Stephen Turkington, Co-Founder of Search 5.0, hosts the Code Bytes Podcast. We interview those redefining the talent experience, exploring what it will take, from candidates and clients alike, to address the ever-pressing developer's skills gap.
…
continue reading
Everything IT Related, from security and coding to how to optimize your Win PC by turning it into to a Linux box... I will talk about anything and everything IT Related. Comment if you have something you would like me to discuss! Support this podcast: https://podcasters.spotify.com/pod/show/begin-code/support
…
continue reading
Welcome to Take Another Byte, where developers and digital creators Mazen Kourouche and James Dale dive into the world of digital creativity. They'll take a look at the impact of technology on various creative industries. You'll find exclusive interviews, conversations and hopefully gain value from deep field-related insights. You can find more on the podcast on Twitter and Instagram (@mazenkourouche / @_JamesDale)
…
continue reading
Every global crisis, every technological leap, and every headline-making attack is connected by a thread of code. Bytes, Borders, & Breaches is the show that gives you the cybersecurity lens—showing you the digital reality running beneath the surface of the news. We go beyond the fear, uncertainty, and doubt (FUD) to deliver clear, actionable, and highly engaging analysis. If you’ve ever watched The Matrix, The Bourne Series, or Game of Thrones and wondered how those scenarios play out in th ...
…
continue reading
Sushi Bytes is an unapologetically AI-generated podcast brought to you by Shinobi, FossID’s vigilant Software Composition Analysis ninja. In each bite-sized episode, Shinobi breaks down the evolving world of software supply chain integrity – from open-source license compliance and vulnerability disclosure to SBOM standards, IP risks, and AI-generated code implications. With a surge in regulatory scrutiny and AI adoption, the software stack is becoming harder to manage – and riskier to ignore ...
…
continue reading
…
continue reading
The Anycast - powered by CacheFly About The Anycast https://www.theanycast.com/about/ The Anycast – powered by CacheFly celebrates the tech disruptors, digital pioneers, innovators, code warriors, and unconventional thinkers who refuse to conform to corporate norms. From the entrepreneurial rule-breakers, rule-makers, and rule-benders, reshaping the future with their boundless creativity to entertain and educate the world, to those charting a new course in the world of technology innovation. ...
…
continue reading
Bytes and Beyond is a tech podcast where I talk about topics I wish were discussed more. Get ready for diverse topics because the journey in the tech world goes far beyond the lines of code. So, grab your favorite beverage, and let's dive into the human side of tech together.
…
continue reading
Welcome to the Biotech Bytes podcast, where we sit down with Biotech and Pharma IT leaders to learn what's working in our industry. Steven Swan is the CEO of The Swan Group LLC. He has 20 years of experience working with companies and individuals to make long-term matches. Focusing on Information technology within the Biotech and Pharmaceutical industries has allowed The Swan Group to become a valued partner to many companies. Staying in constant contact with the marketplace and its trends a ...
…
continue reading
The DEX Show (Digital Employee Experience): A Show for IT Change Makers is dedicated to IT professionals looking to advance the industry by leaps and bounds. IT is changing—you know it, and so do we—and without a healthy dose of curiosity about how the future of IT will affect employee experience of entire companies, traditional workers will be left behind. If you see IT as more than the basement-dwelling, plumber cliche it’s so often portrayed as, this is the podcast for you. Each episode w ...
…
continue reading
In a world where cyberattacks are becoming more commonplace, we all need to be vigilant about protecting our digital lives, whether at home or at work. Byte Sized Security is the podcast that provides snackable advice on cybersecurity best practices tailored for professionals on the go. Hosted by information security expert, Marc David, each 15-20 minute episode provides actionable guidance to help listeners safeguard their devices, data, and organizations against online threats. With new ep ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Hosted by Dr. Kristin Stephens-Martinez. This is a podcast where we talk with educators about teaching and equity in computer science.
…
continue reading
1
The TWIML AI Podcast (formerly This Week in Machine Learning & Artificial Intelligence)
Sam Charrington
Machine learning and artificial intelligence are dramatically changing the way businesses operate and people live. The TWIML AI Podcast brings the top minds and ideas from the world of ML and AI to a broad and influential community of ML/AI researchers, data scientists, engineers and tech-savvy business and IT leaders. Hosted by Sam Charrington, a sought after industry analyst, speaker, commentator and thought leader. Technologies covered include machine learning, artificial intelligence, de ...
…
continue reading
From the Beginning is our show about podcasters, their origins and how they came to create their podcast. Speaking to a wide range of podcasters from executive coaches to software developers to die hard Cubs fans, From the Beginning takes a look behind the mic at the hosts of your favorite podcasts to find out why they do what they do.
…
continue reading
Your opinionated podcast on development, tech and every day struggles.
…
continue reading
A place to talk about startups, venture capital and tech. For a full download, double-click on sandhillroad.io
…
continue reading
1
🎙️ Reality Bytes: The Rise (and Risks) of Vibe Coding
23:20
23:20
Play later
Play later
Lists
Like
Liked
23:20In this Reality Bytes reunion, Tom, Sean, Tim, Oriana and Megan unpack the buzzy rise of vibe coding — the AI-assisted development trend coined by Andrej Karpathy and already explored by companies like Meta and Microsoft. The panel digs beneath the hype: from accelerated prototyping and accessibility gains to serious risks around technical debt, sh…
…
continue reading
Discover why the edge is more than just a buzzword and how it impacts modern cloud networking, latency, and throughput. Whether you're curious about real-time apps or the evolving relationship between the cloud and edge, this discussion breaks it all down. Key topics include: Exploring what defines the edge in computing and networking Understanding…
…
continue reading
1
SANS Stormcast Thursday, December 18th, 2025: More React2Shell; Donicwall and Cisco Patch; Updated Chrome Advisory
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit applications that do not have Next.js exposed. https://isc.sans.edu/diary/Maybe%20a%20Little%20Bit%20More%20Intere…
…
continue reading
1
Rethinking Pre-Training for Agentic AI with Aakanksha Chowdhery - #759
52:54
52:54
Play later
Play later
Lists
Like
Liked
52:54Today, we're joined by Aakanksha Chowdhery, member of technical staff at Reflection, to explore the fundamental shifts required to build true agentic AI. While the industry has largely focused on post-training techniques to improve reasoning, Aakanksha draws on her experience leading pre-training efforts for Google’s PaLM and early Gemini models to…
…
continue reading
1
SANS Stormcast Wednesday, December 17th, 2025: Beyond RC4; Forticloud SSO Vuln Exploited; FortiGate SSO Exploited;
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Beyond RC4 for Windows authentication Microsoft outlined its transition plan to move away from RC4 for authentication and published guidance and tools to facilitate this change. https://www.microsoft.com/en-us/windows-server/blog/2025/12/03/beyond-rc4-for-windows-authentication FortiCloud SSO Login Vuln Exploited Arctic Wolf observed exploit attemp…
…
continue reading
1
🎁❄️🎄 GEOFF WRIGHT RETURNS: 2025 EOY SPECIAL EPISODE!
51:27
51:27
Play later
Play later
Lists
Like
Liked
51:27In our tradtional end-of-year DEX Show special episode, Mondelez’s Geoff Wright returns to unpack a wild 2025 for IT, AI and employee experience. Tim, Tom and Geoff riff on AI agents that shop, plan travel and work across your browser tabs, the coming street fight between Windows and Chromebooks, and why younger workers just want a browser and to b…
…
continue reading
1
SANS Stormcast Tuesday, December 16th, 2025: Current React2Shell Example; SAML woes; MSMQ issues after patch;
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45More React2Shell Exploits CVE-2025-55182 Our honeypots continue to detect numerous React2Shell variants. Some using slightly modified exploits https://isc.sans.edu/diary/More%20React2Shell%20Exploits%20CVE-2025-55182/32572 The Fragile Lock: Novel Bypasses For SAML Authentication SAML is a tricky protocol to implement correctly, in particular if dif…
…
continue reading
1
SANS Stormcast Monday, December 15th, 2025: DLL Entry Points; ClickFix and Finger; Apple Patches
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45Abusing DLLs EntryPoint for the Fun DLLs will not just execute code when some of their functions are called, but also as they are loaded. https://isc.sans.edu/diary/Abusing%20DLLs%20EntryPoint%20for%20the%20Fun/32562 Apple Patches Everything: December 2025 Edition Apple released patches for all of its operating systems, fixing two already exploited…
…
continue reading
1
SANS Stormcast Friday, December 12th, 2025: Local AI Models; Mystery Chrome 0-Day; SOAPwn Attack
6:56
6:56
Play later
Play later
Lists
Like
Liked
6:56Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 Mystery Google Chrome 0-Day Vulnerability Google released an update for Google Chrome fixing a vulne…
…
continue reading
1
SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on. https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Comma…
…
continue reading
1
SANS Stormcast Wednesday, December 10th, 2025: Microsoft, Adobe, Ivanti, Fortinet, and Ruby patches.
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution in ColdFusion, as well as the code execution issue in Acrobat, will very likely see exploits soon. h…
…
continue reading
1
Why Vision Language Models Ignore What They See with Munawar Hayat - #758
57:40
57:40
Play later
Play later
Lists
Like
Liked
57:40In this episode, we’re joined by Munawar Hayat, researcher at Qualcomm AI Research, to discuss a series of papers presented at NeurIPS 2025 focusing on multimodal and generative AI. We dive into the persistent challenge of object hallucination in Vision-Language Models (VLMs), why models often discard visual information in favor of pre-trained lang…
…
continue reading
1
🎙️ M-Dashes, the Cookie Monster & DEX: The BIG Reality Bites 2025 Finale
38:28
38:28
Play later
Play later
Lists
Like
Liked
38:28It’s our favorite Reality Bites tradition: the end-of-year panel! Tom and Tim bring the whole crew together—Megan, Ariana, Sean, and Dina—for a joyful, honest, and insight-packed reflection on 2025. From global travel and AI breakthroughs to personal milestones, hard-won lessons, and the music that carried us through the year, the team shares what …
…
continue reading
1
Bytes, Borders, & Breaches - Ep. 2: AI Agents, Snake Malware & FBI Backdoors
37:25
37:25
Play later
Play later
Lists
Like
Liked
37:25The internet isn't a cloud; it's a glass house. And we just handed everyone a rock. In Episode 02 of Bytes, Borders, & Breaches, we deconstruct how a single configuration file nearly lobotomized the web, how Chinese state hackers are turning our own laws against us, and why your new "Agentic AI" developer might actually be a sleeper cell waiting fo…
…
continue reading
1
SANS Stormcast Tuesday, December 9th, 2025: nanoKVM Vulnerabilities; Ghostframe Phishing; WatchGuard Advisory
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as undocumented may actually be documented in the underlying hardware description. https://www.tomshardware.com/tech-industry/cyber-security/researcher-finds-undocumented-microphone-and-major-security-flaws-in…
…
continue reading
1
SANS Stormcast Monday, December 8th, 2025: AutoIT3 FileInstall; React2Shell Update; Tika Vuln
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34AutoIT3 Compiled Scripts Dropping Shellcodes Malicious AutoIT3 scripts are usign the FileInstall function to include additional scripts at compile time that are dropped as temporary files during execution. https://isc.sans.edu/diary/AutoIT3%20Compiled%20Scripts%20Dropping%20Shellcodes/32542 React2Shell Update The race is on to patch vulnerable syst…
…
continue reading
1
SANS Stormcast Friday, December 5th, 2025: Compromised Govt System; React Vuln Update; Array Networks VPN Attacks
4:35
4:35
Play later
Play later
Lists
Like
Liked
4:35Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Government%3F%20%5BGuest%20Diary%5D/32536 React Update Working exploits for the React vulnerability patched yesterday are n…
…
continue reading
1
Bonus - Cloud Computing: The Green and Red Flags 🚩
14:14
14:14
Play later
Play later
Lists
Like
Liked
14:14Discover the key insights into navigating cloud adoption, avoiding pitfalls, and identifying opportunities. This episode dives into: Why the cloud rose to prominence and its evolving role in business operations. Green flags: Seasonal scalability, hybrid solutions, and aligning cloud use with specific needs. Red flags: Overspending, inefficiencies, …
…
continue reading
1
How AI is Shaping the Future: The Rise of The Bionic Professional with Bill Wallace
42:50
42:50
Play later
Play later
Lists
Like
Liked
42:50How AI is Shaping the Future: The Rise of The Bionic Professional with Bill Wallace #aitechnology #futureofwork #bionicprofessional Step into the exciting world where AI is transforming the way we work and the very nature of our professions. Please visit our website to get more information: https://swangroup.net/ In this episode, I’m joined by Bill…
…
continue reading
1
SANS Stormcast Thursday, December 4th, 2025: CDN Headers; React Vulnerabiity; PickleScan Patch
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React server components. Exploitation is likely imminent. https://react.dev/blog/2025/12/03/critical-se…
…
continue reading
1
🐙 What the Octopus Can Teach Us About AI (w/ Steve Wunker)
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12Tim and Tom sit down with Steve Wunker — Managing Director of New Markets Advisors, author, and early pioneer of the smartphone — to explore the big ideas behind his latest book, AI and the Octopus Organization. Steve breaks down why AI shouldn’t just “bolt onto” old processes, how distributed intelligence reshapes the firm, and what leaders can le…
…
continue reading
1
SANS Stormcast Wednesday, December 3rd, 2025: SmartTube Compromise; NPM Malware Prompt Injection Attempt; Angular XSS Vulnerability
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-3670629826 https://github.com/yuliskov/SmartTube/releases/tag/notification Two Years, 17K Downloads: The NPM Malware That Tried to Gas…
…
continue reading
1
Scaling Agentic Inference Across Heterogeneous Compute with Zain Asgar - #757
48:44
48:44
Play later
Play later
Lists
Like
Liked
48:44In this episode, Zain Asgar, co-founder and CEO of Gimlet Labs, joins us to discuss the heterogeneous AI inference across diverse hardware. Zain argues that the current industry standard of running all AI workloads on high-end GPUs is unsustainable for agents, which consume significantly more tokens than traditional LLM applications. We explore Gim…
…
continue reading
1
CRAzy Requirements: What the Cyber Resilience Act Means for Your SBOM
5:50
5:50
Play later
Play later
Lists
Like
Liked
5:50The EU Cyber Resilience Act (CRA) is reshaping global expectations for software security – and putting Software Bill of Materials (SBOMs) at the center of compliance. In this episode, Shinobi and Gen break down what the CRA requires, how it compares to U.S. regulations, and what engineering and legal teams must do now to stay ahead. Whether you're …
…
continue reading
1
SANS Stormcast Tuesday, December 2nd, 2025: Analyzing ToolShell from Packdets; Android Update; Long Game Malicious Browser Ext.
5:49
5:49
Play later
Play later
Lists
Like
Liked
5:49Hunting for SharePoint In-Memory ToolShell Payloads A walk-through showing how to analyze ToolShell payloads, starting with acquiring packets all the way to decoding embedded PowerShell commands. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Hunting%20for%20SharePoint%20In-Memory%20ToolShell%20Payloads/32524 Android Security Bulletin December 20…
…
continue reading
1
SANS Stormcast Monday, December 1st, 2025: More ClickFix; Teams Guest Access; Geoserver XXE Vulnerablity
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42Fake adult websites pop realistic Windows Update screen to deliver stealers via ClickFix The latest variant of ClickFix tricks users into copy/pasting commands by displaying a fake blue screen of death. https://www.acronis.com/en/tru/posts/fake-adult-websites-pop-realistic-windows-update-screen-to-deliver-stealers-via-clickfix/ B2B Guest Access Cre…
…
continue reading
1
SANS Stormcast Wednesday, November 26th, 2025: Attacks Against Messaging; Passwords in Random Websites; Fluentbit Vuln; #thanksgiving
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications Spyware attacks messaging applications in part by triggering vulnerabilities in messaging applications but also by deploying tools like keystroke loggers and screenshot applications. https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-targ…
…
continue reading
1
SANS Stormcast Tuesday, November 25th, 2025: URL Mapping and Authentication; SHA1-Hulud; Hacklore
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control./32518 Sha1-Hulud, The Se…
…
continue reading
1
Bytes, Borders, & Breaches - Ep. 1: The Wolf, The Wall, and The Watermark
35:42
35:42
Play later
Play later
Lists
Like
Liked
35:42The script just got flipped. Chinese state hackers are using autonomous AI agents to write cyberattacks ("Operation Wolfs Bane"), a massive Cloudflare outage took down half the internet, and the Akira ransomware group just made $250 million by exploiting a single, basic mistake. Welcome to the premiere episode of Bytes, Borders, & Breaches. I’m you…
…
continue reading
1
SANS Stormcast Monday, November 24th, 2025: CSS Padding in Phishing; Oracle Identity Manager Scans Update;
4:59
4:59
Play later
Play later
Lists
Like
Liked
4:59Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%3F/32510 Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day Early exploit attem…
…
continue reading
1
SANS Stormcast Friday, November 21st, 2025: Oracle Idendity Manager Scans; SonicWall DoS Vuln; Adam Wilson (@sans_edu) reducing prompt injection.
14:09
14:09
Play later
Play later
Lists
Like
Liked
14:09Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, indicating that exploitation may have occurred prior to the patch being released. https://isc.sans.edu/diary/Oracle%20Identity%20Manager%20Exploit%20…
…
continue reading
1
Bonus - From Chaos to Innovation: Lessons in Tech Pivots
24:24
24:24
Play later
Play later
Lists
Like
Liked
24:24Discover how chaos sparks innovation in this insightful exploration of tech pivots. Featuring lessons from industry leaders, this episode dives into the challenges, strategies, and breakthroughs that define successful pivots in the tech world. Whether you're building dynamic applications or navigating complex entrepreneurial decisions, this video o…
…
continue reading
1
SANS Stormcast Thursday, November 20th, 2025: Unicode Issues; FortiWeb More Vulns; DLink DIR-878 Vuln; Operation WrtHug and ASUS Routers
6:34
6:34
Play later
Play later
Lists
Like
Liked
6:34Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names./32472 FortiWeb Multiple OS command injection in API and CLI A second silently patched vulnerability in FortiW…
…
continue reading
1
SANS Stormcast Wednesday, November 19th, 2025: Kong Tuke; Cloudflare Outage
4:38
4:38
Play later
Play later
Lists
Like
Liked
4:38KongTuke Activity This diary investigates how a recent Kong Tuke infections evolved all the way from starting with a ClickFix attack. https://isc.sans.edu/diary/KongTuke%20activity/32498 Cloudflare Outage Cloudflare suffered a large outage today after an oversized configuration file was loaded into its bot protection service https://x.com/dok2001 G…
…
continue reading
1
Proactive Agents for the Web with Devi Parikh - #756
56:04
56:04
Play later
Play later
Lists
Like
Liked
56:04Today, we're joined by Devi Parikh, co-founder and co-CEO of Yutori, to discuss browser use models and a future where we interact with the web through proactive, autonomous agents. We explore the technical challenges of creating reliable web agents, the advantages of visually-grounded models that operate on screenshots rather than the browser’s mor…
…
continue reading
1
SANS Stormcast Tuesday, November 18th, 2025: Binary Expression Decoding. Tea NPM Pollution; IBM AIX NIMSH Vulnerability
4:58
4:58
Play later
Play later
Lists
Like
Liked
4:58Decoding Binary Numeric Expressions Didier updated his number to hex script to support simple arithmetic operations in the text. https://isc.sans.edu/diary/Decoding%20Binary%20Numeric%20Expressions/32490 Tea Token NPM Pollution The NPM repository was hit with around 150,000 submissions that did not contain any useful contributions, but instead atte…
…
continue reading
1
💥 Agentic AI and the End of Traditional IT (w/ Robb Wilson)
44:13
44:13
Play later
Play later
Lists
Like
Liked
44:13In a wide-ranging conversation, Robb Wilson—CEO and co-founder of OneReach.ai and author of The Age of Invisible Machines—joins Tim and Tom to explore the rise of agentic AI and its seismic implications for IT, organizations, and society. Robb breaks down the concept of agent runtimes, why conversational interfaces matter more than ever, and how ad…
…
continue reading
1
SANS Stormcast Monday, November 17th, 2025: New(isch) Fortiweb Vulnerability; Finger and ClickFix
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10Fortiweb Vulnerability Fortinet, with significant delay, acknowledged a recently patched vulnerability after exploit attempts were seen publicly. https://isc.sans.edu/diary/Honeypot+FortiWeb+CVE202564446+Exploits/32486 https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/ https://fo…
…
continue reading
1
SANS Stormcast Friday, November 14th, 2025: SmartApeSG and ClickFix; Formbook Obfuscation Tricks; Sudo-rs Vulnerabilities; SANS Holiday Hack Challenge
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diar…
…
continue reading
1
Snippet Detection: Small Code, Big Compliance Risk
5:07
5:07
Play later
Play later
Lists
Like
Liked
5:07In this episode of Sushi Bytes, Shinobi and Gen unpack the high-stakes reality of code snippet: when small fragments of open source code make their way into proprietary applications and go undetected by traditional SCA tools. From copy-pasted Stack Overflow answers to AI-generated code functions, these sometimes-small code segments can carry seriou…
…
continue reading
1
Developer Velocity vs. Legal Risk: The Latest Software Engineering Tug-of-War
4:41
4:41
Play later
Play later
Lists
Like
Liked
4:41Developer experience and productivity are critical, but so is copyright and license compliance. In this episode of Sushi Bytes, Shinobi and Gen talk about the tug-of-war between productivity-centric engineering teams and risk-averse legal teams. Who will win? Tune in to hear how modern SCA tooling can align speed with safety, automate away this fri…
…
continue reading
1
Unmasked: What to Look for in Picking the Right SCA Tool
5:55
5:55
Play later
Play later
Lists
Like
Liked
5:55Not every Software Composition Analysis (SCA) tool reveals what’s really haunting your code. In this Halloween-themed episode of Sushi Bytes, Shinobi and Gen explore why comparing SCA tools is trickier than it seems—and what engineering and compliance teams should look for under the mask. From snippet detection and modified code to license clarity,…
…
continue reading
In this episode of Sushi Bytes, Shinobi and Gen dive into the hidden risk of license drift – when the open source license declared in metadata files like package.json or README doesn’t match the actual licenses embedded in the source code. It’s a common problem with serious consequences, especially in embedded systems or M&A deals. The duo explores…
…
continue reading
1
AI-Generated Code: The Legal Unknown in Your Repo
4:18
4:18
Play later
Play later
Lists
Like
Liked
4:18AI-assisted coding is accelerating development, but also creating compliance headaches. In this episode of Sushi Bytes, Shinobi and Gen unpack the legal gray zones around AI-generated code: Who owns it? Is it safe to use? What happens if it’s trained on GPL-licensed data? If your team uses GitHub Copilot, ChatGPT, or Claude, there’s a good chance y…
…
continue reading
1
How AI Is Accelerating Drug Discovery | Smbat Rafayelyan (Bioneex CEO)
37:37
37:37
Play later
Play later
Lists
Like
Liked
37:37AI in Drug Discovery | #aidrugdiscovery #biotechinnovation #medicalinnovation Amid a rapidly changing biotech landscape, AI is transforming how we discover and develop new medicines. Please visit our website to get more information: https://swangroup.net/ In this episode, I sit down with Smbat Rafayelyan, founder and CEO of Bioneex, a platform that…
…
continue reading
1
SANS Stormcast Thursday, November 13th, 2025: OWASP Top 10 Update; Cisco/Citrix Exploits; Test post quantum readiness
6:33
6:33
Play later
Play later
Lists
Like
Liked
6:33OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-disc…
…
continue reading
Not every vulnerability in your SBOM is a real threat. That’s where VEX comes in. In this episode of Sushi Bytes, Shinobi and Gen explore the Vulnerability Exploitability eXchange… what it is, why it matters, and how it helps teams focus on the vulnerabilities that actually matter. From cutting through alert fatigue to avoiding the growing mess of …
…
continue reading
Your software has a supply chain. Your SBOM is supposed to tell you what’s inside. But what makes a Software Bill of Materials truly useful; and why is everyone suddenly asking for one? In this episode of Sushi Bytes, Shinobi unpacks what an SBOM is, why regulatory pressure is turning it from best practice to business-critical and why spinning off …
…
continue reading
Welcome to Sushi Bytes – FossID’s bite-sized, AI-generated podcast hosted by Shinobi, your sharp-eyed Software Composition Analysis ninja. In this debut episode, Shinobi breaks down what “software supply chain integrity” really means… and why it’s now a board-level concern. From open source license compliance to AI-generated code and SBOMs, we expl…
…
continue reading
1
AI Orchestration for Smart Cities and the Enterprise with Robin Braun and Luke Norris - #755
54:46
54:46
Play later
Play later
Lists
Like
Liked
54:46Today, we're joined by Robin Braun, VP of AI business development for hybrid cloud at HPE, and Luke Norris, co-founder and CEO of Kamiwaza, to discuss how AI systems can be used to automate complex workflows and unlock value from legacy enterprise data. Robin and Luke detail high-impact use cases from HPE and Kamiwaza’s collaboration on an “Agentic…
…
continue reading