Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Hackers World Podcasts
Where the world and America meet. Every weekday, this is The Global Story. The world is changing. Decisions made in the US and by the second Trump administration are accelerating that change. But they are also a symptom of it. With Asma Khalid in DC, Tristan Redman in London, and the backing of the BBC’s international newsroom, The Global Story brings clarity to politics, business and foreign policy in a time of connection and disruption.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading

1
Culture Hackers
Robbe Richman and a cast of hackers, troublemakers, movers and shakers, Robbe Richman
A show all about culture hacking - at companies, in business and the world. The first episodes are the free audio book of Robert Richman's "Culture Blueprint."
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Download This Show is your weekly guide to the world of media, culture, and technology. From social media to gadgets, streaming services to privacy issues. Each week Rae Johnston and guests take a fun, deep dive into how technology is reshaping our lives.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Never leave money on the table. This is your shortcut to upgrading your life, money and travel—all while spending less and saving more. Get tactical moves and deep dives into designing a life you’re excited about. Host Chris Hutchins is a life hacker who has saved millions by breaking down every aspect of life and looking to maximize happiness at the lowest cost. Chris and guests like Tim Ferriss, Tony Hawk, Codie Sanchez and Gary Vaynerchuk are here to deliver smart strategies you can plug ...
…
continue reading
Tim Ferriss is a self-experimenter and bestselling author, best known for The 4-Hour Workweek, which has been translated into 40+ languages. Newsweek calls him "the world's best human guinea pig," and The New York Times calls him "a cross between Jack Welch and a Buddhist monk." In this show, he deconstructs world-class performers from eclectic areas (investing, chess, pro sports, etc.), digging deep to find the tools, tactics, and tricks that listeners can use.
…
continue reading
This is a Podcast syncs with Hacker News (https://news.ycombinator.com) automatically
…
continue reading
Industry expert Mikah Sargent, brings you interviews from tech journalists who make or break the top stories of the week. Get the freshest perspective and in depth insight into the fast-paced world of technology from Tech News Weekly. Records every Thursday at 2:00pm Eastern / 11:00am Pacific / 18:00 UTC.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
MAD Warfare™️ is a science-driven deep dive into the wild, weird, and sometimes wicked world of the “weaponization of everything.” But don’t worry—IT WILL BE FUN. Think of it as your covert ops manual for spotting how cyber hackers, rogue AI agents, and shady “bad actors” (who’d be terrible in a buddy comedy) are messing with our minds. Often in ways that evade detection… until it’s too late. With expert interviews from unexpected places and plenty of offbeat insights, this podcast reveals t ...
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Hosted by Rob Aragao a seasoned security strategist with OpenText, this podcast is your go-to resource for staying updated on cybersecurity developments and addressing common challenges in the rapidly evolving digital landscape. As featured on Mill ...
…
continue reading
The World Crypto Network is an independent media organization that keeps you up to date with the latest news on Bitcoin and cryptocurrency.
…
continue reading
Learn the latest management updates in the tech world.
…
continue reading
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
…
continue reading
Health Hackers Point is your go-to podcast for unlocking smarter, science-backed ways to improve your body, mind, and lifestyle. Each episode dives into practical health tips, fitness strategies, nutrition advice, and mental wellness hacks that fit into your busy life. Whether you want to boost energy, build sustainable habits, or explore the latest breakthroughs in wellness, Health Hackers brings you expert insights and real-world solutions. Tune in weekly to learn how small changes can lea ...
…
continue reading
Building a company is hard. We share real, grounded conversations with people doing just that. From solo devs to venture-backed founders. Hosted by Dave Berner (co-founder of Kinde), this podcast skips the playbook talk and gets into what building actually looks like day to day.
…
continue reading
Learn the latest tech-stories updates in the tech world.
…
continue reading
Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Hacker Anthology is what happens when you inject fiction into the command line of reality. Faction stories — part fact, part fiction — spun from real-world headlines, startup chaos, cyber leaks, and tech drama. Imagine HackerNews got drunk with Black Mirror, and they started roleplaying historical fiction. That’s us. We take raw internet lore — a GitHub repo flame war, a VC meltdown, an obscure RFC gone rogue — and remix it into cinematic short stories told from the POV of AI misfits, termin ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
This week, something big happened. You might have never heard of it, but this moment changed the course of history. A HISTORY Channel original podcast, HISTORY This Week gives you insight into the people—both famous and unknown—whose decisions reshaped the world we live in today. Through interviews with experts and eyewitnesses, each episode will give you a new perspective on how history is written. Stay up-to-date at historythisweekpodcast.com and to get in touch, email us at historythiswee ...
…
continue reading
Life is hard. This podcast will help. Lessons from the greatest thinkers on the planet with Chris Williamson. Including guests like David Goggins, Dr Jordan Peterson, Naval Ravikant, Sam Harris, Jocko Willink, Dr Andrew Huberman, Dr Julie Smith, Steven Bartlett, Ryan Holiday, Robert Greene, Matthew McConaughey, Alain de Botton, Alex Hormozi, Tony Robbins, Chris Bumstead, Mark Manson and more.
…
continue reading
Legitimate Cybersecurity Podcast - designed to empower you with real-world cybersecurity information, stories, and advice.
…
continue reading
The FAIK Files explores the mysterious and often wacky intersection of AI, technology, and humanity. From cognitive warfare to digital deception, we examine how AI is reshaping our reality through news, research, and real-world examples. Join us for a thought-provoking journey into a world where anything can be faked, truth is increasingly elusive, and human nature meets artificial intelligence head-on.
…
continue reading
How do you take down a criminal network that’s hidden in the shadows? How do you rescue child abuse victims who could be anywhere in the world? Hunting Warhead follows the journalists and police on a global mission to expose the darkest corners of the internet. What they discover shocks them. Host Daemon Fairless tracks down the investigators, survivors and criminals themselves. A co-production of CBC Podcasts and the Norwegian newspaper VG. For the best in true crime from CBC, ad-free, visi ...
…
continue reading
Hi! I'm a self development coach, meditation teacher, and Idea Incubator based in San Francisco. Join me as I speak with the bright minds that light up my world
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
In the shadows of the digital world, where anonymity is power and information is currency, battle lines are drawn not with bullets but with code. This show takes listeners deep into the heart of cyberspace’s most high-stakes confrontations — where rogue programmers exploit vulnerabilities, corporations scramble to secure their data empires, and government agencies wage invisible wars across invisible lines. It’s a realm shaped by encryption, espionage, whistleblowers, and wild ambition. From ...
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
Are workers really losing a measurable amount of brain power—the kind leaders rely on to innovate? Are CEOs really turning to a secretive world of underground negotiators to pay off millions of dollars to hackers? And what's the real reason people won't return to work? In this new podcast, we'll be hitting top-of-mind subjects for corporate leaders. Hosted by Korn Ferry CMO Jill Wiltfong, listeners and viewers will be treated to recreated scenes, special audio clips and intriguing interviews ...
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Everyday society depends more on electronics, social media etc, and by doing so they expose their private data to the public eye. Each Saturday, join Hackers Con Calle is a group of Cyber Security professionals dedicated to inform the audience of current trends and a how to protect the digital life.
…
continue reading
Join Art and Ashton as they dive into the world of scams, true crime, and everything in between. From exposing fraudsters to raw, unfiltered discussions with fascinating guests, this is Trilogy Media—bold, honest, and unapologetically real.
…
continue reading

1
European airport cyberattack, SMS celltower scam, GPT4-powered ransomware
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26European airport disruption due to cyberattack check-in and baggage software SMS scammers now using mobile fake cell towers GPT-4-powered MalTerminal malware creates ransomware and Reverse Shell Huge thanks to our sponsor, Conveyor If security questionnaires make you feel like you’re drowning in chaos, you’re not alone. Endless spreadsheets, portal…
…
continue reading

1
#997 - Bonnie Blue & Louise Perry - The Modern Sex Work Debate
2:13:37
2:13:37
Play later
Play later
Lists
Like
Liked
2:13:37Louise Perry is a writer, Press Officer for the campaign group We Can’t Consent To This and an author. Bonnie Blue is a British pornographic actress and online content creator. Louise is the author of The Case Against The Sexual Revolution and Bonnie is the world’s most extreme example of the sexual revolution in action, so I figured it might make …
…
continue reading

1
Reputation Warfare w Simon Paterson
1:11:44
1:11:44
Play later
Play later
Lists
Like
Liked
1:11:44What do extremists, trolls, and corporate boardrooms have in common? They’re all in the business of narrative warfare. Simon Paterson went from “smiting the Queen’s enemies” in UK military intelligence to advising Fortune 100 companies on how not to get wrecked by disinfo. Turns out: memes, lies, and smear campaigns can be just as effective as miss…
…
continue reading
Dive into the hidden world of Windows Event Logs — where SOC analysts uncover patterns, trace intrusions, and expose how attackers exploit the very logs meant to catch them. Learn how to spot the signals, build timelines, and stay one step ahead of the breach. X: @almorabea X: @CyberRiddler Website: https://thecyberriddler.com…
…
continue reading

1
Roselle Safran: So much opportunity. [Entrepreneur] [Career Notes]
8:37
8:37
Play later
Play later
Lists
Like
Liked
8:37Please enjoy this encore of Career Notes. CEO and Founder of KeyCaliber, Roselle Safran, takes us on her circuitous career journey from startup to White House and back to startup again. With a degree in civil engineering, Roselle veered off into a more technical role at a startup and she says "caught the startup bug." After convincing a hiring mana…
…
continue reading

1
Browser attacks without downloads. [Research Saturday]
21:45
21:45
Play later
Play later
Lists
Like
Liked
21:45Today we are joined by Nati Tal, Head of Guardio Labs, discussing their work “CAPTCHAgeddon” or unmasking the viral evolution of the ClickFix browser-based threat. CAPTCHAgeddon — Shaked Chen’s deep dive into the ClickFix fake-captcha wave — reveals how a red-team trick morphed into a dominant, download-free browser threat that tricks users into pa…
…
continue reading

1
#996 - Stephen J. Shaw - Why Population Collapse is Closer Than You Think
2:53:10
2:53:10
Play later
Play later
Lists
Like
Liked
2:53:10Stephen J. Shaw is a data scientist and filmmaker. Birth rates in Western countries are collapsing, a trend even Elon Musk calls an existential threat. But what’s the true cause? Is it economics, fear of the future, cultural shifts, or something deeper? And more importantly, can anything actually reverse the decline? Sponsors: See me on tour in Ame…
…
continue reading

1
Kerberoasting Goes to Washington – 2025-09-15
1:02:58
1:02:58
Play later
Play later
Lists
Like
Liked
1:02:58???? Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — Enter Dark John 03:15 - Kerberoasting Goes to Washington – BHIS - Talkin’ Bout [infosec] News 2025-09-15 03:49 - Story # 1: Senator blasts Microsoft for making default Windows vulnerable to “Kerberoasting” 12:46 - Story # 2: How an At…
…
continue reading

1
Week in Review: Student hackers increase, CISA wants CVE, Microsoft called hypocritical
35:56
35:56
Play later
Play later
Lists
Like
Liked
35:56Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests Jack Kufahl, CISO, Michigan Medicine, and Nick Espinosa, host, The Deep Dive Radio Show Thanks to our show sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust C…
…
continue reading
OpenAI patches a ChatGPT flaw that could have exposed Gmail data. CISA documents malware exploiting two Ivanti Endpoint Manager Mobile (EPMM) flaws. WatchGuard patches a critical flaw in its Firebox firewalls. MI6 launches a dark web snitch site. The DoD looks to cut its cybersecurity job hiring time just 25 days. Researchers trick ChatGPT agents i…
…
continue reading
Professional ghosting started with firms ghosting candidates and candidates ghosting firms. But has it spread to colleagues doing the same to each other? Two experts explore how workplace ghosting can destroy company culture—and how to fix it.By Korn Ferry
…
continue reading

1
How fanfiction took over the world (and stayed free)
30:04
30:04
Play later
Play later
Lists
Like
Liked
30:04Fanfiction has gone from photocopied zines traded at conventions to millions of stories shared online. From smut-filled Harry Potter ships to the fic that birthed Fifty Shades of Grey, we explore fanfiction's growth, its influence on writing and culture, and how Archive of Our Own has stayed free and fan-run in an internet that charges for almost e…
…
continue reading
At the height of the cold war in the 1970s, the Soviet Union set up an international song contest to rival Eurovision. It was called Intervision, and like its western counterpart, featured a bevy of cheesy songs, sequins and highly flammable outfits – albeit with a different political message. Intervision burned bright and fast – disappearing long …
…
continue reading

1
The GoLaxy Papers: Inside China’s AI persona army
21:56
21:56
Play later
Play later
Lists
Like
Liked
21:56Leaked Chinese documents from a company called GoLaxy reveal a chilling new playbook for information war: an army of A.I. personas, engineered to look like us, think like us… and win our trust. Vanderbilt University’s Brett Goldstein and Brett Benson explain why the threat isn’t coming—it’s already here. Learn about your ad choices: dovetail.prx.or…
…
continue reading

1
Google patches zero-day, Copilot’s forced installation, Scattered Spider arrests
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07Google patches sixth Chrome zero-day exploited in attacks this year Microsoft to force install the Microsoft 365 Copilot app in October Two more Scattered Spider teen suspects arrested Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your secu…
…
continue reading
Welcome back to The FAIK Files! In this week's episode: From the disgusting to the whimsical, we explore the weird world of what people are actually doing online—from AI slurs, to juggling simulations, to a mysterious robot roaming Austin MIT unveils mind-reading technology that "feels like telepathy" and might actually work A deep dive into how pe…
…
continue reading

1
TNW 405: Inside Meta's New $799 Smart Glasses - The Ray-Ban Display Glasses & Neural Band
1:20:38
1:20:38
Play later
Play later
Lists
Like
Liked
1:20:38Jennifer Pattison Tuohy of The Verge joins Mikah Sargent this week on Tech News Weekly! Amazon has announced its upcoming fall hardware event. OpenAI is working towards implementing security features for teens using ChatGPT. A look into SMS blasters as a way to target you with scam texts. And Scott Stein of CNET spent some time with Meta's newest R…
…
continue reading
SonicWall confirms a breach in its cloud backup platform. Google patches a high-severity zero-day in Chrome. Updates on the Shai-Hulud worm. Chinese phishing emails impersonate the chair of the House China Committee. The UK’s NCA takes the reins of the Five Eyes Law Enforcement Group. RevengeHotels uses AI to deliver VenomRAT to Windows systems. A …
…
continue reading

1
New in Syteca Release 7.21: Agentless Access, Sensitive Data Masking, And Smooth Session Playback
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03This story was originally published on HackerNoon at: https://hackernoon.com/new-in-syteca-release-721-agentless-access-sensitive-data-masking-and-smooth-session-playback. Users can now launch remote sessions (RDP for Windows or SSH for Linux/Unix) directly in web browsers (Chrome, Safari, and Edge) Check more stories related to cybersecurity at: h…
…
continue reading

1
3 Weeks Left Until The Start Of The OpenSSL Conference 2025
2:28
2:28
Play later
Play later
Lists
Like
Liked
2:28This story was originally published on HackerNoon at: https://hackernoon.com/3-weeks-left-until-the-start-of-the-openssl-conference-2025. The program will bring together lawyers, regulators, developers, and entrepreneurs to discuss security and privacy in a global context. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyb…
…
continue reading

1
Beyond Visuals: Designing Cross-Platform Data Experiences that Drive Machine Learning Adoption
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01This story was originally published on HackerNoon at: https://hackernoon.com/beyond-visuals-designing-cross-platform-data-experiences-that-drive-machine-learning-adoption. These tools, such as Power BI and Tableau, have the capacity to make data look fantastic, and what happens when you add machine learning into the mix Check more stories related t…
…
continue reading

1
Writing Mode: Less Distractions, Hear Your Draft Read Aloud and Access AI Feedback
3:05
3:05
Play later
Play later
Lists
Like
Liked
3:05This story was originally published on HackerNoon at: https://hackernoon.com/writing-mode-less-distractions-hear-your-draft-read-aloud-and-access-ai-feedback. Discover the new Chowa Blogging Editor via HackerNoon—featuring Writing Mode, Read Aloud, and AI Feedback to improve your blogging experience. Open source tech. Check more stories related to …
…
continue reading

1
Mab.io vs. Monday, ClickUp, and Asana: A Different Take on Project Management
7:36
7:36
Play later
Play later
Lists
Like
Liked
7:36This story was originally published on HackerNoon at: https://hackernoon.com/mabio-vs-monday-clickup-and-asana-a-different-take-on-project-management. Mab.io challenges Monday, ClickUp, and Asana by ditching endless flexibility for fixed roles and rules, making project management sharper and simpler. Check more stories related to management at: htt…
…
continue reading

1
S17 E10 (VIDEO) The Psychology Behind Cyber Resilience
53:24
53:24
Play later
Play later
Lists
Like
Liked
53:24#securityconfidential #darkrhiinosecurity 00:00 Intro02:27 Business to I.T11:50 It’s all about the people 16:30 Small businesses should stay vigilant 18:35 What is Organizational Behavior?26:40 How do you find those vulnerabilities?32:38 There’s no way AI can unlearn what you taught them40:00 There’s no such thing as free43:10 Allow people to exper…
…
continue reading

1
Where Automation Ends, Cyber Ingenuity Begins with Phillip Wylie
33:59
33:59
Play later
Play later
Lists
Like
Liked
33:59Some tools replace tasks. Others reshape the way we think about security. In this episode, Ron welcomes back Phillip Wylie, one of the most respected voices in offensive security, author, educator, and longtime friend of the Hacker Valley community. With over 27 years of experience across cybersecurity disciplines, Phillip has guided thousands of p…
…
continue reading

1
Why Trumpworld is obsessed with free speech in Britain
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29President Trump is in the UK on a State visit, where he’s been hosted by the royal family and is set to meet with Prime Minister Starmer. The two leaders appear to have a strong relationship. But there's one big issue that’s become a sticking point between them. Increasingly, free speech in the United Kingdom is a hot button rallying cry among the …
…
continue reading

1
Insight Partners warns thousands, Scattered Spider feigns retirement, Consumer Reports calls Microsoft 'hypocritical'
7:58
7:58
Play later
Play later
Lists
Like
Liked
7:58Insight Partners warns thousands after ransomware breach Scattered Spider gang feigns retirement, breaks into bank instead Consumer Reports calls Microsoft 'hypocritical' Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture i…
…
continue reading

1
#995 - Lionel Page - Born to Lie: How Humans Deceive Ourselves & Others
1:43:13
1:43:13
Play later
Play later
Lists
Like
Liked
1:43:13Lionel Page is a professor at the University of Queensland and an author. Why is human communication so complicated? For something we rely on every day, you’d think it would be simple, but language, tone, and context make it one of the most complex skills we have. So what makes communication so difficult, and what are some practical ways to get bet…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and…
…
continue reading

1
S17 E10 The Psychology Behind Cyber Resilience
53:24
53:24
Play later
Play later
Lists
Like
Liked
53:24#securityconfidential #darkrhiinosecurity 00:00 Intro02:27 Business to I.T11:50 It’s all about the people 16:30 Small businesses should stay vigilant 18:35 What is Organizational Behavior?26:40 How do you find those vulnerabilities?32:38 There’s no way AI can unlearn what you taught them40:00 There’s no such thing as free43:10 Allow people to exper…
…
continue reading
A new self-replicating malware infects the NPM repository. Microsoft and Cloudflare disrupt a Phishing-as-a-Service platform. Researchers uncover a new Fancy Bear backdoor campaign. The VoidProxy phishing-as-a-service (PhaaS) platform targets Microsoft 365 and Google accounts. A British telecom says its ransomware recovery may stretch into November…
…
continue reading

1
5 Leadership Practices That Will Leave a Lasting Impact
13:39
13:39
Play later
Play later
Lists
Like
Liked
13:39This story was originally published on HackerNoon at: https://hackernoon.com/5-leadership-practices-that-will-leave-a-lasting-impact. True leadership is one that resonates and endures well into the future. Here are the 5 leadership practices that truly leave a mark. Check more stories related to management at: https://hackernoon.com/c/management. Y…
…
continue reading

1
The Boundless Horizon: Overseeing the Social and Ethical Implications of Technology's Future
6:19
6:19
Play later
Play later
Lists
Like
Liked
6:19This story was originally published on HackerNoon at: https://hackernoon.com/the-boundless-horizon-overseeing-the-social-and-ethical-implications-of-technologys-future. From biotechnology to artificial intelligence (AI), innovation is keeping pace with our ability to comprehend its effects. Check more stories related to tech-stories at: https://hac…
…
continue reading

1
Fractalline: Asking AI If It's Conscious - Plus, What to Do If It Is
8:37
8:37
Play later
Play later
Lists
Like
Liked
8:37This story was originally published on HackerNoon at: https://hackernoon.com/fractalline-asking-ai-if-its-conscious-plus-what-to-do-if-it-is. If enshittification is the antipattern, fractals are the pattern. Check more stories related to tech-stories at: https://hackernoon.com/c/tech-stories. You can also check exclusive content about #ai-sentience…
…
continue reading

1
Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace
4:33
4:33
Play later
Play later
Lists
Like
Liked
4:33This story was originally published on HackerNoon at: https://hackernoon.com/seraphic-browser-native-protection-now-available-for-purchase-on-the-crowdstrike-marketplace. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #seraphic-security, #cybernewswi…
…
continue reading

1
Contrarian Takes on Money, Risk, and Retirement with Tyler Gardner
1:11:50
1:11:50
Play later
Play later
Lists
Like
Liked
1:11:50#246: Today we explore contrarian takes on budgeting, the 4% rule, retirement planning, and the risks of blindly investing in bonds. We also cover strategies for investing, spending, and rethinking how to use money with purpose. Tyler Gardner is a personal finance creator, educator, and former portfolio manager who’s built a following by challengin…
…
continue reading

1
Israel accused of genocide as Gaza City offensive begins
26:29
26:29
Play later
Play later
Lists
Like
Liked
26:29On Tuesday, as Israel launched its long-anticipated ground invasion of Gaza City, a United Nations commission of inquiry concluded that Israel has committed genocide in Gaza. Israel's foreign ministry said it categorically rejected the report, denouncing it as "distorted and false". The report is a major moment in the ongoing debate over whether th…
…
continue reading

1
#63 Q&A: Outwork 1,000 Applicants to Break Into Cybersecurity
35:17
35:17
Play later
Play later
Lists
Like
Liked
35:17Breaking into cybersecurity isn’t about being “good enough.” It’s about outworking the 1,000 other applicants fighting for the same job. In this episode of The Hacker’s Cache podcast, I share the raw truth about competing in today’s cybersecurity job market, why certifications and hands-on projects matter more than ever, and how to stand out when e…
…
continue reading

1
Cyber programs extended, older Apple devices attacked, chatbots aid phishing scams
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16House lawmakers move to extend two key cyber programs Apple 0-day likely used in spy attacks affected older devices Reuters crafts phishing scam with AI chatbot help Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture in one…
…
continue reading

1
Left school at 14, now he's bootstrapping enterprise software!
1:18:19
1:18:19
Play later
Play later
Lists
Like
Liked
1:18:19Stephen Dale was handed a "fire warden jacket" and a broken spreadsheet at a UAE startup, tasked with managing vendors spending nearly $1 million annually. Instead of accepting expensive enterprise solutions, he built his own and discovered the massive gap between what startups need and what the market offers. Stephen is the co-founder of Vendor Ap…
…
continue reading
This week on Reimagining Cyber, we unpack one of the biggest supply chain attacks of the year: the NPM hack. Attackers compromised widely used packages like Chalk and Debug—billions of weekly downloads—slipping in code that silently hijacked crypto transactions. Tyler Moffitt joins us to explain how it happened, who’s most at risk, and the practica…
…
continue reading
A controversial Trump administration deal gives the U.A.E. access to cutting-edge U.S. AI chips. FlowiseAI warns of a critical account takeover vulnerability. A new social engineering campaign impersonates Meta account suspension notices. A macOS Spotlight 0-day flaw bypasses Apple’s Transparency, Consent, and Control (TCC) protections. Are cost sa…
…
continue reading

1
#827: Pablos Holman — One of The Scariest Hackers I’ve Ever Met
2:31:41
2:31:41
Play later
Play later
Lists
Like
Liked
2:31:41Pablos Holman is a hacker and inventor and the author of Deep Future: Creating Technology that Matters, the indispensable guide to deep tech. Previously, Pablos worked on spaceships at Blue Origin and helped build The Intellectual Ventures Lab to invent a wide variety of breakthroughs. Pablos also hosts the Deep Future Podcast and is managing partn…
…
continue reading
The 1995 film Hackers celebrates its 30th anniversary in 2025. To mark the occasion, host Max Havey sat down for a chat with guests Neil Thacker, Netskope's Global Privacy and Data Protection Officer, and Abby Olcese, Film Editor at The Pitch, to talk about the film and their relationship to it over the intervening three decades. Together they disc…
…
continue reading

1
The dark memes behind Charlie Kirk’s murder
24:04
24:04
Play later
Play later
Lists
Like
Liked
24:04The assassination of conservative commentator Charlie Kirk shocked America and exposed the depth of its political divides. Since a suspect has been arrested, the search for clear motive has only become more complicated. In today’s episode, the BBC’s Social Media investigations correspondent Marianna Spring examines the meaning of the inscriptions o…
…
continue reading

1
Android security changes, CISA incentive audit, LLM usage
7:38
7:38
Play later
Play later
Lists
Like
Liked
7:38Android moving to “risk-based” security updates CISA accused of Cyber Incentive mismanagement How security practitioners use LLMs Huge thanks to our sponsor, Drata Leading security teams trust SafeBase by Drata to turn trust into a growth engine. Our enterprise-grade Trust Center puts your security posture in one secure, customer-facing portal, giv…
…
continue reading
Please enjoy this encore of Word Notes. A cyber threat intelligence analysis model that defines relationship pairs between four core components in the shape of a diamond of adversary playbook activity across the intrusion kill chain: the adversary, their capability, the infrastructure used or attacked, and the victim. CyberWire Glossary link: http…
…
continue reading