The State of Synth is a weekly live synthwave radio show on Nightride FM — part news, part music, and just a dash of ’80s cheese. Equal parts funny, surreal, and informative, it features exclusive interviews and tracks from some of synthwave’s most notable artists.
…
continue reading
The State Of Synth Podcasts
Black Room is a music program on the radio frequencies of Radio Icaro Rubicone FM 90.0 (IT Adriatic area). During the 60-minute program, the music selection of the radio hosts, Matteo Bosi and Luca D'Altri, leads the listeners into a niche music “underworld”, discovering all the "marginal sounds" that populate it. The sound you can enjoy varies from post-punk to new wave, from industrial to various shades of electro, from minimal synth to dark techno, from shoegaze to coldwave and darkwave. ...
…
continue reading
The Shadow Transmission presents two podcasts. Gloom Room is a broad look and exploration of underground music, including goth, industrial, ebm, new wave, and synth pop. Darkansaw is exploration of the same underground music, but with a focus on what is occurring in the state of Arkansas.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
1
S14E10 – The Doctor Will Synth You Now (w/ Dr. Jess Blaise Ward)
2:04:15
2:04:15
Play later
Play later
Lists
Like
Liked
2:04:15This week on The State of Synth, Groot and Neon Fawkes sit down with the one and only Dr. Jess Blaise Ward — yes, an actual doctor of synthwave. Music producer, author, and cultural researcher, Jess joins us to talk about her brand-new book, “Making Synthwave: How an Online Music Community Invented a Genre.”…
…
continue reading
1
Researching and Remediating RCEs via GitHub Actions - Bar Kaduri, Roi Nisimi - ASW #355
1:08:08
1:08:08
Play later
Play later
Lists
Like
Liked
1:08:08Pull requests are a core part of collaboration, whether in open or closed source. GitHub has documented some of the security consequences of misconfiguring how PRs can trigger actions. But what happens when repo owners don't read the docs? Bar Kaduri and Roi Nisimi walk through their experience in reading docs, finding vulns, demonstrating exploits…
…
continue reading
1
Episode 3: Black Room ■03■ 02.11.2025
1:01:48
1:01:48
Play later
Play later
Lists
Like
Liked
1:01:48BLACK ROOM RADIO Marginal sounds of the underworld ƎP1SØÐƐ ■03■ 02.11.2025 01:08 POTOCHKINE - Endorphine 03:12 CAUSTIC - Rhythm is a cancer 07:38 SIERRA VEINS - Desire 11:21 BLIPBLOP - Sista vilan 13:31 AUTUMNS - Your favorite cowboy 16:59 PAROLE E AZIONI - Guarda come balla 19:57 LEFT FOR PLEASURE - Burden 23:16 VIKOWSKI - Pollution 27:23 HØRD - F…
…
continue reading
1
S14E9 – Letting Our Hair Down w/ Anniee
1:50:04
1:50:04
Play later
Play later
Lists
Like
Liked
1:50:04Groot and Neon Fawkes sit down with Anniee to talk Night School, her musical The Heart (and the making-of doc), and what’s next. They also run through upcoming tour dates and spin a stack of fresh cuts from Phaserland, Jessy Mach, The Midnight, Atlas Neon, Battlejuice & Power Rob, and Miami Nights 1984.…
…
continue reading
1
Quantum Computing Isn't A Threat To Blockchains - Yet - Sandy Carielli, Martha Bennett - ASW #354
58:52
58:52
Play later
Play later
Lists
Like
Liked
58:52The post quantum encryption migration is going to be a challenge, but how much of a challenge? There are several reasons why it is different from every other protocol and cypher iteration in the past. Is today's hardware up to the task? Is it just swapping out a library, or is there more to it? What is the extent of software, systems, and architect…
…
continue reading
1
Reacting to Ransomware and Setting Secure Defaults - Rob Allen - ASW #353
1:03:39
1:03:39
Play later
Play later
Lists
Like
Liked
1:03:39Ransomware attacks typically don't care about memory safety and dependency scanning, they often target old, unpatched vulns and too often they succeed. Rob Allen shares some of the biggest cases he's seen, what they have in common, and what appsec teams could do better to help them. Too much software still requires custom configuration to make it m…
…
continue reading
1
Episode 2: Black Room ■02■ 19.10.2025
1:01:08
1:01:08
Play later
Play later
Lists
Like
Liked
1:01:08BLACK ROOM RADIO Marginal sounds of the underworld ƎP1SØÐƐ ■02■ 19.10.2025 01:40 SMFORMA - Wir machen angst (Statiqbloom remix) 06:39 VOIX IN THE DARK + MADURO - Heartbeat 10:09 YEARS OF DENIAL - AI lover 14:05 CORBEAU HANGS - Cold stairs 18:31 RUE OBERKAMPF - Solitude (Essenz master) 22:09 BLOOD WISTERIA - Nilfheim 25:58 NINE INCH NAILS - As alive…
…
continue reading
1
S14E8 – Three Layers of Bass w/ Neon Nox
2:06:16
2:06:16
Play later
Play later
Lists
Like
Liked
2:06:16Groot and Neon Fawkes were joined by Swedish outrun powerhouse Neon Nox to talk about his music, collaborations, and production techniques behind his high-octane sound — including his work on the Terrorbytes soundtrack. The episode featured premieres from Signal Void, Annie, and Von Kaiser, plus bangers from Droid Bishop, YOTA, and Megan McDuffee.…
…
continue reading
1
Inside the OWASP GenAI Security Project - Steve Wilson - ASW #352
1:07:32
1:07:32
Play later
Play later
Lists
Like
Liked
1:07:32Interest and participation in the OWASP GenAI Security Project has exploded over the last two years. Steve Wilson explains why it was important for the project to grow beyond just a Top Ten list and address more audiences than just developers. He also talks about how the growth of AI Agents influences the areas that appsec teams need to focus on. W…
…
continue reading
1
Finding Large Bounties with Large Language Models - Nico Waisman - ASW #351
53:52
53:52
Play later
Play later
Lists
Like
Liked
53:52
…
continue reading
BLACK ROOM RADIO Marginal sounds of the underworld ƎP1SØÐƐ ■01■ 05.10.2025 01:13 DIE TÖDIN - Ich bin schon tot 04:43 SYZYGYX - Sylph 09:38 BILL LEEB - Neoromotive (Sehr Geil one mix by Rhys Fulber) 14:55 MADURO - You are empty 19:08 CAMILLA SPARKSSS - Stormseeker 21:38 ASH CODE - Angel oscuro 25:45 PATRIARCHY - New way 30:19 VIOFLESH - Always 33:44…
…
continue reading
1
S14E7 – Getting Nostalgic For Nostalgia w/ Vehlinggo
2:17:34
2:17:34
Play later
Play later
Lists
Like
Liked
2:17:34Groot and Neon Fawkes were joined by Vehlinggo’s Aaron Vehling to talk about the blog’s origins, iconic interviews, and its impact on the synthwave scene. They also spun tracks from Let Em Riot plus some of Aaron’s own picks, including Electric Youth, Fawn, Foret de Vin, Kinga, Sébastien Tellier, and more.…
…
continue reading
1
Changing the Vuln Conversation from Volume to Remediation - Francesco Cipollone - ASW #350
1:14:32
1:14:32
Play later
Play later
Lists
Like
Liked
1:14:32Dealing with vulns tends to be a discussion about prioritization. After all, there a tons of CVEs and dependencies with known vulns. It's important to figure out how to present developers with useful vuln info that doesn't overwhelm them. Francesco Cipollone shares how to redirect that discussion to focus on remediation and how to incorporate LLMs …
…
continue reading
Groot and Fawkes were joined by VHS Dreams — one of the OGs of the synthwave scene — for a trip through his retro-electronic world, from Trans Am and retro EDM roots to cover albums, aesthetics, and action-figure brainstorms. Along the way they spun fresh cuts and premieres from Evanton, Pfeffermouse & Edictum & Turbo […]…
…
continue reading
1
Design Errors in Entra ID, Design Defenses in iOS, Design Difficulties in DeepSeek - ASW #349
58:43
58:43
Play later
Play later
Lists
Like
Liked
58:43In the news, Microsoft encounters a new cascade of avoidable errors with Entra ID, Apple improves iOS with hardware-backed memory safety, DeepSeek demonstrates the difficulty in reviewing models, curl reduces risk by eliminating code, preserving the context of code reviews, and more! Show Notes: https://securityweekly.com/asw-349…
…
continue reading
This week, Groot and Fawkes plug into the dark cybernetic world of DreamReaper — the Portland producer whose sound fuses heavy riffs, glitchy textures, and cinematic energy. They dive into his creative process, favorite tools of destruction, and how his music is shifting toward new frontiers, from collaborations to movie soundtracks. Along the way,…
…
continue reading
1
How OWASP's GenAI Security Project keeps up with the pace of AI/Agentic changes - Scott Clinton - ASW #348
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00This week, we chat with Scott Clinton, board member and co-chain of the OWASP GenAI Security Project. This project has become a massive organization within OWASP with hundreds of volunteers and thousands of contributors. This team has been cranking out new tools, reports and guidance for practitioners month after month for over a year now. We start…
…
continue reading
1
S14E4 – Pro Wrestling Energy w/ Immortal Girlfriend
1:52:57
1:52:57
Play later
Play later
Lists
Like
Liked
1:52:57Groot and Fawkes were joined by Immortal Girlfriend — the Dark Knights of Synth — for a deep dive into their cinematic sound, brotherly chemistry, and their journey from Milwaukee to major syncs in Wednesday, Good Girls, and NBA 2K22. They shared creative inspirations, stories from the road, and even what fuels a 2AM tour […]…
…
continue reading
1
Limitations and Liabilities of LLM Coding - Ted Shorter, Seemant Sehgal - ASW #347
1:17:09
1:17:09
Play later
Play later
Lists
Like
Liked
1:17:09Up first, the ASW news of the week. At Black Hat 2025, Doug White interviews Ted Shorter, CTO of Keyfactor, about the quantum revolution already knocking on cybersecurity's door. They discuss the terrifying reality of quantum computing's power to break RSA and ECC encryption—the very foundations of modern digital life. With 2030 set as the deadline…
…
continue reading
1
S14E3 – All Those Collabs w/ Pashang and Edictum
1:57:49
1:57:49
Play later
Play later
Lists
Like
Liked
1:57:49This week on The State of Synth, Groot and Neon Fawkes are joined by special guests Edictum (Austria) and Pashang (Korea) to talk about their global collaborations, upcoming releases, and the making of their concept album. Tune in for a boat load of exclusive premieres and fresh tracks from The Midnight, Droid Bishop, Futurecop!, and […]…
…
continue reading
1
AI, APIs, and the Next Cyber Battleground: Black Hat 2025 - Michael Callahan, Idan Plotnik, Josh Lemos, Chris Boehm - ASW #346
1:08:11
1:08:11
Play later
Play later
Lists
Like
Liked
1:08:11In this must-see BlackHat 2025 interview, Doug White sits down with Michael Callahan, CMO at Salt Security, for a high-stakes conversation about Agentic AI, Model Context Protocol (MCP) servers, and the massive API security risks reshaping the cyber landscape. Broadcast live from the CyberRisk TV studio at Mandalay Bay, Las Vegas, the discussion pu…
…
continue reading
1
Episode 16: Black Room ►SUMMER 03◄ 31.08.2025
1:01:36
1:01:36
Play later
Play later
Lists
Like
Liked
1:01:36BLACK ROOM RADIO Marginal sounds of the underworld ►SUMMER 03◄ 31.08.2025 00:40 ATTIC FROST - How will the world end today? 04:48 HUMAN TETRIS - Home 09:07 COLD COLORS / XIU - Another day 13:30 DEFENSA ESLAVA - Alegria en los desprecios 17:03 MANTAROCHEN - Steamy nights 19:18 INGRESO CADÁVER - De miseria y soledad 24:08 SHOCKED VOLK - War 26:46 EDD…
…
continue reading
1
S14E2 – Hitting the Invisible Cowbell w/ DRUMxWAVE
2:02:10
2:02:10
Play later
Play later
Lists
Like
Liked
2:02:10Groot and Neon Fawkes welcome Timecop1983 tour drummer and multi-talented artist Jay, aka DRUMxWAVE, to the show. They chat about his new project, DRUMxWAVE, and his experiences working with artists such as Timecop1983, The Bad Dreamers, Arena, Chroma Cloud, and Ollie Wride.By The State of Synth
…
continue reading
1
Translating Security Regulations into Secure Projects - Emily Fox, Roman Zhukov - ASW #345
1:13:31
1:13:31
Play later
Play later
Lists
Like
Liked
1:13:31The EU Cyber Resilience Act joins the long list of regulations intended to improve the security of software delivered to users. Emily Fox and Roman Zhukov share their experience education regulators on open source software and educating open source projects on security. They talk about creating a baseline for security that addresses technical items…
…
continue reading
1
Managing the Minimization of a Container Attack Surface - Neil Carpenter - ASW #344
1:08:17
1:08:17
Play later
Play later
Lists
Like
Liked
1:08:17A smaller attack surface should lead to a smaller list of CVEs to track, which in turn should lead to a smaller set of vulns that you should care about. But in practice, keeping something like a container image small has a lot of challenges in terms of what should be considered minimal. Neil Carpenter shares advice and anecdotes on what it takes to…
…
continue reading
1
S14E1 – Monster Battles w/ Power Rob
2:11:15
2:11:15
Play later
Play later
Lists
Like
Liked
2:11:15Fawkes and Groot power up the season premiere with Neotropolis veteran and vocal powerhouse Power Rob — talking Dark Star, touring, and the secrets to ultimate Dragon Ball Z victory.By The State of Synth
…
continue reading
1
The Future of Supply Chain Security - Janet Worthington - ASW #343
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13Open source software is a massive contribution that provides everything from foundational frameworks to tiny single-purpose libraries. We walk through the dimensions of trust and provenance in the software supply chain with Janet Worthington. And we discuss how even with new code generated by LLMs and new terms like slopsquatting, a lot of the most…
…
continue reading
1
Uniting software development and application security - Jonathan Schneider, Will Vandevanter - ASW #342
58:07
58:07
Play later
Play later
Lists
Like
Liked
58:07Maintaining code is a lot more than keeping dependencies up to date. It involved everything from keeping old code running to changing frameworks to even changing implementation languages. Jonathan Schneider talks about the engineering considerations of refactoring and rewriting code, why code maintenance is important to appsec, and how to build con…
…
continue reading
1
Episode 15: Black Room ►SUMMER 02◄ 03.08.2025
59:41
59:41
Play later
Play later
Lists
Like
Liked
59:41BLACK ROOM RADIO Marginal sounds of the underworld ►SUMMER 02◄ 03.08.2025 00:16 SAD MADONA - Crimes 03:20 KRIMEA - This pleasure 07:06 DINA SUMMER - Hypnotized (Etane remix) 10:10 LARSOVITCH + DRAMACHINE - Vios / Mania 13:52 ALEX ROSSI - L’amore fa volare 17:00 LUMINANCE - Trop fragile 21:05 STAATSEINDE - Suicide tuesday 24:30 BLIND DELON - La viol…
…
continue reading
1
How Product-Led Security Leads to Paved Roads - Julia Knecht - ASW #341
1:04:11
1:04:11
Play later
Play later
Lists
Like
Liked
1:04:11A successful strategy in appsec is to build platforms with defaults and designs that ease the burden of security choices for developers. But there's an important difference between expecting (or requiring!) developers to use a platform and building a platform that developers embrace. Julia Knecht shares her experience in building platforms with an …
…
continue reading
1
Rise of Compromised LLMs - Sohrob Kazerounian - ASW #340
1:06:35
1:06:35
Play later
Play later
Lists
Like
Liked
1:06:35AI is more than LLMs. Machine learning algorithms have been part of infosec solutions for a long time. For appsec practitioners, a key concern is always going to be how to evaluate the security of software or a system. In some cases, it doesn't matter if a human or an LLM generated code -- the code needs to be reviewed for common flaws and design p…
…
continue reading
1
Getting Started with Security Basics on the Way to Finding a Specialization - ASW #339
1:07:50
1:07:50
Play later
Play later
Lists
Like
Liked
1:07:50What are some appsec basics? There's no monolithic appsec role. Broadly speaking, appsec tends to branch into engineering or compliance paths, each with different areas of focus despite having shared vocabularies and the (hopefully!) shared goal of protecting software, data, and users. The better question is, "What do you want to secure?" We discus…
…
continue reading
1
Checking in on the State of Appsec in 2025 - Sandy Carielli, Janet Worthington - ASW #338
1:07:15
1:07:15
Play later
Play later
Lists
Like
Liked
1:07:15Appsec still deals with ancient vulns like SQL injection and XSS. And now LLMs are generating code along side humans. Sandy Carielli and Janet Worthington join us once again to discuss what all this new code means for appsec practices. On a positive note, the prevalence of those ancient vulns seems to be diminishing, but the rising use of LLMs is e…
…
continue reading
1
Simple Patterns for Complex Secure Code Reviews - Louis Nyffenegger - ASW #337
38:26
38:26
Play later
Play later
Lists
Like
Liked
38:26Manual secure code reviews can be tedious and time intensive if you're just going through checklists. There's plenty of room for linters and compilers and all the grep-like tools to find flaws. Louis Nyffenegger describes the steps of a successful code review process. It's a process that starts with understanding code, which can even benefit from a…
…
continue reading
1
Episode 14: Black Room ►SUMMER 01◄ 29.06.2025
1:00:16
1:00:16
Play later
Play later
Lists
Like
Liked
1:00:16BLACK ROOM RADIO Marginal sounds of the underworld ►SUMMER 01◄ 29.06.2025 00:33 STAATSEINDE - Tanzverbot 04:30 DIE SEXUAL - Magic never dies 09:20 MY OWN BURIAL - Complain 12:39 DRKLV - Technoir 15:08 CORBEAU HANGS - Ill intents 19:10 BLYSKI - Reflektor 22:24 16VOLT - White noise 25:55 COMBICHRIST - Desolation 30:56 SARCOMA - Psicofiera 33:11 WILLI…
…
continue reading
1
How Fuzzing Barcodes Raises the Bar for Secure Code - Artur Cygan - ASW #336
1:01:18
1:01:18
Play later
Play later
Lists
Like
Liked
1:01:18Fuzzing has been one of the most successful ways to improve software quality. And it demonstrates how improving software quality improves security. Artur Cygan shares his experience in building and applying fuzzers to barcode scanners, smart contracts, and just about any code you can imagine. We go through the useful relationship between unit tests…
…
continue reading
1
S13E15 – The Valkyrie Collective (Season Finale)
3:13:10
3:13:10
Play later
Play later
Lists
Like
Liked
3:13:10Dennis and Jules wrap up the season with an epic chat featuring OG Synthwave and French Touch legends Nightstop and Maethelvin—plus some killer tunes and a few herp-a-derps for good measure. Thanks for listening! See you in September!By The State of Synth
…
continue reading
1
Threat Modeling With Good Questions and Without Checklists - Farshad Abasi - ASW #335
1:08:00
1:08:00
Play later
Play later
Lists
Like
Liked
1:08:00What makes a threat modeling process effective? Do you need a long list of threat actors? Do you need a long list of terms? What about a short list like STRIDE? Has an effective process ever come out of a list? Farshad Abasi joins our discussion as we explain why the answer to most of those questions is No and describe the kinds of approaches that …
…
continue reading
1
Bringing CISA's Secure by Design Principles to OT Systems - Matthew Rogers - ASW #334
1:09:09
1:09:09
Play later
Play later
Lists
Like
Liked
1:09:09CISA has been championing Secure by Design principles. Many of the principles are universal, like adopting MFA and having opinionated defaults that reduce the need for hardening guides. Matthew Rogers talks about how the approach to Secure by Design has to be tailored for Operational Technology (OT) systems. These systems have strict requirements o…
…
continue reading