Each week, our podcast delivers forward-focused headlines, practical tips, and fresh perspectives on the topics that matter most—artificial intelligence, business analysis, data protection, and more. This isn’t just news; it’s actionable advice that helps you turn knowledge into results.
…
continue reading
Ai Driven Malware Podcasts
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading

1
SquareX Shows AI Browsers Fall Prey to OAuth Attacks, Malware Downloads& Malicious Link Distribution
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55This story was originally published on HackerNoon at: https://hackernoon.com/squarex-shows-ai-browsers-fall-prey-to-oauth-attacks-malware-downloadsand-malicious-link-distribution. The timing of this disclosure is particularly significant as major companies including OpenAI, Microsoft, Google and The Browser Company have announced or relea Check mor…
…
continue reading

1
Mapping Prime Factorization onto Palm Jumeirah: A Geometric View of the Elliptic Curve Method
19:19
19:19
Play later
Play later
Lists
Like
Liked
19:19This story was originally published on HackerNoon at: https://hackernoon.com/mapping-prime-factorization-onto-palm-jumeirah-a-geometric-view-of-the-elliptic-curve-method. Imagine the Elliptic Curve Method as exploring Palm Jumeirah, Dubai’s iconic palm-shaped island. The island represents an elliptic curve y² = x³ + ax + b mod M. Check more stories…
…
continue reading

1
The Dark Side of GPT: How NLP Tools Are Being Used for Phishing, Scams, and Misinformation
30:41
30:41
Play later
Play later
Lists
Like
Liked
30:41This story was originally published on HackerNoon at: https://hackernoon.com/the-dark-side-of-gpt-how-nlp-tools-are-being-used-for-phishing-scams-and-misinformation. Explore how GPT and NLP tools are fueling phishing, scams, and misinformation. Learn how AI-powered attacks are becoming more sophisticated and dangerous. Check more stories related to…
…
continue reading

1
Beyond Phishing: How Agentic AI Is Weaponizing the Human Element in Next-Gen Cyberattacks
10:34
10:34
Play later
Play later
Lists
Like
Liked
10:34This story was originally published on HackerNoon at: https://hackernoon.com/beyond-phishing-how-agentic-ai-is-weaponizing-the-human-element-in-next-gen-cyberattacks. Security expert analyzes how Agentic AI moves beyond simple phishing to autonomously exploit the human element. Check more stories related to cybersecurity at: https://hackernoon.com/…
…
continue reading

1
INE Security Releases "Wired Together: The Case For Cross-Training In Net working And Cybersecurity"
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:02This story was originally published on HackerNoon at: https://hackernoon.com/ine-security-releases-wired-together-the-case-for-cross-training-in-net-working-and-cybersecurity. The report documents operational challenges created by this convergence and presents cross-training as the strategic solution. Only 33% feel well-prepared to ha Check more st…
…
continue reading

1
Building Resilient Operations Through ITIL-Based Incident Management
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00This story was originally published on HackerNoon at: https://hackernoon.com/building-resilient-operations-through-itil-based-incident-management. ITIL 4 transforms cloud incident management with automation, observability, and adaptive governance—cutting MTTR by 47% and boosting resilience. Check more stories related to cybersecurity at: https://ha…
…
continue reading

1
From Apple’s Inside to a New Kind of Phone: Privacy, Free Speech, and Building a Third Platform
48:40
48:40
Play later
Play later
Lists
Like
Liked
48:40Send us a text We trade last‑minute schedules and kid chaos for a deep dive into how modern phones leak data, why “Ask App Not to Track” isn’t enforcement, and what a third platform built for privacy and free speech looks like. Joe shares his Apple-to-Unplugged journey, the Raxxis findings, and practical features that make privacy usable. • zero‑to…
…
continue reading

1
Quantum Photons Deliver the Ultimate Random Number Generator
16:49
16:49
Play later
Play later
Lists
Like
Liked
16:49This story was originally published on HackerNoon at: https://hackernoon.com/quantum-photons-deliver-the-ultimate-random-number-generator. HOM interference, entanglement, and CHSH tests have confirmed secure quantum randomness, guaranteeing cryptographic applications that are independent of devices Check more stories related to cybersecurity at: ht…
…
continue reading

1
Inside the AI-Driven Supply Chain: How Scribe Security Is Building Trust at Code Speed
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00This story was originally published on HackerNoon at: https://hackernoon.com/inside-the-ai-driven-supply-chain-how-scribe-security-is-building-trust-at-code-speed. Scribe Security’s ScribeHub combines signed provenance, SBOMs, and AI agents to secure AI-generated code and meet global supply chain regulations. Check more stories related to cybersecu…
…
continue reading

1
ThreatBook Launches Best-of-Breed Advanced Threat Intelligence Solution
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04This story was originally published on HackerNoon at: https://hackernoon.com/threatbook-launches-best-of-breed-advanced-threat-intelligence-solution. 34% of cyber-attacks worldwide take place within the Asia Pacific (APAC) ThreatBook ATI is able to capture new, difficult-to-detect threats emanating from withi Check more stories related to cybersecu…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/you-should-be-faking-your-security-answers. One way to guarantee they won’t know the answers to these questions is if you make them up and save them in your password manager for future reference. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybe…
…
continue reading

1
Your AI is not as secure as you think it is, and here's why
50:51
50:51
Play later
Play later
Lists
Like
Liked
50:51Send us a text David Brockler, AI security researcher at NCC Group, explores the rapidly evolving landscape of AI security and the fundamental challenges posed by integrating Large Language Models into applications. We discuss how traditional security approaches fail when dealing with AI components that dynamically change their trustworthiness base…
…
continue reading

1
Want to Stay Safe Online? Lie About Your Birthday
3:34
3:34
Play later
Play later
Lists
Like
Liked
3:34This story was originally published on HackerNoon at: https://hackernoon.com/want-to-stay-safe-online-lie-about-your-birthday. Your birth date, like your phone number, is personal information that scammers can use to steal your identity or target you for fraud. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. …
…
continue reading

1
Sia Redefines Cloud Security with Supreme Privacy and Impenetrable Protection
10:15
10:15
Play later
Play later
Lists
Like
Liked
10:15This story was originally published on HackerNoon at: https://hackernoon.com/sia-redefines-cloud-security-with-supreme-privacy-and-impenetrable-protection. Sia delivers decentralized cloud security with Supreme Privacy and Impenetrable Protection, eliminating single points of failure and insider threats. Check more stories related to cybersecurity …
…
continue reading

1
The Day I Learned My NAS Was Traceable Through TLS Logs
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17This story was originally published on HackerNoon at: https://hackernoon.com/the-day-i-learned-my-nas-was-traceable-through-tls-logs. I recently learned about a new way to leak your privacy, and it's a scary one. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #dns, …
…
continue reading

1
How to Stop Getting Spam Emails—The Complete Guide to Removing Your Personal Information Online
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51This story was originally published on HackerNoon at: https://hackernoon.com/how-to-stop-getting-spam-emailsthe-complete-guide-to-removing-your-personal-information-online. How to remove your personal information from the major data broker sites and get fewer ads in your inbox. Check more stories related to cybersecurity at: https://hackernoon.com/…
…
continue reading

1
How Generative AI Can Be Used in Cybersecurity
11:50
11:50
Play later
Play later
Lists
Like
Liked
11:50This story was originally published on HackerNoon at: https://hackernoon.com/how-generative-ai-can-be-used-in-cybersecurity. Explore how generative AI is transforming cybersecurity: its dual-use risks, defense tools, and what teams must do to stay ahead. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can…
…
continue reading

1
Research Round Up: On Anonymization -Creating Data That Enables Generalization Without Memorization
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35This story was originally published on HackerNoon at: https://hackernoon.com/research-round-up-on-anonymization-creating-data-that-enables-generalization-without-memorization. Anonymization is what lets us take the most sensitive information and transform it into a safe, usable substrate for machine learning. Check more stories related to cybersecu…
…
continue reading

1
Cloud, AI, and the Future of Identity Access Management
45:18
45:18
Play later
Play later
Lists
Like
Liked
45:18Send us a text Art Poghosyan shares his journey from IT security consultant to CEO of Britive, a cloud-native identity and access management company. His experience during economic downturns shaped his understanding of how cybersecurity services remain resilient through various market cycles. • Started in IT security right after completing a master…
…
continue reading

1
New in Syteca Release 7.21: Agentless Access, Sensitive Data Masking, And Smooth Session Playback
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03This story was originally published on HackerNoon at: https://hackernoon.com/new-in-syteca-release-721-agentless-access-sensitive-data-masking-and-smooth-session-playback. Users can now launch remote sessions (RDP for Windows or SSH for Linux/Unix) directly in web browsers (Chrome, Safari, and Edge) Check more stories related to cybersecurity at: h…
…
continue reading

1
3 Weeks Left Until The Start Of The OpenSSL Conference 2025
2:28
2:28
Play later
Play later
Lists
Like
Liked
2:28This story was originally published on HackerNoon at: https://hackernoon.com/3-weeks-left-until-the-start-of-the-openssl-conference-2025. The program will bring together lawyers, regulators, developers, and entrepreneurs to discuss security and privacy in a global context. Check more stories related to cybersecurity at: https://hackernoon.com/c/cyb…
…
continue reading

1
Seraphic Browser-Native Protection Now Available for Purchase on the CrowdStrike Marketplace
4:33
4:33
Play later
Play later
Lists
Like
Liked
4:33This story was originally published on HackerNoon at: https://hackernoon.com/seraphic-browser-native-protection-now-available-for-purchase-on-the-crowdstrike-marketplace. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #cybersecurity, #seraphic-security, #cybernewswi…
…
continue reading

1
How to Get a Reverse Shell on macOS Using A Flipper Zero as a BadUSB
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10This story was originally published on HackerNoon at: https://hackernoon.com/how-to-get-a-reverse-shell-on-macos-using-a-flipper-zero-as-a-badusb. Using a Flipper Zero as an ethical pentesting device to establish a reverse shell on a macOS computer. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also…
…
continue reading

1
Hack Your Way to Achievement: One Small Step at a Time
42:50
42:50
Play later
Play later
Lists
Like
Liked
42:50Send us a text Ted Harrington shares insights about achieving difficult goals through disciplined habits rather than relying on fleeting inspiration. He explains how the hacker mindset—being curious, non-conforming, committed, and creative—can help anyone overcome challenges and find overlooked opportunities. • Breaking big goals into smaller, mana…
…
continue reading

1
Introducing the InfoSec colour wheel — blending developers with red and blue security teams.
21:40
21:40
Play later
Play later
Lists
Like
Liked
21:40This story was originally published on HackerNoon at: https://hackernoon.com/introducing-the-infosec-colour-wheel-blending-developers-with-red-and-blue-security-teams-6437c1a07700. As a developer turned security person, I’ve learnt first-hand how important it is for all teams to work together, more than just DevSecOps. Check more stories related to…
…
continue reading

1
How to Make a Malicious USB Device and Have Some Harmless Fun
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54This story was originally published on HackerNoon at: https://hackernoon.com/how-to-make-a-malicious-usb-device-and-have-some-harmless-fun. Make an inexpensive BadUSB from an old USB drive and learn about Windows shortcut files and how malicious actors are using .lnk files to spread malware. Check more stories related to cybersecurity at: https://h…
…
continue reading

1
Identity Governance and Administration Projects Are Never Done – But Can Get Much Easier
5:27
5:27
Play later
Play later
Lists
Like
Liked
5:27This story was originally published on HackerNoon at: https://hackernoon.com/identity-governance-and-administration-projects-are-never-done-but-can-get-much-easier. Identity & Access Management (IAM) and Identity Governance & Administration (IGA) are crucial for organizations, but current implementations often fall short. Check more stories related…
…
continue reading

1
Innovations in Cloud-Based Standards Management: Shaping the Future of Global Compliance
7:18
7:18
Play later
Play later
Lists
Like
Liked
7:18This story was originally published on HackerNoon at: https://hackernoon.com/innovations-in-cloud-based-standards-management-shaping-the-future-of-global-compliance. Ritesh Kumar drives innovation in cloud-based standards management with AI, SaaS, and automation, redefining global compliance and collaboration. Check more stories related to cybersec…
…
continue reading

1
The Future of AI: Security, Ethics, and Human Augmentation
39:31
39:31
Play later
Play later
Lists
Like
Liked
39:31Send us a text Artificial intelligence is developing at unprecedented speed, becoming a transformative force that may rival nuclear technology in its impact on human civilization. The rapid evolution of AI capabilities presents both extraordinary opportunities and profound challenges that we're only beginning to understand. • AI development is acce…
…
continue reading

1
Breaking the Sky: How Vulnerable Are Our Satellites?
55:37
55:37
Play later
Play later
Lists
Like
Liked
55:37Send us a text Grant McCracken shares his groundbreaking PhD research on satellite security, revealing how vulnerable our orbital infrastructure is to cyberattacks and the urgent need for better security measures before quantum computing renders current encryption obsolete. • Satellites face unique security challenges with limited patching windows …
…
continue reading
Send us a text In this episode, we delve into the transformative journey of artificial intelligence and its profound impact on job markets worldwide. From automation to innovation, AI is reshaping industries, creating new opportunities, and challenging traditional employment paradigms. Join us as we explore how AI is redefining work, the skills nee…
…
continue reading

1
Finding Your Niche: How Specialization Drives Success in a Crowded Market
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10Send us a text Carlos Corrador shares his journey from aspiring lawyer to founding Condor Agency, a specialized marketing firm for B2B tech services companies. We explore how deep specialization, personal branding, and adapting to AI are critical for survival in today's rapidly changing business landscape. • Started as a sports journalist in Venezu…
…
continue reading

1
From Russia with Code: A Malware Analyst's Journey
47:27
47:27
Play later
Play later
Lists
Like
Liked
47:27Send us a text Sergey Novikov shares his fascinating journey from early days at Kaspersky Lab through his evolution as a malware analyst and cybersecurity expert, offering unique insights into the changing threat landscape and ethical considerations of security research. • Started at Kaspersky in 2002 when it was a small startup with fewer than 100…
…
continue reading

1
Finding Zero Days in Salesforce Industry Clouds
45:40
45:40
Play later
Play later
Lists
Like
Liked
45:40Send us a text SaaS platforms represent a significant security blind spot for many organizations, with misconceptions about the shared responsibility model leaving sensitive data vulnerable to exposure. Aaron Costello, Chief of SaaS Security Research at AppOmni, shares insights from his research uncovering five zero-day vulnerabilities in Salesforc…
…
continue reading

1
Zero Trust Architecture: The Future of Cybersecurity
49:38
49:38
Play later
Play later
Lists
Like
Liked
49:38Send us a text Cybersecurity expert Bob Kochan from Beyond Identity discusses the evolution of security from network defense to identity-first approaches. He shares insights on how AI is transforming security operations while creating new threat vectors, emphasizing the need for phishing-resistant authentication solutions in today's threat landscap…
…
continue reading

1
The Human Element Still Matters in a Quantum AI World
49:49
49:49
Play later
Play later
Lists
Like
Liked
49:49Send us a text Aksa Taylor shares her journey from electrical engineering to cybersecurity, highlighting how curiosity and focused passion can open unexpected career doors in the security industry. • Finding specific interests within cybersecurity rather than trying to "get into security" broadly • Building a personal brand through knowledge sharin…
…
continue reading

1
Ric Prado: CIA Black Ops Operator That Hunted Bin Laden
1:12:19
1:12:19
Play later
Play later
Lists
Like
Liked
1:12:19Send us a text Ric Prado shares his remarkable journey from Cuban refugee to CIA Senior Operations Officer, revealing how being separated from his parents at age 8 during Castro's revolution eventually led him to America where he found purpose in military service and intelligence work. • Escaped Cuba at age 8 through Operation Peter Pan, sent alone…
…
continue reading

1
AI for Good, Policy Missteps, and Meta’s New Crackdown
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35This week on Future Ready Insights, we explore the rising tensions around trust, ethics, and control in artificial intelligence: Chapters 00:00 Introduction to AI's Impact 01:26 Job Displacement and Creation in the AI Era 02:42 Humanoid Robots and Future Deliveries 03:29 Data Privacy and AI Training Concerns 05:08 Copyright Issues in AI Training 06…
…
continue reading

1
Inside the Mind of a CIA Agent: Nuclear Threats and Intelligence Operations
53:42
53:42
Play later
Play later
Lists
Like
Liked
53:42Send us a text Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/ Twitter: https://twitter.com/SecUnfPodcastBy Joe South
…
continue reading

1
Can Your Messaging Survive the Quantum Computing Threat?
51:27
51:27
Play later
Play later
Lists
Like
Liked
51:27Send us a text Anurag Lal discusses the critical importance of quantum-resistant encryption for enterprise messaging and the urgent need for organizations to prepare for the coming quantum computing revolution that will render current encryption methods obsolete. • Anurag's extensive background in technology from Apple to Sprint and participation i…
…
continue reading

1
The SHOCKING Truth About AI Security in Hospitals
44:55
44:55
Play later
Play later
Lists
Like
Liked
44:55Send us a text Security is increasingly viewed as a strategic business advantage rather than just a necessary cost center. The dialogue explores how companies are leveraging their security posture to gain competitive advantages in sales cycles and build customer trust. • Taylor's journey from aspiring physical therapist to cybersecurity expert thro…
…
continue reading

1
Honest AI, Meta’s Data Grab, and the Workers Replaced by ChatGPT
10:25
10:25
Play later
Play later
Lists
Like
Liked
10:25This week on Future Ready Insights, we explore the rising tensions around trust, ethics, and control in artificial intelligence: Chapters 00:00 Introduction to AI's Impact 01:26 Job Displacement and Creation in the AI Era 02:42 Humanoid Robots and Future Deliveries 03:29 Data Privacy and AI Training Concerns 05:08 Copyright Issues in AI Training 06…
…
continue reading

1
Reputation is Everything: How AI and Domain Security Shape Today's Threat Landscape
54:36
54:36
Play later
Play later
Lists
Like
Liked
54:36Send us a text Ihab Shraim shares his expertise on domain security and why it represents the "missing chapter" in modern cybersecurity strategy. We explore how AI is accelerating cyber threats from years to weeks and why protecting your online presence is more critical than ever. • Domain security is often overlooked despite being critical to an or…
…
continue reading

1
AI Bloodbath? Anthropic CEO Warning, Claude’s Blackmail, & Google’s Thought Summaries
5:12
5:12
Play later
Play later
Lists
Like
Liked
5:12This week on Future Ready Insights, we unpack some of the most alarming — and fascinating — developments in AI: Chapters 00:00 The Impact of AI on Employment 02:58 AI Safety and Ethical Concerns 04:56 Innovations in AI Technology 05:06 New Chapter Stories and Links 🧑💼 Anthropic CEO warns AI could wipe out up to 50% of white-collar entry-level jobs…
…
continue reading

1
Amazon’s Robot with Touch, Klarna Rehires Humans, & Google’s AI Glasses
8:40
8:40
Play later
Play later
Lists
Like
Liked
8:40This week on Future Ready Insights, we explore seven powerful stories showing how AI is rapidly transforming business, diplomacy, and daily life — for better or worse. Chapters 00:00 Introduction to AI Innovations 00:26 Robots Can Now Feel! 01:29 Klarna Rehiring Humans Over AI 02:17 Google Glasses and New Google Translation in Real-Time 05:00 LLM J…
…
continue reading
Send us a text Root.io Disclaimer: This post contains affiliate links. If you make a purchase, I may receive a commission at no extra cost to you. Support the show Follow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secun…
…
continue reading

1
Voices from the Future: AI in Courtrooms, Hollywood, and Your Wallet
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43In this episode, I explore six powerful and sometimes unsettling AI news stories that reveal just how deeply artificial intelligence is shaping our world. Chapters 00:00 Introduction to AI's Impact on Society 00:56 AI in the Legal System: Ethical Dilemmas 02:32 AI and the Future of Hollywood 05:26 Politeness and Humanising AI 07:29 AI Behaviour and…
…
continue reading

1
Browser Security Unveiled: John Carse on SquareX & Cyber Career Insights
47:45
47:45
Play later
Play later
Lists
Like
Liked
47:45Send us a text In this episode, Joe sits down with John Carse, Field CISO at SquareX, to dive into the often-overlooked world of browser security and the evolving landscape of cybersecurity. Recorded despite a 12-hour time difference (Singapore to the US!), John shares: The Browser Security Gap: Why 85% of user time in browsers is a growing risk fo…
…
continue reading

1
Mastering Cyber Risk: Matthew Alderman on Cybersecurity, Leadership & Building CyberSaint
44:16
44:16
Play later
Play later
Lists
Like
Liked
44:16Send us a text Join Joe as he reconnects with Matthew Alderman, Chief Product Officer at CyberSaint, in this insightful episode of the podcast! With over 250 episodes under his belt, Joe dives deep with Matthew, a cybersecurity veteran, podcast host, and advisor, to explore: CyberSaint’s Game-Changing Approach: How CyberSaint uses historical loss d…
…
continue reading

1
AI Goes to School, Falls in Love, and Remembers You!
7:33
7:33
Play later
Play later
Lists
Like
Liked
7:33Happy Easter! In this week’s episode, I’ve got a packed lineup of fascinating AI stories: • Google launches Gemini 1.5 Flash – a faster, more efficient AI model designed for high-volume use • Claude for Education rolls out with tools for students and teachers • ChatGPT gets long-term memory (yes, it can now remember your preferences) • The rise of …
…
continue reading