Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Security Testing Podcasts
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Step into the ever-evolving world of cybersecurity with the offensive security group from SecurIT360. We’re bringing you fresh content from our journeys into penetration testing, threat research and various other interesting topics. [email protected]
…
continue reading
The TestGuild Automation Testing Podcast (formerly TestTalks) is the longest-running podcast dedicated to test automation, releasing new weekly episodes since 2014. Hosted by Joe Colantonio, this podcast is for software testers, automation engineers, and developers who want practical, real-world insights to improve automation reliability, reduce flaky tests, and stay ahead of modern testing trends. Each episode features in-depth conversations with leading automation experts, tool creators, a ...
…
continue reading
Two CISOs and a security-minded friend discuss and debate topics of security and privacy, with a focus on looking at the topic from various angles, both that they support and those they don't. Sign up for our newsletter to be notified when new episodes drop, or when new projects are announced https://newsletter.greatsecuritydebate.net
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
[email protected] (SE-Radio Team)
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. SE Radio is brought to you by the IEEE Computer Societ ...
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals commit ...
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading
Mind4Survival Podcast is for people who take survival, prepping, and preparedness seriously. Hosted by Brian Duff, each episode delivers no-nonsense strategies preppers can use in real life. From mindset and situational awareness to safety and self-reliance, this is prepping with purpose.
…
continue reading
The Security Briefing is the official podcast from the organisers of The Security Event. Each episode brings together industry leaders, innovators, and frontline professionals to discuss the latest trends, technologies, and challenges shaping the future of security. From cyber to physical, strategy to innovation, this is your inside track on the issues that matter most to security professionals today.
…
continue reading
Helping people build practical emergency preparedness, situational awareness, and survival skills—so they can confidently protect their families and thrive in any crisis.
…
continue reading
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Smooth Scaling: System Design for High Traffic focuses on all things scalability, reliability, and performance. Tune in for expert advice on how to scale systems, control costs, boost availability, optimize performance, and get the most out of your tech stack. Host Jose Quaresma is the VP of Technical Engagement at Queue-it, working on the frontlines with some of the world’s biggest businesses on their busiest days, from Ticketmaster to Zalando to Home Office U.K. He’ll be joined by experts ...
…
continue reading
The Rachel Maddow Show airs Mondays at 9pm ET on MS NOW and drops shortly thereafter in this feed.
…
continue reading
Sirens, a new podcast from the ladies of Bombshell, dissects the institutions of American power. With their trademark wit and charm, join Loren DeJonge Schulman, Radha Iyengar Plumb, and Erin Simpson as they sound the alarm on technology, governance, and national security issues. (And maybe lure men to their deaths.)
…
continue reading
The SMC Journal is a podcast about all things related to Software Engineering, Performance, DevOps, Observability, Cloud Computing, Security, AI, and much more.
…
continue reading
Australian comedy duo Hamish Blake and Andy Lee continue to taunt each other and their button-pusher Jack with a weekly show that is more about their listeners than it is about themselves. Hamish & Andy question and test the smaller things in life, no pondering too small. Visit hamishandandy.com
…
continue reading
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
…
continue reading
Phillip Wylie interviews cybersecurity industry experts on offensive security and techniques around penetration testing and red teaming.
…
continue reading
Listen for today's top stories, with context, in just 15 minutes. Get informed from Bloomberg's 3,000 journalists and analysts.
…
continue reading
f
…
continue reading
SquareX is excited to launch The Be Fearless Podcast Series, where we bring together industry experts and professionals from the cybersecurity community. Hosted by SquareX Founder - and cybersecurity veteran - Vivek Ramachandran, look forward to insights about our guests’ journeys in security, the evolution of the field, the changing threatscape and how enterprises across industries are addressing them today.
…
continue reading
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
…
continue reading
1
Secure & Simple — Podcast for Consultants and vCISOs on Cybersecurity Governance and Compliance
Dejan Kosutic
“Secure & Simple” demystifies governance and compliance challenges faced by consultants, as well as professionals acting as fractional CISOs in companies. The podcast is hosted by Dejan Kosutic, an expert in cybersecurity governance, ISO 27001, NIS2, and DORA. The episodes present topics in an easy-to-understand way and provide you with insight you won’t be able to find elsewhere. To provide comments, suggest topics for the next episodes, or express your interest in participating in the show ...
…
continue reading
1
CISSP Cyber Training Podcast - CISSP Training Program
Shon Gerber, vCISO, CISSP, Cybersecurity Consultant and Entrepreneur
Join Shon Gerber on his weekly CISSP Cyber Training podcast, where his extensive 23-year background in cybersecurity shines through. With a rich history spanning corporate sectors, government roles, and academic positions, Shon imparts the essential insights and advice necessary to conquer the CISSP exam. His expertise is not just theoretical; as a CISSP credential holder since 2009, Shon translates his deep understanding into actionable training. Each episode is packed with invaluable secur ...
…
continue reading
This podcast contains security topics discussed by the Secure Ideas LLC. team.
…
continue reading
The mission of the Financial Safari is to equip you with the tools and knowledge that you need to successfully navigate through today's complex financial jungle. Each week, the hosts and guests on the show reveal the latest developments in the financial world to keep you informed of changes that may affect you personally, while sharing some common sense strategies that will help you make the most out of your retirement savings.
…
continue reading
The Series 7 Whisperer is the voice in your head you wish you had while studying. Hosted by a retired NYSE trader and FINRA principal with 37 years on the Street, this podcast cuts through the noise to deliver the raw, real, and testable truths behind the Series 7 exam. No fluff. No filler. Just the stuff that gets you paid. Whether you’re cramming before test day or grinding through options, suitability, and regs, this is your shortcut to passing with swagger.
…
continue reading
The cyber security podcast from SE LABS ®. In-depth cyber security analysis, with our practical, insightful experts. 🔴 SERIES 3: Summer 2025!
…
continue reading
Welcome to “Understandable Insights: Information to Intelligence with Sue Gordon” — the national security podcast that provides you an elemental understanding of the world as it is, not how you prefer it to be. Each week, Eric — a former Marine, father, and entrepreneur — sits down with the Honorable Sue Gordon, the nation’s former top career intelligence officer. Together, they break down the headlines shaping our world and ask what they really mean for citizens, leaders, and institutions. ...
…
continue reading
Investigative Security Unlimited
…
continue reading
Tough decisions rattle us all to the core. But for our guests on One Decision— the choices they are up against can also shape history. No pressure! They take us through all of their doubts, emotions and—sometimes unexpected--consequences. A fresh take on foreign policy. Hear the former head of Mi6, Sir Richard Dearlove alongside international journalists as they analyse, interview, and discuss.
…
continue reading
We are often distracted in life and never really dive deep into the real foundation of self improvement, goal achieving, and wellbeing. - Join our team of experts every week as we discuss the real facets of manhood. Topics like: How to develop more self esteem, self love, deeper relationships. How to improve our wellbeing, mental toughness, resilience, and productivity. How to develop critical skills, become better leaders, expand our careers/business, create financial security and contribut ...
…
continue reading
Crystal Orderson brings news from the continent.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
TechWell community manager Owen Gotimer travels the country connecting with agile, testing, DevOps, and security professionals to advance the global software community. Do you want to hear from an expert on the show? Email Owen at [email protected].
…
continue reading
1
Penetration Testing & Threat Intelligence: Enhancing Cybersecurity | Interview with Sasa Jusic
41:34
41:34
Play later
Play later
Lists
Like
Liked
41:34In this episode, host Dejan Kosutic interviews Sasa Jusic, a board member at Infigo IS and a cybersecurity expert. They delve deep into penetration testing and cyber threat intelligence, explaining their roles in enhancing cybersecurity. Learn about the differences between offensive and defensive security measures, the importance of DORA and ISO 27…
…
continue reading
1
Powell Probe Stirs GOP Concern; Trump Vows 25% Tariff on Iran's Trading Partners
16:48
16:48
Play later
Play later
Lists
Like
Liked
16:48On today's podcast: 1) President Trump faced rare opposition from key Republican lawmakers after Federal Reserve Chair Jerome Powell accused the Department of Justice of launching a grand jury investigation to pressure and intimidate the central bank. Senator Thom Tillis, a key Republican on the Banking Committee who isn’t running for reelection, v…
…
continue reading
1
Database Scaling at Intercom: Aurora, PlanetScale & Incident Response with Engineering Director Ryan Sherlock
46:15
46:15
Play later
Play later
Lists
Like
Liked
46:15In this episode of Smooth Scaling, José Quaresma talks with Ryan Sherlock, Director of Engineering at Intercom, about the realities of scaling databases in a fast-growing SaaS product. Ryan shares Intercom’s journey from a single MySQL database through Aurora, proxies, and per-customer scaling patterns—and what eventually pushed the team toward Pla…
…
continue reading
1
Trump rebuked at every turn; Courts and Congress show new spine as Americans take to the streets
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08Rachel Maddow rounds up a litany of recent court losses Donald Trump has suffered, as even some Republicans in Congress are agreeing to block or otherwise mitigate the damage Trump's policies are inflicting on their constituents, all while Americans rally in protest of abuses and outright crimes committed by Trump's ICE agents. Rachel Maddow review…
…
continue reading
1
In Brief: Why Greenland and Iran Matter to Trump
16:47
16:47
Play later
Play later
Lists
Like
Liked
16:47On this episode of One Decision In Brief, guest host Rosanna Lockwood and Sir Richard Dearlove, former head of MI6, unpack the shifting landscape of U.S. foreign policy on Greenland and Iran. Rosanna questions whether the United States is abandoning 75 years of post-war foreign policy in favor of a return to regional hegemony and balance-of-power p…
…
continue reading
1
SANS Stormcast Tuesday, January 13th, 2026: n8n got npm’ed; Gogs exploit; telegram proxy links
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45n8n supply chain attack Malicious npm pagackages were used to attempt to obtain user OAUTH credentials for NPM. https://www.endorlabs.com/learn/n8mare-on-auth-street-supply-chain-attack-targets-n8n-ecosystem Gogs 0-Day Exploited in the Wild An at the time unpachted flaw in Gogs was exploited to compromise git repos. https://www.wiz.io/blog/wiz-rese…
…
continue reading
Recently and over the past few years, world events may have included cybersecurity components in their enactment. So, Brian, Erik, and Dan started talking about the role of security in critical infrastructure protection, asking questions about the ethics and thresholds for government and corporate roles in cyber retaliation, whether we as security …
…
continue reading
1
CCT 314: AI Threats And Identify, Analyze, and Prioritize Business Continuity (CISSP Domain 1.8) - Part 1
25:11
25:11
Play later
Play later
Lists
Like
Liked
25:11Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Start with the reality check: today’s AI-enabled businesses face nine fas…
…
continue reading
1
Fed Served With DOJ Subpoenas; Iran Says Protests Quelled After Hundreds Reported Killed
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30On today's podcast: 1) Federal Reserve Chair Jerome Powell said the US central bank had been served grand jury subpoenas from the Justice Department threatening a criminal indictment, a dramatic escalation of the Trump administration’s attacks on the institution. In a forceful written and video statement released Sunday evening, Powell said the act…
…
continue reading
In a world of uncertainty, developing a resilient survival mindset is your greatest asset. This Mind4Survival episode explores practical, actionable strategies for preparedness—sharpening situational awareness, using the "what-if" game to guide decisions, and transforming anxiety into calm confidence. Whether you're an experienced prepper or just g…
…
continue reading
1
#9. Effective Security of Security Theatre
24:20
24:20
Play later
Play later
Lists
Like
Liked
24:20Inspector Lewis Hastie is the unit head of the National Vehicle Threat Mitigation Unit, which is a specialised police unit operating within the National Counter Terrorism Security Office (NaCTSO). The unit comprises of subject matter experts, who have a wealth of experience in the temporary vehicle security barriers through the deployment of the Na…
…
continue reading
In this episode of You Gotta Hack That, Felix sits down with Emily, a principal industrial cyber security consultant and former national utility cyber lead, to demystify ISA/IEC 62443. Why do so many teams treat it like a silver bullet and why does that backfire fast? Emily breaks down what 62443 actually is (spoiler: it’s a family of standards), w…
…
continue reading
1
SANS Stormcast Monday, January 12th, 2026: PEB Manipulation; YARA Update; VideoLAND and Apache NimBLE Patches
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16Malicious Process Environment Block Manipulation The process environment block contains metadata about particular processes, but can be manipulated. https://isc.sans.edu/diary/Malicious+Process+Environment+Block+Manipulation/32614/ YARA-X 1.11.0 Release: Hash Function Warnings The latest version of YARA will warn users if a hash rule attempts to ma…
…
continue reading
1
From 12th Grade Dropout to Cyber Entrepreneur | Ajay Unni, Founder and CEO, StickmanCyber
54:07
54:07
Play later
Play later
Lists
Like
Liked
54:07In this episode of the Be Fearless Podcast, StickmanCyber’s Founder Ajay Unni sits down with SquareX Field CISO John Carse to discuss the personal side of building a global cybersecurity brand. Ajay reveals how a failure in his 12th-grade exams in India became the catalyst for his first software company. He explains his leadership philosophy, which…
…
continue reading
Coach Pete teams up with CPA Stan Moore to break down the massive tax changes coming in 2026—and who really wins from them. They unpack new deductions, smart tax moves for business owners, and advanced strategies like cost segregation and the backdoor Roth IRA. If you want to keep more of your money, avoid ugly tax surprises, and stay ahead of the …
…
continue reading
Hey friends, in episode #649 I gave you my first impressions of Twingate. It's been a minute, so I thought I'd revisit Twingate (specifically this awesome Twingate LXC) and talk about how we're using it to (almost) entirely replace remote access to our datacenter servers and pentest dropboxes. Also, don't forget: Our pentest class is coming up at t…
…
continue reading
1
Daybreak Weekend: Bank Earnings, UK Property Market, China Trade
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02Bloomberg Daybreak Weekend with Host Nathan Hager take a look at some of the stories we'll be tracking in the coming week. In the US – a look ahead to U.S CPI data and bank earnings. In the UK – a look at what to expect from the UK’s property market moving forward. In Asia – a look ahead to China trade figures. See omnystudio.com/listener for priva…
…
continue reading
1
Iran, Minnesota, Venezuela, and 2026
1:06:44
1:06:44
Play later
Play later
Lists
Like
Liked
1:06:44Happy 2026 to all friends of Sirens! Loren, Radha, and Erin are truly astonished at the pace of news in their mid-winters nap and gab for an extended drill to cover new Hatch Act procedures, protests in Iran, the thwarted terrorist attack on NYE, the drastic decrease in financial crime fines in 2026, and Netanyahu's visit (also, Andy and Anderson's…
…
continue reading
1
Walz Clashes With Noem Over ICE Shooting Probe; Trump’s Tariffs Face Supreme Court Test
15:23
15:23
Play later
Play later
Lists
Like
Liked
15:23On today's podcast: 1) The investigation into the killing of a US citizen by an ICE agent in Minneapolis this week is being complicated by clashes between federal and local officials, with the FBI taking control over the objections of Governor Tim Walz. State authorities questioned whether a federal probe could be trusted, especially given comments…
…
continue reading
1
Episode 163: The Vendor Security Trap: Are You Losing Control?
34:45
34:45
Play later
Play later
Lists
Like
Liked
34:45In this episode, we dissect the dangerous trend of organizations ceding control of their security strategy to vendors, exploring the pitfalls of vendor lock-in, overspending, and the illusion of comprehensive protection. We'll provide actionable steps to reclaim your security posture and build an independent strategy tailored to your specific needs…
…
continue reading
Listen to this special invitation from Rachel Maddow and sign up for MS NOW Premium on Apple Podcasts to take advantage of a 3-month free trial! With MS NOW Premium, you can get our entire suite of podcasts – everything from “The Last Word with Lawrence O’Donnell” to “The Best People with Nicolle Wallace” – all ad-free. As a subscriber, you also ge…
…
continue reading
1
Episode 554: The Alpha and The Omega
1:12:05
1:12:05
Play later
Play later
Lists
Like
Liked
1:12:05This week, we discuss AI’s impact on Stack Overflow, Docker’s Hardened Images, and Nvidia buying Groq. Plus, thoughts on playing your own game and having fun. Watch the YouTube Live Recording of Episode 554 Please complete the Software Defined Talk Listener Survey! Runner-up Titles It’s all brisket after that. Exploring Fun Should I go build a snow…
…
continue reading
1
SANS Stormcast Friday, January 9th, 2026: Gephi Analysis; zlib vuln; GnuPG Vulns; Cisco/Cloudflare DNS Issue
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12Analysis using Gephi with DShield Sensor Data Gephi is a neat tool to create interactive data visualizations. It can be applied to honeypot data to find data clusters. https://isc.sans.edu/diary/Analysis%20using%20Gephi%20with%20DShield%20Sensor%20Data/32608 zlib v1.3.1.2 Global Buffer Overflow in TGZfname() of zlib untgz Utility The untgz utility …
…
continue reading
1
Steve Santorelli: Trust, Community, and the Reality of Cybercrime Investigation
34:18
34:18
Play later
Play later
Lists
Like
Liked
34:18What really happens when a cyberattack becomes a criminal investigation? In this episode of THEOS Cybernova, Paul Jackson speaks with Steve Santorelli, a formerly of Scotland Yard, whose career spans Microsoft’s Internet Crimes Investigation Team and Team Cymru. They explore how cybercrime investigations succeed in the real world: why trust and com…
…
continue reading
1
Cybersecurity Needs Hackers, Not Test Takers | Gautam Sharma, Executive Director, AccessCyber
1:00:30
1:00:30
Play later
Play later
Lists
Like
Liked
1:00:30In this episode of the Be Fearless Podcast, Gautam "Gotham" Sharma, Executive Director, Cybersecurity Education and Training at AccessCyber, sits down with SquareX Field CISO John Carse to discuss why cybersecurity education and hiring are broken. The conversation explores nontraditional cyber career paths, why certifications alone don’t get candid…
…
continue reading
1
CCT 313: CISSP Practice Questions and AI Agents As The New Insider Risk
32:22
32:22
Play later
Play later
Lists
Like
Liked
32:22Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv What happens when your “helper” becomes your riskiest insider? We dig int…
…
continue reading
1
ICE Minneapolis Shooting Sparks Anger; US Seizes Two More Tankers in Venezuela Campaign
15:29
15:29
Play later
Play later
Lists
Like
Liked
15:29On today's podcast: 1) An Immigration and Customs Enforcement officer fatally shot a woman during a confrontation in Minneapolis, sparking an uproar over the presence of ICE agents in the city and heightening political divisions around the Trump administration’s migrant crackdown. The Wednesday shooting — caught on video and shared widely on social…
…
continue reading
1
Trump's Venezuela Raid. A Warning for Europe
36:46
36:46
Play later
Play later
Lists
Like
Liked
36:46In this episode of One Decision, host Kate McCann and co-host Sir Ben Wallace, former UK Defence Secretary, speak with former US National Security Advisor to Kamala Harris, Philip Gordon. They dissect the Trump administration’s military actions in Venezuela, including the arrest of President Maduro, and also discuss the US’s threat to take control …
…
continue reading
1
SANS Stormcast Thursday, January 8th, 2026: HTML QR Code Phishing; n8n vulnerability; Powerbank Feature Creep
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23A phishing campaign with QR codes rendered using an HTML table Phishing emails are bypassing filters by encoding QR codes as HTML tables. https://isc.sans.edu/diary/A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table/32606 n8n vulnerabilities In recent days, several new n8n vulnerabilities were disclosed. Ensure that …
…
continue reading
1
SE Radio 702: Derick Schaefer on Modern CLIs
48:05
48:05
Play later
Play later
Lists
Like
Liked
48:05Derick Schaefer, author of CLI: A Practical Guide to Creating Modern Command-Line Interfaces, talks with host Robert Blumen about command-line interfaces old and new. Starting with a short review of the origin of commands in the early unix systems, they trace the evolution of commands into modern CLIs. Following the historic rise, fall, and re-emer…
…
continue reading
1
Trump Says Venezuela to Send Up to $2.8 BN of Oil; US Won’t Rule Out Military Force to Acquire Greenland
15:57
15:57
Play later
Play later
Lists
Like
Liked
15:57On today's podcast: 1) President Trump said Venezuela would relinquish as much as 50 million barrels of oil to the US, worth roughly $2.8 billion at the current market price, announcing the cargoes would be sold with proceeds benefiting both countries. The announcement late on Tuesday, which came with few details, marked a significant step up for t…
…
continue reading
1
SANS Stormcast Wednesday, January 7th, 2026: Tailsnitch Review; D-Link DSL EoL Vuln; TOTOLINK Unpatched Vuln
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44Tool Review: Tailsnitch Tailsnitch is a tool to audit your Tailscale configuration. It does a comprehensive analysis of your configuration and suggests (or even applies) fixes. https://isc.sans.edu/diary/Tool%20Review%3A%20Tailsnitch/32602 D-Link DSL Command Injection via DNS Configuration Endpoint A new vulnerability in very old D-Link DSL modems …
…
continue reading
1
Top 8 Automation Testing Trends for 2026 with Joe Colantonio
12:03
12:03
Play later
Play later
Lists
Like
Liked
12:03AI testing is everywhere — but clarity isn't. In this episode, Joe Colantonio breaks down the real test automation trends for 2026, based on data from 40,000+ testers, 510 live Q&A questions, and 50+ interviews with industry leaders. This isn't vendor hype or futuristic speculation. It's what working testers are actually worried about — and what th…
…
continue reading
1
Ep. 25: A Global Geopolitical Romp: Strategy, Scarcity, and a Question of Values
43:50
43:50
Play later
Play later
Lists
Like
Liked
43:50In this episode, Sue and Eric kick off the year with a look at geopolitical hotspots and assess that, in aggregate, US actions reveal the National Security Strategy for what it is—and isn’t. Assessing the Trump strategy as one of power, resources, and driven by their version of the “scarcity model”, they walk through recent actions in Venezuela, Ir…
…
continue reading
1
Quality at Scale: Engineering in an AI-Driven World.
20:45
20:45
Play later
Play later
Lists
Like
Liked
20:45This episode explores the rapid expansion of artificial intelligence in software, with a focus on how software engineering professionals and QA can keep pace. We discuss the quality of software generated by AI tools, and how to adapt mindsets to these new tech trends. 🔥 Like and Subscribe 🔥 💰 Sponsors If you are interested in sponsoring my content,…
…
continue reading
1
Maduro Pleads Not Guilty; Venezuela Regroups With New Leader
15:34
15:34
Play later
Play later
Lists
Like
Liked
15:34On today's podcast: 1) Ousted Venezuela President Nicolás Maduro pleaded not guilty on Monday to US charges in a narco-terrorism case against him, kicking off an extraordinary legal battle with major geopolitical ramifications. The US accused Maduro over the weekend of using his positions in government for a quarter of a century to enrich himself a…
…
continue reading
The Legion of Doom (LoD) wasn’t just a “hacker group”, it captured the essence of underground hacking in the 80s/90s. BBSes, phreaking, rival crews, and the crackdowns that changed everything. From those humble beginnings came a legacy that still echoes through modern security culture today. Sponsors Support for this show comes from ThreatLocker®. …
…
continue reading
1
Maddow calls out the real reason Trump invaded Venezuela
44:35
44:35
Play later
Play later
Lists
Like
Liked
44:35Rachel Maddow runs through the litany of excuses and justifications the Trump administration has presented to explain the military invasion of Venezuela, and points out that none of what has been floated holds up under scrutiny. Every principle the Trump administration claims to be defending comes with examples of the administration not caring at a…
…
continue reading
On this week’s One Decision In Brief, host Kate McCann is joined by co-host and former UK Defence Secretary Sir Ben Wallace to examine the fallout of the United States’ military raid in Caracas, Venezuela, which led to the arrest of President Nicolás Maduro and his wife Cilia Flores. Sir Ben explains the military execution of the operation, why it …
…
continue reading
1
SANS Stormcast Tuesday, January 6th, 2026: IPKVM Risks; Tailsnitch; Net-SNMP Vuln;
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08Risks of OOB Access via IP KVM Devices Recently, cheap IP KVMs have become popular. But their deployment needs to be secured. https://isc.sans.edu/diary/Risks%20of%20OOB%20Access%20via%20IP%20KVM%20Devices/32598 Tailsnitch Tailsnitch is a tool to review your Tailscale configuration for vulnerabilities https://github.com/Adversis/tailsnitch Net-SNMP…
…
continue reading
1
Cyber Resilience On-Orbit a ‘Nervous System’ for Detecting Threats
41:55
41:55
Play later
Play later
Lists
Like
Liked
41:55In response to evolving cyber threats that can manipulate and compromise a satellite’s data, the United States Space Force is heightening its focus on “space cyber,” or the cybersecurity of space systems on-orbit. One emerging solution toward this effort is the Cyber Reslience On-Orbit tool (CROO), a software program that focuses on not just securi…
…
continue reading
1
Cybersecurity Is About People, Not Tools | Larry Whiteside Jr., Co-Founder & President, Confide
1:00:30
1:00:30
Play later
Play later
Lists
Like
Liked
1:00:30In this episode of the Be Fearless Podcast, Larry Whiteside Jr, Co-Founder and President of Confide, sits down with SquareX Field CISO John Carse to discuss the real risks facing today’s CISOs. Drawing from three decades of experience across the U.S. military, the Pentagon, and Fortune 500 leadership roles, Larry explains why the CISO role is the m…
…
continue reading
1
CCT 312: From Kimwolf Threats To Chain Of Custody: What Security Leaders Must Know (Domain 7.1)
37:50
37:50
Play later
Play later
Lists
Like
Liked
37:50Send us a text Check us out at: https://www.cisspcybertraining.com/ Get access to 360 FREE CISSP Questions: https://www.cisspcybertraining.com/offers/dzHKVcDB/checkout Get access to my FREE CISSP Self-Study Essentials Videos: https://www.cisspcybertraining.com/offers/KzBKKouv Your TV, camera, or even a smart bird feeder can be a beachhead for attac…
…
continue reading
1
Commodities in Flux After US Captures Venezuela’s Maduro
20:40
20:40
Play later
Play later
Lists
Like
Liked
20:40On today's podcast: 1) President Trump said the US needs “total access” to Venezuela as questions mount about the country’s leadership following the capture of President Nicolás Maduro. Delcy Rodríguez, the acting president of Venezuela, has asked the US to work with her country, striking a more conciliatory tone toward the Trump administration aft…
…
continue reading