show episodes
 
Interviews from Bret Fisher's live show with co-host Nirmal Mehta. Topics cover container and cloud topics like Docker, Kubernetes, Swarm, Cloud Native development, DevOps, SRE, GitOps, DevSecOps, platform engineering, and the full software lifecycle. Full show notes and more info available at https://podcast.bretfisher.com
  continue reading
 
Artwork

1
Software Defined Talk

Software Defined Talk LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
  continue reading
 
Artwork

1
Now in Android

Now in Android

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This show gives listeners a quick run-down on things that the Android team has done recently that developers may want to check out. It covers library and platform releases, articles, videos, podcasts, samples, codelabs - whatever seems relevant and interesting for Android developers. Subscribe to Android Developers YouTube → https://goo.gle/AndroidDevs Android’s a big platform and there are many things being released all the time; listen to this podcast to stay up to date on what those thing ...
  continue reading
 
Artwork

1
Cloud Unplugged

Jon Shanks, Lewis Marshall

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Each week, Jon Shanks, CEO of cloud-native consultancy and product business Appvia, and tech evangelist Lewis Marshall, senior developer and AI enthusiast, analyse the biggest news stories that week, that are shaping Cloud, Data and AI. Alongside their insight, they invite frontline leaders, Chief Technology Officers and engineering heads from established, cloud-powered organisations to share candid lessons from running real-world workloads at scale. Together, they take the headlines and get ...
  continue reading
 
ShipTalk is the podcast series on the ins, outs, ups, and downs of software delivery. This series dives into the vast ocean Software Delivery, bringing aboard industry tech leaders, seasoned engineers, and insightful customers to navigate through the currents of the ever-evolving software landscape. Each session explores the real-world challenges and victories encountered by today’s tech innovators. Whether you’re an Engineering Manager, Software Engineer, or an enthusiast in Software delive ...
  continue reading
 
Designed & engineered specifically for Dental Practices. Adit is the only dental software that integrates Calls, Texts, Emails, Patient Forms, Online Scheduling, Analytics, Reviews, Payments and more, all in one place! These features are all manageable within Adit's centralized platform, along with detailed insights on all marketing campaigns – Google Ads, social media marketing, or even billboards and flyers. https://www.adit.com
  continue reading
 
Welcome to the Cloud Gaming Xtreme Podcast. In this podcast, We Cover every Cloud Gaming Platform. Platforms such as Nvidia Geforce Now, Microsoft Project Xcloud, Shadow, and Google Stadia. We talk about the recent news and discussions in the cloud gaming universe. We have 7 awesome members on the panel who are passionate about cloud gaming. This podcast goes live on youtube every Saturday afternoons at 2 pm PT. You can check out our youtube channel at https://www.youtube.com/CloudGamingXtre ...
  continue reading
 
Artwork

1
Netenrich Resolution Intelligence Cloud Podcast

netenrichresolutionintelligencecloud

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Netenrich invites security professionals to learn how they can optimize their security operations, remove silos, and gain increased efficiencies with the tools and systems they have. This podcast series is focused on effective detection, investigation, and response techniques where data and analytics is at the foundation. Hear from leading cybersecurity experts on how they’re transforming security ops. Netenrich boosts security and digital operations effectiveness so that organizations can a ...
  continue reading
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
  continue reading
 
Artwork

1
The Modern .NET Show

Jamie Taylor

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Calling all .NET developers! Dive into the heart of modern .NET technology with us. We are the go-to podcast for all .NET developers worldwide; providing an audio toolbox for developers who use modern .NET. Our show, previously known as The .NET Core Podcast, is all about keeping you up-to-date and empowered in this ever-evolving field. Tune in for engaging interviews with industry leaders, as we discuss the topics every .NET developer should be well-versed in. From cross-platform wonders to ...
  continue reading
 
Artwork

1
Untold Stories Podcast

Chabi Dhakal & Sagar Dangal

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Untold Stories is a new podcast started from January 2022, which is cohosted by two hosts Chabi Dhakal from Ontario, Canada and Sagar Dangal from Michigan, USA. The main goal of the Podcast is to create a platform to have a casual and raw conversation with various personalities from different field such as Business, Sports, Community Services, Education, Entertainment, etc. We hope to provide value to our listeners through our guest’s untold stories, experiences, perspectives, and opinions. ...
  continue reading
 
Artwork

1
RecruitingDaily Podcast

William Tincup

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The RecruitingDaily Podcast is a series of conversations and interviews with thought leaders and practitioners. Each week, the topic digs into the biggest challenges faced in HR, recruiting, and the latest technology innovations you should know about. Listen & Subscribe on your favorite platform Apple | Spotify | Google | Amazon
  continue reading
 
Find me on Github/Twitter/Kaggle @SamDeepLearning. Find me on LinkedIn @SamPutnam. This Podcast is supported by Enterprise Deep Learning | Cambridge/Boston | New York City | Hanover, NH | http://www.EnterpriseDeepLearning.com. Contact: [email protected], 802-299-1240, P.O. Box 863, Hanover, NH, USA, 03755. We move deep learning to production. I teach the worldwide Deploying Deep Learning Masterclass at http://www.DeepLearningConf.com in NYC regularly and am a Deep Learning Consultant ser ...
  continue reading
 
How can Fintech contribute to building a better world? In Season 4 of Fintech Files, we’re turning our focus to where financial technology meets social impact. This season, we explore financial inclusion, sustainable investing, and decarbonization with some of the brightest minds in the industry. As financial services touch every aspect of our lives, the opportunity to drive positive change is enormous. About Fintech Files: Join us on Fintech Files from BCG Platinion as we explore the cuttin ...
  continue reading
 
Interchange is about integrated transport infrastructure as the solution to achieving a more effective and decarbonised transport network. The Interchange podcast is a monthly show, produced in association with Arcadis https://www.arcadis.com/en Hosted by Ayo Abbas, the show will drill down into the challenges, the opportunities and the economic, environmental and societal benefits we could gain by having a low carbon, seamless, and fully integrated transport system that works. Each month we ...
  continue reading
 
Employing an outside company to handle all payroll-related duties is known as outsourcing payroll services in a business. The main reasons for using payroll management services are to cut costs and free up time when handling payroll-related financial operations. Employing a third party to handle payroll operations frees up a company from having to recruit and educate a sizable in-house payroll team, buy suitable payroll software, and keep up with complicated tax regulations. All business typ ...
  continue reading
 
Loading …
show series
 
Show Description What helps you remember a person's name, thinking about background coding agents, is AI for append only mode, what are MCPs and how should I think about them, what has been working for more than a month not just the last two days, and coming up with an RSS starter pack riffing off Molly White's article on using RSS. Listen on Websi…
  continue reading
 
Google Paid Ads for Fake Tesla Websites Someone is setting up fake Tesla lookalike websites that attempt to collect credit card data from unsuspecting users trying to preorder Tesla products. https://isc.sans.edu/diary/Google%20Paid%20Ads%20for%20Fake%20Tesla%20Websites/32186 Compromising USB Devices for Persistent Stealthy Access USB devices, like…
  continue reading
 
This week, we discuss cloud earnings, what’s driving valuations, and why AWS says it’s still early innings for cloud. Plus, Coté does a deep dive on Shipley Donuts. Watch the YouTube Live Recording of Episode 532 Runner-up Titles Dangerous to do things in bed Free Donut Holes Dark Fiber BET A man can not believe anything that devalues their index f…
  continue reading
 
Mass Internet Scanning from ASN 43350 Our undergraduate intern Duncan Woosley wrote up aggressive scans from ASN 43350 https://isc.sans.edu/diary/Mass+Internet+Scanning+from+ASN+43350+Guest+Diary/32180/#comments HTTP/1.1 Desync Attacks Portswigger released details about new types of HTTP/1.1 desync attacks it uncovered. These attacks are particular…
  continue reading
 
Do Sextortion Scams Still Work in 2025? Jan looked at recent sextortion emails to check if any of the crypto addresses in these emails received deposits. Sadly, some did, so these scams still work. https://isc.sans.edu/diary/Do%20sextortion%20scams%20still%20work%20in%202025%3F/32178 Akira Ransomware Group s use of Drivers Guidepoint Security obser…
  continue reading
 
Luke Hinds, CTO of Stacklok and creator of Sigstore, speaks with SE Radio's Brijesh Ammanath about the privacy and security concerns of using AI coding agents. They discuss how the increased use of AI coding assistants has improved programmer productivity but has also introduced certain key risks. In the area of secrets management, for example, the…
  continue reading
 
This episode is a crossover with our friends at the SRE Prodcast. Kaslin joined Ben Good and Steve McGhee to talk about Kubernetes for Platform Engineering. Do you have something cool to share? Some questions? Let us know: - web: kubernetespodcast.com - mail: [email protected] - twitter: @kubernetespod - bluesky: @kubernetespodcast.com N…
  continue reading
 
Welcome to Now in Android, your ongoing guide to what's new and notable in the world of Android development. Dan covers Android Canaries, Agentic AI, 16 KB Page Size requirements, and new subscription tools, Resources: Canary release channel → https://goo.gle/4lMWgjh Agentic AI with Gemini in Android Studio → https://goo.gle/3GUZzpi Prepare your Pl…
  continue reading
 
Stealing Machinekeys for fun and profit (or riding the SharePoint wave) Bojan explains in detail how .NET uses Machine Keys to protect the VIEWSTATE, and how to abuse the VIEWSTATE for code execution if the Machine Keys are lost. https://isc.sans.edu/diary/Stealing%20Machine%20Keys%20for%20fun%20and%20profit%20%28or%20riding%20the%20SharePoint%20wa…
  continue reading
 
Daily Trends Report A new trends report will bring you daily data highlights via e-mail. https://isc.sans.edu/diary/New%20Feature%3A%20Daily%20Trends%20Report/32170 NVidia Triton RCE Wiz found an interesting information leakage vulnerability in NVidia s Triton servers that can be leveraged to remote code execution. https://www.wiz.io/blog/nvidia-tr…
  continue reading
 
Show Description It's time for a ShopTalk GearTalk segment on video and audio upgrades, a chat about better YouTube thumbnails, buying the $200 Yamaha guitar (or equivalent in other areas of life), Chris and Dave riff on CSS modules, and what's your social media ethos in 2025? Listen on Website → Links how to make a killer thumbnail (for the 2025 a…
  continue reading
 
Scans for pop3user with guessable password A particular IP assigned to a network that calls itself Unmanaged has been scanning telnet/ssh for a user called pop3user with passwords pop3user or 123456 . I assume they are looking for legacy systems that either currently run pop3 or ran pop3 in the past, and left the user enabled. https://isc.sans.edu/…
  continue reading
 
This week, we discuss the AI hype cycle, Astronomer’s viral moment, and yet another YAML flavor — KYAML. Plus, private equity is coming for your donuts. Watch the YouTube Live Recording of Episode 531 Runner-up Titles Sometimes it’s hard to make money I’ve given into Big Donut Maybe you can fake your way through life At some point you have to have …
  continue reading
 
Scattered Spider Related Domain Names A quick demo of our domain feeds and how they can be used to find Scattered Spider related domains https://isc.sans.edu/diary/Scattered+Spider+Related+Domain+Names/32162 Excel External Workbook Links to Blocked File Types Will Be Disabled by Default Excel will discontinue allowing links to dangerous file types …
  continue reading
 
Securing Firebase: Lessons Re-Learned from the Tea Breach Inspried by the breach of the Tea app, Brendon Evans recorded a video to inform of Firebase security issues https://isc.sans.edu/diary/Securing%20Firebase%3A%20Lessons%20Re-Learned%20from%20the%20Tea%20Breach/32158 WebKit Vulnerability Exploited before Apple Patch A WebKit vulnerablity patch…
  continue reading
 
Apple Updates Everything: July 2025 Edition Apple released updates for all of its operating systems patching 89 different vulnerabilities. Many vulnerabilities apply to multiple operating systems. https://isc.sans.edu/diary/Apple%20Updates%20Everything%3A%20July%202025/32154 Python Triage A quick python script by Xavier to efficiently search throug…
  continue reading
 
Wesley Beary of Anchor speaks with host Sam Taggart about designing APIs with a particular emphasis on user experience. Wesley discusses what it means to be an “API connoisseur”— paying attention to what makes the APIs we consume enjoyable or frustrating and then taking those lessons and using them when we design our own APIs. Wesley and Sam also e…
  continue reading
 
Bret is joined by Andrew Tunall, the President and Chief Product Officer at Embrace, to discuss his prediction that we’ll all start shipping non-QA'd code (buggier code in production) and QA will need to be replaced with better observability. 🙌 My next course is coming soon! I've opened the waitlist for those wanting to go deep in GitHub Actions fo…
  continue reading
 
Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a bl…
  continue reading
 
In this episode of ShipTalk, Chinmay Gaikwad sits down with Aravind Putrevu, Head of Developer Relations at CodeRabbit, and dives into the evolving landscape of AI in software development. Aravind shares insights on the influence of AI tools across the software development lifecycle, from coding and code reviews to automation and security. Aravind …
  continue reading
 
Show Description Tim Farnam stops by to talk with Chris and Dave about his new project, Hot Page, and why and how he started building it after working in print and web news. (20% discount code for the Design Tokens Course: SHOPTALKSHOWISAWESOME) Listen on Website → Guests Tim Farnam Guest's Main URL • Guest's Social Creative coder based in Mexico C…
  continue reading
 
Linux Namespaces Linux namespaces can be used to control networking features on a process-by-process basis. This is useful when trying to present a different network environment to a process being analysed. https://isc.sans.edu/diary/Sinkholing%20Suspicious%20Scripts%20or%20Executables%20on%20Linux/32144 Coyote in the Wild: First-Ever Malware That …
  continue reading
 
Guests are Pierre-Gilles Mialon and Glen Yu. Pierre-Gilles and Glen are Google Developer Experts. We had an opportunity to catch up with them at Next 2025 and we spoke about Platform Engineering, GitOps, Policy as code and AI. Do you have something cool to share? Some questions? Let us know: - web: kubernetespodcast.com - mail: kubernetespodcast@go…
  continue reading
 
This week, we cover AI going rogue, Cloudflare declaring independence, and the secure container craze. Plus, Matt bravely judges 9 new emoji. Watch the YouTube Live Recording of Episode 530 Runner-up Titles VP of getting it on Neutral trombone Good Margin Independent from what? The New Benevolence I have plenty of cynicism for other things Rundown …
  continue reading
 
New File Integrity Tool: ficheck.py Jim created a new tool, ficheck.py, that can be used to verify file integrity. It is a drop-in replacement for an older tool, fcheck, which was written in Perl and no longer functions well on modern Linux distributions. https://isc.sans.edu/diary/New%20Tool%3A%20ficheck.py/32136 Mitel Vulnerability Mitel released…
  continue reading
 
Reversing SharePoint Toolshell Exploits CVE-2025-53770 and CVE-2025-53771 A quick walk-through showing how to decode the payload of recent SharePoint exploits https://isc.sans.edu/diary/Analyzing%20Sharepoint%20Exploits%20%28CVE-2025-53770%2C%20CVE-2025-53771%29/32138 Compromised JavaScript NPM is Package The popular npm package is was compromised …
  continue reading
 
Chris Love, co-author of the book Core Kubernetes, joins host Robert Blumen for a conversation about kubernetes security. Chris identifies the node layer, secrets management, the network layer, contains, and pods as the most critical areas to be addressed. The conversation explores a range of topics, including when to accept defaults and when to ov…
  continue reading
 
Microsoft Updates SharePoint Vulnerability Guidance CVE-2025-53770 and CVE-2025-53771 Microsoft released its update for SharePoint 2016, completing the updates across all currently supported versions. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/ WinZip MotW Privacy Starting with version 7.10…
  continue reading
 
Microsoft Released Patches for SharePoint Vulnerability CVE-2025-53770 CVE-2025-53771 Microsoft released a patch for the currently exploited SharePoint vulnerability. It also added a second CVE number identifying the authentication bypass vulnerability. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-…
  continue reading
 
Show Description Dave's coming in hot from vacation, how CodePen's new editor imports packages, should CodePen fix your code if you forgot something, the struggle to get the right context in the console, Chris is still shopping for an Arc replacement, and the struggles with inspiration driven engineering. (20% discount code for the Design Tokens Co…
  continue reading
 
SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0Day+Vulnerablity+Exploited+CVE202553770+ToolShell/32122/ Veeam Voicemail Phishing Attackers appear to impersonate …
  continue reading
 
This week, we discuss Windsurf being acquired (again), how much AI agents really help with coding, and AWS launching Kiro. Plus, Matt attempts to design a new closet. Watch the YouTube Live Recording of Episode 529 Runner-up Titles "The backlog will always be with you." The things I dream about… Closet debt It’s about the money They call it busines…
  continue reading
 
Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
  continue reading
 
More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112 Ongoing SonicWall Secure Mobile Access (SMA) Exploitation…
  continue reading
 
Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%20Stored%20in%20an%20ADS/32108 Malvertising Homebrew An attacker has been attempting to trick users into installing a malicious versi…
  continue reading
 
Jacob Visovatti and Conner Goodrum of Deepgram speak with host Kanchan Shringi about testing ML models for enterprise use and why it's critical for product reliability and quality. They discuss the challenges of testing machine learning models in enterprise environments, especially in foundational AI contexts. The conversation particularly highligh…
  continue reading
 
DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse s residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that Jesse runs. https://isc.sans.edu/diary/DSh…
  continue reading
 
Show Description Chris and Dave chat about whether you should wing it or script your videos, unplanned demos versus the safety net of edited videos, streaming software with Ecamm Live vs OBS vs Streamlabs, new CSS animation composition, and anchor positioning thoughts. (20% discount code for the Design Tokens Course: SHOPTALKSHOWISAWESOME) Listen o…
  continue reading
 
Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102 Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812 Huntress saw active exploitation of…
  continue reading
 
This week, we discuss the return of command line tools, Kubernetes embracing VMs, and the steady march of Windows. Plus, thoughts on TSA, boots, and the “old country." Watch the YouTube Live Recording of Episode 528 Runner-up Titles Pool Problems Stockholm Pool Syndrome The Old Country VMs aren’t going anywhere Vaya con Dios This is why we have mil…
  continue reading
 
SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this particular case, the Yandex mail server was the primary victim of these attacks. https://isc.sans.edu/diary/SSH%20Tunneling%20in%20Act…
  continue reading
 
Samuel Colvin, the CEO and founder of Pydantic, speaks with host Gregory M. Kapfhammer about the ecosystem of Pydantic’s Python frameworks, including Pydantic, Pydantic AI, and Pydantic Logfire. Along with discussing the design, implementation, and use of these frameworks, they dive into the refactoring of Pydantic and the follow-on performance imp…
  continue reading
 
Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20Development%3A%20Why%20and%20How./32092 Animation-Driven Tapjacking on Android Attackers can use a clic…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play