Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Bug Tracking Podcasts

show episodes
 
Artwork

1
Testcast

Bruce McLeod & Trish Khoo

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hosted by Bruce McLeod and Trish Khoo, Testcast discusses all things related to Software Testing, Test Management, Automated Testing and living the life of a software tester.
  continue reading
 
Artwork

1
Science Friday

Science Friday and WNYC Studios

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
Covering the outer reaches of space to the tiniest microbes in our bodies, Science Friday is the source for entertaining and educational stories about science, technology, and other cool stuff.
  continue reading
 
Artwork

1
Boy Meets World Fever

Cameron and Chance

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Hello world! Two great friends, Chance and Cameron, are life long Boy Meets World Fans. Join them as the talk their way through each episode, laughing and learning along with Cory, Shawn, Topanga, and Mr. Feeny. They also build a timeline, keeping track of the shows twisted history, hoping to make sense of it all.
  continue reading
 
Artwork

1
Data Skeptic

Kyle Polich

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Data Skeptic Podcast features interviews and discussion of topics related to data science, statistics, machine learning, artificial intelligence and the like, all from the perspective of applying critical thinking and the scientific method to evaluate the veracity of claims and efficacy of approaches.
  continue reading
 
Going Wild with Dr. Rae Wynn Grant is a different kind of nature show about the human drama of saving animals. From a paleoanthropologist who hunts fossils in conflict zones to someone who helped save an endangered species while in prison, in season four we will hear from real-life heroes and nature advocates with widely different expertise and life experiences that led them to be champions for the natural world. Wildlife biologist and host Dr. Rae Wynn-Grant has been studying wild animals i ...
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Loading …
show series
 
British and Romanian authorities make arrests in a major tax fraud scheme. The Interlock ransomware gang has a new RAT. A new vulnerability in Google Gemini for Workspace allows attackers to hide malicious instructions inside emails. Suspected Chinese hackers breach a major DC law firm. Multiple firmware vulnerabilities affect products from Taiwane…
  continue reading
 
Oceanographer Victoria Orphan’s dream was coming true. She was sitting in the Alvin submersible, on one of its deepest science dives ever. But the trip was anything but smooth sailing. Victoria takes us inside the sub, where her dream turns nightmarish as things start to go wrong, and Alvin pilot Nick O’Sadcia works frantically to troubleshoot. Oce…
  continue reading
 
Researchers found a new sea spider with a giant nose, leg cannons, and—most remarkably—a novel way of surviving in the lightless, freezing environment miles below the sea surface. These oceanic arthropods are powered by methane that seeps out of the ocean floor. Biologist Shana Goffredi joins Host Flora Lichtman to tell us more about the discovery …
  continue reading
 
Today we are joined by ⁠Selena Larson⁠, Threat Researcher at ⁠Proofpoint⁠, and co-host of ⁠Only Malware in the Building⁠, as she discusses their work on "Amatera Stealer - Rebranded ACR Stealer With Improved Evasion, Sophistication." Proofpoint researchers have identified Amatera Stealer, a rebranded and actively developed malware-as-a-service (Maa…
  continue reading
 
Please enjoy this encore of Career Notes. Director of Google Cloud's Office of the CISO, MK Palmore, dedicated much of his life to public service and now brings his experience working for the greater good to the private sector. A graduate of the US Naval Academy, including the Naval Academy Prep School that he calls the most impactful educational e…
  continue reading
 
Fortinet patches a critical flaw in its FortiWeb web application firewall. Hackers are exploiting a critical vulnerability in Wing FTP Server. U.S. Cyber Command’s fiscal 2026 budget includes a new AI project. Czechia’s cybersecurity agency has issued a formal warning about Chinese AI company DeepSeek. The DoNot APT group targets Italy’s Ministry o…
  continue reading
 
President Trump has said that he wants to phase out FEMA, the Federal Emergency Management Agency, and move responsibility for dealing with major disasters to the state level. Since its creation in 1979, the agency has played a key role in coordinating emergency response nationally. Host Ira Flatow talks with Samantha Montano, an emergency manageme…
  continue reading
 
UK police make multiple arrests in the retail cyberattack case. French authorities arrest a Russian basketball player at the request of the U.S. A German court declares open season on Meta’s tracking pixels. The European Union unveils new rules to regulate artificial intelligence. London’s Iran International news confirms cyberattacks from Banished…
  continue reading
 
Most pasta is made from just two ingredients—flour and water. For decades this humble food has prompted physicists around the world to try to understand its mysterious properties and answer questions like: Why does a stick of spaghetti break into three pieces and not cleanly into two? And why is cacio e pepe so hard to perfect? The answers reveal m…
  continue reading
 
Patch Tuesday. An Iranian ransomware group puts a premium on U.S. and Israeli targets. Batavia spyware targets Russia’s industrial sector. HHS fines a Texas Behavioral Health firm for failed risk analysis. The Anatsa banking trojan targets financial institutions in the U.S. and Canada. Hackers abuse a legitimate commercial evasion framework to pack…
  continue reading
 
We live in a world filled with microbes—they’re inside our bodies, in soil, in deep sea hydrothermal vents, and in your window AC unit. Some microbiologists are hopeful that finding more of these tiny organisms could help us address the climate crisis. Joining Host Flora Lichtman to talk about how are microbiologists James Henriksen and Lisa Stein.…
  continue reading
 
Researchers release proof-of-concept exploits for CitrixBleed2. Grafana patches four high-severity vulnerabilities. A hacker claims to have breached Spanish telecom giant Telefónica. Italian police arrest a Chinese man wanted by U.S. authorities for alleged industrial espionage. Beware of a new ransomware group called Bert. Call of Duty goes offlin…
  continue reading
 
The colon, :, is a punctuation mark consisting of two equally sized dots aligned vertically. A colon often precedes an explanation, a list, or a quoted sentence. It is also used between hours and minutes in time, between certain elements in medical journal citations, between chapter and verse in Bible citations, between two numbers in a ratio, and,…
  continue reading
 
GLP-1 medications like Ozempic have dominated headlines over the past couple of years. When writing his new book, Diet, Drugs and Dopamine: The New Science of Achieving a Healthy Weight, former FDA commissioner David Kessler wanted to unpack the science beyond those headlines. He also has a personal relationship with the subject, having taken GLP-1…
  continue reading
 
Ingram Micro suffers a ransomware attack by the SafePay gang. Spanish police dismantle a large-scale investment fraud ring. The SatanLock ransomware group says it is shutting down. Brazilian police arrest a man accused of stealing over $100 million from the country’s banking system. Qantas confirms contact from a “potential cybercriminal” following…
  continue reading
 
In both her life and her work, researcher Karmella Haynes has never followed the pack. Karmella explains why she created her own area of research at the intersection of synthetic biology and epigenetics. Emory colleague David Katz weighs in on the challenges Karmella faces in pioneering a new research field. Plus Karmella’s sister Sherrone Wallace …
  continue reading
 
In this episode, Professor Pål Grønås Drange from the University of Bergen, introduces the field of Parameterized Complexity - a powerful framework for tackling hard computational problems by focusing on specific structural aspects of the input. This framework allows researchers to solve NP-complete problems more efficiently when certain parameters…
  continue reading
 
Please enjoy this encore of Career Notes. Ground Labs' Head of Engineering, Swati Shekhar, shares her circuitous route from and back to engineering. Always being interested in leveraging the tools available to solve problems, Swati talks about how she found her place in engineering. She mentions how she had her first real experience with a computer…
  continue reading
 
Please enjoy this encore of Research Saturday. This week we are joined by ⁠⁠Silas Cutler⁠⁠, Principal Security Researcher at ⁠⁠Censys⁠⁠, asking the important question of "Will the Real Volt Typhoon Please Stand Up?" The FBI's disruption of the KV Botnet in December 2023, attributed to the Chinese threat group Volt Typhoon, targeted infected systems…
  continue reading
 
In excerpts of two conversations from the Science Friday archives (originally recorded in 2000 and 2009), oceanographer Robert Ballard joins Host Ira Flatow to discuss the 1985 expedition in which he discovered the wreck of the Titanic. He also emphasizes the value of combining the efforts of oceanographers, engineers, and social scientists to stud…
  continue reading
 
Please enjoy this encore from our T-Minus Space Daily segment Deep Space. Parker Wishik⁠ from ⁠The Aerospace Corporation⁠ explores how experts are turning data into decisions in the space industry on the latest Nexus segment. Parker is joined by⁠ Jackie Barbieri⁠, Founder and CEO of ⁠Whitespace⁠, and Dr. Steve Lewis, Leader of The Aerospace Corpora…
  continue reading
 
While the N2K CyberWire team is observing Independence Day in the US, we thought you'd enjoy this episode of Threat Vector from our podcast network. Listen in and bust those cyber myths. In this episode of Threat Vector, David Moulton talks with Lisa Plaggemier, Executive Director of the National Cybersecurity Alliance. Lisa shares insights from th…
  continue reading
 
Sudo patch your Linux systems. Cisco has removed a critical backdoor account that gave remote attackers root privileges. The Hunters International ransomware group rebrands and closes up shop. The Centers for Medicare and Medicaid Services (CMS) notifies 103,000 people that their personal data was compromised. NimDoor is a sophisticated North Korea…
  continue reading
 
Summer is here, which means it’s the season for soaking up the sun. But it’s important to do so responsibly, considering the strong link between sun exposure and skin cancer. There are a lot of sunscreens on the market, so Hosts Flora Lichtman and Ira Flatow join dermatologist Jonathan Ungar to discuss what ingredients to look for and how they work…
  continue reading
 
French authorities report multiple entities targeted by access brokers. A ransomware group extorts a German hunger charity. AT&T combats SIM swapping and account takeover attacks. A Missouri physician group suffers a cyber attack. Qantas doesn’t crash, but their computers do. Researchers uncover multiple critical vulnerabilities in Agorum Core Open…
  continue reading
 
The latest Jurassic World movie, “Jurassic World Rebirth,” is out today. The movie stars Scarlett Johansson (“The Avengers”) and Mahershala Ali (“Moonlight”). Their characters make a dangerous journey to an island chock-full of dinosaurs to get their hands on some dino blood for a life-saving heart medicine. But unfortunately for them, and luckily …
  continue reading
 
The Feds shut down a covert North Korean IT operation. Google releases an emergency update to fix a new Chrome zero-day. A major U.S. trade show and event marketing firm suffers a data breach. NetScaler patches a pair of critical vulnerabilities. A sophisticated cyber attack targets The Hague. An Iran-linked hacking group threatens to release email…
  continue reading
 
AI is not just for automating tasks or coming up with new recipe ideas. Increasingly, people are turning to AI chatbots for companionship. Roughly half a billion people worldwide have downloaded chatbots designed specifically to provide users with emotional and social support. And while these human-chatbot relationships might ease loneliness or sim…
  continue reading
 
CISA warns organizations of potential cyber threats from Iranian state-sponsored actors.Scattered Spider targets aviation and transportation. Workforce cuts at the State Department raise concerns about weakened cyber diplomacy. Canada bans Chinese security camera vendor Hikvision over national security concerns.Cisco Talos reports a rise in cybercr…
  continue reading
 
Geologist Steve Squyres risked his career and millions of dollars to get two rovers roaming on Mars. But the mission almost didn’t make it to the launch pad. Steve and NASA engineer Jennifer Trosper describe the many obstacles the team faced in getting Spirit and Opportunity ready, from ripped parachutes to fuzzy camera feeds, and the problem-solvi…
  continue reading
 
Please enjoy this encore of Career Notes. Senior Vice President for Strategy, Partnerships, and Corporate Development at IronNet Cybersecurity, Jamil Jaffer, shares how his interest in technology brought him full circle. Always a tech guy, Jamil paid he way through college doing computer support. Jamil went to law school and worked in various jobs …
  continue reading
 
In this episode, we learn why simply analyzing the structure of a network is not enough, and how the dynamics - the actual mechanisms of interaction between components - can drastically change how information or influence spreads. Our guest, Professor Baruch Barzel of Bar-Ilan University, is a leading researcher in network dynamics and complex syst…
  continue reading
 
This week we are joined by Kyle Lefton, Security Researcher from Akamai, who is diving into their work on "Two Botnets, One Flaw - Mirai Spreads Through Wazuh Vulnerability." Akamai researchers have observed active exploitation of CVE-2025-24016, a critical RCE vulnerability in Wazuh, by two Mirai-based botnets. The campaigns highlight how quickly …
  continue reading
 
Hawaiian Airlines reports a cybersecurity incident. Microsoft updates its Windows Resiliency Initiative after the 2024 CrowdStrike crash. CitrixBleed 2 is under active exploitation in the wild. Researchers disclose a critical vulnerability in Open VSX. Malware uses prompt injection to evade AI analysis. A new report claims Cambodia turns a blind ey…
  continue reading
 
Since January, the National Institutes of Health (NIH) has made sweeping cuts to science. It's hard to keep track of how many research grants were canceled, but they add up to hundreds of millions—possibly billions—of dollars of research funding lost. Some scientists, like Dr. Katie Edwards, are taking the fight to the courts. Edwards studies inter…
  continue reading
 
Patches, patches and more patches.A patient death has been linked to the 2023 ransomware attack on an NHS IT provider. U.S. authorities indict the man known online as “IntelBroker”. A suspected cyberattack disrupts Columbia University’s computer systems. A major license plate reader company restricts cross-state data access after reports revealed m…
  continue reading
 
The first images from the brand new Vera C. Rubin Observatory have finally been unveiled, and they show us the cosmos like never before. The camera captures so much detail that its first complete image contains about 10 million galaxies. Host Flora Lichtman talks with Dr. Federica Bianco about our dazzling new view of the night sky, how the camera …
  continue reading
 
Cybercriminals target financial institutions across Africa using open-source tools. Threat actors are using a technique called Authenticode stuffing to abuse ConnectWise remote access software. A fake version of SonicWall’s NetExtender VPN app steals users’ credentials. CISA and the NSA publish a guide urging the adoption of Memory Safe Languages. …
  continue reading
 
Last month, scientists reported a historic first: they gave the first personalized gene-editing treatment to a baby who was born with a rare life-threatening genetic disorder. Before the treatment, his prognosis was grim. But after three doses, the baby’s health improved. So how does it work? What are the risks? And what could this breakthrough mea…
  continue reading
 
Cybersecurity warnings about possible Iranian retaliation have surged. A potential act of sabotage disrupts the NATO Summit in The Hague. Canadian cybersecurity officials discover Salt Typhoon breached a major telecom provider. The U.S. House bans WhatsApp from all government devices. APT28 uses Signal chats in phishing campaigns targeting Ukrainia…
  continue reading
 
Sign up for Nature's newsletter: https://www.pbs.org/wnet/nature/newsletter/ Growing up, Kiese Laymon thought of himself as a city kid. But he spent his childhood with a foot in two worlds: his mom’s house in the capital city of Jackson, Mississippi and his grandma’s house in a rural country town. It wasn’t until Kiese left Mississippi that he came…
  continue reading
 
I want to be the very best Like no one ever was To catch them is my real test To train them is my cause I will travel across the land Searching far and wide Each Pokémon to understand The power that's inside It's you and me I know it's my destiny (Pokémon) Oh, you're my best friend In a world we must defend (Pokémon, gotta catch 'em all) A heart so…
  continue reading
 
Australia is known for its unusual animal life, from koalas to kangaroos. But once upon a time, the Australian landscape had even weirder fauna, like Palorchestes azael, a marsupial with immense claws and a small trunk. There was Protemnodon mamkurra, a massive, slow-moving, kangaroo-like creature. And Zygomaturus trilobus, a wombat the size of a h…
  continue reading
 
US warns of heightened risk of Iranian cyberattacks. Cyber warfare has become central to Israel and Iran’s strategies. Oxford City Council discloses data breach. Europe aiming for digital sovereignty. Michigan hospital network says data belonging to 740,000 was stolen by ransomware gang. RapperBot pivoting to attack DVRs. A picture worth a thousand…
  continue reading
 
As a grad student, Suchitra Sebastian wasn’t sure she wanted to be a physicist. But when one of her experiments gave an unexpected result, she was hooked. Suchitra’s former PhD student Beng Sing Tan describes the late-night experiments that led to an “impossible” finding—a potentially new state of matter. Theoretical physicist Piers Coleman tells u…
  continue reading
 
Please enjoy this encore of Career Notes. Jadee Hanson, CIO and CISO at Code 42, started her technology journey thanks to the help of a teacher in high school. She began college studying computer science and ended with a degree in computer information systems as it had more of the business side. Working in the private sector for companies such as D…
  continue reading
 
In this episode we'll discuss how to use Github data as a network to extract insights about teamwork. Our guest, Gabriel Ramirez, manager of the notifications team at GitHub, will show how to apply network analysis to better understand and improve collaboration within his engineering team by analyzing GitHub metadata - such as pull requests, issues…
  continue reading
 
Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the M…
  continue reading
 
An historic data breach that wasn’t. Aflac says it stopped a ransomware attack. Cloudflare thwarts a record breaking DDoS attack. Mocha Manakin combines clever social engineering with custom-built malware. The Godfather Android trojan uses a sophisticated virtualization technique to hijack banking and crypto apps. A British expert on Russian inform…
  continue reading
 
The James Webb Space Telescope (JWST) started collecting data nearly three years ago, and it has already transformed our understanding of the universe. It has spotted the earliest galaxies ever seen, and, closer to home, captured auroras around Jupiter. So what’s the latest from the JWST? In this live broadcast, Hosts Flora Lichtman and Ira Flatow …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play