Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Technical interviews about software topics.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
The State and Popular Culture
…
continue reading
A place for elite leaders and teams.
…
continue reading
Advice. Firsthand experiences. Inspiring conversations. Fresh perspectives. You’ll find it all on the SAFe Business Agility podcast—your connection to all things SAFe, and a lot more.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
A podcast about web design and development.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Exploring the observability side of software development.
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
Software engineers, architects and team leads have found inspiration to build better, high performing teams by listening to the weekly InfoQ Podcast. We have achieved that by interviewing some of the top CTOs, engineers and technology directors from companies like Uber, Netflix and more. Over 500,000 downloads in the last 3 years.
…
continue reading
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
A podcast about the design, development, and business of great software. Each week thoughtbot is joined by the people who build and nurture the products we love.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
Audio podcasts on software testing.
…
continue reading
The latest machine learning, A.I., and data career topics from across both academia and industry are brought to you by host Dr. Jon Krohn on the Super Data Science Podcast. As the quantity of data on our planet doubles every couple of years and with this trend set to continue for decades to come, there's an unprecedented opportunity for you to make a meaningful impact in your lifetime. In conversation with the biggest names in the data science industry, Jon cuts through hype to fuel that pro ...
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Running a bootstrapped software company? Looking to start one? Then this is the podcast for you.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
TestGuild Automation Podcast (formally Test Talks) is a weekly podcast hosted by Joe Colantonio, which geeks out on all things software test automation. TestGuild Automation covers news found in the testing space, reviews books about automation, and speaks with some of the thought leaders in the test automation field. We’ll aim to interview some of today’s most successful and inspiring software engineers, and test automation thought leaders.
…
continue reading
next generation web podcast
…
continue reading

1
Grand Theft Auto III on the Dreamcast with Falco Girgis and Stef Kornilios Mitsis Poiitidis
47:40
47:40
Play later
Play later
Lists
Like
Liked
47:40Grand Theft Auto III is a 2001 an open-world action-adventure game developed by Rockstar Games and it had a profound impact on both gaming and popular culture. Its success cemented video games as a dominant form of entertainment and storytelling, and paved the way for future blockbuster franchises. The game was also a technological milestone that r…
…
continue reading

1
Building Zed's agentic editing (Interview)
1:52:27
1:52:27
Play later
Play later
Lists
Like
Liked
1:52:27Nathan Sobo is back talking about the next big thing for Zed—agentic editing! You now have a full-blown AI-native editor to play with. Collaborate with agents at 120fps in a natively multiplayer IDE. Join the discussion Changelog++ members save 10 minutes on this episode because they made the ads disappear. Join today! Sponsors: Depot – 10x faster …
…
continue reading

1
SE Radio 667: Ashley Peacock on Cloudflare
1:04:31
1:04:31
Play later
Play later
Lists
Like
Liked
1:04:31Ashley Peacock, the author of Serverless Apps on Cloudflare, speaks with host Jeremy Jung about content delivery networks (CDNs). Along the way, they examine dependency injection with bindings, local development, serverless, cold starts, the V8 runtime, AWS Lambda vs Cloudflare workers, WebAssembly limitations, and core services such as R2, D1, KV,…
…
continue reading

1
Achieving Sustainable Mental Peace in Software Engineering with Help from Generative AI
27:37
27:37
Play later
Play later
Lists
Like
Liked
27:37This is the Engineering Culture Podcast, from the people behind InfoQ.com and the QCon conferences.In this podcast, Shane Hastie, Lead Editor for Culture & Methods spoke to John Gesimondo about how to leverage generative AI tools to support sustainable mental peace and productivity in the complex, interruption-prone world of software engineering - …
…
continue reading

1
Python Test – The role of AI in software testing – Anthony Shaw
58:06
58:06
Play later
Play later
Lists
Like
Liked
58:06Show notes: Python Test – The role of AI in software testing – Anthony ShawBy Testing Podcast
…
continue reading

1
Exploring the fundamentals of software engineering
27:51
27:51
Play later
Play later
Lists
Like
Liked
27:51You might think you know software engineering, but what are the really fundamental elements? What are the concepts, ideas and practices that are completely essential? What makes software engineering what it is? Thoughtworker Nate Schutta and Dan Vega are attempting to address those questions in their upcoming book with O'Reilly, The Fundamentals of…
…
continue reading

1
Uyghur software malware, DDoS jumps, 4chan back
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37Uyghur Language Software Hijacked to Deliver Malware Cloudflare sees a big jump in DDoS attacks 4chan back online Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a d…
…
continue reading

1
Pentagon hits fast-forward on software certs.
32:44
32:44
Play later
Play later
Lists
Like
Liked
32:44The Defense Department is launching a new fast-track software approval process. A popular employee monitoring tool exposes over 21 million real-time screenshots. The U.S. opens a criminal antitrust investigation into router maker TP-Link. A pair of health data breaches affect over six million people. South Korea’s SK Telecom confirms a cyberattack.…
…
continue reading

1
571: Space, Software, and Surprises with Rémy Hannequin
43:11
43:11
Play later
Play later
Lists
Like
Liked
43:11Sami and fellow thoughtboter Rémy look to the stars as they talk all things astronomical. Learn about Rémy’s new open source gem Astonoby that plots the coordinates of objects in space, the hidden inventions developed as humans looked to the stars and listen as the pair theorise whether there truly is other life in the universe. — If you’re enthusi…
…
continue reading

1
Shift-M/54: Michael Feathers on software engineering and testing
58:19
58:19
Play later
Play later
Lists
Like
Liked
58:19The video is here: https://www.youtube.com/watch?v=Wv3o4ORYv48By Yegor Bugayenko
…
continue reading

1
Wide World of Cyber: How state adversaries attack security vendors
52:42
52:42
Play later
Play later
Lists
Like
Liked
52:42In this edition of the Wide World of Cyber podcast Patrick Gray talks to SentinelOne’s Steve Stone and Alex Stamos about how foreign adversaries are targeting security vendors, including them. From North Korean IT workers to Chinese supply chain attacks, SentinelOne and its competitors are constantly fending off sophisticated hacking campaigns. Thi…
…
continue reading

1
Is Vibe Coding Real? with James Montemagno
45:21
45:21
Play later
Play later
Lists
Like
Liked
45:21Vibe Coding has folks talking and "vibing entire applications." But is it valid? Should one use AI agents to create apps that go directly into production, or is it just appropriate for prototyping? Scott talks to James Montemagno who recently vibed a 17,000 line application and only wrote 20 bespoke lines himself. Is this the future of programming …
…
continue reading
The LockBit ransomware gang has been hacked. Google researchers identify a new infostealer called Lostkeys. SonicWall is urging customers to patch three critical device vulnerabilities. Apple patches a critical remote code execution flaw. Cisco patches 35 vulnerabilities across multiple products. Iranian hackers cloned a German modeling agency’s we…
…
continue reading
Old passwords work for Windows RDP, Broadcom shows why perpetual software licenses aren’t really forever, Windows Server is getting hotpatching, and preventing changes to archived files. Plugs Support us on patreon and get an ad-free RSS feed with some early episodes Owning the Stack: Infrastructure Independence with FreeBSD and ZFS News/discussion…
…
continue reading

1
AWS in Orbit: Empowering exploration on the Moon, Mars, and more.
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37From the N2K CyberWire network T-Minus team, please enjoy this podcast episode recorded at Space Symposium 2025. Find out how AWS for Aerospace and Satellite is empowering exploration on the Moon, Mars, and beyond with Lunar Outpost. You can learn more about AWS in Orbit at space.n2k.com/aws. Our guests on this episode are AJ Gemer, CTO at Lunar O…
…
continue reading

1
Python Test – pytest-check – allow multiple failures per test
9:56
9:56
Play later
Play later
Lists
Like
Liked
9:56Show notes: Python Test – pytest-check – allow multiple failures per testBy Testing Podcast
…
continue reading

1
Reviewing RSA 2025 with Jason Haddix
1:21:44
1:21:44
Play later
Play later
Lists
Like
Liked
1:21:44What really happened at RSA 2024? Daniel Miessler and Jason Haddix break it down. Fresh off a whirlwind RSA week, Daniel sits down with Jason Haddix (Arcanum Information Security) to talk about what mattered—beyond the show floor noise. From off-site innovation summits to real-world AI implementation, this deep dive covers: -Where the real innovati…
…
continue reading

1
Europol shuts down DDoS-for-hire services, CrowdStrike lays off 500 workers, GOV.UK embraces passkeys
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28Europol shuts down six DDoS-for-hire services used in global attacks CrowdStrike says it will lay off 500 workers Passkeys set to protect GOV.UK accounts against cyber-attacks Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from z…
…
continue reading

1
573: Mocking the Future: Tom Akehurst on WireMock and API Testing
39:30
39:30
Play later
Play later
Lists
Like
Liked
39:30Sami talks with Tom Akehurst, Co-Founder of WireMock, about the delay and disconnect between front and back end development and how WireMock set out to bridge the two together. Tom explains how his time working for Disney paved the way for WireMock, the different processes of mocking and testing APIs, and provides some useful advice on how to impro…
…
continue reading

1
What’s inside the mystery box? Spoiler: It’s a scam!
46:13
46:13
Play later
Play later
Lists
Like
Liked
46:13As Dave Bittner is at the RSA Conference this week, our hosts Maria Varmazis and Joe Carrigan, are sharing the latest in social engineering scams, phishing schemes, and criminal exploits that are making headlines. We start with some follow-up from José on episode 335, sharing how UK banking features like Faster Payments and the “Check Payee” …
…
continue reading

1
Moving beyond velocity: Measuring real business impact
30:32
30:32
Play later
Play later
Lists
Like
Liked
30:32In this episode of Leaders of Code, Dan Lines, cofounder and COO of LinearB; Ben Matthews, Senior Director of Engineering at Stack Overflow; and host Ben Popper talk about why velocity should be a diagnostic tool, not the primary goal of engineering teams. They also touch on the need for cross-disciplinary collaboration to align engineering with bu…
…
continue reading
How do you balance architecture and code? Carl and Richard talk to Steve Smith about various architectural strategies and the swing back-and-forth against over-designing architecture and getting code written. Steve talks about how architecture changes depending on the size and number of teams, how the latest tools can help with architectural choice…
…
continue reading

1
SANS Stormcast Thursday, May 8th: Modular Malware; Sysaid Vuln; Cisco Wireless Controller Patch; Unifi Protect Camera Patch
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%22Modular%22%20Malware/31928 Sysaid XXE Vulnerabilities IT Service Management Software Sysaid patched a number of XXE vulner…
…
continue reading
A jury orders NSO Group to pay $167 millions dollars to Meta over spyware allegations. CISA warns of hacktivists targeting U.S. ICS and SCADA systems. Researcher Micah Lee documents serious privacy risks in the TM SGNL app used by high level Trump officials. The NSA plans significant workforce cuts. Nations look for alternatives to U.S. cloud provi…
…
continue reading

1
AI in Testing: Innovation or Just Noise? with Fitz Nowlan
35:36
35:36
Play later
Play later
Lists
Like
Liked
35:36Show notes: AI in Testing: Innovation or Just Noise? with Fitz NowlanBy Testing Podcast
…
continue reading

1
900: 13 New CSS Features You Can Start Using Today
57:41
57:41
Play later
Play later
Lists
Like
Liked
57:41
…
continue reading

1
Congress challenges CISA cuts, Texas school breached, NSO pays WhatsApp
8:32
8:32
Play later
Play later
Lists
Like
Liked
8:32Congress challenges Noem over proposed CISA cuts Texas school district breach impacts over 47,000 people NSO Group to pay WhatsApp $167 million in damages Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and r…
…
continue reading

1
6 Year Old Sleeper Attack Uncovered, Fake Bank Draft Scam, and Signal Tool Breach
8:56
8:56
Play later
Play later
Lists
Like
Liked
8:56In this episode of Cybersecurity Today, host Jim Love delves into a range of alarming cyber incidents. A six-year sleeper supply chain attack has compromised thousands of e-commerce websites, exploiting vulnerabilities in Magento extensions from vendors Tigren, Meetanshi, and Magesolution. Russian-controlled open-source tool Easy JSON raises scruti…
…
continue reading

1
Risky Business #790 -- Bye bye Signal-gate, hello TeleMessage-gate
56:12
56:12
Play later
Play later
Lists
Like
Liked
56:12On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: White House’s off-brand Israeli Signal fork logs cleartext messages with hard coded creds while getting hacked (twice). Just … Wow. Ransomware attacks on UK retailers are linked, and Marks & Spencer has it extra bad After six years dormant, a Magento eCommerce …
…
continue reading

1
SANS Stormcast Wednesday, May 7th: Infostealer with Webserver; Android Update; CISA Warning
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that, in addition to implementing typical infostealer functionality, includes a web server suitable to create local phishing sites. https://isc.sans.edu/diary/Python%20InfoStealer%20with%20Embedded%20Phishing%20Webserver/31924 Android Update Fixes Freetype 0…
…
continue reading

1
No hocus pocus—MagicINFO flaw is the real threat.
37:01
37:01
Play later
Play later
Lists
Like
Liked
37:01A critical flaw in a Samsung’s CMS is being actively exploited. President Trump’s proposed 2026 budget aims to slash funding for CISA. “ClickFix” malware targets both Windows and Linux systems through advanced social engineering. CISA warns of a critical Langflow vulnerability actively exploited in the wild. A new supply-chain attack targets Linux …
…
continue reading

1
Breaking news about breaking news Ep 87
1:02:29
1:02:29
Play later
Play later
Lists
Like
Liked
1:02:29Show notes: Breaking news about breaking news Ep 87By Testing Podcast
…
continue reading
Changing your mindset can change your behaviors. In this episode, SPCT and Strategic Advisor Horaki Nakaya explains why this is so important to a successful transformation for any organization. Like what you hear? Connect with Hiroaki on LinkedIn. Explore SAFe courses here.By Scaled Agile, inc.
…
continue reading
In this week’s episode, I dive into rapid triage techniques for non-core Windows executables to uncover signs of malicious activity.
…
continue reading

1
885: Python Polars: The Definitive Guide, with Jeroen Janssens and Thijs Nieuwdorp
1:15:22
1:15:22
Play later
Play later
Lists
Like
Liked
1:15:22Jeroen Janssens and Thijs Nieuwdorp are data frame library Polars’ greatest advocates in this episode with Jon Krohn, where they discuss their book, Python Polars: The Definitive Guide, best practice for using Polars, why Pandas users are switching to Polars for data frame operations in Python, and how the library reduces memory usage and compute t…
…
continue reading

1
They’re Not AI Mistakes, They’re Happy Little Incidents
45:35
45:35
Play later
Play later
Lists
Like
Liked
45:35All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series, and Andy Ellis, partner of YL Ventures. Their sponsored guest is Jadee Hanson, CISO of Vanta. In this episode: Find a partner to work with Fixing the root of burnout The limitations of human vigilance Balanci…
…
continue reading
Polypane is a specialized web development browser that simplifies creating and testing modern websites. A key feature is that it provides multiple screen sizes at once, with synchronized scrolling and interactions, so developers can test different layouts and breakpoints simultaneously. Polypane also focuses on accessibility tools, real-time previe…
…
continue reading
MalwareTech was an anonymous security researcher, until he accidentally stopped WannaCry, one of the largest ransomware attacks in history. That single act of heroism shattered his anonymity and pulled him into a world he never expected. https://malwaretech.com Sponsors Support for the show comes from Black Hills Information Security. Black Hills h…
…
continue reading

1
Signal clones, easyjson warning, UK retail hacker
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37Signal clone gets hacked Sounding the alarm on easyjson Ransomware group takes credit for UK retail attacks Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default…
…
continue reading
Radio Free Europe was built to counter disinformation behind the Iron Curtain. Now, as the Trump administration moves to defund it, authoritarians are expected to fill the void when trusted voices disappear. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
OWASP broken access control (noun) [Word Notes]
7:30
7:30
Play later
Play later
Lists
Like
Liked
7:30Please enjoy this encore of Word Notes. Software users are allowed access to data or functionality contrary to the defined zero trust policy by bypassing or manipulating the installed security controls.By N2K Networks
…
continue reading

1
The RMM protocol: Remote, risky, and ready to strike. [OMITB]
41:40
41:40
Play later
Play later
Lists
Like
Liked
41:40Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your host is Selena Larson, Proofpoint intelligence analyst and host of their podcast DISCARDED. Inspired by the residents of a building in New York’s exclusive upper west side, Selena is joined b…
…
continue reading

1
A Conversation with Bar-El Tayouri from Mend.io
45:53
45:53
Play later
Play later
Lists
Like
Liked
45:53➡ Get full visibility, risk insights, red teaming, and governance for your AI models, AI agents, RAGs, and more—so you can securely deploy AI powered applications with ul.live/mend In this episode, I speak with Bar-El Tayouri, Head of AI Security at Mend.io, about the rapidly evolving landscape of application and AI security—especially as multi-age…
…
continue reading

1
BONUS INTERVIEW: Senator Mark Warner on Signalgate, Volt Typhoon and tariffs
49:44
49:44
Play later
Play later
Lists
Like
Liked
49:44In this extended interview the Vice Chair of the Senate Select Committee on Intelligence, Senator Mark Warner, joins Risky Business host Patrick Gray to talk about: The latest developments in the Signalgate scandal Why America needs to be more aggressive in responding to Volt Typhoon How tariffs are affecting American alliances Why the Five Eyes al…
…
continue reading

1
AI’s Impact on Testing Careers with Jason Arbon
42:07
42:07
Play later
Play later
Lists
Like
Liked
42:07Show notes: AI’s Impact on Testing Careers with Jason ArbonBy Testing Podcast
…
continue reading

1
Mastering microservices with a former Uber and Netflix architect
30:26
30:26
Play later
Play later
Lists
Like
Liked
30:26Orkes is a developer-first enterprise workflow orchestration platform. Explore the developer edition or dive into the docs. Before cofounding Orkes, Jeu was an architect at Uber and Netflix. Find him on LinkedIn. Shoutout to Stack Overflow user Alex Stiff, whose answer to Bash - Sort a list of strings earned them a Lifeboat badge.…
…
continue reading

1
SANS Stormcast Tuesday, May 6th: Mirai Exploiting Samsung magicInfo 9; Kali Signing Key Lost;
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung s MagicInfo 9 CMS, was patched last August but attracted new attention last week after being mostly ignored so far. https://isc.sans.edu/diary/Mirai+No…
…
continue reading