Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Email Security Podcasts
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
Every week, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
HIPAA compliance is complicated, confusing and easy to get wrong. Violations, data breaches and ransomware attacks are everywhere in healthcare. HIPAA Critical brings interviews with leaders in cybersecurity, InfoSec, healthcare, and compliance straight to you. Each 30-minute episode is designed to keep you informed and entertained. A new episode is released on the first three Wednesdays of every month.
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading

1
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
Welcome to “Let’s Talk Attachments”, a podcast all about ATTACHMENT THEORY! My name is Jessica Da Silva and I’m a Licensed Marriage and Family Therapist & Attachment Coach helping you transform the way you experience love by teaching you the ins and outs of your attachment style in a practical and relatable way. Website: https://jessicadasilvacoaching.com/ Instagram: @thejessicadasilva Tiktok: @jessicadasilvacoaching Email: [email protected]
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
Podcast of the Rio Grande Foundation that addresses public policy issues facing New Mexico.
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
…
continue reading
Elliott Danker hosts this Asia Collective podcast series where we take a look at what's behind the pulse of Asia right now. We discuss what governments and businesses are paying attention to around the world and especially in Asia and what businesses need to pay attention to when expanding in the region. Be a part of setting the rhythm in Asia For enquiries on collaborations and partnerships, email us at [email protected]
…
continue reading
🔒 Cybersecurity is evolving — and so should you. Razorwire brings the open conversations that give you the edge. Welcome to the Razorwire podcast — your resource for practical advice, expert insights, and real-world conversations on cybersecurity, information security (InfoSec), risk management, governance, security leadership, human factors, and industry trends. Our mission is to help you build a stronger cybersecurity career while supporting a dynamic, agile community of professionals comm ...
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
This is the Philippine Stock Market Weekly podcast series by FirstMetroSec, where we will be featuring timely and relevant discussions on the Philippine stock market and economy, in the hope of providing investing and trading guidance to Filipinos. Enjoying our episodes? Don't forget to follow the podcast, rate us 5 stars and hit the notification bell. Connect with us through social media with the handle, @firstmetrosec. #YourFutureFirst Website: www.firstmetrosec.com.ph Email: events@firstm ...
…
continue reading
Welcome to Cyber Insights, the podcast that bridges the worlds of networking and cybersecurity. From cutting-edge innovations in enterprise connectivity to the latest in digital defense, we break down the buzzwords and bring you actionable insights to secure and scale your systems. Whether you're an IT professional, business leader, or tech enthusiast, join us as we explore the critical intersection of networks and security, featuring expert conversations, industry trends, and real world str ...
…
continue reading
Lit AF podcast is your resource for healing and transforming attachment styles. Sarah Cohan is a relationship and communication coach. She helps folx end old relationship patterns like people-pleasing and codependency in order to show up confidently in secure relationships. It is possible to change your attachment style. Tune in to start healing today. Website: [Sarahcohan.com](https://www.sarahcohan.com/) Instagram: [@itsmesarahcohan](https://www.instagram.com/itsmesarahcohan/) Email: hello ...
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
We're getting back to basics, talking technology, taking your calls and your questions about technology, talking to industry leaders about their companies across cars, tech and lifestyle products. Email Trev via the EFTM Website or send an SMS 0477 657 657
…
continue reading
Join us as we discuss news and current events, trends, and controversies in the world of cybersecurity. We have strong feelings and they're not limited to FedRAMP, CMMC, FISMA, IRAP, security engineering, or documentation. Anything goes -- some of the things we say are probably even helpful! Interested in having words? Email us at [email protected].
…
continue reading
Cyber Security, data breaches, Hackers, Chief Information Security Officers, Talking Cyber Security (formerly 'The Australian CISO') is a podcast for anyone interested in Cyber Security. Hear about data breaches, cyber news, how security personnel 'tick', how to answer questions at an interview, lessons learnt while doing the security role, how security people network, how they succeed etc. Use the email address [email protected] to make comments, pose questions or even ask to be on ...
…
continue reading
A new beginning in IT
…
continue reading
Intuition Consultancies has a decade of expertise, in empowering businesses with innovative tech solutions for growth and efficiency. Your success, our mission. https://intuitionconsultanciesinc.com/
…
continue reading
Learn the latest Business IT and security strategies you can execute today.
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading
The Dugout is a weekly Black anarchist podcast hosted by Jordan and Prince Shakur. We bring radical, decolonial, and queer takes on politics, movements, and media—covering everything from Black anarchism and Afro-pessimism to uprisings, direct action, and liberation struggles worldwide. Have ideas, reading recs, or want to be a guest? Email us. Consider supporting us on Patreon: https://www.patreon.com/TheDugoutPod
…
continue reading
Selva Kumar is SAP Career Trainer specializing in SAP Career Coaching, identifying skills for getting a Job. You can reach me @ 302 494 9476 or Email: [email protected] Download Free SAP GRC Guide. http://expressgrc.com/sap-grc-10-1-step-step-guide/
…
continue reading
We take an expert look at the latest cybersecurity incidents, how they happened, and why. Tune in weekly to learn what you can do to stop bad things from happening to you! Got questions/suggestions/stories to share? Email: [email protected] Twitter: @NakedSecurity Instagram: @NakedSecurity
…
continue reading
This is the podcast version of Prudent Money Radio Show. Monday through Friday, we convert that day’s show to the podcast platform of your choice. This way you can listen on your own time. From New York Times Best Selling authors to monthly Prudent Money contributors, we’ve got you covered with the information that is critical to know. As a member of the subscriber list, you will receive an email each Friday with the breakdown of the shows for the week.
…
continue reading
Welcome Everyone! Each week we candidly share our opinions on a variety of topics including personal life experiences, entertainment, & cultural climate. From My Experience Podcast is also a space where we invite people from diverse walks of life to share their stories and unique life experiences. We strive to provide our listeners with content that promotes positivity and offers encouragement.. We would love to hear from you all as well. Always feel free to email us your questions or opinio ...
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
The Mid-Atlantic’s Best IT services company. Helping Business Owners create, improve and scale their Technology strategy. IT services, IT Security and IT Support advice and leadership from expert professionals. Q&A with Senior Engineers, Service Managers and Business Development.
…
continue reading
The TechSurge: Deep Tech VC Podcast explores the frontiers of emerging tech, venture capital, and business trends, with conversations tailored for entrepreneurs, technologists, and investment professionals. Presented by Celesta Capital, and hosted by Founding Partners Nic Brathwaite, Michael Marks, and Sriram Viswanathan. Email feedback and show ideas to [email protected]. Join us as we examine the next major tech cycle, uncover emerging global tech hubs, and analyze where VC investment d ...
…
continue reading

1
Chilling Tales for Dark Nights: A Horror Anthology and Scary Stories Series Podcast
Chilling Entertainment, LLC & Studio71
Chilling Tales for Dark Nights is a horror fiction anthology podcast, with each weekly episode featuring several creepy tales from talented authors, brought to life by professional voice actors, and accompanied by SFX and music. For advertising opportunities please email [email protected] We wanna make the podcast even better, help us learn how we can: https://bit.ly/2EcYbu4 Privacy Policy: https://www.studio71.com/us/terms-and-conditions-use/#Privacy%20Policy.
…
continue reading
Welcome to “Cyber Compliance and Beyond,” a Kratos podcast that will bring clarity to compliance, helping put you in control of cybersecurity compliance in your organization. Kratos is a leading cybersecurity compliance advisory and assessment organization, providing services to both government and commercial clients across varying sectors including defense, space, satellite, financial services, and health care. Through "Cyber Compliance and Beyond," our cyber team of experts will share thei ...
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
The best analysis of the biggest Premier League matches. From Saturday Night Football, Super Sunday, Monday Night Football and more... Featuring your favourite Sky Sports pundits like Roy Keane, Micah Richards, Jamie Carragher and Izzy Christiansen, get the best insight into the latest Premier League action. Listen to every episode of The Sky Sports Football Podcast here: skysports.com/the-sky-sports-football-podcast You can listen to The Sky Sports Football Podcast on your smart speaker by ...
…
continue reading
Legitimate Cybersecurity Podcast - designed to empower you with real-world cybersecurity information, stories, and advice.
…
continue reading
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
…
continue reading
Podcast about enterprise technology by Indonesia's trusted I.T. company, ACS Group IG @acsgroup.co.id. We interview experts to spread awareness about the latest trends and opportunities in the enterprise tech space. Email us at: [email protected]
…
continue reading
Welcome to Crypto News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about Bitcoin, Ethereum, blockchain technology, DeFi, NFTs, and more. Whether you're a crypto enthusiast, investor, or simply curious about the potential of digital currencies, this podcast is your go-to source for all things crypto. Tune ...
…
continue reading

1
Microsoft 365 Direct Send Exploited: How Phishing Emails Masquerade as Internal Messages
41:44
41:44
Play later
Play later
Lists
Like
Liked
41:44Phishing has long been a favored weapon of cybercriminals, but a recent revelation about Microsoft 365’s Direct Send feature has elevated the threat to a new level—from inside the firewall. Designed for internal systems to send notifications without authentication, Direct Send can be abused by malicious actors to spoof emails that appear to origina…
…
continue reading

1
719 New Mexico Economy, A Look Backward at Social Security, Deleting Emails at State, ABQ Mayoral Candidates
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46On this week's conversation Paul and Wally discuss Paul's recent article highlighting Arizona's superior policies relative to New Mexico's. Matt Mitchell recently gave a talk on economic freedom in NM. Here are his slides and an interview with Bob Clark of KKOB. Social Security could have been solvent with private accounts full of cash if Congress …
…
continue reading

1
028 - Silence & Stealth - Mailbox, Email & Anti-KYC Phone Strategies
45:28
45:28
Play later
Play later
Lists
Like
Liked
45:28In this episode, I discuss three key strategies for maintaining privacy and security across your physical mailbox, email, and phone. I discuss the growing Matrix community, explore alternative mailing solutions using co-working spaces, detail a four-tier email strategy, and examine the concerning spread of Flock ALPR cameras. I also share insights …
…
continue reading

1
SAP’s July 2025 Patch Day: Critical Flaws, CVE-2025-30012, and Ransomware Risk
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01In this episode, we break down SAP’s July 2025 Security Patch Day—a high-stakes moment for any enterprise relying on SAP’s core business applications. With 27 new and 4 updated security notes released, including seven rated as critical, this patch cycle directly targets some of the most serious vulnerabilities seen in SAP environments in recent mem…
…
continue reading

1
BBVA Spain Launches Crypto Trading, UAE Drives Arab Crypto Boom, SEC Fast-Tracks Solana ETFs, PS Miner Launches AI Crypto Service, and more...
11:49
11:49
Play later
Play later
Lists
Like
Liked
11:49BBVA Spain Launches Regulated Crypto Trading for Retail Customers Amid Growing Market UAE Leads Arab Crypto Boom with $34B Influx and Youth-Driven Growth SEC Fast-Tracks Solana ETF Approvals, Signals Major Shift in Crypto Investment Landscape PS Miner Launches World's First AI-Driven Multi-Asset Crypto Liquidity Mining Service Court Dismisses Coin …
…
continue reading

1
NBN woes, International Roaming feedback and Mp3 players
52:07
52:07
Play later
Play later
Lists
Like
Liked
52:07How hard is it to change NBN providers, and what to look for in your current plan. NAS drive with Movies on it - the issues with getting a replacement. International roaming feedback, Vodafone and Airalo getting our listener through. An Mp3 player for simplicity - is that a thing? The EFTM Podcast thanks to Swann. Get in touch thanks to Vodafone on…
…
continue reading

1
383: Witness to Oblivion - Chilling Tales for Dark Nights
1:12:12
1:12:12
Play later
Play later
Lists
Like
Liked
1:12:12In this emotionally charged episode of Chilling Tales for Dark Nights, host Steve Taylor invites you to confront the most terrifying vanishing act of all—the erasure of self. Tonight’s story doesn’t lurk in the shadows or drip with blood. It aches. It lingers. It asks: What if the price of healing is everything that made you who you are? Crafted by…
…
continue reading

1
AsiaPulse - The Landscape of Energy Investment
26:35
26:35
Play later
Play later
Lists
Like
Liked
26:35This week, Elliott Danker speaks with Srini Nagarajan, Managing Director and Head of Asia, British International Investment as they discuss energy sustainability across South East Asia as well as how it compares with regions like Europe and America. Srini also gives some insights into some recent announcements by BII as well as their current invest…
…
continue reading

1
106GB Exposed? Telefónica, HellCat, and the Silent Data Breach
50:33
50:33
Play later
Play later
Lists
Like
Liked
50:33In this episode, we explore a shadowy and unconfirmed—but highly consequential—data breach at Spanish telecommunications giant Telefónica. Allegedly orchestrated by the HellCat ransomware group, the breach involves a staggering 106GB of exfiltrated data, including internal communications, customer records, and employee information. Telefónica has y…
…
continue reading

1
How Big Of A Change Did Trump Make To Student Loans?
25:58
25:58
Play later
Play later
Lists
Like
Liked
25:58If you have any student loan debt you will want to hear this. John Hupalo is here with Bob to talk about the student loan debt changes that were finalized through Trump's Big Beautiful BillBy Bob Brooks
…
continue reading

1
Telegram Offers UAE Golden Visa, Bitcoin Network Activity Plummets, Global Crypto Adoption Surges, Crypto Exchanges Shift to Dubai Hong Kong, and more...
10:49
10:49
Play later
Play later
Lists
Like
Liked
10:49(0:10): Telegram's TON Offers 10-Year UAE Golden Visa for $100K Toncoin Stake, Boosting Crypto Residency Options (2:06): Bitcoin Faces Crisis: Network Activity Plummets Despite Price Surge (4:07): High-Growth Markets Lead Global Crypto Adoption, U.S. Lags Despite Regulatory Advances (6:00): Crypto Exodus: Major Exchanges Eye Dubai, Hong Kong Amid S…
…
continue reading

1
Ingram Micro’s SafePay Ransomware Breach: Human-Operated Threats and Supply Chain Fallout
59:56
59:56
Play later
Play later
Lists
Like
Liked
59:56The recent ransomware attack on Ingram Micro, a global technology distribution giant, reveals not only a sophisticated human-operated cyber assault—but also the fragile state of modern supply chain cybersecurity. In this episode, we break down how attackers, believed to be affiliated with the SafePay ransomware group, penetrated Ingram Micro’s infr…
…
continue reading

1
The Illusion of Shutdowns: What Hunters International's Closure Really Means
42:41
42:41
Play later
Play later
Lists
Like
Liked
42:41In a sudden and cryptic announcement, the notorious ransomware group Hunters International has declared its shutdown, citing “recent developments” and pledging to release decryption keys to victims. Active since late 2022 and suspected to be a rebrand of the earlier Hive ransomware gang, Hunters International has been responsible for attacks on nea…
…
continue reading

1
CISA Flags CVE-2025-6554: Patching Chrome’s Critical Flaw Before It’s Too Late
40:49
40:49
Play later
Play later
Lists
Like
Liked
40:49A newly discovered and actively exploited zero-day vulnerability in Google Chrome has sent ripples through the cybersecurity community. Known as CVE-2025-6554, this critical type confusion flaw in Chrome’s V8 JavaScript and WebAssembly engine enables remote attackers to perform arbitrary read/write operations or execute code via a single malicious …
…
continue reading

1
029 - Minimize not Militarize and Avoiding Surveillance with GrapheneOS
54:26
54:26
Play later
Play later
Lists
Like
Liked
54:26In this episode, I explore the difference between the military mindset and the more stealth approach of minimization in cybersecurity. I share the results from the Ghost in the Source Capture the Flag (CTF) challenge, revealing how the winners cracked the AES encryption using dictionary attacks, keyword harvesting and the cipher tool hidden in robo…
…
continue reading

1
Market Bites: RL Commercial REIT, Inc. (RCR)
6:24
6:24
Play later
Play later
Lists
Like
Liked
6:24FirstMetroSec’s Anjz Baccay shares our updated insights on RL Commercial REIT, Inc. (RCR). In this episode, Anjz discussed our target price and recommendation for the stock. These and more, only here on Philippine Stock Market
…
continue reading

1
Episode 95: Episode 95 - Security Awareness - What works?
22:42
22:42
Play later
Play later
Lists
Like
Liked
22:42In this episode, Richard has a deep dive into Security Awareness. What works? What doesn't?
…
continue reading

1
What To Do If You Can't Protest: On Organizing Beyond The Frontlines
27:44
27:44
Play later
Play later
Lists
Like
Liked
27:44Not everyone can be on the frontlines — and that’s okay. In this video, I share real, grounded ways to stay politically active when protesting isn’t an option. From mutual aid and jail support to scouting, media-making, and hosting communal dinners, these are essential roles that keep movements alive. Whether you’re burned out, undocumented, disabl…
…
continue reading
# Byte Sized Security Show Notes ## Episode Title: 3 Immediate Actions to Protect Your Privacy Today ## Episode Summary: In this episode of Byte Sized Security, host Marc David outlines three practical, actionable steps to enhance your privacy protection immediately. With data breaches nearly doubling in 2024 and companies like AT&T and Ticketmaste…
…
continue reading

1
ANSSI vs. Houken: France Battles Advanced Chinese Hacking Threat
33:16
33:16
Play later
Play later
Lists
Like
Liked
33:16In this episode, we uncover a high-stakes cyber campaign targeting the heart of French digital infrastructure. ANSSI, France’s national cybersecurity agency, has exposed a Chinese-linked hacking group known as Houken (UNC5174 or Uteus) responsible for a widespread espionage operation since late 2024. This state-adjacent threat actor infiltrated cri…
…
continue reading

1
Psychological Manipulation and AI Fraud: How Spain Exposed a $12M Scam
17:21
17:21
Play later
Play later
Lists
Like
Liked
17:21In this episode, we examine a growing threat reshaping financial crime in Europe: sophisticated, technology-driven investment fraud. Spanish law enforcement has recently dismantled a fraud operation that spanned multiple years, deceived over 300 victims, and resulted in more than $11.8 million in losses. What made this case particularly notable was…
…
continue reading

1
TOP Secures $28.5M Funding, Ondo and Pantera Launch $250M Fund, Google and Mozilla Fight Crypto Theft, Ex-Daybreak CEO Raises 30.5M, and more...
11:39
11:39
Play later
Play later
Lists
Like
Liked
11:39(0:10): TOP Raises $28.5M, Reaches $1B Valuation to Expand TON Blockchain with Telegram Partnership (2:02): Ondo and Pantera Launch $250M Fund to Boost Tokenized Asset Innovation (4:40): Google and Mozilla Battle Major Crypto Theft Threats from Zero-Day Flaw and Malicious Extensions (6:37): Ex-Daybreak CEO Raises $30.5M for Web3 Shooter 'Reaper Act…
…
continue reading

1
CVE-2025-20309: Critical Cisco Root Access Flaw Threatens VoIP Security
41:32
41:32
Play later
Play later
Lists
Like
Liked
41:32A devastating vulnerability—CVE-2025-20309—has been discovered in Cisco’s Unified Communications Manager (Unified CM) and its Session Management Edition (SME), threatening the security of over a thousand internet-exposed VoIP systems globally. In this episode, we break down this critical flaw, which scores a perfect CVSS 10.0, and explore why it's …
…
continue reading

1
[WARTEK] Satu Tools, Banyak Fungsi: Kenapa FortiAnalyzer Jadi Andalan Tim Keamanan | ACS Group
8:35
8:35
Play later
Play later
Lists
Like
Liked
8:35Dalam menangini serangan cyber security diperlukan peran enginner untuk mendeteksi dan merespons serangan siber. Namun, seperti yang Anda sebutkan, hanya mengandalkan mereka saja tidak cukup. Keamanan siber adalah upaya berlapis yang membutuhkan kombinasi manusia, teknologi, dan proses untuk menjadi efektif.Solusi FortiAnalyzer mampu menjadi alat y…
…
continue reading
FirstMetroSec’s Anjz Baccay shares our updated insights on Emperador Inc. (EMI). In this episode, Anjz discussed our target price and recommendation for the stock. These and more, only here on Philippine Stock Market Weekly.
…
continue reading

1
macOS Under Siege: NimDoor Malware Targets Telegram, Wallets, and Keychains
43:09
43:09
Play later
Play later
Lists
Like
Liked
43:09A new, highly advanced malware strain—NimDoor—has emerged as the latest cyber weapon in the arsenal of North Korean state-sponsored hackers, specifically targeting macOS systems used by cryptocurrency and Web3 organizations. This episode explores the complex tactics and alarming capabilities of NimDoor, a malware family showcasing a blend of C++ an…
…
continue reading

1
Cisco Unified CM Vulnerability: Root Access Risk for Enterprise VoIP Networks
56:02
56:02
Play later
Play later
Lists
Like
Liked
56:02A newly disclosed vulnerability—CVE-2025-20309—in Cisco's Unified Communications Manager (Unified CM) and Session Management Edition has sent shockwaves through enterprise VoIP and IT security teams. The flaw stems from hardcoded root SSH credentials that could allow unauthenticated remote attackers to gain full control of affected systems. In this…
…
continue reading
Tributes have poured in from around the world after the tragic deaths of Liverpool forward Diogo Jota and his brother Andre Silva. In this episode, Vicky Gomersall hears from Sky Sports News reporters at Anfield and Molineux as well as getting reaction to the news from Euro 2025 and the Club World Cup.…
…
continue reading

1
Forminator Flaw Exposes WordPress Sites to Takeover Attacks: Vulnerability Threatens 600,000+ Sites
50:32
50:32
Play later
Play later
Lists
Like
Liked
50:32A critical new WordPress vulnerability—CVE-2025-6463—has been discovered in the widely used Forminator plugin, affecting over 600,000 active installations and putting hundreds of thousands of websites at risk of full compromise. In this episode, we dive deep into the mechanics, risks, and remediation of this arbitrary file deletion flaw and explain…
…
continue reading

1
Ep:41 Beware: Your Top VPN App May Be a Chinese Government Spy
3:10
3:10
Play later
Play later
Lists
Like
Liked
3:10Episode Summary: In this episode, we explore the alarming discovery that many of the top-rated VPN apps on the App Store and Google Play are secretly owned by Chinese companies. These VPNs pose a serious risk to user privacy and security, as Chinese law requires them to hand over all user data to the government without justification. Key Topics Cov…
…
continue reading

1
722 Daniel Chavez - Candidate for Mayor of Albuquerque
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55On this week's interview Paul talks to Albuquerque Mayoral candidate Daniel Chavez. Chavez owns a company that manages parking lots, so Paul and Daniel discuss some of the issues facing that industry. Then they discuss the issues Chavez plans to take on in his campaign including permitting, crime, homelessness, and other critical issues facing the …
…
continue reading

1
Kelly Benefits Breach: Over 550,000 Victims and the Rising Identity Theft Crisis
1:08:04
1:08:04
Play later
Play later
Lists
Like
Liked
1:08:04In one of the latest large-scale data breaches to hit the U.S. private sector, Kelly Benefits, a provider of payroll and benefits administration services, disclosed a significant cybersecurity incident impacting over 553,000 individuals. The breach, which occurred in December 2024 but was only revealed in April 2025, exposed sensitive personal info…
…
continue reading
Yeeerrrr!!!!! What is going on everybody? On this episode Rob and Ericca discuss times when they gave in to peer pressure and they also discuss the power of thinking for yourself. Do you need or want some advice? Did you recently celebrate something important? Did you have a spicy interaction with someone? If so, we want to share your story. Submit…
…
continue reading

1
Tech Billionaires Launch Crypto Bank, Ripple Pursues US Banking License, North Korean Hackers Target Crypto Firms, Trump's Wealth Rises Amid Crypto Ventures, and more...
11:22
11:22
Play later
Play later
Lists
Like
Liked
11:22(0:10): Erebor Bank: Tech Billionaires Launch Crypto-Focused Digital Bank Amid Traditional Banking Collapse (2:08): Ripple Seeks U.S. Banking License to Boost Compliance and Expand Stablecoin Services (4:17): North Korean Hackers Deploy NimDoor Malware to Target Crypto Firms via Fake Zoom Update (6:06): Trump's Wealth Soars by $620 Million Amid Cry…
…
continue reading

1
CR104 Quantumania part 2 with Catherine Vollgraff Heidweiller and James Goeders, Google Quantum AI
1:03:09
1:03:09
Play later
Play later
Lists
Like
Liked
1:03:09Quantum computing in 2025 is rapidly advancing toward commercialization, with breakthroughs in algorithms, scalable hardware, and cloud-based quantum services driving real-world applications across finance, healthcare, logistics, and cybersecurity This week, Dave, Esmee, and Rob dive into the cutting edge of quantum computing with Catherine Vollgra…
…
continue reading

1
382: Licensed to Harm - Chilling Tales for Dark Nights
49:41
49:41
Play later
Play later
Lists
Like
Liked
49:41Licensed to help. Trained to heal. But what if the person you trust most… is the one who breaks you? In this chilling installment of Chilling Tales for Dark Nights, a desperate soul seeks solace behind the polished doors of a celebrated therapist’s office—only to discover that not every diploma on the wall guarantees safety. What begins as a quest …
…
continue reading

1
FileFix, HTA, and MotW Bypass—The Alarming Evolution of HTML-Based Attacks
46:04
46:04
Play later
Play later
Lists
Like
Liked
46:04A newly disclosed exploit dubbed FileFix is redefining how attackers bypass Microsoft Windows' built-in security protections—specifically the Mark-of-the-Web (MotW) mechanism. Developed and detailed by security researcher mr.d0x, this attack takes advantage of how browsers save HTML files and how Windows handles HTA (HTML Application) files. The re…
…
continue reading

1
Sophisticated Cyberattack on the International Criminal Court: Justice in the Crosshairs
19:37
19:37
Play later
Play later
Lists
Like
Liked
19:37The International Criminal Court (ICC), the world’s foremost tribunal for prosecuting war crimes, genocide, and crimes against humanity, has confirmed yet another sophisticated cyberattack, highlighting the persistent threat facing high-profile global institutions. This marks the second targeted intrusion against the ICC in recent years, and althou…
…
continue reading

1
Critical Flaws in Microsens NMP Web+ Threaten Industrial Network Security
43:40
43:40
Play later
Play later
Lists
Like
Liked
43:40In a major red flag for the industrial cybersecurity community, three newly disclosed vulnerabilities in Microsens NMP Web+, a popular network management solution used across critical infrastructure, have revealed just how fragile many ICS environments remain. The flaws—two rated critical and one high—allow unauthenticated attackers to bypass authe…
…
continue reading
The cyber workforce is as diverse as the challenges it faces. From process designers and behavioral analysts to business strategists and communicators, cybersecurity thrives on a diversity of skill sets. It’s important to understand what it takes to join the field, especially given the current shortage of cybersecurity professionals. In today’s epi…
…
continue reading

1
Qantas Data Breach: Third-Party Hack Exposes Millions of Frequent Flyers
24:36
24:36
Play later
Play later
Lists
Like
Liked
24:36In a stark reminder of the aviation industry's growing exposure to cyber threats, Australian airline Qantas recently confirmed a serious data breach—this time not from its own systems, but from a third-party platform used by one of its customer contact centers. The breach exposed personal data for up to six million customers, including names, dates…
…
continue reading

1
UniCredit Launches Bitcoin ETF, SEC Proposes Faster Crypto ETF Approval, Treasuries Outpace ETFs in Bitcoin, Senate Passes GENIUS Act, and more...
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21(0:10): UniCredit Launches Capital-Protected Bitcoin ETF Product Amid Rising Institutional Crypto Demand (2:20): SEC Proposes Faster Approval Process for Crypto ETFs, Predicts Altcoin Market Surge (4:48): Corporate Treasuries Outpace ETFs in Bitcoin Acquisitions, Holding 4% of Total Supply (7:01): Senate Passes GENIUS Act: Pioneering Guide for Stab…
…
continue reading

1
Risky Business #798 -- Mexican cartel surveilled the FBI to identify, kill witnesses
1:02:19
1:02:19
Play later
Play later
Lists
Like
Liked
1:02:19On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: Australian airline Qantas looks like it got a Scattered Spider-ing Microsoft works towards blunting the next CrowdStrike disaster Changes are coming for Microsoft’s default enterprise app consenting setup Synology downplays hardcoded passwords for its M365 clou…
…
continue reading