Hosted by Bruce McLeod and Trish Khoo, Testcast discusses all things related to Software Testing, Test Management, Automated Testing and living the life of a software tester.
…
continue reading
Bug Tracking Podcasts
A weekly tutorial-style video podcast for Axosoft OnTime users. This podcast is in SD and is designed for viewing on a mobile device. For high-definition viewing on a PC, try our HD podcast.
…
continue reading
Covering the outer reaches of space to the tiniest microbes in our bodies, Science Friday is the source for entertaining and educational stories about science, technology, and other cool stuff.
…
continue reading
Hello world! Two great friends, Chance and Cameron, are life long Boy Meets World Fans. Join them as the talk their way through each episode, laughing and learning along with Cory, Shawn, Topanga, and Mr. Feeny. They also build a timeline, keeping track of the shows twisted history, hoping to make sense of it all.
…
continue reading
The Data Skeptic Podcast features interviews and discussion of topics related to data science, statistics, machine learning, artificial intelligence and the like, all from the perspective of applying critical thinking and the scientific method to evaluate the veracity of claims and efficacy of approaches.
…
continue reading
The podcast where we talk unfiltered and raw about sex and relationships.
…
continue reading
Going Wild with Dr. Rae Wynn Grant is a different kind of nature show about the human drama of saving animals. From a paleoanthropologist who hunts fossils in conflict zones to someone who helped save an endangered species while in prison, in season four we will hear from real-life heroes and nature advocates with widely different expertise and life experiences that led them to be champions for the natural world. Wildlife biologist and host Dr. Rae Wynn-Grant has been studying wild animals i ...
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
British and Romanian authorities make arrests in a major tax fraud scheme. The Interlock ransomware gang has a new RAT. A new vulnerability in Google Gemini for Workspace allows attackers to hide malicious instructions inside emails. Suspected Chinese hackers breach a major DC law firm. Multiple firmware vulnerabilities affect products from Taiwane…
…
continue reading
Oceanographer Victoria Orphan’s dream was coming true. She was sitting in the Alvin submersible, on one of its deepest science dives ever. But the trip was anything but smooth sailing. Victoria takes us inside the sub, where her dream turns nightmarish as things start to go wrong, and Alvin pilot Nick O’Sadcia works frantically to troubleshoot. Oce…
…
continue reading

1
How These Spiders At The Bottom Of The Sea Run On Methane
7:57
7:57
Play later
Play later
Lists
Like
Liked
7:57Researchers found a new sea spider with a giant nose, leg cannons, and—most remarkably—a novel way of surviving in the lightless, freezing environment miles below the sea surface. These oceanic arthropods are powered by methane that seeps out of the ocean floor. Biologist Shana Goffredi joins Host Flora Lichtman to tell us more about the discovery …
…
continue reading
Today we are joined by Selena Larson, Threat Researcher at Proofpoint, and co-host of Only Malware in the Building, as she discusses their work on "Amatera Stealer - Rebranded ACR Stealer With Improved Evasion, Sophistication." Proofpoint researchers have identified Amatera Stealer, a rebranded and actively developed malware-as-a-service (Maa…
…
continue reading

1
MK Palmore: Lead from where you stand. [CISO] [Career Notes]
9:10
9:10
Play later
Play later
Lists
Like
Liked
9:10Please enjoy this encore of Career Notes. Director of Google Cloud's Office of the CISO, MK Palmore, dedicated much of his life to public service and now brings his experience working for the greater good to the private sector. A graduate of the US Naval Academy, including the Naval Academy Prep School that he calls the most impactful educational e…
…
continue reading
Fortinet patches a critical flaw in its FortiWeb web application firewall. Hackers are exploiting a critical vulnerability in Wing FTP Server. U.S. Cyber Command’s fiscal 2026 budget includes a new AI project. Czechia’s cybersecurity agency has issued a formal warning about Chinese AI company DeepSeek. The DoNot APT group targets Italy’s Ministry o…
…
continue reading

1
As Disasters Escalate, What’s The Future Of FEMA?
19:19
19:19
Play later
Play later
Lists
Like
Liked
19:19President Trump has said that he wants to phase out FEMA, the Federal Emergency Management Agency, and move responsibility for dealing with major disasters to the state level. Since its creation in 1979, the agency has played a key role in coordinating emergency response nationally. Host Ira Flatow talks with Samantha Montano, an emergency manageme…
…
continue reading
UK police make multiple arrests in the retail cyberattack case. French authorities arrest a Russian basketball player at the request of the U.S. A German court declares open season on Meta’s tracking pixels. The European Union unveils new rules to regulate artificial intelligence. London’s Iran International news confirms cyberattacks from Banished…
…
continue reading
Most pasta is made from just two ingredients—flour and water. For decades this humble food has prompted physicists around the world to try to understand its mysterious properties and answer questions like: Why does a stick of spaghetti break into three pieces and not cleanly into two? And why is cacio e pepe so hard to perfect? The answers reveal m…
…
continue reading
Patch Tuesday. An Iranian ransomware group puts a premium on U.S. and Israeli targets. Batavia spyware targets Russia’s industrial sector. HHS fines a Texas Behavioral Health firm for failed risk analysis. The Anatsa banking trojan targets financial institutions in the U.S. and Canada. Hackers abuse a legitimate commercial evasion framework to pack…
…
continue reading

1
The Goo In Your Home Could Help Science Address Climate Change
17:58
17:58
Play later
Play later
Lists
Like
Liked
17:58We live in a world filled with microbes—they’re inside our bodies, in soil, in deep sea hydrothermal vents, and in your window AC unit. Some microbiologists are hopeful that finding more of these tiny organisms could help us address the climate crisis. Joining Host Flora Lichtman to talk about how are microbiologists James Henriksen and Lisa Stein.…
…
continue reading
Researchers release proof-of-concept exploits for CitrixBleed2. Grafana patches four high-severity vulnerabilities. A hacker claims to have breached Spanish telecom giant Telefónica. Italian police arrest a Chinese man wanted by U.S. authorities for alleged industrial espionage. Beware of a new ransomware group called Bert. Call of Duty goes offlin…
…
continue reading

1
Dune: On the Edge of a Crysknife: Hiding Among Harkonens, Captain America: Our Secret Wars, and Ethics: When Creators Do Bad Things (The : Episode) - Comics Pull-Ooza
1:40:23
1:40:23
Play later
Play later
Lists
Like
Liked
1:40:23The colon, :, is a punctuation mark consisting of two equally sized dots aligned vertically. A colon often precedes an explanation, a list, or a quoted sentence. It is also used between hours and minutes in time, between certain elements in medical journal citations, between chapter and verse in Bible citations, between two numbers in a ratio, and,…
…
continue reading
GLP-1 medications like Ozempic have dominated headlines over the past couple of years. When writing his new book, Diet, Drugs and Dopamine: The New Science of Achieving a Healthy Weight, former FDA commissioner David Kessler wanted to unpack the science beyond those headlines. He also has a personal relationship with the subject, having taken GLP-1…
…
continue reading
Ingram Micro suffers a ransomware attack by the SafePay gang. Spanish police dismantle a large-scale investment fraud ring. The SatanLock ransomware group says it is shutting down. Brazilian police arrest a man accused of stealing over $100 million from the country’s banking system. Qantas confirms contact from a “potential cybercriminal” following…
…
continue reading
In both her life and her work, researcher Karmella Haynes has never followed the pack. Karmella explains why she created her own area of research at the intersection of synthetic biology and epigenetics. Emory colleague David Katz weighs in on the challenges Karmella faces in pioneering a new research field. Plus Karmella’s sister Sherrone Wallace …
…
continue reading
In this episode, Professor Pål Grønås Drange from the University of Bergen, introduces the field of Parameterized Complexity - a powerful framework for tackling hard computational problems by focusing on specific structural aspects of the input. This framework allows researchers to solve NP-complete problems more efficiently when certain parameters…
…
continue reading

1
Swati Shekhar: Challenges increase your risk appetite. [Engineering] [Career Notes]
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04Please enjoy this encore of Career Notes. Ground Labs' Head of Engineering, Swati Shekhar, shares her circuitous route from and back to engineering. Always being interested in leveraging the tools available to solve problems, Swati talks about how she found her place in engineering. She mentions how she had her first real experience with a computer…
…
continue reading

1
Botnet’s back, tell a friend. [Research Saturday]
22:47
22:47
Play later
Play later
Lists
Like
Liked
22:47Please enjoy this encore of Research Saturday. This week we are joined by Silas Cutler, Principal Security Researcher at Censys, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems…
…
continue reading

1
The Seafaring Life Of ‘Modern-Day Captain Nemo,’ Robert Ballard
30:08
30:08
Play later
Play later
Lists
Like
Liked
30:08In excerpts of two conversations from the Science Friday archives (originally recorded in 2000 and 2009), oceanographer Robert Ballard joins Host Ira Flatow to discuss the 1985 expedition in which he discovered the wreck of the Titanic. He also emphasizes the value of combining the efforts of oceanographers, engineers, and social scientists to stud…
…
continue reading

1
Turning data into decisions. [Deep Space]
50:47
50:47
Play later
Play later
Lists
Like
Liked
50:47Please enjoy this encore from our T-Minus Space Daily segment Deep Space. Parker Wishik from The Aerospace Corporation explores how experts are turning data into decisions in the space industry on the latest Nexus segment. Parker is joined by Jackie Barbieri, Founder and CEO of Whitespace, and Dr. Steve Lewis, Leader of The Aerospace Corpora…
…
continue reading

1
Secure Your Summer: Top Cyber Myths, Busted [Threat Vector]
38:00
38:00
Play later
Play later
Lists
Like
Liked
38:00While the N2K CyberWire team is observing Independence Day in the US, we thought you'd enjoy this episode of Threat Vector from our podcast network. Listen in and bust those cyber myths. In this episode of Threat Vector, David Moulton talks with Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance. Lisa shares insights from th…
…
continue reading
Sudo patch your Linux systems. Cisco has removed a critical backdoor account that gave remote attackers root privileges. The Hunters International ransomware group rebrands and closes up shop. The Centers for Medicare and Medicaid Services (CMS) notifies 103,000 people that their personal data was compromised. NimDoor is a sophisticated North Korea…
…
continue reading

1
Understanding Sunscreen Ingredients And Which Ones You Need
18:38
18:38
Play later
Play later
Lists
Like
Liked
18:38Summer is here, which means it’s the season for soaking up the sun. But it’s important to do so responsibly, considering the strong link between sun exposure and skin cancer. There are a lot of sunscreens on the market, so Hosts Flora Lichtman and Ira Flatow join dermatologist Jonathan Ungar to discuss what ingredients to look for and how they work…
…
continue reading
French authorities report multiple entities targeted by access brokers. A ransomware group extorts a German hunger charity. AT&T combats SIM swapping and account takeover attacks. A Missouri physician group suffers a cyber attack. Qantas doesn’t crash, but their computers do. Researchers uncover multiple critical vulnerabilities in Agorum Core Open…
…
continue reading

1
In ‘Jurassic World Rebirth,’ Paleontology Is Still The Star
13:55
13:55
Play later
Play later
Lists
Like
Liked
13:55The latest Jurassic World movie, “Jurassic World Rebirth,” is out today. The movie stars Scarlett Johansson (“The Avengers”) and Mahershala Ali (“Moonlight”). Their characters make a dangerous journey to an island chock-full of dinosaurs to get their hands on some dino blood for a life-saving heart medicine. But unfortunately for them, and luckily …
…
continue reading
The Feds shut down a covert North Korean IT operation. Google releases an emergency update to fix a new Chrome zero-day. A major U.S. trade show and event marketing firm suffers a data breach. NetScaler patches a pair of critical vulnerabilities. A sophisticated cyber attack targets The Hague. An Iran-linked hacking group threatens to release email…
…
continue reading

1
What Does It Mean To Have A Chatbot Companion?
19:36
19:36
Play later
Play later
Lists
Like
Liked
19:36AI is not just for automating tasks or coming up with new recipe ideas. Increasingly, people are turning to AI chatbots for companionship. Roughly half a billion people worldwide have downloaded chatbots designed specifically to provide users with emotional and social support. And while these human-chatbot relationships might ease loneliness or sim…
…
continue reading

1
U.S. braces for Iranian cyber intrusions.
40:16
40:16
Play later
Play later
Lists
Like
Liked
40:16CISA warns organizations of potential cyber threats from Iranian state-sponsored actors.Scattered Spider targets aviation and transportation. Workforce cuts at the State Department raise concerns about weakened cyber diplomacy. Canada bans Chinese security camera vendor Hikvision over national security concerns.Cisco Talos reports a rise in cybercr…
…
continue reading

1
The Leap: Mars? It Was A Miracle We Got To Florida
23:43
23:43
Play later
Play later
Lists
Like
Liked
23:43Geologist Steve Squyres risked his career and millions of dollars to get two rovers roaming on Mars. But the mission almost didn’t make it to the launch pad. Steve and NASA engineer Jennifer Trosper describe the many obstacles the team faced in getting Spirit and Opportunity ready, from ripped parachutes to fuzzy camera feeds, and the problem-solvi…
…
continue reading

1
Jamil Jaffer: You should run towards risk. [Strategy] [Career Notes]
8:01
8:01
Play later
Play later
Lists
Like
Liked
8:01Please enjoy this encore of Career Notes. Senior Vice President for Strategy, Partnerships, and Corporate Development at IronNet Cybersecurity, Jamil Jaffer, shares how his interest in technology brought him full circle. Always a tech guy, Jamil paid he way through college doing computer support. Jamil went to law school and worked in various jobs …
…
continue reading
In this episode, we learn why simply analyzing the structure of a network is not enough, and how the dynamics - the actual mechanisms of interaction between components - can drastically change how information or influence spreads. Our guest, Professor Baruch Barzel of Bar-Ilan University, is a leading researcher in network dynamics and complex syst…
…
continue reading

1
A tale of two botnets. [Research Saturday]
24:55
24:55
Play later
Play later
Lists
Like
Liked
24:55This week we are joined by Kyle Lefton, Security Researcher from Akamai, who is diving into their work on "Two Botnets, One Flaw - Mirai Spreads Through Wazuh Vulnerability." Akamai researchers have observed active exploitation of CVE-2025-24016, a critical RCE vulnerability in Wazuh, by two Mirai-based botnets. The campaigns highlight how quickly …
…
continue reading
Hawaiian Airlines reports a cybersecurity incident. Microsoft updates its Windows Resiliency Initiative after the 2024 CrowdStrike crash. CitrixBleed 2 is under active exploitation in the wild. Researchers disclose a critical vulnerability in Open VSX. Malware uses prompt injection to evade AI analysis. A new report claims Cambodia turns a blind ey…
…
continue reading

1
After Her Grants Got Cut, This Researcher Is Suing The NIH
13:07
13:07
Play later
Play later
Lists
Like
Liked
13:07Since January, the National Institutes of Health (NIH) has made sweeping cuts to science. It's hard to keep track of how many research grants were canceled, but they add up to hundreds of millions—possibly billions—of dollars of research funding lost. Some scientists, like Dr. Katie Edwards, are taking the fight to the courts. Edwards studies inter…
…
continue reading
Patches, patches and more patches.A patient death has been linked to the 2023 ransomware attack on an NHS IT provider. U.S. authorities indict the man known online as “IntelBroker”. A suspected cyberattack disrupts Columbia University’s computer systems. A major license plate reader company restricts cross-state data access after reports revealed m…
…
continue reading

1
New Telescope Captures The Cosmos In Groundbreaking Detail
12:38
12:38
Play later
Play later
Lists
Like
Liked
12:38The first images from the brand new Vera C. Rubin Observatory have finally been unveiled, and they show us the cosmos like never before. The camera captures so much detail that its first complete image contains about 10 million galaxies. Host Flora Lichtman talks with Dr. Federica Bianco about our dazzling new view of the night sky, how the camera …
…
continue reading
Cybercriminals target financial institutions across Africa using open-source tools. Threat actors are using a technique called Authenticode stuffing to abuse ConnectWise remote access software. A fake version of SonicWall’s NetExtender VPN app steals users’ credentials. CISA and the NSA publish a guide urging the adoption of Memory Safe Languages. …
…
continue reading

1
How Scientists Made The First Gene-Editing Treatment For A Baby
18:56
18:56
Play later
Play later
Lists
Like
Liked
18:56Last month, scientists reported a historic first: they gave the first personalized gene-editing treatment to a baby who was born with a rare life-threatening genetic disorder. Before the treatment, his prognosis was grim. But after three doses, the baby’s health improved. So how does it work? What are the risks? And what could this breakthrough mea…
…
continue reading

1
Iran’s digital threat after U.S. strikes.
31:35
31:35
Play later
Play later
Lists
Like
Liked
31:35Cybersecurity warnings about possible Iranian retaliation have surged. A potential act of sabotage disrupts the NATO Summit in The Hague. Canadian cybersecurity officials discover Salt Typhoon breached a major telecom provider. The U.S. House bans WhatsApp from all government devices. APT28 uses Signal chats in phishing campaigns targeting Ukrainia…
…
continue reading
Sign up for Nature's newsletter: https://www.pbs.org/wnet/nature/newsletter/ Growing up, Kiese Laymon thought of himself as a city kid. But he spent his childhood with a foot in two worlds: his mom’s house in the capital city of Jackson, Mississippi and his grandma’s house in a rural country town. It wasn’t until Kiese left Mississippi that he came…
…
continue reading

1
Superman Unlimited, Batman and Robin Year One, and Pokemon Dreams - Comics Pull-Ooza
1:26:50
1:26:50
Play later
Play later
Lists
Like
Liked
1:26:50I want to be the very best Like no one ever was To catch them is my real test To train them is my cause I will travel across the land Searching far and wide Each Pokémon to understand The power that's inside It's you and me I know it's my destiny (Pokémon) Oh, you're my best friend In a world we must defend (Pokémon, gotta catch 'em all) A heart so…
…
continue reading

1
Ancient Bone Proteins May Offer Insight On Megafauna Extinction
19:23
19:23
Play later
Play later
Lists
Like
Liked
19:23Australia is known for its unusual animal life, from koalas to kangaroos. But once upon a time, the Australian landscape had even weirder fauna, like Palorchestes azael, a marsupial with immense claws and a small trunk. There was Protemnodon mamkurra, a massive, slow-moving, kangaroo-like creature. And Zygomaturus trilobus, a wombat the size of a h…
…
continue reading
US warns of heightened risk of Iranian cyberattacks. Cyber warfare has become central to Israel and Iran’s strategies. Oxford City Council discloses data breach. Europe aiming for digital sovereignty. Michigan hospital network says data belonging to 740,000 was stolen by ransomware gang. RapperBot pivoting to attack DVRs. A picture worth a thousand…
…
continue reading

1
The Leap: You Do Realize… That’s Impossible
23:47
23:47
Play later
Play later
Lists
Like
Liked
23:47As a grad student, Suchitra Sebastian wasn’t sure she wanted to be a physicist. But when one of her experiments gave an unexpected result, she was hooked. Suchitra’s former PhD student Beng Sing Tan describes the late-night experiments that led to an “impossible” finding—a potentially new state of matter. Theoretical physicist Piers Coleman tells u…
…
continue reading

1
Jadee Hanson: Cybersecurity is a team effort. [CISO] [Career Notes]
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09Please enjoy this encore of Career Notes. Jadee Hanson, CIO and CISO at Code 42, started her technology journey thanks to the help of a teacher in high school. She began college studying computer science and ended with a degree in computer information systems as it had more of the business side. Working in the private sector for companies such as D…
…
continue reading
In this episode we'll discuss how to use Github data as a network to extract insights about teamwork. Our guest, Gabriel Ramirez, manager of the notifications team at GitHub, will show how to apply network analysis to better understand and improve collaboration within his engineering team by analyzing GitHub metadata - such as pull requests, issues…
…
continue reading

1
Signed, sealed, exploitable. [Research Saturday]
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the M…
…
continue reading
An historic data breach that wasn’t. Aflac says it stopped a ransomware attack. Cloudflare thwarts a record breaking DDoS attack. Mocha Manakin combines clever social engineering with custom-built malware. The Godfather Android trojan uses a sophisticated virtualization technique to hijack banking and crypto apps. A British expert on Russian inform…
…
continue reading

1
What We’re Learning From The James Webb Space Telescope
17:47
17:47
Play later
Play later
Lists
Like
Liked
17:47The James Webb Space Telescope (JWST) started collecting data nearly three years ago, and it has already transformed our understanding of the universe. It has spotted the earliest galaxies ever seen, and, closer to home, captured auroras around Jupiter. So what’s the latest from the JWST? In this live broadcast, Hosts Flora Lichtman and Ira Flatow …
…
continue reading