Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Linux After Dark Podcasts

show episodes
 
Artwork

1
Linux After Dark

The Late Night Linux Family

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Sysadmin Chris, cloud consultant Gary, and developer/admin May join Joe to talk about their recent Linux-related experiences, and discuss some of the more philosophical aspects of being a Linux user.
  continue reading
 
Artwork

1
Late Night Linux

The Late Night Linux Family

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Late Night Linux is a podcast that takes a look at what’s happening with Linux and the wider tech industry. Every week, Joe, Félim, Graham and Will discuss the latest news and releases, and the broader issues and trends in the world of free and open source software. Expect drinking, swearing, strong opinions, and Félim being trolled about AI and the cloud.
  continue reading
 
Artwork

1
Late Night Linux (Ogg)

The Late Night Linux Family

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Late Night Linux is a podcast that takes a look at what’s happening with Linux and the wider tech industry. Every week, Joe, Félim, Graham and Will discuss the latest news and releases, and the broader issues and trends in the world of free and open source software.
  continue reading
 
Artwork

1
CyberWire Daily

N2K Networks

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Loading …
show series
 
The Feds shut down a covert North Korean IT operation. Google releases an emergency update to fix a new Chrome zero-day. A major U.S. trade show and event marketing firm suffers a data breach. NetScaler patches a pair of critical vulnerabilities. A sophisticated cyber attack targets The Hague. An Iran-linked hacking group threatens to release email…
  continue reading
 
Linux gaming goes from strength to strength but puts off the inevitable death of 32-bit x86, devs are sick of companies expecting free fixes, Creative Commons disappoints on AI, and more. News Steam Beta finally enables Proton on Linux fully, making Linux gaming simpler Games run faster on SteamOS than Windows 11, Ars testing finds Fedora Linux dev…
  continue reading
 
Linux gaming goes from strength to strength but puts off the inevitable death of 32-bit x86, devs are sick of companies expecting free fixes, Creative Commons disappoints on AI, and more. News Steam Beta finally enables Proton on Linux fully, making Linux gaming simpler Games run faster on SteamOS than Windows 11, Ars testing finds Fedora Linux dev…
  continue reading
 
Linux gaming goes from strength to strength but puts off the inevitable death of 32-bit x86, devs are sick of companies expecting free fixes, Creative Commons disappoints on AI, and more. News Steam Beta finally enables Proton on Linux fully, making Linux gaming simpler Games run faster on SteamOS than Windows 11, Ars testing finds Fedora Linux dev…
  continue reading
 
CISA warns organizations of potential cyber threats from Iranian state-sponsored actors.Scattered Spider targets aviation and transportation. Workforce cuts at the State Department raise concerns about weakened cyber diplomacy. Canada bans Chinese security camera vendor Hikvision over national security concerns.Cisco Talos reports a rise in cybercr…
  continue reading
 
When and how to use benchmarking in your project, why it’s hard, and why optimising your code can be even harder. Blog post about the speed of ripgrep hyperfine: A command-line benchmarking tool Profile-guided optimization Andy benchmarking IndexedDb Support us on Patreon and get an ad-free RSS feed with early episodes sometimes See our contact pag…
  continue reading
 
Please enjoy this encore of Career Notes. Senior Vice President for Strategy, Partnerships, and Corporate Development at IronNet Cybersecurity, Jamil Jaffer, shares how his interest in technology brought him full circle. Always a tech guy, Jamil paid he way through college doing computer support. Jamil went to law school and worked in various jobs …
  continue reading
 
This week we are joined by Kyle Lefton, Security Researcher from Akamai, who is diving into their work on "Two Botnets, One Flaw - Mirai Spreads Through Wazuh Vulnerability." Akamai researchers have observed active exploitation of CVE-2025-24016, a critical RCE vulnerability in Wazuh, by two Mirai-based botnets. The campaigns highlight how quickly …
  continue reading
 
Hawaiian Airlines reports a cybersecurity incident. Microsoft updates its Windows Resiliency Initiative after the 2024 CrowdStrike crash. CitrixBleed 2 is under active exploitation in the wild. Researchers disclose a critical vulnerability in Open VSX. Malware uses prompt injection to evade AI analysis. A new report claims Cambodia turns a blind ey…
  continue reading
 
How much observability and monitoring is really needed, the tooling people actually use (from Datadog and Grafana Cloud to open source options like Prometheus, Loki, and Tempo), and how to approach observability without overcomplicating things. Support us on patreon and get an ad-free RSS feed with early episodes sometimes Subscribe to the RSS feed…
  continue reading
 
Patches, patches and more patches.A patient death has been linked to the 2023 ransomware attack on an NHS IT provider. U.S. authorities indict the man known online as “IntelBroker”. A suspected cyberattack disrupts Columbia University’s computer systems. A major license plate reader company restricts cross-state data access after reports revealed m…
  continue reading
 
Jim is concerned that we might not see another next-gen filesystem that can compete with ZFS, no matter how much we all want one. Plus whether you should switch to third-party firmware on your router. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes ZFS Performance Tuning – Optimizing for your Workload Discussio…
  continue reading
 
Cybercriminals target financial institutions across Africa using open-source tools. Threat actors are using a technique called Authenticode stuffing to abuse ConnectWise remote access software. A fake version of SonicWall’s NetExtender VPN app steals users’ credentials. CISA and the NSA publish a guide urging the adoption of Memory Safe Languages. …
  continue reading
 
Cybersecurity warnings about possible Iranian retaliation have surged. A potential act of sabotage disrupts the NATO Summit in The Hague. Canadian cybersecurity officials discover Salt Typhoon breached a major telecom provider. The U.S. House bans WhatsApp from all government devices. APT28 uses Signal chats in phishing campaigns targeting Ukrainia…
  continue reading
 
In this episode: Martin has replaced his coreutils, findutils, diffutils and sudo with Rust reimplementations. Alan has continued working on Nerdy Day Trips. Mark made a timelapse with Velocity lapse and Youcut. See it on Makertube. You can send your feedback via [email protected] or the Contact Form. If you’d like to hang out with other listene…
  continue reading
 
Making music with code in real time, fancy rsync, an open source real time strategy engine, advanced print debugging, EU-based DNS resolvers, and European government departments moving away from Microsoft and they might stick with Linux and FOSS this time. Discoveries Strudel rsyncy Spring IceCream DNS4EU News/discussion Two city governments in Den…
  continue reading
 
Making music with code in real time, fancy rsync, an open source real time strategy engine, advanced print debugging, EU-based DNS resolvers, and European government departments moving away from Microsoft and they might stick with Linux and FOSS this time. Discoveries Strudel rsyncy Spring IceCream DNS4EU News/discussion Two city governments in Den…
  continue reading
 
Making music with code in real time, fancy rsync, an open source real time strategy engine, advanced print debugging, EU-based DNS resolvers, and European government departments moving away from Microsoft and they might stick with Linux and FOSS this time. Discoveries Strudel rsyncy Spring IceCream DNS4EU News/discussion Two city governments in Den…
  continue reading
 
US warns of heightened risk of Iranian cyberattacks. Cyber warfare has become central to Israel and Iran’s strategies. Oxford City Council discloses data breach. Europe aiming for digital sovereignty. Michigan hospital network says data belonging to 740,000 was stolen by ransomware gang. RapperBot pivoting to attack DVRs. A picture worth a thousand…
  continue reading
 
Please enjoy this encore of Career Notes. Jadee Hanson, CIO and CISO at Code 42, started her technology journey thanks to the help of a teacher in high school. She began college studying computer science and ended with a degree in computer information systems as it had more of the business side. Working in the private sector for companies such as D…
  continue reading
 
Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the M…
  continue reading
 
An historic data breach that wasn’t. Aflac says it stopped a ransomware attack. Cloudflare thwarts a record breaking DDoS attack. Mocha Manakin combines clever social engineering with custom-built malware. The Godfather Android trojan uses a sophisticated virtualization technique to hijack banking and crypto apps. A British expert on Russian inform…
  continue reading
 
Nintendo cuts off Switches that dare to play backed up games, more Microsoft AI exploits, why you shouldn’t regularly spin down hard drives, and securing applications on a home server. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Reliable ZFS Storage on Commodity Hardware – A Cost-Efficient, Data-Sure Storag…
  continue reading
 
We put together an open conversation between our podcast hosts, CyberWire Daily's Dave Bittner, T-Minus Space Daily’s Maria Varmazis, and CISO Perspectives podcast’s Kim Jones. Their conversation goes deeper than just the historical significance of Juneteenth, diving into candid conversations on allyship, representation, and the enduring value of d…
  continue reading
 
Viasat confirms it was breached by Salt Typhoon. Microsoft’s June 2025 security update giveth, and Microsoft’s June 2025 security update taketh away. Local privilege escalation flaws grant root access on major Linux distributions. BeyondTrust patches a critical remote code execution flaw. SMS low cost routing exposes users to serious risks. Erie In…
  continue reading
 
A House oversight committee requests DOGE documents from Microsoft. Predatory Sparrow claims a cyberattack on an Iranian bank. Microsoft says data that happens in Europe will stay in Europe. A complex malware campaign is using heavily obfuscated Visual Basic files to deploy RATs. A widely used CMS platform suffers potential RCE bugs. North Korea’s …
  continue reading
 
X11 is basically dead (again) and we are quite pleased, the Linux Foundation sets out to fix the WordPress mess and some of us are cynical, custom ROMs for Pixel phones are going to be much more difficult to make, Apple is adding proper OCI containers to macOS, and more. News Ubuntu 25.10 drops support for GNOME on Xorg Ubuntu 25.10 and Fedora 43 t…
  continue reading
 
X11 is basically dead (again) and we are quite pleased, the Linux Foundation sets out to fix the WordPress mess and some of us are cynical, custom ROMs for Pixel phones are going to be much more difficult to make, Apple is adding proper OCI containers to macOS, and more. News Ubuntu 25.10 drops support for GNOME on Xorg Ubuntu 25.10 and Fedora 43 t…
  continue reading
 
X11 is basically dead (again) and we are quite pleased, the Linux Foundation sets out to fix the WordPress mess and some of us are cynical, custom ROMs for Pixel phones are going to be much more difficult to make, Apple is adding proper OCI containers to macOS, and more. News Ubuntu 25.10 drops support for GNOME on Xorg Ubuntu 25.10 and Fedora 43 t…
  continue reading
 
International law enforcement takes down a darknet drug marketplace. The Washington Post is investigating a cyberattack targeting several journalists' email accounts. Anubis ransomware adds destructive capabilities. The GrayAlpha threat group uses fake browser update pages to deliver advanced malware. Researchers uncover a stealthy malware campaign…
  continue reading
 
How we deal with complex projects involving non-technical people as well as developers. How to manage expectations about timing, how to deal with issues, why documenting conversations is important, and more. Support us on Patreon and get an ad-free RSS feed with early episodes sometimes See our contact page for ways to get in touch. Subscribe to th…
  continue reading
 
Please enjoy this encore of Career Notes. Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, has gone from taking technology to its limits for his own understanding to providing clarity about security for others. Mark fell in love with his Commodore 128 and once he realized he could bend the machine to his will, it set him on the path to…
  continue reading
 
This week, Dave is joined by ⁠Ziv Karliner⁠, ⁠Pillar Security⁠’s Co-Founder and CTO, sharing details on their work on "New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents." Vibe Coding - where developers use AI assistants like GitHub Copilot and Cursor to generate code almost instantly - has become central to how e…
  continue reading
 
Cloudflare says yesterday’s widespread outage was not caused by a cyberattack. Predator mobile spyware remains highly active. Microsoft is investigating ongoing Microsoft 365 authentication services issues. An account takeover campaign targets Entra ID users by abusing a popular pen testing tool. Palo Alto Networks documents a JavaScript obfuscatio…
  continue reading
 
After over 10 years of using Synology appliances for his backups, Gary has had enough of their shenanigans and needs to rethink his whole setup. Synology confirms that higher-end NAS products will require its branded drives AOOSTAR NAS series UGREEN NASync DXP2800 2-Bay Desktop NAS Fractal Design Node 304 – Black – Mini Cube Compact Computer Case T…
  continue reading
 
Interpol’s Operation Secure dismantles a major cybercrime network, and Singapore takes down scam centers. GitLab patches multiple vulnerabilities in its DevSecOps platform. Researchers unveil a covert method for exfiltrating data using smartwatches. EchoLeak allows for data exfiltration from Microsoft Copilot. Journalists are confirmed targets of P…
  continue reading
 
SharePoint is exploitable by Microsoft’s AI, NIST proposes a new metric for exploited vulnerabilities, SBCs that look cool for a mini NAS and a router, and setting up a first NAS with 4 disks. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes The Maintainer’s Dilemma: Strategies for Supporting Legacy Drivers Acro…
  continue reading
 
Patch Tuesday. Mozilla patches two critical FireFox security flaws. A critical flaw in Salesforce OmniStudio exposes sensitive customer data stored in plain text. The Badbox botnet continues to evolve. AI-powered “ghost students” enrolling in online college courses to steal government funds. Hackers steal nearly 300,000 vehicle crash reports from t…
  continue reading
 
An unsecured Chroma database exposes personal information of Canva Creators. A researcher brute-forces Google phone numbers. Five zero-day vulnerabilities in Salesforce Industry Cloud are uncovered. Librarian Ghouls target Russian organizations with stealthy malware. SAP releases multiple security patches including a critical fix for a NetWeaver bu…
  continue reading
 
In this episode: Martin has been brutally reclaiming GitHub runner disk space using Nothing but Nix This technique can be applied to other purposes. Get the technical details from Martin’s blog: The Nix Space Heist: Reclaiming 130GB in GitHub Actions Alan has resurrected a very nerdy website. Go to Nerdy Day Trips² and submit your favourite fascina…
  continue reading
 
Redis finally picks the right licence but it’s probably too late, the Ubuntu release process is being modernised, GNOME drops X11 for good and gets a new Executive Director, the Android Desktop mode is officially happening, and Linux Format magazine is no more. Plus a cool Frigate update, auto dark mode in Plasma, and Fender’s new audio workstation…
  continue reading
 
Redis finally picks the right licence but it’s probably too late, the Ubuntu release process is being modernised, GNOME drops X11 for good and gets a new Executive Director, the Android Desktop mode is officially happening, and Linux Format magazine is no more. Plus a cool Frigate update, auto dark mode in Plasma, and Fender’s new audio workstation…
  continue reading
 
Redis finally picks the right licence but it’s probably too late, the Ubuntu release process is being modernised, GNOME drops X11 for good and gets a new Executive Director, the Android Desktop mode is officially happening, and Linux Format magazine is no more. Plus a cool Frigate update, auto dark mode in Plasma, and Fender’s new audio workstation…
  continue reading
 
A new White House executive Order overhauls U.S. cybersecurity policy. The EU updates its “cybersecurity blueprint”. The Pentagon’s inspector general investigates Defense Secretary Hegseth’s Signal messages. Chinese hackers target U.S. smartphones. A new Mirai botnet variant drops malware on vulnerable DVRs. 17 popular Gluestack packages on NPM hav…
  continue reading
 
Please enjoy this encore of Career Notes. Linux and Security Advocate at Intezer Ell Marquez shares her journey from the family ranch to security. Needing a life change due to a bunch of circumstances that had occurred that left her almost homeless, Ell found out about a six week Linux boot camp that took her down the path toward technology. She fe…
  continue reading
 
This week, we are joined by Michael Gorelik, Chief Technology Officer from Morphisec, discussing their work on "New Noodlophile Stealer Distributes Via Fake AI Video Generation Platforms." A new threat dubbed Noodlophile Stealer is exploiting the popularity of AI-powered content tools by posing as fake AI video generation platforms, luring users in…
  continue reading
 
The DOJ files to seize over $7 million linked to illegal North Korean IT workers. The FBI warns of BADBOX 2.0 malware targeting IoT devices. Researchers uncover a major security flaw in Chrome extensions. ESET uncovers Iranian hackers targeting Kurdish and Iraqi government officials. Hitachi Energy, Acronis and Cisco patch critical vulnerabilities.…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play