Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Vulnerability Research Podcasts

show episodes
 
You might think you know what it takes to lead a happier life… more money, a better job, or Instagram-worthy vacations. You’re dead wrong. Yale professor Dr. Laurie Santos has studied the science of happiness and found that many of us do the exact opposite of what will truly make our lives better. Based on the psychology course she teaches at Yale -- the most popular class in the university’s 300-year history -- Laurie will take you through the latest scientific research and share some surpr ...
  continue reading
 
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
  continue reading
 
Artwork
 
Practice As Research aims to bring together the many different strands of practice-led/based research across all disciplines so as to not be limited by disciplinary conventions, but instead to benefit from cross-disciplinary fertilisation. In the wider academic communities, there are many terms in use to describe the research-practice nexus. For the sake of consistency we adopt the term 'practice as research'. Fundamentally, we consider practice as research any practice that is underpinned b ...
  continue reading
 
Artwork
 
Hosted by therapist Dustin Oliver, MHC-LP, boy meets therapy blends clinical research with real conversations about vulnerability, relationships, friendship, identity, and culture with an emphasis on the LGBTQ+ community. Episodes feature solo insights and in-depth interviews with licensed professionals who share both their expertise and their humanity. Perfect for queer listeners, allies, and mental health aficionados seeking affirming, research-informed discussions about therapy and life.
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Threats, Beers, and No Silver Bullets. Listen to Talos security experts as they bring their hot takes on current security topics and Talos research to the table. Along the way, Mitch, Matt and a rotating chair of special guests will talk about anything (and we mean anything) that's on their minds, from the latest YouTube trends to Olympic curling etiquette. New episodes every other Thursday.
  continue reading
 
Artwork

1
Consider Before Consuming

Fight the New Drug

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Think about all of the things you consider every day to help keep yourself, your loved ones, and your community happy, healthy, and hopeful. Now consider this: There is an ever-growing body of research demonstrating significant negative impacts, for yourself and the ones you love, in the consumption of pornography. It can change the way you think, harm your ability to connect with other people, and can contribute to changing the world in negative ways. Join us every other week as we consider ...
  continue reading
 
Artwork

1
Unlocking Us with Brené Brown

Vox Media Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
I’ve spent over 20 years studying the emotions and experiences that bring meaning and purpose to our lives, and if there’s one thing I’ve learned it’s this: we are hardwired for connection, and connecting requires courage, vulnerability, and conversation. I want this to be a podcast that’s real, unpolished, honest, and reflects both the magic and the messiness of what it means to be human. Episodes will include conversations with the people who are teaching me, challenging me, confusing me, ...
  continue reading
 
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
  continue reading
 
”Shoulder to Shoulder” by With-you is a compelling and empowering podcast that explores the profound impact of peer support and lived experience in the journey of personal growth, mental health and resilience. In a world that often stigmatises vulnerability and isolates individuals facing challenges, ”Shoulder to Shoulder” offers a safe and welcoming space for listeners to explore the power of connection and shared wisdom.Hosted by Cate Munro this podcast invites a diverse range of guests wh ...
  continue reading
 
What is spectrum policy? Why do we need it? How is it used? Spectrum policy is about managing the use of the airwaves by mobile phones, satellites and a huge range of other devices ranging from radio telescopes to garage door openers. How can we ensure that all these users get access to the spectrum while bringing the maximum benefits to society? This podcast brings together experts from engineering, economics and policy-making to discuss current issues. It is brought to you by PolicyTracker ...
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
  continue reading
 
Host John Pemberton — diabetes educator, researcher, and dad living with type 1 since 2008 — explores how to think clearly about type 1 diabetes in the real world. Each episode translates current evidence and expert practice into decisions you can use: CGM accuracy and interpretation, getting more from pumps and automated insulin delivery, movement as a glucose tool, nutrition that protects performance and enjoyment, sleep, travel, parties, and sport. Guests include leading clinicians, resea ...
  continue reading
 
Artwork

1
SEI Shorts

Members of Technical Staff at the Software Engineering Institute

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.
  continue reading
 
What does it mean to live, lead, and grow in today’s world, and how do our emotions shape the way we show up? Generations in Session brings together two therapists at different stages of their journey: Elizabeth, a psychologist with nearly three decades of experience, and Kaelen, a new clinician stepping into the field. Together, they explore the intersections of mental health, identity, leadership, and relationships through both a seasoned and emerging perspective. Across the first season, ...
  continue reading
 
Artwork
 
A journey exploring African masculinity through research, conversations, and personal reflection. The show examines what it means to be an African man today, drawing on academic studies and diverse perspectives from across the continent's rich cultures. Covering topics from personal growth and fatherhood to identity, vulnerability, and accountability. Hosted by a former humanitarian worker turned stay-at-home dad, this programme explores what it means to be a man today, engaging with nuance ...
  continue reading
 
This podcast aims to help leaders understand current and future leadership trends and encourage leaders to explore their horizons and understand the skills that will help them become even more successful moving forward. Welcome to Leadership Horizons, where we explore leadership at its most transformative through two unique perspectives. I am Lois Burton, an executive coach and leadership development specialist and I've witnessed first hand how great leadership can transform organizations ac ...
  continue reading
 
A six parts podcast series that explores how refugees experience their „vulnerabilities“ when seeking asylum. In this podcast we want to focus on the individual experiences and feelings, that constitute the „vulnerability“ of refugees and that are often overlooked. - We bring together scientific field work AND the stories of refugees. We wanted to know: How does vulnerability show at the different stages of the migration process? To answer this question we talked to three people from three d ...
  continue reading
 
Dr. Abbie Henson dives into critical conversations with those who have been directly impacted by the criminal justice system- whether through lived experience, research, or both. These conversations get into the weeds on complex justice-related issues and encourage listeners to think critically, challenge existing narratives, and cultivate change through dialogue. Guided by the belief that systemic change stems from individual change and individual change stems from exposure to new ideas and ...
  continue reading
 
Artwork
 
Our journal of learning about and living with Lichen Sclerosus from a patient's point of view. Bringing community and awareness to a disorder that hardly anyone knows about. Join me as I research Lichen Sclerosus from every angle and share my struggles living with it. My hope is to build a community of survivors so we can affect change in our lives and the research.
  continue reading
 
On Crying Out Loud, our goal is to destigmatize mental health and treatment by providing insight into the mental health world by using evidence-based research and real-life experiences. Join us on our journey of vulnerability as we discuss our own history of trauma, resilience, and healing practices.
  continue reading
 
Artwork

1
Get Together

People & Company, Bailey Richardson, Kevin Huynh, Kai Elmer Sotto, Maggie Zhang, Mia Quagliarello

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A show about ordinary people building extraordinary communities. "Get Together" is hosted by the team at People & Company and our correspondents Mia Quagliarello, Maggie Zhang, Marjorie Anderson, and Whitney Ogutu.
  continue reading
 
Artwork

1
Canada Foundation for Innovation

Canada Foundation for Innovation

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Since 1997, the Canada Foundation for Innovation has invested in infrastructure that researchers need to think big, innovate and push the boundaries of knowledge. State-of-the-art research facilities and equipment increase the capability of Canada’s universities, colleges, research hospitals and non-profit research organizations to carry out high-quality research. This, in turn, helps them to attract and retain the world’s top talent, train the next generation of researchers and support worl ...
  continue reading
 
Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.
  continue reading
 
Artwork

1
How She Really Does It

Koren Motekaitis

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
How She Really Does It, is a place for you to learn how to create the life you want. It is the place where inspiration + possibility meet. Here you can create your life, your way in a REAL way that fits you, where you belong. This show is a place for you to learn, grow, create and tweak your life. The show is a place to see the glimmer of possibilities from other people's experiences and/or research.
  continue reading
 
Artwork
 
Only scientists who are honest and authentic or are working towards it will be on this podcast. Professor Brene Brown's research shows that vulnerability fosters good emotional and mental health. It is a sign of courage. We become more resilient and brave when we embrace who we truly are and what we are feeling. The Vulnerable Scientist Podcast is a space for scientists to tell their honest and authentic stories. I am your host Sarah Nyakeri who happens to be a scientist, Informal science co ...
  continue reading
 
Artwork

1
American Journal of Psychiatry Audio

American Journal of Psychiatry

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Each episode of AJP Audio brings you an in-depth look at one of the articles featured in that month's issue of The American Journal of Psychiatry, the official journal of the American Psychiatric Association. Wide-ranging interviews with article authors cover the background, rationale, main findings, and future implications of the research. This podcast is subject to the Terms of Use at ww.psychiatry.org. The views and opinions expressed in this podcast are those of the individual speakers o ...
  continue reading
 
Artwork

1
Semi-Together

Gillian Burgess and Melia Dicker

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Semi-Together is a podcast by sisters Gillian Burgess and Melia Dicker about having some of your life together all of the time. It’s about working on where you want to get it together, while giving yourself credit for where you’ve got it together. As we learn to live with more calm, joy, and authenticity, we share takeaways from our research and experience that you can use, too. Topics: Perfectionism, self-compassion, personal development, anxiety, stress, coping skills, psychology, goals, a ...
  continue reading
 
Artwork
 
The Latter Day Struggles Podcast addresses beliefs and issues within the LDS faith that are challenging to talk about but vital to discuss for those trying to navigate their relationship in or around the church. Valerie and her guests invite psychological maturity, theological health, and institutional integrity.
  continue reading
 
Artwork

1
15 Minutes with Dad: Emotional Presence, Co-Parenting for Father's Growth

Lirec Williams | Parenting, Growth & Leadership Expert

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Hosted by Lirec Williams, 15 Minutes with Dad is a dynamic podcast focused on fatherhood, co-parenting, and personal growth. Each episode gives modern dads the tools and insights to create healthier families through emotional healing, parenting resilience, and intentional leadership. In just 15 minutes (well, sometimes a bit more), we explore the real stories that shape modern fatherhood—from breaking generational cycles and healing childhood trauma to building emotional presence, developing ...
  continue reading
 
Artwork

1
Real Fuel with SLS

Stevie Lyn Smith MS, RDN, CSSD, CDN

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to Real FUEL with SLS: real food, real training, real talk where we push past the finish line and surface level stuff and dive into the real world of endurance sports– where we’re both an athlete, and human. I'm your host, Stevie Lyn, and I'm here to tell you this isn’t going to be a lighthearted small talk kind of show. We're talking sweat, tears, and the honest truth about what it takes to conquer mountains, both literal and metaphorical without losing sight on having fun and findi ...
  continue reading
 
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
  continue reading
 
Real People is a podcast hosted by Jason Dunstone, the founder and managing director of Square Holes. Jason builds on his 25 years of conducting human-centred research, interviewing average and not so average people (rich, poor, old, young, content and vulnerable) to understand what they believe and how they behave. On this podcast, Jason interviews academics, researchers, leading thinkers, and other interesting people. Jason also interviews “actual real people” about their passions, aspirat ...
  continue reading
 
Artwork

1
Sentencing Matters

Queensland Sentencing Advisory Council

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Queensland Sentencing Advisory Council provides independent research and advice, seeks public views and promotes community understanding of sentencing matters.
  continue reading
 
Artwork

51
The Quantum State

BTQ Technologies Corp

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Quantum State," is a podcast exploring the latest research and innovation in quantum computing. Join us as we dive into groundbreaking breakthroughs, trends, and news shaping the quantum landscape. Discover the cutting-edge developments pushing the boundaries of computing technology. Through insightful discussions, expert interviews, and in-depth analysis, we unravel the intricate theories and real-world applications driving this transformative field. "The Quantum State" also offers upda ...
  continue reading
 
Loading …
show series
 
In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigat…
  continue reading
 
NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump’s cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method. Researchers warn a popular open-source server monitoring tool is being abused. Cyber cri…
  continue reading
 
Send us a text In this powerful episode of The Aligned Father, host Lirec Williams challenges the outdated definition of manhood many fathers inherited and reveals why unlearning old conditioning is essential for healthy modern fatherhood. Most men were raised to believe that strength means silence, leadership means control, and love is proven thro…
  continue reading
 
Send us a Positive Review! Series title: Mormon Faith Crisis—Progression, Not Pathology [Part I of III] The data is rolling in and Wow…if you want to know what’s really on the hearts and minds of many active Latter-day Saints, this 3-part series is a GOLD MINE. Join Val and colleague Jeff Strong, prominent researcher on Mormon faith crisis as they …
  continue reading
 
DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. Bu…
  continue reading
 
Please enjoy this encore of Career Notes. Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking int…
  continue reading
 
Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. Using examples…
  continue reading
 
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Am…
  continue reading
 
Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn t quite clean for ISC, but SSL2 and SSL3 systems have been cut down by about half. https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ra…
  continue reading
 
Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accu…
  continue reading
 
Mobile Threat Alert: Crypto Mnemonic Phrase Stealer SeedSnatcher is a newly uncovered Android malware family targeting the crypto ecosystem, built to steal users’ mnemonic recovery phrases using a sophisticated DisplayOverlay attack Capabilities: Intercepts and exfiltrates seed phrases and private keys from major cryptocurrency wallets Presents dec…
  continue reading
 
Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit applications that do not have Next.js exposed. https://isc.sans.edu/diary/Maybe%20a%20Little%20Bit%20More%20Intere…
  continue reading
 
Researchers detail a years-long Russian state-sponsored cyber espionage campaign. Israel’s cyber chief warns against complacency. Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. MITRE expands its D3FEND cybersecurity ontology to cover operational technology. Te…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analyst Ivan as they discuss: React2Shell Exploits Flood the Internet as Attacks Continue (1:06) ClickFix Style Attack Leveraging Grok and ChatGPT for Malware Delivery (7:39) New ConsentFix Attack Hijacking Microsoft Accounts via Azure CLI (13:50) Holiday Season Attac…
  continue reading
 
Trigger Warning: This episode includes discussion of sexual violence, exploitation, and child sexual abuse. Listener discretion is advised. Heidi Olson is a Sexual Assault Nurse Examiner and the Founder and President of Paradigm Shift Training and Consulting. Drawing from years of frontline medical experience, Heidi explains why sexual exploitation…
  continue reading
 
The rush to close the year can drown out the one habit that multiplies growth: reflection. We press pause to turn a demanding 2025 into hard-won wisdom for 2026, sharing a practical framework you can complete in 30–45 minutes that transforms experience into better decisions, calmer leadership, and clearer priorities. Lois recaps the forces that sha…
  continue reading
 
Beyond RC4 for Windows authentication Microsoft outlined its transition plan to move away from RC4 for authentication and published guidance and tools to facilitate this change. https://www.microsoft.com/en-us/windows-server/blog/2025/12/03/beyond-rc4-for-windows-authentication FortiCloud SSO Login Vuln Exploited Arctic Wolf observed exploit attemp…
  continue reading
 
Venezuela’s state oil company blames a cyberattack on the U.S. An Iranian hacker group offers cash bounties for doxing Israelis. Germany’s lower house of parliament suffers a major email outage. South Korea’s e-commerce breach exposes personal information of nearly all of that nation’s adults. Researchers report active exploitation of two critical …
  continue reading
 
In this episode, host Kim Jones tacks a topic that is rapidly moving from theoretical to operational reality: quantum computing. While classical computing will remain the backbone of our systems for years to come, quantum technologies are advancing fast enough that CISOs must begin preparing today. Kim explores what quantum computing really means, …
  continue reading
 
CYFIRMA researchers have identified a sophisticated Android malware operation spreading via fake RTO Challan/e-Challan notifications shared over WhatsApp. The malicious APK uses two-stage installation, NP-based code obfuscation, and a custom VPN layer to evade detection and maintain persistent control over infected devices. C2 Infrastructure Expose…
  continue reading
 
More React2Shell Exploits CVE-2025-55182 Our honeypots continue to detect numerous React2Shell variants. Some using slightly modified exploits https://isc.sans.edu/diary/More%20React2Shell%20Exploits%20CVE-2025-55182/32572 The Fragile Lock: Novel Bypasses For SAML Authentication SAML is a tricky protocol to implement correctly, in particular if dif…
  continue reading
 
Apple and Google issue emergency updates to patch zero-days. Google links five additional Chinese state-backed hacking groups to “React2Shell.” France’s Ministry of the Interior was hit by a cyberattack. Atlassian patches roughly 30 third-party vulnerabilities. Microsoft says its December 2025 Patch Tuesday updates are breaking Message Queuing. Res…
  continue reading
 
Send us a Positive Review! In this episode of Latter Day Struggles, Valerie and guest Maxine Hanks dive into the complexities of reform and personal wellness within the Church of Jesus Christ of Latter-Day Saints. This fascinating conversation explores the first-hand experience of two women whose influential work spans a half-century in the LDS spo…
  continue reading
 
Going home for the holidays can bring up more than nostalgia for many gay people. It can activate old family roles, unspoken rules, emotional triggers, and versions of yourself you thought you outgrew. In this episode, Dustin explores why returning to your hometown can feel so emotionally complex. From family systems that never updated, to subtle i…
  continue reading
 
What stresses you out over the festive season? Happiness Lab listeners sent in their holiday woes so Dr Laurie and guest Rainn Wilson (The Office star and host of Soul Boom) could weigh in with some science-backed advice. In the second part of our Holiday Survival Guide, Dr Laurie and Rainn discuss what makes the perfect gift, how to slow down to e…
  continue reading
 
Abusing DLLs EntryPoint for the Fun DLLs will not just execute code when some of their functions are called, but also as they are loaded. https://isc.sans.edu/diary/Abusing%20DLLs%20EntryPoint%20for%20the%20Fun/32562 Apple Patches Everything: December 2025 Edition Apple released patches for all of its operating systems, fixing two already exploited…
  continue reading
 
Please enjoy this encore of Career Notes. Chief security officer and chief information officer at Relativity, Amanda Fennell shares her story from archeology to cybersecurity. She shares the path that lead her towards becoming an archeologist and how it turned out not being exactly what she expected. She then shares how she got into the cyber busin…
  continue reading
 
Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China’s Great Firewall. Across both parts, you break down thousands of leaked document…
  continue reading
 
A new executive order targets states’ AI regulations, while the White House shifts course on an NSA deputy director pick. The UK fines LastPass over inadequate security measures. Researchers warn of active attacks against Gladinet CentreStack instances. OpenAI outlines future cybersecurity plans. MITRE ranks the top 25 vulnerabilities of 2025. CISA…
  continue reading
 
CYFIRMA | November 2025 Ransomware Snapshot Ransomware activity shifted fast in November—Akira and INC Ransom surged; AI-driven tools accelerated attacks, and critical sectors like Manufacturing, IT, and Professional Services took the heaviest hits. North America remained the top target as threat actors expanded into virtualization platforms and ev…
  continue reading
 
Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 Mystery Google Chrome 0-Day Vulnerability Google released an update for Google Chrome fixing a vulne…
  continue reading
 
Send us a text What happens when a car accident stops life in its tracks — leaving you facing pain, uncertainty, and a future you never imagined? In this powerful episode of Shoulder to Shoulder, Cate speaks with José Argudo — husband, new dad, volunteer, and trauma survivor. Just two weeks into a new job, having recently moved house and with a bab…
  continue reading
 
CISA warns that pro-Russia hacktivist groups are targeting US critical infrastructure. Google patches three new Chrome zero-day vulnerabilities. North Korean actors exploit React2Shell to deploy a new backdoor. Researchers claim Docker Hub secret leakage is now a systemic problem. Attackers exploit an unpatched zero-day in Gogs, the self-hosted Git…
  continue reading
 
APT36 Targets Indian Government Entities with a New Python-Based ELF Malware. CYFIRMA has uncovered a new cyber-espionage campaign by APT36 (Transparent Tribe), a Pakistan-based threat actor long known for targeting Indian government entities and strategic sectors. This campaign showcases a major leap in the group’s technical sophistication — deliv…
  continue reading
 
Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on. https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Comma…
  continue reading
 
Patch Tuesday. Federal prosecutors charge a Houston man with smuggling Nvidia chips to China, a Ukrainian woman for targeting critical infrastructure, and an Atlanta activist for wiping his phone. The power sector sees cyber threats doubling. The new Spiderman phishing kit slings its way across the dark web. Our guest is Dick O'Brien, Principal Int…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John along with systems security engineer Corey and intelligence analyst Hayden as they discuss: Chinese Threat Groups Exploiting the React2Shell Vulnerability (1:18) CISA Issues Alert on Persistent Brickstorm Backdoor Attacks (9:05) ShadyPanda Hackers Turn Millions of Browsers into Weapon…
  continue reading
 
Leadership shouldn’t feel like driving with one foot on the gas and the other on the brake. When uncertainty stacks up and decisions never stop, your nervous system stays on high alert and your best thinking goes offline. We unpack what burnout really is—biology, not a character flaw—and show how to reclaim clarity, energy, and courage without sacr…
  continue reading
 
Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution in ColdFusion, as well as the code execution issue in Acrobat, will very likely see exploits soon. h…
  continue reading
 
Organizations worldwide scramble to address the critical React2Shell vulnerability. Major insurers look to exclude artificial intelligence risks from corporate policies. Three Chinese hacking groups converge on the same Sharepoint flaws. Ransomware crews target hypervisors. A UK hospital asks the High Court to block publication of data stolen by th…
  continue reading
 
Suggest guests or get in contact Host: John Pemberton, RD Guest: Diabetes with Milly (Milly) Episode page: Detailed show notes In this episode, Milly joins John to explore how real community forms when people with type 1 diabetes feel safe enough to be vulnerable. Diagnosed during lockdown and thrown into DKA in the final year of her biology degree…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play