Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Learn from the superstars turning content into cash! From social media influencers to small local businesses, people everywhere are harnessing the power of creative tools to design not just brands and content, but also deeply satisfying careers. In the Making explores the practical challenges and surprising rewards of working in this new creator economy. Join Adobe’s Teresa Au for conversations with content creators, solopreneurs, and industry experts who offer inspiration and insight for co ...
…
continue reading
1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Become the best software developer you can be
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Technical interviews about software topics.
…
continue reading
A podcast about web design and development.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Daily update on current cyber security threats
…
continue reading
On The Bike Shed, hosts Joël Quenneville and Stephanie Minn discuss development experiences and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
A podcast about modern UI development on the web. Hosted by Sam Selikoff and Ryan Toronto.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
se-radio@computer.org
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Join our weekly discussion about how to build top end Angular applications and become an Angular expert. Become a supporter of this podcast: https://www.spreaker.com/podcast/adventures-in-angular--6102018/support.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
Cascading Style Sheets (CSS) is the web’s core styling language. For web developers, It’s one of the quickest technologies to get started with, but one of the hardest to master. Follow Una Kravets and Adam Argyle, Developer Advocates from Google, who gleefully breakdown complex aspects of CSS into digestible episodes covering everything from accessibility to z-index.
…
continue reading
Agile Coaches' Corner shares practical concepts in an approachable way. It is for agile practitioners and business leaders seeking expert advice on improving the way they work to achieve their desired outcomes.
…
continue reading
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
…
continue reading
A place for elite leaders and teams.
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
Technical interviews about software topics.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
next generation web podcast
…
continue reading
A fortnightly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of recent security vulnerabilities and fixes as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
The State and Popular Culture
…
continue reading
Join 3 experienced Open Source professionals as they discuss the impact Linux has in their daily lives. Upbeat family-friendly banter, conversation and discussion for Linux enthusiasts and casual observers of all ages. A new episode every two weeks covering terminal productivity, desktop experience, development, gaming, hosting, hardware, community, cloud-native and all the Linux Matters that matter.
…
continue reading
Developers building a software business on our own terms.
…
continue reading
A podcast featuring panelists of engineers from Netflix, Twitch, & Atlassian talking over drinks about all things software engineering.
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
1
824: Taylor Otwell's opinions on PHP, React, Laravel and Lamborghini Memes
50:51
50:51
Play later
Play later
Lists
Like
Liked
50:51
In this episode of Syntax, Wes and Scott talk with Taylor Otwell, the creator of Laravel. Taylor shares insights on his journey from creating Laravel in his free time to building a strong community and user base. He discusses Laravel’s growth, including the major features and tools that were developed over the years. Taylor also shares his outlook …
…
continue reading
1
SE Radio 634: Jim Bugwadia on Kubernetes Policy as Code
1:02:22
1:02:22
Play later
Play later
Lists
Like
Liked
1:02:22
Jim Bugwadia, CEO of Nimrata and a committer to the kyverno projects, joins host Robert Blumen for a discussion of policy-as-code and the open source kyverno project. The discussion covers the nature of policies; policies and security; policies and compliance to standards; security scans that generate reports compared to tools that allow or deny op…
…
continue reading
1
Life as an Indie Developer with Joseph Finney
33:19
33:19
Play later
Play later
Lists
Like
Liked
33:19
By Scott Hanselman
…
continue reading
1
TanStack and TanRouter with Tanner Linsley
30:34
30:34
Play later
Play later
Lists
Like
Liked
30:34
Tanner Linsley, creator of TanStack and co-founder at Nozzle, dives into the evolution and philosophy behind TanStack, his work on TanRouter, and shares insights on the importance of type safety in routing within web development. Links https://x.com/tannerlinsley https://tannerlinsley.com https://www.youtube.com/tannerlinsley https://github.com/tan…
…
continue reading
1
Career Growth Comes From Finding Low Hanging Fruit in the Gaps
8:41
8:41
Play later
Play later
Lists
Like
Liked
8:41
Your career growth will be directly correlated to your ability to solve critical unsolved problems in the gaps of your organization's problems. Focus on finding the problems that have a high chance of success for you specifically - the low hanging fruit. 📮 Ask a Question If you enjoyed this episode and would like me to discuss a question that you h…
…
continue reading
1
The best, worst codebase (Interview)
1:24:14
1:24:14
Play later
Play later
Lists
Like
Liked
1:24:14
Jimmy Miller talks to us about his experience with a legacy codebase at his first job as a programmer. The codebase was massive, with hundreds of thousands of lines of C# and Visual Basic, and a database with over 1,000 columns. Let’s just say Jimmy got into some stuff. There’s even a Gilfoyle involved. This episode is all about his adventures whil…
…
continue reading
1
632: Adam Coster on Game Development and Crashlands 2
52:01
52:01
Play later
Play later
Lists
Like
Liked
52:01
Show Description Adam Coster talks with us about working with his family in game development, how they get started making games, what all is involved with publishing games, deciding to go Steam and Netflix only for Crashlands 2, how web tech is involved in game development, and the fun of testing and doing Q&A for games. Listen on Website → Guests …
…
continue reading
1
Ann Johnson: Trying to make the world safer. [Business Development] [Career Notes]
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17
Enjoy this special encore episode where we are joined by, Microsoft's Corporate Vice President of Cybersecurity Business Development Ann Johnson brings us on her career journey from aspiring lawyer to cybersecurity executive. After pivoting from studying law, Ann started working with computers and found she had a deep technical aptitude for technol…
…
continue reading
1
Episode 208 - Why most new developers struggle: The missing skills you need
49:52
49:52
Play later
Play later
Lists
Like
Liked
49:52
In this episode of Front End Happy Hour, Ryan Burgess, Jem Young, Brian Holt, and Dan DiGangi dive deep into the challenges faced by junior developers as they embark on their coding journeys. From the importance of curiosity and continuous learning to the often overlooked non-technical skills, our panelists discuss the common gaps that new develope…
…
continue reading
1
DOP 278: GUI versus Command Line in Development
32:04
32:04
Play later
Play later
Lists
Like
Liked
32:04
#278: In today's tech landscape, developers often find themselves caught in the middle of a debate that never seems to age: GUI or CLI? While the tools and interfaces we use may evolve, the core question remains. How do we balance the efficiency and familiarity of graphical user interfaces (GUIs) with the raw power and flexibility of command-line i…
…
continue reading
1
167. Mic Drop: TikTok’s day in Appeals Court
12:18
12:18
Play later
Play later
Lists
Like
Liked
12:18
TikTok’s lawyers were in a U.S. Court of Appeals this week trying to push back against a law that requires the popular video app to sell its American subsidiary to a non-Chinese owner or be banished from app stores. Alan Rozenshtein, an associate professor at the University of Minnesota, and expert in lawfare, explains what’s at stake.…
…
continue reading
1
INC targets healthcare, Providence schools cyberattack, Apple iPads bricked
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55
New INC ransomware targets U.S. healthcare sector Providence public schools deal with irregular internet activity Apple pulls iPadOS 18 update that was bricking M4 iPad Pro devices Thanks to today's episode sponsor, Conveyor It’s Friday and Conveyor hopes you don’t have a meaty security questionnaire waiting for you on the other side of this podcas…
…
continue reading
1
How to detect errors in AI-generated code
25:42
25:42
Play later
Play later
Lists
Like
Liked
25:42
Read the paper Gias coauthored about incorrectness in AI-generated code or explore more of his research. You can connect with Gias via his website. We previously covered research on Stack Overflow code snippets that Gias was involved in and spoke to his team about deriving sentiment from SO comments. Shoutout to Stack Overflow user Adhi Ardiansyah …
…
continue reading
1
Supply chain targets 3,000 users. Cyber Security Today for Friday, September 20, 2024
6:43
6:43
Play later
Play later
Lists
Like
Liked
6:43
Cybersecurity Today: Supply Chain Attacks, Data Breaches, and Botnet Threat Disruptions In this episode of 'Cybersecurity Today,' host Jim Love covers pressing issues in the cybersecurity world, including a supply chain attack in Lebanon, a major data breach at AT&T resulting in a $13 million fine, and the disruption of the Chinese botnet known as …
…
continue reading
Overview John and Maximé have been talking about Ubuntu’s AppArmor user namespacerestrictions at the the Linux Security Summit in Europe this past week, plus wecover some more details from the official announcement of permission promptingin Ubuntu 24.10, a new release of Intel TDX for Ubuntu 24.04 LTS and more. This week in Ubuntu Security Updates …
…
continue reading
1
ISC StormCast for Friday, September 20th, 2024
7:35
7:35
Play later
Play later
Lists
Like
Liked
7:35
Fake GitHub Site Targeting Developers https://isc.sans.edu/diary/Fake%20GitHub%20Site%20Targeting%20Developers/31282 Ivanti CSA 4.6 Advisory https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-CSA-4-6-Cloud-Services-Appliance-CVE-2024-8963?language=en_US German Police Deanonymizes Tor User https://blog.torproject.org/tor-is-still-safe/ Eve…
…
continue reading
1
My First Thoughts on New OpenAI Strawberry Model ( OpenAI o1-preview)
22:02
22:02
Play later
Play later
Lists
Like
Liked
22:02
Here are my first thoughts after using OpenAI's New Strawberry Model for a couple of hours Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in/danielmiessler See you in the nex…
…
continue reading
The US government disrupts China’s Raptor Train botnet. A phishing campaign abuses GitHub repositories to distribute malware.Ransomware group Vanilla Tempest targets U.S. healthcare providers.Hackers demand $6 million for stolen airport data. The FCC opens applications for a $200 million cybersecurity grant program. GreyNoise Intelligence tracks my…
…
continue reading
The Malaysian government’s misguided plan to control its citizens’ DNS, the wrong way to deploy underwater servers, a philosophical question about how long a person’s photos will exist, and how we manage our SSH keys. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes News/discussion Malaysia’s plan to block overse…
…
continue reading
1
Data Management at Capital One with Jim Lebonitte
28:59
28:59
Play later
Play later
Lists
Like
Liked
28:59
Data is at the center of many business decisions and advances today, including AI-driven capabilities. This requires companies to have well-governed data that is easy for users to find, use and understand. In moving to the cloud, Capital One modernized its data ecosystem and adopted a “You Build, Your Data” model to equip its data stakeholders with…
…
continue reading
1
Data Management at Capital One with Jim Lebonitte
28:59
28:59
Play later
Play later
Lists
Like
Liked
28:59
Data is at the center of many business decisions and advances today, including AI-driven capabilities. This requires companies to have well-governed data that is easy for users to find, use and understand. In moving to the cloud, Capital One modernized its data ecosystem and adopted a “You Build, Your Data” model to equip its data stakeholders with…
…
continue reading
1
Derailing Raptor Train, Volunteer Civil Cyber Defense, US AI safety summit
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10
Feds derail Raptor Train Newmark creates Volunteer Network for Civil Cyber Defense US to host global AI safety summit Thanks to today's episode sponsor, Conveyor Does the next security questionnaire that hits your inbox make you want to throw your laptop out the window? If so, don’t do it. You should check out Conveyor first. Conveyor is the market…
…
continue reading
1
Exploring DuckDB: A relational database built for online analytical processing
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26
Like every other kind of technology, when it comes to databases there's no one-size-fits-all solution that's going to be the best thing for the job every time. That's what drives innovation and new solutions. It's ultimately also the story behind DuckDB, an open source relational database specifically designed for the demands of online analytical p…
…
continue reading
This week, Dave and Joe share some listener follow-up from Clayton about credit card fraud and the potential issues with automatic update services that some cards provide. Dave's story is on sextortion scams targeting spouses, where scammers claim a partner is cheating and provide links to fake "proof." Joe has two stories this week, the first one …
…
continue reading
1
How Simple is as Simple as Possible with Mark Rendle
1:01:00
1:01:00
Play later
Play later
Lists
Like
Liked
1:01:00
How simple can you make software development? Carl and Richard talk to Mark Rendle about his focus on simplicity in building software - as simple as possible. Mark talks about the tendency of developers, sometimes through no fault of their own, to use what is new and cool in development, regardless of how practical or necessary it actually is. The …
…
continue reading
1
ISC StormCast for Thursday, September 19th, 2024
4:13
4:13
Play later
Play later
Lists
Like
Liked
4:13
Python Infostealer Patching Windows Exodus App https://isc.sans.edu/diary/Python%20Infostealer%20Patching%20Windows%20Exodus%20App/31276 Service Now Knoledge Bases Data Exposures https://appomni.com/ao-labs/servicenow-knowledge-bases-data-exposures-uncovered/ Gitlab Patch https://about.gitlab.com/releases/2024/09/17/patch-release-gitlab-17-3-3-rele…
…
continue reading
Exploding pagers in Lebanon are not a cyberattack. Europol leads an international effort to shut down the encrypted communications app Ghost. Microsoft IDs Russian propaganda groups’ disinformation campaigns. California’s Governor signs bills regulating AI in political ads. A multi-step zero-click macOS Calendar vulnerability is documented. A new p…
…
continue reading
Tom Occhino, Chief Product Officer at Vercel and former Engineering Director at Facebook, joins Sam to talk about the pivotal moments in React's history. He talks about how React popularized the ideas of declarative rendering and unidirectional data flow, how GraphQL furthered React's goal of co-locating all the concerns of a particular piece of UI…
…
continue reading
1
Custom DevTools for your React App with Cory House
33:29
33:29
Play later
Play later
Lists
Like
Liked
33:29
React and JavaScript expert Cory House discusses the creation of custom development tools for React applications, sharing insights from his recent talk at React Rally and exploring how the right tools can shape development workflows and enhance automated testing strategies. Links https://www.bitnative.com https://github.com/coryhouse/ama https://x.…
…
continue reading
Scott and Wes serve up a discussion on AI coding assistants with a deep look at Cursor AI, exploring its unique features like multi-line auto-complete and Smart Rewrites. They also discuss why Cursor’s intuitive UI stands out and tackle the big question: is it worth the investment? Show Notes 00:00 Welcome to Syntax! 01:16 Brought to you by Sentry.…
…
continue reading
1
DOP 281: The Impossibility of Competing with Tech Giants
52:42
52:42
Play later
Play later
Lists
Like
Liked
52:42
#281: In today's rapidly evolving tech industry, many startups believe they can challenge the well-established giants by offering similar products with minor tweaks. However, this approach is fundamentally flawed. Companies like Amazon and Microsoft will absorb a few of these new competitors, while many others will simply disappear. The driving for…
…
continue reading
ESLint is a static code analysis tool for identifying and fixing problems in JavaScript code. It helps developers maintain code quality and consistency by enforcing coding standards and detecting issues such as syntax errors, stylistic problems, and bugs. Nicholas Zakas is the creator of ESLint. He joins the show to talk about working at Yahoo in t…
…
continue reading
ESLint is a static code analysis tool for identifying and fixing problems in JavaScript code. It helps developers maintain code quality and consistency by enforcing coding standards and detecting issues such as syntax errors, stylistic problems, and bugs. Nicholas Zakas is the creator of ESLint. He joins the show to talk about working at Yahoo in t…
…
continue reading
The insidious undercurrents threatening to crush open-source AI projects, plus our thoughts on Microsoft's "big changes" to Windows post-CrowdStrike. Sponsored By: Coder QA: Take $1 a month off for the lifetime of your membership and contribute to our show directly. Promo Code: summer Support Coder Radio Links: 💥 Gets Sats Quick and Easy with Strik…
…
continue reading
1
Exploding pager analysis, construction company vulnerability, cyberattack job loss
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00
Exploding pager tragedy experts look towards supply chain sabotage Construction companies potentially vulnerable through accounting software Cyberattacks result in job losses Thanks to today's episode sponsor, Conveyor Are customer security reviews constantly interrupting your day? You should check out Conveyor. With an enterprise-grade trust cente…
…
continue reading
Teresa Au chats with graphic designer Magdiel Lopez about all the spaces for creativity in his life, from his famous “A Poster A Day” project, to his personal artistic practice, to the buildings and offices that his firm transforms into art-filled, meaningful spaces. They also discuss how immigration shapes your thinking, mental health in the face …
…
continue reading
1
London Transport requires in person password validation for 30,000 employees, Cyber Security Today for Wednesday, September 18, 2024
7:34
7:34
Play later
Play later
Lists
Like
Liked
7:34
Emerging Cyber Threats: Repellent Scorpius, TfL Cyber Attack, and Online Safety for Children In this episode, we discuss the emergence of the new ransomware group Repellent Scorpius and their use of the Ciccada 3301 ransomware. We cover the London Transport Authority's (TfL) in-person password resets following a significant cyber attack, and examin…
…
continue reading
1
Risky Business #764 -- Mossad expands into telecommunications services
1:02:56
1:02:56
Play later
Play later
Lists
Like
Liked
1:02:56
On this week’s show, Patrick Gray and Adam Boileau discuss the weeks security news, including: Hezbollah’s attempts to avoid SIGINT with pagers ends in explosions The US shines many bright lights on RT’s disinfo role Australia counters Chinese bullying in the Pacific Valid accounts are the most prevalent entry point, says CISA’s data Ivanti and For…
…
continue reading
1
SN 992: Password Manager Injection Attacks - Aging Media, Naval Starlink, adam:ONE
2:23:39
2:23:39
Play later
Play later
Lists
Like
Liked
2:23:39
Windows Endpoint Security Ecosystem Summit Aging storage media does NOT last forever How Navy chiefs conspired to get themselves illegal warship Wi-Fi adam:ONE named the #1 best Secure Access Service Edge (SASE) solution AI Talk Password Manager Injection Attacks Show Notes - https://www.grc.com/sn/SN-992-Notes.pdf Hosts: Steve Gibson and Mikah Sar…
…
continue reading
1
ISC StormCast for Wednesday, September 18th, 2024
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18
23:59, Time to Exfiltrate! https://isc.sans.edu/diary/23%3A59%2C%20Time%20to%20Exfiltrate!/31272 Critical VMWare VCenter Vulnerability https://blogs.vmware.com/cloud-foundation/2024/09/17/vmsa-2024-0019-questions-answers/ Zero-Click Calendar invite - Critical zero-click vulnerability chain in macOS https://mikko-kenttala.medium.com/zero-click-calen…
…
continue reading
1
UL NO. 450: Thoughts on o1-preview and the Path to AGI
24:17
24:17
Play later
Play later
Lists
Like
Liked
24:17
80% Chinese Cranes, Drones vs. Abrahams, a RAG kickstart, a Canary-based Security Maturity Model, and more... Check out Wiz for a Free Could Security Scan: https://www.wiz.io/ul Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmie…
…
continue reading
The US charges a Chinese national for spear-phishing government employees. The feds impose new sanctions on the makers of Predator spyware. Dealing with fake data breaches. Researchers discover a critical vulnerability in Google Cloud Platform. D-Link has patched critical vulnerabilities in three popular wireless router models. Snowflake ups their …
…
continue reading
1
$10 Million in Fake AI Royalties + the 'Infinite Money Glitch' That's Just Fraud + Voter Outreach So Bad It Seemed Like Phishing
1:00:00
1:00:00
Play later
Play later
Lists
Like
Liked
1:00:00
In which we discuss alleged Spotify streaming ad fraud that brought in millions, extremely poor voter outreach and an extended tangent on AI. Correction: we failed to make the "Ramen Empire" joke. Our apologies. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy Hacked
…
continue reading
In this episode: Mark brings us a clutch of Subsonic apps for Android: Tempo GoSonic Ultrasonic Symphonium Martin names a whole new category of “Top-like” tools for monitoring GPUS: nvtop intel_gpu_top nvitop amdgpu_top Alan, who is not a developer, has been writing UncleClive in Python to send Mastodon posts to a Spectrum emulator and back. You ca…
…
continue reading
1
Caught in the Crossfire: Infighting and Treason in Russia’s Cyber World
26:18
26:18
Play later
Play later
Lists
Like
Liked
26:18
On Dec. 5, 2016, two senior Russian Intelligence officers and two civilians were arrested and accused of treason. A few weeks later, when Western journalists were finally able to speak with the men’s lawyers, they learned that the case was based on events that were, oddly enough, already widely known. This made the arrests even more peculiar. As mo…
…
continue reading
Welcome to this week’s session, where we’ll delve into web shell forensics—an ever-critical topic in incident response investigations and threat-hunting strategies. Today, I’ll provide a breakdown that includes the latest developments, detailed triage techniques, and practical examples of what to look for during your investigations:…
…
continue reading
1
Humane with George Kedenburg III and Josh Dickens
48:30
48:30
Play later
Play later
Lists
Like
Liked
48:30
The Humane pin is a multi-modal wearable device designed by Humane Inc., a startup co-founded by former Apple employees Imran Chaudhri and Bethany Bongiorno. This wearable is part of a broader vision to create more seamless and integrated interactions between humans and technology, moving away from traditional screens. George Kedenburg III is a Sof…
…
continue reading
1
Humane with George Kedenburg III and Josh Dickens
48:30
48:30
Play later
Play later
Lists
Like
Liked
48:30
The Humane pin is a multi-modal wearable device designed by Humane Inc., a startup co-founded by former Apple employees Imran Chaudhri and Bethany Bongiorno. This wearable is part of a broader vision to create more seamless and integrated interactions between humans and technology, moving away from traditional screens. George Kedenburg III is a Sof…
…
continue reading
Enjoy this special encore episode. A programming technique where the developer doesn't specify each step of the algorithm in code, but instead teaches the algorithm to learn from the experience.By N2K Networks
…
continue reading
When does it make sense to step away from Rails conventions? What are the limits of convention over configuration? While Rails conventions provide a solid foundation, there are times when customization is necessary to meet specific project needs. In this episode, Joël and Stephanie dive into the tradeoffs of breaking away from Rails defaults. They …
…
continue reading