Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime.
…
continue reading
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a software developer and how the art and practice of programming is changing our world. From Rails to React, from Java to Node.js, join the Stack home team for conversations with fascinating guests to help you understand how technology is made and where it’s headed.
…
continue reading
A weekly talk show taking a pragmatic look at the art and business of Software Development and the world of technology.
…
continue reading
Deception, influence, and social engineering in the world of cyber crime.
…
continue reading
Technical interviews about software topics.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
The podcast that tells true stories about the people making and breaking our digital world. We take listeners into the world of cyber and intelligence without all the techie jargon. Every Tuesday and Friday, former NPR investigations correspondent Dina Temple-Raston and the team draw back the curtain on ransomware attacks, mysterious hackers, and the people who are trying to stop them.
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
It takes more than great code to be a great engineer. Soft Skills Engineering is a weekly advice podcast for software developers about the non-technical stuff that goes into being a great software developer.
…
continue reading
Updates on the latest cybersecurity threats to businesses, data breach disclosures, and how you can secure your firm in an increasingly risky time.
…
continue reading
What is DevOps? We will attempt to answer this and many more questions.
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Risky Business is a weekly information security podcast featuring news and in-depth interviews with industry luminaries. Launched in February 2007, Risky Business is a must-listen digest for information security pros. With a running time of approximately 50-60 minutes, Risky Business is pacy; a security podcast without the waffle.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
.NET Rocks! is an Internet Audio Talk Show for Microsoft .NET Developers.
…
continue reading
The Thoughtworks podcast plunges deep into the latest tech topics that have captured our imagination. Join our panel of senior technologists to explore the most important trends in tech today, get frontline insights into our work developing cutting-edge tech and hear more about how today’s tech megatrends will impact you.
…
continue reading
Hanselminutes is Fresh Air for Developers. A weekly commute-time podcast that promotes fresh technology and fresh voices. Talk and Tech for Developers, Life-long Learners, and Technologists.
…
continue reading
2.5 Admins is a podcast featuring two sysadmins called Allan Jude and Jim Salter, and a producer/editor who can just about configure a Samba share called Joe Ressington. Every two weeks we get together, talk about recent tech news, and answer some of your admin-related questions.
…
continue reading

1
Defensive Security Podcast - Malware, Hacking, Cyber Security & Infosec
Jerry Bell and Andrew Kalat
Defensive Security is a weekly information security podcast which reviews recent high profile cyber security breaches, data breaches, malware infections and intrusions to identify lessons that we can learn and apply to the organizations we protect.
…
continue reading
Unsupervised Learning is about ideas and trends in Cybersecurity, National Security, AI, Technology, and Culture—and how best to upgrade ourselves to be ready for what's coming.
…
continue reading
This is the audio podcast version of Troy Hunt's weekly update video published here: https://www.troyhunt.com/tag/weekly-update/
…
continue reading
No-frills discussions between Bruce Eckel and James Ward about programming, what it is, and what it should be. Buy the Happy Path Programming t-shirt: https://happy-path.printify.me/products
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
The State and Popular Culture
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
The Algorithms + Data Structures = Programs Podcast (aka ADSP: The Podcast) is a programming podcast hosted by two NVIDIA software engineers that focuses on the C++ and Rust programming languages. Topics discussed include algorithms, data structures, programming languages, latest news in tech and more. The podcast was initially inspired by Magic Read Along. Feel free to follow us on Twitter at @adspthepodcast.
…
continue reading
The stories and people behind the code. Hear stories of software development from interesting people.
…
continue reading
A podcast about web design and development.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Join us for thought provoking conversations on surveillance, digital privacy, and cybersecurity law and policy in the information age. Each week, hosts Dave Bittner and Ben Yelin break down the headlines, legal cases, and policy battles that matter most.
…
continue reading
Technical interviews about software topics.
…
continue reading
Discussions, tips, and debates from security practitioners and vendors on how to work better together to improve security for themselves and everyone else.
…
continue reading
Do you feel like you're hitting a wall with your existing software projects? Are you curious to hear how other people are navigating this? You're not alone. On the Maintainable Software Podcast, Robby speaks with seasoned practitioners who have overcome the technical and cultural problems often associated with software development. Our guests will share stories in each episode and outline tangible, real-world approaches to software challenges. In turn, you'll uncover new ways of thinking abo ...
…
continue reading
Journalists Carole Cadwalladr and Peter Jukes – with the help of Conservative party whistleblower Sergei Cristo – expose an alleged secret spy ring operating at the very heart of the British political system. This is the untold story of the most audacious Russian influence operation in British history. It involves honey traps, Russian agents and information warfare. Russian wealth and glamour collide with a wild west of new digital landscapes. And as Sergei tries and fails to raise the alarm ...
…
continue reading
A twice-monthly podcast dedicated to all things relating to Security, Privacy, Compliance and Reliability on the Microsoft Cloud Platform. Hosted by Microsoft security experts, Michael Howard, Sarah Young, Gladys Rodriguez and Mark Simos. https://aka.ms/azsecpod ©2020-2025 Michael Howard, Sarah Young, Gladys Rodriquez, and Mark Simos.
…
continue reading
Exploring the observability side of software development.
…
continue reading
Joe and various hosts from the Late Night Linux Family answer your questions. The catch is we aren’t allowed to talk about Linux or open source. Episodes are released two weeks early on Patreon.
…
continue reading
next generation web podcast
…
continue reading
Lab Director at Huawei, founder of Zerocracy, author of Elegant Objects, creator of Zold
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
A romp through the field of computer programming, grapling with our history and wondering what should come next. A mix of deeply technical talk, philosophy, art, dark lore, and good takes. Hosted by Ivan Reese, Jimmy Miller, and Lu Wilson.
…
continue reading
Securing the future of DevOps and AI: real talk with industry leaders.
…
continue reading
Audio podcasts on software testing.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
It’s Kaizen 18! Can you believe it? We discuss the recent Fly.io outage, some little features we’ve added since our last Kaizen, our new video-first production, and of course, catch up on all things Pipely! Oh, and Gerhard surprises us (once again). BAM! Join the discussion Changelog++ members save 7 minutes on this episode because they made the ad…
…
continue reading

1
SE Radio 657: Hong Minhee on ActivityPub and the Fediverse
40:09
40:09
Play later
Play later
Lists
Like
Liked
40:09Hong Minhee, an open source developer and creator of the Fedify ActivityPub library, discusses the ActivityPub protocol and the fediverse with SE Radio's Jeremy Jung. They explore ActivityPub use cases, including microblogging applications such as Mastodon and Misskey, as well as activities built into the specification such as Like, Follow, and Acc…
…
continue reading
Browser security aims to protect users from cyber threats encountered online, such as phishing, malicious extensions, and malware. It’s a complex, multifaceted challenge that’s increasingly important as cloud-based tools, SaaS platforms, and collaborative applications become the backbone of modern workflows. Jeswin Mathai is the Chief Architect at …
…
continue reading

1
Episode 448: Title over salary and from figure skater to software developer
28:01
28:01
Play later
Play later
Lists
Like
Liked
28:01In this episode, Dave and Jamison answer these questions: A listener named Steven says, Long-time listener of the podcast here—it always brings me so much joy! Should I prioritize title over salary? I’m currently based in Europe, working as a Senior Engineer at a big company that pays really well. The problem is, there’s almost no chance for promot…
…
continue reading

1
Psychology of Software Teams with Dr. Cat Hicks
33:02
33:02
Play later
Play later
Lists
Like
Liked
33:02Dr. Cat Hicks is a psychologist studying software teams, a research leader, an empirical interventionist, and a creative entrepreneur. She is the VP of Research Insights for Pluralsight, where she founded the Developer Success Lab, an empirical research lab creating open science for developers and their teams. She talks to Scott about how software …
…
continue reading

1
Top 10 Software Testing Conferences with Joe Colantonio
19:24
19:24
Play later
Play later
Lists
Like
Liked
19:24Show notes: Top 10 Software Testing Conferences with Joe ColantonioBy Testing Podcast
…
continue reading

1
From Manual QA to Automation Engineer Using AI with Tal Barmeir and Sapnesh Naik
25:32
25:32
Play later
Play later
Lists
Like
Liked
25:32Show notes: From Manual QA to Automation Engineer Using AI with Tal Barmeir and Sapnesh NaikBy Testing Podcast
…
continue reading

1
Taree Reardon: A voice for women in cyber. [Career Notes]
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56Senior Threat Analyst and Shift Lead for VMware Taree Reardon shares her journey to becoming leader for women in the cybersecurity field. A big gamer who has always been interested in hacking and forensics, Taree found her passion while learning about cybersecurity. She's dedicated to diversity and inclusion and found her footing on a team made up …
…
continue reading
Double Digits! Featuring caller stories of sarcastic keyboard pranks, failed SEO birthday gifts, vending machine hijinks and more. Hacked is brought to you by Push Security—helping companies stop identity attacks before they happen. Phishing, credential stuffing, session hijacking—Push tackles it right where it starts: in the browser. Smart, seamle…
…
continue reading
23B Rows of Stealer Logs (and stuff); Apple Advanced Data Protect and the Brits; More Spyware Breaches; Zimi Senoa IoT Switches; Sponsored by Report URI https://www.troyhunt.com/weekly-update-440/ See omnystudio.com/listener for privacy information.By Troy Hunt
…
continue reading

1
ep172 Monthly Platform 202502 | mozaic.fm
2:45:32
2:45:32
Play later
Play later
Lists
Like
Liked
2:45:32第 172 回のテーマは 2025 年 2 月の Monthly Platform です。Show Note はこちら: https://mozaic.fm/episodes/172/monthly-platform-202502.htmlBy Jxck
…
continue reading

1
Caught in the contagious interview. [Research Saturday]
29:10
29:10
Play later
Play later
Lists
Like
Liked
29:10This week we are joined by Phil Stokes, threat researcher at SentinelOne's SentinelLabs, discussing their work on "macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed." Apple recently pushed an update to its XProtect tool, blocking several variants of the DPRK-linked Ferret malware family, which targets victims through the "Con…
…
continue reading

1
Mr. Kurtzmann, Boffins gone Wild, Grasscall, Vo1d, CE, Shadowpad, Aaran Leyland... - SWN #455
30:29
30:29
Play later
Play later
Lists
Like
Liked
30:29Mr. Kurtzmann, Boffins gone Wild, Grasscall, Vo1d, Windows CE, Shadowpad, Aaran Leyland, and More, on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-455
…
continue reading

1
Week in Review: Apple encryption, gamification for security, DISA breach
25:25
25:25
Play later
Play later
Lists
Like
Liked
25:25Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Andrew Wilder, CISO, Vetcor Thanks to our show sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the follow up tasks you don’t have time for are close behind. What are you going …
…
continue reading
Qilin ransomware gang claims responsibility for attack against Lee Enterprises. Thai police arrest suspected hacker behind more than 90 data leaks. JavaGhost uses compromised AWS environments to launch phishing campaigns. LotusBlossum cyberespionage campaigns target Southeast Asia. Malware abuses Microsoft dev tunnels for C2 communication. Protecti…
…
continue reading
We check in with the recently-released season two of Netflix’s The Recruit, a show supported by the CIA, DOD and... The post Subscribercast #96 – The Recruit Season Two first appeared on Spy Culture.By Tom Secker
…
continue reading

1
Cyber Security Today February 2025 Month In Review
59:57
59:57
Play later
Play later
Lists
Like
Liked
59:57Cybersecurity Insights: February Review & Current Trends Join us in this comprehensive discussion on February's cybersecurity highlights, featuring experts Laura Payne from White Tuque and David Shipley from Beauceron Security. We delve into Canada's cybercrime progress, discuss significant global cyber incidents, and explore the ongoing challenges…
…
continue reading
In this episode, Conor and Ben chat with Tristan Brindle about the recent C++ London meetup, the future of C++ and safety in C++. Link to Episode 223 on Website Discuss this episode, leave a comment, or ask a question (on GitHub) Socials ADSP: The Podcast: Twitter Conor Hoekstra: Twitter | BlueSky | Mastodon Ben Deane: Twitter | BlueSky About the G…
…
continue reading

1
Cyber espionage increase, Nakasone cyber warning, PolarEdge exploits Cisco
8:09
8:09
Play later
Play later
Lists
Like
Liked
8:09Chinese cyber espionage jumped 150% last year Nakasone warns of U.S. falling behind adversaries in cyberspace PolarEdge botnet exploits Cisco, ASUS, QNAP, and Synology Huge thanks to our sponsor, Conveyor Let me guess, another security questionnaire just landed in your inbox. Which means all the follow up tasks you don’t have time for are close beh…
…
continue reading

1
Mic Drop: Anne Neuberger on AI: ‘We have to challenge ourselves to be first’
13:58
13:58
Play later
Play later
Lists
Like
Liked
13:58We sat down with former deputy national security advisor Anne Neuberger on the sidelines of the Munich Security Conference to talk about everything from Chinese AI start-ups like DeepSeek to the competition for the future world order. Learn about your ad choices: dovetail.prx.org/ad-choicesBy Recorded Future News
…
continue reading

1
“Translation is the tip of the iceberg”: A deep dive into specialty models
31:28
31:28
Play later
Play later
Lists
Like
Liked
31:28Smartling is an enterprise translation platform that includes AI-powered translation solutions. Connect with Olga on LinkedIn. Kudos to Stack Overflow user Suleka_28, who earned a Populist badge by explaining how to convert logits to probability in binary classification in tensorflow.By Ben Popper, Ryan Donovan, Olga Beregovaya
…
continue reading

1
SANS Stormcast Friday Feb 28th: Njrat devtunnels.ms; Apple FindMe Abuse; XSS Exploited; @sans_edu Ben Powell EDR vs. Ransomware
14:27
14:27
Play later
Play later
Lists
Like
Liked
14:27Njrat Compaign Using Microsoft dev Tunnels: A recent version of the Njrat remote admin tool is taking advantage of Microsoft's developer tunnels (devtunnels.ms) as a command and control channel. https://isc.sans.edu/diary/Njrat%20Campaign%20Using%20Microsoft%20Dev%20Tunnels/31724 NrootTag Apple FindMy Abuse Malware could use a weakness in the keys …
…
continue reading

1
F59: Friday Q&A about programming and management
1:02:00
1:02:00
Play later
Play later
Lists
Like
Liked
1:02:00F59: Friday Q&A about programming and management by Yegor BugayenkoBy Yegor Bugayenko
…
continue reading

1
Zero Days Are Not Just Fiction - PSW #863
1:49:19
1:49:19
Play later
Play later
Lists
Like
Liked
1:49:19Apple, the UK, and data protection, you can get pwned really fast, Australia says no Kaspersky for you!, the default password is on the Internet, topological qubits, dangerous AI tools, old software is not just old but vulnerable too, tearing down Sonic Walls, CWE is good but could be great, updating your pi-hole, should you watch "Zero Day"? my no…
…
continue reading
Arm is going to make its own server chips, WordPress is selling “100 year” domain registrations, geo-redundancy for VPSs, and backing up Windows to Backblaze B2. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes Isolating Containers with ZFS and Linux Namespaces News Arm to launch its own chip in move that could …
…
continue reading

1
The masterminds behind a $1.5 billion heist.
33:08
33:08
Play later
Play later
Lists
Like
Liked
33:08FBI attributes $1.5 billion Bybit hack to DPRK hackers. Cellebrite suspends services in Serbia following allegations of misuse. A Belgium spy agency is hacked. New groups, bigger attacks. Sticky Werewolf strikes again. US DNI orders legal review of UK's request for iCloud backdoor. A cybersecurity veteran takes CISA’s lead. DOGE accesses sensitive …
…
continue reading

1
Reimagining the Windows Terminal with Warp's Zach Lloyd
31:46
31:46
Play later
Play later
Lists
Like
Liked
31:46What if we did the terminal...differently? Warp is taking a big bet on a new terminal that's got AI at the center. Is it a bad idea, or might it just be epic? Scott talks to Warp CEO Zach Lloyd about their big bet on a new way to think about the oldest computing interface. And, Warp is now out on Windows! https://www.warp.dev…
…
continue reading

1
Building for application developers (Interview)
1:52:33
1:52:33
Play later
Play later
Lists
Like
Liked
1:52:33Anurag Goel, Founder/CEO of Render, joins Adam to discuss what they’re doing to solve cloud problems for application developers. They just raised $80M they don’t even need and they’re poised to solve boring problems like object storage, and less boring things like building for the AI era. Join the discussion Changelog++ members get a bonus 4 minute…
…
continue reading

1
Live from Orlando, it's Hacking Humans! [Hacking Humans]
30:51
30:51
Play later
Play later
Lists
Like
Liked
30:51In this special live episode of Hacking Humans, recorded at ThreatLocker’s Zero Trust World 2025 conference in Orlando, Florida, Dave Bittner is joined by T-Minus host Maria Varmazis. Together, they explore the latest in social engineering scams, phishing schemes, and cybercriminal exploits making headlines. Their guest, Seamus Lennon, ThreatLocker…
…
continue reading
Browser security aims to protect users from cyber threats encountered online, such as phishing, malicious extensions, and malware. It’s a complex, multifaceted challenge that’s increasingly important as cloud-based tools, SaaS platforms, and collaborative applications become the backbone of modern workflows. Jeswin Mathai is the Chief Architect at …
…
continue reading

1
GitHub repos exposed, HaveIBeenPwned adds 244M stolen passwords, Anagram gamifies cybersecurity training
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16Thousands of exposed GitHub repositories, now private, can still be accessed through Copilot Cellebrite halts product use in Serbia following Amnesty surveillance report New Ghostwriter campaign targets Ukrainian Government and opposition activists in Belarus Huge thanks to our sponsor, Conveyor It’s 2025. This is your second sign to get a trust ce…
…
continue reading
In this special live episode of Hacking Humans, recorded at ThreatLocker’s Zero Trust World 2025 conference in Orlando, Florida, Dave Bittner is joined by T-Minus host Maria Varmazis. Together, they explore the latest in social engineering scams, phishing schemes, and cybercriminal exploits making headlines. Their guest, Seamus Lennon, ThreatLocker…
…
continue reading
This week, we are joined by Adam Marré, Arctic Wolf CISO, who is talking about banning TikTok and increasing regulations for social media companies. Ben has an update on the fate of Apple’s end-to-end encryption in the UK, as well as the story of a lawsuit against DOGE for getting unauthorized access to personal data. Dave looks at a call from cong…
…
continue reading

1
Vertical Slice Architecture with Jeremy Miller
54:00
54:00
Play later
Play later
Lists
Like
Liked
54:00How can vertical architecture help you? Carl and Richard talk to Jeremy Miller about using vertical architecture to help build applications quickly and reliably. Jeremy talks about resisting the over-thinking of architecture leaving room for developers to build the app and get to results rapidly - by taking a vertical slice of the problem space, en…
…
continue reading

1
SANS Stormcast Thursday Feb 27th: High Exfil Ports; Malicious VS Code Theme; Developer Workstation Safety; NAKIVO PoC; OpenH264 and rsync vuln;
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45Attacker of of Ephemeral Ports Attackers often use ephermeral ports to reach out to download additional resources or exfiltrate data. This can be used, with care, to detect possible compromises. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Malware%20Source%20Servers%3A%20The%20Threat%20of%20Attackers%20Using%20Ephemeral%20Ports%20as%20Service%2…
…
continue reading
A major employee screening provider discloses a data breach affecting over 3.3 million people. Signal considers exiting Sweden over a proposed law that would give police access to encrypted messages. House Democrats call out DOGE’s negligent cybersecurity practices. Critical vulnerabilities in Rsync allow attackers to execute remote code. A class a…
…
continue reading

1
880: Creator of Home Assistant: Web Components, Self Hosting and Home Hacking
58:34
58:34
Play later
Play later
Lists
Like
Liked
58:34Wes and CJ talk with Paulus Schoutsen, creator of Home Assistant, about the future of smart homes, AI-powered automation, and open-source innovation. Show Notes 00:00 Welcome to Syntax! 00:29 What is Home Assistant? 03:32 Web Components in Home Assistant Home Assistant Frontend 10:41 Home Assistant’s stability and longevity 17:05 Is Home Assistant …
…
continue reading

1
DOP 304: Strategies for Successful Talent Retention
32:30
32:30
Play later
Play later
Lists
Like
Liked
32:30#304: As we continue to navigate the complexities of modern work environments, the debate surrounding remote work versus in-office setups remains a hot topic. Companies are constantly reevaluating their strategies when it comes to talent retention, with the return to office being a significant point of discussion. On one hand, working in an office …
…
continue reading

1
CISOs Struggling, Culture Hurting, But Cybersecurity Salaries Stay Competitive - BSW #384
43:25
43:25
Play later
Play later
Lists
Like
Liked
43:25This week: CISOs struggling to balance security, business objectives, Signs Your Organization’s Culture is Hurting Your Cybersecurity, Servant Leadership: Putting Trust at the Center, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-384…
…
continue reading

1
New Phishing Scam Uses Authentic PayPal Address: Cyber Security Today February 26, 2025
9:59
9:59
Play later
Play later
Lists
Like
Liked
9:59In this episode, host Jim Love covers a $1.5 billion Ethereum heist attributed to the North Korean Lazarus Group, Google's shift from SMS to QR codes for multifactor authentication, a massive botnet targeting Microsoft 365 accounts, and new phishing scams exploiting PayPal's address feature. Tune in for essential insights into the latest cybersecur…
…
continue reading

1
DISA breach, Swedish backdoors, Dems looking into system access
7:39
7:39
Play later
Play later
Lists
Like
Liked
7:39US employee screening firm confirms breach Swedish law enforcement seeking messaging app backdoors Dems warn of exposed entry points on government systems Huge thanks to our sponsor, Conveyor Ever wish you had a teammate that could handle the most annoying parts of customer security reviews? You know, chasing down SMEs for answers, updating systems…
…
continue reading

1
Risky Business #781 -- How Bybit oopsied $1.4bn
1:02:40
1:02:40
Play later
Play later
Lists
Like
Liked
1:02:40On this week’s show Patrick Gray and Adam Boileau discuss the week’s cybersecurity news: North Korea pulls off a 1.5 billion dollar crypto heist Apple pulls Advanced Data Protection from the UK Black Basta ransomware gang’s internal chats leak Russians snoop on Signal with QR codes And Myanmar ships thousands of freed scam compound workers to Thail…
…
continue reading

1
SN 1014: FREEDOM Administration Login - Apple's UK Privacy Showdown, $1.5 Billion Crypto Heist
2:39:37
2:39:37
Play later
Play later
Lists
Like
Liked
2:39:37Apple disables Advanced Data Protection for new UK users. Paying ransoms is not as cut and dried as we might imagine. Elon Musk's "X" social media blocks "Signal.me" links. Spain's soccer league blocks Cloudflare and causes a mess. Two new (and rare) vulnerabilities discovered in OpenSSH. The U.S. seems unable to evict Chinese attackers from its Te…
…
continue reading

1
SANS Stormcast Wednesday Feb 26th: M365 Infostealer Botnet; Mixing OpenID Keys; Malicious Medical Image Apps
5:59
5:59
Play later
Play later
Lists
Like
Liked
5:59Massive Botnet Targets M365 with Password Spraying A large botnet is targeting service accounts in M365 with credentials stolen by infostealer malware. https://securityscorecard.com/wp-content/uploads/2025/02/MassiveBotnet-Report_022125_03.pdf Mixing up Public and Private Keys in OpenID The complex OpenID specificiation and the flexibility it suppo…
…
continue reading

1
Exchange Server in 2025 with Michel de Rooij
31:42
31:42
Play later
Play later
Lists
Like
Liked
31:42What is it like to take care of an Exchange Server in 2025? Richard chats with Michel de Rooij about his work with Exchange, including the many scripts he has written and published over the years to help sysadmins solve problems. Michel discusses how staying on-premises with Exchange is getting harder - the new version will be subscription-based! T…
…
continue reading
Keith Klain Show notes: Show notes: QR Podcast – James Bach Podcast Site: QR PodcastBy Testing Podcast
…
continue reading

1
Cronenbergs, Dangling Twitchbots, Crypto, Kaspersky, SMS, OT, Josh Marpet... - SWN #454
25:34
25:34
Play later
Play later
Lists
Like
Liked
25:34Cronenbergs, Dangling Twitchbots, Crypto, Kaspersky, SMS, OT, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-454
…
continue reading

1
Orange you glad you didn't fall for this?
33:18
33:18
Play later
Play later
Lists
Like
Liked
33:18A hacker claims to have stolen internal documents from a major French telecommunications company. A security breach hits Russia’s financial sector. Cyberattacks targeting ICS and OT surged dramatically last year. Chinese group Silver Fox is spoofing medical software. The UK Home Office’s new vulnerability reporting policy risks prosecuting ethical …
…
continue reading
Today we’re talking all about MacOS AutoRun locations and how to spot persistence mechanisms. We’ll explore the ins and outs of property list files, launch daemons, system integrity protections, and the recent changes in macOS that can impact your forensic examinations...
…
continue reading