Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Spyware Podcasts
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
It Could Happen Here started as an exploration of the possibility of a new civil war. Now a daily show, it's evolved into a chronicle of collapse as it happens, and an exploration of how we might build a better future. Every day Robert Evans, Garrison Davis, Mia Wong, and James Stout take you on a jaunty walk through the burning ruins of the old world and towards a better one that lays just on the horizon.
…
continue reading
Deconstructing Media with No Agenda, by Adam Curry and John C. Dvorak
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
An online network about educating, entertaining and encouraging your dance with Technology!
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
A new beginning in IT
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
The Threat Monitor podcast is a semimonthly tip from SearchSecurity.com that focuses on current information security threats, including hack attacks, viruses, worms, Trojans, backdoors, bots, spyware and DDoS, and provides you with the tactics required to defend against them.
…
continue reading
In a landscape saturated with directives, Focal Point prioritizes discussions over dictation. The show’s mission is to present diverse perspectives on hot topics and current events, encouraging viewers to form their own opinions. Focal Point is an IRONCLAD Original.
…
continue reading
Machines Like Us is a technology show about people. We are living in an age of breakthroughs propelled by advances in artificial intelligence. Technologies that were once the realm of science fiction will become our reality: robot best friends, bespoke gene editing, brain implants that make us smarter. Every other Tuesday Taylor Owen sits down with the people shaping this rapidly approaching future. He’ll speak with entrepreneurs building world-changing technologies, lawmakers trying to ensu ...
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Listen to articles handpicked by our editors, and stay updated on top technology news from TechCrunch.
…
continue reading
Cyber Focus, from the McCrary Institute, explores the people and ideas that shape and protect our digital world. Each week our host, Frank Cilluffo, speaks with the leading voices in cybersecurity, and brings to light what steps public and private organizations need to be taking to keep our country secure.
…
continue reading
Petra Söderling, the author of 'Governments and Innovation - the Economic Developer's Guide to Our Future', discusses the role governments play in creating new innovations, and innovation based industries. Intended audience: Economic Development and Foreign Direct Investment Professionals, Policy Makers, Civil Servants, CEOs, CFOs, R&D folks and tech enthusiasts. To subscribe to more free content go to https://petrasoderling.com/ Nothing in the show should be taken as investment advise.
…
continue reading
Whether its terrorists, anarchists, cyber criminals or nation states, America has a target on its back. WTOP National Security Correspondent J.J. Green investigates the threats facing the U.S., the people behind them, the agencies fighting them and their impact on Americans.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
We discuss about the way to increase traffic
…
continue reading
Listen to all of Human Rights Watch's Twitter Space conversations in one convenient location.
…
continue reading
The Complete back up of No Agenda podcasts in case of deplatforming!
…
continue reading
We Cover the Cyberspace.
…
continue reading
Black Hat Digital Self Defense. Black Hat provides cutting edge content in the information and computer security field. Keep up to date with Black Hat presentations, announcements, and free content.
…
continue reading
Tech news and opinion from an angry programmer with a microphone
…
continue reading
The podcast where academics and plebs critically discuss representations of fascism and anti-fascism in modern cinema. Hosted by Tenzan Eaghll and Nathan Litwin. Let's get critical!
…
continue reading
Margo Cruz, the host of Tech Law Tracker, keeps up with new state-level regulations of the internet to find out how state laws are shaping the development and use of technology.
…
continue reading
Protecting your privacy from identity theft, fraud, and cyber threats is easy with a Privacy Mentor. Get the latest on threats, tools, and tips to staying safe in the digital age. Tune in weekly.
…
continue reading
I’m Anthony Desnos, a security engineer specializing in Android apps and malware analysis. Date of birth: 18/02/1985 Web: https://anthonydesnos.com/ Address: 4117 David Dr, CA California, US Gmail: [email protected] Social: https://gravatar.com/anthonydesnos522 https://www.facebook.com/anthonydesnos/ https://www.instagram.com/anthonydesnos552/ https://x.com/AnthonyDes19261 https://www.reddit.com/user/Crazy-Mousse-4053/ https://www.scoop.it/u/anthonydesnos522-gmail-com https://www.pi ...
…
continue reading
There's a lot of cool techy stuff going down in cybersecurity, and we love it. But you can't deny that a lot of the time we humans get forgotten. Our podcast takes a not-so-serious look at issues in security from a human point of view. Covering social engineering to hacker motivations and everything in between, we chat through security stories and themes and what they mean to us: the oft-neglected humans behind the screen. Apart from Kev, Kev is a cyborg. These weekly podcasts come in two ma ...
…
continue reading
The phone hacking scandal that closed News of the World was big, but that was just the tip of the iceberg. At the bottom of that iceberg of 'dark arts' - hacking, burglary, bugging, and bribing bent cops - is the body of Daniel Morgan. It’s been described by an Assistant Commissioner of the Metropolitan Police as “one of the most disgraceful episodes in the entire history of the Metropolitan Police Service.” Over the three decades since Daniel was killed, five failed police investigations an ...
…
continue reading
“Views on First” is the Knight First Amendment Institute’s flagship podcast. Each season, we invite leading legal scholars, practitioners, tech policy experts, and others to join us in conversations about some of the most pressing First Amendment issues in the ever-shifting expressive landscape of the digital age. “Views on First: Season 1” won a 2024 Anthem Award Silver Medal and 2023 Signal Listener’s Choice Award and a Signal Silver Medal.
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html Black Hat Briefings bring together a unique mix in security: t ...
…
continue reading

1
Standards, Spyware, and $10 per iPhone: A Cybersecurity Pioneer's Inside Story
32:54
32:54
Play later
Play later
Lists
Like
Liked
32:54"Complexity is the biggest enemy of security." Janne Uusilehto, a veteran who has led security and privacy engineering at Nokia, Microsoft, and Google, joins the podcast to peel back the curtain on the hidden world of cybersecurity standards. He reveals why industry rivals, like the original mobile phone giants, agreed to rules that ultimately gene…
…
continue reading
This week, we are joined by Martin Zugec, Technical Solutions Director from Bitdefender, sharing their work and findings on "EggStreme Malware: Unpacking a New APT Framework Targeting a Philippine Military Company. A newly identified Chinese APT group has been observed deploying a sophisticated, fileless malware framework called EggStreme against a…
…
continue reading

1
Inside CISA Cuts, ODNI Shifts, and Spyware Threats with Federal News Network's Justin Doubleday
29:16
29:16
Play later
Play later
Lists
Like
Liked
29:16What happens when the federal cyber workforce shrinks just as threats are multiplying? In this episode, Federal News Network’s Justin Doubleday joins host Frank Cilluffo to unpack the turbulence facing government agencies. They examine the mass departures at CISA, the controversial firings under DHS’s Cyber Talent Management System, and the looming…
…
continue reading

1
ICE Gets Israeli Spyware: Risks to Privacy and National Security
14:37
14:37
Play later
Play later
Lists
Like
Liked
14:37On today’s episode, Andy sits down with former FBI agent Dan Brunner to discuss ICE’s reactivated access to Graphite, an Israeli-made spyware capable of infiltrating phones, reading encrypted apps like WhatsApp and Signal, and even activating microphones. Originally signed under Biden but paused for review, the $2 million contract has raised concer…
…
continue reading

1
496 | ICE, Graphite, and the Spyware Frontier
20:59
20:59
Play later
Play later
Lists
Like
Liked
20:59In this episode we look at how Immigration and Customs Enforcement is believed to have access to Graphite—powerful spyware capable of silently hacking smartphones and reading encrypted apps like WhatsApp and Signal. At issue is what Graphite can do, the legal red lines it risks crossing, and what it means for civil liberties inside the U.S. if you …
…
continue reading

1
Apple’s latest iPhone security feature just made life more difficult for spyware makers
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26The feature is called Memory Integrity Enforcement (MIE) and is designed to help stop memory corruption bugs, which are some of the most common vulnerabilities exploited by spyware developers and makers of phone forensic devices used by law enforcement. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading

1
Checklist 440 - Latest iPhones Target Serious Spyware
15:21
15:21
Play later
Play later
Lists
Like
Liked
15:21Longterm and short-term security work from Apple on this week’s Checklist. First, the company’s warning individuals in France of potential spyware attacks. We’ll look at what they’re looking for and advice for staying safe. Plus - the iPhones Apple announced this week are bringing a new memory safety feature. We'll familiarize ourselves with Memory…
…
continue reading

1
SonicWall VPM exploits, Fed cyberchief’s priorities, U.S spyware investment triples
8:18
8:18
Play later
Play later
Lists
Like
Liked
8:18SonicWall SSL VPN flaws now being actively exploited Acting federal cyber chief outlines his priorities U.S. based investors in spyware firms nearly tripled in 2024 Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it…
…
continue reading

1
ICE Partners with Israeli Phone Hacking Spyware
35:30
35:30
Play later
Play later
Lists
Like
Liked
35:30Garrison talks with Cooper Quentin from the Electronic Frontier Foundation about Paragon’s spyware Graphite, how it reads text messages, who is most at risk, and misinformation exaggerating the spyware's known capabilities. Sources: https://ssd.eff.org/ https://citizenlab.ca/2025/03/a-first-look-at-paragons-proliferating-spyware-operations/ https:/…
…
continue reading

1
Can Apple's New Anti-Exploit Tech Stop iPhone Spyware Attacks?
2:45:46
2:45:46
Play later
Play later
Lists
Like
Liked
2:45:46Three Buddy Problem - Episode 61: We cover a pair of software supply chain breaches (Salesforce Salesloft Drift and NPM/GitHub) that raises big questions about SaaS integrations and the ripple effects across major security vendors. Plus, Apple’s new Memory Integrity Enforcement in iPhone 17 and discussion on commercial spyware infections and the va…
…
continue reading

1
Chris Eng on lessons learned from the NSA, @Stake, Veracode, and 20 years in cybersecurity
44:54
44:54
Play later
Play later
Lists
Like
Liked
44:54This week on Security Conversations, Ryan sits down with Chris Eng, former Chief Research Officer at Veracode, to talk about life after nearly two decades at one company and the lessons learned along the way. They dig into a career start at the NSA, the early days of @Stake and the Symantec acquisition, and the birth and ambitions of Veracode. Plus…
…
continue reading

1
Critical GoAnywhere bug fuels ransomware wave.
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23Microsoft tags a critical vulnerability in Fortra’s GoAnywhere software. A critical Redis vulnerability could allow remote code execution. Researchers tie BIETA to China’s MSS technology enablement. Competing narratives cloud the Oracle E-Business Suite breach. An Ohio-based vision care firm will pay $5 million to settle phishing-related data breac…
…
continue reading

1
Deloitte goes all in on AI — despite having to issue a hefty refund for use of AI; plus Taylor Swift fans accuse singer of using AI in her Google scavenger hunt videos
6:40
6:40
Play later
Play later
Lists
Like
Liked
6:40Deloitte is rolling out Claude to its nearly 500,000 employees after issuing a refund for a report that contained AI hallucinations. Plus, Taylor Swift fans love a good puzzle, but some were rubbed the wrong way by a promotional scavenger hunt which appeared to use AI-generated videos. Learn more about your ad choices. Visit podcastchoices.com/adch…
…
continue reading

1
Geoffrey Hinton vs. The End of the World
1:09:11
1:09:11
Play later
Play later
Lists
Like
Liked
1:09:11The story of how Geoffrey Hinton became “the godfather of AI” has reached mythic status in the tech world. While he was at the University of Toronto, Hinton pioneered the neural network research that would become the backbone of modern AI. (One of his students, Ilya Sutskever, went on to be one of OpenAI’s most influential scientific minds.) In 201…
…
continue reading

1
AMD to supply 6GW of compute capacity to OpenAI in chip deal worth tens of billions
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37AMD has signed a multi-year chip supply deal with OpenAI that could generate tens of billions in revenue for the chipmaker, helping accelerate its momentum in the AI industry. AMD has agreed to supply 6 gigawatts of compute capacity to OpenAI, which is enough to power up to 4 ½ million homes, across multiple generations of its Instinct GPUs, starti…
…
continue reading

1
Unity vulnerability, Oracle zero-day patched, Discord user info exposed
8:31
8:31
Play later
Play later
Lists
Like
Liked
8:31Unity vulnerability puts popular games at risk Oracle zero-day exploit patched Third-party breach claims Discord user info Huge thanks to our sponsor, ThreatLocker Cybercriminals don’t knock — they sneak in through the cracks other tools miss. That’s why organizations are turning to ThreatLocker. As a zero-trust endpoint protection platform, Threat…
…
continue reading
Robert, James, Mia, and Gare talk about the comedians who sold their soul to perform stand up for the royal family in Saudi Arabia. Sources: https://www.bbc.com/news/world-middle-east-37598413 https://www.hrw.org/news/2018/09/02/yemen-coalition-bus-bombing-apparent-war-crime https://www.bbc.com/news/world-middle-east-37598413 See omnystudio.com/lis…
…
continue reading

1
Oracle zero-day serves up persistent access.
23:47
23:47
Play later
Play later
Lists
Like
Liked
23:47A critical zero-day in Oracle E-Business Suite is under active exploitation. ICE plans a major expansion of its social media surveillance operations. Discord confirms a third-party data breach. A critical vulnerability in the Unity game engine could allow arbitrary code execution. New variants of the XWorm remote access trojan spread through phishi…
…
continue reading

2
Waffles eat Bluesky, plus Suspect arrested after threats against TikTok’s Culver City headquarters
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12A waffle-centric controversy underlines ongoing tensions between Bluesky and some of its most vocal users. Also, police say they have arrested a suspect allegedly connected to multiple online threats that led TikTok to evacuate its headquarters near Los Angeles on Friday. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading

2
Tesla’s insurance arm accused of ‘egregious delays’ and ‘systemic failures’ by CA regulator; also, Bezos predicts that millions will live in space in ‘couple of decades’
6:33
6:33
Play later
Play later
Lists
Like
Liked
6:33California's Department of Insurance has been warning Tesla to fix its claims process since 2022, but consumer complaints have skyrocketed anyways. Amazon founder Jeff Bezos made a rare public appearance at Italian Tech Week in Turin on Friday and used the opportunity to predict that millions of people will be living in space “in the next couple of…
…
continue reading

1
ParkMobile breach settlement, UK schools vulnerable, Zimbra calendar attacks
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03ParkMobile 2021 data breach class action suit concludes UK government study suggests secondary schools larger target than businesses Zimbra Collaboration Suite flaw used in calendar attacks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. …
…
continue reading
Mia talks with Unraveled’s Raven about ICE’s horrific raids in Chicago from a traffic stop murder to helicopter apartment raids. Sources: https://thetriibe.com/2025/09/feds-detain-dozens-of-immigrants-in-massive-south-shore-apartment-building-raid-in-chicago/ https://chicago.suntimes.com/immigration/2025/10/01/massive-immigration-raid-on-chicago-ap…
…
continue reading
No Agenda Episode 1805 - "Hamburger Wine" "Hamburger Wine" Executive Producers: Matthew Lohmar Sir Ghee Karl Diethrick Jackie Greene John Bigelow Janet Gilles Sir David Killian Associate Executive Producers: Linda Lu, Duchess of jobs & writer of winning resumes. Secretary-General: Matthew Lohmar Secretary General of Water Well Drillers Become a mem…
…
continue reading

1
2025 DataTribe Challenge: Forging the future of cyber. [Special Edition]
1:00:42
1:00:42
Play later
Play later
Lists
Like
Liked
1:00:42The DataTribe Challenge is a launchpad for elite cybersecurity and cyber-adjacent startups ready to break out. 2025 marks the 8th annual edition of the event with a change in venue and some exciting new updates. We take you on a journey from inception with Leo Scott, Managing Director and Chief Innovation Officer at DataTribe, and 3 past DataTribe …
…
continue reading

1
Sloane Menkes: What is the 2%? [Consultant] [Career Notes]
10:11
10:11
Play later
Play later
Lists
Like
Liked
10:11Please enjoy this encore of Career Notes. Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down.…
…
continue reading

1
CZM Book Club: Kushtaka, by Mathilda Zeller
38:25
38:25
Play later
Play later
Lists
Like
Liked
38:25Kicking off spooky month with a story about demons that I don't want to spoil by telling you more about but it's so good I promise. See omnystudio.com/listener for privacy information.By Cool Zone Media and iHeartPodcasts
…
continue reading

1
China’s stealthiest spy operation yet. [Research Saturday]
22:52
22:52
Play later
Play later
Lists
Like
Liked
22:52Assaf Dahan, Director of Threat Research, Cortex XDR, at Palo Alto Networks, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified Phantom Taurus, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middl…
…
continue reading
All of this week's episodes of It Could Happen Here put together in one large file. - SEIU 1000 Union Rep of the IE Reports Live from the Frontline - Everyone Hates Them: Trump, the Media and Jimmy Kimmel - Does Tylenol Give Your Baby Autism? - What Does the Antifa Executive Order Mean for Free Speech? - Executive Disorder: White House Weekly #36 Y…
…
continue reading
In this final episode of The Lockdown, I reflect on the journey of the podcast, and explaining why I’m redirecting my energy to other projects. I discuss the importance of practical privacy measures, measures over an ‘all-or-nothing’ approach, as well as sharing my thoughts on threat modeling, and address several listener questions about privacy to…
…
continue reading

1
Week in Review: Shutdown furloughs CISA, DoD risk framework, Oracle extortion problem
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Nick Espinosa, nationally syndicated host of The Deep Dive Radio Show, with guest Steve Zalewski, co-host, Defense in Depth Thanks to our show sponsor, Nudge Security Here’s the thing: your employees are signing up for new apps, sharing data, and connecting tool…
…
continue reading
A fast-spreading malware campaign is abusing WhatsApp as both lure and launchpad. Carmaker Renault suffers a data breach. DrayTek patches a critical router flaw. CISA alerts cover a range of vulnerabilities. A new phishing kit lowers the bar for convincing lures. A Catholic hospital network pays $7.6 million to settle data breach litigation. A majo…
…
continue reading

1
Apple removes ICEBlock and similar tracking apps from the App Store; also, Hacking group claims theft of 1 billion records from Salesforce customer databases
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10A notorious predominantly English-speaking hacking group has launched a website to extort its victims, threatening to release about a billion records stolen from companies who store their customers’ data in cloud databases hosted by Salesforce. Apple has removed ICEBlock and other apps from its App Store that allow users to anonymously report sight…
…
continue reading

1
Oracle cl0p ransomware crisis, EU drone sightings, Cisco bootkit fallout
2:03:28
2:03:28
Play later
Play later
Lists
Like
Liked
2:03:28Three Buddy Problem - Episode 66: We discuss drone sightings that shut down airports across Europe and what they reveal about hybrid warfare and the changing nature of conflict; Oracle ransomware/extortion campaign tied to unpatched E-Business Suite vulnerabilities and the company’s muted response. Plus, the TikTok–Oracle deal and the strange role …
…
continue reading

1
Why the CJNG Cartel Is Stronger Than Ever Despite U.S. Crackdowns
20:22
20:22
Play later
Play later
Lists
Like
Liked
20:22On today’s episode, Andy welcomes back Stefano Ritondale from @AllSourceNews to discuss the dramatic rise in U.S. cocaine consumption and its impact on Mexican cartels. Cocaine use has surged by 154% in western states since 2019, fueling the power of the Jalisco New Generation Cartel (CJNG), led by Nemesio Rubén “El Mencho” Oseguera Cervantes. Desp…
…
continue reading

1
Checklist 443 - Why Anti-Phishing Training Isn’t Working
16:18
16:18
Play later
Play later
Lists
Like
Liked
16:18We’re doing the ransomware thing again - checking on the folks at Jaguar Land Rover, plus what may be a ransomware attack at Japanese brewery Asahi. Then - why isn’t the anti-phishing training at your work working? UC San Diego has some thoughts. All of that plus tiny updates from Apple on this edition of The Checklist, brought to you by SecureMac.…
…
continue reading

1
Hackers are sending extortion emails to executives after claiming Oracle apps’ data breach; also, OpenAI is the world’s most valuable private company
5:38
5:38
Play later
Play later
Lists
Like
Liked
5:38Google says hackers associated with a prolific ransomware group are sending extortion emails to executives at “numerous” large organizations after claiming to have stolen their sensitive information from a suite of business software products developed by Oracle. Also, OpenAI has sold 6.6 billion dollars in shares held by current and former employee…
…
continue reading

1
Shutdown furloughs CISA, Defender BIOS bug, Motilily dealership cyberattack
7:42
7:42
Play later
Play later
Lists
Like
Liked
7:42Government shutdown furloughs most CISA staff Microsoft Defender bug triggers erroneous BIOS update alerts Motility RV software company suffers cyberattack Huge thanks to our sponsor, Nudge Security Here's the thing: your employees are signing up for new apps, sharing data, and connecting tools together, often without anyone knowing. And, AI adopti…
…
continue reading

1
Executive Disorder: White House Weekly #36
1:12:08
1:12:08
Play later
Play later
Lists
Like
Liked
1:12:08The gang discuss the government shutdown, War Department plans to deploy troops to US cities, ICE raids in Chicago, new border wall construction, and a National Security Presidential Memo targeting political violence indicators like “anti-capitalism, anti-christianity, and extremism on migration, race, and gender.” https://www.gofundme.com/f/ec-off…
…
continue reading
No Agenda Episode 1804 - "Mucho Retardo" "Mucho Retardo" Executive Producers: Sir Donald of the Fire Bottles No Name Commodore Semi-anonymous vegan Associate Executive Producers: Sir Adam of The Koch Empire. Nathan Parker Sean Homan Eli the coffee guy Anita suasso de Lima de Prado Linda Lu, Duchess of jobs & writer of winning resumes Peter Goodall …
…
continue reading
CISA furloughs most of its workforce due to the government shutdown. The U.S. Air Force confirms it is investigating a SharePoint related breach. Google warns of a large-scale extortion campaign targeting executives. Researchers uncover Android spyware campaigns disguised as popular messaging apps. An extortion group claims to have breached Red Hat…
…
continue reading

1
Hollywood is not taking kindly to the AI-generated actress Tilly Norwood, plus, Apple is shelving Vision Pro overhaul to focus on AI glasses
4:24
4:24
Play later
Play later
Lists
Like
Liked
4:24London-based actress Tilly Norwood has about 40 thousand Instagram followers. One thing to know though is she’s not real. She is an AI-generated character created by Xicoia, the AI division of the production company Particle6. Also, Apple is sidelining plans to overhaul its Vision Pro VR glasses to focus on developing AI smart glasses that can comp…
…
continue reading

1
OpenAI staff grapples with the company’s social media push
7:08
7:08
Play later
Play later
Lists
Like
Liked
7:08Current and former OpenAI researchers seem torn over how the company's Sora app fits in with its broader mission. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
Breaches set for North America, Outlook bug needs Microsoft support, Air Force admits SharePoint issue
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25Breach notification letters set to flood North America's mailboxes New bug in classic Outlook only fixed via Microsoft support Air Force admits SharePoint privacy issue over breach Huge thanks to our sponsor, Nudge Security AI notetakers like Otter AI spread fast. In fact, one Nudge Security customer discovered 800 new accounts created in only 90 d…
…
continue reading

1
What Does the Antifa Executive Order Mean for Free Speech?
55:55
55:55
Play later
Play later
Lists
Like
Liked
55:55James introduces a rebroadcast of Final Straw Radio in which Mo speaks with Bursts about the implications of recent Executive Orders and Memoranda for free speech and the First Amendment. https://thefinalstrawradio.noblogs.org/post/2025/09/28/the-implications-of-trumps-war-on-antifa-with-moira-meltzer-cohen/ See omnystudio.com/listener for privacy …
…
continue reading