Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Microsoft Ml Podcasts

show episodes
 
Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and follow us! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Machine learning and artificial intelligence are dramatically changing the way businesses operate and people live. The TWIML AI Podcast brings the top minds and ideas from the world of ML and AI to a broad and influential community of ML/AI researchers, data scientists, engineers and tech-savvy business and IT leaders. Hosted by Sam Charrington, a sought after industry analyst, speaker, commentator and thought leader. Technologies covered include machine learning, artificial intelligence, de ...
  continue reading
 
The Everyday AI podcast is a daily livestream, podcast and free newsletter where we help everyday people grow their careers with AI. The Everyday AI podcast is hosted by Jordan Wilson, a former journalist who's now the owner of a boutique digital strategy company with 20 years of martech experience. Our main focus is to help you keep up with AI trends to make your job easier. Get your work done faster. Increase your output. - Sign up for our free Prime Prompt Polish ChatGPT course: https://p ...
  continue reading
 
Loading …
show series
 
Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://is…
  continue reading
 
Today, we're joined by Charles Martin, founder of Calculation Consulting, to discuss Weight Watcher, an open-source tool for analyzing and improving Deep Neural Networks (DNNs) based on principles from theoretical physics. We explore the foundations of the Heavy-Tailed Self-Regularization (HTSR) theory that underpins it, which combines random matri…
  continue reading
 
Stop what you're doing and read this 👇 ↳ Claude just dropped something new that slipped under the radar. ↳ Other companies have been working on it for a bit as well. ↳ This is the future of knowledge work. ↳ So you should learn now. ↳ Join us to find out what it is. Newsletter: Sign up for our free daily newsletter More on this Episode: Episode Pag…
  continue reading
 
vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%…
  continue reading
 
Is AI gonna wipe out 50% of entry-level jobs? Anthropic's CEO says that's the case when it comes to AI jobs disruption and entry-level, white-collar jobs. So..... is that for real? Or just an AI CEO trying to pump his company's newly released tools? Join us to find out! Newsletter: Sign up for our free daily newsletter More on this Episode: Episode…
  continue reading
 
Agentic AI is seen as a key frontier in artificial intelligence, enabling systems to autonomously act, adapt in real-time, and solve complex, multi-step problems based on objectives and context. Unlike traditional rule-based or generative AI, which are limited to predefined or reactive tasks, agentic AI processes vast information, models uncertaint…
  continue reading
 
Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
  continue reading
 
Perplexity is pivoting hard... and we like it. The New York Times (even amidst its fight with Big AI) just partnered with a big AI company. And Google Gemini just got a lot better for workspace users, and you won't have to lift a finger. AI got a lot more useful this week. Join us to find out how it's changing how we work. Newsletter: Sign up for o…
  continue reading
 
A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently p…
  continue reading
 
We only talk about the upside of agentic AI. But why don't we talk about the risks? As AI agents grow exponentially more capable, so too does the likelihood of something going wrong. So how can we take advantage of agentic AI while also addressing the risks head-on? Join us to learn from a global leader on Responsible AI. Newsletter: Sign up for ou…
  continue reading
 
Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
  continue reading
 
We're so quick to give AI access to see the world around us, but what are the dangers? And what are some powers that you're not aware of? We'll be sharing both as Michael Tiffany, Co-Founder and CEO of Fulcra Dynamics, joins us to discuss. Newsletter: Sign up for our free daily newsletter More on this Episode: Episode Page Join the discussion: Have…
  continue reading
 
Synopsys is a leading electronic design automation company specializing in silicon design and verification, as well as software integrity and security. Their tools are foundational to the creation of modern chips and embedded software, powering everything from smartphones to cars. Chip design is a deeply complex process, often taking months or year…
  continue reading
 
Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
  continue reading
 
Today, I’m excited to share a special crossover edition of the podcast recorded live from Google I/O 2025! In this episode, I join Shawn Wang aka Swyx from the Latent Space Podcast, to interview Logan Kilpatrick and Shrestha Basu Mallick, PMs at Google DeepMind working on AI Studio and the Gemini API, along with Kwindla Kramer, CEO of Daily and cre…
  continue reading
 
Claude 4: Game-changer or just more AI noise? Anthropic's new Opus 4 and Sonnet 4 models are officially out and crushing coding benchmarks like breakfast cereal. They're touting big coding gains, fresh tools, and smarter AI agentic capabilities. Need to know what's actually up with Claude 4, minus the marketing fluff? Join us as we dive in. Newslet…
  continue reading
 
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Weston’s keynote from BlueHat India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-po…
  continue reading
 
SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
  continue reading
 
AI went boom this week. 🤯 ↳ Google announced their biggest AI updates ever at I/O. ↳ Microsoft unveiled dozens of AI updates at its Build conference. ↳ Anthropic unveiled Cluade 4 at its first conference. And none of those are the biggest AI takeaways of the week. Sheeeeesh. The implications on work are nutty. What's new and how will it impact you?…
  continue reading
 
OpenTofu is an open-source alternative to Terraform, designed for managing infrastructure as code. It enables users to define, provision, and manage their cloud and on-premises resources using a declarative configuration language. OpenTofu was created to ensure an open and community-driven approach to infrastructure tooling, and it emphasizes compa…
  continue reading
 
SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
  continue reading
 
What happens when.... AI agents are everywhere? To learn, we tapped into the insights from one of the leading voices in AI, Babak Hodjat, who's resume includes helping create the tech behind the original AI agents like Siri. So, how do enterprises prepare for a multi-agent environment? Tune in and find out. Newsletter: Sign up for our free daily ne…
  continue reading
 
Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
  continue reading
 
So many new Google AI updates at Google I/O, we had to do an encore. Google dropped dozens of new AI tools, features and modes inside their Gemini model and just about everywhere else. We already counted down the first half, so join us LIVE as we talk about the best of the best of hashtag #GoogleIO announcements. Newsletter: Sign up for our free da…
  continue reading
 
Python is the dominant language for AI and data science applications, but it lacks the performance and low-level control needed to fully leverage GPU hardware. As a result, developers often rely on NVIDIA’s CUDA framework, which adds complexity and fragments the development stack. Mojo is a new programming language designed to combine the simplicit…
  continue reading
 
New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive VIP memberships to withdraw the money. https://isc.sans.edu/diary/New%20Variant%20of%20Crypto%20Confidence%20Scam/31968 Malicious Chrome Extensions Malici…
  continue reading
 
Google just dropped like 3 years of AI updates on us in 3 hours. 🫨 Welp...... cool. What do we do, now? And how does this change how your business operates? Don't worry... we'll tackle it all. In 2 parts. Google I/O AI Updates: 15 new features and how they can grow your business Pt 1 of 2 -- An Everyday AI Chat with Jordan Wilson Newsletter: Sign u…
  continue reading
 
Today, we're joined by Sebastian Gehrmann, head of responsible AI in the Office of the CTO at Bloomberg, to discuss AI safety in retrieval-augmented generation (RAG) systems and generative AI in high-stakes domains like financial services. We explore how RAG, contrary to some expectations, can inadvertently degrade model safety. We cover examples o…
  continue reading
 
Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do offer lists of researchers and just added three new groups today https://isc.sans.edu/diary/Researchers%20Scanning%20the%20Intern…
  continue reading
 
Microsoft legit just dropped a book of AI updates at the Build Conference. We're going to go over the 5 most impactful AI-powered Microsoft Copilot updates and how they will change the future of work. Newsletter: Sign up for our free daily newsletter More on this Episode: Episode Page Join the discussion: Have a question? Join the convo here. Upcom…
  continue reading
 
PostgreSQL is an open-source database known for its robustness, extensibility, and compliance with SQL standards. Its ability to handle complex queries and maintain high data integrity has made it a top choice for both start-ups and large enterprises. Heikki Linnakangas is a leading developer for the PostgreSQL project, and he’s a co-founder at Neo…
  continue reading
 
RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960 RVTools compromise confirmed Robware.net, the site behind the popular tool RVTools now confirmed that it was compromi…
  continue reading
 
OpenAI made a coding splash. Anthropic is in legal trouble for .... using its own Claude tool? Google went full multimedia. And that's only the half of it. Don't spend hours a day trying to keep up with AI. That's what we do. Join us (most) Mondays as we bring you the AI News That Matters. Newsletter: Sign up for our free daily newsletter More on t…
  continue reading
 
xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
  continue reading
 
Think AI is hitting a wall? Nope. This is just the start. Actually, we're at the first chapter. Here's what that means, and how you can move your company ahead. Newsletter: Sign up for our free daily newsletter More on this Episode: Episode Page Join the discussion: Thoughts on this? Join the conversation Upcoming Episodes: Check out the upcoming E…
  continue reading
 
Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
  continue reading
 
Blink, and you’ve already missed like 7 AI updates. The large language models we use and rely on? They change out more than your undies. (No judgement here.) But real talk — businesses have made LLMs a cornerstone of their business operations, yet don’t follow the updates. Don’t worry shorties. We’ve got ya. In our first ever LLM Monthly roundup, w…
  continue reading
 
Cryptocurrency exchanges face unique security challenges that require specialized threat assessments and planning. Coinbase is a cryptocurrency exchange based in the United States. It was founded in 2012 and has evolved alongside cryptocurrency as a technology. Philip Martin is the Chief Security Officer at Coinbase. Prior to Coinbase, Philip built…
  continue reading
 
Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
  continue reading
 
AI is shaking up qualitative research: speeding things up, cleaning messy transcripts, and even identifying hidden patterns. Sounds amazing, right? Buuuuuuuut there’s a catch. When does AI go from helpful assistant to heavy-handed editor, scrubbing out the human insights qualitative research was built on? In this episode of Everyday AI, we're tackl…
  continue reading
 
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Felix Boulet fresh off his participation in Zero Day Quest. Felix talks about his unique journey from industrial maintenance to becoming a full-time vulnerability researcher, and how that background fuels his passion for hacking and bug bounty work. He explai…
  continue reading
 
Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.san…
  continue reading
 
Today, we're joined by Mahesh Sathiamoorthy, co-founder and CEO of Bespoke Labs, to discuss how reinforcement learning (RL) is reshaping the way we build custom agents on top of foundation models. Mahesh highlights the crucial role of data curation, evaluation, and error analysis in model performance, and explains why RL offers a more robust altern…
  continue reading
 
Agentic AI is equally as daunting as it is dynamic. So…… how do you not screw it up? After all, the more robust and complex agentic AI becomes, the more room there is for error. Luckily, we’ve got Dr. Maryam Ashoori to guide our agentic ways. Maryam is the Senior Director of Product Management of watsonx at IBM. She joined us at IBM Think 2025 to b…
  continue reading
 
The Model Context Protocol, or MCP, is a new open standard that connects AI assistants to arbitrary data sources and tools, such as codebases, APIs, and content repositories. Instead of building bespoke integrations for each system, developers can use MCP to establish secure, scalable connections between AI models and the data they need. By standar…
  continue reading
 
Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking d…
  continue reading
 
OpenAI is making moves to go public. Apple and Anthropic are teaming up for vibe coding. And Google is quietly continuing its dominance with a quiet update to the world's most powerful AI model. Once again, the big names are shaking up the AI space. Don't burn hours a day trying to keep up. Spend your Mondays with Everyday AI and our weekly 'AI New…
  continue reading
 
Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/ FBI Warns of End-of-life routers The FBI is tracking larger…
  continue reading
 
Still experimenting with AI? Cool. While you tinker with prompts and pilot projects, real businesses are stacking wins—and actual revenue. They’re not chasing shiny tools. They’re building unfair advantages. They’re automating what matters and scaling faster than their competition can. And no, it’s not just Big Tech. It’s manufacturers. Retailers. …
  continue reading
 
No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932 SAMSUNG magicINFO 9 Server Flaw Still exploitable The SAMSUNG magicINFO 9 Serv…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play