Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Learn from the superstars turning content into cash! From social media influencers to small local businesses, people everywhere are harnessing the power of creative tools to design not just brands and content, but also deeply satisfying careers. In the Making explores the practical challenges and surprising rewards of working in this new creator economy. Join Adobe’s Teresa Au for conversations with content creators, solopreneurs, and industry experts who offer inspiration and insight for co ...
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Technical interviews about software topics.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
A podcast about web design and development.
…
continue reading
1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Become the best software developer you can be
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
se-radio@computer.org
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Daily update on current cyber security threats
…
continue reading
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Technical interviews about software topics.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
The State and Popular Culture
…
continue reading
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
…
continue reading
Level up your .NET skills with our weekly discussion of C# and other Microsoft technologies for developers. Become a supporter of this podcast: https://www.spreaker.com/podcast/adventures-in-net--6102015/support.
…
continue reading
A podcast featuring panelists of engineers from Netflix, Twitch, & Atlassian talking over drinks about all things software engineering.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
A podcast about modern UI development on the web. Hosted by Sam Selikoff and Ryan Toronto.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
Troubleshooting Agile is a problem-solving session for agile teams. Jeffrey Fredrick and Douglas Squirrel look at common problems agile teams face and provide practical, immediately useful advice for getting back on track.
…
continue reading
next generation web podcast
…
continue reading
Joe and various hosts from the Late Night Linux Family answer your questions. The catch is we aren’t allowed to talk about Linux or open source. Episodes are released two weeks early on Patreon.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
…
continue reading
1
SE Radio 643: Ganesh Datta on Production Readiness
53:15
53:15
Play later
Play later
Lists
Like
Liked
53:15
Ganesh Datta, co-founder of Cortex.io, joins host Robert Blumen for a conversation about production readiness. The conversation covers the history of production readiness; its relationship to microservice architecture; the Google SRE model's impact on production readiness; production readiness checklists; the process; and production readiness trans…
…
continue reading
1
Two tickets for Departure, please (Interview)
1:47:32
1:47:32
Play later
Play later
Lists
Like
Liked
1:47:32
Today we’re joined by a dynamic duo, Helena Zhang & Tobias Fried, who team up on all sorts of digital passion projects. This includes the wildly popular Phosphor Icons plus their latest joint, Departure Mono, a monospaced pixel font with a lo-fi technical vibe… that both Adam & Jerod are pretty much in love with. We discuss their tastes & inspirati…
…
continue reading
1
Scattered Spider arrest, telcos attacked, Apple exploit
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04
US charges Scattered Spider members Chinese threat actors infiltrate more telcos Apple issues emergency security update Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a proactive, default-de…
…
continue reading
1
Can regulations keep up with rapid innovation?
50:06
50:06
Play later
Play later
Lists
Like
Liked
50:06
This week, Danny Allen, Snyk's CTO, discusses how AI regulations are influencing both the security of AI tools and the broader software ecosystem and the emphasis on compliance with security standards. This comes on the heels of a recent report which found that the majority of security leaders have begun contemplating banning the use of AI in codin…
…
continue reading
On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there. This week, Joe shares a note from listener Micha…
…
continue reading
Let's talk about .NET 9 with one of the platform's leaders! Carl and Richard talk to Glenn Condron about his experiences building .NET 9. Glenn talks about the usual improvements in every version of .NET, including performance, security, and stability. But the new stuff is where the excitement is, starting with Aspire. The conversation digs deeper …
…
continue reading
In our latest episode we discuss how a woman hid under the bed after scammers told her she was under "digital arrest", how hackers are hijacking YouTube channels through malicious sponsorship deals, and how one phone company is turning the tables on fraudsters through deepfake AI. All this and much much more is discussed in the latest edition of th…
…
continue reading
A WIRED investigation uncovers the ease of tracking U.S. military personnel. Apple releases emergency security updates to address actively exploited vulnerabilities. Latino teenagers and LGBTQ individuals are receiving disturbing text messages spreading false threats. Crowdstrike says Liminal Panda is responsible for telecom intrusions. Oracle patc…
…
continue reading
1
850: Manage State in JavaScript Like a Pro!
1:02:00
1:02:00
Play later
Play later
Lists
Like
Liked
1:02:00
Scott and Wes serve up state management in JavaScript, breaking down key concepts like reactive state, state updaters, and global vs local state. They also explore various approaches and libraries, mutation-based state, and tools like Zustand and xState, to help you manage state like a pro. Show Notes 00:00 Welcome to Syntax! 01:22 Brought to you b…
…
continue reading
1
DOP 290: KubeCon North America 2024 Review
38:40
38:40
Play later
Play later
Lists
Like
Liked
38:40
#290: Darin catches up with Viktor and Whitney Lee just minutes after they've finished up at KubeCon NA 2024. We discuss the good things and bad things that they experienced while in Salt Lake City. YouTube channel: https://youtube.com/devopsparadox Review the podcast on Apple Podcasts: https://www.devopsparadox.com/review-podcast/ Slack: https://w…
…
continue reading
CRV is a venture capital firm that invests in early-stage startups. The firm has invested in more than 600 startups including Airtable, DoorDash and Vercel. James Green is a general partner at CRV where he is known for investing in startups focused on security, infrastructure and financial services. He joins the show to talk about his path into tec…
…
continue reading
CRV is a venture capital firm that invests in early-stage startups. The firm has invested in more than 600 startups including Airtable, DoorDash and Vercel. James Green is a general partner at CRV where he is known for investing in startups focused on security, infrastructure and financial services. He joins the show to talk about his path into tec…
…
continue reading
We react to Microsoft's new vision for the desktop PC, discuss the realities of working with large dependency chains in your projects, and discuss Google selling off Chrome. Then, we read some spicy tech CEO emails! Sponsored By: Mission Control: UK-based Mission Control can build Flutter and React Apps for companies big and small, including Fortun…
…
continue reading
1
Easterly to step down, Maxar discloses breach, Microsoft hacking event
7:57
7:57
Play later
Play later
Lists
Like
Liked
7:57
CISA director Jen Easterly to step down Space tech giant Maxar discloses employee data breach Microsoft launches Zero Day Quest hacking event Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a…
…
continue reading
1
Microsoft Unveils New Cybersecurity Features at Ignite Conference: Cyber Security Today for November 20, 2024
9:01
9:01
Play later
Play later
Lists
Like
Liked
9:01
Cybersecurity Today: Microsoft Updates, Gen AI Risks, and Liminal Panda Threat In this episode of Cybersecurity Today, host Jim Love discusses major cybersecurity updates from Microsoft's Ignite conference, including enhancements to Windows security and device recovery. A survey by LegitSecurity highlights the security risks associated with generat…
…
continue reading
APT-10 is a Chinese nation-state threat actor that in recent years has been targeting Japanese IT & Instrastructure organizations using a sophisticated backdoor malware known as LODEINFO. Recently, Jin Ito & Loic Castel, researchers from Cybereason's IR Team, uncovered a new tool used by the group: NOOPDOOR, which incorporates highly sophisticated …
…
continue reading
1
SN 1001: Artificial General Intelligence (AGI) - Gmail Temp Addresses, Russia's Internet Off Switch
2:25:09
2:25:09
Play later
Play later
Lists
Like
Liked
2:25:09
How Microsoft lured the US Government into a far deeper and expensive dependency upon its cybersecurity solutions. Gmail to offer native throwaway email aliases like Apple and Mozilla. Russia to ban several additional hosting companies and give its big Internet disconnect switch another test. Russia uses a diabolical Windows flaw to attack Ukrainia…
…
continue reading
1
Risky Business #771 -- Palo Alto's firewall 0days are very, very stupid
1:01:12
1:01:12
Play later
Play later
Lists
Like
Liked
1:01:12
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Microsoft introduces some sensible sounding post-Crowdstrike changes Palo Alto patches hella-stupid bugs in its firewall management webapp CISA head Jen Easterly to depart as Trump arrives AI grandma tarpits phone scammers in family-tech-support hell…
…
continue reading
1
ISC StormCast for Wednesday, November 20th, 2024
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12
Detecting the Presence of a Debugger in Linux https://isc.sans.edu/diary/Detecting%20the%20Presence%20of%20a%20Debugger%20in%20Linux/31450 Palo Alto Patches https://security.paloaltonetworks.com/CVE-2024-0012 https://security.paloaltonetworks.com/CVE-2024-9474 VMware vCenter Server Attacks https://support.broadcom.com/web/ecx/support-content-notifi…
…
continue reading
Would you delete your unfinished work to ensure a fresh start? On this week’s episode, Jeffrey and Squirrel discuss whether using deletion as a tool can provide focus and improvement, with help from Grant Slatton's provocative article 'Algorithms We Develop Software By’Links: - Grant's article; https://grantslatton.com/software-pathfinding#algorith…
…
continue reading
1
Biden vs. Trump: A tale of two cybersecurity strategies.
34:27
34:27
Play later
Play later
Lists
Like
Liked
34:27
Pundits predict Trump will overhaul U.S. cybersecurity policy. Experts examine escalating cybersecurity threats facing the U.S. energy sector. Palo Alto Networks patches a pair of zero-days. Akira and SafePay ransomware groups claim dozens of new victims. A major pharmacy group is pressured to pay a $1.3 million ransomware installment. Threat actor…
…
continue reading
1
Once You Show Me Your Diploma, I’ll Explain Why We Don’t Gatekeep
39:47
39:47
Play later
Play later
Lists
Like
Liked
39:47
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Jimmy Benoit, vp, cybersecurity, PBS. In this episode: Starting early on security awareness The limits of gamification Technically quali…
…
continue reading
The Linux subsystem for Windows, create both opportunity and challenges for forensic analysts. It makes Windows an excellent platform for multi platform forensic analysis tasks, allowing it to take advantage of the many Linux tools available. The challenges are foreseeable, you have Linux artifacts, now commingled on a Windows platform, which makes…
…
continue reading
1
DataStax and the Future of Real-Time Data Applications with Jonathan Ellis
43:24
43:24
Play later
Play later
Lists
Like
Liked
43:24
DataStax is known for its expertise in scalable data solutions, particularly for Apache Cassandra, a leading NoSQL database. Recently, the company has focused on enhancing platform support for AI-driven applications, including vector search capabilities. Jonathan Ellis is the Co-founder of DataStax. He maintains a technical role at the company and …
…
continue reading
1
DataStax and the Future of Real-Time Data Applications with Jonathan Ellis
43:24
43:24
Play later
Play later
Lists
Like
Liked
43:24
DataStax is known for its expertise in scalable data solutions, particularly for Apache Cassandra, a leading NoSQL database. Recently, the company has focused on enhancing platform support for AI-driven applications, including vector search capabilities. Jonathan Ellis is the Co-founder of DataStax. He maintains a technical role at the company and …
…
continue reading
1
184. Escape from Bamban: One man’s scam farm nightmare in the Philippines
29:26
29:26
Play later
Play later
Lists
Like
Liked
29:26
Back in February, Dylan went to the Philippines for what he thought would be a great Chinese Lunar New Year vacation. Then he found himself held hostage in a gang-run scamming compound. We tell one man’s story about getting out and what the Philippines is doing to shut these operations down.By Recorded Future News
…
continue reading
1
personally identifiable information (PII) (noun) [Word Notes]
7:26
7:26
Play later
Play later
Lists
Like
Liked
7:26
A term of legal art that defines the types of data and circumstances that permits a third party to directly or indirectly identify an individual with collected data.By N2K Networks
…
continue reading
1
EPA warns of critical risks, Four million WordPress sites exposed, Sextortion scams bypass filters
8:21
8:21
Play later
Play later
Lists
Like
Liked
8:21
EPA warns of critical risks in drinking water infrastructure Four million WordPress sites exposed Sextortion scams bypass Microsoft security filters Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you…
…
continue reading
1
Coaching Yourself: Career Coaching Personas for Everyday Engineers, Part Three - Shoulder Socrates
16:05
16:05
Play later
Play later
Lists
Like
Liked
16:05
In today's episode we discuss the concept of adopting self-coaching personas, and discuss the third persona, "Shoulder Socrates." 🙏 Today's Episode is Brought To you by: Wix Studio Devs, if you think website builders mean limited control—think again. With Wix Studio’s developer-first ecosystem you can spend less time on tedious tasks and more on th…
…
continue reading
1
The open-source ecosystem built to reduce tech debt
27:14
27:14
Play later
Play later
Lists
Like
Liked
27:14
Moderne is an open-source company building automated source code transformations for framework migrations, vulnerability patches, and API migrations. Explore the platform here. OpenRewrite is a community-driven open source project that consists of an auto-refactoring engine that runs prepackaged refactoring recipes for common framework migrations, …
…
continue reading
1
ISC StormCast for Tuesday, November 19th, 2024
5:13
5:13
Play later
Play later
Lists
Like
Liked
5:13
Exploit attempts for unpatched Citrix vulnerability CVE-2024-8068/CVE-2024-8069 https://isc.sans.edu/diary/Exploit+attempts+for+unpatched+Citrix+vulnerability/31446 https://support.citrix.com/s/article/CTX691941-citrix-session-recording-security-bulletin-for-cve20248068-and-cve20248069?language=en_US Microsoft Power Pages: Data Exposure Reviewed ht…
…
continue reading
CISA’s Director Easterly plans to step down in the coming year. DHS issues recommendations for AI in critical infrastructure.Palo Alto Networks confirms active exploitation of a critical zero-day vulnerability in its firewalls. Threat actors exploit Microsoft’s 365 Admin Portal to send sextortion emails. A China-based APT targets a zero-day in Fort…
…
continue reading
Evan Doyle says AI makes tech debt more expensive, Hunter Ng researches the ghost job ad phenomenon, Gavin Anderegg analyzes Bluesky in light of its recent success, Martin Tournoij rants against best practices & Evan Schwartz tells us why he thinks binary vector embeddings are so cool. View the newsletter Join the discussion Changelog++ members sup…
…
continue reading
You’ve got a project, and you need the right tool—but how do you know if that JavaScript package is the one? Scott and Wes guide you through finding and validating packages, from checking NPM to scoping out social proof, so you can pick tools you can trust. Show Notes 00:00 Welcome to Syntax! 00:29 Brought to you by Sentry.io. Take The Pledge 01:44…
…
continue reading
1
Episode 435: How to make my boss actually do something and kindly shooting down
32:40
32:40
Play later
Play later
Lists
Like
Liked
32:40
In this episode, Dave and Jamison answer these questions: First! I recently listened to episode 178 (huge backlog of episodes to work through!) and Dave made the assertion (in 2019!) that 47% of all companies would be remote by 2023: wildly close, what else do you see in the future? Second: my work situation continues to confound and external insig…
…
continue reading
1
642: Chris Person on Forums, Reddit, and Cooperative Reporting
1:04:16
1:04:16
Play later
Play later
Lists
Like
Liked
1:04:16
Show Description Chris Person from Aftermath joins us to chat about the state of forums in 2024, being downwind of knowledge, forum drama, Reddit and StackOverflow's impact on forums, the importance of the individuals caring for knowledge and information, and the benefits and struggles of cooperatives in reporting. Listen on Website → Guests Chris …
…
continue reading
1
T-Mobile confirms breach, AnnieMac data stolen, NewGlove malware threat
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25
T-Mobile confirms telecom breach hack Customer data stolen from AnnieMac New Glove infostealer malware bypasses Chrome’s cookie encryption Thanks to today's episode sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker helps you take a pr…
…
continue reading
1
Unknown Attacker Tries To Frame Security Researcher: Cyber Security Today for Monday, November 18th, 2024
9:10
9:10
Play later
Play later
Lists
Like
Liked
9:10
Cybersecurity Today: GitHub Attacks & Microsoft's November Patch Tuesday Updates In this episode of Cybersecurity Today, host Jim Love highlights critical cybersecurity updates. The episode covers malicious attacks on GitHub projects, including an orchestrated attempt to frame Texas-based security researcher Mike Bell, and the associated impact on …
…
continue reading
1
Cyber-entrepreneurship in the age of CyberAI. [CSO Perspectives]
22:18
22:18
Play later
Play later
Lists
Like
Liked
22:18
Rick Howard, N2K CyberWire’s Chief Analyst and Senior Fellow, turns over hosting duties to Kevin Magee, the Global Director of Cybersecurity Startups at Microsoft to discuss Cyber-entrepreneurship in the age of CyberAI. For a complete reading list and even more information, check out Rick’s more detailed essay on the topic. References: Andrew McCar…
…
continue reading
1
A Conversation with Rob Allen from ThreatLocker
32:18
32:18
Play later
Play later
Lists
Like
Liked
32:18
In this conversation, I speak with Rob Allen, Chief Product Officer at ThreatLocker. We talk about: ThreatLocker’s Unique Zero Trust Approach to Cybersecurity: How ThreatLocker’s "deny by default, permit by exception" methodology, along with automated application learning and built-in definitions for over 4,000 applications, simplifies allowlisting…
…
continue reading
1
ISC StormCast for Monday, November 18th, 2024
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14
Ancient TP-Link Backdoor Discovered by Attackers https://isc.sans.edu/diary/Ancient%20TP-Link%20Backdoor%20Discovered%20by%20Attackers/31442 GitHub Projects Targeted with Malicious Commits To Frame Researchers https://www.bleepingcomputer.com/news/security/github-projects-targeted-with-malicious-commits-to-frame-researcher/ PaloAlto and Fortinet Vu…
…
continue reading
1
UL NO. 458: Ollama Vulnerabilities, Rating AI Using AI, The Mantis Hack-back Framework
32:46
32:46
Play later
Play later
Lists
Like
Liked
32:46
My conversation with Jason Haddix from Flare, Google finds a Zero-Day with AI, Robot Dogs Protecting Mar-a-Lago, and more... Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow on X: https://twitter.com/danielmiessler Follow on LinkedIn: https://www.linkedin.com/in…
…
continue reading
Netflix’s The Diplomat is cutting edge State Department propaganda, as well as being a Homeland replacement set in and around... The post Subscribercast #94 – The Diplomat Season Two first appeared on Spy Culture.By Tom Secker
…
continue reading
1
Teresa Shea: The challenge of adapting new technologies. [Intelligence] [Career Notes]
7:17
7:17
Play later
Play later
Lists
Like
Liked
7:17
Please enjoy this encore episode where Vice President of Raytheon's Cyber Offense, Defense Expert Teresa Shea speaks of her journey from math to adapting new technologies on the cutting edge, With a love of math, Teresa was offered a scholarship by the Society of Women Engineering and decided to pursue a degree in electrical engineering. Unsurprisi…
…
continue reading
Elon Musk is Right; Hot Topic Breach; Demand Science Breach; Everything we Broke on Have I Been Pwned This Week; Sponsored by 1Password https://www.troyhunt.com/weekly-update-425/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading
1
Credential harvesters in the cloud. [Research Saturday]
18:55
18:55
Play later
Play later
Lists
Like
Liked
18:55
This week we are joined by, Blake Darché, Head of Cloudforce One at Cloudflare, to discuss their work on "Unraveling SloppyLemming’s Operations Across South Asia." Cloudforce One's investigation into the advanced threat actor "SloppyLemming" reveals an extensive espionage campaign targeting South and East Asia, with a focus on Pakistan's government…
…
continue reading
1
AI in Action: Project Synapse With Marcel Gagne and John Pinard. Cyber Security Today Weekend Edition for November 16, 2024
50:43
50:43
Play later
Play later
Lists
Like
Liked
50:43
Cybersecurity Today - Weekend Edition: Project Synapse, AI in Action (Episode 2) In this episode of Cybersecurity Today with host Jim Love, we dive into the intersection of Artificial Intelligence (AI) and cybersecurity, continuing our exploration in the series Project Synapse. Joined by Linux and open-source expert Marcel Gagné and cybersecurity p…
…
continue reading
1
A Bot Made a Memecoin Worth Almost a Billion Dollars + McDonald's Ice Cream Machines Redux + Apple Bug Bounties
1:07:42
1:07:42
Play later
Play later
Lists
Like
Liked
1:07:42
A chatty chat in which we discuss the Infinite Backrooms and the extremely profitable shock-meme-cult it spurred, a big update in the McDonald's ice cream machine right to repair story, Apple Bug Bounties, Canadian hackers and so much more. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading
1
Week in Review: Most common passwords, Secure-by-design, DNA firm vanishes
26:08
26:08
Play later
Play later
Lists
Like
Liked
26:08
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Brett Conlon, CISO, American Century Investments Thanks to our show sponsor, ThreatLocker Do zero-day exploits and supply chain attacks keep you up at night? Worry no more; you can harden your security with ThreatLocker. ThreatLocker …
…
continue reading