show episodes
 
Artwork

1
Hacked

Hacked

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
  continue reading
 
Artwork

1
Error Code

Robert Vamosi

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
  continue reading
 
The world of application development moves quickly. New tools, new processes, and new threats are always popping up. Through enlightening interviews with industry leaders, From Code to the Cloud helps you stay on top of new developments in Low Code and Salesforce DevOps.
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
As more and more organizations continue to adopt low code as a standard practice for solution development, information technology professionals find themselves learning new skills, translating professional development skills into low code tools and implementing governance and service management strategies. Learn from Microsoft MVPs, Microsoft Product team members, and Microsoft Power Platform users how they approached building solutions using Microsoft Power Platform.
  continue reading
 
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
  continue reading
 
Artwork

1
The Security Circle

Yolanda Hamblen (Yoyo)

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
  continue reading
 
Artwork

1
Code WACK!

HEAL California

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Code WACK! shines a light on our callous healthcare system and what we can do about it. It reveals the healthcare hassles that - far from being just annoying - threaten our peace of mind, our financial security and at times, our very lives. Join us each week as we chat about the challenges that patients and healthcare providers face, amplifying their voices and examining a range of possible solutions, including Medicare for All. Powered by HEAL California, a project of the California OneCare ...
  continue reading
 
Artwork

1
Law of Code

Jacob Robinson

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The Law of Code podcast focuses on the legal framework being built around blockchains, crypto, NFTs, and DAOs. We’ll look at crypto regulations, rights surrounding NFTs, as well as the legislation impacting blockchain. You’ll hear from the top lawyers, lawmakers, and entrepreneurs in the space – we’ll touch on best practices countries are implementing, new regulations, and share ideas on the best path forward.
  continue reading
 
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
  continue reading
 
Artwork

1
Redefining CyberSecurity

Sean Martin, ITSPmagazine

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
  continue reading
 
Artwork

1
Beyond the Code

Yitzy Hammer

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Welcome to Beyond the Code, the podcast where we dive into the legal, regulatory, and ethical issues surrounding emerging technologies. Each week, we bring you in-depth conversations with industry experts, discussing the latest advancements in technology and their implications on society and the legal system. From artificial intelligence to blockchain, we'll be exploring all the hot topics in the field. Your host, Yitzy Hammer, a lawyer and tech enthusiast, is joined by a diverse group of ex ...
  continue reading
 
Artwork

1
The Security Table

Izar Tarandach, Matt Coles, and Chris Romeo

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
  continue reading
 
Artwork
 
Join millions of listeners tuning into The Kim Komando Show, the award-winning weekly radio program airing on over 420 stations nationwide and available on-demand. Kim Komando, the trusted digital expert, brings you the latest cutting-edge gadgets, urgent tech news, and vital privacy tips to keep you secure online. Every hour, Kim engages with callers, tackling a wide array of digital life challenges. Don’t be left behind in the ever-evolving tech world. Listen just once and you'll be hooked ...
  continue reading
 
Artwork

1
You Gotta Hack That

You Gotta Hack That

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
  continue reading
 
Artwork

1
DevSecOps Cracking The Code

devsecopscrackingthecode

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
  continue reading
 
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
  continue reading
 
Artwork

4
Bitunix Referral Code "d1c9qu" – Earn Up to 5500 USDT and 10% Off Fees

Bitunix Referral Code "d1c9qu" – Earn Up to 5500 USDT and 10% Off Fees

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
Unlock exclusive rewards when you use the Bitunix referral code "d1c9qu". By registering with this code, you can receive up to 5500 USDT in bonuses and enjoy a 10% discount on trading fees. Here’s how you can take advantage of these offers and start trading on Bitunix. How to Use the Bitunix Referral Code "d1c9qu" Sign Up: Visit the Bitunix website and create an account by providing your email address and setting a secure password. Enter the Referral Code: When prompted, enter "d1c9qu" to un ...
  continue reading
 
Artwork

1
The Hacker's Cache

Kyser Clark - Cybersecurity

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
  continue reading
 
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
  continue reading
 
Artwork

1
Code Patrol

Contrast Security

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Code Patrol scrutinizes the month’s tech scene with code-colored glasses. Computer security industry veteran Lisa Vaas chats with guests about all things security — be it cybercrime, hacking, DevSecOps, and beyond — that collide with the code that runs the world.
  continue reading
 
Artwork
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Exness provides traders and affiliates with one of the most rewarding rebate programs in the forex industry. By using the Exness Partner Code ”l3fesph7”, you can earn up to 90% daily rebates automatically, allowing you to maximize your earnings effortlessly. Whether you’re a trader looking for cashback on your trades or an affiliate aiming to boost commissions, Exness offers a flexible and highly profitable system that ensures you get the best returns. Why Use the Exness Partner Code ”l3fesp ...
  continue reading
 
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
The CyberGov Podcast is dedicated to providing government contractors with the latest cybersecurity best practices, industry news, and actionable insights. Our mission is to help businesses safeguard their operations, stay informed about emerging threats, and effectively navigate the complexities of providing services to the government. Through expert interviews, in-depth analysis, and practical advice, we aim to build a more secure and resilient government contracting community.”
  continue reading
 
Artwork

1
Thinking Elixir Podcast

ThinkingElixir.com

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The Thinking Elixir podcast is a weekly show where we talk about the Elixir programming language and the community around it. We cover news and interview guests to learn more about projects and developments in the community. Whether you are already experienced with Elixir or just exploring the language, this show is created with you in mind. We discuss community news, Functional Programming, transitioning from OOP, coding conventions, and more. Guests visit the show to help challenge our ass ...
  continue reading
 
Artwork
 
Join Matias Madou for the interview series that brings the world's leading cybersecurity experts, educators, and academics to your living room. Chatting about all things software security, secure coding and the industry at large, it's the podcast for security enthusiasts everywhere.
  continue reading
 
Welcome to DC Pension Geeks, a conversation with top retirement-related policymakers and regulators in and around Washington. Hosted by Brian Graff, an attorney, accountant, former Capitol Hill staffer, and now CEO of the American Retirement Association, it’s an inside view of the ups and downs, ins and outs and sometimes surprising turns Washington takes on the road to ensuring a secure retirement for millions of hard-working Americans.
  continue reading
 
Loading …
show series
 
A broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 0…
  continue reading
 
Send us a text Summary of Episode: 🎙️ Episode Summary: Jonathan Perillo on Purpose, Mentorship, and the Evolving Security Industry Introduction & Background Jonathan shares his journey from joining the U.S. Marines post-9/11 to building a career in private security. His early interest in the Coast Guard shifted to the Marines after meeting a recrui…
  continue reading
 
On March 26, 2025,⁠ ⁠Collider. VC⁠⁠ hosted⁠ ⁠Building Blocks 2025⁠⁠, as part of ETH TLV. Our host,⁠ ⁠Yitzy Hammer⁠⁠ was invited to come and interview guests and speakers. Live from Building Blocks at Jaffa Port in Tel Aviv, Yitzy interviews Josh Schwartz, CEO and Co-Founder of FORDeFi, about bridging the gap between traditional finance and decentra…
  continue reading
 
Protecting Salesforce digital experiences is critical to delivering the seamless, secure services your customers expect. Join Justin Hazard, Principal Security Architect at AutoRABIT, and Matt Meyers, Salesforce Certified Technical Architect and CEO of Adaptus, as they dive into the challenges and strategies for safeguarding Salesforce digital expe…
  continue reading
 
In this conversation, Felix and Oli discuss the development of a hydrogen-powered uncrewed surface vessel (USV) and the associated cybersecurity challenges. They explore the importance of integrating cybersecurity measures from the outset, navigating regulatory frameworks like Workboat Code 3, and the ongoing challenges of ensuring compliance and s…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley discusses several pressing concerns in the cybersecurity landscape. Attackers have been exploiting Fortinet VPN devices to maintain access even after patches were applied; administrators are urged to upgrade and follow recovery guidance. Microsoft has created a new INET Pub folder through i…
  continue reading
 
In this episode of The Low Code Approach, we are joined by Mihaela Blendea and Shawn Nandi to dive into the transformative world of Managed Security for Microsoft Power Platform. Discover how this suite of advanced security features is revolutionizing the way organizations protect their data, manage access, and ensure compliance in an AI-driven era…
  continue reading
 
In this episode of the mnemonic security podcast, Robby is joined by Ricardo Ferreira, CISO EMEA at Fortinet, to explore the power of policy as code and its role in technical resilience. Ferreira explains how organisations can move beyond manual processes to automate security policies, reduce complexity, and enhance agility. They discuss cloud tran…
  continue reading
 
Vibe coding, or using AI to generate code by describing what you want. We critically examine the concerns surrounding AI-generated code, including code quality, security risks, and the potential for creating numerous low-quality applications. Our discussion explores whether AI can truly provide foolproof, production-ready code, or if it should be l…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley discusses the FBI's report on cybercrime losses in 2024, which reached a record $16.6 billion, marking a 33% increase from the previous year. The report highlights major types of cyber crimes such as phishing, spoofing, extortion, and investment fraud, with older adults being significantly …
  continue reading
 
Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
  continue reading
 
On March 26, 2025,⁠ ⁠Collider. VC⁠⁠ hosted⁠ ⁠Building Blocks 2025⁠⁠, as part of ETH TLV. Our host,⁠ ⁠Yitzy Hammer⁠⁠ was invited to come and interview guests and speakers. In the last of the Building Blocks Conversations, Yitzy Hammer sat down with Adam Benayoun, managing partner at Collider, to unpack the highlights and aspirations emerging from Bu…
  continue reading
 
Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
  continue reading
 
On April 25, 2020, Geertjan Wielenga published the first Foojay post. Yes, we are celebrating 5 years since the Friends Of OpenJDK website launch! Today, more than 1,600 posts are on the site, written by over 250 authors. And there is much more to discover within the Foojay world... In this podcast, we look at how Foojay started with founder Geertj…
  continue reading
 
Kendall Miller is a bubbly extrovert who sticks his fingers in a lot of pies. He advises tech companies like FusionAuth, positions tech products like Civo & Tensorlake, organizes tech networks like CTO Lunches, and even sells whiskey & gin to tech people like us via his Friday Deployment Spirits brand. Kendall has learned a lot since he first enter…
  continue reading
 
Today we delve into the evolving landscape of cybersecurity hiring, debating the merits of prioritizing skills over degrees and experience. From discussing the value of critical thinking and hands-on skills to the potential role of AI in the workforce, the conversation navigates the complexities of hiring practices. We share personal anecdotes, ins…
  continue reading
 
In this episode of 'Cybersecurity Today,' host Jim Love discusses various pressing topics in the realm of cybersecurity. Highlights include Anthropic's prediction on AI-powered virtual employees and their potential security risks, Microsoft’s introduction of AI security agents to mitigate workforce gaps and analyst burnout, and a pivotal court ruli…
  continue reading
 
This episode shines a light on abuse.ch, a vital non-profit project built by and for the global cybersecurity community. We chat with founder Roman Huessy about the collective effort behind tracking malware and botnets for over a decade. Discover the journey of maintaining a crucial shared resource—the technical challenges of hosting an open platfo…
  continue reading
 
In this episode of The Hacker’s Cache, Matthew Younker (aka Zumi Yumi) shares the raw truth about what it really took to break into offensive security, working full time, going to college, and grinding for OSCP with almost zero rest. He opens up about the unhealthy sacrifices he made, why OSWA was harder than OSCP, and how his journey from Army haz…
  continue reading
 
xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
  continue reading
 
In this episode, Jacob Robinson is joined by Dr. Chris Brummer (@ChrisBrummerDr), Professor of Financial Technology at Georgetown Law and Founder & CEO of Bluprynt, an AI and blockchain-powered platform for automating regulatory disclosures. Together, they unpack the SEC’s recent statement: Offerings and Registrations of Securities in the Crypto As…
  continue reading
 
Ok, so vulnerable MCP tools are a thing now? Ken demonstrates installing and running an intentionally vulnerable MCP server with a bunch of example issues. Following is a discussion of the recent article and research around hallucinations of 3rd party dependencies/libraries in AI-Generated Python and JavaScript. New attack targets all dependent on …
  continue reading
 
Copilot and agent news is coming out all the time. How does one keep track? What's new? What's happening? Thomas Abel, Director of Product Marketing for Microsoft Copilot Studio joins Ken and Sean for a must listen episode on all the news for agents and Microsoft Copilot Studio.By Microsoft
  continue reading
 
News includes EEF board elections with voting beginning May 9th, Gleam v1.10.0 enhancing security with SBoMs and SLSA build provenance, an AshAuthentication vulnerability with mitigation steps, the Elixir Secure Coding Training project finding a permanent home at the EEF, announcements for both ElixirConf US 2025 in Orlando and ElixirConfEU in Krak…
  continue reading
 
Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
  continue reading
 
What does it take to defend 32 nations across five domains in an era of AI, quantum, and nation-state threats? In this episode of Code and Country, we sit down with NATO’s first-ever CIO and CISO, Manfred Boudreaux-Dehmer, for an inside look at the alliance’s approach to cybersecurity, digital transformation, and geopolitical defense. We explore wh…
  continue reading
 
Guest Info: Name: Bronwen Aker Contact Information (N/A): https://br0nw3n.com/ Time Zone(s): Pacific, Central, Eastern –Copy begins– Disclaimer: The views, information, or opinions expressed on this program are solely the views of the individuals involved and by no means represent absolute facts. Opinions expressed by the host and guests can change…
  continue reading
 
On March 26, 2025,⁠ ⁠Collider. VC⁠⁠ hosted⁠ ⁠Building Blocks 2025⁠⁠, as part of ETH TLV. Our host,⁠ ⁠Yitzy Hammer⁠⁠ was invited to come and interview guests and speakers. Live from Building Blocks at Jaffa Port in Tel Aviv, Yitzy interviews Ben Samocha, the founder of Crypto Jungle, discussing the evolution of the platform, its role in the Israeli …
  continue reading
 
It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL. https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%2…
  continue reading
 
We drop our fourth Changelog Beats album, Dex Horthy proposes the 12-factor AI agent, Thorsten Ball takes us step-by-step through building a coding agent, Zachary Huang builds an LLM framework in 100 lines of code & Philip Laine’s Spegel project gets unknowingly forked by Microsoft. View the newsletter Join the discussion Changelog++ members save 1…
  continue reading
 
This week on CodeWACK! The Wyoming legislature effectively shut down the only surgical abortion clinic in the state. How did it use "TRAP" (Targeted Regulations Against Abortion Providers) as its legislative strategy? And how does this make getting an abortion even more challenging for residents in Wyoming and nearby states that have abortion bans?…
  continue reading
 
Cybersecurity Today: Allegations Against Elon Musk, Microsoft Lockout Issues, Cozy Bear's New Malware, and Canada's Anti-Fraud Proposals In this episode of Cybersecurity Today, hosted by David Shipley, we examine several major cybersecurity stories. A whistleblower accuses Elon Musk's team's involvement in a significant cyber breach at the National…
  continue reading
 
In this episode, Robby speaks with Harry Wetherald, Co-Founder and CEO of the security platform Maze, about the current wave of LLM innovation in security and how to separate real progress from marketing fluff. Drawing on his experience building security products, Wetherald shares how large language models are changing the way we approach vulnerabi…
  continue reading
 
Ever worry about what will happen to your bitcoin after you die? On March 26, 2025,⁠ ⁠⁠Collider.⁠ hosted⁠ ⁠⁠Building Blocks 2025⁠⁠⁠, as part of ETH TLV. Our host,⁠ ⁠⁠Yitzy Hammer⁠⁠⁠ was invited to come and interview guests and speakers. Live from Building Blocks at Jaffa Port in Tel Aviv, Yitzy sits down with Eyal Gruper, Co-Founder of Peaceful21, …
  continue reading
 
Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widesp…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play