Tales of supernatural horror and suspense, old and new, are brought to life in this series of audio narrations enhanced with spinetingling music and sound effects. Featuring stories by acknowledged masters of the genre like M. R. James, E. F. Benson and H. P. Lovecraft, alongside lesser-known authors of the early 20th century waiting to be rediscovered and contemporary talents, The EnCrypted Horror Podcast is your new home for horror, curated, read and produced by Jasper L'Estrange. Subscrib ...
…
continue reading
Encrypted Podcasts
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
The world’s most controversial events, and the complex beliefs behind them. From Bigfoot sightings to bitcoin takeovers, alien landings to assassinations, who’s shaping the narrative — and why? Conspiracy Theories is a Spotify Podcast. New episodes Wednesdays. Watch episodes and more on YouTube: www.youtube.com/@ConspiracyTheoriesPodcast
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
NBTV: Your Money; Your Data; Your Life. Welcome to the worlds of Digital Privacy, Tech, Scientific Innovation, and Cryptocurrency. NBTV is hosted by Naomi Brockwell: tech journalist, producer for 19-times emmy award-winning journalist John Stossel, and host of Coindesk daily show "The Hash".
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Scramblex.com has released a free encryption service that will protect sensitive data from unauthorised access and the potential for identity or financial theft.
…
continue reading
Exploring the ideas and stories of crypto moguls from around the world. Learn more at cryptonews.com
…
continue reading
Techlore Talks brings you in-depth conversations with the experts at the forefront of privacy, security, and digital rights. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode features meaningful discussions with the people building, researching, and advocating for digital freedom. From cybersecurity researchers and privacy tool developers to open-source advocates and digital rights activists—if they're shaping how we protect ourselves online, the ...
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
…
continue reading
1
Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.
Craig Petronella
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
…
continue reading
Venture into the elusive world of intelligence collection and espionage to spot, assess and debrief: spies, handlers, catchers, analysts, cut-outs, dangles, diplomats, security experts and the storytellers who bring them all to life. Check your electronics and subscribe, do a thorough surveillance detection route, secure your Live Drop location, and after a mad-minute introduction, listen in on conversations with our fascinating guests who help to illuminate a complex universe. A HUMINT expe ...
…
continue reading
The Encrypted Economy podcast explores the business, laws, regulation, and security relating to our most valuable digital data...whether financial assets, proprietary data or personal information. Join us each week as we delve into what makes up the new encrypted economy as well as the developments that are shaping our economies and world.
…
continue reading
The officially unofficial podcast for Mr. Robot on USA. Each week we hack into the episode with a full recap and listener feedback.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Discover the future of digital privacy with ZeroID — featuring a secure chat app, secure eSIM, and encrypted eSIM technology with no KYC or surveillance. Learn how to stay anonymous, connected, and in control using crypto-powered tools built on Solana.
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
A new beginning in IT
…
continue reading
An in-depth analysis of tech issues and topics. Hosted by Chris Fisher and Allan Jude, with over 20+ years in the technology industry. Tune in and get engaged by deep critical analysis and conversation around technologies’ milestones.
…
continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
continue reading
Engineers consistently exclude non-technical people from understanding enough about technology to better utilise it. This is wrong! Engineers should be equipping non-technical people with enough of an understanding to make the right business decisions, without trying to drag them all the way down into the detail.
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
A series of shortcasts from the Internet Watch Foundation (IWF) about their leading non-profit work tackling online child sexual abuse. Our series of short podcasts feature discussions with leading experts and academics covering a wide variety of topics including tech, encryption, policy and how these impact the criminal circulation of child sexual imagery online. Find out more at iwf.org.uk
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Interviews with people who have transitioned and got jobs in #infosec and #cybersecurity so you can learn and be inspired from their experience. There is no linear path into the field of Information Security, so the hope is that you will resonate with at least one of the guests. Some of my guests were teachers, paralegals, librarians, military vets, developers, and IT help desk techs (to name a few) before transitioning. Also featuring "spoof" ads poking fun at the industry.
…
continue reading
David Bombal interviews people in the networking world to learn about life, hacks, technology and networking and ways to improve your life!
…
continue reading
Inside Policy Talks is the premier video podcast of the Macdonald-Laurier Institute, Ottawa's most influential public policy think tank. The Macdonald-Laurier Institute exists to make bad public policy unacceptable in our nations capital.
…
continue reading
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
Welcome to the Clear Crypto Podcast, straight talk on what crypto and blockchain do today, and what they're going to do tomorrow with Nathan Jeffay, Head of Media at StarkWare and Gareth Jenkinson, Head of Multimedia at Cointelegraph.
…
continue reading
"You're The Voice” is a captivating podcast by Efrat Fenigson, that delves fearlessly into the realms of health, economics, politics, money, sovereignty, mind-control & beyond. Join Efrat & intriguing guests from all corners of the globe for open & uncensored dialogues, seamlessly weaving in perspectives on mental & spiritual well-being. Efrat believes in free speech & self-expression, and this podcast helps you discover how much your voice matters. Prepare to be challenged, inspired, & enli ...
…
continue reading
A man is haunted from childhood by a recurring, deeply unsettling dream in which he always finds himself visiting the same gloomy house, meeting the same strange family, and being led toward a particular room at the top of the house. As the years pass, the dream evolves in disturbing ways. This original recording is an audio presentation by Jasper …
…
continue reading
1
#502: Rand Hindi, CEO of Zama, on Fully Homomorphic Encryption (FHE), Total Value Shielded (TVS), and The future of Privacy
28:42
28:42
Play later
Play later
Lists
Like
Liked
28:42Dr. Rand Hindi is an entrepreneur and deeptech investor. He is the Founder and CEO at Zama and an investor in over 50 companies across privacy, AI, blockchain, and medtech. Rand started coding at the age of 10, founded a Social Network at 14, and started a PhD at 21. He then created Snips, a privacy-centric AI startup that was acquired by Sonos. Ra…
…
continue reading
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Am…
…
continue reading
1
Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers
4:37
4:37
Play later
Play later
Lists
Like
Liked
4:37Linux adds PCIe encryption to help secure cloud servers, Europol cracks down on Violence-as-a-Service providers, the International Criminal Court prepares for cyber-enabled genocide, and Cambodia busts a warehouse full of SMS blasters. Show notes Risky Bulletin: Linux adds PCIe encryption to help secure cloud servers…
…
continue reading
1
#522: Does Traditional Encryption End in 2027?
15:24
15:24
Play later
Play later
Lists
Like
Liked
15:24Big thanks to Cisco for sponsoring this video and sponsoring my trip to Cisco Partner Summit 2025. Is your encryption safe? Cisco’s Vijoy Pandey reveals why distributed quantum computing is coming in 2-3 years, not 10. Learn about the 'Store Now, Harvest Later' threat and how quantum networking changes everything, including the security of your VPN…
…
continue reading
1
#503: Austin King, Founder of Nomina, on Funding Rate Arbitrage, Being Delta Neutral, Perp DEXs, and the Future of Financial Advisors
31:43
31:43
Play later
Play later
Lists
Like
Liked
31:43Austin King, Founder of Nomina, is a Harvard-trained computer scientist, is a proven entrepreneur with a record of building and scaling high-impact ventures. He sold his first company to Ripple, where he co-authored a new payment protocol with CTO David Schwartz and led its go-to-market strategy. Today, Austin draws on his combined expertise in eng…
…
continue reading
While our team is out on winter break, please enjoy this episode of Only Malware in the Building. Welcome in! You’ve entered, Only Malware in the Building. Wrap yourself in a warm blanket, pour your favorite mug of tea, and join us each month as we unwrap the season’s juiciest cyber mysteries. Your host is Selena Larson, Proofpoin…
…
continue reading
In today’s episode, we dig into the Electronic Frontier Foundation’s annual Breachies, highlighting some of the year’s most avoidable, eye-opening, and sometimes head-shaking data breaches. From companies collecting far more data than they need to third-party missteps and quiet misconfigurations, the Breachies offer a revealing look at how familiar…
…
continue reading
1
Health Sovereignty: Mitochondria, Light & Nature - Dr. Alexis Cowan | Ep. 114
2:20:07
2:20:07
Play later
Play later
Lists
Like
Liked
2:20:07My guest today is Dr. Alexis Cowan, PhD,, a Princeton-trained molecular biologist specializing in metabolism, mitochondrial function, and circadian biology. We talk about why modern science has drifted into scientism, how mitochondrial dysfunction sits at the root of nearly every chronic disease, and why reclaiming sovereignty over your health is b…
…
continue reading
Happy Holidays! This week, we're sharing an episode of one of our other favorite podcasts, Otherworld. In this episode, a woman checks into a hotel while visiting her family for Christmas only to find that she may be sharing her room with a shadowy presence. Keep up with Conspiracy Theories! YouTube: @ConspiracyTheoriesPodcast Instagram: @the…
…
continue reading
1
SN 1057: GhostPoster - Free VPNs, Hidden Risks
2:20:19
2:20:19
Play later
Play later
Lists
Like
Liked
2:20:19What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer c…
…
continue reading
1
SN 1057: GhostPoster - Free VPNs, Hidden Risks
2:20:19
2:20:19
Play later
Play later
Lists
Like
Liked
2:20:19What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer c…
…
continue reading
A university museum curator receives a mezzotint print depicting a country house. At first glance, the image seems ordinary, but on repeated viewings it begins to change in unsettling ways. This original recording is an audio presentation by Jasper L'Estrange for EnCrypted Horror. “THE MEZZOTINT” by M. R. James, 1904.💀💀💀💀💀💀💀💀💀💀💀💀💀💀💀Supporting my wo…
…
continue reading
1
Eyes in the sky, red flags on the ground.
27:28
27:28
Play later
Play later
Lists
Like
Liked
27:28The White House bans foreign-made drones. African law enforcement agencies crackdown on cybercrime. A new phishing campaign targets Russian military personnel and defense-related organizations. A University of Phoenix data breach affects about 3.5 million people. A pair of Chrome extensions covertly hijack user traffic. Romania’s national water aut…
…
continue reading
1
Tech Investment Strategies and Overview [CISOP]
48:39
48:39
Play later
Play later
Lists
Like
Liked
48:39In this CISOP episode of CSO Perspectives, Host Kim Jones sits down with John Funge, venture capitalist at DataTribe, to explore how investors view the cybersecurity landscape. Kim reflects on the tension between innovation, profit motives, and the real needs of security practitioners—raising questions about whether the industry prioritizes mitigat…
…
continue reading
NATO suspects Russia is developing a new anti-satellite weapon to disrupt the Starlink network. A failed polygraph sparks a DHS probe and deepens turmoil at CISA. A look back at Trump’s cyber policy shifts. MacSync Stealer adopts a stealthy new delivery method. Researchers warn a popular open-source server monitoring tool is being abused. Cyber cri…
…
continue reading
1
SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. Bu…
…
continue reading
1
Eric Escobar: Collaboration is key. [Pen tester] [Career Notes]
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42Please enjoy this encore of Career Notes. Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking int…
…
continue reading
1
Sentenced For Building Freedom! Samourai Wallet's Keonne Rodriguez | Ep. 113
1:00:22
1:00:22
Play later
Play later
Lists
Like
Liked
1:00:22→ Sign the petition & financially support Bill & Keonne here: https://billandkeonne.org/ From open‑source privacy pioneer to federal inmate, Keonne Rodriguez, the mind behind Samourai Wallet, sits down to explain why the DOJ’s “regulation‑by‑prosecution” saga matters to every crypto user, developer, and civil‑rights advocate. This episode was broad…
…
continue reading
1
The lies that let AI run amok. [Research Saturday]
24:36
24:36
Play later
Play later
Lists
Like
Liked
24:36Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. Using examples…
…
continue reading
1
From Addiction to Building Villages: Responsibility Over Collapse - Aaron Murphy | Ep. 112
1:05:28
1:05:28
Play later
Play later
Lists
Like
Liked
1:05:28My guest today is Aaron Murphy, founder of MurphsLife Foundation, a storyteller and builder working across Latin America to turn direct aid into long-term, dignity-first systems. We sit down in El Salvador’s National Palace to talk about what happens when you hit rock bottom—and choose responsibility, faith, and service instead of collapse. Murph s…
…
continue reading
1
He Built a Privacy Tool. Now He’s Going to Prison.
1:00:18
1:00:18
Play later
Play later
Lists
Like
Liked
1:00:18https://youtu.be/Fshsk8MCAf4 https://odysee.com/@NaomiBrockwell:4/Samourai:e WARNING: This video contains flashing lights and visual effects that may trigger seizures for people with photosensitive epilepsy. Viewer discretion is advised. You might think privacy is optional. Something you can worry about later. But right now there is a major war aga…
…
continue reading
1
Live Special: Securing the Connected World with Thomas Harvey
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15In this special live episode of Cyber Leaders, Ciaran sits down with Thomas Harvey, CISO at Santander UK. As one of the UK’s leading operational cybersecurity figures, Thomas discusses the growing need for cross-sector collaboration, why a more connected security community is essential to national cyber resilience, and how building trust can help c…
…
continue reading
1
Risky Bulletin: Belarus deploys spyware on journalists' phones
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Belarus deployed spyware on journalists’ phones, a man is arrested for installing malware on a ferry, France arrests the hacker behind an Interior Ministry email server breach, and new Cisco and SonicWall zero-days. Show notes Risky Bulletin: Belarus deploys spyware on journalists' phones
…
continue reading
1
SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs
4:37
4:37
Play later
Play later
Lists
Like
Liked
4:37Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn t quite clean for ISC, but SSL2 and SSL3 systems have been cut down by about half. https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ra…
…
continue reading
1
The Law That Protects Your Online Speech Is Under Attack
41:31
41:31
Play later
Play later
Lists
Like
Liked
41:31This week's Surveillance Report covers the internet's free speech protections under attack as a US Senator moves to repeal Section 230. Plus: ransomware attacks escalate with React2Shell exploitation, India orders government access to encrypted messaging, AI "superintelligence" fear is being used to justify actual corporate manipulation happening r…
…
continue reading
Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accu…
…
continue reading