Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Developing Software Podcasts
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Technical interviews about software topics.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The State and Popular Culture
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
A podcast about web design and development.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
next generation web podcast
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
On The Bike Shed, hosts Joël Quenneville and Stephanie Minn discuss development experiences and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
Audio podcasts on software testing.
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
Programming Throwdown educates Computer Scientists and Software Engineers on a cavalcade of programming and tech topics. Every show will cover a new programming language, so listeners will be able to speak intelligently about any programming language.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
Exploring the observability side of software development.
…
continue reading
Join us in listening to the experienced experts discuss cutting edge challenges in the world of DevOps. From applying the mindset at your company, to career growth and leadership challenges within engineering teams, and avoiding the common antipatterns. Every episode you'll meet a new industry veteran guest with their own unique story.
…
continue reading
coffee => code
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Gerhard calls Kaizen 20, ‘The One Where We Meet’. Rightfully so. It’s also the one where we eat, hike, chat, and launch Pipely live on stage with friends. Join the discussion Changelog++ members save 7 minutes on this episode because they made the ads disappear. Join today! Sponsors: Auth0 – The identity infrastructure for the age of AI. Built by d…
…
continue reading

1
SE Radio 680: Luke Hinds on Privacy and Security of AI Coding Assistants
45:37
45:37
Play later
Play later
Lists
Like
Liked
45:37Luke Hinds, CTO of Stacklok and creator of Sigstore, speaks with SE Radio's Brijesh Ammanath about the privacy and security concerns of using AI coding agents. They discuss how the increased use of AI coding assistants has improved programmer productivity but has also introduced certain key risks. In the area of secrets management, for example, the…
…
continue reading

1
When malware plays pretend. [Research Saturday]
20:30
20:30
Play later
Play later
Lists
Like
Liked
20:30Nicolás Chiaraviglio, Chief Scientist from Zimperium's zLabs, joins to discuss their work on "Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed." Zimperium’s zLabs team has been tracking an evolving banker trojan dubbed DoubleTrouble, which has grown more sophisticated in both its distribution and capabilities. Initially spread via …
…
continue reading

1
Cybersecurity Today Month In Review: August 9, 2025
58:55
58:55
Play later
Play later
Lists
Like
Liked
58:55Cybersecurity Today: July Review - Massive Lawsuits, AI Warnings, and Major Breaches In this episode of Cybersecurity Today: The Month in Review, host Jim Love and an expert panel, including David Shipley, Anton Levaja, and Tammy Harper, discuss the most significant cybersecurity stories from July. Key topics include the $380 million lawsuit betwee…
…
continue reading

1
Week in Review: UK LegalAid collapse, public ransomware approval, Salesforce breach impact
30:03
30:03
Play later
Play later
Lists
Like
Liked
30:03Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Montez Fitzpatrick, CISO, Navvis Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. Th…
…
continue reading

1
SonicWall, Informants Exposed, Cisco Vishing, Perplexity, GPT‑5, Josh Marpet–SWN #501 - SWN #501
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23This week we have, SonicWall, Confidential Informants Exposed, Cisco Vishing, Perplexity vs robots.txt, Microsoft’s Project Ire, Meta–Flo Jury Verdict, GPT‑5 Lands, TeaOnHer Data Leak, Josh Marpet, and more on the Security Weekly News.. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-…
…
continue reading
Researchers uncover multiple vulnerabilities in a popular open-source secrets manager. Software bugs threaten satellite safety. Columbia University confirms a cyberattack. Researchers uncover malicious NPM packages posing as WhatsApp development tools.A new EDR killer tool is being used by multiple ransomware gangs. Home Improvement stores integrat…
…
continue reading

1
#182 Abandoning med school to become a software engineer with Edidiong Asikpo
1:13:48
1:13:48
Play later
Play later
Lists
Like
Liked
1:13:48On this week's episode of the podcast, freeCodeCamp founder Quincy Larson interviews Edidiong Asikpo. Didi is a software engineer. She grew up in Lagos, the biggest city in Nigeria and the biggest tech hub in Africa. Didi got into medical school. But while waiting for her studies to start, she started studying computer science and got really into i…
…
continue reading

1
Python: Come for the language, stay for the community
30:36
30:36
Play later
Play later
Lists
Like
Liked
30:36Ryan welcomes Paul Everitt, developer advocate at JetBrains and an early adopter of Python, to discuss the history, growth, and future of Python. They cover Python’s pivotal moments and rise alongside the internet, the increased adoption from transitions like Python 2 to Python 3, and the significant role Python plays in academia and data science t…
…
continue reading
DEF CON began as a rogue hacker meetup. Then came the prosecutors, the NSA, and the policy panels. This week of Click Here’s Mic Drop, how a game of "Spot the Fed" turned into an uneasy alliance—and what that says about crime, power, and trust in the digital age. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading

1
Hybrid Exchange flaw, France telecom breach, Dialysis company attack
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44Microsoft warns of high-severity flaw in hybrid Exchange deployments France’s third-largest mobile operator suffers breach Dialysis company’s April attack affects 900,000 people Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-d…
…
continue reading

1
Cybersecurity Alerts: Black Hat Exposes AI and Firmware Vulnerabilities
11:54
11:54
Play later
Play later
Lists
Like
Liked
11:54In this episode, host Jim Love thanks listeners for their support of his book 'Elisa, A Tale of Quantum Kisses,' which is available for 99 cents on Kindle. The show then dives into pressing cybersecurity issues discussed at Black Hat USA, including vulnerabilities in AI assistants via prompt injection attacks, and critical flaws in Broadcom chips u…
…
continue reading

1
SANS Stormcast Friday, August 8th, 2025:: ASN43350 Mass Scans; HTTP1.1 Must Die; Hyprid Exchange Vuln; Sonicwall Update; SANS.edu Research: OSS Security and Shifting Left
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59Mass Internet Scanning from ASN 43350 Our undergraduate intern Duncan Woosley wrote up aggressive scans from ASN 43350 https://isc.sans.edu/diary/Mass+Internet+Scanning+from+ASN+43350+Guest+Diary/32180/#comments HTTP/1.1 Desync Attacks Portswigger released details about new types of HTTP/1.1 desync attacks it uncovered. These attacks are particular…
…
continue reading

1
Learning to Code with AI and Steve Klabnik
43:12
43:12
Play later
Play later
Lists
Like
Liked
43:12Steve Klabnik wasn't a fan of AI. He knows how to code at high and low levels...but then he tried again. Now he's making more, shipping more, coding more, and having more fun. Is this a moral choice or a techincal one or both?By Scott Hanselman
…
continue reading
Microsoft warns of a high-severity vulnerability in Exchange Server hybrid deployments. A Dutch airline and a French telecom report data breaches. Researchers reveal new HTTP request smuggling variants. An Israeli spyware maker may have rebranded to evade U.S. sanctions. CyberArk patches critical vulnerabilities in its secrets management platform. …
…
continue reading

1
Are AI Agents Replacing Contract Testing? DevOps Insights from Matt Fellows
1:44
1:44
Play later
Play later
Lists
Like
Liked
1:44Show notes: Are AI Agents Replacing Contract Testing? DevOps Insights from Matt FellowsBy Testing Podcast
…
continue reading
The Web is a mess of tracking and AI scraping so do we need a new one, would it even be possible, or is this the wrong question? Plus setting up servers in a garage where dusty woodworking is happening. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes Free consulting We were asked about setting up servers in a ga…
…
continue reading

1
Cybersecurity Has a Prioritization Problem
31:26
31:26
Play later
Play later
Lists
Like
Liked
31:26All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Steve Zalewski. Joining them is Terry O'Daniel, former CISO at Amplitude. In this episode: Beyond prioritization: aligning risk with real…
…
continue reading

1
SED News: Meta’s AI Gambit, Windsurf Shake‑Up, and the UK VPN Surge
47:25
47:25
Play later
Play later
Lists
Like
Liked
47:25SED News is a monthly podcast from Software Engineering Daily where hosts Gregor Vand and Sean Falconer unpack the biggest stories shaping software engineering, Silicon Valley, and the broader tech industry. In this episode, they explore Meta’s bold push into AI with the launch of Meta Superintelligence Labs, the dramatic twists in the Windsurf acq…
…
continue reading

1
Gemini AI hijacked, Nvidia rejects AI chip backdoors, phishers abuse Microsoft 365
6:23
6:23
Play later
Play later
Lists
Like
Liked
6:23Hackers hijacked Google’s Gemini AI with a poisoned calendar invite to take over a smart home Nvidia rejects US demand for backdoors in AI chips Google says hackers stole its customers’ data by breaching its Salesforce database Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybers…
…
continue reading
How should businesses go about actually navigating AI? It's one thing to strategize and generate new ideas, but what needs to be done to put it into practice in a way that's effective and commercially impactful? In this episode of the Technology Podcast, new host Nigel Dalton is joined by his Thoughtworks colleague May Xu — Head of Tech for Thought…
…
continue reading

1
PM Albanese's China visit and the future of the Aus-China relationship
51:39
51:39
Play later
Play later
Lists
Like
Liked
51:39How has the Australia-China relationship changed since the Prime Minister’s last visit to China in 2023? From China's perspective, how does its relationship with Australia fit into its current worldview? And how has US policy under Trump impacted that relationship? What does the future hold for the Australia-China relationship, given China’s increa…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some …
…
continue reading

1
Improving Legacy Applications with Billy Hollis
1:02:00
1:02:00
Play later
Play later
Lists
Like
Liked
1:02:00Can you improve a legacy application? What's the right way to go about it? Carl and Richard talk with Billy Hollis about his work updating legacy applications, starting with the most essential question: should you? Billy begins by defining what it means to be a legacy application and how, invariably, these applications are critical to the organizat…
…
continue reading

1
SANS Stormcast Thursday, August 7th, 2025: Sextortion Update; Adobe and Trend Micro release emergency patches
5:06
5:06
Play later
Play later
Lists
Like
Liked
5:06Do Sextortion Scams Still Work in 2025? Jan looked at recent sextortion emails to check if any of the crypto addresses in these emails received deposits. Sadly, some did, so these scams still work. https://isc.sans.edu/diary/Do%20sextortion%20scams%20still%20work%20in%202025%3F/32178 Akira Ransomware Group s use of Drivers Guidepoint Security obser…
…
continue reading
Two Chinese nationals are arrested for allegedly exporting sensitive Nvidia AI chips. A critical security flaw has been discovered in Microsoft’s new NLWeb protocol. Vulnerabilities in Dell laptop firmware could let attackers bypass Windows logins and install malware. Trend Micro warns of an actively exploited remote code execution flaw in its endp…
…
continue reading

1
LIVE from Denver with Nora Jones! (Interview)
1:15:26
1:15:26
Play later
Play later
Lists
Like
Liked
1:15:26We’re LIVE at the historic Oriental Theater in Denver, CO with Nora Jones. Nora is the founder of Jeli.io, recently acquired by PagerDuty and she’s been shaping the way we think about reliability, incident response, and human-centered engineering for years. We get into the real story behind the deal. Not just the headline, but what it’s like sellin…
…
continue reading
Scott and CJ explore why RSS still matters and how it’s more underused than outdated. They discuss how to self-host RSS readers, escape the noise of the modern web, and reclaim a cleaner, ad-free reading experience across devices. Show Notes 00:00 Welcome to Syntax! 01:09 Brought to you by Sentry.io 02:41 What is RSS and how does it work? RSS Atom …
…
continue reading
What do we risk when we let AI do the heavy lifting in our coding? Are we giving up the thinking that makes us good at what we do? And as expectations keep rising to match productivy gains, is all this speed really helping, or just making us busier? Today, let's look at the tradeoffs of coding with AI and why the hardest part might be deciding what…
…
continue reading

1
DOP 310: The Misconceptions and Realities of DevOps, Agile, and Leadership
51:28
51:28
Play later
Play later
Lists
Like
Liked
51:28#310: In this episode, Darin and Viktor sit down with Tim Beattie, co-founder and CEO of Stellafai, to chat about the myths and realities of DevOps and Agile in today's workplaces. They dive into how DevOps and Agile should be seen more as philosophies rather than just titles on a business card. Tim shares his take on why roles like DevOps Engineer…
…
continue reading

1
Cybersecurity Threats and Trends: From North Korean Spies to AI-Driven Attacks
11:55
11:55
Play later
Play later
Lists
Like
Liked
11:55In this episode, host Jim Love explores a variety of pressing cybersecurity threats and developments. The episode begins with an invitation for listeners to share their summer reading choices. The main content highlights include North Korean operatives infiltrating US companies through fake identities and AI-generated resumes, the ability of large …
…
continue reading

1
PBS confirms data breach, TSMC fires engineers over theft, Cloudflare: Perplexity is web scraping
7:04
7:04
Play later
Play later
Lists
Like
Liked
7:04PBS confirms data breach after employee info leaked on Discord servers TSMC fires engineers over suspected semiconductor secrets theft Cloudflare on Perplexity web scraping techniques to avoid robot.txt and network blocks Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurit…
…
continue reading

1
Risky Business #801 -- AI models can hack well now and it's weirding us out
1:06:01
1:06:01
Play later
Play later
Lists
Like
Liked
1:06:01On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news. Google security engineering VP Heather Adkins drops by to talk about their AI bug hunter, and Risky Business producer Amberleigh Jack makes her main show debut. This episode explores the rise of AI-powered bug hunting: Google’s Project Zero and Deepmind team up…
…
continue reading

1
SN 1037: Chinese Participation in MAPP - Why Signal is Leaving Australia
2:47:02
2:47:02
Play later
Play later
Lists
Like
Liked
2:47:02A follow-up to the SharePoint server patch mess. How Russia arranges to spy on other country's local embassies. "Dropbox Passwords" manager app is ending in October. Signal will leave Australia rather than help spy. YouTube deploys viewing history age-estimation heuristics. Chrome adds clever lightweight extension signing to prevent abuse. A domain…
…
continue reading

1
SANS Stormcast Wednesday, August 6th, 2025: Machinekeys and VIEWSTATEs; Perplexity Unethical Learning; SonicWall Updates
7:41
7:41
Play later
Play later
Lists
Like
Liked
7:41Stealing Machinekeys for fun and profit (or riding the SharePoint wave) Bojan explains in detail how .NET uses Machine Keys to protect the VIEWSTATE, and how to abuse the VIEWSTATE for code execution if the Machine Keys are lost. https://isc.sans.edu/diary/Stealing%20Machine%20Keys%20for%20fun%20and%20profit%20%28or%20riding%20the%20SharePoint%20wa…
…
continue reading

1
MFA Bypass, SonicWall, BIOS Shade, Sex Toys, FBI Warning, Claude v GPT-5, Josh Marpet - SWN #500
32:30
32:30
Play later
Play later
Lists
Like
Liked
32:30MFA Bypass, SonicWall, BIOS Shade, Sex Toys, FBI Warnings, Claude vs GPT-5, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-500
…
continue reading
Cisco reveals a phishing related data breach. SonicWall warns users to disable SSLVPN services after reports of ransomware gangs exploiting a likely zero-day. Researchers uncover a stealthy Linux backdoor and new vulnerabilities in Nvidia’s Triton Inference Server. A new malware campaign targets Microsoft 365 users with fake OneDrive emails. The U.…
…
continue reading
…
continue reading

1
From Testing to DevOps – A Career Move That Makes Sense with Maciek Konkolowicz
30:03
30:03
Play later
Play later
Lists
Like
Liked
30:03Show notes: From Testing to DevOps – A Career Move That Makes Sense with Maciek KonkolowiczBy Testing Podcast
…
continue reading
Jeff Fritz (Microsoft) joins me to talk about .NET Aspire, CoPilot Agents and Vibe programming. This is a show not to miss; his enthusiasm is catching and his knowledge is astonishing.By Jesse Liberty
…
continue reading

1
Electron and Desktop App Engineering with Shelley Vohr
50:59
50:59
Play later
Play later
Lists
Like
Liked
50:59Electron is a framework for building cross-platform desktop applications using web technologies like JavaScript, HTML, and CSS. It allows developers to package web apps with a native-like experience by bundling them with a Chromium browser and Node.js runtime. Electron is widely used for apps like VS Code, Discord, and Slack because it enables a si…
…
continue reading

1
Domain-based Message Authentication Reporting Conformance (DMARC) (noun) [Word Notes]
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27Please enjoy this encore of Word Notes. An open source email authentication protocol designed to prevent emails, spoofing in phishing, business email compromise or BEC, and other email-based attacks. CyberWire Glossary link: https://thecyberwire.com/glossary/pegasus Audio reference link:"Global Cyber Alliance's Phil Reitinger talks DMARC adoptio…
…
continue reading

1
Microsoft & Google lead zero day exploits, Plague Linux malware maintains SSH access, panel to create US Cyber Force
8:20
8:20
Play later
Play later
Lists
Like
Liked
8:20Microsoft and Google among most affected as zero day exploits jump 46% Vietnamese hackers use PXA Stealer, hit 4,000 IPs and steal 200,000 passwords globally New Plague Linux malware stealthily maintains SSH access Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity contr…
…
continue reading
All Hieu Minh Ngo wanted was to make money online. But when he stumbled into the dark web, he found more than just opportunity, he found a global dark market. What started as a side hustle turned into an international crime spree. Find Hieu on X: https://x.com/HHieupc. Sponsors Support for this show comes from ThreatLocker®. ThreatLocker® is a Zero…
…
continue reading
It started as a going-away party… and became the most legendary hacker conference in the world. This week, Jeff Moss—aka The Dark Tangent—tells us how DEF CON began, what it became, and why it still matters. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading