SecureMac presents The Checklist. Hosted by Ken Ray, each week The Checklist hits security topics for your Mac and iOS devices. From how-to's and safety tips, to security news of the day, The Checklist by SecureMac takes a conversational, solutions oriented approach to security for the average user. Check in each Thursday for a new Checklist!
…
continue reading
Security Operations Podcasts
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Your Weekly Source for Linux GNews from the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Security Management Highlights brings the security professional expert interviews and information on the most critical industry topics. Join host Brendan Howard as he interviews thought leaders and industry professionals, as well as editors from the magazine.
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
SpyTalk lives at the intersection of intelligence operations, foreign policy, homeland security, and military strategy. Hosted by veteran national security journalist Jeff Stein, the podcast features exclusives by SpyTalk’s roster of longtime reporters, news and profiles of US and foreign spymasters, and interviews with policymakers and expert authors. There’s nothing quite like it—a place for experts and laypersons alike, who enjoy national security scoops and insights by SpyTalk's subject ...
…
continue reading
Join Senator Ted Cruz and co-host Ben Ferguson as they break down the most important news stories of the day and reveal what they mean for you. On "Verdict with Ted Cruz,” you will go behind the scenes of the political debates that define our country. "Verdict with Ted Cruz" is being brought to you by Jobs, Freedom, and Security PAC, a political action committee dedicated to supporting conservative causes, organizations, and candidates across the country. In 2022, Jobs, Freedom, and Security ...
…
continue reading
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
…
continue reading
Enter the secretive world of spies, espionage, and covert operations. Hosted by former CIA analyst turned spy novelist, David McCloskey, and veteran security correspondent, Gordon Corera, this podcast unravels real-life spy stories, intelligence secrets, and the hidden power struggles shaping global events. From Cold War espionage to modern-day intelligence agencies like the CIA, MI6, and Mossad, explore the world of double agents, classified missions, and the shadowy figures who operate in ...
…
continue reading
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android's a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
…
continue reading
Android Backstage, a podcast by and for Android developers. Hosted by developers from the Android engineering team, this show covers topics of interest to Android programmers, with in-depth discussions and interviews with engineers on the Android team at Google. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs
…
continue reading
Destination Linux is a weekly show where Ryan, Jill, & guests share their passion for Linux & Open Source. Destination Linux is a show for all experience levels, whether you’re a beginner to Open Source or a Guru of Sudo, this is the podcast for you. Destination Linux covers a wide range of topics from the latest news, discussions on Linux & Open Source, gaming on Linux, unique in-depth interviews and much more!
…
continue reading
The Cognitive Crucible explores all aspects of our generational challenge: Cognitive Security. It is the only podcast dedicated to increasing interdisciplinary collaboration between information operations practitioners, scholars, and policy makers. Join the discussion forum each week with the Cognitive Crucible host, John Bicknell. Have a question or would like to suggest a topic go to: https://information-professionals.org/podcasts/cognitive-crucible.
…
continue reading
A podcast about all things energy, brought to you by the Australian Energy Market Operator.
…
continue reading
Explore the evolving world of application delivery and security. Each episode will dive into technologies shaping the future of operations, analyze emerging trends, and discuss the impacts of innovations on the tech stack.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Entry & Exit is a podcast about building, scaling, and exiting security and fire businesses. Hosts Stephen Olmon and Collin Trimble share their journey growing Alarm Masters through acquisitions and organic growth, along with the lessons they’ve learned along the way. From recurring revenue strategies to sales, operations, and M&A, Entry & Exit gives business owners and entrepreneurs an inside look at what it takes to succeed in the security industry. Whether you’re starting your first compa ...
…
continue reading
The Podcast of Brushbeater.org, dedicated to training in small group communications, operations and intelligence tradecraft with a splash of current events.
…
continue reading
Comedy + "Conspiracy Theory". Welcome to a shenanigan infused journey into the mind of this particular Garbage Can Dood...
…
continue reading
Sea Control is CIMSEC's Flagship podcast. We focus on maritime security, naval affairs, and defense and foreign policy.
…
continue reading
Stay ahead of cyberthreats with expert insights and practical security . Led by an ensemble cast of industry thought leaderss offering in-depth analysis and practical advice to fortify your organization's defenses.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it's not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they're secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Welcome to the Ontic Connected Intelligence Podcast, the show for corporate security professionals who are elevating the practice and perception of security. Whether you’re a seasoned professional or new to the field, our podcast offers valuable insights and practical advice to help you navigate the complexities of modern corporate security. Hosted by Fred Burton and Manish Mehta, our episodes are packed with real-world examples and forward-thinking solutions to help you secure your organiza ...
…
continue reading
The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
…
continue reading
“At the Boundary” is going to feature global and national strategy insights that we think our fans will want to know about. That could mean live interviews, engagements with distinguished thought leaders, conference highlights, and more. It will pull in a broad array of government, industry, and academic partners, ensuring we don’t produce a dull uniformity of ideas. It will also be a platform to showcase all the great things going on with GNSI, our partners, and USF.
…
continue reading
This podcast distills the signal from the noise about enterprise IT digital transformation and operations in the era of Agile, DevOps and distributed applications. Interviews feature expert guests in conversation with IT journalism veteran Beth Pariseau, Senior News Writer at Informa TechTarget.
…
continue reading
Commissionaires Nova Scotia proudly presents Purpose & Protection, a podcast dedicated to the people behind Canada’s security: veterans, their families, civilians and all those dedicated to keeping our communities safe. Each episode explores the lived experiences of those who’ve served, those who support them, and those shaping the future of Canada’s security landscape. From the frontlines to the home front, you’ll hear stories of resilience, leadership and purpose. As the largest private em ...
…
continue reading
Cyber Daily News is a fast, no nonsense cybersecurity podcast designed for professionals, builders, and anyone who wants to stay ahead of real world threats. Each episode delivers a concise breakdown of the most important cyber incidents, vulnerabilities, exploits, and security trends shaping the day. You will hear clear explanations of breaches, ransomware campaigns, zero day vulnerabilities, nation state activity, and major security advisories, without hype or filler. The focus is on what ...
…
continue reading
The Elara Edge is a thought leadership forum of military and industry experts providing commentary and analysis on the latest news developments in national security - with an emphasis in space and aerospace applications.
…
continue reading
The Practical 365 Podcast is a fortnightly show covering all things Microsoft 365, Copilot, AI, MIcrosoft Teams, Exchange & Cybersecurity plus any hot technology topics that are worth a deep-dive to help you learn more and get the real-world view. Your hosts are Microsoft MVPs Steve Goodman, Paul Robichaux and Quest's Bastiaan Verdonk, who will share their expert opinions on the talk of the week, and Q&A with special guests.
…
continue reading
If you wish to know what it's really like to make the life and death decisions portrayed in the movies by James Bond or on TV by Homeland's, Cary Matherson, then Black Spy Podcast is the show for you. If you're interested in the clandestine world of secret intelligence, espionage, counter-terrorism and national security, then this definitely your must listen Podcast! Every week, along with a different successful or famous guest who's always been interested in the secret services, ex officer, ...
…
continue reading
The best in maritime security, technology, history, and international affairs from CIMSEC - your moment of power point rehab.
…
continue reading
From going undercover on the dark web to hunting down ransomware that doesn’t want to be found, our co-hosts Duck and David bring a unique perspective to real-world cybersecurity. ”Tales from the SOC” is your go-to podcast for exploring the weird and wonderful world of the Security Operations Center. Join us on this journey, because understanding is the first step to securing your world. For more information about our human-led cybersecurity services, head to: https://solcyber.com/
…
continue reading
The CISO Signal is a true cybercrime podcast investigating the most consequential breaches, insider threats, takedowns, and nation-state hacks shaping today’s digital world. Each episode combines gripping, cinematic storytelling with exclusive interviews from top CISOs and cybersecurity leaders. Together, we break down how the world’s most dangerous cyberattacks unfolded and what today’s security professionals must learn from them. Whether you’re a Chief Information Security Officer, a secur ...
…
continue reading
Join hosts Ned Bellavance and Kyler Middleton as they dive deep into the challenges of DevOps from the perspective of seasoned practitioners. You'll hear from expert guests—technical leaders, trainers, and consultants with years of hands-on experience—discussing the nuances of DevOps. From AWS to Azure, networking to security, automation to modern cloud environments, each weekly episode equips you with the insights to confidently address tech and business challenges such as resilience, cost ...
…
continue reading
1
From IoT to AIoT: Operational and Security Challenges for Modern Enterprises
27:24
27:24
Play later
Play later
Lists
Like
Liked
27:24Industrial enterprises are undergoing significant transformation as connected devices reshape the way they operate. IoT platforms provide new opportunities for automation, predictive maintenance, and more efficient device management. But these benefits come with challenges. In this episode of the Security Strategist podcast, host Trisha Pillay spea…
…
continue reading
1
Breaking Barriers: A conversation with HCol Doug Ruck, KC
43:29
43:29
Play later
Play later
Lists
Like
Liked
43:29In this episode of Purpose & Protection, host Barry Pitcher, CEO of Commissionaires Nova Scotia, speaks with Honourary Colonel Doug Ruck, KC: a pioneer in Canadian public service and a champion for diversity, equity, and inclusion. Doug shares his inspiring journey of breaking barriers, the evolution of Commissionaires, and why representation matte…
…
continue reading
Cyber Daily News January 8, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- New n8n Vulnerability (CVE-2026-21858) Allows Unauthenticated File Access and RCEhttps://thecyberexpress.com/cve-2026-21858-n8n-webhook-vulnerability/- Australian Insurer Prosura Confirms…
…
continue reading
1
BONUS POD: Woman Killed After Attempting to Ram ICE Officer
20:25
20:25
Play later
Play later
Lists
Like
Liked
20:25Incident Overview ICE agents were conducting operations in Minneapolis when a woman blocked their vehicles and refused repeated commands to exit her car. She allegedly accelerated toward an ICE agent, prompting the officer to fire through the windshield, resulting in her death. The shooting is described as defensive and necessary to prevent harm to…
…
continue reading
1
AI data management and governance take center stage in 2026
27:58
27:58
Play later
Play later
Lists
Like
Liked
27:58You might recognize Rob Strechay from his appearances on TheCube livestreaming videos during industry conferences, but he's worn many hats in the industry over the years. In this wide-ranging discussion, he looks back at how AI data management evolved in 2025, and predicts that AI "governance, security and data quality are going to be all the rage …
…
continue reading
1
SANS Stormcast Thursday, January 8th, 2026: HTML QR Code Phishing; n8n vulnerability; Powerbank Feature Creep
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23A phishing campaign with QR codes rendered using an HTML table Phishing emails are bypassing filters by encoding QR codes as HTML tables. https://isc.sans.edu/diary/A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table/32606 n8n vulnerabilities In recent days, several new n8n vulnerabilities were disclosed. Ensure that …
…
continue reading
1
D2DO291: From Politics to Machine Learning and AI Engineering
41:43
41:43
Play later
Play later
Lists
Like
Liked
41:43Marina Wyss, Senior Applied Scientist at Twitch, joins Kyler and Ned to discuss her unique path from political science to AI Engineering. Wyss clarifies the difference between AI Engineering and Machine Learning Engineering and offers practical advice for aspiring engineers who want to incorporate data science, AI, and machine learning into their w…
…
continue reading
Cyber Daily News January 7, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Hackers actively exploit critical RCE flaw in legacy D-Link DSL routershttps://securityaffairs.com/186616/hacking/hackers-actively-exploit-critical-rce-flaw-in-legacy-d-link-dsl-routers.h…
…
continue reading
1
Buying a Business? Don't Make These Mistakes in the First 90 Days
41:35
41:35
Play later
Play later
Lists
Like
Liked
41:35Avoid expensive post-close mistakes by running a calm, disciplined first 90 days after acquiring a security or life-safety business. In this episode of Entry & Exit, hosts Stephen Olmon and Collin Trimble break down what actually happens after you close—and why most buyers hurt themselves by moving too fast. Drawing from real acquisitions (and real…
…
continue reading
1
Venezuela Victory part 2-Historically Transforming Latin America & What Happens Next
43:21
43:21
Play later
Play later
Lists
Like
Liked
43:21Cilia Flores’ Role: Far from being a symbolic first lady, Flores is a mastermind behind corruption and drug trafficking. She was sanctioned by the U.S. Treasury and linked to major criminal activities, including her nephews’ cocaine smuggling. Western Hemisphere Strategy: The discussion emphasizes the Monroe Doctrine and its modern interpretation u…
…
continue reading
1
The Evolution of Aviation Security: Managing Risk at a Global Scale with Rich Davis
35:25
35:25
Play later
Play later
Lists
Like
Liked
35:25In this episode, Fred Burton sits down with Rich Davis, former Chief Security Officer of United Airlines, to explore the evolution of aviation security and what it takes to manage risk at a truly global scale. Drawing on decades of leadership experience, Rich shares how collaboration, intelligence sharing, and a strong duty of care mindset have res…
…
continue reading
1
Kimwolf Bot Strikes - "Routers Will Not Protect You"
13:05
13:05
Play later
Play later
Lists
Like
Liked
13:05In this episode of Cybersecurity Today, host Jim Love discusses the latest in cybersecurity threats including the rapidly growing Kim Wolf botnet affecting millions of devices, the rising threats to file-sharing environments, and the intersection of cybercrime with physical supply chains. He also covers an audacious hacktivist takedown of white sup…
…
continue reading
1
SANS Stormcast Wednesday, January 7th, 2026: Tailsnitch Review; D-Link DSL EoL Vuln; TOTOLINK Unpatched Vuln
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44Tool Review: Tailsnitch Tailsnitch is a tool to audit your Tailscale configuration. It does a comprehensive analysis of your configuration and suggests (or even applies) fixes. https://isc.sans.edu/diary/Tool%20Review%3A%20Tailsnitch/32602 D-Link DSL Command Injection via DNS Configuration Endpoint A new vulnerability in very old D-Link DSL modems …
…
continue reading
1
115. Intelligence Scoop: Why Venezuela Isn’t About Oil (Ep 2)
48:56
48:56
Play later
Play later
Lists
Like
Liked
48:56President Trump is now “running Venezuela”, but how did we get to this point? Why would a US president want to control Latin America? And is it really all about drugs and oil? Listen as David and Gordon explore the reasons behind Trump’s attack on Venezuela and try to understand why this Latin American country holds so much potential for the future…
…
continue reading
1
Bonus: Daily Review with Clay and Buck - Jan 6 2026
1:03:46
1:03:46
Play later
Play later
Lists
Like
Liked
1:03:46Meet my friends, Clay Travis and Buck Sexton! If you love Verdict, the Clay Travis and Buck Sexton Show might also be in your audio wheelhouse. Politics, news analysis, and some pop culture and comedy thrown in too. Here’s a sample episode recapping four takeaways. Give the guys a listen and then follow and subscribe wherever you get your podcasts.…
…
continue reading
1
How the World Got Owned Episode 1: The 1980s
1:03:36
1:03:36
Play later
Play later
Lists
Like
Liked
1:03:36In this special documentary episode, Patrick Gray and Amberleigh Jack take a historical dive into hacking in the 1980s. Through the words of those that were there, they discuss life on the ARPANET, the 414s hacking group, the Morris Worm, the vibe inside the NSA and a parallel hunt for German hackers happening at a similar time to Cliff Stoll’s fam…
…
continue reading
1
How the World Got Owned Episode 1: The 1980s
1:03:36
1:03:36
Play later
Play later
Lists
Like
Liked
1:03:36In this special documentary episode, Patrick Gray and Amberleigh Jack take a historical dive into hacking in the 1980s. Through the words of those that were there, they discuss life on the ARPANET, the 414s hacking group, the Morris Worm, the vibe inside the NSA and a parallel hunt for German hackers happening at a similar time to Cliff Stoll’s fam…
…
continue reading
Cyber Daily News January 6, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- European Commission Investigates Grok AI After Explicit Images of Minors Surfacehttps://thecyberexpress.com/european-commission-investigates-grok-ai/- Critical n8n Vulnerability Allows Ar…
…
continue reading
1
Shift left into runtime: Vibe coding and AI guardrails
20:35
20:35
Play later
Play later
Lists
Like
Liked
20:35Coding pipelines are evolving and AI agents are taking the wheel. In this episode of Pop Goes the Stack, F5's Joel Moses teams up with Buu Lam to dive into “vibe coding”—where tools like Claude Code and GitHub Copilot plan, build, and optimize apps faster than humans can debate lint rules. But is faster better? While agentic AI unlocks game-changin…
…
continue reading
1
BONUS POD: Trump’s Plan to Rebuild Venezuela’s Broken Oil Empire plus Maduro in the Big Apple
14:59
14:59
Play later
Play later
Lists
Like
Liked
14:59Trump’s stance on Venezuela’s oil and U.S. role Trump is asserting the U.S. will “run” or strongly direct efforts in Venezuela, with U.S. oil companies going in to rebuild the country’s “broken” oil infrastructure. Trump is quoted saying elections should occur “at the right time” after stabilization. Venezuela’s oil reserves are worth trillions of …
…
continue reading
1
#239 Ian Brown on Snowmobiles and Grand Ideals
54:07
54:07
Play later
Play later
Lists
Like
Liked
54:07The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. John Boyd is well known to have formally written down …
…
continue reading
1
SANS Stormcast Tuesday, January 6th, 2026: IPKVM Risks; Tailsnitch; Net-SNMP Vuln;
6:08
6:08
Play later
Play later
Lists
Like
Liked
6:08Risks of OOB Access via IP KVM Devices Recently, cheap IP KVMs have become popular. But their deployment needs to be secured. https://isc.sans.edu/diary/Risks%20of%20OOB%20Access%20via%20IP%20KVM%20Devices/32598 Tailsnitch Tailsnitch is a tool to review your Tailscale configuration for vulnerabilities https://github.com/Adversis/tailsnitch Net-SNMP…
…
continue reading
1
Episode 443: Managing in the Antarctic
1:41:31
1:41:31
Play later
Play later
Lists
Like
Liked
1:41:312026 has begun. Lets look forwards and no backwards and talk about what we have in hope for the year. What are we hoping to see from a hardware perspective? What are we hanging out for at WWDC this year? What predictions do we have for our favourite community projects, conferences, vendors and integrations? What do we resolve to do more, of, less o…
…
continue reading
1
Cyber Resilience On-Orbit a ‘Nervous System’ for Detecting Threats
41:55
41:55
Play later
Play later
Lists
Like
Liked
41:55In response to evolving cyber threats that can manipulate and compromise a satellite’s data, the United States Space Force is heightening its focus on “space cyber,” or the cybersecurity of space systems on-orbit. One emerging solution toward this effort is the Cyber Reslience On-Orbit tool (CROO), a software program that focuses on not just securi…
…
continue reading
1
What Comes Next? Future-Proofing Exercises Can Unveil Your Path Forward
28:51
28:51
Play later
Play later
Lists
Like
Liked
28:51In an uncertain world, it can be difficult to see past the next 48 hours. But future-proofing exercises can help security and business leaders get more strategic about what they want to achieve in the next few years and how to get there, says futurist Heather Vescent. She helps outline how to step back and take a different worldview to uncover emer…
…
continue reading
Breaking down the most successful raid in modern American history, what it means for foreign policy, and the left's complete and utter meltdown.By RadioContra
…
continue reading
1
330: Arch, Bazzite, elementary, Mint, Kali, Parrot OS, Qubes OS, & more 2026 Linux news
28:27
28:27
Play later
Play later
Lists
Like
Liked
28:27video: https://youtu.be/wFDzItN6Ags Download as MP3 Support the Show Become a Patron = tuxdigital.com/membership Store = tuxdigital.com/store Chapters: 00:00 Intro 00:55 Arch Linux Kicks Off 2026 with New Release 02:59 Universal Blue Year in Review 03:39 Bazzite End of Year Update 04:49 Aurora Year in Review 05:46 Project Bluefin Year in Review 07:…
…
continue reading
Cyber Daily News January 5, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Critical IBM API Connect Vulnerability Enables Authentication Bypasshttps://thecyberexpress.com/ibm-api-connect-security-vulnerability/- Sedgwick discloses data breach after TridentLocker…
…
continue reading
1
Maduro Arrested-Why Trump Ordered this Historic Attack & the Detailed Legal Basis for his Authority to Do So
52:19
52:19
Play later
Play later
Lists
Like
Liked
52:19Event Summary (WATCH: PRESIDENT TRUMP PRESS CON HERE) The U.S. military executed a highly complex and precise operation in Caracas, Venezuela, to apprehend Maduro. The mission involved over 150 aircraft, advanced coordination across multiple military branches, and cyber and space operations. The operation was completed without any American casualti…
…
continue reading
1
Infrastructure Under Attack: Cybersecurity Today for Monday January 5, 2026
11:57
11:57
Play later
Play later
Lists
Like
Liked
11:57In this episode of 'Cybersecurity Today', host David Shipley discusses significant cyber events and their implications. The podcast explores hints by President Donald Trump regarding the use of cyber tactics in a U.S. operation that resulted in a power outage in Venezuela. The episode also delves into the April 2025 data breach at Nova Scotia Power…
…
continue reading
1
SANS Stormcast Monday, January 5th, 2026: MongoBleed/React2Shell Recap; Crypto Scams; DNS Stats; Old Fortinet Vulns
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57Cryptocurrency Scam Emails and Web Pages As We Enter 2026 Scam emails are directing victims to confidence scams attempting to steal cryptocurrencies. https://isc.sans.edu/diary/Cryptocurrency%20Scam%20Emails%20and%20Web%20Pages%20As%20We%20Enter%202026/32594 Debugging DNS response times with tshark tshark is a powerful tool to debug DNS timing issu…
…
continue reading
1
114. Intelligence Scoop: How Trump Captured Maduro in Venezuela (Ep 1)
47:54
47:54
Play later
Play later
Lists
Like
Liked
47:54What is actually happening between the US and Venezuela? Trump has captured President Maduro of Venezuela and extradited him to the US, but how was he able to pull off such a complex, and legally contentious, plot? Listen as David and Gordon take a look inside the raid that brought down Maduro and share the intelligence scoop on why it was so succe…
…
continue reading
Cyber Daily News January 4, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- French authorities investigate AI ‘undressing’ deepfakes on Xhttps://securityaffairs.com/186460/ai/french-authorities-investigate-ai-undressing-deepfakes-on-x.html- President Trump blocks…
…
continue reading
Cyber Daily News January 3, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Covenant Health data breach after ransomware attack impacted over 478,000 peoplehttps://securityaffairs.com/186439/data-breach/covenant-health-data-breach-after-ransomware-attack-impacted…
…
continue reading
1
Fake Autism Centers in Fraudesota, Elon Musk's Warning & Will we See Jail Time for High Lvl Officials Week In Review
33:02
33:02
Play later
Play later
Lists
Like
Liked
33:02Daycare & Autism Centers Fraud Numerous daycare centers and autism facilities have received millions in state funding but have no children enrolled. Example: A daycare shut down for violations reopened under a new name and continued receiving funds. Home Healthcare Fraud A single building allegedly housed 14 Somali-owned healthcare companies, all b…
…
continue reading
1
Final Encore Episode - Research, Cybersecurity Awareness and Training
1:23:55
1:23:55
Play later
Play later
Lists
Like
Liked
1:23:55In this episode, host Jim Love discusses the importance of cybersecurity awareness and training, featuring insights from Michael Joyce of the Human-Centric Cybersecurity Partnership at the University of Montreal and David Shipley of Beauceron Security. They explore the impact of cybersecurity awareness programs, the decay of sustained vigilance pos…
…
continue reading
1
A special mailbag episode with book recommendations
3:01:15
3:01:15
Play later
Play later
Lists
Like
Liked
3:01:15(Presented by Material Security: We protect your company’s most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 79: We cover MongoBleed (CVE‑2025‑14847), exposed MongoDB deployments, and the sad realization that zero-day attacks are a normal, ev…
…
continue reading
Christine Kuehn talks about her shocking discovery in “Family of Spies" Family of Spies https://us.macmillan.com/books/9781250344465/familyofspies/ Follow Jeff Stein on Twitter: https://twitter.com/SpyTalker Follow Karen Greenberg on Twitter https://x.com/KarenGreenberg3 Follow Michael Isikoff on Twitter: https://twitter.com/isikoff Follow SpyTalk …
…
continue reading
Cyber Daily News January 2, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- China’s New Cybersecurity Law Is Here — And It Changes Everything for Businesseshttps://thecyberexpress.com/china-cybersecurity-law-2026/- IBM warns of critical API Connect bug enabling r…
…
continue reading
1
A Look Inside Elon Musk's Vision: Complete Interview
55:05
55:05
Play later
Play later
Lists
Like
Liked
55:05Government Waste and Reform Musk discusses shocking inefficiencies in the U.S. federal government, such as: Excessive software licenses and media subscriptions (often double the number of employees). Duplicate credit cards and unexplained payments. Fraudulent NGO funding (e.g., billions allegedly misused). He emphasizes that the government is essen…
…
continue reading
Cyber Daily News January 1, 2026Cyber Daily News is also available via podcast!https://feeds.transistor.fm/cyber-daily-newsStories mentioned in today's briefing:- Shai-Hulud Supply Chain Attack Drained $8.5 Million from Trust Wallet Usershttps://thecyberexpress.com/shai-hulud-attack-trust-wallet/- Singapore CSA warns of maximun severity SmarterMail…
…
continue reading
1
BONUS POD: Trump’s Healthcare Framework Unveiled w Big, YUGE & Bold Savings
12:40
12:40
Play later
Play later
Lists
Like
Liked
12:40Objective of the Plan Lower healthcare costs for Americans. Extend expiring ACA subsidies temporarily while transitioning to a new system. Shift financial benefits from insurance companies to individuals. Proposed Measures Two-year extension of Enhanced Premium Tax Credits (originally expanded during COVID-19). Income eligibility cap for subsidies …
…
continue reading