Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Software Podcasts
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Technical interviews about software topics.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Expert analysis, insights and opinion on the national security challenges facing Australia and the Indo-Pacific. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Audio podcasts on software testing.
…
continue reading
…
continue reading
Defense in Depth promises clear talk on cybersecurity’s most controversial and confusing debates. Once a week we choose one controversial and popular cybersecurity debate and use the InfoSec community’s insights to lead our discussion.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Software developer at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
next generation web podcast
…
continue reading
The Laracasts snippet, each episode, offers a single thought on some aspect of web development.
…
continue reading
The State and Popular Culture
…
continue reading
A podcast about web design and development.
…
continue reading
Arrested DevOps is the podcast that helps you achieve understanding, develop good practices, and operate your team and organization for maximum DevOps awesomeness.
…
continue reading
A Podcast on Computer Security & Privacy for Non-Techies
…
continue reading
coffee => code
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Programming Throwdown educates Computer Scientists and Software Engineers on a cavalcade of programming and tech topics. Every show will cover a new programming language, so listeners will be able to speak intelligently about any programming language.
…
continue reading

1
SE Radio 689: Amey Desai on the Model Context Protocol
58:36
58:36
Play later
Play later
Lists
Like
Liked
58:36Amey Desai, the Chief Technology Officer at Nexla, speaks with host Sriram Panyam about the Model Context Protocol (MCP) and its role in enabling agentic AI systems. The conversation begins with the fundamental challenge that led to MCP's creation: the proliferation of "spaghetti code" and custom integrations as developers tried to connect LLMs to …
…
continue reading

1
Vite documentary companion pod (Interview)
1:12:22
1:12:22
Play later
Play later
Lists
Like
Liked
1:12:22Our friends at Cult.Repo launch their epic Vite documentary on October 9th, 2025! To celebrate, Jerod sat down with Evan You to discuss Vite’s adoption story, why he raised money to start VoidZero, how developer documentaries get made, open source sustainability, and more. Join the discussion Changelog++ members save 6 minutes on this episode becau…
…
continue reading

1
SED News: NVIDIA Bets on Intel, Meta’s Demo Crash, and Anthropic’s Explosive Growth
53:23
53:23
Play later
Play later
Lists
Like
Liked
53:23By Software Engineering Daily
…
continue reading

1
Story: Risk Rolls Downhill - The Software Bug That Sent People to Prison
54:58
54:58
Play later
Play later
Lists
Like
Liked
54:58What if a software bug drained your savings, ruined your reputation, and nobody believed it wasn’t your fault? Scott Darlington took over a village post office, hoping to give his family a steady life. But the software system kept showing cash shortfalls he couldn’t explain. Each time, the Post Office told him the numbers were right and made him pa…
…
continue reading

1
Building a Job-Hunting Portfolio for Software Development and Testing
23:18
23:18
Play later
Play later
Lists
Like
Liked
23:18Show notes: Building a Job-Hunting Portfolio for Software Development and TestingBy Testing Podcast
…
continue reading
Chinese hackers infiltrate a major U.S. law firm. The EU Commission President warns Russia is waging a hybrid war against Europe. Researchers say LoJax is the latest malware from Russia’s Fancy Bear. Salesforce refuses ransom demands. London Police arrest two teens over an alleged ransomware attack on a preschool. Microsoft tightens Windows 11 setu…
…
continue reading
Show notes: Test Code Migration not Test CasesBy Testing Podcast
…
continue reading

1
944: Is Coinbase Really Writing Half Their Code With AI?
49:06
49:06
Play later
Play later
Lists
Like
Liked
49:06Wes and Scott talk with Kyle Cesmat about how Coinbase is writing nearly half its code with AI—while keeping quality and security front and center. They dig into tools like Cursor and Claude Code, agent-driven workflows, code review challenges, and how AI is reshaping developer productivity without replacing developers. Show Notes 00:00 Welcome to …
…
continue reading

1
DOP 319: AI-Powered Infrastructure: Beyond Hype to Reality
36:32
36:32
Play later
Play later
Lists
Like
Liked
36:32#319: The AI infrastructure landscape is evolving rapidly, but the gap between marketing hype and practical reality remains significant. While vendors promise revolutionary changes with each new model release, the true challenge lies not in accessing more powerful AI tools, but in developing the organizational workflows and individual expertise nee…
…
continue reading

1
North Korean attackers steal crypto. Who's sending UK phones to China? Avnet confirms data breach
7:35
7:35
Play later
Play later
Lists
Like
Liked
7:35
…
continue reading
By Jim Love
…
continue reading

1
SANS Stormcast Wednesday, October 8th, 2025: FreePBX Exploits; Disrupting Teams Threats; Kibana and QT SVG Patches
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57By Dr. Johannes B. Ullrich
…
continue reading

1
SN 1046: Google's Developer Registration Decree - The End of Free Android Apps?
2:31:51
2:31:51
Play later
Play later
Lists
Like
Liked
2:31:51By TWiT
…
continue reading

1
Snake Oilers: Realm Security, Horizon3 and Persona
45:40
45:40
Play later
Play later
Lists
Like
Liked
45:40
…
continue reading

1
Critical GoAnywhere bug fuels ransomware wave.
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23By N2K Networks
…
continue reading
Testing Peers Show notes: Strategy: Test X QualityBy Testing Podcast
…
continue reading

1
Don’t Worry, We’ll Get to Solving Your Problem on Slide 87
36:41
36:41
Play later
Play later
Lists
Like
Liked
36:41
…
continue reading
By Jack Rhysider
…
continue reading
By Recorded Future News
…
continue reading
By N2K Networks
…
continue reading
By N2K Networks
…
continue reading

1
Unity vulnerability, Oracle zero-day patched, Discord user info exposed
8:31
8:31
Play later
Play later
Lists
Like
Liked
8:31
…
continue reading

1
Context is king for secure, AI-generated code
28:15
28:15
Play later
Play later
Lists
Like
Liked
28:15
…
continue reading

1
SANS Stormcast Tuesday, October 7th, 2025: More About Oracle; Redis Vulnerability; GoAnywhere Exploited
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33By Dr. Johannes B. Ullrich
…
continue reading
AI Browsers Turn Rogue, Discord Data Breach, and Surge in Palo Alto Scans In this episode of Cybersecurity Today, host David Shipley discusses several significant cybersecurity concerns. Firstly, researchers at Layer X have uncovered a flaw in the Perplexity Comet AI browser that allows malicious prompts to turn the browser into a data thief with j…
…
continue reading

1
Oracle zero-day serves up persistent access.
23:47
23:47
Play later
Play later
Lists
Like
Liked
23:47A critical zero-day in Oracle E-Business Suite is under active exploitation. ICE plans a major expansion of its social media surveillance operations. Discord confirms a third-party data breach. A critical vulnerability in the Unity game engine could allow arbitrary code execution. New variants of the XWorm remote access trojan spread through phishi…
…
continue reading
…
continue reading

1
Cut Weeks of Manual Test Design into Minutes Using GenAI with Joe Colantonio
17:25
17:25
Play later
Play later
Lists
Like
Liked
17:25By Testing Podcast
…
continue reading

1
Defensive Security Podcast Episode 324
1:19:57
1:19:57
Play later
Play later
Lists
Like
Liked
1:19:57Here are links to the stories we discuss this week: https://cloud.google.com/blog/topics/threat-intelligence/brickstorm-espionage-campaign https://thehackernews.com/2025/09/github-mandates-2fa-and-short-lived.html https://www.theregister.com/2025/09/23/gartner_ai_attack/ https://www.bleepingcomputer.com/news/security/sonicwall-releases-sma100-firmw…
…
continue reading

1
Episode 481: I'm bored and will I ever find out why I was fired?
29:03
29:03
Play later
Play later
Lists
Like
Liked
29:03
…
continue reading
There are literally billions of devices connected to the internet today – many of them cheap, insecure IoT devices… smart thermostats, doorbell cameras, webcams, cheap WiFi routers and other smart appliances. As we like to say, the “S” in “IoT” is for security. And when insecure devices are no longer supported, the security bugs will never be fixed…
…
continue reading

1
943: Modern React with Ricky Hanlon (React Core Dev)
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36Scott and Wes sit down with Ricky Hanlon from the React core team at Facebook to dive into the latest features and APIs shaping modern React development. From transitions and Suspense to fetching strategies and future directions, this episode breaks down what’s next for React and how developers can take advantage of it. Show Notes 00:00 Welcome to …
…
continue reading

1
Peter Ritchie: .NET Foundation - Episode 370
28:05
28:05
Play later
Play later
Lists
Like
Liked
28:05Peter Ritchie is a veteran software architect and consultant with over 35 years of experience in the tech industry. Peter is renowned for his deep expertise in .NET development, distributed systems, and agile methodologies. He’s an accomplished author of several technical books, a former Microsoft MVP, and a sought-after international speaker. Pete…
…
continue reading

1
685: Fix My Home Tech, What’s Up with Firefox, and the MVP Car
1:06:14
1:06:14
Play later
Play later
Lists
Like
Liked
1:06:14Show Description Who's the person to hire when your home network isn't working as reliably as it should? And while we're at it - can you also fix Dave's Find My notifications? What's the plan with Firefox in 2025? And Dave blogs (and mouth blogs) about his struggles with the MVP car. Listen on Website Links Why I hate the MVP car - daverupert.com T…
…
continue reading

1
ParkMobile breach settlement, UK schools vulnerable, Zimbra calendar attacks
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03ParkMobile 2021 data breach class action suit concludes UK government study suggests secondary schools larger target than businesses Zimbra Collaboration Suite flaw used in calendar attacks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. …
…
continue reading
Breaches of the Week; Welcoming CERN to HIBP; Latest Pilot Jobs and HomeRefill Data Breaches; Brainstorming the Breach Pipeline; Sponsored by Report URI https://www.troyhunt.com/weekly-update-472/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading

1
SANS Stormcast Monday, October 6th, 2025: Oracle 0-Day
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Oracle E-Business Suite 0-Day CVE-2025-61882 Last week, the Cl0p ransomware gang sent messages to many businesses stating that an Oracle E-Business Suite vulnerability was used to exfiltrate data. Initially, Oracle believed the root cause to be a vulnerability patched in June, but now Oracle released a patch for a new vulnerability. https://www.ora…
…
continue reading

1
Sloane Menkes: What is the 2%? [Consultant] [Career Notes]
10:11
10:11
Play later
Play later
Lists
Like
Liked
10:11Please enjoy this encore of Career Notes. Principal in PricewaterhouseCoopers Cyber Risk and Regulatory Practice, Sloane Menkes, shares her story of how non-linear math helped to shape her life and career. Sloane credits a high school classmate for inspiring her mantra "What is the 2%?" that she employs when she feels like things are shutting down.…
…
continue reading

1
2025 DataTribe Challenge: Forging the future of cyber. [Special Edition]
1:00:42
1:00:42
Play later
Play later
Lists
Like
Liked
1:00:42The DataTribe Challenge is a launchpad for elite cybersecurity and cyber-adjacent startups ready to break out. 2025 marks the 8th annual edition of the event with a change in venue and some exciting new updates. We take you on a journey from inception with Leo Scott, Managing Director and Chief Innovation Officer at DataTribe, and 3 past DataTribe …
…
continue reading

1
F82: 𝜑-calculus | Pet проекты | Распил | Социал-дарвинизм | UML | Apple vs. Google | Психологи
1:15:40
1:15:40
Play later
Play later
Lists
Like
Liked
1:15:40F82: 𝜑-calculus | Pet проекты | Распил | Социал-дарвинизм | UML | Apple vs. Google | Психологи by Yegor BugayenkoBy Yegor Bugayenko
…
continue reading

1
China’s stealthiest spy operation yet. [Research Saturday]
22:52
22:52
Play later
Play later
Lists
Like
Liked
22:52Assaf Dahan, Director of Threat Research, Cortex XDR, at Palo Alto Networks, discussing Phantom Taurus, a new China APT uncovered by Unit 42. Unit 42 researchers have identified Phantom Taurus, a newly designated Chinese state-aligned APT conducting long-term espionage against government and telecommunications organizations across Africa, the Middl…
…
continue reading

1
October Cybersecurity Month in Review: Insider Threats, AI's Role, and Cybercrime Trends
51:43
51:43
Play later
Play later
Lists
Like
Liked
51:43In this episode of 'Cybersecurity Today: Our Month in Review,' host Jim welcomes a panel including Tammy Harper from Flair, Laura Payne from White Tuque, and David Shipley, CEO of Beauceron Securities. The discussion kicks off with an overview of their plans for Cybersecurity Month, including reviving the MapleSEC show and the CIO of the Year award…
…
continue reading

1
Week in Review: Shutdown furloughs CISA, DoD risk framework, Oracle extortion problem
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Nick Espinosa, nationally syndicated host of The Deep Dive Radio Show, with guest Steve Zalewski, co-host, Defense in Depth Thanks to our show sponsor, Nudge Security Here’s the thing: your employees are signing up for new apps, sharing data, and connecting tool…
…
continue reading
A fast-spreading malware campaign is abusing WhatsApp as both lure and launchpad. Carmaker Renault suffers a data breach. DrayTek patches a critical router flaw. CISA alerts cover a range of vulnerabilities. A new phishing kit lowers the bar for convincing lures. A Catholic hospital network pays $7.6 million to settle data breach litigation. A majo…
…
continue reading
Let me tell you a story about the programming-induced anxiety that my former self once felt. If you are constantly online, you will have the impression that you are constantly falling behind. But...are you?By Jeffrey Way
…
continue reading

1
npm under siege (what to do about it) (Friends)
1:35:20
1:35:20
Play later
Play later
Lists
Like
Liked
1:35:20Over the past two months, we’ve seen some of the most serious supply chain attacks in npm history: phishing campaigns, maintainer account takeovers, and malware published to packages with billions of weekly downloads. What is going on?! What can we do about it? Our old friend, Feross Aboukhadijeh, joins us to help make sense of it all. Join the dis…
…
continue reading