Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
The world of application development moves quickly. New tools, new processes, and new threats are always popping up. Through enlightening interviews with industry leaders, From Code to the Cloud helps you stay on top of new developments in Low Code and Salesforce DevOps.
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
As more and more organizations continue to adopt low code as a standard practice for solution development, information technology professionals find themselves learning new skills, translating professional development skills into low code tools and implementing governance and service management strategies. Learn from Microsoft MVPs, Microsoft Product team members, and Microsoft Power Platform users how they approached building solutions using Microsoft Power Platform.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Code WACK! shines a light on our callous healthcare system and what we can do about it. It reveals the healthcare hassles that - far from being just annoying - threaten our peace of mind, our financial security and at times, our very lives. Join us each week as we chat about the challenges that patients and healthcare providers face, amplifying their voices and examining a range of possible solutions, including Medicare for All. Powered by HEAL California, a project of the California OneCare ...
…
continue reading
The Law of Code podcast focuses on the legal framework being built around blockchains, crypto, NFTs, and DAOs. We’ll look at crypto regulations, rights surrounding NFTs, as well as the legislation impacting blockchain. You’ll hear from the top lawyers, lawmakers, and entrepreneurs in the space – we’ll touch on best practices countries are implementing, new regulations, and share ideas on the best path forward.
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
…
continue reading

1
Relationship advice by The Relationship Code..
Brett and Marie Jones. International relationship experts and authors.
For Dynamic Couples and Songles Short , smart, incise strategies to boost your Relationship, Love, Family.
…
continue reading
Daily Security Review, the premier source for news and information on security threats, Ransomware and vulnerabilities
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Welcome to Beyond the Code, the podcast where we dive into the legal, regulatory, and ethical issues surrounding emerging technologies. Each week, we bring you in-depth conversations with industry experts, discussing the latest advancements in technology and their implications on society and the legal system. From artificial intelligence to blockchain, we'll be exploring all the hot topics in the field. Your host, Yitzy Hammer, a lawyer and tech enthusiast, is joined by a diverse group of ex ...
…
continue reading
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
…
continue reading
Join millions of listeners tuning into The Kim Komando Show, the award-winning weekly radio program airing on over 420 stations nationwide and available on-demand. Kim Komando, the trusted digital expert, brings you the latest cutting-edge gadgets, urgent tech news, and vital privacy tips to keep you secure online. Every hour, Kim engages with callers, tackling a wide array of digital life challenges. Don’t be left behind in the ever-evolving tech world. Listen just once and you'll be hooked ...
…
continue reading
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading
A weekly podcast about web design and development with a little zest from Amy Dutton and Brad Garropy
…
continue reading
We created Enginears as a place to share Engineering stories and to aid knowledge sharing and discovery into how companies build their products. Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
This podcast covers all things technology and engineering in Cyprus. The host, Andreas Lefkatis, talks with his guests about what’s trending in their field, innovative ways they’re using technology to make the island a prominent technology hub, and much more. Hopefully it inspires you to do the same! The episodes are available on all major podcast platforms and on our Youtube channel.
…
continue reading
DevOps was always meant to include security, but in reality, the cultures didn’t align—leaving many organizations without a mature DevSecOps strategy. So how do you complete the DevSecOps journey? Join Techstrong and Checkmarx for DevSecOps: Cracking the Code, a new webinar series packed with expert insights and actionable advice to help you successfully evolve from DevOps to DevSecOps.
…
continue reading
Code Patrol scrutinizes the month’s tech scene with code-colored glasses. Computer security industry veteran Lisa Vaas chats with guests about all things security — be it cybercrime, hacking, DevSecOps, and beyond — that collide with the code that runs the world.
…
continue reading
Join us for interesting conversations about technology and the business of IT.
…
continue reading

1
Bitunix Referral Code "d1c9qu" – Earn Up to 5500 USDT and 10% Off Fees
Bitunix Referral Code "d1c9qu" – Earn Up to 5500 USDT and 10% Off Fees
Unlock exclusive rewards when you use the Bitunix referral code "d1c9qu". By registering with this code, you can receive up to 5500 USDT in bonuses and enjoy a 10% discount on trading fees. Here’s how you can take advantage of these offers and start trading on Bitunix. How to Use the Bitunix Referral Code "d1c9qu" Sign Up: Visit the Bitunix website and create an account by providing your email address and setting a secure password. Enter the Referral Code: When prompted, enter "d1c9qu" to un ...
…
continue reading
### **Bitunix Referral Code ”d1c9qu” – Claim 5500 USDT Bonus and 10% Fee Discount** Bitunix referral code **”d1c9qu”** offers new users a powerful way to boost their trading experience right from the start. By using this code during registration, you can unlock **up to 5500 USDT in bonuses** and enjoy a **10% discount on all trading fees**. Bitunix is designed for traders who want a secure, efficient, and rewarding environment, making it a top choice for both beginners and professionals. ## ...
…
continue reading
Larry and Kerry talk about parenting issues during Covid-19 isolation period
…
continue reading
The Thinking Elixir podcast is a weekly show where we talk about the Elixir programming language and the community around it. We cover news and interview guests to learn more about projects and developments in the community. Whether you are already experienced with Elixir or just exploring the language, this show is created with you in mind. We discuss community news, Functional Programming, transitioning from OOP, coding conventions, and more. Guests visit the show to help challenge our ass ...
…
continue reading
Welcome to the Cyber Security Happy Hour Podcast. This podcast is dedicated to discussing a variety of topics in all things Cyber Security.. Each episode features our host Christie Ogubere This is Cyber Security podcast - do not forget to protect your data in transit by using our affiliate link for Nordvpn. GET NORDVPN: https://go.nordvpn.net/aff_c?offer_id=288&aff_id=41574&url_id=11219 USE COUPON CODE: intexcyber USE THE CODE SO YOU CAN GET 70% off 3-year plan + 1 month free Website: https: ...
…
continue reading
Discussing DX design and the unique challenges of building dev-facing products.
…
continue reading
Welcome to Behind the Binary, the podcast that introduces you to the fascinating people, technology, and tools driving the world of reverse engineering. Join your host, Josh Stroschein, a reverse engineer with the FLARE team at Google, and someone passionate about sharing knowledge and shedding light on the art of reverse engineering, as he sits down with intriguing guests to explore the human side of this profession. Behind the Binary goes beyond the code, sharing the stories, motivations, ...
…
continue reading
The podcast of foojay.io, a central resource for the Java community’s daily information needs, a place for friends of OpenJDK, and a community platform for the Java ecosystem — bringing together and helping Java professionals everywhere.
…
continue reading
A monthly podcast that draws perspectives from a variety of thought leaders on key themes influencing markets, industries and the global economy today.
…
continue reading
If you know how attacks work, you’ll know exactly where to look—whether you’re breaking in as an ethical hacker or defending as a blue teamer. Hacked & Secured: Pentest Exploits & Mitigations breaks down real-world pentest findings, exposing how vulnerabilities were discovered, exploited, and mitigated. Each episode dives into practical security lessons, covering attack chains and creative exploitation techniques used by ethical hackers. Whether you're a pentester, security engineer, develop ...
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Heavybit is the leading investor in developer-first startups that turn visions into movements, products into platforms, and contributors into communities. Since 2013, Heavybit companies have redefined how teams build, deploy, secure, and scale mission-critical technology. From JAMstack, to DevSecOps, to feature flagging, Heavybit founders build the future of software from the bottom up.
…
continue reading

1
Dustin Lehr - Code, Culture, and Community
1:04:44
1:04:44
Play later
Play later
Lists
Like
Liked
1:04:44Dustin Lehr joined Security Journey as Director of Application Security Advocacy. With nearly two decades of experience as a software engineer, application architect, and cybersecurity leader, Dustin has ample expertise in the industry. In this episode of The Security Champions Podcast, Dustin joined to explore the interconnected roles of secure co…
…
continue reading

1
Actively Exploited: Commvault Web Shells, Active! mail RCE, and Brocade Code Injection Now in KEV
17:21
17:21
Play later
Play later
Lists
Like
Liked
17:21Three actively exploited vulnerabilities—CVE-2025-42599 (Qualitia Active! mail), CVE-2025-3928 (Commvault Web Server), and CVE-2025-1976 (Broadcom Brocade Fabric OS)—have been added to CISA’s KEV catalog. The Qualitia flaw is a remote stack-based buffer overflow (CVSS 9.8) allowing code execution without authentication. Commvault's vulnerability pe…
…
continue reading

1
Ep. 8 – OTP Flaw & Remote Code Execution: When Small Flaws Go Critical
15:45
15:45
Play later
Play later
Lists
Like
Liked
15:45A broken logout flow let attackers hijack accounts using just a user ID. A self-XSS and an IDOR exposed stored data. And a forgotten internal tool—running outdated software—ended in full Remote Code Execution. This episode is all about how small bugs, missed checks, and overlooked services can lead to serious consequences. Chapters: 00:00 - INTRO 0…
…
continue reading

1
EP 122 From Marine to Mentor: The Jonathan Perillo Code
53:34
53:34
Play later
Play later
Lists
Like
Liked
53:34Send us a text Summary of Episode: 🎙️ Episode Summary: Jonathan Perillo on Purpose, Mentorship, and the Evolving Security Industry Introduction & Background Jonathan shares his journey from joining the U.S. Marines post-9/11 to building a career in private security. His early interest in the Coast Guard shifted to the Marines after meeting a recrui…
…
continue reading

1
Josh Schwartz on Building Secure DeFi Infrastructure with FORDeFI, at #BB25
15:39
15:39
Play later
Play later
Lists
Like
Liked
15:39On March 26, 2025, Collider. VC hosted Building Blocks 2025, as part of ETH TLV. Our host, Yitzy Hammer was invited to come and interview guests and speakers. Live from Building Blocks at Jaffa Port in Tel Aviv, Yitzy interviews Josh Schwartz, CEO and Co-Founder of FORDeFi, about bridging the gap between traditional finance and decentra…
…
continue reading

1
Progress and Gaps in Securing Salesforce Digital Experiences
29:51
29:51
Play later
Play later
Lists
Like
Liked
29:51Protecting Salesforce digital experiences is critical to delivering the seamless, secure services your customers expect. Join Justin Hazard, Principal Security Architect at AutoRABIT, and Matt Meyers, Salesforce Certified Technical Architect and CEO of Adaptus, as they dive into the challenges and strategies for safeguarding Salesforce digital expe…
…
continue reading

1
Autonomous ships, cyber security and the workboat code
19:06
19:06
Play later
Play later
Lists
Like
Liked
19:06In this conversation, Felix and Oli discuss the development of a hydrogen-powered uncrewed surface vessel (USV) and the associated cybersecurity challenges. They explore the importance of integrating cybersecurity measures from the outset, navigating regulatory frameworks like Workboat Code 3, and the ongoing challenges of ensuring compliance and s…
…
continue reading

1
Fortinet Exploits, Windows INET Folder, and AI Code Risks: Cyber Security Today for April 14
6:46
6:46
Play later
Play later
Lists
Like
Liked
6:46In this episode of Cybersecurity Today, host David Shipley discusses several pressing concerns in the cybersecurity landscape. Attackers have been exploiting Fortinet VPN devices to maintain access even after patches were applied; administrators are urged to upgrade and follow recovery guidance. Microsoft has created a new INET Pub folder through i…
…
continue reading

1
Episode 83: Managed Security (w/ Mihaela and Shawn)
25:11
25:11
Play later
Play later
Lists
Like
Liked
25:11In this episode of The Low Code Approach, we are joined by Mihaela Blendea and Shawn Nandi to dive into the transformative world of Managed Security for Microsoft Power Platform. Discover how this suite of advanced security features is revolutionizing the way organizations protect their data, manage access, and ensure compliance in an AI-driven era…
…
continue reading

1
OpenEoX and the Future of End-of-Life Standardization in IT
12:01
12:01
Play later
Play later
Lists
Like
Liked
12:01In this episode, we unpack the evolving landscape of Product Lifecycle Management (PLM) and why it's become a strategic cornerstone in modern IT environments. From conception to retirement, managing a product’s lifecycle is now about more than just operations—it's about security, compliance, innovation, and cost. We explore the critical milestones …
…
continue reading
Friday night celebration? Nah. We’ve got food delivery and streaming. You can thank Wi-Fi for that.By Kim Komando
…
continue reading
We discuss a schism years in the making — the infamous imageboard 4chan gets hacked by its own offshoot, Soyjak.party, in a breach that exposed moderator identities, source code, and shattered the myth of online anonymity. Then, we look at Cluely — an AI tool built by a suspended student to help users “cheat” on job interviews — and the viral campa…
…
continue reading

1
Cybersecurity News Roundup: Book Deals, Retail Attacks, Apple Spyware Alerts, and More
11:32
11:32
Play later
Play later
Lists
Like
Liked
11:32In this episode, host Jim Love discusses various cybersecurity topics including a book deal from CRC Press for those interested in cybersecurity, auditing, and leadership. Major cyber incidents involving two UK retailers, Co-op and Marks & Spencer's, are detailed, highlighting the challenges they face. Apple's notifications to users in 100 countrie…
…
continue reading

1
SANS Stormcast Friday, May 2nd: More Steganography; Malicious Python Packages GMail C2; BEC to Steal Rent Payments
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
…
continue reading
Someone asked Sarah that question at a grocery store. Minutes later, her debit card was gone.By Kim Komando
…
continue reading

1
Chasing that next BIG thing (Interview)
1:38:40
1:38:40
Play later
Play later
Lists
Like
Liked
1:38:40Drew Wilson is back! It’s been more than a decade since Adam and Drew have spoken and wow, Drew has been busy. He built Plasso and got acquired by GoDaddy. He built a bank called Letter which didn’t work out…and now he’s Head of Design at Clerk and back to chasing that next big thing. Join the discussion Changelog++ members save 6 minutes on this e…
…
continue reading

1
Generationship - Ep. #35, Wisdom with Brooke Hopkins of Coval
21:57
21:57
Play later
Play later
Lists
Like
Liked
21:57In episode 35 of Generationship, Rachel is joined by Brooke Hopkins to explore what it takes to make voice AI agents reliable, robust, and ready for real-world deployment. Drawing from her experience at Waymo and her current work at Coval, Brooke reveals how testing and evaluation are the key to staying ahead in a fast-moving AI landscape.…
…
continue reading

1
Posting deepfake nudes is now a federal crime
9:16
9:16
Play later
Play later
Lists
Like
Liked
9:16Finally, victims have protections. That doesn’t mean the internet will forget.By Kim Komando
…
continue reading

1
SANS Stormcast Thursday, May 1st: Sonicwall Attacks; Cached Windows RDP Credentials
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
…
continue reading
Weak signal? Grab some foil. This kitchen hack might actually boost your Wi-Fi.By Kim Komando
…
continue reading

1
LayerX Secures $45M Total to Battle Data Leaks, One Browser at a Time
24:46
24:46
Play later
Play later
Lists
Like
Liked
24:46LayerX just raised another $11 million — and it’s not to build another antivirus. With $45 million in total funding, the company is betting that your browser is the most vulnerable—and most overlooked—part of your cybersecurity stack. In this episode, we explore how LayerX turns everyday browsers like Chrome and Firefox into intelligent defense age…
…
continue reading

1
$10.5M to Fight AI-Phishing: The Rise of Pistachio’s Cybersecurity Training Platform
13:04
13:04
Play later
Play later
Lists
Like
Liked
13:04In this episode, we dive into the story of Pistachio, the Norwegian cybersecurity startup that just raised $7 million in new funding—bringing its total to $10.5 million. Pistachio isn’t building another firewall or antivirus tool; it’s targeting the weakest link in most security systems: people. With AI-powered phishing attacks becoming increasingl…
…
continue reading

1
Exploring Kadena's Groundbreaking Blockchain: Horizontal Scalability & Security with Randy Daal! | Enginears Podcast
33:14
33:14
Play later
Play later
Lists
Like
Liked
33:14If you're keen to share your story, please reach out to us! Guest: https://www.linkedin.com/in/randydaal/ https://www.kadena.io/careers/ Powered by Artifeks! https://www.linkedin.com/company/artifeksrecruitment https://www.artifeks.co.uk https://www.linkedin.com/in/agilerecruiter LinkedIn: https://www.linkedin.com/company/enginearsio Twitter: https…
…
continue reading

1
AirBorne: How a Zero-Click Bug Threatens Millions of Apple and Third-Party Devices
14:23
14:23
Play later
Play later
Lists
Like
Liked
14:23In this episode, we dive deep into AirBorne — a critical set of vulnerabilities in Apple’s AirPlay protocol and SDK, recently uncovered by security researchers at Oligo. These flaws enable zero-click, wormable remote code execution (RCE) attacks across iPhones, Macs, Apple TVs, CarPlay systems, and millions of third-party devices. Even more alarmin…
…
continue reading

1
o11ycast - Ep. #80, Augmented Coding with Kent Beck
39:52
39:52
Play later
Play later
Lists
Like
Liked
39:52In episode 80 of o11ycast, Ken Rimple and Jessica Kerr chat with Kent Beck about the emerging world of AI-assisted coding. Beck shares his experiences with "augmented coding," discussing the benefits, challenges, and the evolving relationship between developers and AI agents. They explore how these tools are changing software development practices …
…
continue reading
The MyPillow guy’s lawyer used AI to write court filings in the Dominion case. Big mistake.By Kim Komando
…
continue reading

1
E69 Dr. Shmuel Abramzon: Inside the Mind of Israel’s Chief Economist: Digital Assets, Regulation & the Road Ahead
42:55
42:55
Play later
Play later
Lists
Like
Liked
42:55In this wide-ranging conversation, Yitzy sits down with Dr. Shmuel Abramzon, Israel’s Chief Economist at the Ministry of Finance, to unpack his unique role at the intersection of policy, macroeconomics, and innovation. They dive into the evolution of digital assets in Israel, what it really means to “regulate” crypto, and the story behind the Minis…
…
continue reading

1
#44 How to Hack What No One Teaches ft. Noah Pack
33:17
33:17
Play later
Play later
Lists
Like
Liked
33:17In this episode of The Hacker’s Cache, I sit down with Noah Pack, an aerospace pentester with a ridiculous cert stack and an unconventional mindset. We talk about hacking obscure systems with no public tools or documentation, transitioning from SOC analyst to pentester, and why reading the manual might be your secret weapon. If you’ve ever wondered…
…
continue reading

1
Cybersecurity Incidents: Musk's Staffers, Canadian Power Utility Attack, and Massive Password Leak
8:43
8:43
Play later
Play later
Lists
Like
Liked
8:43In this episode of Cybersecurity Today, host Jim Love discusses several major cybersecurity events. Two members of Elon Musk's 'Department of Government Efficiency' reportedly gained access to classified US nuclear networks, though accounts were never activated. Nova Scotia Power faces a cyber attack affecting customer services but not critical inf…
…
continue reading

1
Mobile Platforms: The evolution of the smartphone and the Android vs iOS war | Mike Yerou & Michalis Mavris
33:33
33:33
Play later
Play later
Lists
Like
Liked
33:33In this episode, we delve into the fascinating world of mobile platforms 📱 with Mike Yerou and Michalis Mavris, founders of Pale Blue and part of the organizing team in GDG Cyprus. We explore Pale Blue services and products and the history of mobile phones, from Nokia and Sony dumbphones to early smartphones like Symbian and Blackberry. We discuss …
…
continue reading

1
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
…
continue reading

1
#145 - How Peer-to-Peer transactions are regulated differently online vs. in-person, with Tuongvy Le
38:08
38:08
Play later
Play later
Lists
Like
Liked
38:08f the law were truly “technology-neutral,” what would that look like in practice for a P2P securities transaction via smart contracts? In this episode, Jacob Robinson is joined by Tuongvy Le (@TuongvyLe12), who has served as General Counsel of Anchorage Digital, Partner and Head of Regulatory and Policy at Bain Capital Crypto, and Deputy GC and Com…
…
continue reading
Zero Trust is a security model based on default-deny policies and fine-grained access control governed by identity, authentication, and contextual signals. For RSAC 2025, John Kindervag, Chief Evangelist of Illumio and the creator of Zero Trust, talks about introducing a "protect surface" into legacy OT systems —isolating critical data, application…
…
continue reading
Hackers are using AI to create fake job candidates that look and sound real on Zoom. Try this pro trick to spot them.By Kim Komando
…
continue reading

1
The Silent Majority: Why 51% of Internet Traffic Is Now Bots
13:03
13:03
Play later
Play later
Lists
Like
Liked
13:03The bots have taken over—and they’re not just crawling your website. In this episode, we dig into the alarming reality that automated bots now generate over half of all internet traffic. Armed with artificial intelligence and cloaked in residential proxies, these bots are evolving beyond simple scripts into highly evasive, persistent threats target…
…
continue reading

1
Episode 85: We're Chatting Agents! (w/ Mark Smith)
30:57
30:57
Play later
Play later
Lists
Like
Liked
30:57In this episode, Ken, Sean, and Jocelyn sit down with industry expert Mark Smith, the NZ365 guy, to explore the current state of AI agents in the real world. They delve into the practical applications, challenges, and innovations surrounding AI agents, discussing how these intelligent systems are transforming various industries. From personal produ…
…
continue reading

1
The Case For Steward Ownership And Open Source With Melanie Rieback
44:11
44:11
Play later
Play later
Lists
Like
Liked
44:11Episode Summary Is the traditional Silicon Valley startup model harming the security industry? In this episode of The Secure Developer, Danny Allan talks with Melanie Rieback, founder of Radically Open Security, about shaking up the industry with nonprofit business models. Tuning in, you’ll learn about the inner workings of Radically Open Security …
…
continue reading

1
From 1,382 to 4 Million: What VeriSource Didn’t Know (or Say)
9:02
9:02
Play later
Play later
Lists
Like
Liked
9:02In this episode, we investigate the massive data breach at VeriSource Services, Inc. (VSI), a Houston-based HR outsourcing and employee benefits administrator. Initially reported as affecting fewer than 2,000 individuals, the breach has now ballooned to a confirmed 4 million affected people. We trace the timeline from the initial detection of suspi…
…
continue reading

1
Platform Builders - Ep. #5, Maxed out on AWS, Still Falling Over with Scott Mitchell
41:06
41:06
Play later
Play later
Lists
Like
Liked
41:06In episode 5 of Platform Builders, Christine Spang and Isaac Nassimi chat with Scott Mitchell, former CTO of Salesloft, about the challenges and triumphs of scaling a high-growth B2B SaaS company. Scott shares his experiences navigating hyper-growth, from tackling critical infrastructure bottlenecks to fostering a culture of adaptability. They also…
…
continue reading

1
251: SSH Vulnerability and Cookies are Changing
41:51
41:51
Play later
Play later
Lists
Like
Liked
41:51News includes a critical Unauthenticated Remote Code Execution vulnerability in Erlang/OTP SSH, José Valim teasing a new project, Oban Pro v1.6's impressive new "Cascade Mode" feature, Semaphore CI/CD platform being open-sourced as a primarily Elixir application, new sandboxing options for Elixir code with Dune and Mini Elixir, BeaconCMS developmen…
…
continue reading
Some moments are meant for respect, not your camera roll.By Kim Komando
…
continue reading

1
Secure Designs, UX Dragons, Vuln Dungeons - Jack Cable - ASW #328
44:08
44:08
Play later
Play later
Lists
Like
Liked
44:08In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
…
continue reading

1
SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
…
continue reading
Are you inbox zero? If not, here’s a simple way to get rid of all those junky emails.By Kim Komando
…
continue reading

1
Inside the DARPA AI Cyber Challenge: Securing Tomorrow’s Critical Infrastructure Through AI and Healthy Competition | An RSAC Conference 2025 Conversation with Andrew Carney | On Location Coverage with ...
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35During RSAC Conference 2025, Andrew Carney, Program Manager at DARPA, and (remotely via video) Dr. Kathleen Fisher, Professor at Tufts University and Program Manager for the AI Cyber Challenge (AIxCC), guide attendees through an immersive experience called Northbridge—a fictional city designed to showcase the critical role of AI in securing infrast…
…
continue reading
Zach Bellay tells us about the devil and the angel on his shoulders, Pete Koomen thinks today’s AI apps are like horseless carriages, Hyperwood is an open source system for crafting furniture from simple wooden slats, Scott Antipa agrees with YAGNI but adds YAGRI & Antony Henao debunks three common myths that get engineers stuck. View the newslette…
…
continue reading

1
Hard-Coded Havoc: The Fatal Flaws in Planet’s Network Devices
11:39
11:39
Play later
Play later
Lists
Like
Liked
11:39A wave of critical vulnerabilities in Planet Technology’s industrial switches and network management systems could let attackers hijack devices, steal data, and sabotage industrial networks—with no credentials required. In this urgent episode, we dissect: 🔓 The 5 worst flaws (CVSS 9.3+)—from hard-coded database passwords to pre-auth command injecti…
…
continue reading

1
Craft CMS Crisis: The 10.0-Rated RCE Flaw Every Developer Must Patch Now
14:51
14:51
Play later
Play later
Lists
Like
Liked
14:51A critical, actively exploited vulnerability (CVE-2025-32432) is wreaking havoc on Craft CMS—allowing attackers to execute arbitrary PHP code on unpatched servers with no authentication required. In this urgent episode, we break down: 💥 Why this flaw scores a perfect 10.0 CVSS—the highest severity rating possible. 🔍 How hackers are exploiting it: F…
…
continue reading