Welcome to The Time Hacker Podcast, where speed meets success and time becomes your ultimate weapon. Hosted by Mike Fallat, bestselling author, entrepreneur, and founder of Lead Marketing Company, this show is built for the doers, the dreamers, and the diehards who refuse to waste another second living below their potential. Each episode, Mike sits down with world-class entrepreneurs, bestselling authors, and industry disruptors to uncover their boldest strategies for saving time, scaling fa ...
…
continue reading
Time Hackers Podcasts
CNBC's longest-running primetime original series, "American Greed" takes you inside the amazing real-life stories of how some people will do anything for money. The award-winning series is narrated by legendary actor Stacy Keach.
…
continue reading
Taking your time is a podcast series hosted by Jacques Fu, author of Time Hacks. You will learn tips and strategies of practical time management and discover what it means to make the most out of the moments you have. In this show, we also seek to explore the feeling and reality of never having enough time. Jacques's books, and businesses he's co-founded have been featured in news outlets such as Spectrum News, the Orlando Sentinel, and Inc Magazine, Forbes, and USA Today. Jacques will draw ...
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
Daily overview of the Top 10 Hacker News posts. Post and comment summarization by AI.
…
continue reading
Make better decisions based on how your mind works. Personality Hacker teaches you the coding language of your mind and how to use it to create great relationships - a fulfilling career and happiness. Are you born with your personality, or does it develop over time? What is intuition? What's the fastest way to use your natural gifts to improve overall happiness? Join Joel Mark Witt and Antonia Dodge as they discuss small changes in your personality and relationships that have big impact.
…
continue reading
Information you will not read about in the press... by @adanielhill 1st hacker that served time in prision in #uruguay for a computer crime. https://my.darkweb.today/mydarkweb/
…
continue reading
A few years ago I caught the "entrepreneurial itch." I've been ferociously reading books, listening to podcasts, reading blogs, and being active in online communities. But the wantrepreneur in me is real. The reality is that it's hard. This is the honest account of myself — in all my struggles and learnings — as I work to become a full-time entrepreneur the indie hacker way. I talk about everything that I learn, all the projects I launch, and everything in between. If you’re obsessed with le ...
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
The House Hacker Podcast is all things housing! Learn about programs and options to help home buyers and home owners, listen to top producing real estate agents background and experience, and stay in the know with current housing trends! Listen to interviews, program updates, housing market news, interest rate forecasts, and much more. All things housing with your host itsOscvr of The MVP Team!
…
continue reading
The story of the world's most secret agents...the backups. For the first time in his career, Special Agent Chet Phillips has discovered that he can choose NOT to accept a mission! That means there's no choice but to send in the "B Team": A nervous pencil pusher promoted to the field, a computer hacker working off her sentence, a fading former sitcom star and a recently reassigned White House intern. A full cast comedy audio adventure with a new episode debuting each month!
…
continue reading
1
In Wheel Time Podcast: Your Go-To Automotive Talk Show
In Wheel Time Podcast | Automotive talk with Don Armstrong, Michael Marrs, and Jeff Dziekan
"Join Don Armstrong, Michael Marrs, and Jeff Dziekan on the In Wheel Time Podcast, your premier automotive podcast featuring car talk, reviews, tips, and the latest automotive news.'" The In Wheel Time Podcast is a 30-minute version of the In Wheel Time live automotive talk show on the Audacy Network Saturday from 10a-12noonCT. Now available on your favorite podcast provider including Apple Music, Spotify, Amazon Music, iHeartRadio Podcast, SiriusXM Podcast and many more including InWheelTim ...
…
continue reading
For years Alex "WORLDWIDE" Kellar has stated that 1995 was the Greatest Year Ever In (american) Cinema. Now it's time to prove it (maybe, who cares)
…
continue reading
Tito, Pylet, and guests discuss how to improve your skills in Hearthstone. Our Guests are the absolute best members of the Hearthstone Community.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A short and to the point podcast about hacking and cyber security. A weekly podcast that give you best information and knowledge about cyber security. And helps you to save your time. Support this podcast: https://podcasters.spotify.com/pod/show/hacker-life/support
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
…
continue reading
Book 2 of the Borrowed Time Chronology Ness Relevant has traveled through time before. Now he must once again use his time machine to confront a determined foe. Only this time his personal stakes are even higher. Threatened by his future, he must find a way to save his wife and thwart a mad-man's schemes for world conquest, or he'll never regain his stolen time.
…
continue reading
Hackers have been an underground tribe of creators and thinkers. It's time to take a look inside the tribe of how the mind of its members work.
…
continue reading
Jacksonville Jaguars and other Sports and Pop Culture Talk presented by Eric Dunn and Andrew Willis. We are Dunn and Drew. Hot Takes Served Cold. Available on YouTube, Apple Music, Spotify and wherever you get your podcasts.
…
continue reading
I’m spilling the secrets to growing your business with a brand new set of tools. I’ll teach you everything about it on the show.. We’ll grow on journey together.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Learn the latest management updates in the tech world.
…
continue reading
The "Shawn Ryan Show" is hosted by Shawn Ryan, former U.S. Navy SEAL, CIA Contractor, and Founder of Vigilance Elite. We tell REAL stories about REAL people from all walks of life. We discuss the ups and downs, wins and losses, successes and struggles, the good and bad in a respectful but candid way with our guest. We're better than entertainment, we're the REAL thing. Please enjoy the show.
…
continue reading
Go on an adventure into unexpected corners of the health and science world each week with award-winning host Maiken Scott. The Pulse takes you behind the doors of operating rooms, into the lab with some of the world's foremost scientists, and back in time to explore life-changing innovations. The Pulse delivers stories in ways that matter to you, and answers questions you never knew you had.
…
continue reading
A "by Hackers for Hackers" podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest hacking techniques.
…
continue reading
…
continue reading
Hi everyone my name is Nitish Kumar. I have read dozens of self help book and practicing yoga and meditation for a long time. In my podcasts, I talk about the lessons which I have learnt from self help books in 5 minutes, daily. So you can subscribe to my podcast to get daily dose of your motivation and start your day with positive energy.
…
continue reading
Founder Reality with George Pu. Real talk from a technical founder building AI-powered businesses in the trenches. No highlight reel, no startup theater – just honest insights from someone who codes, ships, and scales. Every week, George breaks down the messy, unfiltered decisions behind building a bootstrap software company. From saying yes to projects you don't know how to build, to navigating AI hype vs. reality, to the mental models that actually matter for technical founders. Whether yo ...
…
continue reading
Silicon Valley. If this place were a country, it'd be the wealthiest on Earth. It's a place full of disruptors. But that's an edge that cuts both ways… Set in the cutthroat world of tech, The Valley gives you a prime time soap-style blast of drama, ambition, twists, and revenge twice a week. Cam, a hacker with a shadowy past, has come here to teach the most powerful people in the Valley a lesson. In a world full of high risk and high reward, revenge is a feature… not a bug.
…
continue reading
1
Success Hackers | Empowering Entrepreneurs to Play Bigger in Business and Life
Scott Hansen brings you interviews from some of the most influential Entre
Success Hackers was created to inspire entrepreneurs to reach new heights in their business. If you're looking for strategies, success "hacks", and new ways to double, triple or 10x your business, Success Hackers is the podcast for you. Scott Hansen takes you inside the minds of some of the most talented and successful entrepreneurs who are impacting the world with their message. HACKER NATION!!
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Welcome to Shut the Backdoor, brought to you by Redox. Shut The Backdoor is a healthcare security podcast dedicated to keeping health data safe, one episode at a time. Hosted by Jody Maberry and Meghan Mcleod and featuring special guests to discuss the most critical topics for healthcare security.
…
continue reading
Follow along with Louis and Mojca as we grow our profitable businesses. We give weekly updates on the stuff that's on our minds and the challenges we're facing.
…
continue reading
The best newspaper in Canada is a podcast. Original reporting, sharp political analysis, and media criticism you won’t get anywhere else. Keeping you informed about what’s happening now in your country. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Get Real, Get Weiser isn’t another stiff business show. It’s raw conversations with real estate investors and professionals who’ve taken the punches, built from nothing, and learned what it actually takes to win. Each episode, Tzvi “LLC” Weiser digs beneath the polished bios to uncover the messy stories, the bold moves, and the lessons you won’t hear anywhere else. If you want unfiltered insights, practical strategies, and some good laughs along the way — this is your podcast.
…
continue reading
MAMA, UNLEASHED! Science, information and inspiration to unleash yourself and truly thrive in motherhood. MAMA, UNLEASHED! exists for one reason: to help mothers thrive. Whether you are pregnant, or have already had your baby, learn from experts, scientists, researchers and parents, who share their knowledge, discoveries, mistakes and life-lessons, so you can better understand postpartum, and yourself in motherhood.We are here to support you.You are not alone!Join your host, PhD-qualified ne ...
…
continue reading
Talking about millennial mom life with some blogging tips thrown in! And a bit, or a lot of wine.
…
continue reading
You’ve seen the headlines. Now it’s time to hear the full, unfiltered story of Josh’s rise from homeless kid to NSA hacker. From Homeless to Mansion is more than a podcast; it’s a raw, honest look at one man’s extraordinary journey of resilience, grit and reinvention. Follow the story from the heart of opioid-ravaged Appalachia, where one kid battles the brutal realities of homelessness, generational addiction and daily survival. This raw, powerful story reveals how Josh overcame seemingly i ...
…
continue reading
Cut through the AI noise with Adrian Lefler, a 15-year dental industry veteran who's actually using this stuff. No theory, no sales pitches, just the tactical AI implementations that are transforming dental practices right now. In 20-30 minute episodes, Adrian brings you real practitioners sharing exactly how they're using AI tools like ChatGPT, Perplexity, Gemini, and other LLM's to save time, increase revenue, and stay ahead of the curve. Whether it's automating patient communication, stre ...
…
continue reading
Ever wondered what really goes on when solo traveling the world? Join Emily from Emily Eats and Explores and Ashley from Ashley gets Around weekly as they air out their crazy travel stories, share travel tips, and just chat about travel! Emily Cooper is a full-time traveler and the creator behind Emily Eats and Explores. In 2022, Emily quit her job in healthcare to travel the world solo and create content. Now, she teaches women how they can make money while they travel the world! Ashley Pet ...
…
continue reading
Welcome to Build, Create & Learn: A Maker’s Journey, hosted by Stefan Herndlbauer! If you’re fascinated by how tech products truly come to life – and love the messy, exciting process of building things, even while you’re figuring it out – this podcast is for you. Join Stefan, a product manager and passionate maker, as he takes you behind the scenes of his workbench. Each episode shares his personal explorations, challenges, and ’aha!’ moments while tackling real-world tech projects. From emb ...
…
continue reading
Stories from the world of hacking, ransomware, cybersecurity, and rogue AI. Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten ...
…
continue reading
Tim Ferriss is a self-experimenter and bestselling author, best known for The 4-Hour Workweek, which has been translated into 40+ languages. Newsweek calls him "the world's best human guinea pig," and The New York Times calls him "a cross between Jack Welch and a Buddhist monk." In this show, he deconstructs world-class performers from eclectic areas (investing, chess, pro sports, etc.), digging deep to find the tools, tactics, and tricks that listeners can use.
…
continue reading
A dealership website script shouldn’t be the key to your car. Yet that’s exactly what one security researcher demonstrated on a DEF CON stage, turning a forgotten corner of a portal into national-level access that could unlock vehicles, view customer data, and send remote commands. We dig into what that means for drivers, dealers, and automakers no…
…
continue reading
1
11.24.25 | Fran Sans font inspired by San Francisco, time-travelling door bug in Half Life 2, native Secure Enclave SSH keys on macOS
10:28
10:28
Play later
Play later
Lists
Like
Liked
10:28This is a recap of the top 10 posts on Hacker News on Nov 24, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:18) - Fran Sans – font inspired by San Francisco light rail displays (01:19) - A time-travelling door bug in Half Life 2 (02:17) - Native Secure Enclave backed SSH keys on m…
…
continue reading
1
Will the Jaguars get hot at the right time? (Feat. Hacker After Dark)
2:17:39
2:17:39
Play later
Play later
Lists
Like
Liked
2:17:39A Jacksonville Jaguars podcast. A little Xs and Os, a lot of vibes. Join our Discord Chat ► https://discord.gg/BJmXnbbUDonate $5/mo. to the cause of Dunn and Drew! It helps fight burnout! LOL ► Patreon.com/dunnanddrewMerch Store!! ► https://www.dunnanddrew.com/Join the Sports conversation in our Facebook Group ► https://www.facebook.com/groups/dunn…
…
continue reading
1
#360 - Bevan Cox (Turn Toward the Storm: How I Turned Trauma Into Triumph)
53:18
53:18
Play later
Play later
Lists
Like
Liked
53:18In this gripping episode of the Mike Fallat Time Hacker Podcast, Mike sits down with author and entrepreneur Bevan Cox, whose new book Turn Toward the Storm: How I Turned Trauma into Triumph unpacks one of the most harrowing and inspiring redemption stories you’ll ever hear. Bevan opens up about a childhood marked by trauma, a lifetime of people-pl…
…
continue reading
1
Cybersecurity’s Global Defenders Converge in Riyadh for Black Hat MEA 2025
6:19
6:19
Play later
Play later
Lists
Like
Liked
6:19This story was originally published on HackerNoon at: https://hackernoon.com/cybersecuritys-global-defenders-converge-in-riyadh-for-black-hat-mea-2025. Black Hat MEA 2025 will bring together over 45k attendees, 450 exhibitors, & 300 globalspeakers from December 2–4 at Riyadh Exhibition and Convention Center Check more stories related to cybersecuri…
…
continue reading
1
The Hidden Currency In Every System | Podcast 617
1:08:10
1:08:10
Play later
Play later
Lists
Like
Liked
1:08:10Explore Your Personality: https://PersonalityHacker.com Joel and Antonia explore how generational views on value have shifted—from land and productivity to emotion and social currency. They discuss fiat money, debt, AI, programmable money, and the hidden "currencies" that shape society and relationships.…
…
continue reading
One of the world’s biggest online gaming sites, Roblox, is in the courts. The cases involve the alleged sexual exploitation of a minor, online harassment, and business practices that lead to addiction. That last charge, involving addiction, is connected to an aspect of online gaming that’s passing mostly under the radar. The “gamblification” of gam…
…
continue reading
1
#258 Adam Bry - Why China Fears Skydio’s Rise in AI Drone Technology
2:35:24
2:35:24
Play later
Play later
Lists
Like
Liked
2:35:24Adam Bry is the Co-Founder and CEO of Skydio, the leading U.S. drone manufacturer and world leader in autonomous flight technology, founded in 2014 to develop AI-powered drones for consumer, enterprise, and defense applications. A graduate of the Massachusetts Institute of Technology with a degree in aerospace engineering, Bry was an early team mem…
…
continue reading
1
12.1.25 | Advent of Code 2025, tips for writing Claude.md, Windows drive letters beyond A-Z
10:25
10:25
Play later
Play later
Lists
Like
Liked
10:25This is a recap of the top 10 posts on Hacker News on Dec 1, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:16) - Advent of Code 2025 (01:20) - Writing a good Claude.md (02:26) - Windows drive letters are not limited to A-Z (03:34) - Search tool that only returns content created be…
…
continue reading
1
Le Mans 2000–2009, Inside The Official History with John Brooks
32:14
32:14
Play later
Play later
Lists
Like
Liked
32:14What truly changed at Le Mans when the 2000s began—and why did teams abandon open cockpits just as speeds stayed sky high? We invited author and photographer John Brooks to walk us through the decade he chronicles in Le Mans: The Official History 2000–2009, and his trackside vantage point delivers a rare blend of technical clarity and human detail.…
…
continue reading
1
Unlocking Data Protection: Vishnu Varma on Cybersecurity Challenges
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55Send us a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how Bo…
…
continue reading
1
Cybersecurity Today: QR Code Parking Scams, Evil Twin WiFi Attacks & Microsoft's Teams Flaw
19:12
19:12
Play later
Play later
Lists
Like
Liked
19:12In this episode of Cybersecurity Today, host David Shipley discusses a range of pressing cybersecurity issues. Topics include the surge in QR code parking scams, with recent cases in Monaco, Ottawa, and across Europe; an Australian man sentenced for evil twin WiFi attacks targeting travelers; the shutdown of the Code Red emergency notification syst…
…
continue reading
1
11.30.25 | OpenAI preparing ChatGPT ads, One breakthrough needed, Bazzite for Linux gaming
11:23
11:23
Play later
Play later
Lists
Like
Liked
11:23This is a recap of the top 10 posts on Hacker News on Nov 30, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:17) - Leak confirms OpenAI is preparing ads on ChatGPT for public roll out (01:29) - All it takes is for one to work out (02:34) - Bazzite: The next generation of Linux gami…
…
continue reading
1
One Identity Safeguard Named a Visionary In The 2025 Gartner Magic Quadrant For PAM
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45This story was originally published on HackerNoon at: https://hackernoon.com/one-identity-safeguard-named-a-visionary-in-the-2025-gartner-magic-quadrant-for-pam. Privileged Access Management (PAM) The placement reflects what the company observes across its customer and partner ecosystem, highlighting a collective emphasi Check more stories related …
…
continue reading
1
11.29.25 | 28M Hacker News comments dataset, Imgur geo-blocked UK, Molly improved Signal App
11:43
11:43
Play later
Play later
Lists
Like
Liked
11:43This is a recap of the top 10 posts on Hacker News on Nov 29, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:20) - 28M Hacker News comments as vector embedding search dataset (01:38) - Imgur geo-blocked the UK, so I geo-unblocked my network (02:44) - Molly: An Improved Signal App (…
…
continue reading
1
Quttera Launches "Evidence-as-Code" API to Automate Security Compliance For SOC 2 and PCI DSS v4.0
5:51
5:51
Play later
Play later
Lists
Like
Liked
5:51This story was originally published on HackerNoon at: https://hackernoon.com/quttera-launches-evidence-as-code-api-to-automate-security-compliance-for-soc-2-and-pci-dss-v40. API feeds structured security evidence into GRC platforms. Threat Encyclopedia provides instant context for detected threats. Check more stories related to cybersecurity at: ht…
…
continue reading
Canada is pulling back from progressive policies, but were we ever really committed to them in the first place? Whether it’s the reversal on DEI from BMO, RBC, and Shopify or Carney’s shift away from a feminist foreign policy, Canada is quietly pivoting from Trudeau-era progressive policies. Plus, concerns over Quebec’s proposed constitution and th…
…
continue reading
1
11.28.25 | Thanksgiving wishes, Snapdragon 8 Elite Gen 5 Linux support, Google’s AI advantage with TPUs vs. GPUs
9:55
9:55
Play later
Play later
Lists
Like
Liked
9:55This is a recap of the top 10 posts on Hacker News on Nov 28, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:19) - Tell HN: Happy Thanksgiving (01:10) - Same-day upstream Linux support for Snapdragon 8 Elite Gen 5 (02:09) - TPUs vs. GPUs and why Google is positioned to win AI race …
…
continue reading
1
Espionage and Intelligence - What Cybersecurity Professionals Can Learn
47:41
47:41
Play later
Play later
Lists
Like
Liked
47:41The Intersection of Espionage Techniques and Cybersecurity Threats This episode explores the parallels between espionage and cybersecurity, particularly focusing on social engineering tactics used in both domains. Hosted by Jim Love, the podcast features insights from Neil Bisson, a retired intelligence officer from CSIS, and David Shipley, CEO of …
…
continue reading
Skip Granger is on trial for murder…and Ex-President Chet Phillips is one of his victims. Written by Pete Barry & J. Michael DeAngelis & John Dowgin & Paige Klaniecki Story by Pete Barry & J. Michael DeAngelis Directed by J. Michael DeAngelis & Pete Barry Starring Chris Klaniecki as Skip Granger Nazli Sarpakaya as Mini-McGrath Faith Dowgin as Secti…
…
continue reading
1
When "Just Following Guidelines" Isn't Enough
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10This story was originally published on HackerNoon at: https://hackernoon.com/when-just-following-guidelines-isnt-enough. A Reddit post highlights the failure modes of internal AI agents. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #ai-security, #machine-learning,…
…
continue reading
1
When APIs Talk Too Much – A Lesson About Hidden Paths
3:46
3:46
Play later
Play later
Lists
Like
Liked
3:46This story was originally published on HackerNoon at: https://hackernoon.com/when-apis-talk-too-much-a-lesson-about-hidden-paths. Why API security requires more than just endpoint protection and what developers can take away. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content…
…
continue reading
1
Episode 150: ASP.NET MVC Patterns, Popping Oracle Identity, and Esoteric Subdomain Enumeration
57:20
57:20
Play later
Play later
Lists
Like
Liked
57:20Episode 150: In this episode of Critical Thinking - Bug Bounty Podcast we're highlighting some cool news and research, but not before expressing our gratitude to the Hacker community. We are so thankful for you all! Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback here: info@critica…
…
continue reading
1
#257 Jocko Willink - Commander of SEAL Team-3 Task Unit Bruiser aka "The Punishers"
5:58:04
5:58:04
Play later
Play later
Lists
Like
Liked
5:58:04Jocko Willink is a retired U.S. Navy SEAL officer, bestselling author, and leadership expert with a 20-year military career. Enlisting at 19, he completed BUD/S class 177, served with SEAL Teams One and Two, and later commissioned as an officer with deployments across Asia, the Middle East, and Europe. He led SEAL Team Three’s Task Unit Bruiser in …
…
continue reading
1
11.27.25 | Voyager 1 nearing one light-day from Earth, hotel bathroom doors needed, Zig repository migrating to Codeberg
12:09
12:09
Play later
Play later
Lists
Like
Liked
12:09This is a recap of the top 10 posts on Hacker News on Nov 27, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:17) - Voyager 1 is about to reach one light-day from Earth (01:24) - Bring bathroom doors back to hotels (02:24) - Migrating the main Zig repository from GitHub to Codeberg …
…
continue reading
1
Why Nurturing Connection is Good for Your Health
49:34
49:34
Play later
Play later
Lists
Like
Liked
49:34So often, our relationships take a backseat to everything else on our to-do lists — but new research shows that nurturing personal connections plays a central role in our health and well-being. On this episode, we explore the science of connection, from why it’s important, to how we can make it a priority in our lives.…
…
continue reading
What happens when a family heirloom gets a NASCAR heart and a date with a mountain? We brought Richard Tomlin of Apex Auto Works on to share the full story of transforming a 1968 Plymouth Roadrunner into a Pike’s Peak contender by setting the classic body over a stretched NASCAR truck chassis and dropping in a Mopar R5 P7 that sings to 9,500 RPM. T…
…
continue reading
1
Cybersecurity Update: Incorrect Company Naming, Major Breaches, and New Malware Campaigns
12:58
12:58
Play later
Play later
Lists
Like
Liked
12:58In this episode, the host addresses a previous mistake in naming a company involved in a breach, correcting SitusAMC for Ascensus, and extends apologies. Key topics include US banks assessing a breach fallout from financial tech vendor SitusAMC, ransomware group CioP targeting Broadcom through Oracle's vulnerabilities, a new malware campaign hiding…
…
continue reading
1
The hack that brought back the zombie apocalypse
40:58
40:58
Play later
Play later
Lists
Like
Liked
40:58America's airwaves are haunted by zombies again, as we dig into a decade of broadcasters leaving their hardware open to attack, giving hackers the chance to hijack TV shows, blast out fake emergency alerts, and even replace religious sermons with explicit furry podcasts. Meanwhile, we look at how a worker at a cybersecurity firm allegedly leaked in…
…
continue reading
1
#837: How to Simplify Your Life in 2026 — New Tips from Derek Sivers, Seth Godin, and Martha Beck
32:18
32:18
Play later
Play later
Lists
Like
Liked
32:18As we head into the new year, many of us feel like we’re drowning in invisible complexity. So I wanted to hit pause and ask a simple question: What are 1-3 decisions that could dramatically simplify my life in 2026? To explore that, I invited three close friends and long-time listener favorites—Derek Sivers, Seth Godin, and Martha Beck. This episod…
…
continue reading
1
Educational Byte: How Fake CAPTCHAs Can Steal Your Crypto
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01This story was originally published on HackerNoon at: https://hackernoon.com/educational-byte-how-fake-captchas-can-steal-your-crypto. Fake CAPTCHAs are tricking users into installing malware that steals crypto wallets. Learn how they work and how to spot and avoid these scams. Check more stories related to cybersecurity at: https://hackernoon.com/…
…
continue reading
1
Zero Trust Security Goes Mainstream as Breach Costs Hit Record Highs
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48This story was originally published on HackerNoon at: https://hackernoon.com/zero-trust-security-goes-mainstream-as-breach-costs-hit-record-highs. Learn why Zero Trust is vital in 2025, how AI-driven attacks and regulations increase the stakes, and practical ways to protect your business today. Check more stories related to cybersecurity at: https:…
…
continue reading
A cocaine lawyer, a crime blog, and a $15 million reward. Eight more Canadians are arrested and a sensational new indictment from Operation Giant Slalom puts the Ryan Wedding case back in the headlines around the world. But how is Ryan Wedding’s background shaping the coverage? Host: San Grewal Credits: James Nicholson (Producer), Jules Bugiel (Ass…
…
continue reading
1
11.26.25 | Google Antigravity data exfiltration, YouTube's prophecy fulfilled, big software projects failing despite trillions spent
12:02
12:02
Play later
Play later
Lists
Like
Liked
12:02This is a recap of the top 10 posts on Hacker News on Nov 26, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:21) - Google Antigravity exfiltrates data via indirect prompt injection attack (01:37) - Someone at YouTube Needs Glasses: The Prophecy Has Been Fulfilled (02:44) - Trillion…
…
continue reading
Some faces you can’t forget. We kick off with a sharp, entertaining tour of automotive front ends that sparked love, hate, and head-scratching in equal measure—from the Jeep Cherokee KL’s split lighting and the Lincoln MKT’s controversial split wing to the Dodge Nitro’s gym-bro stance and the Chevy SSR’s retro grin. The thread through all of them i…
…
continue reading
1
Major US Bank Data Linked Through Breach At SitusAMC
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32In today's episode of Cybersecurity Today, hosted by Jim Love, several major cybersecurity incidents are discussed. US banks are assessing the impact of a security breach at SitusAMC, where the ALFV ransomware group claimed to have stolen three terabytes of data. CIOP has targeted Broadcom through Oracle's E-Business Suite vulnerabilities. A new ma…
…
continue reading
1
Risky Business #816 -- Copilot Actions for Windows is extremely dicey
58:07
58:07
Play later
Play later
Lists
Like
Liked
58:07In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Salesforce partner Gainsight has customer data stolen Crowdstrike fires insider who gave hackers screenshots of internal systems Australian Parliament turns off wifi and bluetooth in fear of of visiting Chinese bigwigs Shai-Hulud npm/Github worm is b…
…
continue reading
1
Trevor Lawrence is the most polarizing player in the league
1:03:28
1:03:28
Play later
Play later
Lists
Like
Liked
1:03:28A Jacksonville Jaguars podcast. A little Xs and Os, a lot of vibes. Join our Discord Chat ► https://discord.gg/BJmXnbbUDonate $5/mo. to the cause of Dunn and Drew! It helps fight burnout! LOL ► Patreon.com/dunnanddrewMerch Store!! ► https://www.dunnanddrew.com/Join the Sports conversation in our Facebook Group ► https://www.facebook.com/groups/dunn…
…
continue reading
1
Every NDP Leadership Candidate on WTF They Would Do
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46The federal NDP leadership race is officially on. Five candidates want the job, and each of them thinks they know how to rescue a party that's been drifting into irrelevance. In this special episode, Noor sits down with all five contenders (Tony McQuail, Rob Ashton, Avi Lewis, Heather McPherson, and Tanille Johnston) for an unfiltered, no-notes con…
…
continue reading
1
11.25.25 | Pebble Watch software open source, Claude Opus 4.5 released, over 300 infected NPM packages
12:05
12:05
Play later
Play later
Lists
Like
Liked
12:05This is a recap of the top 10 posts on Hacker News on Nov 25, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:20) - Pebble Watch software is now open source (01:28) - Claude Opus 4.5 (02:41) - Shai-Hulud Returns: Over 300 NPM Packages Infected (03:52) - Claude Advanced Tool Use (05:…
…
continue reading
1
EV Reality Check: Incentives, Charging, And Choice
29:48
29:48
Play later
Play later
Lists
Like
Liked
29:48EVs can feel like a battlefield of headlines and hot takes, so we put the rhetoric aside and dig into what actually matters on the road: incentives, charging reality, range you can trust, and the freedom to choose what fits your life. We start with a clear-eyed look at Honda’s massive EV write-down and a supplier lawsuit tied to a delayed electric …
…
continue reading
1
Ep 146. Control, control, you must learn control. Ft. TicTac
1:23:54
1:23:54
Play later
Play later
Lists
Like
Liked
1:23:54TicTac Joins us to talk about what it means to be a control player.
…
continue reading
1
Why the MITRE ATT&CK Framework Actually Works
10:10
10:10
Play later
Play later
Lists
Like
Liked
10:10This story was originally published on HackerNoon at: https://hackernoon.com/why-the-mitre-attandck-framework-actually-works. ATT&CK makes detection engineering measurable by mapping real TTPs to your content, exposing visibility gaps attackers rely on to stay hidden. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersec…
…
continue reading