Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Open Source Security is a media project to help showcase and educate on open source security. Our goal is to give the community a platform educate both developers and users on how open source security works. There’s a lot of good work happening that doesn’t get attention because there’s no marketing department behind it, they don’t have a developer relations team posting on LinkedIn every two hours. Let’s focus on those people and teams then learn what they do and how they do it. The goal is ...
…
continue reading
The Open at Intel podcast is about all things open source, from software to security to artificial intelligence to Linux and beyond. Each episode brings you fresh perspectives with sophisticated, leading-edge, free-ranging conversations from some of the best minds in the open source community.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
The leading podcast on how to build a successful open source company. Learn from the founders of HashiCorp, Chronosphere, Vercel, MongoDB, DBT, mobile.dev and more!
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
Explore the life of a security leader with NetSPI Field Chief Information Security Officer (CISO) Nabil Hannan. Hear how CISOs with diverse expertise tackle the challenges and opportunities that come with life on the frontlines of cybersecurity.
…
continue reading
The Cyberlaw Podcast is a weekly interview series and discussion offering an opinionated roundup of the latest events in technology, security, privacy, and government. It features in-depth interviews of a wide variety of guests, including academics, politicians, authors, reporters, and other technology and policy newsmakers. Hosted by cybersecurity attorney Stewart Baker, whose views expressed are his own.
…
continue reading
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
…
continue reading
Calling all .NET developers! Dive into the heart of modern .NET technology with us. We are the go-to podcast for all .NET developers worldwide; providing an audio toolbox for developers who use modern .NET. Our show, previously known as The .NET Core Podcast, is all about keeping you up-to-date and empowered in this ever-evolving field. Tune in for engaging interviews with industry leaders, as we discuss the topics every .NET developer should be well-versed in. From cross-platform wonders to ...
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Janes delivers validated open-source defence intelligence across four core capability areas threat, equipment, defence industry and country that are aligned with workflows across the defence industry, national security and government.
…
continue reading
The FINOS Open Source in Finance Podcast celebrates open source projects and interesting topics at the cross section of financial services and open source. So far, our industry experts have discussed practical applications of and their real-world experiences with a range of open source projects including desktop interoperability, low code platforms, synthetic data, and data modeling. They’ve also discussed best practices for inner source, common myths about open source and why commercial com ...
…
continue reading
The Dynamist, a podcast by the Foundation for American Innovation, brings together the most important thinkers and doers to discuss the future of technology, governance, and innovation. The Dynamist is hosted by Evan Swarztrauber, former Policy Advisor at the Federal Communications Commission. Subscribe now!
…
continue reading
Allison Sheridan's technology geek podcast with an EVER so slight Apple bias
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
The New Stack Podcast is all about the developers, software engineers and operations people who build at-scale architectures that change the way we develop and deploy software. For more content from The New Stack, subscribe on YouTube at: https://www.youtube.com/c/TheNewStack
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Are you sick of the establishment corporate media manipulating the truth in America? We are. The Benny Show is 100% INDEPENDENT and your source for breaking news and raw commentary. Benny Johnson is an award-winning storyteller who hits back in the culture wars. Benny has spent his entire life working at the center of the bare-knuckles brawl for the future of America and has the scars to prove it. Benny delivers cutting, behind-the-scenes insight into the global conflict for freedom in our time.
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
The Official AWS Podcast is a podcast for developers and IT professionals looking for the latest news and trends in storage, security, infrastructure, serverless, and more. Join Simon Elisha and Hawn Nguyen-Loughren for regular updates, deep dives, launches, and interviews. Whether you’re training machine learning models, developing open source projects, or building cloud solutions, the Official AWS Podcast has something for you.
…
continue reading
Talk Python to Me is a weekly podcast hosted by developer and entrepreneur Michael Kennedy. We dive deep into the popular packages and software developers, data scientists, and incredible hobbyists doing amazing things with Python. If you're new to Python, you'll quickly learn the ins and outs of the community by hearing from the leaders. And if you've been Pythoning for years, you'll learn about your favorite packages and the hot new ones coming out of open source.
…
continue reading
Dive into the world of artificial intelligence with 'Leveraging AI,' a podcast tailored for forward-thinking business professionals. Each episode brings insightful discussions on how AI can ethically transform business practices, offering practical solutions to day-to-day business challenges. Join our host Isar Meitis (4 time CEO), and expert guests as they turn AI's complexities into actionable insights, and explore its ethical implications in the business world. Whether you are an AI novic ...
…
continue reading
Dive deep into AI's accelerating role in securing cloud environments to protect applications and data. In each episode, we showcase its potential to transform our approach to security in the face of an increasingly complex threat landscape. Tune in as we illuminate the complexities at the intersection of AI and security, a space where innovation meets continuous vigilance.
…
continue reading
Power & Politics is the arena where decision-makers answer the questions that matter. Featuring hard-hitting political interviews and a cast of regular political panelists and critical thinkers, the program gives an insider's view of the continuously unfolding drama of the Canadian political scene.
…
continue reading

1
Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies
Epicenter Media Ltd.
Epicenter brings you in-depth conversations about the technical, economic and social implications of cryptocurrencies and blockchain technologies. Every week, we interview business leaders, engineers academics and entrepreneurs, and bring you a diverse spectrum of opinions and points of view. Epicenter is hosted by Sebastien Couture, Brian Fabian Crain, Friederike Ernst, Meher Roy and Felix Lutsch. Since 2014, our episodes have been downloaded over 8 million times.
…
continue reading
What’s indexing this week in crypto, blockchain, and open-source AI? Find out on The Index, where we feature exclusive conversations that go beyond code. Each week, host and entrepreneur Alex Kehaya talks with founders, developers, and investors who are shaping the future of Web3. From startup advice to breakthrough strategies, our guests share their stories and take a deep dive into the decentralized future.
…
continue reading
What's in the SOSS? features the sharpest minds in security as they dig into the challenges and opportunities that create a recipe for success in making software more secure. Get a taste of all the ingredients that make up secure open source software (SOSS) and explore the latest trends at the intersection of AI and security, vulnerability management, and threat assessments. Each episode of What's in the SOSS? is packed with valuable insight designed to foster collaboration and promote stron ...
…
continue reading
Open source is different. How different would the world be if we used open source concepts more widely? This micro podcast looks at the open source philosophy and how open source can change the world. Each episode is just over two minutes long. Watch video versions on YouTube and Twitter.
…
continue reading
Every day, a team of AIs deliver simple, straightforward updates from the world of artificial intelligence.
…
continue reading
Revenera experts are joined by industry leaders for discussions on all the latest talking points in the world of software.
…
continue reading
Welcome to Opt Out, where I sit down with passionate people to learn why privacy matters to them, the tools and techniques they’ve found and leveraged, and where we encourage and inspire others towards personal privacy and data-sovereignty.
…
continue reading
David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
…
continue reading
Jaron Swab, a software engineer, shares tips around Linux, programming, and open source. So you can stay on top of your privacy, security, and productivity. Discover what it means to be a hacker from a self taught software engineer. You'll learn how to land a tech job, amp up your computer efficiency, and leave behind the walled gardens of big tech. Since 2005, Jaron has exercised his love for coding and taking technology into his own hands. It's Jaron and a microphone; a one on one approach ...
…
continue reading
Compose is an interview podcast for software developers using the Rust programming language to build a better planet. Software's impact on our society is increasing every day. Let's pull things apart so we can learn how to put things back together. Interview guests are typically the maintainers of open source projects, startup founders, leaders within the technology industry, and the occasional critic. Each episode aims to teach something new and provoke thoughts that'll last until the next ...
…
continue reading
Security News Podcast features information security specialist Ira Victor and award-winning journalist Samantha Stone in a fast-paced news program about data security, the law, and the digital underworld. Your security depends on these weekly updates, with topics spanning data confidentiality, disaster recovery, encryption, open source and more.
…
continue reading
Podcast on enterprise technologies including cloud native, GenAI, Security, Data Protection and more.
…
continue reading
Get a daily rundown of the top global open source national security stories and previews of the exclusive content available on The Cipher Brief.
…
continue reading
Industry experts talk open source software, open trends more broadly, and the inventions they make possible.
…
continue reading
Ortelius is an evidence store that federates supply chain and DevOps intelligence providing an end-to-end view of an organization’s security profile. We invite speakers who specialize in DevOps, Supply Chain, open-source security, and microservices. Hosted by the contributors of the Ortelius Open Source Community Team.
…
continue reading
I chat with Aaron Lippold, creator of MITRE's Security Automation Framework (SAF), to discuss how to escape the pain of manual STIG compliance. We explore the technical details of open-source tools like InSpec, Heimdall, and Vulcan that automate validation, normalize diverse security data, and streamline the entire security authoring process. The s…
…
continue reading

1
Malware-as-Code: The Rise of DaaS on GitHub and the Collapse of Open-Source Trust
39:46
39:46
Play later
Play later
Lists
Like
Liked
39:46In this episode, we dissect one of the most sophisticated ongoing cybercrime trends—malware campaigns weaponizing GitHub repositories to compromise developers, gamers, and even rival hackers. By abusing GitHub’s search functionality and reputation signals, threat actors are pushing backdoored code under the guise of popular tools, game cheats, and …
…
continue reading

1
9.8 Severity and Counting: Inside Trend Micro’s Latest Security Emergency
32:08
32:08
Play later
Play later
Lists
Like
Liked
32:08In this episode, we break down Trend Micro’s urgent June 10th security update that patched ten high- and critical-severity vulnerabilities—some with CVSSv3.1 scores as high as 9.8—across Apex Central and Endpoint Encryption PolicyServer (TMEE). While no active exploitation has been observed, the risks are too severe to ignore. We spotlight the most…
…
continue reading

1
Trump RAGES After Israel Bombs Iran in Massive Attack, World War 3: ‘They’re All DEAD!’ with Guests Rep. Anna Paulina Luna, Lt Col Daniel Davis, Steve Hilton and Nick Sortor
1:49:11
1:49:11
Play later
Play later
Lists
Like
Liked
1:49:11Trump responds as Israel strikes Iran, Democrat Senator throws hissy fit after being arrested for storming Kristi Noem press conference, Rep. Anna Paulina Luna, Lt Col Daniel Davis, Steve Hilton and Nick Sortor join the show. Check Out Our Partners:American Financing: Save with https://www.americanfinancing.net/benny NMLS: 182334, http://www.nmlsco…
…
continue reading

1
Saltiness about frostiness (Friends)
2:07:01
2:07:01
Play later
Play later
Lists
Like
Liked
2:07:01Justin Searls joins Jerod in Apple’s WWDC wake for hot takes about frosty UIs. We go (almost) point-by-point through the keynote, dissecting and reacting along the way. Concentricity! Join the discussion Changelog++ members save 5 minutes on this episode because they made the ads disappear. Join today! Sponsors: Retool – Assemble your elite AI team…
…
continue reading

1
Zero-Day in the Call Center: Mitel MiCollab Exploited in Active Attacks
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27In this episode, we dissect the critical vulnerabilities plaguing Mitel MiCollab, a widely used unified communications platform, and explore how attackers are exploiting these flaws in the wild. Recently, security researchers uncovered a trio of dangerous vulnerabilities, including CVE-2024-35286 (a SQL injection flaw), CVE-2024-41713 (an authentic…
…
continue reading

1
The Info-Stealer Sting: A Deep Dive into INTERPOL's Operation Secure
14:39
14:39
Play later
Play later
Lists
Like
Liked
14:39Join us for a gripping discussion on "Operation Secure," a landmark international crackdown that reverberated through the dark corners of the cybercriminal world between January and April 2025. Led by INTERPOL and involving law enforcement from 26 countries, primarily across the Asia-Pacific region, this massive coordinated effort, bolstered by cri…
…
continue reading

1
Lawfare Daily: U.S. Troops on the Streets of Los Angeles
1:25:21
1:25:21
Play later
Play later
Lists
Like
Liked
1:25:21For today's episode, Lawfare Senior Editor and General Counsel Scott R. Anderson sat down with three leading legal experts on domestic military deployments: William Banks of Syracuse University College of Law, Laura Dickinson of the George Washington University Law School, and Chris Mirasola of the University of Houston Law Center. They discussed t…
…
continue reading

1
Dapr: The Secret Sauce to Simplifying Distributed Applications with Mark Fussell
1:09:47
1:09:47
Play later
Play later
Lists
Like
Liked
1:09:47RJJ Software's Software Development Service This episode of The Modern .NET Show is supported, in part, by RJJ Software's Software Development Services, whether your company is looking to elevate its UK operations or reshape its US strategy, we can provide tailored solutions that exceed expectations. Show Notes "Yeah, exactly. In fact, one of the c…
…
continue reading

1
Backlash to Modi G7 invite as report says Indian agent tracked NDP leader
55:59
55:59
Play later
Play later
Lists
Like
Liked
55:59Following a Global News report that says an Indian agent closely surveilled former NDP leader Jagmeet Singh and caused the RCMP to put him in police protection, World Sikh Organization legal counsel Balpreet Singh argues Canada's G7 invitation to India's leader tells Sikh Canadians that their 'lives simply don't matter.' Plus, former Canadian ambas…
…
continue reading

1
Trump Speaks LIVE from White House as LA Burns, Gavin Newsom PANIC | Massive Airliner Crash, with Guests Harmeet DhIllon, Mike Cernovich and Lee Greenwood
3:17:33
3:17:33
Play later
Play later
Lists
Like
Liked
3:17:33Trump speaks at White House as Anti-ICE protests rage, Israel is poised to launch operation on Iran, Harmeet Dhillon, Mike Cernovich and Lee Greenwood joins the show. Check Out Our Partners:Advantage Gold: Get your FREE wealth protection kit https://www.abjv1trk.com/F6XL22/4MQCFX/?sub1=Youtube American Financing: Save with https://www.americanfinan…
…
continue reading

1
Escalation, Episode Seven: Boiling the Frog
58:28
58:28
Play later
Play later
Lists
Like
Liked
58:28Today, it’s Episode Seven of Escalation, our latest narrative series co-hosted by Lawfare Managing Editor Tyler McBrien and Ukraine Fellow Anastasiia Lapatina. Throughout the show, Nastya and Tyler trace the history of U.S.-Ukrainian relations from the time of Ukrainian independence through the present. You can listen to Escalation in its entirety,…
…
continue reading

1
Exploring Common Controls and Governance in Finance w Mike Long, CEO, Kosli
25:08
25:08
Play later
Play later
Lists
Like
Liked
25:08Exploring Common Controls and Governance in Financial Services with Kosli's CEO, Mike LongIn this episode of the FINOS podcast, Grizz Griswold interviews Mike Long, CEO and founder of Kosli. They discuss the challenges of AI readiness and managing risk in financial services, focusing on the importance of common control definitions in SDLC processes…
…
continue reading

1
No SSH? What is Talos, this Linux Distro for Kubernetes?
19:23
19:23
Play later
Play later
Lists
Like
Liked
19:23Container-based Linux distributions are gaining traction, especially for edge deployments that demand lightweight and secure operating systems. Talos Linux, developed by Sidero Labs, is purpose-built for Kubernetes with security-first features like a fully immutable file system and disabled SSH access. In a demo, Sidero CTO Andrew Rynhard and Head …
…
continue reading

1
Lawfare Daily: McCarthyism and Its Echoes in Modern Politics with Clay Risen
43:24
43:24
Play later
Play later
Lists
Like
Liked
43:24Lawfare Contributing Editor Renée DiResta sits down with Clay Risen to talk about his book “Red Scare: Blacklists, McCarthyism, and the Making of Modern America,” exploring the historical context of McCarthyism and its relevance to contemporary issues. They discuss the dynamics of accusation versus evidence during the Red Scare, the impact of vigil…
…
continue reading
Beautiful documentation that's easy to generate is one of Rust's superpowers, but that superpower does not come for free. Guillaume Gomez describes his longstanding involvement in the project, starting in 2013.By Tim McNamara (timClicks)
…
continue reading

1
Canada and U.S. exchanging outline for possible deal: Sources
54:11
54:11
Play later
Play later
Lists
Like
Liked
54:11CBC's Kate Simpson and Radio-Canada's Louis Blouin explain what sources told them about a document being passed between Ottawa and Washington, which outlines the details for a possible deal. Former defence minister David Pratt reacts to one source who says the document states Canada's willingness to join the U.S. president's proposed 'Golden Dome' …
…
continue reading

1
Tomcat Manager Attacks: 400 IPs in Coordinated Brute-Force Attack
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49On June 5, 2025, GreyNoise flagged a massive spike in coordinated brute-force login attempts targeting Apache Tomcat Manager interfaces. Nearly 400 unique IP addresses, many traced back to DigitalOcean infrastructure, were involved in a widespread and opportunistic campaign. In this episode, we dissect the attack pattern, what makes Apache Tomcat a…
…
continue reading

1
Reducing Developer Toil, Shifting Security Left, And Using Caution With AI – Andy Dennis
20:41
20:41
Play later
Play later
Lists
Like
Liked
20:41In this episode of the Security Repo Podcast, Andy Dennis, VP at Modus Create, joins Dwayne McDaniel to unpack what "shifting left" really means for security and engineering teams. They explore the impact of hands-on security training at B-Sides events, the concept of developer toil, and the role AI tools like GitHub Copilot AutoFix are starting to…
…
continue reading

1
Trump Humiliates Gavin Newsom as ‘Live Address’ CRASHES, No Audio, LA Burns | Democrats Indicted... with Guests Rep. Brandon Gill and Mark Mitchell
1:44:49
1:44:49
Play later
Play later
Lists
Like
Liked
1:44:49Gavin Newsom roasted after audio fail exposes fake live LA riot announcement, Elon Musk apologies to Donald Trump, Rep.Brandon Gill and Mark Mitchell join the show Check Out Our Partners:Advantage Gold: Get your FREE wealth protection kit https://www.abjv1trk.com/F6XL22/4MQCFX/?sub1=Youtube American Financing: Save with https://www.americanfinancin…
…
continue reading

1
The Roc programming language (Interview)
1:35:56
1:35:56
Play later
Play later
Lists
Like
Liked
1:35:56Jerod chats with Richard Feldman about Roc – his fast, friendly, functional language inspired by Richard’s love of Elm. Roc takes many of Elm’s ideas beyond the frontend and introduces some great ideas of its own. Get ready to learn about static dispatch, platforms vs applications, opportunistic mutation, purity inference, and a whole lot more. Joi…
…
continue reading
On May 12, 2025, the Texas Department of Transportation (TxDOT) disclosed a significant data breach that compromised crash reports containing personal data of over 423,000 individuals. In this episode, we take a forensic look at what went wrong, how one compromised account enabled unauthorized downloads of sensitive crash data, and what this means …
…
continue reading

1
Rational Security: The “How Many Constitutional Crises Can We Fit Into One Episode?” Edition
1:17:17
1:17:17
Play later
Play later
Lists
Like
Liked
1:17:17This week, Scott sat down with Lawfare Senior Editors Molly Reynolds and Quinta Jurecic, and Contributing Editor Chris Mirasola, to focus on the week’s big domestic news, including: “Drama Majors, Meet Major Drama.” In the glittering city of Los Angeles, the Trump administration has taken the dramatic step of calling up the California National Guar…
…
continue reading

1
Ghost Students and AI Scams: How Identity Theft is Gutting Financial Aid
43:49
43:49
Play later
Play later
Lists
Like
Liked
43:49What happens when hundreds of thousands of college applications are submitted—not by hopeful students, but by bots using stolen identities? In this episode, we dive deep into the alarming rise of financial aid fraud in U.S. higher education, driven by "ghost students" and increasingly sophisticated scams powered by AI. From fraud rings applying for…
…
continue reading

1
Episode 071 - The Future of HubSpot is Passwordless - Alyssa Robinson
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39The Future of HubSpot is Passwordless Learn how HubSpot’s CISO Alyssa Robinson breaks down passwordless authentication, innovative security strategies, and the art of balancing usability with protection on the latest episode. + + + Find more episodes on YouTube or wherever you listen to podcasts, as well as at netspi.com/agentofinfluence.…
…
continue reading

1
Lawfare Daily: Christina Knight on AI Safety Institutes
38:53
38:53
Play later
Play later
Lists
Like
Liked
38:53Christina Knight, Machine Learning Safety and Evals Lead at Scale AI and former senior policy adviser at the U.S. AI Safety Institute (AISI), joins Kevin Frazier, the AI Innovation and Law Fellow at Texas and a Senior Editor at Lawfare, to break down what it means to test and evaluate frontier AI models as well as the status of international effort…
…
continue reading
If you're looking to leverage the insane power of modern GPUs for data science and ML, you might think you'll need to use some low-level programming language such as C++. But the folks over at NVIDIA have been hard at work building Python SDKs which provide nearly native level of performance when doing Pythonic GPU programming. Bryce Adelstein Lelb…
…
continue reading

1
Risky Business #795 -- How The Com is hacking Salesforce tenants
1:07:34
1:07:34
Play later
Play later
Lists
Like
Liked
1:07:34On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: New York Times gets a little stolen Russian FSB data as a treat iVerify spots possible evidence of iOS exploitation against the Harris-Walz campaign Researcher figures out a trick to get Google account holders’ full names and phone numbers Major US food distrib…
…
continue reading

1
Trump tests boundaries of his power with troops in L.A.
42:52
42:52
Play later
Play later
Lists
Like
Liked
42:52NBC senior correspondent Jay Gray joins Power & Politics from a confrontation between protesters and National Guard troops deployed by President Donald Trump in Los Angeles, as California's governor accuses Trump of the 'acts of a dictator.' Auditor General Karen Hogan says the estimated cost of Canada's F-35 fighter jet program has gone from $19 b…
…
continue reading

1
Escalation, Episode Six: Nothing Else Matters
57:50
57:50
Play later
Play later
Lists
Like
Liked
57:50Today, it’s Episode Six of Escalation, our latest narrative series co-hosted by Lawfare Managing Editor Tyler McBrien and Ukraine Fellow Anastasiia Lapatina. Throughout the show, Nastya and Tyler trace the history of U.S.-Ukrainian relations from the time of Ukrainian independence through the present. You can listen to Escalation in its entirety, a…
…
continue reading

1
Inside the React Native NPM Supply Chain Breach: 16 Packages, 1 Million+ Downloads, and a RAT in the Code
41:15
41:15
Play later
Play later
Lists
Like
Liked
41:15In this episode, we break down the massive supply chain attack that rocked the React Native ecosystem beginning on June 6, 2025. Over 16 NPM packages, collectively downloaded over one million times per week, were silently weaponized with a Remote Access Trojan (RAT) embedded in obfuscated code. The attack, linked to the same threat actor behind the…
…
continue reading
Hayden Smith, Hunted Labs Co-Founder comes on Absolute AppSec to discuss, among other things, the Hunted Labs work discovering and publicizing the EasyJson software supply chain threat. Before co-founding Hunted Labs, Hayden was Senior Director of Field Services at Anchore, assisting US government, intelligence, and Fortune 500 clients. Long a spec…
…
continue reading

1
Mirai Strikes Again: Spring4Shell, Wazuh, and TBK DVRs Exploited in Live Campaigns
43:52
43:52
Play later
Play later
Lists
Like
Liked
43:52In this episode, we dive into the latest wave of active Mirai botnet campaigns exploiting high-severity remote code execution (RCE) vulnerabilities in critical enterprise and IoT systems. The Mirai malware—still evolving nearly a decade after its first appearance—has adapted its tactics to weaponize recent CVEs with CVSS scores of 9.8 and 9.9, impa…
…
continue reading

1
Open Authorization In The World Of AI With Aaron Parecki
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07Episode Summary How do we apply the battle-tested principles of authentication and authorization to the rapidly evolving world of AI and Large Language Models (LLMs)? In this episode, we're joined by Aaron Parecki, Director of Identity Standards at Okta, to explore the past, present, and future of OAuth. We dive into the lessons learned from the ev…
…
continue reading

1
UNFI Breach: How One Cyberattack Shook the North American Food Supply
36:53
36:53
Play later
Play later
Lists
Like
Liked
36:53On June 5, 2025, United Natural Foods Inc. (UNFI)—North America's largest publicly traded wholesale food distributor and primary supplier for Whole Foods—was struck by a major cyberattack that forced the company to shut down key IT systems. The result: widespread delivery disruptions to over 30,000 locations across the U.S. and Canada, eerily empty…
…
continue reading

1
Nuclear 101: Reactors of the Future with Ed Petit De Mange, Patrick O’Brien, Kathleen Nelson Romans and Emmet Penney
59:21
59:21
Play later
Play later
Lists
Like
Liked
59:21Nuclear power is experiencing a notable revival in policy circles. The Trump administration has moved quickly on this front, drafting executive orders to accelerate plant construction, directing the Pentagon to explore reactor installations on military bases, and reshaping the regulatory landscape. A recent $900 million solicitation for small modul…
…
continue reading

1
196 | How to Safely Run Powerful AI Agents (Like Manus & GenSpark) with no RISK
37:51
37:51
Play later
Play later
Lists
Like
Liked
37:51Powerful AI tools like Manus and Genspark can supercharge your workflows — but how do you experiment with them safely, without risking your hardware or exposing sensitive credentials?** In this hands-on live session, I'll walk through exactly how to set up a safe environment to test and run these tools — no technical deep-dives, no unnecessary risk…
…
continue reading

1
Lawfare Daily: Censorship, Civilizational Allies, and Codes of Practice
57:17
57:17
Play later
Play later
Lists
Like
Liked
57:17Lawfare Contributing Editor Renée DiResta sits down with Daphne Keller, Director of the Program on Platform Regulation at Stanford University's Cyber Policy Center; Dean Jackson, Contributing Editor at Tech Policy Press and fellow at American University's Center for Security, Innovation, and New Technology; and Joan Barata, Senior Legal Fellow at T…
…
continue reading

1
AI Safety Shift: Trump Admin Revamps Institute, OpenAI Tackles Threats
10:16
10:16
Play later
Play later
Lists
Like
Liked
10:16Explore the Trump administration's controversial restructuring of the US AI Safety Institute, OpenAI's efforts to combat malicious AI use, and Qualcomm's strategic move to acquire UK-based Alphawave IP Group. Dive into the changing landscape of AI policy, security, and industry developments. Sources: https://techstory.in/safety-removed-from-ai-safe…
…
continue reading
Janes analysts James Trigg and Aparna Iyer join Sean Corbett and Kate Cox to discuss the strategic depths of Yemen’s role in global security. They unpack the complex military, political, and regional dynamics shaping this pivotal Middle Eastern country and how Yemen’s conflict influences international shipping lanes, serves as a battleground for pr…
…
continue reading

1
Carney pledges $9B to hit NATO spending goal by March
43:51
43:51
Play later
Play later
Lists
Like
Liked
43:51Prime Minister Mark Carney says Canada will reach NATO's two per cent of GDP defence spending target this fiscal year — a dramatic acceleration from his previous 2030 timeline. U.S. Ambassador to Canada Pete Hoekstra tells Power & Politics that the U.S. is 'thankful' for the spending and says it shows 'clear progress' for trade and security talks b…
…
continue reading

1
Never. Let. AI. Write. Your. Tests. (News)
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09Diwank explains why you should never let AI writes your tests, Apple redesigns all of their software platforms, AI has brought about the rise of judgement over technical skills, Peter Steinberger says Claude Code is now his computer, and the curious case of Memvid. View the newsletter Join the discussion Changelog++ members support our work, get cl…
…
continue reading

1
#724: Accelerated computing: From fraud detection to AI innovation
41:25
41:25
Play later
Play later
Lists
Like
Liked
41:25Join host Shruthi to discover how organizations use GPU-accelerated computing on AWS. Container Specialist Re Alvarez Parmar shows how Rivian optimizes GPU usage for autonomous vehicles with Amazon EKS. AWS Financial Services expert Sudhir Kalidindi explains real-time fraud detection processing 100B+ events annually. Learn architectural patterns an…
…
continue reading