Byte Code public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
/* Begin Code */

Giga_Byte_Me (D. W.)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Everything IT Related, from security and coding to how to optimize your Win PC by turning it into to a Linux box... I will talk about anything and everything IT Related. Comment if you have something you would like me to discuss! Support this podcast: https://podcasters.spotify.com/pod/show/begin-code/support
  continue reading
 
Artwork

1
Take Another Byte

Mazen Kourouche & James Dale

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Take Another Byte, where developers and digital creators Mazen Kourouche and James Dale dive into the world of digital creativity. They'll take a look at the impact of technology on various creative industries. You'll find exclusive interviews, conversations and hopefully gain value from deep field-related insights. You can find more on the podcast on Twitter and Instagram (@mazenkourouche / @_JamesDale)
  continue reading
 
Every global crisis, every technological leap, and every headline-making attack is connected by a thread of code. Bytes, Borders, & Breaches is the show that gives you the cybersecurity lens—showing you the digital reality running beneath the surface of the news. We go beyond the fear, uncertainty, and doubt (FUD) to deliver clear, actionable, and highly engaging analysis. If you’ve ever watched The Matrix, The Bourne Series, or Game of Thrones and wondered how those scenarios play out in th ...
  continue reading
 
Sushi Bytes is an unapologetically AI-generated podcast brought to you by Shinobi, FossID’s vigilant Software Composition Analysis ninja. In each bite-sized episode, Shinobi breaks down the evolving world of software supply chain integrity – from open-source license compliance and vulnerability disclosure to SBOM standards, IP risks, and AI-generated code implications. With a surge in regulatory scrutiny and AI adoption, the software stack is becoming harder to manage – and riskier to ignore ...
  continue reading
 
Artwork

51
The Anycast

Matt Levine

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Anycast - powered by CacheFly About The Anycast https://www.theanycast.com/about/ The Anycast – powered by CacheFly celebrates the tech disruptors, digital pioneers, innovators, code warriors, and unconventional thinkers who refuse to conform to corporate norms. From the entrepreneurial rule-breakers, rule-makers, and rule-benders, reshaping the future with their boundless creativity to entertain and educate the world, to those charting a new course in the world of technology innovation. ...
  continue reading
 
Artwork
 
Bytes and Beyond is a tech podcast where I talk about topics I wish were discussed more. Get ready for diverse topics because the journey in the tech world goes far beyond the lines of code. So, grab your favorite beverage, and let's dive into the human side of tech together.
  continue reading
 
Welcome to the Biotech Bytes podcast, where we sit down with Biotech and Pharma IT leaders to learn what's working in our industry. Steven Swan is the CEO of The Swan Group LLC. He has 20 years of experience working with companies and individuals to make long-term matches. Focusing on Information technology within the Biotech and Pharmaceutical industries has allowed The Swan Group to become a valued partner to many companies. Staying in constant contact with the marketplace and its trends a ...
  continue reading
 
The DEX Show (Digital Employee Experience): A Show for IT Change Makers is dedicated to IT professionals looking to advance the industry by leaps and bounds. IT is changing—you know it, and so do we—and without a healthy dose of curiosity about how the future of IT will affect employee experience of entire companies, traditional workers will be left behind. If you see IT as more than the basement-dwelling, plumber cliche it’s so often portrayed as, this is the podcast for you. Each episode w ...
  continue reading
 
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
  continue reading
 
Machine learning and artificial intelligence are dramatically changing the way businesses operate and people live. The TWIML AI Podcast brings the top minds and ideas from the world of ML and AI to a broad and influential community of ML/AI researchers, data scientists, engineers and tech-savvy business and IT leaders. Hosted by Sam Charrington, a sought after industry analyst, speaker, commentator and thought leader. Technologies covered include machine learning, artificial intelligence, de ...
  continue reading
 
Artwork

4
From the Beginning

Jenn Dudley, Griffin Caprio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
From the Beginning is our show about podcasters, their origins and how they came to create their podcast. Speaking to a wide range of podcasters from executive coaches to software developers to die hard Cubs fans, From the Beginning takes a look behind the mic at the hosts of your favorite podcasts to find out why they do what they do.
  continue reading
 
Loading …
show series
 
In this Reality Bytes reunion, Tom, Sean, Tim, Oriana and Megan unpack the buzzy rise of vibe coding — the AI-assisted development trend coined by Andrej Karpathy and already explored by companies like Meta and Microsoft. The panel digs beneath the hype: from accelerated prototyping and accessibility gains to serious risks around technical debt, sh…
  continue reading
 
Discover why the edge is more than just a buzzword and how it impacts modern cloud networking, latency, and throughput. Whether you're curious about real-time apps or the evolving relationship between the cloud and edge, this discussion breaks it all down. Key topics include: Exploring what defines the edge in computing and networking Understanding…
  continue reading
 
Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit applications that do not have Next.js exposed. https://isc.sans.edu/diary/Maybe%20a%20Little%20Bit%20More%20Intere…
  continue reading
 
Today, we're joined by Aakanksha Chowdhery, member of technical staff at Reflection, to explore the fundamental shifts required to build true agentic AI. While the industry has largely focused on post-training techniques to improve reasoning, Aakanksha draws on her experience leading pre-training efforts for Google’s PaLM and early Gemini models to…
  continue reading
 
Beyond RC4 for Windows authentication Microsoft outlined its transition plan to move away from RC4 for authentication and published guidance and tools to facilitate this change. https://www.microsoft.com/en-us/windows-server/blog/2025/12/03/beyond-rc4-for-windows-authentication FortiCloud SSO Login Vuln Exploited Arctic Wolf observed exploit attemp…
  continue reading
 
In our tradtional end-of-year DEX Show special episode, Mondelez’s Geoff Wright returns to unpack a wild 2025 for IT, AI and employee experience. Tim, Tom and Geoff riff on AI agents that shop, plan travel and work across your browser tabs, the coming street fight between Windows and Chromebooks, and why younger workers just want a browser and to b…
  continue reading
 
More React2Shell Exploits CVE-2025-55182 Our honeypots continue to detect numerous React2Shell variants. Some using slightly modified exploits https://isc.sans.edu/diary/More%20React2Shell%20Exploits%20CVE-2025-55182/32572 The Fragile Lock: Novel Bypasses For SAML Authentication SAML is a tricky protocol to implement correctly, in particular if dif…
  continue reading
 
Abusing DLLs EntryPoint for the Fun DLLs will not just execute code when some of their functions are called, but also as they are loaded. https://isc.sans.edu/diary/Abusing%20DLLs%20EntryPoint%20for%20the%20Fun/32562 Apple Patches Everything: December 2025 Edition Apple released patches for all of its operating systems, fixing two already exploited…
  continue reading
 
Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 Mystery Google Chrome 0-Day Vulnerability Google released an update for Google Chrome fixing a vulne…
  continue reading
 
Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on. https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Comma…
  continue reading
 
Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution in ColdFusion, as well as the code execution issue in Acrobat, will very likely see exploits soon. h…
  continue reading
 
In this episode, we’re joined by Munawar Hayat, researcher at Qualcomm AI Research, to discuss a series of papers presented at NeurIPS 2025 focusing on multimodal and generative AI. We dive into the persistent challenge of object hallucination in Vision-Language Models (VLMs), why models often discard visual information in favor of pre-trained lang…
  continue reading
 
It’s our favorite Reality Bites tradition: the end-of-year panel! Tom and Tim bring the whole crew together—Megan, Ariana, Sean, and Dina—for a joyful, honest, and insight-packed reflection on 2025. From global travel and AI breakthroughs to personal milestones, hard-won lessons, and the music that carried us through the year, the team shares what …
  continue reading
 
The internet isn't a cloud; it's a glass house. And we just handed everyone a rock. In Episode 02 of Bytes, Borders, & Breaches, we deconstruct how a single configuration file nearly lobotomized the web, how Chinese state hackers are turning our own laws against us, and why your new "Agentic AI" developer might actually be a sleeper cell waiting fo…
  continue reading
 
nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as undocumented may actually be documented in the underlying hardware description. https://www.tomshardware.com/tech-industry/cyber-security/researcher-finds-undocumented-microphone-and-major-security-flaws-in…
  continue reading
 
AutoIT3 Compiled Scripts Dropping Shellcodes Malicious AutoIT3 scripts are usign the FileInstall function to include additional scripts at compile time that are dropped as temporary files during execution. https://isc.sans.edu/diary/AutoIT3%20Compiled%20Scripts%20Dropping%20Shellcodes/32542 React2Shell Update The race is on to patch vulnerable syst…
  continue reading
 
Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Government%3F%20%5BGuest%20Diary%5D/32536 React Update Working exploits for the React vulnerability patched yesterday are n…
  continue reading
 
Discover the key insights into navigating cloud adoption, avoiding pitfalls, and identifying opportunities. This episode dives into: Why the cloud rose to prominence and its evolving role in business operations. Green flags: Seasonal scalability, hybrid solutions, and aligning cloud use with specific needs. Red flags: Overspending, inefficiencies, …
  continue reading
 
How AI is Shaping the Future: The Rise of The Bionic Professional with Bill Wallace #aitechnology #futureofwork #bionicprofessional Step into the exciting world where AI is transforming the way we work and the very nature of our professions. Please visit our website to get more information: https://swangroup.net/ In this episode, I’m joined by Bill…
  continue reading
 
Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React server components. Exploitation is likely imminent. https://react.dev/blog/2025/12/03/critical-se…
  continue reading
 
Tim and Tom sit down with Steve Wunker — Managing Director of New Markets Advisors, author, and early pioneer of the smartphone — to explore the big ideas behind his latest book, AI and the Octopus Organization. Steve breaks down why AI shouldn’t just “bolt onto” old processes, how distributed intelligence reshapes the firm, and what leaders can le…
  continue reading
 
SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-3670629826 https://github.com/yuliskov/SmartTube/releases/tag/notification Two Years, 17K Downloads: The NPM Malware That Tried to Gas…
  continue reading
 
In this episode, Zain Asgar, co-founder and CEO of Gimlet Labs, joins us to discuss the heterogeneous AI inference across diverse hardware. Zain argues that the current industry standard of running all AI workloads on high-end GPUs is unsustainable for agents, which consume significantly more tokens than traditional LLM applications. We explore Gim…
  continue reading
 
The EU Cyber Resilience Act (CRA) is reshaping global expectations for software security – and putting Software Bill of Materials (SBOMs) at the center of compliance. In this episode, Shinobi and Gen break down what the CRA requires, how it compares to U.S. regulations, and what engineering and legal teams must do now to stay ahead. Whether you're …
  continue reading
 
Hunting for SharePoint In-Memory ToolShell Payloads A walk-through showing how to analyze ToolShell payloads, starting with acquiring packets all the way to decoding embedded PowerShell commands. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Hunting%20for%20SharePoint%20In-Memory%20ToolShell%20Payloads/32524 Android Security Bulletin December 20…
  continue reading
 
Fake adult websites pop realistic Windows Update screen to deliver stealers via ClickFix The latest variant of ClickFix tricks users into copy/pasting commands by displaying a fake blue screen of death. https://www.acronis.com/en/tru/posts/fake-adult-websites-pop-realistic-windows-update-screen-to-deliver-stealers-via-clickfix/ B2B Guest Access Cre…
  continue reading
 
Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications Spyware attacks messaging applications in part by triggering vulnerabilities in messaging applications but also by deploying tools like keystroke loggers and screenshot applications. https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-targ…
  continue reading
 
Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control./32518 Sha1-Hulud, The Se…
  continue reading
 
The script just got flipped. Chinese state hackers are using autonomous AI agents to write cyberattacks ("Operation Wolfs Bane"), a massive Cloudflare outage took down half the internet, and the Akira ransomware group just made $250 million by exploiting a single, basic mistake. Welcome to the premiere episode of Bytes, Borders, & Breaches. I’m you…
  continue reading
 
Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%3F/32510 Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day Early exploit attem…
  continue reading
 
Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, indicating that exploitation may have occurred prior to the patch being released. https://isc.sans.edu/diary/Oracle%20Identity%20Manager%20Exploit%20…
  continue reading
 
Discover how chaos sparks innovation in this insightful exploration of tech pivots. Featuring lessons from industry leaders, this episode dives into the challenges, strategies, and breakthroughs that define successful pivots in the tech world. Whether you're building dynamic applications or navigating complex entrepreneurial decisions, this video o…
  continue reading
 
Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names./32472 FortiWeb Multiple OS command injection in API and CLI A second silently patched vulnerability in FortiW…
  continue reading
 
KongTuke Activity This diary investigates how a recent Kong Tuke infections evolved all the way from starting with a ClickFix attack. https://isc.sans.edu/diary/KongTuke%20activity/32498 Cloudflare Outage Cloudflare suffered a large outage today after an oversized configuration file was loaded into its bot protection service https://x.com/dok2001 G…
  continue reading
 
Today, we're joined by Devi Parikh, co-founder and co-CEO of Yutori, to discuss browser use models and a future where we interact with the web through proactive, autonomous agents. We explore the technical challenges of creating reliable web agents, the advantages of visually-grounded models that operate on screenshots rather than the browser’s mor…
  continue reading
 
Decoding Binary Numeric Expressions Didier updated his number to hex script to support simple arithmetic operations in the text. https://isc.sans.edu/diary/Decoding%20Binary%20Numeric%20Expressions/32490 Tea Token NPM Pollution The NPM repository was hit with around 150,000 submissions that did not contain any useful contributions, but instead atte…
  continue reading
 
In a wide-ranging conversation, Robb Wilson—CEO and co-founder of OneReach.ai and author of The Age of Invisible Machines—joins Tim and Tom to explore the rise of agentic AI and its seismic implications for IT, organizations, and society. Robb breaks down the concept of agent runtimes, why conversational interfaces matter more than ever, and how ad…
  continue reading
 
Fortiweb Vulnerability Fortinet, with significant delay, acknowledged a recently patched vulnerability after exploit attempts were seen publicly. https://isc.sans.edu/diary/Honeypot+FortiWeb+CVE202564446+Exploits/32486 https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/ https://fo…
  continue reading
 
SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diar…
  continue reading
 
In this episode of Sushi Bytes, Shinobi and Gen unpack the high-stakes reality of code snippet: when small fragments of open source code make their way into proprietary applications and go undetected by traditional SCA tools. From copy-pasted Stack Overflow answers to AI-generated code functions, these sometimes-small code segments can carry seriou…
  continue reading
 
Developer experience and productivity are critical, but so is copyright and license compliance. In this episode of Sushi Bytes, Shinobi and Gen talk about the tug-of-war between productivity-centric engineering teams and risk-averse legal teams. Who will win? Tune in to hear how modern SCA tooling can align speed with safety, automate away this fri…
  continue reading
 
Not every Software Composition Analysis (SCA) tool reveals what’s really haunting your code. In this Halloween-themed episode of Sushi Bytes, Shinobi and Gen explore why comparing SCA tools is trickier than it seems—and what engineering and compliance teams should look for under the mask. From snippet detection and modified code to license clarity,…
  continue reading
 
In this episode of Sushi Bytes, Shinobi and Gen dive into the hidden risk of license drift – when the open source license declared in metadata files like package.json or README doesn’t match the actual licenses embedded in the source code. It’s a common problem with serious consequences, especially in embedded systems or M&A deals. The duo explores…
  continue reading
 
AI-assisted coding is accelerating development, but also creating compliance headaches. In this episode of Sushi Bytes, Shinobi and Gen unpack the legal gray zones around AI-generated code: Who owns it? Is it safe to use? What happens if it’s trained on GPL-licensed data? If your team uses GitHub Copilot, ChatGPT, or Claude, there’s a good chance y…
  continue reading
 
AI in Drug Discovery | #aidrugdiscovery #biotechinnovation #medicalinnovation Amid a rapidly changing biotech landscape, AI is transforming how we discover and develop new medicines. Please visit our website to get more information: https://swangroup.net/ In this episode, I sit down with Smbat Rafayelyan, founder and CEO of Bioneex, a platform that…
  continue reading
 
OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-disc…
  continue reading
 
Not every vulnerability in your SBOM is a real threat. That’s where VEX comes in. In this episode of Sushi Bytes, Shinobi and Gen explore the Vulnerability Exploitability eXchange… what it is, why it matters, and how it helps teams focus on the vulnerabilities that actually matter. From cutting through alert fatigue to avoiding the growing mess of …
  continue reading
 
Your software has a supply chain. Your SBOM is supposed to tell you what’s inside. But what makes a Software Bill of Materials truly useful; and why is everyone suddenly asking for one? In this episode of Sushi Bytes, Shinobi unpacks what an SBOM is, why regulatory pressure is turning it from best practice to business-critical and why spinning off …
  continue reading
 
Welcome to Sushi Bytes – FossID’s bite-sized, AI-generated podcast hosted by Shinobi, your sharp-eyed Software Composition Analysis ninja. In this debut episode, Shinobi breaks down what “software supply chain integrity” really means… and why it’s now a board-level concern. From open source license compliance to AI-generated code and SBOMs, we expl…
  continue reading
 
Today, we're joined by Robin Braun, VP of AI business development for hybrid cloud at HPE, and Luke Norris, co-founder and CEO of Kamiwaza, to discuss how AI systems can be used to automate complex workflows and unlock value from legacy enterprise data. Robin and Luke detail high-impact use cases from HPE and Kamiwaza’s collaboration on an “Agentic…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play