Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The podcast that brings you the very best in all things, cybersecurity, taking an in-depth look at the most pressing issues and trends across the industry. Connect with us on our LinkedIn page! - https://www.linkedin.com/company/security-masterminds-podcast/
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Safety. Security. Survival. What I’ve taught multi-billion dollar companies to give them peace of mind. Mindset, awareness and preparing for unexpected danger. From www.safetyman.co
…
continue reading
Learn to use the sciences of the mind to help you understand what makes you emotionally tick. Two Austin therapists and their world-recognized guest experts break down the research in modern attachment, relational neuroscience and trauma in a challenging but entertaining format to keep you off autopilot and moving towards closer connections. www.therapistuncensored.com
…
continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
continue reading
🎙️ Dive into the world of cybersecurity with Cubic Lighthouse Podcast - your expert companion in navigating the latest developments and crucial topics in the field. We dissect complexities, provide strategic insights, and ensure you stay abreast of cutting-edge trends. Whether you're a seasoned professional or a cybersecurity enthusiast, join us for concise expertise and actionable intelligence to enhance your security posture. 🌐🔐
…
continue reading
Tune in as our hosts answer questions from small business leaders! We will discuss real-world Information Security challenges faced by our callers and offer relevant advice and guidance.
…
continue reading
Every parent is a protector. The Secure Dad Podcast empowers families to live safer, happier lives. Every week host Andy Murphy discusses topics like home security, situational awareness, privacy, and online safety. Plus, he interviews industry experts on how we can all level up our preparedness. The information shared on The Secure Dad Podcast is for general information only.
…
continue reading
Embark on a journey with us as we explore the realms of cybersecurity, IT security, business, news, technology, and the interconnected global geopolitical landscape. Tune in, unwind with your preferred cup of java (not script), and engage in thought-provoking discussions that delve into the dynamic evolution of the world around us.
…
continue reading
In a community of likeminded individuals in the firearms, and self-protection industry, Evolution Security instructors Eric Davis, Brian Schilt and Aaron Davis believe in a renaissance approach and philosophy. Focusing on teaching, educating, and informing everyday people on the path of defense and health. You will hear case studies on the judicious use of force and statistics that are far too often ignored by the mainstream media. There will be a heavy emphasis on personal accountability, f ...
…
continue reading
"Light 'Em Up" takes a deep dive on the criminal justice system, crime scene investigation and leadership. We take you under and behind the crime scene investigation tape to get at the truth, the whole truth and nothing but the truth, so help us God! Justice comes to those that fight ... not those that cry!
…
continue reading
The purpose of this podcast is to provide unclassified information about current trends in homeland security for the state of New Jersey, as well as educational information and resources for your awareness.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Let's save the world by 2030. Our Platform for Survival aims to prevent war and weapons (especially nuclear); global warming; famine; pandemics, massive radiation exposure; and cyberattacks—and adopt “enabling measures” (global economic, security, and governance reforms).
…
continue reading
Welcome to the Re-Thinking the Human Factor podcast. It’s a podcast for information security professionals, where we will be asking our guests to share thoughts and insights on security awareness, behaviour and culture. Our guests come, predominately, from outside of the security industry. They all specialise in elements of awareness, behaviour and culture, or they have effectively tackled similar challenges, in their own industry or careers. The one thing that unites them all is their willi ...
…
continue reading
Get ready for a deep dive into what cybersecurity professionals often refer to as the "8th Layer" of security: HUMANS. Welcome to 8th Layer Insights (8Li). This podcast is a multidisciplinary exploration into how the complexities of human nature affect security and risk. Author, security researcher, and behavior science enthusiast Perry Carpenter taps experts for their insights and illumination. Topics include cybersecurity, psychology, behavior science, communication, leadership, and more.
…
continue reading
It aims at creating awareness around hackers stealing financial information and how cyber crime continues to evolve, with new threats surfacing every year. They can, in effect, destroy businesses and damage your financial and personal lives — especially if you’re the victim of identity theft. Cyber attacks are an evolving danger to organizations, employees and consumers. They may be designed to access or destroy sensitive data or extort money. At Hidden Files, hope listeners will be able to ...
…
continue reading
Welcome to our podcast. In each episode we dive into cyber security and management of your security efforts. We'll help you succeed with frameworks, templates, and experts who have tried it before. There's plenty of podcasts about technology and cyber security. So that's not us. Instead, we'll focus on the human aspect of cyber security and processes and frameworks you can use to create effect security work in your company. Your host is Anders Bryde Thornild from www.cyberpilot.io. Each epis ...
…
continue reading
Important safety, survival, and security topics including firearms safety, first aid training, PTSD help, firearms instruction and training, NJ permit to carry a handgun topics, and many more!
…
continue reading
Cyber defenders, listen up! The CYFIRMA Research podcast has some juicy intel on the latest cyber threats that are lurking in the shadows. Tune in to this security briefing to stay on top of emerging threats and be ready to tackle digital risk like never before.
…
continue reading
…
continue reading
Join 20-year Navy veteran and safety expert, Gary Marsh, as he takes you on a captivating journey through the complex world of safety, AI safety & security, and beyond. As the author of "Safetyology" and founder of PDC Safety, a company specializing in the art and science of protecting your business, Gary brings unparalleled expertise from years as a safety officer, coach, advisor, manager, and director. Dive deep into gripping stories, practical advice, and the latest developments in AI saf ...
…
continue reading
Grassroots Security Podcast was set up for two things: Provide better awareness about security including tips that hopefully most people can understand. And talk about what's happening in the news related to security and what it could mean for you. I try to make it fun yet informational and educational. I hope you enjoy it as much as I enjoyed making it.
…
continue reading
Cybersecurity weekly podcast series featuring industry thought leaders discussing security solutions, best practices, threat intel, and more. Our primary topics within InfoSec include: Application Security; Artificial Intelligence; Blockchain; Career Development; Cloud Security; Encryption / DLP; Endpoint / Mobile / IoT Security; GRC; Incident Response / SIEM; Identity and Access Management; Network Security; Privacy; Ransomware / Malware; and Security Awareness.
…
continue reading
Farms. Food. Future. looks at the big issues facing farmers in the developing world and what needs to be done to wipe out global hunger while dealing with the climate crisis. It’s brought to you by the UN’s International Fund for Agricultural Development (IFAD) and presented by Brian Thomson. Through the podcast, IFAD raises awareness of the challenges smallholder farmers in developing countries are facing around food security. Farms. Food. Future. includes interviews with IFAD experts, part ...
…
continue reading
Security tips when your out and about instinctual behaviour to keep you and your safe
…
continue reading
Noted fashion and image consultant and entrepreneur Marilyn Wetston hosts her weekly interview program called From a Womans Perspective, with subjects ranging from health and nutrition to travel and security issues. Marilyn Wetston gives it to you straight from a Womans Perspective here on Zoomer Radio. Every Saturday from 8-9am on Zoomer Radio AM740 and FM96.7
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Dive into “Compromising Positions”, the unique, new podcast designed to iron out the wrinkles in the relationship between cybersecurity teams and other tech professionals. We’re taking the ‘security as a blocker’ stereotype head-on, promoting a shared language and mutual understanding. We’ll turn those ‘compromising positions’ into ‘compromising solutions’, helping security pros and tech teams collaborate more effectively for a smoother, safer digital journey. Every week we will be joined by ...
…
continue reading
Can’t sleep? Neither can I! You know how your mind wonders when you’re trying to sleep? The random, weird nonsense that goes on in your head? I bet, more often than not, you lie awake thinking of the most ridiculous things! This podcast is a peek inside MY head. My ADD, crazy, sleep deprived brain. The rambling conversations I have with myself that keep me awake at night. I do not edit my episodes. You hear everything. My dogs, coyotes, crickets, the Amazon driver. You hear unedited, life. Y ...
…
continue reading
InfoSecSync is an Information Security Broadcast that promotes Information Security Awareness to the masses as well as industry professionals.
…
continue reading
Welcome to the Conkers3 page. The home of the Conkers’ Corner podcasts, Twin Petes Investing podcasts and so much more. The podcasts are set out to enhance the awareness of new investors, experienced investors, high net worth individuals (HNWI), Independent Financial Advisers and life long students of the financial markets. This will be done through insightful interviews and podcasts published on a regular basis. If you’re aiming to achieve a financial goal then these podcasts will have wort ...
…
continue reading
Welcome to the Responsibly Armed Citizen Radio Show, presented by Apache Solutions, airing on WSIC every Saturday at 1pm. Join your hosts, Frank Horvath and Tim Kelly, as they delve into the world of responsible firearm ownership, self-defense, and personal security. Whether you are a seasoned gun owner or just starting your journey, this show is designed to provide you with valuable insights and expert advice. About Apache Solutions Responsibly Armed Citizen Radio Show is brought to you by ...
…
continue reading
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
…
continue reading
Confused about the latest cybercrime in the news? Overwhelmed by trying to figure out if an incident applies to you? Want to learn simple, actionable steps to keep you and your family safe online? Introducing Bee Cyber Fit, a podcast for the Yale University community and beyond. We’ll cut through the cyber mumbo jumbo and make cybersecurity awareness easy to digest. Every two weeks we’ll share compelling cyber stories, make sense of buzzwords and share a simple call to action. Scammers are e ...
…
continue reading
This podcast is about raw, real and engaging conversations that get you to think. Get amongst it and reason with me about connection, self-worth and relationships. Why do we think feel and act the way we do? What drives us? How do we show up and be with ourselves and others? How do we find and thrive in healthy relationships? I love raising awareness and changing perspectives and have focused in and observed what the listeners have been connecting with most, you'll see a slight change from 2 ...
…
continue reading
1
Utility Security Podcast - Office for Bomb Prevention & CISA - Partnering with Local Law Enforcement to Improve Bomb-Making Materials Awareness
16:39
16:39
Play later
Play later
Lists
Like
Liked
16:39
Utility Security Podcast - Office for Bomb Prevention & CISA - Partnering with Local Law Enforcement to Improve Bomb-Making Materials Awareness Charles Leas Operations Chief for the Office for Bombing Prevention Subscribe to Utility Security Magazine at no cost! - https://utilitysecurity.com/subscribe-now/…
…
continue reading
1
Ep. 121 - Evolving Ransomware: Unique Tactics for Payment
17:45
17:45
Play later
Play later
Lists
Like
Liked
17:45
In this episode I talk about the evolving world of ransomware. I discuss a few examples of unique tactics the malicious actors are using to put pressure on organizations to pay the ransom. Referenced Articles: https://www.theregister.com/AMP/2024/04/30/finnish_psychotherapy_center_crook_sentenced/ https://www.darkreading.com/cyber-risk/hackers-weap…
…
continue reading
In this episode host Tom Eston welcomes Jen VanAntwerp, founder of Sober in Cyber. Jen shares her journey in cybersecurity and marketing, and discusses the motivation behind creating alcohol-free networking events. Sober in Cyber provides much-needed alternatives to typical alcohol-centered industry events, fostering inclusive environments for both…
…
continue reading
1
Sober in Cyber: Creating Alcohol-Free Networking in Cybersecurity
19:33
19:33
Play later
Play later
Lists
Like
Liked
19:33
In this episode host Tom Eston welcomes Jen VanAntwerp, founder of Sober in Cyber. Jen shares her journey in cybersecurity and marketing, and discusses the motivation behind creating alcohol-free networking events. Sober in Cyber provides much-needed alternatives to typical alcohol-centered industry events, fostering inclusive environments for both…
…
continue reading
1
Responsibly Armed Citizen | Frank Horvath and Tim Kelly | 06.01.24
48:13
48:13
Play later
Play later
Lists
Like
Liked
48:13
Join Frank Horvath and Tim Kelly every Saturday as they talk all things guns and gun safetyBy WSIC
…
continue reading
1
Does the 2nd Amendment & the Castle Doctrine Apply Equally or at ALL for Black Americans? Sr. U.S. Airman Roger Fortson, Amir Locke & Donovan Lewis: Gunned Down in Their Own Homes. Hard Truths Examined ...
53:57
53:57
Play later
Play later
Lists
Like
Liked
53:57
Currently we're being downloaded in 113 countries! Thank you! With the May 3rd, 2024, shooting and killing of Sr. U.S. Airman Roger Fortson in his off-base home in Fort Walton, FL, by an Okaloosa County Sheriff’s Deputy, we shine the antiseptic light of the truth in this deep, thorough and investigatory episode of Light ‘Em Up on the killing of bla…
…
continue reading
In this Safetyman podcast episode will discuss the ways. New Jersey has set for permit to carry handgun holders or CCW must requalify and redo their permit.
…
continue reading
1
181: TWIN PETES INVESTING PODCAST 128: With special guest, A winning 30 bagger investment, Riskified Ltd, Next 15 Group, H&T Group, Foresight Sustainable Forestry Co Takeovers IDS AAL BHP WOSG HL. CVX ...
1:35:56
1:35:56
Play later
Play later
Lists
Like
Liked
1:35:56
The topics, stocks and shares mentions / discussed include: With special guest, Andy @FlyFinance, Full-time pilot & part-time investor A winning 30 bagger investment Takeovers Riskified Ltd / $RSKD Next 15 Group / NFG H&T Group / HAT Foresight Sustainable Forestry Co / FSF Hargreaves Lansdown / HL. International Distribution Services / IDS / Royal …
…
continue reading
1
Special Episode - How to start a business: Part 1
1:18:22
1:18:22
Play later
Play later
Lists
Like
Liked
1:18:22
This special episode of The Mindful Business Security Show is the first in a multi-part series about how to start a business. In this episode, Accidental CISO is accompanied by Joe Brinkley, TheBlindHacker. Joe is a business owner, content creator, and cybersecurity consultant. With an entrepreneurial journey spanning more than a decade, his busine…
…
continue reading
1
CYFIRMA Research- Threat Actors Actively Exploiting CVE-2024-3273: Underground Forums Share IP Addresses of Vulnerable D-Link NAS Devices
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17
Urgent Alert: Hackers are actively exploiting CVE-2024-3273, a critical vulnerability in D-Link NAS devices, with affected device IP addresses being shared on underground forums. With over 90,000 potentially impacted devices globally and inclusion in CISA's Known Exploited Vulnerabilities list, immediate action is crucial to secure data and prevent…
…
continue reading
This week we are joined by Maria Varmazis, host of the N2K daily space show, T-Minus. Maria shares an interesting story from a listener, who writes in on an AirBnB debacle he was dealing with. Joe shares the newly released 2024 Data Breach Investigations Report from Verizon. Dave shares a story From the New York Magazine, written by Ezra Marcus, on…
…
continue reading
1
Understanding AI Bias: Implications for Business Leaders
38:30
38:30
Play later
Play later
Lists
Like
Liked
38:30
Welcome to The Guardian Files! I'm Gary Marsh, your host, bridging the gap between traditional safety practices and the emerging world of AI. In this episode, we dive deep into the critical topic of AI bias—what it is, why it matters, and how it impacts various aspects of business and society. AI bias refers to systematic discrimination embedded in…
…
continue reading
1
EPISODE 30: SAY GOODBYE TO ‘GIT BLAME’: BUILDING COLLABORATIVE AND SECURE SOFTWARE DEVELOPMENT LIFECYCLES
36:46
36:46
Play later
Play later
Lists
Like
Liked
36:46
Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! This week we are joined by James Charlesworth, a seasoned Director of Engineering at Pendo with 15 ye…
…
continue reading
1
Utility Security Podcast - Resources to Help You Protect Your Customers from Scams - A Conversation with Utilities United Against Scams Executive Director Michelle Martinez
13:53
13:53
Play later
Play later
Lists
Like
Liked
13:53
Utility Security Podcast - Resources to Help You Protect Your Customers from Scams - A Conversation with Utilities United Against Scams Executive Director Michelle Martinez Many electric, water, and natural gas customers throughout the country are being targeted by impostor utility scams each day. Scammers typically use phone, in-person, and online…
…
continue reading
1
Ep. 159 - Gear and Mindset 26 - Barbell Prescription Book - Shooting Focus - Mental Cues
1:20:32
1:20:32
Play later
Play later
Lists
Like
Liked
1:20:32
Combatives Summit - 20-22 Sep 2024 D’lberville Mississipi https://combativessummit.com/ The Barbebell Prescription - Book Weight Belt - Rogue Echo belt - Get The Law of Self-Defense Book for free -https://lawofselfdefense.com/ Jocko Letter regarding Way of the Warrior Kid book influence; The Way of the Warrior Kid Book Upcoming EvoSec Training Even…
…
continue reading
1
Behind the Lock Screen: Strategies for Device Defense & Cyber Resilience
15:24
15:24
Play later
Play later
Lists
Like
Liked
15:24
Send us a Text Message. Ever misplaced your phone and felt that momentary pulse of panic? Listen in as we recount a cautionary tale of lost phones and the perils of unsecured devices, illustrating just how easily our personal and work data can be compromised. Wendy's harrowing experience at a shoe store losing her phone inside a boot serves as a po…
…
continue reading
A nation-state hacking group’s practice of funding its town activities through cybercrime or cyber mercenary work.By N2K Networks
…
continue reading
1
CYFIRMA Research- Iluria Stealer; a Variant of Another Discord Stealer
6:49
6:49
Play later
Play later
Lists
Like
Liked
6:49
The notorious Nikki Stealer group has transitioned into the Iluria Stealer group, maintaining a strong presence with a predominantly Portuguese-speaking user base. Both their websites are hosted by Hostinger, and the current owner, as per his Discord bio, claims to be the former CEO of Nikki Stealer. Dynamic analysis reveals that Iluria Stealer has…
…
continue reading
1
Must Read “See Yourself in Cyber” | Book Review with Author Ed Adams
27:01
27:01
Play later
Play later
Lists
Like
Liked
27:01
Join us for an insightful review of the book "See Yourself in Cyber: Security Careers Beyond Hacking" by the esteemed author and security expert, Ed Adams. In this engaging discussion, we delve into the challenges and opportunities within the cybersecurity industry, exploring topics such as breaking misconceptions about cybersecurity, addressing th…
…
continue reading
1
Episode 606 Global Town Hall May 2024
2:00:15
2:00:15
Play later
Play later
Lists
Like
Liked
2:00:15
Barbara Leger talks about her peace work in Ukraine; Bill Geimer shares his desire for Canada to become more independent of the US. We hear about the situation in Kashmir, the purge of military leaders in Russia, and the use of platforms in the ocean to grow seaweed. For the video, audio podcast, summary and comments: https://tosavetheworld.ca/epis…
…
continue reading
1
CYFIRMA Research - Synapse Ransomware Technical Analysis
4:41
4:41
Play later
Play later
Lists
Like
Liked
4:41
Meet Synapse ransomware, the newest digital threat on the block. This latest threat, emerging in February 2024, operates under a Ransomware-as-a-Service model, distributing its malicious payload via the dark web. Our research sheds light on the internal working of this malware. Discover how it selectively avoids encrypting Iranian systems, raising …
…
continue reading
1
10. NIS2 is coming. Here's what you need to know (with Sarah Hofmann - Product and Policy Specialist)
19:04
19:04
Play later
Play later
Lists
Like
Liked
19:04
NIS2 is coming, but many people and companies don't know what it means for them. Therefore, we've invited Sarah Hofmann into the studio to talk about: What NIS2 is Who it apply to What happens if you don't comply How you can get started working with the NIS2 requirements In the episode we also mention a blog post, you can find it right here: https:…
…
continue reading
Episode 331 of the Shared Security Podcast discusses privacy and security concerns related to two major technological developments: the introduction of Windows PC’s new feature ‘Recall,’ part of Microsoft’s Copilot+, which captures desktop screenshots for AI-powered search tools, and Slack’s policy of using user data to train machine learning featu…
…
continue reading
1
Microsoft's Copilot+ Recall Feature, Slack's AI Training Controversy
18:02
18:02
Play later
Play later
Lists
Like
Liked
18:02
Episode 331 of the Shared Security Podcast discusses privacy and security concerns related to two major technological developments: the introduction of Windows PC's new feature 'Recall,' part of Microsoft’s Copilot+, which captures desktop screenshots for AI-powered search tools, and Slack's policy of using user data to train machine learning featu…
…
continue reading
1
Responsibly Armed Citizen | Frank Horvath and Tim Kelly | 05.25.24
48:13
48:13
Play later
Play later
Lists
Like
Liked
48:13
Join Frank Horvath and Tim Kelly every Saturday as they talk all things guns and gun safetyBy WSIC
…
continue reading
This week,Ron Fox CEO of Glidepath Portfolio Services and team give us financial planning and investment management adviceHearing Instrument specialist Edmond Ayvazyan of Hearing Aid Source Centres gives us a happy storyMatchmaker Linda Miller of Misty River Introductions, explains the benefits of her traditional matchmakingSharon Parenteau of SMAR…
…
continue reading
1
Rapid Fire Questions with Dr. Jessica Barker, PhD, MBE
4:36
4:36
Play later
Play later
Lists
Like
Liked
4:36
This is the extra part of the episode where we go through and ask a speed round of questions to Jessica for not only her insights into cybersecurity, but a little bit of her personal life too!By Security Masterminds
…
continue reading
1
CYFIRMA Research- Tinyproxy (CVE-2023-49606) – Vulnerability Analysis and Exploitation
4:58
4:58
Play later
Play later
Lists
Like
Liked
4:58
Critical Alert: Organizations relying on Tinyproxy must act now! CVE-2023-49606 poses a grave risk of remote code execution. With 1.6M+ servers potentially affected globally; swift action is imperative. Attackers exploit HTTP requests to trigger memory corruption, risking unauthorized access or service disruptions. Update Tinyproxy, monitor for ano…
…
continue reading
This week, we are joined by host of 8th Layer Insights, Perry Carpenter from KnowBe4 and Dr. Jessica Barker from Cygenta to discuss human risk: awareness, behavior and beyond. Joe and Dave share some listener follow up, the first being from Richard, who writes in to share some tips and tricks regarding relationship scams mentioned in a previous sho…
…
continue reading
1
EPISODE 29: “THE DILEMMA GAME”:UNLEASHING THE POWER OF ETHICS AND GOOD CYBERSECURITY THROUGH PLAY
23:23
23:23
Play later
Play later
Lists
Like
Liked
23:23
Welcome to Compromising Positions! The tech podcast that asks non-cybersecurity professionals what we in the industry can do to make their lives easier and help make our organisations more prepared to face ever-changing human-centric cyber threats! We are joined again by Dr Bettina Palazzo a business ethics expert! She works with compliance manager…
…
continue reading
1
CYFIRMA Research- SamsStealer: Unveiling the Information Stealer Targeting Windows Systems
5:21
5:21
Play later
Play later
Lists
Like
Liked
5:21
Our latest report dives into the information stealer SamsStealer, a newly identified information stealer targeting Windows systems. This stealer is written in .NET, is designed to extract sensitive data stealthily from a variety of browsers and applications, including Chrome, Microsoft Edge, Discord, and cryptocurrency wallets. Once it has gathered…
…
continue reading
1
From bees to trees: bringing nature back into agriculture
32:59
32:59
Play later
Play later
Lists
Like
Liked
32:59
It's no secret nature is under threat: the world has seen global wildlife populations drop by two thirds over the past 50 years, and agriculture is partly to blame. But from beekeeping to reforestation, small-scale farmers around the planet are doing their part to reverse this trend. To celebrate World Biodiversity Day, we explore how rural communi…
…
continue reading
What has been keeping me up? Moving. Should I move? If so, where? When? I don't want to leave my grand kids or sons behind. But I' m going crazy and feel claustrophobic. What else is on my brain? Leaders and followers. There are people that relish in being in charge. The pack leader. And there are those that prefer to support. Be of assistance by w…
…
continue reading
In this episode of The Secure Dad Podcast, Andy welcomes retired Federal Air Marshal Gary Quesenberry to share insights into safety during air travel. Through their conversation, they cover the significance of situational awareness in various settings, including personal experiences that highlight the importance of being vigilant and prepared for u…
…
continue reading
1
Will AI Become Self-Aware? What CEOs and Business Owners Need to Know.
8:23
8:23
Play later
Play later
Lists
Like
Liked
8:23
Welcome to The Guardian Files! I'm Gary Marsh, your dedicated host, here to bridge the gap between traditional safety practices and the emerging world of artificial intelligence. In this episode, we tackle one of the most intriguing and controversial questions in AI: "Will AI Become Self-Aware?" As AI technology advances at an unprecedented rate, t…
…
continue reading
Flower Msuya, Ole Mouritsen, and Paul Carnell all are scientists studying various aspects of seaweeds. Also, Flower helps local producers, Ole experiments with cooking, and Paul helps governments save coastal ecosystems. For the video, audio podcast, transcript and comments: https://tosavetheworld.ca/episode-605-eating-seaweed.…
…
continue reading
A device connected to a network that accepts communications from other endpoints like laptops, mobile devices, IoT equipment, routers, switches, and any tool on the security stack.By N2K Networks
…
continue reading
1
Security Individually, Relationally, and in Community with Ann & Sue 3 of 3 (237)
29:08
29:08
Play later
Play later
Lists
Like
Liked
29:08
Part 3 of 3 – Let’s talk about deepening security relationally Curiosity, emotional honesty and discernment… magic ingredients to preserve and express your security. Ann and Sue focus on context over the intrapsychic in this episode, which expands on the last thrid of the ideas from their book, Secure Relating Holding Your Own in an Insecure World.…
…
continue reading