The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Chaos Lever examines emerging trends and new technology for the enterprise and beyond. Hosts Ned Bellavance and Chris Hayner examine the tech landscape through a skeptical lens based on over 40 combined years in the industry. Are we all doomed? Yes. Will the apocalypse be streamed on TikTok? Probably. Does Joni still love Chachi? Decidedly not.
…
continue reading
Technology has become increasingly important to policy debates, but these debates won’t be productive without an understanding of how the technology in question works. AEI Visiting Fellow Shane Tews interviews tech industry experts to explain how the apps, services, and structures of today's information technology systems work, and how they shape our social and economic life.
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
A podcast about web design and development.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
The latest in AI and Marketing - Hear Tomorrow’s Tech Today AI in Marketing is a human-curated, AI-generated, Short-Form Podcast. This podcast is generated by Voice_Stream. With Voice_Stream give your brand a voice. Automatically convert your text documents into professional-quality podcasts with Voice_Stream. Start you free trial at https://www.getvoicestream.com/
…
continue reading
Today's websites are increasingly dynamic. Pages are no longer static HTML files but instead generated by scripts and database calls. User interfaces are more seamless, with technologies like Ajax replacing traditional page reloads. This course teaches students how to build dynamic websites with Ajax and with Linux, Apache, MySQL, and PHP (LAMP), one of today's most popular frameworks. Students learn how to set up domain names with DNS, how to structure pages with XHTML and CSS, how to progr ...
…
continue reading
This is the show for IT leaders looking to move fast, optimize costs, and protect against the latest security threats in their IT environments. In each episode, discussions tackle one aspect of IT, from cloud computing and digital workplace to modern infrastructure and cybersecurity. If you're looking to stay ahead in the game, enhance your organizational agility, and secure your digital assets, you've come to the right place.
…
continue reading
Beyond the Hype is a monthly podcast from the Scott Logic team where we cast a practical eye over what is new and exciting in software development – everything from Kafka to Kubernetes, AI to APIs, microservices to micro-frontends. We look beyond the promises, the buzz and excitement to guide you towards the genuine value. At Scott Logic, we have years of experience in tackling tough software problems for our clients, often at the bleeding edge of technology. Each month on this podcast, our ...
…
continue reading

1
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Jason Mical, Lori Robinson, Hed Kovetz, Rob Allen, Vivek Ramachandran, Alex Pinto - ESW #405
1:42:43
1:42:43
Play later
Play later
Lists
Like
Liked
1:42:43Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
…
continue reading

1
2025 Security Trends: Identity, Endpoint, Cloud & the Rise of Browser Threats - Hed Kovetz, Vivek Ramachandran, Rob Allen, Jason Mical, Alex Pinto, Lori Robinson - ESW #405
1:42:44
1:42:44
Play later
Play later
Lists
Like
Liked
1:42:44Now in its 18th year, the Verizon Business DBIR is one of the industry’s longest standing and leading reports on the current cybersecurity landscape. This year’s report analyzes more than 22,000 security incidents with victims spanning 139 countries, examining significant growth in third-party involvement in breaches, increases in ransomware and ex…
…
continue reading

1
E6 - Browser extensions are everywhere - but are they safe for enterprise use?
11:43
11:43
Play later
Play later
Lists
Like
Liked
11:43In this episode, we explore the hidden risks posed by one of the most overlooked elements of the modern enterprise tech stack: browser extensions. In this episode we will unpack key insights from the newly released Enterprise Browser Extension Security Report 2025 - a data-driven look into how widely-used browser extensions are impacting enterprise…
…
continue reading

1
Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland... - SWN #481
33:15
33:15
Play later
Play later
Lists
Like
Liked
33:15Edge, Safari, CISO Pay and Loathing, Fake AI, ASUS, OneDrive, Manus, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-481
…
continue reading

1
ConnectWise Breach: Nation-State Exploits CVE-2025-3935 in ScreenConnect
15:06
15:06
Play later
Play later
Lists
Like
Liked
15:06ConnectWise has confirmed a cyberattack targeting ScreenConnect, its remote access solution used by thousands of Managed Service Providers (MSPs). The breach is reportedly tied to a sophisticated nation-state actor and linked to CVE-2025-3935, a critical ViewState code injection vulnerability that could allow Remote Code Execution (RCE). In this ep…
…
continue reading

1
Browser vs. GPU: Firefox 139 Collides with NVIDIA Drivers
14:10
14:10
Play later
Play later
Lists
Like
Liked
14:10In this episode, we dive into the graphical corruption saga triggered by Firefox version 139, released on May 27, 2025. Aimed at uncovering what went wrong, we review reports from across the web detailing how the update wreaked havoc for Windows users running NVIDIA graphics cards—particularly those with multi-monitor setups using mixed refresh rat…
…
continue reading

1
Unbound Raises $4M to Secure Generative AI in the Enterprise
20:08
20:08
Play later
Play later
Lists
Like
Liked
20:08In this episode, we break down the recent $4 million seed funding round for Unbound, a startup tackling one of the biggest unsolved problems in enterprise AI: how to stop employees from leaking sensitive data through ungoverned use of Generative AI tools. Unbound’s AI Gateway aims to be the missing link between rapid AI adoption and responsible usa…
…
continue reading

1
"AI Innovation Pulse: Google's Gemini AI, Hugging Face Robots, AI Safety Concerns, Perplexity's New Tool, and Doudna Supercomputer"
4:56
4:56
Play later
Play later
Lists
Like
Liked
4:56Welcome to another episode of AI in Marketing where we cover the hottest news in the AI sphere. Today, we're discussing Google's Gemini AI and its enhanced video analysis capability in Google Drive. From artificial intelligence, we pivot to humanoid robots as Hugging Face introduces HopeJR and Reachy Mini. We also delve into pressing concerns surro…
…
continue reading

1
SE Radio 670: Matthias Endler on Prototype in Rust
1:01:01
1:01:01
Play later
Play later
Lists
Like
Liked
1:01:01Matthias Endler, Rust developer, open-source maintainer, and consultant through his company Corrode, speaks with SE Radio host Gavin Henry about prototyping in Rust. They discuss prototyping and why Rust is excellent for prototyping, and Matthias recommends a workflow for it, including what parts of Rust to use, and what parts to avoid at this stag…
…
continue reading
In the security news: Vicious Trap - The malware hiding in your router Hacking your car WSL is open-source, but why? Using AI to find vulnerabilities - a case study Why you should not build your own password manager The inside scoop behind Lumma Infostealer Hacking a smart grill Hardcoded credentials on end of life routers and "Alphanetworks" SIM s…
…
continue reading

1
Windows Updates, Reimagined: Inside Microsoft’s Unified Orchestration Push
16:18
16:18
Play later
Play later
Lists
Like
Liked
16:18Microsoft is taking direct aim at one of the biggest pain points in the Windows ecosystem: update fragmentation. In this episode, we dive deep into the details of Microsoft’s newly announced Windows-native update orchestration platform, currently in private preview. We explore how this unified infrastructure aims to centralize updates for all apps,…
…
continue reading
What happens when a Google engineer thinks his chatbot has developed a soul? Three years ago, we covered the LaMDA saga, and now it's back—because someone forgot to turn off the AI. In this rebroadcast episode, Chris and Ned re-examine the wild story of Blake Lemoyne, who believed his creation had achieved sentience. It... uh, didn't. 🤖 The duo dig…
…
continue reading

1
Systemd as a Weapon: How PumaBot Exploits Linux Persistence
18:38
18:38
Play later
Play later
Lists
Like
Liked
18:38Linux systems are under siege—particularly in the world of IoT and internet-exposed servers. In this episode, we dissect PumaBot, a new GoLang-based botnet that's turning Linux IoT devices into cryptomining workhorses. We’ll break down how attackers brute-force SSH credentials, install malware disguised as legitimate services, and use systemd for s…
…
continue reading

1
TypeScript, Security, and Type Juggling with Ariel Shulman & Liran Tal - JSJ 679
1:32:43
1:32:43
Play later
Play later
Lists
Like
Liked
1:32:43In this episode, we dove headfirst into the swirling waters of TypeScript, its real-world use cases, and where it starts to fall short—especially when it comes to security. Joining us from sunny Tel Aviv (and a slightly cooler Portland), we had the brilliant Ariel Shulman and security advocate Liran Tal bring the heat on everything from type safety…
…
continue reading

1
The LexisNexis Breach: 364,000 Records Exposed via GitHub
17:22
17:22
Play later
Play later
Lists
Like
Liked
17:22On December 25, 2024, while most businesses were offline, a serious data breach struck LexisNexis Risk Solutions—exposing the personal data of over 360,000 individuals. The twist? The attack vector wasn’t a direct hack, but an indirect compromise through a third-party GitHub repository. Even more concerning, the breach went undetected until April 1…
…
continue reading

1
Mistral’s Code Embeddings, Horizon3.ai’s Cybersecurity Bet, and Meta’s Generative Shift
4:33
4:33
Play later
Play later
Lists
Like
Liked
4:33"AI in Marketing: Episode 123" explores the latest advancements and challenges in AI, discussing Mistral's new code embedding model and its application in Marketing, Horizon3.ai's pursuit for funding to advance in AI cybersecurity, and the reorganization of Meta's generative AI team. This episode also examines how AI is revolutionizing user experie…
…
continue reading

1
Ransomware Hits MathWorks: Week-Long Outage Disrupts Millions
12:30
12:30
Play later
Play later
Lists
Like
Liked
12:30On this episode, we dissect the ransomware attack that brought MathWorks—a cornerstone software provider for engineers, scientists, and educators—to a grinding halt. The attack, which began on May 18, 2025, and was officially confirmed on May 26, crippled a wide range of customer-facing and internal systems, from MATLAB Online and ThingSpeak to lic…
…
continue reading

1
Zscaler Acquires Red Canary: What It Means for AI-Powered Security Operations
14:27
14:27
Play later
Play later
Lists
Like
Liked
14:27The cybersecurity market is booming, projected to triple in size from $215 billion in 2025 to $697 billion by 2035. This explosive growth is being fueled by rising cyber threats, the digital transformation of global businesses, and an urgent need for advanced security operations. One of the clearest signals of this momentum? Zscaler’s acquisition o…
…
continue reading

1
DragonForce Breaches MSPs via SimpleHelp Flaws: Inside CVE-2024-57726
16:47
16:47
Play later
Play later
Lists
Like
Liked
16:47In this episode, we unpack a critical supply chain breach that’s rattled the cybersecurity world: the exploitation of multiple zero-day vulnerabilities in SimpleHelp Remote Support Software — most notably CVE-2024-57726, a privilege escalation flaw scored 9.9 by the NVD. Threat actors linked to the DragonForce ransomware operation and the Scattered…
…
continue reading

1
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Jordan Avnaim, Chris Hickman, Amit Sinha, Albert Estevez Polo - BSW #397
1:07:59
1:07:59
Play later
Play later
Lists
Like
Liked
1:07:59This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
…
continue reading

1
"Chatbots, Brain Tech & Authenticity in AI: An Expedition with Anthropic, OpenAI, Neuralink, Meta & Adobe"
4:52
4:52
Play later
Play later
Lists
Like
Liked
4:52"AI in Marketing" delivers insightful analysis of the latest advancements and industry news impacting artificial intelligence within various sectors. In this episode, we explore Anthropic's introduction of a voice mode to their Claude chatbot and its potential appeal. We also discuss OpenAI's move to encourage developers to embed their ChatGPT sign…
…
continue reading

1
Risky Business #793 -- Scattered Spider is hijacking MX records
1:04:52
1:04:52
Play later
Play later
Lists
Like
Liked
1:04:52In this week’s edition of Risky Business Dmitri Alperovitch and Adam Boileau join Patrick Gray to talk through the week’s news, including: EXCLUSIVE: A Scattered Spider-style crew is hijacking DNS MX entries and compromising enterprises within minutes The SVG format brings the all horrors of HTML+JS to image files, and attackers have noticed Brian …
…
continue reading

1
AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more... - SWN #480
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-480
…
continue reading

1
Fentanyl, Firearms, and $200M in Crypto: Dark Web Crime Meets Global Law Enforcement
13:50
13:50
Play later
Play later
Lists
Like
Liked
13:50This episode dives deep into Operation RapTor, one of the largest international crackdowns on dark web crime to date. We analyze how coordinated law enforcement actions across ten countries led to the arrest of 270 individuals, the seizure of $200 million in currency and digital assets, and the dismantling of major darknet marketplaces including In…
…
continue reading

1
Marlboro-Chesterfield Pathology Ransomware Breach: 235,000 Patients Affected
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27In this episode, we take a deep dive into the recent Marlboro-Chesterfield Pathology (MCP) ransomware attack—one of the most significant healthcare breaches of 2025. On January 16th, MCP detected unauthorized activity on its internal systems. Just days later, the SAFEPAY ransomware group claimed responsibility, posting stolen data—over 30GB of sens…
…
continue reading

1
How Infostealers Like Stealc Use TikTok Accounts to Exfiltrate Stolen Data
22:54
22:54
Play later
Play later
Lists
Like
Liked
22:54In this episode, we dive deep into the underground cybercrime ecosystem powering the surge of modern infostealers—Stealc, Vidar, and LummaC2. These malware strains aren't just code—they're full-service products sold as Malware-as-a-Service (MaaS), giving even low-skilled attackers access to powerful data theft tools. We break down how these stealer…
…
continue reading

1
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Shahar Man, Brian Fox, Mark Lambert - ASW #332
1:04:35
1:04:35
Play later
Play later
Lists
Like
Liked
1:04:35ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
…
continue reading

1
"AI Updates & Ethics: Palisade's Unpredictable Models, xAI's Grok 3.5 Teaser, Google's Creative Lineup, and the Human-AI Identity Crisis"
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41We start with the unsettling revelations by Palisade Research about certain AI models potentially "disobeying" shutdown instructions, highlighting questions on AI self-regulation. We move on to a leak hinting at the imminent launch of xAI's Grok 3.5, rumored to offer advances in coding skills and better integration with iOS devices. Google DeepMind…
…
continue reading

1
The Great Screenshot Scandal: Microsoft Recall and Signal’s DRM Shield
28:34
28:34
Play later
Play later
Lists
Like
Liked
28:34In this episode, we dive deep into the growing tension between AI innovation and data privacy through the lens of a major controversy: Microsoft’s Windows 11 Recall feature. Designed to screenshot nearly everything a user does every few seconds, Recall creates a searchable visual archive of on-screen activity. But while Microsoft claims it enhances…
…
continue reading

1
Bumblebee Malware Returns: IT Pros Targeted Through SEO Poisoning and Typosquatting
28:48
28:48
Play later
Play later
Lists
Like
Liked
28:48In this episode, we break down the resurgence of the Bumblebee malware loader and its latest distribution method: blackhat SEO campaigns and trojanized software installers. By mimicking legitimate download pages through typosquatted domains and poisoning Bing search results, attackers are tricking IT professionals into unknowingly infecting their o…
…
continue reading

1
FBI Warns of Luna Moth Tactics: Inside the Silent Ransom Group’s Law Firm Attacks
14:45
14:45
Play later
Play later
Lists
Like
Liked
14:45In this episode, we dive into the evolving tactics of the Silent Ransom Group (SRG)—also known as Luna Moth—a cybercriminal outfit that has shifted from traditional phishing to a new, more deceptive strategy: impersonating IT support over the phone. Their latest victims? U.S. law firms, targeted for the sensitive data they hold and the large financ…
…
continue reading

1
Reality check on SOC AI; Enterprise News; runZero and Imprivata RSAC interviews - HD Moore, Joel Burleson-Davis, Erik Bloch - ESW #408
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
…
continue reading

1
Reality check on SOC AI; Enterprise News; runZero and Imprivata RSAC interviews - Erik Bloch, HD Moore, Joel Burleson-Davis - ESW #408
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
…
continue reading

1
Reality check on SOC AI; Enterprise News; runZero and Imprivata RSAC interviews - Erik Bloch, HD Moore, Joel Burleson-Davis - ESW #408
1:49:38
1:49:38
Play later
Play later
Lists
Like
Liked
1:49:38Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
…
continue reading

1
666: What Are the Evils of the Web Platform?
1:02:12
1:02:12
Play later
Play later
Lists
Like
Liked
1:02:12Show Description How it all comes back to the why column, dark patterns, privacy and tracking, getting emails forever from one purchase, how to be bold with communication while still being respectful, HTMHell, CSS mistakes, are we anti-JSON, and the state of FitVid in 2025. Listen on Website → Links Markup from hell - HTMHell Incomplete List of Mis…
…
continue reading

1
Keyboards, 3am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland... - SWN #479
33:37
33:37
Play later
Play later
Lists
Like
Liked
33:37Keyboards, 3 am, TikTok, LummaC2, Cityworks, Honeypots, Fancy Bear, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-479
…
continue reading

1
Trust Exploited: Unpacking the macOS Malware Attacking Ledger Wallets
25:57
25:57
Play later
Play later
Lists
Like
Liked
25:57A growing cyber threat is targeting macOS users who rely on Ledger cold wallets to secure their cryptocurrency. In this episode, we dissect the anti-Ledger malware campaign—an increasingly sophisticated phishing operation that impersonates the trusted Ledger Live application to trick users into revealing their 24-word recovery phrases. Once entered…
…
continue reading

1
$21M Seized and DanaBot, Qakbot, and Bumblebee Disrupted in Operation Endgame Takedown
11:23
11:23
Play later
Play later
Lists
Like
Liked
11:23In this episode, we break down the latest and most impactful phase of Operation Endgame, the international law enforcement campaign targeting the backbone of the ransomware ecosystem. Between May 19–22, authorities executed a sweeping takedown of 300 servers, neutralized 650 domains, and seized €3.5 million in cryptocurrency, adding to a total of €…
…
continue reading

1
From TikTok to Total Compromise: The Rise of Social Media Infostealers
18:50
18:50
Play later
Play later
Lists
Like
Liked
18:50In this episode, we dive into the alarming surge of infostealer malware campaigns leveraging social media platforms, particularly TikTok, as their distribution vector. Threat actors are exploiting trending content—especially around AI tools like Sora, ChatGPT, and Google Gemini AI, and popular software like CapCut and MidJourney—to bait unsuspectin…
…
continue reading

1
"Onion's Comedic Strategy, OpenAI's UAE Plans, Trump's Big Bill, Apollo's AI Safety & Tesla's Optimus Robot Showcase"
4:59
4:59
Play later
Play later
Lists
Like
Liked
4:59The "AI in Marketing" podcast provides in-depth coverage of the latest happenings in the world of AI. Dive deep into a discussion of The Onion's newly founded creative agency that interestingly veers away from relying on AI in crafting humor-filled copywriting. Explore OpenAI's ambitious initiative to establish a data center mega-factory in UAE in …
…
continue reading

1
Malware Laced Printer Drivers - PSW #875
2:01:59
2:01:59
Play later
Play later
Lists
Like
Liked
2:01:59This week in the security news: Malware-laced printer drivers Unicode steganography Rhode Island may sue Deloitte for breach. They may even win. Japan's active cyber defense law Stop with the ping LLMs replace Stack Overflow - ya don't say? Aggravated identity theft is aggravating Ivanti DSM and why you shouldn't use it EDR is still playing cat and…
…
continue reading

1
Kettering Health Breached: What the Interlock Ransomware Group Did and Why It Matters
23:33
23:33
Play later
Play later
Lists
Like
Liked
23:33In this episode, we dive into the ransomware attack that struck Kettering Health, a major healthcare provider, and the evolving tactics of the Interlock ransomware group behind it. Interlock, active since late 2024, has adopted advanced techniques including double extortion, credential theft, and PowerShell-based backdoors to compromise healthcare …
…
continue reading

1
Building Agentic AI Workflows with Matthew Henage - JSJ 678
1:03:44
1:03:44
Play later
Play later
Lists
Like
Liked
1:03:44In this episode, we sat down with full-stack developer and AI innovator Matthew Henage, creator of WAOS.ai (Web App Operating System) and the incredible storytelling platform SpeakMagic.ai. This conversation took us deep into the world of agentic AI, low-code app building, and the future of intelligent workflows. We kicked things off with Matthew s…
…
continue reading