (Cambridge UP, 2025)
50:09
50:09
Play later
Play later
Lists
Like
Liked
50:09In this unprecedented history of intelligence cooperation during the Cold War, Aviva Guttmann uncovers the key role of European intelligence agencies in facilitating Mossad's Operation Wrath of God; a campaign of assassination against Black September terrorists. She reveals how, in the aftermath of the 1972 Munich Olympics Massacre, Palestinians su…
…
continue reading
Eric's on vacation and Jon wrangles cows. Cloudflare accuses perplexity of stealth scraping tactics, Google tweaks their disclosure policy, Microsoft studies AI impact on jobs, and OpenAI shared chats disclose a little (lot) too much. For fun, how about a hike in the Tetons, and Potatoes from Tomatoes. 0:00 - Intro 11:55 - Stealth Bots 16:24 - Disc…
…
continue reading

1
PromptLock Ransomware: How AI is Lowering the Bar for Cybercrime
44:37
44:37
Play later
Play later
Lists
Like
Liked
44:37The cybersecurity world has entered a new era: AI-powered ransomware. Researchers recently uncovered PromptLock, a proof-of-concept malware that uses OpenAI’s gpt-oss:20b model and Lua scripting to autonomously generate malicious code, encrypt data, and exfiltrate files across Windows, Linux, and macOS. While still experimental, PromptLock demonstr…
…
continue reading

1
Hybrid AD at Risk: Storm-0501 Exploits Entra ID for Cloud-Native Ransomware
40:34
40:34
Play later
Play later
Lists
Like
Liked
40:34The 2025 Purple Knight Report paints a stark picture of enterprise identity security: the average security assessment score for hybrid Active Directory (AD) and Entra ID environments has plummeted to just 61%—a failing grade and an 11-point decline since 2023. This troubling trend underscores the persistent challenges organizations face in protecti…
…
continue reading

1
AI-Powered Polymorphic Phishing: The New Era of Social Engineering
1:10:14
1:10:14
Play later
Play later
Lists
Like
Liked
1:10:14Cybercrime is entering a new phase—one marked by AI-powered phishing attacks, the weaponization of legitimate remote access tools, and the rise of professionalized underground markets. Recent reports highlight the alarming growth of AI-driven polymorphic phishing, where malicious emails are automatically tailored, randomized, and adapted in real ti…
…
continue reading

1
Salesforce Breach: How OAuth Token Theft Exposed Hundreds of Organizations
40:17
40:17
Play later
Play later
Lists
Like
Liked
40:17The recent Salesforce data breach underscores a growing reality in cybersecurity: even when core SaaS platforms are secure, their third-party integrations often aren’t. Between August 8–18, 2025, attackers from the group UNC6395 exploited compromised OAuth tokens from the Salesloft Drift AI chat integration, systematically exporting data from hundr…
…
continue reading

1
Lawfare Daily: Unpacking Security Guarantees for Ukraine
59:13
59:13
Play later
Play later
Lists
Like
Liked
59:13On today’s episode, Lawfare’s Ukraine Fellow Anastasiia Lapatina sits down with Eric Ciaramella, a Senior Fellow at the Carnegie Endowment for International Peace and Lawfare Contributing Editor, to discuss the history of American security commitments abroad and how it can help inform the debate around security guarantees for Ukraine. To receive ad…
…
continue reading

1
TuneIn, Turn On, Sign Up - MOSK: 08.28.2025
15:20
15:20
Play later
Play later
Lists
Like
Liked
15:20- IDC Raises 2025 Smartphone Shipment Expectations Thanks to iPhone - Apple Revokes Notarization for iTorrent in EU’s AltStore PAL - Google Intros Notarization-Style Verification for Android Apps Outside Play Store - Columbia Pursues Probe into Alleged Anticompetitive Behavior from Apple - Apple Music Radio Stations Turn Up on TuneIn - Apple TV+ Dr…
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses cloud network observability.By Enterprise Management Associates + APMdigest
…
continue reading

1
Design at GitHub with Diana Mounter
1:09:00
1:09:00
Play later
Play later
Lists
Like
Liked
1:09:00How did the design of GitHub evolve? Carl and Richard speak with Diana Mounter about her experiences at GitHub, including her role as head of design. Diana discusses how she was drawn to GitHub as a designer and how her career evolved to lead design for the company. The conversation ranges over different design concepts, the Primer design language,…
…
continue reading

1
MacVoices #25225: Live! - Adobe’s PDF AI, Dia Browser Costs, and A Foldable Phone Test
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52Adobe has opened a new door on their AI strategy, unveiling a new AI service for PDFs. Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Marty Jencius, Jeff Gamet, Eric Bolden, Jim Rea, Web Bixby, and Norbert Frassa weigh its usefulness against privacy risks and academic research tools. They discuss the Dia browser’s pricey subscription model, …
…
continue reading

1
Silk Typhoon’s Fake Adobe Update: How China-Backed Hackers Target Diplomats
40:33
40:33
Play later
Play later
Lists
Like
Liked
40:33A new and highly sophisticated cyber espionage campaign attributed to Silk Typhoon—also known as Mustang Panda, TEMP.Hex, or UNC6384—has been uncovered, targeting diplomats and government entities across Southeast Asia. Researchers from Google’s Threat Intelligence Group (GTIG) revealed that the attackers deployed Adversary-in-the-Middle (AitM) tec…
…
continue reading

1
Oops! I auto-filled my password into a cookie banner
34:51
34:51
Play later
Play later
Lists
Like
Liked
34:51We unpack how some password managers can be tricked into coughing up your secrets, with a clickjacking sleight-of-hand, what website owners can do to prevent it, and how to lock down your personal password vault. Then we time-hope to the post-quantum scramble: "harvest-now, decrypt later", Microsoft's 2033 quantum-safe pledge, and whether your prin…
…
continue reading

1
FTC Warns Tech Giants: Don’t Weaken Encryption for Foreign Governments
37:13
37:13
Play later
Play later
Lists
Like
Liked
37:13The fight over encryption has entered a new phase. The Federal Trade Commission (FTC), led by Chairman Andrew Ferguson, has issued a strong warning to major U.S. technology companies: resist foreign government demands to weaken encryption. At stake is nothing less than the security of millions of Americans’ private communications, financial data, a…
…
continue reading

1
MacVoices #25224: Live! - Mixing Music, Filtering Searches, Choosing AI Models, Alexa Plus Woes
42:02
42:02
Play later
Play later
Lists
Like
Liked
42:02A wide-ranging MacVoices Live! panel discussion covers Apple’s upcoming AutoMix feature in Music, Spotify’s more granular playlist controls, and how DJs and party hosts might use transitions. The group debates Google’s new “preferred sources” search option and its risks of echo chambers, along with OpenAI’s return of model-selection in ChatGPT. Chu…
…
continue reading

1
Unsecurity Episode 245: DEF CON Recap w/ Matt Dowd, Matt Findlay, Pinky Thompson
30:35
30:35
Play later
Play later
Lists
Like
Liked
30:35Returning from this year's DEF CON, hear from our Offensive Team Managers, Dowd and Findlay, and Pinky, IR Manager and co-host of The Hackle Box. Hear about new highlights, CTF's, and villages, and reflection from Brad as a Blue Team member navigating past challenges. Have something to say? Contact us at [email protected] and follow us for mo…
…
continue reading

1
Invisible Prompts: How Image Scaling Attacks Break AI Security
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03Researchers have uncovered a new form of indirect prompt injection that leverages a simple but powerful trick: image scaling. This novel attack involves hiding malicious instructions inside high-resolution images, invisible to the human eye. When AI systems automatically downscale these images during preprocessing, the hidden prompt becomes visible…
…
continue reading

1
Rational Security: The “Room Raider” Edition
1:18:50
1:18:50
Play later
Play later
Lists
Like
Liked
1:18:50This week, Scott sat down with old and new Lawfare colleagues—Benjamin Wittes, Renée DiResta, and Michael Feinberg—to talk through the week’s big national security news stories, including: “An Old Fashioned Anti Raid.” Former Trump National Security Advisor (turned Trump critic) John Bolton got a rude awakening this past week when the FBI conducted…
…
continue reading

1
Healthcare Services Group Breach Exposes 624,000 Individuals’ Sensitive Data
1:04:53
1:04:53
Play later
Play later
Lists
Like
Liked
1:04:53The healthcare sector has been rocked yet again by a massive cybersecurity incident. Healthcare Services Group (HCSG), a provider of dining and laundry services to healthcare facilities, disclosed a data breach that compromised the personal information of over 624,000 individuals. Between late September and early October 2024, hackers gained unauth…
…
continue reading

1
Auchan Data Breach: Hundreds of Thousands of Loyalty Accounts Compromised
40:09
40:09
Play later
Play later
Lists
Like
Liked
40:09French retail giant Auchan has confirmed a massive data breach that compromised the personal details of hundreds of thousands of customers. The stolen data includes names, addresses, phone numbers, email addresses, and loyalty card numbers—though banking details, passwords, and PINs were reportedly not affected. Despite this, the breach is serious …
…
continue reading

1
Russia/India Relations and the War in Ukraine
28:18
28:18
Play later
Play later
Lists
Like
Liked
28:18This episode examines the political, military, and economic elements of the relationship between Russia and India. Guest Biographies Dmitry Gorenburg is a Senior Research Scientist in CNA’s Russia Studies Program. He is an expert on security issues in the former Soviet Union, the Russian military, Russian foreign policy, and ethnic politics and ide…
…
continue reading

1
Episode 426: Virtualization in 2025
1:20:43
1:20:43
Play later
Play later
Lists
Like
Liked
1:20:43Apple Silicon provides so many different opportunities with virtualisation, but many of us still miss the intel days when we could snapshot and use serial numbers to automate device enrollment. Tools like Tart provide opportunities to build workflows that allow us to configure and enhance the way we virtualise macOS. Hosts: Tom Bridge - @tbridge@th…
…
continue reading

1
Apple Announces "Awe Dropping" Media Event - MOSK: 08.27.2025
16:09
16:09
Play later
Play later
Lists
Like
Liked
16:09- Apple’s Next Media Event Set for 9 September - Expectations for Apple’s “Awe Dropping” Event - Apple Sets “Awe Dropping” Placeholder on YouTube - “Awe Dropping” Art Goes Interactive on Apple Site - BofA: Investors Not Super Excited About iPhone Air - Germany Says Apple Can’t Call Apple Watch “Carbon Neutral” - Apple Opening Two Stores in India Ne…
…
continue reading

1
Lawfare Daily: ‘War in the Smartphone Age,’ with Matthew Ford
59:06
59:06
Play later
Play later
Lists
Like
Liked
59:06Matthew Ford, Associate Professor at Swedish Defence University and author of “War in the Smartphone Age: Conflict, Connectivity, and the Crises at Our Fingertips,” joins Lawfare’s Justin Sherman to discuss the role of smartphones and related technologies in war, how social media contributes to a collapse of context in the war content we see online…
…
continue reading

1
EP 140 Why Labour Exploitation is Security’s Unseen Threat – Paul Fullwood, Former Director of Inspections and Enforcement of the Security Industry Authority, Speaks
53:40
53:40
Play later
Play later
Lists
Like
Liked
53:40Send us a text Career Paul joined the SIA in 2001 after a 33-year career first in HM Armed Forces and then in the Police Service. Paul retired from policing in 2020 as Assistant Chief Constable (Specialist Policing Services) for Bedfordshire Police and the Cambridgeshire and Hertfordshire constabularies, with responsibility for major crime, armed p…
…
continue reading

1
Mark L. Haas, "The Geriatric Peace: Population Aging and the Decline of War" (Oxford UP, 2025)
52:20
52:20
Play later
Play later
Lists
Like
Liked
52:20The vast majority of the world's countries are experiencing a demographic revolution: dramatic, sustained, and likely irreversible population aging. States' median ages are steadily increasing as the number of people ages 65 and older skyrockets. Analysts and policymakers frequently decry population aging's domestic costs, especially likely slowing…
…
continue reading

1
NATO's Early Cold War Lessons Show What US, Japan, and South Korea Must Do Now
8:58
8:58
Play later
Play later
Lists
Like
Liked
8:58In the not-so-distant future, a U.S. military commander in the Indo-Pacific could be forced to fight two major wars at once - one against a Chinese assault on Taiwan, the other against a North Korean attack on the Korean Peninsula. This dual-front crisis scenario, long considered unlikely, is now routinely modeled in wargames and quietly debated in…
…
continue reading

1
Risky Business #804 -- Phrack's DPRK hacker is probably a Chinese APT guy
53:32
53:32
Play later
Play later
Lists
Like
Liked
53:32On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Australia expels Iranian ambassador Hackers sabotage Iranian shipping satcoms APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK? Trail of Bits uses image-downscaling to sneak prompts into Google Gemini The Com’s King Bob ge…
…
continue reading

1
Docker Desktop Vulnerability: Why Containers Aren’t as Safe as You Think
46:31
46:31
Play later
Play later
Lists
Like
Liked
46:31A critical vulnerability in Docker Desktop, CVE-2025-9074, has shaken the container security world. Scoring 9.3 on the CVSS scale, this flaw exposed an unauthenticated Docker Engine API (192.168.65.7:2375) to any container running on Windows and macOS. With nothing more than a few HTTP requests—or even three lines of Python code—attackers could esc…
…
continue reading

1
77. The Hunt for Pablo Escobar: The Medellin Cartel vs Colombia (Ep 4)
50:52
50:52
Play later
Play later
Lists
Like
Liked
50:52By the autumn of 1989, the hunt for Pablo Escobar and the Medellín cartel was intensifying. With the US military and intelligence agencies now directly involved, a new, more aggressive phase of the War on Drugs had begun. Join Gordon and David as they explore how Escobar, facing a relentless manhunt, leverages his position to strike an extraordinar…
…
continue reading

1
Arch Linux Website, Forums, and AUR Targeted in Sustained Cyber Assault
40:04
40:04
Play later
Play later
Lists
Like
Liked
40:04The Arch Linux community has just endured more than a week of turbulence as a massive distributed denial-of-service (DDoS) attack disrupted its most critical services, including the main website, the Arch User Repository (AUR), and community forums. Beginning in mid-August 2025, the sustained volumetric and protocol-level assault overwhelmed hostin…
…
continue reading

1
Data I/O Ransomware Attack: Supply Chain Cybersecurity in Crisis
37:08
37:08
Play later
Play later
Lists
Like
Liked
37:08Cyberattacks against supply chains are no longer isolated disruptions—they are systemic threats with the power to cascade across industries and nations. The recent ransomware attack on Data I/O, a chip programming firm whose customers include global giants like Apple, Microsoft, Amazon, and Bosch, demonstrates how one breach can disrupt manufacturi…
…
continue reading

1
MacVoices #25223: Live! - Blood Oxygen Tracking Back On Apple Watch, Apple Card Satisfaction Slips
28:00
28:00
Play later
Play later
Lists
Like
Liked
28:00Apple Watch users regain blood oxygen tracking via iPhone processing, while panelists debate its impact on Apple’s legal fight with Massimo. Security warnings about Plex servers and ESR power banks serve as public service announcements. Chuck Joiner, David Ginsburg, Brian Flanigan-Arthurs, Jim Rea, and Web Bixby then turn their attention to Apple C…
…
continue reading

1
433: Is Your Favorite Open Source Software Really Open Source?
1:00:07
1:00:07
Play later
Play later
Lists
Like
Liked
1:00:07video: https://youtu.be/PdyDXEbu56k This week on Destination Linux, we’re putting software to the test with a brand-new community tool at IsItReallyFOSS.com, a site that helps you find out if projects claiming to be open source live up to it. Then Jill takes us through the latest release of Fastfetch 2.49, the modern Neofetch alternative that’s qui…
…
continue reading

1
BianLian Ransomware Strikes Aspire Rural Health: 138,000 Patients Exposed
44:33
44:33
Play later
Play later
Lists
Like
Liked
44:33The U.S. healthcare sector continues to face relentless cyberattacks, and rural hospitals are increasingly at the center of this crisis. The recent Aspire Rural Health System breach in Michigan—attributed to the BianLian ransomware group—exposed the personal and medical data of nearly 140,000 patients and staff. From Social Security numbers and fin…
…
continue reading

1
OneFlip: How a Single Bit-Flip Can Hack AI Models
49:40
49:40
Play later
Play later
Lists
Like
Liked
49:40Artificial Intelligence (AI) models are shaping the future of industries from healthcare and finance to autonomous vehicles and national infrastructure. But with this rise comes a hidden battlefield: adversarial attacks designed to manipulate AI systems in subtle yet devastating ways. One of the most alarming threats is the OneFlip attack, a method…
…
continue reading
In this episode of Pop Goes the Stack, F5's Lori MacVittie, Joel Moses, and Ken Arora delve into the complex issue of ownership with respect to your AI-driven digital twin. As organizations consider the use of AI avatars and AI twins, explore the nuances of employment contracts, intellectual property, and the potential for creating AI models based …
…
continue reading

1
Lawfare Daily: Defending Ukraine Outside NATO with Michael O'Hanlon and Andriy Zagorodnyuk
54:41
54:41
Play later
Play later
Lists
Like
Liked
54:41Lawfare Contributor Mykhailo Soldatenko sits down with Michael O'Hanlon, Director of Foreign Policy Research and Senior Fellow at the Brookings Institution, and Andriy Zagorodnyuk, Chairman of the Centre for Defence Strategies in Kyiv, a former Ukrainian Defence Minister, and a nonresident scholar at Carnegie Endowment for International Peace, to d…
…
continue reading

1
Twitter's Remains Sue Apple - MOSK: 08.26.2025
13:44
13:44
Play later
Play later
Lists
Like
Liked
13:44- Elon Musk Sues Apple and OpenAI Over iOS/ChatGPT Integration - Y Combinator Sides with Epic in Amicus Brief Against Apple - Apple Seeds Eighth (blank)OS 26 Betas to Developers - 9to5Mac Suspects Eighth iOS 26 Developer Beta is Last Before Wide Release - Apple Seeds Fifth Betas of Most (blank)OS 26 Builds to Public Testers - F1: The $600M+ Movie -…
…
continue reading
The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, David Cook discusses his recent a…
…
continue reading

1
Building the 2026 ISP: Developing a very different Integrated System Plan in 2026
24:30
24:30
Play later
Play later
Lists
Like
Liked
24:30In July we hit the half-way mark in the development of the 2026 Integrated System Plan (ISP) with the publication of a number of key reports, including the Inputs, Assumptions and Scenarios Report (IASR) and the new Gas Infrastructure Options Report (GIOR). The ISP is the strategic roadmap for Australia's National Electricity Market (NEM) and it ou…
…
continue reading

1
From Gatekeeper to Growth Partner: How Modern CISOs Build Trust, Drive Innovation, and Shape AI-Enabled Business Security | A Conversation with Legendary CISO, Andy Ellis | Redefining CyberSecurity with ...
40:08
40:08
Play later
Play later
Lists
Like
Liked
40:08⬥GUEST⬥ Andy Ellis, Legendary CISO [https://howtociso.com] | On LinkedIn: https://www.linkedin.com/in/csoandy/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com ⬥EPISODE NOTES⬥ In this episode of Redefining Cyb…
…
continue reading

1
MacVoices #25222: Live! - A Falling iPhone, A Telescope Data Center, $1 ChatGPT, AOL Ends Dial-Up
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21An iPhone survives a 2,600-foot fall, sparking debate on durability and user habits between Chuck Joiner, David Ginsburg, Eric Bolden, Brian Flanigan-Arthurs, Marty Jencius, Web Bixby, Jim Rea, and Jeff Gamet. A Texas startup launches a telescope-hosting data center, enabling astronomers to control gear remotely under pristine skies. Meanwhile, Ope…
…
continue reading