show episodes
 
Artwork

1
Rocket Ship

Simon Grimm

icon
Unsubscribe
icon
Unsubscribe
חודשי+
 
Welcome aboard the Rocket Ship, the ultimate podcast voyage into the heart of React Native development with Simon Grimm! Whether you're a seasoned mobile app developer or just starting your journey, this is your go-to destination for all things React Native and Expo.
  continue reading
 
Artwork

1
The React Show

Owl Creek Studios

icon
Unsubscribe
icon
Unsubscribe
חודשי
 
Discussions about React, JavaScript, and web development by React experts with a focus on diving deep into learning React and discussing what it's like to work within the React industry.
  continue reading
 
Partner with iTechnolabs, the top react native app development company IN USA and Canada, to enhance your online business. Our team of expert developers can build react native apps tailored to your needs. As a trusted and experienced react native app development company, we serve startups, established businesses, and MNCs in USA. Let's work together.
  continue reading
 
Artwork

1
Brains & Beards Show

Wojciech Ogrodowczyk, Brains & Beards, Patryk Peszko

icon
Unsubscribe
icon
Unsubscribe
חודשי
 
Patryk and Wojciech from Brains & Beards use their combined 25+ years of professional experience to discuss programming, building teams, workflows and everything else that it takes to deliver great mobile applications (in React Native, or otherwise).
  continue reading
 
Artwork

1
Coffee Break Spanish

Coffee Break Languages

icon
Unsubscribe
icon
Unsubscribe
חודשי
 
Learn Spanish in coffee-break lessons from the Radio Lingua Network. In each lesson we'll focus on the language you need to know and before long you'll be making yourself understood with native Spanish speakers. Season 1 lessons are for absolute beginners, and the courses increase in difficulty as the seasons progress. 386357 Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
The Undefined Podcast

Jared Palmer & Ken Wheeler

icon
Unsubscribe
icon
Unsubscribe
חודשי
 
The only engineering podcast with a 2 drink minimum! Full stack developers Jared Palmer and Ken Wheeler have peer-to-peer conversations with world-class engineers about software development.
  continue reading
 
Artwork

1
Sub Club by RevenueCat

David Barnard, Jacob Eiting

icon
Unsubscribe
icon
Unsubscribe
חודשי+
 
Interviews with the experts behind the biggest apps in the App Store. Hosts David Barnard and Jacob Eiting dive deep to unlock insights, strategies, and stories that you can use to carve out your slice of the 'trillion-dollar App Store opportunity'.
  continue reading
 
Artwork

1
Modern Web

Modern Web

icon
Unsubscribe
icon
Unsubscribe
שבועי
 
The modern web is changing fast. Front-end frameworks evolve quickly, standards are emerging and old ones are fading out of favor. There are a lot of things to learn, but knowing the right thing is more critical than learning them all. Modern Web Podcast is an interview-style show where we learn about modern web development from industry experts. We’re committed to making it easy to digest lots of useful information!
  continue reading
 
Artwork

1
saubhagyam

seosaubhagyam

icon
Unsubscribe
icon
Unsubscribe
חודשי
 
We are one of Top Rated Python Mobile Application Development Company in India and we also provide services of website development, web designing and mobile application development at the cost effective rates. Contact us today for more information.
  continue reading
 
Artwork
 
Unity 3D is a fantastic gaming engine for creators that offers a wealth of features and gameplay options. Consider utilizing the Unity 3D game development platform to develop an interactive game that is both fascinating and excellent in its own right. Developing a gaming application will get easier as virtual worlds come to life.
  continue reading
 
Over the last few years, Coditation has successfully built marketing analytics and BI, marketing operations, customer success, social video analytics, marketing video generation, social media analytics and hyper-personalization products/solutions for it's customers. Leveraging this ever expanding MarTech know-how and experience, team Coditation has come up with a series of Podcast episodes focused on MarTech with a focus on data and artificial intelligence driven solutions. For more informat ...
  continue reading
 
Artwork

1
TABLEFLIP

Alan Shaw, Oli Evans, Richard Silverton and Bernard Mordan

icon
Unsubscribe
icon
Unsubscribe
יומי+
 
For a while now there's been a growing urge amongst the TABLEFLIP crew. A stratovolcano waiting to blurt out a fountain of opinions, observations, frustrations and wisdoms. Driven by our experiences working with many clients on varying projects and disparate code bases. From greenfield to legacy and everything in between our affliction to using the newest most shiny tech gives us a unique outlook on the state of the world of development in Node.js and JavaScript. We can no longer stem the fi ...
  continue reading
 
Artwork

1
Fragmented - Android Developer Podcast

Donn Felker, Kaushik Gopal

icon
Unsubscribe
icon
Unsubscribe
חודשי
 
The Fragmented Podcast is the leading Android developer podcast started by Kaushik Gopal & Donn Felker. Our goal is to help you become a better Android Developer through conversation & to capture the zeitgeist of Android development. We chat about topics such as Testing, Dependency Injection, Patterns and Practices, useful libraries, and much more. We will also be interviewing some of the top developers out there. Subscribe now and join us on the journey of becoming a better Android Developer.
  continue reading
 
Loading …
show series
 
The AppJS took place and there's a lot to learn from the amazing talks about the current state of React Native and its future. From frozen architecture to React Native news and new packages, we dive into everything in this episode! Also in this episode: - Why Simon is killing his app - My next clone project 🚀 Learn React Native: https://galaxies.de…
  continue reading
 
What if you could skip most native builds—and still ship confidently? In this episode of React Universe On Air, we explore how the React Native Enterprise Framework (RNEF) helps large teams dramatically reduce build times and streamline development at scale.Our guest Michał Pierzchała, Principal Engineer at Callstack, shares how RNEF was built to s…
  continue reading
 
On the podcast we talk with Charlie about why React Native has become the default for VC-funded apps, how AI is accelerating development cycles, and why speed of iteration matters more than programming language. Top Takeaways: ⚡ Instant iteration cycles unlock agility React Native and Expo supercharge development by collapsing long build times into…
  continue reading
 
In this episode, we break down the massive supply chain attack that rocked the React Native ecosystem beginning on June 6, 2025. Over 16 NPM packages, collectively downloaded over one million times per week, were silently weaponized with a Remote Access Trojan (RAT) embedded in obfuscated code. The attack, linked to the same threat actor behind the…
  continue reading
 
In this episode of the Modern Web Podcast, Danny Thompson sits down with Reed Harmeyer, CTO of Skylight Social, and Brandon Mathis, React Native engineer at This Dot Labs. They unpack the technical and strategic decisions behind Skylight’s meteoric growth: why they built on the AT Protocol, how they tackled video discovery and scaling challenges, a…
  continue reading
 
Cedric van Putten from Expo joins Jamon, Robin, and Mazen to talk about Expo Atlas—a tool for visualizing Metro bundles, spotting bloat, and understanding what your app is really shipping. Plus, the story behind how Atlas was built and where it’s headed next. Show Notes Introducing Expo Atlas Connect With Us! Guest: @cedric_dev Jamon Holmgren: @jam…
  continue reading
 
On June 5, 2025, GreyNoise flagged a massive spike in coordinated brute-force login attempts targeting Apache Tomcat Manager interfaces. Nearly 400 unique IP addresses, many traced back to DigitalOcean infrastructure, were involved in a widespread and opportunistic campaign. In this episode, we dissect the attack pattern, what makes Apache Tomcat a…
  continue reading
 
On May 12, 2025, the Texas Department of Transportation (TxDOT) disclosed a significant data breach that compromised crash reports containing personal data of over 423,000 individuals. In this episode, we take a forensic look at what went wrong, how one compromised account enabled unauthorized downloads of sensitive crash data, and what this means …
  continue reading
 
What happens when hundreds of thousands of college applications are submitted—not by hopeful students, but by bots using stolen identities? In this episode, we dive deep into the alarming rise of financial aid fraud in U.S. higher education, driven by "ghost students" and increasingly sophisticated scams powered by AI. From fraud rings applying for…
  continue reading
 
In this episode, we dive into the latest wave of active Mirai botnet campaigns exploiting high-severity remote code execution (RCE) vulnerabilities in critical enterprise and IoT systems. The Mirai malware—still evolving nearly a decade after its first appearance—has adapted its tactics to weaponize recent CVEs with CVSS scores of 9.8 and 9.9, impa…
  continue reading
 
On June 5, 2025, United Natural Foods Inc. (UNFI)—North America's largest publicly traded wholesale food distributor and primary supplier for Whole Foods—was struck by a major cyberattack that forced the company to shut down key IT systems. The result: widespread delivery disruptions to over 30,000 locations across the U.S. and Canada, eerily empty…
  continue reading
 
News for the week of June 2, 2025: TSC init command gets new, modern defaults, plus new betas drop for Vite 7 and Babel 8. From the community: Learn advanced TS features in 25 mins, and improve the performance of your TS monorepos with secret arcane knowledge. Chapters (00:00) - Introduction and Personal Updates (02:26) - News: tsc --init Finally H…
  continue reading
 
In this episode, we dissect one of the most sophisticated ongoing cybercrime trends—malware campaigns weaponizing GitHub repositories to compromise developers, gamers, and even rival hackers. By abusing GitHub’s search functionality and reputation signals, threat actors are pushing backdoored code under the guise of popular tools, game cheats, and …
  continue reading
 
In this episode, we dive deep into ClickFix, also tracked as ClearFix or ClearFake—a highly effective and deceptive malware delivery tactic that emerged in early 2024. ClickFix exploits the human tendency to trust browser prompts by using fake error messages, CAPTCHA pages, and verification requests to convince users to execute malicious PowerShell…
  continue reading
 
Cybercrime is rapidly evolving—and so are its tactics. In this episode, we dissect the findings of SoSafe’s Cybercrime Trends 2025 report and explore the six key trends reshaping the global threat landscape, including AI as an attack surface, multichannel intrusions, and the rising exploitation of personal identities. But we don’t stop at theory. W…
  continue reading
 
In the final chapter of Scenes, our course for intermediate Spanish learners, Isabel shares more about her Chicos de oro and the wonderful plans they enjoy together. ¡Son como una gran familia! Join Mark and Pablo in this last episode and take your Spanish to the next level! In Chapter 10, we’ll continue practising and reinforcing key concepts whil…
  continue reading
 
Jason Yu (ycmjason.codes) joins us to share an open source tool he created to help teams migrate their legacy TSConfig compiler options to modern-day options painlessly and progressively. Learn about his experience implementing strict options on big teams, how it inspired his new tool, and how you can take advantage of it right now! Chapters (00:00…
  continue reading
 
In this episode, we dive deep into three actively exploited zero-day vulnerabilities discovered in Google Chrome in 2025, each of which was patched in rapid succession following targeted attacks. At the center is CVE-2025-5419, a high-severity out-of-bounds read/write flaw in the V8 JavaScript engine that allows attackers to exploit heap corruption…
  continue reading
 
In this episode of the Modern Web Podcast, Rob Ocel, Danny Thompson, and Adam Rackis sit down with Ahmad Awais, CEO and founder of LangBase, to talk about agents, context, and the future of AI-assisted software development. Ahmad shares the origin story of Chai.new, an agent that builds agents, and why he believes context, not code, is the true val…
  continue reading
 
Australia just made cyber history. On May 30, 2025, the nation became the first in the world to enforce mandatory ransomware payment reporting under the newly enacted Cyber Security Act 2024. In this episode, we dissect what this means for businesses, law enforcement, and the global cybersecurity landscape. We break down the key aspects of the legi…
  continue reading
 
In this episode, we dive into Trustifi’s recent $25 million Series A funding round, led by growth equity firm Camber Partners. Specializing in AI-powered email security, Trustifi has now raised a total of $29 million to accelerate its product development, go-to-market strategy, and global marketing initiatives—especially in the MSP space. We unpack…
  continue reading
 
In this episode, we dissect Google's recent and upcoming decisions to distrust several Certificate Authorities (CAs) within the Chrome Root Store, including Entrust, Chunghwa Telecom, and Netlock. These high-impact moves are rooted in Chrome's strict enforcement of compliance, transparency, and security standards for public trust. We explore the ro…
  continue reading
 
Two critical, actively exploited vulnerabilities in vBulletin forum software—CVE-2025-48827 and CVE-2025-48828—have put thousands of websites at immediate risk of full system compromise. In this episode, we dissect how these flaws, triggered by insecure usage of PHP’s Reflection API and abuse of vBulletin’s template engine, allow unauthenticated at…
  continue reading
 
In this episode, we dissect the JINX-0132 cryptojacking campaign — a real-world example of how threat actors are exploiting cloud and DevOps environments to mine cryptocurrency at scale. We unpack how cybercriminals targeted misconfigured Docker APIs, publicly exposed HashiCorp Nomad and Consul servers, and vulnerable Gitea instances — turning ente…
  continue reading
 
News for the week of May 26, 2025: Angular's 20th release brings DX improvements, Remix replaced by React Router receives reincarnation, and how a lone volunteer brings the much-anticipated Temporal API to Firefox. Chapters (00:00) - Personal News and Updates (04:46) - News: Angular 20 is Out and It's Boring (But in a Good Way) (08:39) - News: Remi…
  continue reading
 
In this episode, we unpack two newly disclosed Linux vulnerabilities—CVE-2025-5054 and CVE-2025-4598—discovered by the Qualys Threat Research Unit (TRU). These race condition flaws impact Ubuntu’s apport and Red Hat/Fedora’s systemd-coredump, exposing a little-known but critical attack vector: core dumps from crashed SUID programs. We dive into how…
  continue reading
 
Recent phishing campaigns have entered a new phase—one where trust is weaponized. In this episode, we break down how cybercriminals are exploiting legitimate services like Google Apps Script and Google Firebase Storage to host phishing pages, evade detection, and steal credentials. Using cleverly crafted lures such as fake DocuSign notifications, i…
  continue reading
 
In this episode, we unpack the international takedown of AVCheck, one of the largest counter antivirus (CAV) services used by cybercriminals to test and fine-tune malware before deployment. Led by Dutch authorities and supported by agencies from the U.S., Germany, France, and others, this operation marks a major win in Operation Endgame—a sweeping …
  continue reading
 
ConnectWise has confirmed a cyberattack targeting ScreenConnect, its remote access solution used by thousands of Managed Service Providers (MSPs). The breach is reportedly tied to a sophisticated nation-state actor and linked to CVE-2025-3935, a critical ViewState code injection vulnerability that could allow Remote Code Execution (RCE). In this ep…
  continue reading
 
In this episode, we dive into the graphical corruption saga triggered by Firefox version 139, released on May 27, 2025. Aimed at uncovering what went wrong, we review reports from across the web detailing how the update wreaked havoc for Windows users running NVIDIA graphics cards—particularly those with multi-monitor setups using mixed refresh rat…
  continue reading
 
In this episode, we break down the recent $4 million seed funding round for Unbound, a startup tackling one of the biggest unsolved problems in enterprise AI: how to stop employees from leaking sensitive data through ungoverned use of Generative AI tools. Unbound’s AI Gateway aims to be the missing link between rapid AI adoption and responsible usa…
  continue reading
 
Microsoft is taking direct aim at one of the biggest pain points in the Windows ecosystem: update fragmentation. In this episode, we dive deep into the details of Microsoft’s newly announced Windows-native update orchestration platform, currently in private preview. We explore how this unified infrastructure aims to centralize updates for all apps,…
  continue reading
 
Linux systems are under siege—particularly in the world of IoT and internet-exposed servers. In this episode, we dissect PumaBot, a new GoLang-based botnet that's turning Linux IoT devices into cryptomining workhorses. We’ll break down how attackers brute-force SSH credentials, install malware disguised as legitimate services, and use systemd for s…
  continue reading
 
In Chapter 9 of Scenes, our course for intermediate Spanish learners, we return to Isabel’s café, where she welcomes a group of customers from a place that holds special meaning for her. ¿Te imaginas de dónde vienen? Join Mark and Pablo as they guide you through useful vocabulary and grammar while also introducing some of Spain’s most popular tapas…
  continue reading
 
On December 25, 2024, while most businesses were offline, a serious data breach struck LexisNexis Risk Solutions—exposing the personal data of over 360,000 individuals. The twist? The attack vector wasn’t a direct hack, but an indirect compromise through a third-party GitHub repository. Even more concerning, the breach went undetected until April 1…
  continue reading
 
While the AppJS is about to kick off, we talk about some cool new packages and updates around Reanimated and a new solution for local-first apps! Also in this episode: - New React Native Essentials - Apple still doesn't like my app - New Expo Router v5 Course - Are you VibeCoding? 🚀 Learn React Native: https://galaxies.dev/missions/zero-to-hero 🔥 W…
  continue reading
 
On this episode, we dissect the ransomware attack that brought MathWorks—a cornerstone software provider for engineers, scientists, and educators—to a grinding halt. The attack, which began on May 18, 2025, and was officially confirmed on May 26, crippled a wide range of customer-facing and internal systems, from MATLAB Online and ThingSpeak to lic…
  continue reading
 
The cybersecurity market is booming, projected to triple in size from $215 billion in 2025 to $697 billion by 2035. This explosive growth is being fueled by rising cyber threats, the digital transformation of global businesses, and an urgent need for advanced security operations. One of the clearest signals of this momentum? Zscaler’s acquisition o…
  continue reading
 
In this episode, we unpack a critical supply chain breach that’s rattled the cybersecurity world: the exploitation of multiple zero-day vulnerabilities in SimpleHelp Remote Support Software — most notably CVE-2024-57726, a privilege escalation flaw scored 9.9 by the NVD. Threat actors linked to the DragonForce ransomware operation and the Scattered…
  continue reading
 
On the podcast I talk with Tim about the importance of trust in web2app funnels, replacing free trials with money-back guarantees, and how they’ve found success with contractors after struggling with in-house marketing hires. Top Takeaways: 🔁 Replace trials with trust to attract high-intent users A 30-day money-back guarantee can outperform traditi…
  continue reading
 
This episode dives deep into Operation RapTor, one of the largest international crackdowns on dark web crime to date. We analyze how coordinated law enforcement actions across ten countries led to the arrest of 270 individuals, the seizure of $200 million in currency and digital assets, and the dismantling of major darknet marketplaces including In…
  continue reading
 
In this episode, we take a deep dive into the recent Marlboro-Chesterfield Pathology (MCP) ransomware attack—one of the most significant healthcare breaches of 2025. On January 16th, MCP detected unauthorized activity on its internal systems. Just days later, the SAFEPAY ransomware group claimed responsibility, posting stolen data—over 30GB of sens…
  continue reading
 
In this episode, we dive deep into the underground cybercrime ecosystem powering the surge of modern infostealers—Stealc, Vidar, and LummaC2. These malware strains aren't just code—they're full-service products sold as Malware-as-a-Service (MaaS), giving even low-skilled attackers access to powerful data theft tools. We break down how these stealer…
  continue reading
 
News for the week of May 19, 2025: Try out the new TypeScript Go native port, Zod 4 is out, and no, Deno is not dead. Chapters (00:00) - Introduction and Personal News (05:12) - News: TypeScript Native is in Preview! (10:12) - News: Anders' Talk About TS Native at MS Build (12:58) - News: Zod 4 is Officially Released (15:51) - News: Reports of Deno…
  continue reading
 
In this episode, we dive deep into the growing tension between AI innovation and data privacy through the lens of a major controversy: Microsoft’s Windows 11 Recall feature. Designed to screenshot nearly everything a user does every few seconds, Recall creates a searchable visual archive of on-screen activity. But while Microsoft claims it enhances…
  continue reading
 
In this episode, we break down the resurgence of the Bumblebee malware loader and its latest distribution method: blackhat SEO campaigns and trojanized software installers. By mimicking legitimate download pages through typosquatted domains and poisoning Bing search results, attackers are tricking IT professionals into unknowingly infecting their o…
  continue reading
 
In this episode, we dive into the evolving tactics of the Silent Ransom Group (SRG)—also known as Luna Moth—a cybercriminal outfit that has shifted from traditional phishing to a new, more deceptive strategy: impersonating IT support over the phone. Their latest victims? U.S. law firms, targeted for the sensitive data they hold and the large financ…
  continue reading
 
A growing cyber threat is targeting macOS users who rely on Ledger cold wallets to secure their cryptocurrency. In this episode, we dissect the anti-Ledger malware campaign—an increasingly sophisticated phishing operation that impersonates the trusted Ledger Live application to trick users into revealing their 24-word recovery phrases. Once entered…
  continue reading
 
In this episode, we break down the latest and most impactful phase of Operation Endgame, the international law enforcement campaign targeting the backbone of the ransomware ecosystem. Between May 19–22, authorities executed a sweeping takedown of 300 servers, neutralized 650 domains, and seized €3.5 million in cryptocurrency, adding to a total of €…
  continue reading
 
In this episode, we dive into the alarming surge of infostealer malware campaigns leveraging social media platforms, particularly TikTok, as their distribution vector. Threat actors are exploiting trending content—especially around AI tools like Sora, ChatGPT, and Google Gemini AI, and popular software like CapCut and MidJourney—to bait unsuspectin…
  continue reading
 
Loading …

מדריך עזר מהיר

האזן לתוכנית הזו בזמן שאתה חוקר
הפעלה