Cutting through AI bullsh*t. Come join the discussion on Discord! https://discord.gg/4UNKGf3
…
continue reading
Join Malcolm Gladwell, author and host of Revisionist History, for Smart Talks with IBM as he speaks with visionaries who are creatively applying technology in business to drive change and transform their industries. This season, Smart Talks with IBM is hitting the road. We’re stepping outside the studio to explore how IBM clients are using artificial intelligence to transform the way they do business. It’s a fresh look behind the curtain of technology, where big ideas meet cutting-edge solu ...
…
continue reading
Translating Cyber into Plain Terms. Newest AI, Social Engineering, and Ransomware Attack Insight to Protect Businesses and Reduce Risk. Latest Cyber News from the Dark web, research, and insider info. Interviews of Global Technology Leaders, sharing True Cyber Crime stories and advice on how to manage cyber risk. Find all content at www.CyberCrimeJunkies.com and videos on YouTube @CyberCrimeJunkiesPodcast
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Daily overview of the Top 10 Hacker News posts. Post and comment summarization by AI.
…
continue reading
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Data & Fun. Weekly updates from the R programming language open source community. #rstats
…
continue reading
Cybersecurity and Hacking related news like Hacks, Bugs, Vulnerabilities, Data Breaches of the last 7 days on every Wednesday.
…
continue reading
Based in New York City - JDP features diverse guests & topics including: Wild Stories, Current Events, Geopolitics, True Crime, Society & Culture, History, Tech, Investigative Journalism and much more. Hosted by Julian Dorey.
…
continue reading
Barcode is a cocktail powered podcast that dives into the technology, personalities, criminals, and heroes that have come to define modern security across the globe. Hosted by Chris Glanden.
…
continue reading
Listen to the Eh Sayers podcast to meet the people behind the data and explore the stories behind the numbers. Join us as we meet with experts from Statistics Canada and from across the nation to ask and answer the questions that matter to Canadians.
…
continue reading
This is a Podcast syncs with Hacker News (https://news.ycombinator.com) automatically
…
continue reading
Problems have solutions. We're here to learn about them from regular people creating change in their communities using data and technology. Each season of the Civic Hacker Podcast includes audio from the Civic Hacker Summit and news from the Civic Hacker Network. The Civic Hacker Podcast © 2024 by Lori McNeill is licensed under CC BY-NC-ND 4.0. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/4.0/
…
continue reading
Security Visionaries is a podcast all about the world of cyber, data, and tech infrastructure, bringing together experts from around the world and across domains. In each episode, your hosts Emily Wearmouth, Bailey Harmon, and Max Havey dig into the hot topics and burning questions that are preoccupying industry conversations.
…
continue reading
A podcast for movies. A podcast for cyber talk. A podcast for smart people to say smart things to smart listeners. Hosted by Jeffrey Wheatman, former Gartner Analyst.
…
continue reading
Each episode our panel of International Map Hackers will dissect a buzzword from the world of GIS. We’ll give you concrete definitions, practical applications, and share where we hope the technology can go from here.
…
continue reading
The Fraudian Slip Podcast from the ITRC
…
continue reading
Arvid Kahl talks about starting and bootstrapping businesses, how to build an audience, and how to build in public.
…
continue reading
Scams 360 gives you an inside look into an investigator’s mind about how scams work and how to avoid them. Listen each week to hear a new story.
…
continue reading
Everyday society depends more on electronics, social media etc, and by doing so they expose their private data to the public eye. Each Saturday, join Hackers Con Calle is a group of Cyber Security professionals dedicated to inform the audience of current trends and a how to protect the digital life.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Millions of Plays! The Cybercrime Magazine Podcast is your destination for cybersecurity facts, figures, predictions and statistics. Listen to interviews with top industry experts, Fortune 500 CISOs, and cybersecurity CEOs – plus rundowns of the latest news involving hacks and breaches, coverage of topics such as women in cyber, programs at high schools and colleges, and more. Subscribe wherever you get your podcasts.
…
continue reading
Learn the latest Cybersecurity updates in the tech world.
…
continue reading
DIY Cyber Guy, hosted by David W. Schropfer, offers a approachable exploration of cybersecurity, emerging technologies (like AI and Quantum Computing) for all knowledge levels. Through dynamic podcasts, expert interviews, and engaging blog posts, DIY Cyber Guy provides practical, easy-to-apply tips to stay ahead of tech trends and protect your digital world. Whether you're curious about cutting-edge tech or looking to secure your online life, DIY Cyber Guy makes complex topics both fun and a ...
…
continue reading
We will be doing podcasts about data storage, backup & disaster recovery, and cloud storage solutions
…
continue reading
Tripwire's cybersecurity podcast features 20-minute conversations with the people who protect people from cyber threats. Hosted by Tripwire's VP of Product Management and Strategy, Tim Erlin, each episode brings on a new guest to explore the evolving threat landscape, technology trends, and cybersecurity best practices.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
When Russian hackers break into your business’s computers, what will they find and how much will it cost you? How long will it take you to recover? Can you recover? Here’s the sad truth: 97% of breaches could have been prevented with basic security measures; but once you’ve been hit… you can never get UnHacked! UnHacked is a weekly cybersecurity podcast for SMB business owners and leaders that helps them sort through the overwhelming security costs and recommendations, and focus on the best ...
…
continue reading
Weekly discussion of coding and spreadsheets in real life business applications.
…
continue reading
In today's environment of data breaches, identity theft, fraud, and increasing connectivity, HIPAA Privacy and Security rules are a responsibility to your patients and your clients. HIPAA isn't about compliance, it's about patient care.
…
continue reading
Veteran host Francis Rose gives Federal government decision-makers news and information about management, workforce, IT, and acquisition, to help those leaders do their jobs better.
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
Our podcast covers major data breaches, digital privacy issues, and the quirks of internet culture with a mix of humor and insight. Why Subscribe? Stay Informed: Get the latest updates on cybersecurity threats, ransomware attacks, and cyber insurance trends. Engaging Content: We break down complex topics with a lighthearted approach, making them easy to understand. Expert Insights: Learn from industry experts and our own experiences in the cybersecurity field. We dive deep into the latest in ...
…
continue reading
Podcast about enterprise technology by Indonesia's trusted I.T. company, ACS Group IG @acsgroup.co.id. We interview experts to spread awareness about the latest trends and opportunities in the enterprise tech space. Email us at: [email protected]
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Ransomware, CyberSecurity & Information Security Hackers, State Actors, OH MY! Ransomware Battleground hosts, Syya Yasotornrat and Poul Frederiksen investigate the highly topical attacks that Ransomware and its ilk are ravaging organizations big and small today. If you are a business or IT leader, you can enjoy a digestible conversation to stay on top of the attacks that your organization is always under potential threat. It can get technical, but we're here to put it into laymen's terms and ...
…
continue reading
A gumbo of cybersecurity insights about Data Protection, Data Governance, and Data Backup
…
continue reading
Hacker Public Radio is an podcast that releases shows every weekday Monday through Friday. Our shows are produced by the community (you) and can be on any topic that are of interest to hackers and hobbyists.
…
continue reading
Welcome to The Lockdown. Privacy doesn’t have to be all-or-nothing. The inability to attain extreme levels of privacy shouldn’t deter one from taking any protective measures at all. The show is hosted by Ray Heffer, an expert in the field of privacy and cybersecurity, with each episode touching on a range of topics such as data privacy, password management, and secure browsing habits. Tin-foil hats are optional!
…
continue reading
We Cover the Cyberspace.
…
continue reading
Cyber Uncut brings you the key decision makers and cutting edge innovators shaping Australia's cyber revolution. From cyber security to artificial intelligence and information systems, discover how businesses and government are navigating the transition to a digital future. Join Momentum Media's Phil Tarrant, defence and national security podcaster, Major General (Ret'd) Dr Marcus Thompson AM – former head of the ADF's Information Warfare Division, and Liam Garman, editor of Cyber Daily, as ...
…
continue reading
"What the Hack?" is the award-winning true cybercrime podcast--the place to hear memorable stories and get good advice.
…
continue reading
I'm fascinated by what happens in the dark parts of the Internet. Come with me and let's shine some light on it and see what's there.
…
continue reading
Hackers have been an underground tribe of creators and thinkers. It's time to take a look inside the tribe of how the mind of its members work.
…
continue reading
1
Cybercrime News For Dec. 8, 2025. Hacker Twins Charged in Data Breach. WCYB Digital Radio.
2:52
2:52
Play later
Play later
Lists
Like
Liked
2:52The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
Uruguay Data Hack Compromised Three Million Records
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49The combined sources present a critical analysis of the October 2025 cybersecurity incident impacting Uruguay’s Plataforma GURI, the education system's central data repository for millions of citizens, including minors. Security analysts confirm this incident is part of a systemic cyber campaign targeting the Uruguayan public sector, concurrent wit…
…
continue reading
1
12.3.25 | Anthropic acquires Bun, OpenAI issues 'code red' over Google, IBM CEO doubts AI data center ROI
12:07
12:07
Play later
Play later
Lists
Like
Liked
12:07This is a recap of the top 10 posts on Hacker News on Dec 3, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:23) - Anthropic acquires Bun (01:33) - OpenAI declares 'code red' as Google catches up in AI race (02:42) - IBM CEO says there is 'no way' spending on AI data centers will pa…
…
continue reading
Question? Text our Studio direct. From Rupert Murdoch's global entertainment ambition to a dead hacker found hanging from a tree in a park in Germany, this true cyber crime story spans over a decade in the cut-throat Satellite TV wars, involving colorful characters, pirates, big business, technology advances and failures and those who entered the d…
…
continue reading
1
INE Earns G2 Winter 2026 Badges Across Global Markets
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35This story was originally published on HackerNoon at: https://hackernoon.com/ine-earns-g2-winter-2026-badges-across-global-markets. Awards include Leader status in the Online Course Providers Grid Report, Momentum Leader recognition in two major training categories, and regional leadership. Check more stories related to cybersecurity at: https://ha…
…
continue reading
1
The Louvre Heist: Intimidation, DNA, and the Real Story Behind the Global Headline
8:45
8:45
Play later
Play later
Lists
Like
Liked
8:45This story was originally published on HackerNoon at: https://hackernoon.com/the-louvre-heist-intimidation-dna-and-the-real-story-behind-the-global-headline. Louvre heist and how the simple password is not the story. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #c…
…
continue reading
1
Cybercrime Wire For Dec. 10, 2025. ChatGPT Exposes $1M Pig Butchering Scheme. WCYB Digital Radio.
1:19
1:19
Play later
Play later
Lists
Like
Liked
1:19The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Cybercrime News For Dec. 10, 2025. FTC Upholds Ban on Stalkerware Founder. WCYB Digital Radio.
2:36
2:36
Play later
Play later
Lists
Like
Liked
2:36The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
Mastering Cyber. Holiday Scam Dangers. Alissa “Dr Jay” Abdullah, Deputy CSO, Mastercard.
1:35
1:35
Play later
Play later
Lists
Like
Liked
1:35Welcome to Mastering Cyber with Host Alissa (Dr Jay) Abdullah, PhD, SVP & Deputy CSO at Mastercard, and former White House technology executive. Listen to this weekly one-minute podcast to help you maneuver cybersecurity industry tips, terms, and topics. Buckle up, your 60 seconds of cyber starts now! Sponsored by Mastercard: https://mastercard.us/…
…
continue reading
Think your Christmas tree knowledge is top‑notch? Time to put it to the test! In this holiday special of Eh Sayers, our colleagues face off in a trivia showdown all about Canada’s Christmas tree industry. Discover which nation first sparked the tradition, how much Canadian Christmas tree farmers earned in 2023, the surprising numbers behind exports…
…
continue reading
1
12.10.25 | Gemini Pro 3 imagines future HN front page, Let's Encrypt celebrates 10 years, Mistral launches Devstral2 and Vibe CLI
11:54
11:54
Play later
Play later
Lists
Like
Liked
11:54This is a recap of the top 10 posts on Hacker News on Dec 10, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:20) - Show HN: Gemini Pro 3 hallucinates the HN front page 10 years from now (01:25) - 10 Years of Let's Encrypt (02:45) - Mistral releases Devstral2 and Mistral Vibe CLI (0…
…
continue reading
Cybersecurity Today: Google Chrome's AI Safety Plan, React2Shell Fixes, & New Ransomware Tactics In this episode of Cybersecurity Today, host Jim Love discusses Google's new security blueprint for AI-powered Chrome agents, highlighting measures against indirect prompt injections and model errors. Learn about Next JS's new tool for addressing the cr…
…
continue reading
1
Risky Business #818 -- React2Shell is a fun one
58:27
58:27
Play later
Play later
Lists
Like
Liked
58:27In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: There’s a CVSS 10/10 remote code exec in the React javascript server. JS server? U wot mate? China is out popping shells with it Linux adds support for PCIe bus encryption Amnesty International says Intellexa can just TeamViewer into its customers’ s…
…
continue reading
1
CONTESTED GROUND: Australia's strategic crossroads and aspects of national resilience
46:45
46:45
Play later
Play later
Lists
Like
Liked
46:45In this episode of the Contested Ground podcast, hosts Phil Tarrant and Major General (Ret'd) Dr Marcus Thompson are joined by special guest Dr Ross Babbage, chief executive officer of Strategic Forum and Non-Resident Senior Fellow at the Center for Strategic and Budgetary Assessments in Washington DC. Together, the trio dive into Australia's rapid…
…
continue reading
1
Rethinking Public Health Workflows Through Automation and Governance: Why Data Modernization May Be The Key | A Conversation with Jim St. Clair | Redefining CyberSecurity with Sean Martin
44:06
44:06
Play later
Play later
Lists
Like
Liked
44:06⬥EPISODE NOTES⬥ Artificial intelligence is reshaping how public health organizations manage data, interpret trends, and support decision-making. In this episode, Sean Martin talks with Jim St. Clair, Vice President of Public Health Systems at a major public health research institute, Altarum, about what AI adoption really looks like across federal,…
…
continue reading
1
Anthrax Response to Cyber IR to Hacking Teslas: Ex-Marine & Cyber Podcaster, Wil Klusovsky, reveals 2026's Deadliest Cyber Threats
59:19
59:19
Play later
Play later
Lists
Like
Liked
59:19Ever wondered what handling deadly anthrax at the US Capitol has in common with battling ransomware in 2025? What if the next big cyber attack isn't from hackers in a basement—but from quantum computers shattering your encryption overnight? In this unmissable episode of Ransomware Rewind, cybersecurity legend Wil Klusovsky spills insider secrets th…
…
continue reading
1
#364 - Cult Victim EXPOSES Murderous Psychotic “Guru” & his Master Slave Fantasy | Sarah Edmondson
2:31:22
2:31:22
Play later
Play later
Lists
Like
Liked
2:31:22SPONSORS:1) GHOSTBED: During GhostBed’s Holiday Sale, you can get 25% off sitewide for a limited time. Just go to http://GhostBed.com/julian and use promo code JULIAN at checkout2) MIZZEN & MAIN: Right now, Mizzen & Main is offering our listeners 20% off your first purchase at http://mizzenandmain.com , promo code JULIAN203) BUBS NATURALS: Live Bet…
…
continue reading
1
I Built a Tiny Browser-Only Encryption Tool Because I Don’t Trust Your Backend
10:25
10:25
Play later
Play later
Lists
Like
Liked
10:25This story was originally published on HackerNoon at: https://hackernoon.com/i-built-a-tiny-browser-only-encryption-tool-because-i-dont-trust-your-backend. A developer builds Encrypter, a browser-only tool for encrypting text without servers, logins, or tracking—offering a simple, secure way to share secrets. Check more stories related to cybersecu…
…
continue reading
1
Securing Kafka for PCI DSS Compliance: A Practical Guide for Financial Data Pipelines
10:31
10:31
Play later
Play later
Lists
Like
Liked
10:31This story was originally published on HackerNoon at: https://hackernoon.com/securing-kafka-for-pci-dss-compliance-a-practical-guide-for-financial-data-pipelines. comprehensive guide on aligning Kafka security with PCI DSS requirements, covering topics like Encryption, authentication and access Control, Auditing and monit Check more stories related…
…
continue reading
1
Cybercrime Wire For Dec. 9, 2025. Network Intrusion At Large U.S. Hospice Chain. WCYB Digital Radio.
1:29
1:29
Play later
Play later
Lists
Like
Liked
1:29The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Cybercrime News For Dec. 9, 2025. North Chicago Schools Reopen After Cyberattack. WCYB Digital Radio
2:39
2:39
Play later
Play later
Lists
Like
Liked
2:39The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading
1
Sailors First: Inside CNO's Ideal Navy Vision
25:15
25:15
Play later
Play later
Lists
Like
Liked
25:15In his first long-form interview as CNO, Adm. Daryl Caudle says Navy success hinges less on a headline ship count and more on readiness, capability, and sustainability. He prioritizes protecting sea lanes, integrating with allies, and the right mix of crewed and unmanned systems. “Sailors First” means ending afloat living, improving quality-of-life…
…
continue reading
1
12.9.25 | Icons in menus, AI progress steady, IBM acquires Confluent
12:22
12:22
Play later
Play later
Lists
Like
Liked
12:22This is a recap of the top 10 posts on Hacker News on Dec 9, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:20) - Icons in Menus Everywhere – Send Help (01:28) - Horses: AI progress is steady. Human equivalence is sudden (02:44) - IBM to acquire Confluent (03:54) - Microsoft increa…
…
continue reading
1
Episode 229: Why Most Cybersecurity Advice Is Wrong
46:51
46:51
Play later
Play later
Lists
Like
Liked
46:51How do you stay safe online? (Wrong answers only.) Avoid public Wi-Fi, QR codes, charging stations. Cyber OG Bob Lord (Yahoo, DNC, CISA) wrote an open letter tackling the real harm caused by bad advice, and offering a better path with proven practices to stay safe online. Check out https://www.hacklore.org/letter Learn more about your ad choices. V…
…
continue reading
1
#90: The Discord Breach – Could it Happen to You?
24:17
24:17
Play later
Play later
Lists
Like
Liked
24:17Complyance CEO Richa Kaul discusses how third parties can expose sensitive data (passports, IDs) and provides actionable steps to prevent loss and protect revenue.By Extra Something Media
…
continue reading
1
How Quantum Computers Threaten Bitcoin and the Entire Internet: Simply Explained
17:43
17:43
Play later
Play later
Lists
Like
Liked
17:43This story was originally published on HackerNoon at: https://hackernoon.com/how-quantum-computers-threaten-bitcoin-and-the-entire-internet-simply-explained. Learn how Shor's Algorithm breaks RSA, ECC, and Bitcoin. Understand the 'Decrypt Later' threat and the urgent global race for Post-Quantum Cryptography (PQC). Check more stories related to cyb…
…
continue reading
1
Power Without Stealth: Should America Flex In Cyberspace Or Starve Cartels Online
1:13:48
1:13:48
Play later
Play later
Lists
Like
Liked
1:13:48Send us a text We trace Jake’s unlikely route from journalism to the White House, how DEF CON’s Voting Village began, and why imposter syndrome can be a secret advantage when paired with relentless learning. Then we pull apart cyber strategy, Stuxnet’s signal value, and a plan to choke fentanyl through targeted offensive operations against cartels’…
…
continue reading
1
Cybercrime Wire For Dec. 8, 2025. Cyberattack Hits Major Russian Logistics Firm. WCYB Digital Radio.
1:34
1:34
Play later
Play later
Lists
Like
Liked
1:34The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
12.8.25 | Google Titans architecture enhances AI memory, failed attempt to recreate 1996 Space Jam website, dollar-stores overcharge despite low price promises
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55This is a recap of the top 10 posts on Hacker News on Dec 8, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:21) - Google Titans architecture, helping AI have long-term memory (01:33) - I failed to recreate the 1996 Space Jam website with Claude (02:46) - Dollar-stores overcharge cu…
…
continue reading
1
DevelopmentTools May Allow Remote Compromise
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08Explosive React Vulnerability and AI Tool Flaws Uncovered: Major Implications for Cybersecurity In this episode of Cybersecurity Today, host David Shipley discusses a new significant React vulnerability, React2Shell, that has caused widespread confusion and debate in the security community. This major flaw, affecting a widely used web framework, po…
…
continue reading
1
Safeguarding Your Privacy: How to Delete Your Data
1:00:26
1:00:26
Play later
Play later
Lists
Like
Liked
1:00:26Question? Text our Studio direct. David Mauro interviews Merry Marwig, a data privacy advocate, and Jeff Jockisch, founder of Obscure IQ, about how data brokers work and how to delete your data by discussing the intersection of privacy and personal data. They discuss the role of data brokers, the lack of transparency in data collection, and the pot…
…
continue reading
1
12.7.25 | GrapheneOS offers complete security patches, Tiny Core Linux is a 23 MB graphical distro, LLMs utilized at Oxide
11:54
11:54
Play later
Play later
Lists
Like
Liked
11:54This is a recap of the top 10 posts on Hacker News on Dec 7, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:16) - GrapheneOS is the only Android OS providing full security patches (01:29) - Tiny Core Linux: a 23 MB Linux distro with graphical desktop (02:38) - Using LLMs at Oxide (…
…
continue reading
1
$14.6 Million in RWA Hacks This Year Reveals the Gap Between Tokenization Hype and Reality
10:18
10:18
Play later
Play later
Lists
Like
Liked
10:18This story was originally published on HackerNoon at: https://hackernoon.com/$146-million-in-rwa-hacks-this-year-reveals-the-gap-between-tokenization-hype-and-reality. RWA tokenization hit $35.68B in 2025, but $14.6M in hacks exposed security gaps. Can the industry scale to $2 trillion by 2028 amid regulatory fragmentation? Check more stories relat…
…
continue reading
1
The Invisible Breach: How AI Is Quietly Creating New Security Blind Spots in Modern Tech
10:46
10:46
Play later
Play later
Lists
Like
Liked
10:46This story was originally published on HackerNoon at: https://hackernoon.com/the-invisible-breach-how-ai-is-quietly-creating-new-security-blind-spots-in-modern-tech. We're watching organizations introduce sophisticated machine learning systems to reduce risk, only to discover its creating entirely new categories of risk. Check more stories related …
…
continue reading
1
12.6.25 | Netflix acquires Warner Bros, Cloudflare outage December 5, 2025, Gemini 3 Pro advances vision AI
11:34
11:34
Play later
Play later
Lists
Like
Liked
11:34This is a recap of the top 10 posts on Hacker News on Dec 6, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:16) - Netflix to Acquire Warner Bros (01:18) - Cloudflare outage on December 5, 2025 (02:29) - Gemini 3 Pro: the frontier of vision AI (03:38) - Self-hosting my photos with I…
…
continue reading
1
Cybercrime Wire For Dec. 6-7, 2025. Weekend Update. WCYB Digital Radio.
1:08
1:08
Play later
Play later
Lists
Like
Liked
1:08The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Cybersecurity Today Month In Review - December 5th, 2025
54:06
54:06
Play later
Play later
Lists
Like
Liked
54:06Cybersecurity Today: The Rise of Living Off the Land Strategies & More In this episode of Cybersecurity Today's Month in Review, host Jim Love is joined by Laura Payne from White Tuque and David Shipley from Beauceron Security. They discuss several pressing cybersecurity issues, including the growing threat of 'living off the land' strategies where…
…
continue reading
1
Ransomware Minute. Rochester Philharmonic Orchestra Hit By Hack. Scott Schober, WCYB Digital Radio
3:25
3:25
Play later
Play later
Lists
Like
Liked
3:25The Ransomware Minute is a rundown of the latest ransomware attacks & news, brought to you Cybercrime Magazine, Page ONE for Cybersecurity. Listen to the podcast weekly and read it daily at https://ransomwareminute.com. For more on cybersecurity, visit us at https://cybercrimemagazine.com.By Cybercrime Magazine
…
continue reading
1
#363 - Tyler Oliveira goes NUCLEAR on Secrets of the Elites, Epstein Files & Mass Immigration
3:13:02
3:13:02
Play later
Play later
Lists
Like
Liked
3:13:02SPONSORS: 1) AMENTARA: Go to https://www.amentara.com/go/julian and use code JD22 for 22% off your first order! 2) MOOD: Discover your perfect mood and get 20% off your first order at http://mood.com and use code JULIAN at check out! 3) HOLLOW SOCKS: For a limited time Hollow Socks is having a Buy 2, Get 2 Free Sale. Head to http://Hollowsocks.com …
…
continue reading
1
Cyber Social. Ethical Hacking: Coolest Job You've Never Heard Of? Taylor Fox, Cybercrime Magazine.
3:00
3:00
Play later
Play later
Lists
Like
Liked
3:00An article from Bolde.com titled “15 Coolest Jobs You’ve Probably Never Heard Of" named ethical hacking as number one. In this episode, Taylor Fox, Media Coordinator at Cybercrime Magazine and manager of our social media accounts, joins host Amanda Glassner to discuss why we shared this article on Instagram, alongside some of the fun and interestin…
…
continue reading
1
CTRL, ALT, HACKED. Online 'Greggy's Cult' Targeting Kids Via Gaming Platforms. Russia Bans Roblox.
16:28
16:28
Play later
Play later
Lists
Like
Liked
16:28According to the New York Post, a twisted online cult, dubbed 'Greggy's Cult,' terrorized and blackmailed children on gaming platforms into performing illicit acts on camera. In this episode, host Paul John Spaulding, Kyle Haglund, VP, Audio Engineering at Cybercrime Magazine, and Sam White, Video Producer at Cybercrime Magazine, discuss this story…
…
continue reading
This story was originally published on HackerNoon at: https://hackernoon.com/how-request-response-really-works. Learn how the request–response model really works under the hood. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecurity. You can also check exclusive content about #network, #request-response-model, #reque…
…
continue reading
1
Taking Control Of Software Supply Chains in the Open Source Era
7:02
7:02
Play later
Play later
Lists
Like
Liked
7:02This story was originally published on HackerNoon at: https://hackernoon.com/taking-control-of-software-supply-chains-in-the-open-source-era. Understanding how these recent npm attacks unfolded will help signal a way forward for a more secure software supply chain. Check more stories related to cybersecurity at: https://hackernoon.com/c/cybersecuri…
…
continue reading
1
Cybercrime Wire For Dec. 5, 2025. Ransomware Incident Reported By Spectra Logic. WCYB Digital Radio.
1:27
1:27
Play later
Play later
Lists
Like
Liked
1:27The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we’re following. If there’s a cyberattack, hack, or data breach you should know about, then we’re on it. Listen to the podcast daily and hear it every hour on WCYB. The …
…
continue reading
1
Cybercrime News For Dec. 5, 2025. Minnesota Residents Hit by Ransomware. WCYB Digital Radio.
2:46
2:46
Play later
Play later
Lists
Like
Liked
2:46The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. List…
…
continue reading