Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Learn all the hacks to upgrade your life, money and travel – all while spending less and saving more. Host Chris Hutchins is a life hacker who has saved millions by breaking down every aspect of life, looking to maximize happiness at the lowest cost. Chris and guests like Tim Ferriss, Tony Hawk, Codie Sanchez and Gary Vaynerchuk will help you learn the strategies and tactics they used to shape their success.
…
continue reading
Hackers, North Korea and billions of dollars. Lazarus returns – in fact, the criminals never went away. Season 2 begins at an ATM, possibly near you. With Jean Lee and Geoff White. Investigators claim a secretive, elite North Korean hacking ring, nicknamed the Lazarus Group, is responsible for the theft of billions of dollars around the globe. Pyongyang denies having anything to do with cybercrimes, saying the United States is making these allegations to try to tarnish its image. Season 1 to ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Explore the minds of world-class web3 hackers, smart contract protocol developers, startup founders, and cybersecurity specialists with host DeGatchi as he takes you on a journey through the chaotic world of Ethereum Virtual Machine (EVM) blockchain cyberspace. Keywords: solo auditor, public auditing platforms, private audits, scalability, freedom, Scraping Bits podcast, blockchain technology, audit industry, flashbots, reverse engineering, cybersecurity, infosec, mev, mev bot, quant, defi, ...
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
The story of the world's most secret agents...the backups. For the first time in his career, Special Agent Chet Phillips has discovered that he can choose NOT to accept a mission! That means there's no choice but to send in the "B Team": A nervous pencil pusher promoted to the field, a computer hacker working off her sentence, a fading former sitcom star and a recently reassigned White House intern. A full cast comedy audio adventure with a new episode debuting each month!
…
continue reading
The H4unt3d Hacker podcast is an idea that came to be from a conversation over a glass of bourbon. We bring you REAL talk about cybersecurity. Want to know how hackers see the world and events? Then tune in and go on a trip with the H4unt3d Hackers in their hoppin H4unt3d house. Mike Jones "H4unt3d" Mike is a former hacktivist, red teamer, SIGINT operator and intelligence analyst. Mike left the world of illegal hacking to help businesses and individuals learn how and why they are attacked an ...
…
continue reading
New York Times columnist Jamelle Bouie and freelance writer John Ganz delve into the world of 90s post-Cold War thrillers with Unclear and Present Danger, a podcast that explores America in an age of transition to lone superpower, at once triumphant and unsure of its role in the world.
…
continue reading
A bi-monthly show focusing on cybersecurity, hacker news with a lighter side. Unmasked is a look behind the cyber professionals and will spotlight teammates, community advocators and businesses to give insight to how cybersecurity affects everyone. Brought to you by Assura. Where the superheroes of cybersecurity provide a clearer understanding of the threats we face in our digital world. With Host: Paul Blacker Web: https://www.assurainc.com/
…
continue reading
A podcast about cult hacking! Cracking the cult code to understand what they are, how they work, how people leave and how to make sense of the world after leaving. Father and daughter team, media graduate Celine, and former cult member now organizational psychologist Stephen, explore how cults work, why they are so dangerous and the experience of leaving and making sense of the world. They speak to cult hackers from all over the world, from ex members to academics, from writers to filmmakers ...
…
continue reading
Host Jean Ponzi presents information, education and conversation with activists and experts on environmental issues and all things "green." Produced in the studios of KDHX Community Media in St. Louis, MO.
…
continue reading
Get better every day with the Muslim Life Hackers podcast. Through conversations with experts, leaders and inspiring individuals, we are going to give you actionable insights help you win in this life and the next.
…
continue reading
This is a Podcast syncs with Hacker News (https://news.ycombinator.com) automatically
…
continue reading
On WE’RE IN!, you'll hear from the newsmakers and innovators who are making waves and driving the cyber security industry forward. We talk to them about their stories, the future of the industry, their best practices, and more.
…
continue reading
Learn the latest management updates in the tech world.
…
continue reading
Courtland and Channing Allen interview the ambitious indie hackers who are turning their ideas and side projects into profitable online businesses. Explore the latest strategies and tools founders are using to capitalize on new opportunities, escape the 9-to-5 grind, and create their own personal revenue-generating machines. The future is indie!
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Health Hacker Life
TJ Anderson: Bestselling Author, Health Hacker, & Co-Founder: www.elevatedeats.pro
Tune in for simple yet powerful episodes on the best ‘health hacks’ for you to learn...and actually apply in your lifestyle to notice the benefits- improved energy and focus, a better relationship with stress, more confidence in your approach to healthcare and an overall calmer, quieter mind. Use this show as a healthy excuse to ‘take a break and take a breath’ during your workdays as you continue along your quest to becoming a smarter, high performing health hacker. As a holistic health hac ...
…
continue reading
Join us for State of Cybercrime, where experts discuss the latest trends and developments in the world of cybercrime and provide insights into how organizations can protect themselves from potential threats. Sponsored by Varonis
…
continue reading
How do you take down a criminal network that’s hidden in the shadows? How do you rescue child abuse victims who could be anywhere in the world? Hunting Warhead follows the journalists and police on a global mission to expose the darkest corners of the internet. What they discover shocks them. Host Daemon Fairless tracks down the investigators, survivors and criminals themselves. A co-production of CBC Podcasts and the Norwegian newspaper VG. For the best in true crime from CBC, ad-free, visi ...
…
continue reading
Learn the latest tech-stories updates in the tech world.
…
continue reading
Every second week, Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
…
continue reading
Welcome to the award-winning 401 Access Denied podcast, voted Best Cybersecurity Podcast for North America by the 2021, 2022, and 2023 Cybersecurity Excellence Awards and named 2023's Best Tech Podcast by TMCnet. Want authorized access to top security tips from experts in InfoSec? Bi-weekly, join the 401 Access Denied Podcast with Delinea's ethical hacker Joseph Carson as he shares life lessons and insights into the world of InfoSec – the good, the bad, and the ugly. Joe will be speaking wit ...
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Hello hackers and welcome to the Fairway Finders Podcast! We are Bru, Steve & Donny, three Irish golf obsessives, data mad golf tipsters and independent golf journalists focused on making golf off the course as much craic as it is on the course. Follow our weekly show with previews and picks across the PGA, DP World and LPGA Tours along with great guests from inside the ropes of all three and more! Please follow our Social Media: Twitter: @FindersFairway - email: Fairwayfinderspod@gmail.com ...
…
continue reading
The Cyber Riddler is a podcast that discusses interesting topics in the field of information security. It explores different areas and situations in real-life cyber security engagements and activities. Episodes feature guests from different backgrounds such as hackers, security analysts, cyber security managers, bug bounty hobbyists and more.
…
continue reading
The BOM (or “bill of materials”) is a weekly Supplyframe DesignLab Podcast hosted by Head of Design & Partnerships Majenta Strongheart. Each week, through digestible conversations with the world’s leading innovators, hackers, and entrepreneurs, Majenta and her guests explore the future of how hardware projects are built and brought to market, investigate technological solutions to the world's toughest challenges, help bridge the gap between makers, startups, and investors, and celebrate the ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
DarkWeb.Today – Hackers & Cyber Security: Piercing the Veil, Empowering the Secure.
Alberto Daniel Hill
“DarkWeb.Today – Hackers & Cyber Security” is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that are central to our ...
…
continue reading
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Hi! I'm a self development coach, meditation teacher, and Idea Incubator based in San Francisco. Join me as I speak with the bright minds that light up my world
…
continue reading
Explore the critical intersection of cybersecurity and business impact while gaining insights into CISO priorities with "Reimagining Cyber." Stay informed on the latest cybersecurity news, trends, and solutions tailored for today's CISOs and CIOs. Episodes cover a range of topics, including the role of AI in cyber security, technology, preventive measures to stop cyber attacks, response strategies for cyber attack victims, cybersecurity challenges in healthcare, the future landscape of cyber ...
…
continue reading
Are workers really losing a measurable amount of brain power—the kind leaders rely on to innovate? Are CEOs really turning to a secretive world of underground negotiators to pay off millions of dollars to hackers? And what's the real reason people won't return to work? In this new podcast, we'll be hitting top-of-mind subjects for corporate leaders. Hosted by Korn Ferry CMO Jill Wiltfong, listeners and viewers will be treated to recreated scenes, special audio clips and intriguing interviews ...
…
continue reading
What *really* gets people to take action for the planet? Environmental engineer and designer, Katie Patrick, takes you on a wild intellectual journey into the heart of the environmental psyche, exploring the latest evidence-based behavioral science you can use to get more people to adopt your climate or environmental campaign. Get Katie's secret climate action design tips and indie/hacker startup insights for making it happen at https://helloworlde.com/actiontips. Warning: For deep sustainab ...
…
continue reading
Everyday society depends more on electronics, social media etc, and by doing so they expose their private data to the public eye. Each Saturday, join Hackers Con Calle is a group of Cyber Security professionals dedicated to inform the audience of current trends and a how to protect the digital life.
…
continue reading
The comedy podcast that unpacks the bananas world of romance novels.
…
continue reading
Join hacker maker Phillip Wylie and his guests as they discuss and unveil the “secrets” of professional hacking — a mysterious, intriguing, and often misunderstood occupation, even by those in the field of cybersecurity. With the rising need for professional hackers, those entering the infosec world are drawn to it, and understandably so — it is an exciting and fascinating career. Still, it sure has nothing to do with magic. Join these conversations to discover what the role entails, the dif ...
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
Ever wondered what really goes on when solo traveling the world? Join Emily from Emily Eats and Explores and Ashley from Ashley gets Around weekly as they air out their crazy travel stories, share travel tips, and just chat about travel! Emily Cooper is a full-time traveler and the creator behind Emily Eats and Explores. In 2022, Emily quit her job in healthcare to travel the world solo and create content. Now, she teaches women how they can make money while they travel the world! Ashley Pet ...
…
continue reading
Dr. Carlos provides a daily briefing on national security from around the world
…
continue reading
At any moment around the world, cybercriminals and nation-state sponsored hackers are targeting businesses, government entities, and nonprofits for financial gain, cyber espionage, or geopolitical advantage. But behind every organization facing this nonstop barrage of cyberattack activity are dedicated cybersecurity professionals working to defend their organizations' networks, systems, and sensitive information. Dark Reading Confidential brings you rare, firsthand stories from the cybersecu ...
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How ICP's Walletless Solution Enhances Online Trust and Privacy
4:37
4:37
Play later
Play later
Lists
Like
Liked
4:37
This story was originally published on HackerNoon at: https://hackernoon.com/how-icps-walletless-solution-enhances-online-trust-and-privacy. Explore the benefits of Internet Computer Protocol's walletless solution which allows users to selectively disclose identity attributes, enhancing online trust. Check more stories related to cybersecurity at: …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Why You Shouldn't Unsubscribe From Spam Emails
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10
This story was originally published on HackerNoon at: https://hackernoon.com/why-you-shouldnt-unsubscribe-from-spam-emails. Spam emails are annoying, and the impulse is to unsubscribe — but that could just make things worse. Here's why. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclus…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AI in SecOps: Transforming Cloud Security with Advanced Threat Detection
8:47
8:47
Play later
Play later
Lists
Like
Liked
8:47
This story was originally published on HackerNoon at: https://hackernoon.com/ai-in-secops-transforming-cloud-security-with-advanced-threat-detection. Discover how AI enhances cloud security by optimizing SecOps, boosting threat detection, and improving response times with practical implementation steps. Check more stories related to tech-stories at…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cyber Polygon Returns to Simulate an Advanced Targeted Attack on a Tech Company
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42
This story was originally published on HackerNoon at: https://hackernoon.com/cyber-polygon-returns-to-simulate-an-advanced-targeted-attack-on-a-tech-company. Cyber Polygon 2024 returns with a virtual exercise simulating a cyber attack on a tech startup, focusing on AI-driven solutions. Check more stories related to tech-stories at: https://hackerno…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SINALOA CARTEL AND CHINESE ORGANIZED CRIME LINKED3
4:07
4:07
Play later
Play later
Lists
Like
Liked
4:07
By Circle Of Insight Productions
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Stocks vs. Real Estate: What’s the Best Investment to Build Wealth?
50:21
50:21
Play later
Play later
Lists
Like
Liked
50:21
#180: Chris hosts a debate about whether stock investing or real estate is the faster path to wealth. He's joined by experts from The Motley Fool and BiggerPockets who dive into tax advantages, cash flow potential, long-term returns, and wealth-building strategies associated with each investment path to help you make informed decisions. Jason Moser…
…
continue reading
Hey Everyone, welcome back to the pod, on today's episode we dissect the aftermath of that ALL TIME bottle from Rory, what went wrong and what went right for Bryson to win his second US Open, we also give quick picks for this week's Travelers , enjoy
…
continue reading
![Artwork](/static/images/128pixel.png)
1
AMD investigates breach, Qilin demands ransom, Hackers derail Amtrak
8:49
8:49
Play later
Play later
Lists
Like
Liked
8:49
AMD investigates breach after data for sale on hacking forum Qilin demands $50 million ransom from UK hospital Hackers derail Amtrak Guest Rewards accounts Thanks to today's episode sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and more. With Van…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
T-Minus Overview- Our Moon [T-Minus Radio Program]
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10
Please enjoy this bonus episode from our T-Minus Space Daily team. The N2K CyberWire team is observing the Juneteenth holiday here in the US. Welcome to the T-Minus Overview Radio Show. In this program we’ll feature some of the conversations from our daily podcast with the people who are forging the path in the new space era, from industry leaders,…
…
continue reading
In this podcast episode, hosts Rob Aragao and Stan Wisseman are joined by Arun DeSouza, a renowned expert in connected vehicle security and former CISO at leading automotive companies. Arun begins by highlighting the critical challenges facing connected vehicles, emphasizing the importance of security by design throughout the development lifecycle.…
…
continue reading
Europol and partners shut down 13 terrorist websites. A data breach at the LA County Department of Public Health affects over two hundred thousand. The Take It Down act targets deepfake porn. The Five Eyes alliance update their strategies to protect critical infrastructure. VMware has disclosed two critical-rated vulnerabilities in vCenter Server. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Unreleased Special With 3D Printing Genuis Vijay Varada
32:30
32:30
Play later
Play later
Lists
Like
Liked
32:30
As you have probably noticed, we’ve been on a bit of a break but we’re coming back with exclusive interviews from amazing events and locations. This summer, we’ve been on the road to Chicago to visit mHub to talk with some of the founders, engineers, and builders of incredible hardware and start-ups. You’ll get to see all that and more, but first, …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
#92 - XtremeTom: SEO, Serial Founder, Chrome Extensions, Out-streaming Ninja
1:09:11
1:09:11
Play later
Play later
Lists
Like
Liked
1:09:11
Follow Scraping Bits on Twitter: https://x.com/scrapingbits Your Host, DeGatchi: https://x.com/DeGatchi Guest Speaker: https://x.com/msolomon44 Please support this podcast by checking out our sponsors: https://x.com/ComposableFin https://x.com/mevdotio https://x.com/0xPFL Keywords: solo auditor, public auditing platforms, private audits, scalabilit…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
#91 - 100proof: Discovering Kyberswap Exploit, Negotiating Bug Bounties, Pre vs Post Smart Contract Auditing
48:12
48:12
Play later
Play later
Lists
Like
Liked
48:12
Follow Scraping Bits on Twitter: https://x.com/scrapingbits Your Host, DeGatchi: https://x.com/DeGatchi Guest Speaker: https://x.com/1_00_proof Please support this podcast by checking out our sponsors: https://x.com/ComposableFin https://x.com/mevdotio https://x.com/0xPFL Keywords: solo auditor, public auditing platforms, private audits, scalabilit…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Ultimate Chromebook Revival for 2024: Enter Pixelbook
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44
This story was originally published on HackerNoon at: https://hackernoon.com/the-ultimate-chromebook-revival-for-2024-enter-pixelbook. I fell in love with the Pixelbook about two months ago. I saw a coworker at Google using one, and I was immediately impressed by its extreme thinness. Check more stories related to tech-stories at: https://hackernoo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How Do You Go About Creating Biological Weapons That Cannot Be Countered?
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39
This story was originally published on HackerNoon at: https://hackernoon.com/how-do-you-go-about-creating-biological-weapons-that-cannot-be-countered. This is why bioweapons and bio-engineered viruses should never be developed. Check more stories related to tech-stories at: https://hackernoon.com/c/tech-stories. You can also check exclusive content…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
140. Are solutions to deepfake abuse finally coming into focus?
29:16
29:16
Play later
Play later
Lists
Like
Liked
29:16
After years of shouting into the wind about deepfakes and deepfake porn, we take a look at some possible solutions that offer not just deterrence but accountability. Plus, something we rarely see these days: bipartisan agreement on a bill in Congress.By Recorded Future News
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Snowflake breach escalates, MITRE has a memo for the president, Velvet Ant persists
8:44
8:44
Play later
Play later
Lists
Like
Liked
8:44
Snowflake breach escalates with ransom demands and death threats MITRE has a memo for the president Velvet Ant maintains three-year cyber espionage campaign Thanks to today's episode sponsor, Vanta When it comes to ensuring your company has top-notch security practices, things can get complicated, fast. Vanta automates compliance for SOC 2, ISO 270…
…
continue reading
Join Ashley and Emily as they dive into Emily's recent European adventure! Hear all about Emily's college reunion trip kicking off in Salzburg, the origin stories of Ashley and Emily's travel businesses, and the must-see spots and activities in Vienna and Bratislava. Plus, discover why cruising is an incredible way to explore the world. Don't miss …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Scattered Spider hacker snagged in Spain.
36:55
36:55
Play later
Play later
Lists
Like
Liked
36:55
Spanish authorities snag a top Scattered Spider hacker. HC3 issues an alert about PHP. WIRED chats with ShinyHunters about the breach affecting Snowflake customers. Meta delays LLM training over European privacy concerns. D-Link urges customers to upgrade routers against a factory installed backdoor. A new Linux malware uses emojis for command and …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
CISA tabletop exercise, Keytronic confirms breach, Linux emoji malware
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43
CISA leads first tabletop exercise for AI cybersecurity Keytronic confirms data breach after ransomware gang leaks stolen files New Linux malware controlled through Discord emojis Thanks to today's episode sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 2…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The current state of XDR: A Rick-the-toolman episode.
19:29
19:29
Play later
Play later
Lists
Like
Liked
19:29
Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of “eXtended Detection and Response” (XDR) with CyberWire Hash Table guests Rick Doten, Centene’s VP of Security, and Milad Aslaner, Sentinel One’s XDR Product Manager. References: Alexandra Aguiar, 2023. Key Trends from the 2023 Hype Cycle for Security…
…
continue reading
Rock_clasico_Jaja_ --- Send in a voice message: https://podcasters.spotify.com/pod/show/darkwebtoday/message
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The Future of Encryption and Digital Safety With Ameesh Divatia
43:57
43:57
Play later
Play later
Lists
Like
Liked
43:57
Send us a Text Message. What if you could unlock the secrets of a thriving tech career and learn how to safeguard sensitive data in the digital age? Join us for an insightful episode featuring our special guest, Ameesh Divatia, who shares his captivating journey into IT, sparked by reading tech articles in Time magazine and National Geographic. Fro…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
35. Alberto Daniel Hill: The Philosophy of a Wrongly Arrested Hacker, Setting the Record Straight.
1:27:47
1:27:47
Play later
Play later
Lists
Like
Liked
1:27:47
35. Alberto Daniel Hill: The Philosophy of a Wrongly Arrested Hacker, Setting the Record Straight. --- Send in a voice message: https://podcasters.spotify.com/pod/show/darkwebtoday/message
…
continue reading
![Artwork](/static/images/128pixel.png)
1
SEGURIDAD,PRIVACIDAD,POLITICAS DE ESTADO
5:30:47
5:30:47
Play later
Play later
Lists
Like
Liked
5:30:47
SEGURIDAD,PRIVACIDAD,POLITICAS DE ESTADO --- Send in a voice message: https://podcasters.spotify.com/pod/show/darkwebtoday/message
…
continue reading
By Circle Of Insight Productions
…
continue reading
By Circle Of Insight Productions
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cryptographic Ransomware Encryption Detection: Survey: Author's Declaration
55:58
55:58
Play later
Play later
Lists
Like
Liked
55:58
This story was originally published on HackerNoon at: https://hackernoon.com/cryptographic-ransomware-encryption-detection-survey-authors-declaration. In this paper, researchers propose a cyber kill chain that describes the modern crypto-ransomware attack. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Cryptographic Ransomware Encryption Detection: Survey: Abstract and Introduction
15:46
15:46
Play later
Play later
Lists
Like
Liked
15:46
This story was originally published on HackerNoon at: https://hackernoon.com/cryptographic-ransomware-encryption-detection-survey-abstract-and-introduction. In this paper, researchers propose a cyber kill chain that describes the modern crypto-ransomware attack. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Using Your GI Bill for Tech Education: What You Need To Know
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17
This story was originally published on HackerNoon at: https://hackernoon.com/using-your-gi-bill-for-tech-education-what-you-need-to-know. Learn how to use the GI Bill for tech education, covering eligible programs, application tips, and maximizing benefits. Check more stories related to tech-stories at: https://hackernoon.com/c/tech-stories. You ca…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How Leaders Can Avoid the Trap of False Urgency and Boost Team Productivity
10:41
10:41
Play later
Play later
Lists
Like
Liked
10:41
This story was originally published on HackerNoon at: https://hackernoon.com/how-leaders-can-avoid-the-trap-of-false-urgency-and-boost-team-productivity. Learn how to avoid the trap of false urgency in leadership, ensuring team productivity and fostering a healthy work culture with these effective strategies. Check more stories related to tech-stor…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Encore: Rosa Smothers: Secure the planet. [Intelligence] [Career Notes]
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17
Senior VP of Cyber Operations at KnowBe4, Rosa Smothers, talks about her career as an early cybersecurity professional in what she describes as the Wild, Wild West to her path through government intelligence work. Rosa shares how she always knew she wanted to be involved with computers and how being a big Star Trek nerd and fan particularly of Spoc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Long Distance Relationships and HACKING
3:03:43
3:03:43
Play later
Play later
Lists
Like
Liked
3:03:43
Long Distance Relationships and HACKING --- Send in a voice message: https://podcasters.spotify.com/pod/show/darkwebtoday/message
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Soumaya Najjarin: Healing and Rebuilding After Divorce
56:34
56:34
Play later
Play later
Lists
Like
Liked
56:34
In this episode, Soumaya Najjarin, CEO of New Beginnings, shares her personal journey through divorce, the motivations behind starting New Beginnings, and the challenges faced by divorced individuals in the Muslim community. Soumaya offers practical advice and insights on rebuilding one's life post-divorce, emphasizing courage and resilience. Times…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
The EU Blockchain Regulatory Sandbox And RWA Tokenization Under MiCA
6:36
6:36
Play later
Play later
Lists
Like
Liked
6:36
This story was originally published on HackerNoon at: https://hackernoon.com/the-eu-blockchain-regulatory-sandbox-and-rwa-tokenization-under-mica. The European Union(EU)took the early lead in providing a global benchmark for crypto regulation with the approval of the Markets In Crypto- Asset(MiCA) Check more stories related to tech-stories at: http…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Is The Rise of Runes a New Era for Bitcoin?
20:37
20:37
Play later
Play later
Lists
Like
Liked
20:37
This story was originally published on HackerNoon at: https://hackernoon.com/is-the-rise-of-runes-a-new-era-for-bitcoin. This article discusses the Runes protocol, exploring its functionalities, potential advantages, and place within a continuously growing Bitcoin ecosystem. Check more stories related to tech-stories at: https://hackernoon.com/c/te…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Why Lessons from the British Airways Data Breach Are Timelier Than Ever
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23
This story was originally published on HackerNoon at: https://hackernoon.com/why-the-lessons-of-the-british-airways-data-breach-are-timelier-than-ever. Browser supply chain attacks exploiting third-party scripts pose a severe threat. Learn why malicious script injections are so dangerous. Check more stories related to cybersecurity at: https://hack…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Navigating the Cybersecurity Hiring Trenches: Challenges, Realities, and Paths Forward
30:45
30:45
Play later
Play later
Lists
Like
Liked
30:45
This story was originally published on HackerNoon at: https://hackernoon.com/navigating-the-cybersecurity-hiring-trenches-challenges-realities-and-paths-forward. Exciting yet frustrating tech scene: layoffs, low pay, unrealistic expectations, talent shortages. Success needs skills, community, and resilience. Check more stories related to cybersecur…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Travel Wisdom from the World’s Most Traveled Man (Harry Mitsidis)
52:17
52:17
Play later
Play later
Lists
Like
Liked
52:17
#179: The world’s most traveled man, Harry Mitsidis shares his wisdom on the transformative benefits of travel. He provides insights on planning trips for the best experiences, shares his favorite destinations and highlights under-appreciated countries and regions. Harry Mitsidis is one of three people in the world to have visited every country twi…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Exploring the mechanics of Infostealer malware. [Research Saturday]
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50
This week, we are joined by a Security Researcher from SpyCloud Labs, James, who is discussing their work on "Unpacking Infostealer Malware: What we’ve learned from reverse engineering LummaC2 and Atomic macOS Stealer." Infostealer malware has become highly prevalent, with SpyCloud tracking over 50 families and finding that 1 in 5 digital identitie…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Week in Review: New York Times theft, Club Penguin hack, NHS wants blood
28:10
28:10
Play later
Play later
Lists
Like
Liked
28:10
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Janet Heins, CISO, ChenMed and janetheins.com Thanks to our show sponsor, Vanta Whether you’re starting or scaling your security program, Vanta helps you automate compliance across frameworks like SOC 2, ISO 27001, and more. With Vanta, …
…
continue reading
Microsoft’s President admits security failures in congressional testimony. Paul Nakasone joins OpenAI’s board. The feds hold their first AI tabletop exercise. CISA reports on the integration of space-based infrastructure. Cleveland city hall remains closed after a cyber attack. Truist commercial bank confirms a data breach. Rockwell Automation patc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Corporate Downfalls: Why Healthcare Is Losing The Battle Against Ransomware Attacks
14:14
14:14
Play later
Play later
Lists
Like
Liked
14:14
This story was originally published on HackerNoon at: https://hackernoon.com/corporate-downfalls-why-healthcare-is-losing-the-battle-against-ransomware-attacks. Why Healthcare Is Losing The Battle Against Ransomware Attacks. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Majority Voting Approach to Ransomware Detection: Related Work
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04
This story was originally published on HackerNoon at: https://hackernoon.com/majority-voting-approach-to-ransomware-detection-related-work. In this paper, researchers propose a new majority voting approach to ransomware detection. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive co…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
How the Upcoming Us Elections Are Changing the Cryptocurrency Market
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10
This story was originally published on HackerNoon at: https://hackernoon.com/how-the-upcoming-us-elections-are-changing-the-cryptocurrency-market. The US presidential election is beginning to have a strong impact on the crypto market. Check more stories related to tech-stories at: https://hackernoon.com/c/tech-stories. You can also check exclusive …
…
continue reading
Layoffs can be deeply painful. But they're also one of the stark realities of the business world, with four in ten companies this year alone expecting to let people go. Two experts explore techniques to launch anew after a layoff.By Korn Ferry
…
continue reading
![Artwork](/static/images/128pixel.png)
1
139. Mic Drop: GhostSec’s quest for redemption: their leader claims their life of crime is over.
12:07
12:07
Play later
Play later
Lists
Like
Liked
12:07
The GhostSec hacktivist group used to be known for its cyberattacks against terrorist groups like ISIS. Then, last year, the group took an unexpected turn — it created GhostLocker and began launching ransomware attacks. We talk to the group’s leader about their work with cybercriminal gangs and why we should believe him when he says all that is now…
…
continue reading