Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Developmental Podcasts
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Technical interviews about software topics.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The State and Popular Culture
…
continue reading
Hear about the cutting edge of development economics from research to practice.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
next generation web podcast
…
continue reading
Explore topics related to transformational community leadership including economic development, non-profit engagement, organizational management, and policy development. It's a candid conversation with veterans of the economic development profession along with inspiring interviews of today's thought leaders.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Arrested DevOps is the podcast that helps you achieve understanding, develop good practices, and operate your team and organization for maximum DevOps awesomeness.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
Make better decisions based on how your mind works. Personality Hacker teaches you the coding language of your mind and how to use it to create great relationships - a fulfilling career and happiness. Are you born with your personality, or does it develop over time? What is intuition? What's the fastest way to use your natural gifts to improve overall happiness? Join Joel Mark Witt and Antonia Dodge as they discuss small changes in your personality and relationships that have big impact.
…
continue reading
Audio podcasts on software testing.
…
continue reading
Information to inspire and help with personal and business development.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Jake Bennett and Michael Dyrynda conquer a 14.5 hour time difference to talk about life as web developers
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
No Limit Leadership is the go-to podcast for growth-minded executives who refuse to settle for mediocrity. Hosted by executive coach and former Special Forces commander Sean Patton, this show explores modern leadership, self-leadership, and the real-world strategies that build high-performing teams. Whether you're focused on leadership development, building a coaching culture, improving leadership communication, or strengthening team accountability, each episode equips you with actionable in ...
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Design Development is your hub to learn direct from top professionals in real estate, development, design, and construction!
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
Cigar, Beer and Spirit Reviews and Discussions
…
continue reading
This week, we are joined by Jamie Levy, Director of Adversary Tactics at Huntress, who is discussing their work on "Active Exploitation of SonicWall VPNs." Huntress has released an urgent threat advisory on active exploitation of SonicWall VPNs, with attackers bypassing MFA, pivoting to domain controllers, and ultimately deploying Akira ransomware.…
…
continue reading

1
Cybersecurity Today: Month In Review Panel for August 2025
1:07:32
1:07:32
Play later
Play later
Lists
Like
Liked
1:07:32Cybersecurity Today: Navigating AI Advancements and Future Trends In this episode of 'Cybersecurity Today,' host Jim Love and panelists Tammy Harper, Laura Payne, and David Shipley discuss recent developments in cybersecurity, shifting focus to AI's impact on the industry. They explore emerging threats such as AI-generated ransomware and the effici…
…
continue reading

1
Week in Review: Citrix RCE flaw, steganography revived, major telecom fiasco
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Johna Till Johnson, CEO and founder, Nemertes Thanks to our show sponsor, Prophet Security Ever feel like your security team is stuck in a loop of alert fatigue and manual investigations? Meet Prophet Security. Their Agentic AI SOC Pl…
…
continue reading
A suspected ransomware attack disrupts hundreds of Swedish municipalities. Google warns Gmail users of emerging cyberattacks tied to the ShinyHunters group. A malicious supply chain attack hits the npm registry. Senators press AFLAC for answers following a data breach. Law enforcement takedowns splinter the ransomware ecosystem. The FBI and Dutch p…
…
continue reading
Arun Gupta, now a “free agent” after his surprise exit at Intel, joins us to discuss how he’s dealing with his first job hunt since the 1990s. Along the way, we talk about agentic coding strategies, what GPT-5’s release implies about the future, and more. (US buys 10% of Intel)++ Join the discussion Changelog++ members get a bonus 12 minutes at the…
…
continue reading

1
Python Test – 238: So Long, and Thanks for All the Fish
2:21
2:21
Play later
Play later
Lists
Like
Liked
2:21Show notes: Python Test – 238: So Long, and Thanks for All the FishBy Testing Podcast
…
continue reading

1
#168 How to use AI as an accelerator, not a crutch, with freelance engineer Ankur Tyagi
54:25
54:25
Play later
Play later
Lists
Like
Liked
54:25For this week's interview, I'm talking with Ankur Tyagi. He's a software engineer who's worked at multinational companies like Volvo, Barclays, and Accenture. He grew up in Pune, India and now lives in Gothenburg, Sweden. Ankur is a prolific contributor to freeCodeCamp's open source learning resources. He also runs DevTools Academy, where he blogs …
…
continue reading
Many people across the board experience in their life someone they know that has had cancer or heart disease, or other types of diseases or even accidents that happens unexpectedly. So even if they were healthy, or were trying to eat right and work out, this can still happen. But because you or they were exercising and eating right, it will make it…
…
continue reading

1
Team Review Recap: La Gloria Cubana Gloriosos Toro
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20John and Aaron discuss their review experience with the La Gloria Cubana Gloriosos Toro https://developingpalates.com/reviews/cigar-reviews/team-cigar-review-la-gloria-cubana-gloriosos-toro/By Developing Palates
…
continue reading
The A.I. boom is reshaping our world—and quietly guzzling power. This week, sustainable code advocate Stuart Clark explains how the race to build smarter machines is heating up our planet—and how we can code our way to a cleaner future. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
Malicious nx Packages, AI worker scam, Salt Typhoon attacks Netherlands
8:56
8:56
Play later
Play later
Lists
Like
Liked
8:56Malicious nx Packages leak GitHub, Cloud, and AI Credentials North Korean remote worker scheme boosted by generative AI The Netherlands announces Salt Typhoon penetration Huge thanks to our sponsor, Prophet Security Security teams are drowning in alerts - many companies generate upwards of 1000 or more alerts a day, and nearly half go ignored. That…
…
continue reading

1
Zipline Phishing, Google Urges Password Resets, and AI-Driven Threats: Cybersecurity Today
9:43
9:43
Play later
Play later
Lists
Like
Liked
9:43In this episode of Cybersecurity Today, host Jim Love delves into the latest cyber threats and risks. Key topics include the new phishing campaign Zipline that flips traditional tactics, Google's call for 2.5 billion Gmail users to reset passwords due to a phishing attack by Shiny Hunters, and the emergence of AI-driven ransomware like Prompt Lock.…
…
continue reading

1
Open-source is for the people, by the people
38:14
38:14
Play later
Play later
Lists
Like
Liked
38:14Travis Oliphant, creator of NumPy and SciPy, joins Ryan to explore the development of Python as a data science tool, the evolution of these foundational libraries, and the importance of community and collaboration in open-source projects, including Travis’ current work to support sustainable open-source through the OpenTeams Incubator. Episode note…
…
continue reading

1
SANS Stormcast Friday, August 29th, 2025: Scans for ZIP Files; FreePBX 0-Day; Passwordstate Patch
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45Increasing Searches for ZIP Files Attackers are scanning our honeypots more and more for .zip files. They are looking for backups of credential files and the like left behind by careless administrators and developers. https://isc.sans.edu/diary/Increasing%20Searches%20for%20ZIP%20Files/32242 FreePBX Vulnerability An upatched vulnerability in FreePB…
…
continue reading
Google is planning to assert even more control over which Android apps can be installed, the US government takes a 10% stake in Intel, and minimum networking speeds in homes and offices. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes ZFS Basecamp Launch: A Panel with the People Behind ZFS News/discussion A new…
…
continue reading

1
How do Lead with Value with Dr. Morgan Depenbusch
31:40
31:40
Play later
Play later
Lists
Like
Liked
31:40Today with chat with Dr. Morgan Depenbusch, we dive into the mindset shift that can transform your career and relationships at work. Instead of pushing harder to be heard or constantly proving yourself, what if the key is simply leading with value? Dr. Depenbusch and Scott unpack what “value” really looks like in practice—whether it’s helping teamm…
…
continue reading

1
F78: Code Review | ООП | Чистые Пруды | Токсики | Релоканты | Тим Лиды
1:16:00
1:16:00
Play later
Play later
Lists
Like
Liked
1:16:00Video is here: https://youtube.com/live/E8Ol8zWYP6UBy Yegor Bugayenko
…
continue reading

1
SE Radio 683: Artie Shevchenko on Programmers as Code Health Guardians
57:31
57:31
Play later
Play later
Lists
Like
Liked
57:31Artie Shevchenko, author of Code Health Guardian, speaks with host Jeff Doolittle about the crucial role of human programmers in the AI era, emphasizing that humans must excel at managing code complexity. Shevchenko discusses these concepts and key takeaways from his book, including the three problems caused by complexity: change amplification, cog…
…
continue reading

1
AI-Powered Predictive Autoscaling for Kubernetes with Jennifer Rahmani
35:07
35:07
Play later
Play later
Lists
Like
Liked
35:07Show notes: AI-Powered Predictive Autoscaling for Kubernetes with Jennifer RahmaniBy Testing Podcast
…
continue reading

1
Soccer terror, conference swag, and Omarchy (btw)
48:27
48:27
Play later
Play later
Lists
Like
Liked
48:27In this episode, Jake and Michael catch up on life, family, and tech. Michael shares proud stories about his son Eli turning into a “soccer terrorist” on the field, while Jake recounts his own stint as a stand-in soccer coach. They dive into Laracon AU updates — from speaker announcements and Road to Laracon podcasts, to quiz night and swag plannin…
…
continue reading

1
Indonesia’s evolving role in the Indo-Pacific and beyond
51:16
51:16
Play later
Play later
Lists
Like
Liked
51:16How has Indonesia’s foreign policy evolved under President Prabowo? Is Indonesia slowly moving from being ‘non-aligned’ to being ‘multi-aligned’? How have recent US foreign and domestic policies affected its relationship with Indonesia? How can Australia and Indonesia strengthen their relationship and enhance cooperation in the Indo-Pacific? In thi…
…
continue reading

1
How to Deal with Last Minute Compliance Requirements
31:40
31:40
Play later
Play later
Lists
Like
Liked
31:40All links and images can be found on CISO Series. Check out this post by Geoff Belknap, co-host of Defense in Depth, for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and John Overbaugh, CISO, Alpine Investors. Joining us is our sponsored guest, Pukar Hamal, fo…
…
continue reading

1
A Conversation with Amazon CTO Werner Vogels
48:15
48:15
Play later
Play later
Lists
Like
Liked
48:15Werner Vogels is the Chief Technology Officer at Amazon, where he has played a pivotal role in shaping the company’s technology vision for over two decades. Before joining Amazon in 2004, Werner was a research scientist at Cornell University where he focused on distributed systems and scalability, both of which are concepts that would later influen…
…
continue reading

1
Salt Typhoon expands, AI-powered ransomware, Anthropic warns of vibe-hacking
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39FBI warns of expanded Chinese hacking campaign AI-powered ransomware is a thing now Anthropic warns about “vibe-hacking” Huge thanks to our sponsor, Prophet Security SOC analyst burnout is real - repetitive tasks, poor tooling, and constant alert noise are driving them out. Prophet Security fixes this. Their Agentic AI Analyst handles alert triage …
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are ma…
…
continue reading
The FBI shares revelations on Salt Typhoon’s reach. Former NSA and FBI directors sound alarm on infrastructure cybersecurity gaps. Google is launching a new cyber “disruption unit”. A new report highlights cyber risks to the maritime industry. A Pennsylvania healthcare provider suffers a data breach affecting over six hundred thousand individuals. …
…
continue reading

1
Design at GitHub with Diana Mounter
1:09:00
1:09:00
Play later
Play later
Lists
Like
Liked
1:09:00How did the design of GitHub evolve? Carl and Richard speak with Diana Mounter about her experiences at GitHub, including her role as head of design. Diana discusses how she was drawn to GitHub as a designer and how her career evolved to lead design for the company. The conversation ranges over different design concepts, the Primer design language,…
…
continue reading

1
SANS Stormcast Thursday, August 28th, 2025: Launching Shellcode; NX Compromise; Volt Typhoon Report
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallets and Credentials The popular open source NX build package was compromised. Code was added that uses…
…
continue reading
A whistle-blower claims DOGE uploaded a sensitive Social Security database to a vulnerable cloud server. Allies push back against North Korean IT scams. ZipLine is a sophisticated phishing campaign targeting U.S.-based manufacturing. Researchers uncover a residential proxy network operating across at least 20 U.S. states. Flock Safety license plate…
…
continue reading

1
Python documentary companion pod (Interview)
1:54:19
1:54:19
Play later
Play later
Lists
Like
Liked
1:54:19Our friends at Cult.Repo launched their epic Python documentary on August 28th, 2025! To celebrate, we sat down with Travis Oliphant –creator of NumPy, SciPy, and more– to get his perspective on how Python took over the software world. Stick around for the twist ending! We set aside Python and dissect Travis’ big idea to make open source projects f…
…
continue reading

1
How to Build a Culture of Comprehensive Quality with Matt Gilbert
22:37
22:37
Play later
Play later
Lists
Like
Liked
22:37Show notes: How to Build a Culture of Comprehensive Quality with Matt GilbertBy Testing Podcast
…
continue reading

1
Team Review Recap: Avowed The Vow 7.05 Corona Gorda
8:31
8:31
Play later
Play later
Lists
Like
Liked
8:31Jiunn, Seth, John and Aaron discuss their review experience with the Avowed The Vow 7.05 Corona Gorda https://developingpalates.com/reviews/cigar-reviews/team-cigar-review-avowed-the-vow-7-05-corona-gorda/By Developing Palates
…
continue reading

1
DT #583 Transforming Arkansas - Hugh McDonald, Arkansas Secretary of Commerce
34:19
34:19
Play later
Play later
Lists
Like
Liked
34:19Join us for an insightful conversation with Hugh McDonald, Arkansas Secretary of Commerce, as he shares his journey from the utility sector to leading state commerce. Discover the challenges, achievements, and future plans for Arkansas's economic development. Key Points: Hugh McDonald's transition from Entergy to the Secretary of Commerce The creat…
…
continue reading

1
DOP 313: Harnessing AI for Smarter Development
32:11
32:11
Play later
Play later
Lists
Like
Liked
32:11#313: In this episode, Darin shares his recent experiences using AI tools Cursor and Claude Code to improve and refactor Jenkins plugins. After receiving a recommendation to try out Cursor for code improvements, he tests it alongside Claude Code, comparing their functionalities and effectiveness. He describes his process and observations, noting th…
…
continue reading

1
S6 Ep34: Food policy: Lessons and priorities for a changing world
30:20
30:20
Play later
Play later
Lists
Like
Liked
30:20In 2025, the International Food Policy Research Institute (IFPRI) is 50 years old. “Lessons and Priorities for a Changing World”, its 2025 Global Food Policy Report, runs to just under 600 pages and covers the last five decades of progress in improving the world’s food systems – but also the challenges that remain, and the need for policy to keep e…
…
continue reading

1
142: Reinventing Urban Self-Storage with Katharine Lau, CEO & Founder, Stuf Storage
46:04
46:04
Play later
Play later
Lists
Like
Liked
46:04Katharine Lau is the dynamic founder and CEO of Stuf Storage, a company that reimagines self-storage by leveraging under-utilized commercial real estate to create tech-enabled storage solutions. Before embarking on her entrepreneurial journey, Kat held a key role at Industrious as their first real estate hire, where she was instrumental in the comp…
…
continue reading
In this episode of Cybersecurity Today, host Jim Love discusses recent developments in cybersecurity, including a method to bypass GPT5 model safeguards, malware issues in the Google Play Store, NIST's new AI-specific security controls, and a cyber attack that led to a government shutdown in Nevada. The episode also covers a CRM-related breach link…
…
continue reading
This episode focuses on the critical importance of having a backup plan, not just for technical redundancies but especially for situations involving human error, which are highly prevalent in one's career. The core argument hinges on understanding risk and reward curves, highlighting the disproportionate impact of failures compared to incremental s…
…
continue reading

1
DOGE puts critical SS data at risk? CISA warns of new exploited flaw, K-Pop stock heist attacker extradited to South Korea
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10DOGE Put Critical Social Security Data at Risk, Whistle-Blower Says CISA warns of actively exploited Git code execution flaw Alleged mastermind behind K-Pop celebrity stock heist extradited to South Korea Huge thanks to our sponsor, Prophet Security Your security analysts didn’t sign up to chase false alarms all day. With Prophet Security’s AI SOC …
…
continue reading

1
Risky Business #804 -- Phrack's DPRK hacker is probably a Chinese APT guy
53:32
53:32
Play later
Play later
Lists
Like
Liked
53:32On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Australia expels Iranian ambassador Hackers sabotage Iranian shipping satcoms APT hacker got doxxed in Phrack. Kind of. They’re probably Chinese, not DPRK? Trail of Bits uses image-downscaling to sneak prompts into Google Gemini The Com’s King Bob ge…
…
continue reading

1
From punch cards to prompts: a history of how software got better
34:12
34:12
Play later
Play later
Lists
Like
Liked
34:12SPONSORED BY AWS Ryan welcomes Darko Mesaroš, Principal Developer Advocate at AWS and all around computer history buff, to chat about history of software development improvements and how they made developers made more productive. They discuss the technologies and breakthroughs that created greater abstractions on the underlying bit manipulations an…
…
continue reading

1
SN 1040: Clickjacking "Whac-A-Mole" - Inside the Password Manager Clickjacking Frenzy and What It Means
Alarm bells are ringing over a supposed browser zero-day, but is the threat as bad as it sounds? Steve reveals why "clickjacking" might be more whac-a-mole than breaking news, and what that really means for your passwords. • Germany may soon outlaw ad blockers • What's happening in the courts over AI • The U.K. drops its demands of Apple • New Micr…
…
continue reading

1
SANS Stormcast Wednesday, August 27th, 2025: Analyzing IDNs; Netscaler 0-Day Vuln; Git Vuln Exploited;
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabil…
…
continue reading
A cyberattack disrupts state systems in Nevada. A China-linked threat actor targets Southeast Asian diplomats. A new attack method hides malicious prompts inside images processed by AI systems.Experts ponder preventing AI agents from going rogue. A new study finds AI is hitting entry-level jobs hardest. Michigan’s Supreme Court upholds limits on ce…
…
continue reading

1
Defensive Security Podcast Episode 318
1:15:32
1:15:32
Play later
Play later
Lists
Like
Liked
1:15:32I have no idea why Riverside.fm (the service we use to record the podcast) has such an audio/video sync problem for the first minute or so of the recording. We’re working on it… On to the show. Here are the links for this week’s episode: https://www.bleepingcomputer.com/news/security/new-downgrade-attack-can-bypass-fido-auth-in-microsoft-entra-id h…
…
continue reading
…
continue reading

1
DT #582 2025 IEDC Annual Conference Preview
18:01
18:01
Play later
Play later
Lists
Like
Liked
18:01In this episode of Develop This! Dennis is joined by Maureen Donahue Krauss, President and CEO of the Detroit Regional Partnership, and they discuss Detroit today and the upcoming 2025 IEDC Annual Conference in Detroit. Get ready for an exciting preview of the 2025 IEDC Annual Conference in Detroit! This episode offers a sneak peek into the anticip…
…
continue reading
Testing Peers Show notes: Influencing QualityBy Testing Podcast
…
continue reading