Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Web Security Podcasts

show episodes
 
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
  continue reading
 
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
  continue reading
 
Artwork

1
BrakeSec Education Podcast

Bryan Brake, Amanda Berlin, and Brian Boettcher

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
  continue reading
 
The adventures of Matt Lawrence and Mike Karan through the world of web development, web design, and small business management. As web development agency owners for the better part of a decade, they’ve worked with all sorts of technologies, through the rise of responsive web design, the revolution of serverless computing, and the popularity gain of many no-code tools for small business owners. They commonly discuss foundational web development technologies like HTML, CSS, and JavaScript - in ...
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
  continue reading
 
Artwork
 
Tech Disruptors by Bloomberg Intelligence features conversations with thought leaders and management teams on disruptive trends. Topics covered in this series include cloud, e-commerce, cybersecurity, AI, 5G, streaming, advertising, EVs, automation, crypto, fintech, AR/VR, metaverse and Web 3.0. This podcast is intended for professional investors only. It is being prepared solely for informational purposes only and does not constitute an offer or investment advice.
  continue reading
 
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
  continue reading
 
Artwork

1
Impressive Hosting

Jesse Friedman

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Impressive Hosting is a podcast that explores the core tenets of great WordPress hosting, from performance and security to scalability and user experience. Hosted by Jesse Friedman of WP Cloud, each episode features in-depth conversations with industry experts, developers, and hosting professionals who share insights, best practices, and real-world challenges. Whether you’re managing enterprise-level WordPress infrastructure, optimizing hosting for higher education, or scaling for high-traff ...
  continue reading
 
Artwork

1
Security Breach

Eric Sorensen

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A weekly discussion of new developments and the latest cybersecurity threats, including ransomware, malware, phishing schemes, DDoS attacks and more, facing the U.S. industrial sector.
  continue reading
 
Artwork

1
Security Boulevard Chat

Security Boulevard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
  continue reading
 
Artwork

1
The Web Usability Podcast

Lucy Collins from Web Usability

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Join Lucy Collins, Director of Web Usability, as we explore what it takes to make the web a more accessible and enjoyable place for everyone. Whether you're a website owner, developer, or just a curious mind, we're here to share insights, tips, and stories that can help you improve the user experience of your digital world. Web Usability is an established User Experience (UX) agency. We are UX specialists. We provide inclusive UX research and advice to optimise your digital services. If you ...
  continue reading
 
From development and design to marketing and support, Under the Radar is all about independent app development. It's rarely longer than 30 minutes. Hosted by Marco Arment and David Smith.
  continue reading
 
Artwork
 
ConTejas Code is a podcast in the web engineering space that has deep dives on various topics between frontend engineering with React, TypeScript, Next.js, and backend engineering with Kafka, Postgres, and more. The series is a mix of long-form content and guest episodes with industry leaders in the web engineering space. From the podcast, listeners will take away actionable best practices that you can integrate into your workflows as well as valuable insights from prominent people in the in ...
  continue reading
 
Every week Wayne Scott from brings together a team of technology journalists from http://www.ITProPortal.com to discuss, share analysis and argue about the biggest Tech News stories of the past week. From enterprise and business technology, to tech start ups, consumer gadgets, office IT and mobile you can get informed here. Plus join us live at some of the many technology shows around the world like CeBit, IFA, Infosec, The Gadget Show and much more !
  continue reading
 
Artwork

51
Reality 2.0

Katherine Druckman and Doc Searls

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Join Privacy and Open Source advocates, Doc Searls and Katherine Druckman, as they navigate the new digital world, covering topics related to digital privacy, cybersecurity, digital identity, as well as Linux and open source and other current issues.
  continue reading
 
Artwork

1
AWS Executive Insights

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
The Executive Insights podcast, brought to you by AWS (Amazon Web Services), features peer-to-peer conversations between business executives on innovating for growth, building resiliency, and shaping the future of their organizations. Learn more at AWS Executive Insights and follow us on LinkedIn. For video versions of these and other conversations, subscribe to our YouTube playlist.
  continue reading
 
Artwork

1
JavaScript Jabber

Charles M Wood

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork

101
Everyday Heroes

Hayden Baillio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Welcome to Everyday Heroes, a podcast about the unsung heroes of the tech world. From the phone in your pocket to the world's most critical digital infrastructure, open-source software has a hand in it. These free technologies that shape our digital world wouldn't be anything without the Heroes that maintain them, promote them, and evolve them - these are their stories. Everyday Heroes is brought to you by HeroDevs.
  continue reading
 
Artwork
 
Sharing the work we do around the open web, information security and user privacy is an important role of Mozilla Security. The Mozilla Security Bytes podcast discuss various topics and technologies implemented in Firefox and other Mozilla products and initiatives.
  continue reading
 
Healthcare is complicated. Joe Gellatly and Amanda Hepper are here to help, guiding us through the biggest issues and updates in healthcare security and compliance. From HIPAA Risk Assessments to the dark web, learn what factors are affecting the security of healthcare information and how to protect your data. Tune in for news, advice, and more.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
This Week in Health Tech

Vik Patel and Guests

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This Week in Health Tech podcast is a health technology podcast. Podcast features Vik Patel, a health technology veteran and CEO of Tido Inc. (A Trusted Tech Partner for Healthcare Organizations) and industry experts. Our shows provide commentary, news, and perspective on the latest trends in health tech and features seasoned experienced industry experts. All of our shows are free. TWIHT is supported by advertising. We limit the number of ads on each show, and we only accept advertising from ...
  continue reading
 
Artwork
 
👋 Welcome to Bizionic Technology Pvt Ltd! We specialize in providing top-notch Hire Talent, Marketing, Technologies, Cloud Consulting Services, and Security Solutions. Don't forget to check out our podcast for valuable insights. Visit our website at https://www.bizionictech.com for more information. Let's innovate together! 💡 #BizionicTech #InnovateWithUs
  continue reading
 
Artwork
 
Welcome to DataNext Podcast, every week our CEO Zeeshan Baig talks about latest Tools and Technologies, shares his experience, Best practices on Cloud computing, Big data, DevOps, Security. Tips on work-life balance, Professional Career and much much more. Subscribe and stay up to date with what's Next in Enterprise IT.
  continue reading
 
Artwork

1
AWS Industrial Insights

Amazon Web Services

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Visionary leaders from industrial companies share their insights on technology, innovation, and leadership. This podcast is for industrial business leaders who are looking to make data-driven decisions and learn from those who have experienced similar challenges.
  continue reading
 
Artwork

1
WebInnovationX

Dr. Rachel Yager

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
WebInnovationX Web Innovation Center is a Global Think Tank in Digital Transformation of Businesses, the Study of the Social and Economic Impacts of the World Wide Web, and home to the World Wide Web Consortium W3C NY Metro Chapter. Join Our Thought Leaders at SymposiumX CertificationX AccelerationX. Meet the Experts and Get Inspired on Innovation Thought Leadership, Strategy, and Tactics. Powered by FortuneTimes Group.
  continue reading
 
Loading …
show series
 
In this episode, Matt and Mike dive deep into web app security by walking through a simple SaaS note-taking app and breaking down vulnerabilities at each layer—from frontend and backend to auth and hosting. With 16 billion credentials recently leaked and AI increasing attack complexity, even indie devs need to lock things down. They cover common se…
  continue reading
 
DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse s residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that Jesse runs. https://isc.sans.edu/diary/DSh…
  continue reading
 
SANS Stormcast Monday, July 14th, 2025: Web Honeypot Log Volume; Browser Extension Malware; RDP Forensics DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse’s residential honeypot, which has historica…
  continue reading
 
OCI Web Application Firewall is the top choice in this episode as Bizionic Tech compares it with AWS and Azure to determine what's best for Detroit’s cybersecurity needs. Tune in to explore why OCI WAF stands out for local enterprises—from performance and scalability to pricing and compliance. 🔒 Don’t miss this crucial insight—Listen now and secure…
  continue reading
 
Explorando la Dark Web: Ciberseguridad y Peligros Ocultos. Alberto Hill. Uruguay's Digital Divide: Navigating Cybersecurity Challenges and Legislative GapsUruguay, often recognized for its advancements in e-government and high internet connectivity, faces significant hurdles in the realm of cybersecurity and the legal prosecution of cybercrimes. De…
  continue reading
 
• Let's Encrypt drops its long-running email notifications. • Microsoft's new "Unexpected Restart Experience". • Microsoft's response to last year's massive CrowdStrike outage. • Windows 10's extended service updates will sort of be free. • Russia-sold iPhones MUST include the RuStore app. • Lyon, in France, says bye-bye to Windows. Hello to Linux.…
  continue reading
 
SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0Day+Vulnerablity+Exploited+CVE202553770+ToolShell/32122/ Veeam Voicemail Phishing Attackers appear to impersonate …
  continue reading
 
SANS Stormcast Monday July 21st, 2025: Sharepoint Exploited; Veeam Fake Voicemail Phish; Passkey Phishing Attack SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0D…
  continue reading
 
The Perils and Pleasures of Online Connection A Deep Dive into the "Romance Scams" Twitter Space: Navigating Digital Deception and Personal NarrativesOn September 3, 2022, a Twitter Space titled "Romance Scams" took place, running for over 10 hours. Hosted by Alberto Daniel Hill (@ADanielHill), with KingBurrito (@trombelise) as a co-host, the conve…
  continue reading
 
In the twitter space recording, a unique and vulnerable interaction unfolds, primarily between Alberto Daniel Hill, Rebel One, and Kim Burrito. The conversation shifts from general topics to a deeply personal "master class on seduction for men, dumb men," as Alberto humorously frames it, revealing his struggles with social interaction, particularly…
  continue reading
 
Twitter Spaces: Krypto POKER This Twitter Space recording, hosted by Alberto Daniel Hill, delves into a discussion about a project called "Kryptopoker" seeking support from members of the cybersecurity community. The conversation highlights various interactions, personal philosophies, and insights into the psychological profiles, credibility, and t…
  continue reading
 
The Digital Ghost: When Ethical Hacking Collides with Unprepared Justice The provided source details the compelling story of Alberto Daniel Hill, a highly skilled cybersecurity expert from Uruguay whose professional identity as a "gray hat" hacker—one who identifies vulnerabilities without explicit permission to prompt security improvements—led to …
  continue reading
 
The sources capture a dynamic group conversation covering a wide array of topics, beginning with a frustrating customer service experience with Capital One regarding a canceled credit card. The discussion then pivots to severe weather events, including tornadoes and snowstorms, and the specialized vehicles used for storm chasing. Participants share…
  continue reading
 
This survey report offers a comprehensive analysis of @ADanielHill's activity and ranking on X Spaces, comparing his metrics to other hosts to determine his position among them. The analysis indicates that @ADanielHill, also known as Alberto Hill, has an exceptionally high level of engagement, having hosted 1,924 X Spaces since 2021, co-hosted 207 …
  continue reading
 
This recording features an online session discussing cybersecurity in the digital age, hosted by Go54, a leading African hosting company. The primary speaker, Olu, a cyber security professional and co-founder of Cyber Security Education Initiative, offers strategies for protecting data and mitigating cyber threats across personal, business, and nat…
  continue reading
 
This report provides an exhaustive analysis of the role of Twitter (now X) and its live audio feature, Twitter Spaces, as a central platform for interaction, intelligence dissemination, and content creation within the global cybersecurity community. For years, the platform hosted a vibrant, self-organizing ecosystem known as "InfoSec Twitter," whic…
  continue reading
 
The provided document is a report focused on the intersection of Twitter and cybersecurity, specifically examining how Twitter Spaces contributes to this field. The title, "Twitter and Twitter Spaces for Cybersecurity Report.md," indicates it is likely a markdown file, suggesting it might be a technical or research-oriented document. Its purpose ap…
  continue reading
 
This comprehensive report, "Hack the Planet: A Definitive Report on the 20 Most Influential Hacker Films and TV Shows," examines the evolution of the hacker archetype in cinema and television, tracing their portrayal from curious pioneers to complex figures challenging reality. The authors evaluate each film and TV show using four key criteria: cin…
  continue reading
 
The source, an audio transcript, explores listener engagement with a podcast focusing on cyber security, privacy, and digital activism. By analyzing stream counts and episode topics from late 2019 to 2021, the hosts identify a significant surge in popularity starting in 2021. This growth was primarily driven by content related to hacking, privacy v…
  continue reading
 
This extended transcript captures a dynamic online discussion, primarily featuring a central host and several participants. The conversation spans various topics, initially focusing on technical issues with the hosting platform as participants are repeatedly removed or experience audio problems. This leads to a playful, yet somewhat frustrated, inv…
  continue reading
 
Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
  continue reading
 
SANS Stormcast Friday, July 18th, 2025: Extended File Attributes; Critical Cisco ISE Patch; VMWare Patches; Quarterly Oracle Patches Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick,…
  continue reading
 
Should we adopt Liquid Glass or stick with our existing designs? And if we do adopt it, how much should we redesign and rethink along the way? (tl;dr: yes; much.) This episode of Under the Radar is sponsored by: Porkbun: Get a .app or .dev domain for less than $6 for the year. Links and Show Notes: Support Under the Radar with a Relay Membership…
  continue reading
 
Roblox CEO Dave Baszucki said an immersive 3D co-experience is going to form the future foundation for how people communicate, connect, shop, learn and play together — even how they experience entertainment. Gaming has always been at the forefront of 3D communication. Baszucki joins Bloomberg Intelligence’s head of technology research, Mandeep Sing…
  continue reading
 
UL NO. 489: STANDARD EDITION | My personal toolchain updates, Google tracking through DuckDuckGo, Anthropic’s Pentagon Deal, Grok4 NSFW, Substack Crushes WSJ, and more... You are currently listening to the Standard version of the podcast, consider upgrading and becoming a member to unlock the full version and many other exclusive benefits here: htt…
  continue reading
 
More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112 Ongoing SonicWall Secure Mobile Access (SMA) Exploitation…
  continue reading
 
SANS Stormcast Thursday, July 17th, 2025: catbox.moe abuse; Sonicwall Attacks; Rendering Issues More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20F…
  continue reading
 
Youtube Video at: https://www.youtube.com/watch?v=yHPvGVfPgjI Jay Beale is a principal security consultant and CEO/CTO for InGuardians. He is the architect of multiple open source projects, including the Peirates attack tool for Kubernetes (in Kali Linux), the Bustakube CTF Kubernetes cluster, and Bastille Linux. Jay created and leads the Kubernete…
  continue reading
 
Twitter Spaces - Insights of a Cybersecurity Expert An In-Depth Look into a Twitter Space Hosted by Alberto Daniel Hill: Insights from a Recent Recording This article delves into a recording of a Twitter Space hosted by @ADanielHill, also known as Alberto Daniel Hill, a prominent cybersecurity professional from Montevideo, Uruguay. Known for their …
  continue reading
 
Documentation isn’t enough anymore. “Reasonable and appropriate” has always been HIPAA’s standard—but that standard is shifting. In this episode, we break down how OCR is interpreting those words today, where organizations are getting into trouble, and what it actually takes to meet expectations now. Learn more about Medcurity here: https://medcuri…
  continue reading
 
Hacking, Trust, and the Human Condition 1. Introduction: A Microcosm of the Modern World This briefing document synthesizes key themes, ideas, and facts from live Twitter Spaces, offering a unique, unfiltered glimpse into the complexities of our digital lives. These raw conversations, featuring a diverse mix of experts, activists, and everyday indi…
  continue reading
 
Jesse Friedman interviews Oliver Sild, founder of Patch Stack, about the confusion surrounding WordPress security responsibilities. They explore why hosting companies market security they can't fully control, how customers misunderstand their role in site maintenance, and Oliver's virtual patching solution that bridges the gap between infrastructur…
  continue reading
 
Intelligence, Innovation, and Human Understanding The sources are transcripts from audio conversations exploring diverse interpretations of truth and humanity's future. Participants discuss the nature of intelligence, distinguishing between memorization and the ability to recontextualize information, while also questioning the idolization of figure…
  continue reading
 
Shadow Ops: Unveiling Government Data Vulnerabilities These sources capture a **dynamic conversation** primarily between **Carl, Adam, and other participants** on a **Twitter Spaces session**, covering a wide array of **interconnected topics**. The discussion spans from **technical security concerns**, including **cyberattacks, vulnerabilities in g…
  continue reading
 
We all know what it’s like to be fired—but what about firing a client? In this week’s Web News, Matt and Mike explore what happens when a freelance relationship goes sour. Is it ever okay to walk away from a paying client? What if they’re disruptive, draining your time, or you’ve simply lost interest in their project? They break down when it’s appr…
  continue reading
 
Twitter Spaces Stories. Conversations on AI, Politics, and Society. Adam running for president. This podcast transcript features Adam, a presidential candidate, discussing his core values of honesty, truth, and power, while expressing his anti-corruption stance and desire to improve the country. He later engages in a mock interview with an AI, outl…
  continue reading
 
A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction t…
  continue reading
 
A glorious takedown of quantum factorization. Notepad++ signs its own code signing certificate. Dennis Taylor has Bobiverse Book 6 on his lap. Crypto/ATM machines flat out outlawed. Signal vs WhatsApp: Encryption in flight and at rest. A close look at browser fingerprinting metrics. Rewriting interpreters in memory-safe languages. An introduction t…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play