A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
The world of application development moves quickly. New tools, new processes, and new threats are always popping up. Through enlightening interviews with industry leaders, From Code to the Cloud helps you stay on top of new developments in Low Code and Salesforce DevOps.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
The OWASP Podcast Series is a recorded series of discussions with thought leaders and practitioners who are working on securing the future for coming generations.
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Main AI by CodeRabbit is a podcast that brings you deep conversations with legendary developers who've shaped the tools we use every day. We explore how artificial intelligence is transforming software development while celebrating the creators and tools that built our foundation. Each episode features intimate discussions about building developer tools, maintaining open source projects, and navigating the evolution of technology.
…
continue reading
Join host Chris Lindsey as he digs into the world of Application Security with experts from leading enterprises. Each episode is theme based, so it's more conversational and topic based instead of the general interview style. Our focus is growing your knowledge, providing useful tips and advice. With Chris' development background of 35 years, 15+ years of secure coding and 3+ years running an application security program for large enterprise, the conversations will be deep and provide a lot ...
…
continue reading
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Cyber Security News, Analysis and Opinion
…
continue reading
Welcome to For a Cloudy Day, the podcast where we talk about the cloud technology industry with insights from experts. Hosted by Co-native, the home of cloud specialists.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading

1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
As more and more organizations continue to adopt low code as a standard practice for solution development, information technology professionals find themselves learning new skills, translating professional development skills into low code tools and implementing governance and service management strategies. Learn from Microsoft MVPs, Microsoft Product team members, and Microsoft Power Platform users how they approached building solutions using Microsoft Power Platform.
…
continue reading
Larry and Kerry talk about parenting issues during Covid-19 isolation period
…
continue reading
Breaking the Internet is a podcast about tech for tech - but we’re not like other girls. Serena (@shenetworks) and Ali (@endingwithali) take to the mic to talk about the industry, trends, history and more.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
A weekly podcast about web design and development with a little zest from Amy Dutton and Brad Garropy
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading

1
Relationship advice by The Relationship Code..
Brett and Marie Jones. International relationship experts and authors.
For Dynamic Couples and Songles Short , smart, incise strategies to boost your Relationship, Love, Family.
…
continue reading
Join us for interesting conversations about technology and the business of IT.
…
continue reading
Security Boulevard is the destination for the security community to stay up on the latest news, discussion and analysis. Home of the Security Bloggers Network, Security Boulevard has more security related content than anywhere else on the web.
…
continue reading
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
…
continue reading
Revenera experts are joined by industry leaders for discussions on all the latest talking points in the world of software.
…
continue reading
ThePrint.in is a news, analysis, opinion & knowledge media company that sharply focuses on politics, policy, government and governance. Start your mornings with our journalists who bring you the big story of the day in ThePrintAM. ThePrintPod offers you our special reports and opinions for when you‘re on the go. End your day with our most popular show ‘Cut The Clutter’ by Editor-in-Chief Shekhar Gupta. But that’s not all. We also have Pure Science, National Interest, ThePrint Uninterrupted, ...
…
continue reading
Code WACK! shines a light on our callous healthcare system and what we can do about it. It reveals the healthcare hassles that - far from being just annoying - threaten our peace of mind, our financial security and at times, our very lives. Join us each week as we chat about the challenges that patients and healthcare providers face, amplifying their voices and examining a range of possible solutions, including Medicare for All. Powered by HEAL California, a project of the California OneCare ...
…
continue reading
Code Patrol scrutinizes the month’s tech scene with code-colored glasses. Computer security industry veteran Lisa Vaas chats with guests about all things security — be it cybercrime, hacking, DevSecOps, and beyond — that collide with the code that runs the world.
…
continue reading
Learn to Code is a podcast hosted by Chris Castiglione (OneMonth.com) based in Brooklyn, NY. Each week Chris interviews successful business founders, startups and programmers to ask them: How did you learn to code? What tips and tricks do you have for finding meaningful work? Learn more about One Month and the Learn to Code podcast at www.onemonth.com.
…
continue reading
The law affects our lives and our society in many unique and profound ways. Reasonably Speaking, produced by The American Law Institute, features interviews with legal experts on some of the most important legal topics of our time. Each episode takes you through the law in action, beyond courtrooms and casebooks. Whether you are a legal scholar or a concerned citizen, this examination of the relationship between our laws and our society will leave you with a better understanding of how we go ...
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
Entertaining information focused on Fintech industry insights, market trends, news, and life stories from Fintech leaders, thinkers, and doers.
…
continue reading
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
…
continue reading

1
Security Code: Kashmir’s Leepa Valley is on fire. Is a new war brewing on the Line of Control?
10:33
10:33
Play later
Play later
Lists
Like
Liked
10:33Almost as an afterthought, India grabbed several key peaks along the northern stretches of the Line of Control in 1971. Those stretches have long been used to launch punitive raids across the LoC, notably in 2016, and many Indian planners are wondering if seizing some heights would send a strong strategic message to Pakistan.…
…
continue reading

1
Dustin Lehr - Code, Culture, and Community
1:04:44
1:04:44
Play later
Play later
Lists
Like
Liked
1:04:44Dustin Lehr joined Security Journey as Director of Application Security Advocacy. With nearly two decades of experience as a software engineer, application architect, and cybersecurity leader, Dustin has ample expertise in the industry. In this episode of The Security Champions Podcast, Dustin joined to explore the interconnected roles of secure co…
…
continue reading

1
Actively Exploited: Commvault Web Shells, Active! mail RCE, and Brocade Code Injection Now in KEV
17:21
17:21
Play later
Play later
Lists
Like
Liked
17:21Three actively exploited vulnerabilities—CVE-2025-42599 (Qualitia Active! mail), CVE-2025-3928 (Commvault Web Server), and CVE-2025-1976 (Broadcom Brocade Fabric OS)—have been added to CISA’s KEV catalog. The Qualitia flaw is a remote stack-based buffer overflow (CVSS 9.8) allowing code execution without authentication. Commvault's vulnerability pe…
…
continue reading

1
Ep. 8 – OTP Flaw & Remote Code Execution: When Small Flaws Go Critical
15:45
15:45
Play later
Play later
Lists
Like
Liked
15:45A broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 0…
…
continue reading

1
EP 122 From Marine to Mentor: The Jonathan Perillo Code
53:34
53:34
Play later
Play later
Lists
Like
Liked
53:34Send us a text Summary of Episode: 🎙️ Episode Summary: Jonathan Perillo on Purpose, Mentorship, and the Evolving Security Industry Introduction & Background Jonathan shares his journey from joining the U.S. Marines post-9/11 to building a career in private security. His early interest in the Coast Guard shifted to the Marines after meeting a recrui…
…
continue reading

1
Progress and Gaps in Securing Salesforce Digital Experiences
29:51
29:51
Play later
Play later
Lists
Like
Liked
29:51Protecting Salesforce digital experiences is critical to delivering the seamless, secure services your customers expect. Join Justin Hazard, Principal Security Architect at AutoRABIT, and Matt Meyers, Salesforce Certified Technical Architect and CEO of Adaptus, as they dive into the challenges and strategies for safeguarding Salesforce digital expe…
…
continue reading

1
Updating Risk Assessment in the CERT Secure Coding Standard
26:04
26:04
Play later
Play later
Lists
Like
Liked
26:04Bringing a codebase into compliance with the SEI CERT Coding Standards, requires a cost of time and effort, namely in the form of a static analysis tool. But those who are familiar with static analysis tools know that the alerts are not always reliable and produce false positives that must be detected and disregarded. This year, we plan on making s…
…
continue reading

1
Autonomous ships, cyber security and the workboat code
19:06
19:06
Play later
Play later
Lists
Like
Liked
19:06In this conversation, Felix and Oli discuss the development of a hydrogen-powered uncrewed surface vessel (USV) and the associated cybersecurity challenges. They explore the importance of integrating cybersecurity measures from the outset, navigating regulatory frameworks like Workboat Code 3, and the ongoing challenges of ensuring compliance and s…
…
continue reading

1
Episode 83: Managed Security (w/ Mihaela and Shawn)
25:11
25:11
Play later
Play later
Lists
Like
Liked
25:11In this episode of The Low Code Approach, we are joined by Mihaela Blendea and Shawn Nandi to dive into the transformative world of Managed Security for Microsoft Power Platform. Discover how this suite of advanced security features is revolutionizing the way organizations protect their data, manage access, and ensure compliance in an AI-driven era…
…
continue reading

1
NationalInterest: Caste Census is a bad idea & shows Rahul dragging Modi away from Nagpur, to Lohia. Worse lies ahead
10:52
10:52
Play later
Play later
Lists
Like
Liked
10:52#nationalinterest ‘The announcement of caste census has come in the build-up to the Bihar elections. The census may conclude just ahead of the Uttar Pradesh elections. The reason we call this move a bad idea is because nobody has figured out what to do with the data, except Rahul Gandhi’— Watch this week's #NationalInterest with Shekhar Gupta -----…
…
continue reading

1
ThePrintAM: WHAT IS THE NANGAL WATER SHARING DISPUTE BETWEEN PUNJAB & HARYANA?
15:57
15:57
Play later
Play later
Lists
Like
Liked
15:57By ThePrint
…
continue reading

1
CutTheClutter: Bilawal Bhutto’s interview signals Pakistan Army wants politicians to lead charge on Pahalgam
12:05
12:05
Play later
Play later
Lists
Like
Liked
12:05#cuttheclutter Pakistan has put forward its political faces to present its case after India’s punitive measures in wake of Pahalgam attack. Defence Minister Khawaja Asif was the first, then came PPP chief Bilawal Bhutto Zardari. In Episode 1653 of #CutTheClutter Editor-in-Chief Shekhar Gupta explains the reasons behind this approach and looks at th…
…
continue reading

1
Nova Scotia Power, a Canadian Utility, Breached: A Global Warning for Critical Infrastructure
11:46
11:46
Play later
Play later
Lists
Like
Liked
11:46On April 25, 2025, Nova Scotia Power, the province’s primary electricity provider, confirmed what many suspected: a cyber incident involving unauthorized access had compromised customer data. But what looked at first like an isolated disruption is, in reality, a single node in a much broader—and much more dangerous—global pattern. In this episode, …
…
continue reading

1
ThePrintPod: Use PMLA judiciously, don’t lose leverage by making early arrests—ASG Raju advises ED officers
4:52
4:52
Play later
Play later
Lists
Like
Liked
4:52Speaking on the occasion of ED's foundation day, the additional solicitor general also said officers should should take their time, get the evidence, take the statement & then arrest.By ThePrint
…
continue reading

1
When life gives you LLMs... (Friends)
1:40:24
1:40:24
Play later
Play later
Lists
Like
Liked
1:40:24Our old friend, Zeno Rocha, returns to discuss email etiquette, the strange new world of AI SEO, the coming LLM enshittification, and SLATE Auto – the just-announced $20k modular EV truck. Join the discussion Changelog++ members get a bonus 3 minutes at the end of this episode and zero ads. Join today! Sponsors: Heroku – The Next Generation of Hero…
…
continue reading

1
ThePrintPod: The Centre must use the caste census wisely
5:06
5:06
Play later
Play later
Lists
Like
Liked
5:06The caste census will also reveal the status of disadvantaged groups within Muslims and Christians, sparking a new debate.By ThePrint
…
continue reading

1
SentinelOne Discloses Ongoing Attacks by Nation-State Hackers and Ransomware Gangs
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50In a rare move, SentinelOne has publicly confirmed that it is under persistent attack from nation-state threat actors and ransomware gangs. This episode breaks down their recent report detailing how these adversaries—some believed to be backed by China and North Korea—are targeting SentinelOne to gain insight into how thousands of environments are …
…
continue reading

1
Writings on The Wall: Pakistan, a National Security State, that suspects all, most of all its own | Writings on the Wall
26:05
26:05
Play later
Play later
Lists
Like
Liked
26:05Pakistan, a National Security State, that suspects all, most of all its own | Writings on the WallBy ThePrint
…
continue reading

1
OpenEoX and the Future of End-of-Life Standardization in IT
12:01
12:01
Play later
Play later
Lists
Like
Liked
12:01In this episode, we unpack the evolving landscape of Product Lifecycle Management (PLM) and why it's become a strategic cornerstone in modern IT environments. From conception to retirement, managing a product’s lifecycle is now about more than just operations—it's about security, compliance, innovation, and cost. We explore the critical milestones …
…
continue reading
We discuss a schism years in the making — the infamous imageboard 4chan gets hacked by its own offshoot, Soyjak.party, in a breach that exposed moderator identities, source code, and shattered the myth of online anonymity. Then, we look at Cluely — an AI tool built by a suspended student to help users “cheat” on job interviews — and the viral campa…
…
continue reading

1
Improving on a 30-year-old hardware architecture
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:54SambaNova makes a full-stack AI platform and an “intelligent chip” capable of running models of up to five trillion parameters, allowing developers to run state-of-the-art open source models without the time-consuming work of tuning and modeling. See what developers are building with the tech. Find Rodrigo on LinkedIn. This episode was recorded at …
…
continue reading

1
SANS Stormcast Friday, May 2nd: More Steganography; Malicious Python Packages GMail C2; BEC to Steal Rent Payments
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
…
continue reading

1
ThePrintAM: WHAT IS THE US-UKRAINE MINERALS DEAL?
5:02
5:02
Play later
Play later
Lists
Like
Liked
5:02By ThePrint
…
continue reading

1
Chasing that next BIG thing (Interview)
1:39:39
1:39:39
Play later
Play later
Lists
Like
Liked
1:39:39Drew Wilson is back! It’s been more than a decade since Adam and Drew have spoken and wow, Drew has been busy. He built Plasso and got acquired by GoDaddy. He built a bank called Letter which didn’t work out…and now he’s Head of Design at Clerk and back to chasing that next big thing. Join the discussion Changelog++ members save 7 minutes on this e…
…
continue reading

1
CutTheClutter: India’s security architecture, its evolution since 1962 War & how it differs from Pakistan’s
21:35
21:35
Play later
Play later
Lists
Like
Liked
21:35#cuttheclutter Pakistan has a new National Security Adviser (NSA). In Episode 1652 of #CutTheClutter @ShekharGupta contrasts this with India’s reconstitution of its National Security Advisory Board, involving balanced representation from the armed forces, police, and diplomacy; he also contextualises these developments within broader civil-military…
…
continue reading

1
ThePrintPod: Any cross-border strike by India faces a potential drawback. It may be seen as underwhelming
11:11
11:11
Play later
Play later
Lists
Like
Liked
11:11The response of Kashmiris has been an outcome that is a true game-changer. The present government has an opportunity to claim ownership over this final and happy chapter.By ThePrint
…
continue reading

1
ThePrintPod: Retd Bangladeshi major general calls for ‘occupation’ of India’s Northeast if it attacks Pakistan
5:31
5:31
Play later
Play later
Lists
Like
Liked
5:31ALM Fazlur Rahman, who heads the seven-member commission probing the 2009 BDR mutiny, made the comment Tuesday on Facebook amid heightened India-Pakistan tension.By ThePrint
…
continue reading

1
SANS Stormcast Thursday, May 1st: Sonicwall Attacks; Cached Windows RDP Credentials
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
…
continue reading

1
ThePrintAM: What's behind Centre's caste census announcement?
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20By ThePrint
…
continue reading

1
LayerX Secures $45M Total to Battle Data Leaks, One Browser at a Time
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46LayerX just raised another $11 million — and it’s not to build another antivirus. With $45 million in total funding, the company is betting that your browser is the most vulnerable—and most overlooked—part of your cybersecurity stack. In this episode, we explore how LayerX turns everyday browsers like Chrome and Firefox into intelligent defense age…
…
continue reading

1
CutTheClutter: Pakistan's offer of neutral probe into Pahalgam attack is a tool to distract. Think 26/11, Pathankot
26:01
26:01
Play later
Play later
Lists
Like
Liked
26:01#cuttheclutter Pakistan has offered to cooperate if India were willing to agree to a neutral probe into the Pahalgam terror attack. In Episode 1651 of #CutTheClutter Editor-in-Chief Shekhar Gupta looks at past instances of Islamabad offering cooperation in the aftermath of a terror attack in India, and explains how it might be a strategy to virtue …
…
continue reading

1
ThePrintPod: How Trump factor & central bank background led Mark Carney to victory in Canadian elections
5:32
5:32
Play later
Play later
Lists
Like
Liked
5:32The Liberal Party's victory is a remarkable turnaround from a few short months ago when opinion polls guaranteed a total wipeout in favour of the Conservatives led by Pierre Poilievre.By ThePrint
…
continue reading

1
ThePrintPod15 years after CWG ‘scam’, why a Delhi court accepted ED’s closure report against Suresh Kalmadi
4:19
4:19
Play later
Play later
Lists
Like
Liked
4:19As original CBI case was closed in 2016, ED noted that no 'scheduled offence' was committed by the accused. Money laundering probe fell flat as predicate offence was absent.By ThePrint
…
continue reading

1
ThePrintPod: IPL expansion will kill Test cricket. Players no longer care about playing for the country
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16One of the founding philosophies of the BCCI has been to effectively control the game in India. The IPL has dented that control.By ThePrint
…
continue reading

1
$10.5M to Fight AI-Phishing: The Rise of Pistachio’s Cybersecurity Training Platform
13:04
13:04
Play later
Play later
Lists
Like
Liked
13:04In this episode, we dive into the story of Pistachio, the Norwegian cybersecurity startup that just raised $7 million in new funding—bringing its total to $10.5 million. Pistachio isn’t building another firewall or antivirus tool; it’s targeting the weakest link in most security systems: people. With AI-powered phishing attacks becoming increasingl…
…
continue reading

1
AirBorne: How a Zero-Click Bug Threatens Millions of Apple and Third-Party Devices
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23In this episode, we dive deep into AirBorne — a critical set of vulnerabilities in Apple’s AirPlay protocol and SDK, recently uncovered by security researchers at Oligo. These flaws enable zero-click, wormable remote code execution (RCE) attacks across iPhones, Macs, Apple TVs, CarPlay systems, and millions of third-party devices. Even more alarmin…
…
continue reading

1
#44 How to Hack What No One Teaches ft. Noah Pack
33:17
33:17
Play later
Play later
Lists
Like
Liked
33:17In this episode of The Hacker’s Cache, I sit down with Noah Pack, an aerospace pentester with a ridiculous cert stack and an unconventional mindset. We talk about hacking obscure systems with no public tools or documentation, transitioning from SOC analyst to pentester, and why reading the manual might be your secret weapon. If you’ve ever wondered…
…
continue reading

1
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
…
continue reading

1
ThePrintAM: Why has SC ordered CBI probe into 'Builder-Bank nexus'?
5:37
5:37
Play later
Play later
Lists
Like
Liked
5:37ThePrintAM: Why has SC ordered CBI probe into 'Builder-Bank nexus'?By ThePrint
…
continue reading
Zero Trust is a security model based on default-deny policies and fine-grained access control governed by identity, authentication, and contextual signals. For RSAC 2025, John Kindervag, Chief Evangelist of Illumio and the creator of Zero Trust, talks about introducing a "protect surface" into legacy OT systems —isolating critical data, application…
…
continue reading

1
CutTheClutter: Modi chairs key security meet as India's forces 'spot' Pahalgam attackers,& tech used by LeT in J&K
21:46
21:46
Play later
Play later
Lists
Like
Liked
21:46#cuttheclutter A week since Pahalgam terror attack that claimed 26 lives, top level huddles are underway in Delhi to calibrate India’s response. PM Modi chaired a key meeting with the Defence Minister, NSA, CDS & Chiefs of the three Armed Forces on Tuesday. In Kashmir, India’s security forces have reportedly ‘spotted’ terrorists behind the attack. …
…
continue reading

1
The Silent Majority: Why 51% of Internet Traffic Is Now Bots
13:03
13:03
Play later
Play later
Lists
Like
Liked
13:03The bots have taken over—and they’re not just crawling your website. In this episode, we dig into the alarming reality that automated bots now generate over half of all internet traffic. Armed with artificial intelligence and cloaked in residential proxies, these bots are evolving beyond simple scripts into highly evasive, persistent threats target…
…
continue reading

1
ThePrintPOD: Delhi Police awaits new ‘reverse image search’ software for quick suspect identification. How it’ll work
3:33
3:33
Play later
Play later
Lists
Like
Liked
3:33ThePrintPOD: Delhi Police awaits new ‘reverse image search’ software for quick suspect identification. How it’ll workBy ThePrint
…
continue reading

1
ThePrintPOD: India’s delimitation debate needs bigger ideas, not just bigger numbers. Here are the options
7:52
7:52
Play later
Play later
Lists
Like
Liked
7:52ThePrintPOD: India’s delimitation debate needs bigger ideas, not just bigger numbers. Here are the optionsBy ThePrint
…
continue reading

1
Episode 85: We're Chatting Agents! (w/ Mark Smith)
30:57
30:57
Play later
Play later
Lists
Like
Liked
30:57In this episode, Ken, Sean, and Jocelyn sit down with industry expert Mark Smith, the NZ365 guy, to explore the current state of AI agents in the real world. They delve into the practical applications, challenges, and innovations surrounding AI agents, discussing how these intelligent systems are transforming various industries. From personal produ…
…
continue reading

1
The Case For Steward Ownership And Open Source With Melanie Rieback
44:11
44:11
Play later
Play later
Lists
Like
Liked
44:11Episode Summary Is the traditional Silicon Valley startup model harming the security industry? In this episode of The Secure Developer, Danny Allan talks with Melanie Rieback, founder of Radically Open Security, about shaking up the industry with nonprofit business models. Tuning in, you’ll learn about the inner workings of Radically Open Security …
…
continue reading

1
From 1,382 to 4 Million: What VeriSource Didn’t Know (or Say)
9:02
9:02
Play later
Play later
Lists
Like
Liked
9:02In this episode, we investigate the massive data breach at VeriSource Services, Inc. (VSI), a Houston-based HR outsourcing and employee benefits administrator. Initially reported as affecting fewer than 2,000 individuals, the breach has now ballooned to a confirmed 4 million affected people. We trace the timeline from the initial detection of suspi…
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading