Meet Alice – a burnt-out barista who turns to the Dark Web to pay off her student debt. But when cybercrime pulls her deeper than she could have ever imagined, only one question remains: can Alice get out before it’s too late? The Hacker Chronicles Season 2: Digital Nomad. Presented by Tenable. Starring Michael C. Hall as John Doe. And Chloe Taylor as Alice.
…
continue reading
Michael Hacker Podcasts
One average name, some crazy stuff! Cover art photo provided by Michael Hacker on Unsplash: https://unsplash.com/@michael_hacker
…
continue reading
I was inspired to really speak to the edge of my own journey, and all of ours collectively this week. I did a talk in my hometown for a bunch of really important people, namely my city, and it really has had me thinking about the true impact of my journey, of your journey, and what's at stake for us, not only as we grow individually, but as a species.
…
continue reading
The Peabody Award-winning On the Media podcast is your guide to examining how the media sausage is made. Hosts Brooke Gladstone and Micah Loewinger examine threats to free speech and government transparency, cast a skeptical eye on media coverage of the week’s big stories and unravel hidden political narratives in everything we read, watch and hear.
…
continue reading
The Successful Bookkeeper Podcast is a weekly show to help increase your confidence, work smarter and build a business you love. Each week you'll listen to inspiring guests who will share their success secrets, so you can take your bookkeeping enterprise and life to another level. Some of them include New York Times Best-Selling Author of E-Myth, Michael E. Gerber, Pure Bookkeeping Co-Founder, Debbie Roberts, the host of The Productive Woman podcast, Laura McClellan and the author of *I Know ...
…
continue reading
Comedian Doug Benson (Super High Me, Last Comic Standing) invites his friends to sit down and discuss his first love: movies!
…
continue reading
Security by Default is a cybersecurity podcast hosted by Joseph Carson, a renowned ethical hacker and security expert. Each episode dives into the latest security trends, real-world threats, and practical advice for staying safe in the digital world. With insightful interviews and clear explanations, Joseph makes complex topics accessible for both IT professionals and curious listeners alike.
…
continue reading
Never leave money on the table. This is your shortcut to upgrading your life, money and travel—all while spending less and saving more. Get tactical moves and deep dives into designing a life you’re excited about. Host Chris Hutchins is a life hacker who has saved millions by breaking down every aspect of life and looking to maximize happiness at the lowest cost. Chris and guests like Tim Ferriss, Tony Hawk, Codie Sanchez and Gary Vaynerchuk are here to deliver smart strategies you can plug ...
…
continue reading
A Bob Dylan Primer is a series of broadcasts dedicated to the work and life of Bob Dylan. The first season consists of 12 episodes, appearing approximately once a month, and covering the time period from Dylan’s youth in Minnesota and early days in New York City up to the release of Dylan’s Time Out Of Mind in 1997. I’ve attempted to combine a detailed account of Dylan’s life with my own personal observations about Dylan’s creative output and place in our world. It’s my hope that A Bob Dylan ...
…
continue reading
For years Alex "WORLDWIDE" Kellar has stated that 1995 was the Greatest Year Ever In (american) Cinema. Now it's time to prove it (maybe, who cares)
…
continue reading
1
Culture Hackers
Robbe Richman and a cast of hackers, troublemakers, movers and shakers, Robbe Richman
A show all about culture hacking - at companies, in business and the world. The first episodes are the free audio book of Robert Richman's "Culture Blueprint."
…
continue reading
7th Son: 7 Days is a audio prequel anthology to J.C. Hutchins' thriller novel, 7th Son: Descent. Set two weeks before Descent's extraordinary events, the series reveals the lives of seven seemingly unrelated men, and their everyday challenges. In the world of 7th Son, "everyday challenges" are far from ordinary. Each of these seven stories stars a unique John Michael Smith. Witness criminal profiler Dr. Mike's quest to hunt an unstoppable serial killer. Watch blue-collar musician John realiz ...
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Jump-start your use of the Cisco Learning Network's dynamic features and vibrant community offerings. Here you will find technical information and professional networking opportunities, which will help advance your certification goals. By joining the Cisco Learning Network you will be a part of the community, prepare for success, interact with professionals, mentor, share, and achieve.
…
continue reading
The Security Podcast of Silicon Valley invites founders, engineers, and security leaders to share how they tackle compliance, growth, and real-world security challenges—turning obstacles into strategic advantages. Brought to you by YSecurity.
…
continue reading
From BBC News NI. Tara Mills and Declan Harvey react and reflect on the stories that impact all our lives and speak to those who can help us understand why we’re in the state we’re in. This podcast is a new way of talking and learning about the news in Northern Ireland. There’ll be lots of candid conversations, special guests, with wisdom, informality and some fun along the way. Nothing will be off the table on “The State of Us”. New episodes every Tuesday and Thursday. Contact thestateofus@ ...
…
continue reading
Are you a Canadian real estate investor looking for real Canadian Content? You've found it! Since 2016, this weekly show has helped Canadians cut through the BS and uncover the truth about how to most effectively invest in real estate. Ranked as high as #81 globally in iTunes' Business category, host Erwin Szeto is a real estate investor and 4X Investor Realtor of the Year, with just under $500M in income property transactions. Erwin interviews top investors and wealth builders, sharing stra ...
…
continue reading
An interview show where I talk to programmers, developers, and coders of all types who have gone into business for themselves. I find out the secrets to their success so you can make the move into an entrepreneurial pursuit yourself.
…
continue reading
The Reconfigured Podcast is a show that explores the intersection of technology, culture, and society which is hosted by Mohamad Kalaaji (technolaaji). We bring professionals to talk about their extended experience or discuss about a topic that might be interesting. All of our episodes are available for free to the general public at no additional cost
…
continue reading
Security Headlines is a podcast about the latest security vulnerabilities with in the cyber security field. So if your interested about the latest security holes no mather if you are a tech savy penetration tester, a devops person, a programmer or just generally interested in the latest technology security news. Security headlines is here for you Security headlines is perfect to listen on when you want a quick update, on the way to work or when you are taking a walk out side The podcast is p ...
…
continue reading
Faith Angle brings together top scholars and leading journalists for smart conversations around some of the most profound questions in the public square. Rather than a current-events debrief, our goal is a substantive conversation one notch beneath the surface, drawing out how religious convictions manifest themselves in American culture and public life.
…
continue reading
1
Root access to the great firewall. [Research Saturday]
26:06
26:06
Play later
Play later
Lists
Like
Liked
26:06Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China’s Great Firewall. Across both parts, you break down thousands of leaked document…
…
continue reading
1
Trump Guns for the FTC. Plus, Are We the Losers in the Paramount v Netflix Battle?
51:57
51:57
Play later
Play later
Lists
Like
Liked
51:57The Supreme Court appears ready to let Donald Trump fire Federal Trade Commission members at will. On this week’s On the Media, why the court’s expansion of presidential powers would impact the entire government. Plus, how two Hollywood giants are squaring off over a massive merger. [02:47] Host Brooke Gladstone sits down with Noah Rosenblum, assoc…
…
continue reading
A new executive order targets states’ AI regulations, while the White House shifts course on an NSA deputy director pick. The UK fines LastPass over inadequate security measures. Researchers warn of active attacks against Gladinet CentreStack instances. OpenAI outlines future cybersecurity plans. MITRE ranks the top 25 vulnerabilities of 2025. CISA…
…
continue reading
CISA warns that pro-Russia hacktivist groups are targeting US critical infrastructure. Google patches three new Chrome zero-day vulnerabilities. North Korean actors exploit React2Shell to deploy a new backdoor. Researchers claim Docker Hub secret leakage is now a systemic problem. Attackers exploit an unpatched zero-day in Gogs, the self-hosted Git…
…
continue reading
He was Stakeknife, Britain's top spy in the IRA. And he was also Freddie Scappaticci, a west Belfast man who rose through the ranks of the IRA, before fleeing Northern Ireland decades ago when claims about his double life became public. He died in 2023, but the details and circumstances of his life – and what he did while acting for the Army while …
…
continue reading
Patch Tuesday. Federal prosecutors charge a Houston man with smuggling Nvidia chips to China, a Ukrainian woman for targeting critical infrastructure, and an Atlanta activist for wiping his phone. The power sector sees cyber threats doubling. The new Spiderman phishing kit slings its way across the dark web. Our guest is Dick O'Brien, Principal Int…
…
continue reading
1
How a Gossip Blogger (almost) Became the Poster Child for First Amendment Rights
23:39
23:39
Play later
Play later
Lists
Like
Liked
23:39Last summer, Perez Hilton, the gossip blogger who rose to fame for his scoopy and sometimes vicious takes in the early 2000s, was served a subpoena by Blake Lively's legal team. Perez Hilton decided to resist the subpoena under the argument that he is a journalist who is entitled to protect his sources. Micah speaks with Joel Simon, the longtime fo…
…
continue reading
1
End of Year Checklist for Your Taxes, Points and Miles
1:13:17
1:13:17
Play later
Play later
Lists
Like
Liked
1:13:17#257: We break down essential tax and financial decisions to make before year-end. Learn how to maximize deductions, optimize charitable giving, manage investment gains and losses, and take advantage of retirement and home-improvement credits. We also run through all the credit card, points and miles deadlines to hit before 12/31. Link to Full Show…
…
continue reading
Organizations worldwide scramble to address the critical React2Shell vulnerability. Major insurers look to exclude artificial intelligence risks from corporate policies. Three Chinese hacking groups converge on the same Sharepoint flaws. Ransomware crews target hypervisors. A UK hospital asks the High Court to block publication of data stolen by th…
…
continue reading
1
Building Trust in Customer Success with David Muniz
41:52
41:52
Play later
Play later
Lists
Like
Liked
41:52In this episode of the Security by Default podcast, Joseph Carson engages with David Muniz to explore the evolving landscape of cybersecurity. They discuss the importance of diversity in the field, the distinction between customer success and support, and the critical role of trust in business relationships. The conversation also delves into the Ze…
…
continue reading
1
EP506: Ron Bester - How SODA Helps You Build A Business That Runs Without You
43:26
43:26
Play later
Play later
Lists
Like
Liked
43:26" You do not want a business that is entirely dependent on you. You want an independent running business." -Ron Bester Ron Bester, VP of Client Experience at Successful Bookkeeper Global, breaks down why so many bookkeepers feel buried in day-to-day work and how the SODA framework helps you reclaim time, reduce stress, and build a business that doe…
…
continue reading
In this episode, host Kim Jones examines the rapid rise of enterprise AI and the tension between innovation and protection, sharing an RSA anecdote that highlights both excitement and concern. He outlines the benefits organizations hope to gain from AI while calling out often-overlooked risks like data quality, governance, and accountability. Kim i…
…
continue reading
Blue-green algae, pollutants – and cocaine? The health of Northern Ireland’s lakes and rivers has been in the spotlight for some time and now scientists have found the widespread presence of drugs – including cocaine, painkillers and anti-depressants – in some of our major waterways. And, while the water sampled is not the same stuff as comes out o…
…
continue reading
How might Trump’s new National Security Strategy impact cyber? The UK’s NCSC warns LLMs may never get over prompt injection. At least 18 U.S. universities were hit by a months-long phishing campaign. Russia blocks FaceTime. A bipartisan group of senators reviving efforts to strengthen protections across the health sector. Portugal provides legal sa…
…
continue reading
1
Joey Bragg, Kevin Lewis and Geoff Tate guest
53:44
53:44
Play later
Play later
Lists
Like
Liked
53:44Doug welcomes Joey Bragg, Kevin Lewis and Geoff Tate to the show. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
…
continue reading
1
Jon DiMaggio: Two roads diverged. [Strategy] [Career Notes]
9:19
9:19
Play later
Play later
Lists
Like
Liked
9:19Please enjoy this encore of Career Notes. Chief security strategist from Analyst1, Jon DiMaggio shares his story on how he grew to become a part of the cybersecurity world. He describes different jobs that paved the way to the knowledge he has in the industry right now, and he even shares about an experience that led him to a path that split and wh…
…
continue reading
1
When macOS gets frostbite. [Research Saturday]
24:40
24:40
Play later
Play later
Lists
Like
Liked
24:40Jaron Bradley, Director of Jamf Threat Labs, is sharing their work on "ChillyHell: A Deep Dive into a Modular macOS Backdoor." Jamf Threat Labs uncovers a newly notarized macOS backdoor called ChillyHell, tied to past UNC4487 activity and disguised as a legitimate applet. The malware showcases robust host profiling, multiple persistence mechanisms,…
…
continue reading
1
Covering the Pentagon, from Sy Hersh to Laura Loomer
1:03:43
1:03:43
Play later
Play later
Lists
Like
Liked
1:03:43The New York Times has sued the Pentagon for restricting access to journalists. On this week’s On the Media, meet the new cast of right wing influencers and conspiracy theorists replacing the press corps in the Pentagon. Plus, a new documentary examines the life and work of investigative journalist Seymour Hersh. [01:00] Host Micah Loewinger sits d…
…
continue reading
1
China’s quiet crawl into critical networks.
30:13
30:13
Play later
Play later
Lists
Like
Liked
30:13Chinese threat actors deploy Brickstorm malware. The critical React2Shell vulnerability is under active exploitation. Cloudflare’s emergency patch triggered a brief global outage. Phishing kits pivot to fake e-commerce sites. The European Commission fines X(Twitter) €120 million for violating the Digital Services Act. Predator spyware has a new bag…
…
continue reading
CISA staff may see pay cuts in 2026. Threat actors advertise a full chain zero-day exploit for iOS. A US-led international coalition releases joint guidance on integrating AI into operational technology. Microsoft lowers sales growth targets for its agentic AI products. A major fintech provider suffers a ransomware-linked breach. Arizona’s Attorney…
…
continue reading
The Presbyterian Church in Ireland (PCI) is the biggest Protestant denomination in Northern Ireland, with more than 200,000 members across the island. And it has never had its moderator, or head of the church, resign in its 185-year history – until three weeks ago. The announcement that Rev Trevor Gribben was stepping down due to serious safeguardi…
…
continue reading
1
How to Sell a Tenanted Property in 2026: What Investors Need to Know Now
1:02:15
1:02:15
Play later
Play later
Lists
Like
Liked
1:02:15Discover how to sell a tenanted property in 2026! Investor and property manager Tim Hong joins host Erwin Szeto to break down market trends, new regulations, and practical strategies for selling with tenants in place. Get expert tips on maximizing your investment, navigating challenges, and making smart decisions in today’s real estate market. Plus…
…
continue reading
1
Just another day of scamming and jamming.
29:53
29:53
Play later
Play later
Lists
Like
Liked
29:53The DOJ shuts down another scam center in Myanmar. OpenAI confirms a Mixpanel data breach. A new phishing campaign targets company executives. A bipartisan bill looks to preserve the State and Local Cybersecurity Grant Program. Universities suffer Oracle EBS data breaches. India reports GPS jamming at eight major airports. Kaiser Permanente settles…
…
continue reading
Late last month, Reuters reported that DOGE had “disbanded,” that the group was no longer a centralized government entity. But according to Wired Reporter Vittoria Elliott, while DOGE is no longer moving across the government "in a move-fast-and-break-things blitz,” it is far from dead and gone. One source, at the USDA, told Wired that DOGE operati…
…
continue reading
1
Transforming Cybersecurity Awareness Training with Michael Waite
31:49
31:49
Play later
Play later
Lists
Like
Liked
31:49In this episode of Security by Default, host Joe Carson sits down with Michael Waite from Dune Security to explore how AI is reshaping cybersecurity and why it’s time to rethink traditional awareness training. As cyber threats become more sophisticated, personalized, and AI-powered, organizations can no longer rely on outdated, one-size-fits-all le…
…
continue reading
1
The Easy Way to Build and Maintain Meaningful Relationships with Nick Gray
58:45
58:45
Play later
Play later
Lists
Like
Liked
58:45#256: We break down the simplest, most effective ways to build stronger friendships and stay connected as an adult. Plus, learn how to build a personal website, host better events, send a friends newsletter, book a cruise on a budget, and so much more. Nick Gray is an entrepreneur and author who built and sold two successful companies, Flight Displ…
…
continue reading
Enjoy this episode of Cyber things from Armis. Catch the next episode on your favorite podcast app on December 15th. Welcome to Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire that plunges into the hidden world beneath our connected reality. Inspired by Stranger Things, we explore the digital realm's own U…
…
continue reading
1
"Six point Seven" Virtuosity (1995) with Nate (who has never had a nickname)
1:56:03
1:56:03
Play later
Play later
Lists
Like
Liked
1:56:03Why do they call it a nickname? Who's Nick? Call it a Nate-name. Nate's on the show to talk the cyber-action flick VIRTUOSITY (1995) even though he doesn't watch movies (except for Night At The Roxbury and Big Daddy). It's wild that 30 years ago they knew AI was bad news, mannnnn. Nate doesn't give a frick but check out his band if you want (but he…
…
continue reading
ShadyPanda plays the long game. India mandates tracking software on mobile devices. Korea weighs punitive damages after a massive breach. Qualcomm patches a critical boot flaw impacting millions. OpenAI patches a Codex CLI vulnerability. Google patches Android zero-days. Cybersecurity issues prompt an FDA permanent recall for an at-home ventilator …
…
continue reading
1
83. How small companies can make their security doable (with Phil Howie)
34:47
34:47
Play later
Play later
Lists
Like
Liked
34:47What if your first security hire wasn’t a person, but a simple, guided program that made sense to everyone in your company? In this conversation, Sidekick founder and CEO Phil Howie breaks down how SMBs can build a security and privacy practice from the ground up—long before they can afford a full internal team. We cover the reality of compliance v…
…
continue reading
1
EP505: Christina Springstead - The Bookkeeper's Guide To Boundaries, Cleanups & Growth
42:19
42:19
Play later
Play later
Lists
Like
Liked
42:19"Like this is not just a gig, but this is my career. You grow into wanting more of that for your clients and you start recognizing if a client isn't about that. The last thing I want is just agree to do a subpar job because a client doesn't really care and then they decide to care in two years and they look back at the history and they're like, 'Th…
…
continue reading
In this episode, Kim Jones sits down with Eric Nagel, a former CISO with a rare blend of engineering, legal, and patent expertise, to unpack what responsible AI really looks like inside a modern enterprise. Eric breaks down the difference between traditional machine learning and generative AI, why nondeterministic outputs can be both powerful and r…
…
continue reading
1
Olympic boxer Aidan Walsh: Why I’m delighted to quit the ring
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36When Aidan Walsh announced his retirement from boxing last month, and said he was doing so with relief, it was clear his relationship with the sport is complicated. There were great days, not least winning a bronze medal at the Tokyo Olympics and representing Ireland at the highest stage with sister, and fellow boxer, Michaela. But there were dark …
…
continue reading
European authorities take down an illegal cryptomixer. An Australian man is sentenced for running an airport evil twin WiFi campaign. Researchers unmask a Scattered LAPSUS$ Hunters impresario. CISA flags a cross-site scripting flaw in OpenPLC ScadaBR. A major South Korean retailer suffers a data breach affecting over 33 million customers. Threat ac…
…
continue reading
1
Kurtis David Harder, Jonathan Mangum and Clarke Wolfe guest
1:00:15
1:00:15
Play later
Play later
Lists
Like
Liked
1:00:15Doug welcomes Kurtis David Harder, Jonathan Mangum and Clarke Wolfe to the show. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
…
continue reading
1
AI in the GRC: What's real, what's risky and what's next. [Special Edition]
1:02:46
1:02:46
Play later
Play later
Lists
Like
Liked
1:02:46Join us for a timely and insightful live discussion on the evolving role of artificial intelligence in governance, risk, and compliance. Host Dave Bittner from N2K | CyberWire is joined by Kayne McGladrey from Hyperproof, Matthew Cassidy, PMP, CISA from Grant Thornton (US), and Alam Ali from Hyperproof to explore the current state of artificial int…
…
continue reading
1
Danielle Jablanski: Finding the path to success [Strategy] [Career Notes]
9:21
9:21
Play later
Play later
Lists
Like
Liked
9:21Please enjoy this encore of Career Notes. Operational technology cybersecurity strategist from Nozomi Networks, Danielle Jablanski shares her story of building a target map to end up where she is today. She shares how she started in college and how different paths in life got her to be on the target of success where she is today. She says " you bui…
…
continue reading
1
A new stealer hiding behind AI hype. [Research Saturday]
22:08
22:08
Play later
Play later
Lists
Like
Liked
22:08Please enjoy this encore of Research Saturday. This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as …
…
continue reading
1
Tell Your Uncle He's Fighting Twitter Bots in Bangladesh
50:11
50:11
Play later
Play later
Lists
Like
Liked
50:11A new feature on X, formerly known as Twitter, has revealed that some prominent MAGA accounts are based in South Asia and Eastern Europe. On this week’s On the Media, how foreign actors funnel political rage-bait into social media feeds. Plus, a school librarian in Louisiana shares how she’s been targeted by book-banning activists. [01:00] Host Mic…
…
continue reading
1
Pass the intel, please. [Only Malware in the Building]
38:06
38:06
Play later
Play later
Lists
Like
Liked
38:06Please enjoy this encore of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the r…
…
continue reading
1
Familiar faces return to count The State of the Budget
34:39
34:39
Play later
Play later
Lists
Like
Liked
34:39Taxes, child benefits, electric cars and milkshakes - yes, we’re talking the Budget and how it could affect you. To help us along we invited some past guests of the programme back on to better understand what it all means. These guests all come from different circumstances – factory worker and new homeowner Jamie Jennings; single mum Louise McCullo…
…
continue reading
1
Hacker Movies Then vs Now [Threat Vector]
47:06
47:06
Play later
Play later
Lists
Like
Liked
47:06We dive into a nostalgic yet revealing journey through classic hacker films, from WarGames to The Net and beyond, to assess what they got right, what they wildly imagined, and what those stories say about culture, fears, and cyber reality today. David Moulton, Senior Director of Thought Leadership for Unit 42 talks with Ben Hasskamp, Global Content…
…
continue reading
1
Identifying vulnerabilities in space with Bigbear.ai. [Deep Space]
21:22
21:22
Play later
Play later
Lists
Like
Liked
21:22Please enjoy this encore of T-Minus Deep Space. BigBear.ai is at the forefront of innovation for national security, and is committed to supporting the critical infrastructure driving America’s competitive edge. The company deploys cutting-edge Al, machine learning, and computer vision solutions to defend critical operations and win with decision ad…
…
continue reading
Report sheds light on cyber activity targeting space-related organizations during the Gaza War. Russian threat actor targets US civil engineering firm. FBI says $262 million has been stolen in account takeover scams this year. HashJack attack tricks AI browser assistants. London councils disrupted by cyberattacks. Russia’s Gamaredon and North Korea…
…
continue reading