show episodes
 
C
Click Here

1
Click Here

The Record by Recorded Future

Unsubscribe
Unsubscribe
Weekly
 
It seems like we hear about new cyberattacks almost every day. The targets used to be just big companies and government agencies. Now they are focused on you. Every Tuesday, former NPR investigations correspondent Dina Temple-Raston dives deep into the world of cyber and intelligence. You’ll hear stories about everything from ransomware to misinformation to the people shaping the cyber world, from hacking masterminds to the people who try to stop them. If you want more news like this deliver ...
 
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
 
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
 
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
 
The CodeNewbie podcast was born from CodeNewbie, an organization which fosters a supportive, international community of people learning to code. Each season, host Saron Yitbarek delivers stories and interviews from people of diverse backgrounds and expertise about their coding journeys, as well as beginner friendly discussions about the tech you should know about.
 
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
 
H
Hacked

1
Hacked

Sticks & Stones

Unsubscribe
Unsubscribe
Monthly
 
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious (and occasionally criminal) world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new story every episode.
 
S
Self-Hosted

1
Self-Hosted

Jupiter Broadcasting

Unsubscribe
Unsubscribe
Monthly+
 
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
 
A weekly podcast covering all the news and events in Enterprise Software and Cloud Computing. We discuss topics including: Kubernetes, DevOps, Serverless, Security and Coding. Plus, plenty of off topic banter and nonsense to keep you entertained. Don't worry if you miss the latest industry conference, we will recap all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
 
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is an informal podcast inspired by Magic Read Along. We plan to talk about whatever we feel like - algorithms, data structures, programming languages, latest news in tech and more. Feel free to follow us on Twitter at @adspthepodcast.
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Our GDPR privacy policy was updated on August 8, 2022. Visit acast.com/privacy for more information.
 
Feel like you’re hitting a wall with your existing software projects? You're not alone. On the Maintainable software podcast, we speak with seasoned practitioners who have worked past the problems often associated with technical debt and legacy code. In each episode, our guests will share stories and outline tangible, real-world approaches to software challenges. In turn, you'll uncover new ways of thinking about how to improve your software project's maintainability. We're in this together. ...
 
The Azure DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
 
Loading …
show series
 
Permissions are Hard! And they are becoming harder as we move more into the Cloud-native ecosystem. If we go back in time to the point where it was just a single monolith that you were building on your own. You’ll probably have a framework to manage the permissions for you. But when you are working with distributed microservices, especially if you …
 
Lucas F. Costa on why your daily stand-ups don’t work and host to fix them, Mahdi Yusuf deeply explains Redis, the Deno team announces some big changes coming, DevDash is a highly configurable terminal dashboard for developers and creators & Brett Cannon determines what is a Minimum Viable Python (MVPy). Discuss on Changelog News Changelog++ member…
 
This week we discuss build vs. buy decisions, sustaining corporate strategies and Malcolm Gladwell’s WFH comments. Plus, we announce the location of the Austin Meetup on August 27th. Runner-up Titles Strategy for eating mixed nuts. Finish in a flurry Eat Dessert First It’s about where you is, not where you was. We don’t even own a copy of Illustrat…
 
In this episode, Abi Noda, founder of Pull Panda and DX, discusses developer experience with SE Radio host Brijesh Ammanath. They examine the basic concept of DX and why it matters before diving into a wide variety of issues, including methodologies for measuring DX, the main factors that influence it, and strategies for overcoming common […]…
 
VBA Maldoc and UTF7 (APT-C-35) https://isc.sans.edu/diary/VBA+Maldoc+%26+UTF7+%28APT-C-35%29/28946 Disrupting SEABORGIUM's Ongoing Phishing Operations https://www.microsoft.com/security/blog/2022/08/15/disrupting-seaborgiums-ongoing-phishing-operations/ UWB Real Time Location Systems: How Secure Radio Communcations May Fail in Practice.…
 
Microsoft identifies and disrupts Russian cyberespionage activity. An update on RedAlpha. An evil PLC proof-of-concept shows how programmable logic controllers could be "weaponized." Ben Yelin has an update on right to repair. Our guest is Arthur Lozinski of Oomnitza with a look at attack surface management maturity. And the Cl0p gang hits an Engli…
 
Just when you thought you had a month free of the Cyberlaw Podcast, it turns out that we are persisting, at least a little. This month we offer a bonus episode, in which Dave Aitel and I interview Michael Fischerkeller, one of three authors of "Cyber Persistence Theory: Redefining National Security in Cyberspace." The book is a detailed analysis of…
 
All links and images for this episode can be found on CISO Series Just the words "zero trust" often causes security professionals to shiver. In general, CISOs are on board with the concepts of "zero trust," we just think they're uncomfortable with how it's being used for branding and marketing efforts. This week’s episode is hosted by me, David Spa…
 
Chat app used as a backdoor PyPi package drops crytominer Access to corporate networks sees a value dip Thanks to today’s episode sponsor, 6clicks Protect your supply chain from third-party risk with the power of 6clicks. Organizations can better manage their vendor risk by automating the vendor assessment lifecycle and detecting vendor assessment …
 
Heather is a General Partner at OSS Capital, which provides VC backing to seed-stage COSS (commercial open source) startups. Her law practice focuses on intellectual property and open-source licensing, and she serves on the IEEE-ISTO Board of Directors. Connect with Heather on LinkedIn or explore her work on her website. Today’s Lifeboat badge goes…
 
Realtek CVE-2022-27255 Followup (snort signature and presentation) https://isc.sans.edu/diary/Realtek+SDK+SIP+ALG+Vulnerability%3A+A+Big+Deal%2C+but+not+much+you+can+do+about+it.+CVE+2022-27255/28940 MacOS Privilege Escalation https://sector7.computest.nl/post/2022-08-process-injection-breaking-all-macos-security-layers-with-a-single-vulnerability/…
 
Shuckworm maintains its focus on Ukrainian targets. Killnet's DDoS and dubious proof-of-work. Iron Tiger's supply chain campaign. TikTok and national security. Dinah Davis from Arctic Wolf shares insights on Dark Utilities. Rick Howard digs into identity management. And an arrest in the case of the Tornado Cash crypto mixer. For links to all of tod…
 
We all get them. We all hate them. Spam. There was a time, long ago, when it was just your mailbox and your inbox that got hit with superfluous ads and scams. But now? My phone rings all day long and all of the calls are spam. All of them. If you’re not on my contact list, I’m not picking up. And the texts have gotten much much worse. Everyday is a…
 
Railway systems are a mess of old systems built on top of older systems, running ancient operating systems and exposing their most sensitive inner workings to commuters via Wifi. Why are railway systems so difficult to defend, and what are the most probable attack vectors against them? Nate Nelson, our Sr. producer, speaks with Israel Baron, Israel…
 
In this episode, Dave and Jamison answer these questions: I work at a small company that has recently grown from a couple of engineers to 40+ due to some great new project opportunities. As part of this transition, many new policies are being implemented. The policies concerning the engineering department primarily revolve around task tracking and …
 
In this episode of Syntax, Wes and Scott talk about proposals to CSS including @when, CSS Masonry, CSS Caret, ENV Vars, and Media Query Ranges. Sentry - Sponsor If you want to know what’s happening with your code, track errors and monitor performance with Sentry. Sentry’s Application Monitoring platform helps developers see performance issues, fix …
 
Damian Brady is a Developer Advocate at GitHub. He's a developer, speaker, and author specializing in DevOps, MLOps, developer process, and software architecture. Formerly a Cloud Advocate at Microsoft for four years, and before that, a dev at Octopus Deploy and a Microsoft MVP, he has a 20-plus year background in software development and consultin…
 
Ukraine's cyber chief makes surprise visit to Black Hat Killnet claims to have hacked Lockheed Martin Starlink successfully hacked using $25 modchip Thanks to today’s episode sponsor, 6clicks Identify, track, respond, and remediate issues and incidents from your various GRC workflows with 6clicks. With an issue submission form, 6clicks makes it eas…
 
In this episode, we talk about what your bootcamp isn’t teaching you with Caitlyn Greffly, software engineer at The Motley Fool, and author of The Bootcamper’s Companion. Caitlyn talks about not seeing herself as someone who would fit into the tech industry, falling in love with data and analytics, and then transitioning careers and eventually writ…
 
Realtek eCOS SDK SIP ALG Vulnerability https://isc.sans.edu/diary/Realtek+SDK+SIP+ALG+Vulnerability%3A+A+Big+Deal%2C+but+not+much+you+can+do+about+it.+CVE+2022-27255/28940 Phishing HTML Attachment as Voicemail Audio Transcription https://isc.sans.edu/diary/Phishing+HTML+Attachment+as+Voicemail+Audio+Transcription/28938 CVE-2022-0028 PAN-OS: Reflect…
 
It’s surprising how little we know about Git as we continue to dive into Git from the Bottom Up, while Michael confuses himself, Joe has low standards, and Allen tells a joke. The full show notes for this episode are available at https://www.codingblocks.net/episode191. News Thanks for all the great feedback on the last episode and for sticking wit…
 
Cybercriminals are motivated by one simple incentive - money. Their favorite tools are bots to leverage sophistication, scalability, and ease of use. The effect is the creation of the underground bot ecosystem. This community allows threat actors to work together and continually improve their tactics. They sell bypasses for rule-based anti-bot solu…
 
Christian Lees, CTO at Resecurity, shares his story and insight on coming into the cybersecurity world. He considers himself a late bloomer because he did not go to college until he was 23. He wasn’t sure of what he wanted to do, and a family friend gave him a computer and the rest was history, he says. He fell in love with computers and started wo…
 
eBPF is a revolutionary kernel technology that has lit the cloud native world on fire. If you’re going to have one person explain the excitement, that person would be Liz Rice. Liz is the COSO at Isovalent, creators of the open source Cilium project and pioneers of eBPF tech. On this episode Liz tells Jerod all about the power of eBPF, where it cam…
 
Ashley Taylor from SANS.edu, joins Dave to discuss fake job ads and methods to proactively detect these scams. The research shares how job seekers are under attack, with scammers posing as fake job recruiters to steal information from people who are interested in the job posting. The brands being impersonated as are at risk of losing credibility to…
 
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, June 6-10, is hosted by Rich Stroffolino with our guest, Jack Kufahl, CISO, Michigan Medicine Thanks to today’s episode sponsor, Edgescan Edgescan simplifies Vulnerability Management by delivering a single full-stack solution (SaaS) integrated with world-class security profess…
 
The optempo of the war's cyber phase, and Ukraine’s response. Organizing and equipping hacktivists. Joint warning on Zeppelin ransomware. Update on the DoNot Team, APT-C-35. Rewards for Justice offers $10 million for information on Conti operators. Rob Boyce from Accenture shares insights from BlackHat. Caleb Barlow ponders closing the skills gap w…
 
In this episode, Bryce and Conor talk about C++23. Link to Episode 90 on Website Twitter ADSP: The Podcast Conor Hoekstra Bryce Adelstein Lelbach Show Notes Date Recorded: 2022-08-09 Date Released: 2022-08-12 Bighorn Sheep Kate Gregory on Twitter APL Toronto Meetup on Sep 1 APL New York Meetup on Sep 7 C23 is Finished: Here is What is on the Menu C…
 
This week I explain some vital pfSense firewall modifications and offer a tip to prevent website chat apps from launching.Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and Open Source Intelligence Techniques (9th Edition). More details can be found at IntelTec…
 
Bret is joined by Nirmal Mehta, a Principal Specialist Solution Architect at AWS, and a Docker Captain, to discuss Karpenter, an autoscaling solution launched by AWS in 2021. Karpenter simplifies Kubernetes infrastructure by automating node scaling up and down, giving you "the right nodes at the right time." Autoscaling, particularly for Kubernetes…
 
This week, Dan Neumann is joined by Andrea Floyd to explore the concept of change. In this episode, Andrea and Dan talk about the critical importance of change, since as an Agilist, what needs to be embraced as always present is change. Change is involved in every part of an Agile journey, it is a way of working and a way of dealing with people. Th…
 
What is it like to live with another man's automations? Brent spills all. Plus, Chris tries out a few more Shelly devices and reports back. Special Guest: Brent Gervais. Sponsored By: Humio: Take logs from any source and make them usable. Get started with Humio Community Edition for free. Linode: Receive a $100 60-day credit towards your new accoun…
 
In this supper club episode of Syntax, Wes and Scott talk with Josh Larson from Shopify about headless ecommerce, including Hydrogen from Shopify, how integrations work with Shopify, and what the tech stack is behind Hydrogen. Hasura - Sponsor With Hasura, you can get a fully managed, production-ready GraphQL API as a service to help you build mode…
 
Given the variety of architectural styles — and the unique technology landscapes at every organization — how can you develop a set of metrics that can reliably guide your organization to improve? Andrew Harmel-Law has been grappling with this question for some time. We catch up with him to hear how he thinks DORA’s Four Key Metrics provide invaluab…
 
Cisco admits corporate network compromised by gang with links to Lapsus$ CISA should split from DHS says Chris Krebs Ransomware data theft epidemic fueling BEC attacks Thanks to today’s episode sponsor, Edgescan Edgescan simplifies Vulnerability Management by delivering a single full-stack solution (SaaS) integrated with world-class security profes…
 
Spencer was one of the original creators of open-source, cross-platform image editing software GIMP (GNU Image Manipulation Program), authored while he was still in college. He went on to spend a decade at Google, plus two years as CTO of Viewfinder, later acquired by Square. In 2014, he cofounded Cockroach Labs to back his creation CockroachDB, a …
 
InfoStealer Script Based on Curl and NSudo https://isc.sans.edu/diary/InfoStealer+Script+Based+on+Curl+and+NSudo/28932 Cisco Breach Details https://blog.talosintelligence.com/2022/08/recent-cyber-attack.html Ivanti Pulse Connect Secure Privilege Escalation Vulnerability https://gist.github.com/JGarciaSec/2060ec1c8efc1d573a1ddb754c6b4f84 Cisco Adapt…
 
Erica Brescia co-founded Bitnami, and later joined GitHub as COO. She's also on the board of directors of the Linux Foundation. This week she talks to Scott about how VC works, where the money comes from, how one moves from idea to funded, and how companies like Redpoint help support founders.By Scott Hanselman
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login