Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A podcast with short episodes that discuss cyber crime cases, security problems, and infamous malware. I make my episodes quick and easy to understand so you get the story without the filler and too much technical jargon. Links to all my sources on my pastebin https://pastebin.com/u/BiteSizedCyberCrime
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
"What the Hack with Adam Levin" is the award-winning weekly true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
On the front lines of technology and business there is a battle of survival. Behind the scenes, businesses are on a mission to keep a vigilant watch for threats in an ongoing Cyber War. But it’s not just about malware, ransomware, and breaches anymore. The obstacles and barriers companies face today are bigger and badder than ever — and these cyber threats are forcing them to prove they’re secure for the future. So when you need answers to win the battle, tune into Cyber Security America wit ...
…
continue reading
Take a journey into the dark depths of the Australian criminal underworld with Australia’s most formidable crime reporter - John Silvester. https://www.theage.com.au/topic/naked-city-jbi #crime #truecrime #police #news
…
continue reading
Inside the FBI highlights news, cases, and people from around the Bureau—in audio form. For more information, visit fbi.gov.
…
continue reading
The Cyber-Crime Survivors Advisory & Recovery Podcast is created to raise awareness about the ongoing theft of people’s lifesaving and wealth by evil cyber criminals. It is time to stop shaming victims and start sharing the truth about what is happening to our families and friends. CCSARP is a safe place for learning and growth that will empower cybercrime victims to become survivors. Another goal is if all people are aware of the evil theft of money from our loved one, we can shut down cybe ...
…
continue reading
The Cyber Leaders podcast focusses on the fast-paced world of cybersecurity, delivering cutting-edge insights and trends with energy, enthusiasm, and professionalism. With high level expertise and thought leadership, we aim to provide invaluable perspectives and actionable strategies to empower leaders in navigating the ever-changing landscape of cybersecurity.
…
continue reading
Hacks, scams, cyber crimes, and other shenanigans explored and explained. Presented by cyber security teacher and digital forensics specialist Michele Bousquet.
…
continue reading
Follow Investigative Reporter Robert Riggs into the darkest corners of the criminal mind.
…
continue reading
The Future of Cybercrime is dedicated to helping security practitioners defend their organizations by distilling insights, best practices, and actionable tips from the world’s leading cyber crime experts. This show is brought you by KELA Cyber Threat Intelligence. For more information, visit www.kelacyber.com
…
continue reading
Meet Alice – a burnt-out barista who turns to the Dark Web to pay off her student debt. But when cybercrime pulls her deeper than she could have ever imagined, only one question remains: can Alice get out before it’s too late? The Hacker Chronicles Season 2: Digital Nomad. Presented by Tenable. Starring Michael C. Hall as John Doe. And Chloe Taylor as Alice.
…
continue reading
Our regular podcast series features threat research and security news, hosted by threat researchers from the Threat Hunter Team.
…
continue reading
I am targeting a market of IT professionals who enjoy woodworking as a hobby. Providing information around information technology topics like cyber security, cyber crime, and a few woodworking projects
…
continue reading
Modern Law: Verdicts and Voices is a monthly podcast hosted by Alison Crawford in which we unpack key legal stories and celebrate the 150th anniversary of the Supreme Court of Canada. This special series delves into legal news, landmark cases and features expert guests who provide unique insights into Canada’s justice system.
…
continue reading
"Only Malware in the Building” is a monthly podcast crafted through a collaboration between N2K CyberWire and the Proofpoint DISCARDED podcast. Join hosts Selena Larson, Threat Researcher at Proofpoint, Dave Bittner—host of the CyberWire Daily podcast—and Keith Mularski, former FBI Cyber Division Unit Chief and now Chief Global Officer at Qintel, as this trio of cyber-savvy partners-in-crime team up to uncover the secrets behind some of the most notorious cyberattacks. This segment focuses o ...
…
continue reading

1
The Impact: Coronavirus and Organized Crime
Global Initiative Against Transnational Organized Crime
The Impact: Coronavirus and Organized Crime is a special edition weekly podcast from the Global Initiative Against Transnational Organized Crime. We'll look at how the ongoing COVID-19 virus is impacting on organized crime around the world and how the illicit economy may affect our ability to respond to the virus. We'll be covering cyber crime, the illegal wildlife trade, counterfeit medicines, drug trafficking, human smuggling, corruption and human trafficking.
…
continue reading
It aims at creating awareness around hackers stealing financial information and how cyber crime continues to evolve, with new threats surfacing every year. They can, in effect, destroy businesses and damage your financial and personal lives — especially if you’re the victim of identity theft. Cyber attacks are an evolving danger to organizations, employees and consumers. They may be designed to access or destroy sensitive data or extort money. At Hidden Files, hope listeners will be able to ...
…
continue reading
Hosted by two former federal agents who investigated computer crime, this is a technology Podcast covering Computer Security, Computer Crime and Computer Forensics Topics.
…
continue reading
SCARY STORIES TO REAL LIFE EVENTS CHECK US OUT.
…
continue reading
FINCast is an exciting hub of conversation encompassing the world's most pressing financial integrity-related issues, including anti-money laundering/counter-terrorist financing (AML/CFT), anti-bribery and corruption, financial and cyber crime vulnerabilities, and fin-tech and new technologies.
…
continue reading
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live at https://twit.tv/live every Tuesday.
…
continue reading
National Cyber Security Radio gives the hottest topics in cyber security news and reveals all the Fake News by other experts. Topics include, hacker for hire murders, how to make money cyber security, should you get your college degree or certification in cyber security, plus over 20 over topics. Execute Produced by one of the world’s most known and respected Ex-hacker Gregory Evans (GregoryDEvans.com) listeners will not be disappointed.
…
continue reading
Australian businesses were targeted with more advanced malware and cyber intrusions in 2014 than any other. We believe its time for Australian organisations to realize that we are firmly in the cross-hairs of global cyber criminals. This blog and podcast is so we can provide a platform to share stories of cyber crime from Australia and the rest of the world, and hopefully find ways Australian businesses can protect their organisation, customers and employees data from these threats.
…
continue reading
In a world where we are so dependent on our phones, our computers and the internet, we explore what happens when you don't protect yourself online. Criminal Domain will expose the ways we leave ourselves open to potential hacking and phishing attacks, and how perpetrators use technology to manipulate us. World renowned futurist Mark Pesce and respected investigative journalist Claire Aird speak to victims of cyber crime to inform us how to better protect ourselves online.
…
continue reading
PODAWFUL™ is a hot beef, Inkjet Injektion of information superhighway new-age sewage. It's a crossover event between the internet & reality. Graffiti on the brick wall of a dark digital alleyway. A cyber 𝐀𝐑-𝟏𝟓 you stick inside your gaping mouth and pull the 𝓉𝓇𝒾𝑔𝑔𝑒𝓇 to feel HAPPY. An act of Modem Warfare against a Plastic Modern Hell Culture. PODAWFUL™ is Internet Television. A true CULT COMEDY filled with criminal sociopath henchmen who value laughs more than life. SICK FREAKS, lab-grown to ...
…
continue reading
Safe Nation is an inaugural podcast curated to share insight and discussion about law enforcement, security and crime prevention with a focus on current events and honest data. Offering a fresh perspective on safety through interviews, opinions and great practical advice, join your host, retired, female state trooper Captain Nikki Renfroe. Listen as she interviews industry professionals, sharing information on how to protect yourself from danger and crimes while also bringing attention to un ...
…
continue reading
Decoding Security is a podcast from Microsoft Australia about how to protect your business from the ever changing threat of cyber crime. On the show, you’ll hear from leaders in cybersecurity, as well as Microsoft experts, as we break down strategies to help keep your business secure. From identifying threats, to managing incidents — we’ll crack the code to help you stay resilient, agile and competitive.
…
continue reading
A riveting, original and comprehensive account of international crime and a brilliant critique of globalisation's dark side, McMafia contains full and often terrible stories behind today's most sensational headlines, charting a parallel universe of crime. Find out more at www.bodleyhead.co.uk.
…
continue reading
... with your Radio Madam, Fezile Manzini, 20h00-23h00, Mon to Thurs and 19h00 to 22h00 on Fridays.
…
continue reading
Join George and Jim from cyberTAP at Purdue University for a fun and informative discussion. Listen as they unpack cybersecurity news, conduct interviews with industry experts, and dish the latest tech, tools, tips and tricks...as long as they stay focused.
…
continue reading
The Laundry podcast: Dive deep into the intricacies of financial crime, AML (anti-money laundering), compliance, sanctions, and the ever-evolving landscape of financial regulation. Hosted by Marit Rødevand and Fredrik Riiser – this podcast features renowned experts from sectors such as banking, fintech, compliance, and investigative journalism. Together, they shed light on the industry's trending topics, analyse mainstream news through a compliance-focused lens, and connect the fight against ...
…
continue reading
Welcome to the new realities of cyber security podcast series, where we'll be looking at the key challenges and opportunities faced by businesses in the rapidly evolving area of cyber security. From digital crime scene forensics to GDPR, this series covers topical issues that matter.
…
continue reading
"In a world where change is the only constant, Title Agents Podcast stands at the forefront, guiding title professionals to not just grow their businesses but to master the art of innovation. With every episode, you're handed the keys to unlock unparalleled growth and stay ahead of the curve. Get ready for a transformative journey!"
…
continue reading
Chris Parker, the founder of WhatIsMyIPAddress.com, interviews guests and tells real-life stories about topics to open your eyes to the danger and traps lurking in the real world, ranging from online scams and frauds to everyday situations where people are trying to take advantage of you—for their gain and your loss. Our goal is to educate and equip you, so you learn how to spot the warning signs of trouble, take quick action, and lower the risk of becoming a victim.
…
continue reading
A deep-dive conversation about cyber, security, and technology topics on a relaxed walk.
…
continue reading

1
Wire Fraud, Cyber Crime, and Closings: Andy White’s Blueprint for Security
42:29
42:29
Play later
Play later
Lists
Like
Liked
42:29When a phishing scam nearly cost him his life savings, Andy White turned that wake-up call into Closinglock, a cybersecurity platform now protecting billions in real estate closings. Dive in as he shares how title agents can fight back against wire fraud, seller impersonation, and deepfake threats using tools like KYC, MFA, and secure workflows. If…
…
continue reading

1
Cybercrime vs Small Business. Insider View of Cyber Crime.
49:17
49:17
Play later
Play later
Lists
Like
Liked
49:17Ron Sharon, a well-known cybersecurity & IT leader having served at such great companies as CANNON, LA Clippers, Universal Music, Mercedes, and more. Ron is a mentor to IT and cyber professionals across the globe and a friend of this show. Chapters 00:00 The Journey into Cybersecurity 04:58 Cyber Crime vs Small Business 09:56 Insider View of Cyber …
…
continue reading
Pearson is an education giant, providing learning tools and standardized assessments across many fields, schools, and organizations. Recently they were breached by what was likely a series of relatively minor mistakes. Sources: https://pastebin.com/YemUE0XiBy Chloe Thonus
…
continue reading

1
Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed (2/2)
4:12
4:12
Play later
Play later
Lists
Like
Liked
4:12Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed (2/2) This article was prepared by the Global Institute for Digital Rights and Justice.
…
continue reading

1
The Click That Opens The Door To Cyber Hell
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46You Just Thought Your Home Was Safe By Robert Riggs You lock your doors at night. You check on your kids. But what if the real threat is already inside—hiding in your phone, your smart TV, or your child’s video game chat? In this episode of True Crime Reporter®, former federal probation officer Art Bowker takes us into the digital battlefield unfol…
…
continue reading

1
RISEfm Evenings with Fezile Manzini talks about Cyber crimes Act
13:24
13:24
Play later
Play later
Lists
Like
Liked
13:24If your partner cheats, do you blame them or their lover for hurting you? RISEfm Evenings with Fezile Manzini talks about the dangers of using people's pictures to bash them on social media for sleeping with your partner. RISE fmBy RISE fm
…
continue reading

1
Telegram Exposed: The Super App Enabling Cyber Crime
53:28
53:28
Play later
Play later
Lists
Like
Liked
53:28In episode 36, Josh welcomes renowned intelligence systems expert Stephen Arnold to shine a light on one of the most underestimated threats in cybersecurity today—Telegram. Known to most as a simple messaging app, Telegram is quietly operating as a “super app” for cyber crime. From crypto laundering and hamster games masking gambling platforms, to …
…
continue reading

1
HACKAMANIA: anti-climax - PODAWFUL PODCAST EO65
3:15:46
3:15:46
Play later
Play later
Lists
Like
Liked
3:15:46https://podawful.com/posts/2564 ANOTHER WIN FOR THE LOAD! Hackamania, celebration of all things Dabbleverse (so, just Steel Toe Morning Show) was held in Vegas this past weekend, and hosted by Nobody Likes Onions. Nick Rekieta left his wife and children behind to enthrall audiences with his tales of being a cuck with Aaron Imholte, and Dick Masters…
…
continue reading

1
The Rock: Alcatraz’s Chilling True Crime Legacy
47:49
47:49
Play later
Play later
Lists
Like
Liked
47:49Alcatraz shut its cell doors more than 60 years ago, but its grip on the American imagination hasn’t loosened. Each year, nearly a million and a half tourists ride the ferry across San Francisco Bay, through cold, choppy waters, to walk the crumbling corridors of the most infamous prison in U.S. history. Visitors today frequently cite the desire to…
…
continue reading
Please enjoy this encore of Word Notes. An open source Java-based software tool available from the Apache Software Foundation designed to log security and performance information. CyberWire Glossary link: https://thecyberwire.com/glossary/log4j Audio reference link: “CISA Director: The LOG4J Security Flaw Is the ‘Most Serious’ She’s Seen in Her …
…
continue reading

1
Episode 200: The Wild West of the Loophole Economy
50:13
50:13
Play later
Play later
Lists
Like
Liked
50:13We’ve all been there. You see something perfect online, you do all the clicks and then think, “Wait, was that legit?” Scam-lite transactions are the way of the web these days, whether it’s direct-from-manufacturer or super-sticky subscriptions, we have your back. Learn more about your ad choices. Visit megaphone.fm/adchoices…
…
continue reading

1
RISEfm Evenings with Fezile Manzini talks malicious damage to property
8:10
8:10
Play later
Play later
Lists
Like
Liked
8:10Would you forgive your bae if they vandalized your property when angry? RISEfm Evenings with Fezile Manzini talks about vandalism of your partner's property also being GBV. RISE fmBy RISE fm
…
continue reading

1
Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed (1/2)
5:30
5:30
Play later
Play later
Lists
Like
Liked
5:30Logged Into Hell. An Injustice, a Fortune Lost, and the Resilience That Followed. This article was prepared by the Global Institute for Digital Rights and Justice.
…
continue reading

1
Episode 34 - Epoch Times Article Review Part III - Evidence Clearly Show the Chinese Communist Party Are Final Take-Aways from our discussion
1:03:56
1:03:56
Play later
Play later
Lists
Like
Liked
1:03:56Episode 34 - Epoch Times Article Review Part III - Evidence Clearly Shows the Chinese Communist Party Are Final Take-Aways from our discussion Brian and Mike talk about Chris Sommers' EPOCH TIMES article "CCP Likely Enabling Industrial Cyber Scamming of US Nationals, Experts Say." In this second part of a three-part series, we discuss this article …
…
continue reading

1
Trump's Signal Clone App was Hacked in 15 minutes
8:11
8:11
Play later
Play later
Lists
Like
Liked
8:11Trump's Signal Clone App was Hacked in 15 minutes
…
continue reading

1
**"To Hell and Back" - my talk @ekoparty 2022 - For Spotify Video with English subtitles!**
48:33
48:33
Play later
Play later
Lists
Like
Liked
48:33**"To Hell and Back" - my talk @ekoparty 2022 - with English subtitles!** In 2014, Alberto Daniel Hill, a cybersecurity expert, discovered a security vulnerability on a medical provider's website. While reporting on the issue, he became the first person imprisoned in Uruguay for a computer-related crime—a crime he did not commit and that likely nev…
…
continue reading

1
Jonathan Scott - Full Episode- Apple products and privacy.
2:14:38
2:14:38
Play later
Play later
Lists
Like
Liked
2:14:38We are speaking about YOUR privacy and YOUR #HumanRightsViolated tonight. I will disclose the tools that @Apple has, and show you the truth about what has been going on for a long time. VPN logs, Contacts, Emails, SMS logs, and much more. @jonathandata1
…
continue reading

1
Mano a mano con el hacker mas buscado del Rio de la Plata gov.eth - Alberto Daniel Hill
2:00:22
2:00:22
Play later
Play later
Lists
Like
Liked
2:00:22Mano a mano con el hacker mas buscado del Rio de la Plata gov.eth - Alberto Daniel Hill#policia #argentina #hacker #goveth -------------------Alberto Daniel Hill https://albertohill.com https://x.com/ADanielHill https://cybermidnight.club https://t.me/cybermidnight #hacker #uruguay #cybersecurity #cybersecuritytips #infosecurity #hacking #police #p…
…
continue reading

201
The Dark Web Black Market Trade Cyber Crime Crime Alpha Bay
1:30:58
1:30:58
Play later
Play later
Lists
Like
Liked
1:30:58The Dark Web Black Market Trade Cyber Crime Crime Alpha Bay
…
continue reading

1
ETHAN vs. HASAN: Final Two State Solution - PODAWFUL PODCAST EO64
51:31
51:31
Play later
Play later
Lists
Like
Liked
51:31[5+ HOUR LONG SHOW! JOIN THE PIZZA FUND! $12 level. https://podawful.com/posts/2563] Ethan Klein vs Hasan Piker, Israel Vs Palestine, India vs Pakistan, Kanye West vs The Earth... everyone is picking sides. You have to choose a side! QUICK! Or else you're gonna look stupid on the internet. Put the right flag emoji next to your name or they are gonn…
…
continue reading

1
RISEfm Evenings with FezileManzini talks about the main character syndrome
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Is someone who only calls you when they have a problem, your friend? RISEfm Evenings with Fezile Manzini talks about how having a main character syndrome can be bad for friendship. RISE fmBy RISE fm
…
continue reading

1
Cyber Traps at Home! How to Keep Your Family Safe Online.🔥
54:23
54:23
Play later
Play later
Lists
Like
Liked
54:23Host David Mauro interviews Dr. Feleks Kravetz, US citizen who migrated from the former USSR and founder of Cuber Security Easy. We discuss: 🎯protecting yourself online, 🎯cybersecurity risks for families, and 🎯the importance of cybersecurity awareness. Find Dr. Felix and his mission to raise awareness for all here: 🌐 Website: https://www.CyberSecur…
…
continue reading

1
How to fast-track the UK Cyber Governance Code of Practice using IASME Cyber Assurance
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20Implementing the UK Cyber Governance Code of Practice with IASME Cyber Assurance In this episode, we discuss the crucial topic of cyber governance for business leaders. With 74% of large businesses and 70% of medium businesses in the UK experiencing a cyber breach in the past year, boards are now clearly expected to lead on cyber risk. In response,…
…
continue reading

1
What’s inside the mystery box? Spoiler: It’s a scam!
46:13
46:13
Play later
Play later
Lists
Like
Liked
46:13As Dave Bittner is at the RSA Conference this week, our hosts Maria Varmazis and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from José on episode 335, sharing how UK banking features like Faster Payments and the “Check Payee” …
…
continue reading

1
E121: The Laundry team answers your questions!
37:53
37:53
Play later
Play later
Lists
Like
Liked
37:53This week, our expert hosts – Marit Rødevand, Fredrik Riiser, and Robin Lycka – have the tables turned on them as they respond to questions, comments, and hot takes from Heads of Compliance, MLROs, sanctions experts, and other listeners of the podcast. The panel discuss: when it's right to separate the roles of Head of Compliance and MLRO; the cash…
…
continue reading

1
Stingray Part I: Does Cell Phone Surveillance Violate Your Rights?
25:00
25:00
Play later
Play later
Lists
Like
Liked
25:00In 2014, the US government chose not to take a massive, rock-solid tax fraud case to trial. But why? This episode kicks off the tale of Daniel Rigmaiden, a hacker who exploited a legal loophole to regain his freedom. Find out how Rigmaiden's method for online connection, his Air Card, was both his downfall and his salvation. Take a deep dive into t…
…
continue reading

1
RISEfm Evenings with FezileManzini talks about dress code
20:20
20:20
Play later
Play later
Lists
Like
Liked
20:20Do you believe that what a person wears says something about them? RISEfm Evenings with Fezile Manzini talks about why it matters what you wear and why it should complement the context of where you are going. RISE fmBy RISE fm
…
continue reading
Cyber warfare is no longer something that happens behind closed doors or in some far-off digital corner. It's happening now—and reshaping the rules of conflict in real time. Drone strikes controlled by apps, ransomware attacks on hospitals—today's battleground is just as likely to be online as on the ground. That science fiction scenario is now a c…
…
continue reading
Microsoft to officially abandon passwords and support their deletion. Meta's RayBan smart glasses weaken their privacy terms. 30% of Microsoft code is now being written by AI. Google says prying Chrome from it will damage its security. Nearly 1,000 six-year-old eCommerce backdoors spring to life. eM Client moves to version 10.3 A bunch of terrific …
…
continue reading

1
What's Really Wrong with Policing? A Veteran LAPD Lieutenant Speaks Out
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06Send us a text Retired LAPD Lieutenant Jeff Wenninger joins Safe Nation for a powerful Season 3 premiere. Adopted and raised in a multiracial family, Jeff brings a rare perspective to the conversation on race, policing, and public trust. With over 30 years of experience—including more than 700 use-of-force incidents and time in LAPD's elite Metropo…
…
continue reading

1
RISEfm Evening with Fezile Manzini talks about lying on your CV
12:01
12:01
Play later
Play later
Lists
Like
Liked
12:01If you were a boss, would you fire someone for lying on their CV? RISEfmEvenings with Fezile Manzini talks about how misrepresentation of information on your CV, can lead to a dismissal. RISE fmBy RISE fm
…
continue reading
https://podawful.com/posts/2560 A Mershmorial. Mersh's only dedicated Youtube clipper and doppelgänger, _Mersh, has died. Somehow he is still trolling Mersh from beyond the grave, causing Nightwave Radio to become a funeral service for his hate channel. We remember his legacy, and laugh at Mersh in his honor. PLUS: Comedy Shaman gets some pussycat,…
…
continue reading

1
How a $2.3M Loss Became the Launchpad for a Tech-Driven Title Empire
51:40
51:40
Play later
Play later
Lists
Like
Liked
51:40In this episode, Aaron Davis shares how he turned a $2.3M wire fraud disaster into a launchpad for innovation, building one of the Southeast’s top title operations. He dives into scaling through M&A, leading with culture, and using tech to stay ahead. Plus, hear how disaster relief became his unexpected calling, so tune in! What you’ll learn from t…
…
continue reading

1
OWASP broken access control (noun) [Word Notes]
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls.By N2K Networks
…
continue reading
MalwareTech was an anonymous security researcher, until he accidentally stopped WannaCry, one of the largest ransomware attacks in history. That single act of heroism shattered his anonymity and pulled him into a world he never expected. https://malwaretech.com Sponsors Support for the show comes from Black Hills Information Security. Black Hills h…
…
continue reading

601
Episode 199: CISA Director Jen Easterly Stands Watch in the Cyberwars
43:11
43:11
Play later
Play later
Lists
Like
Liked
43:11From elections to ransomware, CISA Director Jen Easterly breaks down the threats to America’s critical infrastructure and what’s being done to stop them, sharing along the way her journey from the real-life battlefield to the frontlines of cybersecurity. This is a rare glimpse into the most pressing threats America faces—and a compelling story abou…
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike. [OMITB]
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined b…
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike.
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined b…
…
continue reading

1
RISEfm Evenings with Fezile Manzini talks about 3rd parties in relationships
17:39
17:39
Play later
Play later
Lists
Like
Liked
17:39Do you take advice on your relationship or uyahlebisana? RISEfm Evenings with Fezile Manzini talks about the impact of involving family/friends in your relationship matters. RISE fmBy RISE fm
…
continue reading

1
Security Firm CEO Installs Malware on Hospital Computer
9:05
9:05
Play later
Play later
Lists
Like
Liked
9:05This is one of the craziest stories I've ever covered in my 3 years of this podcast, and hearing both sides somehow makes the situation even less clear. Cybersecurity firm CEO Jeff Bowie accessed hospital computers and wrote malicious scripts on them intended to steal data. But why? Sources: https://pastebin.com/qqLMem11…
…
continue reading

1
Episode 33 - Epoch Times Article Review Part II - Evidence Clearly Show the Chinese Communist Party Are Perpetrating an Economic WWIII on us SCAMEES
1:03:46
1:03:46
Play later
Play later
Lists
Like
Liked
1:03:46Episode 33 - Epoch Times Article Review Part II - Evidence Clearly Show the Chinese Communist Party Are Perpetrating an Economic WWIII on us SCAMEES Brian and Mike talk about Chris Sommers EPOCH TIMES article "CCP Likely Enabling Industrial Cyber Scamming of US Nationals, Experts Say." In this second part of a three part series, we discuss this art…
…
continue reading

1
Identity Crisis: Aaron Painter on Mobile ID Verification, Cryptography, and Reducing Cyber Risk
51:25
51:25
Play later
Play later
Lists
Like
Liked
51:25Catch the Video episode: https://youtu.be/zMNsjSGT-yw Aaron Painter, former global executive at Microsoft, discusses the rising risks of deepfakes, how deep fake videos increase security risks, and how mobile-based identity verification helps like the new company he founded called Nametag. In this story David Mauro interviews Aaron and discusses id…
…
continue reading