Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
Deception, influence, and social engineering in the world of cyber crime.
Become the best software developer you can be
S
Syntax - Tasty Web Development Treats


1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
Technical interviews about software topics.
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
What is DevOps? We will attempt to answer this and many more questions.
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
Malicious Life by Cybereason tells the unknown stories of the history of cybersecurity, with comments and reflections by real hackers, security experts, journalists, and politicians.
P
PodRocket - A web development podcast from LogRocket


PodRocket covers everything you need to know about frontend web development on a weekly basis. Join LogRocket cofounder Ben Edelstein, the LogRocket engineering team, and more, as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
A live podcast about front end web design and UX.
The CodeNewbie podcast was born from CodeNewbie, an organization which fosters a supportive, international community of people learning to code. Each season, host Saron Yitbarek delivers stories and interviews from people of diverse backgrounds and expertise about their coding journeys, as well as beginner friendly discussions about the tech you should know about.
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
T
The Changelog: Software Development, Open Source


1
The Changelog: Software Development, Open Source
Changelog Media
Conversations with the hackers, leaders, and innovators of the software world. Hosts Adam Stacoviak and Jerod Santo face their imposter syndrome so you don’t have to. Expect in-depth interviews with the best and brightest in software engineering, open source, and leadership. This is a polyglot podcast. All programming languages, platforms, and communities are welcome. Open source moves fast. Keep up.
Steve Gibson, the man who coined the term spyware and created the first anti-spyware program, creator of SpinRite and ShieldsUP, discusses the hot topics in security today with Leo Laporte. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
Developer Tea exists to help driven developers connect to their ultimate purpose and excel at their work so that they can positively impact the people they influence. With over 13 million downloads to date, Developer Tea is a short podcast hosted by Jonathan Cutrell (@jcutrell), co-founder of Spec and Director of Engineering at PBS. We hope you'll take the topics from this podcast and continue the conversation, either online or in person with your peers. Twitter: @developertea :: Email: deve ...
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)
Johannes B. Ullrich
Daily update on current cyber security threats
Level up your .NET skills with our weekly discussion of C# and other Microsoft technologies for developers.
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
A podcast about modern UI development on the web. Hosted by Sam Selikoff and Ryan Toronto.
The stories and people behind the code. Hear stories of software development from interesting people.
An interview show from your friends at Smashing Magazine. Drew McLellan talks to design and development experts about their work on the web, as well as catching you up with the latest news and articles at Smashing Magazine. Suitable for cats.
On The Bike Shed, hosts Chris Toomey & Steph Viccari discuss their development experience and challenges at thoughtbot with Ruby, Rails, JavaScript, and whatever else is drawing their attention, admiration, or ire this week.
A podcast by coders for coders about all aspects of life as a developer.
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
Modern Web is a podcast that explores next generation frameworks, standards, and techniques. Visit http://modern-web.org for more.
S
Software Engineering Radio - the podcast for professional software developers


1
Software Engineering Radio - the podcast for professional software developers
se-radio@computer.org
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
Narrators read our favorite written stories. You can listen to them anywhere, including on your smart speaker. Play for audio versions of WIRED's Security stories, featuring the latest on cybersecurity, hacking, privacy, national security, and keeping yourself safe online.
As hacking leaves the dark corners of the internet and makes its way into our daily lives, we set out to paint a picture of this curious (and occasionally criminal) world. Join us on Hacked, as Jordan Bloemen, communicator and storyteller, and Scott Francis Winder, technologist and computer security hobbyist, delve into a new story every episode.
Your weekly dose of privacy, digital security, and open source intelligence (OSINT) news and opinion.
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Ben Makuch talks every week to Motherboard reporters Lorenzo Franceschi-Bicchierai and Joseph Cox about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. See acast.com/privacy for privacy and opt-out information.
Three Rubyists having conversations and interviewing others about Ruby and web development.
Hosted by former covert CIA intelligence officer Andrew Bustamante, Everyday Espionage gives you practical, powerful spy skills you can use to get ahead in your everyday life.
Join our weekly discussion about how to build top end Angular applications and become an Angular expert.
H
HTML All The Things - Web Development, Web Design, Small Business


1
HTML All The Things - Web Development, Web Design, Small Business
Matt Lawrence and Mike Karan
The adventures of Matt Lawrence and Mike Karan through the world of web development, web design, and small business management. We‘ll be covering all the latest JavaScript news as well as JavaScript Frameworks like Vue, React, and Svelte. We‘ll stay on top of the industry so you don‘t have to.
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
A weekly podcast on cybersecurity and privacy from the cyberlaw practice at Steptoe and Johnson. Featuring Stewart Baker and Michael Vatis.
Formerly named CISO/Security Vendor Relationship Podcast. Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
Hackers Podcast
A podcast about security for developers, covering tools and best practices.
Agile Coaches' Corner shares practical concepts in an approachable way. It is for agile practitioners and business leaders seeking expert advice on improving the way they work to achieve their desired outcomes.
A podcast featuring panelists of engineers from Netflix, Twitch, & Atlassian talking over drinks about all things Front End development.
Things about Svelte. Sometimes weekly, sometimes not.
The Podcast for Professional Software Developers
Web development discussions and interviews from Peter Fisher. Covering JavaScript, Linux, Docker, PHP, Python, MYSQL, HTML and more Peter Fisher is a freelance web and mobile developer in Gloucestershire UK and the Host of the How To Code Well YouTube channel. If you have any feedback or wish to do a collaboration then please get in touch.
P
PodRocket - A web development podcast from LogRocket


1
Modern React with Paige Niedringhaus (Repeat)
50:00
50:00
Play later
Play later
Lists
Like
Liked
50:00
Originally published on February 8, 2022 We are taking some time off from production. We will be back with new episodes on July 6th. Paige Niedringhaus, Staff Software Engineer at Blues Wireless and author of the Modernizing React Apps course, joins us to talk about keeping your React application up to date, challenges React developers are experien…
S
Syntax - Tasty Web Development Treats


1
Supper Club × Developer Experience with Shawn Wang
53:31
53:31
Play later
Play later
Lists
Like
Liked
53:31
In this supper club episode of Syntax, Wes and Scott talk with Shawn Wang about his thoughts on developer experience, why DX is important, and the importance of learning in public. Hasura - Sponsor With Hasura, you can get a fully managed, production-ready GraphQL API as a service to help you build modern apps faster. You can get started for free i…
T
The Stack Overflow Podcast


1
Exploring the interesting and strange results from our 2022 Developer Survey
24:59
24:59
Play later
Play later
Lists
Like
Liked
24:59
Huge thanks to the more than 73,000 devs from 180 countries who spent 15 minutes each completing our 2022 Developer Survey. This year’s survey was longer than usual, since we wanted to ask about new topics as well as provide a historical throughline to understand how your responses have changed over the years. Among the takeaways from the survey: 2…
H
How To Code Well


1
163 - Why 10x developers are not paid any more
31:05
31:05
Play later
Play later
Lists
Like
Liked
31:05
Change log I'm currently running experiments with Kubernetes CornJobs I've done lots of under the hood security tweaks with howtocodewell.net I've started using Jira to manage spikes and delivery tickets for the deployment stage of howtocodewell.net I've added tickets for some upgrade work, Symfony 6, NPM 16 LTS, PHP 8.1 On Tuesday we progressed th…
Defining your audience is critical to a good meeting. If you haven't defined your audience... who is the meeting even for? 📮 Ask a Question If you enjoyed this episode and would like me to discuss a question that you have on the show, drop it over at: developertea.com. 📮 Join the Discord If you want to be a part of a supportive community of enginee…
Most development shops with multiple departments, software packages, or teams will gravitate towards having separate repositories for their various bits of code. If they have to share code, they stand up a server someone to serve up things like nuget and npm packages for whatever system happens to need them. This works great, as long as those separ…
Get back to basics with our first episode re-release. This week due to Mike being out sick and Matt being on vacation, the duo have decided to shine a spotlight on one of their most popular episodes that take us all back to the very basics of web development. Back to vanilla HTML, CSS, and JS - some of the most useful skills to have when making sma…
S
Software Engineering Radio - the podcast for professional software developers


1
Episode 518: Karl Wiegers on Software Engineering Lessons
1:05:05
1:05:05
Play later
Play later
Lists
Like
Liked
1:05:05
Karl Wiegers, Principal Consultant with Process Impact and author of 13 books, discusses specific software development practices that can help you make sure that you don't repeat the same problems he sees time and time again with every customer...By IEEE Computer Society
We’re experimenting with something new: a super-brief Monday edition of “The Changelog” to help start your week off right and keep you up with the fast-moving software world. If you like this, would listen to it, and want us to keep it going… let us know in the comments or by tweeting @changelog. If you’d rather we didn’t… also let us know! Discuss…
A
Adventures in Angular


1
NgRx with Google Developer Expert, Tomas Trajan - AiA 347
1:02:24
1:02:24
Play later
Play later
Lists
Like
Liked
1:02:24
Tomas Trajan, Google Developer Expert for Angular and Web technologies, joins the show today to discuss NgRx and best practices. They deliberate the main integrations for NgRx with Angular, various implementation strategies, and more. This is an exciting conversation you won’t want to miss! In this Episode… NgRx overview NgRx best practices NgRx an…
C
CodeNewbie


1
S20:E7 - What we can all learn from the experience of being a neurodivergent developer (Alex Karp)
42:13
42:13
Play later
Play later
Lists
Like
Liked
42:13
In this episode, about what we can all learn from the experience of being a neurodivergent developer, with Alex Karp, author of the new book Running Start: How to get a job in tech, keep that job, and thrive. Alex talks about some of the biggest misconceptions about autism, how putting effort into accessibility and inclusion helps everyone, and wha…
C
Cybersecurity Today


1
Cyber Security Today, June 17, 2022 - Ransomware could hit Microsoft 365 files, a warning to web developers and more.
4:07
4:07
Play later
Play later
Lists
Like
Liked
4:07
This episode reports on a way ransomware could hit Microsoft 365 files in SharePoint and OneDrive, and a warning to web developers using the Telerik UI platformBy ITWC
C
CyberWire Daily


1
Interpol scores against BEC, online fraud, and money laundering. Developments in C2C markets. Versioning vulnerability. Cyber war and cyber escalation.
28:37
28:37
Play later
Play later
Lists
Like
Liked
28:37
Interpol coordinates international enforcement action against scammers. A new version of IceXLoader is observed. Exploiting versioning limits to render files inaccessible. Reflections on the first large-scale hybrid war. Kelly Shortridge from Fastly on why behavioral science and economics matters for InfoSec. Patrick Orzechowski from DeepWatch on R…
T
The Privacy, Security, & OSINT Show


1
268-CCW Permits, UNREDACTED 003, & Linux Questions
42:44
42:44
Play later
Play later
Lists
Like
Liked
42:44
This week I discuss the California CCW leak, release the latest issue of UNREDACTED Magazine, and answer several listeners' Linux questions.Direct support for this podcast comes from our privacy services, online training, and new books for 2022: Extreme Privacy (4th Edition) and Open Source Intelligence Techniques (9th Edition). More details can be…
A
Agile Coaches' Corner


1
What is Technical Debt? with Michael Cooper
34:33
34:33
Play later
Play later
Lists
Like
Liked
34:33
This week, Dan Neumann is joined by Agile’s Thought Chief Architect, Michael Cooper to explore the topic of Technical Debt. In this episode, Dan and Mike share how Technical Debt has become a dirty term among technical and non-technical people, where it can be considered to be a waste of time and money. Mike is here to demystify Tech Debt and talk …
Build automation tools automate the process of building code, including steps such as compiling, packaging binary code, and running automated tests. Because of this, build automation tools are considered a key part of a continuous delivery pipeline. Build automation tools read build scripts to define how they should perform a build. Common build sc…
C
Cybersecurity Today


1
Cyber Security Today, July 1, 2022 - Carnival Cruise Line hit with US$5 million fine over data breaches, an FBI warning to HR departments over deepfake videos, and more
4:33
4:33
Play later
Play later
Lists
Like
Liked
4:33
This episode reports on why Carnival Cruise Line was fined over cyber inadequacies, an FBI warning to HR departments over deepfake video job applications, and moreBy ITWC
A new sophisticated malware is attacking SOHO routers New study shows over half of employees use prohibited apps Google battles bots, puts Workspace admins on alert Thanks to today’s episode sponsor, Optiv The modern enterprise needs a solution as unique as its business. Optiv’s Advanced Detection and Response (ADR) works with your organization to …
The story of some very incriminating letters and the mission to figure out where they came from. Like Hacked? Subscribe, spread the word, and visit https://www.patreon.com/hackedpodcast to show us some love. Learn more about your ad choices. Visit megaphone.fm/adchoicesBy Sticks & Stones
Case Study: Cobalt Strike Server Lives on After its Domain is Suspended https://isc.sans.edu/forums/diary/Case+Study+Cobalt+Strike+Server+Lives+on+After+Its+Domain+Is+Suspended/28804/ CVE-2022-28219: Unauthenticated XXE to RCE and Domain Compromise in ManageEngine ADAudit Plus https://www.horizon3.ai/red-team-blog-cve-2022-28219/ CWE Top 25 Update …
H
Hanselminutes with Scott Hanselman


1
Engineering Stack Overflow with Roberta Arcoverde
32:58
32:58
Play later
Play later
Lists
Like
Liked
32:58
By Scott Hanselman
C
CyberWire Daily


1
CISA Alert AA22-181A – #StopRansomware: MedusaLocker. [CISA Alert]
3:09
3:09
Play later
Play later
Lists
Like
Liked
3:09
CISA, the FBI, the Department of the Treasury, and the Financial Crimes Enforcement Network are releasing this alert to provide information on MedusaLocker ransomware. Observed as recently as May 2022, MedusaLocker actors predominantly rely on vulnerabilities in Remote Desktop Protocol to access victims’ networks. AA22-181A Alert, Technical Details…
C
CYBER


1
The Supreme Court Doesn't Care About What Americans Want
52:35
52:35
Play later
Play later
Lists
Like
Liked
52:35
On June 30, the U.S. Supreme Court issued a ruling that will have far reaching consequences about the power of the federal government to fight climate change. How did the landmark ruling even end up in front of the Justices, why did they decide to rule on it, and what will the consequences be for the environment and the country? On this episode of …
C
CyberWire Daily


1
Killnet hits Norwegian websites. Hacktivists tied to Russia's government. Looking ahead to new cyber phases of Russia's hybrid war. C2C market differentiation. Gennady Bukin, call your shoe store.
30:35
30:35
Play later
Play later
Lists
Like
Liked
30:35
Killnet hits Norwegian websites. Hacktivists are tied to Russia's government. Amunet as a case study in C2C market differentiation. C2C commodification extends to script kiddies. Andrea Little Limbago from Interos examines borderless data. Rick Howard speaks with Cody Chamberlain from NetSPI on Breach Communication. Roscosmos publishes locations of…
W
WIRED Security: News, Advice, and More


1
How to Use Microsoft Defender on All Your Devices
3:51
3:51
Play later
Play later
Lists
Like
Liked
3:51
If you use a mix of Apple, Android, and Windows gadgets, you're in luck: The security tool is now available to any Microsoft 365 subscriber.
A
Adventures in Angular


1
How to start a successful programming podcast - AiA 348
55:16
55:16
Play later
Play later
Lists
Like
Liked
55:16
Charles Max Wood is the master architect behind Top End Devs, which includes 11 unique podcast shows for DevOps. Today on the show, Subrat interviews Charles on how to launch, grow, and monetize a podcast show from scratch. He shares his process, the strategies to launch, various tools, sites, and apps, how to build an audience, and how to monetize…
Creating great creative tools is extremely difficult. There are thousands of paths a user could take, and every aspect of the user experience has to be carefully considered and optimized for performance. And when you try to add real-time collaboration on top of that, you can be sure that you’re left with almost no time to focus on the core user exp…
NATO to create rapid response cyber force FBI warns of deep fakes for remote work Ship controls identified as another major attack surface Thanks to today’s episode sponsor, Optiv The modern enterprise needs a solution as unique as its business. Optiv’s Advanced Detection and Response (ADR) works with your organization to comb through the D&R clutt…
Mutation testing has long been a proven method for driving software quality in a way unit testing can't. But it can be a long, expensive and computationally intensive process. Our podcasters explore effective strategies for mutation testing and how to establish when it's right for your projects.
H
Hacking Humans


1
The top 10 brand names most likely used in a phishing scheme.
44:09
44:09
Play later
Play later
Lists
Like
Liked
44:09
Omer Dembinsky, a Data Research Manager from Check Point Research, joins Dave to discuss their Brand Phishing Report for Q1 2022 and how DHL, Maersk, and AliExpress were all in the top 10 list. Joe and Dave have some listener follow up from the 200th episode discussing how many redirects are too many. Joe has two stories this week, the first on how…
Most technology companies rely on open source software projects. But open source software projects are often maintained by a group of people that is not affiliated with any particular company. When an open source project develops too much technical debt, it can become a tragedy of the commons. Who is responsible for maintaining these open source pr…
Its New Phone Day: Time to Migrate Your MFA https://isc.sans.edu/forums/diary/Its+New+Phone+Day+Time+to+migrate+your+MFA/28800/ Managing Human Risk Security Awareness Report https://go.sans.org/lp-wp-2022-sans-security-awareness-report Microsoft Azure Service Fabric Container Elevation of Privilege Vulnerability https://unit42.paloaltonetworks.com/…
C
CyberWire Daily


1
Article 5? It’s complicated. Influence ops for economic advantage. SOHO routers under attack. YTStealer described. RansomHouse hits AMD. A NetWalker affiliate cops a plea.
30:29
30:29
Play later
Play later
Lists
Like
Liked
30:29
NATO's response to Killnet's cyberattacks on Lithuania. Influence operations in the interest of national market share. SOHO routers are under attack. YTStealer is out and active in the wild. RansomHouse hits AMD. CISA releases six ICS security advisories. The most dangerous software weaknesses. Betsy Carmelite from Booz Allen Hamilton takes a look …
S
Software Engineering Radio


1
Episode 518: Karl Wiegers on Software Engineering Lessons
1:05:05
1:05:05
Play later
Play later
Lists
Like
Liked
1:05:05
Karl Wiegers, Principal Consultant with Process Impact and author of 13 books, discusses specific practices based on his 50 years’ experience in the software industry that can help and affect many software projects. Host Gavin Henry spoke with Wiegers about common problems in software development, including technical debt; staff scaling; iron trian…
Mike just signed up for a year of GitHub Copilot and Chris tries to understand why. Then we catch each other up on some recent surprises. Sponsored By: Linode: Receive a $100 60-day credit towards your new account. Promo Code: linode.com/coder Tailscale: Tailscale is the easiest way to create a peer-to-peer network with the power of Wireguard. Supp…
P
PodRocket - A web development podcast from LogRocket


1
The state of CSS in 2022 with Adam Argyle
49:03
49:03
Play later
Play later
Lists
Like
Liked
49:03
We welcome Adam Argyle back onto the pod as we discuss his latest talk from Google I/O 2022, “The State of CSS in 2022.” We talk browser compatibility, cascade layers, color, and so much more. Links https://www.linkedin.com/in/adamargyle/ https://twitter.com/argyleink https://github.com/argyleink https://nerdy.dev/ https://www.youtube.com/channel/U…
W
WIRED Security: News, Advice, and More


1
Google Warns of New Spyware Targeting iOS and Android Users
5:22
5:22
Play later
Play later
Lists
Like
Liked
5:22
The malware has been used to target people in Italy, Kazakhstan, and Syria, researchers at Google and Lookout have found.
#165: Viktor recently (sort of) attended KubeCon EU 2022 in Valencia, Spain. In this episode, we talk about everything that Viktor saw and experienced. We also attempt to answer the age old question, how was the conference food? YouTube channel: https://youtube.com/devopsparadox/ Books and Courses: Catalog, Patterns, And Blueprints https://www.devo…
In this episode of Syntax, Wes and Scott talk about their tips for better communication in email, Zoom calls, code reviews, or asking for help. Sentry - Sponsor If you want to know what’s happening with your code, track errors and monitor performance with Sentry. Sentry’s Application Monitoring platform helps developers see performance issues, fix …
C
Cybersecurity Today


1
Cyber Security Today, June 29, 2022 - A list of the most dangerous software weaknesses is updated, a warning to Kubernetes administrators, and more
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39
This episode reports on the updating of two important vulnerabilities list, a warning to Kubernetes administrators, a U.S. regulator punishes the current and former owners of a website for a data breach and SOHO routers being targetedBy ITWC
Stolen PII and deepfakes used to apply for tech jobs Russia fines foreign firms for data violations Premier League crypto sponsorships expose fans to big losses Thanks to today’s episode sponsor, Optiv The modern enterprise needs a solution as unique as its business. Optiv’s Advanced Detection and Response (ADR) works with your organization to comb…
S
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)


1
ISC StormCast for Wednesday, June 29th, 2022
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48
Possible Scans for HiByMusic Devices https://isc.sans.edu/forums/diary/Possible+Scans+for+HiByMusic+Devices/28796/ OpenSSL Heap Overflow https://guidovranken.com/2022/06/27/notes-on-openssl-remote-memory-corruption/ https://github.com/openssl/openssl/issues/18625#issuecomment-1165012549 ZuoRat MalwareHijacking Home Office Routers https://blog.lumen…
On this week’s show Patrick Gray and Adam Boileau discuss the week’s security news, including: Activists who are totally not Israeli military hackers make Iranian steel mills firebally Chinese APT crews use ransomware to muddy attribution Attackers are now ransoming cloud access Chinese APTs using building control systems for persistence and stealt…
S
Security Now (Audio)


Picture of the Week. Errata: Firefox's "Total Cookie Protection" 3rd Party FIDO2 Authenticators Germany's not buying the EU's proposal which subverts encryption The Conti Gang have finally pulled the last plug Log4J and Log4Shell is alive and well The '311' emergency number proposal 56 Insecure-By-Design Vulnerabilities "Long Story Short" Closing T…
C
CyberWire Daily


1
DDoS threat to Lithuania continues. Hacktivists hit Iranian steel mill. Bumblebee loader takes C2C markteshare. CISA adds Known Exploited Vulnerabilities. Music piracy. Where do spies go?
29:12
29:12
Play later
Play later
Lists
Like
Liked
29:12
Distributed denial-of-service attacks against Lithuania. Dark Crystal RAT described. Iranian steel mill suspends production due to cyberattack. Bumblebee rising. CISA adds to its Known Exploited Vulnerabilities Catalog. Music pirate sites brought down by US and Brazilian authorities. Joe Carrigan looks at Apple’s private access tokens. Mister Secur…
The Supreme Court has overturned Roe v. Wade, upsetting decades of precedent and ushering in a weird new world of conflicting laws and a lack of bodily autonomy for many women in the country. It’s a decision that will affect life in the U.S. in ways we’re only starting to comprehend. This week on Cyber we’re going to look at one small piece of all …
T
The Cyberlaw Podcast


1
The Cyberlaw Podcast: A Small Door and Too Many Fat Men: Congress’s Tech Agenda
53:35
53:35
Play later
Play later
Lists
Like
Liked
53:35
It’s that time again on the Congressional calendar. All the big, bipartisan tech initiatives that looked so good a few months ago are beginning to compete for time on the floor like fat men desperate to get through a small door. And tech lobbyists are doing their best to hinder the bills they hate while advancing those they like. We open the Cyberl…
We talk to Greg Brimble, Systems Engineer at Cloudflare, about his talk from this year’s Remix Conf, “Full Stack Fast: Data on the Edge.” He covers what the Edge is, how Cloudflare fits into Edge computing, and more. Links https://discord.gg/cloudflaredev https://twitter.com/gregbrimble What is Jamstack? Follow us. Get free stickers. Follow us on A…
S
Smashing Podcast


1
Is Sass still relevant? with Stephanie Eckles
32:51
32:51
Play later
Play later
Lists
Like
Liked
32:51
We ask if Sass is still relevant in 2022 and if it adds any value modern CSS workflows? Vitaly Friedman talks to expert Stephanie Eckles to find out.By Smashing Magazine
All frameworks have their quirks. As a framework matures some of the quirks go away but every framework seems to have one or two things that you have to work around. When writing demo or proof of concept code you may not run into these quirks. They only surface when you need to deploy your code in another environment. In this episode the panelists …