Get behind-the-scenes insights into the world of internal ML platforms and MLOps stack components with Piotr Niedźwiedź and Aurimas Griciūnas in their show, where together with ML platform professionals, they discuss design choices, best practices, and real-world solutions to MLOps challenges. Brought to you by neptune.ai.
…
continue reading

1
The TWIML AI Podcast (formerly This Week in Machine Learning & Artificial Intelligence)
Sam Charrington
Machine learning and artificial intelligence are dramatically changing the way businesses operate and people live. The TWIML AI Podcast brings the top minds and ideas from the world of ML and AI to a broad and influential community of ML/AI researchers, data scientists, engineers and tech-savvy business and IT leaders. Hosted by Sam Charrington, a sought after industry analyst, speaker, commentator and thought leader. Technologies covered include machine learning, artificial intelligence, de ...
…
continue reading

1
Matthew Leblanc Jr Podcast/Beats FamousMatt Real Topics Real Life Diamond TV 💎One ml
Matthew Leblanc Jr Podcast/Beats FamousMatt Real Topics Real Life Diamond TV 💎1
Matthew Leblanc Jr Podcast/Beats FamousMatt Host Is a lay-back "Radio Podcast Station" with real News, topics & newly instrumental listening beats by me. Updates about what's going on Worldwide. Motivation and encouragement in these last days. I'm a podcaster and YouTube creator of streaming Platform Membership subscription service.. Diamond TV 💎 One ml
…
continue reading
AI is transforming our world - in science, healthcare, finance, and beyond. With rapid advancements in large language models, automation, and machine learning, companies are racing to build smarter, more efficient systems that shape the future. But how do you go from an AI idea to a scalable, impactful solution? Building and scaling AI isn’t just about the technology. It’s also about making the right strategic decisions. AI founders need to consider everything from data quality and model per ...
…
continue reading
Welcome to Building Reddit. In this podcast, host Ryan H. Lewis will take you behind the scenes into how Reddit is built. From some of the coolest projects like Reddit Recap and Collectible Avatars, to the daily work lives of Reddit's employees. You’ll hear from software engineers, product managers, data scientists, community managers, marketers, and more!
…
continue reading
This podcast features interviews of CTOs and other technical leadership figures and topics range from technology (AI, blockchain, cyber, DevOps, Web Architecture, etc.) to management (e.g. scaling, structuring teams, mentoring, technical recruiting, product etc.). Guests from leading tech companies share their best practices and knowledge. The goal is to support other CTOs on their journey through tech and engineering, inspire and allow a sneak-peek into other successful companies to underst ...
…
continue reading
Giggso is a No-Code ModelOps Observability platform for Data Science, Engineering teams, and Business execs.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Kaituhi Kōrero | Author Talks Kaituhi Kōrero - Author Talks is a podcast dedicated to shining a light on the experiences, stories, and creative journeys of Indie Authors in New Zealand and Australia. Sponsored by Pae Pukapuka, this platform dives deep into the writing process, the challenges and triumphs of Indie publishing, and the connections between authors and their characters. Through heartfelt conversations, Kaituhi Kōrero celebrates the voices that shape our literary landscape and bri ...
…
continue reading
Join us for our upcoming podcast series on ecommerce growth where we focus on platform preferences, personalisation, delivery, acquisition and much more.
…
continue reading
Welcome to the Array Podcast. The platform to discover an array of hacks and skills you need at different stages of building your business. On each episode, we host successful entrepreneurs who share their secrets on growing an enterprise businesses that leverage data and AI/ML.
…
continue reading
Welcome to The Data Flowcast: Mastering Apache Airflow ® for Data Engineering and AI— the podcast where we keep you up to date with insights and ideas propelling the Airflow community forward. Join us each week, as we explore the current state, future and potential of Airflow with leading thinkers in the community, and discover how best to leverage this workflow management system to meet the ever-evolving needs of data engineering and AI ecosystems. Podcast Webpage: https://www.astronomer.io ...
…
continue reading
VC (advised two unicorns)/ Ranked Global No. 1 Finance Influencer by Refinitiv (Thomson Reuters)Ranked Global No. 1 Fintech, AI, Blockchain & No. 2 InsurTech Influencer by Onalytica
…
continue reading
The Unexplored Territory Podcast is a bi-weekly show focussing on datacenter and cloud related topics, with a heavy emphasis on VMware/Broadcom products and the VMware ecosystem. The show is hosted by Duncan Epping (author of Yellow-Bricks.com, and the vSphere Clustering and vSAN Deep Dive book series), and each episode will feature an industry-leading expert to dive deep into their area of expertise.
…
continue reading
Expert insights from quants for quants. Listen to QuantSpeak to hear from thought leaders in quant finance as they share their insights into the latest research and industry practice. QuantSpeak is created by the CQF Institute. Part of Fitch Learning, the CQF Institute is the awarding body for the Certificate in Quantitative Finance and provides a platform for educating and building the global quantitative finance community. Find out more at www.cqfinstitute.org
…
continue reading
Roger Peng and Hilary Parker talk about the latest in data science and data analysis in academia and industry.
…
continue reading
Welcome to the Camunda Community Podcast, your source for information about BPMN, DMN, and general process orchestration topics. Host and Camunda Senior Developer Advocate Niall Deehan and members of our Developer Relations team will dive deep with subject matter experts into topics like process automation, orchestration, and optimization; how you can contribute to the future of process orchestration; Camunda 8; leveraging AI and ML in your processes; scaling process automation; building and ...
…
continue reading

1
SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
…
continue reading

1
SANS Stormcast Monday, April 28th: Image Steganography; SAP Netweaver Exploited
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
…
continue reading
Kia ora and welcome back to Kaituhi Kōrero. In this compelling episode, join your host, Jess, for the second part of an insightful kōrero with Lizzi Tremayne, an award-winning historical fiction author, equine vet, and indie publishing advocate. In this episode, Lizzi shares the behind-the-scenes challenges of being an indie author, exploring topic…
…
continue reading

1
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues;
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
…
continue reading

1
Introducing Apache Airflow® 3 with Vikram Koka and Jed Cunningham
27:28
27:28
Play later
Play later
Lists
Like
Liked
27:28The Airflow 3.0 release marks a significant leap forward in modern data orchestration, introducing architectural upgrades that improve scalability, flexibility and long-term maintainability. In this episode, we welcome Vikram Koka, Chief Strategy Officer at Astronomer, and Jed Cunningham, Principal Software Engineer at Astronomer, to discuss the ar…
…
continue reading

1
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
…
continue reading

1
Generative Benchmarking with Kelly Hong - #728
54:17
54:17
Play later
Play later
Lists
Like
Liked
54:17In this episode, Kelly Hong, a researcher at Chroma, joins us to discuss "Generative Benchmarking," a novel approach to evaluating retrieval systems, like RAG applications, using synthetic data. Kelly explains how traditional benchmarks like MTEB fail to represent real-world query patterns and how embedding models that perform well on public benchm…
…
continue reading

1
SANS Stormcast Wednesday, April 23rd: More xorsearch Updates; DKIM Replay Attack; SSL.com Vulnerability Fixed
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
…
continue reading

1
SANS Stormcast Tuesday, April 22nd: Phishing via Google; ChatGPT Fingerprint; Asus AI Cloud Vuln; PyTorch RCE
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL. https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%2…
…
continue reading

1
#095 - Event Season Kickoff: NVIDIA GTC, KubeCon, and Dutch VMUG with Johan van Amersfoort
37:22
37:22
Play later
Play later
Lists
Like
Liked
37:22For this episode I decided to invite Johan van Amersfoort to discuss with us his experiences at NVIDIA GTC, Kubecon London, and of course the Dutch VMUG. Or should we say, the start of event season? Johan shared countless of updates and videos on LinkedIn, make sure to check those out while you are at it! Disclaimer: The thoughts and opinions shar…
…
continue reading

1
SANS Stormcast Monday, April 21st: MSFT Entra Lockouts; Erlang/OTP SSH Exploit; Sonicwall Exploit; bubble.io bug
7:31
7:31
Play later
Play later
Lists
Like
Liked
7:31Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widesp…
…
continue reading
In this episode of Kaituhi Kōrero, host Jess invites you to explore the inspiring journey of award-winning author and dedicated equine veterinarian, Lizzie Tremayne. Renowned for her historical fiction, Lizzi weaves tales of adventure, resilience, and the human spirit, drawing from her richly varied life experiences. Delve into the first part of th…
…
continue reading

1
SANS Stormcast Friday, April 18th: Remnux Cloud Environment; Erlang/OTP SSH Vuln; Brickstorm Backdoor Analysis; GPT 4.1 Safety Controversy
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18RedTail: Remnux and Malware Management A description showing how to set up a malware analysis in the cloud with Remnux and Kasm. RedTail is a sample to illustrate how the environment can be used. https://isc.sans.edu/diary/RedTail%2C%20Remnux%20and%20Malware%20Management%20%5BGuest%20Diary%5D/31868 Critical Erlang/OTP SSH Vulnerability Researchers …
…
continue reading

1
#120 - AI's Singularity & Commoditization: Navigating Hype vs. Reality with Georg Zoeller // Co-Founder @ C4AIL
1:13:51
1:13:51
Play later
Play later
Lists
Like
Liked
1:13:51Debunking AI hype, exploring security risks, and strategies for CTOs in the age of rapid change. In this episode, Tobi talks with Georg Zoeller, Co-Founder of the Centre for AI Leadership and mercenaries.ai, about the turbulent landscape of AI. Georg, with his background at Meta and deep expertise in AI strategy, cuts through the hype surrounding A…
…
continue reading

1
Airflow in Action: Powering Instacart's Complex Ecosystem
25:14
25:14
Play later
Play later
Lists
Like
Liked
25:14The evolution of data orchestration at Instacart highlights the journey from fragmented systems to robust, standardized infrastructure. This transformation has enabled scalability, reliability and democratization of tools for diverse user personas. In this episode, we’re joined by Anant Agarwal, Software Engineer at Instacart, who shares insights i…
…
continue reading

1
SANS Stormcast Thursday April 17th: Apple Updates; Oracle Updates; Google Chrome Updates; CVE News;
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04Apple Updates Apple released updates for iOS, iPadOS, macOS, and VisionOS. The updates fix two vulnerabilities which had already been exploited against iOS. https://isc.sans.edu/diary/Apple%20Patches%20Exploited%20Vulnerability/31866 Oracle Updates Oracle released it quarterly critical patch update. The update addresses 378 security vulnerabilities…
…
continue reading

1
SANS Stormcast Wednesday Apr 16th: File Upload Service Abuse; OpenSSH 10.0 Released; Apache Roller Vuln; Possible CVE Changes
5:54
5:54
Play later
Play later
Lists
Like
Liked
5:54Online Services Again Abused to Exfiltrate Data Attackers like to abuse free online services that can be used to exfiltrate data. From the originals , like pastebin, to past favorites like anonfiles.com. The latest example is gofile.io. As a defender, it is important to track these services to detect exfiltration early https://isc.sans.edu/diary/On…
…
continue reading

1
SANS Stormcast Tuesday April 15th: xorsearch Update; Short Lived Certificates; New USB Malware
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35xorsearch Update Diedier updated his "xorsearch" tool. It is now a python script, not a compiled binary, and supports Yara signatures. With Yara support also comes support for regular expressions. https://isc.sans.edu/diary/xorsearch.py%3A%20Searching%20With%20Regexes/31854 Shorter Lived Certificates The CA/Brower Forum passed an update to reduce t…
…
continue reading

1
Exploring the Biology of LLMs with Circuit Tracing with Emmanuel Ameisen - #727
1:34:06
1:34:06
Play later
Play later
Lists
Like
Liked
1:34:06In this episode, Emmanuel Ameisen, a research engineer at Anthropic, returns to discuss two recent papers: "Circuit Tracing: Revealing Language Model Computational Graphs" and "On the Biology of a Large Language Model." Emmanuel explains how his team developed mechanistic interpretability methods to understand the internal workings of Claude by rep…
…
continue reading

1
SANS Stormcast Monday April 14th: Langlow AI Attacks; Fortinet Attack Cleanup; MSFT Inetpub;
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248) After spotting individaul attempts to exploit the recent Langflow vulnerability late last weeks, we now see more systematic internet wide scans attempting to verify the vulnerability. https://isc.sans.edu/forums/diary/Exploit+Attempts+for+Recent+Langflow+AI+Vulnerability+CVE20253…
…
continue reading

1
SANS Stormcast Friday April 11th: Network Infraxploit; Windows Hello Broken; Dell Update; Langflow Exploit
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34Network Infraxploit Our undergraduate intern, Matthew Gorman, wrote up a walk through of CVE-2018-0171, an older Cisco vulnerability, that is still actively being exploited. For example, VOLT TYPHOON recently exploited this problem. https://isc.sans.edu/diary/Network+Infraxploit+Guest+Diary/31844 Windows Update Issues / Windows 10 Update Microsoft …
…
continue reading

1
From ETL to Airflow: Transforming Data Engineering at Deloitte Digital with Raviteja Tholupunoori
27:42
27:42
Play later
Play later
Lists
Like
Liked
27:42Data orchestration at scale presents unique challenges, especially when aiming for flexibility and efficiency across cloud environments. Choosing the right tools and frameworks can make all the difference. In this episode, Raviteja Tholupunoori, Senior Engineer at Deloitte Digital, joins us to explore how Airflow enhances orchestration, scalability…
…
continue reading

1
SANS Stormcast ThursdayApril 10th: Getting Past PyArmor; CenterStack RCE; Android 0-Day Patch; VMware Tanzu Patches; Odd Win11 Directory; WhatsApp File Confusion; SANS AI Guide;
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35Getting Past PyArmor PyArmor is a python obfuscation tool used for malicious and non-malicious software. Xavier is taking a look at a sample to show what can be learned from these obfuscated samples with not too much work. https://isc.sans.edu/diary/Obfuscated%20Malicious%20Python%20Scripts%20with%20PyArmor/31840 CenterStack RCE CVE-2025-30406 Glad…
…
continue reading

1
SANS Stormcast Wednesday, April 10th: Microsoft Patch Tuesday; Adobe Patches; OpenSSL 3.5 with PQC; Fortinet
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19Microsoft Patch Tuesday Microsoft patched over 120 vulnerabilities this month. 11 of these were rated critical, and one vulnerability is already being exploited. https://isc.sans.edu/diary/Microsoft%20April%202025%20Patch%20Tuesday/31838 Adobe Updates Adobe released patches for 12 different products. In particular important are patches for Coldfusi…
…
continue reading

1
Teaching LLMs to Self-Reflect with Reinforcement Learning with Maohao Shen - #726
51:45
51:45
Play later
Play later
Lists
Like
Liked
51:45Today, we're joined by Maohao Shen, PhD student at MIT to discuss his paper, “Satori: Reinforcement Learning with Chain-of-Action-Thought Enhances LLM Reasoning via Autoregressive Search.” We dig into how Satori leverages reinforcement learning to improve language model reasoning—enabling model self-reflection, self-correction, and exploration of a…
…
continue reading
XORsearch: Searching With Regexes Didier explains a workaround to use his tool XORsearch to search for regular expressions instead of simple strings. https://isc.sans.edu/diary/XORsearch%3A%20Searching%20With%20Regexes/31834 MCP Security Notification: Tool Poisoning Attacks Invariant labs summarized a critical weakness in the Model Context Protocol…
…
continue reading

1
#094 - Discussing SAP HANA support for vSAN ESA 8.x with Erik Rieger!
45:46
45:46
Play later
Play later
Lists
Like
Liked
45:46Recently Broadcom announced that vSAN ESA support for SAP HANA was introduced. Erik Rieger is Broadcom's Principal SAP Global Technical Alliance Manager and Architect, and as such I invited him on the show to go over what this actually means, and why this is important for customers! For more details make sure to check: SAP note 3406060 – SAP HANA o…
…
continue reading

1
SANS Stormcast Monday April 7th 2025: New Username Report; Quickshell Vulnerability; Apache Traffic Director Request Smuggeling
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14New SSH Username Report A new ssh/telnet username reports makes it easier to identify new usernames attackers are using against our telnet and ssh honeypots https://isc.sans.edu/diary/New%20SSH%20Username%20Report/31830 Quickshell Sharing is Caring: About an RCE Attack Chain on Quick Share The Google Quick Share protocol is susceptible to several v…
…
continue reading

1
Episode #3 - M L Jewell - Full Episode
1:05:02
1:05:02
Play later
Play later
Lists
Like
Liked
1:05:02In this exciting episode of Kaituhi Kōrero, join host Jess as she delves into the world of independent publishing with Brisbane-based author M.L. Jewell, affectionately known as Mel. Mel shares the journey behind her debut novel, Rise of the Witches, a captivating dark urban fantasy that hit bookshelves in October 2023. Listeners are invited to exp…
…
continue reading
Welcome to another episode of Kaituhi Kōrero with your host, Jess. In this engaging conversation, we dive into the creative world of M.L. Jewell, known as Mel, a Brisbane-based indie author who recently published her debut novel, Rise of the Witches. This dark urban fantasy is not just any tale, it's a gripping narrative filled with flesh-eating mo…
…
continue reading

1
#119 - Navigating Ambiguity and AI's Impact on Engineering feat. Ivan Kusalic // CTO @ Enpal
56:31
56:31
Play later
Play later
Lists
Like
Liked
56:31Leading in ambiguous environments and the impact of AI on engineering practices In this episode, Tobi talks with Ivan Kusalic, CTO of Enpal, who leads a team of 250 engineers at one of Germany's leading solar energy companies. Ivan shares insights from his extensive technical leadership journey and his recent return to coding after seven years due …
…
continue reading

1
SANS Stormcast Friday, Apr 4th: URL Frequency Analysis; Ivanti Flaw Exploited; WinRAR MotW Vuln; Tax filing scams; Oracle Breach Update
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive Using frequency analysis, and training the model with honeypot data as well as log data from legitimate websites allows for a fairly simple and reliable triage of web server logs to identify possible malicious activity. https://isc.sans.edu/diary/Exploring%20Statistical%20Mea…
…
continue reading

1
A Deep Dive Into the 2025 State of Airflow Survey Results with Tamara Fingerlin of Astronomer
23:26
23:26
Play later
Play later
Lists
Like
Liked
23:26The 2025 State of Airflow report sheds light on how global users are adopting, evolving and innovating with Apache Airflow. With over 5,000 responses from 116 countries, the survey reveals critical insights into Airflows’ role in business operations, new use cases and what’s ahead for the community. In this episode, Tamara Fingerlin, Developer Advo…
…
continue reading

1
SANS Stormcast Thursday Apr 3rd: Juniper Password Scans; Hacking Call Records; End to End Encrypted GMail
9:23
9:23
Play later
Play later
Lists
Like
Liked
9:23Surge in Scans for Juniper t128 Default User Lasst week, we dedtect a significant surge in ssh scans for the username t128 . This user is used by Juniper s Session Smart Routing, a product they acquired from 128 Technologies which is the reason for the somewhat unusual username. https://isc.sans.edu/diary/Surge%20in%20Scans%20for%20Juniper%20%22t12…
…
continue reading

1
SANS Stormcast Wednesday Apr 2nd: Apple Updates Everything;
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16Apple Patches Everything Apple released updates for all of its operating systems. Most were released on Monday with WatchOS patches released today on Tuesday. Two already exploited vulnerabilities, which were already patched in the latest iOS and macOS versions, are now patched for older operating systems as well. A total of 145 vulnerabilities wer…
…
continue reading

1
SANS Stormcast Tuesday Apr 1st: Apache Camel Exploits; New Cert Authorities Requirements; Possible Oracle Breach
7:36
7:36
Play later
Play later
Lists
Like
Liked
7:36Apache Camel Exploit Attempt by Vulnerability Scans A recently patched vulnerability in Apache Camel has been integrated into some vulnerability scanners, like for example OpenVAS. We do see some exploit attempts in our honeypots, but they appear to be part of internal vulnerablity scans https://isc.sans.edu/diary/Apache%20Camel%20Exploit%20Attempt…
…
continue reading

1
Waymo's Foundation Model for Autonomous Driving with Drago Anguelov - #725
1:09:07
1:09:07
Play later
Play later
Lists
Like
Liked
1:09:07Today, we're joined by Drago Anguelov, head of AI foundations at Waymo, for a deep dive into the role of foundation models in autonomous driving. Drago shares how Waymo is leveraging large-scale machine learning, including vision-language models and generative AI techniques to improve perception, planning, and simulation for its self-driving vehicl…
…
continue reading

1
Scaling to Series C with Shawn Wen, CTO at PolyAI
28:10
28:10
Play later
Play later
Lists
Like
Liked
28:10In this conversation, Shawn Wen, co-founder and CTO of PolyAI, shares insights into the journey of building PolyAI into a successful series C AI startup focused on automating phone calls for contact centres. He discusses the early days of PolyAI, the challenges faced in scaling the team, the importance of company culture, and the evolving role of a…
…
continue reading

1
SANS Stormcast Monday, March 31st: Comparing Phishing Sites; DOH and MX Abuse Phishing; opkssh
7:15
7:15
Play later
Play later
Lists
Like
Liked
7:15A Tale of Two Phishing Sties Two phishing sites may use very different backends, even if the site itself appears to be visually very similar. Phishing kits are often copied and modified, leading to sites using similar visual tricks on the user facing site, but very different backends to host the sites and reporting data to the miscreant. https://is…
…
continue reading

1
SANS Stormcast Friday, March 28th: Sitecore Exploited; Blasting Past Webp; Splunk and Firefox Vulnerabilities
6:15
6:15
Play later
Play later
Lists
Like
Liked
6:15Sitecore "thumbnailsaccesstoken" Deserialization Scans (and some new reports) CVE-2025-27218 Our honeypots detected a deserialization attack against the CMS Sitecore using a thumnailaccesstoken header. The underlying vulnerability was patched in January, and security firm Searchlight Cyber revealed details about this vulnerability a couple of weeks…
…
continue reading

1
Airflow’s Role in the Rise of DataOps with Andy Byron
26:15
26:15
Play later
Play later
Lists
Like
Liked
26:15The orchestration layer is evolving into a critical component of the modern data stack. Understanding its role in DataOps is key to optimizing workflows, improving reliability and reducing complexity. In this episode, Andy Byron, CEO at Astronomer, discusses the rapid growth of Apache Airflow, the increasing importance of orchestration and how Astr…
…
continue reading

1
SANS Stormcast Thursday Mar 27th: Classifying Malware with ML; Malicious NPM Packages; Google Chrome 0-day
4:50
4:50
Play later
Play later
Lists
Like
Liked
4:50Leveraging CNNs and Entropy-Based Feature Selection to Identify Potential Malware Artifacts of Interest This diary explores a novel methodology for classifying malware by integrating entropy-driven feature selection with a specialized Convolutional Neural Network (CNN). Motivated by the increasing obfuscation tactics used by modern malware authors,…
…
continue reading

1
SANS Stormcast Wednesday Mar 26th: XWiki Exploit; File Converter Correction; VMWare Vulnerability; Draytek Router Reboots; MMC Exploit Details;
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14XWiki Search Vulnerablity Exploit Attempts (CVE-2024-3721) Our honeypot detected an increase in exploit attempts for an XWiki command injection vulnerablity. The vulnerability was patched last April, but appears to be exploited more these last couple days. The vulnerability affects the search feature and allows the attacker to inject Groovy code te…
…
continue reading

1
Empowering Data and AI teams with Chris Pedder from Obrizum
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41Find Chris on LinkedIn, and learn about Obrizum. I talk with Chris Pedder from Obrizum. Chris started his career as a Physicist, before moving into AI and Data. He is now Chief Data and AI Officer at Obrizum, who use AI to deliver adaptive learning. In this episode we talk about the behaviours that Chris intentionally fosters in his team, including…
…
continue reading

1
SANS Stormcast Tuesday Mar 25th: Privacy Awware Bots; Ingress Nightmare; Malicious File Converters; VSCode Extension Leads to Ransomware
5:55
5:55
Play later
Play later
Lists
Like
Liked
5:55Privacy Aware Bots A botnet is using privacy as well as CSRF prevention headers to better blend in with normal browsers. However, in the process they may make it actually easier to spot them. https://isc.sans.edu/diary/Privacy%20Aware%20Bots/31796 Critical Ingress Nightmare Vulnerability ingress-nginx fixed four new vulnerabilities, one of which ma…
…
continue reading