Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Software Podcasts
Technical interviews about software topics.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The State and Popular Culture
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Audio podcasts on software testing.
…
continue reading
Software Gone Wild by ipSpace.net
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
next generation web podcast
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
A podcast about web design and development.
…
continue reading
coffee => code
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
…
continue reading
Arrested DevOps is the podcast that helps you achieve understanding, develop good practices, and operate your team and organization for maximum DevOps awesomeness.
…
continue reading
Modern web development faces several challenges, particularly when building scalable, maintainable, and high-performance applications. As applications grow, managing complex user interfaces, and ensuring efficient data handling and modular code structures, becomes increasingly difficult. Angular is a TypeScript-based web framework developed by Goog…
…
continue reading

1
How AI is reshaping developer teams and the future of software development
31:19
31:19
Play later
Play later
Lists
Like
Liked
31:19In this two-part episode of Leaders of Code, Peter O’Connor, Director of Platform Engineering, welcomes Ryan J. Salva, Senior Director of Product at Google, Developer Experiences, for a deep dive into the future of software development. They explore how AI-assisted tools are reshaping the developer experience, going far beyond just writing code. Fr…
…
continue reading
It’s been over four years since I published the last Software Gone Wild episode. In the meantime, I spent most of my time developing an open-source labbing tool, so it should be no surprise that the first post-hiatus episode focused on a netlab use case: how Ethan Banks (of the PacketPushers fame) is using the tool to quickly check the technology d…
…
continue reading

1
SE Radio 685: Will Wilson on Deterministic Simulation Testing
1:01:14
1:01:14
Play later
Play later
Lists
Like
Liked
1:01:14In this episode, Will Wilson, CEO and co-founder of Antithesis, explores Deterministic Simulation Testing (DST) with host Sriram Panyam. Wilson was part of the pioneering team at FoundationDB that developed this revolutionary testing approach, which was later acquired by Apple in 2015. After seeing that even sophisticated organizations lacked robus…
…
continue reading
Mike Judge breaks down why he doesn’t believe the AI coding claims add up, the folks behind Cactoide create an open source alternative to Meetup / Eventbrite, Ryan Farley tells the story of how RSS beat Microsoft, Dominik Szymański ditched Docker for Podman (and thinks you should too), and Stripe announces a new layer 1 blockchain called Tempo. Vie…
…
continue reading

1
Waterfall Software Development Method (noun) [Word Notes]
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25Please enjoy this encore of Word Notes. A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-software-development Audio reference link: “Creating Video Games - Agile Software Development,” by Sara Verr…
…
continue reading

1
Episode 248: The Philosophy of Good Software Design (Part 2)
33:50
33:50
Play later
Play later
Lists
Like
Liked
33:50In this episode, Conor and Ben chat about the philosophy of good software design, TV shows, movies and more! Link to Episode 248 on Website Discuss this episode, leave a comment, or ask a question (on GitHub) Socials ADSP: The Podcast: Twitter Conor Hoekstra: Twitter | BlueSky | Mastodon Ben Deane: Twitter | BlueSky Show Notes Date Recorded: 2025-0…
…
continue reading
Building the Prusa Core One; Pwned Passwords Passes 16B Monthly Requests; Going Deeper Down the IoT Rabbit Hole https://www.troyhunt.com/weekly-update-469/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading

1
The Godfather of Zero Trust - A Discussion with John Kindervag
59:42
59:42
Play later
Play later
Lists
Like
Liked
59:42Inside Zero Trust: John Kindervag and the Evolution of Cybersecurity In this episode of Cybersecurity Today: Weekend Edition, host Jim Love speaks with John Kindervag, the pioneer behind the Zero Trust model of cybersecurity. With over 25 years of industry experience, John delves into how the concept originated from his early work with firewalls, a…
…
continue reading

1
Data leak without a click. [Research Saturday]
22:02
22:02
Play later
Play later
Lists
Like
Liked
22:02Today we are joined by Amanda Rousseau, Principal AI Security Researcher from Straiker, discussing their work on "The Silent Exfiltration: Zero‑Click Agentic AI Hack That Can Leak Your Google Drive with One Email." Straiker’s research found that enterprise AI agents can be silently manipulated to leak sensitive data, even without user clicks or ale…
…
continue reading

1
Week in Review: Qantas penalizes executives, UK cyberlegislation delayed, SonicWall VPN flaws
37:26
37:26
Play later
Play later
Lists
Like
Liked
37:26Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests Rob Teel, CTO, Oklahoma Department of Commerce and Howard Holton, CEO, GigaOm Thanks to our show sponsor, Vanta Do you know the status of your compliance controls right now? Like…right now? We know that real-time visibility is critic…
…
continue reading

1
Diella, Texas, Movie Rip Offs, WAF, AdaptixC2, Nano11, and More... - SWN #511
33:44
33:44
Play later
Play later
Lists
Like
Liked
33:44Diella, Texas, Movie Rip Offs, WAF, AdaptixC2, Nano11, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-511
…
continue reading
Samsung patches a critical Android zero-day vulnerability. Microsoft resolves a global Exchange Online outage. CISA reaffirms its commitment to the CVE program. California passes a bill requiring web browsers to let users automatically send opt-out signals. Apple issues spyware attack warnings. The FTC opens an investigation into AI chatbots on how…
…
continue reading

1
Everyone’s invited to the QA Party! – Ep 103
50:38
50:38
Play later
Play later
Lists
Like
Liked
50:38Show notes: Everyone’s invited to the QA Party! – Ep 103By Testing Podcast
…
continue reading

1
Episode 251: Sean Parent C++ Under the Sea Keynote Preview
21:42
21:42
Play later
Play later
Lists
Like
Liked
21:42In this episode, Conor and Bryce interview Sean Parent about his upcoming keynote at C++ Under the Sea! Link to Episode 251 on Website Discuss this episode, leave a comment, or ask a question (on GitHub) Socials ADSP: The Podcast: Twitter Conor Hoekstra: Twitter | BlueSky | Mastodon Bryce Adelstein Lelbach: Twitter About the Guest: Sean Parent is a…
…
continue reading

1
#188 Playing the Developer Job Search Game to Win in 2025 with Danny Thompson & Leon Noel
56:37
56:37
Play later
Play later
Lists
Like
Liked
56:37For this week's interview, we've got a special treat. I'm talking with two legends in the self-taught developer community. Danny Thompson worked for 10 years at a Tennessee gas station, frying chicken for people to eat, sometimes working 80 hour weeks just to provide for his family. And yet, Danny had ambition. He taught himself to code using freeC…
…
continue reading

1
SonicWall VPM exploits, Fed cyberchief’s priorities, U.S spyware investment triples
8:18
8:18
Play later
Play later
Lists
Like
Liked
8:18SonicWall SSL VPN flaws now being actively exploited Acting federal cyber chief outlines his priorities U.S. based investors in spyware firms nearly tripled in 2024 Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it…
…
continue reading
For decades, the U.S. has led the world in cyber innovation. But when it comes to resilience — the ability to withstand and recover from an attack — we’ve fallen dangerously behind. Anne Neuberger, former deputy national security adviser for cyber, explains how AI-powered “digital twins” could help us catch up — and maybe even get ahead. Learn abou…
…
continue reading
Cybersecurity Today: Microsoft Patches, Canadian Data Breach, NVIDIA's New Tool, and a Senator's Call for Investigation In this episode of Cybersecurity Today, host Jim Love discusses Microsoft's September patch update addressing 81 security flaws, including two zero-day vulnerabilities. Highlights include a data breach in Canada affecting email an…
…
continue reading

1
Planning to Arm mobile devices with chips that handle AI
32:36
32:36
Play later
Play later
Lists
Like
Liked
32:36Ryan welcomes Geraint North, AI and developer platforms fellow at Arm, to dive into the impact of GenAI on chip design, Arm’s approach to designing flexible CPU architectures, and the challenges of optimizing large language models at the chip level for edge devices. Episode notes: Arm is a global compute platform that allows the world’s leading tec…
…
continue reading

1
SANS Stormcast Friday, September 12th, 2025: DShield SIEM Update; Another Sonicwall Warning; Website Keystroke Logging
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38DShield SIEM Docker Updates Guy updated the DShield SIEM which graphically summarizes what is happening inside your honeypot. https://isc.sans.edu/diary/DShield%20SIEM%20Docker%20Updates/32276 Again: Sonicwall SSL VPN Compromises The Australian Government s Signals Directorate noted an increase in compromised Sonicwall devices. https://www.cyber.go…
…
continue reading
This week: Americans Can't Hack It Copy and paste to get malware Pixel 5 web servers - because you can How they got in and why security is hard Vulnerability management is failing - is it dead yet? Exploiting hacker tools Bluetooth spending spree! How to defend your car IoT security solutions and other such lies Exploiting IBM i (formerly AS/400) V…
…
continue reading
The House passes a defense policy bill that includes new provisions on cybersecurity and artificial intelligence. Senator Wyden accuses Microsoft of “gross cybersecurity negligence” after a 2024 ransomware attack crippled healthcare giant Ascension. The White House shelves plans to split U.S. Cyber Command and the NSA. The Pentagon finalizes its lo…
…
continue reading

1
Testing AI in the National Health Service (NHS)
42:02
42:02
Play later
Play later
Lists
Like
Liked
42:02The Testing Show Show notes: Testing AI in the National Health Service (NHS)By Testing Podcast
…
continue reading

1
The Pattern of Early Adoption of Security Tools
29:28
29:28
Play later
Play later
Lists
Like
Liked
29:28All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark, the producer of CISO Series, and Edward Contreras, senior evp and CISO, Frost Bank. Joining us is CISO Series reporter and CISO herself, Hadas Cassorla. In this episode: …
…
continue reading

1
npm update, Cursor Autorun flaw details, Microsoft probe over Ascension hack?
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03The npm incident: nothing to fret about? Cursor Autorun flaw lets repositories execute code without consent Senator Wyden urges FTC to probe Microsoft over Ascension hack Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but w…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are sharing the latest in social engineering scams, phishing schemes, and criminal …
…
continue reading

1
Evolving lessons in counterterrorism from 9/11 to 2025
57:47
57:47
Play later
Play later
Lists
Like
Liked
57:47How has the terrorism threat landscape evolved since 9/11, and what makes today’s challenges more complex? How is the counterterrorism response evolving in response to today’s rapidly shifting global landscape? How has Trump’s ‘America-First’ policy impacted the US’ relationship with the Five Eyes partners in the counterterrorism space? What can we…
…
continue reading

1
Visual Studio 2026 with Mads Kristensen
1:03:00
1:03:00
Play later
Play later
Lists
Like
Liked
1:03:00Ready for the next version of Visual Studio? Carl and Richard talk to Mads Kristensen about the long-awaited version of Visual Studio. Needless to say, artificial intelligence sits front and center. Mads talks about the deep integration of AI across the development lifecycle, including code completion, debugging, even natural language querying. The…
…
continue reading

1
SANS Stormcast Thursday, September 11th, 2025: BASE64 in DNS; Google Chrome, Ivantii and Sophos Patches; Apple Memory Integrity Feature
7:12
7:12
Play later
Play later
Lists
Like
Liked
7:12BASE64 Over DNS The base64 character set exceeds what is allowable in DNS. However, some implementations will work even with these invalid characters. https://isc.sans.edu/diary/BASE64%20Over%20DNS/32274 Google Chrome Update Google released an update for Google Chrome, addressing two vulnerabilities. One of the vulnerabilities is rated critical and…
…
continue reading
Patch Tuesday. A data leak sheds light on North Korean APT Kimsuky. Apple introduces Memory Integrity Enforcement. Ransomware payments have dropped sharply in the education sector in 2025. A top NCS official warns ICS security lags behind, and a senator calls U.S. cybersecurity a “hellscape”. A Ukrainian national faces federal charges and an $11 mi…
…
continue reading

1
Balancing Speed and Quality in the AI Era with Jim Trentadue
35:40
35:40
Play later
Play later
Lists
Like
Liked
35:40Show notes: Balancing Speed and Quality in the AI Era with Jim TrentadueBy Testing Podcast
…
continue reading

1
UL NO. 497: STANDARD EDITION | More NPM Shenanigans, I Open Sourced Kai, Blood Work Results, Finding Vulns in a 10-line Prompt, and more...
37:13
37:13
Play later
Play later
Lists
Like
Liked
37:13UL NO. 497: STANDARD EDITION | More NPM Shenanigans, I Open Sourced Kai, Blood Work Results, Finding Vulns in a 10-line Prompt, and more... Read this episode online: https://newsletter.danielmiessler.com/p/ul-497 Subscribe to the newsletter at: https://danielmiessler.com/subscribe Join the UL community at: https://danielmiessler.com/upgrade Follow …
…
continue reading

1
936: Realtime LED Wall With React + Websockets (I Let Strangers Control It)
47:12
47:12
Play later
Play later
Lists
Like
Liked
47:12Scott, Wes, and CJ dive into Wes’s Hackweek project: a real-time, web-controlled LED grid. They break down the hardware build, custom 3D-printed diffuser, ESP32 microcontroller, and Cloudflare durable objects powering live pixel art, GitHub activity displays, and interactive web drawings. Show Notes 00:00 Welcome to Syntax! 02:03 Wes’ Hackweek proj…
…
continue reading

1
DOP 315: Why Good Developers Spend More Time Designing Than Coding
34:35
34:35
Play later
Play later
Lists
Like
Liked
34:35#315: In this episode, the discussion centers around the critical importance of design over mere code writing in software development. The hosts reflect on their experience with coding tools like Cursor and Claude Code, noting their pros, cons, and the efficiency brought by AI in handling coding chores. They highlight the paradigm shift in develope…
…
continue reading

1
Forrester 2026 Budget Planning Guide and BlackHat 2025 Interviews - Jess Burn, Matt Muller, Danny Jenkins - BSW #412
1:11:11
1:11:11
Play later
Play later
Lists
Like
Liked
1:11:11With volatility now the norm, security and risk leaders need practical guidance on managing existing spending and new budgetary necessities. Where should they look? Jess Burn, Principal Analyst at Forrester Research, joins Business Security Weekly to discuss Forrester's Budget Planning Guide 2026: Security And Risk. This data-and-insights-driven re…
…
continue reading

1
Blood center attack details emerge, Electoral Commission recovers, Plex suffers password breach
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23Thousands had data leaked in blood center ransomware attack UK Electoral Commission recovers, 3 years after China hack Npm packages with 2 billion weekly downloads targeted in supply chain attack Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is cri…
…
continue reading

1
iCloud Calendar Invites Disguise New Phishing Campaigns
10:05
10:05
Play later
Play later
Lists
Like
Liked
10:05Phishing Scams, Leaked Stream Keys, Zero-Day Android Vulnerabilities, and Bounties on Russian Hackers In this episode of Cybersecurity Today, host Jim Love discusses several critical cybersecurity issues. Attackers are using iCloud calendar invites for phishing scams, leveraging Apple's system to bypass security checks. The US Department of Defense…
…
continue reading

1
Risky Business #806 -- Apple's Memory Integrity Enforcement is a big deal
51:42
51:42
Play later
Play later
Lists
Like
Liked
51:42On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Apple ruins exploit developers’ week with fresh memory corruption mitigations Feross Aboukhadijeh drops by to talk about the big, dumb npm supply chain attack Salesloft says its GitHub was the initial entry point for its compromise Sitecore says peop…
…
continue reading

1
SN 1042: Letters of Marque - 1.1.1.1 Certificate Snafu
2:56:10
2:56:10
Play later
Play later
Lists
Like
Liked
2:56:10Is the U.S. on the verge of legalizing "hack back" missions, turning private companies into sanctioned cyber warriors? Steve and Leo unpack Google's plan for a cyber disruption unit and why the lines between defense and digital retaliation are suddenly blurring. My experience with 'X' vs email. Google TIG blackmailed to fire two security researcher…
…
continue reading

1
SANS Stormcast Wednesday, September 10th, 2025: Microsoft Patch Tuesday;
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25Microsoft Patch Tuesday As part of its September patch Tuesday, Microsoft addressed 177 different vulnerabilities, 86 of which affect Microsoft products. None of the vulnerabilities has been exploited before today. Two of the vulnerabilities were already made public. Microsoft rates 13 of the vulnerabilities are critical. https://isc.sans.edu/diary…
…
continue reading

1
Hellhounds, Anthropic, iCloud, NPM, gitforked, notdoor, TOR, Signal, Josh Marpet - SWN #510
32:42
32:42
Play later
Play later
Lists
Like
Liked
32:42AI Hellhounds, Anthropic, iCloud, NPM, gitforked, notdoor, TOR, Signal, WhatsApp, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-510
…
continue reading
…
continue reading
The open source community heads off a major npm supply chain attack. The Treasury Department sanctions cyber scam centers in Myanmar and Cambodia. Scammers abuse iCloud Calendar invites to send callback phishing emails. Researchers discover a new malware variant exploiting exposed Docker APIs. Phishing attacks abuse the Axios user agent and Microso…
…
continue reading
Visual Studio 2026 is here. Mads takes us through the highlights View this podcast on YouTubeBy Jesse Liberty
…
continue reading

1
Tired of ISTQB? Take the STEC path! Ep 102
53:01
53:01
Play later
Play later
Lists
Like
Liked
53:01Show notes: Tired of ISTQB? Take the STEC path! Ep 102By Testing Podcast
…
continue reading

1
We All Agree That Prevention Is the Best Advice We're Never Going to Follow
44:27
44:27
Play later
Play later
Lists
Like
Liked
44:27All links and images can be found on CISO Series. This week’s episode is hosted by David Spark, producer of CISO Series and Andy Ellis, principal of Duha. Joining us is Jason Loomis, CISO, Freshworks. In this episode: Making organizations take their security medicine Building CISO support systems Holding the door for humans Underappreciated risks: …
…
continue reading