show episodes
 
Artwork
 
Get behind-the-scenes insights into the world of internal ML platforms and MLOps stack components with Piotr Niedźwiedź and Aurimas Griciūnas in their show, where together with ML platform professionals, they discuss design choices, best practices, and real-world solutions to MLOps challenges. Brought to you by neptune.ai.
  continue reading
 
Machine learning and artificial intelligence are dramatically changing the way businesses operate and people live. The TWIML AI Podcast brings the top minds and ideas from the world of ML and AI to a broad and influential community of ML/AI researchers, data scientists, engineers and tech-savvy business and IT leaders. Hosted by Sam Charrington, a sought after industry analyst, speaker, commentator and thought leader. Technologies covered include machine learning, artificial intelligence, de ...
  continue reading
 
Artwork

1
Matthew Leblanc Jr Podcast/Beats FamousMatt Real Topics Real Life Diamond TV 💎One ml

Matthew Leblanc Jr Podcast/Beats FamousMatt Real Topics Real Life Diamond TV 💎1

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Matthew Leblanc Jr Podcast/Beats FamousMatt Host Is a lay-back "Radio Podcast Station" with real News, topics & newly instrumental listening beats by me. Updates about what's going on Worldwide. Motivation and encouragement in these last days. I'm a podcaster and YouTube creator of streaming Platform Membership subscription service.. Diamond TV 💎 One ml
  continue reading
 
Artwork

1
Fireside AI

Catherine Breslin

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
AI is transforming our world - in science, healthcare, finance, and beyond. With rapid advancements in large language models, automation, and machine learning, companies are racing to build smarter, more efficient systems that shape the future. But how do you go from an AI idea to a scalable, impactful solution? Building and scaling AI isn’t just about the technology. It’s also about making the right strategic decisions. AI founders need to consider everything from data quality and model per ...
  continue reading
 
Welcome to Building Reddit. In this podcast, host Ryan H. Lewis will take you behind the scenes into how Reddit is built. From some of the coolest projects like Reddit Recap and Collectible Avatars, to the daily work lives of Reddit's employees. You’ll hear from software engineers, product managers, data scientists, community managers, marketers, and more!
  continue reading
 
Artwork

1
alphalist.CTO Podcast - For CTOs and Technical Leaders

Tobias Schlottke - alphalist CTO Podcast

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
This podcast features interviews of CTOs and other technical leadership figures and topics range from technology (AI, blockchain, cyber, DevOps, Web Architecture, etc.) to management (e.g. scaling, structuring teams, mentoring, technical recruiting, product etc.). Guests from leading tech companies share their best practices and knowledge. The goal is to support other CTOs on their journey through tech and engineering, inspire and allow a sneak-peek into other successful companies to underst ...
  continue reading
 
Artwork

1
Kaituhi Kōrero | Author Talks

Kaituhi Kōrero | Author Talks

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Kaituhi Kōrero | Author Talks Kaituhi Kōrero - Author Talks is a podcast dedicated to shining a light on the experiences, stories, and creative journeys of Indie Authors in New Zealand and Australia. Sponsored by Pae Pukapuka, this platform dives deep into the writing process, the challenges and triumphs of Indie publishing, and the connections between authors and their characters. Through heartfelt conversations, Kaituhi Kōrero celebrates the voices that shape our literary landscape and bri ...
  continue reading
 
Artwork

1
[Array] Podcast

Shruti Gandhi

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to the Array Podcast. The platform to discover an array of hacks and skills you need at different stages of building your business. On each episode, we host successful entrepreneurs who share their secrets on growing an enterprise businesses that leverage data and AI/ML.
  continue reading
 
Welcome to The Data Flowcast: Mastering Apache Airflow ® for Data Engineering and AI— the podcast where we keep you up to date with insights and ideas propelling the Airflow community forward. Join us each week, as we explore the current state, future and potential of Airflow with leading thinkers in the community, and discover how best to leverage this workflow management system to meet the ever-evolving needs of data engineering and AI ecosystems. Podcast Webpage: https://www.astronomer.io ...
  continue reading
 
Artwork
 
The Unexplored Territory Podcast is a bi-weekly show focussing on datacenter and cloud related topics, with a heavy emphasis on VMware/Broadcom products and the VMware ecosystem. The show is hosted by Duncan Epping (author of Yellow-Bricks.com, and the vSphere Clustering and vSAN Deep Dive book series), and each episode will feature an industry-leading expert to dive deep into their area of expertise.
  continue reading
 
Artwork

1
QuantSpeak

CQF Institute

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Expert insights from quants for quants. Listen to QuantSpeak to hear from thought leaders in quant finance as they share their insights into the latest research and industry practice. QuantSpeak is created by the CQF Institute. Part of Fitch Learning, the CQF Institute is the awarding body for the Certificate in Quantitative Finance and provides a platform for educating and building the global quantitative finance community. Find out more at www.cqfinstitute.org
  continue reading
 
Artwork

1
Camunda Community Podcast

Camunda Community Podcast

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to the Camunda Community Podcast, your source for information about BPMN, DMN, and general process orchestration topics. Host and Camunda Senior Developer Advocate Niall Deehan and members of our Developer Relations team will dive deep with subject matter experts into topics like process automation, orchestration, and optimization; how you can contribute to the future of process orchestration; Camunda 8; leveraging AI and ML in your processes; scaling process automation; building and ...
  continue reading
 
Loading …
show series
 
SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
  continue reading
 
Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
  continue reading
 
Kia ora and welcome back to Kaituhi Kōrero. In this compelling episode, join your host, Jess, for the second part of an insightful kōrero with Lizzi Tremayne, an award-winning historical fiction author, equine vet, and indie publishing advocate. In this episode, Lizzi shares the behind-the-scenes challenges of being an indie author, exploring topic…
  continue reading
 
Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
  continue reading
 
The Airflow 3.0 release marks a significant leap forward in modern data orchestration, introducing architectural upgrades that improve scalability, flexibility and long-term maintainability. In this episode, we welcome Vikram Koka, Chief Strategy Officer at Astronomer, and Jed Cunningham, Principal Software Engineer at Astronomer, to discuss the ar…
  continue reading
 
Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
  continue reading
 
In this episode, Kelly Hong, a researcher at Chroma, joins us to discuss "Generative Benchmarking," a novel approach to evaluating retrieval systems, like RAG applications, using synthetic data. Kelly explains how traditional benchmarks like MTEB fail to represent real-world query patterns and how embedding models that perform well on public benchm…
  continue reading
 
xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
  continue reading
 
It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL. https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%2…
  continue reading
 
⁠For this episode I decided to invite Johan van Amersfoort to discuss with us his experiences at NVIDIA GTC, Kubecon London, and of course the Dutch VMUG. Or should we say, the start of event season? Johan shared countless of updates and videos on LinkedIn, make sure to check those out while you are at it! Disclaimer: The thoughts and opinions shar…
  continue reading
 
Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widesp…
  continue reading
 
In this episode of Kaituhi Kōrero, host Jess invites you to explore the inspiring journey of award-winning author and dedicated equine veterinarian, Lizzie Tremayne. Renowned for her historical fiction, Lizzi weaves tales of adventure, resilience, and the human spirit, drawing from her richly varied life experiences. Delve into the first part of th…
  continue reading
 
RedTail: Remnux and Malware Management A description showing how to set up a malware analysis in the cloud with Remnux and Kasm. RedTail is a sample to illustrate how the environment can be used. https://isc.sans.edu/diary/RedTail%2C%20Remnux%20and%20Malware%20Management%20%5BGuest%20Diary%5D/31868 Critical Erlang/OTP SSH Vulnerability Researchers …
  continue reading
 
Debunking AI hype, exploring security risks, and strategies for CTOs in the age of rapid change. In this episode, Tobi talks with Georg Zoeller, Co-Founder of the Centre for AI Leadership and mercenaries.ai, about the turbulent landscape of AI. Georg, with his background at Meta and deep expertise in AI strategy, cuts through the hype surrounding A…
  continue reading
 
The evolution of data orchestration at Instacart highlights the journey from fragmented systems to robust, standardized infrastructure. This transformation has enabled scalability, reliability and democratization of tools for diverse user personas. In this episode, we’re joined by Anant Agarwal, Software Engineer at Instacart, who shares insights i…
  continue reading
 
Apple Updates Apple released updates for iOS, iPadOS, macOS, and VisionOS. The updates fix two vulnerabilities which had already been exploited against iOS. https://isc.sans.edu/diary/Apple%20Patches%20Exploited%20Vulnerability/31866 Oracle Updates Oracle released it quarterly critical patch update. The update addresses 378 security vulnerabilities…
  continue reading
 
Online Services Again Abused to Exfiltrate Data Attackers like to abuse free online services that can be used to exfiltrate data. From the originals , like pastebin, to past favorites like anonfiles.com. The latest example is gofile.io. As a defender, it is important to track these services to detect exfiltration early https://isc.sans.edu/diary/On…
  continue reading
 
xorsearch Update Diedier updated his "xorsearch" tool. It is now a python script, not a compiled binary, and supports Yara signatures. With Yara support also comes support for regular expressions. https://isc.sans.edu/diary/xorsearch.py%3A%20Searching%20With%20Regexes/31854 Shorter Lived Certificates The CA/Brower Forum passed an update to reduce t…
  continue reading
 
In this episode, Emmanuel Ameisen, a research engineer at Anthropic, returns to discuss two recent papers: "Circuit Tracing: Revealing Language Model Computational Graphs" and "On the Biology of a Large Language Model." Emmanuel explains how his team developed mechanistic interpretability methods to understand the internal workings of Claude by rep…
  continue reading
 
Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248) After spotting individaul attempts to exploit the recent Langflow vulnerability late last weeks, we now see more systematic internet wide scans attempting to verify the vulnerability. https://isc.sans.edu/forums/diary/Exploit+Attempts+for+Recent+Langflow+AI+Vulnerability+CVE20253…
  continue reading
 
Network Infraxploit Our undergraduate intern, Matthew Gorman, wrote up a walk through of CVE-2018-0171, an older Cisco vulnerability, that is still actively being exploited. For example, VOLT TYPHOON recently exploited this problem. https://isc.sans.edu/diary/Network+Infraxploit+Guest+Diary/31844 Windows Update Issues / Windows 10 Update Microsoft …
  continue reading
 
Data orchestration at scale presents unique challenges, especially when aiming for flexibility and efficiency across cloud environments. Choosing the right tools and frameworks can make all the difference. In this episode, Raviteja Tholupunoori, Senior Engineer at Deloitte Digital, joins us to explore how Airflow enhances orchestration, scalability…
  continue reading
 
Getting Past PyArmor PyArmor is a python obfuscation tool used for malicious and non-malicious software. Xavier is taking a look at a sample to show what can be learned from these obfuscated samples with not too much work. https://isc.sans.edu/diary/Obfuscated%20Malicious%20Python%20Scripts%20with%20PyArmor/31840 CenterStack RCE CVE-2025-30406 Glad…
  continue reading
 
Microsoft Patch Tuesday Microsoft patched over 120 vulnerabilities this month. 11 of these were rated critical, and one vulnerability is already being exploited. https://isc.sans.edu/diary/Microsoft%20April%202025%20Patch%20Tuesday/31838 Adobe Updates Adobe released patches for 12 different products. In particular important are patches for Coldfusi…
  continue reading
 
Today, we're joined by Maohao Shen, PhD student at MIT to discuss his paper, “Satori: Reinforcement Learning with Chain-of-Action-Thought Enhances LLM Reasoning via Autoregressive Search.” We dig into how Satori leverages reinforcement learning to improve language model reasoning—enabling model self-reflection, self-correction, and exploration of a…
  continue reading
 
XORsearch: Searching With Regexes Didier explains a workaround to use his tool XORsearch to search for regular expressions instead of simple strings. https://isc.sans.edu/diary/XORsearch%3A%20Searching%20With%20Regexes/31834 MCP Security Notification: Tool Poisoning Attacks Invariant labs summarized a critical weakness in the Model Context Protocol…
  continue reading
 
Recently Broadcom announced that vSAN ESA support for SAP HANA was introduced. Erik Rieger is Broadcom's Principal SAP Global Technical Alliance Manager and Architect, and as such I invited him on the show to go over what this actually means, and why this is important for customers! For more details make sure to check: SAP note 3406060 – SAP HANA o…
  continue reading
 
New SSH Username Report A new ssh/telnet username reports makes it easier to identify new usernames attackers are using against our telnet and ssh honeypots https://isc.sans.edu/diary/New%20SSH%20Username%20Report/31830 Quickshell Sharing is Caring: About an RCE Attack Chain on Quick Share The Google Quick Share protocol is susceptible to several v…
  continue reading
 
In this exciting episode of Kaituhi Kōrero, join host Jess as she delves into the world of independent publishing with Brisbane-based author M.L. Jewell, affectionately known as Mel. Mel shares the journey behind her debut novel, Rise of the Witches, a captivating dark urban fantasy that hit bookshelves in October 2023. Listeners are invited to exp…
  continue reading
 
Welcome to another episode of Kaituhi Kōrero with your host, Jess. In this engaging conversation, we dive into the creative world of M.L. Jewell, known as Mel, a Brisbane-based indie author who recently published her debut novel, Rise of the Witches. This dark urban fantasy is not just any tale, it's a gripping narrative filled with flesh-eating mo…
  continue reading
 
Leading in ambiguous environments and the impact of AI on engineering practices In this episode, Tobi talks with Ivan Kusalic, CTO of Enpal, who leads a team of 250 engineers at one of Germany's leading solar energy companies. Ivan shares insights from his extensive technical leadership journey and his recent return to coding after seven years due …
  continue reading
 
Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive Using frequency analysis, and training the model with honeypot data as well as log data from legitimate websites allows for a fairly simple and reliable triage of web server logs to identify possible malicious activity. https://isc.sans.edu/diary/Exploring%20Statistical%20Mea…
  continue reading
 
The 2025 State of Airflow report sheds light on how global users are adopting, evolving and innovating with Apache Airflow. With over 5,000 responses from 116 countries, the survey reveals critical insights into Airflows’ role in business operations, new use cases and what’s ahead for the community. In this episode, Tamara Fingerlin, Developer Advo…
  continue reading
 
Surge in Scans for Juniper t128 Default User Lasst week, we dedtect a significant surge in ssh scans for the username t128 . This user is used by Juniper s Session Smart Routing, a product they acquired from 128 Technologies which is the reason for the somewhat unusual username. https://isc.sans.edu/diary/Surge%20in%20Scans%20for%20Juniper%20%22t12…
  continue reading
 
Apple Patches Everything Apple released updates for all of its operating systems. Most were released on Monday with WatchOS patches released today on Tuesday. Two already exploited vulnerabilities, which were already patched in the latest iOS and macOS versions, are now patched for older operating systems as well. A total of 145 vulnerabilities wer…
  continue reading
 
Apache Camel Exploit Attempt by Vulnerability Scans A recently patched vulnerability in Apache Camel has been integrated into some vulnerability scanners, like for example OpenVAS. We do see some exploit attempts in our honeypots, but they appear to be part of internal vulnerablity scans https://isc.sans.edu/diary/Apache%20Camel%20Exploit%20Attempt…
  continue reading
 
Today, we're joined by Drago Anguelov, head of AI foundations at Waymo, for a deep dive into the role of foundation models in autonomous driving. Drago shares how Waymo is leveraging large-scale machine learning, including vision-language models and generative AI techniques to improve perception, planning, and simulation for its self-driving vehicl…
  continue reading
 
In this conversation, Shawn Wen, co-founder and CTO of PolyAI, shares insights into the journey of building PolyAI into a successful series C AI startup focused on automating phone calls for contact centres. He discusses the early days of PolyAI, the challenges faced in scaling the team, the importance of company culture, and the evolving role of a…
  continue reading
 
A Tale of Two Phishing Sties Two phishing sites may use very different backends, even if the site itself appears to be visually very similar. Phishing kits are often copied and modified, leading to sites using similar visual tricks on the user facing site, but very different backends to host the sites and reporting data to the miscreant. https://is…
  continue reading
 
Sitecore "thumbnailsaccesstoken" Deserialization Scans (and some new reports) CVE-2025-27218 Our honeypots detected a deserialization attack against the CMS Sitecore using a thumnailaccesstoken header. The underlying vulnerability was patched in January, and security firm Searchlight Cyber revealed details about this vulnerability a couple of weeks…
  continue reading
 
The orchestration layer is evolving into a critical component of the modern data stack. Understanding its role in DataOps is key to optimizing workflows, improving reliability and reducing complexity. In this episode, Andy Byron, CEO at Astronomer, discusses the rapid growth of Apache Airflow, the increasing importance of orchestration and how Astr…
  continue reading
 
Leveraging CNNs and Entropy-Based Feature Selection to Identify Potential Malware Artifacts of Interest This diary explores a novel methodology for classifying malware by integrating entropy-driven feature selection with a specialized Convolutional Neural Network (CNN). Motivated by the increasing obfuscation tactics used by modern malware authors,…
  continue reading
 
XWiki Search Vulnerablity Exploit Attempts (CVE-2024-3721) Our honeypot detected an increase in exploit attempts for an XWiki command injection vulnerablity. The vulnerability was patched last April, but appears to be exploited more these last couple days. The vulnerability affects the search feature and allows the attacker to inject Groovy code te…
  continue reading
 
Find Chris on LinkedIn, and learn about Obrizum. I talk with Chris Pedder from Obrizum. Chris started his career as a Physicist, before moving into AI and Data. He is now Chief Data and AI Officer at Obrizum, who use AI to deliver adaptive learning. In this episode we talk about the behaviours that Chris intentionally fosters in his team, including…
  continue reading
 
Privacy Aware Bots A botnet is using privacy as well as CSRF prevention headers to better blend in with normal browsers. However, in the process they may make it actually easier to spot them. https://isc.sans.edu/diary/Privacy%20Aware%20Bots/31796 Critical Ingress Nightmare Vulnerability ingress-nginx fixed four new vulnerabilities, one of which ma…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play