Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Software Patch Podcasts
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
The Embedded Frontier, hosted by embedded systems expert Jacob Beningo, is a cutting-edge podcast dedicated to exploring the rapidly evolving world of embedded software and embedded system trends. Each episode delves into the latest technological advancements, industry standards, and innovative strategies that are shaping the future of embedded systems. Jacob Beningo, with his deep industry knowledge and experience, guides listeners through complex topics, making them accessible for both sea ...
…
continue reading
…
continue reading
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
…
continue reading
Learn the latest programming updates in the tech world.
…
continue reading
Interviews with end users and industry experts in, IT, AV and security about commercial technologies that can help institutions from enterprise to education to healthcare and beyond.
…
continue reading
Hacker Public Radio is an podcast that releases shows every weekday Monday through Friday. Our shows are produced by the community (you) and can be on any topic that are of interest to hackers and hobbyists.
…
continue reading
Welcome to the Flexera Security Vulnerability Insight Podcast, your go-to source for all things related to cybersecurity, software vulnerabilities, and threat intelligence. In this engaging podcast series, we will dive deep into the ever-evolving world of digital security, providing you with valuable insights, expert interviews, and the latest industry trends. Hosted by Jeroen Braak and leading experts in the field, each episode explores critical topics such as: Vulnerability Management: Sta ...
…
continue reading
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep network visibility to not only protect against sophisticated cyber- ...
…
continue reading
Master the CompTIA Server+ exam with the Server+ Audio Course—your complete audio companion for learning server hardware, administration, security, storage, and troubleshooting. Each episode breaks down the official exam objectives into clear, practical lessons designed for listening and learning on the go. You’ll gain a deep understanding of physical and virtual server environments, network integration, performance monitoring, and disaster recovery planning—all explained in simple, direct l ...
…
continue reading
The Natural Reward podcast will focus on questions of innovation, progress and advancement in the evolution of life. We will discuss the evolution of scientific theories, how to think critically about science, and questions of progress and advancement in technology and human culture. The Natural Reward podcast will cover the philosophy and history of science, evolutionary theory, and economic theory. Music by Christian Bjoerklund.
…
continue reading
1
President's cyber bill, Iranian APT resurfaces, Kimwold DDoS attack
7:20
7:20
Play later
Play later
Lists
Like
Liked
7:20President signs defense bill funding Cyber Command, Pentagon phone security Iranian APT Infy resurfaces with new malware Massive Android botnet Kimwolf launches DDoS attack Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement an…
…
continue reading
1
SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. Bu…
…
continue reading
1
Go's New Experimental Packages: What to Know
17:08
17:08
Play later
Play later
Lists
Like
Liked
17:08This story was originally published on HackerNoon at: https://hackernoon.com/gos-new-experimental-packages-what-to-know. This blog post is about Go 1.25’s new experimental encoding/json/v2 and encoding/json/jsontext packages, which bring long-awaited improvements and fixes. Check more stories related to programming at: https://hackernoon.com/c/prog…
…
continue reading
1
Eric Escobar: Collaboration is key. [Pen tester] [Career Notes]
8:42
8:42
Play later
Play later
Lists
Like
Liked
8:42Please enjoy this encore of Career Notes. Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking int…
…
continue reading
1
The lies that let AI run amok. [Research Saturday]
24:36
24:36
Play later
Play later
Lists
Like
Liked
24:36Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. Using examples…
…
continue reading
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Am…
…
continue reading
1
How I Mastered JavaScript Event Loop and Concurrent Model
2:02
2:02
Play later
Play later
Lists
Like
Liked
2:02This story was originally published on HackerNoon at: https://hackernoon.com/how-i-mastered-javascript-event-loop-and-concurrent-model. Discover practical tips for building responsive web applications without freezing the UI. Check more stories related to programming at: https://hackernoon.com/c/programming. You can also check exclusive content abo…
…
continue reading
1
I Got 15K People to Practice SQL by Turning Them Into Detectives
11:13
11:13
Play later
Play later
Lists
Like
Liked
11:13This story was originally published on HackerNoon at: https://hackernoon.com/i-got-15k-people-to-practice-sql-by-turning-them-into-detectives. See how SQL Case Files became a top choice for anyone searching for free SQL games or challenging SQL puzzles. Check more stories related to programming at: https://hackernoon.com/c/programming. You can also…
…
continue reading
1
Windows RemoteApp problems, ferry malware arrest, Senator's open-source warning
8:34
8:34
Play later
Play later
Lists
Like
Liked
8:34Recent Windows updates break RemoteApp connections France arrests threat actors for installing malware on Italian ferry Senate Intel chair urges safeguard against open-source software threats Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Security …
…
continue reading
1
SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs
4:37
4:37
Play later
Play later
Lists
Like
Liked
4:37Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn t quite clean for ISC, but SSL2 and SSL3 systems have been cut down by about half. https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ra…
…
continue reading
Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accu…
…
continue reading
1
How Astro Made My Portfolio 82% Faster to Build
7:05
7:05
Play later
Play later
Lists
Like
Liked
7:05This story was originally published on HackerNoon at: https://hackernoon.com/how-astro-made-my-portfolio-82percent-faster-to-build. I moved my portfolio website from Next.js to Astro after three years. Faster builds, less JavaScript, better SEO, and a simpler setup that just works. Check more stories related to programming at: https://hackernoon.co…
…
continue reading
1
What We Know (and Don’t) About Modern Code Reviews
15:13
15:13
Play later
Play later
Lists
Like
Liked
15:13This story was originally published on HackerNoon at: https://hackernoon.com/what-we-know-and-dont-about-modern-code-reviews. A deep review of modern code review research, its evolution, key themes, and the growing gap between academic findings and practitioner needs. Check more stories related to programming at: https://hackernoon.com/c/programmin…
…
continue reading
1
FTC orders crypto to pay, New exploit of React2Shell, Ukraine fraud ring take down
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27FTC orders crypto to pay New exploit of React2Shell Ukraine-based fraud ring taken down Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. In deepfake scams, the tells aren't glitchy video anymore – it's behavior: "Do this right now," or "keep it secre…
…
continue reading
1
SANS Stormcast Thursday, December 18th, 2025: More React2Shell; Donicwall and Cisco Patch; Updated Chrome Advisory
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit applications that do not have Next.js exposed. https://isc.sans.edu/diary/Maybe%20a%20Little%20Bit%20More%20Intere…
…
continue reading
Researchers detail a years-long Russian state-sponsored cyber espionage campaign. Israel’s cyber chief warns against complacency. Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. MITRE expands its D3FEND cybersecurity ontology to cover operational technology. Te…
…
continue reading
1
Episode 077 – What Security Leaders Do for Fun
15:59
15:59
Play later
Play later
Lists
Like
Liked
15:59From Spartan races to culinary arts, discover the hobbies and passions that keep CISOs balanced and inspired in this behind-the-scenes edition of Agent of Influence. Welcome to a special edition of the Agent of Influence podcast! In this episode, we step away from the usual cybersecurity deep dives to explore the personal side of security leaders, …
…
continue reading
1
Rogue NuGet package steals data, Venezuela's PDVSA suffers attack, patched Fortinet flaws exploited
7:45
7:45
Play later
Play later
Lists
Like
Liked
7:45Rogue NuGet package steals data Venezuela's PDVSA suffers attack Patched Fortinet flaws exploited Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Picture a "new hire" who interviews well… except they're synthetic: AI video, AI voice, AI backstory. O…
…
continue reading
1
SANS Stormcast Wednesday, December 17th, 2025: Beyond RC4; Forticloud SSO Vuln Exploited; FortiGate SSO Exploited;
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Beyond RC4 for Windows authentication Microsoft outlined its transition plan to move away from RC4 for authentication and published guidance and tools to facilitate this change. https://www.microsoft.com/en-us/windows-server/blog/2025/12/03/beyond-rc4-for-windows-authentication FortiCloud SSO Login Vuln Exploited Arctic Wolf observed exploit attemp…
…
continue reading
Venezuela’s state oil company blames a cyberattack on the U.S. An Iranian hacker group offers cash bounties for doxing Israelis. Germany’s lower house of parliament suffers a major email outage. South Korea’s e-commerce breach exposes personal information of nearly all of that nation’s adults. Researchers report active exploitation of two critical …
…
continue reading
1
What I Learned from Giving People a Choice in Ride Types
14:32
14:32
Play later
Play later
Lists
Like
Liked
14:32This story was originally published on HackerNoon at: https://hackernoon.com/what-i-learned-from-giving-people-a-choice-in-ride-types. How I redesigned a ride-hailing order form for 360M users inside a 7-year-old monolith. Lessons on legacy code, user habits, and breaking production. Check more stories related to programming at: https://hackernoon.…
…
continue reading
1
The "API First" Illusion: Why Your "Simple" Endpoints Turn Into Technical Debt (And How to Fix It)
4:13
4:13
Play later
Play later
Lists
Like
Liked
4:13This story was originally published on HackerNoon at: https://hackernoon.com/the-api-first-illusion-why-your-simple-endpoints-turn-into-technical-debt-and-how-to-fix-it. Stop treating API design like a plumbing task. Use this system prompt to enforce Richardson Maturity Model Level 3 and build endpoints that actually scale. Check more stories relat…
…
continue reading
1
US taps private firms in cyber offensive, Microsoft updates cause queuing failures, phishing campaign delivers Phantom Stealer
7:46
7:46
Play later
Play later
Lists
Like
Liked
7:46US turns to private firms in cyber offensive Microsoft updates cause queuing failures Phishing campaign delivers Phantom stealer Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Attackers don't need malware anymore; they need trust. Tip: set a simple…
…
continue reading
In this episode, host Kim Jones tacks a topic that is rapidly moving from theoretical to operational reality: quantum computing. While classical computing will remain the backbone of our systems for years to come, quantum technologies are advancing fast enough that CISOs must begin preparing today. Kim explores what quantum computing really means, …
…
continue reading
1
SANS Stormcast Tuesday, December 16th, 2025: Current React2Shell Example; SAML woes; MSMQ issues after patch;
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45More React2Shell Exploits CVE-2025-55182 Our honeypots continue to detect numerous React2Shell variants. Some using slightly modified exploits https://isc.sans.edu/diary/More%20React2Shell%20Exploits%20CVE-2025-55182/32572 The Fragile Lock: Novel Bypasses For SAML Authentication SAML is a tricky protocol to implement correctly, in particular if dif…
…
continue reading
1
Department of Know: MITRE's weaknesses list, DoD goes postquantum, Coupang fallout
34:02
34:02
Play later
Play later
Lists
Like
Liked
34:02Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Andy Ellis, Principal, Duha, and Johna Till Johnson, CEO and Founder, Nemertes Research Thanks to our show sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. AI is rewriting the…
…
continue reading
Apple and Google issue emergency updates to patch zero-days. Google links five additional Chinese state-backed hacking groups to “React2Shell.” France’s Ministry of the Interior was hit by a cyberattack. Atlassian patches roughly 30 third-party vulnerabilities. Microsoft says its December 2025 Patch Tuesday updates are breaking Message Queuing. Res…
…
continue reading
1
Here's How You Can Build a FinTech Approval System With Symfony 7.4
9:31
9:31
Play later
Play later
Lists
Like
Liked
9:31This story was originally published on HackerNoon at: https://hackernoon.com/heres-how-you-can-build-a-fintech-approval-system-with-symfony-74. In this article, we will build a robust Multi-Signature Approval System for a FinTech application. Check more stories related to programming at: https://hackernoon.com/c/programming. You can also check excl…
…
continue reading
1
Code Smell 316 - The Syntax Police Review Anti-Pattern
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53This story was originally published on HackerNoon at: https://hackernoon.com/code-smell-316-the-syntax-police-review-anti-pattern. Syntax-focused code reviews hide architecture flaws, waste human attention, and lower quality. Automating style checks lets teams review what truly matters. Check more stories related to programming at: https://hackerno…
…
continue reading
1
MongoDB records exposed, Apple WebKit patches, Coupang culprit identified
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:5416TB MongoDB database exposes nearly 4.3 billion professional records Apple posts updates after discovery of WebKit flaws Coupang data breach traced to ex-employee Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Deepfakes aren't science fiction anym…
…
continue reading
1
SANS Stormcast Monday, December 15th, 2025: DLL Entry Points; ClickFix and Finger; Apple Patches
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45Abusing DLLs EntryPoint for the Fun DLLs will not just execute code when some of their functions are called, but also as they are loaded. https://isc.sans.edu/diary/Abusing%20DLLs%20EntryPoint%20for%20the%20Fun/32562 Apple Patches Everything: December 2025 Edition Apple released patches for all of its operating systems, fixing two already exploited…
…
continue reading
1
Flight Recorder: A New Go Execution Tracer
10:07
10:07
Play later
Play later
Lists
Like
Liked
10:07This story was originally published on HackerNoon at: https://hackernoon.com/flight-recorder-a-new-go-execution-tracer. Flight recording is now available in Go 1.25, and it’s a powerful new tool in the Go diagnostics toolbox. Check more stories related to programming at: https://hackernoon.com/c/programming. You can also check exclusive content abo…
…
continue reading
1
Amanda Fennell: There's a cyber warrior in all of us [Information] [Career Notes]
9:33
9:33
Play later
Play later
Lists
Like
Liked
9:33Please enjoy this encore of Career Notes. Chief security officer and chief information officer at Relativity, Amanda Fennell shares her story from archeology to cybersecurity. She shares the path that lead her towards becoming an archeologist and how it turned out not being exactly what she expected. She then shares how she got into the cyber busin…
…
continue reading
1
Root access to the great firewall. [Research Saturday]
26:06
26:06
Play later
Play later
Lists
Like
Liked
26:06Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China’s Great Firewall. Across both parts, you break down thousands of leaked document…
…
continue reading