Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Security Weekly Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
On Mondays, Jon Stewart hosts The Daily Show, but on Thursdays, he's back in your ears with The Weekly Show -- a podcast featuring in-depth conversations with a range of special guests. From experts and advocates, to stakeholders and thought leaders, we discuss the challenges, changes, and ideas that are shaping our world.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and ...
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
A weekly discussion of national security and foreign policy matters featuring Lawfare senior editors Scott R. Anderson, Quinta Jurecic, and Alan Rozenshtein. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Off The Wall is a weekly show on WUSB radio, Stony Brook - Long Island, produced by 2600 Magazine. This feed offers a high-bitrate (128k) MP3 version of the show.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
About bridging the gap between security initiatives and business objectives. Hosted by Matt Alderman, co-hosted by Jason Albuquerque, Ben Carr.
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
Your weekly fix of everything economics. Hosted by James Meadway.
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
Americast is the authoritative US news and politics podcast from the BBC. Each week we provide audiences with the best analysis from across the BBC, with on-the-ground observations and big picture insights about the stories which are defining America right now. The podcast is hosted by trusted BBC journalists including the BBC’s North America editor, Sarah Smith, BBC Radio 4 presenter, Justin Webb, the BBC’s disinformation and social media correspondent, Marianna Spring, and BBC North Americ ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
A look at events making the news in Ireland over the last week, presented by Justin McCarthy. Listen live every Sunday at 1pm on RTÉ Radio 1.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
National security, unlocked. Each Thursday, host Mary Louise Kelly and a team of NPR correspondents discuss the biggest national security news of the week. With decades of reporting from battlefields and the halls of power, they bring you inside the Pentagon, State Department, and intelligence community to help you understand America's shifting role in the world, and how events in faraway places matter here at home. Additional episodes feature interviews with power players from the NatSec wo ...
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
Your Weekly Source for Linux GNews from the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
A window into our world, through in-depth storytelling from the BBC. Investigating, reporting and uncovering true stories from everywhere. Award-winning journalism, unheard voices, amazing culture and global issues. From Trump's new world order, to war in Sudan, to the legacy of football icon Mo Salah, The Documentary investigates major global stories. We delve into social media, take you into the minds of the world's most creative people and explore personal approaches to spirituality. Ever ...
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
With two new shows each week, our experts dig into the game-tape for analysis rich in detail and information. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
No one pays ransomware demands anymore - so attackers have a new goal. Also: Ransomware Surge in Europe: Cybercriminals Exploit GDPR Penalties, Target Key SectorsBy Carl Franklin
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-527
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta’s Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527
…
continue reading
1
Turning To The Darkside & AI Cyberslop - PSW #899
2:07:54
2:07:54
Play later
Play later
Lists
Like
Liked
2:07:54This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Transforming Frontline Workflows with Passwordless Access, AI costs, and the News - Joel Burleson-Davis - ESW #431
1:41:46
1:41:46
Play later
Play later
Lists
Like
Liked
1:41:46Segment 1: Interview with Joel Burleson-Davis Frontline workers can't afford to be slowed down by manual, repetitive logins, especially in mission-critical industries where both security and productivity are crucial. This segment will explore how inefficient login methods erode productivity, while workarounds like shared credentials increase risk, …
…
continue reading
1
Security review of all IPAS centres after arson attack, Brophy says
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32A security review of all IPAS centres will take place speedily in the wake of an arson attack on a facility in Drogheda. Colm Brophy, the Minister of State for Justice, Home Affairs and Migration speaks to This Week.By RTÉ Radio 1
…
continue reading
Ciarán Kennedy and Murray Kinsella reflect on Ireland's victory against Japan at the Aviva Stadium. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Kruger national park in South Africa is one of the most well known nature reserves in the world. But the legacy of Paul Kruger, who the park is named after, is complicated. He founded the park to protect South Africa's wildlife, but he is also considered to be a relic of the country's racist past and considered by some as an architect of apartheid.…
…
continue reading
1
A fine pearl gone rusty. [Research Saturday]
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59Tal Peleg, Senior Product Manager, and Coby Abrams, Cyber Security Researcher of Varonis, discussing their work and findings on Rusty Pearl - Remote Code Execution in Postgres Instances. The flaw could allow attackers to execute arbitrary commands on a database server’s operating system, leading to potential data theft, destruction, or lateral move…
…
continue reading
1
AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune and Jason Wood - SWN #527
44:40
44:40
Play later
Play later
Lists
Like
Liked
44:40This week we have AI-Obfuscating Malware, China Influence Ops, and Meta's Fraud Fortune, Jason Wood, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-527
…
continue reading
The CBO was hacked by a suspected foreign actor. Experts worry Trump’s budget cuts weaken U.S. cyber defenses. Regulation shapes expectations. ClickFix evolves on macOS. Notorious cybercrime groups form a new “federated alliance.” Congressional leaders look to counter China’s influence in 6G networks. An EdTech firm pays $5.1 million to settle data…
…
continue reading
1
328: This MONTH in Linux with Linux 6.17, End of Windows 10, KDE Plasma 6.5, GNOME 49, COSMIC Beta, Fedora 43, Ubuntu 25.10, & more Linux news
35:18
35:18
Play later
Play later
Lists
Like
Liked
35:18video: https://youtu.be/9sSoZ89qwpU Download as MP3 Support the Show Become a Patron = tuxdigital.com/membership Store = tuxdigital.com/store Chapters: 00:00 Intro 01:42 Linux 6.17 Released 04:28 The End of Windows 10 Has Arrived 09:23 KDE Plasma 6.5 Released 11:39 GNOME 49 Released 15:30 Sandfly Security, agentless Linux security 17:40 Fedora Linu…
…
continue reading
Today is episode 700 of the 7MinSec podcast! Oh my gosh. My mom didn't think we could do it, but we did. Instead of a big blowout with huge news, giveaways and special guests, today is a pretty standard issue episode with a (nearly) 7-minute run time! The topic of today's episode is Pretender (which you can download here and read a lot more about h…
…
continue reading
1
Kai Höss: My grandfather, the Commandant of Auschwitz
26:30
26:30
Play later
Play later
Lists
Like
Liked
26:30In a cinema in south-west Germany an audience is gathered to watch an Oscar winning film, Zone of Interest, about the life of Rudolf Höss, Commandant of Auschwitz. Those present comprise Jewish people from around the world, and the special guest is Rudolf’s grandson. The topic was rarely visited during Kai's childhood. It was only after a school hi…
…
continue reading
1
The GOP's extremism problem and what it means for national security
26:48
26:48
Play later
Play later
Lists
Like
Liked
26:48Tucker Carlson interviewed white nationalist Nick Fuentes, and now the right is divided on whether that’s okay. Host Mary Louise Kelly speaks with Odette Yousef, a national security correspondent focusing on extremism, about the divide that seems to be opening up on the American political right after Carlson’s interview. And Pentagon Correspondent …
…
continue reading
1
Turning To The Darkside & AI Cyberslop - PSW #899
2:07:54
2:07:54
Play later
Play later
Lists
Like
Liked
2:07:54This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
…
continue reading
1
The role of AI in Zero Trust. [CyberWire-X]
23:25
23:25
Play later
Play later
Lists
Like
Liked
23:25Zero Trust has been top of mind for years, but how is AI changing what that actually looks like in practice? In this episode of CyberWire-X, Dave Bittner is joined by Deepen Desai, Chief Security Officer at Zscaler, to discuss the transformative impact of AI on Zero Trust security frameworks. The discussion outlines how AI enhances threat preventio…
…
continue reading
Cisco patches critical vulnerabilities in its Unified Contact Center Express (UCCX) software. CISA lays off 54 employees despite a federal court order halting workforce reductions. Gootloader malware returns. A South Korean telecom is accused of concealing a major malware breach. Russia’s Sandworm launches multiple wiper attacks against Ukraine. Ch…
…
continue reading
1
The Democrats are back… but will it last?
45:30
45:30
Play later
Play later
Lists
Like
Liked
45:30For the first time since the presidential election there is renewed optimism among Democrats after a big election night on Tuesday. Alongside Zohran Mamdani’s win in New York and the governor races in New Jersey and West Virginia, the party also won important - albeit less glamorous - races in Pennsylvania and Georgia. In this episode, Justin, Anth…
…
continue reading
1
S18 E01 (VIDEO) How Hackers Target National Security
47:50
47:50
Play later
Play later
Lists
Like
Liked
47:50#SecurityConfidential #DarkRhiinoSecurityMatthew Devost is a cybersecurity, risk management, and national security expert with over 25 years of experience. He is the CEO and Co-Founder of OODA LLC and Devsec previously founded the Terrorism Research Center and cybersecurity consultancy FusionX, which was acquired by Accenture. At Accenture, he led …
…
continue reading
All links and images can be found on CISO Series. Check out this post by Kevin Paige, CISO at ConductorOne, for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining them is Julie Tsai, CISO-in-Residence, Balli…
…
continue reading
1
Democrats Actually Win Something with Chris Hayes and David Plouffe
1:20:20
1:20:20
Play later
Play later
Lists
Like
Liked
1:20:20Following Democrats' decisive Tuesday wins, Jon is joined by MSNBC's Chris Hayes, host of "All In" and author of "The Sirens' Call," and David Plouffe, former Obama campaign manager and White House senior advisor. Together, they dissect the election results, explore the tension between political consulting and authentic campaigning, and discuss wha…
…
continue reading
Today we are joined by Dr. Sasha O'Connell, Senior Director for Cybersecurity Programs at Aspen Digital, discussing "10 Years of Cybersecurity Progress & What Comes Next." Ben talks about a couple of instances of AI companies reigning in their chatbots. Dave's got the story of ICE’s controversial facial recognition operations. While this show cover…
…
continue reading
After years of Chinese investment in Africa, the West is fighting back. Through the Lobito Corridor project, the US and European countries are investing billions in Angola’s Benguela Railway, which runs from southern Africa’s interior to Angola’s Atlantic coast. The aim is to build a quick and reliable supply chain to export African minerals to the…
…
continue reading
1
The hack that messed with time, and rogue ransomware negotiators
38:43
38:43
Play later
Play later
Lists
Like
Liked
38:43Time itself comes under attack as a state-backed hacking gang spends two years tunnelling toward a nation’s master clock — with chaos potentially only a tick away. Plus when ransomware negotiators turn to the dark side, what could possibly go wrong? All this and more is discussed in episode 442 of the "Smashing Security" podcast with cybersecurity …
…
continue reading
1
S18 E01 How Hackers Target National Security
47:50
47:50
Play later
Play later
Lists
Like
Liked
47:50Matthew Devost is a cybersecurity, risk management, and national security expert with over 25 years of experience. He is the CEO and Co-Founder of OODA LLC and Devsec previously founded the Terrorism Research Center and cybersecurity consultancy FusionX, which was acquired by Accenture. At Accenture, he led the Global Cyber Defense practice. Matthe…
…
continue reading
Operation “Chargeback” takes down global fraud networks. An investigation reveals the dangers of ADINT. M&S profits plunge after a cyberattack. Google patches a critical Android flaw. Asian prosecutors seize millions from an accused Cambodian scam kingpin. Ohio residents are still guessing water bills months after a cyberattack. Houston firefighter…
…
continue reading
This week, Scott sat down with co-hosts emeritus Benjamin Wittes and Alan Rozenshtein, and Senior Editor Kate Klonick, to talk through the week’s big national security news stories, including: “Cracks in the Foundation.” The conservative Heritage Foundation—and the broader conservative movement it plays a central role in—has been going through a ve…
…
continue reading
1
James Tracy on Ireland's lineout and scrum frustrations in Chicago
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06James Tracy joins Ciarán Kenendy for a deep dive analysis into Ireland's defeat against New Zealand. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Defense Against Configurations as CIOs and CISOs Show Value Through Risks and Metrics - Rob Allen - BSW #420
49:31
49:31
Play later
Play later
Lists
Like
Liked
49:31What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
…
continue reading
1
Zohran Mamdani wins New York mayoral race
29:31
29:31
Play later
Play later
Lists
Like
Liked
29:31Election night is back in the US and this time around there’s a lot more for the Democrats to cheer about after the party’s rising star, Zohran Mamdani, won the New York City mayoral election and will become the first Muslim mayor of the biggest city in America. The 34-year-old led his party to victory on the back of pledges to tax millionaires to …
…
continue reading
This week on The Curve, James Meadway is joined by author and journalist Sarah Jaffe who has covered New York politics extensively. Together, they discuss Zohran Mamdani's momentous victory in New York's mayoral election and what it means for the future of economic populism on the left. In the full episode James and Sarah also discuss UK Chancellor…
…
continue reading
1
SN 1050: Here Come the AI Browsers - Scareware Blockers
3:21:25
3:21:25
Play later
Play later
Lists
Like
Liked
3:21:25AI-powered web browsers are hitting the scene fast, but Steve and Leo unpack why these smart assistants could usher in an era of security chaos most users aren't ready for. Brace yourself for the wild risks, real-world scams, and the privacy questions no one else is asking. Secret radios discovered in Chinese-made busses. Edge & Chrome introduce LL…
…
continue reading
1
SN 1050: Here Come the AI Browsers - Scareware Blockers
3:20:21
3:20:21
Play later
Play later
Lists
Like
Liked
3:20:21AI-powered web browsers are hitting the scene fast, but Steve and Leo unpack why these smart assistants could usher in an era of security chaos most users aren't ready for. Brace yourself for the wild risks, real-world scams, and the privacy questions no one else is asking. Secret radios discovered in Chinese-made busses. Edge & Chrome introduce LL…
…
continue reading
1
Risky Business #813 -- FFmpeg has a point
1:05:08
1:05:08
Play later
Play later
Lists
Like
Liked
1:05:08In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: We love some good vulnerability reporting drama, this time FFmpeg’s got beef with Google OpenAI announces its Aardvark bug-gobbling system Two US ransomware responders get arrested for… ransomware Memento (nee HackingTeam) CEO says: Sì, those are tot…
…
continue reading
In July 2024, Bolivia discovered the Mayaya Centro-X1 gas field, its largest find in nearly 20 years. With an estimated 1.7 trillion cubic feet of reserves, the announcement sparked excitement across the country, promising to help reverse a steep decline in domestic production and inject billions into the national economy. South American based jour…
…
continue reading
By Emmanuel Goldstein
…
continue reading
1
Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and More! - SWN #526
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Rogue Negotiators, Gemini Pulled, Apple’s AI Shift, Disappearing CAPTCHAs, and Aaran Leyland on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-526
…
continue reading