Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
A podcast about web design and development.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Technical interviews about software topics.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
next generation web podcast
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
The State and Popular Culture
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
On The Bike Shed, hosts Joël Quenneville and Stephanie Minn discuss development experiences and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
…
continue reading
The New Stack Podcast is all about the developers, software engineers and operations people who build at-scale architectures that change the way we develop and deploy software. For more content from The New Stack, subscribe on YouTube at: https://www.youtube.com/c/TheNewStack
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
A place for elite leaders and teams.
…
continue reading
Exploring the observability side of software development.
…
continue reading
Advice. Firsthand experiences. Inspiring conversations. Fresh perspectives. You’ll find it all on the SAFe Business Agility podcast—your connection to all things SAFe, and a lot more.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Two Rubyists having conversations and interviewing others about Ruby and web development.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
Audio podcasts on software testing.
…
continue reading
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
Jerod tells Adam about bad he hates the taste of Gin, sips on some Generative A Rye (on the rocks), they open the comments section for a bit, and land the plane talking about being alone, naked, and afraid. Join the discussion Changelog++ members save 6 minutes on this episode because they made the ads disappear. Join today! Sponsors: Retool – Asse…
…
continue reading
Logan Kilpatrick from Google DeepMind talks about the latest developments in the Gemini 2.5 model family, including Gemini 2.5 Pro, Flash, and the newly introduced Flashlight. Logan also offers insight into AI development workflows, model performance, and the future of proactive AI assistants. Links Website: https://logank.ai LinkedIn: https://www.…
…
continue reading

1
Frictionless Development with Nicole Forsgren
1:00:00
1:00:00
Play later
Play later
Lists
Like
Liked
1:00:00How do you eliminate the friction of development? Carl and Richard talk to Nicole Forsgren about her upcoming book on eliminating the friction from software development. Building on her earlier book, Accelerate, Nicole discusses the role of AI technologies in software development, along with more traditional DevOps elements, such as automating test…
…
continue reading

1
SE Radio 673: Abhinav Kimothi on Retrieval-Augmented Generation
55:55
55:55
Play later
Play later
Lists
Like
Liked
55:55In this episode of Software Engineering Radio, Abhinav Kimothi sits down with host Priyanka Raghavan to explore retrieval-augmented generation (RAG), drawing insights from Abhinav's book, A Simple Guide to Retrieval-Augmented Generation. The conversation begins with an introduction to key concepts, including large language models (LLMs), context wi…
…
continue reading

1
Great Reviews and Terrible Tacos - Sharpening Substitute Questions with Counterfactuals
23:28
23:28
Play later
Play later
Lists
Like
Liked
23:28This episode delves into the use of substitute questions—simpler queries we use to answer more complex ones—and the crucial concept of cohesion between these substitutes and our true objectives. You'll learn how to leverage counterfactual thinking to scrutinize your assumptions and enhance the effectiveness of your decisions. Discover two powerful …
…
continue reading
Wes chats with James Mikrut, founder of Payload CMS, about being acquired by Figma! They discuss building an open source business, the future of UI design, AI interfaces, and what this means for the future of Payload and Figma. Show Notes 00:00 Welcome to Syntax. 01:06 What is Payload CMS? 01:56 The big announcement. 03:03 Why does Figma want a CMS…
…
continue reading

1
669: Peter Pistorius on Developing RedwoodSDK
1:07:06
1:07:06
Play later
Play later
Lists
Like
Liked
1:07:06Show Description We're chatting with Peter Pistorius about the change they made from RedwoodJS to RedwoodSDK, how it's going to handle routing, some new marketing ideas for RedwoodSDK, how RedwoodSDK's principles are informed by where Peter's from, choosing to go all in on Cloudflare, how the community has responded, and plans for monetization. Lis…
…
continue reading

1
Open Authorization In The World Of AI With Aaron Parecki
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07Episode Summary How do we apply the battle-tested principles of authentication and authorization to the rapidly evolving world of AI and Large Language Models (LLMs)? In this episode, we're joined by Aaron Parecki, Director of Identity Standards at Okta, to explore the past, present, and future of OAuth. We dive into the lessons learned from the ev…
…
continue reading

1
Getting rid of the pain for developers on Shopify
30:05
30:05
Play later
Play later
Lists
Like
Liked
30:05Check out Shopify’s newest updates on their editions page, including Horizons and their new AI capabilities with Sidekick. Connect with Glen Coates on LinkedIn and X. Shoutout to Stellar Question badge winner nouptime for asking Converting string to byte array in C#.By Ryan Donovan, Glen Coates
…
continue reading

1
Ep. #82, Automating Developer Toil with Morgante Pell of Grit
38:40
38:40
Play later
Play later
Lists
Like
Liked
38:40In episode 82 of o11ycast, Ken and Jess chat with Morgante Pell, the visionary behind Grit, an AI-powered agent designed to automate developer toil and technical debt. The discussion covers the evolution of AI in coding, the challenges of building and deploying AI agents, the future of combining code awareness with production awareness, and Grit’s …
…
continue reading

1
Jadee Hanson: Cybersecurity is a team effort. [CISO] [Career Notes]
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09Please enjoy this encore of Career Notes. Jadee Hanson, CIO and CISO at Code 42, started her technology journey thanks to the help of a teacher in high school. She began college studying computer science and ended with a degree in computer information systems as it had more of the business side. Working in the private sector for companies such as D…
…
continue reading
I’m Live From Monaco; Events in Dubai, Liechtenstein, Zurich, Bern, Geneva & Lyon This Week; That 16 Billion Credential Story; Sponsored by 1Password https://www.troyhunt.com/weekly-update-457/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading

1
Signed, sealed, exploitable. [Research Saturday]
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the M…
…
continue reading

1
AI Vulnerabilities and the Gentle Singularity: A Deep Dive with Project Synapse
1:00:59
1:00:59
Play later
Play later
Lists
Like
Liked
1:00:59In this thought-provoking episode of Project Synapse, host Jim and his friends Marcel Gagne and John Pinard delve into the complexities of artificial intelligence, especially in the context of cybersecurity. The discussion kicks off by revisiting a blog post by Sam Altman about reaching a 'Gentle Singularity' in AI development, where the progress t…
…
continue reading

1
Week in Review: ClickFake deepfake scam, Krispy Kreme breach, NIST ZTA guidance
32:50
32:50
Play later
Play later
Lists
Like
Liked
32:50Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Howard Holton, COO and industry analyst, GigaOm Thanks to our show sponsor, Adaptive Security As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing simulations featuring realistic persona…
…
continue reading
An historic data breach that wasn’t. Aflac says it stopped a ransomware attack. Cloudflare thwarts a record breaking DDoS attack. Mocha Manakin combines clever social engineering with custom-built malware. The Godfather Android trojan uses a sophisticated virtualization technique to hijack banking and crypto apps. A British expert on Russian inform…
…
continue reading

1
F69: Философия программиста, Вопросы и ответы, LIVE
1:06:46
1:06:46
Play later
Play later
Lists
Like
Liked
1:06:46Видео здесь: https://youtube.com/live/sWxPB7vycUIBy Yegor Bugayenko
…
continue reading

1
What is Reverse Mutation Testing with Leonardo Lanni
38:52
38:52
Play later
Play later
Lists
Like
Liked
38:52Show notes: What is Reverse Mutation Testing with Leonardo LanniBy Testing Podcast
…
continue reading

1
Episode 239: Claude-Poisoned Dev Sipping Rocket Fuel
5:16
5:16
Play later
Play later
Lists
Like
Liked
5:16In this episode, Conor recommends some articles on AI and LLMs. Link to Episode 239 on Website Discuss this episode, leave a comment, or ask a question (on GitHub) Socials ADSP: The Podcast: Twitter Conor Hoekstra: Twitter | BlueSky | Mastodon Show Notes Date Generated: 2025-06-19 Date Released: 2025-06-20 The Real Python Podcast Episode 253 My AI …
…
continue reading
In this episode of Remote Ruby, Chris and Andrew discuss the recent Google Cloud Platform and Heroku outages, sharing personal experiences of system impacts and recovery strategies. The conversation shifts to technical insights, including a deep dive into Rails ‘direct’ routes and their routing helper capabilities. They also touch on the latest per…
…
continue reading

1
Cisco, Atlassian fixes, Ryuk member arrested, Viasat Typhoon attack
8:57
8:57
Play later
Play later
Lists
Like
Liked
8:57Cisco, Atlassian fix high-severity vulnerabilities Alleged Ryuk ransomware gang member arrested and extradited Telecom company Viasat attacked by Salt Typhoon Huge thanks to our sponsor, Adaptive Security — OpenAI’s first cybersecurity investment As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing si…
…
continue reading

1
Mic Drop: Catching a tempest in a honeypot
15:21
15:21
Play later
Play later
Lists
Like
Liked
15:21A Chinese hacking group walked right into a trap. Not a firewall. Not a filter. A honeypot. This week, Amazon CSO Steve Schmidt explains how a digital decoy called MadPot helped expose Volt Typhoon—and why, in the age of AI, the real vulnerability isn’t software. It’s people. Learn about your ad choices: dovetail.prx.org/ad-choices…
…
continue reading

1
Exposing Cybersecurity Threats: Breaches, Vulnerabilities, and Evolving Malware
14:28
14:28
Play later
Play later
Lists
Like
Liked
14:28In this episode of 'Cybersecurity Today,' host Jim Love discusses several alarming cybersecurity developments. A recent Washington Post breach raises critical questions about Microsoft 365’s enterprise security as foreign government hackers compromised the email accounts of journalists. Additionally, a critical Linux flaw allows attackers to gain r…
…
continue reading

1
Defending the realm: Trust and safety at Stack Overflow
37:25
37:25
Play later
Play later
Lists
Like
Liked
37:25The Trust and Safety team is using aliases in this episode. Learn more about who the Community Management team is at Stack Overflow. Explore how we keep our community safe in our Code of Conduct. Congratulations to Lifeboat badge recipient Arvin Yorro, who won it for their helpful answer to the question Docker Desktop - WSL update failed.…
…
continue reading

1
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, N…
…
continue reading
Nintendo cuts off Switches that dare to play backed up games, more Microsoft AI exploits, why you shouldn’t regularly spin down hard drives, and securing applications on a home server. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Reliable ZFS Storage on Commodity Hardware – A Cost-Efficient, Data-Sure Storag…
…
continue reading
Like what we’re doing with the DefSec Podcast and want to help support us? Donate here: https://www.patreon.com/defensivesec Links: https://www.bleepingcomputer.com/news/security/sentinelone-shares-new-details-on-china-linked-breach-attempt/ https://thehackernews.com/2025/06/new-supply-chain-malware-operation-hits.html?m=1 https://www.csoonline.com…
…
continue reading

1
EXCLUSIVE: Why Trump & Netanyahu Want War with Iran
1:21:51
1:21:51
Play later
Play later
Lists
Like
Liked
1:21:51Find your Spy Superpower: https://yt.everydayspy.com/45pkQ4h EXCLUSIVE: Why Trump & Netanyahu Want War with Iran Andrew Bustamante sits down with biotech CEO Ilan Sobel to expose the unspoken truth behind Israel’s war posture, Iran’s rising aggression, and the U.S.’s uncertain role in the chaos. It’s not just about politics—it’s about survival, sci…
…
continue reading

1
Emulating Retro Games on Modern Consoles with Robin Lavallée and Bill Litshauer
1:01:17
1:01:17
Play later
Play later
Lists
Like
Liked
1:01:17Emulating retro games on modern consoles is a growing trend, and allows players to experience classic titles with improved performance, enhanced resolution, and added features like save states and rewinding. However, this process raises many challenging technical questions related to hardware compatibility, performance optimization, rendering, and …
…
continue reading

1
Juneteenth: Reflecting, belonging, and owning your seat at the table. [Special Edition]
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26We put together an open conversation between our podcast hosts, CyberWire Daily's Dave Bittner, T-Minus Space Daily’s Maria Varmazis, and CISO Perspectives podcast’s Kim Jones. Their conversation goes deeper than just the historical significance of Juneteenth, diving into candid conversations on allyship, representation, and the enduring value of d…
…
continue reading

1
Episource Breach, Predatory Sparrow strikes again, Swiss banks data leak
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Over 5 million impacted by Episource breach Predatory Sparrow strikes Iran again Data leak at Swiss banks Huge thanks to our sponsor, Adaptive Security — OpenAI’s first cybersecurity investment As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing simulations featuring realistic personalized deepfakes …
…
continue reading
Please enjoy this encore of Hacking Humans. On Hacking Humans, Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of N2K's daily space podcast, T-Minus), are once again sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines to help our audience become aware of what is out there…
…
continue reading

1
"My job is going to change in a dramatic way”: Exploring the future of the internet with Cloudflare
23:09
23:09
Play later
Play later
Lists
Like
Liked
23:09Dane shares his excitement about the Model Context Protocol (MCP), exploring its potential impact on the future of technology. The discussion turns to the growing need for sustainable content monetization and fair compensation for creators in an AI-driven world, and how this connects to Cloudflare’s mission to build a better internet. The conversat…
…
continue reading

1
UL NO. 485: STANDARD EDITION: Netflix RCE, My Current AI Stack, All-in on Claude Code, and more...
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45STANDARD EDITION: Netflix RCE, My Current AI Stack, All-in on Claude Code, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclusive benefits here: https://newsletter.danielmiessler.com/upgrade Read this episode online: https://newslet…
…
continue reading

1
The CEO of htmx likes codin' dirty (Interview)
1:23:09
1:23:09
Play later
Play later
Lists
Like
Liked
1:23:09Jerod is joined by Carson Gross, the creator of htmx –a small, zero-dependency JavaScript library that he says, “completes HTML as a hypertext”. Carson built it because he’s big on hypermedia, he even wrote a book called Hypermedia Systems. Carson has a lot of strong opinions weakly held that we dive into in this conversation. Join the discussion C…
…
continue reading
Viasat confirms it was breached by Salt Typhoon. Microsoft’s June 2025 security update giveth, and Microsoft’s June 2025 security update taketh away. Local privilege escalation flaws grant root access on major Linux distributions. BeyondTrust patches a critical remote code execution flaw. SMS low cost routing exposes users to serious risks. Erie In…
…
continue reading
Show notes: Don’t worry! I’m a Tester Ep 94By Testing Podcast
…
continue reading

1
Cracking the Complexity: Teleport CEO Pushes Identity-First Security
21:07
21:07
Play later
Play later
Lists
Like
Liked
21:07In this on-the-road episode of The New Stack Makers, Editor in Chief Heather Joslyn speaks with Ev Kontsevoy, CEO and co-founder of Teleport, from the floor of KubeCon + CloudNativeCon Europe in London. The discussion centers on infrastructure security and the growing need for robust identity management. Citing alarming cybersecurity statistics—suc…
…
continue reading

1
DOP 305: The Episode I Thought I Would Never Record
5:03
5:03
Play later
Play later
Lists
Like
Liked
5:03#305: In this brief and emotional update, Darin addresses the hiatus in the show following the passing of his wife, Valorie, on March 19th, 2025. He announces that new episodes will resume on July 9th, 2025, and thanks the audience for their patience and support during this difficult period. Darin also highlights the nonprofit organization Father's…
…
continue reading

1
Hackers exploit Langflow flaw, TP-Link routers still vulnerable, Russia detects SuperCard malware attacks
8:52
8:52
Play later
Play later
Lists
Like
Liked
8:52Hackers exploit critical Langflow flaw to unleash Flodrix botnet Organizations warned of vulnerability exploited against discontinued TP-Link routers Russia detects first SuperCard malware attacks skimming bank data via NFC Huge thanks to our sponsor, Adaptive Security — OpenAI’s first cybersecurity investment As deepfake scams and GenAI phishing e…
…
continue reading

1
Scattered Spider Targets US Insurance, Microsoft Zero-Day, Major Database Breach, and AI Poison Pill
11:14
11:14
Play later
Play later
Lists
Like
Liked
11:14In this episode, host Jim Love delves into recent cybersecurity threats and breakthroughs. The notorious Scattered Spider hacker group has shifted its focus to US insurance companies after attacking UK retailers earlier this year. Microsoft's urgent security updates address active zero-day vulnerabilities that allow complete system control. Researc…
…
continue reading

1
Risky Business #796 -- With special guest co-host Chris Krebs
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04On this week’s show Patrick Gray and Adam Boileau are joined by special guest Chris Krebs to discuss the week’s cybersecurity news. They talk through: Israeli “hacktivists” take out an Iranian state-owned bank Scattered-spider and friends pivot into attacking insurers Securing identities in a cloud-first world keeps us awake at night Microsoft take…
…
continue reading

1
SN 1030: Internet Foreground Radiation - The NPM Repository is Under Siege
2:48:29
2:48:29
Play later
Play later
Lists
Like
Liked
2:48:29An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40…
…
continue reading
A House oversight committee requests DOGE documents from Microsoft. Predatory Sparrow claims a cyberattack on an Iranian bank. Microsoft says data that happens in Europe will stay in Europe. A complex malware campaign is using heavily obfuscated Visual Basic files to deploy RATs. A widely used CMS platform suffers potential RCE bugs. North Korea’s …
…
continue reading
Keith Klain Show notes: Show notes: QR Podcast – Alessandra Moreira Podcast Site: QR PodcastBy Testing Podcast
…
continue reading
If you’re a Release Train Engineer (RTE) aspiring to become a Solution Train Engineer (STE), what should you consider before making a move? In this episode, Lech Babula, SPCT at Nordea offers three key tips based on his personal experience. Like what you hear? Connect with Lech on LinkedIn. Explore SAFe courses here.…
…
continue reading

1
We Checked the “Yes” Box for Cybersecurity. What Else Do We Have to Do?
41:24
41:24
Play later
Play later
Lists
Like
Liked
41:24All links and images can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is Alex Hall, CISO, Gensler. In this episode: Evaluating secure messaging beyond the app Reframing compliance as a business enabler Incremental security inv…
…
continue reading

1
SED News: Corporate Spies, Postgres, and the Weird Life of Devs Right Now
43:39
43:39
Play later
Play later
Lists
Like
Liked
43:39Welcome back to SED News, a podcast series from Software Engineering Daily where hosts Gregor Vand and Sean Falconer break down the latest stories in software engineering, Silicon Valley, and wider tech world. In this episode, Gregor and Sean unpack what’s going with Deel and Rippling, explore why Databricks and Snowflake are making big bets on Pos…
…
continue reading

1
2FA middleman, Archetyp seized, Zoomcar hacked
7:35
7:35
Play later
Play later
Lists
Like
Liked
7:35Beware the SMS 2FA middleman Police seize Archetyp Market Zoomcar hack impacts 8.4 million users Huge thanks to our sponsor, Adaptive Security As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing simulations featuring realistic personalized deepfakes and engaging security awareness training. Their new…
…
continue reading