AntStack is one of the leading full-stack serverless consulting companies aiming at disrupting the cloud computing space by providing holistic solutions to get you up and running with serverless. We specialize in providing services like application development, application modernization, UI engineering, and data engineering & modernization that empower businesses to achieve unmatched efficiency, and cost-effectiveness. Our team of experienced experts brings a wealth of knowledge to the table ...
…
continue reading
Welcome to The Data Flowcast: Mastering Apache Airflow ® for Data Engineering and AI— the podcast where we keep you up to date with insights and ideas propelling the Airflow community forward. Join us each week, as we explore the current state, future and potential of Airflow with leading thinkers in the community, and discover how best to leverage this workflow management system to meet the ever-evolving needs of data engineering and AI ecosystems. Podcast Webpage: https://www.astronomer.io ...
…
continue reading
A Podcast on Designing Bitcoin
…
continue reading
Explore the world of software engineering with the Joshua Matos Show, where we dive into Spring Boot, React, Java, and TypeScript. We'll talk about how to be successful as a Software Engineer, and all the things that you should know.
…
continue reading
Wil and Matt discuss tech, startups, and building really cool things with AI. Sometimes joined by (actual expert) friends.
…
continue reading
In The Front End, we explore the in's and out's of life as a developer. We delve into challenging topics around modern-day development and technology including learning and professional growth, programming languages, frameworks, tools, techniques, UX/UI, and careers.
…
continue reading
Find out what it takes to start a career in software development, data analytics, data science, or UI/UX design from those who made the leap. Hear from musicians, veterans, single-moms, teachers, bartenders, postdocs, warehouse workers, and more - all graduates of Nashville Software School (NSS) - as they discuss their transition to tech and their capstone projects presented at Demo Day. Founded in 2012, NSS is a flourishing community of over one thousand alumni, active students, and a team ...
…
continue reading
Hosted by Omid Mirzaee Yazdi, Fullstack Engineer at Knowit Syd, Texplosion brings you the latest and greatest in tech news, reviews and general nerdery. Whether you're a seasoned developer, a curious tech enthusiast, or just someone looking for a good laugh, this podcast has something for you. Every month we will discuss technology with an expert in the field. So grab your cup of coffee, sit back, relax, and get ready to laugh your tech-loving heart out.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Shifting Privacy Left features lively discussions on the need for organizations to embed privacy by design into the UX/UI, architecture, engineering / DevOps and the overall product development processes BEFORE code or products are ever shipped. Each Tuesday, we publish a new episode that features interviews with privacy engineers, technologists, researchers, ethicists, innovators, market makers, and industry thought leaders. We dive deeply into this subject and unpack the exciting elements ...
…
continue reading
The Women in Tech Podcast is hosted by WeAreLATech's Espree Devora and features inspiring Women in Tech from Engineers, Female Founders, Investors, UX and UI Designers, Journalists all sharing their story how they got to where they are today. The purpose of the show is for every listener to walk away feeling 'If She Can Do It So Can I'. Espree calls it "actionable empowerment". Show style/content is to Startup Podcast, WeAreLATech, Nerdette, Rocket, Tim Ferriss & Recode
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
EdTech and stories of personal development
…
continue reading
The #1 podcast for designers who animate, animators who design, and anyone who is 3D-curious. We interview Designers, Animators, 3D Artists, Producers, Studio Owners and other folks related to motion design and creativity. We get deep into the geeky world of Adobe After Effects, Cinema 4D, Photoshop and Illustrator. We talk about the business and art of Motion Design. Dig in.
…
continue reading
Welcome to Design Daily! A podcast around design, creators, and life with candid conversations featuring creators across design disciplines including architects, product designers, developers, artists and others in the design realm. Hosted by myself Austin Beck. Connect with me! | austinbeck.co YouTube | https://www.youtube.com/channel/UCfmoOuX5-2XpP-kSSTeK1aw?view_as=subscriber Instagram | https://www.instagram.com/the_austinbeck/ Twitter | https://twitter.com/the_austinbeck ISSUU | https:/ ...
…
continue reading

1
SANS Stormcast Friday, August 22nd, 2025: The -n switch; Commvault Exploit; Docker Desktop Escape Vuln;
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the …
…
continue reading

1
Focus Friend by Hank Green is #1 in the App Store with Bria Sullivan
38:34
38:34
Play later
Play later
Lists
Like
Liked
38:34In this episode, Scott sits down with Bria Sullivan, developer and founder of Honey B Games, to unpack the viral success of Focus Friend—the cozy productivity app that dethroned ChatGPT at the top of the App Store. Co-created with Hank Green, Focus Friend gamifies focus with a sock-knitting bean companion, offering users a whimsical yet effective w…
…
continue reading

1
Scaling On-Prem Airflow With 2,000 DAGs at Numberly with Sébastien Crocquevieille
24:17
24:17
Play later
Play later
Lists
Like
Liked
24:17Scaling 2,000+ data pipelines isn’t easy. But with the right tools and a self-hosted mindset, it becomes achievable. In this episode, Sébastien Crocquevieille, Data Engineer at Numberly, unpacks how the team scaled their on-prem Airflow setup using open-source tooling and Kubernetes. We explore orchestration strategies, UI-driven stakeholder access…
…
continue reading

1
SANS Stormcast Thursday, August 21st, 2025: Airtel Scans; Apple Patch; Microsoft Copilot Audit Log Issue; Password Manager Clickjacking
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
…
continue reading

1
SANS Stormcast Wednesday, August 20th, 2025: Increased Elasticsearch Scans; MSFT Patch Issues
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
…
continue reading

1
SANS Stormcast Tuesday, August 19th, 2025: MFA Bombing; Cisco Firewall Management Vuln; F5 Access for Android Vuln;
5:10
5:10
Play later
Play later
Lists
Like
Liked
5:10Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
…
continue reading

1
SANS Stormcast Monday, August 18th, 2025: 5G Attack Framework; Plex Vulnerability; Fortiweb Exploit; Flowise Vuln
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
…
continue reading

1
SANS Stormcast Friday, August 15th, 2025: Analysing Attack with AI; Proxyware via YouTube; Xerox FreeFlow Vuln; Evaluating Zero Trust @SANS_edu
15:12
15:12
Play later
Play later
Lists
Like
Liked
15:12AI and Faster Attack Analysis A few use cases for LLMs to speed up analysis https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198 Proxyware Malware Being Distributed on YouTube Video Download Site Popular YouTube download sites will attempt to infect users with proxyware. https://asec.ahnlab.com/en/89574/ Xero…
…
continue reading

1
Inside the Maker Mindset with Roboticist Aaed Musa
31:47
31:47
Play later
Play later
Lists
Like
Liked
31:47From wrist‑mounted CD launchers to rope‑driven quadrupeds, Purdue engineering student and YouTuber Aaed Musa turns wild ideas into precision‑crafted reality. On Hanselminutes, he joins Scott Hanselman to share the art, grit, and storytelling behind his most ambitious projects — and why iteration is his superpower. https://www.aaedmusa.com/…
…
continue reading

1
How Moniepoint Group Uses Airflow for Exposure Monitoring with Adeolu Adegboye
21:32
21:32
Play later
Play later
Lists
Like
Liked
21:32Managing financial data at scale requires precise orchestration and proactive monitoring to maintain operational efficiency. In this episode, we are joined by Adeolu Adegboye, Data Engineer at Moniepoint Group, who shares how his team uses data pipelines and workflow automation to manage high volumes of transactions, ensure timely alerts and suppor…
…
continue reading

1
SANS Stormcast Thursday, August 14th, 2025: Equation Editor; Kerberos Patch; XZ-Utils Backdoor; ForitSIEM/FortiWeb patches
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16CVE-2017-11882 Will Never Die The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email. https://isc.sans.edu/diary/CVE-2017-11882%20Will%20Never%20Die/32196 Windows Kerberos El…
…
continue reading

1
SANS Stormcast Wednesday, August 13th, 2025: Microsoft Patch Tuesday; libarchive vulnerability upgrade; Adobe Patches
8:55
8:55
Play later
Play later
Lists
Like
Liked
8:55Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression…
…
continue reading

1
Uncut with Danilo Leal, Design Engineer at Zed, Prototyping in React and Built in Rust, Designing for an AI Assisted UX
1:00:42
1:00:42
Play later
Play later
Lists
Like
Liked
1:00:42TDLR: 10 episodes in and we are going full uncut conversation with Danilo Leal. One of the magician Design Engineers working on the Zed code editor. “I'll be making a jingle” “We prototype everything in React before Rust” Danilo Leal represents a new breed of designer and engineer. The role of design is becoming more approachable with technology. A…
…
continue reading

1
SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto;
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of…
…
continue reading

1
SANS Stormcast Monday, August 11th, 2025: Fake Tesla Preorders; Bad USB Cameras; Win-DoS Epidemic
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07Google Paid Ads for Fake Tesla Websites Someone is setting up fake Tesla lookalike websites that attempt to collect credit card data from unsuspecting users trying to preorder Tesla products. https://isc.sans.edu/diary/Google%20Paid%20Ads%20for%20Fake%20Tesla%20Websites/32186 Compromising USB Devices for Persistent Stealthy Access USB devices, like…
…
continue reading

1
SANS Stormcast Friday, August 8th, 2025:: ASN43350 Mass Scans; HTTP1.1 Must Die; Hyprid Exchange Vuln; Sonicwall Update; SANS.edu Research: OSS Security and Shifting Left
23:59
23:59
Play later
Play later
Lists
Like
Liked
23:59Mass Internet Scanning from ASN 43350 Our undergraduate intern Duncan Woosley wrote up aggressive scans from ASN 43350 https://isc.sans.edu/diary/Mass+Internet+Scanning+from+ASN+43350+Guest+Diary/32180/#comments HTTP/1.1 Desync Attacks Portswigger released details about new types of HTTP/1.1 desync attacks it uncovered. These attacks are particular…
…
continue reading

1
Learning to Code with AI and Steve Klabnik
43:12
43:12
Play later
Play later
Lists
Like
Liked
43:12Steve Klabnik wasn't a fan of AI. He knows how to code at high and low levels...but then he tried again. Now he's making more, shipping more, coding more, and having more fun. Is this a moral choice or a techincal one or both?By Scott Hanselman
…
continue reading

1
Inside Bosch’s Airflow 3 Revolution: Remote Execution with Jens Scheffler
28:02
28:02
Play later
Play later
Lists
Like
Liked
28:02The evolution of Airflow has reached a milestone with the introduction of remote execution in Airflow 3, enabling flexible orchestration across distributed environments. In this episode, Jens Scheffler, Test Execution Cluster Technical Architect at Bosch, shares insights on how his team’s need for large-scale, cross-environment testing influenced t…
…
continue reading

1
SANS Stormcast Thursday, August 7th, 2025: Sextortion Update; Adobe and Trend Micro release emergency patches
5:06
5:06
Play later
Play later
Lists
Like
Liked
5:06Do Sextortion Scams Still Work in 2025? Jan looked at recent sextortion emails to check if any of the crypto addresses in these emails received deposits. Sadly, some did, so these scams still work. https://isc.sans.edu/diary/Do%20sextortion%20scams%20still%20work%20in%202025%3F/32178 Akira Ransomware Group s use of Drivers Guidepoint Security obser…
…
continue reading

1
Sub Agent or Super Agent, MCP UI Over Lunch, Bitter Lesson Learnings, Locking in on Prompts and Trying to Live in the Future
57:46
57:46
Play later
Play later
Lists
Like
Liked
57:46TLDR Matt caught whitebait for dinner during his outdoor adventures. Wing foiling is a new sport gaining popularity. Sub agents are necessary for exploring context windows in AI. A2A and MCP servers are the future of AI integration. AI-assisted code review can streamline the development process. Prompting techniques are evolving and require careful…
…
continue reading

1
SANS Stormcast Wednesday, August 6th, 2025: Machinekeys and VIEWSTATEs; Perplexity Unethical Learning; SonicWall Updates
7:41
7:41
Play later
Play later
Lists
Like
Liked
7:41Stealing Machinekeys for fun and profit (or riding the SharePoint wave) Bojan explains in detail how .NET uses Machine Keys to protect the VIEWSTATE, and how to abuse the VIEWSTATE for code execution if the Machine Keys are lost. https://isc.sans.edu/diary/Stealing%20Machine%20Keys%20for%20fun%20and%20profit%20%28or%20riding%20the%20SharePoint%20wa…
…
continue reading

1
SANS Stormcast Tuesday, August 05, 2025: Daily Trends Report; NVidia Triton RCE; Cursor AI Misconfiguration
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48Daily Trends Report A new trends report will bring you daily data highlights via e-mail. https://isc.sans.edu/diary/New%20Feature%3A%20Daily%20Trends%20Report/32170 NVidia Triton RCE Wiz found an interesting information leakage vulnerability in NVidia s Triton servers that can be leveraged to remote code execution. https://www.wiz.io/blog/nvidia-tr…
…
continue reading

1
SANS Stormcast Monday, August 4th, 2025: Legacy Protocols; Sonicwall SSL VPN Possible 0-Day;
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17Scans for pop3user with guessable password A particular IP assigned to a network that calls itself Unmanaged has been scanning telnet/ssh for a user called pop3user with passwords pop3user or 123456 . I assume they are looking for legacy systems that either currently run pop3 or ran pop3 in the past, and left the user enabled. https://isc.sans.edu/…
…
continue reading

1
SANS Stormcast Friday, August 1st, 2025: Scattered Spider Domains; Excel Blocking Dangerous Links; CISA Releasing Thorium Platform
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41Scattered Spider Related Domain Names A quick demo of our domain feeds and how they can be used to find Scattered Spider related domains https://isc.sans.edu/diary/Scattered+Spider+Related+Domain+Names/32162 Excel External Workbook Links to Blocked File Types Will Be Disabled by Default Excel will discontinue allowing links to dangerous file types …
…
continue reading

1
How is AlmaLinux OS is community-driven? with benny Vasquez
34:14
34:14
Play later
Play later
Lists
Like
Liked
34:14In this episode, Scott Hanselman sits down with benny Vasquez, Chair of the AlmaLinux OS Foundation, to explore the project's journey since the shift away from CentOS. benny shares insights into how AlmaLinux stays community-driven, transparent, and enterprise-ready—all while navigating the evolving world of open-source licensing. It's a candid and…
…
continue reading

1
Inside Modern Data Infrastructure at Massdriver with Cory O’Daniel and Jake Ferriero
31:24
31:24
Play later
Play later
Lists
Like
Liked
31:24Managing modern data platforms means navigating a web of complex infrastructure, competing team needs and evolving security standards. For data teams to truly thrive, infrastructure must become both accessible and compliant without sacrificing velocity or reliability. In this episode, we’re joined by Cory O’Daniel, CEO and Co-Founder at Massdriver,…
…
continue reading

1
SANS Stormcast Thursday July 31st, 2025: Firebase Security; WebKit Vuln Exploited; Scattered Spider Update
6:40
6:40
Play later
Play later
Lists
Like
Liked
6:40Securing Firebase: Lessons Re-Learned from the Tea Breach Inspried by the breach of the Tea app, Brendon Evans recorded a video to inform of Firebase security issues https://isc.sans.edu/diary/Securing%20Firebase%3A%20Lessons%20Re-Learned%20from%20the%20Tea%20Breach/32158 WebKit Vulnerability Exploited before Apple Patch A WebKit vulnerablity patch…
…
continue reading

1
NSS Alumni Forge A Path In Data Engineering | Stories From The Hackery
59:54
59:54
Play later
Play later
Lists
Like
Liked
59:54In this episode of Stories from the Hackery, we explore the emerging field of data engineering with NSS alumni Teresa Whitesell and Joshua Rio-Ross. They share their career journeys and how their education in data analytics and data science set a solid foundation for their data engineering roles. Teresa discusses the critical role of data engineeri…
…
continue reading

1
SANS Stormcast Wednesday July 30th, 2025: Apple Updates; Python Triage; Papercut Vuln Exploited
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Apple Updates Everything: July 2025 Edition Apple released updates for all of its operating systems patching 89 different vulnerabilities. Many vulnerabilities apply to multiple operating systems. https://isc.sans.edu/diary/Apple%20Updates%20Everything%3A%20July%202025/32154 Python Triage A quick python script by Xavier to efficiently search throug…
…
continue reading

1
SANS Stormcast Tuesday, July 29th, 2025:Parasitic Exploits; Cisco ISE Exploit; MyASUS Vuln
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a bl…
…
continue reading

1
SANS Stormcast Monday, July 28th, 2025: Linux Namespaces; UI Automation Abuse; Autoswagger
5:39
5:39
Play later
Play later
Lists
Like
Liked
5:39Linux Namespaces Linux namespaces can be used to control networking features on a process-by-process basis. This is useful when trying to present a different network environment to a process being analysed. https://isc.sans.edu/diary/Sinkholing%20Suspicious%20Scripts%20or%20Executables%20on%20Linux/32144 Coyote in the Wild: First-Ever Malware That …
…
continue reading

1
SANS Stormcast Friday, July 25th, 2025: ficheck.py; Mital and SonicWall Patches
5:20
5:20
Play later
Play later
Lists
Like
Liked
5:20New File Integrity Tool: ficheck.py Jim created a new tool, ficheck.py, that can be used to verify file integrity. It is a drop-in replacement for an older tool, fcheck, which was written in Perl and no longer functions well on modern Linux distributions. https://isc.sans.edu/diary/New%20Tool%3A%20ficheck.py/32136 Mitel Vulnerability Mitel released…
…
continue reading

1
Breaking Barriers in Tech with Brenda Darden Wilkerson
32:18
32:18
Play later
Play later
Lists
Like
Liked
32:18In this episode of Hanselminutes, Scott Hanselman chats with Brenda Darden Wilkerson, the President and CEO of AnitaB.org, about her journey in technology and advocacy for diversity, equity, and inclusion in the tech industry. Brenda shares her inspiring story of entering computer science by accident, overcoming societal perceptions, and her impact…
…
continue reading

1
SANS Stormcast Thursday, July 24th, 2025: Reversing SharePoint Exploit; NPM “is” Compromise;
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53Reversing SharePoint Toolshell Exploits CVE-2025-53770 and CVE-2025-53771 A quick walk-through showing how to decode the payload of recent SharePoint exploits https://isc.sans.edu/diary/Analyzing%20Sharepoint%20Exploits%20%28CVE-2025-53770%2C%20CVE-2025-53771%29/32138 Compromised JavaScript NPM is Package The popular npm package is was compromised …
…
continue reading

1
SANS Stormcast Wednesday, July 23rd, 2025: Sharepoint 2016 Patch; MotW Privacy and WinZip; Interlock Ransomware; Sophos Patches
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17Microsoft Updates SharePoint Vulnerability Guidance CVE-2025-53770 and CVE-2025-53771 Microsoft released its update for SharePoint 2016, completing the updates across all currently supported versions. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/ WinZip MotW Privacy Starting with version 7.10…
…
continue reading

1
SANS Stormcast Tuesday, July 22nd, 2025: SharePoint Emergency Patches; How Long Does Patching Take; HPE Wifi Vuln; Zoho WorkDrive Abused
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00Microsoft Released Patches for SharePoint Vulnerability CVE-2025-53770 CVE-2025-53771 Microsoft released a patch for the currently exploited SharePoint vulnerability. It also added a second CVE number identifying the authentication bypass vulnerability. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-…
…
continue reading

1
SANS Stormcast Monday July 21st, 2025: Sharepoint Exploited; Veeam Fake Voicemail Phish; Passkey Phishing Attack
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0Day+Vulnerablity+Exploited+CVE202553770+ToolShell/32122/ Veeam Voicemail Phishing Attackers appear to impersonate …
…
continue reading

1
Study Says AI Makes Developers Slower? F1 Movie Review, Coding and Testing for AI, Free Perplexity and Free Ideas
1:09:54
1:09:54
Play later
Play later
Lists
Like
Liked
1:09:54News The pod has twitter/x - https://x.com/badagentpod Wil’s new brand - tritanclub.com Links Boris Tane post on Cloudflare DOs + Drizzle - https://boristane.com/blog/durable-objects-database-per-user/ Experience with Claude Code - https://sankalp.bearblog.dev/my-claude-code-experience-after-2-weeks-of-usage/ Focus on inputs not outputs: https://jo…
…
continue reading

1
SANS Stormcast Friday, July 18th, 2025: Extended File Attributes; Critical Cisco ISE Patch; VMWare Patches; Quarterly Oracle Patches
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
…
continue reading

1
The Art of Assembly: Exploring Low-Level Mastery with Randall Hyde
37:28
37:28
Play later
Play later
Lists
Like
Liked
37:28In this episode of Hanselminutes, Scott Hanselman talks with Randall Hyde, renowned for his expertise in programming and assembly language. Known as the creator of the Lisa Assembler and the author of The Art of Assembly Language and Write Great Code series, Randall shares his journey from developing in assembler for early computing systems to work…
…
continue reading

1
The Future of Airflow Telemetry with Bolke de Bruin
21:55
21:55
Play later
Play later
Lists
Like
Liked
21:55Telemetry has the potential to guide the future of Airflow, but only if it’s implemented transparently and with community trust. In this episode, we’re joined by Bolke de Bruin, Director at Metyis and a long-time Airflow PMC member. Bolke discusses how telemetry has been handled in the past, why it matters now and what it will take to get it right.…
…
continue reading

1
SANS Stormcast Thursday, July 17th, 2025: catbox.moe abuse; Sonicwall Attacks; Rendering Issues
5:09
5:09
Play later
Play later
Lists
Like
Liked
5:09More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112 Ongoing SonicWall Secure Mobile Access (SMA) Exploitation…
…
continue reading

1
SANS Stormcast Wednesday, July 16th, 2025: ADS Keystroke Logger; Fake Homebrew; Broadcom Altiris RCE; Malicious Cursor AI Extensions
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%20Stored%20in%20an%20ADS/32108 Malvertising Homebrew An attacker has been attempting to trick users into installing a malicious versi…
…
continue reading

1
SANS Stormcast Monday, July 14th, 2025: Web Honeypot Log Volume; Browser Extension Malware; RDP Forensics
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse s residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that Jesse runs. https://isc.sans.edu/diary/DSh…
…
continue reading

1
SANS Stormcast Monday, July 14th, 2025: Suspect Domain Feed; Wing FTP Exploited; FortiWeb Exploited; NVIDIA GPU Rowhammer
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102 Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812 Huntress saw active exploitation of…
…
continue reading