Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The Browsing Security podcast by LayerX Security: Learn from the biggest influencers in cybersecurity about browser security risks, challenges and solutions, in a casual and fun setting
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Security Confidential provides weekly interviews and insights into the world of cybersecurity. Produced entirely in-house by MSSP & global risk management firm Dark Rhiino Security.
…
continue reading
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
…
continue reading
Your dose of tips about all things Information Security, ICT Legislation and Risk. South African podcast.
…
continue reading
…
continue reading
Cybersecurity Architecture Podcast aims to help security professionals to rethink their approach to infosec design and simplify their decision-making process while they face the overcrowded innovative cybersecurity market.
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Cyber Security can be a difficult field to not only understand but to also navigate. Joe South is here to help with over a decade of experience across several domains of security. With this podcast I hope to help more people get into IT and Cyber Security as well as discussing modern day Cyber Security topics you may find in the daily news. Come join us as we learn and grow together!
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Curious about application security? Want to learn how to detect security vulnerabilities and protect your application. We discuss different topics and provide valuable insights into the world of application security.
…
continue reading
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
News, analysis, and insights into enterprise security. We put security vendors under the microscope, and explore the latest trends that can help defenders succeed. Hosted by Adrian Sanabria. Co hosts: Katie Teitler-Santullo, Ayman Elsawah, Jason Wood, Jackie McGuire.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Linux “Off The Cuff”
…
continue reading
The Call Kent podcast is a regular podcast where you call in with a question and Kent answers. Call in with your questions right from your web browser with any device at https://kentcdodds.com/call
…
continue reading
Beyond the Hype is a monthly podcast from the Scott Logic team where we cast a practical eye over what is new and exciting in software development – everything from Kafka to Kubernetes, AI to APIs, microservices to micro-frontends. We look beyond the promises, the buzz and excitement to guide you towards the genuine value. At Scott Logic, we have years of experience in tackling tough software problems for our clients, often at the bleeding edge of technology. Each month on this podcast, our ...
…
continue reading
Technology has become increasingly important to policy debates, but these debates won’t be productive without an understanding of how the technology in question works. AEI Visiting Fellow Shane Tews interviews tech industry experts to explain how the apps, services, and structures of today's information technology systems work, and how they shape our social and economic life.
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
Threat Vector, Palo Alto Networks podcast, is your premier destination for security thought leadership. Join us as we explore pressing cybersecurity threats, robust protection strategies, and the latest industry trends. The podcast features in-depth discussions with industry leaders, Palo Alto Networks experts, and customers, providing crucial insights for security decision-makers. Whether you're looking to stay ahead of the curve with innovative solutions or understand the evolving cybersec ...
…
continue reading
I'm Chris (REal0day) Magistrado, hacker who interviews hackers, entrepreneurs, community builders, and investors. https://HackersToFounders.com
…
continue reading
Broadcasting from Dubai, The CTO Show with Mehmet explores the latest trends in technology, startups, and venture funding. Host Mehmet Gonullu leads insightful discussions with thought leaders, innovators, and entrepreneurs from diverse industries. From emerging technologies to startup investment strategies, the show provides a balanced view on navigating the evolving landscape of business and tech, helping listeners understand their profound impact on our world. [email protected]
…
continue reading
SquareX is excited to launch The Be Fearless Podcast Series, where we bring together industry experts and professionals from the cybersecurity community. Hosted by SquareX Founder - and cybersecurity veteran - Vivek Ramachandran, look forward to insights about our guests’ journeys in security, the evolution of the field, the changing threatscape and how enterprises across industries are addressing them today.
…
continue reading
Technical interviews about software topics.
…
continue reading
Too often we work at the pleasure of technology. This is backwards. Technology should serve our needs and support our humanity. Instead, we can use tools to translate our desires into the language that technology requires. You aren’t alone in this…I will be your guide. Together, we'll protect our personal privacy, security, and get better use of technology.
…
continue reading
Spreading awarness about data privacy, cybersecurity tips and how you should become an alert citizen by protecting your privacy
…
continue reading
Here we talk about many untalked subjects in Sri Lanka and in the world and also talked about subjects to give our take on it. Brought to you by Shiyon Perera. If you enjoy listening be sure to follow and let us know on social media: https://twitter.com/dashamaya_ https://www.facebook.com/DashamayaPodcast/
…
continue reading
Welcome to AI News Daily, brought to you by Brief! Our AI selects the latest stories and top headlines and then delivers them to you each day in less than ten minutes (for more details, visit www.brief.news/how-it-works). Tune in to get your daily news about machine learning, robotics, automation, natural language processing, AI ethics, and more. Whether you're a tech enthusiast, AI researcher, or simply curious about the future of technology, this podcast is your go-to source for AI news. T ...
…
continue reading
Talking about the newest tech, such as phones, computers, and more!
…
continue reading
Daily overview of the Top 10 Hacker News posts. Post and comment summarization by AI.
…
continue reading
Hands-On Windows, featuring Paul Thurrott, will help you adapt to the changes made in Windows 11. From visual tweaks to performance boosts Hands-On Windows will show you how to get the most out of your Windows 11 PC. You can join Club TWiT for $10 per month and get ad-free audio and video feeds for all our shows plus everything else the club offers...or get just this podcast ad-free for $5 per month. New episodes every Thursday.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Protecting your privacy from identity theft, fraud, and cyber threats is easy with a Privacy Mentor. Get the latest on threats, tools, and tips to staying safe in the digital age. Tune in weekly.
…
continue reading

1
#482 The Browser Is the New Battleground: John Carse on Securing the Modern Endpoint
49:37
49:37
Play later
Play later
Lists
Like
Liked
49:37In this episode of The CTO Show with Mehmet, we’re joined by John Carse, Field CISO at SquareX, to explore a fast-emerging shift in cybersecurity: the browser as the new endpoint. John shares why traditional tools like EDR and CASB are no longer sufficient, how modern threats are bypassing enterprise defenses, and what CISOs need to prioritize in a…
…
continue reading

1
40K IoT cameras stream secrets to browsers, Marks & Spencer taking online orders post-cyberattack, PoC Code escalates Roundcube Vuln threat
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04CISA, Microsoft warn of Windows zero-day used in attack on ‘major’ Turkish defense org 40K IoT cameras worldwide stream secrets to anyone with a browser Marks & Spencer begins taking online orders again, out for seven weeks due to cyberattack Huge thanks to our sponsor, Vanta Is your manual GRC program slowing you down? There’s something more effic…
…
continue reading

1
ClickFix: How Fake Browser Errors Became the Internet’s Most Dangerous Trap
47:15
47:15
Play later
Play later
Lists
Like
Liked
47:15In this episode, we dive deep into ClickFix, also tracked as ClearFix or ClearFake—a highly effective and deceptive malware delivery tactic that emerged in early 2024. ClickFix exploits the human tendency to trust browser prompts by using fake error messages, CAPTCHA pages, and verification requests to convince users to execute malicious PowerShell…
…
continue reading

1
Can you supercharge security with a browser?
39:41
39:41
Play later
Play later
Lists
Like
Liked
39:41In this episode of Threat Vector, Ofer Ben‑Noon steps in as guest host to interview cybersecurity strategist Kirsten Davies. They explore why browsers now handle 85 percent of work and how that shift makes them the prime attack surface. Learn how phishing and session hijacks exploit low‑friction paths, why Zero Trust and enterprise browsers must wo…
…
continue reading
Do you use any application more than your browser? No, we didn't think so. But which is the best browser for your needs, and how do you know you're browsing safely. The team discusses. #Priviso #PrivisoLive #Security #informationsecurityBy Anthony Olivier
…
continue reading

1
Risky Bulletin: Israel-linked hackers claim Iran bank disruption
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03An Israeli-linked hacktivist group claims attack on Iranian bank, Chrome gets a new prompt to prevent local network attacks, a Century-old German napkin company goes under following ransomware attack, and Europol takes down the Archetyp dark web market. Show notes
…
continue reading

1
Archetyp Market Seized: €250M Drug Empire Toppled by Operation Deep Sentinel
54:53
54:53
Play later
Play later
Lists
Like
Liked
54:53In this episode, we unpack the dramatic takedown of Archetyp Market, a darknet marketplace that dominated the online drug trade since its launch in May 2020. With over €250 million ($290 million) in drug transactions, more than 600,000 users, and 17,000 listings, Archetyp wasn’t just another darknet forum—it was the largest dedicated drug market on…
…
continue reading

1
AI Zombie Lawyer, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet - SWN #486
36:26
36:26
Play later
Play later
Lists
Like
Liked
36:26AI Zombie Lawyers, Scattered Spider, ASUS, Mainframes, GrayAlpha, Backups, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-486
…
continue reading

1
KillSec Exploits Zero-Day to Breach Ocuco: 241K Patients Exposed
1:07:13
1:07:13
Play later
Play later
Lists
Like
Liked
1:07:13In this episode, we break down one of 2025’s most significant healthcare cybersecurity incidents: the ransomware attack on Ocuco, a global eyecare software provider. On April 1st, 2025, threat actors from the KillSec ransomware group exploited CVE-2024-41197 — a critical authentication bypass in Ocuco’s INVCLIENT.EXE — to gain Administrator-level a…
…
continue reading

1
DragonForce Ransomware: The Evolving Threat to Healthcare Data
39:12
39:12
Play later
Play later
Lists
Like
Liked
39:12In this episode, we dive deep into the current state of cybersecurity in healthcare, where the growing sophistication of cyber threats has led to increasingly devastating breaches. We begin with a close look at the rise of Ransomware-as-a-Service (RaaS), focusing on DragonForce, a ransomware group that has transitioned from politically motivated at…
…
continue reading

1
Google’s $32B Bid for Wiz Faces DOJ Fire: A Cloud Security Power Play or Market Grab?
1:02:01
1:02:01
Play later
Play later
Lists
Like
Liked
1:02:01In this episode, we break down the seismic implications of Google’s proposed $32 billion acquisition of Wiz, the world’s largest cybersecurity unicorn—and why this isn’t just another tech deal. At the core is the U.S. Department of Justice's antitrust investigation, triggered by concerns that the deal could tighten Google’s grip on a critical secto…
…
continue reading

1
6.17.25 | WhatsApp adds ads, Nanonets-OCR-s converts documents to markdown, Chawan TUI web browser showcased
11:59
11:59
Play later
Play later
Lists
Like
Liked
11:59This is a recap of the top 10 posts on Hacker News on Jun 17, 2025. WhatsApp introduces ads in its app https://www.nytimes.com/2025/06/16/technology/whatsapp-ads.html https://news.ycombinator.com/item?id=44289412 Nanonets-OCR-s – OCR model that transforms documents into structured markdown https://huggingface.co/nanonets/Nanonets-OCR-s https://news…
…
continue reading

1
SED News: Corporate Spies, Postgres, and the Weird Life of Devs Right Now
43:39
43:39
Play later
Play later
Lists
Like
Liked
43:39Welcome back to SED News, a podcast series from Software Engineering Daily where hosts Gregor Vand and Sean Falconer break down the latest stories in software engineering, Silicon Valley, and wider tech world. In this episode, Gregor and Sean unpack what’s going with Deel and Rippling, explore why Databricks and Snowflake are making big bets on Pos…
…
continue reading

1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading

1
2FA middleman, Archetyp seized, Zoomcar hacked
7:35
7:35
Play later
Play later
Lists
Like
Liked
7:35Beware the SMS 2FA middleman Police seize Archetyp Market Zoomcar hack impacts 8.4 million users Huge thanks to our sponsor, Adaptive Security As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing simulations featuring realistic personalized deepfakes and engaging security awareness training. Their new…
…
continue reading

1
#484 The CTO as Orchestrator: Naga Vadrevu on Leading Tech with First Principles
42:33
42:33
Play later
Play later
Lists
Like
Liked
42:33In this episode of The CTO Show with Mehmet, Naga Vadrevu, Chief Technology Officer at Wonderschool and former engineering leader at Square, Adobe, and Autodesk, shares his journey from big tech to startup disruption. Naga dives deep into how he applies AI and machine learning to revolutionize childcare access in the U.S., and why modern CTOs must …
…
continue reading

1
WPP TikTok Boosts Marketing Creativity, Synopsys Strengthens Samsung Partnership, Artprice and PerplexityAI Transform Art Market, Cisco Revolutionizes AI Networking, and more...
12:00
12:00
Play later
Play later
Lists
Like
Liked
12:00(0:10): WPP and TikTok Elevate Marketing with Symphony AI Integration, Boosting Creativity and Personalization (2:11): Synopsys Strengthens Samsung Partnership Amid China Delays, Reports Strong Q2 Revenue (4:46): Artprice and Perplexity.AI Unveil AI-Driven Insights Transforming Global Art Market (7:08): Cisco Revolutionizes AI Networking with $1B i…
…
continue reading

1
SimpleHelp Exploit Fallout: Ransomware Hits Utility Billing Platforms
1:03:42
1:03:42
Play later
Play later
Lists
Like
Liked
1:03:42In this critical episode, we dive into the alarming exploitation of CVE-2024-57727, a vulnerability in SimpleHelp Remote Monitoring and Management (RMM) software actively leveraged by ransomware operators since early 2025. This isn't just a theoretical risk—it's already being used to compromise utility billing providers and downstream MSP customers…
…
continue reading

1
Between Two Nerds: Why modern influence operations suck
30:21
30:21
Play later
Play later
Lists
Like
Liked
30:21In this edition of Between Two Nerds Tom Uren and The Grugq take a look at a new AI-powered covert influence campaign and compare it to World War 2 efforts. This episode is also available on Youtube. Show notes
…
continue reading

1
TeamFiltration and Token Theft: The Cyber Campaign Microsoft Never Saw Coming
1:01:04
1:01:04
Play later
Play later
Lists
Like
Liked
1:01:04In this episode, we dissect UNK_SneakyStrike—a major account takeover campaign targeting Microsoft Entra ID users with precision and scale. Tracked by Proofpoint, this campaign began in December 2024 and has since escalated, leveraging TeamFiltration, a legitimate penetration testing tool, to enumerate users and launch password spraying attacks tha…
…
continue reading

1
Three CVEs, One Risk: Arbitrary Code Execution in Nessus Agent for Windows
44:04
44:04
Play later
Play later
Lists
Like
Liked
44:04In this episode, we dive deep into one of the most critical attack techniques in modern cyber warfare: privilege escalation—and how it recently hit center stage with three high-severity vulnerabilities discovered in Tenable’s Nessus Agent for Windows. We break down CVE-2025-36631, CVE-2025-36632, and CVE-2025-36633, which, when exploited, allow a n…
…
continue reading

1
WestJet Cyberattack: Cracks in Aviation’s Digital Armor
25:52
25:52
Play later
Play later
Lists
Like
Liked
25:52A major cyberattack has rocked Canada's second-largest airline, WestJet—crippling internal systems and prompting warnings for customers to monitor their accounts and change passwords. But this is more than just a corporate incident. It’s the latest sign of a broader, escalating crisis in aviation cybersecurity. In this episode, we examine the WestJ…
…
continue reading

1
The SHOCKING Truth About AI Security in Hospitals
45:33
45:33
Play later
Play later
Lists
Like
Liked
45:33Send us a text Security is increasingly viewed as a strategic business advantage rather than just a necessary cost center. The dialogue explores how companies are leveraging their security posture to gain competitive advantages in sales cycles and build customer trust. • Taylor's journey from aspiring physical therapist to cybersecurity expert thro…
…
continue reading

1
6.16.25 | SSL renamed to TLS, Modifying Starlink Mini, Canyon.mid
11:52
11:52
Play later
Play later
Lists
Like
Liked
11:52This is a recap of the top 10 posts on Hacker News on Jun 16, 2025. Why SSL was renamed to TLS in late 90s (2014) https://tim.dierks.org/2014/05/security-standards-and-name-changes-in.html https://news.ycombinator.com/item?id=44282378 How to modify Starlink Mini to run without the built-in WiFi router https://olegkutkov.me/2025/06/15/how-to-modify-…
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Yotam Segev, Matthew Warner, Rob Allen - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading

1
Insider threats, migrating away from cloud, RSAC interviews with Cyera and Blumira - Rob Allen, Matthew Warner, Yotam Segev - ESW #411
1:19:04
1:19:04
Play later
Play later
Lists
Like
Liked
1:19:04Segment 1 - Interview with Rob Allen from Threatlocker Segment 2 - Topic: Growing Trend - Edge Computing and Hybrid Cloud Segment 3 - Interviews from RSAC 2025 Cyera Cyera is the fastest-growing data security company in history, empowering companies to classify, secure, and manage their data, wherever it is, and leverage the power of the industry’s…
…
continue reading

1
BT Group Restructures for Savings, Indonesia Pushes Ethical AI Adoption, UK AI Cheating Cases Triple, Google Cloud Launches Gemini 2.5, and more...
12:08
12:08
Play later
Play later
Lists
Like
Liked
12:08(0:10): BT Group Restructures: 40,000 Job Cuts and AI Integration to Save £3 Billion by 2030 (2:17): At AI Summit, Indonesian Minister Stresses Speedy, Ethical Adoption of AI Across Sectors (4:03): UK Student AI Cheating Soars: Cases Triple, Government Invests £200M in Education Reform (6:39): Google Cloud Unveils Gemini 2.5: Revolutionizing AI-Pow…
…
continue reading

1
Washington Post hacked, WestJet suffers cyberattack, Texas DoT breach
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25Washington Post investigates hacking incident on journalists’ emails Canadian airline WestJet is containing a cyberattack Crash records stolen from Texas DOT Huge thanks to our sponsor, Adaptive Security — OpenAI’s first cybersecurity investment As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing sim…
…
continue reading

1
Risky Bulletin: Washington Post email accounts hacked
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48Email accounts compromised at the Washington Post, shady email provider Cock.li gets hacked, hackers steal data from a French university, and the EU invests €145 million in hospital cybersecurity. Show notes
…
continue reading

1
Soap Box: AI has entered the SOC, and it ain't going anywhere
30:58
30:58
Play later
Play later
Lists
Like
Liked
30:58In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Dropzone AI founder Ed Wu about the role of LLMs in the SOC. The debate about whether AI agents are going to wind up in the SOC is over, they’ve already arrived. But what are they good for? What are they NOT good for? And where else will we see AI popping up in…
…
continue reading

1
Soap Box: AI has entered the SOC, and it ain't going anywhere
30:58
30:58
Play later
Play later
Lists
Like
Liked
30:58In this sponsored Soap Box edition of the Risky Business podcast Patrick Gray chats with Dropzone AI founder Ed Wu about the role of LLMs in the SOC. The debate about whether AI agents are going to wind up in the SOC is over, they’ve already arrived. But what are they good for? What are they NOT good for? And where else will we see AI popping up in…
…
continue reading
In this Risky Bulletin sponsor interview Michael Leland, Field CTO of Island, talks about how Island manages risks from extensions, phishing and infostealers. Even when credentials are stolen, it is still not game over and there are still ways to prevent data loss and breaches. Show notes
…
continue reading

1
Silent Surveillance: The Hidden Risks in 40,000+ Unsecured Cameras
49:37
49:37
Play later
Play later
Lists
Like
Liked
49:37In this episode, we dig into a disturbing yet underreported national security threat: the exploitation of internet-connected surveillance cameras—especially those manufactured in the People’s Republic of China—as a cyber weapon against U.S. critical infrastructure. Drawing from recent DHS intelligence briefings and independent cybersecurity analyse…
…
continue reading

1
Paragon’s Promise vs. Reality: How Graphite Is Being Used Against Journalists and Activists
1:10:32
1:10:32
Play later
Play later
Lists
Like
Liked
1:10:32In this episode, we dive deep into the alarming revelations surrounding Graphite, a powerful spyware tool developed by Israeli firm Paragon Solutions. Promoted as a “responsible alternative” to the NSO Group’s Pegasus, Graphite is now implicated in the surveillance of journalists, humanitarian activists, and civil society figures—contrary to the ve…
…
continue reading

1
6.15.25 | Reimplemented Stable Diffusion 3.5 in PyTorch, Waymo rides pricier than Uber/Lyft, TimeGuessr
12:02
12:02
Play later
Play later
Lists
Like
Liked
12:02This is a recap of the top 10 posts on Hacker News on Jun 15, 2025. I have reimplemented Stable Diffusion 3.5 from scratch in pure PyTorch https://github.com/yousef-rafat/miniDiffusion https://news.ycombinator.com/item?id=44276476 Waymo rides cost more than Uber or Lyft and people are paying anyway https://techcrunch.com/2025/06/12/waymo-rides-cost…
…
continue reading

1
zeroRISC Secures $10M to Commercialize OpenTitan and Reinvent Supply Chain Security
51:51
51:51
Play later
Play later
Lists
Like
Liked
51:51zeroRISC just raised $10 million to bring OpenTitan—the first open-source silicon Root of Trust—to market. In this episode, we break down what this funding means for the future of supply chain security, and why investors are betting on open hardware to fix vulnerabilities baked into modern chips. We explore how geopolitical tension, forced labor en…
…
continue reading

1
The Mechanics of Security Investing | Zain Rizavi, CEO at Stealth, ex-VC
54:35
54:35
Play later
Play later
Lists
Like
Liked
54:35Cybersecurity Co-Founder and ex-Venture Capitalist Zain Rizavi breaks down what really happens behind closed doors in cybersecurity investing. From his unconventional journey from political science to backing the next generation of security companies, Zain reveals why most founders get product-market fit completely wrong and what it really takes to…
…
continue reading

1
Fog, RedFox, and the Rise of Silent Intruders: Cyberattacks Surge Against Financial Institutions
34:42
34:42
Play later
Play later
Lists
Like
Liked
34:42The financial services industry is under siege. In this episode, we unpack the latest findings from Radware’s 2025 Financial Threat Analysis and multiple intelligence reports detailing a relentless rise in cyberattacks targeting banks and financial institutions across the globe. We examine the surge in sophisticated attacks that blend legitimate to…
…
continue reading

1
6.14.25 | Solar system model, HP's board buys Palm, Apple's Liquid Glass for AR interfaces
12:16
12:16
Play later
Play later
Lists
Like
Liked
12:16This is a recap of the top 10 posts on Hacker News on Jun 14, 2025. If the moon were only 1 pixel: A tediously accurate solar system model (2014) https://joshworth.com/dev/pixelspace/pixelspace_solarsystem.html https://news.ycombinator.com/item?id=44266828 I convinced HP's board to buy Palm and watched them kill it https://philmckinney.substack.com…
…
continue reading

1
#483 Bootstrapping in Motion: Nelson Nigel’s Blueprint from Yellow Cab to Kidmoto
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14In this episode, Mehmet Gonullu sits down with Nelson Nigel, the founder of Kidmoto, a ride-hailing service designed specifically for families traveling with young children. From driving a yellow cab in New York to building a tech-enabled transportation service operating in 64+ cities, Nelson shares how he bootstrapped his company past $1M in reven…
…
continue reading