Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Security Protocols Podcasts
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
The Defender’s Advantage Podcast explores the world of cyber security and Mandiant through three distinct tracks. Threat Trends: Listen twice a month as host Luke McNamara interviews guests on the latest in cyber security research, the cyber landscape, and the latest news from Mandiant. Frontline Stories: Listen to Kerry Matre monthly as she is joined by notable guests on the frontlines of cyber security, including Mandiant customers, security professionals, and executives. Skills Gap: List ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading

1
DoD Secure-Working with National Industrial Security Program
jeffrey W. Bennett, ISP, SAPPC, SFPC, ISOC
Interviews and topics centering on security clearances and protecting classified information according to the National Industrial Security Clearance Operating Manual (NISPOM).
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Blockcast delivers unfiltered analysis of crypto's most compelling narratives. Each week, seasoned industry insider Takatoshi Shibayama sits down with founders, CEOs, and key players shaping the blockchain landscape to dissect emerging projects, market dynamics, and institutional moves. From trending protocols to strategic industry shifts, get an insider's take on the forces driving decentralized innovation and the decisions that matter. No fluff, no hype—just deep dives into what's really h ...
…
continue reading
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
…
continue reading
Are you a successful, female-assigned-at-birth professional, aged 24–38, who secretly struggles with repeated heartbreak, emotional exhaustion, and painful relationship cycles, despite outward success? Do you find yourself overwhelmed by intense feelings of abandonment, rejection, inadequacy, or confusion, wondering why lasting love and emotional security feel out of reach? The CPTSD Medicine Podcast is explicitly designed for you. I’m Dr. Tanner Wallace, IFS Level 3 Practitioner, trauma rec ...
…
continue reading
Are you a cyber defender looking to keep up on the newest tools, technology, and security concepts? Then BLUEPRINT is the podcast for you! Tune in to hear the latest in cyber defense and security operations from blue team leaders and experts. With a focus on learning, BLUEPRINT includes interviews with today’s top security practitioners defending the world’s most respected brands, and in-depth explanations on the newest technologies, protocols, and defensive tools. BLUEPRINT, is a podcast ho ...
…
continue reading
Technical interviews about software topics.
…
continue reading
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
continue reading
On Bloom Fireside we speak with the partners and individuals helping us build the Bloom protocol, and working to get it in the hands of everyday people who will use it and benefit from it. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The PiratePod is a Web3 focused podcast from Arrington Capital where we set sail into the uncharted waters of Web3 entrepreneurship and those building the at the forefront of crypto. Episodes will celebrate and interview the bold risk-takers and adventurers who dare to defy the norm. These modern-day pirates are founders who lust after the thrill of venturing into the unknown and thrive on the exhilarating web3 startup life itself. We will dive into new apps, defi, trading, infrastructure, c ...
…
continue reading
Monero Talk broadcasts weekly conversations on YouTube (https://www.youtube.com/c/monerotalk) with topical guests to understand what the Monero cryptocurrency is today and what it hopes to become. We strive to give birth to new Monero users by simply reporting on the facts in our search to answer the question--Is Monero the truest cryptocurrency of them all? In staying true to the Monero ethos, we aim to always be skeptical. While we are Monero Talk by name, and Monero devotees at heart, the ...
…
continue reading
Security issues are increasingly on the front burner for many individuals, corporates and Security practitioners. Whether it be kidnapping, banditry, terrorism, armed robbery etc. We all seem to know someone who has been a victim even when we personally have not
…
continue reading
This podcast is dedicated to helping all humans find a prosperous life. The host Jim Johnson has been using his "Prosperity Protocol" for more than a decade to find balance and fulfillment in a chaotic ever changing world. Guests on the show will be focused on the 7 pillars of the "Prosperity Protocol", Work Fulfillment, Time & Financial Security, Community, Health & Performance, Leadership, Creativity & Curiosity, Spiritual Growth & Development. They will share life experience, practical ap ...
…
continue reading
This podcast features all things related to Information Security and Cyber Security
…
continue reading
Join host Brian Rose as he explores groundbreaking ideas in crypto, decentralized finance, politics, personal development and beyond. Featuring candid conversations with world-renowned guests, London Real is your gateway to transformative insights and action. Featured Guests Include: Patrick Bet-David, Jordan Peterson, Tim Ferriss, Jocko Willink, Graham Hancock, David Goggins, Dr. David Sinclair, Wim Hof, Dan Peña, Dr. Joe Dispenza, Robert Kiyosaki, Grant Cardone, Dr. Gabor Maté, David Icke, ...
…
continue reading
The Trident is produced by the Center on Irregular Warfare and Armed Groups (CIWAG). Director, Dave Brown, Col. (Retired), speaks with a variety of professionals, academics, and other experts to explore threats and challenges, in the international security environment, that both directly and indirectly relate to the field of irregular warfare.
…
continue reading
Join Dan Vega and DaShaun Carter as they explore what’s new in the world of Spring. This is your chance to stay connected to what’s happening with the Spring Framework, related projects, and the community.
…
continue reading
Bitcoin pioneer Charlie Shrem peels back the layers on the lives and backgrounds of the world's most impactful innovators. Centering around intimate narratives, Shrem uncovers a detailed, previously unspoken story of the genesis and evolution of bitcoin, cryptocurrency, artificial intelligence, and the web3 movements. Join Shrem as he journeys through the uncharted territories of tech revolutions, revealing the human side of the stories that shaped the digital world we live in today.
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
DeFi Watch's Chris Blec engages in honest conversations with DeFi teams about the transparency & decentralization of their decentralized finance applications & protocols. Support this podcast: https://podcasters.spotify.com/pod/show/proof-of-decentralization/support
…
continue reading
Resilient Cyber brings listeners discussions from a variety of Cybersecurity and Information Technology (IT) Subject Matter Experts (SME) across the Public and Private domains from a variety of industries. As we watch the increased digitalization of our society, striving for a secure and resilient ecosystem is paramount.
…
continue reading
Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
…
continue reading
In an increasingly unpredictable world, knowledge and preparation are your best defense. Brought to you by the Preparedness Protocol Experts (P.P.E Team), this is an educational podcast delivering expert insights on Chemical, Biological, Radiological, and Nuclear (CBRN) threats, cutting-edge survival tactics, and comprehensive disaster preparedness strategies for today's complex risk landscape. Each episode features in-depth analysis of historical disasters, emerging threats, practical survi ...
…
continue reading
Almost Diplomatic is a podcast discussing geopolitics, national security and nonsense over beers. Disclaimer: The comments and views discussed in the podcast are our own and do not represent those of any entity we volunteer with or are employed by.
…
continue reading
The Wireless Environmental Monitor by TempGenius offers a highly reliable and scalable solution for facilities that demand precision in environmental tracking. Designed for industries like healthcare, pharmaceuticals, laboratories, and food services, this wireless monitoring system delivers real-time data to help maintain compliance, safety, and operational efficiency. Equipped with advanced sensors, TempGenius monitors critical metrics including temperature, humidity, air pressure, CO₂ leve ...
…
continue reading
Welcome to the Guide to Short-Term Rental (STR) Management, a resource tailored for professional property managers. Unlike casual hosting, this role demands business expertise, profitability focus, and consistent value delivery to property owners. Laying the Foundation Start by establishing a strong legal and financial structure. Secure essential insurance policies like General Liability and Errors & Omissions (Professional Liability). Understand licensing and zoning rules by region, address ...
…
continue reading
Welcome to the Future of Threat Intelligence podcast, where we explore the transformative shift from reactive detection to proactive threat management. Join us as we engage with top cybersecurity leaders and practitioners, uncovering strategies that empower organizations to anticipate and neutralize threats before they strike. Each episode is packed with actionable insights, helping you stay ahead of the curve and prepare for the trends and technologies shaping the future.
…
continue reading
Human-curated AI podcast for a lightweight technology discussion. I am a Network Engineer with two decades of experience working with Fortune 500 enterprise clients and tier 1 service providers. I also, operate a YouTube channel called SDN Tech Forum, where I share my knowledge and expertise on the latest networking technologies. My channel covers various topics, including Cisco SDA, SD-WAN,, Meraki, Thousandeyes, AWS, IoT, Cybersecurity, and more.
…
continue reading
Henri Arslanian brings you in-depth discussions and constructive analyses of the developments shaping the future of money and finance from Bitcoin and cryptocurrencies to CBDCs and DeFi
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
…
continue reading
ConTejas Code is a podcast in the web engineering space that has deep dives on various topics between frontend engineering with React, TypeScript, Next.js, and backend engineering with Kafka, Postgres, and more. The series is a mix of long-form content and guest episodes with industry leaders in the web engineering space. From the podcast, listeners will take away actionable best practices that you can integrate into your workflows as well as valuable insights from prominent people in the in ...
…
continue reading
Breaking Point – Tensions at Home and Abroad March 18, 2025 | Your Voice – Voices of America Podcast Good morning, America! Today’s episode of Your Voice delivers the stories shaping our world—from escalating conflicts overseas to major political shake-ups right here at home. Buckle up, because this one’s packed with breaking news, critical insights, and the bold discussions you’ve come to expect. 🔥 Middle East on Edge: Overnight Israeli airstrikes hit multiple targets in Gaza following rene ...
…
continue reading

1
The Smart Economy Podcast: Real-World Blockchain Applications with Crypto, DeFi, NFTs, and DAOs
Ragnarok Digital, LLP
The Smart Economy Podcast features interviews with some of the most interesting people within the blockchain industry, working to make the new smart economy a reality.
…
continue reading

1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
Exploring cross-chain composability in a multi-chain world. Composable is a bi-weekly podcast hosted by Alysia and Ellie. Brought to you by Espresso Pods.
…
continue reading

1
SANS Stormcast Monday, August 4th, 2025: Legacy Protocols; Sonicwall SSL VPN Possible 0-Day;
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17Scans for pop3user with guessable password A particular IP assigned to a network that calls itself Unmanaged has been scanning telnet/ssh for a user called pop3user with passwords pop3user or 123456 . I assume they are looking for legacy systems that either currently run pop3 or ran pop3 in the past, and left the user enabled. https://isc.sans.edu/…
…
continue reading

1
SANS Stormcast Sunday, August 03, 2025: Legacy Protocols; Sonicwall SSL VPN Possible 0-Day; (#)
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18SANS Stormcast Sunday, August 03, 2025: Legacy Protocols; Sonicwall SSL VPN Possible 0-Day; Scans for pop3user with guessable password A particular IP assigned to a network that calls itself “Unmanaged” has been scanning telnet/ssh for a user called “pop3user” with passwords “pop3user” or “123456”. I assume they are looking for legacy systems that …
…
continue reading

1
David Carvalho - The Cyber Mesh Revolution: Why Naoris Protocol Will Secure The Digital Future
1:14:31
1:14:31
Play later
Play later
Lists
Like
Liked
1:14:31🛡️ Welcome to the dawn of the Cyber Mesh Revolution 🌐💥 Brian Rose sits down with David Carvalho to unravel how Naoris Protocol is redefining digital trust 🔐 and securing decentralized networks from within. Say goodbye to single points of failure 🚫—this blockchain-powered mesh defends everything from smart cities to AI systems 🤖🏙️. Discover why cybe…
…
continue reading

1
Episode 115: Security in Model Context Protocol (MCP)
51:58
51:58
Play later
Play later
Lists
Like
Liked
51:58In this episode, Michael, Sarah and Mark talk to Den Delimarksy about the current posture of Model Context Protocol. Den serves on the committee that oversees MCP. We also cover the latest security news about Azure Firewall, OpenTelemetry, Azure Front Door, Azure Database for PostgreSQL and Azure Kubernetes Service. https://aka.ms/azsecpod…
…
continue reading

1
302 - A brief overview of Model Context Protocol (MCP)
33:00
33:00
Play later
Play later
Lists
Like
Liked
33:00In this week's episode, we break down Model Context Protocol, or MCP. What is it, why should you care, and how does it change your solutions? We discuss the concept, the architecture, and share our experiences working with MCP solutions. (00:00) - Intro and catching up. (03:02) - Show content starts. Show links - MCP home: modelcontextprotocol.io -…
…
continue reading

1
SANS Stormcast Wednesday, August 6th, 2025: Machinekeys and VIEWSTATEs; Perplexity Unethical Learning; SonicWall Updates
7:41
7:41
Play later
Play later
Lists
Like
Liked
7:41Stealing Machinekeys for fun and profit (or riding the SharePoint wave) Bojan explains in detail how .NET uses Machine Keys to protect the VIEWSTATE, and how to abuse the VIEWSTATE for code execution if the Machine Keys are lost. https://isc.sans.edu/diary/Stealing%20Machine%20Keys%20for%20fun%20and%20profit%20%28or%20riding%20the%20SharePoint%20wa…
…
continue reading

1
SANS Stormcast Wednesday, August 6th, 2025: Machinekeys and VIEWSTATEs; Perplexity Unethical Learning; SonicWall Updates (#)
7:42
7:42
Play later
Play later
Lists
Like
Liked
7:42SANS Stormcast Wednesday, August 6th, 2025: Machinekeys and VIEWSTATEs; Perplexity Unethical Learning; SonicWall Updates Stealing Machinekeys for fun and profit (or riding the SharePoint wave) Bojan explains in detail how .NET uses Machine Keys to protect the VIEWSTATE, and how to abuse the VIEWSTATE for code execution if the Machine Keys are lost.…
…
continue reading

1
Colonel Douglas Macgregor - Hezbollah Is Already Inside America: This Ends in Global War
58:03
58:03
Play later
Play later
Lists
Like
Liked
58:03Hezbollah Is Already Inside America: This Ends in Global War - Brian Rose of London Real with Colonel Douglas Macgregor 🔥 In this explosive interview, Colonel Douglas Macgregor reveals chilling truths about national security, global conflict, and the hidden presence of Hezbollah within U.S. borders🇺🇸. Is America already compromised from within? Wha…
…
continue reading

1
🎬Colonel Douglas Macgregor - Hezbollah Is Already Inside America: This Ends in Global War
1:37
1:37
Play later
Play later
Lists
Like
Liked
1:37Hezbollah Is Already Inside America: This Ends in Global War - Brian Rose of London Real with Colonel Douglas Macgregor 🔥 In this explosive interview, Colonel Douglas Macgregor reveals chilling truths about national security, global conflict, and the hidden presence of Hezbollah within U.S. borders🇺🇸. Is America already compromised from within? Wha…
…
continue reading

1
S4E21 - VMware Explore / SpringOne 2025 Preview
1:01:08
1:01:08
Play later
Play later
Lists
Like
Liked
1:01:08Join Dan Vega and DaShaun Carter for the latest updates from the Spring Ecosystem. In this episode, Dan and DaShaun preview the upcoming VMware Explore / SpringOne conference, sharing insights into what attendees can expect from this premier Spring community event. The hosts discuss their upcoming conference sessions, highlight key presentations an…
…
continue reading

1
Electron and Desktop App Engineering with Shelley Vohr
50:59
50:59
Play later
Play later
Lists
Like
Liked
50:59Electron is a framework for building cross-platform desktop applications using web technologies like JavaScript, HTML, and CSS. It allows developers to package web apps with a native-like experience by bundling them with a Chromium browser and Node.js runtime. Electron is widely used for apps like VS Code, Discord, and Slack because it enables a si…
…
continue reading

1
Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:"Global Cyber Alliance's Phil Reitinger talks DMARC adoptio…
…
continue reading

1
Work from home, malware included. [OMITB]
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena…
…
continue reading
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena…
…
continue reading

1
Sustainability in Technology: A New Era
1:00:21
1:00:21
Play later
Play later
Lists
Like
Liked
1:00:21In this episode, host KJ Burke speaks with Frances Edmonds, head of sustainable impact at HP Canada, about the intersection of sustainability and technology. They discuss the importance of a circular economy, the role of procurement in sustainability, and the challenges organizations face in implementing sustainable practices. Frances shares insigh…
…
continue reading

1
SANS Stormcast Tuesday, August 05, 2025: Daily Trends Report; NVidia Triton RCE; Cursor AI Misconfiguration
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48Daily Trends Report A new trends report will bring you daily data highlights via e-mail. https://isc.sans.edu/diary/New%20Feature%3A%20Daily%20Trends%20Report/32170 NVidia Triton RCE Wiz found an interesting information leakage vulnerability in NVidia s Triton servers that can be leveraged to remote code execution. https://www.wiz.io/blog/nvidia-tr…
…
continue reading

1
SANS Stormcast Tuesday, August 05, 2025: Daily Trends Report; NVidia Triton RCE; Cursor AI Misconfiguration (#)
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48SANS Stormcast Tuesday, August 05, 2025: Daily Trends Report; NVidia Triton RCE; Cursor AI Misconfiguration Daily Trends Report A new trends report will bring you daily data highlights via e-mail. https://isc.sans.edu/diary/New%20Feature%3A%20Daily%20Trends%20Report/32170 NVidia Triton RCE Wiz found an interesting information leakage vulnerability …
…
continue reading

1
Resilient Cyber w/ Sid Trivedi - Black Hat, Cyber and AI Opportunities
27:31
27:31
Play later
Play later
Lists
Like
Liked
27:31In this episode we sit down with Sid Trivedi, Partner at venture capital firm Foundational Capital and host of the Inside the Network podcast. Sid brings great insights around cybersecurity market trends, industry events such as Black Hat and the impact that AI is having on the startup and venture capital ecosystem.…
…
continue reading

1
Inside Coinbase’s Plan to Make Bitcoin Your Credit Card Rewards with Michael Rihani
23:47
23:47
Play later
Play later
Lists
Like
Liked
23:47In this episode of The Charlie Shrem Show, Charlie is joined by Michael Rihani, Head of Product at Coinbase, to talk about how Bitcoin is finally going mainstream—not just as an investment, but as a spendable, usable financial asset. Michael breaks down the launch of Coinbase’s new American Express-powered credit card, which gives users up to 4% ba…
…
continue reading
Have you ever found yourself caught in the intense cycle of reactivity during conflicts, feeling completely overwhelmed and disconnected from your True Self? If so, you are not alone, and there’s hope. In this practical episode, Tanner explores the underlying causes of emotional reactivity during conflict for those healing from CPTSD. She provides …
…
continue reading

1
MoneroTopia Episode 225! | Price, News & MUCH MORE!
2:44:32
2:44:32
Play later
Play later
Lists
Like
Liked
2:44:3247e6GvjL4in5Zy5vVHMb9PQtGXQAcFvWSCQn2fuwDYZoZRk3oFjefr51WBNDGG9EjF1YDavg7pwGDFSAVWC5K42CBcLLv5U OR DONATE HERE: https://www.monerotalk.live/donate GUEST LINKS: https://x.com/DontTraceMeBruh TIMESTAMPS (00:00:00) Monerotopia Introduction. (00:14:18) Monerotopia Guest Segment w/ Untraceable. (00:32:09) Monerotopia Price Report Segment w/ Bawdyanarchi…
…
continue reading

1
Andrew Bustamante - CIA Spy: Donald Trump Had No Choice But To Strike Iran
58:04
58:04
Play later
Play later
Lists
Like
Liked
58:04🔥 Former CIA covert ops expert Andrew Bustamante drops bombshell intel with Brian Rose of London Real 🎙️. The real story behind Trump’s shadow war in the Middle East — and why it’s far from over. 🧨 From espionage tactics to geopolitical chess moves, this high-stakes interview pulls back the curtain 🎯. Secrets, strategy, and unsettling truths collid…
…
continue reading

1
UMA & Across: Optimistic Oracles & Intent-Based Bridges for Unifying Ethereum - Hart Lambur
1:11:16
1:11:16
Play later
Play later
Lists
Like
Liked
1:11:16Universal Market Access (UMA) was founded by 2 ex Goldman Sachs traders that wanted to make global markets universally accessible through financial smart contracts that used synthetic assets on Ethereum. However, this was taking place long before the massive boom of DeFi summer of 2020. As a result, UMA shifted to building an optimistic oracle to p…
…
continue reading

1
Why the Unworthiness Wound Keeps You Stuck in CPTSD Cycles (And How to Heal)
41:07
41:07
Play later
Play later
Lists
Like
Liked
41:07In this illuminating episode of the CPTSD Medicine Podcast, Tanner Wallace, Ph.D., Level 3 IFS Practitioner and former professor, reconnects with listeners, reflecting on personal milestones and the profound reciprocal relationship with CPTSD Medicine. Tanner explores the challenging reality therapists face: burnout from working with CPTSD clients …
…
continue reading

1
🎬Andrew Bustamante - CIA Spy: Donald Trump Had No Choice But To Strike Iran
1:49
1:49
Play later
Play later
Lists
Like
Liked
1:49🔥 Former CIA covert ops expert Andrew Bustamante drops bombshell intel with Brian Rose of London Real 🎙️. The real story behind Trump’s shadow war in the Middle East — and why it’s far from over. 🧨 From espionage tactics to geopolitical chess moves, this high-stakes interview pulls back the curtain 🎯. Secrets, strategy, and unsettling truths collid…
…
continue reading

1
SANS Stormcast Friday, August 1st, 2025: Scattered Spider Domains; Excel Blocking Dangerous Links; CISA Releasing Thorium Platform
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41Scattered Spider Related Domain Names A quick demo of our domain feeds and how they can be used to find Scattered Spider related domains https://isc.sans.edu/diary/Scattered+Spider+Related+Domain+Names/32162 Excel External Workbook Links to Blocked File Types Will Be Disabled by Default Excel will discontinue allowing links to dangerous file types …
…
continue reading

1
Running Doom in TypeScript’s Type System with Dimitri Mitropoulos - JSJ 684
1:18:14
1:18:14
Play later
Play later
Lists
Like
Liked
1:18:14What if I told you someone managed to run Doom inside TypeScript’s type system? Sounds insane, right? That’s exactly what our guest Dimitri Mitropoulos did—and in this episode, we dive deep into the how, the why, and the mind-bending implications of this ambitious project. From type-level programming to the philosophical limits of Turing completene…
…
continue reading

1
SANS Stormcast Friday, August 1st, 2025: Scattered Spider Domains; Excel Blocking Dangerous Links; CISA Releasing Thorium Platform (#)
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42SANS Stormcast Friday, August 1st, 2025: Scattered Spider Domains; Excel Blocking Dangerous Links; CISA Releasing Thorium Platform Scattered Spider Related Domain Names A quick demo of our domain feeds and how they can be used to find Scattered Spider related domains https://isc.sans.edu/diary/Scattered+Spider+Related+Domain+Names/32162 Excel Exter…
…
continue reading

1
Merged Mining and Proof of Useful Work - Security Implications for Monero. W/ Francisco Cabanas | EPI 358
1:17:01
1:17:01
Play later
Play later
Lists
Like
Liked
1:17:01Any donation is greatly appreciated! 47e6GvjL4in5Zy5vVHMb9PQtGXQAcFvWSCQn2fuwDYZoZRk3oFjefr51WBNDGG9EjF1YDavg7pwGDFSAVWC5K42CBcLLv5U OR DONATE HERE: https://www.monerotalk.live/donate TODAY'S SHOW: This episode of Monero Talk featured a discussion with Arctic (Francisco) on key developments in Monero and the broader crypto ecosystem. Arctic shared …
…
continue reading

1
Episode 116: Microsoft Sentinel Data Lake
40:03
40:03
Play later
Play later
Lists
Like
Liked
40:03In this episode Michael, Sarah and Mark talk to Mark Kendrick about Microsoft Sentinel Data Lake. We also cover news about The Open Group - Roles and Glossary standards, Security Adoption Module 5 - Data Security, Microsoft Azure Cloud HSM, WAF and Containers, PostgreSQL and PowerBI, Azure Managed Lustre, and more. Also, Sarah mentions some Develop…
…
continue reading

1
Why Everything Will Trade 24/7: Pyth’s Mission to Bring TradFi On-Chain
54:39
54:39
Play later
Play later
Lists
Like
Liked
54:39In this episode of The Smart Economy Podcast, host Dylan Grabowski is joined by Marc Tillement, Director of the Pyth Data Association, an independent entity pursuing decentralized financial data distribution through the Pyth Network ecosystem. Together, they explore how Pyth Network aims to transform financial data distribution through its oracle n…
…
continue reading

1
Digital Asset Redemption's Steve Baer on Criminal Business Models
24:42
24:42
Play later
Play later
Lists
Like
Liked
24:42The economics of ransomware reveal a sophisticated criminal enterprise that most security leaders dramatically underestimate. Steve Baer, Field CISO at Digital Asset Redemption, operates at the intersection of cybercrime and legitimate business, where his team's human intelligence gathering in Dark Web communities provides early warning systems tha…
…
continue reading

1
Modal and Scaling AI Inference with Erik Bernhardsson
39:55
39:55
Play later
Play later
Lists
Like
Liked
39:55Modal is a serverless compute platform that’s specifically focused on AI workloads. The company’s goal is to enable AI teams to quickly spin up GPU-enabled containers, and rapidly iterate and autoscale. It was founded by Erik Bernhardsson who was previously at Spotify for 7 years where he built the music recommendation system and the popular Luigi …
…
continue reading
In this special episode of Hacking Humans, while Joe and Maria take a well-earned summer break, we’re joined by a special guest host: Rob Allen, Chief Product Officer at ThreatLocker. Rob dives into the tactics and profile of the cybercriminal group known as Scattered Spider—a crew that’s gained notoriety for its cunning use of social engineering o…
…
continue reading

1
SANS Stormcast Thursday July 31st, 2025: Firebase Security; WebKit Vuln Exploited; Scattered Spider Update
6:40
6:40
Play later
Play later
Lists
Like
Liked
6:40Securing Firebase: Lessons Re-Learned from the Tea Breach Inspried by the breach of the Tea app, Brendon Evans recorded a video to inform of Firebase security issues https://isc.sans.edu/diary/Securing%20Firebase%3A%20Lessons%20Re-Learned%20from%20the%20Tea%20Breach/32158 WebKit Vulnerability Exploited before Apple Patch A WebKit vulnerablity patch…
…
continue reading