Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
Technical interviews about software topics.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
Hosted by former covert CIA intelligence officers Andrew Bustamante and Jihi Bustamante, the EverydaySpy Podcast gives you practical, powerful spy skills and insights you can use everyday. From parenthood fixes to career shortcuts, business hacks to geopolitical insights, this pod is for you if you are looking for frank, honest, and hilariously relatable truth from two real-world field operatives who have done and seen things they can't talk about (and will never forget).
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading
The State and Popular Culture
…
continue reading
1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
A podcast about web design and development.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
The official podcast of the freeCodeCamp.org open source community. Each week, freeCodeCamp founder Quincy Larson interviews developers, founders, and ambitious people in tech. Learn to math, programming, and computer science for free, and turbo-charge your developer career with our free open source curriculum: https://www.freecodecamp.org
…
continue reading
The Azure & DevOps Podcast is a show for developers and devops professionals shipping software using Microsoft technologies. Each show brings you hard-hitting interviews with industry experts innovating better methods and sharing success stories. Listen in to learn how to increase quality, ship quickly, and operate well. Hosted by Jeffrey Palermo and sponsored by Clear Measure, Inc.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A podcast about the design, development, and business of great software. Each week thoughtbot is joined by the people who build and nurture the products we love.
…
continue reading
TestGuild Automation Podcast (formally Test Talks) is a weekly podcast hosted by Joe Colantonio, which geeks out on all things software test automation. TestGuild Automation covers news found in the testing space, reviews books about automation, and speaks with some of the thought leaders in the test automation field. We’ll aim to interview some of today’s most successful and inspiring software engineers, and test automation thought leaders.
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Audio podcasts on software testing.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
The latest machine learning, A.I., and data career topics from across both academia and industry are brought to you by host Dr. Jon Krohn on the Super Data Science Podcast. As the quantity of data on our planet doubles every couple of years and with this trend set to continue for decades to come, there's an unprecedented opportunity for you to make a meaningful impact in your lifetime. In conversation with the biggest names in the data science industry, Jon cuts through hype to fuel that pro ...
…
continue reading
A place for elite leaders and teams.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
next generation web podcast
…
continue reading
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
…
continue reading
HashiCast is a podcast about the world of DevOps and cloud technology produced by HashiCorp, an IBM company.
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
1
Prometheus and Open-Source Observability with Eric Schabell
46:06
46:06
Play later
Play later
Lists
Like
Liked
46:06Modern cloud-native systems are highly dynamic and distributed, which makes it difficult to monitor cloud infrastructure using traditional tools designed for static environments. This has motivated the development and widespread adoption of dedicated observability platforms. Prometheus is an open-source observability tool designed for cloud-native …
…
continue reading
1
Google's new protocol has AI agents talkin' (News)
8:45
8:45
Play later
Play later
Lists
Like
Liked
8:45Google announces an open protocol for AI agent collaboration, Datastar is an Alpine.js / htmx love child, Matthias Endler documents things he finds common in the best programmers, turns out Linus Torvalds built Git in 10 days & Zev is a CLI that helps you remember (or discover) terminal commands using natural language. View the newsletter Join the …
…
continue reading
1
Turing Award Special: A Conversation with David Patterson
55:46
55:46
Play later
Play later
Lists
Like
Liked
55:46David A. Patterson is a pioneering computer scientist known for his contributions to computer architecture, particularly as a co-developer of Reduced Instruction Set Computing, or RISC, which revolutionized processor design. He has co-authored multiple books, including the highly influential Computer Architecture: A Quantitative Approach. David is …
…
continue reading
1
SE Radio 663: Tyler Flint on Managing External APIs
52:27
52:27
Play later
Play later
Lists
Like
Liked
52:27Tyler Flint, CEO of qpoint.io, joins host Robert Blumen for a conversation about managing external vendor dependencies, including several best practices for adoption. They start with a look at internal versus external services, including details such as the footprint of external services within a micro-services application, and difficulties organiz…
…
continue reading
1
#167 From drop-out to software architect with Jason Lengstorf
1:20:55
1:20:55
Play later
Play later
Lists
Like
Liked
1:20:55On this week's episode of the podcast, freeCodeCamp founder Quincy Larson interviews Jason Lengstorf. He learned to code out of necessity building websites for local emo bands. He dropped out of college but eventually worked as an engineer at IBM and has gone on to roles at many other companies doing everything from software architecture to managem…
…
continue reading
1
Cyber Security Alerts: Recent Breaches and EDR Software Vulnerabilities
14:01
14:01
Play later
Play later
Lists
Like
Liked
14:01In this episode of Cyber Security Today, host Jim Love covers several major cybersecurity incidents and vulnerabilities. Key stories include the compromise of Windows Defender and other Endpoint Detection and Response (EDR) systems, a data breach on X (formerly known as Twitter) exposing over 200 million user records, and a security flaw in several…
…
continue reading
1
Practicing Software Testing – Guest James Lyndsay
52:17
52:17
Play later
Play later
Lists
Like
Liked
52:17Show notes: Practicing Software Testing – Guest James LyndsayBy Testing Podcast
…
continue reading
Some U.S. banks pause electronic communications with the OCC following a major breach of the agency’s email system. Uncertainty spreads at CISA. China accuses three alleged U.S. operatives of conducting cyberattacks during February’s Asian Games. Microsoft Teams suffers filesharing issues. Fraudsters use ChatGPT to create fake passports. Car rental…
…
continue reading
Brent Jensen and Alan Page Show notes: Episode 219: Mailbag and Goodbye For NowBy Testing Podcast
…
continue reading
1
Advancing AppSec With AI With Akira Brand
34:52
34:52
Play later
Play later
Lists
Like
Liked
34:52Episode Summary In this episode of The Secure Developer, Danny Allan sits down with Akira Brand, AVP of Application Security at PRA Group, to explore the evolving landscape of application security and AI. Akira shares her unconventional journey from opera to cybersecurity, discusses why AppSec is fundamentally a customer service role and breaks dow…
…
continue reading
This week, we’re exploring the System Resource Usage Monitor (SRUM) – a powerful source of forensic data within Windows operating systems. First introduced...
…
continue reading
1
879: Serverless, Parallel, and AI-Assisted: The Future of Data Science is Here, with Zerve’s Dr. Greg Michaelson
1:07:14
1:07:14
Play later
Play later
Lists
Like
Liked
1:07:14Greg Michaelson speaks to Jon Krohn about the latest developments at Zerve, an operating system for developing and delivering data and AI products, including a revolutionary feature allowing users to run multiple parts of a program’s code at once and without extra costs. You’ll also hear why LLMs might spell trouble for SaaS companies, Greg’s ‘good…
…
continue reading
1
Welcome to Cybersecurity: Where Everything Is Made Up and the Points Don’t Matter
40:53
40:53
Play later
Play later
Lists
Like
Liked
40:53All links and images for this episode can be found on CISO Series. This week’s episode is hosted by me, David Spark, producer of CISO Series and Andy Ellis, partner, YL Ventures. Joining us is Mike D’Arezzo, executive director of infosec and GRC, Wellstar Health Systems. In this episode: The shift left myth Reconsidering CISO evaluations The power …
…
continue reading
Please enjoy this encore of Word Notes. A broad class of attack vectors, where an attacker supplies input to an applications command interpreter that results in unanticipated functionality. CyberWire Glossary link: https://thecyberwire.com/glossary/owasp-injection Audio reference link: “APPSEC Cali 2018 - Taking on the King: Killing Injection Vulne…
…
continue reading
1
Slopsquatting risks, Morocco leak, EC ups US-based staff security
8:11
8:11
Play later
Play later
Lists
Like
Liked
8:11AI code dependencies are a supply chain risk Morocco investigates social security leak European Commission increases security measures for US-bound staff Thanks to this week's episode sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it…
…
continue reading
1
The SECRET Message In Moby Dick's Final Chapter | Day 11
26:24
26:24
Play later
Play later
Lists
Like
Liked
26:24Find your Spy Superpower: https://yt.everydayspy.com/4j4CPAZ I just finished reading Moby Dick, by Herman Melville, and I’m shocked by how much the ending of this book moved me. SPOILER ALERT: I share the ending of Moby Dick in detail as I deliver my analysis of the lessons, insights, and relevancy shared in the final chapters. In many ways, finish…
…
continue reading
1
USDS insider says DOGE’s audits are like nothing she’s ever seen
25:25
25:25
Play later
Play later
Lists
Like
Liked
25:25DOGE says it’s rooting out waste, fraud, and abuse. But in her first media interview, one insider at the U.S. Digital Service says DOGE’s “audit” felt more like a purge. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading
1
A Conversation with Patrick Duffy from Material Security
26:47
26:47
Play later
Play later
Lists
Like
Liked
26:47➡ Secure what your business is made of with Martial Security: https://material.security/ In this episode, I speak with Patrick Duffy from Material Security about modern approaches to email and cloud workspace security—especially how to prevent and contain attacks across platforms like Google Workspace and Microsoft 365. We talk about: • Proactive S…
…
continue reading
Lunar Analytics specializes in AI-powered claim optimization and healthcare solutions. Connect with Richard on LinkedIn. Knowtex allows healthcare providers to automate clinical workflows with generative AI. Connect with Caroline on LinkedIn. Delve Deep Learning provides artificial intelligence solutions for public affairs. Connect with Jeff on Lin…
…
continue reading
1
SANS Stormcast Tuesday April 15th: xorsearch Update; Short Lived Certificates; New USB Malware
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35xorsearch Update Diedier updated his "xorsearch" tool. It is now a python script, not a compiled binary, and supports Yara signatures. With Yara support also comes support for regular expressions. https://isc.sans.edu/diary/xorsearch.py%3A%20Searching%20With%20Regexes/31854 Shorter Lived Certificates The CA/Brower Forum passed an update to reduce t…
…
continue reading
The Department of the Interior removes top cybersecurity and tech officials. The DOJ looks to block foreign adversaries from acquiring sensitive personal data of U.S. citizens. Microsoft issues emergency updates to fix an Active Directory bug. Hackers are installing stealth backdoors on FortiGate devices. Researchers warn of a rise in “Dangling DNS…
…
continue reading
1
How crucial will the MCP approach be for AI Agents? TWiT Ep 85
57:31
57:31
Play later
Play later
Lists
Like
Liked
57:31Show notes: How crucial will the MCP approach be for AI Agents? TWiT Ep 85By Testing Podcast
…
continue reading
1
Defensive Security Podcast Episode 303
1:01:33
1:01:33
Play later
Play later
Lists
Like
Liked
1:01:33Summary In this episode of the Defensive Security Podcast, hosts Jerry Bell and Andrew Kalat discuss various cybersecurity topics, including the rise of ransomware, the importance of backup strategies, and the implications of AI in phishing attacks. They discuss into the challenges of managing non-human identities and the need for effective communi…
…
continue reading
We’re all creators. Whether you’re a developer, product owner, scrum master, or agile coach, what you do matters. In fact, every action, every conversation, and every idea creates ripples of impact far beyond your immediate surroundings. Recently, two former students from different Forge cohorts met at an Agile conference. They shared a moment, sna…
…
continue reading
1
Episode 456: Will I look bad on the job market if I'm a crypto developer and struggling to go from management back to dev work
31:39
31:39
Play later
Play later
Lists
Like
Liked
31:39In this episode, Dave and Jamison answer these questions: Hey, I am a web developer getting bored of the regular development work. I am interested in finance and the monetary system and due to the overlap of finance and engineering I feel down the Bitcoin rabbit hole and even spiked interest in crypto like Solana and Sui. I am pretty sure most of c…
…
continue reading
Scott and Wes break down the Model Context Protocol (MCP), a new open standard that gives AI agents secure, tool-like access to your dev environment. They cover how it works, why it’s a big deal for AI coding workflows, and real-world use cases like GitHub, Sentry, and YouTube. Show Notes 00:00 Welcome to Syntax! 00:49 The lore of ICP. Wes MCP Shir…
…
continue reading
1
660: Teaching CSS, Conferences, and Masonry Updates
58:48
58:48
Play later
Play later
Lists
Like
Liked
58:48Show Description Follow up on thoughts about teaching CSS from scratch, questions about conferences to attend as well as a way to kickstart a conference idea, some Balatro thoughts, and our thoughts on the recent Grid vs Masonry debate. Listen on Website → Links The Homebrewery - NaturalCrit SmashingConf in-person Conferences 2025 — Friendly, inclu…
…
continue reading
1
.NET Aspire and Databases with Jerry Nixon - Episode 345
50:35
50:35
Play later
Play later
Lists
Like
Liked
50:35Jerry Nixon is a Principal Program Manager on the SQL Server team focused on the Data API builder. He’s also a fanatic for #CSharp, #StarTrek, and Etymology. He also serves as a professor at Colorado Christian University. Topics of Discussion: [3:34] Why Jerry describes his life as a pearl necklace. [5:15] Jerry recommends the book Never Eat Alone …
…
continue reading
1
Fortinet Exploits, Windows INET Folder, and AI Code Risks: Cyber Security Today for April 14
6:46
6:46
Play later
Play later
Lists
Like
Liked
6:46In this episode of Cybersecurity Today, host David Shipley discusses several pressing concerns in the cybersecurity landscape. Attackers have been exploiting Fortinet VPN devices to maintain access even after patches were applied; administrators are urged to upgrade and follow recovery guidance. Microsoft has created a new INET Pub folder through i…
…
continue reading
1
CISA cuts planned, Windows ‘inetpub’ warning, health lab breach
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28Major workforce cuts planned for CISA Microsoft warns Windows users not to delete ‘inetpub’ folder Data breach at testing lab affects 1.6 million people Thanks to this week's episode sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it …
…
continue reading
1
SANS Stormcast Monday April 14th: Langlow AI Attacks; Fortinet Attack Cleanup; MSFT Inetpub;
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248) After spotting individaul attempts to exploit the recent Langflow vulnerability late last weeks, we now see more systematic internet wide scans attempting to verify the vulnerability. https://isc.sans.edu/forums/diary/Exploit+Attempts+for+Recent+Langflow+AI+Vulnerability+CVE20253…
…
continue reading
1
Jennifer Walsmith: Pioneering and defining possible. [Cyber Solutions] [Career Notes]
9:24
9:24
Play later
Play later
Lists
Like
Liked
9:24Please enjoy this encore of Career Notes. Vice President for Cyber and Information Solutions within Mission Systems at Northrop Grumman, Jennifer Walsmith takes us on her pioneering career journey. Following in her father's footsteps at the National Security Agency, Jennifer began her career out of high school in computer systems analysis. Jennifer…
…
continue reading
1
AICAD: Artificial Intelligence Capabilities For Attack & Defense
42:52
42:52
Play later
Play later
Lists
Like
Liked
42:52AI is changing cybersecurity at a fundamental level—but how do we decide what to build, and when? In this episode, I outline a structured way to think about AI for security: from foundational ideas to a future-proof system that can scale with emerging threats. • Rethinking Human Workflows as Intelligence Pipelines By mapping tasks into visual workf…
…
continue reading
Richard Moot joins us to discuss Changelog helping Square launch a developer pod and the excitement around MCP (Model Context Protocol) servers. What might it foretell about the future of human/robot relations? Join the discussion Changelog++ members save 9 minutes on this episode because they made the ads disappear. Join today! Sponsors: Heroku – …
…
continue reading
This week, we are sharing an episode of our monthly show, Only Malware in the Building. We invite you to join Dave Bittner and cohost Selena Larson as they explore "The new malware on the block." Welcome in! You’ve entered, Only Malware in the Building. Join us each month to sip tea and solve mysteries about today’s most interesting threats. Your h…
…
continue reading
1
Insights from a Tech Leader: Interview with TD Bank's Chief Architect Licenia Rojas
42:56
42:56
Play later
Play later
Lists
Like
Liked
42:56In this captivating interview, host Jim Love sits down with Licenia Rojas, Senior Vice President and Chief Architect at TD Bank. They discuss Licenia's journey in the technology sector, the importance of mentorship, and the role of continuous learning in career development. The conversation also delves into evolving topics such as cybersecurity, AI…
…
continue reading
1
#168 From Accountant to Data Engineer with Alyson La
1:19:20
1:19:20
Play later
Play later
Lists
Like
Liked
1:19:20On this week's episode of the podcast, freeCodeCamp founder Quincy Larson interviews Alyson La. She taught herself how to code while working as an accountant at GitHub and was able to transition to a data scientist there, then ultimately a software engineer. After one of her kids got diagnosed with autism, she left her career for 3 years to be a fu…
…
continue reading
1
Week in Review: Fake ChatGPT passport, Apple appeals UK encryption, Oracle’s obsolete servers
22:36
22:36
Play later
Play later
Lists
Like
Liked
22:36Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Carla Sweeney, SVP, InfoSec, Red Ventures Thanks to our show sponsor, Nudge Security Are you struggling to secure your exploding SaaS footprint? With Nudge Security, you can discover all SaaS apps and accounts, manage access, ensure s…
…
continue reading
CISA braces for widespread staffing cuts. Russian hackers target a Western military mission in Ukraine. China acknowledges Volt Typhoon. The U.S. signs on to global spyware restrictions. A lab supporting Planned Parenthood confirms a data breach. Threat actors steal metadata from unsecured Amazon EC2 instances. A critical WordPress plugin vulnerabi…
…
continue reading
1
OpenAI Shuts Down Spammer | New RAT Threatens Windows | WordPress Bug Exploited
11:48
11:48
Play later
Play later
Lists
Like
Liked
11:48In this episode of Cybersecurity Today, host Jim Love covers the shutdown of a spammer exploiting OpenAI's GPT model, a cybersecurity breach at the US Office of the Comptroller of the Currency, and a new malware operation called 'Operation End Game' targeting major cybercrime networks. He also discusses the emergence of a destructive RAT on GitHub …
…
continue reading
1
Python Test – Python 3.14 won’t repeat with pytest-repeat
4:37
4:37
Play later
Play later
Lists
Like
Liked
4:37Show notes: Python Test – Python 3.14 won’t repeat with pytest-repeatBy Testing Podcast
…
continue reading
1
Episode 229: multi_transform? for_each_but_last?
34:12
34:12
Play later
Play later
Lists
Like
Liked
34:12In this episode, Conor and Ben chat about a yet to be named algorithm, potentially multi_transform or for_each_but_last. Link to Episode 229 on Website Discuss this episode, leave a comment, or ask a question (on GitHub) Socials ADSP: The Podcast: Twitter Conor Hoekstra: Twitter | BlueSky | Mastodon Ben Deane: Twitter | BlueSky Show Notes Date Gene…
…
continue reading
AI stacks, AGI, training neural networks, and AI authenticity: Jon Krohn rounds up his interviews from March with this episode of “In Case You Missed It”. In his favorite clips from the month, he speaks to Andriy Burkov (Episode 867), Natalie Monbiot (Episode 873), Richmond Alake (Episode 871) and Varun Godbole (Episode 869). Additional materials: …
…
continue reading
1
SANS Stormcast Friday April 11th: Network Infraxploit; Windows Hello Broken; Dell Update; Langflow Exploit
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34Network Infraxploit Our undergraduate intern, Matthew Gorman, wrote up a walk through of CVE-2018-0171, an older Cisco vulnerability, that is still actively being exploited. For example, VOLT TYPHOON recently exploited this problem. https://isc.sans.edu/diary/Network+Infraxploit+Guest+Diary/31844 Windows Update Issues / Windows 10 Update Microsoft …
…
continue reading
While the world is weighing in on where the ethical boundaries of AI should lie, Heather Mellquist Lehto has partnered with someone who has very definite views on AI’s use: the pope. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading
1
Krebs probed, Nissan Leaf hack, Typhoon tariff warning
8:27
8:27
Play later
Play later
Lists
Like
Liked
8:27President orders probe of former CISA Director Chris Krebs Nissan Leaf cars can be hacked for remote spying and physical takeover Infosec experts warn of China Typhoon retaliation against tariffs Thanks to our episode sponsor, Nudge Security Are you struggling to secure your exploding SaaS footprint? With Nudge Security, you can discover all SaaS a…
…
continue reading
Vectara is a platform-as-a-service that allows users to build AI assistants and agents. Get started with their docs. This interview was recorded at HumanX last month. They are gearing up for next year’s conference on April 6-9, 2026. Follow Amr on LinkedIn.By Ryan Donovan, Amr Awadallah
…
continue reading
1
The era of durable execution (Interview)
1:40:03
1:40:03
Play later
Play later
Lists
Like
Liked
1:40:03Stephan Ewen, Founder and CEO of Restate.dev joins the show to talk about the coming era of resilient apps, the meaning of and what it takes to achieve idempotency, this world of stateful durable execution functions, and when it makes sense to reach for this tech. Join the discussion Changelog++ members save 10 minutes on this episode because they …
…
continue reading
Jim’s server is getting hammered by AI scrapers and he’s big mad about it, why RCS doesn’t work on Android without Google apps, a complex Google account issue, and how Jim and Allan handle their WireGuard configs. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Network Offload and Socket Splicing (SO_SPLICE) in…
…
continue reading