Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A podcast about web design and development.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Technical interviews about software topics.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
next generation web podcast
…
continue reading
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Join our weekly discussion about how to build top end Angular applications and become an Angular expert. Become a supporter of this podcast: https://www.spreaker.com/podcast/adventures-in-angular--6102018/support.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
Level up your .NET skills with our weekly discussion of C# and other Microsoft technologies for developers. Become a supporter of this podcast: https://www.spreaker.com/podcast/adventures-in-net--6102015/support.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
se-radio@computer.org
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
…
continue reading
Learn from the superstars turning content into cash! From social media influencers to small local businesses, people everywhere are harnessing the power of creative tools to design not just brands and content, but also deeply satisfying careers. In the Making explores the practical challenges and surprising rewards of working in this new creator economy. Join Adobe’s Teresa Au for conversations with content creators, solopreneurs, and industry experts who offer inspiration and insight for co ...
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Web development discussions and interviews from Peter Fisher. Covering JavaScript, Linux, Docker, PHP, Python, MYSQL, HTML and more Peter Fisher is a freelance web and mobile developer in Gloucestershire UK and the Host of the How To Code Well YouTube channel. If you have any feedback or wish to do a collaboration then please get in touch.
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
The State and Popular Culture
…
continue reading
Exploring the observability side of software development.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
Kris Brandow & Matthew Sanabria from Fallthrough.fm join Jerod to discuss tools we’re switching to, whether or not Go is still a great systems programming language choice, user-centric documentation, the need for archivists & more. Join the discussion Changelog++ members save 7 minutes on this episode because they made the ads disappear. Join today…
…
continue reading
Mark Downie has been blogging about technical topics for years, and also is the primary maintainer of the DasBlog-Core blogging engine. He talks with Scott about writing technical blogs that get read. Why does one blog and in this time of walled gardens, why is it more important than ever? 50% off code for Hanselminutes Listeners "HMdunlop" for "Wr…
…
continue reading
Mo Khazali, head of mobile and tech lead at Theodo UK, talks about the novel concept of Universal React. He discusses cross-platform development, overcoming performance challenges, and its impact on empowering small development teams to compete with big tech. Links https://x.com/mo__javad https://github.com/mojavad https://www.linkedin.com/in/moham…
…
continue reading
1
870: Windsurf forked VS Code to compete with Cursor. Talking the future of AI + Coding
57:54
57:54
Play later
Play later
Lists
Like
Liked
57:54
Wes and Scott talk with Kevin Hou and Varun Mohan from Windsurf about the evolving landscape of AI in coding, and the future of software development. Show Notes 00:00 Welcome to Syntax! 00:50 The origins of Windsurf and Codeium Windsurf Codeium Vs Code Cursor 03:14 Rethinking IDE UX 05:45 Will Microsoft eventually implement these AI features in VS …
…
continue reading
1
Action Orientation and Making Faster Decisions
25:48
25:48
Play later
Play later
Lists
Like
Liked
25:48
Time-crunched and data-scarce? Learn how the RPD model can leverage expertise and intuition to speed up decision-making, and how the 'Rubicon' moment can make your team more action-oriented. Stop endless planning and start doing: Learn how understanding action phases can help your team move faster from discussion to delivery. • Is your team stuck i…
…
continue reading
Christian Mesh, tech lead of the OpenTofu project, speaks with host Robert Blumen about OpenTofu. They start with the history of terraform, terraform providers, license changes to open source projects, the origin of OpenTofu as a fork of terraform, and the structure of the OpenTofu organization. They further explore compatibility issues for HCL, pr…
…
continue reading
1
The Development Of Security With David Mytton
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23
Episode Summary In this episode of The Secure Developer, host Danny Allan sits down with David Mytton, founder and CEO of Arcjet, former CEO of Server Density, and co-founder of Console.dev. David shares his insights into bridging the “developer-security gap” with Arcjet, a cutting-edge middleware SDK designed to empower developers with advanced se…
…
continue reading
1
beeps and on-call for Next.js developers with Joey Parsons
47:43
47:43
Play later
Play later
Lists
Like
Liked
47:43
beeps is a startup focused on building an on-call platform for Next.js. The company is grounded in the key insight that Next.js has become a dominant framework for modern development. A key motivation in leveraging Next.js is to create a developer-first experience for on-call. Joey Parsons is the founder and CEO of beeps, and he previously founded …
…
continue reading
1
The developer skill you might be neglecting
27:10
27:10
Play later
Play later
Lists
Like
Liked
27:10
Find Geoffrey (Jef) Huck on LinkedIn or check out his website. Stack Overflow user Matt earned a Lifeboat badge by explaining What is the difference between Tomcat containers and Docker containers?.By Geoffrey Huck, Ben Popper, Ryan Donovan
…
continue reading
1
Discussing Useful Security Requirements with Developers - Ixchel Ruiz - ASW #313
1:07:41
1:07:41
Play later
Play later
Lists
Like
Liked
1:07:41
There's a pernicious myth that developers don't care about security. In practice, they care about code quality. What developers don't care for is ambiguous requirements. Ixchel Ruiz shares her experience is discussing software designs, the challenges in prioritizing dev efforts, and how to help open source project maintainers with their issue backl…
…
continue reading
1
210 - Your first month learning Web Development
45:38
45:38
Play later
Play later
Lists
Like
Liked
45:38
Today we talk about how new developers can get overwhelmed when learning how to code for the first time and strategies to learn code efficiently and effectively. Full write up at https://howtocodewell.net/podcast/episode/210 January Sale now on. All courses are $5 https://howtocodewell.net/article/january-2025-course-sale…
…
continue reading
1
A Hacker's View of Civic Infrastructure: Cyber Security Today Weekend January 25, 2025
24:06
24:06
Play later
Play later
Lists
Like
Liked
24:06
Exploring Cyber Vulnerabilities in Civic Infrastructure with Ethical Hacker Nick Aleks In this episode, we dive into the vulnerabilities present in our civic infrastructure with ethical hacker Nick Aleks. We discuss the risks associated with outdated and poorly secured systems that run our cities' utilities, smart buildings, and transit networks. N…
…
continue reading
1
LightSpy's dark evolution. [Research Saturday]
25:40
25:40
Play later
Play later
Lists
Like
Liked
25:40
This week, we are joined by Ismael Valenzuela, VP of Threat Research & Intelligence, and Jacob Faires, Principal Threat Researcher, from Blackberry discussing the team's work on "LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign." In April 2024, BlackBerry uncovered a significant evolution of the Light…
…
continue reading
The HIBP Wall of Graphs; The Fake JB Hi-Fi Data Breach; Muppets and Beg Bounties; Upcoming UK, Ireland and Iceland Travel; Sponsored by Report URI https://www.troyhunt.com/weekly-update-436/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading
1
Cursive Funk, Microsoft, Ivanti, Sonic Wall, Exchange, PowerSchool, Aaran Leyland... - SWN #445
32:01
32:01
Play later
Play later
Lists
Like
Liked
32:01
Cursive Funk, Microsoft, Ivanti, Sonic Wall, Exchange, PowerSchool, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-445
…
continue reading
1
Week in Review: Tik Tok’s return, Noem’s CISA plans, failed startup risks
28:58
28:58
Play later
Play later
Lists
Like
Liked
28:58
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Shaun Marion, vp, CSO, Xcel Energy Thanks to our show sponsor, Vanta Do you know the status of your compliance controls right now? Like…right now? We know that real-time visibility is critical for security, but when it comes to our GR…
…
continue reading
A federal court finds the FBI’s warrantless section 702 searches unconstitutional. The DOJ charges five in a fake IT worker scheme. The Texas Attorney General expands his investigation into automakers’ data sharing. CISA highlights vulnerabilities in the aircraft collision avoidance system. Estonia will host Europe's new space cybersecurity testing…
…
continue reading
In this episode, Conor and Bryce chat about a new algorithm book that Bryce picked up. Link to Episode 218 on Website Discuss this episode, leave a comment, or ask a question (on GitHub) Socials ADSP: The Podcast: Twitter Conor Hoekstra: Twitter | BlueSky | Mastodon Bryce Adelstein Lelbach Show Notes Date Generated: 2025-01-22 Date Released: 2025-0…
…
continue reading
Bamboo teaches us how to lose friends and alienate people. Then, Alex Tran from Immich joins us for a project update, and we shared some dreams for a community RSS project. Special Guest: Alex Tran. Sponsored By: Tailscale: Tailscale is a Zero config VPN. It installs on any device in minutes, manages firewall rules for you, and works from anywhere.…
…
continue reading
1
Stolen Credentials From Leading Cyber Security Vendors Selling For $10: Cyber Security Today, Friday, Jan 24, 2025
7:05
7:05
Play later
Play later
Lists
Like
Liked
7:05
Cybersecurity Today: Stolen Credentials, Firewall Leaks, and Energy Sector Risks In this episode of Cybersecurity Today, host Jim Love discusses the alarming sale of thousands of credentials from leading cybersecurity vendors on the dark web, a massive leak of FortiGate firewall configuration files impacting nearly 5,000 organizations, and a major …
…
continue reading
1
TSA’s Pekoske ousted, CISOs’ boardroom gain, Cisco vulnerability fix
8:13
8:13
Play later
Play later
Lists
Like
Liked
8:13
TSA cyber chief David Pekoske ousted by new administration CISOs gain boardroom traction Influence but still lack soft skills, says Splunk Cisco Fixes vulnerability in Meeting Management Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for…
…
continue reading
1
Mic Drop: Australia’s attempt to keep kids off social media
14:14
14:14
Play later
Play later
Lists
Like
Liked
14:14
Australia is trying to use age-gating to keep kids under 16 off social media. John Pane, at Electronic Frontiers Australia, is worried that kids won’t be the only people losing something. He says privacy as we know it is also in the crosshairs. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading
Check out Cloudflare’s 2024 Year in Review. Read John’s posts on the Cloudflare blog or connect with him on LinkedIn. Shoutout to user Timo Kähkönen for providing knowledge-seekers with a cheap algorithm to find measure of angle between vectors.By Ben Popper, Ryan Donovan, John Graham-Cumming
…
continue reading
1
Innovating with .NET Core and Blazor Across Platforms with Jeff Fritz - NET 214
1:09:07
1:09:07
Play later
Play later
Lists
Like
Liked
1:09:07
In this exciting episode of Top End Devs, we dive into the world of .NET development with none other than Jeff Fritz, a recognized community manager at Microsoft. Hosted by Sean Clabo and co-hosted by Caleb Wells and Wailu, this episode explores Jeff's impressive journey from working in the finance and pharmaceutical industries to becoming a pivota…
…
continue reading
1
SANS ISC Stormcast, Jan 24, 2025: XSS in Email, SonicWall Exploited; Cisco Vulnerablities; AI and SOAR (@sans_edu research paper by Anthony Russo)
14:45
14:45
Play later
Play later
Lists
Like
Liked
14:45
In today's episode, learn how an attacker attempted to exploit webmail XSS vulnerablities against us. Sonicwall released a critical patch fixing an already exploited vulnerability in its SMA 1000 appliance. Cisco fixed vulnerabilities in ClamAV and its Meeting Manager REST API. Learn from SANS.edu student Anthony Russo how to take advantage of AI f…
…
continue reading
1
Vulnerability Prioritization In The Real World - Andy Jaquith - PSW #858
2:19:16
2:19:16
Play later
Play later
Lists
Like
Liked
2:19:16
Andy Jaquith joins us to discuss how to prioritize vulnerabilities and remmediation in the real-world, including asset management and more! In the security news: ESP32s in the wild and security, Google oAuth flaw, DDoS targets, Ban on auto components, Bambu firmware updates, Silk Road founder is free, one last cybersecurity executive order, US Trea…
…
continue reading
CISA and FBI detail exploit chains used by Chinese hackers to compromise Ivanti Cloud Service Appliances. Energy systems in Central Europe use unencrypted radio signals. A critical SonicWall vulnerability is under active exploitation. The Nnice ransomware strain isn’t. Cisco discloses a critical vulnerability in its Meeting Management tool. GhostGP…
…
continue reading
Microsoft didn’t control an important domain that it was using and end up red-faced, the dangers of using free VPN apps, a proof of concept exploit is out for last year’s SSH vulnerability, USB is getting slightly less confusing labels, and swapping the motherboard in a TrueNAS SCALE system. News Edgio bankruptcy results in endpoint change for Micr…
…
continue reading
1
From open source to acquired (Interview)
1:48:31
1:48:31
Play later
Play later
Lists
Like
Liked
1:48:31
Ashley Jeffs shares his journey with Benthos, an open source stream processor that was acquired by Redpanda. We talk about the evolution of data streaming technologies, the challenges he faced while growing the project, the decision to bootstrap versus seek venture capital, and what ultimately led to the acquisition. We discuss reactions to licensi…
…
continue reading
1
If and When Should a CISO Have a Long Term Security Plan?
29:20
29:20
Play later
Play later
Lists
Like
Liked
29:20
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Mike Johnson, CISO, Rivian. Joining us is Gaurav Kapil, CISO, Bread Financial. In this episode: It helps to ha…
…
continue reading
1
Mamba and Software Package Security with Sylvain Corlay
45:56
45:56
Play later
Play later
Lists
Like
Liked
45:56
QuantStack is an open-source technology software company specializing in tools for data science, scientific computing, and visualization. They are known for maintaining vital projects such as Jupyter, the conda-forge package channel, and the Mamba package manager. Sylvain Corlay is the CEO of QuantStack. He joins the podcast to talk about his compa…
…
continue reading
1
DHS terminates the Cyber Security Review Board, Major cybersecurity vendors' credentials found on Dark Web, Trump pardons creator of Silk Road
6:42
6:42
Play later
Play later
Lists
Like
Liked
6:42
Trump administration fires members of cybersecurity review board in ‘horribly shortsighted’ decision Major Cybersecurity Vendors' Credentials Found on Dark Web PowerSchool hacker claims they stole data of 62 million students Thanks to today’s episode sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We k…
…
continue reading
Generative AI's popularity has led to a renewed interest in quality assurance — perhaps unsurprising given the inherent unpredictability of the technology. This is why, over the last year, the field has seen a number of techniques and approaches emerge, including evals, benchmarking and guardrails. While these terms all refer to different things, g…
…
continue reading
This week, we are joined by Shiva Nathan, Founder & CEO of Onymos, talking about why data privacy is a critical priority for companies, yet a major challenge for them. Ben and Dave look at some of the early actions of the Trump administration and what they portend for the future. While this show covers legal topics, and Ben is a lawyer, the views e…
…
continue reading
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week Maria has the story on how the return …
…
continue reading
What's a Microsoft DevBox, and why do you want one? Carl and Richard talk to Isaac Levin about the power of DevBox to help you get up and running fast with a development project. Issac describes a virtual workstation designed for software development with much more processing, memory, and storage options. With the management tools, you can quickly …
…
continue reading
1
Hacks on the high seas, and how your home can be stolen under your nose
49:51
49:51
Play later
Play later
Lists
Like
Liked
49:51
An Italian hacker makes the grade and ends up in choppy waters, and hear true stories of title deed transfer scams. All this and more is discussed in the latest edition of the award-winning "Smashing Security" podcast by computer security veterans Graham Cluley and Carole Theriault. Plus - don't miss our featured interview with Avery Pennarun of Ta…
…
continue reading
1
SANS ISC Stormcast, Jan 23, 2025: PFSync Protocol; Oracle CPU; Korean VPN Supply Chain Attack; Ivanti Guidance
7:49
7:49
Play later
Play later
Lists
Like
Liked
7:49
In today's episode, we start by talking about the PFSYNC protocol used to synchronize firewall states to support failover. Oracle released it's quarterly critical patch update. ESET is reporting about a critical VPN supply chain attack and CISA released guidance for victims of recent Ivanti related attacks. Catching CARP: Fishing for Firewall State…
…
continue reading
1
The uncertain future of cyber safety oversight.
35:46
35:46
Play later
Play later
Lists
Like
Liked
35:46
The latest cyber moves from the Trump White House. Pompompurin faces resentencing. An attack on a government IT contractor impacts Medicaid, child support, and food assistance programs. Helldown ransomware targets unpatched Zyxel firewalls. Murdoc is a new Mirai botnet variant. Cloudflare maps the DDoS landscape. North Korea’s Lazarus group uses fa…
…
continue reading
1
DOP 299: Managing Your AI Workloads With KitOps
42:00
42:00
Play later
Play later
Lists
Like
Liked
42:00
#299: The ability to efficiently manage and analyze data is crucial in today's rapidly evolving tech landscape. One innovative solution that addresses this need is ModelKit. ModelKits are built on existing standards, ensuring compatibility with the tools your data scientists and developers already use. In this episode, Darin and Viktor speak with G…
…
continue reading
Ableton is a music software and hardware company based in Germany. The company develops Ableton Live which is a digital audio workstation for both improvisation and traditional arrangements. The software is remarkable for successfully blending good UI design with a powerful feature set. This has made it popular with new musicians as well as profess…
…
continue reading
We dig into the Rails 8 Solid Trifecta, our thoughts on why fewer developers are taking jobs at startups, and a new buzzphrase: Framework Fatigue. Sponsored By: Coder QA: Take $2 a month off for the lifetime of your membership and contribute to our show directly Promo Code: jarjar Bitcoin Well: Bitcoin sent directly to your wallet is the safest way…
…
continue reading
1
The Future Of The CISO - Jeff Pollard, Jess Burn - BSW #379
59:41
59:41
Play later
Play later
Lists
Like
Liked
59:41
Becoming a CISO is a lofty goal for many security and risk pros, and the role brings new sets of challenges. CISOs who accept the wrong opportunities will be forced to conform, rather than excel, and take on outsized liability for the scope of responsibilities. Jeff Pollard, Vice-President, Principal Analyst on the Security and Risk Team, and Jess …
…
continue reading
1
Another Critical Microsoft Patch: Cyber Security Today for Wednesday, January 22, 2024
6:13
6:13
Play later
Play later
Lists
Like
Liked
6:13
Critical Cybersecurity Updates: Avery Data Breach, Hamilton Ransomware Attack, and Microsoft Outlook Patch In this episode of Cybersecurity Today, host Jim Love covers significant cybersecurity incidents and updates. Avery experiences a massive data breach affecting 61,000 customers due to a credit card skimmer. The city of Hamilton commits $52 mil…
…
continue reading
1
7-Zip flaw, CERT-UA impersonation, AI EO revoked
8:35
8:35
Play later
Play later
Lists
Like
Liked
8:35
7-Zip flaw bypasses Windows security warnings Attackers impersonate Ukraine’s CERT-UA AI Executive Order revoked Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time …
…
continue reading
1
WBIT#3: Can good team dynamics make Agile obsolete?
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01
ApartmentAdvisor helps renters find apartments and navigate more complicated markets. What were the people who wrote the Agile Manifesto thinking? Listen to our podcast with original signatory Jim Highsmith and find out. You think the tech is impressive? Wes played the first “perfect” game of Donkey Kong. Find Wes on GitHub, LinkedIn, Twitter, or h…
…
continue reading
1
SN 1009: Attacking TOTP - Force-Installed Outlook, DJI Firmware Update
3:07:19
3:07:19
Play later
Play later
Lists
Like
Liked
3:07:19
What do we learn from January's record breaking 0-day critical Patch Tuesday? Microsoft to "force-install" a new Outlook into all Windows 10 and 11 desktops? GoDaddy required to get much more serious about its hosting security. More age verification enforcement is coming, including globally. What another instance of a widely exposed management inte…
…
continue reading
1
Risky Business #776 -- Trump will flex American cyber muscles
1:03:53
1:03:53
Play later
Play later
Lists
Like
Liked
1:03:53
Risky Business returns for its 19th year! Patrick Gray and Adam Boileau discuss the week’s cybersecurity news and there is a whole bunch of it. They discuss: The incoming Trump administration guts the CSRB Biden’s last cyber Executive Order has sensible things in it China’s breach of the US Treasury gets our reluctant admiration Ross Ulbricht - the…
…
continue reading
1
SANS ISC Stormcast, Jan 22, 2025: Geolocation via Starlink and Cloudflare; AI Prompt Risks; Homebrew Phishing
9:16
9:16
Play later
Play later
Lists
Like
Liked
9:16
This episodes covers how Starlink users can be geolocated and how Cloudflare may help deanonymize users. The increased use of AI helpers leads to leaking data via careless prompts. Geolocation and Starlink https://isc.sans.edu/diary/Geolocation%20and%20Starlink/31612 Discover the potential geolocation risks associated with Starlink and how they mig…
…
continue reading
1
Smishing, Microsoft, Star Blizzard, Sneaky Log, VMARE, Josh Marpet, and more... - SWN #444
34:45
34:45
Play later
Play later
Lists
Like
Liked
34:45
Smishing, Microsoft, Star Blizzard, Sneaky Log, VMARE, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-444
…
continue reading