We live in an era where businesses are digitally disrupted almost on a daily basis. The Industrial Internet of Things (IoT) is a unique framework to enable businesses exploit the power of digital innovations and emerge as disruptors (and winners). The IOT Review is a podcast specifically designed to empower business decision makers and IT practitioners with highly relevant technology and strategic insights that's needed to integrate IoT in their business models... to gain in-depth know-how o ...
…
continue reading
IoTA is the companion blog to the IoTA Podcast. IoTA is dedicated to the Internet of Things. The Podcast will review daily news stories in IoT and will conduct frequent companion episodes where we interview people who are in the IoT Industry.
…
continue reading
Podcast by Fifth9
…
continue reading
Established IT Professionals focused on delivering technology-based content to growing IT and technology enthusiasts alike. Please support our page by clicking the link below: https://www.buymeacoffee.com/EstablishedLink Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Tune in to get inspired by the opportunities, impact and capabilities of Data, Machine Learning, and Artificial Intelligence. Join Anchormen’s CTO, Jeroen Vlek and Senior Data Scientist, Ron Dotsch, as they meet experts in the field and talk about developments, best practices, and lessons learned.
…
continue reading
Join hosts Adam Justice and Richard Gunther as they explore the smart home universe. The Smart Home Show features interviews with smart home leaders, analysis of the latest smart home news and the occasional Q and A and product review. All smart home, all the time.
…
continue reading
Exploit brokers is dedicated to tech and hacking news commentary, hacking tutorials, and cyber security topics. Exploit brokers brings the knowledge of hacking to you. We review data breaches, malware infections, Botnet events, and other notable hacking events to learn how to better defend against it by getting in the mind of hackers. #cybersecurity #hackingnews #cybersec #whitehat
…
continue reading
Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizations of all sizes with their cybersecurity needs. If you’re an AppSec professional looking for an opportunity to work with some of the best in the ...
…
continue reading
Thought leaders and experts Max Aulakh (Ignyte) and Joel Yonts (Secure Robotics) cover subjects such as the development of AI, cyber security and the how the future looks in terms of cyber risk.
…
continue reading
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
…
continue reading
At Cloudera, we believe data can make the impossible possible. The world’s leading organizations choose Cloudera to transform their businesses, improve lives, and advance human achievement. All through the power of data.
…
continue reading
The Engineering Quality Control Podcast (“TEQC”), published by the Engineering Management Institute, is a podcast focused on helping engineering professionals ensure their projects are of the highest quality. The show will be hosted by Brian Wagner, P.E. and provides strategies and concepts to help ensure you address quality control on your projects. We dive into quality control topics with professionals in the world of engineering and will interview guests on quality control practices, samp ...
…
continue reading
The Lost Explorer Tech Talks are a series of conversations with technology enthusiasts, and former Google Glass Explorers
…
continue reading
Walker Reynolds & Zack Scriven share knowledge and insights on Industry 4.0, IIoT, and Digital Transformation in this podcast from 4.0 Solutions. Support this podcast by checking out our Free / Paid courses at https://www.iiot.university
…
continue reading
With the wide product breadth Parker Hannifin has to offer, wrapping your head around everything motion systems and controls can be daunting. Join two of Parker's engineers, Brian Baranek and Mitch Eichler, as they try to de-mystify everything hydraulic valves and their applications. Tune in as they review products, discuss applications, interview market experts, unveil division programs and showcase Parker promotions and partners. If you are looking for a reliable source for hydraulic valve ...
…
continue reading
Threat talks is a thought leadership discussion about everything cyber security. We have industry experts talking about current and future threats in the cyber industry. Host: Kevin Golas | Jay Grant | Fabian Franco Send us suggestions for topics and feedback to: E:Mail: [email protected]
…
continue reading
Olga Dalecka joins Stephen Rice and Arvind Mishra on this month's Sync Up podcast to share how OneDrive’s mobile app is transforming the way users experience and manage their photos. From Moments of Joy and Photo Shuffle to AI-powered editing and seamless sharing, this episode dives into the innovations making OneDrive the trusted home for your mem…
…
continue reading

1
HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders!
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22# Title * HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders! ## Description 🔍 Microsoft’s AI Uncovers 20 Zero-Day Threats | CoffeeLoader Malware Gets Smarter In this episode of Exploit Brokers, Cipherceval dives into how Microsoft Security Copilot, powered by AI, discovered over 20 previously unknown vulnerabilities in popula…
…
continue reading
In this episode of Sync Up, hosts Stephen Rice and Arvind Mishra sit down with David Johnson, one of Microsoft IT's key architects, to uncover how the company manages OneDrive and SharePoint at scale. From security and automation to self-service with guardrails, they explore the strategies that keep Microsoft’s data secure while enabling seamless c…
…
continue reading

1
Expanding digital transformation fluency
1:44:30
1:44:30
Play later
Play later
Lists
Like
Liked
1:44:30Zack Scriven and Walker Reynolds discuss how to expand your digital transformation fluency.By Walker Reynolds & Zack Scriven
…
continue reading

1
HN58 - Havoc in the Cloud: The Shocking Click Fix Exploit Revealed
24:22
24:22
Play later
Play later
Lists
Like
Liked
24:22Welcome to Exploit Brokers with your host Cipherceval! In this deep dive, we uncover a sophisticated cyber assault where hackers exploited Microsoft SharePoint to launch the Havoc C2 via a stealthy click fix attack. Learn how a single click can trigger malicious PowerShell commands, turning everyday corporate tools into gateways for cybercrime. In …
…
continue reading

1
HN57 - Unmasking SpyLoan: The Android Malware Preying on Loan Seekers
20:32
20:32
Play later
Play later
Lists
Like
Liked
20:32In this episode of Exploit Brokers, we dive into the dark world of cybercrime, exploring two alarming topics: a malicious Android loan app masquerading as a financial tool and Xerox printer vulnerabilities that could be leaking your credentials. Learn how loan sharks have moved from traditional methods to sophisticated digital predation, exploiting…
…
continue reading

1
ProveIt! Conference 2025 - Reactions Podcast
1:48:39
1:48:39
Play later
Play later
Lists
Like
Liked
1:48:39Zack and Walker talk about their thoughts following the ProveIt! conference including what vendors they were the most impressed with!By Walker Reynolds & Zack Scriven
…
continue reading

1
HN56 - Massive Bug Puts Outlook Users at Risk | Kimsuky gets RDPWrapper
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03In today’s episode of Exploit Brokers, we dive deep into two major security threats making waves across the digital world. A critical Remote Code Execution (RCE) vulnerability in Microsoft Outlook is putting millions of users at risk, with hackers exploiting it through spear phishing emails and malicious links. Not only that, but we’re also uncover…
…
continue reading

1
ProveIt! Conference 2025 - Final Podcast before the show!
2:07:35
2:07:35
Play later
Play later
Lists
Like
Liked
2:07:35Final Podcast before the conference! We go over schedule, hot takes on all the vendor sponsors, and Walker shares a vulnerable update. don't want to miss this one!By Walker Reynolds & Zack Scriven
…
continue reading
Join Stephen Rice and Arvind Mishra as they discuss the ins and outs of OneDrive Sync with legendary Sync expert, Gaia Carini. They cover everything from the basics of OneDrive Sync to more advanced features like Files on Demand and Known Folder Move (KFM). Gaia also shares best practices for deploying OneDrive Sync in organizations and highlights …
…
continue reading

1
HN55 - Double Zipping Danger: The 7-Zip Exploit That Could Hack Your PC
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18Welcome back to Exploit Brokers! In today’s video, we dive deep into a critical 7‑Zip vulnerability that’s being exploited by Russian cybercriminals to bypass Windows’ security protections. If you’ve used 7‑Zip at all, you need to know how this flaw can let hackers sneak past the Mark-of-the-Web (MOTW) and deploy dangerous malware like Smoke Loader…
…
continue reading

1
HN54 - Cybersecurity Experts Reveal LAZARUS GROUP's Hidden Secrets
29:54
29:54
Play later
Play later
Lists
Like
Liked
29:54Lazarus Group’s Secret Admin Layer EXPOSED – Major Cybersecurity Discovery! 🔥💻 Security researchers have uncovered a hidden admin layer used by North Korea’s Lazarus Group to manage their Command and Control (C2) servers. This sophisticated network of VPNs and proxies allows them to execute cyberattacks worldwide—mainly targeting cryptocurrency dev…
…
continue reading

1
HN53 - AI’s Dirty Little Secret: Employees Leaking Data by Accident
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46In this episode, we’re uncovering the darker side of Generative AI and the emerging threats lurking behind everyday tools like ChatGPT and Copilot. Learn how sensitive information—ranging from customer data to employee benefits—can be leaked simply by typing it into a Gen AI prompt. We’ll also expose how cybercriminals are escalating their tactics,…
…
continue reading
Adam and Richard are at CES this year, talking about the products, categories, and themes that are catching their attention at the show. They also discuss this show's value to companies, small businesses, and entrepreneurs.By Adam Justice
…
continue reading

1
HN52 - 800K Volkswagen EVs Hacked! Massive Data Breach & Mirai Botnet Attack Explained
21:55
21:55
Play later
Play later
Lists
Like
Liked
21:55🔒🚗 Volkswagen’s Massive 800K EV Data Breach & Mirai Botnet Threats Explained | Exploit Brokers Welcome back to Exploit Brokers! In today’s episode, we dive deep into two major cybersecurity threats shaking the automotive and industrial sectors: Volkswagen’s 800,000 EV Data Breach Discover how a misconfigured Amazon cloud storage led to the exposure…
…
continue reading

1
AI in Manufacturing - Industry 4.0 Live Q&A - Jan 3, 2025
1:56:27
1:56:27
Play later
Play later
Lists
Like
Liked
1:56:27In this episode of the 4.0 Solutions Podcast, Walker Reynolds and Zack Scriven take a deep dive into the evolving landscape of Industry 4.0. From AI's transformative impact to behind-the-scenes insights on the upcoming ProveIt Conference, this discussion is packed with valuable takeaways. Learn about the mistakes vendors are making, uncover strateg…
…
continue reading

1
HN51 - Chinese Hackers Breach U.S. Treasury AND 3M Fake GitHub Stars Exposed
23:16
23:16
Play later
Play later
Lists
Like
Liked
23:16In this episode, we dive deep into two explosive cybersecurity stories making headlines right now: a major breach at the U.S. Treasury Department allegedly carried out by Chinese state-sponsored hackers, and the discovery of over 3.1 million fake stars on GitHub used to boost malicious repositories. We’ll explore how third-party vendor BeyondTrust …
…
continue reading
It time for the 10th annual technology.fm year-end wrap-up. This year, Adam and I join the guys from the HomeTech Podcast to share our thoughts on the year and weigh in with predictions for 2025. If you want a Mill of your own, you can get $200 off using Richard's referral link. Have questions or feedback for us? Send it to [email protected].…
…
continue reading

1
HN50 - IoT Webcams Hacked & 900k+ Health Records Exposed
25:36
25:36
Play later
Play later
Lists
Like
Liked
25:36In this eye-opening episode, we uncover the disturbing reality of IoT webcam vulnerabilities and explore how hackers are leveraging outdated firmware and previously discovered but unpatched exploits to infiltrate personal devices. From prying eyes in your own home to the colossal health data breach exposing over 900,000 patient records, the digital…
…
continue reading

1
MES Bootcamp Webinar: Building the Core of Manufacturing Execution
1:47:13
1:47:13
Play later
Play later
Lists
Like
Liked
1:47:13Dive into the world of Manufacturing Execution Systems (MES) with this special MES Bootcamp Webinar. Join Walker Reynolds and Zack Scriven as they explore: What MES truly is and why "MES is not MES." The Core Four Features every MES system needs and how they drive operational excellence. Real-world examples of MES implementations, from tracking dow…
…
continue reading

1
Industry 4.0 Podcast: The Most Common 3 Questions we get
1:17:30
1:17:30
Play later
Play later
Lists
Like
Liked
1:17:30In this episode, Walker Reynolds and Zack Scriven tackle the three most common questions they receive from the Industry 4.0 community. From choosing the right technology to implementing a Unified Namespace and navigating digital transformation strategies, they provide actionable insights and clear answers to help you on your journey. If you're look…
…
continue reading

1
HN49 - Fortnite Refund Update: Millions Refunded + Lazarus Group’s Crypto Hacks Revealed
23:15
23:15
Play later
Play later
Lists
Like
Liked
23:15We’re diving into two major stories shaking up the gaming and cybersecurity worlds! First, we discuss the Fortnite Refund Update, where the FTC has forced Epic Games to refund millions due to their use of dark patterns. Find out if you’re eligible for a refund and how to claim it. Then, we shift gears to the Lazarus Group, North Korea’s infamous ha…
…
continue reading

1
OneDrive's Year in Review & Unlicensed User Changes
34:04
34:04
Play later
Play later
Lists
Like
Liked
34:04With 2024 coming to a close, the Sync Up crew is reflecting on our favorite OneDrive features of the year, and looking forward to the Unlicensed User changes coming in 2025! Stephen Rice and Arvind Mishra are joined by keeper of the OneDrive roadmap, Irfan Shahdad, and Archive and unlicensed user expert Trent Green! Irfan will take you through the …
…
continue reading
Uncover the fascinating yet chilling story of Hydra Market, the dark web’s largest illicit empire. Learn how this $1.35 billion platform operated, from smuggling narcotics and laundering money to offering hacking services. We’ll explore how its leader was sentenced to life in prison, the innovative (and illegal) technologies they used, and the glob…
…
continue reading

1
HN47 - Andrew Tate’s Platform Hacked by Activists + Russian Hackers Exploit Zero-Days
18:03
18:03
Play later
Play later
Lists
Like
Liked
18:03Andrew Tate's platform, formerly known as Hustler’s University, has been hacked, exposing the data of over 800,000 users. Meanwhile, Russian hackers have exploited critical zero-day vulnerabilities in Firefox and Windows, demonstrating the growing sophistication of cyberattacks. In this video, we’ll break down the Andrew Tate hack, the implications…
…
continue reading

1
HN46 - Phobos’ $16M Haul & Helldown’s Secret Exploits – 2024’s Ransomware Crisis
27:53
27:53
Play later
Play later
Lists
Like
Liked
27:53In this episode, we dive deep into the world of ransomware with two of 2024's most talked-about threats: Phobos and Helldown. Learn how the Phobos ransomware operation managed to dominate 11% of the market, generating $16 million in ransom payments, and the shocking details of its admin’s extradition to the U.S. We also explore the rise of Helldown…
…
continue reading

1
Episode 231 - What’s So Great About Home Assistant?
59:34
59:34
Play later
Play later
Lists
Like
Liked
59:34Paulus Schoutsen, the founder and creator of Home Assistant, dives deep into home automation software with Adam and Richard. They discuss what moves Home Assistant is making in the DIY and pro spaces, and why it's receiving a surge of interest from a more general audience. Have questions or feedback for us? Send it to [email protected].…
…
continue reading

1
HN45 - Malware Madness: How Remcos RAT and Human Error Fuel Cyber Threats
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15In today's episode, we dive deep into the fascinating yet troubling world of cybersecurity, exploring how even the most advanced antivirus software, firewalls, and endpoint security measures can fall short due to a single factor: human error. Despite the latest tech solutions, hackers continue to exploit one consistent vulnerability—users clicking …
…
continue reading

1
HN44 - Malicious Crack Tools & Malvertising Attack: How Hackers Steal Your Data
22:42
22:42
Play later
Play later
Lists
Like
Liked
22:42In today's episode, we’re diving into the hidden dangers of malicious installers, software cracks, and deceptive ads on Google. We'll explore recent stories, including the SteelFox malware that's hijacking Windows PCs, stealing credit card data, and mining cryptocurrency using vulnerable drivers. Plus, we’ll uncover a new wave of malvertising attac…
…
continue reading

1
Industry 4.0 Deep Dive: Answering Community Questions
1:09:50
1:09:50
Play later
Play later
Lists
Like
Liked
1:09:50In this episode of the Industry 4.0 Podcast, your hosts, Walker D. Reynolds and Zack Scriven, tackle the hottest topics and questions from the Industry 4.0 community. From exploring Rockwell's FactoryTalk Optix platform to breaking down the concept of a Unified Namespace (UNS) as the single source of truth, we leave no stone unturned. Highlights in…
…
continue reading

1
HN43 - Dutch Police Take Down Major Information Stealers: Redline & Meta Stealer
10:45
10:45
Play later
Play later
Lists
Like
Liked
10:45In a significant international operation, Dutch police and global law enforcement partners have taken down two major information stealers: Redline and Meta Stealer. These dangerous malware operations targeted thousands of victims worldwide, stealing passwords, sensitive data, and more. This video explores how law enforcement agencies worked togethe…
…
continue reading

1
What Existing AWS Services are Important to AppSec? (Part 2 of 2) | The AppSec Insiders Ep.15
33:28
33:28
Play later
Play later
Lists
Like
Liked
33:28Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizati…
…
continue reading

1
What Existing AWS Services are Important to AppSec? (Part 1 of 2) | The AppSec Insiders Ep.14
26:00
26:00
Play later
Play later
Lists
Like
Liked
26:00Welcome to The AppSec Insiders Podcast. This is a show where we discuss the hottest topics and latest trends in application and cloud security, and tell you what you need to know For those who don’t know who we are, we are all software developers, white-hat hackers, and code security experts. When we’re not recording the podcast, we help organizati…
…
continue reading

1
HN42 - Hackers Breach Internet Archive TWICE – How Safe is Your Data?
16:12
16:12
Play later
Play later
Lists
Like
Liked
16:12The Internet Archive has been breached… AGAIN! 🛑 This time, hackers managed to compromise sensitive user data not once, but twice, exploiting stolen GitLab and Zendesk tokens. In this episode of Exploit Brokers, we break down what went wrong, why access tokens are crucial for cybersecurity, and how this breach could have been prevented. 🚨 We’ll div…
…
continue reading
In this special episode of the Sync Up podcast, join Stephen Rice as he takes you behind the scenes of the OneDrive Fall Event "AI Innovations for Work and Home." Get exclusive insights from interviews with key speakers like Jason Moore, Arwa Tyebkhan and more as they reveal their favorite features, and share some of the exciting upcoming developme…
…
continue reading

1
HN41 - Chinese Hackers Hijack US Telecom Networks
15:46
15:46
Play later
Play later
Lists
Like
Liked
15:46In this eye-opening episode of Exploit Brokers, your host Lauro dives deep into the recent cyberattacks that have compromised major U.S. telecommunications networks. Chinese state-sponsored hackers, known as Salt Typhoon, have exploited a 30-year-old backdoor mandated by U.S. law, targeting giants like AT&T, Lumen (formerly CenturyLink), and Verizo…
…
continue reading

1
HN40 - Shocking Move: Kaspersky Uninstalls Itself and Installs Ultra AV Overnight!
13:13
13:13
Play later
Play later
Lists
Like
Liked
13:13Imagine waking up to find that your trusted antivirus software has uninstalled itself and replaced itself with a completely different program—without your consent! 😱 In today's video, we dive deep into the shocking move by Kaspersky as it uninstalls itself and installs Ultra AV on users' computers. We'll explore why this happened, how users are rea…
…
continue reading
In this episode of the Sync Up Podcast, hosts Stephen Rice and Arvind Mishra dive into the design of Copilot in OneDrive with special guest Ben Truelove, a veteran designer at Microsoft. Ben shares insights from his 27-year journey at Microsoft, including how the team designed and iterated to deliver the best Copilot experience to our customers. Tu…
…
continue reading

1
HN39 - Apple's Shocking Decision: Dropping the Fight Against NSO Spyware
14:15
14:15
Play later
Play later
Lists
Like
Liked
14:15In an unexpected turn of events, Apple has decided to drop its three-year-old lawsuit against the notorious spyware maker, NSO Group. What led to this shocking decision, and what does it mean for the future of cybersecurity and your personal data? 🤔 In today's video, we dive deep into the reasons behind Apple's surprising move. We'll explore how th…
…
continue reading

1
Episode 230 - Richard’s Smart Home 2024 Update
1:15:43
1:15:43
Play later
Play later
Lists
Like
Liked
1:15:43Adam checks in with Richard about his smart home acquisitions from the past year, including new lighting solutions from Inovelli and Legrand, a smart outlet from Leviton, and the Nest Learning Thermostat v4. They also discuss the Mill Food Recycler, which turns food scraps into something resembling coffee grounds. Those grounds can then be composte…
…
continue reading
Walker and Zack talk about influencing or effecting change from a leadership perspective.By Walker Reynolds & Zack Scriven
…
continue reading

1
HN38 - Is Your Tap-to-Pay Secure? The Latest Android Malware Warning
13:35
13:35
Play later
Play later
Lists
Like
Liked
13:35Is Your Tap-to-Pay Secure? The Latest Android Malware Warning 🔒 In this episode of Exploit Brokers, we dive deep into a new Android malware that targets NFC technology to steal your banking information. 📱💳 If you use tap-to-pay or any NFC-based service, this is something you NEED to know. We’ll break down how this malware works, why it's so dangero…
…
continue reading

1
HN37 - AI Manipulation: The Silent Threat to Democracy
16:32
16:32
Play later
Play later
Lists
Like
Liked
16:32🚨 AI Propaganda Exposed: How It’s Influencing Elections Right Now! 🚨 In this episode of Exploit Brokers, we dive deep into the unsettling world of AI-driven misinformation campaigns. From targeting voters on both sides to spreading chaos across social media, AI is being weaponized in ways that sound like science fiction but are shockingly real. We’…
…
continue reading

1
HN36 - Fake Sites, Real Danger: The Trojan Malware in Extensions
15:08
15:08
Play later
Play later
Lists
Like
Liked
15:08In this episode of Exploit Brokers, we dive into a significant new threat spreading across the web—Trojan malware hidden in malicious browser extensions. These sneaky extensions are distributed through fake download sites mimicking popular software like Roblox FPS Unlocker, YouTube, VLC, or KeePass. We’ll discuss how these Trojans operate, how they…
…
continue reading