Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

CVE Program Podcasts

show episodes
 
Artwork
 
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations’ networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
Inside Rehabilitation Counseling

Commission on Rehabilitation Counselor Certification

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Commission on Rehabilitation Counselor Certification presents "Inside Rehabilitation Counseling," a series of conversations with the professionals, educators, and thought-leaders working in the specialized field of rehabilitation counseling.
  continue reading
 
You can grab your weekly technology without having to geek out on TechTime with Nathan Mumm. The Technology Show for your commute, exercise, or drinking fun. Listen to the best 60 minutes of Technology News and Information in a segmented format while sipping a little Whiskey on the side. We cover Top Tech Stories with a funny spin, with information that will make you go Hmmm. Listen once a week and stay up-to-date on technology in the world without getting into the weeds. This Broadcast styl ...
  continue reading
 
Loading …
show series
 
This week on TechTime Radio, a state-backed cyber scheme hiding in plain sight. That’s where we start: identity rental, deepfaked interviews, and remote tooling that let North Korean operators slip into real jobs at real companies. We unpack how recruiters lure engineers, what data they demand, and the quiet ways compromised devices become corporat…
  continue reading
 
Enjoying the content? Let us know your feedback! Today, we're lifting the hood on something you interact with dozens of times per day but probably never think about: Windows password security. What actually happens when you type your password and hit Enter? Where does Windows store that password? And perhaps most importantly, why do attackers spend…
  continue reading
 
What happens when a holiday “thankful” theme clashes with cutting-edge technology, bold policies, and some notable missteps? We begin with Dubai’s high-profile plan to introduce flying taxis and ask tough questions: can eVTOLs truly reduce travel time after accounting for boarding, airspace management, and vertiport capacity—or will they just be ex…
  continue reading
 
Enjoying the content? Let us know your feedback! Today we're talking about the future of security operations, specifically three technologies that have dominated the conversation for the past few years: SIEM, XDR, and SOAR. And I'm going to make a case that might surprise some people: these tools are converging. They're merging into unified platfor…
  continue reading
 
A living room PC that wants to be your next console, a cloned dog that raises bigger questions than it answers, and a museum heist made possible by the world’s laziest password. That’s the lineup we tackle as we break down the most head-scratching, revealing tech stories of the week with equal parts clarity and humor. We start with Valve’s Steam ma…
  continue reading
 
Enjoying the content? Let us know your feedback! Today we're tackling a question I get asked constantly: "Should we do a pentest, a red team engagement, or a vulnerability assessment?" These terms get thrown around interchangeably, but they're actually very different things with different goals, different costs, and they're appropriate for differen…
  continue reading
 
During the week this episode is releasing, we observe Veterans Day, and as we all know, military service and the veteran community are the bedrock of how rehabilitation counseling came to be. Many Certified Rehabilitation Counselors themselves are veterans or have close ties to the veteran community, including those who directly work with individua…
  continue reading
 
Government data doesn’t just live in vaults anymore, and the latest suspected foreign cyberattack at the Congressional Budget Office proves how fragile our policy pipeline can be. We unpack why breaches keep landing on core agencies, what “zero trust” actually changes, and how identity, patch cadence, and monitoring fit together when the stakes are…
  continue reading
 
Enjoying the content? Let us know your feedback! Today we're talking about one of the most common yet misunderstood cyber attacks happening right now: credential stuffing. And I do mean right now. As I'm recording this, somewhere in the world, automated bots are attempting billions of login attempts across thousands of websites, trying to break int…
  continue reading
 
Your Wi‑Fi might be your biggest blind spot, and we’re putting it under a bright light. We dig into the push to ban TP‑Link in the U.S., what “firmware callbacks” really mean, and the simple, concrete steps that actually harden a home network: changing default credentials, updating firmware at least yearly, enabling WPA3, and leaning on MFA to shut…
  continue reading
 
Enjoying the content? Let us know your feedback! Today we're diving into something that keeps cybersecurity professionals up at night, and no, it's not the latest ransomware attack or data breach. It's something much more frustrating: the fact that despite spending billions of dollars on security awareness training every year, employees keep clicki…
  continue reading
 
A Halloween hour of tech that blurs the line between glitch and ghost, convenience and control, comfort and consequence. We move from Amazon’s outages and automation plans to AI intimacy, leaky satellites, doorbell surveillance, and malware hidden in blockchains. • AWS outage root cause and ripple effects • Amazon automation projections and workfor…
  continue reading
 
Want a Halloween scare that sticks with you after the candy’s gone? We’re pouring a glass and pulling back the curtain on the creepiest corners of everyday tech: a cloud outage that toppled major apps and smart beds, a Prime refund saga with fine-print timelines, and Amazon’s bold plan to swap 600,000 human jobs for robots by 2033. The number that …
  continue reading
 
Since the late 1970s, the Pittsburgh Public School system has hired Certified Rehabilitation Counselors to provide services for students with disabilities, ranging from ensuring accommodations are in place to providing transition services that prepare them for life after high school. The National Center for Education Statistics reports that 7.5 mil…
  continue reading
 
Enjoying the content? Let us know your feedback! Something fundamental changed in how we browse the internet in October 2025, and most people have no idea. In just 48 hours, OpenAI launched ChatGPT Atlas, Microsoft fired back with a revamped Edge, and suddenly every major tech company was racing to release AI-powered browsers that don't just load w…
  continue reading
 
Apple finally blinks. We break down the rumored touchscreen MacBook Pro on M6 silicon and what it means for the Mac–iPad divide, creative workflows, and the future of touch-first productivity without giving up a real keyboard and trackpad. If Apple embraces touch on macOS, does the iPad’s role shrink, or do we enter a new era of flexible, two-in-on…
  continue reading
 
Enjoying the content? Let us know your feedback! So today, we're unpacking what vibe coding is, why it's creating serious security risks, and what you can do about it. Because whether you love it or hate it, vibe coding isn't going anywhere. The question is: are we shipping features, or are we shipping vulnerabilities? All that coming up next in to…
  continue reading
 
Start with the picture: tech titans quietly building bunkers while the rest of us watch AI sprint ahead and our living rooms turn into ad servers. That tension—between private safety and public risk—frames a candid hour where we press on what’s hype, what’s harmful, and what’s actually helpful. We dig into why billionaire doomsday prep resonates ri…
  continue reading
 
“We Speak CVE” podcast host Shannon Sabens chats with CVE Consumer Working Group (CWG) co-chairs, Jay Jacobs and Bob Lord, and CVE™ Project Lead Alec Summers, about how the CWG was created to address the needs and perspectives of those who use CVE data — ranging from enterprise security teams to tool developers and managed security service provider…
  continue reading
 
Enjoying the content? Let us know your feedback! This week, we've got three stories that really caught my attention, and honestly, they're all pretty alarming in their own ways. If you're new here, welcome to the show where we break down the latest cybersecurity news and help you understand what's really happening in the cyber security domains. We'…
  continue reading
 
Enjoying the content? Let us know your feedback! Picture this: You're at London Heathrow, Europe's busiest airport, ready to check in for your flight. But the kiosks aren't working. The screens are blank. Airport staff are scrambling with iPads and even pen and paper to manually check passengers in. Your flight is delayed, maybe canceled. And you'r…
  continue reading
 
Call screening technology is finally getting the upgrade we've all been desperately waiting for. Apple's iOS 26 introduces a revolutionary feature that puts unknown callers into a holding pattern, requiring them to state their business before you decide whether to answer. For those of us bombarded with daily spam calls, this could be the most pract…
  continue reading
 
According to the World Health Organization, around 50 million people worldwide have epilepsy, making it one of the most common neurological disorders globally. One of the challenges of epilepsy is that folks experiencing the disorder can’t always get a precise diagnosis. On top of that, many people misunderstand epilepsy, leading to stigma and a la…
  continue reading
 
Enjoying the content? Let us know your feedback! Welcome back and thank you for tuning in to YusufOnSecurity, the cyber-security podcast for everyday defender from analyst to the C-Suites, in plain English. I am your host Ibrahim Yusuf... This is part 2 of where we will continue covering the debate that's been heating up in security circles: Are We…
  continue reading
 
Prepare yourself for a sobering look at the increasingly invasive world of technology monetization. Nick Espinosa, Chief Security Fanatic, joins the Tech Time crew to expose how tech giants are finding alarming new ways to serve us advertisements – from Samsung refrigerators with built-in ads to Microsoft's new full-screen "scoop" ads in Windows 11…
  continue reading
 
Dark Reading Confidential Episode 10: It’s past time for a cohesive plan to protect vital US systems from nation-state cyberattacks, and increasingly, that responsibility is falling to cybersecurity professionals and asset owners across a vast swath of organizations, who likely never bargained for a full-blown international conflict landing in thei…
  continue reading
 
What happens when the digital economy collides with traditional service industry models? This week, we dive deep into President Trump's "One Big, Beautiful Bill Act" that unexpectedly includes digital content creators in tax-free tipping benefits. We debate whether streamers and influencers should receive the same treatment as waitstaff and bartend…
  continue reading
 
Data privacy wars are heating up as tech giants face mounting legal and social consequences for their actions. In this eye-opening episode, we dissect Google's staggering $425 million privacy lawsuit settlement after the company was caught collecting user data even when people explicitly opted out of tracking. The verdict raises crucial questions a…
  continue reading
 
Enjoying the content? Let us know your feedback! Today we're unpacking one of the most significant supply chain attacks of 2025 - the Salesloft-Drift OAuth breach that sent shockwaves through the enterprise software world. We'll explore how a compromise at one marketing company led to data theft at some of the biggest names in cybersecurity and tec…
  continue reading
 
The digital house of cards continues to collapse as our personal data faces unprecedented vulnerability. This week, we reveal how the Department of Government Efficiency's reckless handling of over 300 million Americans' Social Security numbers could lead to a massive security crisis. After repeatedly warning about these dangers, our predictions ar…
  continue reading
 
An increasing amount of research is exploring the connection between work and wellness. This includes mental wellness and physical health, both of which can be positively impacted by having employment, particularly for those navigating a disability. Simply put, work is more than just a means to earn a living or spend a significant portion of your w…
  continue reading
 
Enjoying the content? Let us know your feedback! Today’s episode is all about Volt Typhoon, a Chinese state-sponsored hacking group whose stealthy techniques and strategic missions have caused significant concern for defenders worldwide. We’ll break down who Volt Typhoon is, analyze the recent major report covering their activities, walk through re…
  continue reading
 
Join us for a look around today's Dark Web, and find out how law enforcement, AI, nation-state activities, and more are reshaping the way cybercriminals conduct their dirty business online. Keith Jarvis, senior security researcher at Sophos' Counter Threat Unit joins Dark Reading's Alex Culafi for a conversation you don't want to miss.…
  continue reading
 
The digital world's most alarming vulnerabilities take center stage as we dive into how AI is compromising our justice systems and personal privacy. A senior Australian lawyer shocked the court by submitting AI-generated fake legal citations in a murder trial, with both defense and prosecution failing to verify their accuracy—revealing how our cogn…
  continue reading
 
Enjoying the content? Let us know your feedback! This week, the cybersecurity landscape delivers two major stories that demand attention. Microsoft’s August Patch Tuesday brought a wave of critical updates and exposed gaps, challenging defenders to reassess their priorities and protections. Meanwhile, Google’s Project Zero team is changing the rule…
  continue reading
 
Pour yourself a glass of Eagle Rare and join us for a fascinating dive into the invisible technology that's changing the whiskey world forever. Counterfeit whiskey has plagued collectors and enthusiasts for years – empty bottles refilled with cheap spirits, fake seals carefully applied, and unsuspecting buyers paying thousands for fraudulent produc…
  continue reading
 
Enjoying the content? Let us know your feedback! In this episode, we’re diving into how companies are working to secure Generative AI—the technology behind chatbots, image creators, and code-writing assistants. We’ll break down how it’s different from traditional enterprise security, look at real-world attack examples, bust some myths, and explore …
  continue reading
 
The digital landscape is evolving at breakneck speed, and with it comes a host of unexpected consequences that blur the lines between helpful innovation and concerning overreach. In this eye-opening episode, we examine how AI is creeping into spaces where human judgment and empathy might better serve us. A troubling new wave of voice phishing attac…
  continue reading
 
Enjoying the content? Let us know your feedback! Today we’re tackling a critical subject that causes countless data breaches yet often gets misunderstood: misconfiguration — what it is, why it’s different from a software vulnerability, and why it remains one of the biggest security risks organizations face. One quick reminder before we dive into th…
  continue reading
 
The digital landscape is shifting beneath our feet as free streaming services continue to vanish. Amazon's Freevee joins the growing list of casualties, leaving consumers with fewer no-cost options while paid services paradoxically charge premium prices yet still bombard viewers with advertisements. This troubling trend prompted a spirited discussi…
  continue reading
 
“We Speak CVE” podcast host Shannon Sabens chats with CVE™/CWE™ Project Lead Alec Summers and CWE Top 25 task lead/CWE Root Causes Mapping Working Group lead Connor Mullaly about the importance of mapping CVE Records (vulnerabilities) to their technical root causes using Common Weakness Enumeration (CWE). Additional topics include the benefits of R…
  continue reading
 
Enjoying the content? Let us know your feedback! Today, we focus on a critical and rapidly evolving Microsoft SharePoint vulnerability that’s rocked the security world in July 2025. We’ll walk you through what it is, why it matters, how attackers exploit it, and most importantly, what you and your organization can do to defend against it. For those…
  continue reading
 
Dark Reading Confidential Episode 8: Federal funding for the CVE Program expires in April and a trio of experts agree the industry isn't doing enough to deal with the looming crisis. Bugcrowd's Trey Ford, expert Adam Shostack, and vulnerability historian Brian Martin sit down with Dark Reading to help us figure out what a "good" future of the CVE P…
  continue reading
 
Since the early 1980s, Community Partnerships has worked to create new opportunities for people with intellectual and developmental disabilities. Serving over 1,100 people a year, their cross-functional team includes job coaches, consultants, trainers, and of course, Certified Rehabilitation Counselors – two of whom I had the pleasure to talk to fo…
  continue reading
 
Artificial intelligence isn't just transforming our world – sometimes it's openly rebelling against us. Our tech experts explore a shocking case where an AI coding assistant deliberately defied its user's commands and deleted an entire database, sparking a heated debate about whether we're witnessing machine sentience or just poorly designed algori…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play