Deception, influence, and social engineering in the world of cyber crime.
Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Technical interviews about software topics.
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
What is DevOps? We will attempt to answer this and many more questions.
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of SpinRite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. If you want more stories like Click Her ...
Level up your .NET skills with our weekly discussion of C# and other Microsoft technologies for developers.
A live podcast about front end web design and UX.
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
Hosted by former covert CIA intelligence officer Andrew Bustamante, Everyday Espionage gives you practical, powerful spy skills you can use to get ahead in your everyday life.
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Daily update on current cyber security threats
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
Agile Coaches' Corner shares practical concepts in an approachable way. It is for agile practitioners and business leaders seeking expert advice on improving the way they work to achieve their desired outcomes.
A podcast about security for developers, covering tools and best practices.
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be.
S
Software Engineering Radio - the podcast for professional software developers


1
Software Engineering Radio - the podcast for professional software developers
se-radio@computer.org
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
Your occasional dose of privacy, digital security, and open source intelligence (OSINT) news and opinion.
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
The CodeNewbie podcast was born from CodeNewbie, an organization which fosters a supportive, international community of people learning to code. Each season, host Saron Yitbarek delivers stories and interviews from people of diverse backgrounds and expertise about their coding journeys, as well as beginner friendly discussions about the tech you should know about.
Things about Svelte. Sometimes weekly, sometimes not.
A podcast by coders for coders about all aspects of life as a developer.
A
Agile and Project Management - DrunkenPM Radio


1
Agile and Project Management - DrunkenPM Radio
Dave Prior, Agile Trainer, Consultant and Project Manager
A podcast about Agile and Project Management
A
Adventures in Angular


1
Adventures in Angular
Charles Max Wood, Subrat Mishra, Richard Sithole, Armen Vardanyan, Sani Yusuf, Shai Reznik, Alyssa Nicoll, Brooks Forsyth, Brad McAlister, Chris Ford, Eddie Hinkle, Younes Jaaidi, Brian Love, Jennifer Wadella, Aaron Frost, Joe Eames, John Papa, ...
Join our weekly discussion about how to build top end Angular applications and become an Angular expert.
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
A
Algorithms + Data Structures = Programs


1
Algorithms + Data Structures = Programs
Conor Hoekstra & Bryce Adelstein Lelbach
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
Playful explorations of the rich past and exciting future that we're all building with our silly little computers. Hosted by Jimmy Miller and Ivan Reese.
next generation web podcast
Narrators read our favorite written stories. You can listen to them anywhere, including on your smart speaker. Play for audio versions of WIRED's Security stories, featuring the latest on cybersecurity, hacking, privacy, national security, and keeping yourself safe online.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
Game dev talk. Support this podcast: https://anchor.fm/gamedevbreakdown/support
Programming Throwdown educates Computer Scientists and Software Engineers on a cavalcade of programming and tech topics. Every show will cover a new programming language, so listeners will be able to speak intelligently about any programming language.
S
Syntax - Tasty Web Development Treats


1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
D
Digital Forensic Survival Podcast


1
Digital Forensic Survival Podcast
Digital Forensic Survival Podcast
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
The Podcast for Professional Software Developers
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
Hear about the cutting edge of development economics from research to practice.
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious (and occasionally criminal) world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new story every episode.
Learn how to get the best performance and scale your PostgreSQL database with our weekly shows. Receive the best content curated from around the web. We have a special focus on content for developers since your architecture and usage is the key to getting the most performance out of PostgreSQL.
Software testing Podcast is a one-stop marketplace where you can listen to what is happening in the software QA testing industry. Subscribe us now for the best and most popular testing podcasts. Happy Podcasting!!
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
Hackers
The Azure DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
ISC StormCast for Friday, February 3rd, 2023
4:58
4:58
Play later
Play later
Lists
Like
Liked
4:58
Rotating Packet Captures with pfSense https://isc.sans.edu/diary/Rotating%20Packet%20Captures%20with%20pfSense/29500 BEC Group Incorporates Secondary Impersonated Personas https://intelligence.abnormalsecurity.com/blog/firebrick-ostrich-third-party-reconnaissance-attacks MalVirt .Net Virtualization Thrives in Malvertising Attacks https://www.sentin…
William Falcon of Lighting AI discusses how to optimize deep learning models using the Lightning platform, optimization is a necessary step towards creating a production application. Philip Winston spoke with Falcon about PyTorch, PyTorch Lightning, the Lightning platform, the needs of training vs. inferencing, scalability, machine learning operati…
S
Software Engineering Radio - the podcast for professional software developers


1
549-william-falcon-optimizing-deep-learning-models
1:01:15
1:01:15
Play later
Play later
Lists
Like
Liked
1:01:15
William Falcon of Lighting AI discusses how to optimize deep learning models using the Lightning platform, optimization is a necessary step towards creating a production application. Philip Winston spoke with Falcon about PyTorch, PyTorch Lightning...By IEEE Computer Society
Hottest Day Inbound; I Bought a Connected BBQ; Planet Ice Breach; Pitt Meadows School District Breach; The Scourge of Breach Coverups; Sponsored by CrowdSec https://www.troyhunt.com/weekly-update-333/ See omnystudio.com/listener for privacy information.By Troy Hunt
We gathered Intellivision Amico news from all directions so you don't have to. --- Send in a voice message: https://anchor.fm/gamedevbreakdown/messageSupport this podcast: https://anchor.fm/gamedevbreakdown/support
C
CyberWire Daily


1
Cisco fixes vulnerabilities in ICS appliances. NIST’s anti-phishing guidelines. OneNote exploitation. HeadCrab malware. Recent actions by Russian threat actors. Trends in state-directed cyber ops.
31:21
31:21
Play later
Play later
Lists
Like
Liked
31:21
Cisco patches a command injection vulnerability. NIST issues antiphishing guidance. HeadCrab malware's worldwide distribution campaign. The Gamaredon APT is more interested in collection than destruction. Kathleen Smith of ClearedJobs.Net looks at hiring trends in the cleared community. Bennett from Signifyd describes the fraud ring that’s launched…
H
Hanselminutes with Scott Hanselman


1
Become a more confident developer with Kent C. Dodds
33:01
33:01
Play later
Play later
Lists
Like
Liked
33:01
By Scott Hanselman
Let’s say you have a set of microservices running on a Kubernetes cluster. In the past, developers used to program features like service discovery, observability, who’s allowed to talk to whom and other security related features directly into the application code. This slowed down the dev cycle and it made these microservices bigger and just genera…
C
CYBER


1
One Man’s Obsession With Being 18 Forever
36:48
36:48
Play later
Play later
Lists
Like
Liked
36:48
What would you give to live forever? Hell, what would you give to have the body of an 18-year-old well into your 40s? That’s the goal of tech CEO Bryan Johnnson. He is, by his own estimation, the most measured man on the planet. He takes 112 to 130 pills a day. He eats a restrictive diet. He has automated his body. It’s an expensive process. And on…
W
WIRED Security: News, Advice, and More


1
The Untold Story of a Crippling Ransomware Attack
14:44
14:44
Play later
Play later
Lists
Like
Liked
14:44
More than two years ago, criminals crippled the systems of London’s Hackney Council. It's still fighting to recover.
All links and images for this episode can be found on CISO Series. Why is there a cybersecurity skills gap? Practically everyone is looking to hire, and there are ton of people getting training and trying to get into the industry, but we still have this problem. Why? Check out this post for the discussions that is the basis of our conversation on t…
D
Developer Tea


1
Your Purpose is A Projection of Your Complex Identity
10:30
10:30
Play later
Play later
Lists
Like
Liked
10:30
If your identity is complex, your purpose is by extension complex. In this episode, we talk about purpose as an expression, rather than a regulator, of your identity. ## 🙏 Today's Episode is Brought To you by: [Split](https://split.io/DeveloperTea) This podcast is powered by Split. The Feature Management & Experimentation Platform that reimagines s…
C
Cyber Security Headlines


1
FDIC cyber risk improvements, high-risk containers, record crypto hacks
6:55
6:55
Play later
Play later
Lists
Like
Liked
6:55
Watchdog calls for improved bank cyber testing Containers hold high-risk vulnerabilities 2022 set a record for crypto hacks Thanks to this week's episode sponsor, Hunters Hunters is a complete SOC platform, purpose built for your Security Operations team. Hunters’ brand new IOC Search is a game-changing search tool that determines if a known ‘Indic…
Mike Acton gave a talk at the Game Developer’s Conference back in 2019. In that talk he detailed behaviors that he expects from developers he works with regularly. They are positive statements that he then discusses the problems arising from a lack of each behavior. In a previous episode we reacted to the first half of Mr. Acton’s list. We gave our…
J. Bennett from Signifyd discusses the fraud ring that has launched a war on commerce against US merchants over the past few months. Joe and Dave share some listener follow up from Jon who writes in about an email he almost fell victim to. Joe shares two stories this week, the first on how scammers were seen posing as tech support at two US agencie…
In “Lead Without Blame: Building Resilient Learning Teams” Diana Larsen and Tricia Broderick present tools, techniques, and strategies you can employ to transform the way you approach leading teams. Throughout the book, they present case studies and examples from their own experiences that showcase the impact you can have by fostering a psychologic…
.
.NET Rocks!


1
Clean Architecture in 2023 with Steven Smith
56:01
56:01
Play later
Play later
Lists
Like
Liked
56:01
How is clean architecture evolving? Carl and Richard talk to Steve Smith about his efforts to build applications using clean architecture principles. The conversation starts with a comment from a listener about idealism around architecture - and a reminder that while there isn't one right way to do anything, using existing work, like clean architec…
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
ISC StormCast for Thursday, February 2nd, 2023
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14
Detecting Malicious OneNote Files https://isc.sans.edu/diary/Detecting%20%28Malicious%29%20OneNote%20Files/29494 Microsoft Defender Device Isolation for Linux https://techcommunity.microsoft.com/t5/microsoft-defender-for-endpoint/announcing-device-isolation-support-for-linux/ba-p/3676400 SH1MMER Exploit for Chromebooks https://sh1mmer.me DOMPDF SVG…
C
CyberWire Daily


1
How the C2C market sustains ransomware gangs. In Russia’s war, intelligence services deploy wipers, and hacktivist auxiliaries handle the DDoS. And a look into other corners of the cyber underworld.
32:34
32:34
Play later
Play later
Lists
Like
Liked
32:34
Microsoft tallies more than a hundred ransomware gangs. Sandworm's NikoWiper hits Ukraine's energy sector. Mobilizing cybercriminals in a hybrid war. Firebrick Ostrich and business email compromise. Telegram is used for sharing stolen data and selling malware. Crypto scams find their way into app stores. Bryan Vorndran of the FBI Cyber Division out…
On January 31, a court in Iran handed out a combined sentence of 10 years to a couple who danced outside of Azadi Tower in Tehran, Iran. A film of the brief dance went viral on Instagram and Twitter. They’re 21 and 22 years old. The woman was not wearing a hijab. The long sentence for a viral post is part of a pattern in Iran. In response to protes…
A
Agile Coaches' Corner


1
Consider the Definition of Done when forecasting your releases
3:36
3:36
Play later
Play later
Lists
Like
Liked
3:36
In this episode, Eric Landes addresses a question about how the Definition of Done impacts Release Planning. If you are interested in attending Scrum training, check out our public Scrum training courses. Does the Definition of Done help the PO in Release planning? In a recent class, the idea of how the Definition of Done (DoD) affects a release pl…
W
WIRED Security: News, Advice, and More


1
Most Criminal Cryptocurrency Funnels Through Just 5 Exchanges
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13
The crypto money-laundering market is tighter than at any time in the past decade, and the few big players are moving a “shocking” amount of currency.
D
DevOps Paradox


1
DOP 196: Simplifying Performance Optimization Using Granulate
35:29
35:29
Play later
Play later
Lists
Like
Liked
35:29
#196: Where do you start when you work on optimizing the performance of your application? The number of options can seem overwhelming. Do you start with memory, CPU, network, or somewhere else? Even if you get it right, it's only right for right now and not next week when you release a new version of your application, at which point you start the p…
In this episode of Syntax, Wes and Scott talk through what ESM is, and why you want to move your projects to ESM. Sentry - Sponsor If you want to know what’s happening with your code, track errors and monitor performance with Sentry. Sentry’s Application Monitoring platform helps developers see performance issues, fix errors faster, and optimize th…
C
Cybersecurity Today


1
Cyber Security Today, Feb. 1, 2023 - Microsoft tracks 100 gangs using ransomware, Google Fi customer data is copied and more
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25
This episode reports on the latest DocuSign scam, YouTube channels hacked for cryptocoin fraud, another warning to open source code repositories and moreBy ITWC
V
VoxDev Development Economics


1
S3 Ep3: Did joint ventures help China’s auto business?
28:17
28:17
Play later
Play later
Lists
Like
Liked
28:17
When FDI mandates joint ventures foreign firms get market access, and their local partners get access to knowledge and technology in return. Does the policy benefit the host economy and its consumers more than other forms of FDI would have done? Jie Bai of Harvard Kennedy School talks to Tim Phillips.…
C
Cyber Security Headlines


1
Microsoft phishers are 'Verified' Cloud Partners, DocuSign brand impersonation attack, Google Fi data breach
7:00
7:00
Play later
Play later
Lists
Like
Liked
7:00
Microsoft grants phishers 'Verified' Cloud Partner status DocuSign brand impersonation attack targets thousands of users Google Fi says hackers accessed customer information Thanks to this week's episode sponsor, Hunters Hunters is a SaaS platform, purpose built for your Security Operations team. Solaris Group, a leading German FinTech, implemented…
A conversation about all the conversations we aren't having about Roblox. Featuring Quintin Smith of People Make Games. Check out How to Fix the Internet by the EFF: https://www.eff.org/podcast Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy Sticks & Stones
S
Security Now (Audio)


1
SN 908: Data Operand Independent Timing - Old Android apps, Kevin Rose, iOS 6.3 and FIDO, Hive hacked
1:44:48
1:44:48
Play later
Play later
Lists
Like
Liked
1:44:48
Android to start blocking old and unsafe apps. Microsoft to block Internet sourced Excel add-ins. An example of saying "no" even when it may hurt. Hacked Wormhole funds on the move. Kevin Rose Hacked. Facebook will be moving more users into E2EE. iOS 6.3 and FIDO. Scan thy Citizenry. The Hive ransomware organization takedown. Errata. Closing the Lo…
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
ISC StormCast for Wednesday, February 1st, 2023
7:43
7:43
Play later
Play later
Lists
Like
Liked
7:43
DShield Honeypot Setup with pfSense https://isc.sans.edu/diary/DShield%20Honeypot%20Setup%20with%20pfSense/29490 Threat Actors Abusing Microsoft's "Verified Publisher" Status https://www.proofpoint.com/us/blog/cloud-security/dangerous-consequences-threat-actors-abusing-microsofts-verified-publisher PoS Malware Can Block Contactless Payments https:/…
S
Software Engineering Daily


1
Dev-First Kubernetes Operations Platform with Itiel Shwartz
40:23
40:23
Play later
Play later
Lists
Like
Liked
40:23
Kubernetes is an open-source platform for automating the deployment, scaling, and management of containerized applications. The company Komodor started as a Kubernetes diagnostics platform focusing on Kubernetes troubleshooting for the entire Kubernetes stack. More recently, Komodor is taking a step towards becoming a single-pane-of-glass to simpli…
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including: A look at the Hive takedown UK’s Royal Mail still struggling GitHub’s code signing certificates stolen TSA misses the point on no-fly list theft Much, much more This week’s show is brought to you by Remediant, which is now a part of Netwrix. Tim Keeler is…
C
CyberWire Daily


1
The cybercriminal labor market and the campaigns it’s supporting. Russia’s Killnet is running DDoS attacks against US hospitals, but Russia says, hey, it’s the real victim here.
30:30
30:30
Play later
Play later
Lists
Like
Liked
30:30
Some perspective on the cybercriminal labor market. DocuSign is impersonated in a credential-harvesting campaign. Social engineering pursues financial advisors. Killnet is active against the US healthcare sector. Mr. Security Answer Person John Pescatore has thoughts on cryptocurrency. Ben Yelin and I debate the limits of section 230. And, hey, who…
C
CISO Series Podcast


1
Let’s Pretend We’re Getting Hacked. Who Wants to Panic First?
45:02
45:02
Play later
Play later
Lists
Like
Liked
45:02
All links and images for this episode can be found on CISO Series. Tabletop exercises are critical procedures to learn how everyone will react during an actual attack. Panic is usually the first response, so why don't we do that when we're playing our pretend game of getting our business compromised by a nefarious hacker? This week's episode of CIS…
W
WIRED Security: News, Advice, and More


1
The Flight Tracker That Powered @ElonJet Just Took a Left Turn
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28
ADS-B Exchange, beloved for resisting censorship, was sold to a company owned by private equity—and now even its biggest fans are bailing.
C
Click Here


1
52. SPECIAL FEATURE: Shoot the Messenger: Espionage, Murder & Pegasus Spyware
45:39
45:39
Play later
Play later
Lists
Like
Liked
45:39
“Shoot The Messenger” from Exile Content Studio and PRX looks at what happened to the murdered Washington Post journalist Jamal Khashoggi. The first weapon used against him was digital - a sophisticated spyware called Pegasus.By Recorded Future News
A team responsible for responding to and managing cybersecurity incidents involving computer systems and networks in order to minimize the damage and to restore normal operations as quickly as possible. CyberWire Glossary link: https://thecyberwire.com/glossary/cirt Audio reference link: Avery, B., 2017. 24 TV May 05 Season4 [WWW Document]. YouTube…
C
Cyber Security Headlines


1
Criminal crypto flows, TikTok CEO heads to the House, Killnet launches German DDoS
6:31
6:31
Play later
Play later
Lists
Like
Liked
6:31
Criminal crypto goes through 5 exchanges TikTok CEO heads to the House KillNet launches German DDoS Thanks to this week's episode sponsor, Hunters The Hunters SOC Platform helps your security team identify, understand, triage, and respond to incidents at a much faster pace. ChargePoint, the world's largest network of electric vehicle charging stati…
D
Developer Tea


1
Demystifying Purpose by Focusing On Your Purpose For Today
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35
You don't need to overthink purpose. Focus on clarity, and finding your underlying motivation. That clarity can be short-lived; purpose is a dynamic and powerful force, but only if you hold it lightly. 📮 Ask a Question If you enjoyed this episode and would like me to discuss a question that you have on the show, drop it over at: developertea.com. 📮…
Naturally, tech layoffs are top-of-mind for many of us. Despite comparisons to the dot-com bubble, what we’re seeing right now is different. Here’s what the tech and media layoffs really tell us about the economy. In praise of analog technology: why Millennials and Gen Z are springing for paper maps. Make Time, a way of “rethinking the defaults of …
This week I talk about how to approach investigations involving remote desktop connections.
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
ISC StormCast for Tuesday, January 31st, 2023
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13
Decoding DNS over HTTP(s) Requests https://isc.sans.edu/diary/Decoding%20DNS%20over%20HTTP%28s%29%20Requests/29488 Action Needed for GitHub Desktop and Atom Users https://github.blog/2023-01-30-action-needed-for-github-desktop-and-atom-users/ GitHub Checksum Mismatches for .tar.gz Files https://github.com/orgs/community/discussions/45830 Facebook 2…
C
CyberWire Daily


1
Criminal evolutions, disgruntled insiders, and gangsta wannabes. New wiper attacks hit Ukrainian targets, with less effect than the first rounds early last year. And support your local hacktivist?
26:15
26:15
Play later
Play later
Lists
Like
Liked
26:15
Gootloader's evolution. Yandex source code leaked (and Yandex blames a rogue insider). New GRU wiper malware is active against Ukraine. Latvia reports cyberattacks by Gamaredon. Russia and the US trade accusations of malign cyber activity. A hacktivist auxiliary's social support system. Deepen Desai from Zscaler describes the Lilithbot malware. Ric…
A
Azure DevOps Podcast


1
Philip Japikse: Professional C# in .NET - Episode 230
44:32
44:32
Play later
Play later
Lists
Like
Liked
44:32
An international speaker, Microsoft MVP, ASPInsider, MCSD, PSM II, PSD, and PST, and a passionate member of the developer community, Phil has been working with .NET since the first betas, developing software for over 35 years, and heavily involved in the agile community since 2005 as well as a Professional Scrum Trainer. Phil has taken over the bes…
m
mozaic.fm


1
ep113 Monthly Platform 202301 | mozaic.fm
3:36:28
3:36:28
Play later
Play later
Lists
Like
Liked
3:36:28
第 113 回のテーマは 2023 年 1 月の Monthly Platform です。Show Note はこちら: https://mozaic.fm/episodes/113/monthly-platform-202301.htmlBy Jxck
S
Soft Skills Engineering


1
Episode 341: Offer rescinded and layoff stuff
27:46
27:46
Play later
Play later
Lists
Like
Liked
27:46
In this episode, Dave and Jamison answer these questions: I am an American student finishing my undergraduate degree in computer science in the Midwest this semester. I am concerned about the economic climate of the technology industry. I am doing my second internship at a major technology company this summer (Microsoft). After that I will go to gr…
W
WIRED Security: News, Advice, and More


1
You Might Survive a Nuclear Blast—if You Have the Right Shelter
8:21
8:21
Play later
Play later
Lists
Like
Liked
8:21
The escalating risks of Russia’s war in Ukraine have led scientists to study the unthinkable and model the aftermath of nuclear detonation.
In this Hasty Treat, Scott and Wes talk through their wishlist for CSS in 2023 including mixins, range selectors, fit text, robust color functions, overflown, and more. Show Notes 00:26 Welcome 01:09 Snow skate update 03:01 Mixins 05:06 Range selector 09:36 :first-of-column :last-of:column / row Ability to target items in nth-row of autofilled, imp…
S
ShopTalk


1
550: Sanity with Simen Svelll and Espen Hovlandsdal
1:02:24
1:02:24
Play later
Play later
Lists
Like
Liked
1:02:24
Simen and Espen from Sanity stop by to talk about the origins of Sanity, how Sanity Studio works, good use cases for Sanity, how Sanity does real time updates, what Groq is, and where to start with Sanity.By ShopTalk
C
Cybersecurity Today


1
Cyber Security Today, Jan, 30, 2023 - A new data wiper discovered, patches for Lexmark printers and BIND are issued and more
6:33
6:33
Play later
Play later
Lists
Like
Liked
6:33
This episode reports on the need to protect Active Directory, a patching strategy for ICS devices, a warning to VMware admins and moreBy ITWC