Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Technical interviews about software topics.
Deception, influence, and social engineering in the world of cyber crime.
Become the best software developer you can be
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
S
Syntax - Tasty Web Development Treats


1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
What is DevOps? We will attempt to answer this and many more questions.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
T
The Changelog: Software Development, Open Source


1
The Changelog: Software Development, Open Source
Changelog Media
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of Spinrite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
The stories and people behind the code. Hear stories of software development from interesting people.
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious (and occasionally criminal) world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new story every episode.
A podcast about modern UI development on the web. Hosted by Sam Selikoff and Ryan Toronto.
Functional Geeks, Geeking Functionally
The CodeNewbie podcast was born from CodeNewbie, an organization which fosters a supportive, international community of people learning to code. Each season, host Saron Yitbarek delivers stories and interviews from people of diverse backgrounds and expertise about their coding journeys, as well as beginner friendly discussions about the tech you should know about.
Hackers Podcast
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Daily update on current cyber security threats
A podcast about security for developers, covering tools and best practices.
The Podcast for Professional Software Developers
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
S
Software Engineering Radio - the podcast for professional software developers


1
Software Engineering Radio - the podcast for professional software developers
se-radio@computer.org
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
Hosted by former covert CIA intelligence officer Andrew Bustamante, Everyday Espionage gives you practical, powerful spy skills you can use to get ahead in your everyday life.
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion.
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be.
Narrators read our favorite written stories. You can listen to them anywhere, including on your smart speaker. Play for audio versions of WIRED's Security stories, featuring the latest on cybersecurity, hacking, privacy, national security, and keeping yourself safe online.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
A weekly podcast on cybersecurity and privacy from the cyberlaw practice at Steptoe and Johnson. Featuring Stewart Baker and Michael Vatis.
Thinking about the intersection of security, technology, and society—and what might be coming next. Every Monday morning you get a curated 15-30 minute summary of the week's most important stories and why they matter. Plus regular essays and interviews that explore a single topic.
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
Modern Web is a podcast that explores next generation frameworks, standards, and techniques. Visit http://modern-web.org for more.
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
Every week a panel of experts in .NET and related technologies sit down with developers from the community to talk about all things .NET related.
A live podcast about front end web design and UX.
Audio podcasts on software testing.
A podcast featuring panelists of engineers from Netflix, Twitch, & Atlassian talking over drinks about all things Front End development.
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
The Azure DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
In this show, I open you the doors to companies and thought leaders around the world. With my guests, I discuss software engineering best practices and pitfalls, and how they strive to build software people love.
C
CaSE: Conversations about Software Engineering


1
CaSE: Conversations about Software Engineering
CaSE Podcast Team
Conversations about Software Engineering (CaSE) is an interview podcast for software developers and architects about Software Engineering and related topics. We release a new episode every three weeks.
Things about Svelte. Sometimes weekly, sometimes not.
A
Algorithms + Data Structures = Programs


1
Algorithms + Data Structures = Programs
Conor Hoekstra & Bryce Adelstein Lelbach
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is an informal podcast inspired by Magic Read Along. We plan to talk about whatever we feel like - algorithms, data structures, programming languages, latest news in tech and more. Feel free to follow us on Twitter at @adspthepodcast.
T
The Changelog: Software Development, Open Source


1
Schneier on security for tomorrow’s software
1:15:12
1:15:12
Play later
Play later
Lists
Like
Liked
1:15:12
This week we’re talking with Bruce Schneier — cryptographer, computer security professional, privacy specialist, and writer (of many books). He calls himself a “public-interest technologist”, a term he coined himself, and works at the intersection of security, technology, and people. Bruce has been writing about security issues on his blog since 20…
S
Software Engineering Radio - the podcast for professional software developers


1
Episode 512: Tim Post on Rubber Duck Debugging
49:52
49:52
Play later
Play later
Lists
Like
Liked
49:52
Tim Post of echoreply.io discusses Rubber Duck Debugging, a way to wrap your head about problems and solutions. Host Felienne spoke with Post about Rubber Duck debugging, and how it can help you to find answers to complex problems.By IEEE Computer Society
H
Hacking Humans


1
Waterfall Software Development Method (noun) [Word Notes]
5:55
5:55
Play later
Play later
Lists
Like
Liked
5:55
A software development model that relies on a series of sequential steps that flow into each other, like a series of waterfalls. CyberWire Glossary link: https://thecyberwire.com/glossary/waterfall-software-development Audio reference link: “Creating Video Games - Agile Software Development,” by Sara Verrilli, MIT OpenCourseWare, YouTube, 10 Decemb…
The advent of the cloud introduced a new form of technical debt in which organizations can lose track of what infrastructure they have and how it relates to the business. While the cloud’s native APIs offer some transparency into your infrastructure, these offerings are often described as necessary but not sufficient. When companies have a non-triv…
C
CyberWire Daily


1
AutoWarp bug leads to Automation headaches. [Research Saturday]
19:26
19:26
Play later
Play later
Lists
Like
Liked
19:26
Yanir Tsarimi from Orca Security, joins Dave to discuss how researchers have discovered a critical Azure Automation service vulnerability called AutoWarp. The security flaw was discovered this past March causing Yanir to leap into action announcing the issue to Microsoft who helped to swiftly resolve the cross-account vulnerability. The research sh…
Link to Blog Post This week’s Cyber Security Headlines – Week in Review, May 16-20, is hosted by Rich Stroffolino with our guest, Jerich Beason, CISO, Commercial Bank, CapitalOne Thanks to today's episode sponsor, Torq All links and the video of this episode can be found on CISO Series.com
C
CyberWire Daily


1
Is Conti rebranding? Commercial spyware scrutinized. Notes from the cyber phases of a hybrid war. Notes on the underworld. Software supply chain attack. Canada will exclude Huawei from 5G.
30:59
30:59
Play later
Play later
Lists
Like
Liked
30:59
Was Conti’s digital insurrection in Costa Rica misdirection? Google assesses a commercial spyware threat “with high confidence.” Continuing expectations of escalation in cyberspace. The limitations of an alliance of convenience. Fronton botnet shows versatility. Russian hacktivists hit Italian targets, again. Lazarus Group undertakes new SolarWinds…
Highlight is a tool that helps teams reproduce end-to-end user sessions to better understand their application. With Highlight, engineering teams can replay errors with high precision, which includes a complete session replay, outgoing network requests, dense stack traces and insight into the app’s state management system (redux, apollo’s cache, et…
C
Cybersecurity Today


1
Cyber Security Today, Week in Review for May 20, 2022
30:17
30:17
Play later
Play later
Lists
Like
Liked
30:17
This episode features a discussion a report on security problems IT needs to address, an international survey of CISOs and the EU coming closer to beefing up security standardsBy ITWC
T
Testing Podcast


1
Python + Django + Rich + Testing == Awesome
20:56
20:56
Play later
Play later
Lists
Like
Liked
20:56
Show notes: Python + Django + Rich + Testing == Awesome Book by Brian Okken <br /><br />By Testing Podcast
This week I offer brief updates from the road.Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and Open Source Intelligence Techniques (9th Edition). More details can be found at IntelTechniques.com. Thank you for keeping this show ad-free and sponsor-free.Listen…
C
CyberWire Daily


1
CISA Alert AA22-138B – Threat actors chaining unpatched VMware vulnerabilities for full system control. [CISA Alerts]
3:14
3:14
Play later
Play later
Lists
Like
Liked
3:14
CISA is releasing this cybersecurity advisory to warn organizations that malicious cyber actors are exploiting CVE-2022-22954 and CVE-2022-22960. These vulnerabilities affect versions of VMware products. Successful exploitation permits malicious actors to trigger a server-side template injection that may result in remote code execution or escalatio…
A
Algorithms + Data Structures = Programs


1
Episode 78: C++ Algorithms & Profiling with Ben Deane (Part 4)
32:35
32:35
Play later
Play later
Lists
Like
Liked
32:35
In this episode, Bryce and Conor finish their conversation with Ben Deane about C++ Algorithms! Twitter ADSP: The Podcast Conor Hoekstra Bryce Adelstein Lelbach About the Guest: For Ben Deane, C++ wasn’t even among the first 10 languages that he learned on his programming journey, but it’s been the one that has paid the bills for the last 20-odd ye…
Alex has found the perfect tool to bring your recipe management into the future. Plus, a convenient trick for scripts with passwords, dying hard drives, and the killer new Proxmox feature. Sponsored By: Linode: Receive a $100 60-day credit towards your new account. Promo Code: linode.com/ssh Tailscale: Tailscale is a Zero config VPN. It installs on…
S
Syntax - Tasty Web Development Treats


1
Supper Club × Turbo Repo with Jared Palmer
58:02
58:02
Play later
Play later
Lists
Like
Liked
58:02
In this supper club episode of Syntax, Wes and Scott talk with Jared Palmer about Turbo Repo, how it fits in your tech stack, and what it was like being acquired by Vercel. Whiskey Web and Whatnot - Sponsor Whiskey Web and Whatnot is different than your typical dev podcast. We show a lighter, more human side of developers you know and love, like a …
C
Cybersecurity Today


1
Cyber Security Today, May 20, 2022 - A look inside the Wizard Spider hacking gang
5:56
5:56
Play later
Play later
Lists
Like
Liked
5:56
This episode reports on the operations of one of the biggest ransomware gangs, security updates for VMware products, a warning about Kubernetes APIs and moreBy ITWC
On the whole, exceptions are not exceptional. Each one may be unpredictable or rare, but they happen very regularly. How are you prepared to handle those exceptions? Make space today for the principle of headroom. 📮 Ask a Question If you enjoyed this episode and would like me to discuss a question that you have on the show, drop it over at: develop…
Greenland health services limited from cyberattacks Phishing attacks surge in Q1 Google details 2021 zero-days And now let’s thank today’s sponsor, Torq Myth 5: You Should Automate All Security Processes False. You should automate routine, repetitive tasks that are not subject to much conditional variance. But workflows that can’t be reliably manag…
T
The Stack Overflow Podcast


1
Make your open-source project public before you’re ready
29:44
29:44
Play later
Play later
Lists
Like
Liked
29:44
Highly-touted cryptocurrencies like TARA don’t always solve the problems they’re supposed to, as Bloomberg reports. If you’re looking for a compelling deep-dive into a crypto scammer, Cassidy recommends BBC podcast The Missing Cryptoqueen. Ceora is working to improve the quality of her commit messages in order to turn what’s now a personal project …
Bumblebee Malware from TransferXL URLs https://isc.sans.edu/forums/diary/Bumblebee+Malware+from+TransferXL+URLs/28664/ Microsoft Out-of-Band Update fixes Authentication Issues https://docs.microsoft.com/en-us/windows/release-health/status-windows-11-21h2#you-might-see-authentication-failures-on-the-server-or-client-for-services Sonicwall Patch for …
R
Risky Business


1
SAMPLE PODCAST: Risky Biz News: FSB-linked DDoS tool could also be used for disinformation campaigns
The following is a sample of our latest podcast, Risky Business News, which is published into a new RSS feed. It’s a short podcast published three times a week that updates listeners on the security news of the last few days, as prepared and presented by Catalin Cimpanu. You can find the newsletter version of this podcast here.…
C
CyberWire Daily


1
Information operations and the invasion of Ukraine. VMware patches vulnerabilities. F5 BIG-IP vulnerabilities atively exploited. TDI clarifies data incident. Robo-calling the Kremlin.
30:49
30:49
Play later
Play later
Lists
Like
Liked
30:49
Russian information operations surrounding the invasion of Ukraine. VMware patches vulnerabilities. F5 BIG-IP vulnerabilities undergoing active exploitation. Texas Department of Insurance clarifies facts surrounding its data incident. Robert M. Lee from Dragos is heading to Davos to talk ICS. Rick Howard speaks with author Chase Cunningham on his b…
C
CYBER


1
America’s Complicated Relationship With Nuclear Power
33:24
33:24
Play later
Play later
Lists
Like
Liked
33:24
The atom. For a few brief years in the middle of the 20th century, America and the world was cowed by the awesome possibility and terrifying reality of nuclear energy. Nuclear power had the potential to revolutionize the world but nuclear bombs could destroy it. But still … for a brief moment it seemed like nuclear energy would save the world. Then…
H
Hanselminutes with Scott Hanselman


1
Towards Trustworthy AI with Beena Ammanath
30:21
30:21
Play later
Play later
Lists
Like
Liked
30:21
Trustworthy AI is an essential resource on artificial intelligence ethics for business, government, and society at-large. In her book, Beena Ammanath draws from her extensive experience across several industries and sectors in data, analytics and AI, the latest research and case studies, and the pressing questions and concerns business leaders and …
T
Testing Podcast


1
Maintaining Your Test Automation with Trisha Chetani
28:07
28:07
Play later
Play later
Lists
Like
Liked
28:07
Show notes: Maintaining Your Test Automation with Trisha Chetani Book by Joe Colantonio The UFT API Testing Manifesto: A step-by-step, hands-on testing guide for the massesBy Testing Podcast
We’re all subject to cognitive biases. And whether we’re aware of them or not, they can have a profound impact on the code we write — especially when working in an agile environment, where we have to constantly deal with uncertainties. We take a deep dive into where our biases emerge, the impacts they can have and how we can mitigate them to improv…
W
WIRED Security: News, Advice, and More


1
US Courts Are Coming After Crypto Exchanges That Skirt Sanctions
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53
A newly unsealed opinion is likely the first decision from a US federal court to find that cryptocurrencies can't be used to evade sanctions.
VMware bugs abused to deliver Mirai malware Microsoft to debut of zero trust GDAP tool Bank of Zambia refuses to pay ransom to cyberattack group Hive And now let’s thank today’s sponsor, Torq Myth 4: Automation Will Replace Skilled Security Professionals Not true. Any business that attempts to automate security will quickly find that most high-stak…
Mark Horne, Chief Marketing Officer at Pindrop, joins Dave to discuss voice authentication, Dave and Joe have some follow up about business phishing (BECs) from listeners Nick and Michael, Joe's story has a romance scam where criminals pretend to be celebrities, and Dave's story is about the increase in phishing downloads due to cyber criminals usi…
What can web components do for you? Carl and Richard talk to Jemima Abu about her work with web components. Jemima talks about the projects she is currently working on, and how UI web components make it easier to build good-looking front ends quickly. The discussion digs into how web components stay agnostic of different web frameworks - although o…
VMWare Flaws https://core.vmware.com/vmsa-2022-0014-questions-answers-faq https://blog.barracuda.com/2022/05/17/threat-spotlight-attempts-to-exploit-new-vmware-vulnerabilities/ Tesla BLE Proximity Authentication Vulnerable to Relay Attacks https://research.nccgroup.com/2022/05/15/technical-advisory-ble-proximity-authentication-vulnerable-to-relay-a…
C
CyberWire Daily


1
CISA Alert AA22-138A – Threat Actors Exploiting F5 BIG-IP CVE-2022-1388.
3:20
3:20
Play later
Play later
Lists
Like
Liked
3:20
CISA and the Multi-State Information Sharing & Analysis Center (MS-ISAC), are releasing this joint Cybersecurity Advisory in response to active exploitation of CVE-2022-1388. This vulnerability is a critical iControl REST authentication bypass vulnerability affecting multiple versions of F5 Networks BIG-IP. AA22-138A Alert, Technical Details, and M…
C
CyberWire Daily


1
Privateering goes fully political. Compromised robots? Conti’s campaign against Costa Rica. Cyberconflict along the Nile. A reset in the cyber insurance market.
25:33
25:33
Play later
Play later
Lists
Like
Liked
25:33
Chaos ransomware group declares for Russia. Hacktivists claim to have compromised Russian-manufactured ground surveillance robots. Conti's ongoing campaign against Costa Rica. The claimed "international" cyberattack against Nile dam was stopped. Rick Howard speaks with author Caroline Wong on her book “Security Metrics, a Beginner's Guide”. Our gue…
/*! elementor - v3.5.5 - 03-02-2022 */.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=".svg"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block} /*! elementor - v3.5.5 - 03-02-2022 */.elementor-widget-text-editor.elementor-drop-cap-view-stack…
T
Testing Podcast


1
RBCS – Specifying Test Tool Requirements
1:25:26
1:25:26
Play later
Play later
Lists
Like
Liked
1:25:26
Rex Black Show notes: RBCS – Specifying Test Tool Requirements Books by Rex Black By Testing Podcast
W
WIRED Security: News, Advice, and More


1
The Hidden Race to Protect the US Bioeconomy From Hacker Threats
5:17
5:17
Play later
Play later
Lists
Like
Liked
5:17
A biotech threat intelligence group is gaining supporters as urgency mounts around an overlooked vulnerable sector.
Why Mike feels like Heroku is in a failed state, what drove us crazy about Google I/O this year, how Chris botched something super important, and some serious Python love sprinkled throughout. Sponsored By: Linode: Receive a $100 60-day credit towards your new account. Promo Code: linode.com/coder Tailscale: Tailscale is the easiest way to create a…
S
Syntax - Tasty Web Development Treats


1
Potluck - Protestware × NoSQL × Next.js × ESM × Jest
53:44
53:44
Play later
Play later
Lists
Like
Liked
53:44
In this potluck episode of Syntax, Wes and Scott answer your questions about protestware, NoSQL, Next.js, the Syntax.fm website, ESM, Jest, and more! Prismic - Sponsor Prismic is a Headless CMS that makes it easy to build website pages as a set of components. Break pages into sections of components using React, Vue, or whatever you like. Make corre…
#159: In the age of microservices and containers, Kubernetes has become one of the most popular ways to manage application deployment and lifecycle management. However, it can be difficult to know when it's necessary or appropriate to use Kubernetes. In this episode, we attempt to answer the question "when should I use Kubernetes?" We also talk abo…
C
Cybersecurity Today


1
Cyber Security Today, May 18, 2022 - A warning to e-commerce sites, Conti ransomware gang squeezes Costa Rica and more
5:00
5:00
Play later
Play later
Lists
Like
Liked
5:00
This episode reports on credit card web scraping with PHP, Conti ransomware gang threatens overthrow of Costa Rica, a warning to users of Bluetooth Low Energy smart locks patches from NvidiaBy TIWC
D
Developer Tea


1
You Need Better Inputs to improve Your Options
10:50
10:50
Play later
Play later
Lists
Like
Liked
10:50
The quality of your options is determined by the quality of your inputs. If your decisions have no good options, consider what the source of those options is. 🙏 Today's Episode is Brought To you by: Instabug Building and maintaining mobile applications is not simple. Through comprehensive bug and crash reports, performance monitoring and real time …
Buffalo massacre suspect signaled plans on Discord for months Google faces litigation for unauthorised use of medical records Venezuelan doctor accused of developing and distributing ransomware And now let’s thank today’s sponsor, Torq Myth 3: Only Enterprises Need Security Automation Debunked. While enterprises with thousands of endpoints and spra…
T
The Stack Overflow Podcast


1
Building out a managed Kubernetes service is a bigger job than you think
26:21
26:21
Play later
Play later
Lists
Like
Liked
26:21
You may be running your code in containers. You might even have taken the plunge and orchestrated it all with YAML code through Kubernetes. But infrastructure as code becomes a whole new level of complicated when setting up a managed Kubernetes service. On this sponsored episode of the Stack Overflow podcast, Ben and Ryan talk with David Dymko and …
Use Your Browser Internal Password Vault... or Not? https://isc.sans.edu/forums/diary/Use+Your+Browser+Internal+Password+Vault+or+Not/28658/ SQL Server Brute Forcing https://twitter.com/MsftSecIntel/status/1526680337216114693 UpdateAgent Adapts Again https://www.jamf.com/blog/updateagent-adapts-again/ Updated Exploited Vulnerabilities https://www.c…
S
Security Now (Audio)


1
SN 871: The New EU Surveillance State - Eventful Patch Tuesday, Open Source Maintenance Crew, BIG-IP Boxes
1:54:53
1:54:53
Play later
Play later
Lists
Like
Liked
1:54:53
Picture of the Week. An "eventful" Patch Tuesday. Patch Tuesday. Apple patched a 0-day. Google's "Open Source Maintenance Crew". Conti suggests overthrowing the new Costa Rican government. Policing the Google Play Store. The situation has grown more dire for F5 systems' BIG-IP boxes. Errata. Closing The Loop. SpinRite. The New EU Surveillance State…
In this Soap Box edition of the show Proofpoint’s EVP of Cybersecurity Strategy Ryan Kalember joins host Patrick Gray to talk about why some security spending is just misguided. So much of the infosec industry is geared towards protecting organisations against exotic threats when, really, the trifecta of ransomware, BEC and staff being careless wit…
S
Software Engineering Radio


1
Episode 512: Tim Post on Rubber Duck Debugging
49:52
49:52
Play later
Play later
Lists
Like
Liked
49:52
Tim Post of echoreply.io discusses rubber duck debugging, a way to wrap your head around problems and solutions. Host Felienne spoke with Post about rubber duck debugging, and how it can help you find answers to complex problems. The show also explores the role of documentation in problem solving and how techniques from rubber duck […]…
C
CyberWire Daily


1
CISA Alert AA22-137A – Weak security controls and practices routinely exploited for initial access. [CISA Alerts]
2:49
2:49
Play later
Play later
Lists
Like
Liked
2:49
This joint cybersecurity advisory was coauthored by the cybersecurity authorities of the US, Canada, New Zealand, the Netherlands, and the UK. Cyber actors routinely exploit poor security configurations, weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim’s system. This joi…
C
CyberWire Daily


1
Russian cyber threats and NATO’s Article 5. Conti says it’s going to bring Cost Rica to its knees. BLE proof-of-concept hack. CISA warns of initial access methods. Thanos proprietor indicted.
28:38
28:38
Play later
Play later
Lists
Like
Liked
28:38
An assessment of the Russian cyber threat. NATO's Article 5 in cyberspace. Conti's ransomware attack against Costa Rica spreads, in scope and effect. Bluetooth vulnerabilities demonstrated in proof-of-concept. CISA and its international partners urge following best practices to prevent threat actors from gaining initial access. Joe Carrigan looks a…
C
CYBER


1
Fired By Starbucks, Union Organizer Wears Fursuit to Rallies
47:44
47:44
Play later
Play later
Lists
Like
Liked
47:44
The image is now iconic. An arctic wolf fursona in a Starbucks smock. Stance set wide. A sign in his hand held high that reads “UNION YES!” This was Michael Vestigo dressed in his Fursona as Apollo, a former Starbucks employee in Overland Park, Kansas. Why former? The company fired him for “displaying violent and threatening behavior” after he part…