Podcasts from Akamai's Security Team.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Tired of the lies? Tired of the spin? Are you ready to hear the hard-hitting truth in comprehensive, conservative, principled fashion? The Ben Shapiro Show brings you all the news you need to know in the most fast moving daily program in America. Ben brutally breaks down the culture and never gives an inch! Monday thru Friday.
…
continue reading
Daniel discusses and explains various topics on computers and technology.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Freelancing and marketing nuggets for web designers, without the fluff. TheFreelancerPodcast.com
…
continue reading
Listen in on brief discussions among Cisco and industry experts about the latest issues in network security and the solutions available to help address your business challenges.
…
continue reading
A weekly podcast about web design and development with a little zest from Amy Dutton and Brad Garropy
…
continue reading
Keeping you up to speed with the latest web security news
…
continue reading
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Welcome to Everyday Heroes, a podcast about the unsung heroes of the tech world. From the phone in your pocket to the world's most critical digital infrastructure, open-source software has a hand in it. These free technologies that shape our digital world wouldn't be anything without the Heroes that maintain them, promote them, and evolve them - these are their stories. Everyday Heroes is brought to you by HeroDevs.
…
continue reading
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
Welcome to Act on Tech, the podcast that empowers you to harness technology to boost your productivity and simplify your life. Hosted by tech enthusiast and entrepreneur Alex, each episode dives into actionable tips, tools, and insights to help you stay ahead in the digital age. Discover practical advice, expert opinions, and cutting-edge trends, all while learning about Alex Custom Tech, a leading MSP dedicated to providing personalized IT solutions for business and residential customers. T ...
…
continue reading
The Call Kent podcast is a regular podcast where you call in with a question and Kent answers. Call in with your questions right from your web browser with any device at https://kentcdodds.com/call
…
continue reading
The Executive Insights podcast, brought to you by AWS (Amazon Web Services), features peer-to-peer conversations between business executives on innovating for growth, building resiliency, and shaping the future of their organizations. Learn more at AWS Executive Insights and follow us on LinkedIn. For video versions of these and other conversations, subscribe to our YouTube playlist.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A podcast for the tech community. The theme for Off Script is to challenge ideas and opinions within the tech community. We dig into important topics with special guests, talking frankly in an unscripted setting. Off Script is hosted by Josh Nesbitt and James Hall. Subscribe for future episodes.
…
continue reading
Every week Wayne Scott from brings together a team of technology journalists from http://www.ITProPortal.com to discuss, share analysis and argue about the biggest Tech News stories of the past week. From enterprise and business technology, to tech start ups, consumer gadgets, office IT and mobile you can get informed here. Plus join us live at some of the many technology shows around the world like CeBit, IFA, Infosec, The Gadget Show and much more !
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading

1
The Medcurity Podcast: HIPAA Compliance | Security | Technology | Healthcare
Medcurity: HIPAA Compliance
Healthcare is complicated. Joe Gellatly and Amanda Hepper are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more.
…
continue reading
"Web 3.0 with Sam Kamani" is all about Web 3 and how it is going to change the world. If you are interested in learning more about the 4th Industrial revolution then this podcast is for you. Web 3.0 or Web 3 is often hailed as the technology that will usher in the 4th industrial revolution. This revolution is going to affect every industry, business, government and person on this planet. Web 3.0 is a collection of technologies that are going to change how we collaborate with each other and i ...
…
continue reading
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
…
continue reading
The Laravel Community getting together discussing development and life using the world's best framework, Laravel.
…
continue reading
Sharing the work we do around the open web, information security and user privacy is an important role of Mozilla Security. The Mozilla Security Bytes podcast discuss various topics and technologies implemented in Firefox and other Mozilla products and initiatives.
…
continue reading
Twice per month, Peter House and Mike Chmielewski discuss current cyberthreats and issues. Internet Weather Report is recorded at the studios of Big Cabbage Radio in Palmer, Alaska.
…
continue reading

1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
Welcome to DataNext Podcast, every week our CEO Zeeshan Baig talks about latest Tools and Technologies, shares his experience, Best practices on Cloud computing, Big data, DevOps, Security. Tips on work-life balance, Professional Career and much much more. Subscribe and stay up to date with what's Next in Enterprise IT.
…
continue reading
WebInnovationX Web Innovation Center is a Global Think Tank in Digital Transformation of Businesses, the Study of the Social and Economic Impacts of the World Wide Web, and home to the World Wide Web Consortium W3C NY Metro Chapter. Join Our Thought Leaders at SymposiumX CertificationX AccelerationX. Meet the Experts and Get Inspired on Innovation Thought Leadership, Strategy, and Tactics. Powered by FortuneTimes Group.
…
continue reading
From development and design to marketing and support, Under the Radar is all about independent app development. It's rarely longer than 30 minutes. Hosted by Marco Arment and David Smith.
…
continue reading
The Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the ever-evolving realm of technology and digital innovation. Each episode is a treasure trove of knowledge, focusing on critical areas such as cybersecurity, the intricacies of SEO, and the latest advances in the digital world. Greg's expertise as a technical advisor shines through as he explores the nuances of digital marketing, offering listeners an in-depth understanding of the skills needed to stay ahead in t ...
…
continue reading
This Cyber Security podcast is intended to help people better protect themselves from Cyber criminals by offering quick tips, hacking news summaries and interviews with industry professionals. USB our Guest is the cyber security podcast you have been looking for. Offering quick tips and attack overviews 5-10 minutes in length intended to help people better protect themselves from Cyber criminals and 1-2hr interviews with industry professionals. From 2FA to Zero-Days and everything in between ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
…
continue reading
Hosted by Shi Khai of LongHash Ventures, we chat with the most innovative founders of Web 3.0 building more open, inclusive, and equitable financial and social infrastructure.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media’s Phil Tarrant, defence and national security podcaster, Major General (Ret’d) Dr Marcus Thompson AM – former head of the ADF’s Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
Uptime and performance monitoring made easy.
…
continue reading
Steven Crowder brings you news, entertainment and politics with the most politically incorrect show on the web. Guests, rants, sketches, your calls ... it's whatever. Watch the VIDEO version of this podcast here: http://www.louderwithcrowder.com/mugclub
…
continue reading
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
…
continue reading
Web site building with WordPress. In this podcast we follow the hopeless exploits of David Waumsley and Nathan Wrigley as they try, and fail, to understand WordPress. They know that they love building websites with WordPress, but the complexities of this awesome web building solution are always out of reach. Not only are they not clever enough, but they just don't try all that hard
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading

1
Actively Exploited: Commvault Web Shells, Active! mail RCE, and Brocade Code Injection Now in KEV
17:21
17:21
Play later
Play later
Lists
Like
Liked
17:21Three actively exploited vulnerabilities—CVE-2025-42599 (Qualitia Active! mail), CVE-2025-3928 (Commvault Web Server), and CVE-2025-1976 (Broadcom Brocade Fabric OS)—have been added to CISA’s KEV catalog. The Qualitia flaw is a remote stack-based buffer overflow (CVSS 9.8) allowing code execution without authentication. Commvault's vulnerability pe…
…
continue reading

1
DOS, Web Cams, VSCODE, Coinblack, Oracle, P&G, Satan, Sec Gemini, Josh Marpet... - SWN #466
33:48
33:48
Play later
Play later
Lists
Like
Liked
33:48DOS Lives, Web Cams Gone Wild, VSCODE, Coinblack, Oracle, P&G, Satan, Sec Gemini, Shopify, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-466
…
continue reading
Este es un audio de guv.eth donde confirma que hackeo el CMS del sitio web de @elpaisuy - portal de noticias mas importante (a mi criterio) junto con @ObservadorUY del Uruguay --- Este audio no esta editado ni sacado de contexto, lo puedo garantizar.Hay que escuchar a la otra para para conocer lo que @elpaisuy comenta sobre este tema. Quedaré esper…
…
continue reading
We talk a lot about the growing complexity of hacking groups and how their tools and tactics continue to evolve. One such evolution is the ongoing specialization that runs rampant throughout the black hat community – especially when it comes to ransomware. The rise of initial access brokers, affiliate programs, spoofing domain creators, dark web co…
…
continue reading
What does it take to start a blog about software - and actually keep it going? Blog Recorder Building and Maintaining a Software BlogBy Kent C. Dodds
…
continue reading

1
Exposing 3 Major Anti-Trump LIES - What You Need to Look For
1:02:08
1:02:08
Play later
Play later
Lists
Like
Liked
1:02:08Some things happened at a Beyonce concert. Nike, famous for Air Jordans and child labor, has a new slogan they revealed at the London Marathon. President Donald Trump gave a speech commemorating his (second) first 100 days in office in Michigan. It went pretty well. Here are the highlights. GUEST: Josh Firestine Join Pure Talk Wireless for $25 a mo…
…
continue reading

1
$10.5M to Fight AI-Phishing: The Rise of Pistachio’s Cybersecurity Training Platform
13:04
13:04
Play later
Play later
Lists
Like
Liked
13:04In this episode, we dive into the story of Pistachio, the Norwegian cybersecurity startup that just raised $7 million in new funding—bringing its total to $10.5 million. Pistachio isn’t building another firewall or antivirus tool; it’s targeting the weakest link in most security systems: people. With AI-powered phishing attacks becoming increasingl…
…
continue reading
While the media fulminate over the supposed failure of DOGE, Elon Musk’s signature project just keeps cutting; the Trump tax bill approaches fruition; and we examine the fallout from Canada electing a Leftist, again. Click here to join the member-exclusive portion of my show: https://bit.ly/3WDjgHE Ep.2189 - - - Facts Don’t Care About Your Feelings…
…
continue reading

1
AirBorne: How a Zero-Click Bug Threatens Millions of Apple and Third-Party Devices
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23In this episode, we dive deep into AirBorne — a critical set of vulnerabilities in Apple’s AirPlay protocol and SDK, recently uncovered by security researchers at Oligo. These flaws enable zero-click, wormable remote code execution (RCE) attacks across iPhones, Macs, Apple TVs, CarPlay systems, and millions of third-party devices. Even more alarmin…
…
continue reading

1
Say Easy, Do Hard - Defining Objectives and Key Results Aligned to Business Goals - BSW #393
49:58
49:58
Play later
Play later
Lists
Like
Liked
49:58In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
…
continue reading

1
Strategic maneuvering: Behind the scenes of Formula 1
22:12
22:12
Play later
Play later
Lists
Like
Liked
22:12Ruth Buscombe, a leading Formula 1 strategist, takes us behind the scenes of high-stakes racing strategy and leadership. She shares valuable lessons about data-driven decision making, the importance of clear communication in large teams, and how handling failure and pressure are crucial elements of success in both motorsport and business.…
…
continue reading

1
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472
…
continue reading

1
Security Weekly News Interviews Participants and Coaches at NECCDC - SWN #472
33:34
33:34
Play later
Play later
Lists
Like
Liked
33:34Join us for a special in-person edition of the Security Weekly News! Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-472
…
continue reading

1
The Silent Majority: Why 51% of Internet Traffic Is Now Bots
13:03
13:03
Play later
Play later
Lists
Like
Liked
13:03The bots have taken over—and they’re not just crawling your website. In this episode, we dig into the alarming reality that automated bots now generate over half of all internet traffic. Armed with artificial intelligence and cloaked in residential proxies, these bots are evolving beyond simple scripts into highly evasive, persistent threats target…
…
continue reading

1
Mysten Labs: How Sui Leverages Move to Build the Composable Web3nternet - Adeniyi Abiodun
1:03:09
1:03:09
Play later
Play later
Lists
Like
Liked
1:03:09Founded by former Meta Diem team members, Sui is a high-performance, layer-1 blockchain designed for horizontal scaling and low-latency transactions. It uses an object-centric data model and the Move programming language to enable transaction parallelization which can handle >200,000 txs/s. Sui’s goal is to combine the benefits of blockchains with …
…
continue reading

1
Why Canada's Election Results Are A Golden Opportunity For Trump, America & Alberta
1:02:29
1:02:29
Play later
Play later
Lists
Like
Liked
1:02:29The Canadian elections are over and Canada has decided: we’ll take more of the same, please. We’ll explain why and take a look at what Canada has to look forward to. President Donald Trump has been in office for 100 days. Here are his biggest wins so far. It’s finally here. President Donald Trump is facing articles of impeachment from Representativ…
…
continue reading

1
From 1,382 to 4 Million: What VeriSource Didn’t Know (or Say)
9:02
9:02
Play later
Play later
Lists
Like
Liked
9:02In this episode, we investigate the massive data breach at VeriSource Services, Inc. (VSI), a Houston-based HR outsourcing and employee benefits administrator. Initially reported as affecting fewer than 2,000 individuals, the breach has now ballooned to a confirmed 4 million affected people. We trace the timeline from the initial detection of suspi…
…
continue reading

1
Ep. 2188 - Canada Veers LEFT: Ugly Trudeau Wins!
48:27
48:27
Play later
Play later
Lists
Like
Liked
48:27Liberal Mark Carney wins the Canadian elections, overcoming an enormous lead for the conservatives back in December; President Trump faces down threats from Russia, Iran, and China; and the White House unleashes new measures on illegal immigration. Click here to join the member-exclusive portion of my show: https://bit.ly/3WDjgHE Ep.2188 - - - Fact…
…
continue reading

1
Ep 150: Is OSCAL the Future of Security Documentation (& FedRAMP)?
46:47
46:47
Play later
Play later
Lists
Like
Liked
46:47In this episode of the Virtual CISO Podcast, John Verry speaks with Kenny Scott, founder and CEO of Paramify, about the challenges of cyber risk management and the potential of OSCAL (Open Security Controls Assessment Language) in simplifying compliance and documentation processes. They discuss the importance of structured digital communication in …
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
Leading with purpose: How the Financial Times balances legacy and innovation
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25In this Executive Insights podcast episode, FT Group CEO John Ridding discusses how he led the organization's successful digital transformation while maintaining its journalistic integrity, pioneering the digital subscription model and leveraging new technologies like AI, all while ensuring the FT's culture and values remain strong through clear pr…
…
continue reading
Another week, and we're bringing you the latest WordPress news from the last seven days. Join Nathan Wrigley, Michelle Frechette and Tim Nash. We cover the PressConf event highlights, discuss the new Theme Switcher Pro plugin, and explore Joost’s reflections on unintended consequences in SEO tools. We share updates on Patchstack security alerts, an…
…
continue reading

1
SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
…
continue reading

1
Corte de Energia en España, Europa! 60% of the supply of energy vanished in 5 seconds!
2:25:48
2:25:48
Play later
Play later
Lists
Like
Liked
2:25:48}Key Points A massive power outage hit Spain and Portugal on April 28, 2025, disrupting critical infrastructure, with the cause still under investigation. It seems likely that a grid failure caused the outage, though a cyberattack is being investigated but not confirmed. The Spanish government has been transparent, stating no conclusive cause yet, …
…
continue reading
I’m transitioning from SPAs with REST APIs to SSR applications using React Router Framework. While I’ve used layout routes and tools like SWR/React Query for route protection in React Router DOM, I just found out that actions in React Router Framework are still vulnerable to unauthorized POST requests. I use JWT auth with tokens stored in cookies—d…
…
continue reading

1
Hard-Coded Havoc: The Fatal Flaws in Planet’s Network Devices
11:39
11:39
Play later
Play later
Lists
Like
Liked
11:39A wave of critical vulnerabilities in Planet Technology’s industrial switches and network management systems could let attackers hijack devices, steal data, and sabotage industrial networks—with no credentials required. In this urgent episode, we dissect: 🔓 The 5 worst flaws (CVSS 9.3+)—from hard-coded database passwords to pre-auth command injecti…
…
continue reading

1
There is No Trump Buyer's Remorse; Why the New Poll Numbers are a Psyop
1:03:14
1:03:14
Play later
Play later
Lists
Like
Liked
1:03:14Apparently, the American mind can’t comprehend…we don’t know. Something European, we guess. We’re not sure Europe should be bragging about their cigarette addiction. India and Pakistan are on the brink of war. New information has come out about the January 29th helicopter crash at Ronald Reagan Airport. President Donald Trump took flak for wearing …
…
continue reading

1
Craft CMS Crisis: The 10.0-Rated RCE Flaw Every Developer Must Patch Now
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51A critical, actively exploited vulnerability (CVE-2025-32432) is wreaking havoc on Craft CMS—allowing attackers to execute arbitrary PHP code on unpatched servers with no authentication required. In this urgent episode, we break down: 💥 Why this flaw scores a perfect 10.0 CVSS—the highest severity rating possible. 🔍 How hackers are exploiting it: F…
…
continue reading

1
Ep. 2187 - 100 DAYS: Where Does Trump Stand?
49:19
49:19
Play later
Play later
Lists
Like
Liked
49:19100 days into President Trump’s second term, where do we stand? Plus, President Trump threatens Vladimir Putin with more sanctions; and Axios’ Alex Thompson admits the media blew it by covering up Joe Biden’s health problems. Click here to join the member-exclusive portion of my show: https://bit.ly/3WDjgHE Ep.2187 - - - Facts Don’t Care About Your…
…
continue reading

1
Policy Puppetry: How a Single Prompt Can Trick ChatGPT, Gemini & More Into Revealing Secrets
12:44
12:44
Play later
Play later
Lists
Like
Liked
12:44Recent research by HiddenLayer has uncovered a shocking new AI vulnerability—dubbed the "Policy Puppetry Attack"—that can bypass safety guardrails in all major LLMs, including ChatGPT, Gemini, Claude, and more. In this episode, we dive deep into: 🔓 How a single, cleverly crafted prompt can trick AI into generating harmful content—from bomb-making g…
…
continue reading

1
252: How Sapien is Empowering the AI Gig Economy with Blockchain and Real Rewards, with Ben Noble from Sapien
40:36
40:36
Play later
Play later
Lists
Like
Liked
40:36How do you power the next generation of AI — without centralized data monopolies? In this episode, I talk with Ben Noble, Marketing Director at Sapien, about how Sapien is building the world’s first decentralized data foundry — rewarding people for training AI and contributing real-world data. We cover: How Sapien is combining Web3 incentives with …
…
continue reading

1
Alberto shares his personal story of being wrongly accused and imprisoned
2:48:57
2:48:57
Play later
Play later
Lists
Like
Liked
2:48:57Alberto shares his personal story of being wrongly accused and imprisoned due to security vulnerabilities in a medical records system. He recounts how he was initially suspected of hacking into the system, but he believes that the evidence against him was incomplete or misleading. Alberto's experience led him to write a book about it, which was pub…
…
continue reading

1
#718: From cost center to value creator: How IT automation creates business value
30:52
30:52
Play later
Play later
Lists
Like
Liked
30:52Learn how organizations are transforming IT from a cost center to a value generator through automation, AI, and smart business process optimization, featuring real success stories from AWS Solution Architects Adrian SanMiguel and Greg Harris.Innovate faster with an AWS Genai Competency Partner: https://aws.amazon.com/ai/generative-ai/partners/…
…
continue reading

1
The Future of Access Management - Jeff Shiner - ESW #404
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
…
continue reading

1
SANS Stormcast Monday, April 28th: Image Steganography; SAP Netweaver Exploited
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
…
continue reading

1
CONTESTED GROUND: Cyber war, global politics and the power of truth: Unpacking conflict in the Information Age
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28In this episode of the Contested Ground podcast, hosts Major General (Ret’d) Dr Marcus Thompson, Phil Tarrant and Liam Garman discuss the application of cyber and information in the modern threat environment, and how the White House is changing voting behaviours across the West. They begin the podcast by unpacking Thomas Rid's Cyber War Will Not Ta…
…
continue reading

1
Man CONTINUES sending money to his military girlfriend!
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26Man CONTINUES sending money to his military girlfriend! [1]
…
continue reading
Android Spyware Disguised as Alpine Quest App Targets Russian Military DevicesBy Carl Franklin
…
continue reading

1
Beating the AI Game, Ripple, Numerology, Darcula, Special Guests from Hidden Layer... - Malcolm Harkins, Kasimir Schulz - SWN #471
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
…
continue reading

1
Beating the AI Game, Ripple, Numerology, Darcula, Special Guests from Hidden Layer... - Malcolm Harkins, Kasimir Schulz - SWN #471
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
…
continue reading

1
Lazarus Strikes Again: Inside Operation SyncHole and the 1-Day Exploitation Crisis
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49In this episode, we break down the most urgent cybersecurity developments from late April 2025—including the Lazarus Group’s high-profile “Operation SyncHole” targeting South Korean industries. Discover how attackers are exploiting newly disclosed vulnerabilities faster than ever, with nearly 1 in 3 CVEs weaponized within 24 hours of publication. W…
…
continue reading

1
NY Times Goes Full Simp for Deported Jamaican Kidnapper
1:01:09
1:01:09
Play later
Play later
Lists
Like
Liked
1:01:09Montana cops are having fun on the job, so it’s time to step in and stop it. The media is wrong about…well, a lot, frankly, so let’s look at some of the bad takes and misinformation on immigration this week. The news media is making it sound like Texas governor Greg Abbott is helping developers build communities that house illegals. But is he reall…
…
continue reading

1
OAuth Phishing and Microsoft 365: The Hidden Threats SMBs Can't Ignore
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54In this episode, we dissect the real-world challenges of securing Microsoft 365 environments—especially for small and medium-sized businesses—amid rising threats and licensing limitations. From Reddit frustrations to official Microsoft documentation, we explore the harsh truth: many essential security features, like alerting on suspicious logins, r…
…
continue reading

1
Ep. 2186 - Investigating “Putin’s Brain” + Zelensky Part II
1:12:29
1:12:29
Play later
Play later
Lists
Like
Liked
1:12:29We drop Part II of our exclusive interview with Ukrainian President Volodymyr Zelensky; we analyze what Russia truly wants with a deep dive into “Putin’s brain”; and China tries to hold up President Trump. Click here to join the member-exclusive portion of my show: https://bit.ly/3WDjgHE Ep.2186 - - - Facts Don’t Care About Your Feelings - - - Dail…
…
continue reading

1
Why Ransomware, Credential Theft and Phishing Schemes Persist
39:52
39:52
Play later
Play later
Lists
Like
Liked
39:52One of the great things about covering industrial cybersecurity is the number of reports, studies and white papers being produced right now to help provide intelligence on threats, research on new tools, and data on leading trends. The tough part is sorting through all this data and, at some point, prioritizing it in order to get the most and best …
…
continue reading

1
251: From Bots to Breakthroughs — Bandit Network’s Plan to Reinvent Web3 Growth
27:06
27:06
Play later
Play later
Lists
Like
Liked
27:06How do you grow a Web3 startup without falling into the same old traps — airdrops, bots, and unsustainable hype? In this episode, I speak with Sandesh, founder of Bandit Network, who shares how they’re building growth infrastructure for Web3 — combining off-chain and on-chain data, enabling sustainable campaigns, and even launching their own rollup…
…
continue reading

1
Maple Finance: On-Chain Institutional Yield & Lending Markets - Sidney Powell
54:49
54:49
Play later
Play later
Lists
Like
Liked
54:49With an extensive experience in traditional money markets, Maple Finance was envisioned as an institutional capital marketplace which combines the transparency & capital efficiency of blockchains with the regulatory framework of TradFi. Unlike many DeFi protocols that require over-collateralized loans (e.g. Aave), Maple also specializes in under-co…
…
continue reading