Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
React Universe On Air is your go-to podcast for all things cross-platform and full-stack with React and React Native. Tune in to the conversations with tech creators and leading innovators about how the React ecosystem powers app development and business transformation. 423150
  continue reading
 
Artwork

1
Rocket Ship

Simon Grimm

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Welcome aboard the Rocket Ship, the ultimate podcast voyage into the heart of React Native development with Simon Grimm! Whether you're a seasoned mobile app developer or just starting your journey, this is your go-to destination for all things React Native and Expo.
  continue reading
 
Artwork

1
The React Show

Owl Creek Studios

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Discussions about React, JavaScript, and web development by React experts with a focus on diving deep into learning React and discussing what it's like to work within the React industry.
  continue reading
 
Partner with iTechnolabs, the top react native app development company IN USA and Canada, to enhance your online business. Our team of expert developers can build react native apps tailored to your needs. As a trusted and experienced react native app development company, we serve startups, established businesses, and MNCs in USA. Let's work together.
  continue reading
 
Artwork

1
Brains & Beards Show

Wojciech Ogrodowczyk, Brains & Beards, Patryk Peszko

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Patryk and Wojciech from Brains & Beards use their combined 25+ years of professional experience to discuss programming, building teams, workflows and everything else that it takes to deliver great mobile applications (in React Native, or otherwise).
  continue reading
 
Artwork

1
Coffee Break Spanish

Coffee Break Languages

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Learn Spanish in coffee-break lessons from the Radio Lingua Network. In each lesson we'll focus on the language you need to know and before long you'll be making yourself understood with native Spanish speakers. Season 1 lessons are for absolute beginners, and the courses increase in difficulty as the seasons progress. 386357 Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
The Undefined Podcast

Jared Palmer & Ken Wheeler

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The only engineering podcast with a 2 drink minimum! Full stack developers Jared Palmer and Ken Wheeler have peer-to-peer conversations with world-class engineers about software development.
  continue reading
 
Artwork

1
Modern Web

Modern Web

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The modern web is changing fast. Front-end frameworks evolve quickly, standards are emerging and old ones are fading out of favor. There are a lot of things to learn, but knowing the right thing is more critical than learning them all. Modern Web Podcast is an interview-style show where we learn about modern web development from industry experts. We’re committed to making it easy to digest lots of useful information!
  continue reading
 
Artwork

1
saubhagyam

seosaubhagyam

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
We are one of Top Rated Python Mobile Application Development Company in India and we also provide services of website development, web designing and mobile application development at the cost effective rates. Contact us today for more information.
  continue reading
 
Unity 3D is a fantastic gaming engine for creators that offers a wealth of features and gameplay options. Consider utilizing the Unity 3D game development platform to develop an interactive game that is both fascinating and excellent in its own right. Developing a gaming application will get easier as virtual worlds come to life.
  continue reading
 
Over the last few years, Coditation has successfully built marketing analytics and BI, marketing operations, customer success, social video analytics, marketing video generation, social media analytics and hyper-personalization products/solutions for it's customers. Leveraging this ever expanding MarTech know-how and experience, team Coditation has come up with a series of Podcast episodes focused on MarTech with a focus on data and artificial intelligence driven solutions. For more informat ...
  continue reading
 
Artwork

1
TABLEFLIP

Alan Shaw, Oli Evans, Richard Silverton and Bernard Mordan

icon
Unsubscribe
icon
Unsubscribe
Daily+
 
For a while now there's been a growing urge amongst the TABLEFLIP crew. A stratovolcano waiting to blurt out a fountain of opinions, observations, frustrations and wisdoms. Driven by our experiences working with many clients on varying projects and disparate code bases. From greenfield to legacy and everything in between our affliction to using the newest most shiny tech gives us a unique outlook on the state of the world of development in Node.js and JavaScript. We can no longer stem the fi ...
  continue reading
 
Artwork

1
Fragmented - Android Developer Podcast

Donn Felker, Kaushik Gopal

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Fragmented Podcast is the leading Android developer podcast started by Kaushik Gopal & Donn Felker. Our goal is to help you become a better Android Developer through conversation & to capture the zeitgeist of Android development. We chat about topics such as Testing, Dependency Injection, Patterns and Practices, useful libraries, and much more. We will also be interviewing some of the top developers out there. Subscribe now and join us on the journey of becoming a better Android Developer.
  continue reading
 
Loading …
show series
 
In this episode, we break down the massive supply chain attack that rocked the React Native ecosystem beginning on June 6, 2025. Over 16 NPM packages, collectively downloaded over one million times per week, were silently weaponized with a Remote Access Trojan (RAT) embedded in obfuscated code. The attack, linked to the same threat actor behind the…
  continue reading
 
In this episode of the Modern Web Podcast, Danny Thompson sits down with Reed Harmeyer, CTO of Skylight Social, and Brandon Mathis, React Native engineer at This Dot Labs. They unpack the technical and strategic decisions behind Skylight’s meteoric growth: why they built on the AT Protocol, how they tackled video discovery and scaling challenges, a…
  continue reading
 
Cedric van Putten from Expo joins Jamon, Robin, and Mazen to talk about Expo Atlas—a tool for visualizing Metro bundles, spotting bloat, and understanding what your app is really shipping. Plus, the story behind how Atlas was built and where it’s headed next. Show Notes Introducing Expo Atlas Connect With Us! Guest: @cedric_dev Jamon Holmgren: @jam…
  continue reading
 
No big news besides the RC of React Native 0.80, which gives us time to talk about the current version hell for React Native developers, and a great new Expo DevTool for everyone using TanStack Query! Also in this episode: - RSCs are underrated - Preview of Dead Simple Invoice App - Apple doesn't like my app - Open Water Swimming & Cold Water Shock…
  continue reading
 
Is rewriting your native app really the only way to go cross-platform?In this Coffee Talk episode, we explore how React Native Brownfield offers a smarter path forward.Łukasz Chludziński invites Oskar Kwaśniewski and Burak Güner—who work directly on React Native Core and brownfield tooling—to discuss how recent advances in React Native have made br…
  continue reading
 
In this episode, we dive into the latest wave of active Mirai botnet campaigns exploiting high-severity remote code execution (RCE) vulnerabilities in critical enterprise and IoT systems. The Mirai malware—still evolving nearly a decade after its first appearance—has adapted its tactics to weaponize recent CVEs with CVSS scores of 9.8 and 9.9, impa…
  continue reading
 
On June 5, 2025, United Natural Foods Inc. (UNFI)—North America's largest publicly traded wholesale food distributor and primary supplier for Whole Foods—was struck by a major cyberattack that forced the company to shut down key IT systems. The result: widespread delivery disruptions to over 30,000 locations across the U.S. and Canada, eerily empty…
  continue reading
 
News for the week of June 2, 2025: TSC init command gets new, modern defaults, plus new betas drop for Vite 7 and Babel 8. From the community: Learn advanced TS features in 25 mins, and improve the performance of your TS monorepos with secret arcane knowledge. Chapters (00:00) - Introduction and Personal Updates (02:26) - News: tsc --init Finally H…
  continue reading
 
In this episode, we dissect one of the most sophisticated ongoing cybercrime trends—malware campaigns weaponizing GitHub repositories to compromise developers, gamers, and even rival hackers. By abusing GitHub’s search functionality and reputation signals, threat actors are pushing backdoored code under the guise of popular tools, game cheats, and …
  continue reading
 
In this episode, we dive deep into ClickFix, also tracked as ClearFix or ClearFake—a highly effective and deceptive malware delivery tactic that emerged in early 2024. ClickFix exploits the human tendency to trust browser prompts by using fake error messages, CAPTCHA pages, and verification requests to convince users to execute malicious PowerShell…
  continue reading
 
Cybercrime is rapidly evolving—and so are its tactics. In this episode, we dissect the findings of SoSafe’s Cybercrime Trends 2025 report and explore the six key trends reshaping the global threat landscape, including AI as an attack surface, multichannel intrusions, and the rising exploitation of personal identities. But we don’t stop at theory. W…
  continue reading
 
In the final chapter of Scenes, our course for intermediate Spanish learners, Isabel shares more about her Chicos de oro and the wonderful plans they enjoy together. ¡Son como una gran familia! Join Mark and Pablo in this last episode and take your Spanish to the next level! In Chapter 10, we’ll continue practising and reinforcing key concepts whil…
  continue reading
 
Jason Yu (ycmjason.codes) joins us to share an open source tool he created to help teams migrate their legacy TSConfig compiler options to modern-day options painlessly and progressively. Learn about his experience implementing strict options on big teams, how it inspired his new tool, and how you can take advantage of it right now! Chapters (00:00…
  continue reading
 
In this episode, we dive deep into three actively exploited zero-day vulnerabilities discovered in Google Chrome in 2025, each of which was patched in rapid succession following targeted attacks. At the center is CVE-2025-5419, a high-severity out-of-bounds read/write flaw in the V8 JavaScript engine that allows attackers to exploit heap corruption…
  continue reading
 
In this episode of the Modern Web Podcast, Rob Ocel, Danny Thompson, and Adam Rackis sit down with Ahmad Awais, CEO and founder of LangBase, to talk about agents, context, and the future of AI-assisted software development. Ahmad shares the origin story of Chai.new, an agent that builds agents, and why he believes context, not code, is the true val…
  continue reading
 
Australia just made cyber history. On May 30, 2025, the nation became the first in the world to enforce mandatory ransomware payment reporting under the newly enacted Cyber Security Act 2024. In this episode, we dissect what this means for businesses, law enforcement, and the global cybersecurity landscape. We break down the key aspects of the legi…
  continue reading
 
In this episode, we dive into Trustifi’s recent $25 million Series A funding round, led by growth equity firm Camber Partners. Specializing in AI-powered email security, Trustifi has now raised a total of $29 million to accelerate its product development, go-to-market strategy, and global marketing initiatives—especially in the MSP space. We unpack…
  continue reading
 
In this episode, we dissect Google's recent and upcoming decisions to distrust several Certificate Authorities (CAs) within the Chrome Root Store, including Entrust, Chunghwa Telecom, and Netlock. These high-impact moves are rooted in Chrome's strict enforcement of compliance, transparency, and security standards for public trust. We explore the ro…
  continue reading
 
Two critical, actively exploited vulnerabilities in vBulletin forum software—CVE-2025-48827 and CVE-2025-48828—have put thousands of websites at immediate risk of full system compromise. In this episode, we dissect how these flaws, triggered by insecure usage of PHP’s Reflection API and abuse of vBulletin’s template engine, allow unauthenticated at…
  continue reading
 
In this episode, we dissect the JINX-0132 cryptojacking campaign — a real-world example of how threat actors are exploiting cloud and DevOps environments to mine cryptocurrency at scale. We unpack how cybercriminals targeted misconfigured Docker APIs, publicly exposed HashiCorp Nomad and Consul servers, and vulnerable Gitea instances — turning ente…
  continue reading
 
News for the week of May 26, 2025: Angular's 20th release brings DX improvements, Remix replaced by React Router receives reincarnation, and how a lone volunteer brings the much-anticipated Temporal API to Firefox. Chapters (00:00) - Personal News and Updates (04:46) - News: Angular 20 is Out and It's Boring (But in a Good Way) (08:39) - News: Remi…
  continue reading
 
In this episode, we unpack two newly disclosed Linux vulnerabilities—CVE-2025-5054 and CVE-2025-4598—discovered by the Qualys Threat Research Unit (TRU). These race condition flaws impact Ubuntu’s apport and Red Hat/Fedora’s systemd-coredump, exposing a little-known but critical attack vector: core dumps from crashed SUID programs. We dive into how…
  continue reading
 
Recent phishing campaigns have entered a new phase—one where trust is weaponized. In this episode, we break down how cybercriminals are exploiting legitimate services like Google Apps Script and Google Firebase Storage to host phishing pages, evade detection, and steal credentials. Using cleverly crafted lures such as fake DocuSign notifications, i…
  continue reading
 
In this episode, we unpack the international takedown of AVCheck, one of the largest counter antivirus (CAV) services used by cybercriminals to test and fine-tune malware before deployment. Led by Dutch authorities and supported by agencies from the U.S., Germany, France, and others, this operation marks a major win in Operation Endgame—a sweeping …
  continue reading
 
ConnectWise has confirmed a cyberattack targeting ScreenConnect, its remote access solution used by thousands of Managed Service Providers (MSPs). The breach is reportedly tied to a sophisticated nation-state actor and linked to CVE-2025-3935, a critical ViewState code injection vulnerability that could allow Remote Code Execution (RCE). In this ep…
  continue reading
 
In this episode, we dive into the graphical corruption saga triggered by Firefox version 139, released on May 27, 2025. Aimed at uncovering what went wrong, we review reports from across the web detailing how the update wreaked havoc for Windows users running NVIDIA graphics cards—particularly those with multi-monitor setups using mixed refresh rat…
  continue reading
 
In this episode, we break down the recent $4 million seed funding round for Unbound, a startup tackling one of the biggest unsolved problems in enterprise AI: how to stop employees from leaking sensitive data through ungoverned use of Generative AI tools. Unbound’s AI Gateway aims to be the missing link between rapid AI adoption and responsible usa…
  continue reading
 
Microsoft is taking direct aim at one of the biggest pain points in the Windows ecosystem: update fragmentation. In this episode, we dive deep into the details of Microsoft’s newly announced Windows-native update orchestration platform, currently in private preview. We explore how this unified infrastructure aims to centralize updates for all apps,…
  continue reading
 
Linux systems are under siege—particularly in the world of IoT and internet-exposed servers. In this episode, we dissect PumaBot, a new GoLang-based botnet that's turning Linux IoT devices into cryptomining workhorses. We’ll break down how attackers brute-force SSH credentials, install malware disguised as legitimate services, and use systemd for s…
  continue reading
 
In Chapter 9 of Scenes, our course for intermediate Spanish learners, we return to Isabel’s café, where she welcomes a group of customers from a place that holds special meaning for her. ¿Te imaginas de dónde vienen? Join Mark and Pablo as they guide you through useful vocabulary and grammar while also introducing some of Spain’s most popular tapas…
  continue reading
 
On December 25, 2024, while most businesses were offline, a serious data breach struck LexisNexis Risk Solutions—exposing the personal data of over 360,000 individuals. The twist? The attack vector wasn’t a direct hack, but an indirect compromise through a third-party GitHub repository. Even more concerning, the breach went undetected until April 1…
  continue reading
 
While the AppJS is about to kick off, we talk about some cool new packages and updates around Reanimated and a new solution for local-first apps! Also in this episode: - New React Native Essentials - Apple still doesn't like my app - New Expo Router v5 Course - Are you VibeCoding? 🚀 Learn React Native: https://galaxies.dev/missions/zero-to-hero 🔥 W…
  continue reading
 
On this episode, we dissect the ransomware attack that brought MathWorks—a cornerstone software provider for engineers, scientists, and educators—to a grinding halt. The attack, which began on May 18, 2025, and was officially confirmed on May 26, crippled a wide range of customer-facing and internal systems, from MATLAB Online and ThingSpeak to lic…
  continue reading
 
The cybersecurity market is booming, projected to triple in size from $215 billion in 2025 to $697 billion by 2035. This explosive growth is being fueled by rising cyber threats, the digital transformation of global businesses, and an urgent need for advanced security operations. One of the clearest signals of this momentum? Zscaler’s acquisition o…
  continue reading
 
In this episode, we unpack a critical supply chain breach that’s rattled the cybersecurity world: the exploitation of multiple zero-day vulnerabilities in SimpleHelp Remote Support Software — most notably CVE-2024-57726, a privilege escalation flaw scored 9.9 by the NVD. Threat actors linked to the DragonForce ransomware operation and the Scattered…
  continue reading
 
This episode dives deep into Operation RapTor, one of the largest international crackdowns on dark web crime to date. We analyze how coordinated law enforcement actions across ten countries led to the arrest of 270 individuals, the seizure of $200 million in currency and digital assets, and the dismantling of major darknet marketplaces including In…
  continue reading
 
In this episode, we take a deep dive into the recent Marlboro-Chesterfield Pathology (MCP) ransomware attack—one of the most significant healthcare breaches of 2025. On January 16th, MCP detected unauthorized activity on its internal systems. Just days later, the SAFEPAY ransomware group claimed responsibility, posting stolen data—over 30GB of sens…
  continue reading
 
In this episode, we dive deep into the underground cybercrime ecosystem powering the surge of modern infostealers—Stealc, Vidar, and LummaC2. These malware strains aren't just code—they're full-service products sold as Malware-as-a-Service (MaaS), giving even low-skilled attackers access to powerful data theft tools. We break down how these stealer…
  continue reading
 
News for the week of May 19, 2025: Try out the new TypeScript Go native port, Zod 4 is out, and no, Deno is not dead. Chapters (00:00) - Introduction and Personal News (05:12) - News: TypeScript Native is in Preview! (10:12) - News: Anders' Talk About TS Native at MS Build (12:58) - News: Zod 4 is Officially Released (15:51) - News: Reports of Deno…
  continue reading
 
In this episode, we dive deep into the growing tension between AI innovation and data privacy through the lens of a major controversy: Microsoft’s Windows 11 Recall feature. Designed to screenshot nearly everything a user does every few seconds, Recall creates a searchable visual archive of on-screen activity. But while Microsoft claims it enhances…
  continue reading
 
In this episode, we break down the resurgence of the Bumblebee malware loader and its latest distribution method: blackhat SEO campaigns and trojanized software installers. By mimicking legitimate download pages through typosquatted domains and poisoning Bing search results, attackers are tricking IT professionals into unknowingly infecting their o…
  continue reading
 
In this episode, we dive into the evolving tactics of the Silent Ransom Group (SRG)—also known as Luna Moth—a cybercriminal outfit that has shifted from traditional phishing to a new, more deceptive strategy: impersonating IT support over the phone. Their latest victims? U.S. law firms, targeted for the sensitive data they hold and the large financ…
  continue reading
 
A growing cyber threat is targeting macOS users who rely on Ledger cold wallets to secure their cryptocurrency. In this episode, we dissect the anti-Ledger malware campaign—an increasingly sophisticated phishing operation that impersonates the trusted Ledger Live application to trick users into revealing their 24-word recovery phrases. Once entered…
  continue reading
 
In this episode, we break down the latest and most impactful phase of Operation Endgame, the international law enforcement campaign targeting the backbone of the ransomware ecosystem. Between May 19–22, authorities executed a sweeping takedown of 300 servers, neutralized 650 domains, and seized €3.5 million in cryptocurrency, adding to a total of €…
  continue reading
 
In this episode, we dive into the alarming surge of infostealer malware campaigns leveraging social media platforms, particularly TikTok, as their distribution vector. Threat actors are exploiting trending content—especially around AI tools like Sora, ChatGPT, and Google Gemini AI, and popular software like CapCut and MidJourney—to bait unsuspectin…
  continue reading
 
In this episode, we dive into the ransomware attack that struck Kettering Health, a major healthcare provider, and the evolving tactics of the Interlock ransomware group behind it. Interlock, active since late 2024, has adopted advanced techniques including double extortion, credential theft, and PowerShell-based backdoors to compromise healthcare …
  continue reading
 
As digital deception evolves, so must our defenses. In this episode, we dive deep into the escalating battle for trust in our increasingly connected world. From nation-state-level authentication models to real-time behavioral biometrics on your mobile device, the tools to verify identity are becoming more sophisticated—and more essential—than ever.…
  continue reading
 
In Chapter 8 of Scenes, our course for intermediate Spanish learners, we return to Isabel’s café, where she witnesses an emotional and unexpected moment between a couple. No obstante, cuando se cierra una puerta, se abre una ventana. As always, Mark and Pablo will guide us through any challenging grammar and vocabulary in the text, helping to deepe…
  continue reading
 
In this episode, we dive into a growing cybersecurity crisis: the exposure of Industrial Control Systems (ICS) on the public internet. These systems power our electric grids, water supplies, and industrial automation—but thousands are reachable online, often unsecured. We explore how researchers are working to distinguish between real ICS devices a…
  continue reading
 
In this episode of the Modern Web Podcast, Rob Ocel and Danny Thompson sit down with Julián Duque, Principal Developer Advocate at Heroku, to talk about Heroku’s evolution into an AI Platform-as-a-Service. Julián breaks down Heroku’s new Managed Inference and Agents (MIA) platform, how they’re supporting Claude, Cohere, and Stable Diffusion, and wh…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play