show episodes
 
Artwork

1
From Gay to Ze

Lotte Jeffs/Stu Oakley

Unsubscribe
Unsubscribe
Monthly
 
Celebrating queer life from A to Z. Award-winning hosts and authors Lotte Jeffs and Stu Oakley are joined by special guests to discuss queer pop culture, LGBTQ+ life and everything in-between.
  continue reading
 
Artwork
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
Artwork
 
Murder & Mediumship is true crime meets intuition. Host & Psychic Medium, Kathryn, turns over missing people and murder cases as most true crime podcasts do - but then connects as a psychic medium to the events as well as the spirit world to dissect the evidence & to discover the unknown.
  continue reading
 
In a world of rapid change and growing uncertainty, we need clarity and actionable guidance. Wisdom Rebellion peels back the layers of modern culture's promises - from the illusion of perfect health and happiness to the realities of isolation and societal division. Hosted by Kat Kuczynska - a mother, partner, and entrepreneur who will explore these complex issues with you. We will be challenging the status quo, questioning societal norms, and exploring how we can thrive despite ever-accelera ...
  continue reading
 
Loading …
show series
 
We had the pleasure of finally having Dave Lewis on the show to discuss shadow IT and security debt. Dave shared some fascinating insights from his long career in cybersecurity, emphasizing the importance of addressing fundamental security issues and the human aspect of security. We delved into the challenges of managing shadow IT, the complexities…
  continue reading
 
Explore the shifting tides of British society as we tackle immigration its impact on zoomer demographics and the pressing topic of multiculturalism. Kat and Charlie Downes who is a political commentator, political strategist at Touchpoint Strategy and a content lead at the Centre for Migration Control as they dive into the radical transformation of…
  continue reading
 
Andy drops some Microsoft Windows and 365 knowledge as we discuss the details on how we get to secure by default in our Windows and cloud environments. This week: The USB Army Knife that won't break the budget, I don't want to say EDR is useless (but there I said it), Paul's list of excellent hacking tips, FortiJump - an RCE that took a while to be…
  continue reading
 
Join me for a change of pace where you get a front row seat to an actual reading with fellow content creator, Josh. If you are interested in your own session after hearing this, then click below to set one up for yourself. XOXO, Kathryn Click here to book a session. or hereBy Kathryn Ostrowski
  continue reading
 
New security and vulnerability research is published every day. How can security teams get ahead of the curve and build architecture to combat modern threats and threat actors? Tune-in to a lively discussion about the threat landscape and tips on how to stay ahead of the curve. Segment Resources: https://blog.qualys.com/vulnerabilities-threat-resea…
  continue reading
 
The conversation about the darkest corners of human nature with Prof. Roy F. Baumeister as we tackle the unsettling question of ‘why good people become evil’? This gripping interview unveils the dark psychology and mechanisms behind seemingly incomprehensible actions. Prof. Baumeister, a world’s leading figure in psychology, dissects the enigma of …
  continue reading
 
Did Diddy's ex and mother of three of his children truly succumb to pneumonia or was something far more nefarious to blame? Tune in to find out. To book any private appointments with me or to see more of the services that I offer, please click here. Follow me on all social media platforms here.By Kathryn Ostrowski
  continue reading
 
"Code of Honor: Embracing Ethics in Cybersecurity" by Ed Skoudis is a book that explores the ethical challenges faced by cybersecurity professionals in today's digital landscape. The book delves into the complex moral dilemmas that arise in the field of cybersecurity, offering guidance on how to navigate these issues while maintaining integrity. Th…
  continue reading
 
Delve into the future of intimacy where VR sex and AI dating are redefining human connections, with Dr. Marianne Brandon. We explore how emerging technologies like virtual reality and artificial intelligence are transforming our understanding and experience of intimacy. Dr. Brandon unpacks the complex interactions between technology and human sexua…
  continue reading
 
This episode of Paul Security Weekly features John Hammond, a senior security researcher from Huntress, discussing malware analysis. Hammond dives into the analysis of Ocean Lotus attacks, highlighting the use of stealthy techniques like alternate data streams and DLL side-loading. The conversation also touches on the challenges of combating attack…
  continue reading
 
This week in the security news, Dr. Doug and Larry explore various technological advancements and their implications with a healthy dose of nostalgia, particularly focusing on health monitoring through Wi-Fi signals, the misconceptions surrounding 5G connectivity, the importance of understanding internet speed needs, and the cybersecurity threats f…
  continue reading
 
A pregnant mother disappears after a prenatal checkup. Not even a hint of where she could have gone. Find all of my socials, intuitive development classes, and readings here. Sources: https://www.aetv.com/real-crime/latoyia-figueroa https://greensboro.com/missing-woman-may-share-fate-of-her-mother-in-85/article_e43940d7-93c6-5489-be5c-869b2ff3399d.…
  continue reading
 
Apple drops a lawsuit to avoid exposing secrets, what does it mean for the security industry if MS locks down the kernel?, exploding pagers, more things from the past: Adobe Flash exploits, robots get rid of your data, PKFail is still a thing, Android TV malware is back: now with conspiracy theories, DMA attacks, gamers are not nation-state attacke…
  continue reading
 
Dive into the controversial world of woke ideology and the raging culture wars in our societies with Professor Eric Kaufmann, as we dissect how political landscapes are shaping the lives of the younger generations. This engaging conversation unravels the intricate connections between modern left ideologies and the increasing LGBT identification amo…
  continue reading
 
Lee comes on the show to discuss: EU CRA - https://en.wikipedia.org/wiki/CyberResilienceAct - its impact on bringing products to market and the challenges of enforcing such laws that require products to be "Secure" Recent legislation on disputes for federal agency fines - Chevron deference rule - supreme court decision, uncertainty, more or less cl…
  continue reading
 
Murdered by the foster care system. Joy King-Castro never stood a chance at having a joyous, fun, and “normal” life. Connect with Kathryn Show Notes: https://www.dignitymemorial.com/obituaries/cocoa-fl/joy-king---castro-10333103 https://www.wftv.com/news/local/documents-give-new-details-into-brevard-county-foster-mother-charged-with-murder-child-ab…
  continue reading
 
Exploring the Hacking Landscape with Mark Loveless, AKA SimpleNomad Dive into the intricate world of cybersecurity with our featured guest, Mark Loveless, widely known by his handle SimpleNomad. With a rich history in the realm of information security, Mark is a seasoned professional, researcher, and thought leader. Mark's journey spans decades, ma…
  continue reading
 
After living with her foster parents for most of her short life, Oakley Carlson was returned to her biological parents only to disappear just over a year later. She was missing for 8 months before being reported missing by her biological father. Washington State DCYF failed Oakley Carlson. Where is Oakley? Kathryn's Social Media & Session Booking L…
  continue reading
 
Is investing in children the cornerstone for a thriving future? Join Kat and Josh Wood, the Executive Director of Them Before Us as we unravel the profound impacts of pro-child policies on society's economic and social fabric. We delve into how every aspect of policy from education to immigration can and should be reimagined with children at the fo…
  continue reading
 
Larry and Helen walk us through the AI supply chain landscape. Learn what goes into building and using AI models and the dangers that could lurk within. Segment Resources: Community efforts on AIBOM topic: https://github.com/aibom-squad This week: I want all the firmware, its not just TP-Link, CVEs for malware, BLE and your health, faking your own …
  continue reading
 
Are we too soft on our kids? Dive deep into the controversial world of permissive parenting with Kat and Dr. Leonard Sax, a renowned expert in child and adolescent development. This conversation exposes the troubling outcomes of lax parenting styles and the critical need for more defined boundaries in family dynamics. Explore why striving to be you…
  continue reading
 
Every week here on the show we talk about vulnerabilities and exploits. Typically we recommend that organizations remediate these vulnerabilities in some way. But how? And more importantly, which ones? Some tools we have to help us are actually not all that helpful at time, such as: Mitre Att&ck - Don't get me wrong, this is a great project and Ada…
  continue reading
 
Unlock the secrets of genetic psychology with Professor Robert Plomin as we explore how our genes shape our behaviour, personality, and mental health. Dive into the heart of the debate: are we the products of our environment, or do our genes determine who we become? Join Kat and Professor Robert Plomin in this fascinating discussion about the subst…
  continue reading
 
Early on in his career Spaf was working with microcode and continued to work on technical projects. As time went on he realized that focusing on the non-technical work, such as policies and shaping our thinking, would help move the needle. Borrowing concepts from his book on the subject, we will delve into some cybersecurity myths such as: Are user…
  continue reading
 
Are we truly living under a patriarchy, or is the term currently misunderstood? Join Kat and George, a man behind TheTinMen as they delve into the heated debate on the true meaning of patriarchy in today's society. Our discussion not only challenges prevailing notions of male oppression but also shines a light on often ignored issues like men's hea…
  continue reading
 
This week, Downgrade attacks, bootloader fun, check your firmware before you wreck your firmware, you've got mail server issues, Ivanti is the new Rhianna, you should update your BIOS, Openwrt dominates, and attacking the security tools for fun and profit! Learn what is most interesting at hacker summer camp this year! Visit https://www.securitywee…
  continue reading
 
Is empathy always a virtue? Or is it just a smoke screen for narcissists? Join Kat as she delves into a provocative discussion with Dr. Barbara Oakley, exploring why 'empathy is not virtuous' can be a hard truth in today's society hell-bent on thin veneer of kindness. Unpacking the concept of pathological altruism, they uncover how well-meaning act…
  continue reading
 
Time to reverse the fall of our civilisations and explore potential solutions to population collapse that is awaiting us. Join Kat and Dr. Paul Morland, a renowned author and broadcaster, widely recognised as one of the world's leading demographers as they discuss the paradox of wealth and fertility, the consequences of aging populations, and the u…
  continue reading
 
John is one of the foremost experts in UEFI and joins us to talk about PK Fail! What happens when a vendor in the supply chain accidentally loses a key? It's one of the things that keeps me up at night. Well, now my nightmare scenario has come true as a key has been leaked. Learn how and why and what you can do about it in this segment! Hacking tra…
  continue reading
 
In this episode, Kat Kuczynska is joined by Dr. Mark Leary to talk about the "Goldilocks Zone" for self-reflection. They explore how to strike the perfect balance between too much and too little self-awareness and discuss the evolutionary roots of stress responses, the importance of controlling negative emotions, and the perils of excessive self-fo…
  continue reading
 
Doug and the Security Weekly crew talk about vulnerabilities, are we patching the right things? This is the burning question. We will try to answer it. Segment Resources: https://blog.sonicwall.com/en-us/2024/04/patch-tuesday-which-vulnerabilities-really-need-prioritizing/ Segment description coming soon!The Crowdstrike incident: what happened and …
  continue reading
 
Thinking about getting a 3D printer or have one and need a good primer? Check out this segment, we live 3D print a Captain Crunch whistle and talk all about 3D printing for hackers! Segment Resources: Slides used in this segment: https://files.scmagazine.com/wp-content/uploads/2024/07/3D-Printing-for-Hackers.pdf Major 3D Printer Websites: https://v…
  continue reading
 
In today's episode, Kat Kuczynska talks to Dr. David C. Geary in an enlightening discussion about the complexities of education and gender dynamics. They explore how different educational approaches can benefit boys and girls. They also discuss the nuances of equal rights and parental responsibilities and examine the impact of societal narratives o…
  continue reading
 
Bats in your headset, Windows Wifi driver vulnerabilities, Logitech's dongles, lighthttpd is heavy with vulnerabilities, node-ip's not vulnerability, New Intel CPU non-attacks, Blast Radius, Flipper Zero alternatives, will OpenSSH be exploited, emergency Juniper patches, and the D-Link botnet grows. Iceman comes on the show to talk about RFID and N…
  continue reading
 
In today's episode, Dr. Joyce Benenson offers a deep dive into her groundbreaking research on the differences between men and women. She shares surprising findings that challenge common beliefs, such as the discovery that young boys and men are highly communal, caring, and cooperative, contrasting with the common stereotype of men we have in our mi…
  continue reading
 
Exploring the Hardware Hacking Realm with Joe Grand, AKA Kingpin Joe Grand, also known by his hacker pseudonym "Kingpin," stands as a prominent figure in the cybersecurity landscape. With an extensive background in hardware hacking, reverse engineering, and embedded systems, Joe has carved a niche for himself as a respected authority in the field. …
  continue reading
 
This may be controversial, however, we've been privately discussing how organizations benefit from penetration testing and vulnerability scanning. Do you still need these services as a critical part of your security program? Can't you just patch stuff that is missing patches? Tune in for a lively debate! Zyxl NAS devices are under attack and the ex…
  continue reading
 
From Gay to Ze returns for a special one off episode to celebrate the release of the acclaimed BBC drama, Lost Boys and Fairies. Lotte and Stu are joined on the podcast by one of its stars, Fra Fee, and creator and writer, Daf James. The series, which premiered on the BBC this year, and is now available on iPlayer, is the tender, glittering story o…
  continue reading
 
In today's episode, you'll join host Kat Kuczynska in a compelling conversation with Bettina Arndt, a pioneering sex therapist and advocate for men's rights in Australia. As you listen, you'll explore a range of topics including the unique challenges that arise in divorce cases, the damaging impact of false allegations, and the growing educational …
  continue reading
 
Exploring the Strategic Minds in Cybersecurity: A Conversation with Dave Aitel Welcome to an enlightening episode of our podcast, where we sit down with Dave Aitel, a prominent figure in the cybersecurity landscape. With a robust background in offensive security and an extensive career spanning various facets of the industry, Dave brings a wealth o…
  continue reading
 
We will discuss LLM security in general and some of the issues covered in the OWASP Top 10 for LLMs! Segment Resources: https://genai.owasp.org/ Skyrocketing IoT vulnerabilities, bricked computers?, MACBORG!, raw dogging source code, PHP strikes again and again, if you have a Netgear WNR614 replace it now, Arm Mali, new OpenSSH feature, weird headp…
  continue reading
 
Josh comes on the show to discuss all things related to vulnerability tracking and scoring, including the current issues with various systems and organizations including NIST, CVE, Mitre, CVSS, NVD, and more! Segment Resources: NVD blog post Josh wrote: https://anchore.com/blog/navigating-the-nvd-quagmire/ Josh's Latest post: https://opensourcesecu…
  continue reading
 
Kat Kuczynska interviews Dr. Darrell Bricker as they explore the complex topic of declining global population rates. Darrell is the CEO of Ipsos Public Affairs and has written several national best-selling books, his most recent is called Next. Kat and Darrell discuss how declining birth rates could potentially impact everything from climate change…
  continue reading
 
Making The World A More Secure Place: Joshua Corman's Journey and Insights Welcome to an insightful podcast episode featuring Joshua Corman, a prominent figure in the realm of cybersecurity. With a wealth of experience and a keen understanding of the evolving threat landscape, Joshua has established himself as a thought leader and influencer in the…
  continue reading
 
The Security Weekly crew and special guest Seemant Sehgal explore what PTaaS involves, how it differs from traditional penetration testing, and why it's becoming a crucial service for companies of all sizes to protect their digital assets. We'll discuss the how PTaaS is using the latest technologies (e.g machine learning), the benefits of having a …
  continue reading
 
Has cryptocurrency done more harm than good? Our guest for this segment has some interesting views on its impacts! Vulnrichment (I just like saying that word), Trustworthy Computing Memo V2, SSID confusion, the Flipper Zero accessory for Dads, the state of exploitation, Hackbat, Raspberry PI Connect, leaking VPNs, exploiting faster?, a new Outlook …
  continue reading
 
In today’s episode, our host Kat Kuczynska sits down with Dr Alka Sehgal Cuthbert, the thoughtful director of Don't Divide Us, an organisation that challenges the rise of critical race theory and divisive ideologies in our schools. Together, they explore the substantial growth of diversity and inclusion roles across various sectors, especially in e…
  continue reading
 
Your host Kat explores the controversial ethics behind the fertility industry with her inspiring guest Jennifer Lahl. Jennifer, an expert in bioethics and a vocal advocate for ethical fertility practices, brings to light the often overlooked risks and ethical questions surrounding surrogacy, egg donation, and IVF treatments. They explore the commod…
  continue reading
 
Loading …

Quick Reference Guide