Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Fix Security Podcasts
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
The DailyCyber Podcast and New Live Stream every Wednesday at 1:00 pm EDT is focused on providing the truth into the Cyber Security industry. Discussions on Cyber Security trends, technologies, solutions, news, education, certifications, careers and interviews with leading Cyber Security experts on various Cyber Security topics. Subscribe today to make sure you don't miss an episode. IMPORTANT: The views, information and/or opinions expressed on this podcast/stream are solely those of Brando ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The Financial Times takes you into the corridors of power to unwrap, analyse and debate British politics with a regular lineup of FT correspondents and informed commentators. New episodes available every Friday. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Learn how to think not what to think.
…
continue reading
Battle Lines is The Telegraph’s foreign policy, geopolitics and global conflict podcast. It offers expert analysis and on-the-ground reporting everywhere from China and the United States to the Middle East and Europe. Twice a week, veteran foreign correspondents Roland Oliphant and Venetia Rainey bring you on-the-ground dispatches from the world’s most volatile regions and informed analysis from world-class experts. Whether it’s the Russia-Ukraine war, the Israel-Gaza conflict, Chinese aggre ...
…
continue reading
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
…
continue reading
This is daily Apple news. Monday through Friday, Ken Ray brings a short shot of tech happenings to your day. If it's Apple news, Apple-related news, or news related to Apple-related news, you'll hear about it here. News you'll like... this is Mac OS Ken.
…
continue reading
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
…
continue reading
ODI Global's podcast that discusses some of the world’s most pressing global issues with a variety of experts and commentators. Find out more at odi.org.
…
continue reading
Forrest Hanson is joined by clinical psychologist Dr. Rick Hanson and a world-class group of experts to explore the practical science of lasting well-being. Conversations focus on the key insights from psychology, science, and contemplative practice that you need to build reliable inner strengths, overcome your challenges, and get the most out of life. New episodes every Monday.
…
continue reading
Retired Navy SEAL, Jocko Willink and Director, Echo Charles discuss discipline and leadership in business, war, relationships and everyday life.
…
continue reading
Shriram Fixed deposits are the most secured investment options with guaranteed returns that multiply your investments. Shriram offers one of the highest interest rates at 9.20%, including 0.50% for senior citizens. Returns on Fixed deposits do not change with market or external factors. More Information Visit: https://www.shriramfinance.in/fixed-deposit
…
continue reading
🎙️ Welcome to the Microsoft Intune and Security Report Podcast🎙️ — your essential stop for the latest in Windows and Edge security! This podcast is designed to be a time-saving powerhouse, distilling the most critical updates, new features, and emerging vulnerabilities from multiple trusted sources into one convenient, ready-to-reference report. Each week, we dig deep into the data to give you a concise, actionable rundown on the security landscape, helping you stay one step ahead. So whethe ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
…
continue reading
Steven Crowder brings you news, entertainment and politics with the most politically incorrect show on the web. Guests, rants, sketches, your calls ... it's whatever. Watch the VIDEO version of this podcast here: http://www.louderwithcrowder.com/mugclub
…
continue reading
Each week, Foreign Policy Live will feature a substantive conversation on world affairs. Host and FP editor in chief Ravi Agrawal will be joined by leading foreign-policy thinkers and practitioners to analyze a key issue in global politics, from the U.S.-China relationship to conflict and diplomacy. FP Live is your weekly fix for smart thinking about the world. Foreign Policy magazine subscribers can watch these interviews live and submit questions and suggestions by going to https://foreign ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Small changes, made over time, can produce significant results. Much like a high performance engine, or an entire orchestra, when even a small part is not doing what it is supposed to do, everything suffers. And the same is true of your finances. This show is dedicated to the small things that make a significant difference.
…
continue reading
As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
…
continue reading
Retirement and income planning in a fast paced format. Kevin has focused on helping investors age 50+ preserve and grow their assets, increase their income, and reduce overall income and estate taxes. Many conservative investors have used his advice to invest their savings prudently and transfer more wealth to their heirs efficiently. Visit silverleaffinancial.com for more information.
…
continue reading
Web site building with WordPress. In this podcast we follow the hopeless exploits of David Waumsley and Nathan Wrigley as they try, and fail, to understand WordPress. They know that they love building websites with WordPress, but the complexities of this awesome web building solution are always out of reach. Not only are they not clever enough, but they just don't try all that hard
…
continue reading
A podcast with strong views on politics in Nigeria and suggestions on how to fix our politics.
…
continue reading
Stay up to date with the Go community in about 15 minutes per week
…
continue reading
Dr. Keith Rose is an internationally recognized plastic surgeon and tactical medicine physician who has been performing plastic and reconstructive surgery in Afghanistan, Pakistan, Africa, Central, and South America for the past 21 years. He is also the CEO of Rose Medical Management (www.roseonsite.com), a South Texas-based company providing urgent care clinics (www.urgentcarecc.com), onsite clinics, emergency response teams, and medical/occupational case management services to over 100 com ...
…
continue reading
The latest in AWS news, sprinkled with snark. Posts about AWS come out over sixty times a day. We filter through it all to find the hidden gems, the community contributions--the stuff worth hearing about! Then we summarize it with snark and share it with you--minus the nonsense.
…
continue reading
Sharyl Attkisson is a nonpartisan investigative journalist, five-time Emmy Award winner and recipient of the Edward R. Murrow award for investigative reporting. She is the New York Times bestselling author of "The Smear," "Stonewalled," "Slanted," and "Follow the Science." She is managing editor of the Sun. morning national TV news program “Full Measure with Sharyl Attkisson.” Find out why her podcasts and Tedx talks have received many millions of views. Do your own research. Make up your ow ...
…
continue reading
Christ Restoration Church exists to honor God by fostering a movement of Christ's Kingdom through the proclamation and practice of the gospel that serves and transforms the Sunapee region, and through the Sunapee region the world. Find out more about our church at www.christrestorationchurch.net
…
continue reading
The Nature Podcast brings you the best stories from the world of science each week. We cover everything from astronomy to zoology, highlighting the most exciting research from each issue of the Nature journal. We meet the scientists behind the results and provide in-depth analysis from Nature's journalists and editors. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Inspiring & informing entrepreneurs and business owners
…
continue reading
Interviews with Scholars of Public Policy about their New Books Support our show by becoming a premium member! https://newbooksnetwork.supportingcast.fm/public-policy
…
continue reading
Listen to the latest insights from Dr. David Kelly, Chief Global Strategist, and Gabriela Santos, Chief Strategist for the Americas at J.P. Morgan Asset Management, as they sit down with a variety of thought leaders for a conversational breakdown of big ideas, future trends, emerging topics, and their investment implications, helping to inform the building of stronger long-term investment plans.
…
continue reading
Are you searching for an objective source to help you understand how to manage fixed income investments for your financial institution? Each week, join Chris Nelson, a 30-year banking and investment veteran, as he covers fixed income securities and investment portfolio management, and discusses the latest news and developments in the financial markets.
…
continue reading

1
A Security Fix and Foxconn Hires for iPhone 17 - MOSK: 08.21.2025
15:34
15:34
Play later
Play later
Lists
Like
Liked
15:34- Apple Outs iOS/iPadOS/macOS Updates with Important Security Fix - Zoom Dropping Support for iOS 13 and iOS 14 - SCMP: Foxconn Ramps Hiring in China (Slightly) Ahead of iPhone 17 - Masimo Sues to Reinstate Blood Oxygen Ban in Apple Watch - Geely Adds CarPlay to EX5 in Australia - Apple Pay Express Mode Hits Manchester, England’s Bee Network - Tim …
…
continue reading

1
Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor
1:05:39
1:05:39
Play later
Play later
Lists
Like
Liked
1:05:39Fixing Broken Security Training | DailyCyber 272 with Craig M. Taylor ~ Watch Now ~ In this episode of DailyCyber, I’m joined by Craig M. Taylor, Co-Founder & CISO at CyberHoot, who has spent nearly three decades building and leading security programs for organizations of all sizes. Craig believes cybersecurity awareness should be short, engaging, …
…
continue reading

1
August 2025 Patch Tuesday: Microsoft and Adobe Fix Over 170 Security Flaws
33:00
33:00
Play later
Play later
Lists
Like
Liked
33:00August 2025’s Patch Tuesday brought major security updates from two of the biggest names in technology — Microsoft and Adobe — addressing a combined 170+ vulnerabilities across widely used products. The scale and severity of these updates make them critical for IT teams and security leaders to implement without delay. Microsoft’s security release f…
…
continue reading

1
75. How to Fix All the Problems with Subscriptions
26:43
26:43
Play later
Play later
Lists
Like
Liked
26:43Helpful episodes to listen to first Introduction to Privacy.com Questions we answer in this episode What is Makani's most used online shopping tool? What are 2 key features it provides? What 3 subscription problems does it fix? Episode summary Privacy.com offers super powered Privacy Cards that you can use to shop online. You create a unique Privac…
…
continue reading

1
Lindsey N. Kingston, "Fully Human: Personhood, Citizenship, and Rights" (Oxford UP, 2019)
54:54
54:54
Play later
Play later
Lists
Like
Liked
54:54Lindsey N. Kingston’s new book, Fully Human: Personhood, Citizenship, and Rights (Oxford UP, 2019) interrogates the idea of citizenship itself, what it means, how it works, how it is applied and understood, and where there are clear gaps in that application. This is a wide-ranging, rigorously researched examination of citizenship, statelessness, an…
…
continue reading

1
How can high capital costs in low- and middle-income countries be brought down?
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14The soaring cost of capital for many low- and middle-income countries, particularly in Africa, is one of the most urgent and overlooked development challenges. High borrowing costs are hindering vital investments in energy, infrastructure, food security and public services – threatening development progress and deepening global inequality. But this…
…
continue reading

1
SANS Stormcast Thursday, August 28th, 2025: Launching Shellcode; NX Compromise; Volt Typhoon Report
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallets and Credentials The popular open source NX build package was compromised. Code was added that uses…
…
continue reading

1
Silk Typhoon’s Fake Adobe Update: How China-Backed Hackers Target Diplomats
40:33
40:33
Play later
Play later
Lists
Like
Liked
40:33A new and highly sophisticated cyber espionage campaign attributed to Silk Typhoon—also known as Mustang Panda, TEMP.Hex, or UNC6384—has been uncovered, targeting diplomats and government entities across Southeast Asia. Researchers from Google’s Threat Intelligence Group (GTIG) revealed that the attackers deployed Adversary-in-the-Middle (AitM) tec…
…
continue reading

1
FTC Warns Tech Giants: Don’t Weaken Encryption for Foreign Governments
37:13
37:13
Play later
Play later
Lists
Like
Liked
37:13The fight over encryption has entered a new phase. The Federal Trade Commission (FTC), led by Chairman Andrew Ferguson, has issued a strong warning to major U.S. technology companies: resist foreign government demands to weaken encryption. At stake is nothing less than the security of millions of Americans’ private communications, financial data, a…
…
continue reading

1
Bianca D’Alessio on Power, Purpose & Mastering Intention
22:56
22:56
Play later
Play later
Lists
Like
Liked
22:56Bianca D’Alessio, one of the top real estate brokers in New York, a global speaker, and the author of the new book, Mastering Intentions: 10 … Read more The post Bianca D’Alessio on Power, Purpose & Mastering Intention appeared first on Top Entrepreneurs Podcast | Enterprise Podcast Network.By EPN
…
continue reading

1
Minnesota Catholic School Shooting Update - Shooter & Manifesto
2:29:32
2:29:32
Play later
Play later
Lists
Like
Liked
2:29:32Breaking Here is what we know so far on the Minneapolis Catholic Church shooting. GUEST: Josh Firestine Link to today’s sources: https://www.louderwithcrowder.com/sources-august-27-2025 Buy the OG Mug Club Mug on Crowder Shop now! https://crowdershop.com/products/og-mug-club-mug Let my sponsor American Financing help you regain control of your fina…
…
continue reading

1
Invisible Prompts: How Image Scaling Attacks Break AI Security
23:03
23:03
Play later
Play later
Lists
Like
Liked
23:03Researchers have uncovered a new form of indirect prompt injection that leverages a simple but powerful trick: image scaling. This novel attack involves hiding malicious instructions inside high-resolution images, invisible to the human eye. When AI systems automatically downscale these images during preprocessing, the hidden prompt becomes visible…
…
continue reading

1
Breaking: Minneapolis Catholic Church Shooting Live Coverage
1:08:15
1:08:15
Play later
Play later
Lists
Like
Liked
1:08:15Breaking: shooting in Minneapolis. Travis Kelce and Taylor Swift are engaged. So we have to talk about it. Will Smith is faking his audience. Zohran Mamdani is promising New Yorkers free stuff if they only elect him. Problem is plenty of places have already tried that, and it has failed miserably. A Cuban-born businessman, Joseph Hernandez, decided…
…
continue reading

1
Healthcare Services Group Breach Exposes 624,000 Individuals’ Sensitive Data
1:04:53
1:04:53
Play later
Play later
Lists
Like
Liked
1:04:53The healthcare sector has been rocked yet again by a massive cybersecurity incident. Healthcare Services Group (HCSG), a provider of dining and laundry services to healthcare facilities, disclosed a data breach that compromised the personal information of over 624,000 individuals. Between late September and early October 2024, hackers gained unauth…
…
continue reading

1
Viral spread: how rumours surged in revolutionary France
24:44
24:44
Play later
Play later
Lists
Like
Liked
24:4400:48 How the 18th-Century 'Great Fear’ spread across rural France In the late 1700s, rural France was beset with rapidly spreading rumours of aristocratic plots to suppress revolutionary ideas. But how, and why, these rumours were able to spread so quickly has puzzled historians. Now, using modern epidemiological modelling, a team suggests that a …
…
continue reading

1
Auchan Data Breach: Hundreds of Thousands of Loyalty Accounts Compromised
40:09
40:09
Play later
Play later
Lists
Like
Liked
40:09French retail giant Auchan has confirmed a massive data breach that compromised the personal details of hundreds of thousands of customers. The stolen data includes names, addresses, phone numbers, email addresses, and loyalty card numbers—though banking details, passwords, and PINs were reportedly not affected. Despite this, the breach is serious …
…
continue reading

1
Apple Announces "Awe Dropping" Media Event - MOSK: 08.27.2025
16:09
16:09
Play later
Play later
Lists
Like
Liked
16:09- Apple’s Next Media Event Set for 9 September - Expectations for Apple’s “Awe Dropping” Event - Apple Sets “Awe Dropping” Placeholder on YouTube - “Awe Dropping” Art Goes Interactive on Apple Site - BofA: Investors Not Super Excited About iPhone Air - Germany Says Apple Can’t Call Apple Watch “Carbon Neutral” - Apple Opening Two Stores in India Ne…
…
continue reading

1
503: Delta Force, Mogadishu, and the Legacy of Black Hawk Down. With Norm "Hoot" Hooten.
4:32:40
4:32:40
Play later
Play later
Lists
Like
Liked
4:32:40>Join Jocko Underground< Norm Hooten was a U.S. Army Special Forces soldier (a Green Beret) who became well known because of his role in the Battle of Mogadishu in October 1993, the operation later depicted in the book and film Black Hawk Down. Support this podcast at — https://redcircle.com/jocko-podcast/exclusive-content…
…
continue reading
The human brain might be the grandest computer of all, but in this episode, we talk to two experts who confirm that the ability for tech to decipher thoughts, and perhaps even manipulate them, isn't just around the corner – it's already here. Rapidly advancing "neurotechnology" could offer new ways for people with brain trauma or degenerative disea…
…
continue reading

1
Risky Business #804 -- Phrack's DPRK hacker is probably a Chinese APT guy
53:32
53:32
Play later
Play later
Lists
Like
Liked
53:32On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Australia expels Iranian ambassador Hackers sabotage Iranian shipping satcoms APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK? Trail of Bits uses image-downscaling to sneak prompts into Google Gemini The Com’s King Bob ge…
…
continue reading

1
Risky Business #804 -- Phrack's DPRK hacker is probably a Chinese APT guy
53:32
53:32
Play later
Play later
Lists
Like
Liked
53:32On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Australia expels Iranian ambassador Hackers sabotage Iranian shipping satcoms APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK? Trail of Bits uses image-downscaling to sneak prompts into Google Gemini The Com’s King Bob ge…
…
continue reading

1
SANS Stormcast Wednesday, August 27th, 2025: Analyzing IDNs; Netscaler 0-Day Vuln; Git Vuln Exploited;
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabil…
…
continue reading

1
Docker Desktop Vulnerability: Why Containers Aren’t as Safe as You Think
46:31
46:31
Play later
Play later
Lists
Like
Liked
46:31A critical vulnerability in Docker Desktop, CVE-2025-9074, has shaken the container security world. Scoring 9.3 on the CVSS scale, this flaw exposed an unauthenticated Docker Engine API (192.168.65.7:2375) to any container running on Windows and macOS. With nothing more than a few HTTP requests—or even three lines of Python code—attackers could esc…
…
continue reading

1
Energy for the Future: How FranklinWH is Transforming Home Energy Management
14:47
14:47
Play later
Play later
Lists
Like
Liked
14:47Vincent Ambrose, Chief Commercial Officer at FranklinWH, a company that provides innovative whole-home energy management and storage solutions for homeowners across the U.S joins Enterprise … Read more The post Energy for the Future: How FranklinWH is Transforming Home Energy Management appeared first on Top Entrepreneurs Podcast | Enterprise Podca…
…
continue reading

1
Arch Linux Website, Forums, and AUR Targeted in Sustained Cyber Assault
40:04
40:04
Play later
Play later
Lists
Like
Liked
40:04The Arch Linux community has just endured more than a week of turbulence as a massive distributed denial-of-service (DDoS) attack disrupted its most critical services, including the main website, the Arch User Repository (AUR), and community forums. Beginning in mid-August 2025, the sustained volumetric and protocol-level assault overwhelmed hostin…
…
continue reading

1
Data I/O Ransomware Attack: Supply Chain Cybersecurity in Crisis
37:08
37:08
Play later
Play later
Lists
Like
Liked
37:08Cyberattacks against supply chains are no longer isolated disruptions—they are systemic threats with the power to cascade across industries and nations. The recent ransomware attack on Data I/O, a chip programming firm whose customers include global giants like Apple, Microsoft, Amazon, and Bosch, demonstrates how one breach can disrupt manufacturi…
…
continue reading

1
Adios & Ni Hao: Trump Sends Abrego Garcia to Africa But Welcomes 600K Chinese to America
1:02:24
1:02:24
Play later
Play later
Lists
Like
Liked
1:02:24Remember when exercise was white supremacy? It’s also bad for you now, according to the New York Times. A girl in the UK was arrested after wielding a knife at an “asylum seeker” who was following her. Somebody should make Britain great again. President Donald Trump is allowing 600,000 Chinese students into the country. There’s a 100% chance that t…
…
continue reading

1
BianLian Ransomware Strikes Aspire Rural Health: 138,000 Patients Exposed
44:33
44:33
Play later
Play later
Lists
Like
Liked
44:33The U.S. healthcare sector continues to face relentless cyberattacks, and rural hospitals are increasingly at the center of this crisis. The recent Aspire Rural Health System breach in Michigan—attributed to the BianLian ransomware group—exposed the personal and medical data of nearly 140,000 patients and staff. From Social Security numbers and fin…
…
continue reading

1
OneFlip: How a Single Bit-Flip Can Hack AI Models
49:40
49:40
Play later
Play later
Lists
Like
Liked
49:40Artificial Intelligence (AI) models are shaping the future of industries from healthcare and finance to autonomous vehicles and national infrastructure. But with this rise comes a hidden battlefield: adversarial attacks designed to manipulate AI systems in subtle yet devastating ways. One of the most alarming threats is the OneFlip attack, a method…
…
continue reading

1
Translating Security Regulations into Secure Projects - Roman Zhukov, Emily Fox - ASW #345
1:13:31
1:13:31
Play later
Play later
Lists
Like
Liked
1:13:31The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
…
continue reading

1
Translating Security Regulations into Secure Projects - Emily Fox, Roman Zhukov - ASW #345
1:13:31
1:13:31
Play later
Play later
Lists
Like
Liked
1:13:31The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
…
continue reading

1
Twitter's Remains Sue Apple - MOSK: 08.26.2025
13:44
13:44
Play later
Play later
Lists
Like
Liked
13:44- Elon Musk Sues Apple and OpenAI Over iOS/ChatGPT Integration - Y Combinator Sides with Epic in Amicus Brief Against Apple - Apple Seeds Eighth (blank)OS 26 Betas to Developers - 9to5Mac Suspects Eighth iOS 26 Developer Beta is Last Before Wide Release - Apple Seeds Fifth Betas of Most (blank)OS 26 Builds to Public Testers - F1: The $600M+ Movie -…
…
continue reading

1
SANS Stormcast Tuesday, August 26th, 2025: Decoding Word Reading Location; Image Downscaling AI Vulnerability; IBM Jazz Team Server Vuln
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%20Value%20in%20Microsoft%20Word%20Documents/32224 Weaponizing image scaling against production AI systems AI systems often downscale imag…
…
continue reading

1
304. 'Failure Factory': From Cheating Teachers to Grade-Fixing
31:49
31:49
Play later
Play later
Lists
Like
Liked
31:49Teachers cheating? Grade fixing? Investigative journalist Chris Papst's new book, "Failure Factory," tracks his investigations into the failures behind Baltimore City Schools and, just maybe, the failures behind a school system near you. Order Sharyl's bestseller “Slanted: How the News Media Taught Us to Love Censorship and Hate Journalism” at …
…
continue reading
Grant Stahla, Co-owner of Stahla Services, a nationwide provider of restroom, shower, and ADA trailer rentals again joins Enterprise Radio. On this episode, the … Read more The post 6 Station Restroom Trailers appeared first on Top Entrepreneurs Podcast | Enterprise Podcast Network.By EPN
…
continue reading

1
If Americans Are Lawyers and Chinese Are Engineers, Who Is Going to Win?
44:58
44:58
Play later
Play later
Lists
Like
Liked
44:58The United States and China are constantly looking for a leg up in their rivalry for geopolitical primacy. But what if the real advantage lies in adopting a bit of the other’s culture? A new book makes the case that while China has become an engineering state obsessed with building, the United States has become a lawyerly society focused on procedu…
…
continue reading

1
Ep.410 Raided, Investigated, and Silenced: The Left's Tactics Exposed
47:08
47:08
Play later
Play later
Lists
Like
Liked
47:08/// Support The Scalpel with Dr. Keith Rose - Experience a Healthier You with LifeWave Phototherapy Patches. These non-transdermal, drug-free patches capture infrared light emitted by your body, reflecting it at specific wavelengths. Visit https://lifewave.com/RoseMD to learn more or call 866.202.0065 -----------------------------------------------…
…
continue reading

1
Donald Trump Vs American Crime: Chicago is Next & Libs Are Freaking Out
1:03:06
1:03:06
Play later
Play later
Lists
Like
Liked
1:03:06Zohran Mamdani is bad at lifting weights and should be embarrassed. At least Representative Eric Swalwell did a full rep. Disney recently bemoaned the lack of males in their audience. Gee. Wonder why they’re losing the men. After seemingly fixing Washington, D.C. crime in a week, President Donald Trump suggested that maybe Chicago needs the law and…
…
continue reading

1
Aurora Spends 10 Years Perfecting the Art of "What the Hell?"
4:45
4:45
Play later
Play later
Lists
Like
Liked
4:45Episode Summary: AWS Morning Brief for the week of August 25th, 2025, with Corey Quinn. AWS pricing for Kiro dev tool 'a wallet-wrecking tragedy SQL injection vulnerability in the AWS Aurora DSQL MCP Server | by Michael Kandelaars | Aug, 2025 | Medium Top AWS chip engineer reportedly defects to Arm Copilot Broke Your Audit Log, but Microsoft Won’t …
…
continue reading

1
Limerence: The Psychology of Romantic Obsession with Brandy Wyant
1:04:07
1:04:07
Play later
Play later
Lists
Like
Liked
1:04:07Forrest and therapist Brandy Wyant discuss limerence, an intense and often one-sided state of romantic obsession. They explore how limerence differs from both love and ordinary crushes, why uncertainty fuels it, and how it can take over a person’s inner world. Brandy shares both clinical insights and her own lived experience, describing the obsessi…
…
continue reading

1
Enhancing Humans in Your SOC with RedCarbon
14:56
14:56
Play later
Play later
Lists
Like
Liked
14:56All links and images can be found on CISO Series. In this episode, Simone Rapizzi, CSO at RedCarbon, explains how their AI-powered platform uses specialized models to automate threat detection and response while learning from each customer's unique environment. Joining him are Jonathan Waldrop, former CISO, and John Scrimsher, CISO at Kontoor Brand…
…
continue reading