Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Quantum Ready Security Podcasts

show episodes
 
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
  continue reading
 
Shielded: The Last Line of Cyber Defense is your definitive guide to navigating the quantum era of cybersecurity. Hosted by experts from PQShield, a global leader in post-quantum cryptography (PQC), this podcast explores how industries can future-proof their defences against the imminent threat of quantum computing. Each episode brings you actionable insights, real-world case studies, and expert interviews with cryptographers, industry leaders, and policymakers shaping the future of cybersec ...
  continue reading
 
Artwork

1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™

Startuprad.io – Europe’s Startup & VC Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
  continue reading
 
Artwork
 
Welcome to Crypto News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about Bitcoin, Ethereum, blockchain technology, DeFi, NFTs, and more. Whether you're a crypto enthusiast, investor, or simply curious about the potential of digital currencies, this podcast is your go-to source for all things crypto. Tune ...
  continue reading
 
How can business help solve society’s biggest challenges? Welcome to Take on Tomorrow, the award-winning podcast from PwC that examines the biggest problems facing society and the role business can—and should—play in solving them. Hosts Femi Oke and Lizzie O’Leary talk to industry innovators, tech trailblazers and visionary leaders from around the globe about timely topics: from the climate transition to AI and data; and from the future of food to how we build, move and power the world.
  continue reading
 
Artwork
 
Chakras and Shotguns is a wellness podcast hosted by Mik and Jenn, a married couple who ditched their corporate jobs to become healers. Jenn's a former corporate lawyer, now yoga instructor, Tarot card reader and medium. Mik's a former brand marketer, now a Reiki Master, Shaman, life coach and prepper. And yes, we know Chakras and Shotguns sounds like an odd combo, but it's all about balance and the duality of life! "Chakras" symbolizes your spiritual journey towards enlightenment, while "sh ...
  continue reading
 
Welcome to 'The Citrix Session,' where we bring you the latest in Citrix technologies and solutions. Hosted by XenTegra, this podcast dives deep into the world of Citrix digital workspace solutions, exploring everything from virtual apps and desktops to networking and security. Join us each episode as we discuss best practices, new features, and expert strategies to optimize your Citrix environment and enhance your user experience. Whether you're an IT professional seeking to expand your Cit ...
  continue reading
 
Loading …
show series
 
OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-disc…
  continue reading
 
(0:10): Twenty One Capital to Debut on NYSE, Becoming Major Bitcoin-Focused Entity (3:21): Bitwise CIO: MicroStrategy Unlikely to Sell Bitcoin Despite Market Fears and MSCI Index Changes (5:43): France, Italy, Austria Push for ESMA-Led Crypto Regulation to Harmonize EU Markets (7:45): UK Politics Shaken by Record £9M Donation from Crypto Mogul Chri…
  continue reading
 
Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Government%3F%20%5BGuest%20Diary%5D/32536 React Update Working exploits for the React vulnerability patched yesterday are n…
  continue reading
 
(0:10): UK Recognizes Crypto as Property, Paving Way for Global Digital Finance Leadership (2:40): DOJ Seizes Scam Domain in Major Crypto Crackdown; $5.8B Lost in 2024 Alone (4:54): Binance Appoints Yi He as Co-CEO to Drive Global Expansion Amid Legal Scrutiny (6:54): Kalshi's Unconventional Rise: Ballet to Billion-Dollar Prediction Market with $11…
  continue reading
 
As quantum computing advances, organizations can no longer view post-quantum cryptography as a future project. In this episode of Shielded: The Last Line of Cyber Defense, Konstantinos Karagiannis, Director of Quantum Computing Services at Protiviti, lays out a practical and attacker-focused perspective on preparing for the quantum era. Konstantino…
  continue reading
 
Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React server components. Exploitation is likely imminent. https://react.dev/blog/2025/12/03/critical-se…
  continue reading
 
SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-3670629826 https://github.com/yuliskov/SmartTube/releases/tag/notification Two Years, 17K Downloads: The NPM Malware That Tried to Gas…
  continue reading
 
On this episode of The Data Center Frontier Show, Editor in Chief Matt Vincent sits down with Rob Campbell, President of Flex Communications, Enterprise & Cloud, and Chris Butler, President of Flex Power, to unpack Flex’s bold new integrated data center platform as unveiled at the 2025 OCP Global Summit. Flex says the AI era has broken traditional …
  continue reading
 
Have you noticed something different about customer service calls lately? Maybe even something...delightful? Perhaps the service rep not only anticipated your question but had the perfect suggestion? That could be AI working behind the scenes, supporting those call center employees and making life a little smoother for you. It’s just one way techno…
  continue reading
 
Hunting for SharePoint In-Memory ToolShell Payloads A walk-through showing how to analyze ToolShell payloads, starting with acquiring packets all the way to decoding embedded PowerShell commands. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Hunting%20for%20SharePoint%20In-Memory%20ToolShell%20Payloads/32524 Android Security Bulletin December 20…
  continue reading
 
Kazakhstan's Central Bank Eyes Cautious $300M Crypto Investment Amid Market Volatility Strategy Holds Steady: Bitcoin Sales Only as Last Resort Amid Financial Discipline QuickPromo Launches QPT Token, Pioneers Web3 Ecosystem Collaboration with Global Expansion UPCX's Lightning-Fast Cross-Chain Bridge Revolutionizes Multi-Chain Payments with 100,000…
  continue reading
 
Fake adult websites pop realistic Windows Update screen to deliver stealers via ClickFix The latest variant of ClickFix tricks users into copy/pasting commands by displaying a fake blue screen of death. https://www.acronis.com/en/tru/posts/fake-adult-websites-pop-realistic-windows-update-screen-to-deliver-stealers-via-clickfix/ B2B Guest Access Cre…
  continue reading
 
(0:10): Pi Network Expands into Web3 Gaming with CiDi Partnership, Eyes EU Legitimacy and Growth (2:10): Lazarus Group Suspected in $30.6M Upbit Crypto Heist Amid Dunamu-Naver Merger Scrutiny (3:44): Australia Introduces Digital Assets Bill Requiring Licenses for Crypto Platforms (5:48): KuCoin EU Secures MiCAR License, Expands Regulated Crypto Ser…
  continue reading
 
Artificial intelligence is completely changing how data centers are built and operated. What used to be relatively stable IT environments are now turning into massive power ecosystems. The main reason is simple — AI workloads need far more computing power, and that means far more energy. We’re already seeing a sharp rise in total power consumption …
  continue reading
 
(0:10): Coinbase Ventures Unveils 2026 Blueprint: Focus on Real-World Assets, DeFi, and AI (2:08): CHS Leads Crypto Recovery with Law Enforcement Collaboration and Proven Success (4:14): New EU Rules Mandate Fraud Prevention, Cash Access, and Transparency in Payments (5:50): USDT Faces Downgrade Over Bitcoin Reserves, Stability Concerns Rise (7:56)…
  continue reading
 
Europe's startup narrative is changing fast — from apps and valuations to sovereignty, infrastructure and resilience. In this month's DACH Startup News, we unpack the moves that made European tech sovereignty the defining theme of 2025. What you’ll learn: – Why sovereign cloud is becoming foundational for startups and enterprise buyers – How AI, ro…
  continue reading
 
Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications Spyware attacks messaging applications in part by triggering vulnerabilities in messaging applications but also by deploying tools like keystroke loggers and screenshot applications. https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-targ…
  continue reading
 
(0:10): CME Hits Record Highs in Crypto Futures Amid Soaring Demand and Market Volatility (2:38): Bitcoin Surges 3% as Crypto Market Rebounds; XRP and ZEC Lead Gains (4:44): Japan's FSA to Mandate Crypto Exchanges Establish Liability Reserves for Enhanced Investor Protection (6:44): Bitcoin Sees Historic Supply Shift Amid Fed Rate Cut Speculations …
  continue reading
 
In this episode of the DCF Show podcast, Data Center Frontier Editor in Chief Matt Vincent sits down with Bill Severn, CEO of 1623 Farnam, to explore how the Omaha carrier hotel is becoming a critical aggregation hub for AI, cloud, and regional edge growth. A featured speaker on The Distributed Data Frontier panel at the 2025 DCF Trends Summit, Sev…
  continue reading
 
Modern enterprises face a growing challenge in managing thousands of devices, applications, and identities across increasingly complex IT environments. Unmanaged assets, shadow IT, and inconsistent processes can quietly create security gaps that expose organisations to significant risk. In this episode of Security Strategist, Syed Ali, Chief Execut…
  continue reading
 
Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control./32518 Sha1-Hulud, The Se…
  continue reading
 
(0:10): Bitcoin Mining Faces Survival Crisis as Prices Plunge, Hashrate Stays High (2:24): Korean Crypto Exchanges Face Major Penalties Amid Regulatory Crackdown on AML Violations (4:20): Wormhole Labs Launches Sunrise Gateway to Boost Solana's Liquidity with Day-One Trading for External Assets (5:36): Bitcoin Volatility Surges: Options Activity Si…
  continue reading
 
Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%3F/32510 Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day Early exploit attem…
  continue reading
 
(0:10): Pi Network Aligns with EU MiCA, Paving Way for Regulated Global Crypto Adoption (6:35): SFO Raids Uncover Major Crypto Fraud Linked to Basis Markets Collapse (8:18): Bitcoin For America Act Proposes Tax Payments in Bitcoin and Strategic Reserve Formation (10:13): Crypto Whale Owen Gunden Exits Market, Liquidates 11,000 BTC Amid Market Downt…
  continue reading
 
In this episode, Matt Vincent, Editor in Chief at Data Frontier is joined by Rob Macchi, Vice President Data Center Solutions at Wesco and they explore how companies can stay ahead of the curve with smarter, more resilient construction strategies. From site selection to integrating emerging technologies, Wesco helps organizations build data centers…
  continue reading
 
Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, indicating that exploitation may have occurred prior to the patch being released. https://isc.sans.edu/diary/Oracle%20Identity%20Manager%20Exploit%20…
  continue reading
 
What if the biggest cyber risk inside your company wasn’t malware — but identity? In this episode, I sit down with Santhosh Jayaprakash, founder & CEO of UnoSecur, to unpack one of the fastest-moving transformations in cybersecurity: the rise of identity as the new perimeter. Attackers don’t break in anymore — they log in. And with AI agents, LLM w…
  continue reading
 
(0:10): Kraken Secures $800M in Funding, Eyes Global Expansion and Potential IPO Amid Regulatory Shifts (1:57): Coinbase Ventures into Prediction Markets with Kalshi Partnership to Diversify Revenue Streams (3:59): Block Unveils Ambitious Growth Strategy, Expands Cash App Features and Crypto Innovations (9:25): Hyperliquid's HIP-3 Revolutionizes Ma…
  continue reading
 
Quantum computing is coming faster than most organizations are ready for. In this episode of Shielded: The Last Line of Cyber Defense, Kevin Reifsteck, Director for Critical Infrastructure Protection at Microsoft, joins Jo Lintzen to unpack how Microsoft is building a coordinated roadmap toward quantum-safe security and why governments and enterpri…
  continue reading
 
Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names./32472 FortiWeb Multiple OS command injection in API and CLI A second silently patched vulnerability in FortiW…
  continue reading
 
(0:10): Mastercard, Polygon & Mercuryo Simplify Crypto Transfers with Verified Usernames (1:53): Bitcoin Dips Below $90K Amid Bearish Pressure and Thinning Liquidity (4:08): Bitfury Launches $1B Fund for Ethical Tech and AI Innovation, Marking Strategic Shift Beyond Bitcoin (7:13): French Startup Deblock Secures €30M to Revolutionize European On-Ch…
  continue reading
 
“People love the idea that an agent can go out, learn how to do something, and just do it,” Jeff Hickman, Head of Customer Engineering, Ory, said. “But that means we need to rethink authorization from the ground up. It’s not just about who can log in; it’s about who can act, on whose behalf, and under what circumstances.” In the latest episode of T…
  continue reading
 
KongTuke Activity This diary investigates how a recent Kong Tuke infections evolved all the way from starting with a ClickFix attack. https://isc.sans.edu/diary/KongTuke%20activity/32498 Cloudflare Outage Cloudflare suffered a large outage today after an oversized configuration file was loaded into its bot protection service https://x.com/dok2001 G…
  continue reading
 
(0:10): Cboe Debuts Regulated Crypto Futures for Hedge Funds and Asset Managers Seeking Safe Long-Term Exposure (1:59): UK Court Orders Hacker to Repay £4.1M in Crypto for Twitter Account Hijack Scheme (4:08): Grayscale Poised to Launch First US Dogecoin ETF Ticker GDOG by November 2025 (6:39): Aave's New Savings App Promises 5%+ APY, Bridging Trad…
  continue reading
 
With more and more organisations adopting AI as part of their operations, a new layer of data risk has begun to emerge. In the recent episode of The Security Strategist Podcast, guest Gidi Cohen, CEO and Co-Founder of Bonfy.AI, sat down with host Richard Stiennon, Chief Research Analyst at IT Harvest. They discussed the reasons traditional data los…
  continue reading
 
In this episode of the Data Center Frontier Show, we sit down with Ryan Mallory, the newly appointed CEO of Flexential, following a coordinated leadership transition in October from Chris Downie. Mallory outlines Flexential's strategic focus on the AI-driven future, positioning the company at the critical "inference edge" where enterprise CPU meets…
  continue reading
 
Making all the items we need and use in our everyday lives requires an intricate network of producers, suppliers, and distributors. But intricacy can have consequences: supply chains today are frequently disrupted, even as new technologies are changing everything we thought we knew about manufacturing. Long-standing processes are being revamped to …
  continue reading
 
Decoding Binary Numeric Expressions Didier updated his number to hex script to support simple arithmetic operations in the text. https://isc.sans.edu/diary/Decoding%20Binary%20Numeric%20Expressions/32490 Tea Token NPM Pollution The NPM repository was hit with around 150,000 submissions that did not contain any useful contributions, but instead atte…
  continue reading
 
(0:10): Global Probe Uncovers Crypto's Dirty Secrets: Money Laundering, Scams, and Regulatory Gaps Exposed (1:58): Blockchain Impact Forum 2025: Advancing Sustainable Development with Innovative Solutions (4:02): ECB Warns of Systemic Risk as Dollar-Backed Stablecoins Surge, Euro Initiative Launched (6:12): Polkadot 2.0: Undervalued Gem with Major …
  continue reading
 
Fortiweb Vulnerability Fortinet, with significant delay, acknowledged a recently patched vulnerability after exploit attempts were seen publicly. https://isc.sans.edu/diary/Honeypot+FortiWeb+CVE202564446+Exploits/32486 https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/ https://fo…
  continue reading
 
(0:10): Czech National Bank Launches Pilot Program to Explore Digital Assets and Tokenized Finance (2:29): XRP ETF Launches with $46M Volume, Sparking Institutional Interest and Potential Price Surge (4:47): Czech National Bank Embarks on $1M Digital Asset Pilot for Cryptocurrency Insight (6:48): Grayscale's IPO Filing Signals Major Crypto Investme…
  continue reading
 
SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diar…
  continue reading
 
On this episode of the Data Center Frontier Show, DartPoints CEO Scott Willis joins Editor in Chief Matt Vincent to discuss why regional data centers are becoming central to the future of AI and digital infrastructure. Fresh off his appearance on the Distributed Edge panel at the 2025 DCF Trends Summit, Willis breaks down how DartPoints is position…
  continue reading
 
Microsoft Patch Tuesday for November 2025 https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+for+November+2025/32468/ Gladinet Triofox Vulnerability Triofox uses the host header in lieu of proper access control, allowing an attacker to access the page managing administrators by simply setting the host header to localhost. https://cloud.google.com/b…
  continue reading
 
In this episode of the Data Center Frontier Show, DCF Editor-in-Chief Matt Vincent speaks with Ed Nichols, President and CEO of Expanse Energy / RRPT Hydro, and Gregory Tarver, Chief Electrical Engineer, about a new kind of hydropower built for the AI era. RRPT Hydro’s piston-driven gravity and buoyancy system generates electricity without dams or …
  continue reading
 
(0:10): Coinbase Launches Regulated Monthly Token Sale Platform for US Investors, Starting with Monad (2:01): U.S. Treasury & IRS Unlock Crypto Staking for Retail Investors in Regulatory Breakthrough (4:06): LCPC AI Launches UK Fintech Platform Merging AI and Blockchain for Transparent Digital Asset Management (5:49): Ethereum Eyes Bullish Breakout…
  continue reading
 
It isn t always defaults: Scans for 3CX Usernames Our honeypots detected scans for usernames that may be related to 3CX business phone systems https://isc.sans.edu/diary/It%20isn%27t%20always%20defaults%3A%20Scans%20for%203CX%20usernames/32464 Watchguard Default Password Controversy A CVE number was assigned to a default password commonly used in W…
  continue reading
 
(0:10): Bitcoin's Power Law Model Signals Potential Surge to $512K by 2025 Amid Volatility (2:06): Massive Ponzi Scheme: 128,000 Defrauded, $6 Billion in Bitcoin Seized in UK (4:08): DOGE Targets $1 Breakout with Whale Support and ETF Hopes Amid Bullish Momentum (6:01): Solargy & Super Pepe: A Balanced Crypto Investment Strategy with Real-World Uti…
  continue reading
 
In this episode of The Security Strategist podcast, host Jonathan Care, Lead Analyst at KuppingerCole Analysts, speaks with Sudhir Reddy, the Chief Technology Officer (CTO) of Esper, about how to build trust in ‘Zero Trust.’. They explore this paradox in Zero Trust systems, where human trust is essential for the system to function effectively. Redd…
  continue reading
 
Honeypot Requests for Code Repository Attackers continue to scan websites for source code repositories. Keep your repositories outside your document root and proactively scan your own sites. https://isc.sans.edu/diary/Honeypot%3A%20Requests%20for%20%28Code%29%20Repositories/32460 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads Ne…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play