Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Hacker News Highlights Podcasts

show episodes
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Loading …
show series
 
This is a recap of the top 10 posts on Hacker News on Aug 23, 2025. (00:00) - Intro (00:21) - FFmpeg 8.0 (01:31) - Leaving Gmail for Mailbox.org (02:36) - The first Media over QUIC CDN: Cloudflare (03:50) - LabPlot: Free, open source and cross-platform Data Visualization and Analysis (05:04) - Nitro: A tiny but flexible init system and process supe…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love explores the complex dynamics of cybersecurity training with guests Michael Joyce and David Shipley. They discuss the importance of continuous awareness and the temporal decay of training effects. The conversation highlights the critical balance between training frequency and effectiveness, with…
  continue reading
 
Humans wiped out by 2040, Okta, Elastic, Bad Bots, Berserk Bear, Siemens, Philip K. Dick, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-505
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 22, 2025. (00:00) - Intro (00:23) - AWS CEO says using AI to replace junior staff is 'Dumbest thing I've ever heard' (01:37) - AI tooling must be disclosed for contributions (02:49) - DeepSeek-v3.1 (03:50) - Weaponizing image scaling against production AI systems (05:08) - Show HN: OS X Mave…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love covers a range of recent cybersecurity incidents. A major privacy failure has hit Elon Musk's Grok chatbot, exposing over 370,000 private conversations with sensitive information. Microsoft's recent security update has caused SSD and HDD failures, complicating data recovery. Hackers have exploit…
  continue reading
 
This segment is sponsored by Flashpoint. Visit https://securityweekly.com/flashpoint to learn more about them! Recent leaks tied to LockBit and Black Basta have exposed the inner workings of two of the most notorious ransomware groups—revealing their tactics, negotiation strategies, and operational infrastructure. For defenders, this rare window in…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 21, 2025. (00:00) - Intro (00:19) - Show HN: I was curious about spherical helix, ended up making this visualization (01:25) - Why are anime catgirls blocking my access to the Linux kernel? (02:43) - Zedless: Zed fork focused on privacy and being local-first (03:46) - Sequoia backs Zed (05:0…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 20, 2025. (00:00) - Intro (00:21) - How we exploited CodeRabbit: From simple PR to RCE and write access on 1M repos (01:40) - AGENTS.md – Open format for guiding coding agents (02:58) - Copilot broke audit logs, but Microsoft won't tell customers (04:15) - How to Draw a Space Invader (05:13)…
  continue reading
 
The industry is obsessed with vulnerabilities. From vulnerability assessment to vulnerability management to exposure management and even zero days, we love to talk about vulnerabilities. But what about misconfiguration? By definition it's a vulnerability or weakness, but it doesn't have a CVE (common vulnerability enumeration). Should we ignore it?…
  continue reading
 
In today's episode of 'Cybersecurity Today,' hosted by Jim Love, we cover several key issues in the cybersecurity landscape. Firstly, a breach involving Workday and social engineering attacks targeting Salesforce customers is discussed. Next, the risks posed by a recent Windows update potentially causing data corruption on SSDs and HDDs are highlig…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 19, 2025. (00:00) - Intro (00:18) - Anna's Archive: An Update from the Team (01:27) - Show HN: I built an app to block Shorts and Reels (02:32) - Obsidian Bases (03:38) - Show HN: Whispering – Open-source, local-first dictation you can trust (04:37) - FFmpeg Assembly Language Lessons (05:44)…
  continue reading
 
A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 18, 2025. (00:00) - Intro (00:20) - Claudia – Desktop companion for Claude code (01:29) - Show HN: NextDNS Adds "Bypass Age Verification" (02:40) - The Enterprise Experience (03:53) - ArchiveTeam has finished archiving all goo.gl short links (05:05) - Show HN: OverType – A Markdown WYSIWYG e…
  continue reading
 
Interview with Snehal Antani - Rethinking Risk-Based Vulnerability Management Vulnerability management is broken. Organizations basically use math to turn a crappy list into a slightly less crappy list, and the hardest part of the job as a CIO is deciding what NOT to fix. There has to be a better way, and there is... Segment Resources: https://hori…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley reports from Fredericton, New Brunswick, amidst severe forest fires. The main story covers a data breach in Canada’s House of Commons involving parliamentary employee information, attributed to a recent Microsoft vulnerability. The episode also discusses Fortinet’s recent high-severity vuln…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 17, 2025. (00:00) - Intro (00:19) - Compiler Bug Causes Compiler Bug: How a 12-Year-Old G++ Bug Took Down Solidity (01:36) - OpenBSD is so fast, I had to modify the program slightly to measure itself (02:44) - When the CIA got away with building a heart attack gun (03:47) - US F-16s lose out…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 16, 2025. Open hardware desktop 3D printing is dead? https://www.josefprusa.com/articles/open-hardware-in-3d-printing-is-dead/ https://news.ycombinator.com/item?id=44911423 Occult books digitized and put online by Amsterdam’s Ritman Library https://www.openculture.com/2025/08/2178-occult-boo…
  continue reading
 
In this episode of 'Cybersecurity Today,' the host welcomes Tammy Harper from Flair.io for an in-depth exploration into the ransomware ecosystem. Tammy, a seasoned threat intelligence researcher and certified dark web investigator, shines a light on the complex world of ransomware, its history, business models, and the various threat actor groups i…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 15, 2025. What's the strongest AI model you can train on a laptop in five minutes? https://www.seangoedecke.com/model-on-a-mbp/ https://news.ycombinator.com/item?id=44875848 Gemma 3 270M: Compact model for hyper-efficient AI https://developers.googleblog.com/en/introducing-gemma-3-270m/ http…
  continue reading
 
Cyber Crime Crackdown: $300 Million in Crypto Frozen, FBI Accounts Hacked, and Critical Microsoft Patches Released In this episode of Cybersecurity Today, host Jim Love covers major recent events in cybercrime and cybersecurity. Over $300 million in cryptocurrency tied to cybercrime has been frozen through coordinated efforts by the private sector …
  continue reading
 
We kick things off with a deep dive into the Hackberry PI and how to build one. Then in the security news: Will Perplexity buy Chrome? ESP32 Bus Pirates Poisoned telemetry Docker image security Fully Open Source Quantum Sensors Securing your car, Flippers, and show me the money Bringing your printer and desktop to Starbucks Paying a ransom? You nee…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 14, 2025. FFmpeg 8.0 adds Whisper support https://code.ffmpeg.org/FFmpeg/FFmpeg/commit/13ce36fef98a3f4e6d8360c24d6b8434cbb8869b https://news.ycombinator.com/item?id=44886647 Nginx introduces native support for ACME protocol https://blog.nginx.org/blog/native-support-for-acme-protocol https:/…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 13, 2025. Claude Sonnet 4 now supports 1M tokens of context https://www.anthropic.com/news/1m-context https://news.ycombinator.com/item?id=44878147 Show HN: Building a web search engine from scratch with 3B neural embeddings https://blog.wilsonl.in/search-engine/ https://news.ycombinator.com…
  continue reading
 
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Securit…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley covers critical security updates and vulnerabilities affecting Microsoft Exchange, Citrix NetScaler, and Fortinet SSL VPNs. With over 29,000 unpatched Exchange servers posing a risk for admin escalation and potential full domain compromise, urgent action is needed. Citrix Bleed 2 is activel…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 12, 2025. GitHub is no longer independent at Microsoft after CEO resignation https://www.theverge.com/news/757461/microsoft-github-thomas-dohmke-resignation-coreai-team-transition https://news.ycombinator.com/item?id=44865560 I tried every todo app and ended up with a .txt file https://www.a…
  continue reading
 
Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 11, 2025. Fight Chat Control https://fightchatcontrol.eu/ https://news.ycombinator.com/item?id=44856426 How I code with AI on a budget/free https://wuu73.org/blog/aiguide1.html https://news.ycombinator.com/item?id=44850913 Try and https://ygdp.yale.edu/phenomena/try-and https://news.ycombina…
  continue reading
 
Topic Segment - What's new at Black Hat? We're coming live from hacker summer camp 2025, so it seemed appropriate to share what we've seen and heard so far at this year's event. Adrian's on vacation, so this episode is featuring Jackie McGuire and Ayman Elsawah! News Segment Then, in the enterprise security news, Tons of funding! SentinelOne picks …
  continue reading
 
In today's episode of Cybersecurity Today, host David Shipley covers critical updates on recent cyber attacks and breaches impacting the US Federal judiciary's case management systems, and SonicWall firewall compromises. He also discusses researchers' new jailbreak method against GPT-5, which bypasses ethical guardrails to produce harmful instructi…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 9, 2025. Ultrathin business card runs a fluid simulation https://github.com/Nicholas-L-Johnson/flip-card https://news.ycombinator.com/item?id=44835879 I want everything local – Building my offline AI workspace https://instavm.io/blog/building-my-offline-ai-workspace https://news.ycombinator.…
  continue reading
 
Cybersecurity Today: July Review - Massive Lawsuits, AI Warnings, and Major Breaches In this episode of Cybersecurity Today: The Month in Review, host Jim Love and an expert panel, including David Shipley, Anton Levaja, and Tammy Harper, discuss the most significant cybersecurity stories from July. Key topics include the $380 million lawsuit betwee…
  continue reading
 
This week we have, SonicWall, Confidential Informants Exposed, Cisco Vishing, Perplexity vs robots.txt, Microsoft’s Project Ire, Meta–Flo Jury Verdict, GPT‑5 Lands, TeaOnHer Data Leak, Josh Marpet, and more on the Security Weekly News.. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 8, 2025. GPT-5 https://openai.com/gpt-5/ https://news.ycombinator.com/item?id=44826997 Vibechart https://www.vibechart.net/ https://news.ycombinator.com/item?id=44830684 GPT-5: Key characteristics, pricing and system card https://simonwillison.net/2025/Aug/7/gpt-5/ https://news.ycombinator.c…
  continue reading
 
In this episode, host Jim Love thanks listeners for their support of his book 'Elisa, A Tale of Quantum Kisses,' which is available for 99 cents on Kindle. The show then dives into pressing cybersecurity issues discussed at Black Hat USA, including vulnerabilities in AI assistants via prompt injection attacks, and critical flaws in Broadcom chips u…
  continue reading
 
Why should hate AI When firmware attacks The 300 second breach Old ways still work, AI might help And so begins the crawler wars Turn off your SonicWall VPN Your Pie may be wrapped in PII Attackers will find a way Signed kernel drivers D-Link on the KEV Rasperry PIs attack Stealthy LoRa LLM's don't commit code, people do Jame's Bond style rescue wi…
  continue reading
 
This is a recap of the top 10 posts on Hacker News on Aug 7, 2025. Claude Code IDE integration for Emacs https://github.com/manzaltu/claude-code-ide.el https://news.ycombinator.com/item?id=44811567 We replaced passwords with something worse https://blog.danielh.cc/blog/passwords https://news.ycombinator.com/item?id=44819917 Automerge 3.0 https://au…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play