Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Secure Coding Podcasts
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Discussions with regulators, top lawyers and entrepreneurs about the legal framework for blockchain technology. We look at international regulations, trends, and jurisprudence impacting crypto and its related parts.
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Podcast Channel ที่ว่าด้วยเรื่องของ Security
…
continue reading
The world of application development moves quickly. New tools, new processes, and new threats are always popping up. Through enlightening interviews with industry leaders, From Code to the Cloud helps you stay on top of new developments in Low Code and Salesforce DevOps.
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
…
continue reading
Welcome to Beyond the Code, the podcast where we dive into the legal, regulatory, and ethical issues surrounding emerging technologies. Each week, we bring you in-depth conversations with industry experts, discussing the latest advancements in technology and their implications on society and the legal system. From artificial intelligence to blockchain, we'll be exploring all the hot topics in the field. Your host, Yitzy Hammer, a lawyer and tech enthusiast, is joined by a diverse group of ex ...
…
continue reading
From commentary on current events to random musings, they chat (mostly) about security and technology topics. However, life is more than just the day job. From beekeeping adventures to hiking mountains to favorite shows, there's always something fun to wrap up the show.
…
continue reading
ConTejas Code is a podcast in the web engineering space that has deep dives on various topics between frontend engineering with React, TypeScript, Next.js, and backend engineering with Kafka, Postgres, and more. The series is a mix of long-form content and guest episodes with industry leaders in the web engineering space. From the podcast, listeners will take away actionable best practices that you can integrate into your workflows as well as valuable insights from prominent people in the in ...
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
Code to Cloud is the podcast for builders—founders, engineers, and tech leaders—shipping the future of cloud, faster. From MVP to hyperscale, we dive into what really matters: cloud-native infrastructure, DevSecOps, AI integration, adaptive strategies, and modern app development. Hosted by Kevin Evans, a 25-year tech veteran, Senior Technologist at Microsoft, and fractional CTO at Code to Cloud, each episode delivers tactical conversations with engineering leaders, startup operators, and clo ...
…
continue reading
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot ...
…
continue reading
Join us on Distilled Security as we delve into the fascinating world of cybersecurity. Each episode, we break down intriguing topics, analyze the latest news, and engage in in-depth conversations with our hosts and invited guests. Whether you're a seasoned professional or just curious about cybersecurity, our podcast offers valuable insights and thought-provoking discussions to keep you informed and entertained. Tune in and stay ahead of the curve in the ever-evolving landscape of cybersecurity.
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
…
continue reading
In the shadows of the digital world, where anonymity is power and information is currency, battle lines are drawn not with bullets but with code. This show takes listeners deep into the heart of cyberspace’s most high-stakes confrontations — where rogue programmers exploit vulnerabilities, corporations scramble to secure their data empires, and government agencies wage invisible wars across invisible lines. It’s a realm shaped by encryption, espionage, whistleblowers, and wild ambition. From ...
…
continue reading
This is the Ctrl+Alt+Azure podcast. We talk about all things Microsoft, including Microsoft Azure, and share our experiences and thoughts on the way. Your hosts are Tobias Zimmergren and Jussi Roine.
…
continue reading
discussions on topics connected with software development; privacy, security, management, tools, techniques, skills, training, business, soft skills, health
…
continue reading
Podcast by Skyscanner
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
Our podcast features Tech Talks with professionals at WeblineIndia who share their experiences, challenges, and solutions in software development and technology services. Each episode offers practical examples, lessons learned from recent projects, and suggestions on improving development processes. The discussions also cover current trends in AI, IT outsourcing, software development, and mobile app creation, helping you stay informed about approaches and methods that could make a difference ...
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading

1
Cybersecurity, Privacy, Risk Management, Cryptocurrencies, Fintech, Information Technology
Shahid Sharif
Career guidance & consulting services in Information Technology, Cybersecurity, Privacy, Risk Management, Cryptocurrencies, & Fintech #self improvement # productivity #cybersecurity #security #privacy #risk #fintech #blockchain #cryptocurrencies
…
continue reading
15 minutes news, tips, and tricks on the Go programming language.
…
continue reading
Space Monkeys & Behind the Code: Web3 Thinkers in partnership with Key Pictures: A collection of interviews with the best and brightest minds building on Polkadot and Substrate. Released weekly wherever you listen to podcasts. Make sure you follow us so you don't miss an episode!!
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Code Patrol scrutinizes the month’s tech scene with code-colored glasses. Computer security industry veteran Lisa Vaas chats with guests about all things security — be it cybercrime, hacking, DevSecOps, and beyond — that collide with the code that runs the world.
…
continue reading
Join Privado.ai each week as he navigates the ever-changing landscape of data breaches, surveillance, and individual rights, offering expert insights and actionable advice to help you take control of your digital footprint. Join him for lively discussions, in-depth interviews, and practical tips to protect your privacy in today's connected world.
…
continue reading
Larry and Kerry talk about parenting issues during Covid-19 isolation period
…
continue reading
The Salesforce Admins podcast features real-life Salesforce Admins, product managers, and community leaders who transform businesses, careers, and community with clicks, not code. This 20min (sometimes a bit more) weekly podcast hosted by Mike Gerholdt feature episodes to empower Salesforce Admins who are implementing Enterprise CRM solutions. There may be some (digital) confetti. For more than our most recent episodes, go to https://admin.salesforce.com/salesforce-admin-podcast.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Cloud Security Podcast by Google focuses on security in the cloud, delivering security from the cloud, and all things at the intersection of security and cloud. Of course, we will also cover what we are doing in Google Cloud to help keep our users' data safe and workloads secure. We’re going to do our best to avoid security theater, and cut to the heart of real security questions and issues. Expect us to question threat models and ask if something is done for the data subject’s benefit or ju ...
…
continue reading

1
EP 66: Secure only the OT code that actually runs
23:11
23:11
Play later
Play later
Lists
Like
Liked
23:11Many organizations spend valuable security resources fixing vulnerabilities in code that never actually runs—an inefficient and often unnecessary effort. Jeff Williams, CTO and founder at Contrast Security, says that 62% of open source libraries included in software are never even loaded into memory, let alone executed. This means only 38% of libra…
…
continue reading

1
Episode 14: AI Risks, Threat Modeling, and The Future of Vibe Coding
1:22:30
1:22:30
Play later
Play later
Lists
Like
Liked
1:22:30Episode 14 of the Distilled Security Podcast is here! This week, the team welcomes guest John Zeolla, a cybersecurity expert and AI enthusiast, for a deep dive into the risks, realities, and potential of artificial intelligence. Topics include: Shadow AI in the Enterprise: Why business leaders are adopting AI faster than CISOs can assess the risks—…
…
continue reading

1
Vibe Coding: Can You Put Your Trust in the Machine?
43:35
43:35
Play later
Play later
Lists
Like
Liked
43:35We’re discussing vibe coding again and how AI-generated code is reshaping software development. We discuss the trustworthiness and maintainability of AI-generated code, examining the challenges of reviewing and integrating automated changes at scale. The conversation spans from practical concerns about code quality to broader implications for open-…
…
continue reading

1
7.19 - Hacker Culture: The Self Modifying Code
46:32
46:32
Play later
Play later
Lists
Like
Liked
46:32Hack the planet! In this episode of Security Noise, Geoff and Skyler chat with TrustedSec CSO & VP of Consulting Martin Bos and Principal Security Consultant Mike Felch about the evolution of hacker culture. They talk about their early experiences with hacking, cyber tech, and movies as well as cultural shifts over the years and how it has impacted…
…
continue reading

1
Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
…
continue reading

1
Vibe Coding vs Low-Code/No-Code: Security Risks and CI/CD Pipeline Impacts for Citizen Developers
9:42
9:42
Play later
Play later
Lists
Like
Liked
9:42Explore the evolution from traditional coding to vibe coding and its relationship with low-code/no-code (LCNC) platforms. This comprehensive analysis examines how AI-assisted development and visual programming tools are creating a new generation of citizen developers, transforming enterprise software development. We dive deep into the security impl…
…
continue reading

1
EP2152: Chill Chill Security - Play Claude Plugin of Visual Studio Code
11:13
11:13
Play later
Play later
Lists
Like
Liked
11:13Sponsor by SEC Playground
…
continue reading

1
Shivay Lamba: How to run secure AI anywhere with WebAssembly
1:33:49
1:33:49
Play later
Play later
Lists
Like
Liked
1:33:49Links - CodeCrafters (partner): https://tej.as/codecrafters - WebAssembly on Kubernetes: https://www.cncf.io/blog/2024/03/12/webassembly-on-kubernetes-from-containers-to-wasm-part-01/ - Shivay on X: https://x.com/howdevelop - Tejas on X: https://x.com/tejaskumar_ Summary In this podcast episode, Shivay Lamba and I discuss the integration of WebAsse…
…
continue reading

1
EP231 Beyond the Buzzword: Practical Detection as Code in the Enterprise
30:40
30:40
Play later
Play later
Lists
Like
Liked
30:40Guest: David French, Staff Adoption Engineer, Google Cloud Topic: Detection as code is one of those meme phrases I hear a lot, but I’m not sure everyone means the same thing when they say it. Could you tell us what you mean by it, and what upside it has for organizations in your model of it? What gets better for security teams and security outcomes…
…
continue reading
A GCHQ intern forgets the golden rule of spy school — don’t take the secrets home with you — and finds himself swapping Cheltenham for a cell. Meanwhile, an Australian hacker flies too close to the sun, hacks his way into a US indictment, and somehow walks free... only to get booted back Down Under. Plus: flow states, Bob Mortimer, and the joys of …
…
continue reading

1
Healthline hit with largest CCPA penalty to date | NY tightens teen privacy rules | Microsoft faces EU lawsuit
10:35
10:35
Play later
Play later
Lists
Like
Liked
10:35Send us a text 📢 In Privacy News This Week: 🔹 Healthline fined $1.55M under CCPA – for failing to honor opt-outs, misconfigured cookie banners, and sharing sensitive health data without proper contracts or purpose limitation. 🔹 NY cracks down on teen tracking – AG guidance confirms NY Child Data Protection Act bans behavioral ads unless strictly ne…
…
continue reading
British and Romanian authorities make arrests in a major tax fraud scheme. The Interlock ransomware gang has a new RAT. A new vulnerability in Google Gemini for Workspace allows attackers to hide malicious instructions inside emails. Suspected Chinese hackers breach a major DC law firm. Multiple firmware vulnerabilities affect products from Taiwane…
…
continue reading
Researchers in Japan achieve a world record in data transmission speeds, Robin Sloan explains how an app can be a home-cooked meal, Windsurf founders Varun Mohan & Douglas Chen are headed to Google, new Intel CEO Lip-Bu Tan says it’s too late for the incumbent, Anton Zaides says stop forcing AI tools on your engineers, and Adrien Friggeri visualize…
…
continue reading

1
Australia’s AI future—trust, opportunity, and human rights with Prof Ed Santow
42:30
42:30
Play later
Play later
Lists
Like
Liked
42:30In this episode of the Technology & Security podcast, Dr. Miah Hammond-Errey is joined by Professor Edward Santow, former Australian Human Rights Commissioner and co-director of the Human Technology Institute at UTS. The conversation is a candid exploration of Australia’s evolving AI landscape, diving into why Australians remain sceptical of AI des…
…
continue reading
Attempts at Governance - Every Monday & Thursday on The Kus!
…
continue reading

1
EP234 The SIEM Paradox: Logs, Lies, and Failing to Detect
37:59
37:59
Play later
Play later
Lists
Like
Liked
37:59Guest: Svetla Yankova, Founder and CEO, Citreno Topics: Why do so many organizations still collect logs yet don’t detect threats? In other words, why is our industry spending more money than ever on SIEM tooling and still not “winning” against Tier 1 ... or even Tier 5 adversaries? What are the hardest parts about getting the right context into a S…
…
continue reading

1
Monzy Merza, How Much AI is Too Much, and the Weekly News - Monzy Merza - ESW #415
1:43:41
1:43:41
Play later
Play later
Lists
Like
Liked
1:43:41Segment 1: Interview with Monzy Merza - There is a Right and Wrong Way to use AI in the SOC In the rush to score AI funding dollars, a lot of startups build a basic wrapper around existing generative AI services like those offered by OpenAI and Anthropic. As a result, these services are expensive, and don't satisfy many security operations teams' p…
…
continue reading

1
Lawfare Daily: The Trials of the Trump Administration, July 11
1:47:14
1:47:14
Play later
Play later
Lists
Like
Liked
1:47:14In a live conversation on July 11, Lawfare Editor in Chief Benjamin Wittes sat down with Lawfare Senior Editors Scott Anderson, Anna Bower and Roger Parloff to discuss the Supreme Court’s ruling in Trump v. AFGE, which allows for the mass terminations of federal employees, what happened in the multiple hearings in the criminal and civil cases invol…
…
continue reading

1
SANS Stormcast Monday, July 14th, 2025: Suspect Domain Feed; Wing FTP Exploited; FortiWeb Exploited; NVIDIA GPU Rowhammer
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102 Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812 Huntress saw active exploitation of…
…
continue reading

1
ep.200 - Ledger CTO's Hacking Journey ⚠️ Securing 20% of Crypto with Charles Guillemet
47:54
47:54
Play later
Play later
Lists
Like
Liked
47:54Join us for an exclusive interview with Ledger CTO Charles Guillemet, who shares his incredible journey from hacking his ISP at 13 to leading security for a company that protects over 20% of the crypto market cap. Discover how Ledger’s Donjon team breaks wallets to strengthen them, the truth behind supply chain security fears, and innovations like …
…
continue reading

1
Lawfare Archive: Julian Mortenson on 'The Executive Power'
50:40
50:40
Play later
Play later
Lists
Like
Liked
50:40From April 12, 2019: Julian Mortenson, Professor of Law at the University of Michigan, is the author of a remarkable new article entitled "Article II Vests Executive Power, Not the Royal Prerogative," forthcoming in the Columbia Law Review and available on SSRN. Recently, Benjamin Wittes spoke with the professor about the article, which Mortenson h…
…
continue reading
A 4th of July was had by both. An extension hijacking campaign that infected as many as 2.3 million users and software to protect the small web from AI scrapers with computational overhead. For fun we have car tipping (off a cliff!?), and evidence for even more water on Mars. 0:00 - Intro 13:06 - Hijacking Campaign 16:33 - Weighing the Soul of the …
…
continue reading

1
Lawfare Archive: Juliette Kayyem on the Baltimore Bridge Collapse and Crisis Management
41:56
41:56
Play later
Play later
Lists
Like
Liked
41:56From April 9, 2024: In the early morning on March 26, a Singapore-flagged cargo ship crashed into Baltimore’s Francis Scott Key Bridge. The bridge collapsed, resulting in the death of six of the eight individuals conducting maintenance on the bridge. The incident has disrupted commuter traffic and the transport of hazardous materials, and it has ha…
…
continue reading

1
MK Palmore: Lead from where you stand. [CISO] [Career Notes]
9:10
9:10
Play later
Play later
Lists
Like
Liked
9:10Please enjoy this encore of Career Notes. Director of Google Cloud's Office of the CISO, MK Palmore, dedicated much of his life to public service and now brings his experience working for the greater good to the private sector. A graduate of the US Naval Academy, including the Naval Academy Prep School that he calls the most impactful educational e…
…
continue reading
Today we are joined by Selena Larson, Threat Researcher at Proofpoint, and co-host of Only Malware in the Building, as she discusses their work on "Amatera Stealer - Rebranded ACR Stealer With Improved Evasion, Sophistication." Proofpoint researchers have identified Amatera Stealer, a rebranded and actively developed malware-as-a-service (Maa…
…
continue reading

1
Tapjacking, ZuChe, PerfektBlue, McHacking, OT in the IT, Add Ons, Josh Marpet... - SWN #493
33:42
33:42
Play later
Play later
Lists
Like
Liked
33:42Tapjacking, ZuChe, PerfektBlue, McHacking, OT in the IT, Add Ons, Josh Marpet, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-493
…
continue reading
Fortinet patches a critical flaw in its FortiWeb web application firewall. Hackers are exploiting a critical vulnerability in Wing FTP Server. U.S. Cyber Command’s fiscal 2026 budget includes a new AI project. Czechia’s cybersecurity agency has issued a formal warning about Chinese AI company DeepSeek. The DoNot APT group targets Italy’s Ministry o…
…
continue reading

1
Measuring the actual impact of AI coding (Friends)
1:03:39
1:03:39
Play later
Play later
Lists
Like
Liked
1:03:39Abi Noda from DX is back to share some cold, hard data on just how productive AI coding tools are actually making developers. Teaser: the productivity increase isn’t as high as we expected. We also discuss Jevons paradox, AI agents as extensions of humans, which tools are winning in the enterprise, how development budgets are changing, and more. Jo…
…
continue reading

1
Lawfare Daily: Bribery and the Second Trump Administration with John Keller
58:43
58:43
Play later
Play later
Lists
Like
Liked
58:43John Keller, now a partner at Walden, Macht, Haran, & Williams, channeled his experience as the former chief of the Public Integrity Section at the Department of Justice to talk about bribery with James Pearce, Lawfare Legal Fellow. After explaining the basics of bribery law and whether a current or former president could face a bribery prosecution…
…
continue reading

1
SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches;
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this particular case, the Yandex mail server was the primary victim of these attacks. https://isc.sans.edu/diary/SSH%20Tunneling%20in%20Act…
…
continue reading

1
Citrixbleed 2, Hardware Hacking, and Failed Bans - PSW #882
2:06:05
2:06:05
Play later
Play later
Lists
Like
Liked
2:06:05This week in the security news: Citrixbleed 2 and so many failures Ruckus leads the way on how not to handle vulnerabilities When you have no egress Applocker bypass So you bought earbuds from TikTok More gadgets and the crazy radio Cheap drones and android apps Best Mario Kart controller ever VSCode: You're forked Bluetooth earbuds and vulnerabili…
…
continue reading

1
UL NO. 488: STANDARD EDITION | Google Granting Confusing Access to Gemini, A New Favorite Creator, Russia's new Autonomous Drones, Claude Code Madness and Neovim Config, and more...
30:11
30:11
Play later
Play later
Lists
Like
Liked
30:11UL NO. 488: STANDARD EDITION | Google Granting Confusing Access to Gemini, A New Favorite Creator, Russia's new Autonomous Drones, Claude Code Madness and Neovim Config, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclusive benefit…
…
continue reading
UK police make multiple arrests in the retail cyberattack case. French authorities arrest a Russian basketball player at the request of the U.S. A German court declares open season on Meta’s tracking pixels. The European Union unveils new rules to regulate artificial intelligence. London’s Iran International news confirms cyberattacks from Banished…
…
continue reading
Attempts at Governance - Every Monday & Thursday on The Kus!
…
continue reading

1
Lawfare Daily, Bonus Edition: Unpacking the July 7 Hearing for Kilmar Abrego Garcia
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02On July 8, Lawfare Editor-in-Chief Benjamin Wittes sat down for a bonus edition of Lawfare Live with Lawfare Senior Editors Anna Bower and Roger Parloff to discuss Kilmar Abrego Garcia's July 7 hearing in federal court in Greenbelt, Maryland. To receive ad-free podcasts, become a Lawfare Material Supporter at www.patreon.com/lawfare. You can also s…
…
continue reading

1
Lightspeed search built for devs (Interview)
1:38:30
1:38:30
Play later
Play later
Lists
Like
Liked
1:38:30We talk with Don MacKinnon, Co-founder and CTO of Searchcraft—a lightspeed search engine built in Rust. We dig into the future of search, how it blends vector embeddings with classic ranking, and what it takes to build developer-friendly, production-grade search from the ground up. Join the discussion Changelog++ members save 6 minutes on this epis…
…
continue reading

1
Scaling Laws: Ethan Mollick: Navigating the Uncertainty of AI Development
1:06:21
1:06:21
Play later
Play later
Lists
Like
Liked
1:06:21Ethan Mollick, Professor of Management and author of the “One Useful Thing” Substack, joins Kevin Frazier, the AI Innovation and Law Fellow at the University of Texas School of Law and a Senior Editor at Lawfare, and Alan Rozenshtein, Associate Professor at Minnesota Law and a Senior Editor at Lawfare, to analyze the latest research in AI adoption,…
…
continue reading

1
How Are 2025 Admin Predictions Holding Up So Far?
20:26
20:26
Play later
Play later
Lists
Like
Liked
20:26Today on the Salesforce Admins Podcast, we talk to Jennifer Lee, Joshua Birk, and Kate Lessard from the Admin Evangelist team at Salesforce. Join us as we revisit the team’s predictions from the beginning of the year for how Agentforce will change the game for admins in 2025. You should subscribe for the full episode, but here are a few takeaways f…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with a ton of follow-up—from a sextortio…
…
continue reading

1
SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches;
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20Development%3A%20Why%20and%20How./32092 Animation-Driven Tapjacking on Android Attackers can use a clic…
…
continue reading
In episode 425 of "Smashing Security", Graham reveals how "Call of Duty: WWII" has been weaponised - allowing hackers to hijack your entire PC during online matches, thanks to ancient code and Microsoft’s Game Pass. Meanwhile, Carole digs into a con targeting the recently incarcerated, with scammers impersonating bail bond agents to fleece desperat…
…
continue reading

1
When AI Looks First: How Agentic Systems Are Reshaping Cybersecurity Operations | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3
4:32
4:32
Play later
Play later
Lists
Like
Liked
4:32Before a power crew rolls out to check a transformer, sensors on the grid have often already flagged the problem. Before your smart dishwasher starts its cycle, it might wait for off-peak energy rates. And in the world of autonomous vehicles, lightweight systems constantly scan road conditions before a decision ever reaches the car’s central proces…
…
continue reading
Patch Tuesday. An Iranian ransomware group puts a premium on U.S. and Israeli targets. Batavia spyware targets Russia’s industrial sector. HHS fines a Texas Behavioral Health firm for failed risk analysis. The Anatsa banking trojan targets financial institutions in the U.S. and Canada. Hackers abuse a legitimate commercial evasion framework to pack…
…
continue reading

1
#178 Ted Neward, The Interview Industrial Complex, Part 2
36:16
36:16
Play later
Play later
Lists
Like
Liked
36:16Summary Ted Neward tells me about his job search that started in 2022. Part 2 of a 2 parter. Details Cover letters. The interviews, "elite code" - nothing to do with real programming jobs. Selling elite tests and tutorials, memorizing code. Showing that you can code, live coding. Ageism; cost of developers. Emotional aspects of the job search; much…
…
continue reading

1
Rational Security: The “Game Changers” Edition
1:15:30
1:15:30
Play later
Play later
Lists
Like
Liked
1:15:30This week, Scott sat down with fellow Senior Editors Molly Reynolds and Alan Rozenshtein to talk through the week’s big national security news, including: “One Bill to rule them all, One Bill to find them, One Bill to bring them all and in the darkness bind them.” Republicans in Congress narrowly enacted President Trump’s “One Big Beautiful Bill” l…
…
continue reading

1
298 - Understanding Azure Virtual Network Manager from an ALZ perspective with Jack Tracey
46:03
46:03
Play later
Play later
Lists
Like
Liked
46:03Today, we'll talk about AVNM, or Azure Virtual Network Manager, with insights from Microsoft's Jack Tracey. What is it, and why do you need it? We talk about mesh networks, routing, IP address management, AVNM with Azure Landing Zones, and more! (00:00) - Intro and catching up. (05:08) - Show content starts. Show links - What is AVNM? - Frequently …
…
continue reading

1
Jacob Salassi - Developer Empathy: A Thoughtful Approach to Product Security
1:03:24
1:03:24
Play later
Play later
Lists
Like
Liked
1:03:24Jacob Salassi, former Director of Product Security at Snowflake, joined this episode of The Security Champions Podcast to share insights from his experience leading security transformation at scale. This episode explores the role of empathy in driving security engagement and how security teams can better align with engineering workflows. Jacob disc…
…
continue reading

1
Building the World's Largest Threat Model Library
49:42
49:42
Play later
Play later
Lists
Like
Liked
49:42Today we’re joined by Petra Vukmirovic. Petra, is the head of information security at Numan and co-leader of the Threat Model Library Project. Petra shares her vision for creating a massive, structured dataset of crowdsourced threat models that could revolutionize how the cybersecurity community learns and shares threat modeling knowledge. We explo…
…
continue reading