Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
Mastering Cybersecurity is your narrated audio guide to the essential building blocks of digital protection. Each 10–15 minute episode turns complex security concepts into clear, practical lessons you can apply right away—no jargon, no fluff. From passwords and phishing to encryption and network defense, every topic is designed to strengthen your understanding and confidence online. Whether you’re new to cybersecurity or refreshing your knowledge, this series makes learning simple, smart, an ...
…
continue reading
Scramblex.com has released a free encryption service that will protect sensitive data from unauthorised access and the potential for identity or financial theft.
…
continue reading
Techlore Talks brings you in-depth conversations with the experts at the forefront of privacy, security, and digital rights. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode features meaningful discussions with the people building, researching, and advocating for digital freedom. From cybersecurity researchers and privacy tool developers to open-source advocates and digital rights activists—if they're shaping how we protect ourselves online, the ...
…
continue reading
Privacy and security podcast focused on the everyday person and using simple tools and techniques to become a smaller target for online attacks. Learn to protect yourself using VPNs, DeGoogled phones, VPNs, TOR, end to end encrypted communications, and techniques to help become more private online. Visit the website for more information: https://closednetwork.io
…
continue reading
Podcast about Passwordless Password Management, Identity Theft Protection, Cloud Storage Encryption and Passwordless MFA. Made by https://logmeonce.com/
…
continue reading
Techlore Surveillance Report is your weekly deep-dive into the privacy and security news that matters for your digital freedom. Hosted by Henry Fisher, founder of Techlore and long-time digital rights educator, each episode cuts through the noise to bring you carefully selected stories with the context, analysis, and historical perspective you need to truly understand what's happening to protect yourself (and others!) in the digital space. Topics covered include: • Privacy tool updates and v ...
…
continue reading
1
Encrypted Ambition: Where Ambition Meets Encryption - Inside The Minds Of Disruptors.
Craig Petronella
Where raw ambition meets real execution. Encrypted Ambition explores the vision, grit, and game plans behind today’s most disruptive founders and technologists. From startup trenches to boardroom breakthroughs, the Petronella team dives into the future of business, AI, and digital resilience.
…
continue reading
Welcome to the front lines of digital conflict, where the stakes are global and the battleground is code. Global Cyber Security: The Encrypted Podcast is your essential guide through the complex world of modern defense, strategic warfare, and digital privacy. Over 100 deep-dive episodes, we dissect the foundational texts that define our secure—and insecure—digital reality. We go beyond the headlines to explore applied cryptography, threat modeling, and secure cloud architecture, explaining t ...
…
continue reading
Security Insider is your resource for information on the latest developments in data security, regulatory compliance issues, technology, and trends affecting the industry.
…
continue reading
1
Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™
Startuprad.io – Europe’s Startup & VC Podcast Network
ChatGPT: Perfect clarification — that’s important for compliance and metadata consistency. Let’s correct the Security Sutra entry accordingly (removing ™ from all but Startuprad.io™) and reissue the final, publication-ready version. 🎙️ Security Sutra – Cybersecurity Startups and Venture Capital by Startuprad.io™ 🧠 Optimized Title 👉 Security Sutra: Cybersecurity, Startups & Venture Capital by Startuprad.io™ ✅ Complies with your trademark structure ✅ Keeps Apple/Spotify-friendly keyword balanc ...
…
continue reading
Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
…
continue reading
The Trail of Bits podcast explores the intersection of human intellect and computational power. Imagine having a couple of friends explain to you how they protect some of the world’s most precious data - friends who happen to be the world’s leading cyber security experts, and who know how to speak in plain, straightforward English. That’s what each episode of the Trail of Bits podcast is like. The only ads you’ll ever hear are for our free and open source software and tools.
…
continue reading
1
Scams, Hacks and Frauds: Keeping you and your family safe from scams
Cee | Host of Scams, Hacks and Frauds.
10 Minutes could save your wallet! At Scams, Hacks and Frauds. We believe that sharing stories is the absolute best way to protect people from getting scammed or falling into a hacker's trap. By listening to our stories and sharing them with your friends and family, you can be better protected against Scammers, Fraudsters and Hackers. Each week, you and your loved ones can learn the red flags of a scam or fraud attempt just by listening to a true crime story told in the time it takes to drin ...
…
continue reading
This is a podcast about innovation, game-changing, up-leveling and trailblazing business concepts and trends mostly technology focused. We discuss current events, news and provide interviews all centered on answering the crucial question, IS MY BRAND PROTECTED? Listening to this podcast is NOT to be construed as LEGAL ADVICE. Sometimes we do not discuss legal topics at all, sometimes we just chat about innovation but we are lawyers. We may help you realize that you really need to seek profes ...
…
continue reading
Welcome to ”The Cyber Cookie,” the go-to podcast for all things related to Cyber Security and Data Protection. Produced by CommSec, a renowned name in the field of security and communication, this podcast is tailored for those looking to stay abreast of the latest trends, threats, and solutions in the ever-evolving world of cyber security.Hosted by a team of seasoned experts, ”The Cyber Cookie” breaks down complex issues into easily digestible episodes, guiding listeners through the intricat ...
…
continue reading
The Placing You First Podcast spans a diverse spectrum of insurance industry issues to keep you and your clients informed.
…
continue reading
Round the Fire with Momo is a cozy space where I sit down with friends and inspiring voices to share stories, ideas, and real-life experiences. There’s no set agenda—just honest conversations about the things that shape us. That said, many episodes naturally drift toward topics I’m passionate about, like Bitcoin, keto, and the carnivore lifestyle. So if you're into deep chats, hard money, or healing through food, pull up a seat by the fire.
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
In the highly competitive world of cryptocurrency trading, reducing costs and maximizing profits are critical factors for any successful trader. Trading fees can quickly add up, especially for frequent traders, but with GRVT's referral code “discount,” traders can benefit from a 20% discount on all trading fees. This offer is an excellent opportunity for both beginners and experienced traders to save on costs while accessing the full range of trading services provided by GRVT. In this articl ...
…
continue reading
The Agenda podcast explores the promises of crypto, blockchain and Web3, and how everyday people level up and improve their lives with these new technologies. It covers everything from new blockchain tech to Bitcoin mass adoption and cultural shifts in Web3. Every two weeks, Cointelegraph’s The Agenda podcast tackles a new topic by speaking with the innovators and experts building the Web3 the world actually needs. After all, crypto is for everyone, not just rocket scientists, venture capita ...
…
continue reading
Pi42 is an emerging cryptocurrency exchange that has gained attention for its user-friendly interface, strong security measures, and competitive trading fees. One of the key advantages of Pi42 is its low fees, which make it attractive to both beginner and experienced traders alike. But what if you could reduce those fees even further? By using the Pi42 referral code “QKJ013”, you can enjoy a 20% discount on trading fees, giving you even more value from the platform. In this article, we will ...
…
continue reading
1
Quanto Trade Referral Code ”T9DCWaRF” – Save Up to 45% on Fees & Earn Exclusive Bonuses!
servicesdv
Cryptocurrency trading has rapidly evolved into a global phenomenon, offering substantial opportunities for investors, but it often comes with its fair share of challenges. One of the most significant obstacles traders face is the high trading fees that platforms typically charge. These fees, while often necessary for the platform to remain profitable, can quickly add up, especially for active traders. Fortunately, Quanto Trade offers a way to tackle this issue head-on with its Referral Code ...
…
continue reading
Dhan is rapidly emerging as one of India’s leading stock trading apps. With a wide range of financial products and services, it caters to both beginner and professional traders. Known for its low brokerage charges, robust security features, and user-friendly interface, Dhan has quickly become a go-to platform for traders across the country. One of the standout features for new users is the ₹500 bonus they can claim by using the referral code "ASAR14". This is a fantastic incentive to start y ...
…
continue reading
Cryptocurrency trading offers immense potential for profit, but it can also come with significant costs in the form of trading fees. If you are an active trader, you know how quickly these fees can accumulate and eat into your profits. Thankfully, Based One, a leading cryptocurrency exchange, is offering an exclusive opportunity to reduce your trading fees through its Referral Code “REBATE”. By entering this code during registration, new users can enjoy a 10% discount on trading fees, allowi ...
…
continue reading
In the world of trading, every trader wants to maximize profits while minimizing costs. However, one significant challenge that traders often face is the impact of high trading fees. Whether you're new to trading or an experienced professional, these fees can add up and eat into your profits over time. The Avantishfi Referral Code “kickback” provides a fantastic opportunity to save 10% on trading fees, allowing you to trade more effectively while keeping more of your hard-earned capital. In ...
…
continue reading
4
Blofin Referral Code ”mNbmMf” 2025: Get $99 Bonus + 35% Cashback Instantly | Blofin Promo Code
helpwf
In the dynamic world of cryptocurrency trading, Blofin has emerged as one of the leading platforms for traders of all levels. Whether you’re a seasoned trader looking for advanced tools or a beginner wanting a user-friendly interface, Blofin has something to offer. If you’re looking to get the most out of your trading experience, using the Blofin Referral Code ”mNbmMf” will give you instant access to valuable rewards. By signing up with this referral code, new users can enjoy an immediate $9 ...
…
continue reading
Introduction: Cryptocurrency mining can be an exciting and profitable venture, but it often comes with challenges like high initial investment, maintenance of equipment, and expensive electricity costs. Gomining has revolutionized the mining process by offering cloud mining services, which allow users to mine Bitcoin (BTC), Ethereum (ETH), and other cryptocurrencies without the need for heavy investments in mining hardware. Additionally, with Gomining Promo Code “q01MI”, you can enjoy a 10% ...
…
continue reading
In the world of stock trading, finding a platform that offers both ease of use and robust features is key to success. Dhan App is one such platform designed for individuals and traders who want to experience seamless trading, from equities to futures and options. If you're a newcomer or an experienced trader, Dhan App provides a wide range of tools to meet your needs. By using the Dhan App Referral Code "ASAR14", you can unlock a 500 Rs bonus to kickstart your trading journey. This article w ...
…
continue reading
In today’s dynamic cryptocurrency market, selecting the right exchange is crucial for maximizing profits and ensuring a seamless trading experience. CoinW has quickly become one of the top cryptocurrency exchanges due to its low fees, high liquidity, and user-friendly interface. By signing up using the CoinW Referral Code "1300362", you can unlock up to $1,000 in bonuses, benefit from reduced trading fees, and earn lifetime commissions from your referrals. This article will provide an in-dep ...
…
continue reading
Introduction: Discover the Power of Poloniex for Crypto Trading The world of cryptocurrency is filled with opportunities, but it’s essential to choose the right exchange platform to maximize your profits and trading potential. Poloniex has firmly established itself as one of the most popular and reliable exchanges in the industry, offering an array of features that cater to both beginner and advanced traders. Poloniex offers a seamless trading experience, low fees, and a wide variety of digi ...
…
continue reading
Cryptocurrency trading continues to expand globally, offering new opportunities for individuals to profit from the ever-evolving market. As the demand for digital assets rises, selecting the right trading platform becomes critical for success. Phemex has rapidly emerged as a top cryptocurrency exchange known for its low fees, advanced trading features, and a wide selection of cryptocurrencies. By signing up using the Phemex Invitation Code "BVBE73", new users can unlock up to $8,800 in tradi ...
…
continue reading
As the world of cryptocurrency continues to grow, more traders are diving into digital assets like Bitcoin (BTC), Ethereum (ETH), and a variety of altcoins. While the opportunities for profit are vast, the high transaction fees associated with many cryptocurrency exchanges can significantly erode potential gains. Fortunately, KCEX, a leading cryptocurrency exchange, offers a solution by providing low trading fees and high security. And, with the KCEX Invite Code "DISCOUNT", you can unlock an ...
…
continue reading
1
Axiom Trade Invite Code: ”kickback” – Save 15% on Trading Fees and Maximize Your Profits
shaileshs
If you're an avid cryptocurrency trader or someone just getting started, you understand that fees can quickly eat into your profits. Fortunately, Axiom Trade offers a solution with its Axiom Trade Invite Code "kickback", which allows users to save 15% on trading fees. Whether you're making your first trade or you're a seasoned trader, using the referral code ensures that you can keep more of your profits. This article will explain how you can take advantage of this offer, why Axiom Trade is ...
…
continue reading
1
PP091: News Roundup–Securing MCP, Hunting Backdoors, and Getting the Creeps From AI Kids’ Toys
54:00
54:00
Play later
Play later
Lists
Like
Liked
54:00Our final news roundup for 2025 is a holiday sampler of tasty, chewy (and a few yucky) confections. We look at a years-long exploit campaign that used browser extensions to steal credentials, inject malicious content, and track behavior; tracks ongoing exploits using the React2Shell vulnerability; and debates whether a surveillance camera maker’s p…
…
continue reading
1
Your Age Is Now Required: Australia's Social Media Ban Explained
36:29
36:29
Play later
Play later
Lists
Like
Liked
36:29This week's Surveillance Report covers the dangerous reality that social media bans ARE age verification, India's push for even more invasive phone surveillance, a massive vulnerability actively exploited against major companies, the EU's new proposal to gut GDPR protections, Petco's escalating security disasters, border agents charging people for …
…
continue reading
1
Google’s New Policy is an “Extinction Event” (F-Droid Interview)
1:04:00
1:04:00
Play later
Play later
Lists
Like
Liked
1:04:00Google's new Developer Registration Program is catastrophic for F-Droid and open source app distribution. In this interview, Marc Prud'hommeaux from the F-Droid Board of Directors explains what's happening, why it matters (even if you only use the Google Play Store or Apple's App Store), and what concrete actions you can take RIGHT NOW. We discuss …
…
continue reading
1
SN 1055: React's Perfect 10 - RAM Is the New Lobster
2:45:50
2:45:50
Play later
Play later
Lists
Like
Liked
2:45:50A devastating new React vulnerability earned a "perfect 10" for risk, letting attackers remotely run code on a million-plus servers with a single HTTP request. Find out what happened, how fast attackers moved in, and why this bug changes everything for web security. France's VanityFair face a stiff fine over cookies. GrapheneOS pulls out of France …
…
continue reading
1
SN 1055: React's Perfect 10 - RAM Is the New Lobster
2:45:50
2:45:50
Play later
Play later
Lists
Like
Liked
2:45:50A devastating new React vulnerability earned a "perfect 10" for risk, letting attackers remotely run code on a million-plus servers with a single HTTP request. Find out what happened, how fast attackers moved in, and why this bug changes everything for web security. France's VanityFair face a stiff fine over cookies. GrapheneOS pulls out of France …
…
continue reading
1
97 - Sats Are the Standard | The Truth About BIP-177 and Bitcoin Units
6:51
6:51
Play later
Play later
Lists
Like
Liked
6:51John Carvalho, CEO of Synonym, has proposed in BIP-177 that we replace “sats” with “bitcoins” as the base unit. The idea gained attention and even support from notable Bitcoiners like Jack Dorsey and Samson Mow. In this video, I break down what this change would mean, why it’s being proposed, and whether we should actually make the shift.---🟩 To he…
…
continue reading
1
Charles Ponzi's Scam: The Classic Fraud That Is Still Around Today
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09Tell us your story here! In this enlightening episode of Scams, Hacks, and Frauds, we delve into the world of Ponzi schemes, using the infamous Charles Ponzi as our guide. Discover how these fraudulent schemes operate and the subtle ways you might inadvertently become entangled in one. We explore the fascinating story of Charles Ponzi, who in 1919,…
…
continue reading
1
PP090: Why Native Controls Aren’t Enough to Protect Your Cloud Workspaces (Sponsored)
46:37
46:37
Play later
Play later
Lists
Like
Liked
46:37Cloud-based workspaces such as Google Workspace are often the backbone of an organization. But they also face threats from spam and phishing, account takeovers, and illicit access to sensitive documents and files. On today’s Packet Protector we talk with sponsor Material Security about how it brings additional layers of protection to Google Workspa…
…
continue reading
1
From Ink To Encryption: Understanding E-Signature Risks in the Digital Banking Era
22:49
22:49
Play later
Play later
Lists
Like
Liked
22:49Speed is winning deals, but speed is also feeding fraud. We sit down with CRC Specialty Professional Lines Broker Mark Waldeck to unpack the messy middle where e‑signatures, legacy policy language, and decentralized bank controls collide. From the difference between a simple e‑signature and a cryptographically protected digital signature to why und…
…
continue reading
1
How India's Unremovable App Mandate Failed Within Days
42:02
42:02
Play later
Play later
Lists
Like
Liked
42:02This week's Surveillance Report covers India’s attempt to mandate a potentially invasive app on everyone’s phone, Chat Control updates in the EU with concerns still evolving, half of US states now being age verified, more AI Slop, butt to cloud encryption, and more! Correction: One of you caught my mistake! The poopinator device is $600 *with* a mo…
…
continue reading
1
Top Technology Trends and Predictions for 2026
41:04
41:04
Play later
Play later
Lists
Like
Liked
41:04In this episode KJ Burke discusses the technology trends of 2025 and predictions for 2026. He covers the maturation of AI, the importance of treating data as a product, innovations at the edge, managing cross-cloud environments, building business resiliency and automating the skills gap. Looking ahead, he highlights key trends for 2026, including A…
…
continue reading
1
96 - Bitcoiners Talk Film: Chris & Momo’s Must-Watch Movies for Bitcoiners
1:10:10
1:10:10
Play later
Play later
Lists
Like
Liked
1:10:10Chris and Momo share their top film picks that every Bitcoiner should watch.---00:00 - Intro02:48 - World on a Wire (1973) by Rainer Werner Fassbiner18:48 - Blade Runner (1982) by Ridley Scott22:42 - Blade Runner 2049 (2017) by Denis Villeneuve30:14 - RoboCop (1987) by Paul Verhoeven43:56 - Judge Dredd (1995) by Danny Cannon49:31 - Dredd (2012) by …
…
continue reading
1
SN 1054: Bots in the Belfry - Cisco Promises Real Security Fixes!
3:04:04
3:04:04
Play later
Play later
Lists
Like
Liked
3:04:04Cisco has finally admitted it's time for real change and is vowing to build "secure by default" gear after decades of criticism. Steve Gibson reacts to a rare moment when a tech giant actually gets security right—and what it means for everyone running critical infrastructure. • Scattered Lapsus$ Hunters strikes (Salesforce) again. • Cisco actually …
…
continue reading
1
SN 1054: Bots in the Belfry - Cisco Promises Real Security Fixes!
3:04:04
3:04:04
Play later
Play later
Lists
Like
Liked
3:04:04Cisco has finally admitted it's time for real change and is vowing to build "secure by default" gear after decades of criticism. Steve Gibson reacts to a rare moment when a tech giant actually gets security right—and what it means for everyone running critical infrastructure. • Scattered Lapsus$ Hunters strikes (Salesforce) again. • Cisco actually …
…
continue reading
1
PP089: Hidden Wi-Fi Misconfigurations and Wi-Fi 7 Issues to Be Aware Of
1:02:49
1:02:49
Play later
Play later
Lists
Like
Liked
1:02:49There may be misconfigurations and other problems lurking in your wireless network. From a lack of peer isolation to poor segmentation to RADIUS problems and vendor fails, these issues can make your WLAN less secure. Jennifer “JJ” Minella goes from Packet Protector co-host to guest as she discusses these issues with Drew Conry-Murray. This episode.…
…
continue reading
1
Threat-Informed Defense: Using ATT&CK and Models to Plan Improvements
11:08
11:08
Play later
Play later
Lists
Like
Liked
11:08Threat informed defense means using knowledge about real attacks to guide security work, so defensive choices stay connected to how adversaries actually behave in the world. For a beginner, this idea matters because it turns cybersecurity from a pile of disconnected tools into a story about attackers, their steps, and the ways defenders can interru…
…
continue reading
1
Triage 101: What Happens When an Alert Fires.
14:07
14:07
Play later
Play later
Lists
Like
Liked
14:07Alert triage is the first pass an analyst makes on incoming security alerts. In those first few minutes, the analyst decides whether something needs fast action or patient investigation. The goal is not to solve every detail immediately, but to understand whether the situation is dangerous, harmless, or still unclear. For beginners, this moment can…
…
continue reading
1
Logs, Events, and Alerts: Turning Raw Data Into a Story
11:10
11:10
Play later
Play later
Lists
Like
Liked
11:10Logs are the raw notes that help turn messy digital activity into clear security stories. Every website, device, and application constantly writes these notes in the background, even when people barely notice them. Security teams use logs to understand what really happened when something breaks or looks suspicious, instead of guessing based on inco…
…
continue reading
1
Types of Security Controls: Preventive, Detective, Corrective, and More
10:28
10:28
Play later
Play later
Lists
Like
Liked
10:28Security controls are the many small and large actions, tools, and rules that organizations use to keep information, systems, and people safe from harm. When someone installs a lock, sets up a password, turns on monitoring, or writes a policy, they are putting a control in place to shape what can happen and how problems are handled. At first, the i…
…
continue reading
1
Defense in Depth: Layers That Work Together
11:12
11:12
Play later
Play later
Lists
Like
Liked
11:12Defense in depth is a simple idea that quietly shapes strong cybersecurity for real organizations. Instead of trusting one perfect barrier, defense in depth stacks several ordinary protections so mistakes stay small. A beginner might hear about firewalls, antivirus, passwords, and backups as separate topics, without seeing how they support each oth…
…
continue reading
Network segmentation sounds like a complex expert topic, but it starts very simply. If you understand that computers send messages over shared roads, segmentation shapes those roads. Earlier episodes described basic networks and architectures, the maps connecting devices and services together. This episode builds on that foundation and zooms in on …
…
continue reading
1
You Can’t Secure What You Can’t See: Asset Inventory Basics
9:01
9:01
Play later
Play later
Lists
Like
Liked
9:01Welcome to our exploration of why you cannot secure what you cannot see in cybersecurity. This episode focuses on asset inventory, the simple idea of knowing exactly what technology you depend on every day. Before anything else, you need to understand what security professionals mean when they say the word assets. In security, assets are anything v…
…
continue reading
Patch and update management is where earlier vulnerability concepts finally turn into concrete daily security actions. When you scan for weaknesses or read about new flaws, the story only becomes real when something actually changes on your systems. A patch is a small piece of software code that fixes a known flaw in an existing product, closing a …
…
continue reading
1
Vulnerabilities, CVEs, and CVSS Scores Explained.
12:54
12:54
Play later
Play later
Lists
Like
Liked
12:54Vulnerabilities sit at the center of almost every cybersecurity story people read about today. A vulnerability is a weakness in hardware, software, or a process that an attacker can misuse to cause harm. When organizations understand their vulnerabilities clearly, they can fix the most dangerous ones before someone takes advantage of them in the re…
…
continue reading
1
Threat Modeling 101: Thinking Like an Attacker
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12Threat modeling is a structured way to think about how systems might be attacked before any real harm occurs. Instead of picturing hacking as mysterious magic, threat modeling turns it into a calm, methodical review of what could go wrong and how serious each problem might be. For beginners, it provides a guided path to notice important details tha…
…
continue reading
1
European Tech Sovereignty: The November 2025 DACH Startup News Briefing
22:25
22:25
Play later
Play later
Lists
Like
Liked
22:25Europe's startup narrative is changing fast — from apps and valuations to sovereignty, infrastructure and resilience. In this month's DACH Startup News, we unpack the moves that made European tech sovereignty the defining theme of 2025. What you’ll learn: – Why sovereign cloud is becoming foundational for startups and enterprise buyers – How AI, ro…
…
continue reading
1
Microsoft's Rare Confession: Windows AI Could Leak Your Data
35:54
35:54
Play later
Play later
Lists
Like
Liked
35:54This week's Surveillance Report covers Microsoft's AI Disaster getting worse on multiple levels as well as Google's AI, Malware is stealing E2EE messages from people all around the world, and updates to Chat Control & other EU regulations, and more! Support Techlore: https://techlore.tech/support Timestamps Sources 00:00 Welcome to Surveillance Rep…
…
continue reading
1
SN 1053: Banning VPNs - The Equals Coffee Hack
2:41:48
2:41:48
Play later
Play later
Lists
Like
Liked
2:41:48Could banning VPNs really become law in the US? This episode breaks down the jaw-dropping legislation in Wisconsin and Michigan that targets VPN access for everyone, not just kids—and what it means for your digital privacy. The EU finally comes to its "Chat Control" senses. Windows 11 to include SysInternals Sysmon natively. Chrome's tabs (optional…
…
continue reading
1
SN 1053: Banning VPNs - The Equals Coffee Hack
2:41:48
2:41:48
Play later
Play later
Lists
Like
Liked
2:41:48Could banning VPNs really become law in the US? This episode breaks down the jaw-dropping legislation in Wisconsin and Michigan that targets VPN access for everyone, not just kids—and what it means for your digital privacy. The EU finally comes to its "Chat Control" senses. Windows 11 to include SysInternals Sysmon natively. Chrome's tabs (optional…
…
continue reading
1
PP088: How Fortinet Delivers Web App Security in the AI Era (Sponsored)
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32Web applications have always been tricky to protect. They’re meant to be accessible over the Internet, which exposes them to malicious actors, they’re designed to take end-user inputs, which can be manipulated for malicious purposes, and they often handle sensitive data. Then the rise of public cloud and microservices architectures added new layers…
…
continue reading
Cyber attacks rarely happen as single isolated moments; they usually unfold in connected stages over time. When headlines talk about a breach, they often focus on the final impact, such as stolen data or encrypted files, and they skip the many earlier steps that made that result possible. A beginner who only sees the ending can feel confused, surpr…
…
continue reading
Tell us your story here! In this gripping episode of Scams, Hacks, and Frauds, we explore the dark underbelly of cryptocurrency and how unsuspecting individuals can become entwined in complex fraud schemes. Meet Jian Wren, a resilient woman who, after enduring years of hardship, finds herself caught in a web of deceit involving a criminal mastermin…
…
continue reading
1
Episode 49 - Interview With Zach w/ Developing Coze JS - Encryption, & Cryptography Chat
2:34:03
2:34:03
Play later
Play later
Lists
Like
Liked
2:34:03Show Notes - https://forum.closednetwork.io/t/episode-49-interview-with-zach-w-developing-coze-js-encryption-cryptography-chat/168 Website / Donations / Support - https://closednetwork.io/support/ BTC Lightning Donations - [email protected] / [email protected] Thank You Patreons! - https://www.patreon.com/closednetwork Michael Bates - Privac…
…
continue reading
1
Why This Security Expert Doesn't Use a Phone (Buskill Interview)
1:02:53
1:02:53
Play later
Play later
Lists
Like
Liked
1:02:53Even with encryption and 2FA, if someone steals your logged-in laptop, you're compromised. Michael Altfield created Buskill - an open source USB "dead man switch" - to solve this analog attack vector. In this interview, you’ll hear about the real incidents that inspired it, the advocacy work that fueled it, and the collaborative engineering efforts…
…
continue reading
1
AI Agents Are the New Attackers — Inside the Identity Security Platform Built for 2025
40:41
40:41
Play later
Play later
Lists
Like
Liked
40:41What if the biggest cyber risk inside your company wasn’t malware — but identity? In this episode, I sit down with Santhosh Jayaprakash, founder & CEO of UnoSecur, to unpack one of the fastest-moving transformations in cybersecurity: the rise of identity as the new perimeter. Attackers don’t break in anymore — they log in. And with AI agents, LLM w…
…
continue reading
Episode 245: This week's Surveillance Report covers WhatsApp's massive phone number enumeration flaw that exposed 3.5 billion users' data through poor rate limiting - potentially the largest data exposure in history. I also examine Google's new Android sideloading restrictions threatening open app distribution, the EU's concerning Digital Omnibus p…
…
continue reading
1
Nate Steps Down + What Happens to Surveillance Report
4:22
4:22
Play later
Play later
Lists
Like
Liked
4:22After 4+ years, Nate from The New Oil is stepping down from co-hosting the pod, but Surveillance Report isn't going anywhere. Here's what's changing, what's staying the same, and how to continue listening to Surveillance Report! (Hint: Nothing changes here on the podcast!) Surveillance Report continues with the same mission: weekly privacy and secu…
…
continue reading