Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Technical interviews about software topics.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
A podcast featuring panelists of engineers from Netflix, Twitch, & Atlassian talking over drinks about all things software engineering.
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
Daily update on current cyber security threats
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
se-radio@computer.org
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
A place for elite leaders and teams.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
next generation web podcast
…
continue reading
Agile Coaches' Corner shares practical concepts in an approachable way. It is for agile practitioners and business leaders seeking expert advice on improving the way they work to achieve their desired outcomes.
…
continue reading
Things about Svelte. Sometimes weekly, sometimes not.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
…
continue reading
The State and Popular Culture
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
1
Agile and Project Management - DrunkenPM Radio
Dave Prior, Agile Trainer, Consultant and Project Manager
A podcast about Agile and Project Management
…
continue reading
Make better decisions based on how your mind works. Personality Hacker teaches you the coding language of your mind and how to use it to create great relationships - a fulfilling career and happiness. Are you born with your personality, or does it develop over time? What is intuition? What's the fastest way to use your natural gifts to improve overall happiness? Join Joel Mark Witt and Antonia Dodge as they discuss small changes in your personality and relationships that have big impact.
…
continue reading
Build your English vocabulary in six minutes. Every Monday join two of our presenters and hear about different ways to develop your vocabulary knowledge and skills.
…
continue reading
Level up your .NET skills with our weekly discussion of C# and other Microsoft technologies for developers. Become a supporter of this podcast: https://www.spreaker.com/podcast/adventures-in-net--6102015/support.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every week we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
Technical interviews about software topics.
…
continue reading
Practical automated testing for software engineers using Python. Mostly. But also so much more.
…
continue reading
Join our weekly discussion about how to build top end Angular applications and become an Angular expert. Become a supporter of this podcast: https://www.spreaker.com/podcast/adventures-in-angular--6102018/support.
…
continue reading
The Packet Pushers Podcast Network offers continuous professional development for IT professionals. Keep up with networking, security, cloud, career, and more. We bring the IT community together--engineers, architects, vendors, developers, educators, etc. In this feed, listen to every conversation we record!
…
continue reading
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Why do we make games? Every designer has a different and very personal answer to that question. Soren Johnson, founder of Mohawk Games, sits down with noted designers to find out by examining their careers as a whole.
…
continue reading
Developers building a software business on our own terms.
…
continue reading
Software’s best weekly news brief, deep technical interviews & talk show.
…
continue reading
1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
1
Foundations of Design for Developers with Kathryn Grayson Nanz
29:37
29:37
Play later
Play later
Lists
Like
Liked
29:37
Kathryn Grayson Nanz Is a designer who's written an ebook called Quote Foundations of design for developers. She understands that developers need to participate in the design process, and often developers can identify that something is wrong with the design but they can't figure out why. In this episode she talks to Scott about how engineers and de…
…
continue reading
1
IPB149: A Progress Report On The Federal Government’s IPv6 Migration
40:47
40:47
Play later
Play later
Lists
Like
Liked
40:47
When you chair the IPv6 Task Force for the United States Federal Government, you get a pretty good view of IPv6 implementation across the world and in every aspect of American society. That’s why we have Rob Sears on the show today. He gives us his perspective as chair of the task force charged with... Read more »…
…
continue reading
Why updating iPhones in their sealed boxes might have some downsides, Amazon’s “AI” turned out to just be people, LLMs hallucinating imaginary dependencies is potentially a security risk, Aruba backs up its government data to the Internet Archive, and disk queue schedulers in Linux. Plug Support us on patreon and get an ad-free RSS feed with early …
…
continue reading
1
Day Two Cloud: The Duality of Enterprise AI
55:14
55:14
Play later
Play later
Lists
Like
Liked
55:14
Welcome to a crossover episode with the Day Two Cloud podcast! AI has been around forever; AI is emergent. AI is just data analytics; AI hallucinates. AI doesn’t have many business use cases; AI is already being used by your employees. Today, Greg and Johna from the Heavy Strategy podcast join Day Two Cloud to... Read more »…
…
continue reading
1
Managing Data Leaks Outside Your Perimeter
29:56
29:56
Play later
Play later
Lists
Like
Liked
29:56
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our sponsored guest, Mackenzie Jackson, developer…
…
continue reading
1
Change Healthcare Faces Another Ransomware Threat—and It Looks Credible
8:22
8:22
Play later
Play later
Lists
Like
Liked
8:22
Change Healthcare ransomware hackers already received a $22 million payment. Now a second group is demanding money, and has sent WIRED samples of what they claim is the company's stolen data. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy WIRED
…
continue reading
Ben Huber is a security engineer who has worked at companies including Crypto.com and Blackpanda. He joins the podcast to talk about his career, penetration or “pen” testing, attack vectors, security tools, and much more. Gregor Vand is a security-focused technologist, and is the founder and CTO of Mailpass. Previously, Gregor was a CTO across cybe…
…
continue reading
Ben Huber is a security engineer who has worked at companies including Crypto.com and Blackpanda. He joins the podcast to talk about his career, penetration or “pen” testing, attack vectors, security tools, and much more. Gregor Vand is a security-focused technologist, and is the founder and CTO of Mailpass. Previously, Gregor was a CTO across cybe…
…
continue reading
1
Water utility threats, GPT-4 hacking, SIM swap solicitation
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21
Sandworm-linked group tied to attack on water utilities GPT-4 reads security advisories Cell carrier workers solicited for SIM swaps Thanks to today's episode sponsor, Conveyor Conveyor is the market leading AI-powered platform that automates the entire customer security review process — from sharing your security posture and SOC 2 in a single port…
…
continue reading
Can AI improve the quality of our code? A recent white paper published by code analysis company CodeScene — "Refactoring vs. Refuctoring: Advancing the state of AI-automated code improvements" — highlighted some significant challenges: in tests, AI solutions only delivered functionally correct refactorings 37% of the time. However, there are nevert…
…
continue reading
1
Is change presenting a window of opportunity for attackers?
1:04:22
1:04:22
Play later
Play later
Lists
Like
Liked
1:04:22
Trevin Edgeworth, Red Team Practice Director at Bishop Fox, is discussing how change, like M&A, staff, tech, lack of clarity or even self-promotion within and around security environments presents windows of opportunity for attackers. Joe and Dave share some listener follow up, the first one comes from Erin, who writes in from Northern Ireland, sha…
…
continue reading
1
218: Balancing test coverage with test costs - Nicole Tietz-Sokolskaya
28:48
28:48
Play later
Play later
Lists
Like
Liked
28:48
Nicole is a software engineer and writer, and recently wrote about the trade-offs we make when deciding which tests to write and how much testing is enough. We talk about: Balancing schedule vs testing How much testing is the right about of testing Should code coverage be measured and tracked Good refactoring can reduce code coverage Is it worth te…
…
continue reading
1
Programming with Speech and AI with Karl Geitz
54:00
54:00
Play later
Play later
Lists
Like
Liked
54:00
Can speech become part of your development workflow? Carl and Richard talk to Karl Geitz about his use of NaturallySpeaking to create software in Visual Studio. Karl talks about using voice to write better, longer comments in his code and also helps to navigate the features of Visual Studio itself. The effort started when dealing with Repetitive St…
…
continue reading
1
ISC StormCast for Thursday, April 18th, 2024
5:19
5:19
Play later
Play later
Lists
Like
Liked
5:19
Malicious PDF File As Delivery Mechanism https://isc.sans.edu/diary/Malicious%20PDF%20File%20Used%20As%20Delivery%20Mechanism/30848 Updated Palo Alto Networks GlobalProtect Guidance https://security.paloaltonetworks.com/CVE-2024-3400 Coordinated Social Engineering Takeovers of Open Source Projects; https://openssf.org/blog/2024/04/15/open-source-se…
…
continue reading
A Russian hacker group boldly targets critical infrastructure. The Change Healthcare ransomware attack is projected to cost over a billion dollars. Three hundred bucks is the going rate for a SIM swap. PuTTY potentially reveals private keys. Cisco Talos reports a surge in brute-force attacks. Ivanti updates its MDM product. Omni Hotels & Resorts co…
…
continue reading
AI has been around forever; AI is emergent. AI is just data analytics; AI hallucinates. AI doesn’t have many business use cases; AI is already being used by your employees. Today, Greg and Johna from the Heavy Strategy podcast join Day Two Cloud to give their takes on enterprise AI. Johna brings with her the... Read more »…
…
continue reading
1
NAN060: Python for Network Engineering with Kirk Byers (Part 2)
36:46
36:46
Play later
Play later
Lists
Like
Liked
36:46
This is Part 2 of Kirk Byers’ interview. We discuss the Git course he’s developing and the need to build bridges between networking and testing so we can move automation forward. This of course leads us to geek out about AutoCon and the talks we’re most excited about. Plus, Kirk shares his wisdom about creating... Read more »…
…
continue reading
1
Leading and building Raycast (Interview)
2:08:32
2:08:32
Play later
Play later
Lists
Like
Liked
2:08:32
This week Adam is joined by Thomas Paul Mann, Co-founder and CEO of Raycast, to discuss being productive on a Mac, going beyond their free tier, the extensions built by the community, the Raycast Store, how they’re executing on Raycast AI chat which aims to be a single interface to many LLMs. Raycast has gone beyond being an extendable launcher – t…
…
continue reading
Time to work on your own terms. Four years after the global pandemic, work – and why we do it – has changed. You have a choice to make. You can live by the guide, follow the rules and show up the same as everyone else. Or, you can spend your energy and live life on your own terms. Time to be an original. You won’t enjoy serving your teams (and our …
…
continue reading
1
757: Potluck: Is Gatsby Dead? Shadow Dom, AI Summaries, Self Hosting + More
48:42
48:42
Play later
Play later
Lists
Like
Liked
48:42
Scott and Wes serve up answers to community questions, from navigating Light DOM vs. Shadow DOM to diving into tools for data extraction. Plus, they dish out insights on Gatsby in 2024, utilizing JavaScript ‘wheel events’, and explore the possibilities of hosting a website at home. Show Notes 00:00 Welcome to Syntax! 00:51 Brought to you by Sentry.…
…
continue reading
1
DOP 259: Reimagining The Terminal Experience with Wave Terminal
42:08
42:08
Play later
Play later
Lists
Like
Liked
42:08
#259: Terminals have been around for decades, serving as the backbone of many workflows and operations in the tech world. From managing servers to local file manipulation, terminals offer a direct line to the heart of computing. However, with the advent of graphical user interfaces (GUIs), the terminal's prominence has waned among the general user …
…
continue reading
1
US Senate to Vote on a Wiretap Bill That Critics Call ‘Stasi-Like’
9:50
9:50
Play later
Play later
Lists
Like
Liked
9:50
A controversial bill reauthorizing the Section 702 spy program may force whole new categories of businesses to eavesdrop on the US government's behalf, including on fellow Americans. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy WIRED
…
continue reading
George Mathew is a Managing Director at Insight Partners where he invested in Weights & Biases, Jasper, and others. He has over 20 years of experience developing high-growth technology startups including most recently being CEO of Kespry. George joins the podcast to talk about his path to becoming an investor, his data-first thesis about investment…
…
continue reading
George Mathew is a Managing Director at Insight Partners where he invested in Weights & Biases, Jasper, and others. He has over 20 years of experience developing high-growth technology startups including most recently being CEO of Kespry. George joins the podcast to talk about his path to becoming an investor, his data-first thesis about investment…
…
continue reading
1
Cyber Security Today, April 17, 2024 - More suspicious attempts to take over open source projects, a data theft at a Cisco Duo partner, and more
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25
This episode reports on security updates from Delinea and PuTTY, and reports on bad bots and threat actors going after Zoom meetingsBy Howard Solomon
…
continue reading
1
Cisco MFA breach, Bad Bots surge, LockBit 3.0 propagates
9:38
9:38
Play later
Play later
Lists
Like
Liked
9:38
Cisco announces breach of multifactor authentication message provider Bad bots drive 10% annual surge in account takeover attacks LockBit 3.0 variant generates custom, self-propagating malware Thanks to today's episode sponsor, Conveyor Conveyor is the AI security review automation platform helping infosec teams automate everything from securely sh…
…
continue reading
1
Cultural Antidotes - Clarity Isn't Just Honesty
13:57
13:57
Play later
Play later
Lists
Like
Liked
13:57
The most common mistake for any manager is to fail to clarify. This often happens because we mistake our average communications for having perfect clarity, when in fact we most often don't communicate at high levels of clarity. This isn't because we are bad at communication, but rather because our social communications carry less consequence when t…
…
continue reading
1
Risky Business #745 – Tales from the PANageddon
58:10
58:10
Play later
Play later
Lists
Like
Liked
58:10
On this week’s show Patrick and Adam discuss the week’s security news, including: Palo Alto’s firewalls have a ../ bad day Sisense’s bucket full of creds gets kicked over United Healthcare draws the ire of congress FISA 702 reauthorisation finally moves forward Apple warns about “mercenary exploitation” but what’s the India link? And much, much, mo…
…
continue reading
1
If everyone is building AI, why aren't more projects in production?
41:38
41:38
Play later
Play later
Lists
Like
Liked
41:38
Get started with MongoDB Atlas on Google Cloud today. Read more from the MongoDB DevRel team at the MongoDB Developer Center. Learn more about Google’s Gemini models. Shout out to thitemple for their Lifeboat-worthy answer to In TypeScript, how do I declare a function that returns a string type array?.…
…
continue reading
1
ISC StormCast for Wednesday, April 17th, 2024
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33
Palo Alto Networks GlobalProtect exploit public and widely exploited CVE-2024-3400 https://isc.sans.edu/forums/diary/Palo%20Alto%20Networks%20GlobalProtect%20exploit%20public%20and%20widely%20exploited%20CVE-2024-3400/30844/ Putty Private Key Recovery https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html Oracle Critical Pa…
…
continue reading
1
SN 970: GhostRace - AT&T Breach Update, Cookie Notices, Router Buttons
1:52:46
1:52:46
Play later
Play later
Lists
Like
Liked
1:52:46
An update on the AT&T data breach 340,000 social security numbers leaked Cookie Notice Compliance The GDPR does enforce some transparency Physical router buttons Wifi enabled button pressers Netsecfish disclosure of Dlink NAS vulnerability Chrome bloat SpinRite update GhostRace Show Notes - https://www.grc.com/sn/SN-970-Notes.pdf Hosts: Steve Gibso…
…
continue reading
How can GitHub Copilot help you? Richard chats with Damian Brady at NDC Sydney about the power of GitHub Copilot to help you understand and write the bits of code you need - whether you're using PowerShell, understanding a RegEx expression, or trying to get a Bash prompt right. GitHub Copilot and help to explain the code you've got, even across wor…
…
continue reading
1
SE Radio 612: Eyal Solomon on API Consumption Management
53:30
53:30
Play later
Play later
Lists
Like
Liked
53:30
Eyal Solomon, CEO and co-founder of Lunar.dev, joins SE Radio’s Kanchan Shringi for a discussion on tooling for API consumption management. The episode starts by examining why API consumption management is an increasingly important topic, and how existing tooling on the provider side can be inadequate for client-side issues. Eyal talks in detail ab…
…
continue reading
Cisco Dou warns of a third-party MFA-related breach. MGM Resorts sues to stop an FTC breach investigation. Meanwhile the FTC dings another mental telehealth service provider. Open Source foundations call for caution after social engineering attempts. The NSA shares guidance for securing AI systems. IntelBroker claims to have hit a US geospatial int…
…
continue reading
In the waning years of the 20th century, amid growing anxieties about the turn of the millennium, one man, Robert Bemer, observed the unfolding drama from his remote home on King Possum Lake. A revered figure in computing, Bemer had early on flagged a significant, looming issue known as the Y2K bug, which threatened to disrupt global systems as cal…
…
continue reading
1
PP010: CISA’s Cyber Incident Reporting Law: What You Need to Know
37:27
37:27
Play later
Play later
Lists
Like
Liked
37:27
The US government is seeking comment on a new law mandating detailed cyber incident reporting. In this episode, we cover what you need to know about the “Cyber Incident Reporting for Critical Infrastructure Act.” We break down the details, including what kind of companies the law applies to, what it defines as an “incident,” and... Read more »…
…
continue reading
1
HW025: Easy as Pi: The WLAN Pro’s Swiss Army Knife
39:21
39:21
Play later
Play later
Lists
Like
Liked
39:21
In 2016, a handful of wireless engineers got together and decided to create the portable tool they all wish existed. Thus the WLAN Pi was born. Jerry Olla, Nick Turner, and Jiri Brejcha join the show today to talk about the evolution of the open source WLAN Pi and its current capabilities. The latest generation... Read more »…
…
continue reading
This week I'm wrapping up my series on SSH forensics with a discussion on SSH log triage. Logs are usually what an analyst will start with, so this episode is important. There are a few different log types, and there is a pitfall with one of them, which is something you must be aware of to avoid making inaccurate conclusions. I'll provide the artif…
…
continue reading
1
House Votes to Extend—and Expand—a Major US Spy Program
8:13
8:13
Play later
Play later
Lists
Like
Liked
8:13
US House of Representatives voted on Friday to extend the Section 702 spy program. It passed without an amendment that would have required the FBI to obtain a warrant to access Americans' information. Read this story here. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy WIRED
…
continue reading
1
Hookdeck and Building an Event Gateway with Alex Bouchard
47:01
47:01
Play later
Play later
Lists
Like
Liked
47:01
Event-driven architecture is a software design pattern where system components communicate through events that are generated by producers, and pushed to consumers. This design is often contrasted with a request-driven architecture, where components communicate with each other by sending requests and receiving responses. Hookdeck is an event gateway…
…
continue reading
1
Hookdeck and Building an Event Gateway with Alex Bouchard
47:01
47:01
Play later
Play later
Lists
Like
Liked
47:01
Event-driven architecture is a software design pattern where system components communicate through events that are generated by producers, and pushed to consumers. This design is often contrasted with a request-driven architecture, where components communicate with each other by sending requests and receiving responses. Hookdeck is an event gateway…
…
continue reading
1
Threads out in Turkey, Palo Alto backdoor, Microsoft' security overhaul
7:57
7:57
Play later
Play later
Lists
Like
Liked
7:57
Meta to close Threads in Turkey Palo Alto fixes backdoor zero-day Details on Microsoft’s security overhaul Thanks to today's episode sponsor, Conveyor What are infosec teams measuring these days? More often than not, their impact on sales. As infosec teams become hands on in the sales cycle, proving your value becomes key. A director of GRC said la…
…
continue reading
1
122. The UK-US unmasked a giant Chinese cyber operation but forgot one thing: to tell many of its victims
28:51
28:51
Play later
Play later
Lists
Like
Liked
28:51
The US and UK made a splashy coordinated announcement last month about a years-long cyber espionage campaign by Chinese state-backed hackers. The US indicted seven, the UK leveled sanctions. They just neglected to do one thing --- let some of the victims know.By Recorded Future News
…
continue reading
A family of multitasking, multi-user computer operating systems that derive from the original Unix system built by Ken Thompson and Dennis Ritchie in the 1960s.By N2K Networks
…
continue reading
A data leak at a big Chinese security company reveals not just that they're engaged in state sponsored hacking-for-hire, but just how weirdly corporate a job that actually is. Our conversation with Mei Danowski, security researcher, about her analysis of the iSoon leaks. Check our her excellent Substack Natto thoughts: https://nattothoughts.substac…
…
continue reading
Connect with Michael on LinkedIn. Shoutout to user1083266, who earned a Stellar Question badge with How to store image in SQLite database.By Ben Popper, Ryan Donovan, Michael Geden
…
continue reading
Quick Palo Alto Networks Global Protect Vulnerablity Update CVE-2024-3400 https://isc.sans.edu/diary/30838 Delinea patches critical vulnerability in secret manager https://trust.delinea.com/?tcuUid=17aaf4ef-ada9-46d5-bf97-abd3b07daae3 Lancom Windows Setup Assistant May Reset Password https://www.lancom-systems.com/service-support/general-security-i…
…
continue reading
Bonus Chat Episode. We both love (and make) video games. Thanks to our supporters, alongside our typical two episodes this month, we’re excited to drop this bonus episode where we chat about hacking games, making games, and playing games. If you want to support Hacked too, check out hackedpodcast.com to subscribe. Learn more about your ad choices. …
…
continue reading
Palo Alto Networks releases hotfixes for an exploited zero-day. Delinea issues an urgent update for a critical flaw. Giant Tiger data is leaked online. A European semiconductor manufacturer deals with a data breach. Roku suffers its second breach of the year. Operators of the Hive RAT face charges. A former Amazon security engineer gets three years…
…
continue reading
YouTuber “Internet of Bugs” breaks down why AI “software engineer” Devin is no Upwork hero, Redka is Anton Zhiyanov’s attempt to reimplement Redis with SQLite, OpenTofu issues its response to Hashicorp’s Cease and Desist letter, Brian LeRoux introduces Enhance WASM & PumpkinOS is not your average PalmOS emulator. Leave us a comment Changelog++ memb…
…
continue reading