HTDS is a bi-weekly podcast, delivering a legit, seriously researched, hard-hitting survey of American history through entertaining stories. To keep up with History That Doesn’t Suck news, check us out htdspodcast.com or follow on Facebook and Instagram: @Historythatdoesntsuck. Become a premium member to support our work, receive ad-free episodes and bonus episodes. Take a special VIP cruise with Prof. Jackson May 18-22, 2026 Go to surfshark.com/HTDS or use code HTDS for 4 extra months of Su ...
…
continue reading
A Tottenham Hotspur podcast that will provide that inside track on everything happening at Hotspur Way. Football.London reporters Alasdair Gold and Ryan Taylor will bring you the latest news, analysis and a laugh too as Spurs look to make their way to the top of the Premier League pile. *Advertising feature from our sponsor Nord VPN - Grab your exclusive Nord VPN deal on https://nordvpn.com/goldguest Try it risk-free now with a 30-day money-back guarantee. Nord VPN terms and conditions apply ...
…
continue reading
The only podcast dedicated to 11v11 Pro Clubs on the Xbox One. VPN Weekly covers the FVPAA, America's largest FIFA 11v11 Pro Clubs League.
…
continue reading
1
All Things Secured | Online Privacy & Security on Odysee
All Things Secured | Online Privacy & Security
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
…
continue reading
The only podcast dedicated to 11v11 Pro Clubs on the Xbox One. VPN Weekly covers the FVPAA, America's largest FIFA 11v11 Pro Clubs League.
…
continue reading
Is bringing up your software engineering salary a dating red flag? How do you strike a balance between career ambition and incendiary burnout? Is it ever okay to hold your code hostage in escrow? Navigating a career in tech raises a lot of tricky questions that aren’t exactly appropriate for the daily stand-up. So let’s take this off the VPN. In this new podcast from Jellyfish, work besties Jasmine and Allison scour the internet to find the real questions engineers and developers are whisper ...
…
continue reading
Welcome to the official podcast channel of ProHoster! We provide a high-quality VPN service https://prohoster.info/en/vpn that provides reliable protection of your privacy and security on the Internet. Our low-cost VPN is suitable for all your devices and allows you to use the Internet anonymously and safely in any country of the world. With our VPN service, you can bypass website blockades, protect your data from theft and spying, and access content that may be restricted in your country.
…
continue reading
Technical interviews about software topics.
…
continue reading
The Secure Sessions podcast discusses trending online security, digital rights, and encryption legislation with digital security experts, cryptographers, political activists and media professionals. Hosted by IPVanish CTO Josh Gagliardi, Secure Sessions breaks down what's important in the digital security space and makes it relatable for everyday internet users. Security Sessions is brought to you by IPVanish VPN, the only Top Tier, No Log VPN worldwide.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Welcome to the Digital Desperados Podcast featuring Dark Tales from the Web with Patrick McMurphy. Patrick brings his Irish story telling origins into the limelight as he highlights the Dark Tales of Digital Desperados from around the globe. Cyber Criminal masterminds who are world renowned. Listen in and be prepared to be amazed and intrigued. This podcast is Brought to you by SaferNet VPN.
…
continue reading
Listen in on discussions with Cisco and industry experts regarding business, design, and deployment considerations of SSL VPN in focused 10-15 minute topics. This will be a series of seven discussions, occurring once monthly.
…
continue reading
Training of Aria Technologies products including Ericsson-LG, Lancom Systems, Star Leaf, So Connect, Jabra, xmedius, Checkpoint, NBN, iPECS2Teams
…
continue reading
Hello, I'm Rees from the YouTube channel ctrl-alt-rees. Here is a thing wherein I ramble about things.
…
continue reading
Cutting through the noise for Canadian VARs and MSPs
…
continue reading
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Hosted by cloud computing pioneer David Linthicum, the Cloud Computing Insider podcast gets to the bottom of what cloud computing, and generative AI can bring to your enterprise. New content will focus on what's important to you as a user of cloud computing and generative AI, and the ability to find value the first time.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
The Tech Factor - Tech Deep Dives, Latest Tech and Cool and Funny Tech Stories
…
continue reading
Consumer Technology News & Views About The Hosts: Marsha Collier is an award winning tech author who has sold over a million books. Learn about her at www.marshacollier.com. Marc Cohen Has Spent 30 Years Informing Southern Californians About Technology. Show Contact Info: [email protected] Twitter #techradio @MarshaCollier & @realmarccohen
…
continue reading
4
The American Business Podcast (ABP): The Voice of American Business with Kevin Devecioglu
Kevin Devecioglu
YouTube Silver Award-Winning THE AMERICAN BUSINESS PODCAST (ABP) "The Voice of American Business with Kevin Devecioglu" Subscribe Today! JOIN THE ABP MEMBERSHIP PROGRAM, SUPPORT ABP and ENJOY MEMBERSHIP BENEFITS Click this link to learn about ABP membership options and sign up. We appreciate your support: https://buymeacoffee.com/americanbusi... SHOP IN THE ABP MARKETPLACE Click this link to visit ABP marketplace and start shopping. We appreciate your support: https://buymeacoffee.com/americ ...
…
continue reading
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
…
continue reading
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
…
continue reading
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
…
continue reading
Tired of paying for multiple streaming apps or dealing with broken links? Torrentio offers a simple, free solution to stream movies and TV shows in HD or 4K - no downloads https://torrentsio.com/ no buffering, no monthly bills. Torrentio is a lightweight but powerful addon for Stremio that connects you to public torrent sources instantly. Just install it, search your favorite title, and press play. No technical skills required. 💡 Key Features of Torrentio: 🔹 Free Streaming – No subscriptions ...
…
continue reading
Device management is complex. Security threats are constant. Apple ecosystems are evolving fast. Who's managing these challenges? What does it actually take? And most importantly, how do you stay ahead? Welcome to Jamf After Dark, where IT leaders, security professionals and Apple experts tackle the real issues facing organisations today. Join our hosts as they uncover what works, what doesn't, and how to build technology strategies that actually stick. Hear honest conversations about managi ...
…
continue reading
Welcome to 'Waves & Wires', the podcast that explores the fascinating world of computer networking, brought to you by Zyxel Networks (EMEA). Join us as we dive into the intricacies of cloud networking, explore the latest wired, wireless technologies, and discuss the ever-important topic of network security for businesses.Our team of experts, with years of experience in the networking industry, share their insights and knowledge on how these technologies are shaping the future of communicatio ...
…
continue reading
IPv6 Buzz is for network engineers and infrastructure pros adopting IPv6 or who want to learn more about the protocol. Hosts Ed Horley, Tom Coffeen, and Nick Buraglio demystify IPv6’s intricacies and deliver practical insights in a conversational style that explain the how and why of implementation. They’ve literally written the books about IPv6 and routinely consult on public, private, and federal deployments. IPv6 Buzz is an essential podcast for building your knowledge, confidence, and ex ...
…
continue reading
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
…
continue reading
Lighthearted privacy and security advice from Thexyz and guests.
…
continue reading
Welcome to the GreenLeyf podcast where I touch on tech news, sys admin and all things Linux.
…
continue reading
Kenyan lady using her voice as a tool got storytelling and engaging with her followers.
…
continue reading
Many mistake the idea of Back to Jerusalem as a movement of the Chinese church to evangelize Jerusalem. However, Back to Jerusalem is the goal of the Chinese church to evangelize the unreached peoples from eastern provinces of China, westwards towards Jerusalem. Our organization partners with the church of China to not only evangelize the religiously oppressed areas of Asia, but to also train and send Chinese missionaries into the unreached regions of the globe. This podcast is a publication ...
…
continue reading
Geeksters - Podnutz
…
continue reading
The team from Tech Advisor run through what you need to know to stay safe online, from VPNs and anti-virus to how to keep your personal data locked down.
…
continue reading
ARE YOU READY TO BE MONETIZED? YOUTUBE MONETIZATION IS OUR TEAM GOAL! What are you waiting for? Join Us!
…
continue reading
McAfee customer service phone number +!855-388-3300
…
continue reading
La vida digital explicada de forma sencilla y con una experiencia de primera mano
…
continue reading
New Norton phone number +1855-388-3300 podcast weblog get to know more about Norton antivirus
…
continue reading
Mike Walton reveals his knowledge and experience being a Systems Administrator. I want to help others get into the SysAdmin field and improve their knowledge and career. Advance your career as a Systems Administrator and enjoy a better life.
…
continue reading
"A podcast about the information security, Cyber Security and Cyber-threats" Find us on: Soundcloud: @binarypodcast Facebook: www.fb.com/binarypodcast Join our community and be a part of the discussion: https://web.facebook.com/groups/160148208028813
…
continue reading
The Program that takes the mystery out of Tech. A former corporate executive, Jim Blue makes sure your technology matches your personal and business needs.
…
continue reading
1
US Organizations Warned of Chinese Malware Used for Long-Term Persistence, Critical React2Shell Flaw in React Next.js, New Wave of VPN Login Attempts Targets Palo Alto GlobalProtect Portals
16:04
16:04
Play later
Play later
Lists
Like
Liked
16:04🎙️ China Malware Long-Term Persistence US Warning, Critical React2Shell Flaw, Palo Alto VPN Attack Wave 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1023: Today's episode will discuss the latest news: · Researchers Uncover 30 Flaws in AI Code Assistants and Develop…
…
continue reading
1
Palo Alto VPN attacks, NATO cyberdefense exercise, Chinese exploit React2Shell
8:19
8:19
Play later
Play later
Lists
Like
Liked
8:19New wave of VPN login attempts on Palo Alto portals NATO holds its largest-ever cyberdefense exercise Chinese hackers exploiting React2Shell bug Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Deepfakes aren't science fiction anymore; they'r…
…
continue reading
1
SANS Stormcast Friday, December 5th, 2025: Compromised Govt System; React Vuln Update; Array Networks VPN Attacks
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Government%3F%20%5BGuest%20Diary%5D/32536 React Update Working exploits for the React vulnerability patched yesterday are n…
…
continue reading
1
SANS Stormcast Friday, December 5th, 2025: Compromised Govt System; React Vuln Update; Array Networks VPN Attacks (#)
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35SANS Stormcast Friday, December 5th, 2025: Compromised Govt System; React Vuln Update; Array Networks VPN Attacks Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Governmen…
…
continue reading
1
They're Coming for Your VPN: Michigan's Insane Anti-Cloud Law
11:30
11:30
Play later
Play later
Lists
Like
Liked
11:30Michigan isn't just flirting with bad tech policy—it's toying with breaking the basic security plumbing of the modern internet. Wrapped in "protect the children" branding, new proposals in Lansing would effectively ban or heavily restrict VPNs by forcing ISPs and websites to detect and block encrypted tunnels for Michigan users. On paper, it's abou…
…
continue reading
1
Worms 30th Anniversary, VPN Bans, Rebecca Heineman & More - Ramble 139
1:02:27
1:02:27
Play later
Play later
Lists
Like
Liked
1:02:27Latest Main Channel Release (Atari 2600+ PAC-MAN Edition Review): https://youtu.be/Moyy2WeNm_w In this episode I talk about the new Analogue 3D console, the 30th anniversary of Worms, the 40th anniversary of the Master System, governments trying to ban VPNs, a new SilverStone PC case, the Another World MSX port, Dell & HP disabling HEVC support on …
…
continue reading
1
Replace your VPN - Global Secure Access in Microsoft Entra
10:12
10:12
Play later
Play later
Lists
Like
Liked
10:12Connect users to on-premises resources while enforcing Conditional Access policies, including MFA, and eliminate the need for VPNs using Secure Access Service Edge with Microsoft Entra. Route authentication through Microsoft Entra before granting resource access, even within legacy on-premises systems. Boost performance with intelligent local acces…
…
continue reading
1
'DroidLock' demands ransom, Google fixes secret Chrome 0-day, UK fines LastPass over 2022 breach
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22'DroidLock' malware demands ransom Google fixes secret Chrome 0-day UK fines LastPass over 2022 breach Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Security training fails when it's generic. Adaptive's platform personalizes training and r…
…
continue reading
1
SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack
6:56
6:56
Play later
Play later
Lists
Like
Liked
6:56Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 Mystery Google Chrome 0-Day Vulnerability Google released an update for Google Chrome fixing a vulne…
…
continue reading
1
SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack (#)
6:56
6:56
Play later
Play later
Lists
Like
Liked
6:56SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 "My…
…
continue reading
1
STOP your Phone from Listening! (Privacy 101)
9:49
9:49
Play later
Play later
Lists
Like
Liked
9:49It's easy to cover the cameras on a phone, but what about the microphones? And are they really listening and sending data off to big tech? Here's the no-nonsense truth along with 4 levels of protection. Be sure to check out DeleteMe to learn how to protect your personal data online: https://www.joindeleteme.com/allthingssecured Here are links to so…
…
continue reading
1
Xavi's statement, Tottenham breakthrough, Sonny returns and Thomas Frank's double win delight
1:09:15
1:09:15
Play later
Play later
Lists
Like
Liked
1:09:15Tottenham made it back-to-back wins for the first time since September whilst also recording successive clean sheets during victories over Brentford and Slavia Prague.It was also a big week for Xavi Simons, who netted in both matches and Spurs have now won all eight of the games the Dutchman has started since he signed from RB Leipzig.Chief Tottenh…
…
continue reading
1
DOJ CISA Warn Russia Hackers Targeting Critical Infrastructure, Aeroflot Hacked Through Little-Known Vendor, Chrome Zero-Day Vulnerability Exploited, Intel AMD Processors Affected by PCIe Vulnerabilities ...
17:58
17:58
Play later
Play later
Lists
Like
Liked
17:58🎙️ DOJ CISA Warn Russia Targeting Critical Infrastructure, Chrome Zero-Day, Intel AMD PCIe Flaws 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1026: Today's episode will discuss the latest news: · Google Patches Gemini Enterprise Vulnerability Exposing Corporate Dat…
…
continue reading
1
Aviation Cybersecurity with Serge Christiaans
49:55
49:55
Play later
Play later
Lists
Like
Liked
49:55Aviation cybersecurity is becoming an urgent priority as modern aircraft increasingly rely on complex digital systems for navigation, communication, and engine performance. These systems were once isolated but are now interconnected and vulnerable to cyber threats ranging from GPS spoofing to ransomware attacks on airline infrastructure. As nation-…
…
continue reading
1
Coupang CEO resigns, hactivists target US infrastructure, Israeli cybersecurity hits record funding
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51CEO of retail giant Coupang resigns Pro-Russia hactivists target US infrastructure Israeli cybersecurity funding hits record Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. In deepfake scams, the tells aren't glitchy video anymore – it's beh…
…
continue reading
1
SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on. https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Comma…
…
continue reading
1
SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation (#)
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerab…
…
continue reading
1
Microsoft Patch Tuesday 57 Flaws 3 Zero-Days, Adobe Patches 140 Bugs, Fortinet Critical FortiCloud Flaw
18:02
18:02
Play later
Play later
Lists
Like
Liked
18:02🎙️ Microsoft Patch Tuesday 57 Flaws 3 Zero-Days, Adobe Patches 140 Bugs, Fortinet Critical FortiCloud Flaw 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1025: Today's episode will discuss the latest news: · Ivanti Warns of Critical Endpoint Manager Code Execution Fl…
…
continue reading
1
Spain arrest over data records, goodbye dark Telegram, scammers poison AI search results
7:24
7:24
Play later
Play later
Lists
Like
Liked
7:24Spain arrest over data records Goodbye, dark Telegram Scammers poison AI search results Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Picture a "new hire" who interviews well… except they're synthetic: AI video, AI voice, AI backstory. Onc…
…
continue reading
1
SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches.
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution in ColdFusion, as well as the code execution issue in Acrobat, will very likely see exploits soon. h…
…
continue reading
1
SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches. (#)
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches. Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution…
…
continue reading
1
React2Shell Exploitation Surges, Ransomware Payments Hit $4.5B, Poland Arrests Ukrainian Hackers
14:00
14:00
Play later
Play later
Lists
Like
Liked
14:00🎙️ React2Shell Exploitation Surges, Ransomware Payments Hit $4.5B, Poland Arrests Ukrainian Hackers 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1024: Today's episode will discuss the latest news: · Critical Apache Tika Vulnerability Leads to XXE Injection Attacks …
…
continue reading
1
Blocking Software Supply Chain Attacks with Feross Aboukhadijeh
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48Modern software relies heavily on open source dependencies, often pulling in thousands of packages maintained by developers all over the world. This accelerates innovation but also creates serious supply chain risks as attackers increasingly compromise popular libraries to spread malware at scale. Feross Aboukhadijeh is the founder and CEO of Socke…
…
continue reading
1
Ransomware costs billions, cybercrime leads to real violence, three arrested for hacking tools
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Ransomware payments pass $4.5 billion Cybercrime networks orchestrate real-world violence Three arrested over possessing hacking tools Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Attackers don't need malware anymore; they need trust. Tip…
…
continue reading
Bring AI agents directly into your daily workflows with Microsoft Agent 365. Agents have their own identity, email, OneDrive and Teams presence, and collaborate just like coworkers. Onboard agents, give them the policies and knowledge they need, and let them work in parallel with you to handle procurement, approvals, research, and updates using the…
…
continue reading
1
SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as undocumented may actually be documented in the underlying hardware description. https://www.tomshardware.com/tech-industry/cyber-security/researcher-finds-undocumented-microphone-and-major-security-flaws-in…
…
continue reading
1
Department of Know: CISO hiring warning, critical threat actor law, Microsoft Defender outage
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Link to episode page This week's Department of Know is hosted by Sarah Lane with guests Jason Shockey, CISO, Cenlar FSB, and Mike Lockhart, CISO, Eagleview Thanks to our show sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. AI is rewriting the cybersecurity rulebook, b…
…
continue reading
1
SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory (#)
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as "undocumented" may actually be documented in the underlying hardware description. https://www.to…
…
continue reading
1
The Great GPU Scam: Why Your Cloud AI Budget Is Getting Robbed
21:11
21:11
Play later
Play later
Lists
Like
Liked
21:11Aggressively pursuing GPU adoption—whether in the cloud or on-premises—often leads organizations straight into costly traps. A surprising amount of infrastructure is chronically overprovisioned, with organizations buying or renting more GPU power than they'll ever use "just in case." This overkill results in idle or underutilized GPUs that drain bu…
…
continue reading
1
Spotting AI Text, Safer Kids' Tech with Tonies and Netflix/HBO: The Plot Twist No One Saw Coming
44:07
44:07
Play later
Play later
Lists
Like
Liked
44:07This week, we're unpacking a big move in entertainment: Netflix is buying Warner Bros. Discovery (yes, HBO included) and what it means for the shows we love. We'll also look at the AT&T data breach, how to tell if something you're reading was written by AI, and why Ryan Reynolds and Ricky Gervais are suddenly shaping online marketing. Plus: Marsha'…
…
continue reading
1
SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34AutoIT3 Compiled Scripts Dropping Shellcodes Malicious AutoIT3 scripts are usign the FileInstall function to include additional scripts at compile time that are dropped as temporary files during execution. https://isc.sans.edu/diary/AutoIT3%20Compiled%20Scripts%20Dropping%20Shellcodes/32542 React2Shell Update The race is on to patch vulnerable syst…
…
continue reading
1
SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln (#)
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln AutoIT3 Compiled Scripts Dropping Shellcodes Malicious AutoIT3 scripts are usign the "FileInstall" function to include additional scripts at compile time that are dropped as temporary files during execution. https://isc.sans.edu/diary/AutoIT3%20Compiled%20…
…
continue reading
1
194: Pearl Harbor: December 7, 1941
1:03:23
1:03:23
Play later
Play later
Lists
Like
Liked
1:03:23“Man your battle stations! This is no sh*t!” This is the story of the Japanese attack on Pearl Harbor. It’s 7:55 on Sunday morning, December 7, 1941. 183 Japanese aircraft descend on the United States Naval Base at Pearl Harbor, Hawaii. Sailors awaken to a nightmare as “Battleship Row” becomes a graveyard, hundreds of US planes are destroyed withou…
…
continue reading
1
Unsecurity Episode 252: Bridging the Gap Between CISO & CFO - Executive Panel
29:11
29:11
Play later
Play later
Lists
Like
Liked
29:11A live panel from Hacks & Hops featuring FRSecure's CFO, Vanae Pearson, Information Security Consultant, Greg Cloon, and Director of IT at Miner's Inc., Tyree Johnson. Veterans in the field discuss consulting, translating security needs to executive teams, and advocating for the best budget practices. Like, subscribe, and share with your network to…
…
continue reading
1
AWS AI Agents: Innovation or Just Keynote Theater?
25:46
25:46
Play later
Play later
Lists
Like
Liked
25:46In this video, I'm going to unpack what I see as the bad side of AWS's latest AI push at re:Invent—specifically around agents and mega‑scale infrastructure. You'll hear a lot of polished narratives about "frontier agents," AgentCore, and AI Factories as if they're turnkey answers to every enterprise AI problem. I'm going to challenge that. To me, m…
…
continue reading
1
Microsoft Foundry - Everything you need to build AI apps & agents
12:08
12:08
Play later
Play later
Lists
Like
Liked
12:08It's never been easier to build, optimize, and govern AI apps and agents that understand your business context and deliver business impact. Our unified, interoperable AI platform enables developers to build faster and smarter, while organizations gain fleetwide security and governance in a unified portal. Yina Arenas, Microsoft Foundry CVP, shares …
…
continue reading