Cypher Tech Hacks is an electrifying deep dive into the world of cyber scams and digital deceptions, where host Alex Cipher unpacks intricate hacking techniques into simple, step-by-step explanations. Each episode dissects legendary cyber exploits and high-tech frauds, making complex digital heists accessible and engaging for tech enthusiasts. Beyond the captivating tales, the podcast empowers listeners with practical insights and preventive measures to fortify their digital defenses.
…
continue reading
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
Find out how technology is reshaping our lives every day and explore the new powers of governments and companies.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
A show about hacking the system, hosted by Patrick Tomasso and Gabi Pirraglia. Patrick is a content creator and Gabi is digital strategist, together they pull apart the internet and social media to reveal the hidden creative formulas for success.
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
We Cover the Cyberspace.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Want to learn more about how terrorists and violent extremists are using the internet to communicate and share propaganda? Perhaps you’re interested in why terrorists share their manifestos online and livestream their attacks? The Tech Against Terrorism podcast is a deep dive into the evolving use of the internet by terrorists and violent extremists, how this relates to real world harms, and what can be done to support the tech sector to disrupt this threat. Join us as we speak to the world’ ...
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you’re curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A weekly podcast for bounty hunters, exploit developers or anyone interesting in the details of the latest disclosed vulnerabilities and exploits.
…
continue reading
Hosted by Ian Landsman and Aaron Francis, Mostly Technical is a lively discussion on Laravel, business, and an eclectic mix of related topics.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
[DAILY] Crypto News, AI News, and maybe stock market News shortly. These trends are taking off, You can get in early to profit! Let’s chill and get rich together. 😉
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Senior Intelligence Analysts Chris Morgan and Kim Bromley bring together over 30 years of experience in threat intelligence across government, military, and telecommunications. Along with their guests, they provide practical perspectives on t ...
…
continue reading
The Technado crew covers a whirlwind of tech topics each week from interviews with industry experts and up-and-coming companies to commentary on topics like security, vendor certifications, networking, and just about anything IT related.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
SecurityWeek podcast series. Hear from cybersecurity industry experts and visionaries. Easy listening, great insights..
…
continue reading
Hello, I'm Rees from the YouTube channel ctrl-alt-rees. Here is a thing wherein I ramble about things.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
ID Tech's Alex Perala and Tony Bitzionis are joined by a varied range of guest experts to discuss identity technology, biometrics, digital ID, artificial intelligence, and more.
…
continue reading
Daily run down of top cyber and tech current events
…
continue reading
Go from monotonous to autonomous IT operations with this series. Hosts from Automox, the IT automation platform for modern organizations, will cover the latest IT trends; Patch Tuesday remediations; ways to save time with Worklets (pre-built scripts); reduce risk; slash complexity; and automate OS, third-party, and configuration updates on all your Windows, macOS, and Linux endpoints. Automate confidence everywhere with Automox.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
Welcome to The MLSecOps Podcast, presented by Protect AI. Here we explore the world of machine learning security operations, a.k.a., MLSecOps. From preventing attacks to navigating new AI regulations, we'll dive into the latest developments, strategies, and best practices with industry leaders and AI experts. Sit back, relax, and learn something new with us today. Learn more and get involved with the MLSecOps Community at https://bit.ly/MLSecOps.
…
continue reading
Welcome to ’Hacker Hacks,’ the podcast where we dive deep into the mysterious world of cybersecurity. Each episode unveils the tactics, techniques, and procedures used by both ethical and malicious hackers, empowering you with knowledge to defend your digital realm. Whether you’re a seasoned IT professional, an emerging tech enthusiast, or just curious about the digital shadows, ’Hacker Hacks’ is your ultimate guide to understanding the tricks of the trade and the tools to thwart them. Subsc ...
…
continue reading
The Breach Report gives you a front-row seat to the latest cybersecurity news and insights, as Rense and Robert share practical takeaways from their day-to-day work in threat intelligence and incident response. Take theory into action!
…
continue reading
Tech news from Australia and abroad, with Mashable reporter/tech extraordinaire Johnny Lieu and FBi's Lucy Smith.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
…
continue reading
The Mobile Security Show is a series of panel discussions on the emerging security trends and standards for high-powered mobile computing. Each episode is hosted by tech guru Veronica Belmont and security expert Dino Dai Zovi. The full video of each panel is available from the AT&T Tech Channel at http://techchannel.att.com
…
continue reading
The Cyber Ways Podcast brings academic cyber security research into the "real world." We interview top academic researchers to find how their research can be put into practice by cyber security professionals. Our focus is on behavioral aspects of cyber security. Occasionally, we touch on related topics, such as information privacy and surveillance.Each episode discusses one published, peer-reviewed article to reveal the practical implications of the research. Your hosts, Tom Stafford and Cra ...
…
continue reading
As a civically engaged entrepreneur and mom, I understand the challenges of advocating for yourself and others while attempting to balance your personal and professional demands. I had to develop a personal system of success in every area of my life. Now I want to help you build your unique system and truly trust your voice, even if it shakes. That’s why this week I am launching my new podcast entitled “Trust Your Voice”, based on my new book, “Trust Your Voice”, A Roadmap to Focus and Influ ...
…
continue reading
Where timely and relevant security meets puns and witty banter. Our goal is to keep defenders apprised of pertinent news and trends in under forty-five minutes.
…
continue reading
The Doctor Chaos Security Podcast - Join us as we ramble on topics related to cyber security
…
continue reading
Come join MrMario2011 talk about modding, exploiting, a bit of game/console hacking, and everything in between!
…
continue reading
Rob Wyatt and PJ McNerney discuss the latest and greatest news in the tech world and to figure out where things have been, where they are, and hopefully where they are going.
…
continue reading
I'll talk about everything from politics to entertainment and philosophy. I'm also a part-time entertainment writer and working-class from the UP of Michigan, so that might come up occasionally. Oh, and I make weird experimental music and sometimes host a college radio show.
…
continue reading
deep dive into Data-as-a-Service (DaaS) businesses. World of DaaS is a podcast for data enthusiasts, by data enthusiasts, where Auren Hoffman talks to business and technology leaders about all things data - building it, acquiring it, analyzing it, and everything in between.
…
continue reading
The CyberCast is purpose built for MSPs, MSSPs and IT Practitioners.In each episode you will learn about a new security control, how it maps to the different frameworks, the impact it has, building a policy around it, how the threat actors exploit it - via MITRE ATT&CK - what you can do to defend against it - MITRE Shield, common mistakes or oversights made when implementing into their tech stack and trends.Sponsors:Datto - CIS Control 3 - Data ProtectionNetwrix - CIS Control 3 - Data Protec ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Japan 2004 was held October 14-15 in Tokyo at the at the Tokyo International Exchange Center. Two days, two tracks. Raisuke Miyawaki was the keynote speaker.Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-asia-04/bh-jp-04-index.html Black ...
…
continue reading
Interviews with users, hackers, and staff of America Online (AOL), covering the 90’s/Early 2000’s.
…
continue reading

1
How Hackers Took Over School Smartboards to Launch Ransomware | CommBox Classroom Exploit Explained
4:30
4:30
Play later
Play later
Lists
Like
Liked
4:30Welcome to Cypher Tech Hacks, the podcast where host Alex Cipher takes you inside the most shocking, real-world hacks in digital history. In today’s episode, we uncover The CommBox Classroom Exploit—a ransomware attack that started with smartboards in schools. Attackers used unsecured CommBox devices to infiltrate school networks, encrypt critical …
…
continue reading

1
Crypto News 05/03 | Tesla Bitcoin Transfer, IRS Regulator Exodus, CME Volume Surge (2025)
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25🔴 Get 20% Off Every Spot Trading Fee on Bitget: https://lihi2.com/sWxzC (Limited Offer) (Bitget is the 6th largest exchange in the world) 🔴 [Follow Me] Stay updated on the latest AI, tech, and crypto trends in just 10 mins daily! Discover the newest money-making opportunities! ------ These articles discuss important events in global financial marke…
…
continue reading

1
AI Weekly Insights: U.S. Deepfake Law, Google’s AI Search, AWS Nova Premier & Global AI Breakthroughs
2:17
2:17
Play later
Play later
Lists
Like
Liked
2:17Welcome to AI Weekly Insights — your go-to podcast for the latest breakthroughs in artificial intelligence and machine learning! This episode covers the U.S. passing the landmark Take It Down Act to criminalize non-consensual deepfake content, Google’s powerful AI Mode in Search reshaping online queries, Amazon Web Services’ release of its most adv…
…
continue reading

1
ARM Is 40, New MiSTer MultiSystem, Japanese Game Preservation Peril & More - Ramble 110
46:48
46:48
Play later
Play later
Lists
Like
Liked
46:48London Marathon Fundraising: https://www.justgiving.com/page/rees-london-marathon-2025 Latest Main Channel Release (OCLP On 2008 Intel Mac Pro): https://youtu.be/0b_A7xhdBFE In this episode I talk about the new MiSTer MultiSystem 2, ARM's 40th anniversary, the Japanese Game Preservation Society, Polygon's sale, GTA VI delay & more! Listen on your f…
…
continue reading

1
Week in Review: Cybersecurity CEO busted, Cloudflare’s DDoS increase, FBI’s help request
31:36
31:36
Play later
Play later
Lists
Like
Liked
31:36Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest DJ Schleen, Head of Security, Boats Group Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ranso…
…
continue reading

1
Nova Scotia Power, a Canadian Utility, Breached: A Global Warning for Critical Infrastructure
11:46
11:46
Play later
Play later
Lists
Like
Liked
11:46On April 25, 2025, Nova Scotia Power, the province’s primary electricity provider, confirmed what many suspected: a cyber incident involving unauthorized access had compromised customer data. But what looked at first like an isolated disruption is, in reality, a single node in a much broader—and much more dangerous—global pattern. In this episode, …
…
continue reading

1
CWT429: Tech Titans and Trump's Inauguration: The Billionaire Cabinet
13:43
13:43
Play later
Play later
Lists
Like
Liked
13:43What we saw on that cold January day was more than an inauguration. It was a message: This is who runs America now. Not the voters. Not the institutions. But the billionaires who sit on the dais — and the policies that follow their money.
…
continue reading

1
SentinelOne Discloses Ongoing Attacks by Nation-State Hackers and Ransomware Gangs
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50In a rare move, SentinelOne has publicly confirmed that it is under persistent attack from nation-state threat actors and ransomware gangs. This episode breaks down their recent report detailing how these adversaries—some believed to be backed by China and North Korea—are targeting SentinelOne to gain insight into how thousands of environments are …
…
continue reading

1
OpenEoX and the Future of End-of-Life Standardization in IT
12:01
12:01
Play later
Play later
Lists
Like
Liked
12:01In this episode, we unpack the evolving landscape of Product Lifecycle Management (PLM) and why it's become a strategic cornerstone in modern IT environments. From conception to retirement, managing a product’s lifecycle is now about more than just operations—it's about security, compliance, innovation, and cost. We explore the critical milestones …
…
continue reading

1
UK’s Co-op cyberattack, LabHost domains released, NSO WhatsApp damages
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55UK retailer Co-Op suffers cyberattack FBI shares list of 42,000 LabHost phishing domains NSO group looking at hefty damages in WhatsApp case Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. Thr…
…
continue reading

1
SANS Stormcast Friday, May 2nd: More Steganography; Malicious Python Packages GMail C2; BEC to Steal Rent Payments
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
…
continue reading

1
Automate IT – Beyond the Spreadsheets: Asset Intelligence & Risk Scoring, E16
9:02
9:02
Play later
Play later
Lists
Like
Liked
9:02In this episode of Automate IT, Jeremy Maldonado dives into the world of data-driven endpoint management—breaking down what it means to go “beyond the spreadsheets.” He explores how visibility, intelligent reporting, asset intelligence, and risk scoring can transform how IT teams manage and secure their environments. Drawing from his own journey in…
…
continue reading

1
Crypto News 05/01 | Trump Crypto Pivot, BTC Fund Launch, BlackRock Blockchain Move (2025)
13:58
13:58
Play later
Play later
Lists
Like
Liked
13:58🔴 Get 20% Off Every Spot Trading Fee on Bitget: https://lihi2.com/sWxzC (Limited Offer) (Bitget is the 6th largest exchange in the world) 🔴 [Follow Me] Stay updated on the latest AI, tech, and crypto trends in just 10 mins daily! Discover the newest money-making opportunities! ------ These reports summarize important news affecting the cryptocurren…
…
continue reading

1
Dimwits, Dipsh*ts, Dufuses, and Dullards (Ep. 18); Trump Exploits Ukraine (Because of Course)
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44In a move that has sparked controversy, the United States and Ukraine have signed a bilateral agreement granting the U.S. access to Ukraine's critical mineral resources. Also, another scandalous Trump family member and how Reagan's biggest scandal verifies anarchist critiques of state power and violence.…
…
continue reading

1
Is Traditional Client-Based Access Obsolete? Rethinking Internal Security
29:08
29:08
Play later
Play later
Lists
Like
Liked
29:08"If you envision a world where what would be the most ideal way to make access management IAM decisions, to enable people to access internal things, you'd want to do a few things,” reflects Bobby DeSimone, Founder and CEO at Pomerium. In this episode of The Security Strategies Podcast, host Alejandro Leal, cybersecurity expert and senior analyst at…
…
continue reading

1
Scattered Spider extradition, Telecom hack warnings, Impersonation scammer takedown
9:10
9:10
Play later
Play later
Lists
Like
Liked
9:10Alleged ‘Scattered Spider’ member extradited to U.S. Experts see little progress after major Chinese telecom hack Polish police take down impersonation scammers Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks…
…
continue reading

1
AI News 05/01 | OpenAI Superintelligence, Meta Surge, Waymo Expansion (2025)
12:39
12:39
Play later
Play later
Lists
Like
Liked
12:39🔴 Get 20% Off Every Spot Trading Fee on Bitget: https://lihi2.com/sWxzC (Limited Offer) 🔴 [Follow] to keep up with daily big news! ------ These articles provide an overview of global technology and AI developments as of May 1, 2025. They highlight the advancement of AI agents designed for complex tasks. These agents also raise concerns about privac…
…
continue reading

1
SANS Stormcast Thursday, May 1st: Sonicwall Attacks; Cached Windows RDP Credentials
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
…
continue reading

1
CWT428: Using Humor in Presentations (Even When You’re Not Funny)"
20:21
20:21
Play later
Play later
Lists
Like
Liked
20:21Today we’re talking about how to actually use humor in presentations—even if you don’t think you’re funny.
…
continue reading

1
CWT427: Remembering Mojo Nixon & Skid Roper's 'Elvis Is Everywhere' (music video from 1987)
11:31
11:31
Play later
Play later
Lists
Like
Liked
11:31"Elvis is Everywhere" is a song by Mojo Nixon & Skid Roper, released in 1987 as part of their album "Bo-Day-Shus!!!" It's a fun little tune!
…
continue reading

1
LayerX Secures $45M Total to Battle Data Leaks, One Browser at a Time
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46LayerX just raised another $11 million — and it’s not to build another antivirus. With $45 million in total funding, the company is betting that your browser is the most vulnerable—and most overlooked—part of your cybersecurity stack. In this episode, we explore how LayerX turns everyday browsers like Chrome and Firefox into intelligent defense age…
…
continue reading

1
CWT426: Creepy Creatures and Myths: The Black Volga, or Devil on Four Wheels
12:51
12:51
Play later
Play later
Lists
Like
Liked
12:51Ever hear the one about the black car that stole children off the street? Possibly no license plate (at least in some versions). No trace. Just black paint, white rims, and a sense of dread. Today we’re digging into one of Eastern Europe’s most chilling urban legends: The Black Volga.
…
continue reading

1
Beyond Prompt Injection: AI’s Real Security Gaps
26:02
26:02
Play later
Play later
Lists
Like
Liked
26:02Send us a text In Part 1 of this two-part MLSecOps Podcast, Principal Security Consultant Gavin Klondike joins Dan and Marcello to break down the real threats facing AI systems today. From prompt injection misconceptions to indirect exfiltration via markdown and the failures of ML Ops security practices, Gavin unpacks what the industry gets wrong—a…
…
continue reading
You hear the word anarchy, and what comes to mind?
…
continue reading

1
Demystifying CVE-2025-31324, The New Critical SAP NetWeaver Flaw
24:31
24:31
Play later
Play later
Lists
Like
Liked
24:31Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss: ReliaQuest's Discovery of Critical SAP NetWeaver Vulnerability AI Upgrade for Darcula Phishing Kit DragonForce's New Cartel Business Model Maximum Severity Commvault flaw Kim Bromley: Senior Cyber Threa…
…
continue reading

1
$10.5M to Fight AI-Phishing: The Rise of Pistachio’s Cybersecurity Training Platform
13:04
13:04
Play later
Play later
Lists
Like
Liked
13:04In this episode, we dive into the story of Pistachio, the Norwegian cybersecurity startup that just raised $7 million in new funding—bringing its total to $10.5 million. Pistachio isn’t building another firewall or antivirus tool; it’s targeting the weakest link in most security systems: people. With AI-powered phishing attacks becoming increasingl…
…
continue reading
Takeaways #ExposureManagement involves assessing multiple factors, not just single scans. Organisations must optimise their remediation capacity due to limited resources. Visibility is crucial, but finding the most important exposure is essential. #TraditionalVulnerability management programs are becoming ineffective. Exploitability is the key crit…
…
continue reading

1
Crypto News 04/30 | XRP ETF Surge, UK Crypto Clampdown, US GDP Shock (2025)
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12🔴 Get 20% Off Every Spot Trading Fee on Bitget: https://lihi2.com/sWxzC (Limited Offer) 🔴 [Follow] to keep up with daily big news! ------ These reports summarize key market developments impacting both traditional US stock and crypto markets at the end of April 2025. News highlights include the US economy's contraction and associated stock market de…
…
continue reading

1
Inside Morphing Meerkat and Proton66: How Cybercrime Is Getting Easier
39:39
39:39
Play later
Play later
Lists
Like
Liked
39:39In this episode of Breaking Badness, the crew investigates two escalating threats in the cybercrime ecosystem: the cleverly named phishing-as-a-service platform Morphing Meerkat, and the bulletproof hosting provider Proton66, a favorite among amateur cybercriminals.First, they dig into how Morphing Meerkat uses DNS-over-HTTPS (DoH) and clever phish…
…
continue reading

1
AirBorne: How a Zero-Click Bug Threatens Millions of Apple and Third-Party Devices
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23In this episode, we dive deep into AirBorne — a critical set of vulnerabilities in Apple’s AirPlay protocol and SDK, recently uncovered by security researchers at Oligo. These flaws enable zero-click, wormable remote code execution (RCE) attacks across iPhones, Macs, Apple TVs, CarPlay systems, and millions of third-party devices. Even more alarmin…
…
continue reading

1
Apple Airplay-Enabled Devices Can Be Hacked, Google tracked 75 zero days, France ties Russian APT28 hackers to 12 cyberattacks
8:06
8:06
Play later
Play later
Lists
Like
Liked
8:06Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi Google tracked 75 zero days exploited in the wild in 2024 France ties Russian APT28 hackers to 12 cyberattacks on French orgs Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect b…
…
continue reading

1
Risky Business #789 -- Apple's AirPlay vulns are surprisingly awful
1:02:31
1:02:31
Play later
Play later
Lists
Like
Liked
1:02:31On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: British retail stalwart Marks & Spencer gets cybered South Korean telco sets out to replace all its subscriber SIMs after (we assume) it lost the keymat It’s a good exploit week! Bugs in Apple Airplay, SAP webservers, Erlang SSH and CommVault backups Juice jack…
…
continue reading

1
CYFIRMA Research- Hannibal Stealer: A Rebranded Threat Born from Sharp and TX Lineage
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Read CYFIRMA’s report on the Hannibal Stealer, a rebranded variant of SHARP and TX Stealers, which has re-emerged with expanded data exfiltration capabilities and an updated command-and-control infrastructure. Hannibal Stealer is built in C# on the .NET framework. It targets a wide range of data sources, including browsers, cryptocurrency wallets, …
…
continue reading

1
AI News 04/30 | Alibaba Challenge, Nvidia Crackdown, Supermicro Plunge (2025)
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48🔴 Get 20% Off Every Spot Trading Fee on Bitget: https://lihi2.com/sWxzC (Limited Offer) 🔴 [Follow] to keep up with daily big news! ------ These articles cover the latest tech industry updates globally as of April 30, 2025. They highlight developments in key areas. Significant advancements are occurring in AI models. Examples include Alibaba's launc…
…
continue reading

1
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
…
continue reading

1
CWT424 🐦⬛: 'The Birds II: Land's End' (1994 TV Movie)
14:25
14:25
Play later
Play later
Lists
Like
Liked
14:25Today, we’re diving into one of the more obscure corners of horror cinema — The Birds II: Land’s End.
…
continue reading

1
CWT423 🎙️: Tales of the Wizard of Oz (1961) - Pilot / The Witch Switch
8:01
8:01
Play later
Play later
Lists
Like
Liked
8:01"Tales of the Wizard of Oz" is an animated television series that originally aired from 1961 to 1962, in the heyday of things like "The Alvin Show" (early incarnation of Alvin and the Chipmunks).
…
continue reading

1
The Silent Majority: Why 51% of Internet Traffic Is Now Bots
13:03
13:03
Play later
Play later
Lists
Like
Liked
13:03The bots have taken over—and they’re not just crawling your website. In this episode, we dig into the alarming reality that automated bots now generate over half of all internet traffic. Armed with artificial intelligence and cloaked in residential proxies, these bots are evolving beyond simple scripts into highly evasive, persistent threats target…
…
continue reading

1
CWT422 🎙️: Notable Historical Freudian slips
12:06
12:06
Play later
Play later
Lists
Like
Liked
12:06Today, we’re talking Freudian slips. Those little verbal accidents that might just be windows into what we're really thinking.
…
continue reading

1
From 1,382 to 4 Million: What VeriSource Didn’t Know (or Say)
9:02
9:02
Play later
Play later
Lists
Like
Liked
9:02In this episode, we investigate the massive data breach at VeriSource Services, Inc. (VSI), a Houston-based HR outsourcing and employee benefits administrator. Initially reported as affecting fewer than 2,000 individuals, the breach has now ballooned to a confirmed 4 million affected people. We trace the timeline from the initial detection of suspi…
…
continue reading

1
Crypto News 04/29 | Bitcoin Spoofing, MicroStrategy Keeps Buying, Mastercard Partnership (2025)
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12🔴 Get 20% Off Every Spot Trading Fee on Bitget: https://lihi2.com/sWxzC(Limited Offer) 🔴 [Follow] to keep up with daily big news! ------ U.S. stock market performance was mixed due to company earnings reports and uncertainty about car tariffs. The White House plans to ease some car tariffs. However, General Motors (GM) delayed its financial outlook…
…
continue reading

1
Actively Exploited: Commvault Web Shells, Active! mail RCE, and Brocade Code Injection Now in KEV
17:21
17:21
Play later
Play later
Lists
Like
Liked
17:21Three actively exploited vulnerabilities—CVE-2025-42599 (Qualitia Active! mail), CVE-2025-3928 (Commvault Web Server), and CVE-2025-1976 (Broadcom Brocade Fabric OS)—have been added to CISA’s KEV catalog. The Qualitia flaw is a remote stack-based buffer overflow (CVSS 9.8) allowing code execution without authentication. Commvault's vulnerability pe…
…
continue reading

1
80: The Big Announcement w/ Taylor Otwell
1:17:06
1:17:06
Play later
Play later
Lists
Like
Liked
1:17:06Ian and Aaron are joined by Taylor Otwell to discuss the Mostly Technical Party at Laracon, what exactly Taylor does on a day-to-day basis, how they all use AI, and so much more. Sponsored by Bento, WorkOS, Native PHP for Mobile, and Laracon US 2025 Interested in sponsoring Mostly Technical? Head to https://mostlytechnical.com/sponsor to learn more…
…
continue reading

1
AppNexus Founder Brian O'Kelley - adtech, AI, advertising and more AI
48:30
48:30
Play later
Play later
Lists
Like
Liked
48:30Brian O'Kelley is the co-founder and former CEO of AppNexus, which built core infrastructure for programmatic advertising and was acquired by AT&T for $1.6 billion in 2018. He's now the co-founder and CEO of Scope3, a company working to reduce the carbon footprint in digital advertising. In this episode of World of DaaS, Brian and Auren discuss: Th…
…
continue reading

1
Hands-On IT – 9 Essential Spring Cleaning Tips for IT Pros, E17
9:12
9:12
Play later
Play later
Lists
Like
Liked
9:12Spring is in the air, and it’s time to give your IT environment the deep clean it deserves! In this episode of Hands-On IT, host Landon Miles shares nine essential spring cleaning tips to help IT pros declutter, optimize, and future-proof their systems. From cleaning workspaces and dusting off hardware to reviewing patch policies, auditing backups,…
…
continue reading

1
Uyghur software malware, DDoS jumps, 4chan back
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37Uyghur Language Software Hijacked to Deliver Malware Cloudflare sees a big jump in DDoS attacks 4chan back online Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a d…
…
continue reading

1
CYFIRMA Research- Technical Malware Analysis Report: Python-based RAT Malware
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12A New Breed of Python-Based RATs is Abusing Discord for C2 The CYFIRMA research team has investigated an emerging class of Python malware that is turning popular platforms into weaponized control panels. One recent variant showcases just how accessible and disruptive these tools have become. This lightweight Remote Access Trojan (RAT) uses Discord …
…
continue reading