Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Technical interviews about software topics.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
[email protected] (SE-Radio Team)
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. SE Radio is brought to you by the IEEE Computer Societ ...
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
continue reading
1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Experienced Open Source professionals exploring the tech we actually use. If it runs on Linux, we're into it. Whether you're tweaking your desktop, gaming, self-hosting, developing software, improving terminal productivity, or running production infrastructure — we cover the tools and workflows that actually matter. New episode every fortnight. Upbeat and family-friendly for Linux enthusiasts of all ages.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
next generation web podcast
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today's tech megatrends will impact you.
…
continue reading
…
continue reading
On The Bike Shed, hosts Joël Quenneville and Stephanie Minn discuss development experiences and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Cascading Style Sheets (CSS) is the web's core styling language. For web developers, It's one of the quickest technologies to get started with, but one of the hardest to master. Follow Una Kravets and Bramus Van Damme, Developer Advocates from Google, who gleefully breakdown complex aspects of CSS into digestible episodes covering everything from accessibility to z-index.
…
continue reading
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Audio podcasts on software testing.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Software developer at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
A podcast about web design and development.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire, Sean Metcalf.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Two Rubyists having conversations and interviewing others about Ruby and web development.
…
continue reading
Defense in Depth promises clear talk on cybersecurity's most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community's insights to lead our discussion.
…
continue reading
Why AI needs hard rules (not vibe checks), what Anthropic’s acquisition of Bun’s creators tells us about the AI takeover, Jonah Glover couldn’t get Claude to recreate Space Jam’s 1996 website, Google finally unkills something, and Bazzite is a distro for the next generation of Linux gaming. View the newsletter Join the discussion Changelog++ member…
…
continue reading
1
SE Radio 697: Philip Kiely on Multi-Model AI
56:33
56:33
Play later
Play later
Lists
Like
Liked
56:33Philip Kiely, software developer relations lead at Baseten, speaks with host Jeff Doolittle about multi-agent AI, emphasizing how to build AI-native software beyond simple ChatGPT wrappers. Kiely advocates for composing multiple models and agents that take action to achieve complex user goals, rather than just producing information. He explains the…
…
continue reading
1
Game Development on the PICO-8 with Johan Peitz
47:27
47:27
Play later
Play later
Lists
Like
Liked
47:27PICO-8 is a software-based gaming console for making, sharing, and playing small games with a retro aesthetic. It emulates the look and feel of 8-bit consoles, providing limited color palettes, screen resolutions, and memory constraints. The PICO-8 dev environment uses Lua and is focused on being accessible to developers while offering depth for co…
…
continue reading
1
Top Automation Guild Survey Insights for 2026 with Joe Colantonio
8:52
8:52
Play later
Play later
Lists
Like
Liked
8:52Show notes: Top Automation Guild Survey Insights for 2026 with Joe ColantonioBy Testing Podcast
…
continue reading
Way before the world wide web, computer enthusiasts were sharing information via digital bulletin board systems (BBS). This amounted to attaching a modem to your home computer and allowing other people to dial in from their computers (one at a time) to download “textfiles” and share “warez” – or cracked software applications, often games. This scen…
…
continue reading
1
961: Keeping Up With The Fast and Furious Web
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02Scott and CJ go live from JS Nation NYC to talk about how developers can actually stay current without drowning in the constant churn of new tools and trends. They break down how to see through the fluff, focus on why tech exists before adopting it, and build a healthier, curiosity-driven approach to learning in 2025 and beyond. Show Notes 00:00 We…
…
continue reading
1
Fix your dumb misconfigurations, AI isn't people, and the weekly news - Wendy Nather, Danny Jenkins - ESW #436
1:34:58
1:34:58
Play later
Play later
Lists
Like
Liked
1:34:58Interview with Danny Jenkins: How badly configured are your endpoints? Misconfigurations are one of the most overlooked areas in terms of security program quick wins. Everyone freaks out about vulnerabilities, patching, and exploits. Meanwhile, security tools are misconfigured. Thousands of unused software packages increase remediation effort and a…
…
continue reading
1
694: Invoicing with Studioworks with Jessica and Chris
1:01:20
1:01:20
Play later
Play later
Lists
Like
Liked
1:01:20Show Description Chris and Jessica from Studioworks join us to talk about their new app, why they're uniquely qualified to run an invoicing app, what the long term vision is for Studioworks, pricing models of subscription apps, how invoicing isn't just for web nerds anymore, helping neurospicy people get paid for their work, and what it's like to t…
…
continue reading
1
Chris Wilke: Generated AI Stories - Episode 379
38:46
38:46
Play later
Play later
Lists
Like
Liked
38:46Chris has 25 years experience as a seasoned SaaS and AI product leader known for practical, people-first strategies to harness value from Generative AI for operational excellence. Chris developed the AI Vantage framework—a strategic approach that emphasizes process-driven transformation to unlock immediate and long-term value from GenAI technologie…
…
continue reading
1
Palo Alto VPN attacks, NATO cyberdefense exercise, Chinese exploit React2Shell
8:19
8:19
Play later
Play later
Lists
Like
Liked
8:19New wave of VPN login attempts on Palo Alto portals NATO holds its largest-ever cyberdefense exercise Chinese hackers exploiting React2Shell bug Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Deepfakes aren't science fiction anymore; they'r…
…
continue reading
It's the Have I Been Pwned 12th Birthday Special with Charlotte! Sponsored by Report URI https://www.troyhunt.com/weekly-update-481/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading
1
DevelopmentTools May Allow Remote Compromise
13:08
13:08
Play later
Play later
Lists
Like
Liked
13:08Explosive React Vulnerability and AI Tool Flaws Uncovered: Major Implications for Cybersecurity In this episode of Cybersecurity Today, host David Shipley discusses a new significant React vulnerability, React2Shell, that has caused widespread confusion and debate in the security community. This major flaw, affecting a widely used web framework, po…
…
continue reading
1
SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34AutoIT3 Compiled Scripts Dropping Shellcodes Malicious AutoIT3 scripts are usign the FileInstall function to include additional scripts at compile time that are dropped as temporary files during execution. https://isc.sans.edu/diary/AutoIT3%20Compiled%20Scripts%20Dropping%20Shellcodes/32542 React2Shell Update The race is on to patch vulnerable syst…
…
continue reading
1
F89: TDD | Капитализм | Коты и собаки | Насилие над сотрудниками | EO | Юра Борисов | Троцкий
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00Video is here: https://youtube.com/live/xeyKStxU1d8By Yegor Bugayenko
…
continue reading
1
Jon DiMaggio: Two roads diverged. [Strategy] [Career Notes]
9:19
9:19
Play later
Play later
Lists
Like
Liked
9:19Please enjoy this encore of Career Notes. Chief security strategist from Analyst1, Jon DiMaggio shares his story on how he grew to become a part of the cybersecurity world. He describes different jobs that paved the way to the knowledge he has in the industry right now, and he even shares about an experience that led him to a path that split and wh…
…
continue reading
1
When macOS gets frostbite. [Research Saturday]
24:40
24:40
Play later
Play later
Lists
Like
Liked
24:40Jaron Bradley, Director of Jamf Threat Labs, is sharing their work on "ChillyHell: A Deep Dive into a Modular macOS Backdoor." Jamf Threat Labs uncovers a newly notarized macOS backdoor called ChillyHell, tied to past UNC4487 activity and disguised as a legitimate applet. The malware showcases robust host profiling, multiple persistence mechanisms,…
…
continue reading
1
Cybersecurity Today Month In Review - December 5th, 2025
54:06
54:06
Play later
Play later
Lists
Like
Liked
54:06Cybersecurity Today: The Rise of Living Off the Land Strategies & More In this episode of Cybersecurity Today's Month in Review, host Jim Love is joined by Laura Payne from White Tuque and David Shipley from Beauceron Security. They discuss several pressing cybersecurity issues, including the growing threat of 'living off the land' strategies where…
…
continue reading
Nick Nisi joins us to dig into the latest trends from this year and how they’re impacting his day-to-day coding and Vision Pro wearing. Anthropic’s acquisition of Bun, the evolving JavaScript and AI landscape, GitHub’s challenges and the Amp/Sourcegraph split. We dive into AI development practices, context management, voice assistants, Home Assista…
…
continue reading
1
China’s quiet crawl into critical networks.
30:13
30:13
Play later
Play later
Lists
Like
Liked
30:13Chinese threat actors deploy Brickstorm malware. The critical React2Shell vulnerability is under active exploitation. Cloudflare’s emergency patch triggered a brief global outage. Phishing kits pivot to fake e-commerce sites. The European Commission fines X(Twitter) €120 million for violating the Digital Services Act. Predator spyware has a new bag…
…
continue reading
1
Docker Disasters and Dev Container Journeys
1:17:43
1:17:43
Play later
Play later
Lists
Like
Liked
1:17:43Andrew kicks off at 8 a.m. with six Docker containers running, and he and Chris dive into what modern Rails development looks like inside dev containers—covering Rails’ own images and features, using Mise and Playwright instead of Selenium, and why OrbStack has replaced Docker Desktop on their Macs. They talk through the trade-offs of running servi…
…
continue reading
1
#200 How to build your own learning path using Open Source with Kunal Kushwaha
1:08:48
1:08:48
Play later
Play later
Lists
Like
Liked
1:08:48Today Quincy Larson interviews Kunal Kushwaha. He's a software engineer and prolific computer science teacher on YouTube. He failed the JEE, the Indian Engineering Entrance Exam, TWICE. But he persevered. He did 4 years of university but attended ZERO lectures. Instead he built his own learning path by contributed to open source projects and using …
…
continue reading
Frank on LinkedIn MongoDB Alice for Snowflake Mike on X Coder on X Show Discord Alice & Custom Dev Mike's Recent Omakub Blog PostBy The Mad Botter
…
continue reading
1
Predator spyware, Russia blocks FaceTime, US cyber strategy coming
7:06
7:06
Play later
Play later
Lists
Like
Liked
7:06Predator spyware spotted across several countries Russia blocks FaceTime Draft US cyber strategy set for January release Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you…
…
continue reading
For years, North Korea has quietly dispatched an army of IT workers overseas—not to innovate, but to infiltrate. Disguised as freelancers, they apply for jobs, breach systems, and wire stolen funds back to Pyongyang. We return to a rare conversation with one of them—a defector—about the regime’s digital underworld, and the personal toll of escaping…
…
continue reading
1
Shady Panda Hides For Years In Legitimate Browser Extensions: Cybersecurity Today
12:13
12:13
Play later
Play later
Lists
Like
Liked
12:13In this episode of 'Cybersecurity Today,' host Jim Love discusses several significant cybersecurity issues. Highlights include a maximum severity vulnerability in React Server Components dubbed React2Shell (CVE-2025-55182), a recently patched Windows shortcut flaw by Microsoft, and new attacks using the Evilginx phishing platform in schools. Additi…
…
continue reading
Ryan is joined by Outshift by Cisco’s VP of Engineering Guillaume De Saint Marc to discuss the future of multi-agent architectures as microservices, the challenges and limitations of the infrastructure for these multi-agent systems, and the importance of communication protocols and interoperability in order to build decentralized and scalable archi…
…
continue reading
1
SANS Stormcast Friday, December 5th, 2025: Compromised Govt System; React Vuln Update; Array Networks VPN Attacks
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Government%3F%20%5BGuest%20Diary%5D/32536 React Update Working exploits for the React vulnerability patched yesterday are n…
…
continue reading
CISA staff may see pay cuts in 2026. Threat actors advertise a full chain zero-day exploit for iOS. A US-led international coalition releases joint guidance on integrating AI into operational technology. Microsoft lowers sales growth targets for its agentic AI products. A major fintech provider suffers a ransomware-linked breach. Arizona’s Attorney…
…
continue reading
What a government crackdown on VPNs would look like, malware groups play the long game with browser extensions, a new major version of FreeBSD is released, and using a single database vs one DB per application or VM. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes ZFS Enabled Disaster Recovery for Virtualizatio…
…
continue reading
1
Daniel Temkin and the Beauty of Esoteric Languages
35:12
35:12
Play later
Play later
Lists
Like
Liked
35:12What happens when code stops being useful and starts being art? Scott talks with artist and programmer Daniel Temkin about his new book Forty-Four Esolangs, a deep dive into the world of esoteric programming languages...systems designed not to ship software, but to provoke thought. They explore how absurdity, constraint, and humor reveal something …
…
continue reading
1
Werner Vogels predicts the future (Interview)
1:30:46
1:30:46
Play later
Play later
Lists
Like
Liked
1:30:46Amazon CTO, Werner Vogels, stops by to help us explore his tech predictions for 2026 and beyond. Will companionship be redefined by consumer robots? Will quantum-safe become the only safe worth talking about? Is this the dawn of the renaissance developer? We’re infinitely curious why Werner came to this particular set of conclusions. Are you? Join …
…
continue reading
1
Whats new in React 19.2 with Shruti Kapoor
22:13
22:13
Play later
Play later
Lists
Like
Liked
22:13Shruti Kapoor comes back onto the podcast to discuss React 19.2, how it builds on React 19 and React 18, and new features like Activity, View Transitions, useEffectEvent, and React server components improvements powered by cacheSignal. They explore partial pre rendering, Suspense boundary batching, the stable React Compiler for auto memoed apps, an…
…
continue reading
1
How To Tell When a Vendor is Selling AI Snake Oil
33:51
33:51
Play later
Play later
Lists
Like
Liked
33:51All links and images can be found on CISO Series. Check out this post by Christofer Hoff of Truist for the discussion that is the basis of our conversation on this week's episode co-hosted by David Spark, the producer of CISO Series, and Caleb Sima, builder, WhiteRabbit. Joining them is Crystal Chatam, vp of cybersecurity, Speedcast. In this episod…
…
continue reading
Python’s popularity in data science and backend engineering has made it the default language for building AI infrastructure. However, with the rapid growth of AI applications, developers are increasingly looking for tools that combine Python’s flexibility with the rigor of production-ready systems. Pydantic began as a library for type-safe data val…
…
continue reading
1
Record-breaking DDoS attack, React bug puts servers at risk, RansomHouse attack
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54Record-breaking DDoS attack React bug puts servers at risk RansomHouse attack Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasi…
…
continue reading
1
A fish commits credit card fraud (inadvertently).
51:31
51:31
Play later
Play later
Lists
Like
Liked
51:31This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engin…
…
continue reading
This week, Ben Yelin discusses the new California Opt Me Out Act that requires web browsers to offer a one-click “opt-out” setting that stops companies from selling or sharing your data. Dave Bittner bring the story about the Supreme Court of the United States weighing whether internet service providers must cut off users who repeatedly pirate cont…
…
continue reading
1
The future will thank us: an intergenerational approach to security
46:50
46:50
Play later
Play later
Lists
Like
Liked
46:50What is intergenerational security and how does it intersect with traditional concepts of national security? How do intergenerational dynamics and differing interactions with technology, social media and AI impact security and resilience? What are the security issues that young Australians care about and how do these differ from the concerns of old…
…
continue reading
1
SANS Stormcast Thursday, December 4th, 2025: CDN Headers; React Vulnerabiity; PickleScan Patch
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React server components. Exploitation is likely imminent. https://react.dev/blog/2025/12/03/critical-se…
…
continue reading
1
Just another day of scamming and jamming.
29:53
29:53
Play later
Play later
Lists
Like
Liked
29:53The DOJ shuts down another scam center in Myanmar. OpenAI confirms a Mixpanel data breach. A new phishing campaign targets company executives. A bipartisan bill looks to preserve the State and Local Cybersecurity Grant Program. Universities suffer Oracle EBS data breaches. India reports GPS jamming at eight major airports. Kaiser Permanente settles…
…
continue reading
1
960: Reacting to the Weird + Creative Corners of the Web
27:33
27:33
Play later
Play later
Lists
Like
Liked
27:33Wes and Scott talk about the weird, creative corners of the web—from live-coded music with Strudel and wild Hydra visuals to shader wizardry, projection-mapping art, fully synced Christmas lights, and more. Show Notes 00:00 Welcome to Syntax! 01:10 Strudel https://www.tiktok.com/@dj_dave__/video/7541104277234748685 https://www.tiktok.com/@switch.an…
…
continue reading
#327: When AI tools suggest putting glue on pizza, it's a harmless laugh. But when autonomous AI agents start managing your infrastructure, the stakes become much higher. The reality is that current AI technology isn't ready for unsupervised deployment in critical systems, and treating it like it is could lead to catastrophic failures. The challeng…
…
continue reading
1
Microsoft Defender outage disrupts threats, Apple resists India's app order, MuddyWater strikes Israel
7:59
7:59
Play later
Play later
Lists
Like
Liked
7:59Microsoft Defender outage disrupts threats Apple resists India's state-run app order MuddyWater strikes Israel with MuddyViper Huge thanks to our episode sponsor, Vanta This message comes from Vanta. What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" Enter Vanta. Vanta automates manual work, …
…
continue reading
Enjoy this episode of Cyber things from Armis. Catch the next episode on your favorite podcast app on December 15th. Welcome to Cyber Things, a special edition podcast produced in partnership by Armis and N2K CyberWire that plunges into the hidden world beneath our connected reality. Inspired by Stranger Things, we explore the digital realm's own U…
…
continue reading
1
Living off the Land Attacks and Emerging Cyber Threats
12:42
12:42
Play later
Play later
Lists
Like
Liked
12:42This episode of Cybersecurity Today, hosted by Jim Love, delves into various cybersecurity threats and latest news. Topics include 'living off the land' attacks using Microsoft's native utilities, spoofing Calendly invites for phishing Google and Meta credentials, a significant breach at the University of Pennsylvania linked to Oracle E-Business Su…
…
continue reading
1
SN 1054: Bots in the Belfry - Cisco Promises Real Security Fixes!
3:20:21
3:20:21
Play later
Play later
Lists
Like
Liked
3:20:21Cisco has finally admitted it's time for real change and is vowing to build "secure by default" gear after decades of criticism. Steve Gibson reacts to a rare moment when a tech giant actually gets security right—and what it means for everyone running critical infrastructure. • Scattered Lapsus$ Hunters strikes (Salesforce) again. • Cisco actually …
…
continue reading
1
SANS Stormcast Wednesday, December 3rd, 2025: SmartTube Compromise; NPM Malware Prompt Injection Attempt; Angular XSS Vulnerability
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-3670629826 https://github.com/yuliskov/SmartTube/releases/tag/notification Two Years, 17K Downloads: The NPM Malware That Tried to Gas…
…
continue reading
1
Risky Business #817 -- Less carnage than your usual Thanksgiving
1:01:06
1:01:06
Play later
Play later
Lists
Like
Liked
1:01:06In this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news. It’s a quiet week with Thanksgiving in the US, but there’s always some cyber to talk about: Airbus rolls out software updates after a cosmic ray bitflips an A320 into a dive Krebs tracks down a Scattered Lapsus$ Hunters teen through the usual poor opsec… … as W…
…
continue reading