Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Tech Developments Podcasts
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
Technical interviews about software topics.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
A podcast about web design and development.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
The State and Popular Culture
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
next generation web podcast
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
On The Bike Shed, hosts Joël Quenneville and Stephanie Minn discuss development experiences and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Exploring the observability side of software development.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
We talk about everything to do with coding bootcamps and technology education, including gender parity, scholarships, and the latest industry news.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
Advice. Firsthand experiences. Inspiring conversations. Fresh perspectives. You’ll find it all on the SAFe Business Agility podcast—your connection to all things SAFe, and a lot more.
…
continue reading
Why do we make games? Every designer has a different and very personal answer to that question. Soren Johnson, founder of Mohawk Games, sits down with noted designers to find out by examining their careers as a whole.
…
continue reading
discussions on topics connected with software development; privacy, security, management, tools, techniques, skills, training, business, soft skills, health
…
continue reading
The Python Test Podcast hosted by Brian Okken
…
continue reading
The New Stack Podcast is all about the developers, software engineers and operations people who build at-scale architectures that change the way we develop and deploy software. For more content from The New Stack, subscribe on YouTube at: https://www.youtube.com/c/TheNewStack
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
…
continue reading
Join us in listening to the experienced experts discuss cutting edge challenges in the world of DevOps. From applying the mindset at your company, to career growth and leadership challenges within engineering teams, and avoiding the common antipatterns. Every episode you'll meet a new industry veteran guest with their own unique story.
…
continue reading
A podcast about the design, development, and business of great software. Each week thoughtbot is joined by the people who build and nurture the products we love.
…
continue reading

1
925: Scott & CJ’s Fave Productivity Apps & Web Apps
51:42
51:42
Play later
Play later
Lists
Like
Liked
51:42Scott and CJ go full productivity nerd, swapping notes on their favorite web apps for writing, coding, planning, and more. From terminals to to-do lists to dumb phones, it’s a deep dive into the tools powering their workflows. Show Notes 00:00 Welcome to Syntax! 00:35 Brought to you by Sentry.io. 01:56 Text to speech or speech to text. 02:20 Superw…
…
continue reading

1
Weekly Enterprise Security News and Tips on Building Security From Day 1 - Guillaume Ross - ESW #418
1:45:52
1:45:52
Play later
Play later
Lists
Like
Liked
1:45:52The Weekly Enterprise News (segments 1 and 2) This week, we’ve had to make some last minute adjustments, so we’re going to do the news first, split into two segments. This week, we’re discussing: Some interesting funding Two acquisitions - one picked up for $250M, the other slightly larger, at $25 BILLION Interesting new companies! On the 1 year an…
…
continue reading

1
676: The $200 Upgrade, CSS Module Scripts, and Social Media Ethos
1:00:07
1:00:07
Play later
Play later
Lists
Like
Liked
1:00:07Show Description It's time for a ShopTalk GearTalk segment on video and audio upgrades, a chat about better YouTube thumbnails, buying the $200 Yamaha guitar (or equivalent in other areas of life), Chris and Dave riff on CSS modules, and what's your social media ethos in 2025? Listen on Website → Links how to make a killer thumbnail (for the 2025 a…
…
continue reading

1
Ted Neward: Software Architecture - Episode 361
1:06:47
1:06:47
Play later
Play later
Lists
Like
Liked
1:06:47Ted Neward currently labors on behalf of Capital One as a Senior Distinguished Engineer, leveraging his speaking, writing, and coding experience to bring a technology-focused and -sharpened mindset to the mortgage industry. During his more code-focused years, he specialized in high-scale enterprise systems, working with clients ranging in size from…
…
continue reading

1
Akira’s SonicWall zero-day, UK Legal-Aid suffers, Luxembourg 5G attack
8:50
8:50
Play later
Play later
Lists
Like
Liked
8:50Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start y…
…
continue reading

1
Cybersecurity Today: Hamilton's Ransomware Crisis and Emerging AI and OAuth Threats
9:46
9:46
Play later
Play later
Lists
Like
Liked
9:46In this episode of 'Cybersecurity Today,' host David Chipley discusses several major security incidents and threats. Hamilton, Ontario faces a $5 million insurance denial following a ransomware attack due to incomplete deployment of Multi-Factor Authentication (MFA). The episode also highlights a severe vulnerability, CVE-2025-54135, in the AI-powe…
…
continue reading
Tea Spilled in Crazy Breach; Trying to Shake Me Down for $30k; The IoT Light Switch Saga Continues; Pi-hole Pwned; Sponsored by: Report URI https://www.troyhunt.com/weekly-update-463/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading

1
Hannah Kenney: Focused on people. [Risk] [Career Notes]
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16Please enjoy this encore of Career Notes. Manager in BARR Advisory's Cyber Risk Advisory Practice, Hannah Kenney, shares her journey from never considering technology as a career to having it click in an informations systems class in college. After noticing she was the only one in the room who enjoyed the lecture, Hannah knew she wanted to go down …
…
continue reading
Joey DeVilla of Tampa Tech fame and accordion playing glory joins Mike to discuss the Tampa Tech scene, some Python goodness, a little Rust and much more. Try Mailtrap for free Joey's Blog Mike on X Mike on BlueSky Coder on X Coder on BlueSky Show Discord AliceBy The Mad Botter
…
continue reading

1
nOAuth-ing to see here. [Research Saturday]
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59This week, we are joined by Eric Woodruff, Chief Identity Architect at Semperis, discussing "nOAuth Abuse Alert: Full Account Takeover of Entra Cross-Tenant SaaS Applications". Semperis researchers identified a critical authentication flaw known as nOAuth in 9 out of 104 tested SaaS applications integrated with Microsoft Entra ID. This low-complexi…
…
continue reading

1
Combating the Grandparent Scam: A Deep Dive into Cybersecurity and Law Enforcement Efforts
50:53
50:53
Play later
Play later
Lists
Like
Liked
50:53This episode explores the 'Grandparent Scam,' a prevalent and profitable fraud targeting seniors by exploiting their concern for their grandchildren. Experts Deirdre and John from Ireland's National Cybersecurity Center and the Ontario Provincial Police share insights into the scam's mechanics, the emotional impact on victims, and the challenges la…
…
continue reading

1
The Escobar Phone and Imaginary Flamethrowers
52:23
52:23
Play later
Play later
Lists
Like
Liked
52:23We unpack how a Swedish entrepreneur used Pablo Escobar’s name to sell fake phones, flamethrowers, and crypto — and how a viral scam built on influencer hype finally came crashing down. That and other stories. Hacked is brought to you by Push Security, check them out at PushSecurity.com Learn more about your ad choices. Visit podcastchoices.com/adc…
…
continue reading

1
Week in Review: Surveillance camera vulnerabilities, data sovereignty conundrum, French submarine cyberattack
30:47
30:47
Play later
Play later
Lists
Like
Liked
30:47Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Derek Fisher, Director of the Cyber Defense and Information Assurance Program, Temple University – also check out Derek’s substack. Thanks to our show sponsor, Dropzone AI Security teams everywhere are drowning in alerts. That’s why c…
…
continue reading

1
Pipes, Thorium, Excel, ATM Hillbilly Cannibal Attack, Lambdas, AIs, Aaran Leyland - SWN #499
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55Pipes, Thorium, Excel, Weird Ports, ATM Hillbilly Cannibal Attack, Lambdas, National Guard, AIs, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-499
…
continue reading

1
Pipes, Thorium, Excel, ATM Hillbilly Cannibal Attack, Lambdas, AIs, Aaran Leyland - SWN #499
35:55
35:55
Play later
Play later
Lists
Like
Liked
35:55Pipes, Thorium, Excel, Weird Ports, ATM Hillbilly Cannibal Attack, Lambdas, National Guard, AIs, Aaran Leyland, and More on this episode of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-499
…
continue reading
A critical vulnerability in SUSE [SOO-suh] Manager allows attackers to run commands with root privilege. A joint CISA and U.S. Coast Guard threat hunt at a critical infrastructure site reveals serious cybersecurity issues. Healthcare providers across the U.S. report recent data breaches. Cybercriminals infiltrate a bank by physically planting a Ras…
…
continue reading
Adam & Jerod (plus zero other randos) dig into Stack Overflow’s 2025 developer survey results. We discuss SO’s decline, the desire for younger devs to have real chats with real people, the rise of uv and more Python winning, why people are frustrated with AI, and more. Join the discussion Changelog++ members save 4 minutes on this episode because t…
…
continue reading

1
#184 Senior Playstation Engineer's tips for learning new tools and getting things done
1:24:13
1:24:13
Play later
Play later
Lists
Like
Liked
1:24:13On this week's episode of the podcast, freeCodeCamp founder Quincy Larson interviews Dilip Krishnamoorthi. He's a software engineer working at Sony, building user interfaces for Playstation game consoles where he's been for 10 years. We talk about: - How he dropped out of a traditional Indian university and used an inexpensive distance learning pro…
…
continue reading

1
ATM Raspberry Pi breach, Easterly West Point cancellation, Chinese company-hacker link
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53NATM network breached and attacked through 4G Raspberry Pi Easterly’s appointment to West Point rescinded Report links Chinese companies to tools used by state-sponsored hackers Huge thanks to our sponsor, Dropzone AI Security teams everywhere are drowning in alerts. That's why companies like Zapier and CBTS turned to Dropzone AI—the leader in auto…
…
continue reading
Australia wants to keep kids off social media. But to do that, it may have to crack open everyone’s digital ID. Privacy advocates say this isn’t just about protecting children– it is about rewriting the social contract for the rest of us. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
Cybersecurity Today: Supply Chain Attacks, St. Paul's Cyber Emergency, and Ingram Micro's Data Breach
12:41
12:41
Play later
Play later
Lists
Like
Liked
12:41In this episode, the host Jim Love discusses the increasing sophistication of supply chain attacks, starting with an account of a blockchain developer who lost $500,000 due to a malicious extension in a popular AI-powered coding tool. The episode also covers a significant cyber emergency in St. Paul, Minnesota, which required National Guard support…
…
continue reading

1
Soap Box: Why AI can't fix bad security products
37:11
37:11
Play later
Play later
Lists
Like
Liked
37:11In this Soap Box edition of the show Patrick Gray chats with the CEO of email security company Sublime Security, Josh Kamdjou. They talk about where AI is useful, where it isn’t, and why AI can’t save vendors from their bad product design choices. This episode is also available on Youtube. Show notes…
…
continue reading

1
Hacking Washing Machines - PSW #885
1:58:07
1:58:07
Play later
Play later
Lists
Like
Liked
1:58:07In the security news: Hacking washing machines, good clean fun! Hacking cars via Bluetooth More Bluetooth hacking with Breaktooth Making old vulnerabilities great again: exploiting abandoned hardware Clorox and Cognizant point fingers AI generated Linux malware Attacking Russian airports When user verification data leaks Turns out you CAN steal car…
…
continue reading

1
How is AlmaLinux OS is community-driven? with benny Vasquez
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14In this episode, Scott Hanselman sits down with Benny Vasquez, Chair of the AlmaLinux OS Foundation, to explore the project's journey since the shift away from CentOS. Benny shares insights into how AlmaLinux stays community-driven, transparent, and enterprise-ready—all while navigating the evolving world of open-source licensing. It's a candid and…
…
continue reading
A sweeping malware campaign by North Korea’s Lazarus Group targets open source ecosystems. President Trump announces a new electronic health records system. A new report reveals deep ties between Chinese state-sponsored hackers and Chinese tech companies. Researchers describe a new prompt injection threat targeting LLMs via browser extensions. Palo…
…
continue reading

1
Solving the AI energy crisis (Interview)
2:02:37
2:02:37
Play later
Play later
Lists
Like
Liked
2:02:37Greg Osuri, Founder and CEO of Akash Network joins us to share the backstory in his testimony before congress on the energy crisis and what it’s going to take to power the future of AI. From powering datacenters, to solar, decentralized AI compute, to zombies in SF. Join the discussion Changelog++ members get a bonus 2 minutes at the end of this ep…
…
continue reading
The rise of former CIA officers working as consultants to the film and TV business is one of the cultural... The post Subscribercast #100 – The Latest in the CIA and Hollywood first appeared on Spy Culture.By Tom Secker
…
continue reading

1
Typescript Is SO SLOW...Or Is It? with Mike Hartington
33:33
33:33
Play later
Play later
Lists
Like
Liked
33:33TypeScript might feel slow, but is it really? In this episode, Mike Hartington DevRel at Nx joins us fresh off his React Miami talk to unpack what actually causes TypeScript slowdowns in large monorepos, and how techniques like project references, workspaces, and precompiled DTS files can supercharge your dev experience. We also dig into the upcomi…
…
continue reading

1
FinOps: Holding engineering teams accountable for spend
55:07
55:07
Play later
Play later
Lists
Like
Liked
55:07In this episode of Adventures in DevOps, we dive into the world of FinOps, a concept that aims to apply the DevOps mindset to financial accountability. Yasmin Rajabi, Chief Strategy Officer at CloudBolt, joins us to demystify, as we acknowledge the critical challenge of bringing together financial accountability and engineering teams who often are …
…
continue reading

1
How Can AI Provide Useful Guidance from Fragmented Security Data?
29:42
29:42
Play later
Play later
Lists
Like
Liked
29:42All links and images can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week’s episode co-hosted by David Spark, the producer of CISO Series, and Steve Zalewski. Joining them is their sponsored guest, Matt Eberhart, CEO, Query. In this episode: Quality over quantity in AI decision-makin…
…
continue reading

1
Modal and Scaling AI Inference with Erik Bernhardsson
39:55
39:55
Play later
Play later
Lists
Like
Liked
39:55Modal is a serverless compute platform that’s specifically focused on AI workloads. The company’s goal is to enable AI teams to quickly spin up GPU-enabled containers, and rapidly iterate and autoscale. It was founded by Erik Bernhardsson who was previously at Spotify for 7 years where he built the music recommendation system and the popular Luigi …
…
continue reading

1
Oh No! Lenovo, French submarine data breach, Russian pharmacy cyberattack
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51Oh No! Lenovo You sunk my battleship! Or did you? Russians unable to get a taste of their own medicine Huge thanks to our sponsor, Dropzone AI Security teams everywhere are drowning in alerts. That's why companies like Zapier and CBTS turned to Dropzone AI—the leader in autonomous alert investigation. Their AI investigates everything, giving your a…
…
continue reading
The host of Giant Robots are back to impart some wisdom as they share some notable failures from their careers and the teachable moments that emerged from them. Discover what went wrong for Sami when he put his trust in AI, the survey that shifted the way Will thinks about others, Chad’s mistake with thoughtbot’s first major client and the lessons …
…
continue reading
In this special episode of Hacking Humans, while Joe and Maria take a well-earned summer break, we’re joined by a special guest host: Rob Allen, Chief Product Officer at ThreatLocker. Rob dives into the tactics and profile of the cybercriminal group known as Scattered Spider—a crew that’s gained notoriety for its cunning use of social engineering o…
…
continue reading
What are some of the key mechanisms for avoiding conflict? Why is ASEAN a key player in preventive diplomacy in the Indo-Pacific region? What challenges are faced in trying to prevent conflict in the region? And what role does Australia play? In this episode, Bec Strating, Huong Le Thu and Collin Koh delve into the complexities of conflict preventi…
…
continue reading

1
The innovation, leadership, and team agility inside U.S. Bank’s cloud journey
35:19
35:19
Play later
Play later
Lists
Like
Liked
35:19U.S. Bank has undergone a significant digital transformation, implementing a multi-cloud strategy to accelerate innovation and improve customer-focused development. Operating in a highly regulated environment, the bank must navigate the challenge of balancing innovation with strict compliance requirements while meeting the evolving demands and need…
…
continue reading
How can event sourcing help your applications? Carl and Richard speak with Hannes Lowette about his work in helping developers utilize event sourcing patterns to build scalable applications. Hannes discusses moving away from the old habit of decomposing data from objects into rows, columns, and tables, as there's no reason to save that disk space a…
…
continue reading
Officials in St. Paul, Minnesota declare a state of emergency following a cyberattack. Hackers disrupt a major French telecom. A power outage causes widespread service disruptions for cloud provider Linode. Researchers reveal a critical authentication bypass flaw in an AI-driven app development platform. A new study shows AI training data is chock …
…
continue reading
In this episode, host Brian Okken and guest Adam Johnson explore essential Git features, highlighted by Adam's updated book, "Boost Your Git DX." Key topics include "cherry picking" for selective commits "git stash" for managing in-progress work "git diff", and specifically its `--name-only` flag, which provides a streamlined method for developers …
…
continue reading
Wes and Scott talk about local-first sync engines—why they matter, what makes apps feel fast, and which platforms stand out. From LiveStore to Convex to Instant DB, they break down the pros and cons of each and debate what the “next React” might look like in a local-first future. Show Notes 00:00 Welcome to Syntax! 01:52 Intro to local data: what m…
…
continue reading

1
DOP 309: Using AI Agents in Daily Development Tasks
29:40
29:40
Play later
Play later
Lists
Like
Liked
29:40#309: In this episode, Darin and Viktor discuss their personal experiences and insights related to the rapid advancements in AI technology, particularly focused on AI agents like GitHub Copilot, Cursor, and Claude Code. They examine the paradigm shift in development practices due to these technologies, providing a critical evaluation of their effec…
…
continue reading

1
Aligning Security Objectives, Ditch the Ego, Lead for Real and Succeed - BSW #406
29:45
29:45
Play later
Play later
Lists
Like
Liked
29:45In the leadership and communications section, The CISO code of conduct: Ditch the ego, lead for real, The books shaping today’s cybersecurity leaders, How to Succeed in Your Career When Change Is a Constant, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-406…
…
continue reading

1
Telecom Orange hacked, $2.4M Bitcoin seized from Chaos, Scattered Spider’s tactics evolve
6:43
6:43
Play later
Play later
Lists
Like
Liked
6:43Critical Authentication Flaw Identified in Base44 Vibe Coding Platform French telecom giant Orange discloses cyberattack FBI seizes $2.4M in Bitcoin from new Chaos ransomware operation Huge thanks to our sponsor, Dropzone AI What if your SOC could investigate every single alert without burning out your team? That's exactly what Dropzone AI does. Th…
…
continue reading

1
Cybersecurity Today: Major Data Leaks, Airline Disruptions, Malware in Games, and AI Bypasses Captchas
9:49
9:49
Play later
Play later
Lists
Like
Liked
9:49In this episode of 'Cybersecurity Today,' host Jim Love covers several significant cybersecurity incidents. Hackers disrupt all Aeroflot flights, causing massive delays in Russia. The women-only dating app 'Tea' faces a second serious data leak, exposing 1.1 million private messages. A game on Steam named 'Camia' is found to contain three types of …
…
continue reading

1
Risky Business #800 — The SharePoint bug may have leaked from Microsoft MAPP
53:37
53:37
Play later
Play later
Lists
Like
Liked
53:37On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: Did the SharePoint bug leak out of the Microsoft MAPP program? Expel retracts its FIDO bypass writeup The mess surrounding the women-only dating-safety app Tea gets worse Broadcom customers struggle to get patches for VMWare hypervisor escapes Aeroflot gets hac…
…
continue reading

1
SN 1036: Inside the SharePoint 0-day - Is Our Data Safe Anywhere?
2:58:21
2:58:21
Play later
Play later
Lists
Like
Liked
2:58:21Brave randomizes its fingerprints. The next Brave will block Microsoft Recall by default. Clorox sues its IT provider for $380 million in damages. 6-month Win10 ESU offers are beginning to appear. Warfare has significantly become cyber. Allianz Life loses control of 125 million customers' data. The CIA's Acquisition Research Center website was hack…
…
continue reading