Podcasts about hackers

Computing term

  • 9,970PODCASTS
  • 29,106EPISODES
  • 43mAVG DURATION
  • 6DAILY NEW EPISODES
  • Nov 6, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories




    Best podcasts about hackers

    Show all podcasts related to hackers

    Latest podcast episodes about hackers

    Haunted American History
    The Birmingham Axe Murders

    Haunted American History

    Play Episode Listen Later Nov 6, 2025 22:50


    In the 1920s, Birmingham was known as “The Magic City.”Steel, smoke, opportunity—and something much darker.It began in a small corner store.Then another.And another.Grocers were attacked in the dead of night. Families were slaughtered in their beds.The weapon was simple. Primitive. Personal.An axe.For four years, fear ruled the streets. Doors were barricaded. Neighborhoods formed militias. The police were desperate enough to consult Ouija boards… and corrupt enough to let the Ku Klux Klan lead the investigation.Newspapers blamed a shadowy killer they called “Henry the Hacker.”But the truth was far more terrifying.This wasn't the story of one monster.It was the story of a city full of them. LINKS FOR MY DEBUT NOVEL, THE FORGOTTEN BOROUGHwww.hauntedamericanhistory.comBarnes and Noble -   https://www.barnesandnoble.com/w/the-forgotten-borough-christopher-feinstein/1148274794?ean=9798319693334AMAZON: https://www.amazon.com/dp/B0FQPQD68SEbookGOOGLE: https://play.google.com/store/books/details?id=S5WCEQAAQBAJ&pli=1KOBO: https://www.kobo.com/us/en/ebook/the-forgotten-borough-2?sId=a10cf8af-5fbd-475e-97c4-76966ec87994&ssId=DX3jihH_5_2bUeP1xoje_SMASHWORD: https://www.smashwords.com/books/view/1853316 !! DISTURB ME !! APPLE - https://podcasts.apple.com/us/podcast/disturb-me/id1841532090SPOTIFY - https://open.spotify.com/show/3eFv2CKKGwdQa3X2CkwkZ5?si=faOUZ54fT_KG-BaZOBiTiQYOUTUBE - https://www.youtube.com/@DisturbMePodcastwww.disturbmepodcast.com YOUTUBE⁠⁠⁠⁠https://www.youtube.com/@hauntedchris⁠⁠⁠⁠⁠⁠ TikTok- @hauntedchris LEAVE A VOICEMAIL - 609-891-8658 Patreon- ⁠⁠⁠⁠⁠⁠https://www.patreon.com/hauntedamericanhistory⁠⁠⁠⁠⁠⁠Twitter- @Haunted_A_HInstagram- haunted_american_historyemail- hauntedamericanhistory@gmail.com    Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    1010XL Jax Sports Radio
    Hacker After Dark 11-5-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Nov 6, 2025 84:51


    Hacker After Dark 11-5-25 by 1010 XL Jax Sports Radio

    1010XL Jax Sports Radio
    Hacker After Dark 11-4-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Nov 5, 2025 83:04


    Hacker After Dark 11-4-25 by 1010 XL Jax Sports Radio

    Decipher Security Podcast
    Yahoo's Sean Zadig on How to Raise a Hacker Safely and How Maybe AI Isn't Changing Everything

    Decipher Security Podcast

    Play Episode Listen Later Nov 5, 2025 51:29


    Yahoo CISO and Chief Paranoid Sean Zadig returns to the podcast for a discussion with Dennis Fisher  about how to go about getting kids interested in technology and teaching them about hacking (in the broad, classical sense) safely (9:10). Then they talk about how rapidly the cybersecurity industry is changing and what effects AI is and is not having on offense, defense, and the job market (45:00).Support the show

    The CyberWire
    A storm brews behind the firewall.

    The CyberWire

    Play Episode Listen Later Nov 4, 2025 25:02


    China-Linked hackers target Cisco firewalls. MIT Sloan withdraws controversial “AI-Driven Ransomware” paper. A new study questions the value of cybersecurity training. Hackers exploit OpenAI's API as a malware command channel. Apple patches over 100 Security flaws across devices. A Florida-based operator of mental health and addiction treatment centers exposes sensitive patient information. OPM plans a “mass deferment” for Cybercorps scholars affected by the government shutdown. Lawmakers urge the FTC to investigate Flock Safety's cybersecurity gaps. Cybercriminals team with organized crime for high-tech cargo thefts. Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE's controversial facial scanning initiative. A priceless theft meets a worthless password.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest We are joined by Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies discussing ICE's controversial facial scanning initiative. You can read more about Ben's topic from 404 Media: You Can't Refuse To Be Scanned by ICE's Facial Recognition App, DHS Document Says. Selected Reading China-Linked Hackers Target Cisco Firewalls in Global Campaign (Hackread) MIT Sloan shelves paper about AI-driven ransomware (The Register) CyberSlop — meet the new threat actor, MIT and Safe Security (DoublePulsar) Study concludes cybersecurity training doesn't work (KPBS Public Media) Microsoft: OpenAI API moonlights as malware HQ (The Register) Apple Patches 19 WebKit Vulnerabilities (SecurityWeek) Data Theft Hits Behavioral Health Network in 3 States (Bank Infosecurity) OPM plans to give CyberCorps members more time to find jobs after shutdown ends (CyberScoop) Lawmakers ask FTC to probe Flock Safety's cybersecurity practices (The Record) Cybercriminals, OCGs team up on lucrative cargo thefts (The Register) Louvre Robbery: Security Flaws: The (Obviously) Password Was "Louvre" (L'Unione Sarda) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

    TechLinked
    "Update and Shut Down" bug fixed, AMD GPU followup, Google pulls Gemma + more!

    TechLinked

    Play Episode Listen Later Nov 4, 2025 10:25


    Timestamps: 0:00 i still don't believe this is real 0:13 Microsoft fixes “Update and Shut Down” bug 1:44 AMD clarifies RDNA 1, 2 driver situation 3:01 Google pulls Gemma from AI Studio 4:28 DeleteMe! 4:59 QUICK BITS INTRO 5:07 Apple launches App Store for the Web 5:47 Hackers, Crime rings work together 6:38 Snapmaker 3D U1 Printer on sale 7:21 SpaceX, Besxar to make chips in orbit 8:22 ‘Sunlight on Demand' NEWS SOURCES: https://lmg.gg/3BPEq Learn more about your ad choices. Visit megaphone.fm/adchoices

    1010XL Jax Sports Radio
    Hacker After Dark 11-3-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Nov 4, 2025 85:46


    Hacker After Dark 11-3-25 by 1010 XL Jax Sports Radio

    Hacker News Recap
    November 3rd, 2025 | Tiny electric motor can produce more than 1,000 horsepower

    Hacker News Recap

    Play Episode Listen Later Nov 4, 2025 14:48


    This is a recap of the top 10 posts on Hacker News on November 03, 2025. This podcast was generated by wondercraft.ai (00:30): Tiny electric motor can produce more than 1,000 horsepowerOriginal post: https://news.ycombinator.com/item?id=45797242&utm_source=wondercraft_ai(01:54): Simple trick to increase coverage: Lying to users about signal strengthOriginal post: https://news.ycombinator.com/item?id=45795036&utm_source=wondercraft_ai(03:18): Why Nextcloud feels slow to useOriginal post: https://news.ycombinator.com/item?id=45798681&utm_source=wondercraft_ai(04:43): Google suspended my company's Google cloud account for the third timeOriginal post: https://news.ycombinator.com/item?id=45798827&utm_source=wondercraft_ai(06:07): Ask HN: Who is hiring? (November 2025)Original post: https://news.ycombinator.com/item?id=45800465&utm_source=wondercraft_ai(07:31): The Case Against PGVectorOriginal post: https://news.ycombinator.com/item?id=45798479&utm_source=wondercraft_ai(08:56): > Htmx – The Fetch()eningOriginal post: https://news.ycombinator.com/item?id=45803358&utm_source=wondercraft_ai(10:20): Learning to read Arthur Whitney's C to become smart (2024)Original post: https://news.ycombinator.com/item?id=45800777&utm_source=wondercraft_ai(11:45): First recording of a dying human brain shows waves similar to memory flashbacks (2022)Original post: https://news.ycombinator.com/item?id=45796421&utm_source=wondercraft_ai(13:09): AI's Dial-Up EraOriginal post: https://news.ycombinator.com/item?id=45804377&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai

    The CyberWire
    FCC resets cyber oversight.

    The CyberWire

    Play Episode Listen Later Nov 3, 2025 26:02


    The FCC plans to roll back cybersecurity mandates that followed Salt Typhoon. The alleged cybercriminal MrICQ has been extradited to the U.S. Ransomware negotiators are accused of conducting ransomware attacks. Ernst & Young accidentally exposed a 4-terabyte SQL Server backup. A hacker claims responsibility for last week's University of Pennsylvania breach. The UK chronicles cyberattacks on Britain's drinking water suppliers. Monday business brief. Our guest is Caleb Tolin, host of Rubrik's Data Security Decoded podcast. Hackers massage the truth.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Caleb Tolin, host of Rubrik's Data Security Decoded podcast, as he is introducing himself and his show joining the N2K CyberWire network. You can catch new episodes of Data Security Decoded the first and third Tuesdays of each month on your favorite podcast app. Selected Reading FCC plans vote to remove cyber regulations installed after theft of Trump info from telecoms (The Record) Alleged Jabber Zeus Coder ‘MrICQ' in U.S. Custody (Krebs on Security) Chicago firm that resolves ransomware attacks had rogue workers carrying out their own hacks, FBI says (Chicago Sun Times) Ernst & Young cloud misconfiguration leaks 4TB SQL Server backup on Microsoft Azure (Beyond Machines) Penn hacker claims to have stolen 1.2 million donor records in data breach (Bleeping Computer) Hackers are attacking Britain's drinking water suppliers (The Record) JumpCloud acquires Breez. Chainguard secures $280 million in growth financing. Sublime Security closes $150 million Series C round. (N2K Pro) Hackers steal data, extort $350,000 from massage parlor clients (Korea JoongAng Daily) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

    TRENDIFIER with Julian Dorey
    #351 - DARPA Data Hacker: “I Tracked Elite's Phones to Epstein Island in 2016!” | Mike Yeagley

    TRENDIFIER with Julian Dorey

    Play Episode Listen Later Nov 3, 2025 175:54


    SPONSORS: 1) FUM: Head to https://www.tryfum.com/JULIAN and use promo code JULIAN to get your free gift with purchase and start the Good Habit today! 2) BUBS NATURALS: Live better for longer w/ BUBS Naturals. For a limited time, get 20% Off your entire order w/ code JULIAN at https://Bubsnaturals.com WATCH THE PREVIOUS MIKE YEAGLEY EPISODE HERE: https://youtu.be/UIB2T0g8wpE PATREON: https://www.patreon.com/JulianDorey (***TIMESTAMPS in description below) ~ Mike Yeagley is a data strategist, defense contractor, and one of the early architects of ADINT — Advertising Intelligence. He's known for showing U.S. intelligence how ad-tech location data, the same data used for marketing and mobile tracking, could expose troop movements, covert facilities, and even Vladimir Putin's entourage. Yeagley's work bridges big data, national security, and digital surveillance, redefining how modern governments harvest information in the name of protection — and control. FOLLOW JULIAN DOREY INSTAGRAM (Podcast): https://www.instagram.com/juliandoreypodcast/ INSTAGRAM (Personal): https://www.instagram.com/julianddorey/ X: https://twitter.com/julianddorey JULIAN YT CHANNELS - SUBSCRIBE to Julian Dorey Clips YT: https://www.youtube.com/@juliandoreyclips - SUBSCRIBE to Julian Dorey Daily YT: https://www.youtube.com/@JulianDoreyDaily - SUBSCRIBE to Best of JDP: https://www.youtube.com/@bestofJDP ****TIMESTAMPS**** 00:00 – Intro 01:37 – The Epstein Data Map Exposed 15:59 – Epstein Ohio Ties & Island Witnesses 25:57 – Three Presidents, One Silent DOJ 37:00 – Lost Evidence & Epstein Broken Justice 56:47 – DNA, Data & Civil Collapse 01:18:00 – The Epstein Call That Never Came 01:29:43 – Epstein Power, Secrecy & Hidden Fortunes 01:52:15 – DARPA, Bannon & Surveillance State 02:24:53 – Tech Giants & Modern Espionage 02:36:47 – Palantir, Prediction & Global Control 02:49:15 – Mike's work CREDITS: - Host, Editor & Producer: Julian Dorey - COO, Producer & Editor: Alessi Allaman - https://www.youtube.com/@UCyLKzv5fKxGmVQg3cMJJzyQ - In-Studio Producer: Joey Deef - https://www.instagram.com/joeydeef/ Julian Dorey Podcast Episode 351 - Mike Yeagley Learn more about your ad choices. Visit podcastchoices.com/adchoices

    Consumer Tech Update
    Pay up or get exposed

    Consumer Tech Update

    Play Episode Listen Later Nov 3, 2025 6:45


    Ransomware is dead, blackmail is next. Hackers have changed the rules of the game. Here's what you need to stay on top of. Learn more about your ad choices. Visit megaphone.fm/adchoices

    Hacker News Recap
    November 2nd, 2025 | Linux gamers on Steam cross over the 3% mark

    Hacker News Recap

    Play Episode Listen Later Nov 3, 2025 14:21


    This is a recap of the top 10 posts on Hacker News on November 02, 2025. This podcast was generated by wondercraft.ai (00:30): Linux gamers on Steam cross over the 3% markOriginal post: https://news.ycombinator.com/item?id=45792503&utm_source=wondercraft_ai(01:51): How I use every Claude Code featureOriginal post: https://news.ycombinator.com/item?id=45786738&utm_source=wondercraft_ai(03:13): Facts about throwing good partiesOriginal post: https://news.ycombinator.com/item?id=45794032&utm_source=wondercraft_ai(04:35): URLs are state containersOriginal post: https://news.ycombinator.com/item?id=45789474&utm_source=wondercraft_ai(05:56): Notes by djb on using Fil-COriginal post: https://news.ycombinator.com/item?id=45788040&utm_source=wondercraft_ai(07:18): Backpropagation is a leaky abstraction (2016)Original post: https://news.ycombinator.com/item?id=45787993&utm_source=wondercraft_ai(08:40): Anti-cybercrime laws are being weaponized to repress journalismOriginal post: https://news.ycombinator.com/item?id=45792209&utm_source=wondercraft_ai(10:01): Tongyi DeepResearch – open-source 30B MoE Model that rivals OpenAI DeepResearchOriginal post: https://news.ycombinator.com/item?id=45789602&utm_source=wondercraft_ai(11:23): Using FreeBSD to make self-hosting fun againOriginal post: https://news.ycombinator.com/item?id=45789424&utm_source=wondercraft_ai(12:45): Paris had a moving sidewalk in 1900, and a Thomas Edison film captured it (2020)Original post: https://news.ycombinator.com/item?id=45793466&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai

    Hacker News Recap
    November 1st, 2025 | You can't refuse to be scanned by ICE's facial recognition app, DHS document say

    Hacker News Recap

    Play Episode Listen Later Nov 2, 2025 14:50


    This is a recap of the top 10 posts on Hacker News on November 01, 2025. This podcast was generated by wondercraft.ai (00:30): You can't refuse to be scanned by ICE's facial recognition app, DHS document sayOriginal post: https://news.ycombinator.com/item?id=45780228&utm_source=wondercraft_ai(01:54): Chat Control proposal fails again after public oppositionOriginal post: https://news.ycombinator.com/item?id=45783114&utm_source=wondercraft_ai(03:19): Updated practice for review articles and position papers in ArXiv CS categoryOriginal post: https://news.ycombinator.com/item?id=45782136&utm_source=wondercraft_ai(04:43): Hard Rust requirements from May onwardOriginal post: https://news.ycombinator.com/item?id=45779860&utm_source=wondercraft_ai(06:08): Visible from space, Sudan's bloodied sands expose a massacre of thousandsOriginal post: https://news.ycombinator.com/item?id=45783699&utm_source=wondercraft_ai(07:32): SQLite concurrency and why you should care about itOriginal post: https://news.ycombinator.com/item?id=45781298&utm_source=wondercraft_ai(08:57): GHC now runs in the browserOriginal post: https://news.ycombinator.com/item?id=45782981&utm_source=wondercraft_ai(10:21): Show HN: Why write code if the LLM can just do the thing? (web app experiment)Original post: https://news.ycombinator.com/item?id=45783640&utm_source=wondercraft_ai(11:46): Claude Code can debug low-level cryptographyOriginal post: https://news.ycombinator.com/item?id=45784179&utm_source=wondercraft_ai(13:10): Visopsys: OS maintained by a single developer since 1997Original post: https://news.ycombinator.com/item?id=45785858&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai

    1010XL Jax Sports Radio
    Hacker After Dark 10-31-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Nov 1, 2025 82:28


    Hacker After Dark 10-31-25 by 1010 XL Jax Sports Radio

    Hacker News Recap
    October 31st, 2025 | Attention lapses due to sleep deprivation due to flushing fluid from brain

    Hacker News Recap

    Play Episode Listen Later Nov 1, 2025 14:40


    This is a recap of the top 10 posts on Hacker News on October 31, 2025. This podcast was generated by wondercraft.ai (00:30): Attention lapses due to sleep deprivation due to flushing fluid from brainOriginal post: https://news.ycombinator.com/item?id=45771636&utm_source=wondercraft_ai(01:53): John Carmack on mutable variablesOriginal post: https://news.ycombinator.com/item?id=45767725&utm_source=wondercraft_ai(03:17): How OpenAI uses complex and circular deals to fuel its multibillion-dollar riseOriginal post: https://news.ycombinator.com/item?id=45771538&utm_source=wondercraft_ai(04:40): Futurelock: A subtle risk in async RustOriginal post: https://news.ycombinator.com/item?id=45774086&utm_source=wondercraft_ai(06:04): AMD could enter ARM market with Sound Wave APU built on TSMC 3nm processOriginal post: https://news.ycombinator.com/item?id=45767916&utm_source=wondercraft_ai(07:27): Ask HN: Who uses open LLMs and coding assistants locally? Share setup and laptopOriginal post: https://news.ycombinator.com/item?id=45771870&utm_source=wondercraft_ai(08:51): Show HN: Strange AttractorsOriginal post: https://news.ycombinator.com/item?id=45777810&utm_source=wondercraft_ai(10:14): Just use a buttonOriginal post: https://news.ycombinator.com/item?id=45774182&utm_source=wondercraft_ai(11:38): Another European agency shifts off US Tech as digital sovereignty gains steamOriginal post: https://news.ycombinator.com/item?id=45773974&utm_source=wondercraft_ai(13:01): Addiction MarketsOriginal post: https://news.ycombinator.com/item?id=45774640&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai

    RCN Digital
    El hacker más buscado de Sudamérica, como darle un buen uso a la IA y los 50 de Bohemian Rhapsody'

    RCN Digital

    Play Episode Listen Later Nov 1, 2025 27:29 Transcription Available


    Open IA admite qie un millón de usuarios hablan sobre suicidio con el ChatGPT cada semana. Hablamos con un experto sobre el buen uso y el mal uso de la IA. 'Bohemian Rhapsody' cumple 50 años. El hacker más buscado de Sudamérica fue capturado. El documental de Ben Stiller: “Stiller y Meara: nada se ha perdido. Bon Jovi lanza “Living in Paradise” junto a Avril Lavigne.

    TRASHFUTURE
    *PREVIEW* Baby Billy's Bible Hackers ft. Josh Boerman

    TRASHFUTURE

    Play Episode Listen Later Oct 31, 2025 9:53


    Josh joins Hussein and Riley to talk about new developments in the realm of faith based AI, Grokipedia, and a ghoulish display outside Hussein's local estate agent. Get the whole episode on Patreon here! TF Merch is still available here! *MILO ALERT* Check out Milo's tour dates here: https://www.miloedwards.co.uk/liveshows Trashfuture are: Riley (@raaleh), Milo (@Milo_Edwards), Hussein (@HKesvani), Nate (@inthesedeserts), and November (@postoctobrist)

    Cybercrime Magazine Podcast
    Cybercrime Wire For Oct. 31, 2025. Hackers Infiltrate U.S. Telco Ribbon. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Oct 31, 2025 1:15


    The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

    Hacker News Recap
    October 30th, 2025 | Affinity Studio now free

    Hacker News Recap

    Play Episode Listen Later Oct 31, 2025 14:43


    This is a recap of the top 10 posts on Hacker News on October 30, 2025. This podcast was generated by wondercraft.ai (00:30): Affinity Studio now freeOriginal post: https://news.ycombinator.com/item?id=45761445&utm_source=wondercraft_ai(01:53): Free software scares normal peopleOriginal post: https://news.ycombinator.com/item?id=45760878&utm_source=wondercraft_ai(03:17): The ear does not do a Fourier transform (2024)Original post: https://news.ycombinator.com/item?id=45762259&utm_source=wondercraft_ai(04:41): US declines to join more than 70 countries in signing UN cybercrime treatyOriginal post: https://news.ycombinator.com/item?id=45760328&utm_source=wondercraft_ai(06:05): Ventoy: Create bootable USB drive for ISO/WIM/IMG/VHD(x)/EFI FilesOriginal post: https://news.ycombinator.com/item?id=45760340&utm_source=wondercraft_ai(07:29): A change of address led to our Wise accounts being shut downOriginal post: https://news.ycombinator.com/item?id=45766253&utm_source=wondercraft_ai(08:52): Denmark reportedly withdraws Chat Control proposal following controversyOriginal post: https://news.ycombinator.com/item?id=45765664&utm_source=wondercraft_ai(10:16): Falling panel prices lead to global solar boom, except for the USOriginal post: https://news.ycombinator.com/item?id=45761902&utm_source=wondercraft_ai(11:40): Language models are injective and hence invertibleOriginal post: https://news.ycombinator.com/item?id=45758093&utm_source=wondercraft_ai(13:04): NPM flooded with malicious packages downloaded more than 86k timesOriginal post: https://news.ycombinator.com/item?id=45755027&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai

    The Pulse
    Cybercrime and How Hackers Prey on Human Nature

    The Pulse

    Play Episode Listen Later Oct 30, 2025 54:43


    Cybercrime has been around for as long as computers have — but over the past 20 years, it's exploded into a global threat, with staggering financial, political, and even personal consequences. On this encore episode, we hear about the virus that ushered in the age of social engineering attacks, the history of cybercrime, and what led one man to become a hacker.

    Hacker Valley Studio
    How to See Your Organization Like a Hacker with Chris Dale

    Hacker Valley Studio

    Play Episode Listen Later Oct 30, 2025 25:18


    To defend like a human, you first have to think like a hacker. In this episode, Ron Eddings sits down with Chris Dale, Co-Founder and Chief Hacking Officer at River Security, to explore the human side of hacking, where curiosity, persistence, and vigilance meet defense. Chris shares how the traditional idea of penetration testing has evolved into a continuous journey of discovery, and why reconnaissance and storytelling are critical tools for modern defenders. From real-world breach stories to lessons on trust and responsibility, this episode reveals how thinking like a hacker, and acting like a human can transform the way we approach cybersecurity.   Impactful Moments 00:00 - Introduction 01:00 - The shocking discovery of 266,000 exposed systems 03:30 - Why even trusted systems can become attack points 05:00 - Meet Chris Dale: hacker, educator, and human defender 07:30 - The truth about pen testing and real-world attacks 10:00 - Mapping your digital footprint, what most companies miss 13:00 - How continuous vigilance changes everything 16:00 - The hacker mindset vs. compliance checklists 18:00 - When hacking helps: becoming a company's “criminal best friend” 21:00 - Storytime: hacking Sketchers and getting free shoes 24:00 - The journalist hack that exposed a bigger issue 28:00 - Building trust through transparency in cybersecurity 31:00 - Lessons from hacking, teaching, and staying human   Links: Connect with our Chris on LinkedIn: https://www.linkedin.com/in/chrisad/ Read the Tech Radar article here: https://www.techradar.com/pro/security/f5-breach-fallout-over-266-000-instances-exposed-to-remote-attacks Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/      

    Cybercrime Magazine Podcast
    Cybercrime Magazine Update: Passwords Uncovered In 180 Seconds. Ethical Hacker On Cybercrime Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Oct 30, 2025 2:13


    Brandyn Murtagh, a full-time bug bounty-hunter and ethical ‘White Hat' hacker, recently told Cybercrime Magazine about his exploits during an eye-opening podcast interview. In this episode, host Paul John Spaulding is joined by Steve Morgan, Founder of Cybersecurity Ventures and Editor-in-Chief at Cybercrime Magazine, to discuss. The Cybercrime Magazine Update airs weekly and covers the latest news, interviews, podcasts, reports, videos, and special productions from Cybercrime Magazine, published by Cybersecurity Ventures. For more on cybersecurity, visit us at https://cybersecurityventures.com

    Hacker News Recap
    October 29th, 2025 | Keep Android Open

    Hacker News Recap

    Play Episode Listen Later Oct 30, 2025 14:12


    This is a recap of the top 10 posts on Hacker News on October 29, 2025. This podcast was generated by wondercraft.ai (00:30): Keep Android OpenOriginal post: https://news.ycombinator.com/item?id=45742488&utm_source=wondercraft_ai(01:50): Uv is the best thing to happen to the Python ecosystem in a decadeOriginal post: https://news.ycombinator.com/item?id=45751400&utm_source=wondercraft_ai(03:11): Tell HN: Azure outageOriginal post: https://news.ycombinator.com/item?id=45748661&utm_source=wondercraft_ai(04:32): AWS to bare metal two years later: Answering your questions about leaving AWSOriginal post: https://news.ycombinator.com/item?id=45745281&utm_source=wondercraft_ai(05:52): Minecraft removing obfuscation in Java EditionOriginal post: https://news.ycombinator.com/item?id=45748879&utm_source=wondercraft_ai(07:13): YouTube is taking down videos on performing nonstandard Windows 11 installsOriginal post: https://news.ycombinator.com/item?id=45744503&utm_source=wondercraft_ai(08:34): Tips for stroke-surviving software engineersOriginal post: https://news.ycombinator.com/item?id=45742419&utm_source=wondercraft_ai(09:55): Who needs Graphviz when you can build it yourself?Original post: https://news.ycombinator.com/item?id=45742907&utm_source=wondercraft_ai(11:15): uBlock Origin Lite in Apple App StoreOriginal post: https://news.ycombinator.com/item?id=45742446&utm_source=wondercraft_ai(12:36): Kafka is Fast – I'll use PostgresOriginal post: https://news.ycombinator.com/item?id=45747018&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai

    Cyber Security Headlines
    LG Uplus confirms breach, Conduent attack impacts 10M+, hackers exploit tools against Ukraine

    Cyber Security Headlines

    Play Episode Listen Later Oct 30, 2025 7:08


    LG Uplus confirms cybersecurity incident 10 million+ impacted by Conduent breach Russian hackers exploit tools against Ukrainian targets Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Conveyor takes all that chaos and turns it into calm. AI fills in the questionnaires, your trust center is always ready, and sales cycles move without stalls. Breathe easier—check out Conveyor at www.conveyor.com.

    Spezialgelagerter Sonderpodcast
    SSP #155: Die drei ??? und die Silbermine (26)

    Spezialgelagerter Sonderpodcast

    Play Episode Listen Later Oct 30, 2025


    Tja, auch die Hacker kriegen uns nicht klein! Nach einem kleinen Cyberangriff auf den SSP sind wir nun zurück – in einer Zeit, in der das Internet noch keine Probleme machte. Heute besprechen wir den 26. Fall der Drei ??? aus Rocky Beach, geschrieben von M. V. Carey. Diesmal geht es nach New Mexico, wo die drei Detektive gemeinsam mit Allie Jamison im Fall der Silbermine ermitteln. Hört rein, was Olaf, Sebbo und Tom zu dieser Folge zu sagen haben – und freut euch auf das legendäre Quiz von Dr. Knick Knobel!

    1010XL Jax Sports Radio
    Hacker After Dark 10-29-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Oct 29, 2025 84:58


    Hacker After Dark 10-29-25 by 1010 XL Jax Sports Radio

    Cybercrime Magazine Podcast
    Cybercrime News For Oct. 29, 2025. Hackers Disrupt Russia's Food System. WCYB Digital Radio.

    Cybercrime Magazine Podcast

    Play Episode Listen Later Oct 29, 2025 3:02


    The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

    Hacker News Recap
    October 28th, 2025 | What we talk about when we talk about sideloading

    Hacker News Recap

    Play Episode Listen Later Oct 29, 2025 14:41


    This is a recap of the top 10 posts on Hacker News on October 28, 2025. This podcast was generated by wondercraft.ai (00:30): What we talk about when we talk about sideloadingOriginal post: https://news.ycombinator.com/item?id=45736479&utm_source=wondercraft_ai(01:53): Using AI to negotiate a $195k hospital bill down to $33kOriginal post: https://news.ycombinator.com/item?id=45734582&utm_source=wondercraft_ai(03:17): EuroLLM: LLM made in Europe built to support all 24 official EU languagesOriginal post: https://news.ycombinator.com/item?id=45733707&utm_source=wondercraft_ai(04:40): Washington Post editorials omit a key disclosure: Bezos' financial tiesOriginal post: https://news.ycombinator.com/item?id=45733197&utm_source=wondercraft_ai(06:04): Samsung makes ads on smart fridges official with upcoming software updateOriginal post: https://news.ycombinator.com/item?id=45737338&utm_source=wondercraft_ai(07:28): Austrian ministry kicks out Microsoft in favor of NextcloudOriginal post: https://news.ycombinator.com/item?id=45732485&utm_source=wondercraft_ai(08:51): The AirPods Pro 3 flight problemOriginal post: https://news.ycombinator.com/item?id=45733329&utm_source=wondercraft_ai(10:15): Amazon confirms 14,000 job losses in corporate divisionOriginal post: https://news.ycombinator.com/item?id=45731539&utm_source=wondercraft_ai(11:38): The next chapter of the Microsoft–OpenAI partnershipOriginal post: https://news.ycombinator.com/item?id=45732350&utm_source=wondercraft_ai(13:02): Nearly 90% of Windows Games Now Run on LinuxOriginal post: https://news.ycombinator.com/item?id=45736925&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai

    SECURE AF
    CAPTCHA Con: Hackers' Evolving ClickFix Malware Trap

    SECURE AF

    Play Episode Listen Later Oct 29, 2025 7:50


    Got a question or comment? Message us here!“I'm not a robot.”

    Autonomous IT
    Autonomous IT, Live! True Stories From the Hacker Underworld, E05

    Autonomous IT

    Play Episode Listen Later Oct 29, 2025 36:16


    In this episode of the Autonomous IT, host Landon Miles dives deep into the world of vulnerabilities, exploits, and the psychology behind cyberattacks. From the story of Log4j and its massive global impact to the difference between hackers and attackers, this episode explores how and why breaches happen—and what can be done to stop them.Joining Landon is Jason Kikta, Chief Technology Officer and Chief Information Security Officer at Automox, Marine Corps veteran, and former leader at U.S. Cyber Command. Together, they break down attacker motivations, how to recognize threat patterns, and why understanding your own network better than your adversaries is the key to effective defense.Key Takeaways:The five stages of a vulnerability: introduction, discovery, disclosure, exploitation, and patching.Why Log4j became one of the most devastating vulnerabilities in modern history.How to identify attacker types and motivations.The mindset and methodology of effective defense.Why “good IT starts with good security.”Whether you're a cybersecurity professional, IT leader, or just curious about how cyberattacks really work, this episode offers practical insights from the front lines of digital defense.

    On est fait pour s'entendre
    Ex-arnaqueur, il a démasqué le faux Brad Pitt et aide les victimes en ligne

    On est fait pour s'entendre

    Play Episode Listen Later Oct 29, 2025 24:08


    Ancien 'arn-hacker' repenti, Marwan Ouarab a choisi de mettre son talent au service du bien. Aujourd'hui, il traque les escrocs en ligne et aide les victimes à retrouver leur argent. L'un de ses faits d'armes ? Avoir démasqué le faux Brad Pitt qui soutirait de l'argent à une femme en se faisant passer pour l'acteur. Il raconte son incroyable parcours qui l'a mené à devenir "Hacker éthique". Intervient également : Damien Bancal, journaliste spécialiste des questions de cyber intelligence Hébergé par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.

    Valuetainment
    "Born Jean-Michel Trogneux?" - Brigitte Macron's Sex CHANGED On Tax Return By U.K. Hackers

    Valuetainment

    Play Episode Listen Later Oct 28, 2025 22:22


    Hackers allegedly changed Brigitte Macron's personal tax record to “Jean Michael” in a sexist smear campaign, fueling false rumors about her gender. Candace Owens amplified the story online, sparking debate and raising concerns about misinformation, fear-driven media, and the responsibility of public figures. We break down the French legal context, the challenges of proving claims in court, and the importance of fact-checking in today's viral news environment.

    The Successful Bookkeeper Podcast
    EP498: Ted Harrington - The Hacker Mindset: A Superpower For Business

    The Successful Bookkeeper Podcast

    Play Episode Listen Later Oct 28, 2025 40:13


    "I think that the hacker mindset is a superpower because what it does is it fosters independent thinking. And independent thinking enables a person to observe or discover overlooked pathways, overlooked opportunities, things that other people have missed." -Ted Harrington Ted Harrington, cybersecurity expert and author of Hackable: How To Do Application Security Right and his upcoming book Inner Hacker: A New Way Of Thinking, returns to talk about the hacker mindset and how it can transform both business and life. In this interview, you'll learn: The four traits of the hacker mindset How AI is shaping cyberattacks Ways to tap into your inner hacker To learn more about Ted, click here. Connect with him on LinkedIn. Check out his new book, Inner Hacker: A New Way Of Thinking here. Time Stamp 01:22 – Ted Harrington returns with his new book Inner Hacker 02:47 – Why thinking like a hacker is a superpower 09:17 – The four traits of the hacker mindset 12:39 – What holds people back from channeling their inner hacker 18:24 – How the book supports his business & clients 23:13 – AI's role in modern cyberattacks 29:20 – What's changing for small businesses & cybersecurity awareness 32:31 – Why hackers target small businesses 36:36 – Protecting yourself by knowing where you're vulnerable 37:45 – Ted's future plans & keynote speaking This episode is brought to you by our amazing friends at Hub Analytics! Imagine having all your financial data in one place, with real-time analytics and customized reports at your fingertips. Hub Analytics is a financial platform that streamlines bookkeeping operations, so you can focus on what really matters—delivering high-quality results for your clients. With Hub's easy-to-use tools, you'll save time, reduce errors, and gain deeper insights into your clients' financials! Ready to take your bookkeeping to the next level? Book a demo to learn more and start your FREE trial TODAY!

    1010XL Jax Sports Radio
    Hacker After Dark 10-27-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Oct 28, 2025 119:43


    Hacker After Dark 10-27-25 by 1010 XL Jax Sports Radio

    1010XL Jax Sports Radio
    Hacker After Dark 10-28-25

    1010XL Jax Sports Radio

    Play Episode Listen Later Oct 28, 2025 83:35


    Hacker After Dark 10-28-25 by 1010 XL Jax Sports Radio

    Pulse of the Practice
    Hackers Love Small Tax Firms: Why MFA Is Already Obsolete—and What Could Save You

    Pulse of the Practice

    Play Episode Listen Later Oct 28, 2025 27:49


    Episode description (120–180 words): Cybersecurity is no longer optional for tax and accounting firms. In this episode, hosts Mo Arbas and Paul Miller are joined by Steve Ferguson (Protection Plus) to break down what really keeps practices safe—and operating—when threats hit. They cover why small firms are prime targets, how phishing and AI‑driven scams fool even savvy teams, and why MFA alone isn't enough as zero trust becomes the new standard. Steve explains must‑have protections, including cyber insurance with breach response, plus the role of a written information security plan (WISP) required by FTC/IRS guidance. You'll hear real‑world stories—from kiosk‑seeded refund diversions to gift‑card cons—and practical steps for training staff, reducing liability, and responding fast to limit damage. If you handle client data, this conversation is your playbook for Cybersecurity Awareness Month and beyond.

    I'm Aware That I'm Rare: the phaware® podcast

    How TBX4Life Is Fueling a Global Collaboration LaRae Hacker never set out to become a rare disease advocate—but when her daughter's TBX4 diagnosis left her feeling helpless, she found power in connection. Discover how TBX4Life became her anchor in uncertainty and why she believes parent-led advocacy is the key to progress in rare disease research. Learn more about pulmonary hypertension trials at www.phaware.global/clinicaltrials. Follow us on social @phaware Engage for a cure: www.phaware.global/donate #phaware Share your story: info@phaware.com @TBX4_Life

    Hacker News Recap
    October 27th, 2025 | 10M people watched a YouTuber shim a lock; the lock company sued him – bad idea

    Hacker News Recap

    Play Episode Listen Later Oct 28, 2025 14:30


    This is a recap of the top 10 posts on Hacker News on October 27, 2025. This podcast was generated by wondercraft.ai (00:30): 10M people watched a YouTuber shim a lock; the lock company sued him – bad ideaOriginal post: https://news.ycombinator.com/item?id=45720376&utm_source=wondercraft_ai(01:52): It's insulting to read AI-generated blog postsOriginal post: https://news.ycombinator.com/item?id=45722069&utm_source=wondercraft_ai(03:15): PSF has withdrawn $1.5M proposal to US Government grant programOriginal post: https://news.ycombinator.com/item?id=45721904&utm_source=wondercraft_ai(04:37): Recall for LinuxOriginal post: https://news.ycombinator.com/item?id=45718231&utm_source=wondercraft_ai(06:00): Claude for ExcelOriginal post: https://news.ycombinator.com/item?id=45722639&utm_source=wondercraft_ai(07:22): Rust cross-platform GPUI componentsOriginal post: https://news.ycombinator.com/item?id=45719004&utm_source=wondercraft_ai(08:45): Tags to make HTML work like you expectOriginal post: https://news.ycombinator.com/item?id=45719140&utm_source=wondercraft_ai(10:07): What happened to running what you wanted on your own machine?Original post: https://news.ycombinator.com/item?id=45718665&utm_source=wondercraft_ai(11:30): How I turned Zig into my favorite language to write network programs inOriginal post: https://news.ycombinator.com/item?id=45716109&utm_source=wondercraft_ai(12:52): ICE Will Use AI to Surveil Social MediaOriginal post: https://news.ycombinator.com/item?id=45716296&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai

    Cyber Briefing
    October 28, 2025 - Cyber Briefing

    Cyber Briefing

    Play Episode Listen Later Oct 28, 2025 10:54


    If you like what you hear, please subscribe, leave us a review and tell a friend!

    Inspired Stewardship
    Episode 1587: Interview with Brian Tibbs About His Book The HACKER Method and The Unexpected Investor Community

    Inspired Stewardship

    Play Episode Listen Later Oct 27, 2025 41:02 Transcription Available


    In today's #podcast episode, I interview Brian Tibbs. I ask Brian about how he helps people build wealth through generosity. Brian shares how to focus on mindset first to build real wealth. I also ask Brian to share how his time spent overseas as a missionary helped form his viewpoints on money.   Show Notes and Resources.

    CANADALAND
    Vagrant Fugitive Hacker Warlord

    CANADALAND

    Play Episode Listen Later Oct 27, 2025 49:15


    The man known as Commander X helped orchestrate some of the most audacious cyber attacks in the world. Attacks against governments and corporations, even ranging as far as whaling ships, satellites, and the Pope.In the U.S. he was a wanted man. The charges against him could have brought decades behind bars. So how did he pull off hiding in plain sight, for years, at a coffee shop in downtown Toronto?Host: Jesse BrownCredits: Tristan Capacchione (Audio Editor & Technical Producer), Bruce Thorson (Senior Producer), max collins (Director of Audio), Jesse Brown (Editor and Publisher)Written and Presented by: Ian Thornton and Bruce ThorsonFact checking by Julian AbrahamAdditional music by Audio NetworkMore information:The Masked Avengers — The New YorkerThe Face of Anonymous — Sideways FilmsIan ThorntonSponsors: oxio: Head over to https://canadaland.oxio.ca and use code CANADALAND for your first month free! Douglas: Douglas is giving our listeners a FREE Sleep Bundle with each mattress purchase. Get the sheets, pillows, mattress and pillow protectors FREE with your Douglas purchase today. Visit https://douglas.ca/canadaland to claim this offer.BetterHelp: Visit https://BetterHelp.com/canadaland today to get 10% off your first month.Can't get enough Canadaland? Follow @Canadaland_Podcasts on Instagram for clips, announcements, explainers and more.It's crowdfunding month here at Canadaland! The next 30 people to sign up today will either receive a FREE Douglas mattress protector or one-year subscription to the Slumber Studios Podcast. Become a supporter at canadaland.com/join today. You'll get premium access to all our shows ad free, including early releases and bonus content. You'll also get our exclusive newsletter, discounts on merch at our store, tickets to our live and virtual events, and more than anything, you'll be a part of the solution to Canada's journalism crisis, you'll be keeping our work free and accessible to everybody.You can listen ad-free on Amazon Music—included with Prime. Hosted on Acast. See acast.com/privacy for more information.

    Hacker News Recap
    October 26th, 2025 | A worker fell into a nuclear reactor pool

    Hacker News Recap

    Play Episode Listen Later Oct 27, 2025 14:20


    This is a recap of the top 10 posts on Hacker News on October 26, 2025. This podcast was generated by wondercraft.ai (00:30): A worker fell into a nuclear reactor poolOriginal post: https://news.ycombinator.com/item?id=45708292&utm_source=wondercraft_ai(01:51): You already have a Git serverOriginal post: https://news.ycombinator.com/item?id=45710721&utm_source=wondercraft_ai(03:13): Advent of Code 2025: Number of puzzles reduce from 25 to 12 for the first timeOriginal post: https://news.ycombinator.com/item?id=45710006&utm_source=wondercraft_ai(04:34): Let's Help NetBSD Cross the Finish Line Before 2025 EndsOriginal post: https://news.ycombinator.com/item?id=45711279&utm_source=wondercraft_ai(05:56): Pico-Banana-400kOriginal post: https://news.ycombinator.com/item?id=45708524&utm_source=wondercraft_ai(07:17): I'm drowning in AI features I never asked for and I hate itOriginal post: https://news.ycombinator.com/item?id=45708066&utm_source=wondercraft_ai(08:39): Movie posters from Ghana in the 1980s and 90sOriginal post: https://news.ycombinator.com/item?id=45712807&utm_source=wondercraft_ai(10:00): AsbestosisOriginal post: https://news.ycombinator.com/item?id=45710065&utm_source=wondercraft_ai(11:22): What if tariffs?Original post: https://news.ycombinator.com/item?id=45710021&utm_source=wondercraft_ai(12:43): A definition of AGIOriginal post: https://news.ycombinator.com/item?id=45713959&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai

    Stories of our times
    The teenage hackers bringing British industry to its knees

    Stories of our times

    Play Episode Listen Later Oct 27, 2025 27:40


    The cyberattack which shut down Jaguar Land Rover for five weeks this summer, cost Britain nearly £2bn. It was just one of a series of attacks on big British businesses by teenage hackers who co-ordinate via the dark web. So who are they and how do we stop them? This podcast was brought to you thanks to the support of readers of The Times and The Sunday Times. Subscribe today: http://thetimes.com/thestoryGuests: Matilda Davies, data journalist at The Times and The Sunday Times andChris Stokel Walker, technology journalist. Host: Manveen Rana.Producer: Shabnam Grewal.Read more: Who are the hackers behind the Jaguar Land Rover cyberattack? , Jaguar Land Rover cyberattack nears £2bn in UK's costliest hackClips: BBC News, 5 News, ITV News, TALK TV, CHANNEL 4 News.Photo: Getty Images.Get in touch: thestory@thetimes.com Hosted on Acast. See acast.com/privacy for more information.

    Cyber Security Headlines
    Department of Know: Promoting passphrases, questioning international security conferences, gift card hackers

    Cyber Security Headlines

    Play Episode Listen Later Oct 27, 2025 34:00


    Link to episode page This week's edition of The Department of Know is hosted by Rich Stroffolino with guests Bil Harmer, operating partner and CISO, Craft Ventures, and Sasha Pereira, CISO, WASH Thanks to our show sponsor, ThreatLocker If security questionnaires make you feel like you're drowning in chaos, you're not alone. Endless spreadsheets, portals, and questions—always when you least expect them. Conveyor brings calm to the storm. With AI that auto-fills questionnaires and a trust center that shares all your docs in one place, you'll feel peace where there used to be panic. Find your security review zen at www.conveyor.com. All links and the video of this episode can be found on CISO Series.com

    Security Unfiltered
    Inside Offensive AI: From MCP Servers To Real Security Risks

    Security Unfiltered

    Play Episode Listen Later Oct 27, 2025 66:01 Transcription Available


    Send us a textSecurity gets sharper when we stop treating AI like magic and start treating it like an untrusted user. We sit down with Eric Galinkin to unpack the real-world ways red teams and defenders are using language models today, where they fall apart, and how to build guardrails that hold up under pressure. From MCP servers that look a lot like ordinary APIs to the messy truths of model hallucination, this conversation trades buzzwords for practical patterns you can apply right now.Eric shares takeaways from Offensive AI Con: how models help triage code and surface likely bug classes, why decomposed workflows beat “find all vulns” prompts, and what happens when toy benchmarks meet stubborn, real binaries. We explore reinforcement learning environments as a scalable way to train security behaviors without leaking sensitive data, and we grapple with the uncomfortable reality that jailbreaks aren't going away—so output validation, sandboxing, and principled boundaries must do the heavy lifting.We also dig into Garak, the open-source system security scanner that targets LLM-integrated apps where it hurts: prompted cross-site scripting, template injection in Jinja, and OS command execution. By mapping findings to CWE, Garak turns vague model “misbehavior” into concrete fixes tied to known controls. Along the way, we compare GPT, Claude, and Grok, talk through verification habits to counter confident nonsense, and zoom out on careers: cultivate niche depth, stay broadly literate, and keep your skepticism calibrated. If you've ever wondered how to harness AI without handing it the keys to prod, this one's for you.Enjoyed the episode? Follow, share with a teammate, and leave a quick review so more builders and defenders can find the show.Inspiring Tech Leaders - The Technology PodcastInterviews with Tech Leaders and insights on the latest emerging technology trends.Listen on: Apple Podcasts SpotifySupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.

    Hacker News Recap
    October 25th, 2025 | Meet the real screen addicts: the elderly

    Hacker News Recap

    Play Episode Listen Later Oct 26, 2025 14:36


    This is a recap of the top 10 posts on Hacker News on October 25, 2025. This podcast was generated by wondercraft.ai (00:30): Meet the real screen addicts: the elderlyOriginal post: https://news.ycombinator.com/item?id=45701305&utm_source=wondercraft_ai(01:53): React vs. Backbone in 2025Original post: https://news.ycombinator.com/item?id=45702558&utm_source=wondercraft_ai(03:16): I'm drowning in AI features I never asked for and I hate itOriginal post: https://news.ycombinator.com/item?id=45708066&utm_source=wondercraft_ai(04:39): A worker fell into a nuclear reactor poolOriginal post: https://news.ycombinator.com/item?id=45708292&utm_source=wondercraft_ai(06:02): California invests in battery energy storage, leaving rolling blackouts behindOriginal post: https://news.ycombinator.com/item?id=45706527&utm_source=wondercraft_ai(07:25): Key IOCs for Pegasus and Predator Spyware Removed with iOS 26 UpdateOriginal post: https://news.ycombinator.com/item?id=45700946&utm_source=wondercraft_ai(08:49): We do not have sufficient links to the UK for Online Safety Act to be applicableOriginal post: https://news.ycombinator.com/item?id=45705381&utm_source=wondercraft_ai(10:12): The Journey Before main()Original post: https://news.ycombinator.com/item?id=45706380&utm_source=wondercraft_ai(11:35): What is intelligence? (2024)Original post: https://news.ycombinator.com/item?id=45700663&utm_source=wondercraft_ai(12:58): Tell HN: OpenAI now requires ID verification and won't refund API creditsOriginal post: https://news.ycombinator.com/item?id=45702363&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai

    Cyber Security Today
    Navigating Cybersecurity in Small and Medium Businesses with White Hat Hacker Graham Berry

    Cyber Security Today

    Play Episode Listen Later Oct 25, 2025 41:10 Transcription Available


    In this episode of Cybersecurity Today, host Jim Love sits down with Graham Barrie a CISO and white hat hacker, to discuss the critical importance of cybersecurity for small and medium-sized businesses. From the moment Berry fell in love with technology through a Tandy TRS 80 to his current role helping businesses secure their data, this conversation covers the evolution of cybersecurity. They delve into how Berry assists businesses in understanding cybersecurity risks, communicating effectively with clients, and preparing for and recovering from cyber incidents. This episode is packed with insightful stories, practical advice, and a deep dive into the realities of cybersecurity for businesses of all sizes. 00:00 The Urgency of Cybersecurity 00:33 Introduction to the Podcast 01:00 Meet Graham Berry: A White Hat Hacker 01:31 Graham's Journey into Technology 04:04 From Technology to Cybersecurity 05:49 The Reality of Cyber Threats for Small Businesses 10:44 The Importance of Cyber Insurance 14:23 Engaging with Clients on Cybersecurity 17:08 Turning Around a Reluctant Client 20:10 The Growing Demand for Cyber Coverage 22:12 Third Party Risk Management 22:50 Effective Tabletop Exercises 23:58 Engaging Executives in Cybersecurity 26:43 Importance of Cyber Insurance 28:33 Successful Recovery Stories 34:16 Challenges with AI in Security 38:57 Looking Forward in Security 40:21 Conclusion and Farewell

    The CyberWire
    Hackers peek behind the nuclear curtain.

    The CyberWire

    Play Episode Listen Later Oct 22, 2025 23:56


    A foreign threat actor breached a key U.S. nuclear weapons manufacturing site. The cyberattack on Jaguar Land Rover is the most financially damaging cyber incident in UK history. A new report from Microsoft' warns that AI is reshaping cybersecurity at an unprecedented pace. The ToolShell vulnerability fuels Chinese cyber operations across four continents. Fake browser updates are spreading RansomHub, LockBit, and data-stealing malware. Hackers deface LA Metro bus stop displays. A Spyware developer is warned by Apple of a mercenary spyware attack. Pwn2Own payouts proceed. Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies on a Federal Whistle Blower from the SSA. When the cloud goes down, beds heat up.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Ben Yelin from University of Maryland Center for Cyber Health and Hazard Strategies on a Federal Whistle Blower from the SSA. If you enjoyed Ben's conversation, be sure to check out more from him over on the Caveat Podcast. 2025 Microsoft Digital Defense Report To learn more about the 2025 Microsoft Digital Defense Report, join our partners on The Microsoft Threat Intelligence Podcast. On today's episode, host Sherrod DeGrippo is joined by Chloé Messdaghi and Crane Hassold to unpack the key findings of the 2025 Microsoft Digital Defense Report; a comprehensive look at how the cyber threat landscape is accelerating through AI, automation, and industrialized criminal networks. You can listen to new episodes of The Microsoft Threat Intelligence Podcast every other Wednesday on your favorite podcast app. Selected Reading Foreign hackers breached a US nuclear weapons plant via SharePoint flaws (CSO Online) JLR hack is costliest cyber attack in UK history, say analysts (BBC) Microsoft 2025 digital defense report flags rising AI-driven threats, forces rethink of traditional defenses (Industrial Cyber) The New Frontlines of Cybersecurity: Lessons from the 2025 Digital Defense Report (The Microsoft Threat Intelligence Podcast)   Sharepoint ToolShell attacks targeted orgs across four continents (Bleeping Computer) SocGholish Malware Using Compromised Sites to gDeliver Ransomware (Hackread) LA Metro digital signs taken over by hackers (KTLA) Apple alerts exploit developer that his iPhone was targeted with government spyware (TechCrunch) Hackers Earn Over $520,000 on First Day of Pwn2Own Ireland 2025 (SecurityWeek) AWS crash causes $2,000 Smart Beds to overheat and get stuck upright (Dexerto) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices