Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Explore topics related to transformational community leadership including economic development, non-profit engagement, organizational management, and policy development. It's a candid conversation with veterans of the economic development profession along with inspiring interviews of today's thought leaders.
…
continue reading
Technical interviews about software topics.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
A place for elite leaders and teams.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
next generation web podcast
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
The State and Popular Culture
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Advice. Firsthand experiences. Inspiring conversations. Fresh perspectives. You’ll find it all on the SAFe Business Agility podcast—your connection to all things SAFe, and a lot more.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
Why do we make games? Every designer has a different and very personal answer to that question. Soren Johnson, founder of Mohawk Games, sits down with noted designers to find out by examining their careers as a whole.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
The latest machine learning, A.I., and data career topics from across both academia and industry are brought to you by host Dr. Jon Krohn on the Super Data Science Podcast. As the quantity of data on our planet doubles every couple of years and with this trend set to continue for decades to come, there's an unprecedented opportunity for you to make a meaningful impact in your lifetime. In conversation with the biggest names in the data science industry, Jon cuts through hype to fuel that pro ...
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
Software engineers, architects and team leads have found inspiration to build better, high performing teams by listening to the weekly InfoQ Podcast. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 500,000 downloads in the last 3 years.
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Audio podcasts on software testing.
…
continue reading
TestGuild Automation Podcast (formally Test Talks) is a weekly podcast hosted by Joe Colantonio, which geeks out on all things software test automation. TestGuild Automation covers news found in the testing space, reviews books about automation, and speaks with some of the thought leaders in the test automation field. We’ll aim to interview some of today’s most successful and inspiring software engineers, and test automation thought leaders.
…
continue reading
Running a bootstrapped software company? Looking to start one? Then this is the podcast for you.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A joint advisory warns of Fancy Bear targeting Western logistics and technology firms. A nonprofit hospital network in Ohio suffers a disruptive ransomware attack. The Consumer Financial Protection Bureau (CFPB) drops plans to subject data brokers to tighter regulations. KrebsOnSecurity and Google block a record breaking DDoS attack. A phishing cam…
…
continue reading

1
SE Radio 669: Will McGugan on Text-Based User Interfaces
50:54
50:54
Play later
Play later
Lists
Like
Liked
50:54Will McGugan, the CEO and founder of Textualize, speaks with host Gregory M. Kapfhammer about how to use packages such as Rich and Textual to build text-based user interfaces (TUIs) and command-line interfaces (CLIs) in Python. Along with discussing the design idioms that enable developers to create TUIs in Python, they consider practical strategie…
…
continue reading

1
European Accessibility Act: What Software Testers Need to Know (Actionable Guide) with Laveena Ramchandani
51:29
51:29
Play later
Play later
Lists
Like
Liked
51:29Show notes: European Accessibility Act: What Software Testers Need to Know (Actionable Guide) with Laveena RamchandaniBy Testing Podcast
…
continue reading
"You can’t do it alone. If you need to do everything for your client … then you’re also blindfolded in only looking one way. You need to get many partners all together … so we have multiple visions, multiple cultures, and can be flexible. “ What started as a small network is now Connected Movement, an international consultancy that taps into the va…
…
continue reading

1
904: React vs Svelte × Windsurf Worth $3B × Typescript as Const × Layout Shift Tricks × More
51:15
51:15
Play later
Play later
Lists
Like
Liked
51:15In this potluck episode of Syntax, Wes and CJ answer your questions about OpenAI’s $3B Windsurf acquisition, the evolving role of UI in an AI-driven world, why good design still matters, React vs. Svelte, and more! Show Notes 00:00 Welcome to Syntax! Devs Night Out 02:35 OpenAI acquires Windsurf for $3B Windsurf Ep 870: Windsurf forked VS Code to c…
…
continue reading

1
DT #566 The Power of Collaboration in Economic Development - Tiffany Tauscheck President & CEO of Greater Des Moines Partnership
21:00
21:00
Play later
Play later
Lists
Like
Liked
21:00Summary In this episode of the Develop This Podcast, Dennis Fraise interviews Tiffany Tauscheck, the president and CEO of the Greater Des Moines Partnership. They discuss the organization's role in economic and community development across 12 counties in Iowa, highlighting the importance of collaboration among diverse stakeholders. Tiffany shares i…
…
continue reading

1
DT #565 Building Bridges: Education and Industry - Ron Cole, President of Allegheny College
39:07
39:07
Play later
Play later
Lists
Like
Liked
39:07Summary In this episode of the Develop This Podcast, Dennis Fraise interviews Ron Cole, PhD, the President of Allegheny College. They discuss the unique aspects of Allegheny College's liberal arts education, the importance of adapting to workforce needs, and the college's initiatives to engage with the local community and industry. Ron shares insig…
…
continue reading

1
DOJ investigates Coinbase attack, Dutch cyber-espionage law passes, VanHelsing ransomeware leaked
6:43
6:43
Play later
Play later
Lists
Like
Liked
6:43US DOJ opens investigation into Coinbase's recent cyberattack Dutch government passes law to criminalize cyber-espionage Ransomware attack on food distributor spells more pain for UK supermarkets Huge thanks to our sponsor, Conveyor What if your sales team could answer security questions themselves—without blowing up your Slack or email every 10 mi…
…
continue reading

1
Microsoft Emergency Patch, Pwn2Own Berlin 2025 Highlights, and Emerging Cybersecurity Threats
10:01
10:01
Play later
Play later
Lists
Like
Liked
10:01In this episode of 'Cybersecurity Today,' host Jim Love discusses several urgent cybersecurity topics. Microsoft has released an emergency patch after a recent Windows update caused BitLocker recovery mode on certain systems, locking users out without warning. The issue stems from the May security update affecting systems using Intel, vPro chips, a…
…
continue reading

1
Risky Business #792 -- Beware, Coinbase users. Crypto thieves are taking fingers now
53:01
53:01
Play later
Play later
Lists
Like
Liked
53:01On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: TeleMessage memory dumps show up on DDoSecrets Coinbase contractor bribed to hand over user data Telegram does seem to be actually cooperating with law enforcement Britain’s legal aid service gets 15 years worth of applicant data stolen Shocking no one, Ivanti …
…
continue reading

1
SN 1026: Rogue Comms Tech Found in US Power Grid - Is AI Replicating Itself?
2:47:03
2:47:03
Play later
Play later
Lists
Like
Liked
2:47:03Chrome to actively refuse admin privileges. Android Messenger is getting manual key verification. Pwn2Own to add AI "pwning" as in-scope attack targets. AI has already been found to be replicating. Microsoft not killing off Office on Win10 after October. 23andMe's asset purchaser revealed. Many fun talking points thanks to our listeners. Steve's re…
…
continue reading

1
SANS Stormcast Wednesday, May 21st 2025: Researchers Scanning the Internet; Forgotten DNS Records; openpgp.js Vulneraiblity
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do offer lists of researchers and just added three new groups today https://isc.sans.edu/diary/Researchers%20Scanning%20the%20Intern…
…
continue reading

1
WSL, Defendnot, Clippy, Crawlomatic, Take It Down, Pwn2Own, Aaran Leyland, and More.. - SWN #478
34:55
34:55
Play later
Play later
Lists
Like
Liked
34:55WSL, Defendnot, Clippy, Crawlomatic, Take It Down, Pwn2Own, Aaran Leyland, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-478
…
continue reading
President Trump signs the Take It Down Act into law. A UK grocer logistics firm gets hit by ransomware. Researchers discover trojanized versions of the KeePass password manager. Researchers from CISA and NIST promote a new metric to better predict actively exploited software flaws. A new campaign uses SEO poisoning to deliver Bumblebee malware. A s…
…
continue reading

1
Testing AI’s Promises with Michael Bolton
45:51
45:51
Play later
Play later
Lists
Like
Liked
45:51Show notes: Testing AI’s Promises with Michael BoltonBy Testing Podcast
…
continue reading

1
DFSP # 483 Cooking up Forensics with Chef
14:36
14:36
Play later
Play later
Lists
Like
Liked
14:36In this week’s episode, I delve into strategies for integrating CHEF into your security investigations, unlocking new avenues for proactive defense and effective incident response.
…
continue reading
If an organization’s executives and managers don’t understand the new way of working associated with an Agile transformation, how can they lead effectively? In this episode, Sukie Kang with Connected Movement shares his tips for coaches to help leaders become fully engaged. Like what you hear? Connect with Sukie on LinkedIn. Explore SAFe courses he…
…
continue reading

1
889: AI-Powered Virtual Reality: The Future of Education and Entertainment, with Mary Spio
1:06:59
1:06:59
Play later
Play later
Lists
Like
Liked
1:06:59Founder of CEEK’s Mary Spio talks to Jon Krohn about how the platform contributes to the emerging community of digital creators with its blockchain-powered virtual experiences. Hear how Mary got her first investors for CEEK and how it is used across industries as diverse as education, entertainment, aviation, and healthcare. Additional materials: …
…
continue reading

1
Why Learn Security Fundamentals When We Could Just Chase Our Tails?
34:01
34:01
Play later
Play later
Lists
Like
Liked
34:01All links and images for this episode can be found on CISO Series. I host this week’s episode, David Spark (@dspark), producer of CISO Series and Jesse Whaley, CISO, Amtrak. Joining them is their guest Vaughn Hazen, CISO, CN. In this episode: The classics endure The rules of the rail "Prove It. With data." It's all just software A huge thanks to ou…
…
continue reading

1
Building PostgreSQL for the Future with Heikki Linnakangas
42:12
42:12
Play later
Play later
Lists
Like
Liked
42:12PostgreSQL is an open-source database known for its robustness, extensibility, and compliance with SQL standards. Its ability to handle complex queries and maintain high data integrity has made it a top choice for both start-ups and large enterprises. Heikki Linnakangas is a leading developer for the PostgreSQL project, and he’s a co-founder at Neo…
…
continue reading

1
Appsec News & Interviews from RSAC on Identity and AI - Rami Saas, Charlotte Wylie - ASW #331
1:01:48
1:01:48
Play later
Play later
Lists
Like
Liked
1:01:48In the news, Coinbase deals with bribes and insider threat, the NCSC notes the cross-cutting problem of incentivizing secure design, we cover some research that notes the multitude of definitions for secure design, and discuss the new Cybersecurity Skills Framework from the OpenSSF and Linux Foundation. Then we share two more sponsored interviews f…
…
continue reading
Since the collapse of coal, Eastern Kentucky has lived through a procession of supposed revivals. Each new idea was treated as something close to salvation. We spent four days driving across the state and it became clear that things like crypto mining and AI data centers may not offer a break with history – just a continuation of it. Learn about yo…
…
continue reading

1
Legal Aid breached, patients at risk from cyberattacks, 23andMe buyer
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19UK’s Legal Aid Agency breached NHS patients put at risk from cyberattacks 23andMe has a buyer Huge thanks to our sponsor, Conveyor Ever spent an hour in a clunky portal questionnaire with UI from 1999 just to lose your work because it timed out? Conveyor’s got you. Our browser extension completes questionnaires in the most tedious portals for you b…
…
continue reading

1
OWASP identification and authentication failures (noun) [Word Notes]
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58Please enjoy this encore of Word Notes. Ineffectual confirmation of a user's identity or authentication in session management. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-identification-and-authentication-failure Audio reference link: “Mr. Robot Hack - Password Cracking - Episode 1.” YouTube Video. YouTube, September 21, 20…
…
continue reading

1
Durable execution: autosave for your microservices
22:35
22:35
Play later
Play later
Lists
Like
Liked
22:35DBOS Transact is a lightweight, open-source library that makes durable execution simple so you no longer need to worry about manually coding retries and recovery procedures. Connect with Jeremy on LinkedIn. Connect with Qian on LinkedIn. Shoutout to Stack Overflow user Vanita L., whose answer to What does the Swift 'mutating' keyword mean? earned t…
…
continue reading

1
SANS Stormcast Tuesday, May 20th 2025: AutoIT Code RAT; Fake Keepass Download; Procolored Printer Software Compromise
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960 RVTools compromise confirmed Robware.net, the site behind the popular tool RVTools now confirmed that it was compromi…
…
continue reading
The UK’s Ministry of Justice suffers a major breach. Mozilla patches two critical JavaScript engine flaws in Firefox. Over 200,000 patients of a Georgia-based health clinic see their sensitive data exposed. Researchers track increased malicious targeting of iOS devices. A popular printer brand serves up malware. PupkinStealer targets Windows system…
…
continue reading
Show notes: TWiT-89 Testers like to talkBy Testing Podcast
…
continue reading

1
Non-Conformity is the Key To Your Agile Future
16:48
16:48
Play later
Play later
Lists
Like
Liked
16:48“Non-conformity” is a loaded word. Conformity feels safe. It’s comforting to look around, see everyone else doing the same thing, and assume it’s the right path. But comfort rarely leads to success or fulfillment. Think about the people you genuinely admire—the ones whose careers and lives you’d love to emulate. Chances are, these people aren’t rul…
…
continue reading

1
903: Fork Yeah! Microsoft open sourcing Copilot
57:43
57:43
Play later
Play later
Lists
Like
Liked
57:43Scott and Wes are joined by Erich Gamma, creator of VS Code, and Kai Maetzel, Copilot Lead, to share some big news about the future of VS Code and Copilot. They discuss what it means for developers, how AI is shaping the future of coding, and why staying open to the community is key. Show Notes 00:00 Welcome to Syntax! 01:00 The inception of VS Cod…
…
continue reading

1
Episode 461: How to do side projects with a family and demanding job and my company promised me a raise, but didn't give it
32:40
32:40
Play later
Play later
Lists
Like
Liked
32:40In this episode, Dave and Jamison answer these questions: Hey, long-time listener, listened to almost all episodes now and have been loving it since day 1!! I am a senior engineer at FAANG and work 45-50 hours a week and have a lot of cross-org responsibilities. I am lucky to have a beautiful wife and two wonderful young children. I guess, you can …
…
continue reading

1
The State of Cybersecurity Readiness for the Next Big Emergency - David Aviv, Bri Frost, Marshall Erwin - ESW #407
2:12:42
2:12:42
Play later
Play later
Lists
Like
Liked
2:12:42Segment 1: Fastly Interview In this week's interview segment, we talk to Marshall Erwin about the state of cybersecurity, particularly when it comes to third party risk management, and whether we're ready for the next big SolarWinds or Crowdstrike incident. These big incidents have inspired executive orders, the Secure by Design initiative, and eve…
…
continue reading

1
Scott Forsyth: How Kitchen Copilot uses AI - Episode 350
36:08
36:08
Play later
Play later
Lists
Like
Liked
36:08Scott has spent over 25 years in the IT field, working in disciplines such as systems architecture, software development, team growth, and entrepreneurship. He was a Microsoft MVP for 12 years in ASP.NET and IIS. He’s co-authored two books (IIS 7 and IIS 8 Professional), is a Pluralsight author, and has spoken at various conferences, code camps, an…
…
continue reading

1
UK retailer update, Microsoft Defender disabler, deepfakes target officials
8:10
8:10
Play later
Play later
Lists
Like
Liked
8:10Scattered Spider facilitates UK retail hacks and is moving to the U.S. Defendnot tool can disable Microsoft Defender FBI warns government officials about new waves of deepfakes Huge thanks to our sponsor, Conveyor Are you dealing with security questionnaire chaos this week? If so, get Conveyor’s AI to knock them out for you. Connect Conveyor to any…
…
continue reading

1
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
…
continue reading
In today’s episode, host Joe Colantonio sits down with Judy Mosley, a QA engineer at TextUs with over nine years of experience in the tech industry. Judy shares her unconventional journey from being a stay-at-home mom to becoming a respected figure in the QA world. She discusses how a development bootcamp sparked her passion for testing and her val…
…
continue reading
The Lockerbie bombing, which brought down Pan Am 103 and killed 270 people, is one of the most disturbing events... The post ClandesTime 281 – Conspiracy Theories: The Lockerbie Bombing first appeared on Spy Culture.By Tom Secker
…
continue reading

1
Dave Bittner: From puppet shows to podcasts. [Media] [Career Notes]
10:47
10:47
Play later
Play later
Lists
Like
Liked
10:47Please enjoy this encore of Career Notes. Host of the CyberWire Podcast, Dave Bittner, wanted to work with the Muppets, so naturally he landed in cybersecurity. Dave and his Cookie Monster puppet spent much of his childhood putting on shows for his parents friends. During one of those performances, he was discovered and got his start at the local P…
…
continue reading

1
Designer Notes 88: Caroline Marchal - Part 2
2:02:19
2:02:19
Play later
Play later
Lists
Like
Liked
2:02:19In this episode, Soren interviews veteran game designer Caroline Marchal, best known for her work on Heavy Rain, Beyond Two Souls, and As Dusk Falls. They discuss how much a narrative game should acknowledge that it is a game, if a 50/50 player split for a binary choice is desirable, and whether you are in the shower or under the shower. This episo…
…
continue reading

1
The Monthly Cybersecurity Review: Data Breaches, Ransomware, and Critical Infrastructure
56:44
56:44
Play later
Play later
Lists
Like
Liked
56:44In this episode of 'Cybersecurity Today', host Jim Love is joined by panelists Laura Payne from White Tuque and David Shipley from Beauceron Security to review significant cybersecurity events over the past month. The discussion covers various impactful stories such as the disappearance of a professor, a data breach at Hertz, and government officia…
…
continue reading

1
Leveling up their credential phishing tactics. [Research Saturday]
20:46
20:46
Play later
Play later
Lists
Like
Liked
20:46This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement count…
…
continue reading

1
Is AI what Robotics needs? with Jasmine Lawrence Campbell
33:22
33:22
Play later
Play later
Lists
Like
Liked
33:22In this episode of Hanselminutes, Scott sits down with AI/ML & Robotics leader Jasmine Lawrence Campbell to explore the evolving relationship between artificial intelligence and robotics. Jasmine shares insights on how AI is shaping the future of robotics, the challenges of integrating AI into robotic systems, and why she believes there's a place f…
…
continue reading
Malaysian Government on HIBP; The HIBP Partner Ecosystem; The Final Day of Coding Before Relaunch; WE’RE DOING MERCH!!! ; Sponsored by 1Password https://www.troyhunt.com/weekly-update-452/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading
In this episode, Michael, Sarah, and Mark talk to Craig Nelson, VP of the Microsoft Red Team about how the Red Team works to help secure Microsoft and its customers. In life, there are things you know you know, things you know you don't know, and finally, things you don't know you don't know. This episode is full of the latter. We also cover securi…
…
continue reading

1
Week in Review: Hackers pump stocks, Microsoft stops screenshots, AI encrypts cybersecurity
29:05
29:05
Play later
Play later
Lists
Like
Liked
29:05Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Nick Espinosa, host, The Deep Dive Radio Show. Here’s where you can find him: Daily Podcast on SoundCloud | YouTube | Forbes | Twitter/X | Facebook | BlueSky | Mastodon Thanks to our show sponsor, Vanta Do you know the status of your …
…
continue reading

1
Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More... - SWN #477
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-477
…
continue reading

1
Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More... - SWN #477
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54Steganography, RICO, CMMC, End of 10, AI is coming for you, Aaran Leyland and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-477
…
continue reading
NATO hosts the world’s largest cyber defense exercise. The DOJ charges a dozen people in a racketeering conspiracy involving the theft of over $230 million in cryptocurrency. Japan has enacted a new Active Cyberdefense Law. Lawmakers push to reauthorize the Cybersecurity Information Sharing Act. Two critical Ivanti Endpoint Manager Mobile vulnerabi…
…
continue reading
The Testing Show Show notes: Synthetic Data in TestingBy Testing Podcast
…
continue reading