SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Security Operations Podcasts
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
A podcast made by people who love running Linux.
…
continue reading
Comedy + "Conspiracy Theory". Welcome to a shenanigan infused journey into the mind of this particular Garbage Can Dood...
…
continue reading
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
Your Weekly Source for Linux GNews from the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
…
continue reading
Sea Control is CIMSEC's Flagship podcast. We focus on maritime security, naval affairs, and defense and foreign policy.
…
continue reading
A podcast about all things energy, brought to you by the Australian Energy Market Operator.
…
continue reading
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Entry & Exit is a podcast about building, scaling, and exiting security and fire businesses. Hosts Stephen Olmon and Collin Trimble share their journey growing Alarm Masters through acquisitions and organic growth, along with the lessons they’ve learned along the way. From recurring revenue strategies to sales, operations, and M&A, Entry & Exit gives business owners and entrepreneurs an inside look at what it takes to succeed in the security industry. Whether you’re starting your first compa ...
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android's a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
Welcome to the War Studies podcast. We bring you world-leading research from the School of Security Studies at King’s College London, the largest community of scholars in the world dedicated to the study of all aspects of security, defence and international relations. We aim to explore the complex realm of conflict and uncover the challenges at the heart of navigating world affairs and diplomatic relations, because we believe the study of war is fundamental to understanding the world we live ...
…
continue reading
The Guardian Way is a weekly podcast from Guardian Protection Force that turns real-world security experience into practical guidance you can use today. Hosted by Garrett Thomas with co-host Terry MacAdam, each episode breaks down an operations-level topic like executive protection, protective intelligence, workplace violence prevention, campus security, remote guarding, and patrol program design. We focus on what works in the field, why it works, and how to implement it with clear steps, po ...
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
…
continue reading
The best in maritime security, technology, history, and international affairs from CIMSEC - your moment of power point rehab.
…
continue reading
This podcast distills the signal from the noise about enterprise IT digital transformation and operations in the era of Agile, DevOps and distributed applications. Interviews feature expert guests in conversation with IT journalism veteran Beth Pariseau, Senior News Writer at Informa TechTarget.
…
continue reading
Commissionaires Nova Scotia proudly presents Purpose & Protection, a podcast dedicated to the people behind Canada’s security: veterans, their families, civilians and all those dedicated to keeping our communities safe. Each episode explores the lived experiences of those who’ve served, those who support them, and those shaping the future of Canada’s security landscape. From the frontlines to the home front, you’ll hear stories of resilience, leadership and purpose. As the largest private em ...
…
continue reading
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
…
continue reading
America’s military operations are constantly evolving. From boot camp to boots on the ground, anchor Ryan Robertson provides in-depth coverage of international armed conflicts and the latest technological developments in weaponry worldwide.
…
continue reading
If you wish to know what it's really like to make the life and death decisions portrayed in the movies by James Bond or on TV by Homeland's, Cary Matherson, then Black Spy Podcast is the show for you. If you're interested in the clandestine world of secret intelligence, espionage, counter-terrorism and national security, then this definitely your must listen Podcast! Every week, along with a different successful or famous guest who's always been interested in the secret services, ex officer, ...
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
I am targeting a market of IT professionals who enjoy woodworking as a hobby. Providing information around information technology topics like cyber security, cyber crime, and a few woodworking projects
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Future Secured brings you in-depth conversations with Australian and global cyber security leaders, founders, CEOs, and co-founders. Hosted by Jason Murell and Tom Finnigan, each episode delves into the personal journeys of these experts as they navigate the challenges of building and scaling successful cyber security businesses. From critical industry issues to hard-learned lessons, the podcast explores the competitive global market and offers valuable insights on how to start, grow, and su ...
…
continue reading
From going undercover on the dark web to hunting down ransomware that doesn’t want to be found, our co-hosts Duck and David bring a unique perspective to real-world cybersecurity. ”Tales from the SOC” is your go-to podcast for exploring the weird and wonderful world of the Security Operations Center. Join us on this journey, because understanding is the first step to securing your world. For more information about our human-led cybersecurity services, head to: https://solcyber.com/
…
continue reading
1
How Do Cyber Criminals Really Operate Against Banks? Future Secured Ep 50 with Sandro Bucchianeri.
50:13
50:13
Play later
Play later
Lists
Like
Liked
50:13In this 50th episode of Future Secured, Sandro Bucchianeri, Chief Security Officer at National Australia Bank, takes us inside the uncomfortable reality of modern cybercrime: attackers operate with no boundaries, no legislation, and no regulators. They move fast, change partners instantly, and treat targets as simple commercial opportunities. On th…
…
continue reading
1
OpGCD Live! Sundaze!! - Vol. 25 - National Security:Legend of Danny Casolaro! - FREE PATREON PREVIEW - FREE PATREON PREVIEW
32:43
32:43
Play later
Play later
Lists
Like
Liked
32:43OpGCD Live! Sundaze!! - Vol. 25 - National Security:Legend of Danny Casolaro! - FREE PATREON PREVIEW Links for JJ - https://www.patreon.com/c/OperationGCD
…
continue reading
1
251 - The Future of Security Operations- Are SIEM, XDR, and SOAR Converging or Moving Apart?
22:24
22:24
Play later
Play later
Lists
Like
Liked
22:24Enjoying the content? Let us know your feedback! Today we're talking about the future of security operations, specifically three technologies that have dominated the conversation for the past few years: SIEM, XDR, and SOAR. And I'm going to make a case that might surprise some people: these tools are converging. They're merging into unified platfor…
…
continue reading
1
SANS Stormcast Thursday, November 20th, 2025: Unicode Issues; FortiWeb More Vulns; DLink DIR-878 Vuln; Operation WrtHug and ASUS Routers
6:34
6:34
Play later
Play later
Lists
Like
Liked
6:34Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names./32472 FortiWeb Multiple OS command injection in API and CLI A second silently patched vulnerability in FortiW…
…
continue reading
1
Lawfare Daily: The Duty to Disobey Unlawful Orders
53:05
53:05
Play later
Play later
Lists
Like
Liked
53:05News of a U.S. attack on a boat off the coast of Venezuela—which included a second strike on survivors of the first—has raised new concerns about the administration’s operations against alleged drug traffickers. Legal analysts, including some at Lawfare, call the second strike clearly unlawful. So why did the U.S. military agree to follow the order…
…
continue reading
1
'Back to the Future' with self-hosted bare metal
25:44
25:44
Play later
Play later
Lists
Like
Liked
25:44Rob Hirschfeld is the CEO and co-founder of RackN, founded in 2014, focused on "addressing the messy challenge of operating at scale in physical data centers," according to his LinkedIn profile. Hirschfeld has had a front-row seat to the last decade of conversations in enterprise IT ops about bare-metal server operations and cloud repatriation, top…
…
continue reading
1
SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on. https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Comma…
…
continue reading
Forget what you think you know about reality. The Rest Is Science is a mind-bending new show from Goalhanger that tears down familiar ideas… time, randomness, beauty, it will reveal just how bizarre the world truly is. Join Professor Hannah Fry and science creator Michael Stevens (aka Vsauce) twice a week to explore big, small and surprising questi…
…
continue reading
1
Bring your own model - Android Developers Backstage
58:26
58:26
Play later
Play later
Lists
Like
Liked
58:26In this episode Tor and Chet chat with Raluca Saucic and Eugene Yakavets about the new "Bring Your Own Model" feature in Android Studio which allows using other models than Gemini for agent mode, including models from Anthropic, OpenAI, and more. We also discuss using local models via Ollama and LM Studio. Resources: Use a remote model → https://go…
…
continue reading
Patch Tuesday. Federal prosecutors charge a Houston man with smuggling Nvidia chips to China, a Ukrainian woman for targeting critical infrastructure, and an Atlanta activist for wiping his phone. The power sector sees cyber threats doubling. The new Spiderman phishing kit slings its way across the dark web. Our guest is Dick O'Brien, Principal Int…
…
continue reading
1
Rational Security: The “Adverse Possession” Edition
1:04:41
1:04:41
Play later
Play later
Lists
Like
Liked
1:04:41This week, Scott sat down with Lawfare Managing Editor Tyler McBrien and Contributing Editor Alex Zerden to talk through a few of the week’s big national security news stories, including: “Finding the Road to Damascus.” Former dictator Bashar al-Assad fled Syria one year ago this week, bringing a precipitous end to the country’s more than decade-lo…
…
continue reading
1
NATO investing in space capabilities to enhance multi-domain operations, establish deterrence
48:24
48:24
Play later
Play later
Lists
Like
Liked
48:24Welcome to the inaugural episode of "The Elara Edge: International Insights Edition," where the leaders of the international space community join Elara Nova partners to share their insights and perspectives on the increasing strategic importance of space in joint force and alliance operations. In today's episode, Brad Head, Managing Director of Int…
…
continue reading
1
HOU.SEC.CON Live: Merging Physical & Cyber Security + The Future of Threat Intelligence
19:49
19:49
Play later
Play later
Lists
Like
Liked
19:49🔥 Episode Summary Guests: Steve Lupo (Chevron, Retired FBI) & Orlan Streams (RA Infrastructure) Sponsor: CyberOne Security (www.cyberonesecurity.com) Recorded live at HOU.SEC.CON, this episode brings together two unique perspectives shaping the cybersecurity landscape. First, David speaks with Steve Lupo, Event Security Advisor at Chevron and a ret…
…
continue reading
1
Lawfare Daily: The Defense Tech Paradox, with Susannah Glickman
52:18
52:18
Play later
Play later
Lists
Like
Liked
52:18Susannah Glickman, an assistant professor of history at Stony Brook University who specializes in the political economy of computation and information, sat down with Lawfare Associate Editor Olivia Manes to discuss the role of defense tech in the second Trump administration. Susannah unpacked her recent article in the New York Review of Books traci…
…
continue reading
1
RMR: The 8th Wonder of the Security Business (Here’s Why Buyers Pay More)
45:34
45:34
Play later
Play later
Lists
Like
Liked
45:34Hosts Stephen Olmon and Collin Trimble go deep on recurring monthly revenue (RMR) in the security and fire-alarm industry—why it’s the heartbeat of the business, the biggest driver of valuation confidence, and the single most stabilizing force for operators trying to scale without cash-flow whiplash. They unpack how RMR smooths payroll, fuels growt…
…
continue reading
1
Inside the Surge of Targeted Attacks: What It Means for Executive Protection
25:33
25:33
Play later
Play later
Lists
Like
Liked
25:33Host Fred Burton reunites with longtime colleague Scott Stewart, Vice President of Protective Intelligence at Torchstone Global, to unpack the evolving landscape of executive protection. Drawing on recent high-profile attacks and their own book, The Protective Intelligence Advantage, they explore how threat actors operate, what today’s organization…
…
continue reading
1
Civilian Service & Defence Leadership with HCol Corinne MacLellan
38:19
38:19
Play later
Play later
Lists
Like
Liked
38:19In this episode of Purpose & Protection, host Barry Pitcher, CEO of Commissionaires Nova Scotia, speaks with Corinne MacLellan, a communications strategist and Honorary Lieutenant Colonel of the Halifax Rifles, about the essential role of civilian leadership in Canada’s defence and security landscape. Corinne shares her journey of service, includin…
…
continue reading
1
Risky Business #818 -- React2Shell is a fun one
58:27
58:27
Play later
Play later
Lists
Like
Liked
58:27In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: There’s a CVSS 10/10 remote code exec in the React javascript server. JS server? U wot mate? China is out popping shells with it Linux adds support for PCIe bus encryption Amnesty International says Intellexa can just TeamViewer into its customers’ s…
…
continue reading
1
Risky Business #818 -- React2Shell is a fun one
58:27
58:27
Play later
Play later
Lists
Like
Liked
58:27In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: There’s a CVSS 10/10 remote code exec in the React javascript server. JS server? U wot mate? China is out popping shells with it Linux adds support for PCIe bus encryption Amnesty International says Intellexa can just TeamViewer into its customers’ s…
…
continue reading
1
SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches.
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution in ColdFusion, as well as the code execution issue in Acrobat, will very likely see exploits soon. h…
…
continue reading
1
107. Hunting Al-Qaeda: The War On Terror (Ep 2)
53:02
53:02
Play later
Play later
Lists
Like
Liked
53:02In the years following 9/11, the US launched the War on Terror to root out the most dangerous Al Qaeda operatives across the Middle East. Their determination to avenge those who lost their lives in the 2001 attacks was unrelenting, and they were willing to go to any lengths to win, even if that meant putting their trust into a jihadist turned Jorda…
…
continue reading
Organizations worldwide scramble to address the critical React2Shell vulnerability. Major insurers look to exclude artificial intelligence risks from corporate policies. Three Chinese hacking groups converge on the same Sharepoint flaws. Ransomware crews target hypervisors. A UK hospital asks the High Court to block publication of data stolen by th…
…
continue reading
1
Sea Control 592: The US Coast Guard in the Aleutian Islands
27:52
27:52
Play later
Play later
Lists
Like
Liked
27:52“Bases on the Aleutians Islands Would Project Power Across the Pacific,” by Steven Hulse, USNI (January 2025).By Steven Hulse, Walker Mills
…
continue reading
1
Five nines of wrong: Detecting drift and errors in AI systems
21:59
21:59
Play later
Play later
Lists
Like
Liked
21:59Uptime used to mean reliability. But in the LLM era, five nines just means your liar is always available. Real reliability now includes correctness and that means probing models in real time with prompts that have known answers. When those slip, your delivery fabric has to reroute before customers find out. In this episode F5's Lori MacVittie, Joel…
…
continue reading
1
445: Linus Tech Tips Explodes Linux: Our Reaction & The 2025 Gift Guide
1:04:02
1:04:02
Play later
Play later
Lists
Like
Liked
1:04:02The Ultimate Geek Gift Guide for 2025 is here! Don't buy that RAM yet—we explain the massive AI-driven price spikes. Also, testing the powerful VDO Ninja for streaming and our reaction to Linus Tech Tips' latest Linux takes. 00:00:00 Intro 00:01:54 Community Feedback 00:07:34 Testing Out VDO Ninja: Open Source or Bust 00:09:15 Sandfly Security 00:1…
…
continue reading
Neil Johnson's been building some incredible tools for Mac Admins of late, and we wanted to sit down with him and talking through Apple Policy Explorer and some others. What's it like building tools these days, where do you start? Who is the right audience to design for? We'll dive deep on his process here this week, as well as talk about what's go…
…
continue reading
1
Lawfare Daily: Wikipedia, Ref-Working, and the Battle Over Reality
50:31
50:31
Play later
Play later
Lists
Like
Liked
50:31Wikipedia is more than an encyclopedia. It’s a key part of the internet’s information infrastructure—shaping what people know, what AI models learn, and what the public sees as true. But in an era of geopolitical conflict, AI disruption, and fracturing trust, Wikipedia has come under attack. In this episode, Renée DiResta talks with Wikipedia found…
…
continue reading
In this episode, host Kim Jones examines the rapid rise of enterprise AI and the tension between innovation and protection, sharing an RSA anecdote that highlights both excitement and concern. He outlines the benefits organizations hope to gain from AI while calling out often-overlooked risks like data quality, governance, and accountability. Kim i…
…
continue reading
1
SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as undocumented may actually be documented in the underlying hardware description. https://www.tomshardware.com/tech-industry/cyber-security/researcher-finds-undocumented-microphone-and-major-security-flaws-in…
…
continue reading
How might Trump’s new National Security Strategy impact cyber? The UK’s NCSC warns LLMs may never get over prompt injection. At least 18 U.S. universities were hit by a months-long phishing campaign. Russia blocks FaceTime. A bipartisan group of senators reviving efforts to strengthen protections across the health sector. Portugal provides legal sa…
…
continue reading
1
Is America’s Military Too Dependent on Contractors? The Battle Over Right to Repair
40:44
40:44
Play later
Play later
Lists
Like
Liked
40:44Text the ATB Team! We'd love to hear from you! In this episode of At the Boundary, GNSI Research Fellow Dr. Guido Rossi sits down with Terry Guild, a former senior U.S. Army intelligence officer with a 30–year military career and five years of experience in the defense industry at CAE and Intrinsic Ventures. Together, they unpack one of the most co…
…
continue reading
1
How CISOs Must Lead the Next Generation | Moses Bulus on AI, Data Security & Hybrid IT (Ep. 91)
44:02
44:02
Play later
Play later
Lists
Like
Liked
44:02🔥 Episode Summary In this St. Louis tour-stop episode, David Malicoat sits down with cybersecurity leader Moses Bulus to explore what it truly means to evolve into a professional CISO. Moses shares his journey from early developer to building security programs from scratch, and ultimately into executive leadership — showing how business acumen, net…
…
continue reading
1
Lawfare Daily: The Trials of the Trump Administration, Dec. 5
1:37:47
1:37:47
Play later
Play later
Lists
Like
Liked
1:37:47In a live conversation on YouTube, Lawfare Executive Editor Natalie Orpett sat down with Lawfare Senior Editors Anna Bower, Michael Feinberg, Molly Roberts, Roger Parloff and Eric Columbus and Lawfare Contributing Editor James Pearce to discuss the arrest of a suspect in the attempted bombing on Jan. 6, 2021, a hearing in NPR’s lawsuit over the Tru…
…
continue reading
1
SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34AutoIT3 Compiled Scripts Dropping Shellcodes Malicious AutoIT3 scripts are usign the FileInstall function to include additional scripts at compile time that are dropped as temporary files during execution. https://isc.sans.edu/diary/AutoIT3%20Compiled%20Scripts%20Dropping%20Shellcodes/32542 React2Shell Update The race is on to patch vulnerable syst…
…
continue reading
1
The Myth of Anxiety with Neuroscientist Dr. Rachel Taylor (Part 1)
46:33
46:33
Play later
Play later
Lists
Like
Liked
46:33The Myth of Anxiety with Neuroscientist Dr. Rachel Taylor (Part 1) The Black Spy Podcast 222, Season 23, Episode 0002 Episode 1 – The Anxiety Myth: What If Everything We Think We Know Is Wrong? Is anxiety really a mental health crisis—or have we misunderstood the entire phenomenon? In this week's Black Spy Podcast, Carlton King and Neuroscientist D…
…
continue reading
1
106. Hunting Al-Qaeda: Anatomy Of A Terrorist (Ep 1)
55:10
55:10
Play later
Play later
Lists
Like
Liked
55:10On 30 December 2009, an Al Qaeda terrorist detonated a bomb inside a CIA station in Afghanistan. This is the story of how a quiet doctor from Jordan became responsible for one of the deadliest days in CIA history. Listen as David and Gordon chart the rise of Humam Khalil Abu-Mulal al-Balawi from a doctor working in a Palestinian refugee camp to one…
…
continue reading
1
The Evolution and Future of Digital Extortion
23:20
23:20
Play later
Play later
Lists
Like
Liked
23:20In the final episode of “Inside the Mind of a Ransomware Operator,” Chris and Nick look ahead to the next decade of cybercrime. What happens when ransomware goes fully autonomous? AI that picks the most valuable files… then negotiates the ransom in 17 languages Malware that mimics real human behavior so perfectly that EDR can’t tell the difference …
…
continue reading
1
Lawfare Archive: Lynzy Billing on Afghanistan's Zero Unit Night Raids
42:27
42:27
Play later
Play later
Lists
Like
Liked
42:27From January 24, 2023: In 2019, investigative journalist and photographer Lynzy Billing went to Afghanistan to investigate a very personal story: her own past. In the process, she discovered what she came to call a classified war, one with lines of accountability so obscured that no one had to answer publicly for operations that went wrong. Lawfare…
…
continue reading
1
Jon DiMaggio: Two roads diverged. [Strategy] [Career Notes]
9:19
9:19
Play later
Play later
Lists
Like
Liked
9:19Please enjoy this encore of Career Notes. Chief security strategist from Analyst1, Jon DiMaggio shares his story on how he grew to become a part of the cybersecurity world. He describes different jobs that paved the way to the knowledge he has in the industry right now, and he even shares about an experience that led him to a path that split and wh…
…
continue reading
1
The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin)
30:14
30:14
Play later
Play later
Lists
Like
Liked
30:14The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin) When attackers breached HubSpot in March 2022, they weren’t after HubSpot at all. They were after the customers of its customers. Crypto firms like Trezor, BlockFi, and Swan Bitcoin suddenly saw their users targeted by near-perfect phishing emails designed to st…
…
continue reading
In late 2023, the world’s most trusted identity provider experienced the kind of breach it was designed to prevent. Attackers quietly infiltrated Okta’s customer support system, stole session tokens hidden inside HAR files and used them to impersonate users across some of the most secure organizations on earth. For two full weeks, the intruders ope…
…
continue reading
In this episode, we explore the hidden human cost of major cyber incidents—the stress on IT teams, the disruption to patient care, the executives forced into impossible decisions, and the ripple effects felt by everyday people who rely on critical systems. Beyond the technical breakdown, we examine how breaches impact lives, strain organizations, a…
…
continue reading
Ace investigative reporter Carol Leonnig talks about her latest scoop and new book on Trump’s DoJ, “Injustice: How Politics and Fear Vanquished America's Justice Department.” Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Karen Greenberg on Twitter https://x.com/KarenGreenberg3 Follow Michael Isikoff on Twitter: https://twitter.…
…
continue reading