Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Technical interviews about software topics.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading

1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
Host Russ Altman, a professor of bioengineering, genetics, and medicine at Stanford, is your guide to the latest science and engineering breakthroughs. Join Russ and his guests as they explore cutting-edge advances that are shaping the future of everything from AI to health and renewable energy. Along the way, “The Future of Everything” delves into ethical implications to give listeners a well-rounded understanding of how new technologies and discoveries will impact society. Whether you’re a ...
…
continue reading
News and interviews covering all corners of infrastructure, from rail to roads to energy to tunnels and much more, with guests from all around the wide world of civil engineering chatting with NCE news editor Rob Hakimian and the rest of the NCE team
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.
…
continue reading
Practical DevSecOps (a Hysn Technologies Inc. company) offers vendor-neutral and hands-on DevSecOps and Product Security training and certification programs for IT Professionals. Our online training and certifications are focused on modern areas of information security, including DevOps Security, AI Security, Cloud-Native Security, API Security, Container Security, Threat Modeling, and more.
…
continue reading
From the law enforcement and security organization you’ve never heard of comes a podcast revealing some of the greatest stories in America’s history. Hear from special agents, engineers, technicians, and others who belong to the Diplomatic Security Service as they give Americans insight into what really happened. From the terrorist bombings in East Africa to discovering bugs buried in U.S. embassy walls to dismantling a major sex trafficking network in New York City, listen along as we peel ...
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Your exploration inside Lawrence Livermore National Laboratory. Hear untold stories, meet boundary-pushing pioneers and get unparalleled access to groundbreaking science and technology. From national security challenges to computing revolutions, discover the innovations that are shaping tomorrow, today.
…
continue reading
A podcast that helps us understand human vulnerability and how we can defend against the attacks that exploit us.
…
continue reading
Hosted on the www.embeddedcomputing.com website, the Embedded Insiders Podcast is a fun electronics talk show for hardware design engineers, software developers, and academics. Organized by Tiera Oliver, Associate Editor, and Rich Nass, EVP, of Embedded Computing Design, each episode highlights embedded industry veterans who tackle trends, news, and new products for the embedded, IoT, automotive, security, artificial intelligence, edge computing, and other technology marketplaces in a light ...
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
We created Enginears as a place to share Engineering stories and to aid knowledge sharing and discovery into how companies build their products. Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
How today’s top organizations navigate the complex world of governance, risk, and compliance (GRC).Security & GRC Decoded brings you actionable strategies, expert insights, and real-world stories that help professionals elevate their security and compliance programs. Hosted by Raj Krishnamurthy.It’s for security professionals, compliance teams, and business leaders responsible security GRC and ensuring their organizations’ are safe, secure and adhere to regulatory mandates.Security & GRC Dec ...
…
continue reading
The security repo is a podcast that focuses on real world security issues we are all facing today. We will take deep dives into news events and have exclusive interviews with security leaders on the ground.
…
continue reading
Engineering Influence: The Podcast of America's Engineering and Design Industry
…
continue reading
Each webinar features an SEI researcher discussing their research on software and cybersecurity problems of considerable complexity. The webinar series is a way for the SEI to accomplish its core purpose of improving the state-of-the-art in software engineering and cybersecurity and transitioning this work to the community. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University. The SEI Webinar Seri ...
…
continue reading
Welcome to Security Cleared Jobs: Who’s Hiring & How, the podcast for cleared professionals looking for new opportunities and career advice. We go behind the scenes with recruiters and hiring managers from leading cleared employers to uncover the information you need to make a smart career move. They'll share insider job search tips, new contracts and opportunities, company culture insights, what they value in a prospective employee, and more! ClearedJobs.Net is a veteran-owned career site a ...
…
continue reading
We will discuss all things Cloud with an emphasis on Cloud Security.
…
continue reading
Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments.
…
continue reading
Welcome to Shut the Backdoor, brought to you by Redox. Shut The Backdoor is a healthcare security podcast dedicated to keeping health data safe, one episode at a time. Hosted by Jody Maberry and Meghan Mcleod and featuring special guests to discuss the most critical topics for healthcare security.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
The New Stack Podcast is all about the developers, software engineers and operations people who build at-scale architectures that change the way we develop and deploy software. For more content from The New Stack, subscribe on YouTube at: https://www.youtube.com/c/TheNewStack
…
continue reading
Embedded edge with Maurizio is a podcast show hosted by Maurizio Di Paolo Emilio, who talks to both engineers and executives in the embedded systems design and development industry to gain insights into the embedded systems, technologies and products featured in embedded.com.
…
continue reading
An application technology podcast series with industry engineers that promises to keep you up to speed on some of the embedded semiconductor industry’s newest, fastest-growing and most exciting technologies, applications, and design techniques used by renowned industry engineers. Experience endless episodes packed with entertaining discussion topics that cover the latest ins and outs of embedded systems as well as how to thrive in trending markets while avoiding common design pitfalls and st ...
…
continue reading
This is the official podcast of the Space & Satellite Professionals International. On this channel, we release podcasts in two series: Making Leaders and Better Satellite World. Find out more about SSPI at www.sspi.org
…
continue reading
Gain unparalleled access to the minds of industry-leading CIOs, CTOs, and CISOs. Enjoy episodes filled with expert insights, inspiring stories, and trend analysis, all brought to you by the people shaping the future of technology. Whether you're an IT professional, aspiring tech leader, or general tech enthusiast, IT Visionaries has something for everyone. Don't miss out on the chance to learn from the best – subscribe now! Produced by the team at Mission.org and brought to you by Brightspot.
…
continue reading
Join hosts Ned Bellavance and Kyler Middleton as they dive deep into the challenges of DevOps from the perspective of seasoned practitioners. You'll hear from expert guests—technical leaders, trainers, and consultants with years of hands-on experience—discussing the nuances of DevOps. From AWS to Azure, networking to security, automation to modern cloud environments, each weekly episode equips you with the insights to confidently address tech and business challenges such as resilience, cost ...
…
continue reading
Heavy Wireless is a deep dive into Wi-Fi, IoT, wireless security, and more. Host Keith Parsons, CWNE#3, draws on his decades of experience to educate, entertain, and inspire those working in the WLAN industry. Each twice-monthly episode explores an aspect of wireless technology with guests including Wi-Fi engineers, industry experts, and vendors. Whether you're already a WLAN specialist or looking to expand your skills in this high-demand sector of IT, Heavy Wireless gives you the technical ...
…
continue reading
Join us at the intersection of networking and security! Whether you’re fending off ransomware attacks, securing remote workers, hunting for rogue IoT devices, or gearing up for your latest compliance audit, Packet Protector provides practical information that IT and infrastructure pros can put to work. Every episode covers the latest security headlines and then drills into essential topics to provide technical and strategic insights on wired and wireless network security, access control, clo ...
…
continue reading
Explore the cutting-edge world of platform engineering, the backbone of modern software development. The Platform Engineering Show podcast dives into how internal developer platforms (IDPs) are revolutionizing the way teams build, deploy, and manage applications at scale. From streamlining workflows and reducing cognitive load for developers to fostering innovation and enabling seamless collaboration across development, operations, and IT service management (ITSM), we break down the key conc ...
…
continue reading
Since 2005, BlueHat has been where the security research community, and Microsoft, come together as peers; to debate, discuss, share, challenge, celebrate and learn. On The BlueHat Podcast, Microsoft and MSRC’s Nic Fillingham and Wendy Zenone will host conversations with researchers and industry leaders, both inside and outside of Microsoft, working to secure the planet’s technology and create a safer world for all.
…
continue reading
Welcome to The DevOps Toolchain Show – your go-to podcast for mastering the evolving world of DevOps! Previously known as The TestGuild Performance and SRE Podcast, we dive deep into the latest trends, must-know tools, and cutting-edge techniques shaping modern software delivery. Join industry experts, engineers, and thought leaders as we uncover insights on automation, performance testing, security, CI/CD, AI in DevOps, and everything in between. Whether you're a DevOps practitioner, SRE, o ...
…
continue reading
This podcast covers all things technology and engineering in Cyprus. The host, Andreas Lefkatis, talks with his guests about what’s trending in their field, innovative ways they’re using technology to make the island a prominent technology hub, and much more. Hopefully it inspires you to do the same! The episodes are available on all major podcast platforms and on our Youtube channel.
…
continue reading

1
SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln;
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44 Bluetooth Vulnerability Could Allow Eavesdropping A vulnerability i…
…
continue reading

1
SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln; (#)
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln; Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-coul…
…
continue reading

1
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, N…
…
continue reading

1
Ep. 279 - Security Awareness Series - Dodging Turkeys and Security Awareness with Stacey Edmonds REPLAY
36:52
36:52
Play later
Play later
Lists
Like
Liked
36:52REPLAY (Original Air Date Oct 21, 2024) Today on the Social-Engineer Podcast: The Security Awareness Series, Chris is joined by Stacey Edmonds. Stacey is a multi-disciplinary EdTech innovator and Digital Safety Pioneer, driven by a commitment to democratizing knowledge. Stacey's expertise, encompassing social science, education, EdTech, and multi-p…
…
continue reading

1
Engineering in the Age of AI: Navigating Infrastructure and Security
10:44
10:44
Play later
Play later
Lists
Like
Liked
10:44Join us on this episode of Engineering Influence, brought to you by the American Council of Engineering Companies, as we explore the rapidly evolving landscape of the engineering industry. Coming to you from our annual convention in Washington, D.C., we sat down with Nick Decker, Director of Engineering for Egnyte, to discuss transformative trends …
…
continue reading

1
Infinity Systems Engineering: Mission Operations & Space Systems
19:29
19:29
Play later
Play later
Lists
Like
Liked
19:29Amanda Woollard Lujan, Technical Recruiter at Infinity Systems Engineering, shares that going the extra mile—like writing handwritten thank-you notes—can really set you apart in the cleared job hunt. She highlights Infinity’s work in mission operations and space systems and their global opportunities. Amanda also emphasized the importance of networ…
…
continue reading

1
Aptori Is Building an Agentic AI Security Engineer
18:01
18:01
Play later
Play later
Lists
Like
Liked
18:01AI agents hold the promise of continuously testing, scanning, and fixing code for security vulnerabilities, but we're still progressing toward that vision. Startups like Aptori are helping bridge the gap by building AI-powered security engineers for enterprises. Aptori maps an organization’s codebase, APIs, and cloud infrastructure in real time to …
…
continue reading

1
79-Talking Cloud Podcast-with Adi Golan, Vice President, Solution Engineering, Skyhawk.Security
1:12:01
1:12:01
Play later
Play later
Lists
Like
Liked
1:12:01In this episode of Talking Cloud, I speak with Adi Golan, Vice President of Skyhawk Security, discussing the evolution of cloud security, the challenges faced in the industry, and the innovative solutions being developed to enhance security measures. We explore the role of AI and machine learning in cybersecurity, the complexities of CNAPP, and the…
…
continue reading

1
Pedro Umbelino on Exploiting ATG Devices in Fuel Storage
27:14
27:14
Play later
Play later
Lists
Like
Liked
27:14Pedro Umbelino, Principal Research Scientist at Bitsight Technologies, joins the Nexus Podcast to discuss his team's research into Automatic Tank Gauge (ATG) systems and how they uncovered 11 vulnerabilities in ATGs manufactured by five different vendors. ATG systems are an industrial control system that monitors fuel levels inside storage tanks, i…
…
continue reading
Please enjoy this encore of Word Notes. A descriptive model that provides a baseline of observed software security initiatives and activities from a collection of volunteer software development shops. CyberWire Glossary link: https://thecyberwire.com/glossary/bsimm Audio reference link: “OWASP AppSecUSA 2014 - Keynote: Gary McGraw - BSIMM: A Dec…
…
continue reading

1
Let's build something phoenix.new (Friends)
1:35:31
1:35:31
Play later
Play later
Lists
Like
Liked
1:35:31Our old friend Chris McCord, creator of Elixir’s Phoenix framework, tells us all about his new remote AI runtime for building Phoenix apps. Along the way, we vibe code one of my silly app ideas, calculate all the money we’re going to spend on these tools, and get existential about what it all means. Join the discussion Changelog++ members save 4 mi…
…
continue reading
DevSecOps generates a lot of data valuable for better decision making. However, decision makers may not see all they need to in order to make best use of the data for continuous improvement. The SEI open source Polar tool unlocks the data, giving DevSecOps teams greater capability to automate, which in turn means they can innovate rapidly – without…
…
continue reading

1
AI: The Unexpected Collaboration Catalyst
16:26
16:26
Play later
Play later
Lists
Like
Liked
16:26Welcome to the latest episode of the Engineering Influence podcast, where we delve into the transformative role of artificial intelligence in the AEC industry. Hosted by Allison Schneider, this episode features insightful discussions with Rachelle Ray and Jeff Visnic, who explore how AI is reshaping communication, workflow, and collaboration. Disco…
…
continue reading

1
When vibe coding goes viral (Interview)
1:11:06
1:11:06
Play later
Play later
Lists
Like
Liked
1:11:06Chris Anderson joins the show. You may recognize Chris from the early days of CouchDB and Couchbase. Back when the world was just waking up to NoSQL, Chris was at the center of it all, shaping how developers think about data distribution and offline-first architecture. These days, Chris is working on Vibes.diy and Fireproof — tools that make one-sh…
…
continue reading
Summer is in full swing and we hope you are enjoying it with family and friends. As we spend more time outdoors, it’s an opportune moment to revisit a conversation we had with Zakia Rahman, a dermatologist who shared a number of helpful measures we can take to care for our skin. She reminds us that skincare is about more than vanity — it’s about vi…
…
continue reading

1
Better Satellite World: The Road Less Traveled, Season 2, Episode 3 - Joining Spirituality with Space Exploration
22:39
22:39
Play later
Play later
Lists
Like
Liked
22:39In the second season of The Road Less Traveled series, guest host Lou Zacharilla speaks with people whose lives and work inspire us because they walk “the road less traveled,” the one leading us to a wider view of space, satellites and our quest for the dwelling of light we call “The Truth.” This episode features a conversation with Justin Park, en…
…
continue reading

1
RGC, Not GRC: Why Risk Comes First ft Ricky Waldron
1:19:19
1:19:19
Play later
Play later
Lists
Like
Liked
1:19:19What if compliance wasn't just about passing audits—but about building trust from the ground up? In this powerful episode of Security & GRC Decoded, Raj sits down with Ricky Waldron, Director of Security Audit & GRC at Navan, whose GRC experience spans tech giants like Microsoft, Disney, Oracle, and Smartsheet. Ricky shares how GRC is evolving into…
…
continue reading

1
OpenAI for Government & 5G Smart Manufacturing
38:17
38:17
Play later
Play later
Lists
Like
Liked
38:17Send us a text In this episode of Embedded Insiders, Editor-in-Chief Ken Briodagh dives into the transformative role of AI in Smart Manufacturing and the impact of 5G connectivity on enterprise operations with Telit Cinterion’s Bill Dykas, Senior Product Line Manager, and Stan Gray, SVP of IoT Broadband and High Cat Vertical Sales. But first, Rich,…
…
continue reading

1
WayForward Games with Tomm Hulett and Voldi Way
46:03
46:03
Play later
Play later
Lists
Like
Liked
46:03WayForward is a renowned video game studio that was founded in 1990. The company has developed games for publishers such as Capcom, Konami, and Nintendo and has released their games across major hardware platforms from the last 35 years. They are also the creators of the Shantae series of 2D platformers. WayForward recently developed the latest gam…
…
continue reading

1
What IT Leaders Can Learn from How the Government Buys Tech
44:04
44:04
Play later
Play later
Lists
Like
Liked
44:04IT leaders in regulated industries know the pain of navigating outdated, slow procurement systems – especially when critical missions depend on modern tools. In this episode, Bryana Tucci, Lead of the AWS Marketplace for the US Intelligence Community, shares how government agencies are overcoming legacy procurement bottlenecks to access cutting-edg…
…
continue reading
This week, our hosts Dave Bittner, Joe Carrigan, and Maria Varmazis (also host of the T-Minus Space Daily show) are back sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from listener Abdussobur, who wonders if…
…
continue reading

1
SANS Stormcast Thursday, June 26th, 2025: Another Netscaler Vuln; CentOS Web Panel Vuln; IP Based Certs
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 Remote code execution in CentOS Web Panel - CVE-2025-48703 An arbitrary file upload vulnerab…
…
continue reading

1
Automating the DevOps Pipeline with Maurice McCabe
39:00
39:00
Play later
Play later
Lists
Like
Liked
39:00On this episode of the TestGuild DevOps Toolchain, host Joe Colantonio is joined by Maurice McCabe, a seasoned AI engineer from AIA Systems whose expertise spans over two decades and the rise of agentic AI. Together, they dive deep into the rapidly evolving world of DevOps, AI-driven development, and modern product testing. Maurice shares his exper…
…
continue reading

1
SANS Stormcast Thursday, June 26th, 2025: Another Netscaler Vuln; CentOS Web Panel Vuln; IP Based Certs (#)
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53SANS Stormcast Thursday, June 26th, 2025: Another Netscaler Vuln; CentOS Web Panel Vuln; IP Based Certs NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumbe…
…
continue reading

1
D2DO276: MCP: Capable, Insecure, and On Your Network Today
33:47
33:47
Play later
Play later
Lists
Like
Liked
33:47MCP, or Model Context Protocol, is an open-source project originally created by Anthropic. MCP is designed to let AI agents to connect to data repositories, applications, business and developer tools, and other agents to execute tasks and carry out instructions. Day Two DevOps explores the capabilities and pitfalls of MCP, how the protocol works, a…
…
continue reading

1
From Phishing Scam Response to Cyber Defender: A Journey into Security - Manoj Viswanathan
25:52
25:52
Play later
Play later
Lists
Like
Liked
25:52In this episode of the Security Repo Podcast, Manoj Viswanathan shares his unconventional journey into cybersecurity, from a personal phishing incident to mastering Capture The Flag (CTF) competitions and interning at Toshiba. The conversation dives deep into the community-driven value of groups like BurbSec, the practical benefits of hands-on expe…
…
continue reading

1
Building Bridges: JEO Engineering's Unwavering Commitment to Infrastructure and Community
13:52
13:52
Play later
Play later
Lists
Like
Liked
13:52Join us on the Engineering Influence podcast for an insightful conversation with Rob Brigham, CEO of JEO Consulting Services, recorded live from the ACEC Spring Convention at the Grand Hyatt in Washington, D.C. Discover the journey of JEO, a firm that has been a significant player in the public infrastructure market since 1937, and learn about thei…
…
continue reading

1
Why 1000's of Engineering Teams Outsource Their Product Integrations to Merge! | Enginears Podcast
26:42
26:42
Play later
Play later
Lists
Like
Liked
26:42If you're keen to share your story, please reach out to us! Guest: https://www.linkedin.com/in/gilfeig/ https://www.merge.dev/careers/ Powered by Artifeks! https://www.linkedin.com/company/artifeksrecruitment https://www.artifeks.co.uk https://www.linkedin.com/in/agilerecruiter LinkedIn: https://www.linkedin.com/company/enginearsio Twitter: https:/…
…
continue reading

1
Securing Redirections with Mike Macelletti
42:02
42:02
Play later
Play later
Lists
Like
Liked
42:02In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Mike Macelletti from Microsoft’s MSRC Vulnerabilities and Mitigations team to explore Redirection Guard, a powerful mitigation designed to tackle a long-standing class of file path redirection vulnerabilities in Windows. Mike shares how his interest in securi…
…
continue reading
Clarity Innovations is a rapidly growing software and data innovations firm working in the DoD, IC and federal sectors, shares Director of Recruiting, Brett Willie. Listen for details on why the company values unapologetic transparency and hiring team players who are ready to help those around them succeed. With hiring spanning all security clearan…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each scans than they used to, but the average length of passwords did not change. https://isc.sans.edu/diary/Quick%20Pass…
…
continue reading

1
SE Radio 674: Vilhelm von Ehrenheim on Autonomous Testing
49:49
49:49
Play later
Play later
Lists
Like
Liked
49:49Vilhelm von Ehrenheim, co-founder and chief AI officer of QA.tech, speaks with SE Radio's Brijesh Ammanath about autonomous testing. The discussion starts by covering the fundamentals, and how testing has evolved from manual to automated to now autonomous. Vilhelm then deep dives into the details of autonomous testing and the role of agents in auto…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix (#)
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each s…
…
continue reading

1
DSS After Action: Solving a Cold-case Murder
22:16
22:16
Play later
Play later
Lists
Like
Liked
22:16In this episode of After Action, we delve into an extraordinary true story of a capital murder suspect who eluded authorities for an astonishing 34 years. Living under a meticulously crafted false identity, this fugitive navigated life in the shadows, seemingly beyond the reach of justice. Join us as a retired Diplomatic Security Service Special Ag…
…
continue reading

1
PP068: Common Kubernetes Risks and What to Do About Them
39:09
39:09
Play later
Play later
Lists
Like
Liked
39:09Today’s Packet Protector digs into risks and threats you might encounter in a Kubernetes environment, what to do about them, and why sometimes a paved path (or boring technology) is the smartest option. My guest is Natalie Somersall, Principal Solutions Engineer for the Public Sector at Chainguard. We talk about risks including identity and access.…
…
continue reading
AI is already widely used for wireless network operations. On today’s show, we look at how AI and machine learning are also being applied to wireless design and site surveys. My guest is Jussi Kiviniemi, Founder and CEO of Hamina Wireless. We talk about how Hamina is developing and implementing AI tools to help designers... Read more »…
…
continue reading

1
CodeRabbit and RAG for Code Review with Harjot Gill
48:42
48:42
Play later
Play later
Lists
Like
Liked
48:42One of the most immediate and high-impact applications of LLMs has been in software development. The models can significantly accelerate code writing, but with that increased velocity comes a greater need for thoughtful, scalable approaches to codereview. Integrating AI into the development workflow requires rethinking how to ensure quality,securit…
…
continue reading

1
OWASP vulnerable and outdated components (noun) [Word Notes]
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Please enjoy this encore of Word Notes. Software libraries, frameworks, packages, and other components, and their dependencies (third-party code that each component uses) that have inherent security weaknesses, either through newly discovered vulnerabilities or because newer versions have superseded the deployed version. Audio reference Link: "The…
…
continue reading

1
The Healing Network - CISO Relationships in a Ransomware Era
26:47
26:47
Play later
Play later
Lists
Like
Liked
26:47"Security isn’t proprietary. Sharing what works makes us all safer." Notable Moments 01:29 – Rise in ransomware and the case for collaboration 03:41 – Why reinvention puts you at risk 05:12 – The danger of building relationships mid-crisis 08:10 – Balancing information sharing and confidentiality 09:26 – How groups like HISAC facilitate secure coll…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%20AtHome%20IP%20Cameras/32062 Critical Netscaler Security Update CVE-2025-5777 CVE 2025-5777 is a critical severity vu…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability (#)
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%…
…
continue reading