As a business owner, you take risks every day. Would you take a risk with your CYBERSECURITY? Join us on the Think Cyber Secure Podcast to get actionable tips and information that you can use to uncover the hidden gaps in your business that cause cyber risk and fix them resulting in a stronger and more secure business.
…
continue reading
Think Cyber Secure Podcasts
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
Shaping Cybersecurity Leadership: Today, Tomorrow, Together.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
…
continue reading
Selva Kumar is SAP Career Trainer specializing in SAP Career Coaching, identifying skills for getting a Job. You can reach me @ 302 494 9476 or Email: [email protected] Download Free SAP GRC Guide. http://expressgrc.com/sap-grc-10-1-step-step-guide/
…
continue reading
Welcome to The Security Guy’d — the podcast where safety meets strategy! With your host, Rafee, each week we dive deep into the world of security, leadership, and everything in between. Whether you’re running a company, managing a team, or just passionate about keeping people safe — this show is your guide to smarter, stronger security. Expect real talk, expert guests, and practical tips to help you stay ahead of the game. Let’s lock in and level up — This is The Security Guy’d
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
On Ahead of the Threat, Bryan Vorndran, assistant director of the FBI’s Cyber Division, and Jamil Farshchi—a strategic engagement advisor for the FBI who also works as Equifax’s executive vice president and chief information security officer—discuss emerging cyber threats and the enduring importance of cybersecurity fundamentals. Featuring distinguished guests from the business world and government, Ahead of the Threat will confront some of the biggest questions in cyber: How will emerging t ...
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst John Dilgen brings extensive expertise in cyber threat intelligence and incident response, specializing in researching threats impacting ReliaQuest customers. John and his guests provide practical perspectives on t ...
…
continue reading
Become a Paid Subscriber: https://podcasters.spotify.com/pod/show/jon-atack-family--friends/subscribe Become a Paid Subscriber: https://anchor.fm/jon-atack-family--friends/subscribe jon atack, along with his son sam, present a series of educational podcasts on how to spot, avoid, and overcome unethical manipulation of all kinds - from destructive cults and abusive relationships, to advertising, groupthink, bullying and more. join us in our hope to create a world where people are taught from ...
…
continue reading
NorthStandard‘s podcast features thought-provoking discussions on news and topics in the maritime industry. We talk with experts from the club and special guests in the field from around the world
…
continue reading
Electricity. Finance. Transportation. Our water supply. In Hack the Plant, podcast host Bryson Bort looks for answers to the question: Does connecting these systems, and others, to the internet leaves us more vulnerable to attacks by our enemies? We often take these critical infrastructure systems for granted, but they’re all becoming increasingly dependent on the internet to function. From the ransomware threats of Colonial Pipeline to the failure of the Texas power grid, it is clear our in ...
…
continue reading
Cyber After Hours: The Podcast Where Real Cyber Pros Let Loose What’s It All About? Think of it as that relaxed, late-night bar conversation you have with a fellow cybersecurity pro—except now it’s on the record. Co-hosts (and longtime friends) Paul Marco and Evan Morgan bring decades of combined experience in cybersecurity, from hands-on operations to engineering and architecture. Unscripted & Authentic Every week, they draw a random cybersecurity topic from a “fishbowl” and dive right in. ...
…
continue reading
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
…
continue reading
MAD Warfare™️ is a science-driven deep dive into the wild, weird, and sometimes wicked world of the "weaponization of everything." But don't worry—IT WILL BE FUN. Think of it as your covert ops manual for spotting how cyber hackers, rogue AI agents, and shady "bad actors" (who'd be terrible in a buddy comedy) are messing with our minds. Often in ways that evade detection… until it's too late. With expert interviews from unexpected places and plenty of offbeat insights, this podcast reveals t ...
…
continue reading
Screaming in the Cloud with Corey Quinn features conversations with domain experts in the world of Cloud Computing. Topics discussed include AWS, GCP, Azure, Oracle Cloud, and the "why" behind how businesses are coming to think about the Cloud.
…
continue reading
Welcome to the Security Intelligence Podcast, where we discuss cyber security industry analysis, tips and success stories. Join co-hosts Pam Cobb and David Moulton, security thought leaders and industry professionals as they discuss their experiences and expertise on the latest trends and developments in enterprise security. For even more security content, visit https://securityintelligence.com. 095940
…
continue reading
From technology to workplace culture, from geopolitical trends to economics, Heavy Strategy debates pivotal questions in enterprise IT. Hosts Johna Till Johnson & John Burke bring their technical expertise, analytical acumen, and contrasting viewpoints to discuss complex topics of interest to IT leaders. Frequently irreverent and always thought-provoking, these are the conversations you wish you could have at the leadership table. Tune in and join the think tank, where unanswered questions a ...
…
continue reading
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
…
continue reading
Pathways-2-Partnership (P2P) delivers expert insights, real-world success stories, and actionable strategies from MoveAmerica—the premier think tank for public-private collaboration. Each episode will explore innovations, partnerships, and policies that strengthen the defense industrial base, secure supply chains, and drive mission success. Created for entrepreneurs, industry executives, government leaders, and policy makers, P2P helps you navigate the acquisition processes, ethically influe ...
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
The brave new world of podcasts, let’s do it.
…
continue reading
Industrial Cybersecurity Insider offers a thorough look into the field of industrial cybersecurity for manufacturing and critical infrastructure. The podcast delves into key topics, including industry trends, policy changes, and groundbreaking innovations. Each episode will feature insights from key influencers, policy makers, and industry leaders. Subscribe and tune in weekly to stay in the know on everything important in the industrial cybersecurity world!
…
continue reading
Bask in the simple joys of being right. The Michael Knowles Show cuts through the madness of our politics and culture, analyzing the top stories of the day. Monday through Friday. If you like The Michael Knowles Show, become a Daily Wire member TODAY with promo code: KNOWLES and enjoy the exclusive benefits for 25% off at https://utm.io/ueEss
…
continue reading
This podcast series is brought to you by Lookout. In each episode, host Hank Schless brings on guests from different corners of cybersecurity to discuss the impact various technology trends and events are having on how we think about security and privacy.
…
continue reading
There are great stories in the security industry that aren’t being told. Fascinating people who fly below the radar and aren’t being heard. We know because we encounter them in hallways, hotel lobbies and just about everywhere imaginable across the globe. Everytime we think “I wish I had recorded that conversation so that everyone could hear it…” Our goal with Security Voices is to provide a place for clear-headed dialogue with great people that’s unencumbered by the hyperbole and shouting t ...
…
continue reading
In this podcast we discuss mentoring in cybersecurity, information for those that are looking to get into cybersecurity, and tips for those that are looking to advance their careers.
…
continue reading
Welcome to The Bare Metal Cyber CISSP Audio Course—your comprehensive companion for mastering the Certified Information Systems Security Professional (CISSP) certification. Built for serious cybersecurity professionals and aspiring leaders alike, this Audio Course transforms the eight domains of the CISSP Common Body of Knowledge into clear, structured, and engaging lessons you can learn anytime, anywhere. Each episode blends real-world context, expert insight, and exam-focused explanations ...
…
continue reading
The Ambitious Bookkeeper podcast is for bookkeepers & accountants who are growing or aspiring to start their own business. Our mission is to elevate the bookkeeping profession by providing support and resources for new and experienced firm owners. We share actionable tips on running a successful bookkeeping business, tools and resources, plus guest expert interviews that will help you elevate your business. Where you can find us: Website: https://www.ambitiousbookkeeper.com BBA: https://www. ...
…
continue reading
Intro – Hi, my names Kyle Aitken and this is a short documentary about the problems of Cyber Security at work. Interview 1 – Hello my names Neil Martin, I don’t know wither that’s the first thing I shouldn’t be saying, given the fact were talking about security. But since you don’t know where I am or where I live, we should be ok at that level. I work as an internet and security specialist, em, I work in mainly the financial sector, but also in various other business areas. Em, I specialize ...
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It's a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
Intel 471's podcast with a twist! Join us for the first fully interactive threat hunting podcast where you can hang out with threat hunters from all over the world! Join a rag-tag bunch of threat hunters as they come out of the woods to explore some of the most burning issues related to cyber security. The Out of the Woods podcast is a casual talk covering the topics of threat hunting, security research, and threat intelligence, and some ranting and raving along the way, all over a cocktail ...
…
continue reading
Discussions over drinks with security, defense, and foreign policy insiders and experts. The original War on the Rocks podcast series.
…
continue reading
The Bare Metal Cyber CCISO Audio Course is your complete, executive-level training companion for mastering the Certified Chief Information Security Officer (CCISO) certification. Built for experienced cybersecurity professionals and strategic leaders, this Audio Course delivers over seventy focused episodes covering every domain, concept, and competency area tested on the official EC-Council exam. From governance, risk, and compliance to strategic planning, vendor oversight, and technical co ...
…
continue reading
The Hack Podcast, straight-talk smart tech. Leon McQuade, Paul Longely and Dean Bulfeild bring a leader’s eye over technology drivers shaping the world back to East Yorkshire. We now live in a dazzling world of screens that continues to revolutionise how we live, work and play. The futures arriving faster than ever before, it's time to Think Different. We talk transformation and change focusing on People, Process and Technology. Originally Inspired By Pete Lindsay and Mark Bawden's Book “Pig ...
…
continue reading
Just Lookin’ Out is the first podcast from online safety advocate Kalie Nitzsche who was inspired to create this show after being spectacularly duped by a guy she met on the dating apps. It’s a safe place to share, relate, commiserate, and get practical tips about how to survive this fast-paced digital first world. How do we protect ourselves from a scam? What good or bad traits should we be on the lookout for if we're meeting people for the first time online? How can Kalie and her guests he ...
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Wait Just an Infosec is a weekly hour-long cybersecurity-focused broadcast produced by SANS Institute, streamed live on LinkedIn and YouTube, Tuesdays at 10am ET and available to listen to in podcast format on Wednesdays. Our hosts and invited guests are a rotating lineup of SANS faculty members and experts across all infosec domains – some of the brightest minds in cybersecurity, with decades of experience as practitioners. Each week will offer thought-provoking, rich content for a full ran ...
…
continue reading
When the threats are real and the stakes are high — what actually works? Right now, as you're reading this, someone's watching your family, your business rivals are digging through your digital history, and a disgruntled employee knows exactly where your vulnerabilities are. While you're focused on your day job, they're building a plan. This podcast exists because ignoring threats doesn't make them disappear. I'm Philip Grindell — former Scotland Yard detective, behavioural threat specialist ...
…
continue reading
1
RAISING HER CONFIDENTLY | Connecting with Teens, Parenting Styles, Family Communication, Raising Teen Daughters
Jeannie Baldomero | Parenting Teens Coach Inspired by Brene Brown, Mark Gregston, Gary Chapman
Do you want to have open communication with your teen daughter? Do you find yourself up late at night constantly thinking about how to talk to your teen or why she’s not opening up to you? Do you wake up with confident intentions only to feel confused and frustrated when you get 1-word answers from your daughter or instead of the deep conversations you hoped to have, you end up in a yelling match? Hi, I’m Jeannie. I think back to when I was 13. I was that teenage girl you are googling about! ...
…
continue reading
1
Critical Thinking in the Age of Digital Propaganda - misinformation and disinformation
31:07
31:07
Play later
Play later
Lists
Like
Liked
31:07The provided text is a transcript of a Twitter Spaces discussion where participants explored the significant threats posed by misinformation and disinformation in the context of cyber culture and societal stability. The conversation clarifies that disinformation is the deliberate spreading of false information, often for financial or political gain…
…
continue reading
1
287\\ 4 Simple Ways to Connect with Your Teen Girl This Holiday Season
21:11
21:11
Play later
Play later
Lists
Like
Liked
21:11Today we’re going to talk about four ways to connect with your teenage daughter in ways that feel natural, authentic, and not forced. Ways that feel like exhaling, not performing. And then at the end, I’m going to give you a couple of really helpful conversation tools — so you can connect in a way where she feels seen and safe, rather than judged, …
…
continue reading
1
Try Not To Laugh: Michael REACTS To Spicy Tiktoks
11:18
11:18
Play later
Play later
Lists
Like
Liked
11:18Michael's Producers and subscribers compete in three rounds to see who can make Michael laugh the hardest with their feed. - - - Today's Sponsor: Hillsdale College - Start learning today. Go to https://hillsdale.edu/knowles to sign up for over 40 free online courses. - - - Privacy Policy: https://www.dailywire.com/privacy Learn more about your ad c…
…
continue reading
1
The Psychology of Ignoring Cybersecurity: Why We Think It Won’t Happen to Us
10:30
10:30
Play later
Play later
Lists
Like
Liked
10:30Why do people ignore cybersecurity until it’s too late? In this episode of Darnley’s Cyber Café, we dive into the psychology behind cyber neglect, the illusion of “it won’t happen to me,” and why privacy still matters in a world where everything feels exposed. Using real data and relatable examples (including one about bathroom stalls…), we break d…
…
continue reading
1
"I Was Given To A Man When I Was A Child " Michael & The Sharia Survivor | Sabatina James
2:18:40
2:18:40
Play later
Play later
Lists
Like
Liked
2:18:40In this emotional and eye-opening episode of Michael &, Michael Knowles sits down with Sabatina James — a woman who was given away as a child bride and forced into marriage with a man twice her age. Sabatina courageously recounts her harrowing experience, her fight for freedom, and how she ultimately found redemption through faith in Jesus Christ. …
…
continue reading
1
Last Chance: 50% Off Cyber Week Sale Ends Soon
1:30
1:30
Play later
Play later
Lists
Like
Liked
1:30This is your final opportunity to get a new DailyWire+ annual membership for 50% off, including upgrades and gift memberships. Unlock our entire slate of premium entertainment, uncensored, ad-free daily shows, and the upcoming seven-part epic series, The Pendragon Cycle: Rise of the Merlin. Join now at https://dailywire.com/subscribe - - - Priva…
…
continue reading
FOLLOW UP starts with the realization that Spotify Wrapped thinks we are 82 years old, which honestly feels accurate, followed by a massive shout out to Bama Bryan on Bluesky for listening to us for over 3,000 minutes. We look at the grim stats from the Department of Government Efficiency regarding USAID deaths, then move to IN THE NEWS where the K…
…
continue reading
1
Ep. 1869 - BREAKING: January 6 Pipe Bomber Revealed
53:49
53:49
Play later
Play later
Lists
Like
Liked
53:49The FBI finally arrests the J6 pipe bomber suspect, the Left continues to justify violence against conservatives, and Qatar takes a bunch of American influencers on vacation. Ep.1869 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlri - - - Today's Sponsors: Hillsdale College - Start learning today. Go to https:…
…
continue reading
1
S3 Ep50: Game of Nodes: Persistence Is Coming
42:16
42:16
Play later
Play later
Lists
Like
Liked
42:16Top Headlines: securelist.com | The Tsundere botnet uses the Ethereum blockchain to infect its targets: https://securelist.com/tsundere-node-js-botnet-uses-ethereum-blockchain/117979/ Group-IB | Bloody Wolf: A Blunt Crowbar Threat To Justice: https://www.group-ib.com/blog/bloody-wolf/ welivesecurity.com | MuddyWater: Snakes by the riverbank: https:…
…
continue reading
1
STOP Ignoring These 7 Cyber Security Rules or Get Hacked
15:02
15:02
Play later
Play later
Lists
Like
Liked
15:02Send us a text Cybercrime is exploding in South Africa — and most victims aren’t careless… they’re unaware. In this episode of The Security Guy’d, we break down 7 essential cyber security steps that will protect your money, phone, identity, banking apps, and digital life in 2025 and beyond. These tips are simple, practical, and powerful enough for …
…
continue reading
1
Digital Justice in Uruguay: Hill's Case and the Anthem of Resistance
38:22
38:22
Play later
Play later
Lists
Like
Liked
38:22the provided text examines the modern struggle for freedom and justice in Uruguay by comparing the plight of traditional political prisoners with the challenges faced by the contemporary "digital prisoner." This extensive analysis focuses on Alberto Daniel Hill, the country's first incarcerated "hacker," whose wrongful prosecution following an ethi…
…
continue reading
1
Ep. 1868 - BREAKING: Liberal Journalist Exposed in Satanic Child Abuse Ring
54:34
54:34
Play later
Play later
Lists
Like
Liked
54:34A liberal journalist has been charged with leading an international satanic child sexual abuse material ring, a man goes viral for protecting passengers on a New York subway, and leftists finally admit mass migration is being used as ethnic cleansing against Americans. Ep.1868 - - - Click here to join the member-exclusive portion of my show: https:…
…
continue reading
In the season five finale of the Cyber Security Mentors podcast, hosts Steve and John reflect on the season's highlights, featuring insightful discussions with various cybersecurity experts. They recap key lessons learned, including leadership during crises, negotiation tactics, and the importance of community support. The episode also addresses li…
…
continue reading
1
La Fabricación de la Realidad 1: Dentro de la Economía Sombra de las Redes Sociales
9:11
9:11
Play later
Play later
Lists
Like
Liked
9:11Bienvenidos al CyberMidnight Club. Esta noche, arrancamos la interfaz brillante de tus aplicaciones favoritas para revelar el vientre oscuro, húmedo y lleno de cables de internet. Estamos investigando "La Fabricación de la Realidad": una economía sumergida multimillonaria donde el consenso online se fabrica, se compra y se vende a escala industrial…
…
continue reading
1
The Fabrication of Reality 2: Inside the Shadow Economy of Social Media
39:49
39:49
Play later
Play later
Lists
Like
Liked
39:49Welcome to the CyberMidnight Club. Tonight, we strip away the glossy interface of your favorite apps to reveal the humid, cable-strewn underbelly of the internet. We are investigating "The Fabrication of Reality"—a multi-billion dollar shadow economy where online consensus is manufactured, bought, and sold on an industrial scale. You look at your s…
…
continue reading
1
The Fabrication of Reality 1: Inside the Shadow Economy of Social Media Host:
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07Welcome to the CyberMidnight Club. Tonight, we strip away the glossy interface of your favorite apps to reveal the humid, cable-strewn underbelly of the internet. We are investigating "The Fabrication of Reality"—a multi-billion dollar shadow economy where online consensus is manufactured, bought, and sold on an industrial scale. You look at your s…
…
continue reading
1
Uruguay Data Hack Compromised Three Million Records
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49The combined sources present a critical analysis of the October 2025 cybersecurity incident impacting Uruguay’s Plataforma GURI, the education system's central data repository for millions of citizens, including minors. Security analysts confirm this incident is part of a systemic cyber campaign targeting the Uruguayan public sector, concurrent wit…
…
continue reading
1
Desinformación es propaganda intencional, mientras que la mis información es la propagación involuntaria de falsedades
14:07
14:07
Play later
Play later
Lists
Like
Liked
14:07Basado en la transcripción del "Twitter Space" de 2021 y el análisis psicológico proporcionado, este resumen aborda la dinámica de la desinformación y el perfil de su anfitrión, Alberto Daniel Hill. Perfil del Anfitrión: Alberto Daniel HillAlberto Daniel Hill es perfilado como un experto en ciberseguridad con un coeficiente intelectual estimado de …
…
continue reading
1
AI Agents, Enterprise Risk, and the Future of Recovery: Rubrik’s Vision with Dev Rishi
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26In this episode of Screaming in the Cloud, Corey Quinn sits down with Rubrik’s GM of AI, Dev Rishi, to unpack the real story behind enterprise AI adoption, the rise of agentic systems, and why most organizations are still stuck in read-only mode. Dev breaks down how Rubrik’s Agent Rewind brings safety, observability, and resilience to AI-driven act…
…
continue reading
1
Mexico's Cartel State: Violence and Deep Infiltration
38:11
38:11
Play later
Play later
Lists
Like
Liked
38:11The collected materials explore pressing issues across digital security, online communities, and geopolitical corruption. A foundational research report examines how trust and reputation are built and managed in unfiltered online spaces, using a user’s cyber-harassment crisis as a case study. Complementing this, other documents analyze the grave th…
…
continue reading
1
The Epstein You Don't Know: 4 Astonishing Claims From His Own Account of the 2008 Case
38:08
38:08
Play later
Play later
Lists
Like
Liked
38:08The public narrative surrounding Jeffrey Epstein's 2008 prosecution is well-established, painting a picture of a powerful man who used his wealth and connections to escape serious federal charges. However, a detailed, first-person account written by Epstein himself offers a meticulously constructed counter-narrative—an attempt to dismantle the publ…
…
continue reading
1
State Surveillance and Digital Rights in Uruguay
27:59
27:59
Play later
Play later
Lists
Like
Liked
27:59The collected sources examine the controversies surrounding Uruguay's sophisticated electronic surveillance system, "El Guardián," acquired by the Ministry of the Interior to intercept communications like mobile calls, landlines, and social media traffic. While government officials emphasize that the system operates strictly under judicial authoriz…
…
continue reading
1
Scattered Lapsus$ Hunters, SilverFox's ValleyRat Campaign, and More
25:01
25:01
Play later
Play later
Lists
Like
Liked
25:01Resources: https://linktr.ee/ReliaQuestShadowTalk Join host John and intelligence analysts Alex and Hayden as they discuss: Scattered Lapsus$ Hunters Targeting Zendesk (1:14) Microsoft Teams Guest Access Phishing Bypass (3:37) Dark AI Tools Enhancing Threat Actors (6:08) Silver Fox’s Campaign: Chinese APT Spotlight (10:05) John Dilgen: Cyber Threat…
…
continue reading
1
U.S.-Venezuela Tensions: Cyber Risks for American SOCs
6:32
6:32
Play later
Play later
Lists
Like
Liked
6:32Got a question or comment? Message us here! In this episode of the #SOCBrief, we dig into how world events can trigger cyber fallout that lands directly on the desks of security teams. From ransomware crews capitalizing on instability to hacktivists launching DDoS attacks and opportunistic actors going after vulnerable sectors, we talk through why …
…
continue reading
1
Ep. 1867 - President Trump Really, Really, Really Doesn't Like Somalis
52:58
52:58
Play later
Play later
Lists
Like
Liked
52:58President Trump goes full drunk-uncle against Somalis, Sabrina Carpenter disavows the White House, and cops storm in to arrest a female sexual-assault victim for calling her attacker a poof. Ep.1867 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlri - - - Today's Sponsors: Balance of Nature - Go to https://bala…
…
continue reading
1
El ataque digital a tu relación de pareja
17:09
17:09
Play later
Play later
Lists
Like
Liked
17:09Para los oyentes del CyberMidnight Club, la conclusión forense es clara: las redes sociales han desplegado un exploit "Zero-Day" contra la unidad fundamental de la sociedad: la relación romántica. Estamos ante un cambio criminológico donde el smartphone actúa como un atacante "Man-in-the-Middle", interceptando la intimidad y reemplazándola con vali…
…
continue reading
Para los oyentes del CyberMidnight Club, la conclusión forense es clara: las redes sociales han desplegado un exploit "Zero-Day" contra la unidad fundamental de la sociedad: la relación romántica. Estamos ante un cambio criminológico donde el smartphone actúa como un atacante "Man-in-the-Middle", interceptando la intimidad y reemplazándola con vali…
…
continue reading
For listeners of the CyberMidnight Club, the forensic conclusion is stark: Social media has deployed a massive "Zero-Day" exploit against the foundational unit of human society—the romantic relationship. We are witnessing a criminological shift where the smartphone acts as a "Man-in-the-Middle" attacker, intercepting intimacy and replacing it with …
…
continue reading
1
When Your TV Turns Against You: The SmartTube Breach
9:03
9:03
Play later
Play later
Lists
Like
Liked
9:03A major breach hits SmartTube, the popular third-party YouTube app for smart TVs and suddenly millions of living rooms may have quietly become surveillance hubs. In this episode, we break down how the malicious update happened, what the hidden malware was doing behind the scenes, and why smart TVs are quickly becoming one of the biggest cybersecuri…
…
continue reading
1
223 | Using AI Securely + to Land Clients with Kelsey Silver
40:17
40:17
Play later
Play later
Lists
Like
Liked
40:17Send us a text In this episode, I'm chatting with my friend Kelsey Silver about something so many of you have been asking about - how the heck are we supposed to use AI without compromising our clients' security? Kelsey has a super unique background and she breaks down exactly what we need to look for when evaluating AI tools for our firms. Plus, s…
…
continue reading
1
Ep. 1866 - Stranger Things Star DEFENDS The Child Sacrifice Of Her Sibling
55:39
55:39
Play later
Play later
Lists
Like
Liked
55:39A Stranger Things star is grateful her parents aborted her sibling, a Republican senator wants to end dual-citizenship, and the FDA admits the Fauci Ouchie killed kids. Ep.1866 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlri - - - Today's Sponsors: Birch Gold - Text KNOWLES to 989898 for your free informatio…
…
continue reading
1
Former U.S. Secret Service Special Agent Shares Cyber Criminal Secrets
38:23
38:23
Play later
Play later
Lists
Like
Liked
38:23Former U.S. Secret Service Special Agent Richard LaTulip joins Craig Duckworth to reveal the hidden world of cyber criminal networks and infrastructure attacks. Drawing from his undercover work infiltrating dark web forums and catching some of the world's most sophisticated threat actors, Richard breaks down why traditional security approaches fail…
…
continue reading
Got a question or comment? Message us here! 📱 This #SecureAF episode covers the everyday questions and concerns people have when they think something unusual is happening with their devices or accounts. Hickman and Peters talk through typical scenarios, common misunderstandings, and the foundational steps that help people regain control of their ac…
…
continue reading
1
HS119: Securing 2026: How AI, Quantum, and the AI-Powered Browser are Driving Enterprise Defense (Sponsored)
23:53
23:53
Play later
Play later
Lists
Like
Liked
23:53Anand Oswal, Executive Vice President at Palo Alto Networks, joins Johna Johnson and John Burke for a wide-ranging exploration of two emerging focal points of enterprise risk: cryptographically relevant quantum computing, and browser-mediated agentic AI. The looming arrival of quantum computers that can break legacy encryption has already created t…
…
continue reading
1
Friendly Fire: Hegseth. Homeland Security & Happy Meals
1:06:57
1:06:57
Play later
Play later
Lists
Like
Liked
1:06:57Ben Shapiro, Matt Walsh, and Michael Knowles break down the National Guard shooting and the dangerous reminder it gives the country about Biden’s disastrous immigrations admissions policies. Who got in, who is still out there, and what needs to happen next. Plus, the escalating tensions between the United States and Venezuela. The wartime crime acc…
…
continue reading
1
Ep. 1865 - Why Do We Keep Importing Migrants To Murder Us?
55:35
55:35
Play later
Play later
Lists
Like
Liked
55:35An Afghani "refugee" shoots two National Guardsmen in D.C., a lib congressman says white supremacists should be deported, and President Trump calls Tim Walz retarded. Ep.1865 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlri - - - Today's Sponsors: Mizzen + Main - Get 20% off your first purchase by using code …
…
continue reading
1
Dating Apps after 40 w/ TikTok Dating Guru Catherine Berra
59:53
59:53
Play later
Play later
Lists
Like
Liked
59:53Send us a text What’s the worst thing a guy can do before you meet him for a first date? Our guest this week has the answer! Catherine Berra, shares crazy tales from her book These Stories Are True ... I Sh#t You Not!: A Humorous Look at Online Dating for the Unsuspecting Older Human, detailing both her own wild experiences and those of her male an…
…
continue reading
1
286\\ Understanding Your Teenage Daughter's Development with Dr. Anna Levy-Warren
31:55
31:55
Play later
Play later
Lists
Like
Liked
31:55Wondering why can't your teen girl keep herself organized? Frustrated by her lack of skills in areas you know your teenage daughter should already know? Dr Anna Levy-Warren, clinical psychologist, founder of Organizational Tutors and mom of teens, talks about navigating the teen years: executive functioning-based strategies for thriving through mor…
…
continue reading
1
Cognitive Security in a Noisy World w John Bicknell
51:38
51:38
Play later
Play later
Lists
Like
Liked
51:38What happens when the information environment becomes too loud for the human brain to handle? And why does it feel like everyone — kids, adults, institutions, governments — is getting overwhelmed at the same time? We sit down with John Bicknell, former Marine and host of The Cognitive Crucible, to talk about the cognitive overload shaping modern li…
…
continue reading
1
Unlocking Data Protection: Vishnu Varma on Cybersecurity Challenges
53:55
53:55
Play later
Play later
Lists
Like
Liked
53:55Send us a text In this episode, Joe sits down with Vishnu Varma to explore the evolving landscape of cybersecurity and data management. Vishnu shares his journey from India to the US, detailing his experiences at Cisco and the rise of cloud security. They delve into the challenges of managing vast amounts of data in the age of AI, discussing how Bo…
…
continue reading
1
"You're WRONG Knowles!" After That, The Dark | Andrew Klavan
20:19
20:19
Play later
Play later
Lists
Like
Liked
20:19Andrew Klavan joins Michael to discuss literature, the arts, and Drew's newest book, After That, The Dark. Give it a read today! Purchase your copy of "After That, the Dark" here: https://amzn.to/47D4WEE Once a year, every year, we give you our best deal of the year. And it’s happening right now. DailyWire+ memberships are 50% off. https://getdwplu…
…
continue reading
1
Biorobotics & Neuralink: How Tech Is Rewiring the Human Body
9:30
9:30
Play later
Play later
Lists
Like
Liked
9:30In this episode of Darnley’s Cyber Café, we dive into the fascinating, and slightly unsettling, world of biorobotics, where human biology meets advanced robotics and neural technology. From groundbreaking innovations like Neuralink, next-gen prosthetics, and brain-computer interfaces, to the hidden cybersecurity risks of merging technology directly…
…
continue reading
1
Michael Knowles Reads His Reddit Hater Threads
16:02
16:02
Play later
Play later
Lists
Like
Liked
16:02Michael Knowles dives deep into the internet’s darkest corners, is own Reddit hater threads. From unhinged rants to oddly specific insults, he reads and reacts to what Reddit really thinks about him (and maybe has a few thoughts of his own).Watch as Michael breaks down the funniest, harshest, and most ridiculous comments the internet has to offer, …
…
continue reading
After surviving Thanksgiving and the subsequent biting cold, we jumped into the FOLLOW UP with news that Malaysia is joining the trend by taking steps to ban social media for children under 16, mirroring similar actions in Australia and Denmark—it seems the world is finally realizing the internet is a toxic wasteland for the kids. We also discussed…
…
continue reading
1
Loser Does 100 Push-Ups LIVE! YES or NO: Michael Knowles Vs. Read Choi
59:15
59:15
Play later
Play later
Lists
Like
Liked
59:15YES or NO: Michael Knowles Vs. Read Choi Once a year, every year, we give you our best deal of the year. And it’s happening right now. DailyWire+ memberships are 50% off. https://getdwplus.com/blackfridayMICHAELYT - - - Today's Sponsor: Balance of Nature - Go to https://balanceofnature.com/pages/podcasters and use promo code KNOWLES for 35% off you…
…
continue reading
1
Inside SA’s Security Battle: QCTO, SASSETA, PFTC Explained
45:33
45:33
Play later
Play later
Lists
Like
Liked
45:33Send us a text South Africa’s security industry is facing one of its biggest challenges yet — and most people have no idea what’s really happening behind the scenes. In this powerful episode of the Security Guy’d Podcast, Rafee Moosagie sits down with veteran Close Protection Officer and Law Enforcement Training Manager Mario Firmstone to break dow…
…
continue reading
A_Hacker_s_Fear_for_Mexico
…
continue reading
Ecosistema_tóxico_de_Twitter
…
continue reading
The Promise and Peril of a Global Conversation Imagine trying to tell your friends about something important you just saw online. You start to speak, “You guys are not going to believe what Trump just tweeted…”—but before you can finish, your phone buzzes. And again. And again. The constant stream of notifications, arguments, and alerts becomes so …
…
continue reading
1
We Tested ACI Learning’s Security+ Bundle — Here’s What We Found
36:57
36:57
Play later
Play later
Lists
Like
Liked
36:57In this episode of the Cyber Security Mentals podcast, hosts Steve and John delve into effective strategies for studying cybersecurity. They discuss the importance of structured learning, hands-on labs, and consistent practice, while exploring the challenges of self-paced learning. The episode highlights the benefits of programs like ACI Learning a…
…
continue reading