Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
Join us every week as we take you on an journey into the dynamic realm of cybersecurity. Our podcast brings you exclusive interviews with top-notch leaders in the field, providing an in-depth exploration of the thrilling world of digital security. Discover discussions that encompass everything from the ingenious minds of hackers to the cutting-edge advancements in artificial intelligence. We tackle the crucial topics of diversity and the imperative mission of closing the substantial skills g ...
…
continue reading
The Call Kent podcast is a regular podcast where you call in with a question and Kent answers. Call in with your questions right from your web browser with any device at https://kentcdodds.com/call
…
continue reading
Technical interviews about software topics.
…
continue reading
Made for tech enthusiasts and IT professionals. Expanded coverage of your favorite technologies across Microsoft; including Office, Azure, Windows and Data Platforms. We'll even bring you broader topics such as device innovation with Surface, machine learning, and predictive analytics.
…
continue reading
A weekly show dedicated to helping you kick off your week right with all the latest in automation testing, performance & SRE testing, security testing, and DevOps-related news and updates that you need to know for this week. So grab your favorite cup of coffee or test, and let's do this!
…
continue reading
Linux “Off The Cuff”
…
continue reading
Beyond the Hype is a monthly podcast from the Scott Logic team where we cast a practical eye over what is new and exciting in software development – everything from Kafka to Kubernetes, AI to APIs, microservices to micro-frontends. We look beyond the promises, the buzz and excitement to guide you towards the genuine value. At Scott Logic, we have years of experience in tackling tough software problems for our clients, often at the bleeding edge of technology. Each month on this podcast, our ...
…
continue reading
Listen to articles handpicked by our editors, and stay updated on top technology news from TechCrunch.
…
continue reading
20MinuteLeaders features the world's prominent leaders for short conversations about their journeys and insights. The Human Zero Day brings together Cyber, AI and Social Engineering experts to discuss the vulnerabilities in human decision making.
…
continue reading
Too often we work at the pleasure of technology. This is backwards. Technology should serve our needs and support our humanity. Instead, we can use tools to translate our desires into the language that technology requires. You aren’t alone in this…I will be your guide. Together, we'll protect our personal privacy, security, and get better use of technology.
…
continue reading
Spreading awarness about data privacy, cybersecurity tips and how you should become an alert citizen by protecting your privacy
…
continue reading
Here we talk about many untalked subjects in Sri Lanka and in the world and also talked about subjects to give our take on it. Brought to you by Shiyon Perera. If you enjoy listening be sure to follow and let us know on social media: https://twitter.com/dashamaya_ https://www.facebook.com/DashamayaPodcast/
…
continue reading
Technology has become increasingly important to policy debates, but these debates won’t be productive without an understanding of how the technology in question works. AEI Visiting Fellow Shane Tews interviews tech industry experts to explain how the apps, services, and structures of today's information technology systems work, and how they shape our social and economic life.
…
continue reading
Talking about the newest tech, such as phones, computers, and more!
…
continue reading
Protecting your privacy from identity theft, fraud, and cyber threats is easy with a Privacy Mentor. Get the latest on threats, tools, and tips to staying safe in the digital age. Tune in weekly.
…
continue reading

1
LayerX Secures $45M Total to Battle Data Leaks, One Browser at a Time
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46LayerX just raised another $11 million — and it’s not to build another antivirus. With $45 million in total funding, the company is betting that your browser is the most vulnerable—and most overlooked—part of your cybersecurity stack. In this episode, we explore how LayerX turns everyday browsers like Chrome and Firefox into intelligent defense age…
…
continue reading

1
Episode 40 - Rise of Enterprise Security Browsers
4:40
4:40
Play later
Play later
Lists
Like
Liked
4:40The emergence of the enterprise browser represents a significant step forward in cyber security innovation. Ignoring this evolution is no longer an option for security-conscious organizations looking to stay ahead of the curve in the ongoing cyber arms race
…
continue reading

1
S17 E01 (VIDEO) Why Your Browser Is Your Biggest Risk
41:05
41:05
Play later
Play later
Lists
Like
Liked
41:05#SecurityConfidential #DarkRhiinoSecurityJohn Carse is the Field CISO at SquareX and a seasoned cybersecurity leader with over 20 years of experience spanning the U.S. Navy, JPMorgan, Expedia, Dyson, and Rakuten. With a background in securing critical naval systems during his 14 years in the Navy, John has since built and led global security progra…
…
continue reading

1
Microsoft Purview: New data security controls for the browser & network
9:57
9:57
Play later
Play later
Lists
Like
Liked
9:57Protect your organization’s data with Microsoft Purview. Gain complete visibility into potential data leaks, from AI applications to unmanaged cloud services, and take immediate action to prevent unwanted data sharing. Microsoft Purview unifies data security controls across Microsoft 365 apps, the Edge browser, Windows and macOS endpoints, and even…
…
continue reading

1
SentinelOne Discloses Ongoing Attacks by Nation-State Hackers and Ransomware Gangs
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50In a rare move, SentinelOne has publicly confirmed that it is under persistent attack from nation-state threat actors and ransomware gangs. This episode breaks down their recent report detailing how these adversaries—some believed to be backed by China and North Korea—are targeting SentinelOne to gain insight into how thousands of environments are …
…
continue reading

1
OpenEoX and the Future of End-of-Life Standardization in IT
12:01
12:01
Play later
Play later
Lists
Like
Liked
12:01In this episode, we unpack the evolving landscape of Product Lifecycle Management (PLM) and why it's become a strategic cornerstone in modern IT environments. From conception to retirement, managing a product’s lifecycle is now about more than just operations—it's about security, compliance, innovation, and cost. We explore the critical milestones …
…
continue reading

1
JetBrains releases Mellum, an ‘open’ AI coding model
3:13
3:13
Play later
Play later
Lists
Like
Liked
3:13JetBrains, the company behind a range of popular app development tools, has released its first “open” AI model for coding. On Wednesday, JetBrains made Mellum, a code-generating model the company released for its various software development suites last year, openly available on the AI dev platform Hugging Face. Learn more about your ad choices. Vi…
…
continue reading

1
Yelp debuts AI voice agents for restaurants and service providers
2:24
2:24
Play later
Play later
Lists
Like
Liked
2:24Yelp said on Tuesday that it’s working on deploying AI-powered “voice agents” to help service providers and restaurants handle calls, answer basic questions, and accomplish tasks like adding a customer to a restaurant waitlist. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading
Streamline your day with new, user-focused updates to Microsoft 365 Copilot. Jump into work faster with a redesigned layout that puts Chat, Search, and your agents front and center. New Copilot Search lets you yse natural language to find files, emails, and conversations—even if you don’t remember exact keywords—and get instant summaries and previe…
…
continue reading

1
S17 E02 (VIDEO) Is Your Job Safe From AI?
46:55
46:55
Play later
Play later
Lists
Like
Liked
46:55#SecurityConfidential #DarkRhiinoSecurityAlex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and par…
…
continue reading

1
Spotify adds 5M premium users and hits record operating income
2:22
2:22
Play later
Play later
Lists
Like
Liked
2:22Spotify reported on Tuesday that its premium subscriber base grew by 5 million in the first quarter, representing a 12% increase year-over-year. This brings the total to 268 million, marking the second-highest total ever and the highest net addition of paid subs for a first quarter since 2020. Learn more about your ad choices. Visit podcastchoices.…
…
continue reading
LiveKit is a platform that provides developers with tools to build real-time audio and video applications at scale. It offers an open-source WebRTC stack for creation of live, interactive experiences like video conferencing, streaming, and virtual events. LiveKit has gained significant attention for its partnership with OpenAI for the Advanced Voic…
…
continue reading
Alex Sharpe is a board member, practitioner, speaker, and author known for driving value while managing cyber risk. With a career that began in the intelligence community, Alex has since led strategic transformations across global enterprises, built two startups (including one with a successful IPO), and participated in over 20 M&A transactions. Re…
…
continue reading

1
InfoSec CEO Charged with Installing Malware! – 2025-04-28
1:00:58
1:00:58
Play later
Play later
Lists
Like
Liked
1:00:58Register for upcoming webcasts & summits - https://poweredbybhis.com 00:00 - PreShow Banter™ — Talking Bout Red Green 02:24 - InfoSec CEO Charged with Installing Malware! – BHIS - Talkin’ Bout [infosec] News 2025-04-28 03:01 - Story # 1: CEO of cybersecurity firm charged with installing malware on hospital systems 11:22 - Story # 2: 2025 Data Breac…
…
continue reading

1
Lightrun grabs $70M using AI to debug code in production
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53AI-based coding has exploded in popularity on the promise that it will make developers’ jobs faster and easier. But it’s also resulted in something else: a vast increase in lines of code, and thus the likelihood of bugs resulting in crashes or other mishaps. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading
What does it take to start a blog about software - and actually keep it going? Blog Recorder Building and Maintaining a Software BlogBy Kent C. Dodds
…
continue reading

1
$10.5M to Fight AI-Phishing: The Rise of Pistachio’s Cybersecurity Training Platform
13:04
13:04
Play later
Play later
Lists
Like
Liked
13:04In this episode, we dive into the story of Pistachio, the Norwegian cybersecurity startup that just raised $7 million in new funding—bringing its total to $10.5 million. Pistachio isn’t building another firewall or antivirus tool; it’s targeting the weakest link in most security systems: people. With AI-powered phishing attacks becoming increasingl…
…
continue reading

1
AirBorne: How a Zero-Click Bug Threatens Millions of Apple and Third-Party Devices
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23In this episode, we dive deep into AirBorne — a critical set of vulnerabilities in Apple’s AirPlay protocol and SDK, recently uncovered by security researchers at Oligo. These flaws enable zero-click, wormable remote code execution (RCE) attacks across iPhones, Macs, Apple TVs, CarPlay systems, and millions of third-party devices. Even more alarmin…
…
continue reading

1
Amazon-backed Glacier gets $16M to expand its robot recycling fleet
4:06
4:06
Play later
Play later
Lists
Like
Liked
4:06The world has a trash problem. The amount of stuff we throw away is expected to nearly double, to 3.8 billion metric tons, by 2050. Reducing what we use would go a long way to addressing the issue, but let’s face it, we’re not very good at buying less either. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading

1
Risky Business #789 -- Apple's AirPlay vulns are surprisingly awful
1:02:31
1:02:31
Play later
Play later
Lists
Like
Liked
1:02:31On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: British retail stalwart Marks & Spencer gets cybered South Korean telco sets out to replace all its subscriber SIMs after (we assume) it lost the keymat It’s a good exploit week! Bugs in Apple Airplay, SAP webservers, Erlang SSH and CommVault backups Juice jack…
…
continue reading

1
Anthropic CEO wants to open the black box of AI models by 2027
5:16
5:16
Play later
Play later
Lists
Like
Liked
5:16Anthropic CEO Dario Amodei published an essay Thursday highlighting how little researchers understand about the inner workings of the world’s leading AI models. To address that, Amodei set an ambitious goal for Anthropic to reliably detect most AI model problems by 2027. Amodei acknowledges the challenge ahead. Learn more about your ad choices. Vis…
…
continue reading

1
The Silent Majority: Why 51% of Internet Traffic Is Now Bots
13:03
13:03
Play later
Play later
Lists
Like
Liked
13:03The bots have taken over—and they’re not just crawling your website. In this episode, we dig into the alarming reality that automated bots now generate over half of all internet traffic. Armed with artificial intelligence and cloaked in residential proxies, these bots are evolving beyond simple scripts into highly evasive, persistent threats target…
…
continue reading
Stay in control with Microsoft Defender. You can identify which AI apps and cloud services are in use across your environment, evaluate their risk levels, and allow or block them as needed—all from one place. Whether it's a sanctioned tool or a shadow AI app, you're equipped to set the right policies and respond fast to emerging threats. Defender X…
…
continue reading

1
From 1,382 to 4 Million: What VeriSource Didn’t Know (or Say)
9:02
9:02
Play later
Play later
Lists
Like
Liked
9:02In this episode, we investigate the massive data breach at VeriSource Services, Inc. (VSI), a Houston-based HR outsourcing and employee benefits administrator. Initially reported as affecting fewer than 2,000 individuals, the breach has now ballooned to a confirmed 4 million affected people. We trace the timeline from the initial detection of suspi…
…
continue reading

1
Actively Exploited: Commvault Web Shells, Active! mail RCE, and Brocade Code Injection Now in KEV
17:21
17:21
Play later
Play later
Lists
Like
Liked
17:21Three actively exploited vulnerabilities—CVE-2025-42599 (Qualitia Active! mail), CVE-2025-3928 (Commvault Web Server), and CVE-2025-1976 (Broadcom Brocade Fabric OS)—have been added to CISA’s KEV catalog. The Qualitia flaw is a remote stack-based buffer overflow (CVSS 9.8) allowing code execution without authentication. Commvault's vulnerability pe…
…
continue reading

1
Inside the Human Firewall: Phishing, Deepfakes & the Rise of Social Engineering with Heather Benwell
33:21
33:21
Play later
Play later
Lists
Like
Liked
33:21In this eye-opening episode, we sit down with Heather Benwell, Chief Marketing Officer at Challengeword, to explore one of the fastest-growing threats in cybersecurity: social engineering. From phishing to deepfakes, and the evolving complexity of human-targeted attacks, Heather shares stories, statistics, and insights that highlight just how vulne…
…
continue reading
Chess.com reaches a new membership milestone as it nears its 20th birthday. Chess.com, the online chess platform that was founded in 2005 and launched in 2007, has surpassed 200 million members. Of those 200 million members, 1.5 million are paying users. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading

1
SED News: CoreWeave IPO, Anthropic’s MCP, and Microsoft Turns 50
46:15
46:15
Play later
Play later
Lists
Like
Liked
46:15Welcome to the pilot episode of SED News, a new podcast series from Software Engineering Daily. Join hosts Gregor Van and Sean Falconer as they break down the week’s most important stories in software engineering, machine learning, and developer culture. In this episode, Gregor and Sean discuss the CoreWeave IPO and the company’s recent acquisition…
…
continue reading

1
Adobe wants to create a robots.txt styled indicator for images used in AI training
5:05
5:05
Play later
Play later
Lists
Like
Liked
5:05For years, websites included information about what kind of crawlers were not allowed on their site with a robots.txt file. Adobe, which wants to create a similar standard for images, has added a tool to content credentials with an intention to give them a bit more control over what is used to train AI models. Learn more about your ad choices. Visi…
…
continue reading
I’m transitioning from SPAs with REST APIs to SSR applications using React Router Framework. While I’ve used layout routes and tools like SWR/React Query for route protection in React Router DOM, I just found out that actions in React Router Framework are still vulnerable to unauthorized POST requests. I use JWT auth with tokens stored in cookies—d…
…
continue reading

1
Hard-Coded Havoc: The Fatal Flaws in Planet’s Network Devices
11:39
11:39
Play later
Play later
Lists
Like
Liked
11:39A wave of critical vulnerabilities in Planet Technology’s industrial switches and network management systems could let attackers hijack devices, steal data, and sabotage industrial networks—with no credentials required. In this urgent episode, we dissect: 🔓 The 5 worst flaws (CVSS 9.3+)—from hard-coded database passwords to pre-auth command injecti…
…
continue reading

1
Accelerate QA Using AI, Appium MCP, Security Testing and More TGNS155
9:52
9:52
Play later
Play later
Lists
Like
Liked
9:52Do you know how to accelerate your QA Process with AI and Playwright? What is the latest must try MCP in automation Why would you ever use Reverse Mutation Testing Find out in this episode of the Test Guild New Shows for the week of April 27. So, grab your favorite cup of coffee or tea, and let's do this. 0:18 ZAPTEST AI https://testguild.me/ZAPTES…
…
continue reading

1
Craft CMS Crisis: The 10.0-Rated RCE Flaw Every Developer Must Patch Now
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51A critical, actively exploited vulnerability (CVE-2025-32432) is wreaking havoc on Craft CMS—allowing attackers to execute arbitrary PHP code on unpatched servers with no authentication required. In this urgent episode, we break down: 💥 Why this flaw scores a perfect 10.0 CVSS—the highest severity rating possible. 🔍 How hackers are exploiting it: F…
…
continue reading

1
Policy Puppetry: How a Single Prompt Can Trick ChatGPT, Gemini & More Into Revealing Secrets
12:44
12:44
Play later
Play later
Lists
Like
Liked
12:44Recent research by HiddenLayer has uncovered a shocking new AI vulnerability—dubbed the "Policy Puppetry Attack"—that can bypass safety guardrails in all major LLMs, including ChatGPT, Gemini, Claude, and more. In this episode, we dive deep into: 🔓 How a single, cleverly crafted prompt can trick AI into generating harmful content—from bomb-making g…
…
continue reading

1
Uber, Volkswagen pair up to launch robotaxi service in US with self-driving, electric microbuses
3:37
3:37
Play later
Play later
Lists
Like
Liked
3:37Volkswagen of America and Uber on Thursday unveiled an ambitious plan to launch a commercial robotaxi service — using autonomous electric VW ID. BUZZ vehicles — in multiple U.S. cities over the next decade. The companies expect to launch a commercial service in Los Angeles, the first city on the list, by late 2026 Learn more about your ad choices. …
…
continue reading

1
Ep1139: Manish Patel: Navigating AI Chaos for Growth
21:01
21:01
Play later
Play later
Lists
Like
Liked
21:01Growing up between Uganda, the UK, and rural Kentucky, Manish Patel’s journey led him from Stanford to Google and then into venture capital. Reflecting on technology’s human impact, Manish shares how today’s AI-driven chaos mirrors past moments of innovation—and why building around human needs, not just features, will define the next generation of …
…
continue reading

1
Snake Oilers: LimaCharlie, Honeywell Cyber Insights, CobaltStrike and Outflank
38:50
38:50
Play later
Play later
Lists
Like
Liked
38:50In this edition of the Snake Oilers podcast, three sponsors come along to pitch their products: LimaCharlie: A public cloud for SecOps Honeywell Cyber Insights: An OT security/discovery solution Fortra’s CobaltStrike and Outflank: Security tooling for red teamers This episode is also available on Youtube. Show notes…
…
continue reading

1
Government censorship comes to Bluesky, but not its third-party apps … yet
5:50
5:50
Play later
Play later
Lists
Like
Liked
5:50Government censorship has found its way to Bluesky, but there’s currently a loophole thanks to how the social network is structured. Earlier this month, Bluesky restricted access to 72 accounts in Turkey at the request of Turkish governmental authorities, according to a recent report by the Freedom of Expression Association. Learn more about your a…
…
continue reading

1
Lazarus Strikes Again: Inside Operation SyncHole and the 1-Day Exploitation Crisis
12:49
12:49
Play later
Play later
Lists
Like
Liked
12:49In this episode, we break down the most urgent cybersecurity developments from late April 2025—including the Lazarus Group’s high-profile “Operation SyncHole” targeting South Korean industries. Discover how attackers are exploiting newly disclosed vulnerabilities faster than ever, with nearly 1 in 3 CVEs weaponized within 24 hours of publication. W…
…
continue reading

1
OAuth Phishing and Microsoft 365: The Hidden Threats SMBs Can't Ignore
13:54
13:54
Play later
Play later
Lists
Like
Liked
13:54In this episode, we dissect the real-world challenges of securing Microsoft 365 environments—especially for small and medium-sized businesses—amid rising threats and licensing limitations. From Reddit frustrations to official Microsoft documentation, we explore the harsh truth: many essential security features, like alerting on suspicious logins, r…
…
continue reading

1
Why Outlook Is Eating Your CPU — And What Microsoft Says About It
12:17
12:17
Play later
Play later
Lists
Like
Liked
12:17Microsoft has acknowledged a serious issue affecting users of classic Outlook for Windows: CPU usage spikes up to 50% just from typing emails. First appearing in builds released since November 2024, this bug is now hitting users across several update channels—including Current, Monthly Enterprise, and Insider—leading to power drain, sluggish perfor…
…
continue reading

1
Linktree rolls out a suite of monetization features for creators
4:09
4:09
Play later
Play later
Lists
Like
Liked
4:09Linktree is launching a set of new features aimed at helping creators earn more money directly from its platform. The new tools include the ability to sell courses and digital products, earn from brand-sponsored links, and build shoppable storefronts. Learn more about your ad choices. Visit podcastchoices.com/adchoices…
…
continue reading

1
How Microsoft 365 Backup works and how to set it up
0:50
0:50
Play later
Play later
Lists
Like
Liked
0:50Protect your Microsoft 365 data and stay in control with Microsoft 365 Backup —whether managing email, documents, or sites across Exchange, OneDrive, and SharePoint. Define exactly what you want to back up and restore precisely what you need to with speeds reaching 2TB per hour at scale. With flexible policies, dynamic rules, and recovery points up…
…
continue reading

1
The U.S. doesn’t refine cobalt. This startup wants to change that.
3:08
3:08
Play later
Play later
Lists
Like
Liked
3:08Xerion says it has a new technique to produce highly refined cobalt in a single step. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy TechCrunch
…
continue reading

1
Trojan Map App: Spyware Targets Russian Soldiers via Alpine Quest
9:14
9:14
Play later
Play later
Lists
Like
Liked
9:14A newly discovered Android spyware campaign is targeting Russian military personnel by weaponizing a popular mapping app. Disguised as a cracked version of Alpine Quest Pro, this trojanized app delivers Android.Spy.1292.origin—a powerful surveillance tool that steals data, tracks location in real-time, and downloads secondary payloads to extract co…
…
continue reading