Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
Learn from the superstars turning content into cash! From social media influencers to small local businesses, people everywhere are harnessing the power of creative tools to design not just brands and content, but also deeply satisfying careers. In the Making explores the practical challenges and surprising rewards of working in this new creator economy. Join Adobe’s Teresa Au for conversations with content creators, solopreneurs, and industry experts who offer inspiration and insight for co ...
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Technical interviews about software topics.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
A podcast about web design and development.
…
continue reading
Become the best software developer you can be
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
1
Software Engineering Radio - the podcast for professional software developers
se-radio@computer.org
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
Technical interviews about software topics.
…
continue reading
A podcast featuring panelists of engineers from Netflix, Twitch, & Atlassian talking over drinks about all things software engineering.
…
continue reading
Daily update on current cyber security threats
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
…
continue reading
A podcast about modern UI development on the web. Hosted by Sam Selikoff and Ryan Toronto.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
The State and Popular Culture
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading
Level up your .NET skills with our weekly discussion of C# and other Microsoft technologies for developers. Become a supporter of this podcast: https://www.spreaker.com/podcast/adventures-in-net--6102015/support.
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Troubleshooting Agile is a problem-solving session for agile teams. Jeffrey Fredrick and Douglas Squirrel look at common problems agile teams face and provide practical, immediately useful advice for getting back on track.
…
continue reading
next generation web podcast
…
continue reading
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
…
continue reading
1
ANTHOLOGY – Self-hosted, self-confident & self-employed (Friends)
1:27:11
1:27:11
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:27:11
We take you one last time back to the All Things Open 2024 hallway track to talk with some friends, new & old. We speak with Alex Kretzchmar about self-hosting. We speak with Israa Taha about self-confidence. We speak with Avindra Fernando & Adhithi Ravichandran about self-employment. Join the discussion Changelog++ members save 12 minutes on this …
…
continue reading
1
SE Radio 641: Catherine Nelson on Machine Learning in Data Science
48:19
48:19
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
48:19
Catherine Nelson, author of the new O’Reilly book, Software Engineering for Data Scientists, discusses the collaboration between data scientists and software engineers -- an increasingly common pairing on machine learning and AI projects. Host Philip Winston speaks with Nelson about the role of a data scientist, the difference between running exper…
…
continue reading
1
A firewall wake up call. [Research Saturday]
23:01
23:01
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
23:01
Enjoy this special encore episode, where we are joined by Jon Williams from Bishop Fox, as he is sharing their research on "It’s 2024 and Over 178,000 SonicWall Firewalls are Publicly Exploitable." SonicWall published advisories for CVE-2022-22274 and CVE-2023-0656 a year apart after finding that NGFW series 6 and 7 devices are affected by two unau…
…
continue reading
The HIBP Table Storage Rollover; Automagic SQL Scaling; The Week in Breaches: Stalker Online, Z-lib, Altenen, Dennis Kirk, Earth 2; Sponsored by Report URI https://www.troyhunt.com/weekly-update-425/ See omnystudio.com/listener for privacy information.Oleh Troy Hunt
…
continue reading
1
Mozilla's GenAI Bug Bounty And Education Program - Serious Exploits: Interview With Marco Figueroa, GenAI Bug Bounty Program Manager for Mozilla's ODIN Project. Cyber Security Today Weekend for Nov 9 ...
38:24
38:24
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
38:24
Jailbreaking AI: Behind the Guardrails with Mozilla's Marco Figueroa In this episode of 'Cyber Security Today,' host Jim Love talks with Marco Figueroa, the Gen AI Bug Bounty Program Manager for Mozilla's ODIN project. They explore the challenges and methods of bypassing guardrails in large language models like ChatGPT. Discussion points include ja…
…
continue reading
1
Week in Review: Sophos Chinese hacker warning, AI flaws and vulnerabilities
29:21
29:21
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
29:21
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Ken Athanasiou, CISO, VF Corporation Thanks to our show sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire Aut…
…
continue reading
CISA issues a warning about a critical security flaw in Palo Alto Networks’ Expedition tool. A federal agency urges employees to limit phone use in response to Chinese hacking. Law enforcement is perplexed by spontaneously rebooting iPhones. A key supplier for oilfields suffers a ransomware attack. Hewlett Packard Enterprise (HPE) patches multiple …
…
continue reading
1
845: Are companies hiring? State of the dev job market with Taylor Desseyn
57:05
57:05
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
57:05
Scott and Wes talk with Taylor Desseyn about the shifting developer job market. Taylor shares practical tips for standing out, building genuine connections, and finding opportunities in a competitive hiring landscape. Show Notes 00:00 Welcome to Syntax! 01:38 Meet Taylor Desseyn 03:51 Is the dev job market as bad as it seems? 06:47 How to stand out…
…
continue reading
1
Episode 207: 🇳🇱 C++ Under the Sea Live 🇳🇱 Mateusz Pusz, Floris Bob & More!
29:43
29:43
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
29:43
In this episode, Conor and Bryce record live from C++ Under the Sea and chat with Mateusz Pusz, Inbal Levi, Floris Bob van Elzelingen and Jonathan Müller. Link to Episode 207 on Website Discuss this episode, leave a comment, or ask a question (on GitHub) Twitter ADSP: The Podcast Conor Hoekstra Bryce Adelstein Lelbach Guests Interviewed Mateusz Pus…
…
continue reading
1
181. A hacker’s final frontier — Space
23:29
23:29
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
23:29
Recently, a lot of smart people who work on space problems gathered at the Value of Space Summit in Colorado Springs and talked to us about the things that keep them up at night. At the top of their list? Earthlings hacking satellites and speeding bits of space junk.Oleh Recorded Future News
…
continue reading
1
Interlock targets healthcare, Canada dissolves TikTok, HP critical flaws
7:33
7:33
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:33
Interlock ransomware gang aims at U.S. healthcare, IT and government Canada tells TikTok to dissolve its Canadian business Hewlett Packard warns of critical RCE flaws in Aruba Networking software Thanks to today's episode sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on man…
…
continue reading
1
Canada Orders TikTok To Close Operations: Cyber Security Today for Friday, November 8th, 2024
6:25
6:25
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
6:25
FBI Warnings, TikTok's Canadian Shutdown, Major Data Breach Arrests & More | Cybersecurity Today In this episode of Cybersecurity Today, host Jim Love highlights the FBI's warning about growing phishing attacks exploiting government email credentials, leading to potential data theft and ransomware attacks. The Canadian government orders TikTok to s…
…
continue reading
1
Episode 492: Aran Khanna on Cloud Insurance
50:40
50:40
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
50:40
Brandon interviews Aran Khanna, CEO of Archera, on user privacy, his work on DeepLens at AWS, and Archera’s "cloud insurance" model. Plus, Aran shares how he lost his Facebook internship before it started. Show Links Why it's not your fault that you're sharing too much online Get started with Archera Archera.ai Contact Aran LinkedIn: Aran Khanna Tw…
…
continue reading
1
One of the world’s biggest web scrapers has some thoughts on data ownership
34:02
34:02
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
34:02
Or Lenchner is the CEO of Bright Data, a web data platform that offers ready-made datasets, proxy networks, and AI-powered web scrapers. Developers can get started with their docs here. ICYMI, read our blog post about the knowledge-as-a-service business model and how it will guide the future of our paid platform. AI answers alone aren’t knowledge. …
…
continue reading
1
ISC StormCast for Friday, November 8th, 2024
5:51
5:51
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
5:51
Steam Account Checker Poisoned with Infostealer https://isc.sans.edu/diary/Steam%20Account%20Checker%20Poisoned%20with%20Infostealer/31420 Cisco Ultra Reliable Wireless Backhaul Vulnerability https://www.cisco.com/site/us/en/products/networking/industrial-wireless/ultra-reliable-wireless-backhaul/index.html Breaking Down Multipart Parsers: File upl…
…
continue reading
Canada orders ByteDance to shut down local operations. Cisco releases urgent patches for multiple vulnerabilities. SteelFox malware delivers a crypto-miner and info-stealer. North Korean campaigns pursue fake jobs and remote workers. A suspected cyber intrusion disrupts Washington state court systems. Over 200,000 customers of SelectBlinds have the…
…
continue reading
1
Putting AI into Production with Fireworks AI's Lin Qiao
34:21
34:21
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
34:21
In this episode Scott sit's down with Lin Qiao, the visionary CEO of Fireworks AI - and former head of PyTorch at Meta - to explore the journey of putting AI into production and how Fireworks can make that possible. Lin shares her insights on the challenges and triumphs of transforming AI from research to powerful real-world applications. https://f…
…
continue reading
How using a copy-on-write filesystem like ZFS can get systems back online within seconds after ransomeware encrypts all your data, and even warn you more quickly that it’s happening. Plus Jim and Allan’s advice on getting a job as a sysadmin. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes Klara: 5 Reasons Why Y…
…
continue reading
1
How Platformatic is simplifying Node.js app management with Matteo Collina and Luca Maraschi
35:00
35:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
35:00
Matteo Collina and Luca Maraschi join the podcast to talk about Platformatic. Learn about Platformatics’ incredible 4.3 million dollar seed round, its robust features and modular approach, and how it addresses the unique challenges faced by devs and enterprises. Links https://platformatic.dev/docs/getting-started/quick-start-watt Matteo Collina: ht…
…
continue reading
1
How Are New SEC Rules Impacting CISOs?
34:32
34:32
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
34:32
All links and images for this episode can be found on CISO Series. Check out these posts for the discussion that is the basis of our conversation on this week’s episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Steve Zalewski. Joining us is Allan Cockriel, group CISO, Shell. In this episode: Striking a balance Will we…
…
continue reading
1
Factorio with Michal Kovařík
1:20:48
1:20:48
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:20:48
Factorio is a construction and management simulation game focused on resource-gathering with real-time strategy and survival elements. The player survives by locating and harvesting resources to craft various tools and machines, which in turn create more advanced materials that allow for the progression to more sophisticated technologies. The game …
…
continue reading
1
Factorio with Michal Kovařík
1:20:48
1:20:48
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:20:48
Factorio is a construction and management simulation game focused on resource-gathering with real-time strategy and survival elements. The player survives by locating and harvesting resources to craft various tools and machines, which in turn create more advanced materials that allow for the progression to more sophisticated technologies. The game …
…
continue reading
1
Nokia investigates breach claims, Nigerian cybercrime bust, SelectBlinds e-skimmer breach
7:42
7:42
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
7:42
Nokia says it has no evidence that hackers breached company data Nigerian cybercrime bust arrests 130 people 200,000 SelectBlinds customers impacted by e-skimmer Thanks to today's episode sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Q…
…
continue reading
This week, we are joined by Brad Auerbach from Outside GC, who is talking about their research on "Trailblazing Tennessee Legislation – the ELVIS Act." Ben has the story of parents suing over a bad grade their kid got after using AI. Dave looks at bias in AI evaluations of resumés. While this show covers legal topics, and Ben is a lawyer, the views…
…
continue reading
Maria Varmazis, host of N2K's daily space show T-Minus, joins Dave and Joe to share the story of the five types of social engineers Deanne Lewis encountered while tending bar, revealing how each barroom personality reflects a common cybersecurity threat. Our hosts share some follow-up from a friend of the show, JJ, who reports a rise in tech suppor…
…
continue reading
1
Balancing Coupling in Software Design with Vlad Khononov
50:00
50:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
50:00
How do you balance the coupling in your application? Carl and Richard talk to Vlad Khononov about his book on Balancing Coupling in Software Design. Vlad talks about three aspects of coupling - information, distance, and volatility. When these aspects are out of balance, such as a pair of services that are distant from each other but highly depende…
…
continue reading
1
ISC StormCast for Thursday, November 7th, 2024
4:38
4:38
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
4:38
Insights from August Web Traffic Surge https://isc.sans.edu/forums/diary/%5BGuest%20Diary%5D%20Insights%20from%20August%20Web%20Traffic%20Surge/31408/ Talkative Air Fryer https://www.which.co.uk/policy-and-insight/article/why-is-my-air-fryer-spying-on-me-which-reveals-the-smart-devices-gathering-your-data-and-where-they-send-it-a9Fa24K6gY1c Pygmy G…
…
continue reading
1
ANTHOLOGY — Packages, pledges & protocols (Interview)
1:45:36
1:45:36
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:45:36
The hallway track at All Things Open 2024 — features Carl George, Principal Software Engineer at Red Hat for a discussion on the state of open source enterprise linux and RHEL (Red Hat Enterprise Linux), Max Howell, creator of Homebrew and tea.xyz which offers rewards and recognition to open source maintainers, and Chad Whitacre, Head of Open Sourc…
…
continue reading
Election day wrap-up. The FBI issues a warning about cybercriminals selling government email credentials. Google issues an emergency update for Chrome. An Interpol operation nets dozens of arrests and IP takedowns. Microchip Technology disclosed $21.4 million in expenses related to a cybersecurity breach. Ransomware makes a Georgia hospital revert …
…
continue reading
1
844: TypeScript, Branded Types, Streaming vs Polling + More
56:22
56:22
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
56:22
Scott and Wes serve up listener questions on everything from SvelteKit’s limits and the quirks of branded types in TypeScript to handling email queues and secure token storage in cookies. Plus, they get into app security, the evolution of checkout flows, and why QA teams can actually be game-changers for dev teams. Show Notes 00:00 Welcome to Synta…
…
continue reading
1
Frontend Engineering at Slack with Shruti Kapoor
44:45
44:45
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
44:45
Slack is a team communication platform that originated as an internal tool within Tiny Speck, a game development company. When the company realized that their game would not achieve commercial success, they changed direction and repurposed the communication tool into a new product which eventually became Slack. Slack was launched in 2013 and is now…
…
continue reading
1
Frontend Engineering at Slack with Shruti Kapoor
44:45
44:45
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
44:45
Slack is a team communication platform that originated as an internal tool within Tiny Speck, a game development company. When the company realized that their game would not achieve commercial success, they changed direction and repurposed the communication tool into a new product which eventually became Slack. Slack was launched in 2013 and is now…
…
continue reading
1
DOP 288: The Laws of Software Evolution
32:12
32:12
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
32:12
#288: Let's journey back in time, roughly 30 to 50 years ago, to an era where systems were relatively simple. These foundational systems were built with fewer components, making them not only easier to understand but also simpler to manage. At that time, the stability of a system was often directly correlated with its simplicity. Fewer variables me…
…
continue reading
1
594: Smart Contracts for Dumb People
41:10
41:10
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
41:10
Malicious NPM packages are sneaking into codebases while FFmpeg devs prove old-school assembly skills can still smoke the competition. Plus, a rare bee species takes on Zuck's AI dreams. Sponsored By: Annual Membership - Jupiter Party: Put your support on auto-pilot and get one month for free! Coder QA: Take $2 a month off for the lifetime of your …
…
continue reading
1
ElizaRAT hits India, Washington court outage, Snowflake hacker arrested
8:00
8:00
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
8:00
ElizaRAT hits India IT outage impacts Washington courts Alleged Snowflake hacker arrested Thanks to today's episode sponsor, Vanta As third-party breaches continue to rise, companies are increasingly vigilant, which means more time spent on manual security reviews. With Vanta Questionnaire Automation, security & compliance teams can complete securi…
…
continue reading
1
AI Finds Zero Day Vulnerability For First Time: Cyber Security Today for Wednesday, November 6, 2024
8:05
8:05
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
8:05
AI Finds Zero Day Vulnerability, MFA Mandatory on Google Cloud, French Energy Firm Hacked In today's episode of Cyber Security Today, host Jim Love discusses Google's AI-driven system Big Sleep discovering the first ever AI-identified zero day vulnerability in the SQLite database engine. He also covers Google's new requirement for Google Cloud user…
…
continue reading
1
Risky Business #769 -- Sophos drops implants on Chinese exploit devs
56:51
56:51
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
56:51
On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news, including: Sophos drops implants on Chinese firewall exploit devs Microsoft workshops better just-in-time Windows admin privileges Snowflake hacker arrested in Canada Okta has a fun, but not very impactful auth-bypass bug Russians bring dumb-but-smart RDP clien…
…
continue reading
1
SN 999: AI Vulnerability Discovery - RT's AI TV Hosts, Windows 10 Updates
1:53:05
1:53:05
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
1:53:05
Google's record-breaking fine by Russia. (How many 0's is that?) RT's editor-in-chief admits that their TV hosts are AI-generated. Windows 10 security updates set to end next October... or are they? When a good Chrome extension goes bad. Windows .RDP launch config files. What could possibly go wrong? Firefox 132 just received some new features. Chi…
…
continue reading
1
ISC StormCast for Wednesday, November 6th, 2024
5:26
5:26
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
5:26
Python RAT with a Nice Screensharing Feature https://isc.sans.edu/diary/Python%20RAT%20with%20a%20Nice%20Screensharing%20Feature/31414 Android Security Bulletin November 2024 https://source.android.com/docs/security/bulletin/2024-11-01 Malware Delivered as Virtual Machine https://www.securonix.com/blog/crontrap-emulated-linux-environments-as-the-la…
…
continue reading
Do you or your team show resistance to change? There are some common ingrained habits that can affect your ability to learn. Find out how difficult conversations, pair programming, and test-driven development can help you create new habits to foster meaningful transformation, in this episode of Troubleshooting Agile.Links:- Toyota Kata: https://en.…
…
continue reading
On election day U.S. officials express confidence. A Virginia company is charged with violating U.S. export restrictions on technology bound for Russia. Backing up your GMail. Google mandates MFA. Google claims an AI-powered vulnerability detection breakthrough. Schneider Electric investigates a cyberattack on its internal project tracking platform…
…
continue reading
1
Luckily, We Haven’t Had to Adapt to Any New Technologies Before AI
40:40
40:40
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
40:40
All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), partner, YL Ventures. Joining us is our sponsored guest Jadee Hanson, CISO, Vanta. In this episode: Embracing BYOAI The changing government contractor landscape Creating be…
…
continue reading
1
DFSP # 455 Security Control Circumvention
33:29
33:29
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
33:29
Today, we’re going to explore how to handle a critical security event: Unauthorized Modification of Information. This type of event occurs when a user alters information in a system—whether it’s an application, database, website, server, or configuration files—without prior authorization. These modifications can range from impersonation and unautho…
…
continue reading
1
Boston Dynamics with Matt Malchano
49:56
49:56
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
49:56
Boston Dynamics is a robotics company known for creating advanced robots with highly dynamic movement and agility, designed to navigate complex environments. Their robots, such as the quadruped Spot and the humanoid Atlas, have applications in industries ranging from logistics to public safety. They also garner widespread attention with their impre…
…
continue reading
1
Boston Dynamics with Matt Malchano
49:56
49:56
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
49:56
Boston Dynamics is a robotics company known for creating advanced robots with highly dynamic movement and agility, designed to navigate complex environments. Their robots, such as the quadruped Spot and the humanoid Atlas, have applications in industries ranging from logistics to public safety. They also garner widespread attention with their impre…
…
continue reading
1
Integration Testing - The Why and How - .NET 204
49:08
49:08
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
49:08
We talk to Martin Costello - a .NET developer with a QA background - about integration testing. We walk through the different types of automated testing and discuss the benefits and purpose for each type. Martin introduces us to useful tools he uses to write tests within the .NET ecosystem and discusses what we should and shouldn't be testing as we…
…
continue reading
Enjoy this encore episode. The practice of emulating known adversary behavior against an organization's actual defensive posture.Oleh N2K Networks
…
continue reading
Chris Rock is known for being a security researcher. But he’s also a black hat incident responder. He tells us about a job he did in the middle east. https://x.com/chrisrockhacker Sponsors Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tell…
…
continue reading
1
Whispers in the wires: A closer look at the new age of intrusion. [OMITB]
40:10
40:10
Main Kemudian
Main Kemudian
Senarai
Suka
Disukai
40:10
Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined by N2K …
…
continue reading