show episodes
 
Artwork

1
History That Doesn't Suck

Prof. Greg Jackson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
HTDS is a bi-weekly podcast, delivering a legit, seriously researched, hard-hitting survey of American history through entertaining stories. To keep up with History That Doesn’t Suck news, check us out htdspodcast.com or follow on Facebook and Instagram: @Historythatdoesntsuck. Become a premium member to support our work, receive ad-free episodes and bonus episodes. Take a special VIP cruise with Prof. Jackson May 18-22, 2026 Go to surfshark.com/HTDS or use code HTDS for 4 extra months of Su ...
  continue reading
 
Artwork

1
Talking Tottenham

Reach Podcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A Tottenham Hotspur podcast that will provide that inside track on everything happening at Hotspur Way. Football.London reporters Alasdair Gold and Ryan Taylor will bring you the latest news, analysis and a laugh too as Spurs look to make their way to the top of the Premier League pile. *Advertising feature from our sponsor Nord VPN - Grab your exclusive Nord VPN deal on https://nordvpn.com/goldguest Try it risk-free now with a 30-day money-back guarantee. Nord VPN terms and conditions apply ...
  continue reading
 
Artwork

1
All Things Secured | Online Privacy & Security on Odysee

All Things Secured | Online Privacy & Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
All Things Secured is dedicated to helping you hack-proof your digital life. Get tips and tutorials on how to lock down your social profiles, use a password manager, connect to a virtual private network (VPN), use an identity monitoring service and much, much more. Now more than ever, it's important to keep yourself safe and secure online. We all tend to know this is true, and yet we rarely do anything about it. Now, you can change that. With the Internet of Things creeping into our daily li ...
  continue reading
 
Artwork

1
Off the VPN

Jellyfish

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Is bringing up your software engineering salary a dating red flag? How do you strike a balance between career ambition and incendiary burnout? Is it ever okay to hold your code hostage in escrow? Navigating a career in tech raises a lot of tricky questions that aren’t exactly appropriate for the daily stand-up. So let’s take this off the VPN. In this new podcast from Jellyfish, work besties Jasmine and Allison scour the internet to find the real questions engineers and developers are whisper ...
  continue reading
 
Artwork

1
ProHoster

prohoster

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Welcome to the official podcast channel of ProHoster! We provide a high-quality VPN service https://prohoster.info/en/vpn that provides reliable protection of your privacy and security on the Internet. Our low-cost VPN is suitable for all your devices and allows you to use the Internet anonymously and safely in any country of the world. With our VPN service, you can bypass website blockades, protect your data from theft and spying, and access content that may be restricted in your country.
  continue reading
 
The Secure Sessions podcast discusses trending online security, digital rights, and encryption legislation with digital security experts, cryptographers, political activists and media professionals. Hosted by IPVanish CTO Josh Gagliardi, Secure Sessions breaks down what's important in the digital security space and makes it relatable for everyday internet users. Security Sessions is brought to you by IPVanish VPN, the only Top Tier, No Log VPN worldwide.
  continue reading
 
Artwork

1
Digital Desperados

Jim Brangenberg

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Digital Desperados Podcast featuring Dark Tales from the Web with Patrick McMurphy. Patrick brings his Irish story telling origins into the limelight as he highlights the Dark Tales of Digital Desperados from around the globe. Cyber Criminal masterminds who are world renowned. Listen in and be prepared to be amazed and intrigued. This podcast is Brought to you by SaferNet VPN.
  continue reading
 
SearchSecurity.com's Security Wire Weekly podcast recaps the week's top IT security news. Learn about the latest virus, worm, Trojan, phishing or identity theft scam. Find out the latest strategies for keeping your network and company data secure. Hear what industry experts recommend you watch for in the weeks ahead.
  continue reading
 
Hosted by cloud computing pioneer David Linthicum, the Cloud Computing Insider podcast gets to the bottom of what cloud computing, and generative AI can bring to your enterprise. New content will focus on what's important to you as a user of cloud computing and generative AI, and the ability to find value the first time.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Consumer Technology News & Views About The Hosts: Marsha Collier is an award winning tech author who has sold over a million books. Learn about her at www.marshacollier.com. Marc Cohen Has Spent 30 Years Informing Southern Californians About Technology. Show Contact Info: [email protected] Twitter #techradio @MarshaCollier & @realmarccohen
  continue reading
 
YouTube Silver Award-Winning THE AMERICAN BUSINESS PODCAST (ABP) "The Voice of American Business with Kevin Devecioglu" Subscribe Today! JOIN THE ABP MEMBERSHIP PROGRAM, SUPPORT ABP and ENJOY MEMBERSHIP BENEFITS Click this link to learn about ABP membership options and sign up. We appreciate your support: https://buymeacoffee.com/americanbusi... SHOP IN THE ABP MARKETPLACE Click this link to visit ABP marketplace and start shopping. We appreciate your support: https://buymeacoffee.com/americ ...
  continue reading
 
Artwork

1
Girls Talk Cyber

girlstalkcyber

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Cyber security, no longer a place for tech heads, speaking another language Join us at Girls Talk Cyber, the podcast to help you decode this space and redefine how you act online
  continue reading
 
Artwork

1
Microsoft Mechanics Podcast

Microsoft Mechanics

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
  continue reading
 
Artwork
 
The Hub of the Infosec Community. A daily podcast with host and CISO James Azar delivering the latest cybersecurity headlines without the FUD and addressing risk, impact, and mitigation for cybersecurity practitioners globally. The show airs live at 9AM EST Monday through Thursday on YouTube, LinkedIn, Facebook, Twitter and Twitch. Our mission is to provide substantive and quality content that’s more than headlines or sales pitches. We want to be a valuable source to assist those cybersecuri ...
  continue reading
 
Tired of paying for multiple streaming apps or dealing with broken links? Torrentio offers a simple, free solution to stream movies and TV shows in HD or 4K - no downloads https://torrentsio.com/ no buffering, no monthly bills. Torrentio is a lightweight but powerful addon for Stremio that connects you to public torrent sources instantly. Just install it, search your favorite title, and press play. No technical skills required. 💡 Key Features of Torrentio: 🔹 Free Streaming – No subscriptions ...
  continue reading
 
Device management is complex. Security threats are constant. Apple ecosystems are evolving fast. Who's managing these challenges? What does it actually take? And most importantly, how do you stay ahead? Welcome to Jamf After Dark, where IT leaders, security professionals and Apple experts tackle the real issues facing organisations today. Join our hosts as they uncover what works, what doesn't, and how to build technology strategies that actually stick. Hear honest conversations about managi ...
  continue reading
 
Artwork

1
Waves & Wires.

Offical Zyxel Networks Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to 'Waves & Wires', the podcast that explores the fascinating world of computer networking, brought to you by Zyxel Networks (EMEA). Join us as we dive into the intricacies of cloud networking, explore the latest wired, wireless technologies, and discuss the ever-important topic of network security for businesses.Our team of experts, with years of experience in the networking industry, share their insights and knowledge on how these technologies are shaping the future of communicatio ...
  continue reading
 
Artwork

1
IPv6 Buzz

Packet Pushers

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
IPv6 Buzz is for network engineers and infrastructure pros adopting IPv6 or who want to learn more about the protocol. Hosts Ed Horley, Tom Coffeen, and Nick Buraglio demystify IPv6’s intricacies and deliver practical insights in a conversational style that explain the how and why of implementation. They’ve literally written the books about IPv6 and routinely consult on public, private, and federal deployments. IPv6 Buzz is an essential podcast for building your knowledge, confidence, and ex ...
  continue reading
 
Weekly information security podcast airing Monday mornings hosted by Oscar Minks and Brad Nigh. In a unique focus on protecting personal information, Oscar and Brad discuss information security as an issue that includes cyber security, physical security, as well as administrative controls. Oscar is the CTO of FRSecure and heads technical services and operations at the company. Brad is the Principal Security Consultant and a 20+ year veteran of the industry.
  continue reading
 
Artwork
 
Many mistake the idea of Back to Jerusalem as a movement of the Chinese church to evangelize Jerusalem. However, Back to Jerusalem is the goal of the Chinese church to evangelize the unreached peoples from eastern provinces of China, westwards towards Jerusalem. Our organization partners with the church of China to not only evangelize the religiously oppressed areas of Asia, but to also train and send Chinese missionaries into the unreached regions of the globe. This podcast is a publication ...
  continue reading
 
Mike Walton reveals his knowledge and experience being a Systems Administrator. I want to help others get into the SysAdmin field and improve their knowledge and career. Advance your career as a Systems Administrator and enjoy a better life.
  continue reading
 
Artwork

1
Binary Podcast

Binary Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"A podcast about the information security, Cyber Security and Cyber-threats" Find us on: Soundcloud: @binarypodcast Facebook: www.fb.com/binarypodcast Join our community and be a part of the discussion: https://web.facebook.com/groups/160148208028813
  continue reading
 
Loading …
show series
 
🎙️ China Malware Long-Term Persistence US Warning, Critical React2Shell Flaw, Palo Alto VPN Attack Wave 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1023: Today's episode will discuss the latest news: · Researchers Uncover 30 Flaws in AI Code Assistants and Develop…
  continue reading
 
New wave of VPN login attempts on Palo Alto portals NATO holds its largest-ever cyberdefense exercise Chinese hackers exploiting React2Shell bug Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Deepfakes aren't science fiction anymore; they'r…
  continue reading
 
Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Government%3F%20%5BGuest%20Diary%5D/32536 React Update Working exploits for the React vulnerability patched yesterday are n…
  continue reading
 
SANS Stormcast Friday, December 5th, 2025: Compromised Govt System; React Vuln Update; Array Networks VPN Attacks Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Governmen…
  continue reading
 
Michigan isn't just flirting with bad tech policy—it's toying with breaking the basic security plumbing of the modern internet. Wrapped in "protect the children" branding, new proposals in Lansing would effectively ban or heavily restrict VPNs by forcing ISPs and websites to detect and block encrypted tunnels for Michigan users. On paper, it's abou…
  continue reading
 
Latest Main Channel Release (Atari 2600+ PAC-MAN Edition Review): https://youtu.be/Moyy2WeNm_w In this episode I talk about the new Analogue 3D console, the 30th anniversary of Worms, the 40th anniversary of the Master System, governments trying to ban VPNs, a new SilverStone PC case, the Another World MSX port, Dell & HP disabling HEVC support on …
  continue reading
 
Connect users to on-premises resources while enforcing Conditional Access policies, including MFA, and eliminate the need for VPNs using Secure Access Service Edge with Microsoft Entra. Route authentication through Microsoft Entra before granting resource access, even within legacy on-premises systems. Boost performance with intelligent local acces…
  continue reading
 
'DroidLock' malware demands ransom Google fixes secret Chrome 0-day UK fines LastPass over 2022 breach Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Security training fails when it's generic. Adaptive's platform personalizes training and r…
  continue reading
 
Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 Mystery Google Chrome 0-Day Vulnerability Google released an update for Google Chrome fixing a vulne…
  continue reading
 
SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 "My…
  continue reading
 
It's easy to cover the cameras on a phone, but what about the microphones? And are they really listening and sending data off to big tech? Here's the no-nonsense truth along with 4 levels of protection. Be sure to check out DeleteMe to learn how to protect your personal data online: https://www.joindeleteme.com/allthingssecured Here are links to so…
  continue reading
 
Tottenham made it back-to-back wins for the first time since September whilst also recording successive clean sheets during victories over Brentford and Slavia Prague.It was also a big week for Xavi Simons, who netted in both matches and Spurs have now won all eight of the games the Dutchman has started since he signed from RB Leipzig.Chief Tottenh…
  continue reading
 
🎙️ DOJ CISA Warn Russia Targeting Critical Infrastructure, Chrome Zero-Day, Intel AMD PCIe Flaws 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1026: Today's episode will discuss the latest news: · Google Patches Gemini Enterprise Vulnerability Exposing Corporate Dat…
  continue reading
 
Aviation cybersecurity is becoming an urgent priority as modern aircraft increasingly rely on complex digital systems for navigation, communication, and engine performance. These systems were once isolated but are now interconnected and vulnerable to cyber threats ranging from GPS spoofing to ransomware attacks on airline infrastructure. As nation-…
  continue reading
 
CEO of retail giant Coupang resigns Pro-Russia hactivists target US infrastructure Israeli cybersecurity funding hits record Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. In deepfake scams, the tells aren't glitchy video anymore – it's beh…
  continue reading
 
Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on. https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Comma…
  continue reading
 
SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerab…
  continue reading
 
🎙️ Microsoft Patch Tuesday 57 Flaws 3 Zero-Days, Adobe Patches 140 Bugs, Fortinet Critical FortiCloud Flaw 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1025: Today's episode will discuss the latest news: · Ivanti Warns of Critical Endpoint Manager Code Execution Fl…
  continue reading
 
Spain arrest over data records Goodbye, dark Telegram Scammers poison AI search results Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Picture a "new hire" who interviews well… except they're synthetic: AI video, AI voice, AI backstory. Onc…
  continue reading
 
Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution in ColdFusion, as well as the code execution issue in Acrobat, will very likely see exploits soon. h…
  continue reading
 
SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches. Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution…
  continue reading
 
🎙️ React2Shell Exploitation Surges, Ransomware Payments Hit $4.5B, Poland Arrests Ukrainian Hackers 🚨 Join us on the CyberHub Podcast as we break down today’s biggest cybersecurity stories shaping global risk and resilience. Ep – 1024: Today's episode will discuss the latest news: · Critical Apache Tika Vulnerability Leads to XXE Injection Attacks …
  continue reading
 
Modern software relies heavily on open source dependencies, often pulling in thousands of packages maintained by developers all over the world. This accelerates innovation but also creates serious supply chain risks as attackers increasingly compromise popular libraries to spread malware at scale. Feross Aboukhadijeh is the founder and CEO of Socke…
  continue reading
 
Ransomware payments pass $4.5 billion Cybercrime networks orchestrate real-world violence Three arrested over possessing hacking tools Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Attackers don't need malware anymore; they need trust. Tip…
  continue reading
 
Bring AI agents directly into your daily workflows with Microsoft Agent 365. Agents have their own identity, email, OneDrive and Teams presence, and collaborate just like coworkers. Onboard agents, give them the policies and knowledge they need, and let them work in parallel with you to handle procurement, approvals, research, and updates using the…
  continue reading
 
nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as undocumented may actually be documented in the underlying hardware description. https://www.tomshardware.com/tech-industry/cyber-security/researcher-finds-undocumented-microphone-and-major-security-flaws-in…
  continue reading
 
Link to episode page This week's Department of Know is hosted by Sarah Lane with guests Jason Shockey, CISO, Cenlar FSB, and Mike Lockhart, CISO, Eagleview Thanks to our show sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. AI is rewriting the cybersecurity rulebook, b…
  continue reading
 
SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as "undocumented" may actually be documented in the underlying hardware description. https://www.to…
  continue reading
 
Aggressively pursuing GPU adoption—whether in the cloud or on-premises—often leads organizations straight into costly traps. A surprising amount of infrastructure is chronically overprovisioned, with organizations buying or renting more GPU power than they'll ever use "just in case." This overkill results in idle or underutilized GPUs that drain bu…
  continue reading
 
This week, we're unpacking a big move in entertainment: Netflix is buying Warner Bros. Discovery (yes, HBO included) and what it means for the shows we love. We'll also look at the AT&T data breach, how to tell if something you're reading was written by AI, and why Ryan Reynolds and Ricky Gervais are suddenly shaping online marketing. Plus: Marsha'…
  continue reading
 
AutoIT3 Compiled Scripts Dropping Shellcodes Malicious AutoIT3 scripts are usign the FileInstall function to include additional scripts at compile time that are dropped as temporary files during execution. https://isc.sans.edu/diary/AutoIT3%20Compiled%20Scripts%20Dropping%20Shellcodes/32542 React2Shell Update The race is on to patch vulnerable syst…
  continue reading
 
SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln AutoIT3 Compiled Scripts Dropping Shellcodes Malicious AutoIT3 scripts are usign the "FileInstall" function to include additional scripts at compile time that are dropped as temporary files during execution. https://isc.sans.edu/diary/AutoIT3%20Compiled%20…
  continue reading
 
“Man your battle stations! This is no sh*t!” This is the story of the Japanese attack on Pearl Harbor. It’s 7:55 on Sunday morning, December 7, 1941. 183 Japanese aircraft descend on the United States Naval Base at Pearl Harbor, Hawaii. Sailors awaken to a nightmare as “Battleship Row” becomes a graveyard, hundreds of US planes are destroyed withou…
  continue reading
 
A live panel from Hacks & Hops featuring FRSecure's CFO, Vanae Pearson, Information Security Consultant, Greg Cloon, and Director of IT at Miner's Inc., Tyree Johnson. Veterans in the field discuss consulting, translating security needs to executive teams, and advocating for the best budget practices. Like, subscribe, and share with your network to…
  continue reading
 
In this video, I'm going to unpack what I see as the bad side of AWS's latest AI push at re:Invent—specifically around agents and mega‑scale infrastructure. You'll hear a lot of polished narratives about "frontier agents," AgentCore, and AI Factories as if they're turnkey answers to every enterprise AI problem. I'm going to challenge that. To me, m…
  continue reading
 
It's never been easier to build, optimize, and govern AI apps and agents that understand your business context and deliver business impact. Our unified, interoperable AI platform enables developers to build faster and smarter, while organizations gain fleetwide security and governance in a unified portal. Yina Arenas, Microsoft Foundry CVP, shares …
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play