Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Software Patch Podcasts

show episodes
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
  continue reading
 
Artwork
 
The Embedded Frontier, hosted by embedded systems expert Jacob Beningo, is a cutting-edge podcast dedicated to exploring the rapidly evolving world of embedded software and embedded system trends. Each episode delves into the latest technological advancements, industry standards, and innovative strategies that are shaping the future of embedded systems. Jacob Beningo, with his deep industry knowledge and experience, guides listeners through complex topics, making them accessible for both sea ...
  continue reading
 
Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
  continue reading
 
Artwork

1
Hacker Public Radio

Hacker Public Radio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Hacker Public Radio is an podcast that releases shows every weekday Monday through Friday. Our shows are produced by the community (you) and can be on any topic that are of interest to hackers and hobbyists.
  continue reading
 
Welcome to the Flexera Security Vulnerability Insight Podcast, your go-to source for all things related to cybersecurity, software vulnerabilities, and threat intelligence. In this engaging podcast series, we will dive deep into the ever-evolving world of digital security, providing you with valuable insights, expert interviews, and the latest industry trends. Hosted by Jeroen Braak and leading experts in the field, each episode explores critical topics such as: Vulnerability Management: Sta ...
  continue reading
 
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep ​network visibility to not only protect against sophisticated cyber- ...
  continue reading
 
Master the CompTIA Server+ exam with the Server+ Audio Course—your complete audio companion for learning server hardware, administration, security, storage, and troubleshooting. Each episode breaks down the official exam objectives into clear, practical lessons designed for listening and learning on the go. You’ll gain a deep understanding of physical and virtual server environments, network integration, performance monitoring, and disaster recovery planning—all explained in simple, direct l ...
  continue reading
 
The Natural Reward podcast will focus on questions of innovation, progress and advancement in the evolution of life. We will discuss the evolution of scientific theories, how to think critically about science, and questions of progress and advancement in technology and human culture. The Natural Reward podcast will cover the philosophy and history of science, evolutionary theory, and economic theory. Music by Christian Bjoerklund.
  continue reading
 
Loading …
show series
 
President signs defense bill funding Cyber Command, Pentagon phone security Iranian APT Infy resurfaces with new malware Massive Android botnet Kimwolf launches DDoS attack Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement an…
  continue reading
 
DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. Bu…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/gos-new-experimental-packages-what-to-know. This blog post is about Go 1.25’s new experimental encoding/json/v2 and encoding/json/jsontext packages, which bring long-awaited improvements and fixes. Check more stories related to programming at: https://hackernoon.com/c/prog…
  continue reading
 
Please enjoy this encore of Career Notes. Principal consultant and pen tester at Secureworks, Eric Escobar, shares his career path translating his childhood favorite Legos to civil engineering and pivoting to cybersecurity. Eric was always headed toward engineering and got both his bachelor and master degrees in civil engineering. Upon breaking int…
  continue reading
 
Darren Meyer, Security Research Advocate at Checkmarx, is sharing their work on "Bypassing AI Agent Defenses with Lies-in-the-Loop." Checkmarx Zero researchers introduce “lies-in-the-loop,” a new attack technique that bypasses human‑in‑the‑loop AI safety controls by deceiving users into approving dangerous actions that appear benign. Using examples…
  continue reading
 
Trump signs the National Defense Authorization Act for 2026. Danish intelligence officials accuse Russia of orchestrating cyberattacks against critical infrastructure. LongNosedGoblin targets government institutions across Southeast Asia and Japan. A new Android botnet infects nearly two million devices. WatchGuard patches its Firebox firewalls. Am…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-i-mastered-javascript-event-loop-and-concurrent-model. Discover practical tips for building responsive web applications without freezing the UI. Check more stories related to programming at: https://hackernoon.com/c/programming. You can also check exclusive content abo…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/i-got-15k-people-to-practice-sql-by-turning-them-into-detectives. See how SQL Case Files became a top choice for anyone searching for free SQL games or challenging SQL puzzles. Check more stories related to programming at: https://hackernoon.com/c/programming. You can also…
  continue reading
 
Recent Windows updates break RemoteApp connections France arrests threat actors for installing malware on Italian ferry Senate Intel chair urges safeguard against open-source software threats Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Security …
  continue reading
 
Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn t quite clean for ISC, but SSL2 and SSL3 systems have been cut down by about half. https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ra…
  continue reading
 
Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accu…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/how-astro-made-my-portfolio-82percent-faster-to-build. I moved my portfolio website from Next.js to Astro after three years. Faster builds, less JavaScript, better SEO, and a simpler setup that just works. Check more stories related to programming at: https://hackernoon.co…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/what-we-know-and-dont-about-modern-code-reviews. A deep review of modern code review research, its evolution, key themes, and the growing gap between academic findings and practitioner needs. Check more stories related to programming at: https://hackernoon.com/c/programmin…
  continue reading
 
FTC orders crypto to pay New exploit of React2Shell Ukraine-based fraud ring taken down Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. In deepfake scams, the tells aren't glitchy video anymore – it's behavior: "Do this right now," or "keep it secre…
  continue reading
 
Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit applications that do not have Next.js exposed. https://isc.sans.edu/diary/Maybe%20a%20Little%20Bit%20More%20Intere…
  continue reading
 
Researchers detail a years-long Russian state-sponsored cyber espionage campaign. Israel’s cyber chief warns against complacency. Vulnerabilities affect products from Fortinet and Hitachi Energy. Studies show AI models are rapidly improving at offensive cyber tasks. MITRE expands its D3FEND cybersecurity ontology to cover operational technology. Te…
  continue reading
 
From Spartan races to culinary arts, discover the hobbies and passions that keep CISOs balanced and inspired in this behind-the-scenes edition of Agent of Influence. Welcome to a special edition of the Agent of Influence podcast! In this episode, we step away from the usual cybersecurity deep dives to explore the personal side of security leaders, …
  continue reading
 
Rogue NuGet package steals data Venezuela's PDVSA suffers attack Patched Fortinet flaws exploited Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Picture a "new hire" who interviews well… except they're synthetic: AI video, AI voice, AI backstory. O…
  continue reading
 
Beyond RC4 for Windows authentication Microsoft outlined its transition plan to move away from RC4 for authentication and published guidance and tools to facilitate this change. https://www.microsoft.com/en-us/windows-server/blog/2025/12/03/beyond-rc4-for-windows-authentication FortiCloud SSO Login Vuln Exploited Arctic Wolf observed exploit attemp…
  continue reading
 
Venezuela’s state oil company blames a cyberattack on the U.S. An Iranian hacker group offers cash bounties for doxing Israelis. Germany’s lower house of parliament suffers a major email outage. South Korea’s e-commerce breach exposes personal information of nearly all of that nation’s adults. Researchers report active exploitation of two critical …
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/what-i-learned-from-giving-people-a-choice-in-ride-types. How I redesigned a ride-hailing order form for 360M users inside a 7-year-old monolith. Lessons on legacy code, user habits, and breaking production. Check more stories related to programming at: https://hackernoon.…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/the-api-first-illusion-why-your-simple-endpoints-turn-into-technical-debt-and-how-to-fix-it. Stop treating API design like a plumbing task. Use this system prompt to enforce Richardson Maturity Model Level 3 and build endpoints that actually scale. Check more stories relat…
  continue reading
 
US turns to private firms in cyber offensive Microsoft updates cause queuing failures Phishing campaign delivers Phantom stealer Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Attackers don't need malware anymore; they need trust. Tip: set a simple…
  continue reading
 
In this episode, host Kim Jones tacks a topic that is rapidly moving from theoretical to operational reality: quantum computing. While classical computing will remain the backbone of our systems for years to come, quantum technologies are advancing fast enough that CISOs must begin preparing today. Kim explores what quantum computing really means, …
  continue reading
 
More React2Shell Exploits CVE-2025-55182 Our honeypots continue to detect numerous React2Shell variants. Some using slightly modified exploits https://isc.sans.edu/diary/More%20React2Shell%20Exploits%20CVE-2025-55182/32572 The Fragile Lock: Novel Bypasses For SAML Authentication SAML is a tricky protocol to implement correctly, in particular if dif…
  continue reading
 
Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Andy Ellis, Principal, Duha, and Johna Till Johnson, CEO and Founder, Nemertes Research Thanks to our show sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. AI is rewriting the…
  continue reading
 
Apple and Google issue emergency updates to patch zero-days. Google links five additional Chinese state-backed hacking groups to “React2Shell.” France’s Ministry of the Interior was hit by a cyberattack. Atlassian patches roughly 30 third-party vulnerabilities. Microsoft says its December 2025 Patch Tuesday updates are breaking Message Queuing. Res…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/heres-how-you-can-build-a-fintech-approval-system-with-symfony-74. In this article, we will build a robust Multi-Signature Approval System for a FinTech application. Check more stories related to programming at: https://hackernoon.com/c/programming. You can also check excl…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/code-smell-316-the-syntax-police-review-anti-pattern. Syntax-focused code reviews hide architecture flaws, waste human attention, and lower quality. Automating style checks lets teams review what truly matters. Check more stories related to programming at: https://hackerno…
  continue reading
 
16TB MongoDB database exposes nearly 4.3 billion professional records Apple posts updates after discovery of WebKit flaws Coupang data breach traced to ex-employee Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Deepfakes aren't science fiction anym…
  continue reading
 
Abusing DLLs EntryPoint for the Fun DLLs will not just execute code when some of their functions are called, but also as they are loaded. https://isc.sans.edu/diary/Abusing%20DLLs%20EntryPoint%20for%20the%20Fun/32562 Apple Patches Everything: December 2025 Edition Apple released patches for all of its operating systems, fixing two already exploited…
  continue reading
 
This story was originally published on HackerNoon at: https://hackernoon.com/flight-recorder-a-new-go-execution-tracer. Flight recording is now available in Go 1.25, and it’s a powerful new tool in the Go diagnostics toolbox. Check more stories related to programming at: https://hackernoon.com/c/programming. You can also check exclusive content abo…
  continue reading
 
Please enjoy this encore of Career Notes. Chief security officer and chief information officer at Relativity, Amanda Fennell shares her story from archeology to cybersecurity. She shares the path that lead her towards becoming an archeologist and how it turned out not being exactly what she expected. She then shares how she got into the cyber busin…
  continue reading
 
Daniel Schwalbe, DomainTools Head of Investigations and CISO, is sharing their work on "Inside the Great Firewall." This two-part research project analyzes an extraordinary 500–600GB leak that exposes the internal architecture, tooling, and human ecosystem behind China’s Great Firewall. Across both parts, you break down thousands of leaked document…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play