Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
From social media influencers to small local businesses, people everywhere are harnessing the power of creative tools to design not just brands and content, but also deeply satisfying careers. In the Making explores the practical challenges and surprising rewards of working in this new creator economy. Join Adobe’s Teresa Au for conversations with content creators, solopreneurs, and industry experts who offer inspiration and insight for combining creativity, community, and business.
…
continue reading
Become the best software developer you can be
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Software’s best weekly news brief, deep technical interviews & talk show.
…
continue reading
Technical interviews about software topics.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Get in-depth coverage of current and future trends in technology, and how they are shaping business, entertainment, communications, science, politics, and society.
…
continue reading
Daily update on current cyber security threats
…
continue reading
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
…
continue reading
Agile Coaches' Corner shares practical concepts in an approachable way. It is for agile practitioners and business leaders seeking expert advice on improving the way they work to achieve their desired outcomes.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
Technical interviews about software topics.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every week we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
Unsupervised Learning is a Security, AI, and Meaning-focused podcast that looks at how best to thrive as humans in a post-AI world. It combines original ideas, analysis, and mental models to bring not just the news, but why it matters and how to respond.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
A podcast featuring panelists of engineers from Netflix, Twitch, & Atlassian talking over drinks about all things software engineering.
…
continue reading
This feed includes all episodes of Paul's Security Weekly, Enterprise Security Weekly, Business Security Weekly, Application Security Weekly, and Security Weekly News! Your one-stop shop for all things Security Weekly!
…
continue reading
Get ready for a weekly dose of all things Enterprise Software and Cloud Computing! Join us as we dive into topics including Kubernetes, DevOps, Serverless, Security and Coding. Plus, we’ll keep you entertained with plenty of off-topic banter and nonsense. Don’t worry if you miss the latest industry conference - we’ve got you covered with recaps of all the latest news from AWS, Microsoft Azure, Google Cloud Platform (GCP) and the Cloud Native Computing Foundation (CNCF).
…
continue reading
A podcast about modern UI development on the web. Hosted by Sam Selikoff and Ryan Toronto.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Feel like you’re hitting a wall with your existing software projects? You're not alone. On the Maintainable software podcast, we speak with seasoned practitioners who have worked past the problems often associated with technical debt and legacy code. In each episode, our guests will share stories and outline tangible, real-world approaches to software challenges. In turn, you'll uncover new ways of thinking about how to improve your software project's maintainability. We're in this together. ...
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
The State and Popular Culture
…
continue reading
A podcast about web design and development.
…
continue reading
A weekly podcast talking about the latest developments and updates from the Ubuntu Security team, including a summary of the security vulnerabilities and fixes from the last week as well as a discussion on some of the goings on in the wider Ubuntu Security community.
…
continue reading
A security podcast geared towards those looking to better understand security topics of the day. Hosted by Kurt Seifried and Josh Bressers covering a wide range of topics including IoT, application security, operational security, cloud, devops, and security news of the day. There is a special open source twist to the discussion often giving a unique perspective on any given topic.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
1
What even is the modern data stack (Interview)
1:12:05
1:12:05
Play later
Play later
Lists
Like
Liked
1:12:05
Benn Stancil’s weekly Substack on data and technology provides a fascinating perspective on the modern data stack & the industry building it. On this episode, Benn joins Jerod to dissect a few of his essays, discuss opportunities he sees during this slowdown & discuss why he thinks maybe we should disband the analytics team. Leave us a comment Chan…
…
continue reading
Luma AI develops technologies at the forefront of AI and graphics. They created a text-to-3D tool that functions like Midjourney but for generating 3D models. Another tool makes photorealistic environments by reconstructing any scene in 3D from just a few photos. Karan Ganesan is a Software Engineer and Barkley Dai is the Product and Growth Lead at…
…
continue reading
1
SE Radio 625: Jonathan Schneider on Automated Refactoring with OpenRewrite
52:45
52:45
Play later
Play later
Lists
Like
Liked
52:45
Jonathan Schneider, the cofounder of Moderne and the creator of OpenRewrite, talks with SE Radio's Gregory Kapfhammer about automated software maintenance. In addition to exploring the design and implementation of OpenRewrite, Schneider explains how the tool can automatically support software maintenance tasks such as framework migration and securi…
…
continue reading
This week, we discuss Mary Meeker's AI & Universities report, the CD Foundation's State of CI/CD Report, and share a few thoughts on DevRel. Plus, Coté gets fiber and is forced to watch soccer. Watch the YouTube Live Recording of Episode 475 Runner-up Titles If not better, at least the same. The enterprise software buyer’s lament. Order tokens at f…
…
continue reading
1
622: Website Rendering, Updating Software, and Edge Gets Faster
58:29
58:29
Play later
Play later
Lists
Like
Liked
58:29
Show Description We're talking website rendering, server side rendering, Astro's server islands, perf hits for navigation elements, updating software because the docs aren't available for older versions, and a new Microsoft Edge was released. Listen on Website → Links Scale & Ship Faster with a Composable Web Architecture | Netlify Eleventy is a si…
…
continue reading
1
796: Do We Need JS Frameworks × Are You Over-Engineering? × Webview vs Native
58:34
58:34
Play later
Play later
Lists
Like
Liked
58:34
Scott and Wes tackle a variety of audience questions, from the nuances of over-engineering to the energy consumption of AI LLMs. They also discuss the pros and cons of monorepos, frameworks, and the ever-important question: Do you really need to learn all the developer tooling? Show Notes 00:00 Welcome to Syntax! 00:41 Brought to you by Sentry.io. …
…
continue reading
1
DOP 272: How To Become a Speaker at Conferences
49:17
49:17
Play later
Play later
Lists
Like
Liked
49:17
#272: Public speaking, especially at conferences, can be a daunting task. The fear of failing, the pressure of performing in front of peers, and the challenges of preparation can make even the most confident individuals second-guess themselves. In this episode, Darin and Viktor offer practical advice for aspiring conference speakers. Today's sponso…
…
continue reading
1
Hackers Claim to Have Leaked 1.1 TB of Disney Slack Messages
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11
A hacker group called “NullBulge” says it stole more than a terabyte of Disney’s internal Slack messages and files from nearly 10,000 channels in an apparent protest over AI-generated art. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy SpokenLayer
…
continue reading
Luma AI develops technologies at the forefront of AI and graphics. They created a text-to-3D tool that functions like Midjourney but for generating 3D models. Another tool makes photorealistic environments by reconstructing any scene in 3D from just a few photos. Karan Ganesan is a Software Engineer and Barkley Dai is the Product and Growth Lead at…
…
continue reading
Are small business owners just the worst? The rant that hits close to home. And how AI is looking more like a unicorn, not a horse, but big tech keeps trying to put a saddle on it. Sponsored By: Coder QA: Take $1 a month off your membership for a year, and contribute to our show directly! Promo Code: darthjarjar Support Coder Radio Links: 💥 Gets Sa…
…
continue reading
1
Rite Aid update, AT&T ransom laundered, Hacktivists leak Disney data
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16
Rite Aid says 'limited’ cybersecurity incident affected over 2 million people AT&T ransom laundered through mixers and gambling services Hacktivists leak Disney data to protect artist rights Thanks to today's episode sponsor, Conveyor Why do teams choose Conveyor over the competition to automate answering security questionnaires? A few reasons. One…
…
continue reading
1
Microsoft's Bug Reporting Criticized, Disney Hacked, and Kaspersky Exits US. Cyber Security Today Special Edition from Hashtag Trending
7:24
7:24
Play later
Play later
Lists
Like
Liked
7:24
With Howard away and today's episode of Hashtag Trending being all about security stories, I took the liberty of doing a cross posting. Hope we'll have Howard back next week. In today's episode of Hashtag Trending, host Jim Love covers significant cybersecurity news. Microsoft faces criticism for mishandling a reported MSHTML browser engine vulnera…
…
continue reading
1
ISC StormCast for Wednesday, July 17th, 2024
5:39
5:39
Play later
Play later
Lists
Like
Liked
5:39
Reply Chain Phishing With a Twist https://isc.sans.edu/diary/%22Reply-chain%20phishing%22%20with%20a%20twist/31084 Claroty TP-Link and Synology IP Camera Exploits https://claroty.com/team82/research/pivoting-from-wan-to-lan-synology-bc500-ip-camera https://claroty.com/team82/research/pwn2own-wan-to-lan-exploit-showcase Cosmic Sting Hits Adobe Comme…
…
continue reading
1
Risky Biz Soap Box: Mike Wiacek on lazy mode threat hunting
31:20
31:20
Play later
Play later
Lists
Like
Liked
31:20
This Soap Box edition of the show is with Mike Wiacek, the CEO and Founder of Stairwell. Stairwell is a platform that creates something similar to an NDR, but for file analysis instead of network traffic. The idea is you get a copy of every unique file in your environment to the Stairwell platform, via a file forwarding agent. You get an inventory …
…
continue reading
1
SN 983: A Snowflake's Chance - CDN Safety, Microsoft's Behavior, CDK Ransomware Attack
2:07:11
2:07:11
Play later
Play later
Lists
Like
Liked
2:07:11
Using Content Delivery Networks Safely The CDK Global Ransomware Attack The IRS and Entrust Polyfill.io fallout Microsoft's Behavior A Snowflake's Chance Show Notes - https://www.grc.com/sn/SN-983-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TW…
…
continue reading
1
The Power of Data in the Cloud with Arun Ulag
36:37
36:37
Play later
Play later
Lists
Like
Liked
36:37
How has the cloud transformed the way we work with data? While at Build in Seattle, Richard sat down with Arun Ulag, Microsoft CVP of Azure Data, to discuss how the cloud has transformed how we work with data. The pre-cloud practice of extract-transform-and-load into OLAP cubes has given way to the data lake - you don't need to pre-process data if …
…
continue reading
1
Squarespace's square off with hijacked domains.
36:53
36:53
Play later
Play later
Lists
Like
Liked
36:53
Some Squarespace users see their domains hijacked. Kaspersky Lab is shutting down US operations. BackPack APKs break malware analysis tools. Hackers use 7zip files to deliver Poco RAT malware. CISA’s red-teaming reveals security failings at an unnamed federal agency. Microsoft fixes an Outlook bug triggering false security alerts. Switzerland manda…
…
continue reading
1
SE Radio 624: Marcelo Trylesinski on FastAPI
41:04
41:04
Play later
Play later
Lists
Like
Liked
41:04
Marcelo Trylesinski, a senior software engineer at Pydantic and a maintainer of open-source Python tools including Starlette and Uvicorn, joins host Gregory M. Kapfhammer to talk about FastAPI. Their conversation focuses on the design and implementation of FastAPI and how programmers can use it to create web-based APIs. They also explore how to cre…
…
continue reading
1
Floppy Disks, Exim, Kaspersky, Darkgate, AT&T, Josh Marpet and more... - SWN #398
29:20
29:20
Play later
Play later
Lists
Like
Liked
29:20
Floppy Disks, Exim, Kaspersky, Darkgate, AT&T, Josh Marpet, and more are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-398
…
continue reading
1
Producing Secure Code by Leveraging AI - Stuart McClure - ASW #291
1:09:02
1:09:02
Play later
Play later
Lists
Like
Liked
1:09:02
How can LLMs be valuable to developers as an assistant in finding and fixing insecure code? There are a lot of implications in trusting AI or LLMs to not only find vulns, but in producing code that fixes an underlying problem without changing an app's intended behavior. Stuart McClure explains how combining LLMs with agents and RAGs helps make AI-i…
…
continue reading
Remote Desktop Protocol (RDP) is a crucial artifact in digital forensics due to its extensive use for remote system access. Analyzing RDP activities can uncover vital information about unauthorized access, insider threats, and attacker lateral movement within a network. Forensic examination of RDP logs enables investigators to trace an attacker's s…
…
continue reading
1
The Sweeping Danger of the AT&T Phone Records Breach
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03
Telecom giant AT&T says a major data breach has exposed the call and text records of “nearly all” of its customers, epitomizing the dire state of data security. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy SpokenLayer
…
continue reading
Redis is an in-memory database that can be used for caching, vector search, and as a message broker. Brian Sam-Bodden is a Senior Applied AI Engineer at Redis. He joins the show to talk about his work and AI at the company. Sean’s been an academic, startup founder, and Googler. He has published works covering a wide range of topics from information…
…
continue reading
Redis is an in-memory database that can be used for caching, vector search, and as a message broker. Brian Sam-Bodden is a Senior Applied AI Engineer at Redis. He joins the show to talk about his work and AI at the company. Sean’s been an academic, startup founder, and Googler. He has published works covering a wide range of topics from information…
…
continue reading
1
148. They’re just hackers, living off the land
22:57
22:57
Play later
Play later
Lists
Like
Liked
22:57
In an encore episode, we report on a specific kind of cyber attack targeting big industrial systems that is coming back into fashion: it’s called a ‘living off the land’ attack. What makes it particularly scary is that unlike traditional attacks in which bad actors break into a system and plant malicious code, in living off the land attacks, there’…
…
continue reading
1
James Socol: Building Social Capital in Engineering Teams
44:18
44:18
Play later
Play later
Lists
Like
Liked
44:18
In this episode of the Maintainable Software Podcast, Robby Russell sits down with James Socol, a Staff Engineer at Fastly, to discuss the art of maintaining legacy code and the nuances of technical debt versus technical depreciation. Key Topics Discussed: Characteristics of Well-Maintained Code: James shares his insights on what defines well-maint…
…
continue reading
1
Wiz acquisition, AT&T paid hacker, Squarespace domain defaults
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54
Alphabet in talks to acquire Wiz AT&T allegedly paid hacker to delete data Details on Squarespace domain hacks Thanks to today's episode sponsor, Conveyor Does the mountain of security questionnaires in your inbox make you feel like you're in a rowboat trying to make it through a tsunami? If so, you should check out Conveyor. As the market leader i…
…
continue reading
An undocumented or publicly unknown method to access a computer system undetected or to break a cypher used to encode messages.By N2K Networks
…
continue reading
1
Ticketmaster’s Billions in Barcodes Stolen + AI Misinformation Botnet + Breaking AT&T news
57:10
57:10
Play later
Play later
Lists
Like
Liked
57:10
We got a lot of messages about the Ticketmaster hack that went down since our last episode. We dive into all the weird angles of that evolving story, a strange real time news update about the AT&T hack, and spend a surprising amount of time hyping a Canadian movie about Blackberry. Learn more about your ad choices. Visit podcastchoices.com/adchoice…
…
continue reading
1
The framework helping devs build LLM apps
34:21
34:21
Play later
Play later
Lists
Like
Liked
34:21
LlamaIndex is a data framework for building LLM applications. Check out the open-source framework or get started with the developer community, LlamaHub. Looking for a deeper understanding of RAG? Start with our guide. Wondering how to import `SimpleDirectoryReader` from LlamaIndex? This question has you covered. Jerry Chen is a partner at Greylock.…
…
continue reading
Protected OOXML Spreadsheets https://isc.sans.edu/diary/Protected%20OOXML%20Spreadsheets/31070 Leaked PyPi Secret Token Revealed in Binary https://jfrog.com/blog/leaked-pypi-secret-token-revealed-in-binary-preventing-suppy-chain-attack/ Microsoft 365 Defender Affected by June Update https://learn.microsoft.com/en-us/windows/release-health/status-wi…
…
continue reading
1
Solving the Complexities of Cyber Insurance for SMBs - Brian Fritton - BSW #356
1:06:15
1:06:15
Play later
Play later
Lists
Like
Liked
1:06:15
Cyber insurance underwriting is all over the map. With such a variation in application requirements, how should small and medium businesses prepare to receive the best policy for the price? Brian Fritton joins Business Security Weekly to discuss a systematic approach to preparing for cyber insurance. By working with the underwriters, this approach …
…
continue reading
The assassination attempt on former President Trump sparks online disinformation. AT&T pays to have stolen data deleted. Rite Aid recovers from ransomware. A hacktivist group claims to have breached Disney’s Slack. Checkmarx researchers uncover Python packages exfiltrating user data. HardBit ransomware gets upgraded with enhanced obfuscation. Threa…
…
continue reading
1
The six dumbest ideas in computer security (News)
8:14
8:14
Play later
Play later
Lists
Like
Liked
8:14
Marcus J. Ranum’s 2005 post on dumb ideas in computer security still holds up, Barry Jones argues why story points are useless, Posting is an HTTP client as a TUI, Varnish ceator Poul-Henning Kamp (phk) reflects on ten years of working on the HTTP cache & es-tookit is a major upgrade to Lodash. Leave us a comment Changelog++ members support our wor…
…
continue reading
1
Pressure Grows in Congress to Treat Crypto Investigator Tigran Gambaryan, Jailed in Nigeria, as a Hostage
8:52
8:52
Play later
Play later
Lists
Like
Liked
8:52
A new resolution echoes what 16 members of Congress have already said to the White House: It must do more to free one of the most storied crypto-focused federal agents in history. Learn more about your ad choices. Visit podcastchoices.com/adchoicesBy SpokenLayer
…
continue reading
1
Sips of Wisdom: Interview with Shaundai Person
47:05
47:05
Play later
Play later
Lists
Like
Liked
47:05
In this latest episode of our 'Sips of Wisdom' series, Ryan Burgess sits down with Shaundai Person, Senior Software Engineer at Netflix. Shaundai shares her inspiring journey from a career in sales to becoming a senior software engineer at one of the world's leading entertainment companies. With her unique background and experience, Shaundai discus…
…
continue reading
1
Episode 417: Should I tell my boss I'm checked out and how do I deal with a PM who has no idea what he's doing?
30:52
30:52
Play later
Play later
Lists
Like
Liked
30:52
In this episode, Dave and Jamison answer these questions: Hey guys, love the show! (Insert joke here so you’ll read my question) Should I tell my boss I’m discouraged and have checked out? I’m the frontend lead for a project where I’ve recently gotten the vibe that the project isn’t really that important to the organization. The project is already …
…
continue reading
1
795: Hosting Private Fonts on the Edge With Cloudflare
24:24
24:24
Play later
Play later
Lists
Like
Liked
24:24
Scott and Wes dish out the intricacies of hosting private fonts using Cloudflare Pages. They explore the challenges of font security, the benefits of a font server, and the nuances of caching and whitelisting to keep your fonts secure and efficient. Show Notes 00:00 Welcome to Syntax! 01:53 Behind the Code: Brought to you by Sentry.io. 03:12 The pr…
…
continue reading
1
624: Blogging, In App Browsers are Bad, and Teaching CSS from Scratch
48:23
48:23
Play later
Play later
Lists
Like
Liked
48:23
Show Description On this epsiode we're talking about the current state of blogging and social media, the polyfill hack, whether in app browsers should be banned, web components and the difficulty of front end web dev, and how we would go about teaching CSS from scratch in 2024. Listen on Website → Links Polyfill Attack Impacts Over 380,000 Hosts, I…
…
continue reading
1
Rite Aid breach, AT&T breach implications, CDK paid ransom
7:35
7:35
Play later
Play later
Lists
Like
Liked
7:35
Rite Aid announces data breach following June cyberattack The personal security implications of the AT&T breach US offers support to prevent Paris Olympics cyber and disinformation attacks Thanks to today's episode sponsor, Conveyor Ever feel like completing security questionnaires has become your full-time side hustle you’re not even getting paid …
…
continue reading
Rick Howard, The CSO, Chief Analyst, and Senior Fellow at N2K Cyber, discusses the current state of MITRE ATT&CK with CyberWire Hash Table guests Frank Duff, Tidal Cyber’s Chief Innovation Officer, Amy Robertson, MITRE Threat Intelligence Engineer and ATT&CK Engagement lead, and Rick Doten, Centene’s VP of Information Security. References: Amy L. R…
…
continue reading
16-Bit Hash Collisions in XLS Spreadsheets https://isc.sans.edu/diary/16-bit%20Hash%20Collisions%20in%20.xls%20Spreadsheets/31066 Attacks against the "Nette" PHP framework CVE-2020-15227 https://isc.sans.edu/forums/diary/Attacks+against+the+Nette+PHP+framework+CVE202015227/31076/ Squarespace Hijacked Domains https://github.com/security-alliance/adv…
…
continue reading
1
Episode 437 - CocoPods and proper funding for open source
36:50
36:50
Play later
Play later
Lists
Like
Liked
36:50
Josh and Kurt talk about a pretty big bug found in CocoPods ownership. We also touch on a paper that discusses the technical debt that open source should have. We discuss what the long term sustainability of open source. There aren't any good solutions for open source today, but talking about these problems is important, we have to start to underst…
…
continue reading
1
Encore: Malek Ben Salem: Taking those challenges. [R&D] [Career Notes]
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21
Americas Security R&D Lead for Accenture Malek Ben Salem shares how she pivoted from her love of math and background in electrical engineering to a career in cybersecurity R&D. Malek talks about her interest in astrophysics as a young girl, and how her affinity for math and taking on challenges lead her to a degree in electrical engineering. She gr…
…
continue reading
After surviving an assassination attempt in Butler, PA, a defiant and proud Trump was whisked away by his secret service detail with blood on his face and his fist high in the sky. While the staunchest anti-Trump and pro-Biden voters out there are unlikely to change their mind, the majority of American voters are still undecided about their final c…
…
continue reading
1
On the prowl for mobile malware. [Research Saturday]
27:18
27:18
Play later
Play later
Lists
Like
Liked
27:18
This week, we are joined by Asheer Malhotra and Vitor Ventura from Cisco Talos, and they are discussing "Operation Celestial Force employs mobile and desktop malware to target Indian entities." Cisco Talos revealed Operation Celestial Force, an espionage campaign by the Pakistani threat group "Cosmic Leopard," targeting Indian defense, government, …
…
continue reading
The Junk RockYou2024 Password List; The Junk 9.4GB Twitter Breach; The Real Neiman Marcus Breach; The Real Heritage Foundation Breach; Sponsored by 1Password https://www.troyhunt.com/weekly-update-408/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading
Shawn “swyx” Wang is back to talk with us about the state of DevRel according to ZIRP (the Zero Interest Rate Phenomenon), the data that backs up the rise and fall of job openings, whether or not DevRel is dead or dying, speculation of the near-term arrival of AGI, AI Engineering as the last job standing, the innovation from Cognition with Devin as…
…
continue reading
1
Week in Review: AT&T breach, Security regulations attacked, 10 billion passwords stolen
20:29
20:29
Play later
Play later
Lists
Like
Liked
20:29
Link to blog post This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Andrew Cannata, CISO, Primo Water Thanks to our show sponsor, Entro Security What are you doing to secure your company’s non-human identities? Vaults and scanners are helpful, but they don’t give the context for where your secrets are, h…
…
continue reading