Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Development Podcasts
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Technical interviews about software topics.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
The State and Popular Culture
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
A podcast about web design and development.
…
continue reading
next generation web podcast
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
On The Bike Shed, hosts Joël Quenneville and Stephanie Minn discuss development experiences and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Laracasts snippet, each episode, offers a single thought on some aspect of web development.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
Audio podcasts on software testing.
…
continue reading
Two Rubyists having conversations and interviewing others about Ruby and web development.
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
Jake Bennett and Michael Dyrynda conquer a 14.5 hour time difference to talk about life as web developers
…
continue reading
Arrested DevOps is the podcast that helps you achieve understanding, develop good practices, and operate your team and organization for maximum DevOps awesomeness.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
CJ takes us behind the scenes of Hackweek to share how he built a custom Sega Genesis game from scratch, complete with assembly code, level loading, and retro hardware tricks. From SGDK to parallax faking, this episode is a deep dive into old-school game dev with a modern twist. Show Notes 00:00 Welcome to Syntax! 00:44 Why a Sega game? Sega Genesi…
…
continue reading

1
The useless useCallback: React performance myths unpacked, with Dominik Dorfmeister
22:55
22:55
Play later
Play later
Lists
Like
Liked
22:55Dominik Dorfmeister unpacks the pitfalls of React’s useCallback and useMemo, revealing how these hooks often introduce more complexity than performance gains. He explores the promise of the React Compiler, the practical power of the “latest ref” pattern, and strategies to boost code readability and maintainability at scale. Learn why overusing useE…
…
continue reading

1
XO Ruby is hitting the road (Interview)
1:32:03
1:32:03
Play later
Play later
Lists
Like
Liked
1:32:03Jim Remsik has lived on the bleeding edge (but also the heart’s center) of the Ruby world for decades. This fall, he’s organizing six (yes, SIX) XO Ruby confs all around the United States. On this episode, Jim joins us to reminisce about the early days of Ruby and Rails, share what he’s learned from so many years of organizing events, and invite al…
…
continue reading

1
This One Skill Signifies Seniority For Software Engineers
14:28
14:28
Play later
Play later
Lists
Like
Liked
14:28This episode explains what is arguably the best career advice you'll hear this week: the one skill that signifies seniority in software engineers is the ability to synthesise and optimise for multiple factors at once. Instead of focusing on a single factor, such as performance or maintainability, senior engineers identify and weigh the various trad…
…
continue reading

1
SE Radio 684: Dan Bergh Johnsson and Daniel Deogun on Secure By Design
56:43
56:43
Play later
Play later
Lists
Like
Liked
56:43Daniel Deogun and Dan Bergh Johnsson -- two of the co-authors of the book, Secure by Design -- discuss the intersection of good software design and security with host Sam Taggart. They describe how following certain software design principles can help developers create secure software without needing to become security experts. They talked about ho…
…
continue reading

1
Securing The Future Of AI With Dr. Peter Garraghan
38:19
38:19
Play later
Play later
Lists
Like
Liked
38:19Episode Summary Machine learning has been around for decades, but as it evolves rapidly, the need for robust security grows even more urgent. Today on the Secure Developer, co-founder and CEO of Mindgard, Dr. Peter Garraghan, joins us to discuss his take on the future of AI. Tuning in, you’ll hear all about Peter’s background and career, his though…
…
continue reading

1
1,000 Developers Compromised By NX Build System Breach
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44Cybersecurity Today: Major Attacks on NX Build System, Sitecore, and Salesforce In this episode, David Shipley covers a string of significant cybersecurity breaches and vulnerabilities. Highlights include a compromise of the NX build system affecting over 1000 developers, remote code execution flaws in Sitecore's experience platform, and escalating…
…
continue reading

1
472: What is the skill in software development?
41:26
41:26
Play later
Play later
Lists
Like
Liked
41:26Sally and Joël kick off a new season of the Bike Shed by asking the question, what exactly is it that we as developers even do around here? Together they discuss their roles as developers, how their workflows and skills have changed over time, the value of context and experience when evaluating different solutions to a problem, why so much of their…
…
continue reading

1
DOP 313: Harnessing AI for Smarter Development
32:11
32:11
Play later
Play later
Lists
Like
Liked
32:11#313: In this episode, Darin shares his recent experiences using AI tools Cursor and Claude Code to improve and refactor Jenkins plugins. After receiving a recommendation to try out Cursor for code improvements, he tests it alongside Claude Code, comparing their functionalities and effectiveness. He describes his process and observations, noting th…
…
continue reading

1
Waterfall Software Development Method (noun) [Word Notes]
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25Please enjoy this encore of Word Notes. A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-software-development Audio reference link: “Creating Video Games - Agile Software Development,” by Sara Verr…
…
continue reading

1
#185 From Hospital Janitor to Developer with Emmett Naughton
1:28:57
1:28:57
Play later
Play later
Lists
Like
Liked
1:28:57On this week's episode of the podcast, freeCodeCamp founder Quincy Larson interviews Emmett Naughton. He worked as hospital janitor for years while teaching himself programming using freeCodeCamp. He's founder of Coder Dads, a chat community where dads encourage one another. We talk about: - Making ends meet while raising a family - Recovering from…
…
continue reading

1
681: CSS Reset Update, Arc Gets Bought, and Why Websites?
1:07:22
1:07:22
Play later
Play later
Lists
Like
Liked
1:07:22Show Description Chris is updating us on the progress of his CSS reset, thoughts on The Browser Company and Arc being bought by Atlassian, and in 2025 why would anyone build a website? Listen on Website Links Bend Old-Time Jams and Events Join or Die Join or Die on Netflix Bowling Alone - Wikipedia Microsoft CTO Kevin Scott on the Birth of the Agen…
…
continue reading

1
Ransomware, Agentic AI, and Supply Chain Risks: Insights from Black Hat 2025 - HD Moore, Jason Passwaters, J.J. Guy, Theresa Lanowitz, Mickey Bresman, Yuval Wollman, Jawahar “Jawa” Sivasankaran - ESW ...
2:06:06
2:06:06
Play later
Play later
Lists
Like
Liked
2:06:06Doug White sits down with Theresa Lanowitz, Chief Evangelist at LevelBlue, for a powerful and timely conversation about one of cybersecurity’s most pressing threats: the software supply chain. Theresa shares fresh insights from LevelBlue’s global research involving 1,500 cybersecurity professionals across 16 countries. Together, they unpack the rea…
…
continue reading

1
Richard Hundhausen and Brad Frazer: Who Owns the Code? - Episode 366
45:49
45:49
Play later
Play later
Lists
Like
Liked
45:49Brad Frazer is a Boise-based attorney and partner at Hawley Troxell, Idaho’s largest law firm, where he leads the Intellectual Property & Internet practice group with a specific focus in IP Strategy, AI, Data Security, and IT. A graduate of BYU, UC Hastings, and the University of Utah, Brad has decades of experience in cybersecurity, internet law, …
…
continue reading

1
SVG phishing campaign, Anthropic piracy lawsuit, Qantas penalizes executives
8:45
8:45
Play later
Play later
Lists
Like
Liked
8:45New malware phishing campaign hidden in SVG files Anthropic agrees to pay $1.5bn in book piracy lawsuit Qantas penalizes executives for cyberattack Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC…
…
continue reading

1
Hackers Say Thanks For Lousy Security In Large Fast Food Chain
12:07
12:07
Play later
Play later
Lists
Like
Liked
12:07Cybersecurity Today: Ghost Action Campaign, SalesLoft Breach, AI Vulnerabilities, and Restaurant Security Flaws Host David Shipley discusses the latest in cybersecurity, including the Ghost Action Campaign which compromised over 3000 secrets from GitHub repositories, the SalesLoft breach affecting major cybersecurity and SaaS firms, and new researc…
…
continue reading

1
Snake Oilers: Nebulock, Vali Cyber and Cape
46:33
46:33
Play later
Play later
Lists
Like
Liked
46:33In this edition of the Snake Oilers podcasts, three vendors pop in to pitch you all on their wares: Automated, AI-powered threat hunting with Nebulock Damien Lewke from Nebulock joins the show to talk about how its agentic AI platform can surface attacker activity out of all those “low” and “informational” findings your detection team doesn’t have …
…
continue reading
Links to stories: https://securityaffairs.com/181430/security/after-sharepoint-attacks-microsoft-stops-sharing-poc-exploit-code-with-china.html https://www.cybersecuritydive.com/news/software-vulnerabilities-breaches-checkmarx-report/757793/ https://www.securityinfowatch.com/cybersecurity/article/55309774/even-security-leaders-are-breaking-ai-rules…
…
continue reading

1
SANS Stormcast Monday, September 8th, 2025: YARA to Debugger Offsets; SVG JavaScript Phishing; FreePBX Patches;
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34From YARA Offsets to Virtual Addresses Xavier explains how to convert offsets reported by YARA into offsets suitable for the use with debuggers. https://isc.sans.edu/diary/From%20YARA%20Offsets%20to%20Virtual%20Addresses/32262 Phishing via JavaScript in SVG Files Virustotal uncovered a Colombian phishing campaign that takes advantage of JavaScript …
…
continue reading

1
F79: Zerocracy | Claude Code | TDD | ICPC | Тим лиды | IDE | Бесполезные менеджеры
1:14:40
1:14:40
Play later
Play later
Lists
Like
Liked
1:14:40Video is here: https://youtube.com/live/yiao6dgdZLoBy Yegor Bugayenko
…
continue reading
A Week of School, Cyber and Food in Singapore https://www.troyhunt.com/weekly-update-467/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading

1
Andrew Maloney: Never-ending thirst for knowledge. [COO] [Career Notes]
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35Please enjoy this encore of Career Notes. COO and Co-Founder of Query. AI, Andrew Maloney, shares how the building blocks he learned in the military helped him get where he is today. Coming from a blue collar family with a minimal knowledge of computers, Andrew went into computer operations in the Air Force. While deployed to Oman just after the st…
…
continue reading

1
Don’t trust that app! [Research Saturday]
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41Today we are joined by Selena Larson, co-host of Only Malware in the Building and Staff Threat Researcher and Lead Intelligence Analysis and Strategy at Proofpoint, sharing their work on "Microsoft OAuth App Impersonation Campaign Leads to MFA Phishing." Proofpoint researchers have identified campaigns where threat actors use fake Microsoft OAuth a…
…
continue reading

1
From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today
31:51
31:51
Play later
Play later
Lists
Like
Liked
31:51The Future of Cybersecurity: AI, Exploits, and the CVE Database In this special crossover episode of Cybersecurity Today and Hashtag Trending, the hosts explore the use of artificial intelligence (AI) in cybersecurity. The conversation begins with an overview of the ongoing 'arms race' to find and exploit software vulnerabilities, focusing on how A…
…
continue reading

1
UL NO. 496: STANDARD EDITION | New Video on Building my Personal AI System, Anthropic Reveals One-person Hacking Company using Claude, Pentagon Says China Keeps Penetrating, and more...
1:02:49
1:02:49
Play later
Play later
Lists
Like
Liked
1:02:49UL NO. 496: STANDARD EDITION | New Video on Building my Personal AI System, Anthropic Reveals One-person Hacking Company using Claude, Pentagon Says China Keeps Penetrating, and more... Read this episode online: https://newsletter.danielmiessler.com/p/ul-496 Personal AI Video I'm so excited about Subscribe to the newsletter at: https://danielmiessl…
…
continue reading

1
Week in Review: Baltimore’s expensive gaffe, ransomware takedown outcomes, Workiva Salesforce breach
27:47
27:47
Play later
Play later
Lists
Like
Liked
27:47Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Ray Espinoza, vp of information security, Elite Technology Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day …
…
continue reading

1
AI Trolley Problems, Rhode Island Drivers, and Kohlbergian Post Conventionalism - SWN #509
40:58
40:58
Play later
Play later
Lists
Like
Liked
40:58Josh Marpet and Doug White talk about AI Ethics, Issues, and Compliance. AI Trolley problems, Rhode Island Drivers, and Post Conventionalism. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-509
…
continue reading

1
Wheels left spinning after cyber incident.
29:42
29:42
Play later
Play later
Lists
Like
Liked
29:42A cyberattack disrupts Bridgestone’s manufacturing operations. CISA warns of critical vulnerabilities in products used across multiple sectors. Additional cybersecurity firms confirm data exposure in the recent Salesforce–Salesloft Drift attack. A configuration vulnerability in Sitecore products leads to remote code execution. HHS promises stricter…
…
continue reading

1
GraphQL in the Age of AI Agents – Insights from Apollo’s CEO Matt DeBergalis
33:20
33:20
Play later
Play later
Lists
Like
Liked
33:20Show notes: GraphQL in the Age of AI Agents – Insights from Apollo’s CEO Matt DeBergalisBy Testing Podcast
…
continue reading
In this episode, Chris chats with guest Jim Remsik, Founder of Flagrant, on the significance of Ruby and Rails conferences. They discuss the nuances of organizing and attending such events, including the challenges and rewards of emceeing, the importance of community guidelines, and the value of having diverse participation. Jim shares insights int…
…
continue reading

1
#187 How to focus on building your skills when everything's so distracting with Ania Kubów
57:29
57:29
Play later
Play later
Lists
Like
Liked
57:29For this week's interview, I'm talking with Ania Kubów. She's a software engineer and prolific programming teacher on YouTube. She shares tips for: - Getting into game development and using JavaScript and browser games as an entry point - How to keep your focus in an increasingly distracting world - How AI tools are a jack hammer and you usually ju…
…
continue reading
The Kremlin has mastered controlling the message online. But now, tens of thousands of soldiers are coming home from Ukraine with stories the state can’t erase. Kateryna Stepanenko, a Russia analyst with the Institute for the Study of War, explains why those voices scare Vladimir Putin — and how far he’ll go to keep them quiet. Learn about your ad …
…
continue reading

1
France cookie fines, CISA TP-Link KEV, sports piracy takedown
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43France fines Google and Shein over cookie misconduct CISA adds more TP-Link routers flaws to its KEV catalog World’s largest sports piracy site shut down Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomwar…
…
continue reading

1
Reminder of this week's schedule and preview of Weekend Edition.
1:21
1:21
Play later
Play later
Lists
Like
Liked
1:21For this short week we had episodes on Tuesday and Thursday. We'll return to our Monday, Wednesday and Friday schedule starting next Monday. But we have an interview this weekend with the researchers who have issued a proof of concept showing that you can go from CVE to working exploit in 15 minutes and at the cost of less than a dollar using AI.…
…
continue reading

1
Kotlin is more than just the Android house language
30:58
30:58
Play later
Play later
Lists
Like
Liked
30:58Ryan welcomes Jeffrey van Gogh, Director of Engineering, Android Developer Experience, at Google and board member of the Kotlin Foundation. They discuss the evolution of the Kotlin language from JVM to multiplatform, how their governance board works with the community to stop breaking changes, and the intricacies of Kotlin’s multiplatform capabilit…
…
continue reading

1
SANS Stormcast Friday, September 5th, 2025: Cloudflare Response to 1.1.1.1 Certificate; AI Modem Namespace Reuse; macOS Vulnerability Allowed Keychain Decryption
8:18
8:18
Play later
Play later
Lists
Like
Liked
8:18Unauthorized Issuance of Certificate for 1.1.1.1 Cloudflare published a blog post with more details regarding the bad 1.1.1.1 certificate that was issued by Fina. https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/ AI Model Namespace Reuse Deleted accounts on Huggingface can be taken over by other entities unrelated to th…
…
continue reading

1
The Ultimate Home Arcade with Polycade's Tyler Bushnell
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07This week Scott welcomes Tyler Bushnell, founder of Polycade, to talk about reimagining the arcade experience for modern homes. Drawing on his family's Atari legacy, Tyler shares how Polycade blends retro charm with sleek design and modern game libraries—all while encouraging face-to-face connection. From Kickstarter roots to Techstars growth, we e…
…
continue reading

1
Lasagna DoS, AI Slop, Hacker Ultimatums - PSW #890
2:04:36
2:04:36
Play later
Play later
Lists
Like
Liked
2:04:36In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The S…
…
continue reading
Salt Typhoon marks China’s most ambitious campaign yet. A major Google outage hit Southeastern Europe. A critical zero-day flaw in FreePBX gets patched. Scattered Lapsus$ Hunters claim the Jaguar Land Rover hack. Researchers uncover a major evolution in the XWorm backdoor campaign. GhostRedirector is a new China-aligned threat actor. CISA adds a pa…
…
continue reading
Show notes: TestBash: AI OK – Ep 101By Testing Podcast
…
continue reading

1
SANS Stormcast Thursday, September 4th, 2025: Dassault DELMIA Apriso Exploit Attempts; Android Updates; 1.1.1.1 Certificate Issued
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22Exploit Attempts for Dassault DELMIA Apriso. CVE-2025-5086 Our honeypots detected attacks against the manufacturing management system DELMIA Apriso. The deserialization vulnerability was patched in June and is one of a few critical vulnerabilities patched in recent months. https://isc.sans.edu/diary/Exploit%20Attempts%20for%20Dassault%20DELMIA%20Ap…
…
continue reading
All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Geoff Belknap. Joining us is our sponsored guest Mokhtar Bacha, founder and CEO, Formal. In this episode: Access management faces transformat…
…
continue reading

1
Context-Aware SQL and Metadata with Shinji Kim
41:38
41:38
Play later
Play later
Lists
Like
Liked
41:38A common challenge in data-rich organizations is that critical context about the data is often hard to capture and even harder to keep up to date. As more people across the organization use data and data models get more complex, simply finding the right dataset can be slow and create bottlenecks. Select Star is a data discovery and metadata platfor…
…
continue reading

1
Fintech foils bank heist, NotDoor backdoor, Salesloft-Drift impact continues drifting
8:02
8:02
Play later
Play later
Lists
Like
Liked
8:02Fintech foils bank heist NotDoor backdoor Salesloft-Drift impact continues drifting Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the at…
…
continue reading

1
Organizational design and Team Topologies after AI
42:45
42:45
Play later
Play later
Lists
Like
Liked
42:45Managing technological change in an organization — particularly a large and complex one — has always been challenging. But thanks to the rapid adoption of AI in all kinds of spheres, from knowledge management to software development to content creation, it's becoming more difficult than ever. How do you strike a balance between governance and safet…
…
continue reading

1
Cloudflare Fends Off A Record Breaking 11.5 Tbps DDoS Attack
11:59
11:59
Play later
Play later
Lists
Like
Liked
11:59In this episode of Cybersecurity Today, host Jim Love covers the latest and most critical stories in the world of cyber threats and digital defense: • Cloudflare fends off a record-breaking 11.5 Tbps DDoS attack, highlighting the relentless scale and sophistication of modern cyber assaults. • WhatsApp patches a dangerous zero-click exploit targetin…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits t…
…
continue reading
How has DevOps changed in 2025? Carl and Richard talk to Michael Levan about his experiences helping teams automate their development workflows, and dealing with all the details that help the entire team focus on providing customer value. Michael digs into the role of the new AI tools in facilitating better workflows around code, testing, deploymen…
…
continue reading
Jaguar Land Rover suffers a major cyberattack. ICE gains access to a powerful spyware tool. Researchers find Fancy Bear snuffling around a new Outlook backdoor. Cloudflare and Palo Alto Networks confirm compromised Salesforce data. A researcher discovers an unsecured Navy Federal Credit Union (NFCU) server. A new ClickFix scam spreads MetaStealer m…
…
continue reading