SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Security Operations Podcasts
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
…
continue reading
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android’s a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
…
continue reading
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
Welcome to Ragnar365 Nuggets, Ragnar Heil's short news and personal insights about Microsoft 365 Intelligent Workplace. Focus Areas: Microsoft Teams, SharePoint, Outlook, OneDrive, Copilot, Microsoft Viva, Employee Experience, Governance, Compliance, Power Platform etc)
…
continue reading
The Practical 365 Podcast is a fortnightly newscast on all things Microsoft 365 including Microsoft Teams, Azure AD, Exchange, SharePoint, OneDrive, Windows, Intune and any hot topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
A Cyber Security Podcast, focussed on Threat Research and the interesting people behind it.
…
continue reading
A podcast about all things energy, brought to you by the Australian Energy Market Operator.
…
continue reading
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
🎙️ Welcome to the Microsoft Intune and Security Report Podcast🎙️ — your essential stop for the latest in Windows and Edge security! This podcast is designed to be a time-saving powerhouse, distilling the most critical updates, new features, and emerging vulnerabilities from multiple trusted sources into one convenient, ready-to-reference report. Each week, we dig deep into the data to give you a concise, actionable rundown on the security landscape, helping you stay one step ahead. So whethe ...
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Welcome to covert actions and national security podcast. Welcome to covert and national security podcast. A podcast where we discuss a spectrum of activities concerning covert operations, intelligence, counterintelligence, unconventional warfare, assassination issues, espionage spy craft technology and more. Enter the operational world with Dr. Carlos
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Welcome to The Security Guy’d — the podcast where safety meets strategy! With your host, Rafee, each week we dive deep into the world of security, leadership, and everything in between. Whether you’re running a company, managing a team, or just passionate about keeping people safe — this show is your guide to smarter, stronger security. Expect real talk, expert guests, and practical tips to help you stay ahead of the game. Let’s lock in and level up — This is The Security Guy’d
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
…
continue reading
The Watchers is a profile in the people who are looking out for the rest of us. From national security to cybersecurity, regulators to military operators, these are the people who are on the wall for us.
…
continue reading
Join the brightest SolarWinds minds and IT industry influencers, as they cut through the jargon and give you the tools you need to grow and keep your tech knowledge razor-sharp. Come with questions—leave with actionable steps and practical insights. Have ideas for future episodes or topics? Tweet us @ SolarWinds using #TechPod.
…
continue reading
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot ...
…
continue reading
"Building the Base" - an in-depth series of conversations with top entrepreneurs, innovators, and leaders from tech, financial, industrial, and public sectors. Our special guests provide their unique perspectives on a broad selection of topics such as: shaping our future national security industrial base, the impact of disruptive technologies, how new startups can increasingly contribute to national security, and practical tips on leadership and personal development whether in government or ...
…
continue reading
CNA’s experts understand today’s complex and dynamic national security environments. On CNA Talks, you’ll find analysis of globe-shaping conflicts, foreign policy and shifting alliances, regional breakdowns, pandemics and other health crises, environmental disasters, homeland security concerns, and the future of strategic competition. Follow CNA Talks to go behind the headlines and learn from data-driven, objective, discussions on the factors shaping today’s national security landscape.
…
continue reading
The Future of Security Operations Podcast is dedicated to empowering SecOps leaders to reimagine how their teams work so they can scale their security efforts and build a team that achieves more with less.
…
continue reading
Welcome to Security Halt! Podcast, the show dedicated to Veterans, Active Duty Service Members, and First Responders. Hosted by retired Green Beret Deny Caballero, this podcast dives deep into the stories of resilience, triumph, and the unique challenges faced by those who serve. Through powerful interviews and candid discussions, Security Halt! Podcast highlights vital resources, celebrates success stories, and offers actionable tools to navigate mental health, career transitions, and perso ...
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
From the law enforcement and security organization you’ve never heard of comes a podcast revealing some of the greatest stories in America’s history. Hear from special agents, engineers, technicians, and others who belong to the Diplomatic Security Service as they give Americans insight into what really happened. From the terrorist bombings in East Africa to discovering bugs buried in U.S. embassy walls to dismantling a major sex trafficking network in New York City, listen along as we peel ...
…
continue reading
Join Mike for discussions on intelligence, security, preparedness, building a first world zone in a third world descent, and winning low intensity conflict... or at least not losing.
…
continue reading
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
…
continue reading
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
…
continue reading
Historical True Crime — assassins, gangsters, mobsters and lawmen; manhunts, scandals and unexplained phenomena. Stories of the wildest and darkest chapters of America's past.
…
continue reading

1
Michelle Lang: Building Veteran Support in Rural America | Operation Honor Rural Salute & Mental Health Advocacy
58:14
58:14
Play later
Play later
Lists
Like
Liked
58:14Let us know what you think! Text us! In this powerful episode of Security Halt!, host Deny Caballero sits down with Michelle Lang, founder of Operation Honor Rural Salute, to discuss the hidden challenges veterans face during the transition to civilian life—especially in rural America. Michelle shares her personal journey as a veteran spouse and ad…
…
continue reading

1
Ingram Micro’s SafePay Ransomware Breach: Human-Operated Threats and Supply Chain Fallout
59:56
59:56
Play later
Play later
Lists
Like
Liked
59:56The recent ransomware attack on Ingram Micro, a global technology distribution giant, reveals not only a sophisticated human-operated cyber assault—but also the fragile state of modern supply chain cybersecurity. In this episode, we break down how attackers, believed to be affiliated with the SafePay ransomware group, penetrated Ingram Micro’s infr…
…
continue reading

1
Ric Prado: CIA Black Ops Operator That Hunted Bin Laden
1:13:33
1:13:33
Play later
Play later
Lists
Like
Liked
1:13:33Send us a text Ric Prado shares his remarkable journey from Cuban refugee to CIA Senior Operations Officer, revealing how being separated from his parents at age 8 during Castro's revolution eventually led him to America where he found purpose in military service and intelligence work. • Escaped Cuba at age 8 through Operation Peter Pan, sent alone…
…
continue reading

1
FBI STRIKE ON THE SINALOA CARTELS FASHION DISTRICT LAUNDERING HUB
7:41
7:41
Play later
Play later
Lists
Like
Liked
7:41By Circle Of Insight Productions
…
continue reading

1
The Operations Mindset: 37 Years of Security Wisdom
35:02
35:02
Play later
Play later
Lists
Like
Liked
35:02In this episode of The Security Guy’d, we sit down with Riyaaz Van Rooyen, former Western Cape Operations Manager at ADT Fidelity, who brings with him an incredible 37 years of frontline and leadership experience in the South African security industry. Starting his career at just 16 years old, Riyaaz takes us through his humble beginnings, the chal…
…
continue reading

1
Operation Endgame, deepfakes, and dead slugs
54:59
54:59
Play later
Play later
Lists
Like
Liked
54:59In this episode, Graham unravels Operation Endgame - the surprisingly stylish police crackdown that is seizing botnets, mocking malware authors with anime videos, and taunting cybercriminals via Telegram. Meanwhile, Carole exposes the AI-generated remote hiring threat. Could your next coworker be a North Korean hacker with a perfect LinkedIn? And B…
…
continue reading
Today we are joined by Selena Larson, Threat Researcher at Proofpoint, and co-host of Only Malware in the Building, as she discusses their work on "Amatera Stealer - Rebranded ACR Stealer With Improved Evasion, Sophistication." Proofpoint researchers have identified Amatera Stealer, a rebranded and actively developed malware-as-a-service (Maa…
…
continue reading

1
MK Palmore: Lead from where you stand. [CISO] [Career Notes]
9:10
9:10
Play later
Play later
Lists
Like
Liked
9:10Please enjoy this encore of Career Notes. Director of Google Cloud's Office of the CISO, MK Palmore, dedicated much of his life to public service and now brings his experience working for the greater good to the private sector. A graduate of the US Naval Academy, including the Naval Academy Prep School that he calls the most impactful educational e…
…
continue reading

1
TikTok, China, and the EU: The Battle Over Data Sovereignty
58:06
58:06
Play later
Play later
Lists
Like
Liked
58:06In this episode, we explore the mounting scrutiny TikTok faces over its handling of European user data, with the EU’s Data Protection Commission (DPC) launching a fresh investigation into alleged transfers of data to China. TikTok, owned by Beijing-based ByteDance, is once again in the crosshairs for possible violations of the General Data Protecti…
…
continue reading
Fortinet patches a critical flaw in its FortiWeb web application firewall. Hackers are exploiting a critical vulnerability in Wing FTP Server. U.S. Cyber Command’s fiscal 2026 budget includes a new AI project. Czechia’s cybersecurity agency has issued a formal warning about Chinese AI company DeepSeek. The DoNot APT group targets Italy’s Ministry o…
…
continue reading

1
Booz Allen Invests in Corsha: Defending Machine-to-Machine Communication at Scale
33:00
33:00
Play later
Play later
Lists
Like
Liked
33:00As the cybersecurity landscape shifts toward hyperautomation and AI-driven autonomy, a new frontier has emerged: the identity and access security of machines. In this episode, we explore Booz Allen Ventures’ strategic investment in Corsha, a company at the forefront of Machine Identity Provider (mIDP) technology. Their collaboration marks a pivotal…
…
continue reading

1
Analysing Copilot's Zero-Day, Outages, M365 Local and New Copilot Agents: Practical 365 Podcast S4 E41
40:21
40:21
Play later
Play later
Lists
Like
Liked
40:21In Season 4, Episode 41 of the Practical 365 Podcast, hosts Steve Goodman and Paul Robichaud explore a range of pressing topics in the tech world. They kick off with a deep dive into the Microsoft 365 Copilot exploit, "Echo Leak," discussing its implications for AI safeguards and the future of agentic AI. The conversation then shifts to a recent gl…
…
continue reading

1
WSUS Meltdown: Global Sync Failures and the Shift Toward Cloud Patch Management
27:45
27:45
Play later
Play later
Lists
Like
Liked
27:45Windows Server Update Services (WSUS) has long been a cornerstone of enterprise patch management—but recent global synchronization failures have raised serious questions about its future viability. In this episode, we dissect the widespread outage that left organizations unable to sync critical Windows updates, unpacking both the technical cause an…
…
continue reading

1
Unsecurity Episode 241: Business Impact Analysis w/ FRSecure Consultants
33:12
33:12
Play later
Play later
Lists
Like
Liked
33:12How can you approach your company's leadership to advocate for best security practices? Megan dives into a BIA (Business Impact Analysis) breakdown with triple guest features from FRSecure's Consulting Team. Mea Yang, Coral Morgan, and Kathryn Frickstad-Olson recall client trumphs and challenges they have witnessed with implementing BIAs. Whether y…
…
continue reading

1
Cracking eSIM: Exposing the Hidden Threats in Next-Gen Mobile Security
16:43
16:43
Play later
Play later
Lists
Like
Liked
16:43eSIM technology has transformed the way we connect—but has it also introduced new vulnerabilities into the heart of modern telecommunications? In this deep-dive episode, we dissect the security architecture, remote provisioning systems, and critical attack surfaces of embedded SIM (eSIM) technology, now deployed in billions of mobile, consumer, and…
…
continue reading

1
Jeff Wenninger: Policing, Reform & Lessons from the Rampart Scandal
50:16
50:16
Play later
Play later
Lists
Like
Liked
50:16Let us know what you think! Text us! In this powerful episode of Security Halt!, former law enforcement officer Jeff Wenninger opens up about his 30-year journey in policing—from the gritty streets of Los Angeles to the front lines of community reform. Jeff shares raw, firsthand insights into the realities of policing violent neighborhoods, navigat…
…
continue reading

1
Checklist 431 - Hacking the Mickey D’s Hiring Bot
20:59
20:59
Play later
Play later
Lists
Like
Liked
20:59We’re looking today at how a fake McDonald’s led security researchers to real sensitive info on 64 million real people. It’s a lesson on how NOT to do it. Then, is it smart to buy smart devices? As Belkin prepares to kill support for most of its Wemo line, we’ll revisit the topic. That’s all on this edition of The Checklist, brought to you by Secur…
…
continue reading
UK police make multiple arrests in the retail cyberattack case. French authorities arrest a Russian basketball player at the request of the U.S. A German court declares open season on Meta’s tracking pixels. The European Union unveils new rules to regulate artificial intelligence. London’s Iran International news confirms cyberattacks from Banished…
…
continue reading

1
Back it up, bring it back: No data left behind
48:50
48:50
Play later
Play later
Lists
Like
Liked
48:50It can be a draw when setting up a new device. Some info transfers, while some don’t. Learn how developers can ensure the best user experience when people backup and restore an Android device. Hosts Tor and Chet are joined by Graham and Piyush on the Android Consumer Experience team and Alon on the Android Studio team to discuss Android backup and …
…
continue reading

1
Qantas Breach and Beyond: Cybersecurity Risks in Australia’s Digital Supply Chains
1:03:23
1:03:23
Play later
Play later
Lists
Like
Liked
1:03:23As Australia contends with a growing wave of cybersecurity incidents, this episode explores the intersection of national privacy laws, global supply chain vulnerabilities, and public trust in digital security. The recent Qantas data breach—affecting over 5 million customers—was the latest high-profile case to expose how fragile third-party service …
…
continue reading

1
A Better AI Development Assistant with Mark Miller
1:02:00
1:02:00
Play later
Play later
Lists
Like
Liked
1:02:00How can AI tech help you write better code? Carl and Richard talk to Mark Miller about the latest AI features coming in CodeRush. Mark talks about focusing on a fast and cost-effective AI assistant driven by voice, so you don't have to switch to a different window and type. The conversation delves into the rapid evolution of software development, u…
…
continue reading

1
Multiple Actors, One Breach - Rethinking Threat Models in 2025
36:59
36:59
Play later
Play later
Lists
Like
Liked
36:59In this episode, Julien sits down with Chi En (Ashley) Shen, a distinguished threat researcher at Cisco Talos. Ashley shares her fascinating journey from hacking forums in Taiwan to leading threat intelligence at global giants like Google and Mandiant. Together, they explore the rising trend of compartmentalized cyberattacks, the evolving role of I…
…
continue reading
In episode 425 of "Smashing Security", Graham reveals how "Call of Duty: WWII" has been weaponised - allowing hackers to hijack your entire PC during online matches, thanks to ancient code and Microsoft’s Game Pass. Meanwhile, Carole digs into a con targeting the recently incarcerated, with scammers impersonating bail bond agents to fleece desperat…
…
continue reading

1
When AI Looks First: How Agentic Systems Are Reshaping Cybersecurity Operations | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3
4:32
4:32
Play later
Play later
Lists
Like
Liked
4:32Before a power crew rolls out to check a transformer, sensors on the grid have often already flagged the problem. Before your smart dishwasher starts its cycle, it might wait for off-peak energy rates. And in the world of autonomous vehicles, lightweight systems constantly scan road conditions before a decision ever reaches the car’s central proces…
…
continue reading
Patch Tuesday. An Iranian ransomware group puts a premium on U.S. and Israeli targets. Batavia spyware targets Russia’s industrial sector. HHS fines a Texas Behavioral Health firm for failed risk analysis. The Anatsa banking trojan targets financial institutions in the U.S. and Canada. Hackers abuse a legitimate commercial evasion framework to pack…
…
continue reading

1
How Red Teamers Are Exposing Flaws in AI Pipelines
41:46
41:46
Play later
Play later
Lists
Like
Liked
41:46Send us a text Prolific bug bounty hunter and Offensive Security Lead at Toreon, Robbe Van Roey (PinkDraconian), joins the MLSecOps Podcast to break down how he discovered RCEs in BentoML and LangChain, the risks of unsafe model serialization, and his approach to red teaming AI systems. Full transcript, video, and links to episode resources availab…
…
continue reading

1
119 - Android 16, testing, desktop experiences, AndroidX, and more!
4:36
4:36
Play later
Play later
Lists
Like
Liked
4:36Welcome to Now in Android, your ongoing guide to what's new and notable in the world of Android development. Meghan shares exciting news like the release of Android 16! Discover developer previews for desktop windowing experiences, building adaptive apps, and more! Chapters and resources: 0:00 - Introduction 0:24 - Android 16 is here → https://goo.…
…
continue reading

1
Semper Valens Solutions: Valuing Every Candidate
20:51
20:51
Play later
Play later
Lists
Like
Liked
20:51Semper Valens Solutions designs DevSecOps infrastructure for DISA, develops cyber weapons systems for the Air Force, supports the Army’s deployment of force protection platforms and C2 systems, plus does non-cleared work for DHA, VA, and the FBI. Company COO Nick Brown shares the importance of treating candidates well in the hiring process, doing m…
…
continue reading

1
The Role of AI in Revolutionizing Corporate Security: A Conversation with Brian Tuskan
29:28
29:28
Play later
Play later
Lists
Like
Liked
29:28In this episode of Ontic's Connected Intelligence Podcast, host Manish Mehta interviews Brian Tuskan, Chief Security Officer of ServiceNow, to explore his journey from law enforcement to corporate security leadership. They discuss the transformative role of technology, including AI, in modern security operations and workforce development, while hig…
…
continue reading

1
Smart Devices & Legacy Systems: The Big Risks in Healthcare Cyber - Ep 157
17:24
17:24
Play later
Play later
Lists
Like
Liked
17:24In this episode of Reimagining Cyber, Rob Aragao (Chief Security Strategist, OpenText) speaks with Ed Gaudet, CEO and founder of Censinet, about the high-stakes intersection of cybersecurity and healthcare. With hospitals increasingly reliant on connected medical devices and legacy systems, the risks extend beyond data breaches—they directly impact…
…
continue reading

1
Taiwan Sounds the Alarm: TikTok, WeChat, and the Chinese Data Threat
1:06:28
1:06:28
Play later
Play later
Lists
Like
Liked
1:06:28In this episode, we examine Taiwan’s growing alarm over Chinese mobile applications, especially TikTok and WeChat, in light of rising global concern over data privacy and foreign surveillance. A recent inspection by Taiwan’s National Security Bureau (NSB) revealed that these apps aggressively collect personal data and transmit it to servers located…
…
continue reading

1
63. Terror Strikes London: What did MI5 know? (Ep 2)
36:04
36:04
Play later
Play later
Lists
Like
Liked
36:04Fifteen months before the London bombings, MI5 had seen them. They had names, photographs, and addresses. Two of the men who would carry out the 7/7 attacks had already appeared in surveillance. And then… they vanished back into the noise. In this second episode of our 7/7 series, 20 years on from the attacks, David and Gordon unravel one of the mo…
…
continue reading

1
The Evolution of Atomic macOS Stealer: Backdoors, Keyloggers, and Persistent Threats
45:00
45:00
Play later
Play later
Lists
Like
Liked
45:00This episode exposes the growing menace of Atomic macOS Stealer (AMOS) — a rapidly evolving malware-as-a-service (MaaS) platform targeting macOS users worldwide. Once seen as a simple data stealer, AMOS has matured into a potent, long-term threat featuring keyloggers, a persistent backdoor, and system-level access, all designed to exfiltrate data a…
…
continue reading

1
Tac Intel Tuesday: Operation Excalibur Practical Exercise
1:00:53
1:00:53
Play later
Play later
Lists
Like
Liked
1:00:53By Forward Observer Radio
…
continue reading
Researchers release proof-of-concept exploits for CitrixBleed2. Grafana patches four high-severity vulnerabilities. A hacker claims to have breached Spanish telecom giant Telefónica. Italian police arrest a Chinese man wanted by U.S. authorities for alleged industrial espionage. Beware of a new ransomware group called Bert. Call of Duty goes offlin…
…
continue reading

1
CitrixBleed Returns: CVE-2025-5777 and the Exploitation of NetScaler Devices
1:02:21
1:02:21
Play later
Play later
Lists
Like
Liked
1:02:21In this episode, we dissect CitrixBleed 2—a newly disclosed and actively exploited vulnerability affecting Citrix NetScaler ADC and Gateway appliances. Tracked as CVE-2025-5777 (and possibly also CVE-2025-6543), this critical flaw mirrors the notorious original CitrixBleed by allowing attackers to extract sensitive memory content, including user se…
…
continue reading

1
SAP’s July 2025 Patch Day: Critical Flaws, CVE-2025-30012, and Ransomware Risk
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01In this episode, we break down SAP’s July 2025 Security Patch Day—a high-stakes moment for any enterprise relying on SAP’s core business applications. With 27 new and 4 updated security notes released, including seven rated as critical, this patch cycle directly targets some of the most serious vulnerabilities seen in SAP environments in recent mem…
…
continue reading

1
Episode 419: Device Compliance with Sriram & Preetham from Scalefusion
1:18:46
1:18:46
Play later
Play later
Lists
Like
Liked
1:18:46Sriram & Preetham from Scalefusion join us to talk about device security & compliance, as well as how to handle the necessary access control issues that can come from it. Whether it’s SSF, app management, identity management, there’s always knock-on effects. How can folks handle them? Hosts: Tom Bridge - @[email protected] Marcus Ransom - …
…
continue reading
It’s the 100th episode of SolarWinds TechPod! Join hosts Chrystal Taylor and Sean Sebring as they celebrate this milestone by going behind the scenes of the podcast. From the infamous "host curse" to their favorite guests, funniest moments, and the magic of production, this candid conversation reveals what it really takes to bring TechPod to life. …
…
continue reading

1
106GB Exposed? Telefónica, HellCat, and the Silent Data Breach
50:33
50:33
Play later
Play later
Lists
Like
Liked
50:33In this episode, we explore a shadowy and unconfirmed—but highly consequential—data breach at Spanish telecommunications giant Telefónica. Allegedly orchestrated by the HellCat ransomware group, the breach involves a staggering 106GB of exfiltrated data, including internal communications, customer records, and employee information. Telefónica has y…
…
continue reading
Ingram Micro suffers a ransomware attack by the SafePay gang. Spanish police dismantle a large-scale investment fraud ring. The SatanLock ransomware group says it is shutting down. Brazilian police arrest a man accused of stealing over $100 million from the country’s banking system. Qantas confirms contact from a “potential cybercriminal” following…
…
continue reading

1
The Illusion of Shutdowns: What Hunters International's Closure Really Means
42:41
42:41
Play later
Play later
Lists
Like
Liked
42:41In a sudden and cryptic announcement, the notorious ransomware group Hunters International has declared its shutdown, citing “recent developments” and pledging to release decryption keys to victims. Active since late 2022 and suspected to be a rebrand of the earlier Hive ransomware gang, Hunters International has been responsible for attacks on nea…
…
continue reading

1
CISA Flags CVE-2025-6554: Patching Chrome’s Critical Flaw Before It’s Too Late
40:49
40:49
Play later
Play later
Lists
Like
Liked
40:49A newly discovered and actively exploited zero-day vulnerability in Google Chrome has sent ripples through the cybersecurity community. Known as CVE-2025-6554, this critical type confusion flaw in Chrome’s V8 JavaScript and WebAssembly engine enables remote attackers to perform arbitrary read/write operations or execute code via a single malicious …
…
continue reading

1
Scott Kinder: Green Beret Mindset for Business, Transition & Purpose
42:29
42:29
Play later
Play later
Lists
Like
Liked
42:29Let us know what you think! Text us! In this episode of Security Halt!, host Deny Caballero sits down with Scott Kinder—entrepreneur, author of The Green Beret’s Guide to Starting a Business, and founder of DOL Coach—to unpack the real challenges and opportunities veterans face during their military-to-civilian transition. Scott shares hard-won ins…
…
continue reading
London woke up to joy and celebration on 7 July 2005. The city had just won the 2012 Olympics. It was a glorious summer. There were parties in the streets. But, by 9am, everything had changed. Three explosions tore through the London Underground. Minutes later, a double-decker bus was ripped apart in Tavistock Square. Confusion reigned. Was it a po…
…
continue reading

1
Ben Harrow: From Special Forces to Aviation & Veteran Entrepreneurship
48:43
48:43
Play later
Play later
Lists
Like
Liked
48:43Let us know what you think! Text us! In this inspiring episode of Security Halt!, host Deny Caballero sits down with Ben Harrow, a former Special Forces officer turned successful entrepreneur and aviation leader. From navigating the battlefield to building businesses, Ben shares his powerful story of military transition, embracing risk, and redefin…
…
continue reading