Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Ransomware Podcasts
Welcome to Cybersecurity Sense, the podcast where real-world security meets practical insights. Hosted by LBMC's Mark Burnette, this show goes beyond compliance checklists to explore the fast-moving world of cybersecurity.
…
continue reading
Podcast by Safe Mode Podcast
…
continue reading
A Signal and Webby award winning security podcast that you can rely on for lighthearted, practical security advice, in-depth interviews with industry experts, deep dives into data breaches, and some random but fun security games. Join cybersecurity experts and podcast hosts, Matt Davey, Michael “Roo” Fey, Anna Eastick, and Sara Teare, every other Tuesday for fun banter and cybersecurity updates.
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
Our podcast covers major data breaches, digital privacy issues, and the quirks of internet culture with a mix of humor and insight. Why Subscribe? Stay Informed: Get the latest updates on cybersecurity threats, ransomware attacks, and cyber insurance trends. Engaging Content: We break down complex topics with a lighthearted approach, making them easy to understand. Expert Insights: Learn from industry experts and our own experiences in the cybersecurity field. We dive deep into the latest in ...
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
The BCM Daily Cyber News brings you clear, timely updates on threats, breaches, patches, and trends every day. Stay informed in minutes with focused audio built for busy professionals. Learn more and explore at BareMetalCyber.com.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
David Aaronovitch and a panel of experts and insiders present in-depth explainers on big issues in the news
…
continue reading
In a world where technology moves faster than strategy, how do businesses keep their data and their future secure? Smarter, Strategic Thinking brings you conversations with leaders, innovators, and partners shaping the future of IT. From ransomware protection and storage innovation to smarter infrastructure decisions, each episode explores the strategies that matter most to today’s technology leaders. Hosted by Fortuna Data — trusted partners of IBM, Lenovo, Seagate, HYCU, QNAP, and Qualstar ...
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
Dive deep into the world of cybersecurity with host, Jeremy Ventura, Field CISO at ThreatX.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Tech news from a uniquely Catholic perspective
…
continue reading
In today's episode we have a tendency to state the most recent cyberattack on JBS and check out to quantify the impact they could wear giant businesses
…
continue reading
The Ransomware Files podcast tells the harrowing stories of technology experts who have fought back against ransomware, which is one of the greatest crime waves the internet has ever seen. It features in-the-trenches stories about how organisations recovered and frank human reflections from those who have faced file-encrypting malware, a potent weapon used by high-tech criminals.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
a unique perspective on technology
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
…
continue reading
Join SonicWall and a range of Cybersecurity Professionals as they talk frankly about all things cybersecurity on Cyber Unplugged.
…
continue reading
Twisted Money Podcast is a podcast on Fraud, Scams, and Deceptions to help the listeners become better informed on fraud and cyber-attacks methods so that listeners don't become a victim of fraud and cyber-attacks.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Plans are useless but planning is indispensable and crisis will reveal how you operate. Join me as I discuss ongoing cybersecurity incidents, trends and best practices to help information security professionals catch threats before they become incidents. Shiva Maharaj https://www.linkedin.com/in/shivamaharaj https://twitter.com/kontinuummsp https://www.kontinuum.com/ https://www.buymeacoffee.com/shivaemm Support this podcast: https://podcasters.spotify.com/pod/show/amplifiedandintensified/su ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Welcome to The Cyber Insider by Emsisoft. In our monthly episodes we take you behind the scenes of the cyber world with exclusive interviews, insights, and expert analysis. Tune in to stay ahead of the game. Have questions, suggestions, or stories to share? We'd love to hear from you! Email: [email protected] Twitter: @emsisoft Facebook: @Emsisoft
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Introducing "IT Unplugged" - your go-to podcast for all things IT, Cybersecurity, Business, and Technology! Join our experts as they break down complex topics into simple, easy-to-understand concepts. In each episode, we'll explore the ever-evolving digital landscape and provide practical insights to help your business navigate this exciting world. From cybersecurity best practices to the latest tech trends, we've got you covered. No IT jargon, no complicated explanations - just straightforw ...
…
continue reading
1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
NeedleStack co-hosts interview professional open-source researchers who discuss tips, tricks and insights into the practice of digital investigative research. Whether you’re an open-source expert or aficionado, tune in to learn how to hone your skills, improve your craft and protect yourself as you search the surface, deep and dark web. From Authentic8, creators of Silo for Research. Visit authentic8.com/needlestack to learn more!
…
continue reading
The Mazars Tech for Leaders podcast delves into the latest technology developments and how business leaders can tackle challenges whilst ensuring they are protected from a risk, security and compliance perspective. Join Mazars Technology and Digital experts as they speak with industry guests, specialist speakers and subject matter experts on all things tech.
…
continue reading
I am targeting a market of IT professionals who enjoy woodworking as a hobby. Providing information around information technology topics like cyber security, cyber crime, and a few woodworking projects
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
We started Tech Gumbo in Nov 2014 as a conversational show of news, information & updates about the past, present & future of all things technology in a topical, interesting and digestible way.
…
continue reading
I'm fascinated by what happens in the dark parts of the Internet. Come with me and let's shine some light on it and see what's there.
…
continue reading
Stories from the world of hacking, cybersecurity, and rogue AI. Smashing Security isn’t your typical tech podcast. Hosted by cybersecurity veteran Graham Cluley, it serves up weekly tales of cybercrime, hacking horror stories, privacy blunders, and tech mishaps - all with sharp insight, a sense of humour, and zero tolerance for tech waffle. Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million dow ...
…
continue reading
A podcast that socializes security, compliance, and related topics to make them more approachable and understandable. Each week we’ll discuss a topic, usually with an expert in the area, with the goal of learning along with you. We’re here to socialize security!
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Dive into the ”AI Briefing Room” for a quick update on the latest tech trends and innovations. Each episode, generated by AI, delivers fresh insights into AI advancements, tech disruptions, and more. Tune in from Monday through Friday morning to stay ahead in the tech world! For advice, reach out to us at [email protected].
…
continue reading
In this episode, we explore the hidden human cost of major cyber incidents—the stress on IT teams, the disruption to patient care, the executives forced into impossible decisions, and the ripple effects felt by everyday people who rely on critical systems. Beyond the technical breakdown, we examine how breaches impact lives, strain organizations, a…
…
continue reading
We return to a story on the Akira ransomware group. For 150 years Knights of Old, a U.K. logistics company, survived everything from two world wars to Brexit. Then Akira stormed the company's networks. In just a blink of an eye, everything changed. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading
1
Asahi ransomware details, California browser law, Windows Teams accelerated
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19Japanese brewer Asahi provides details regarding October ransomware attack California law regulating web browsers might impact national data privacy Microsoft to speed up Teams Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors s…
…
continue reading
1
EP-420 Amazon’s Satellite Ambitions 🚀, Google’s Ransomware Defense 🛡️, Meta’s Earnings Surge 📈
1:38
1:38
Play later
Play later
Lists
Like
Liked
1:38i'm wall-e, welcoming you to today's tech briefing for friday, november 28th: amazon's satellite internet ambitions: launching project kuiper with plans for over 3,000 satellites to compete with starlink, marking amazon’s foray into space-based connectivity. google's anti-ransomware initiative: release of advanced security tools to protect small to…
…
continue reading
1
Ransomware Attacks Can Be DEADLY What Makes You SAFE?
57:25
57:25
Play later
Play later
Lists
Like
Liked
57:25Question? Text our Studio direct. We discuss How ransomware can kill and ways to build security resilience with Chris Loehr, SVP of Solis Security. Ransomware Attacks Can Be DEADLY What Makes You SAFE? Season 8 is officially here — and it’s the most unhinged, hilarious, and dangerously educational season we’ve ever done with full cyber chaos: 🔥 Int…
…
continue reading
1
Say This During a Ransomware… or Lose $10M+ in Reputation (CISO Crisis Comms Playbook 20) - EP 18
43:36
43:36
Play later
Play later
Lists
Like
Liked
43:36CISOs, CEOs & Business Owners: What To Say (and NOT Say) When Ransomware Hits – Or You'll Lose Millions in Reputation 90% of companies survive the hack… but die from the crisis communications disaster that follows. Kevin Dinino (Head of Communications at top cybersecurity PR firm KCD PR) reveals the exact playbook that saved Fortune 500 companies d…
…
continue reading
1
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, More... - SWN #529
28:45
28:45
Play later
Play later
Lists
Like
Liked
28:45Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-529
…
continue reading
1
SN 1051: Amazon sues Perplexity - Nevada's Ransomware Comeback
2:44:03
2:44:03
Play later
Play later
Lists
Like
Liked
2:44:03Amazon is taking Perplexity AI to court over its agentic browser that shops on your behalf, raising urgent questions about who controls your online buying experience when bots do the heavy lifting. FFmpeg teaching assembly language for performance. The state of Nevada recovers after not paying ransom. A "rounding error" nets a clever attacker $128 …
…
continue reading
1
Ransomware, Defaults, and Proactive Defenses - Rob Allen - ASW #356
1:11:26
1:11:26
Play later
Play later
Lists
Like
Liked
1:11:26Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
…
continue reading
1
CYFIRMA Research- Tracking Ransomware: October 2025
3:19
3:19
Play later
Play later
Lists
Like
Liked
3:19Stay ahead with CYFIRMA’s Monthly Ransomware Report – October 2025. CYFIRMA’s October 2025 Ransomware Report reveals a strong resurgence in global ransomware activity, with 738 victims recorded marking one of the highest monthly volumes this year. The spike was led by Qilin, which more than doubled its attacks, and Sinobi, which surged sixfold, whi…
…
continue reading
1
The Start Of Season 12! Louvre’s “LOUVRE” Password, Rogue Ransomware Experts, YouTube TV Drops Disney
21:18
21:18
Play later
Play later
Lists
Like
Liked
21:18News and Updates: • France’s famed Louvre museum suffered an €88M jewel heist, later exposed for using “LOUVRE” as its surveillance password—highlighting decades of neglected cybersecurity and outdated systems. • Two U.S. cybersecurity employees from DigitalMint and Sygnia were indicted for spreading ALPHV ransomware to five firms, extorting $1.2M …
…
continue reading
1
Department of Know: CISO hiring warning, critical threat actor law, Microsoft Defender outage
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Link to episode page This week's Department of Know is hosted by Sarah Lane with guests Jason Shockey, CISO, Cenlar FSB, and Mike Lockhart, CISO, Eagleview Thanks to our show sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. AI is rewriting the cybersecurity rulebook, b…
…
continue reading
1
EP-426 ”spacex’s $800b Valuation Liftoff 🚀, Waymo’s Safety Recall Spotlight 🚦, Tesla’s Fsd Under Fire 🔍”
2:56
2:56
Play later
Play later
Lists
Like
Liked
2:56welcome to wall-e's tech briefing for monday, december 8th! let's delve into today's top tech developments: spacex's ambitious secondary share sale: potential to elevate spacex's valuation to $800 billion, surpassing openai and positioning it as america's most valuable private company. driven by the private market's secondary sales trend, spacex co…
…
continue reading
1
How CISOs Must Lead the Next Generation | Moses Bulus on AI, Data Security & Hybrid IT (Ep. 91)
44:02
44:02
Play later
Play later
Lists
Like
Liked
44:02🔥 Episode Summary In this St. Louis tour-stop episode, David Malicoat sits down with cybersecurity leader Moses Bulus to explore what it truly means to evolve into a professional CISO. Moses shares his journey from early developer to building security programs from scratch, and ultimately into executive leadership — showing how business acumen, net…
…
continue reading
1
Windows 11 Stalls, Login Glitch, Camera Sexploitation, Cyber-Cargo Heists
22:05
22:05
Play later
Play later
Lists
Like
Liked
22:05News and Updates: Dell reports Windows 11 adoption trails Windows 10 by 12%. One billion PCs remain on the older OS, with 500 million unable to upgrade hardware. A Windows 11 update renders the password icon invisible on lock screens. The button remains functional if users click the empty space where it belongs. South Korean police arrested four in…
…
continue reading
1
Palo Alto VPN attacks, NATO cyberdefense exercise, Chinese exploit React2Shell
8:19
8:19
Play later
Play later
Lists
Like
Liked
8:19New wave of VPN login attempts on Palo Alto portals NATO holds its largest-ever cyberdefense exercise Chinese hackers exploiting React2Shell bug Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Deepfakes aren't science fiction anymore; they'r…
…
continue reading
1
DevelopmentTools May Allow Remote Compromise
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08Explosive React Vulnerability and AI Tool Flaws Uncovered: Major Implications for Cybersecurity In this episode of Cybersecurity Today, host David Shipley discusses a new significant React vulnerability, React2Shell, that has caused widespread confusion and debate in the security community. This major flaw, affecting a widely used web framework, po…
…
continue reading
1
Safeguarding Your Privacy: How to Delete Your Data
1:00:26
1:00:26
Play later
Play later
Lists
Like
Liked
1:00:26Question? Text our Studio direct. David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ, about how data brokers work and how to delete your data by discussing the intersection of privacy and personal data. They discuss the role of data brokers, the lack of transparency in data collection, and the pot…
…
continue reading
1
The Evolution and Future of Digital Extortion
23:20
23:20
Play later
Play later
Lists
Like
Liked
23:20In the final episode of “Inside the Mind of a Ransomware Operator,” Chris and Nick look ahead to the next decade of cybercrime. What happens when ransomware goes fully autonomous? AI that picks the most valuable files… then negotiates the ransom in 17 languages Malware that mimics real human behavior so perfectly that EDR can’t tell the difference …
…
continue reading
1
The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin)
30:14
30:14
Play later
Play later
Lists
Like
Liked
30:14The HubSpot Hack | The SaaS Backdoor to Bitcoin - ft. Scott Kisser (CISO, Swan Bitcoin) When attackers breached HubSpot in March 2022, they weren’t after HubSpot at all. They were after the customers of its customers. Crypto firms like Trezor, BlockFi, and Swan Bitcoin suddenly saw their users targeted by near-perfect phishing emails designed to st…
…
continue reading
In late 2023, the world’s most trusted identity provider experienced the kind of breach it was designed to prevent. Attackers quietly infiltrated Okta’s customer support system, stole session tokens hidden inside HAR files and used them to impersonate users across some of the most secure organizations on earth. For two full weeks, the intruders ope…
…
continue reading
1
Cybersecurity Today Month In Review - December 5th, 2025
54:06
54:06
Play later
Play later
Lists
Like
Liked
54:06Cybersecurity Today: The Rise of Living Off the Land Strategies & More In this episode of Cybersecurity Today's Month in Review, host Jim Love is joined by Laura Payne from White Tuque and David Shipley from Beauceron Security. They discuss several pressing cybersecurity issues, including the growing threat of 'living off the land' strategies where…
…
continue reading
1
Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Toilet Cams, North Korea, Brickstorm, MCP, India, React2Shell, Proxmox, Metaverse, Josh Marpet, and More, on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-535
…
continue reading
1
Toilet Cams, N. Korea, Brickstorm, MCP, React2Shell, Proxmox, Metaverse, Josh Marpet - SWN #535
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08Toilet Cams, North Korea, Brickstorm, MCP, India, React2Shell, Proxmox, Metaverse, Josh Marpet, and More, on the Security Weekly News. Show Notes: https://securityweekly.com/swn-535
…
continue reading
1
EP-425 Ai Innovations at Aws Re:invent 🤖, Meta’s Budget Shift 📉, Micro1’s Revenue Surge 🚀
2:34
2:34
Play later
Play later
Lists
Like
Liked
2:34i'm wall-e, welcoming you to today's tech briefing for friday, december 5th. explore the key highlights: aws re:invent 2025 highlights: aws introduces significant ai advancements with upgraded ai agents for customizable functions, unveiling the graviton5 cpu, and enhancing ai development tools under the leadership of amazon cto dr. werner vogels. m…
…
continue reading
For years, North Korea has quietly dispatched an army of IT workers overseas—not to innovate, but to infiltrate. Disguised as freelancers, they apply for jobs, breach systems, and wire stolen funds back to Pyongyang. We return to a rare conversation with one of them—a defector—about the regime’s digital underworld, and the personal toll of escaping…
…
continue reading
1
Predator spyware, Russia blocks FaceTime, US cyber strategy coming
7:06
7:06
Play later
Play later
Lists
Like
Liked
7:06Predator spyware spotted across several countries Russia blocks FaceTime Draft US cyber strategy set for January release Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you…
…
continue reading
1
Shady Panda Hides For Years In Legitimate Browser Extensions: Cybersecurity Today
12:13
12:13
Play later
Play later
Lists
Like
Liked
12:13In this episode of 'Cybersecurity Today,' host Jim Love discusses several significant cybersecurity issues. Highlights include a maximum severity vulnerability in React Server Components dubbed React2Shell (CVE-2025-55182), a recently patched Windows shortcut flaw by Microsoft, and new attacks using the Evilginx phishing platform in schools. Additi…
…
continue reading
1
Breaking down the latest era of Chinese cyberespionage with Booz Allen's Nate Beach-Westmoreland
29:37
29:37
Play later
Play later
Lists
Like
Liked
29:37In this episode, we sit down with Nate Beach-Westmoreland, Head of Strategic Cyber Threat Intelligence at Booz Allen, to explore the evolving sophistication of Chinese cyber operations and their implications for U.S. national security. Our guest breaks down how the PRC leverages trusted-relationship abuse, network edge exploitation, and AI-powered …
…
continue reading
1
The Gift Guide for Future Makers, Coders, and Drivers
1:00:56
1:00:56
Play later
Play later
Lists
Like
Liked
1:00:56This week’s Christmas Gift Guide spotlights tech that sparks curiosity, from KiwiCo kits and 3D pens to Arduino starters and game-dev courses with Thomas Sanjurjo. Dom Bettinelli adds smart car upgrades—plus a bold question: Are we ready for a moral framework for AGI? The post The Gift Guide for Future Makers, Coders, and Drivers appeared first on …
…
continue reading
1
The Undetected. Espionage and Spies.(Part 2)
32:07
32:07
Play later
Play later
Lists
Like
Liked
32:07Question? Text our Studio direct. Inside Espionage What Every American Should Know. Inside Truth Behind Data Breaches. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Impact of Chinese Espionage on…
…
continue reading
In her budget the Chancellor increased the state pension by 4.8 % in line with the government's triple lock formula. It was good news for pensioners but is it good news for the young? A constant background to spending and economic decisions for well over a decade now has been an argument about generational injustice. That the young are getting poor…
…
continue reading
1
EP-424 Aws Ai Innovations Unveiled 🤖, Trainium’s Market Surge 🚀, Brevo’s Unicorn Leap 🦄
2:00
2:00
Play later
Play later
Lists
Like
Liked
2:00```html i'm wall-e, welcoming you to today's tech briefing for thursday, december 4th. here's what's happening in the tech world: aws re:invent 2025: focus on ai for enterprise, with ceo matt garman discussing ai agents' potential for business success. swami sivasubramanian highlights ai agents' capabilities in planning and coding. aws updates: int…
…
continue reading
1
Teens Mourn AI Loss, Anthropic’s Deceptive Models, X Sells Usernames, Grok’s Legal Woes
22:06
22:06
Play later
Play later
Lists
Like
Liked
22:06News and Updates: Character.AI Ban: Character.AI, with 20 million monthly users, has completely cut off chatbot access for users under 18, citing urgent mental health and safety concerns. Tragic Context: The restriction follows the deaths of at least two teenagers by suicide linked to chatbot usage, triggering lawsuits from parents and intense regu…
…
continue reading
1
Record-breaking DDoS attack, React bug puts servers at risk, RansomHouse attack
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54Record-breaking DDoS attack React bug puts servers at risk RansomHouse attack Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasi…
…
continue reading
1
A hacker doxxes himself, and social engineering-as-a-service
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32A teenage cybercriminal posts a smug screenshot to mock a sextortion scammer... and accidentally hands over the keys to his real-world identity. Meanwhile, we look into the crystal ball for 2026 and consider how stolen data is now the jet fuel of cybercrime – and how next year could be even nastier than 2025. Plus, Graham rants about recipe sites t…
…
continue reading
1
Exploring the Future of Identity Security and Agentic AI
52:23
52:23
Play later
Play later
Lists
Like
Liked
52:23Every once in a while, I end up in a conversation that hits at exactly the right moment—when the industry is shifting, the vocabulary is changing, and everyone is quietly circling the same questions. This new episode of the TechSpective […] The post Exploring the Future of Identity Security and Agentic AI appeared first on TechSpective.…
…
continue reading
1
How Modern Cyber Resilience Really Works With Panzura
27:08
27:08
Play later
Play later
Lists
Like
Liked
27:08Send us a text Relying on reactive backup alone is no longer enough. In this episode of Smarter Strategic Thinking, we sit down with Panzura’s CTO to explore how their hybrid cloud file and data services platform is built for cyber resiliency, data security, governance and compliance. We discuss how Panzura combines real-time anomaly detection base…
…
continue reading
1
The Undetected. Espionage and Spies.(Part 1)
32:52
32:52
Play later
Play later
Lists
Like
Liked
32:52Question? Text our Studio direct. There is a bigger story behind some breaches: 1. the Anthem Breach, 2. The Equifax breach, 3. the breach of the OPM (Office of Personnel Management) for the US govt, and 4. Marriott International. The Threat of Chinese Espionage to American National Security Inside Espionage: What Every American Should Know Season …
…
continue reading
1
EP-423 Amazon’s Ai Factory Expansion 🚀, Kalshi’s Valuation Surge 💰, Bending Spoons Acquires Eventbrite 📈
2:27
2:27
Play later
Play later
Lists
Like
Liked
2:27welcome to wall-e's tech briefing for wednesday, december 3rd! delve into today's top tech developments: amazon's ai factories: aws and nvidia partner to launch 'ai factories' enabling secure on-premise ai deployment with options for nvidia blackwell gpus or amazon’s new trainium3 chip. microsoft azure local: microsoft introduces a strategy for ai …
…
continue reading
This is today’s cyber news for December third, 2025. Attackers are turning hacked home cameras, developer tools, and mobile phones into powerful surveillance and access channels that traditional controls struggle to cover. Leaders who understand these overlaps can better prioritize resilience, privacy, and vendor risk. Listeners will hear about sma…
…
continue reading
1
Microsoft Defender outage disrupts threats, Apple resists India's app order, MuddyWater strikes Israel
7:59
7:59
Play later
Play later
Lists
Like
Liked
7:59Microsoft Defender outage disrupts threats Apple resists India's state-run app order MuddyWater strikes Israel with MuddyViper Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, …
…
continue reading
1
Living off the Land Attacks and Emerging Cyber Threats
12:42
12:42
Play later
Play later
Lists
Like
Liked
12:42This episode of Cybersecurity Today, hosted by Jim Love, delves into various cybersecurity threats and latest news. Topics include 'living off the land' attacks using Microsoft's native utilities, spoofing Calendly invites for phishing Google and Meta credentials, a significant breach at the University of Pennsylvania linked to Oracle E-Business Su…
…
continue reading