Hear in depth interviews from Cedar Rapids baseball influencers including former and current players, managers, and executives.
…
continue reading
Kernel Podcasts
certainly entertaining and hopefully helpful we strive to cover the topics at the heart of the Linux gamer. From Proton to Vulkan, from Linux native to voiding the warranty. We discuss news and updates from the Linux community, our gaming habits and wanderings along with reviewing a game each week.
…
continue reading
Podcast by Kentucky Kernel
…
continue reading
A Roulette of thoughts, film review and interests. We’ll figure it out later.
…
continue reading
Podcast by JF
…
continue reading
A periodic summary of Linux Kernel Development
…
continue reading
Movie podcast hosted by comedians Heather Anderson and Jordan Robinson
…
continue reading
…
continue reading
The Untitled Linux Show covers the week's hottest Linux news for desktop, gaming, and even enterprise. ULS is the weekly update you don't want to miss, from the latest kernel development to the updates on your favorite apps! Each episode finishes with a killer command line tip from each host. You can join Club TWiT for $10 per month and get ad-free audio and video feeds for all our shows plus everything else the club offers...or get just this podcast ad-free for $5 per month. New episodes ar ...
…
continue reading
Cool dudes making even cooler comments
…
continue reading
Jackalope Tales pulls back the curtain on the strange, spooky, and sometimes shocking urban legends that lurk within the music industry. Hosts, and founding members of the platinum selling band Toadies, Charles Mooney and Lisa Umbarger explore the weird and wacky stories behind music’s biggest names. Some legends are too bizarre to be true, while others may have a kernel of truth buried beneath the hype. You’ll never listen to your favorite songs the same way again after you hear the outland ...
…
continue reading
That's no moon; it's a podcast! Welcome to "The Nerds Podcast," where we delve deep into the realms of all things geeky and nerdy! Strap in for a hilarious journey through the worlds of movies, TV, and video games with your favorite nerdy hosts! In each episode, we bring you the juiciest reviews this side of the galaxy. From intergalactic space operas to epic superhero sagas, our hosts leave no popcorn kernel unturned. Don't forget our "Nerd News," segment. That Tyler Hunt scours the interwe ...
…
continue reading
Einzelganger (Thijs Geritz) is a Dutch self-taught musician and radiomaker. This is his music.
…
continue reading
Join the Kernels as they discuss the pros and cons of movies they force each other to watch. Featuring original songs, unique games, and some movie trivia for good measure - The Podcorn Kernels Podcast is the perfect blend of creativity, comedy, and criticism. Cosy on down, and enjoy the carnage spawned from the Kernels chaotic craniums. (Listeners beware... may contain spoilers and swears.)
…
continue reading
An open show powered by community LINUX Unplugged takes the best attributes of open collaboration and turns it into a weekly show about Linux.
…
continue reading
Welcome to ”Broadcasting Seeds,” the podcast that dares to delve into the depths of controversial, intriguing, and mind-expanding topics that skirt the edge of conspiracy, the supernatural, and the unexplained. Each episode plants a seed of curiosity, inviting you to explore the possibility that what is often dismissed as fringe or fantastical might hold a kernel of truth. From the existence of cryptids like Bigfoot and the implications of government UFO cover-ups to the mysteries of ancient ...
…
continue reading
We're trading in our controllers for some popcorn! Come on the movie watching adventure with Jon and Rose. Where they talk, "review", and ask the question, what is the kernel, the corn, and the pop?
…
continue reading
A podcast for information security defenders (blue team) on best practices, tools, and implementation for enterprise security.
…
continue reading
Where burnt-out millennials - and anyone else feeling like a shriveled corn kernel - figure out how to get sh*t done.
…
continue reading
Come join MrMario2011 talk about modding, exploiting, a bit of game/console hacking, and everything in between!
…
continue reading
Sunday Morning Linux Review – OGG Feed for Freedom Lovers!
…
continue reading
A couple of old-fashioned IT engineers/consultants turned college professors ranting about IT
…
continue reading
Welcome to Betatalks the podcast, in which we talk with friends from the development community. We chat not only about technology, but what drives them, inspires them and makes them unique. Rick (Cloud Solution Architect at Microsoft) and Oscar (CTO at Virtual Vaults), invite developers, makers, Open Source maintainers and other amazing people from the .NET and Azure development community. Looking for more content? Have a look at our Betatalks video's.
…
continue reading
Ponders Over Popcorn is a podcast about movies! Every other week, Dora and Emily talk about a different movie they seen recently, and…ponder, if you will, over the movie’s themes and ideas. They discuss a wide variety of films (and make a wide variety of bad jokes) but always like to try and get at the heart of each movie. At the end of the episode, they explain what “kernel of truth” they took away from the movie they watched.
…
continue reading
After the checkered flag waves each week, motorsports journalists from The Athletic, Jeff Gluck and Jordan Bianchi, offer instant reaction, analysis and debate straight from the racetrack.
…
continue reading
It’s No Secret is a podcast for Kiwis who want their money questions answered. Are you wondering when the right time to get on the property ladder, whether you should invest with family or how to talk to your significant other about investing and budgeting? If yes, you’re in the right place. Join the Kernel team, alongside some special guests, as they take you through the ins and outs of all things finance, money, property, investing and building wealth so you can move towards achieving fina ...
…
continue reading
Daily overview of the Top 10 Hacker News posts. Post and comment summarization by AI.
…
continue reading
Rhythm and Brews is the craft beer and music pairing podcast. In each episode, we match beers to music in an attempt to make the beer taste better, but in reality, we use it mostly to force people to listen to our questionable music tastes. Featuring great guests from the UK and international beer scenes, including the likes of The Kernel, Wander Beyond Brew, Signature Brew, Yeastie Boys, Fullers and Pete Brown.
…
continue reading
VoidStar Podcast is series where we talk to the top class achievers in tech and take a peek at the secrets to their excellence. Ever wondered how the top achievers got that good? Are they gifted people with extra-terrestrial abilities or are they mere mortals who share several drawbacks with the rest of us? In this podcast, I talk to top class achievers in tech and try to uncover any patterns in their habits, routines and approach. The interview format is an informal conversation with the gu ...
…
continue reading
Welcome to Popcorn and Peril—where every kernel holds a deadly secret. Here, we serve up gripping tales of murder, mystery, and horror, each crafted to keep you on the edge of your seat. Narrated by AI, every episode takes you on a dark journey through crime and suspense, blending cinematic drama with spine-tingling intrigue.Whether you're a fan of twisted plots or a seeker of the sinister, Popcorn and Peril is your ultimate storytelling escape. So grab your popcorn, dim the lights, and prep ...
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
The Exploring Antinatalism Podcast is the world's first podcast dedicated to the subject of Antinatalism, created by Antinatalists! Antinatalism, (Or Anti-Natalism.) Is defined by Wikipedia as, “A philosophical position and social movement that assigns a negative value to birth.” The world of Antinatalism is very vast, and though most Antinatalists do share a kernel of the same core idea, what one Antinatalist believes from the next can be wildly different. What The Exploring Antinatalism Po ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Android Bytes (powered by Esper) is the podcast that dives deep into the engineering and business decisions behind the world’s most popular OS. https://www.esper.io Android powers over 3 billion devices worldwide and is the platform of choice for over a thousand companies. You’ll find Android on smartphones, tablets, watches, TV, cars, kiosks, and so much more. How does Google architect Android to run on so many form factors, and how do companies fork AOSP to make it run on even more devices ...
…
continue reading
The Passing the Plate podcast is all about food, traditions, and the wonderful connections they create. Each week, co-hosts Ashley Covelli of Big Flavors from a Tiny Kitchen and Lisa Lisson of Are You My Cousin? will guide you on a flavor-packed adventure. Tune in to dive into family history, explore new cultures and cuisines, and preserve favorite recipes for future generations. Every episode of Passing the Plate guarantees to be a feast for the senses and a celebration of togetherness. Vis ...
…
continue reading
ShipTalk is the podcast series on the ins, outs, ups, and downs of software delivery. This series dives into the vast ocean Software Delivery, bringing aboard industry tech leaders, seasoned engineers, and insightful customers to navigate through the currents of the ever-evolving software landscape. Each session explores the real-world challenges and victories encountered by today’s tech innovators. Whether you’re an Engineering Manager, Software Engineer, or an enthusiast in Software delive ...
…
continue reading
A podcast about the future of commercial real estate, the future of law, and everything in between.
…
continue reading
We make noise... and we like it.
…
continue reading
NYC, Relationships, Family, Cyberpunk and the many things that go unspoken.... Support this podcast: https://podcasters.spotify.com/pod/show/daniel-dorsey/support
…
continue reading
Podcast by Zack Hudson
…
continue reading
Audio version of LWN.net articles. Maintained by third party, not related by LWN.net. Web-scrapping and audio conversion is done by the opensource project https://github.com/0xba1a/lwn-podcast
…
continue reading
MacResearch.org provides content for scientists designed to promote the use of Apple hardware and software in the sciences. MacResearch.org provides tutorials on Apple computing technology, forums for discussion, news and product reviews. MacResearch.org is a not-for-profit organization.
…
continue reading
Tackling the hard topics in research.
…
continue reading
JOIN THE WOOD TANG CLAN! Podcast from comedian Ruairi Woods. Support the podcast on Patreon https://www.patreon.com/woodstalk
…
continue reading
ACRO’s Good Clinical Podcast dives into topics vital to driving innovation in clinical research, from AI and other cutting-edge technology to regulatory topics that impact clinical trials around the world. ACRO's Sophia McLeod is joined by leaders from across the drug development industry to discuss the latest trends and what direction the industry must head to continue improving trials for patients
…
continue reading
Podcast sobre o dia a dia de dois utilizadores Apple
…
continue reading
Funny and insightful discussions about entertainment, celebrities and headline news.
…
continue reading
The official podcast for Frankenmuth, Michigan - exploring the people, places, events, and unique stories that make Michigan's Little Bavaria a truly special destination.
…
continue reading

1
Episode 58: Homelab Projects That Will Boost Your IT Career
1:07:55
1:07:55
Play later
Play later
Lists
Like
Liked
1:07:55In this episode of Crowbar Kernel Panic, Bo and Josh break down the Top 5 homelab projects that aren’t just fun — they actually build real skills that can help you land (and grow in) an IT or DevOps career. We cover: How networking projects like Pi-hole, Unbound, and OpenSense teach fundamentals you’ll use in every IT job. Why virtualization with P…
…
continue reading

1
9.8.25 | MacBook screen hinge sensor, Claude Code modernizes kernel driver, GPT-5 excels in search
12:35
12:35
Play later
Play later
Lists
Like
Liked
12:35This is a recap of the top 10 posts on Hacker News on Sep 8, 2025. (00:00) - Intro (00:20) - The MacBook has a sensor that knows the exact angle of the screen hinge (01:23) - Using Claude Code to modernize a 25-year-old kernel driver (02:42) - GPT-5 Thinking in ChatGPT (a.k.a. Research Goblin) is good at search (03:56) - I am giving up on Intel and…
…
continue reading

1
Spinning into madness: More disks than your kernel can count, just for fun - (Episode 135)
1:19:56
1:19:56
Play later
Play later
Lists
Like
Liked
1:19:56Picture this: your server room has turned into a disco floor, and every drive is demanding its own spotlight. Thirty disks whirl in perfect sync, but then a rogue 31st struts in, and suddenly your operating system starts sweating like it’s at a math exam it didn’t study for. This episode dives into the hilarious chaos of kernels that choke on too m…
…
continue reading

1
PP075: Kernel Vs. User Mode In Endpoint Security Software
43:39
43:39
Play later
Play later
Lists
Like
Liked
43:39Microsoft is rethinking allowing endpoint security software to run in the Windows kernel (including third-party and Microsoft’s own endpoint security software). While there are benefits to running security software in the kernel, there are also serious downsides (see the CrowdStrike outage). Dan Massameno joins JJ and Drew on Packet Protector to ta…
…
continue reading

1
Ransomware Gangs Deploy Kernel-Level EDR Killers to Evade Detection
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36Ransomware gangs are no longer just encrypting files and demanding payment—they are actively targeting the very defenses meant to stop them. Recent reports reveal a dramatic surge in the use of EDR killer tools, specialized malware designed to disable Endpoint Detection and Response (EDR) and antivirus systems at the kernel level. By silencing thes…
…
continue reading

1
69: Jet Engines to Spice Kits: Sheila Narayanan's Mission to Make Indian Cooking Accessible
46:17
46:17
Play later
Play later
Lists
Like
Liked
46:17What happens when a rocket scientist decides to revolutionize home cooking? Meet Sheila Narayanan, founder of Simply Masala, whose remarkable journey took her from designing jet engines to creating innovative spice kits that make authentic Indian cuisine accessible to everyone. Join us as we chat about breaking down barriers to Indian cooking, the …
…
continue reading
This episode explores the mysterious tale of the green children of Woolpit, who appeared in medieval England with green skin and an unknown language. The narrative delves into their arrival, the theories surrounding their existence, and the reasons why this story has endured through the centuries. It highlights the intersection of history and folkl…
…
continue reading

1
Lakera’s Gandalf Network Joins Check Point in $300M AI Security Deal
24:33
24:33
Play later
Play later
Lists
Like
Liked
24:33In a major strategic move, Check Point Software Technologies has announced the acquisition of Lakera, a Zurich and San Francisco–based AI security firm founded by former Google and Meta AI researchers. Valued at around $300 million, the acquisition will close in late 2025 and serve as the foundation for Check Point’s new Global Center of Excellence…
…
continue reading

1
Shai-Hulud Exposes Fragility of the Open-Source Software Supply Chain
34:50
34:50
Play later
Play later
Lists
Like
Liked
34:50A major supply chain attack is underway in the npm ecosystem. Dubbed Shai-Hulud, this worm-style campaign began with the compromise of the popular @ctrl/tinycolor package and has since infected at least 187 npm packages, including some published under CrowdStrike’s official account. The malware, designed to spread automatically, abuses the legitima…
…
continue reading

1
ChatGPT Calendar Vulnerability Exposes User Emails in New AI Attack
20:27
20:27
Play later
Play later
Lists
Like
Liked
20:27A critical vulnerability has been uncovered in ChatGPT’s new calendar integration, exposing how attackers could exfiltrate sensitive user data—particularly emails—through a deceptively simple exploit. Security researchers at EdisonWatch, led by Eito Miyamura, demonstrated how a malicious calendar invitation could contain hidden instructions that Ch…
…
continue reading

1
CrowdStrike Acquires Pangea to Launch AI Detection and Response (AIDR)
22:03
22:03
Play later
Play later
Lists
Like
Liked
22:03At Fal.Con 2025, CrowdStrike announced one of its boldest moves yet: the acquisition of AI security startup Pangea. The deal signals CrowdStrike’s intent to redefine the future of cybersecurity by protecting not just endpoints and networks, but the entire AI lifecycle. Pangea, founded in 2021, is known for cutting-edge tools like AI Guard, which pr…
…
continue reading

1
RaccoonO365: $100K Phishing-as-a-Service Scheme Taken Down
27:03
27:03
Play later
Play later
Lists
Like
Liked
27:03Microsoft and Cloudflare have successfully dismantled RaccoonO365, a global phishing-as-a-service (PhaaS) operation that had been running for over a year. This criminal platform, marketed on Telegram and used by up to 200 subscribers, enabled attackers to craft realistic Microsoft 365 phishing campaigns, complete with fake login pages, email lures,…
…
continue reading

1
9.17.25 | UN finds Israel guilty of Gaza genocide, Shai-Hulud malware compromises Tinycolor and 40+ NPM packages, Software Defined Radio uses for 2024
12:05
12:05
Play later
Play later
Lists
Like
Liked
12:05This is a recap of the top 10 posts on Hacker News on Sep 17, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:18) - Top UN legal investigators conclude Israel is guilty of genocide in Gaza (01:38) - Shai-Hulud malware attack: Tinycolor and over 40 NPM packages compromised (02:51) - …
…
continue reading
Things got messy on live TV — and we love it. In this episode, Charles revisits the infamous 1976 Sex Pistols interview with Bill Grundy, where Britain collectively clutched its pearls while punk officially announced itself to the world. Lisa brings the chaos stateside with the story of Jello Biafra and Tipper Gore going head-to-head on Oprah, turn…
…
continue reading

1
AI-Generated Phishing and Deepfakes Supercharge Social Engineering Attacks
1:01:18
1:01:18
Play later
Play later
Lists
Like
Liked
1:01:18Social engineering has reclaimed center stage as today’s most reliable intrusion vector—and it’s not just email anymore. Recent warnings from law enforcement and national cyber centers underscore how adversaries exploit human psychology to “log in, not hack in,” bypassing hardened perimeters with phishing, vishing (voice phishing) against IT help d…
…
continue reading

1
Phoenix Attack Breaks DDR5 Rowhammer Defenses: Root in 109 Seconds
41:45
41:45
Play later
Play later
Lists
Like
Liked
41:45The infamous Rowhammer vulnerability, long thought to be contained by new DRAM protections, has resurfaced with devastating force. Academic researchers, working with Google, have unveiled the Phoenix attack, a breakthrough Rowhammer variant that shatters the defenses of DDR5 memory chips. Despite the industry’s investment in Target Row Refresh (TRR…
…
continue reading

1
Silent Push Raises $10M Series B to Expand Threat Intelligence Platform
48:07
48:07
Play later
Play later
Lists
Like
Liked
48:07Cybercriminals aren’t just breaking in—they’re borrowing your brand to do it. This episode dives into the critical intersection of brand protection, threat intelligence, and external attack surface management (EASM) and lays out a practical, intelligence-driven blueprint you can start applying today. We begin with the state of brand abuse: a sharp …
…
continue reading

1
PP078: Using Free Tools for Detection Engineering
49:25
49:25
Play later
Play later
Lists
Like
Liked
49:25You can build effective, scalable detection pipelines using free and open-source tools like Zeek, Suricata, YARA, and Security Onion. Today on Packet Protector we welcome Matt Gracie, Senior Engineer at Security Onion Solutions — the team behind the open-source platform used for detection engineering, network security monitoring, and log management…
…
continue reading

1
Google Accused of Shadow Lobbying Against California Privacy Opt-Out Law
31:38
31:38
Play later
Play later
Lists
Like
Liked
31:38California’s Assembly Bill 566 (AB 566) has become one of the most hotly contested pieces of privacy legislation in the country. The bill would require universal “opt-out preference signals” in web browsers and mobile operating systems, allowing consumers to automatically block the sale and sharing of their personal data across the internet. Propon…
…
continue reading

1
FinWise Bank Data Breach Exposes 700K Customers Amid Predatory Lending Allegations
33:04
33:04
Play later
Play later
Lists
Like
Liked
33:04FinWise Bank is facing a double crisis—one of data security and another of public trust. Nearly 700,000 customers of American First Finance (AFF), a FinWise partner, were impacted by a massive data breach after a former employee improperly accessed sensitive records. The bank has responded with offers of free credit monitoring, but the damage to co…
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy Jaw and Adam Brewer discuss the latest developments in Microsoft security technologies, particularly focusing on Entra and its features like Continuous Access Evaluation (CAE) and the integration of threat intelligence into the Global Secure Access (GSA) platform. They reflect on thei…
…
continue reading

1
9.16.25 | Website on disposable vape, React stifles innovation, Linux phones' rising significance
11:59
11:59
Play later
Play later
Lists
Like
Liked
11:59This is a recap of the top 10 posts on Hacker News on Sep 16, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:19) - Hosting a website on a disposable vape (01:23) - React is winning by default and slowing innovation (02:35) - Linux phones are more important now than ever (03:49) - m…
…
continue reading

1
Where the Weird Ones Are: Stories of Darkness and Light w/ Kevin Sapiel Jr
1:21:02
1:21:02
Play later
Play later
Lists
Like
Liked
1:21:02Kevin Sapiel Jr. shares his journey as the host of the podcast 'Where the Weird Ones Are,' exploring themes of the supernatural, mental health, and personal experiences with paranormal phenomena. He discusses his early encounters with strange occurrences, the motivation behind starting his podcast, and the importance of mental health in navigating …
…
continue reading

1
9.15.25 | Slow thinking strategies, Betty Crocker's recipe box shrinkage, Grapevine canes as biodegradable plastic
12:26
12:26
Play later
Play later
Lists
Like
Liked
12:26This is a recap of the top 10 posts on Hacker News on Sep 15, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:17) - You’re a slow thinker. Now what? (01:30) - Betty Crocker broke recipes by shrinking boxes (02:41) - Grapevine canes can be converted into plastic-like material that wi…
…
continue reading

1
113. Vector Databases and RAG for Grounding AI in Reliable Data - with Christian Peeters
45:47
45:47
Play later
Play later
Lists
Like
Liked
45:47In this Betatalks episode, Rick and Oscar talk with Christian Peeters, a principal Cloud Architect at Betabit and a certified Microsoft trainer. They discuss the intersection of technology, teaching, and continuous learning in software development. They explore emerging tools like vector databases and Retrieval Augmented Generation (RAG), breaking …
…
continue reading
Our first look at KDE Linux, then Chris shares the latest on Hyprvibe, while Wes braves his first install. Sponsored By: Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a device trust …
…
continue reading

1
ULS 220: It Hardly Ever Bricks Your Computer - Historic Open Source, Firefox Blitz, and Apache No More
1:19:11
1:19:11
Play later
Play later
Lists
Like
Liked
1:19:11This week Microsoft Open Sources one of its oldest codebases, Firefox is blitzing its codebase, and Apache (the name) is no more. Pipewire, CUPS, and Fwupd all ships updates. Bcachefs's future is a bit uncertain, and VDPAU is certainly out of Mesa. For tips we have default handling with wpctl, server management with ansible, and Wine performance wi…
…
continue reading

1
9.14.25 | Store generates products from search, Myocardial infarction linked to infection, Wedding crasher mystery resolved
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10This is a recap of the top 10 posts on Hacker News on Sep 14, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:18) - Show HN: A store that generates products from anything you type in search (01:14) - Myocardial infarction may be an infectious disease (02:33) - Four-year wedding cras…
…
continue reading
A surprising high-wear tire race at Bristol Motor Speedway presents a puzzle for playoff teams as Round 1 ends. Jeff and Jordan look back on a wild race, talk about who missed the cut and what the playoffs might look like going forward.By Jordan Bianchi, Jeff Gluck
…
continue reading

1
The Blood and the Goat: Leviticus and the Unseen War
35:19
35:19
Play later
Play later
Lists
Like
Liked
35:19This episode explores the deeper meanings behind the sacrificial rituals in Leviticus, emphasizing the significance of blood as a currency in the supernatural economy, the role of the scapegoat, and the cosmic boundaries established through fire and smoke. It connects these ancient practices to the ultimate sacrifice of Jesus, illustrating how thes…
…
continue reading

1
Big D*ck Zombie Stuff | The Conjuring Last Rites Review – Bob’s Burgers, IASIP and Relay
1:24:35
1:24:35
Play later
Play later
Lists
Like
Liked
1:24:35Episode 526: The Conjuring Last Rites Review – Tyler starts off the episode by discussing getting caught up with Bob’s Burgers and It’s Always Sunny in Philadelphia! Pat shares his thoughts on the new David Mackenzie film Relay. Tyler leads the discussion of the latest “Nerd News”...including a couple of new trailers (Wake up Dead Man, 28 Years Lat…
…
continue reading

1
9.13.25 | EU court classifies nuclear energy as clean, Treasury expands Patriot Act against Bitcoin self-custody, UTF-8 praised as brilliant design
12:15
12:15
Play later
Play later
Lists
Like
Liked
12:15This is a recap of the top 10 posts on Hacker News on Sep 13, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:20) - EU court rules nuclear energy is clean energy (01:39) - The treasury is expanding the Patriot Act to attack Bitcoin self custody (02:57) - UTF-8 is a brilliant design …
…
continue reading

1
9.12.25 | Git history leaks skew SWE-bench scores, Bun Install's behind-the-scenes, website resembles an operating system
12:16
12:16
Play later
Play later
Lists
Like
Liked
12:16This is a recap of the top 10 posts on Hacker News on Sep 12, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:21) - Top model scores may be skewed by Git history leaks in SWE-bench (01:26) - Behind the scenes of Bun Install (02:44) - Why our website looks like an operating system (0…
…
continue reading

1
Ultraviolet Shadows: Sasquatch and the Hidden Spectrum
59:16
59:16
Play later
Play later
Lists
Like
Liked
59:16In this engaging conversation, Chuckie Danger, host of the Danger Zone podcast, shares his insights into the ultraviolet spectrum and its connection to the paranormal, particularly Sasquatch encounters. He discusses personal experiences that led him to explore the unseen aspects of nature, including the role of mimicry in Sasquatch behavior and the…
…
continue reading

1
9.11.25 | Museum visit prioritizes experience, Term.everything enables GUI apps in terminal, Pontevedra, Spain limits urban traffic
12:18
12:18
Play later
Play later
Lists
Like
Liked
12:18This is a recap of the top 10 posts on Hacker News on Sep 11, 2025. Feel free to leave feedback on Github: https://github.com/denolfe/hacker-news-highlights (00:00) - Intro (00:19) - I didn't bring my son to a museum to look at screens (01:44) - Show HN: Term.everything – Run any GUI app in the terminal (02:52) - Pontevedra, Spain declares its enti…
…
continue reading

1
9.10.25 | iPhone Air, narrowly avoided disaster, Claude gains server-side container access
12:30
12:30
Play later
Play later
Lists
Like
Liked
12:30This is a recap of the top 10 posts on Hacker News on Sep 10, 2025. (00:00) - Intro (00:21) - iPhone Air (01:37) - We all dodged a bullet (02:37) - Claude now has access to a server-side container environment (03:47) - E-paper display reaches the realm of LCD screens (04:54) - I replaced Animal Crossing's dialogue with a live LLM by hacking GameCub…
…
continue reading

1
Jackalope Tales – The Last Encore Was A Riot
49:59
49:59
Play later
Play later
Lists
Like
Liked
49:59When the punks said “tear it up,” they weren’t talking about the setlist. In this episode, Charles dives headfirst into the chaos of a Dead Kennedys tour where things spiraled so far out of control that even Jello Biafra found himself on the wrong end of punk justice—blood, boots, and betrayal. Meanwhile, Lisa unpacks a festival hosted by GBH that …
…
continue reading

1
AI for Security vs Security for AI: From IBM Master Inventor to Microsoft AI Architect
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48Dewan Ahmed sits down with Fatih Bulut, AI Architect at Microsoft and former IBM Research Master Inventor, to separate hype from reality in AI for software delivery and cybersecurity. Fatih clarifies AI for security vs security for AI, walks through detection engineering as real software engineering, and explains proactive defense across an attack’…
…
continue reading

1
PP077: News Roundup–Drift Breach Has Long Reach; FCC Investigates Its Own IoT Security Program
37:20
37:20
Play later
Play later
Lists
Like
Liked
37:20Is any publicity good publicity? On today’s News Roundup we talk about how Salesloft, which makes the Drift chat agent that’s been used as a jumping-off point for credential harvesting and data breach attacks against a bunch of big-name companies, is testing that proposition. We also discuss bugs affecting industrial refrigeration controllers, and …
…
continue reading
Summary In this episode of the Blue Security Podcast, hosts Andy and Adam delve into the concept of FUD (Fear, Uncertainty, and Doubt) prevalent in the cybersecurity industry. They discuss the implications of sensationalized reporting, particularly around Windows Hello for Business vulnerabilities and the importance of adopting fish resistant multi…
…
continue reading

1
9.9.25 | NPM packages compromised, Signal backups secured, iPhone as a dumbphone
12:10
12:10
Play later
Play later
Lists
Like
Liked
12:10This is a recap of the top 10 posts on Hacker News on Sep 9, 2025. (00:00) - Intro (00:18) - NPM debug and chalk packages compromised (01:31) - Signal Secure Backups (02:35) - iPhone dumbphone (03:44) - No adblocker detected (04:54) - Experimenting with Local LLMs on macOS (06:07) - Liquid Glass in the Browser: Refraction with CSS and SVG (07:11) -…
…
continue reading

1
Biblical Mysteries and Strange Creatures: A Conversation with Seth Vandebroek
1:05:07
1:05:07
Play later
Play later
Lists
Like
Liked
1:05:07In this conversation, Seth Vandebroek, a full-time Bible Answer Man, shares his insights on high strangeness, the Nephilim, and various historical accounts of strange creatures. He discusses the three races of the Nephilim, the significance of biblical texts, and the implications of ancient history on modern understanding. The dialogue explores the…
…
continue reading

1
The “s1ngularity” Attack: How Hackers Hijacked Nx and Leaked Thousands of Repositories
38:48
38:48
Play later
Play later
Lists
Like
Liked
38:48In late August 2025, the open-source software ecosystem was rocked by a sophisticated two-phase supply chain attack, now known as “s1ngularity.” The incident began when attackers exploited a flaw in GitHub Actions workflows for the Nx repository, stealing an NPM publishing token and using it to release malicious versions of Nx packages. These packa…
…
continue reading

1
Canadian Investment Giant Wealthsimple Hit by Vendor Compromise
34:24
34:24
Play later
Play later
Lists
Like
Liked
34:24Wealthsimple, one of Canada’s largest online investment platforms, has confirmed a data breach that exposed the sensitive information of fewer than 1% of its three million clients. The incident, detected on August 30, 2025, originated from a supply chain attack: a trusted third-party vendor’s compromised software package served as the entry point f…
…
continue reading

1
FireCompass Raises $20M to Scale AI-Powered Offensive Security
38:48
38:48
Play later
Play later
Lists
Like
Liked
38:48In a year when cybercrime is projected to cost the world over $10.5 trillion, FireCompass has emerged as one of the most closely watched AI-driven cybersecurity innovators. The startup, founded in 2019, just secured $20 million in new funding—bringing its total raised to nearly $30 million. Backed in part by EC-Council’s Cybersecurity Innovation Fu…
…
continue reading

1
CVE-2025-42957: Active Exploits Target SAP S/4HANA Systems
32:04
32:04
Play later
Play later
Lists
Like
Liked
32:04A newly uncovered critical vulnerability, tracked as CVE-2025-42957, is sending shockwaves through the enterprise technology world. Affecting all SAP S/4HANA deployments, both on-premise and in private cloud environments, this ABAP code injection flaw carries a near-maximum CVSS score of 9.9. What makes it especially dangerous is its low complexity…
…
continue reading

1
Fake Job Interviews, Real Hacks: How North Korean Spies Steal Billions in Crypto
30:21
30:21
Play later
Play later
Lists
Like
Liked
30:21North Korean cybercriminals have escalated their social engineering operations, deploying a wave of sophisticated campaigns designed to infiltrate cryptocurrency and decentralized finance (DeFi) organizations. At the center of these operations is the “Contagious Interview” campaign, where hackers impersonate recruiters and trick job seekers into do…
…
continue reading
Jeff and Jordan discuss the fallout from the Round 1 NASCAR playoff race at World Wide Technology Raceway -- and Jeff has suddenly changed his tune on who the championship favorites are.By Jeff Gluck, Jordan Bianchi
…
continue reading