A podcast about web design and development.
…
continue reading
Web Security Podcasts
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
Podcasts from Akamai's Security Team.
…
continue reading
Daniel discusses and explains various topics on computers and technology.
…
continue reading
A "by Hackers for Hackers" podcast focused on technical content ranging from bug bounty tips, to write-up explanations, to the latest hacking techniques.
…
continue reading
Freelancing and marketing nuggets for web designers, without the fluff. TheFreelancerPodcast.com
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Listen in on brief discussions among Cisco and industry experts about the latest issues in network security and the solutions available to help address your business challenges.
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Hosted by Emma and Shi Khai of LongHash Ventures, we chat with the most innovative founders of Web 3.0 building more open, inclusive, and equitable financial and social infrastructure.
…
continue reading
Keeping you up to speed with the latest web security news
…
continue reading
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
…
continue reading
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Cut through the noise with Brutally Honest Security, hosted by Eric Taylor, Founder & Chief Forensics Officer at Barricade Cyber Solutions. From ransomware and BEC to DFIR, dark web activity, and the latest breaches, Eric delivers blunt, no-nonsense insights that anyone in cybersecurity can follow. No script. No limits. If it matters in cyber, it’s fair game.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
The Irregular Warfare Podcast explores an important component of war throughout history. Small wars, drone strikes, special operations forces, counterterrorism, proxies—this podcast covers the full range of topics related to irregular war and features in-depth conversations with guests from the military, academia, and the policy community. The podcast is a collaboration between the Modern War Institute at West Point and Princeton University’s Empirical Studies of Conflict Project.
…
continue reading
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
…
continue reading
Every week Wayne Scott from brings together a team of technology journalists from http://www.ITProPortal.com to discuss, share analysis and argue about the biggest Tech News stories of the past week. From enterprise and business technology, to tech start ups, consumer gadgets, office IT and mobile you can get informed here. Plus join us live at some of the many technology shows around the world like CeBit, IFA, Infosec, The Gadget Show and much more !
…
continue reading
The Virtual CISO Podcast is a frank discussion that provides the very best information security advice and insights for Security, IT and Business leaders. If you’re looking for the latest strategies, tips, and trends from seasoned information security practitioners, want no-B.S. answers to your biggest security questions, need a perspective on how your peers are addressing the same issues, or just simply want to stay informed and proactive, then welcome to the show. Our moderator, John Verry ...
…
continue reading
The Code of Entry Podcast, hosted by the insightful Greg Bew, delves deep into the ever-evolving realm of technology and digital innovation. Each episode is a treasure trove of knowledge, focusing on critical areas such as cybersecurity, the intricacies of SEO, and the latest advances in the digital world. Greg's expertise as a technical advisor shines through as he explores the nuances of digital marketing, offering listeners an in-depth understanding of the skills needed to stay ahead in t ...
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
The Laravel Community getting together discussing development and life using the world's best framework, Laravel.
…
continue reading
Sharing the work we do around the open web, information security and user privacy is an important role of Mozilla Security. The Mozilla Security Bytes podcast discuss various topics and technologies implemented in Firefox and other Mozilla products and initiatives.
…
continue reading
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
…
continue reading
Welcome to Everyday Heroes, a podcast about the unsung heroes of the tech world. From the phone in your pocket to the world's most critical digital infrastructure, open-source software has a hand in it. These free technologies that shape our digital world wouldn't be anything without the Heroes that maintain them, promote them, and evolve them - these are their stories. Everyday Heroes is brought to you by HeroDevs.
…
continue reading

1
The Medcurity Podcast: HIPAA Compliance | Security | Technology | Healthcare
Medcurity: HIPAA Compliance
Healthcare is complicated. Joe Gellatly and the Medcurity team are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more. HIPAA laws continue to evolve. Go to hhs.gov for the latest information.
…
continue reading
Welcome to DataNext Podcast, every week our CEO Zeeshan Baig talks about latest Tools and Technologies, shares his experience, Best practices on Cloud computing, Big data, DevOps, Security. Tips on work-life balance, Professional Career and much much more. Subscribe and stay up to date with what's Next in Enterprise IT.
…
continue reading
WebInnovationX Web Innovation Center is a Global Think Tank in Digital Transformation of Businesses, the Study of the Social and Economic Impacts of the World Wide Web, and home to the World Wide Web Consortium W3C NY Metro Chapter. Join Our Thought Leaders at SymposiumX CertificationX AccelerationX. Meet the Experts and Get Inspired on Innovation Thought Leadership, Strategy, and Tactics. Powered by FortuneTimes Group.
…
continue reading
The Executive Insights podcast, brought to you by AWS (Amazon Web Services), features peer-to-peer conversations between business executives on innovating for growth, building resiliency, and shaping the future of their organizations. Learn more at AWS Executive Insights and follow us on LinkedIn. For video versions of these and other conversations, subscribe to our YouTube playlist.
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
A podcast for new programmers and developers. Join CodeNoobs co-creators Danny, Randall, and Russell weekly to explore topics that anyone interested in programming and learning to code will find valuable.
…
continue reading
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading
With such countless organizations succumbing to cybercriminals attacks, organizations should go the additional mile to get internal and external web applications. Numerous organizations feel that vulnerability examines are sufficient for finding security failings in a web application. While vulnerability scans can feature known shortcomings, web application penetration testing shows you how well they would hold up in a true attack by unapproved or unauthorized clients.
…
continue reading
Uptime and performance monitoring made easy.
…
continue reading
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
…
continue reading
Conversations with industry pros on the latest cloud-first technologies and software development practices.
…
continue reading
Our mission at Liveplex is to be the catalyst for transformation in the digital landscape. We empower enterprises with the tools and expertise needed to embrace Web 3.0 effortlessly. Through our APIs and services, we enable efficiency, data-driven decision-making, personalization, security, and trust, allowing our customers to not only thrive in the digital age but also lead with innovation. We are dedicated to enhancing customer experiences, helping businesses evolve, and shaping the future ...
…
continue reading
Drupal Brief is the go-to podcast for quick and insightful AI generated summaries of the latest Drupal news, blogs, and podcasts. Stay informed and inspired in just a few minutes as we distill the most important updates and trends in the Drupal community! Drupal Brief is a podcast of Drupal Forge.
…
continue reading
Exploring the practical and exciting alternate realities that can be unleashed through cloud driven transformation and cloud native living and working. Each episode, our hosts Dave, Esmee & Rob talk to Cloud leaders and practitioners to understand how previously untapped business value can be released, how to deal with the challenges and risks that come with bold ventures and how does human experience factor into all of this? They cover Intelligent Industry, Customer Experience, Sustainabili ...
…
continue reading

1
242 - Are Web Application Firewalls (WAFs) Obsolete in 2025? Pros, Cons, and Future of Application Security - Part 1
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11By YusufOnSecurity.Com
…
continue reading

1
Safes, Hackers, and Web Servers - PSW #892
2:12:25
2:12:25
Play later
Play later
Lists
Like
Liked
2:12:25This week's technical segment is all about the T-Lora Pager from Lilygo, and really cool Meshtastic device that can also be used for some hacking tasks! In the security news: Your safe is not safe Cisco ASA devices are under attack VMScape HybridPetya and UEFI attacks in the wild Eveything is a Linux terminal Hackers turns 30 Hosting websites on di…
…
continue reading

1
Monitoring the Dark Web for Leaked Data in DFIR
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Got a question or comment? Message us here! 🔎 This episode of The #SOCBrief dives into the world of dark web monitoring in digital forensics and incident response. Learn why leaked credentials are a top threat, how to safely detect exposures, and what steps SOC teams can take to stay proactive. Support the show Watch full episodes at youtube.com/@a…
…
continue reading

1
Episode 139: James Kettle - Pwning in Prod & How to do Web Security Research
2:21:51
2:21:51
Play later
Play later
Lists
Like
Liked
2:21:51Episode 139: In this episode of Critical Thinking - Bug Bounty Podcast Justin finally sits down with the great James Kettle to talk about HTTP Proxys, metagaming research, avoiding burnout, and why HTTP/1.1 must die! Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback here: info@critic…
…
continue reading

1
Episode 143: New Cohost + Client-Side Gadgets, LHE Meta — Instant Global Admin in Entra!
1:04:23
1:04:23
Play later
Play later
Lists
Like
Liked
1:04:23Episode 143: In this episode of Critical Thinking - Bug Bounty Podcast Justin brings Brandyn back to announce him as our newest co-host. We chat about recent LHE experiences, and then break down some news. Follow us on twitter at: https://x.com/ctbbpodcast Got any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingp…
…
continue reading

1
Inside Web3’s Most Powerful New Narrative | Etherfi
35:04
35:04
Play later
Play later
Lists
Like
Liked
35:04Inside Web3’s Most Powerful New Narrative | Etherfi by LongHash VenturesBy LongHash Ventures
…
continue reading

1
CR111: From mission-driven to tech-driven with Ben Sparke, Microsoft
46:45
46:45
Play later
Play later
Lists
Like
Liked
46:45The evolving role of technology in modern defense environments, highlighting innovations in communications, automation, and open-source frameworks. Drawing from personal experience, the conversation emphasizes how real-world conflicts are reshaping how tech is deployed, adopted, and understood across military operations. This week, Dave, Esmee, and…
…
continue reading

1
2026 Look Ahead: Where HIPAA Compliance Is Actually Headed | Medcurity Podcast 111
9:06
9:06
Play later
Play later
Lists
Like
Liked
9:06Enforcement is active, policy is tightening, and threats continue to evolve. This episode looks ahead to what 2026 will bring for healthcare compliance—how recent OCR settlements, proposed HIPAA Security Rule updates, and CMS’s 2026 payment rule all point to one clear expectation. Hear what strong compliance looks like going forward, from mapping e…
…
continue reading

1
Episode 159: Building Sustainable Open Source: Keeping the Lights On
27:31
27:31
Play later
Play later
Lists
Like
Liked
27:31In this episode of Reality 2.0, Katherine Druckman talks with Lori Lorusso from the Rust Foundation about the critical importance of sustainable stewardship for open source infrastructure. They discuss a joint statement from the OpenSSF, the Rust Foundation, and other community organizations emphasizing the need for financial support of package man…
…
continue reading

1
🛡️ Pen Test Potential: How Organizations Are Missing Out on Fortifying the SOC 🛡️
20:08
20:08
Play later
Play later
Lists
Like
Liked
20:08Got a question or comment? Message us here! What’s the real difference between a penetration test and a red team engagement, and how can each benefit your SOC? In this episode, Andrew is joined by Tanner, to unpack how pentests uncover vulnerabilities, how red teams stress-test defenders, and why every organization should be leveraging these exerci…
…
continue reading

1
When Ransomware Turns Deadly: Breaking Cyber Crime News and Essential Security Tips for Businesses
27:58
27:58
Play later
Play later
Lists
Like
Liked
27:58Cyber Flash Point on the following topics: how ransomware kills in real life and latest cyber crime news, Send us a text Growth without Interruption. Get peace of mind. Stay Competitive-Get NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Support the show 🔥New Special Offers! 🔥 Remove Your Private Data Online …
…
continue reading

1
Forrester's Global Cybersecurity Market Forecast Before AI Fully Kicks In - Merritt Maxim - BSW #416
52:51
52:51
Play later
Play later
Lists
Like
Liked
52:51Global spending on cybersecurity products and services will see a strong 14.4% CAGR from 2024 through 2029 and will hit $302.5 billion in 2029, driven by continued concerns around cyberattacks across all verticals and geographies. But where is the spending occuring and how do you prepare? Merritt Maxim, VP & Research Director at Forrester, joins Bu…
…
continue reading

1
700 Gigabytes and a Guy Fawkes Mask: How Uruguay's Cyber Silence Led to the BHU Catastrophe
14:28
14:28
Play later
Play later
Lists
Like
Liked
14:28
…
continue reading

1
Bad Crypto, Zombie CPUs, Y2K38,Park Mobile, Redis, Red Hat, Deloitte, Aaran Leyland.. - SWN #518
28:47
28:47
Play later
Play later
Lists
Like
Liked
28:47
…
continue reading
By Alias Cybersecurity
…
continue reading

1
BANCO HIPOTECARIO DEL URUGUAY - se clasifica como una "crisis de reconstrucción nacional"
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12
…
continue reading

1
BHU: Ransomware de Crypto24 y los 700GB de Datos Filtrados ¿Crisis Controlada o Catástrofe Inevitable en Uruguay?
23:36
23:36
Play later
Play later
Lists
Like
Liked
23:36
…
continue reading

1
Finding Large Bounties with Large Language Models - Nico Waisman - ASW #351
53:52
53:52
Play later
Play later
Lists
Like
Liked
53:52
…
continue reading

1
Context is king for secure, AI-generated code
28:15
28:15
Play later
Play later
Lists
Like
Liked
28:15
…
continue reading

1
A conversation between Hill and Snitker specifically discussing the Banco Hipotecario del Uruguay (BHU) attack.
10:41
10:41
Play later
Play later
Lists
Like
Liked
10:41
…
continue reading

1
Alberto y Parmaster (leyenda) hablando sobre el caso del BANCO HIPOTECARIO DEL URUGUAY
15:24
15:24
Play later
Play later
Lists
Like
Liked
15:24
…
continue reading

1
Debate: Denial and Desire Resolution, a hacker's manifesto
15:58
15:58
Play later
Play later
Lists
Like
Liked
15:58
…
continue reading
…
continue reading

1
Identity and Brand Protection. Things We NEED to Know.
47:36
47:36
Play later
Play later
Lists
Like
Liked
47:36By Cyber Crime Junkies-David Mauro
…
continue reading

1
AI & IAM: Where Security Gets Superhuman (Or Supremely Stuck) - Matt Immler, Heather Ceylan, Alexander Makarov, Nitin Raina, Dor Fledel, Aaron Parecki - ESW #427
1:34:04
1:34:04
Play later
Play later
Lists
Like
Liked
1:34:04At Oktane 2025, leaders from across the security ecosystem shared how identity has become the new front line in protecting today’s AI-driven enterprises. As SaaS adoption accelerates and AI agents proliferate, organizations face an explosion of human and non-human identities—and with it, growing risks like misconfigured access, orphaned accounts, a…
…
continue reading

1
685: Fix My Home Tech, What’s Up with Firefox, and the MVP Car
1:06:14
1:06:14
Play later
Play later
Lists
Like
Liked
1:06:14Show Description Who's the person to hire when your home network isn't working as reliably as it should? And while we're at it - can you also fix Dave's Find My notifications? What's the plan with Firefox in 2025? And Dave blogs (and mouth blogs) about his struggles with the MVP car. Listen on Website Links Why I hate the MVP car - daverupert.com T…
…
continue reading

1
Navigating the Modern Digital Landscape: A Synthesis of Deception, Danger, and Defense
23:43
23:43
Play later
Play later
Lists
Like
Liked
23:43The provided source context paints a complex and multifaceted picture of the modern digital world, revealing it as an environment of profound dualities, offering unprecedented connection alongside significant peril. The materials span a wide spectrum, from deeply personal and often disturbing anecdotes of online dating to high-level analyses of cyb…
…
continue reading
The provided texts offer two distinct sets of narratives: the first comprises several true crime stories focused on the dangers of online dating platforms like Tinder, detailing incidents ranging from near-abductions and physical attacks by scorned ex-partners to a murder committed by a date. The second source is a detailed media analysis of the "C…
…
continue reading

1
Secuestro Digital en el BHU: Doble Extorsión, 700GB Robados y el “Protocolo del Silencio” que Ocultó la Amenaza a los Clientes.
13:53
13:53
Play later
Play later
Lists
Like
Liked
13:53BHU (Banco Hipotecario del Uruguay)The bank's initial public response severely minimized the true gravity of the digital threat by characterizing it as a routine technical issue, while in reality, the institution was the victim of a large-scale data theft, cryptocurrency ransom demand, and digital extortion.The contradictions between the official s…
…
continue reading

1
Uruguay's State Bank BHU Hit by Crypto24 Double Extortion Ransomware: 700GB PII Stolen and the Activist Was Right.
1:52
1:52
Play later
Play later
Lists
Like
Liked
1:52ADVANCE: MORE TO COME SOON. The provided sources center on the dire state of cybersecurity in Uruguay, particularly highlighting the outspoken ethical hacker Alberto Daniel Hill (ADH) and two catastrophic cyber incidents. Several transcripts detail Hill's career, which includes being unjustly imprisoned in 2017 for responsibly reporting a security …
…
continue reading

1
Alberto Daniel Hill: De Incidente a Crisis Nacional: La Extorsión de Crypto24 al BHU y el Robo Masivo de 700GB de Datos Sensibles
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35SECTION I: Resumen Ejecutivo e Implicaciones Estratégicas de la Extorsión Confirmada Este informe experto proporciona un análisis exhaustivo y actualizado del incidente cibernético que afectó al Banco Hipotecario del Uruguay (BHU), una institución financiera estatal crítica. El informe sintetiza la estrategia inicial de minimización institucional (…
…
continue reading

1
Displaced Aggression and Relational Betrayal
27:02
27:02
Play later
Play later
Lists
Like
Liked
27:02This expert analysis report examines the actions of an individual identified as CyberGurl10 (CG10), focusing on her severe pattern of displaced aggression directed at her fiancé, Alberto, rather than the true sources of her chronic stress. The source asserts that CG10’s rage stemmed from feelings of structural powerlessness related to an unresponsi…
…
continue reading

1
BIG LIES in Cybersecurity--Why We Need to Rebuild the Industry
52:53
52:53
Play later
Play later
Lists
Like
Liked
52:53In the world of cybersecurity, there are big lies that have been perpetuated about compliance, fixability and communication--and it's time to burn it all down and start over. Many experts see one main cybersecurity truth, especially about AI, SIEM, EDR and related business technology. By examining the intersection of AI, cybersecurity, and complian…
…
continue reading

1
An Analysis of Disparate Treatment in Digital and Private Conflict
6:31
6:31
Play later
Play later
Lists
Like
Liked
6:31Expert Analysis Report: The Weaponization of Intimate Vulnerability and Displaced Aggression in a High-Conflict Environment I. Executive Summary: The Crisis Nexus of Stress and Directed Aggression This analysis examines the severe, externally driven pressures faced by the individual identified as CyberGurl10 (CG10) and the resulting pattern of disp…
…
continue reading
The world is a dumpster fire, confirmed. Following California's landmark AI safety bill SB 53, the head of Nvidia is allegedly "quaking in his boots"—which is a good sign, unlike the news that the "Nirvana Baby" Spencer Elden's lawsuit was finally dismissed. Meanwhile, corporate America continues its pivot to chaos: Spotify shuffled its execs, Meta…
…
continue reading

1
Ratboi, Clop, Oracle, svgs, Impact Solutions, The Pentagon, Open AI, Josh Marpet... - SWN #517
30:34
30:34
Play later
Play later
Lists
Like
Liked
30:34Ratboi, Clop, Oracle, svgs, Impact Solutions, The Pentagon, Open AI, Josh Marpet, and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-517
…
continue reading

1
Cyber Attack Lawsuits: How to Avoid the Litigation
1:03:17
1:03:17
Play later
Play later
Lists
Like
Liked
1:03:17Jamey Davidson, Partner at international law firm O’Hagan Meyer concentrates on top ways to reduce risk in cyber breach litigation, defending businesses in cyber breach class-action law suits and how to build defenses to reduce cyber breach liability. We discuss: Cyber Attack Lawsuits: How to Avoid the Litigation How Cyber Breach Litigation Works W…
…
continue reading

1
Insurgent Armies and State Formation after Victory
54:38
54:38
Play later
Play later
Lists
Like
Liked
54:38Episode 135 of the Irregular Warfare Podcast examines the fate of victorious rebel groups after civil wars—and why some remain loyal to post-war governments while others fragment, defect, or even overthrow the regimes they helped create. Our guests begin by exploring the core puzzle: conventional wisdom suggests that decisive victory produces stabi…
…
continue reading

1
One is not the loneliest number for API calls
26:21
26:21
Play later
Play later
Lists
Like
Liked
26:21Gil Feig, co-founder and CTO of Merge, joins the show to explore Merge’s approach for reducing third-party APIs to a single call, the complexities of and need for data normalization, and the role that AI and MCP plays in the future of API functionality. Episode notes: Merge connects you to any third-party system for fast, secure integrations for yo…
…
continue reading

1
Análisis de la respuesta y comunicación ante la crisis del Banco Hipotecario del Uruguay (BHU) tras el incidente del 30 de septiembre de 2025
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00The Banco Hipotecario del Uruguay (BHU) experienced a significant operational disruption, formally termed an "incidente informático" 1, durante las últimas horas del martes 30 de septiembre de 2025.1Este incidente fue detectado mientras la institución se encontraba ejecutando tareas operativas críticas, específicamente “los procesos de cierre de fi…
…
continue reading

1
Analysis of the Banco Hipotecario del Uruguay (BHU) Crisis Response and Communication Following the Incident of September 30, 2025
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59I. Strategic Overview and Executive Summary of the Crisis ContextI.1. Incident Synthesis: Timeline and Operational Definition The Banco Hipotecario del Uruguay (BHU) experienced a significant operational disruption, formally termed an “incidente informático” 1, during the late hours of Tuesday, September 30, 2025.1 This incident was detected while …
…
continue reading

1
AI: The new trigger word. Or is it Robots? - PSW #894
2:04:32
2:04:32
Play later
Play later
Lists
Like
Liked
2:04:32In addition to some fun news, we get a Mary Ann Davidson as a surprise guest. We even get a great quote from her of "You're never going to have enough cybersecurity people to defend what was never built to be defensible.". Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-894…
…
continue reading

1
AI: The new trigger word. Or is it Robots? - PSW #894
2:04:32
2:04:32
Play later
Play later
Lists
Like
Liked
2:04:32In addition to some fun news, we get a Mary Ann Davidson as a surprise guest. We even get a great quote from her of "You're never going to have enough cybersecurity people to defend what was never built to be defensible.". Show Notes: https://securityweekly.com/psw-894
…
continue reading

1
AI: The new trigger word. Or is it Robots? - PSW #894
2:04:32
2:04:32
Play later
Play later
Lists
Like
Liked
2:04:32In addition to some fun news, we get a Mary Ann Davidson as a surprise guest. We even get a great quote from her of "You're never going to have enough cybersecurity people to defend what was never built to be defensible.". Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-894…
…
continue reading

1
The Prophet Ignored: A Bank Goes Dark in Uruguay.
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59The catastrophic cyberattack that validated Alberto Daniel Hill's prophecy involved the theft of 30,000 of Uruguay's national PKI certificates. This event, described as a "devastating nationaltering crisis" and a "catastrophic cyber failure," occurred a few years after ADH's initial public warning.1. Nature of the Attack: A hacker, calling themselv…
…
continue reading

1
Protecting Identities - Best Practices and Fraud Prevention
53:20
53:20
Play later
Play later
Lists
Like
Liked
53:20Fraud Expert Ayelet Biger joins us. Find her at her site: https://scamranger.ai/ Chapters 00:00 Introduction and Overview 02:49 Shining a Light on the Victim's Perspective 10:00 Creating a Seamless User Experience 12:23 The Role of Behavioral Biometrics in Fraud Detection 15:16 Distinguishing Between Legitimate Users and Cyber Criminals 20:06 The E…
…
continue reading