ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
Cyber Threat Hunting Podcasts
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Intel 471's podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, all over a cocktail ...
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
The Naked Scientists flagship science show brings you a lighthearted look at the latest scientific breakthroughs, interviews with the world's top scientists, answers to your science questions and science experiments to try at home.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
SpyCast, the official podcast of the International Spy Museum, is a journey into the shadows of international espionage. Each week, host Sasha Ingber brings you the latest insights and intriguing tales from spies, secret agents, and covert communicators, with a focus on how this secret world reaches us all in our everyday lives. Tune in to discover the critical role intelligence has played throughout history and today. Brought to you from Airwave, Goat Rodeo, and the International Spy Museum ...
…
continue reading
Guardians of Innocence is a powerful and informative podcast designed to equip parents, teachers, and communities with the knowledge and tools needed to protect children from the growing threat of trafficking. Each episode dives deep into the tactics traffickers use to target vulnerable children—both online and in real life—and provides actionable advice on how to recognize the warning signs. Through expert interviews with cyber safety professionals, law enforcement, and survivors, we uncove ...
…
continue reading
It’s easy to get lost in the space that is cybersecurity which encompasses dozens of specialty areas that can be further segmented into more than 50 career roles. Andrew Hoffritz, a cybersecurity enthusiast and professional, interviews a diverse selection of cybersecurity-minded professionals worldwide each month and pulls back the curtain on how to break into the cybersecurity field, discussing unique skills and why cybersecurity is a continuously growing field. Each episode contains powerf ...
…
continue reading
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from listener Abdussobur, who wonders if…
…
continue reading

1
Analyzing Iran-Israel Cyber Threats, New Scattered Spider Attack Chain
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst Hayden and Threat Hunter Leo as they discuss: New Scattered Spider Attack Chain Israel and Iran Cyber Threat Deep Dive Top Iran-linked Threat Groups & How to Mitigate Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research…
…
continue reading

1
EP11 Tracing Lazarus: Greg Sinclair on Attributing North Korean Cyber Threats Through Binary Similarity
1:02:10
1:02:10
Play later
Play later
Lists
Like
Liked
1:02:10Ever wonder who names the world's most notorious APTs? In this episode, we sit down with Greg Sinclair, a reverse engineer from the FLARE team at Google. Greg not only hunts down sophisticated malware but also shares the behind the scenes story of how he discovered and named the North Korean APT, the Lazarus Group. He also discusses his innovative …
…
continue reading

1
Securing Redirections with Mike Macelletti
42:02
42:02
Play later
Play later
Lists
Like
Liked
42:02In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Mike Macelletti from Microsoft’s MSRC Vulnerabilities and Mitigations team to explore Redirection Guard, a powerful mitigation designed to tackle a long-standing class of file path redirection vulnerabilities in Windows. Mike shares how his interest in securi…
…
continue reading

1
Breaking the Silence: Coming Out in the CIA
34:42
34:42
Play later
Play later
Lists
Like
Liked
34:42Emerging alongside Joseph McCarthy’s Red Scare in the 1950s was the Lavender Scare: Widespread panic and paranoia over the inclusion of gay personnel in the federal government. Their perceived dangers led to the terminations and forced resignations of thousands. Fast forward to 1988 – Tracey Ballard, who worked at the CIA, headed in to take a polyg…
…
continue reading

1
OWASP vulnerable and outdated components (noun) [Word Notes]
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. Audio reference Link: "The…
…
continue reading
In this edition of The Naked Scientists, we speak to the Cambridge scientists who have made it their mission to understand climate change in one of the world's most inhospitable regions... Like this podcast? Please help us by supporting the Naked ScientistsBy The Naked Scientists
…
continue reading

1
HPV vaccine uptake wanes, and boozeless beer health concerns
33:25
33:25
Play later
Play later
Lists
Like
Liked
33:25In this edition of The Naked Scientists: HPV vaccination rates are waning. We examine the importance of the jab. Also ahead: why Africa is key to understanding the evolution of early humans. Plus, the reasons alcohol-free booze might actually not be all that good for us... Like this podcast? Please help us by supporting the Naked Scientists…
…
continue reading
Please enjoy this encore of Hacking Humans. On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there…
…
continue reading

1
Israel-Iran Cyber Warfare, Anubis Ransomware, and More Attacker Trends
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analyst Joey and detection engineer Marken as they discuss: Anubis Ransomware Wiper Capability Teamfiltration Pentesting Tool Cyber Implications of Israel-Iran Conflict The Most Up to Date Attacker Trends Kim Bromley: Senior Cyber Threat Intelligence Analyst on …
…
continue reading

1
S3 Ep32: Security Is a Mindset, Not a Product
49:19
49:19
Play later
Play later
Lists
Like
Liked
49:19*[LIVE] Out of the Woods: The Threat Hunting Podcast The Intersection of AI and Threat Hunting: What Problems Emerge, What Problems Get Solved July 10, 2025 | 12:00 - 1:30 PM ET Sign up: https://intel471.com/resources/podcasts/the-intersection-of-ai-and-threat-hunting-what-problems-emerge-what-problems-get-solved *Threat Hunting Management Workshop…
…
continue reading

1
An Introduction to the MLOps Tool Evaluation Rubric
1:00:23
1:00:23
Play later
Play later
Lists
Like
Liked
1:00:23Organizations looking to build and adopt artificial intelligence (AI)–enabled systems face the challenge of identifying the right capabilities and tools to support Machine Learning Operations (MLOps) pipelines. Navigating the wide range of available tools can be especially difficult for organizations new to AI or those that have not yet deployed sy…
…
continue reading

1
A Conversation with House Permanent Select Committee on Intelligence Chairman
34:56
34:56
Play later
Play later
Lists
Like
Liked
34:56What should the US Intelligence Community prioritize domestically and overseas, and how should the work be done? We sat down with Congressman Rick Crawford, Chairman of the House Permanent Select Committee on Intelligence, to learn his perspective on these questions. The conversation emphasized the growing threat of China’s influence in the West, t…
…
continue reading
In the final installment of this season of Titans of Science, Chris Smith speaks with Sharon Peacock, one of the UK's leading voices in infectious disease research. She is best known for her work on whole genome sequencing of pathogens such as MRSA and SARS CoV-2, and studies of antimicrobial resistance... Like this podcast? Please help us by suppo…
…
continue reading

1
The Invisible Threats: OT Meets IT in Modern Manufacturing
39:50
39:50
Play later
Play later
Lists
Like
Liked
39:50Think you can manage industrial systems like your IT infrastructure? Think again. In this episode of The Audit, Dino Busalachi unpacks the high-stakes complexity of OT-IT convergence—and why your trusty IT playbook flatlines on the plant floor. Join the IT Audit Labs crew as we dive into the chaos of managing 10,000+ industrial assets across a spra…
…
continue reading
Cambridge University have informed us that, for cost cutting reasons, they intend to make Dr Chris Smith redundant. Naturally, this jeopardises the Naked Scientists programme, which is produced under his role. He will also lose his medical job. We regard this as a terrible decision and we intend to protest. Please listen to this short podcast to he…
…
continue reading

1
UK commits to new nuclear plant, and robot surgery
31:24
31:24
Play later
Play later
Lists
Like
Liked
31:24In this edition of The Naked Scientists: the UK commits to building a new nuclear power station. But is it worth the hefty price tag? Also, how robots are revolutionising surgery. We'll ask what they can and can't do. And, how NASA's top scientists track rogue near-Earth objects with remarkable precision... Like this podcast? Please help us by supp…
…
continue reading

1
Managing online security throughout the decades.
43:09
43:09
Play later
Play later
Lists
Like
Liked
43:09This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start off with some more chicken follow up, this week, delving into malware-relat…
…
continue reading

1
Black Basta's Enduring Legacy, Qilin Exploits Fortinet Flaws
29:55
29:55
Play later
Play later
Lists
Like
Liked
29:55Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Alex and John as they discuss: The Enduring Legacy of Black Basta Qilin's Exploitation of Fortinet Flaws Vishing for Salesforce Data Atomic Stealer x ClickFix Campaign Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Resear…
…
continue reading

1
Ignore Ram Shankar Siva Kumar’s Previous Directions
39:54
39:54
Play later
Play later
Lists
Like
Liked
39:54In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share Ram Shankar Siva Kumar’s dynamic keynote from BlueHat India 2025, where he explores the evolving threat landscape of AI through the lens of the Microsoft AI Red Team. From adversarial machine learning to psychosocial harms and persuasive AI, Ram highlights real-world…
…
continue reading

1
Ghost Stories: The Hunt for Russian Spies in the US
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15In the early 2000s, the FBI uncovered a team of Russian operatives who had been living double lives in the United States. They were posing as professors, journalists, financial planners, real estate and travel agents, all while sending information back to Moscow. Now, 15 years after they were arrested, Alan Kohler, the former Assistant Director of …
…
continue reading

1
OWASP software and data integrity failures (noun) [Word Notes]
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27Please enjoy this encore of Word Notes. Code and data repositories that don't protect against unauthorized changes.By N2K Networks
…
continue reading

1
How can we improve young people's mental health?
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35The mental health of the young is reaching breaking point, globally. A recent analysis by a panel of leading researchers, young people, and policy experts, has warned that, without targeted action, by 2030, 42 million years of healthy life could be lost to mental illness or suicide; that's two million more than ten years ago. So today we're asking,…
…
continue reading

1
Africa's cholera surge, and colliding galaxies
35:30
35:30
Play later
Play later
Lists
Like
Liked
35:30In this edition of The Naked Scientists: African leaders hold emergency talks about deadly outbreaks of cholera on the continent. But why is this happening, and what can be done to curb the threat? The James Webb Space Telescope breaks another cosmic record spotting the oldest galaxy ever seen, dating from just 280 million years after the Big Bang.…
…
continue reading
This week, our hosts Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from a listener on class action settlements: they’re a class action attorney …
…
continue reading

1
Scattered Spider's Evolving Playbook, SentinelOne Outage
27:36
27:36
Play later
Play later
Lists
Like
Liked
27:36Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Scattered Spider's Focus on Tech Vendors How APT41 Abuses Google Calendar for C2 The SentinelOne Outage A New Void Blizzard Espionage Campaign Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat …
…
continue reading

1
EP10 Tim Blazytko - Protecting Intellectual Property: Obfuscation & Anti-Reverse Engineering in Software
1:08:32
1:08:32
Play later
Play later
Lists
Like
Liked
1:08:32What goes into creating effective software protections? This episode features a conversation with Tim Blazytko, Chief Scientist and Head of Engineering at Emproof, about the essential strategies for protecting software intellectual property. We cover the core concepts of code obfuscation and anti-reverse engineering and discuss practical, modern ap…
…
continue reading

1
The Secret Navy and Their Hunt for a Nazi Sub
36:06
36:06
Play later
Play later
Lists
Like
Liked
36:06How do you catch an enemy’s submarine … and then make it vanish? That’s what the U.S. Navy’s elusive Tenth Fleet planned, as it tracked down Germany’s U-505 submarine. The mission came right before the Allies ran ashore on the beaches of Normandy in World War II. Historian Alexander Rose draws on long classified documents and intercepted transmissi…
…
continue reading

1
OWASP server-side request forgery (noun) [Word Notes]
7:38
7:38
Play later
Play later
Lists
Like
Liked
7:38Please enjoy this encore of Word Notes. An attack technique that leverages an unprotected web server as a proxy for attackers to send commands through to other computers.By N2K Networks
…
continue reading
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is jo…
…
continue reading

1
Prostate cancer: When should we intervene?
37:15
37:15
Play later
Play later
Lists
Like
Liked
37:15Today's programme is all about prostate cancer; exploring what the disease is, who gets it, and how it can be treated. We'll explore the game-changing test from a Cambridge based firm, and question whether sometimes the best approach is to leave the cancer alone... Like this podcast? Please help us by supporting the Naked Scientists…
…
continue reading

1
Pwnagotchi: The AI Pet That Hunts Your Network Credentials
35:24
35:24
Play later
Play later
Lists
Like
Liked
35:24What happens when you cross a Tamagotchi with a Wi-Fi hacking tool? You get the Pwnagotchi—a pocket-sized device that "feeds" on Wi-Fi handshakes and learns from its environment. In this episode, Jayden Traufler and Cameron Birkland join the crew to demonstrate how this deceptively cute device can passively capture encrypted Wi-Fi credentials from …
…
continue reading

1
UK invests in 'cyber army', and turning lead into gold
32:24
32:24
Play later
Play later
Lists
Like
Liked
32:24In this edition of The Naked Scientists: The UK announces a 1 billion pound budget for a cyber army: but what will these keyboard warriors be doing? Also, a vaccine for norovirus that is just one pill. And, physicists at CERN turn lead into gold, albeit briefly! Like this podcast? Please help us by supporting the Naked Scientists…
…
continue reading
This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a bit of follow up, one from listener Aaron, who shares some safety tips fo…
…
continue reading
Threat Hunting Management Workshop: Structuring Collaboration Across Teams June 18, 2025 | 12:00 - 12:45 PM ET Sign up: https://intel471.com/resources/webinars/threat-hunting-management-workshop-structuring-collaboration-across-teams ---------- Top Headlines: Trend Micro | TikTok Videos Promise Pirated Apps, Deliver Vidar and StealC Infostealers In…
…
continue reading

1
SPECIAL: How Russian Market Fuels Credential-Based Attacks
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Factors Driving Russian Market's Popularity Attackers' Favorite Infostealers Infostealer Attack Paths Main Types and Exclusivity of Stolen Logs Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat…
…
continue reading

1
Protecting AI at the Edge with David Weston
39:15
39:15
Play later
Play later
Lists
Like
Liked
39:15In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Weston’s keynote from BlueHat India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-po…
…
continue reading

1
How Are Shifting Priorities Impacting National Security in America?
29:18
29:18
Play later
Play later
Lists
Like
Liked
29:18Most Americans would agree that the United States should be protected, but from whom … and how? Dr. Donell Harvin, the former Chief of Homeland Security and Intelligence for the District of Columbia, says the U.S. is taking its eye off the ball - focusing its large domestic intelligence apparatus in a direction that is politically expedient, but no…
…
continue reading

1
OWASP security logging and monitoring failures (noun) [Word Notes]
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04Please enjoy this encore of Word Notes. The absence of telemetry that could help network defenders detect and respond to hostile attempts to compromise a system.By N2K Networks
…
continue reading
In this edition of The Naked Scientists, Titans of Science continues with Autism research pioneer, Simon Baron-Cohen... Like this podcast? Please help us by supporting the Naked ScientistsBy The Naked Scientists
…
continue reading

1
Curing mosquitoes' malaria, and the history of our units
33:36
33:36
Play later
Play later
Lists
Like
Liked
33:36In this edition of The Naked Scientists: The new drug that cures mosquitoes of malaria. Intrigued? You'll see why scientists have done this, in just a minute. Also, the Microsoft AI system set to revolutionise weather forecasting, so you can plan that barbecue with impunity in future! And, 150 years of the metre, kilo and second: how science finall…
…
continue reading
Top Headlines: Qualys | Fileless Execution: PowerShell Based Shellcode Loader Executes Remcos RAT WIRED | How the Signal Knockoff App TeleMessage Got Hacked in 20 Minutes WeLiveSecurity | ESET APT Activity Report Q4 2024–Q1 2025 BleepingComputer | New 'Defendnot' tool tricks Windows into disabling Microsoft Defender ---------- Stay in Touch! Twitte…
…
continue reading
This week, our three hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. Listener Jim notes that money launderers and couriers mentioned in recent episodes are often scam…
…
continue reading

1
The Threat Evolution: SAP Exploits, SEO Poisoning, and SkitNet Malware
29:03
29:03
Play later
Play later
Lists
Like
Liked
29:03Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Joey along with intelligence analysts John and Hayden as they discuss: ReliaQuest's investigation into hijacked routers and SEO poisoning fueling payroll heists Nation-state actors leveraging the SAP NetWeaver vulnerability en masse A new "Defendnot" tool that tricks Windows Defender into …
…
continue reading

1
The State of DevSecOps in the DoD: Where We Are, and What’s Next
58:42
58:42
Play later
Play later
Lists
Like
Liked
58:42DevSecOps practices foster collaboration among software development, security, and operations teams to build, test, and release software quickly and reliably. A high-stakes, high-security environment has challenged the implementation of these practices within the Department of Defense (DoD). The DoD Chief Information Officer (CIO) organization part…
…
continue reading

1
Sharing Intelligence: Challenges between US and Ukraine
34:56
34:56
Play later
Play later
Lists
Like
Liked
34:56After Russia’s full scale invasion of Ukraine, the U.S. rushed to create a secret center that set targets for the Ukrainians to destroy. But the counteroffensive of 2023 failed to achieve its goals. So, what went wrong? New York Times reporter Adam Entous spent more than a year reporting on this story. He joins SpyCast host Sasha Ingber to talk abo…
…
continue reading

1
OWASP identification and authentication failures (noun) [Word Notes]
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58Please enjoy this encore of Word Notes. Ineffectual confirmation of a user's identity or authentication in session management. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure Audio reference link: “Mr. Robot Hack - Password Cracking - Episode 1.” YouTube Video. YouTube, September 21, 20…
…
continue reading
This episode of The Naked Scientists was brought to you in partnership with the health foundation Wellcome.In this edition of The Naked Scientists, we return to the world of fungi and why this is one of the most serious health threats you haven't heard of... Like this podcast? Please help us by supporting the Naked Scientists…
…
continue reading

1
S3 Ep29: ClickFix, So Easy Even a Nation State Can Do It
38:43
38:43
Play later
Play later
Lists
Like
Liked
38:43Top Headlines: Proofpoint | TA406 Pivots to the Front hunt.io | APT36-Linked ClickFix Campaign Spoofs Indian Ministry of Defence, Targets Windows & Linux Users Google Cloud Blog | COLDRIVER Using New Malware To Steal Documents From Western Targets and NGOs genians.co.kr | Analysis of APT37 Attack Case Disguised as a Think Tank for National Security…
…
continue reading

1
DNA frees man after 38 years, and breast cancer breakthrough
36:46
36:46
Play later
Play later
Lists
Like
Liked
36:46In this edition of The Naked Scientists: New DNA evidence helps free a British man after 38 years in prison. Also, Cambridge scientists push up breast cancer survival rates and cut side effects with a new treatment regimen. And, why the near and the far side of the Moon are world's apart in appearance: it's all down to temperature differences insid…
…
continue reading