show episodes
 
The key to learning Korean is how easy it is to stay motivated to learn the language. At TalkToMeInKorean.com, we provide a systematic curriculum of easy-to-follow lessons, and a wide selection of self-study Korean-learning books!
  continue reading
 
Artwork

1
Talk To Me In 100% Korean

Talk To Me In Korean

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Improve your Korean through extensive exposure to natural conversations between native Korean speakers. This podcast is brought to you by TalkToMeInKorean.com. Please visit our website for additional learning materials related to the podcast.
  continue reading
 
Learn to speak Korean with bite-sized Korean lessons with Hyunwoo and Kyeong-eun from TalkToMeInKorean.com! Start from Level 1 if you are an absolute beginner, and start from whichever level that fits your current Korean level and start learning for free! You can get accompanying textbooks, workbooks and e-books on our website at http://talktomeinkorean.com !
  continue reading
 
Artwork

4
Afternoona Asks

StudioAfterGlo

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Annyeonghaseyo! We are Grace and Sarah, Asian KDrama fans who love to ask, and hopefully find answers to, all of our (and your) Asian drama questions. We cover everything, from silly topics to sensitive and serious issues that come up as we binge. We'll also share some Korean and Chinese language tips, as well as our experiences as diaspora Asians living in the UK and US. Afternoona Asks ND: Quirky, partly queer and quite late diagnosed, we are the Afternoona Asks ND (neurodivergent) squad - ...
  continue reading
 
Artwork

1
YA GIRL'S KDrama Podcast

Maddie, Christina and Elle

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Hey guys, this is YA GIRL'S KDrama Podcast! ..... Maddie, Christina and Elle have been hamming and hyping KDramas since 2022. Join them every week to discuss Rowoon, best KDrama kiss scenes, man lisps, korean men in headbands, and Rowoon. ... Also check out THE K.DROP for Maddie and Elle's take on all thing KPop, new and old. (still waiting on that Joshua Hong interview...) ..... PLEASE connect with the girls on INSTAGRAM: @yagirl_kdramapod, or on Discord: ⁠https://discord.gg/qkrUGAWVnG For ...
  continue reading
 
Hello there, my name is Vinny. I am the home base to this terrible podcast. I will be discussing topics that I think can help both you and me become better people all around. I am in no way trying to be deep or anything; I just want to make you laugh while dishing out some episodes that I hope will make you think.
  continue reading
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
A 'Dictators v Democrats' program https://tamullis.substack.com/ Buy Me A Coffee: https://buymeacoffee.com/tamullis Patreon: patreon.com/DictatorsvDemocrats Join the Discord: https://discord.gg/vsTNKRvy Democracy is at war. We can see the forces rallied against it: autocratic states like Russia, China, Iran and North Korea, techno-aristocrats, religious fundamentalists and populist demagogues. From the trenches of Ukraine to the halls of power in the US, democratic, free values are under det ...
  continue reading
 
Artwork
 
BMTT is an unscripted, no-holds-barred podcast based in Seoul. We talk pop culture, current issues, and pretty much whatever else holds our interest. It’s basically a volatile mixture of praising the good and trashing the bad according to the universal standard—us. Sheltered souls and members of the PC brigade beware: this ain’t your grandma’s bingo party.
  continue reading
 
Loading …
show series
 
Organizations rely heavily on Salesforce to manage vasts amounts of sensitive data, but hidden security risks lurk beneath the surface. Misconfigurations, excessive user permissions, and unmonitored third party integrations can expose this data to attackers. How do I secure this data? Justin Hazard, Principal Security Architect at AutoRABIT, joins …
  continue reading
 
The MCP standard gave rise to dreams of interconnected agents and nightmares of what those interconnected agents would do with unfettered access to APIs, data, and local systems. Aaron Parecki explains how OAuth's new Client ID Metadata Documents spec provides more security for MCPs and the reasons why the behavior and design of MCPs required a new…
  continue reading
 
Christina and Elle are BACK for a MIDWAY REVIEW for Dynamite Kiss! They are loving this show and will be debriefing on episodes three through eight. A lot has happened so far. Some thing are for certain though… Ji-Hyeok & Da-Rim are whipped for each other, Jin is a great actor, and everyone is DYING to see what’s in store for the leads. Dynamite Ki…
  continue reading
 
Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security program quick wins. Everyone freaks out about vulnerabilities, patching, and exploits. Meanwhile, security tools are misconfigured. Thousands of unused software packages increase remediation effort and a…
  continue reading
 
This week we welcome Ed Skoudis to talk about the holiday hack challenge (https://sans.org/HolidayHack). In the security news: Oh Asus Dashcam botnets Weird CVEs being issued CodeRED, but not the worm Free IP checking Internet space junk and IoT Decade old Linux kernel vulnerabilities Breaking out of Claude code Malicious LLMs Hacker on a plan gets…
  continue reading
 
While many businesses rely on Microsoft 365, Salesforce and Google Workspace security features, critical blind spots remain—the recent series of high profile SaaS breaches demonstrate this. So what should you do? Mike Puglia, General Manager of Kaseya Labs, joins Business Security Weekly to discuss the risks in SaaS applications. In this segment, M…
  continue reading
 
For OT systems, uptime is paramount. That's a hard rule that makes maintaining, upgrading, and securing them a complex struggle. Tomas "Data" Owens and James Cotter discuss how Tennessee is tackling the organizational and technical challenges that come with hardening OT systems across the state. Those challenges range from old technology (like RS-2…
  continue reading
 
Christina & Elle are back for the final review of this year’s Would You Marry Me? It stars Jung Seo-min (Because This Is My First Life, Love Next Door) and Choi Woo-shik (Our Beloved Summer, Parasite). Jung Seo-min ends a bad relationship and needs to act quickly to secure a new house in a private community—and ironically finds a man with the exact…
  continue reading
 
Sarah and Grace are back together to discuss our mutual favorite 2025 K-drama to date, the slice of life rom-com Our Unwritten Seoul. If you have not seen this drama yet, join us as we discuss the meaningful themes, thoughtful details, and story-telling devices that made this drama so relatable and impactful, in the spoiler-free section. And if you…
  continue reading
 
Live from InfoSec World 2025, this episode of Enterprise Security Weekly features six in-depth conversations with leading voices in cybersecurity, exploring the tools, strategies, and leadership approaches driving the future of enterprise defense. From configuration management and AI-generated threats to emerging frameworks and national standards, …
  continue reading
 
In this episode, T. A. Mullis speaks with Ji Hyun Park, who escaped North Korea twice and went on to rebuild her life in the United Kingdom. (Sorry for the delay, recent family bereavements have left my schedule all out of whack) Park describes her childhood under the Kim dictatorship, the famine, and the complete control the regime holds over info…
  continue reading
 
Are you walking around with a phone in your hand? Probably, are ready for the day when it gets grabbed and disappears. Aaran, Doug, and Josh talk about phone strategies on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-533…
  continue reading
 
Tune in for some hands-on tips on how to use Claude code to create some amazing and not-so-amazing software. Paul will walk you through what worked and what didn't as he 100% vibe-coded a Python Flask application. The discussion continues with the crew discussing the future of vibe coding and how AI may better help in creating and securing software…
  continue reading
 
The Security Weekly 25 index is back near all time highs as the NASDAQ hits another record high. Funding and acquisitions have shifted to AI as the security industry continues to evolve. We also had a new IPO, Netskope. They will replace CyberArk once the Palo Alto Networks acquisition closes, allowing the index to survive another public company ac…
  continue reading
 
What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a business. We talk about the role of the OWASP Top 10 and the OWASP ASVS in crafting security programs. And balance that with a discussion in what's the best use of everyone's time -- developers and appsec fol…
  continue reading
 
As long as there isn’t a 3-episode-long salt selling competition in this drama, we think Kang Tae-oh will keep us in this one for the long haul …. Maddie and Elle are here to talk about ELLE’S KDRAMA ULT, Kang Tae-oh (that man is foiinnnnnee). He plays a comical, jaded, lover-boy crown prince who desperately misses his wife and masks his pain by be…
  continue reading
 
Interview with Ravid Circus Ravid will discuss why security and engineering misalignment is the biggest barrier to fast, effective remediation, using data from Seemplicity’s 2025 Remediation Operations Report. This is costing some teams days of unnecessary exposure, which can lead to major security implications for organizations. Segment Resources:…
  continue reading
 
In this episode of Dictators v Democrats: Why We Fight, we speak with Lieutenant General (Ret.) Ben Hodges, former Commanding General of U.S. Army Europe, for a wide-ranging and unusually candid conversation about the state of democracy, the duty of military leaders, the future of Ukraine’s defence, and the global challenge posed by modern autocrac…
  continue reading
 
In the security news: Cloudflare was down, it was not good Logitech breached The largest data breach in history? Fortinet Fortiweb - the saga continues Hacking Linux through your malware scanner, oh the irony I never stopped hating systemd The ASUS exploit that never existed If iRobot fails, can we deploy our own hacker bot army? Firmware encryptio…
  continue reading
 
It's a topic we discuss often on Business Security Weekly: CISO Burnout. It's real, but how should you manage it? Dr. Yonesy Núñez, Global Cybersecurity Executive at Chain Bridge Bank and former Managing Director, Chief Cybersecurity Risk Officer, and Chief Information Security Officer at The Depository Trust & Clearing Corporation (DTCC), joins Bu…
  continue reading
 
Surprise! Christina & Elle watched the first two episodes of Dynamite Kiss and HAD to do an impromptu Through Two because this drama has to be talked about! Dynamite Kiss is giving a classic romantic-comedy feel, and the Pod Sisters couldn’t be more excited. Dynamite Kiss stars the lovely Ahn Eun-jin (My Dearest, The Good Bad Mother, Hospital Playl…
  continue reading
 
Secure code should be grounded more in concepts like secure by default and secure by design than by "spot the vuln" thinking. Matias Madou shares his experience in secure coding training and the importance of teaching critical thinking. He also discusses why critical thinking is so closely related to threat modeling and how LLMs can be a tool for h…
  continue reading
 
The final review of The Tale of Lady Ok is officially here! Is this Maddie’s drama of the YEAR?! Wow, this show. The ladies can’t stop thinking about this drama and how it gripped them for all sixteen episodes. In this final review, Maddie and Christina debrief episodes nine through sixteen. They gush about the characters and thought Lim Ji-yeon an…
  continue reading
 
Segment 1: Interview with Rob Allen It’s the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren’t enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a …
  continue reading
 
Konnichiwa! Welcome to our latest episode, and our first Deep Dive for a Japanese Drama. We are discussing the 2022 Japanese drama First Love, starrring Satoh Takeru and Mitsushima Hikari and inspired by the songs by Hitada Ukaru. We are delighted to welcome Amy, from our sister podcast Afternoona Delight as well as fellow Patreon Gavin on to the s…
  continue reading
 
Augustus De Morgan, Doordash, Fortiweb, Typosquatting, Vista, Ransomware, AI, Josh, Rob, Aaran, Jason, Dr. Scott, Rocky, Uh., and More on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-529
  continue reading
 
In this episode of Dictators v Democrats: Why We Fight, host T. A. Mullis speaks with Zarina Zabrisky, an American war correspondent and filmmaker reporting from the frontlines of Kherson, Ukraine — a city living under daily Russian drone and artillery attacks. Zabrisky, who has spent a decade documenting Russia’s hybrid war against the West, revea…
  continue reading
 
Came for Ji Chang-wook + D.O., stayed for legit EVERYTHING ….. We’re loving this, y’all. And Maddie typically never watches psychological thrillers (like literally ever). But this show is doinggggg ittttt forrrr ussss. …. The Manipulated is a new 12-episode kdrama about a normal (hot) guy who gets framed for a gruesome murder and seeks revenge on t…
  continue reading
 
This week: Minecraft on your lightbulb Sonicwall breached, who's next? Ditch Android, install Linux Hacking your face Thermostat freedom Pen test fails HackRF hacking times 2 Going around EDR Hackers in your printer Chinese data breach NFC relays and PCI Constructive construction hacks FlipperZero firmware update ICS, PLCs, and attacks Bayesian Swi…
  continue reading
 
As AI revolutionizes how we work, it has created a new attack surface with new technologies. One of those new technologies is Model Context Protocol (MCP). MCP has emerged as the standard for connecting AI to external tools, but its flexibility has created security challenges. How do we secure MCP? Rahul Parwani, Head of Product, Security Solutions…
  continue reading
 
Miles Davis, Jimmy Buffet, 10/8 time, Lost Phones, Phishing, Whisper Leak, Quantum Route Redirect, AI Galore, Rob Allen, and more on the Security Weekly News. Segment Resources: https://www.bleepingcomputer.com/news/security/how-a-ransomware-gang-encrypted-nevada-governments-systems/ This segment is sponsored by ThreatLocker. Visit https://security…
  continue reading
 
Just how bad can things get if someone clicks on a link? Rob Allen joins us again to talk about ransomware, why putting too much attention on clicking links misses the larger picture of effective defenses, and what orgs can do to prepare for an influx of holiday-infused ransomware targeting. Segment resources https://www.bleepingcomputer.com/news/s…
  continue reading
 
What do Property Brothers and this drama have in common? ..... weirdly, several things ? ...... We love a slightly-confusing drama!!! Theory-creating is Elle's kdrama love language, so this is gonna be a fun ride for us here at YA GIRL'S. (Listen through to the end to hear Elle's theory of the century.) .... Last Summer is a new kdrama starring THE…
  continue reading
 
Segment 1: OT Security Doesn’t Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don’t care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals’ plans nicely. In this interview, we discuss the cha…
  continue reading
 
Dictators v Democrats: Why We Fight — Episode: American War Correspondent Phil Ittner In this episode, host TA Mullis speaks with Phil Ittner, an American war correspondent with more than two decades of experience covering conflicts around the world — from Iraq and Afghanistan to Georgia and Ukraine. Now based in Kyiv, Ittner discusses the moral an…
  continue reading
 
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPN…
  continue reading
 
What's the biggest attack vector for breaches besides all of the human related ones (i.e., social engineering, phishing, compromised credentials, etc.)? You might think vulnerabilities, but it's actually misconfiguration. The top breach attack vectors are stolen or compromised credentials, phishing, and misconfigurations, which often work together.…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play