show episodes
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
A daily news analysis show on all things artificial intelligence. NLW looks at AI from multiple angles, from the explosion of creativity brought on by new tools like Midjourney and ChatGPT to the potential disruptions to work and industries as we know them to the great philosophical, ethical and practical questions of advanced general intelligence, alignment and x-risk.
  continue reading
 
Artwork

1
Developer Tea

Jonathan Cutrell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 17 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell, engineering leader with over 15 years of industry experience. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Email: [email protected]
  continue reading
 
We live in a world where our civilization and daily lives depend upon institutions, infrastructure, and technological substrates that are _complicated_ but not _unknowable_. Join Patrick McKenzie (patio11) as he discusses how decisions, technology, culture, and incentives shape our finance, technology, government, and more, with the people who built (and build) those Complex Systems.
  continue reading
 
Artwork
 
Is bringing up your software engineering salary a dating red flag? How do you strike a balance between career ambition and incendiary burnout? Is it ever okay to hold your code hostage in escrow? Navigating a career in tech raises a lot of tricky questions that aren’t exactly appropriate for the daily stand-up. So let’s take this off the VPN. In this new podcast from Jellyfish, work besties Jasmine and Allison scour the internet to find the real questions engineers and developers are whisper ...
  continue reading
 
What does it take to be a great leader? We asked some of the most influential names in software engineering and product management. You’ll learn ways to grow as a software engineering leader, optimize your time, develop your team, structure your organization, and get the right products to market, faster. In each episode, Joshua Samberg and Robin Pokorný uncover the empowering insights and daily habits of industry leaders who think, speak, and act in ways that make a positive difference in th ...
  continue reading
 
Artwork

1
Built This Week

Jordan Metzner, Samuel Nadler

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Built This Week is a weekly podcast where real builders share what they're shipping, the AI tools they're trying, and the tech news that actually matters. Hosted by Sam and Jordan from Ryz Labs, the show offers a raw, inside look at building products in the AI era—no fluff, no performative hype, just honest takes and practical insights from the front lines.
  continue reading
 
Few careers have the kind of daily worldwide impact as software engineering. It shapes the interactions that billions of people have online across so many moments of their days. So, how do software engineers keep ahead of the world's increasing reliance on IT solutions? Welcome to SEEK Bytes, a podcast for software engineers, by software engineers who work at SEEK, an Australian-founded leader in online employment marketplaces. Each fortnight, our team of hosts and guests will explore intern ...
  continue reading
 
How does modern day Korea compare to America? Join co-hosts Daniel and Jun every week as they explore a topic and discuss it from both the American and Korean perspective. If you're looking to learn more about Korean society and culture, are a part of the Korean diaspora and curious how Korea has changed since you, your parents, or your grandparents left, or are simply interested in broadening your personal worldview and perspective, then we hope you'll listen in and join us on this journey! ...
  continue reading
 
Artwork

1
Hacker News Recap

Wondercraft.ai

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
A podcast that recaps some of the top posts on Hacker News every day. This is a third-party project, independent from HN and YC. Text and audio generated using AI, by Wondercraft.ai. Create your own news rundown podcast at app.wondercraft.ai
  continue reading
 
Artwork

1
The KYT Show

Kar Yung Tom

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A Software Engineering graduate, Kar Yung Tom is a games enthusiast with high-level tournament experience in chess, Magic: The Gathering, poker and daily fantasy sports. In this show, KYT interviews personalities from the gaming world with a focus on up-and-coming Canadian talent in the world of MTG.
  continue reading
 
Welcome to the SEO.co Daily Search Engine Optimization Podcast. Bringing you daily SEO & digital marketing tips that we've learned throughout our 20+ years of internet marketing. Learn the latest SEO, content marketing, link building, social marketing, conversion optimization, persuasive selling & internet marketing tactics that work today. Learn more at SEO.co.
  continue reading
 
The Select* Podcast features guests across a wide range of backgrounds & topics, with the goal of being your resource for software engineering, leadership advice, edge computing, machine learning, inclusion, tech trends, data management, career paths, enterprise tech, & much, much more. The Select* Podcast is also known as the Select Star Podcast or the HarperDB Podcast. If you listen to podcasts like Syntax, Founder Stories, Changelog, CodeNewbie, TechStuff, Stack Overflow, Software Enginee ...
  continue reading
 
Artwork

1
Trailblazer Show

Trailblazer Show

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A peak behind the scenes on the journey of amazing human beings that have blazed their own trails. You hear about the trials and tribulations in the journey. The interview explores the mental models and processes these trailblazers use daily. In other words, how do they think? How do they deal with fear + doubt? What are the things they do or think about on a daily basis that lead to positive results over time. You will have an insight into their mindset, habits, routines and books that have ...
  continue reading
 
A weekly 30-minute podcast focused on the business of fashion. Fashion Rewired is about the successful transformation of your mind, perspective, and daily approach to your fashion brand. During the Fashion Rewired Podcast, we chat with successful fashion designers and business entrepreneurs who share their powerful stories of success. While providing real time industry tips, tools, and actionable strategies to execute today. With the goal of DESIGNING our listener’s brands for success! YOUR ...
  continue reading
 
Artwork
 
Tell Me About Your Job is a podcast that dives into the jobs and careers of all kinds of normal people, the work they do every single day! We want to inform our listeners about different work fields and careers that are available to them, whether they’re high-schoolers, college students, or adults looking to change careers. We accomplish that by interviewing industry professionals about the work they do on a daily basis, and what it really looks like to have a job in their field. We hope thi ...
  continue reading
 
Artwork

1
The Back To Back Show

Back To Back SWE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The mission of Back to Back SWE is to empower the software engineer to excel in the interview and land the job of their dreams. If you are a high school student, college student, new-grad, industry professional, or...anything in the tech industry...then this podcast is for you. If you want to find the best work in technology while cutting through the bs, you are in the right place. Come visit us at https://backtobackswe.com
  continue reading
 
Loading …
show series
 
Carbon is a programming language developed by Google as a successor to C++, and it aims to provide modern safety features while maintaining high performance. It’s designed to offer seamless interoperability with C++ while addressing shortcomings of C++ such as slow compilation times and lack of memory safety. Carbon also introduces features like a …
  continue reading
 
This episode examines how pricing challenges in AI coding platforms like Cursor and Claude Code reveal a fundamental shift in the software industry. While these tools currently struggle with unsustainable economics - where users pay far less than actual compute costs - this mismatch signals AI's inevitable transition from premium software tool to e…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Steve Zalewski, co-host, Defense in Depth Thanks to our show sponsor, Vanta Do you know the status of your compliance controls right now? Like…right now? We know that real-time visibility is critical for security, but when it comes to…
  continue reading
 
Plex urges users to immediately update their Media Server due to an undisclosed security flaw. Cisco warns of a critical remote code execution flaw in their Secure Firewall Management Center software.Rockwell Automation discloses multiple critical and high-severity flaws. Hackers breached a Canadian House of Commons database. Active law enforcement…
  continue reading
 
Episode 8: Can Public Make You a Better Investor? This week, Jordan Metzner and Sam Nadler go deep on Public.com, the modern investing platform opening its trading infrastructure to developers. They demo a new tool built live on Public’s API, explore the real potential of programmable investing, and sit down with Emily Kurtz (Head of Product at Pub…
  continue reading
 
New wave of NFC relay fraud, call hijacking, and root exploits in banking sector Canada’s House of Commons suffers cyberattack Zoom fixes critical Windows client flaw that could enable privilege escalation Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibil…
  continue reading
 
AI and Faster Attack Analysis A few use cases for LLMs to speed up analysis https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198 Proxyware Malware Being Distributed on YouTube Video Download Site Popular YouTube download sites will attempt to infect users with proxyware. https://asec.ahnlab.com/en/89574/ Xero…
  continue reading
 
A Northeastern University survey finds AI use has gone mainstream in the U.S., with half of adults using at least one tool and most states above 40% adoption. While many expect AI to reshape their jobs within five years, a third remain unsure about regulation. At the same time, Anthropic’s new Claude Sonnet 4 boosts capacity to 1 million tokens—eno…
  continue reading
 
A ransomware attack exposes personal medical records of VA patients. New joint guidance from CISA and the NSA emphasizes asset inventory and OT taxonomy. The UK government reportedly spent millions to cover up a data breach. Researchers identified two critical flaws in a widely used print orchestration platform. Phishing attacks increasingly rely o…
  continue reading
 
Carbon is a programming language developed by Google as a successor to C++, and it aims to provide modern safety features while maintaining high performance. It’s designed to offer seamless interoperability with C++ while addressing shortcomings of C++ such as slow compilation times and lack of memory safety. Carbon also introduces features like a …
  continue reading
 
Carbon is a programming language developed by Google as a successor to C++, and it aims to provide modern safety features while maintaining high performance. It's designed to offer seamless interoperability with C++ while addressing shortcomings of C++ such as slow compilation times and lack of memory safety. Carbon also introduces features like a …
  continue reading
 
In this solo episode, Patrick McKenzie reads his classic essay "Seeing Like a Bank," exploring why financial institutions often appear to have no memory of previous customer interactions despite being excellent at tracking money itself. He breaks down the complex web of legacy systems, tiered support structures, and regulatory constraints that crea…
  continue reading
 
Hack of federal court filing system exploited security flaws known since 2020 Pennsylvania attorney general says cyberattack knocked phone, email systems offline Spike in Fortinet VPN brute-force attacks raises zero-day concerns Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know…
  continue reading
 
CVE-2017-11882 Will Never Die The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email. https://isc.sans.edu/diary/CVE-2017-11882%20Will%20Never%20Die/32196 Windows Kerberos El…
  continue reading
 
Nearly a week into the GPT-5 era, users are still divided on its quality—but one thing’s clear: it’s more steerable than any previous model, and prompts make or break results. In this episode, we cut through the debate and share 11 practical prompting techniques you can use right now to get more from GPT-5. From “think harder” prompts and explicit …
  continue reading
 
Patch Tuesday. The Matrix Foundation patches high-severity vulnerabilities in its open-source communications protocol. The “Curly COMrades” Russian-aligned APT targets critical infrastructure. Microsoft tells users to ignore new CertificateServicesClient (CertEnroll) errors. Researchers uncover a malware campaign hiding the NjRat Remote Access Troj…
  continue reading
 
What happens when our most senior engineer stops writing code altogether and lets AI handle everything? Well, you can expect projects and productivity to go out the window. Meet Simon, who is about 30+ years into the game and fully convinced that AI will fully replace the developer. From trying to build a model that could replace the whole team, to…
  continue reading
 
The hits just keep on coming Where's the Little Dutch Boy when you need him? I felt the ransomware down in Africa Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time…
  continue reading
 
Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression…
  continue reading
 
Today's AI Daily Brief covers how GPT-5's launch changed Wall Street's thinking about the AI bubble debate and why old market comparisons might not work anymore. We look at Leopold Aschenbrenner, a 23-year-old former OpenAI researcher who raised $1.5 billion for his hedge fund "Situational Awareness" and beat markets by 47% after fees in just six m…
  continue reading
 
Hackers leak backend data from the North Korean state-sponsored hacking group Kimsuky. A ransomware attack on a Dutch clinical diagnostics lab exposes medical data of nearly half a million women. One of the world’s largest staffing firms suffers a data breach. Saint Paul, Minnesota, confirms the Interlock ransomware gang was behind a July cyberatta…
  continue reading
 
Podman is an open-source container management tool that allows developers to build, run, and manage containers. Unlike Docker, it supports rootless containers for improved security and is fully compatible with standards from the Open Container Initiative, or OCI. Brent Baude is a Senior Principal Software Engineer at Red Hat where he works on Podma…
  continue reading
 
Podman is an open-source container management tool that allows developers to build, run, and manage containers. Unlike Docker, it supports rootless containers for improved security and is fully compatible with standards from the Open Container Initiative, or OCI. Brent Baude is a Senior Principal Software Engineer at Red Hat where he works on Podma…
  continue reading
 
Podman is an open-source container management tool that allows developers to build, run, and manage containers. Unlike Docker, it supports rootless containers for improved security and is fully compatible with standards from the Open Container Initiative, or OCI. Brent Baude is a Senior Principal Software Engineer at Red Hat where he works on Podma…
  continue reading
 
North Korean crypto theft Microsoft rolls out PC back up during attack U.S. charges four in $100M global fraud scheme Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-…
  continue reading
 
Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of…
  continue reading
 
When OpenAI replaced GPT-4o with its new GPT-5 rollout, the backlash was immediate and fierce. Power users decried hidden model switching, casual users mourned the loss of a “friend,” and debates erupted over AI’s role as strategic collaborator versus sterile assistant. In this episode, NLW unpacks the revolt that forced OpenAI to restore GPT-4o, t…
  continue reading
 
CISA issues an Emergency Directive to urgently patch a critical vulnerability in Microsoft Exchange hybrid configurations. SoupDealer malware proves highly evasive. Google patches a Gemini calendar flaw. A North Korean espionage group pivots to financial crime. Russia’s RomCom exploits a WinRAR zero-day. Researchers turn Linux-based webcams into pe…
  continue reading
 
DARPA awards $4 million prize for AI code review at DEF CON North Korea ScarCruft group adds ransomware to its activities Columbia University hack affects over 860,000 Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when…
  continue reading
 
Google Paid Ads for Fake Tesla Websites Someone is setting up fake Tesla lookalike websites that attempt to collect credit card data from unsuspecting users trying to preorder Tesla products. https://isc.sans.edu/diary/Google%20Paid%20Ads%20for%20Fake%20Tesla%20Websites/32186 Compromising USB Devices for Persistent Stealthy Access USB devices, like…
  continue reading
 
This episode explores ten practical shifts in the AI landscape following GPT-5’s release — from the plateau of raw LLM capability gains to the rise of tool-driven performance, consumer-first design choices, and the explosion of “vibe coding.” NLW breaks down how these changes reshape enterprise competition, open up opportunities for rival labs, dri…
  continue reading
 
Please enjoy this encore of Career Notes. Chief Executive Officer and Founder of TAG Cyber, Ed Amoroso, shares how he learned on the job and grew his career. In his words, Ed "went from my dad having an ARPANET connection and I'm learning Pascal, to Bell Labs, to CISO, to business, to quitting, to starting something new. And now I'm riding a new ex…
  continue reading
 
This episode delves into a powerful model for encouraging behaviour change, applicable to both managing others and self-improvement, by focusing on three critical factors: Trigger, Incentive, and Ability. It challenges common, ineffective management approaches and provides insights into fostering new habits and desired actions by making the 'right'…
  continue reading
 
Nicolás Chiaraviglio, Chief Scientist from Zimperium's zLabs, joins to discuss their work on "Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed." Zimperium’s zLabs team has been tracking an evolving banker trojan dubbed DoubleTrouble, which has grown more sophisticated in both its distribution and capabilities. Initially spread via …
  continue reading
 
First, a collection of first reactions to GPT-5. This week saw major AI shifts — from web-scraping battles to the brutal economics of AI coding startups. Cloudflare took aim at Perplexity over “stealth crawling,” Google defended AI overviews against claims they hurt web traffic, and reports revealed that coding firms like Windsurf and Replit face s…
  continue reading
 
Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Montez Fitzpatrick, CISO, Navvis Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. Th…
  continue reading
 
Researchers uncover multiple vulnerabilities in a popular open-source secrets manager. Software bugs threaten satellite safety. Columbia University confirms a cyberattack. Researchers uncover malicious NPM packages posing as WhatsApp development tools.A new EDR killer tool is being used by multiple ransomware gangs. Home Improvement stores integrat…
  continue reading
 
Episode 7: How Daily Check-Ins Fix Remote Work Jordan Metzner and Sam Nadler share a simple but powerful internal tool: a Slack-integrated daily check-in system that’s helped their remote team stay accountable, async, and aligned. It’s lightweight, fast, and has changed how their team shares progress. Then they revisit Clay, a thoughtfully designed…
  continue reading
 
Microsoft warns of high-severity flaw in hybrid Exchange deployments France’s third-largest mobile operator suffers breach Dialysis company’s April attack affects 900,000 people Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-d…
  continue reading
 
Loading …

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play