Join us each week as celebrity guests pitch an idea for a film based on one of the SUPER niche sub-genres on Netflix. From ‘Steamy Crime Movies from the 1970s’ to ‘Australian Dysfunctional Family Comedies Starring A Strong Female Lead’, our celebrity guests will pitch their wacky plot, their dream cast, the marketing stunts, and everything in between. By the end of every episode, Jimmy Carr, Comedian by night / “Netflix Executive” by day, will decide whether the pitch is greenlit or condemned to development hell! New episode every other Wednesday starting May 28th! Listen on all podcast platforms and watch on the Netflix is a Joke YouTube Channel . The Big Pitch is a co-production by Netflix and BBC Studios Audio.…
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via get@hackedpodcast.com.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
A podcast focusing on the intersection between cybersecurity, national security, and geopolitics
…
continue reading
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
…
continue reading
A weekly podcast of all things application security related. Hosted by Ken Johnson and Seth Law.
…
continue reading
About all things AppSec, DevOps, and DevSecOps. Hosted by Mike Shema and John Kinsella, the podcast focuses on helping its audience find and fix software flaws effectively.
…
continue reading
Discussions about the legal framework for crypto. We’ll look at international regulations, trends and jurisprudence impacting this nascent technology. You’ll hear from the top lawyers, lawmakers and entrepreneurs in the space, who share best practices and ideas on the ideal path forward.
…
continue reading
Software's best weekly news brief, deep technical interviews & talk show.
…
continue reading
Welcome to Beyond the Code, the podcast where we dive into the legal, regulatory, and ethical issues surrounding emerging technologies. Each week, we bring you in-depth conversations with industry experts, discussing the latest advancements in technology and their implications on society and the legal system. From artificial intelligence to blockchain, we'll be exploring all the hot topics in the field. Your host, Yitzy Hammer, a lawyer and tech enthusiast, is joined by a diverse group of ex ...
…
continue reading
As more and more organizations continue to adopt low code as a standard practice for solution development, information technology professionals find themselves learning new skills, translating professional development skills into low code tools and implementing governance and service management strategies. Learn from Microsoft MVPs, Microsoft Product team members, and Microsoft Power Platform users how they approached building solutions using Microsoft Power Platform.
…
continue reading
Cybersecurity is complex. Its user experience doesn’t have to be. Heidi Trost interviews information security experts about how we can make it easier for people—and their organizations—to stay secure.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today’s interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
…
continue reading
The mnemonic security podcast is a place where IT Security professionals can go to obtain insight into what their peers are working with and thinking about.
…
continue reading
An IFPOD production for IFPO the very first security podcast called Security Circle. IFPO is the International Foundation for Protection Officers, and is an international security membership body that supports front line security professionals with learning and development, mental Health and wellbeing initiatives.
…
continue reading
Stephen Turkington, Co-Founder of Search 5.0, hosts the Code Bytes Podcast. We interview those redefining the talent experience, exploring what it will take, from candidates and clients alike, to address the ever-pressing developer's skills gap.
…
continue reading
Code to Cloud is the podcast for builders—founders, engineers, and tech leaders—shipping the future of cloud, faster. From MVP to hyperscale, we dive into what really matters: cloud-native infrastructure, DevSecOps, AI integration, adaptive strategies, and modern app development. Hosted by Kevin Evans, a 25-year tech veteran, Senior Technologist at Microsoft, and fractional CTO at Code to Cloud, each episode delivers tactical conversations with engineering leaders, startup operators, and clo ...
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Redefining CyberSecurity Podcast Hosted by Sean Martin, CISSP Have you ever thought that we are selling cybersecurity insincerely, buying it indiscriminately, and deploying it ineffectively? For cybersecurity to be genuinely effective, we must make it consumable and usable. We must also bring transparency and honesty to the conversations surrounding the methods, services, and technologies upon which businesses rely. If we are going to protect what matters and bring value to our companies, ou ...
…
continue reading
Automation, Generative AI, Shift Left - the world of application security is evolving fast! Security Journey introduces the newest go-to AppSec resource, The Security Champions Podcast, hosted by Director of Application Security Michael Burch.Gain exclusive insight from software development leaders and security experts – from recounting their security champion journey to diving into the latest headlines in the AppSec world. Learn how to build, maintain and scale a successful software securit ...
…
continue reading
The world of application development moves quickly. New tools, new processes, and new threats are always popping up. Through enlightening interviews with industry leaders, From Code to the Cloud helps you stay on top of new developments in Low Code and Salesforce DevOps.
…
continue reading
Our podcast features Tech Talks with professionals at WeblineIndia who share their experiences, challenges, and solutions in software development and technology services. Each episode offers practical examples, lessons learned from recent projects, and suggestions on improving development processes. The discussions also cover current trends in AI, IT outsourcing, software development, and mobile app creation, helping you stay informed about approaches and methods that could make a difference ...
…
continue reading
The Security Table is four cybersecurity industry veterans from diverse backgrounds discussing how to build secure software and all the issues that arise!
…
continue reading
Technology and Security (TS) explores the intersections of emerging technologies and security. It is hosted by Dr Miah Hammond-Errey. Each month, experts in technology and security join Miah to discuss pressing issues, policy debates, international developments, and share leadership and career advice. https://miahhe.com/about-ts | https://stratfutures.com
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
…
continue reading
A weekly podcast about web design and development with a little zest from Amy Dutton and Brad Garropy
…
continue reading
Podcast by Skyscanner
…
continue reading
Felix takes a weekly look at Internet of Things (IoT) cyber security. Perfect for IoT project managers, developers, and those learning about penetration testing in this niche area. Email Felix using helpme@yg.ht Find You Gotta Hack That on Twitter @gotta_hack yougottahackthat.com
…
continue reading
CDW Canada Tech Talks: Discussing the Latest Technology Innovations Experts from CDW and our partners tackle hot topics including generative AI, FinOps, the new cybersecurity landscape and more.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
The Salesforce Admins podcast features real-life Salesforce Admins, product managers, and community leaders who transform businesses, careers, and community with clicks, not code. This 20min (sometimes a bit more) weekly podcast hosted by Mike Gerholdt feature episodes to empower Salesforce Admins who are implementing Enterprise CRM solutions. There may be some (digital) confetti. For more than our most recent episodes, go to https://admin.salesforce.com/salesforce-admin-podcast.
…
continue reading
We created Enginears as a place to share Engineering stories and to aid knowledge sharing and discovery into how companies build their products. Hosted by Ausha. See ausha.co/privacy-policy for more information.
…
continue reading
Shared Security is your premier cybersecurity and privacy podcast where we explore the bonds shared between people and technology. Join industry experts Tom Eston, Scott Wright, and Kevin Johnson as they deliver the latest news, actionable tips, expert guidance, and insightful interviews with top cybersecurity and privacy specialists. Stay informed and take control of your online security and privacy in today's interconnected world. Tune in every week to discover invaluable insights, strateg ...
…
continue reading
Der Chaos Computer Club ist die größte europäische Hackervereinigung, und seit über 25 Jahren Vermittler im Spannungsfeld technischer und sozialer Entwicklungen.
…
continue reading
Join us for interesting conversations about technology and the business of IT.
…
continue reading
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
…
continue reading
A short summary of the latest cyber security news and trends, from the perspective of business leaders and owners. Hosts Trish and Tom provide plain English explanations along with practical advice to keep your business safe and secure from cyber crime and disruption. For cyber security help and advice, speak to Cool Waters Cyber: www.cool-waters.co.uk
…
continue reading

1
Chapter 3: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill
17:30
17:30
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
17:30Chapter 3: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill
…
continue reading

1
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Shahar Man, Brian Fox, Mark Lambert - ASW #332
1:04:35
1:04:35
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
1:04:35ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
…
continue reading

1
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Brian Fox, Mark Lambert, Shahar Man - ASW #332
1:04:35
1:04:35
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
1:04:35ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
…
continue reading

1
Malicious npm codes, Nova Scotia cyberattack, ChatGPT refuses shutdown command
7:19
7:19
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
7:19Malicious npm and VS Code packages stealing data Nova Scotia Power confirms ransomware attack Researchers claim ChatGPT o3 bypassed shutdown in controlled test Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ran…
…
continue reading

1
SANS Stormcast Thursday, May 22nd 2025: Crypto Confidence Scams; Extension Mayhem for VS Code and Chrome
6:21
6:21
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
6:21New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive VIP memberships to withdraw the money. https://isc.sans.edu/diary/New%20Variant%20of%20Crypto%20Confidence%20Scam/31968 Malicious Chrome Extensions Malici…
…
continue reading

1
SANS Stormcast Thursday, May 22nd 2025: Crypto Confidence Scams; Extension Mayhem for VS Code and Chrome (#)
6:22
6:22
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
6:22SANS Stormcast Thursday, May 22nd 2025: Crypto Confidence Scams; Extension Mayhem for VS Code and Chrome New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive “VIP” memberships to withdraw the money. https://…
…
continue reading

1
Cloud Networking: Scale Up, Cut Costs, Boost Security
10:44
10:44
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
10:44Discover how cloud networking empowers businesses to scale efficiently, cut costs, and boost security. In this episode, we explore smart strategies and key principles to future-proof your IT infrastructure. Key highlights: Scalable network design without hardware limitations Cost-optimization through cloud migration Strengthening security in cloud-…
…
continue reading

1
EP 62: Defending the Unknown in OT Security
31:38
31:38
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
31:38ROI is always a tricky subject in cybersecurity. If you’re paying millions of dollars in securing your OT networks, you’d want to be able to show that it was worth it. Andrew Hural of UnderDefense talks about the need for continuous vigilance, risk management, and proactive defense, acknowledging both the human and technological elements in cyberse…
…
continue reading

1
Secure Code Reviews, LLM Coding Assistants, and Trusting Code - Rey Bango, Karim Toubba, Gal Elbaz - ASW #330
1:09:38
1:09:38
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
1:09:38Developers are relying on LLMs as coding assistants, so where are the LLM assistants for appsec? The principles behind secure code reviews don't really change based on who write the code, whether human or AI. But more code means more reasons for appsec to scale its practices and figure out how to establish trust in code, packages, and designs. Rey …
…
continue reading

1
From code to command. AI, human judgement and security with Dr Zena Aassad
42:06
42:06
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
42:06In this episode of Technology & Security, Dr. Miah Hammond-Errey is joined by Dr Zena Assaad to explore the technical, human, ethical, and geopolitical dimensions of artificial intelligence. From workforce disruption to military application, this episode unpacks the complex ways AI is reshaping leadership, war, jobs and global power structures. Dr …
…
continue reading

1
Ctrl + Alt + Secure With Dom Vogel🎙️
58:29
58:29
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
58:29Connect with us! 🔒 Ctrl + Alt + Secure – Where Cyber Meets the Boardroom In this episode, Kevin Evans and Dom Vogel break down the realities of cybersecurity in today’s world—from the fundamentals to the strategies that help businesses stay ahead. We dive into why cyber has become mainstream for organizations and why now is the time to get on board…
…
continue reading

1
SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability (#)
6:11
6:11
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
6:11SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a “weird string” found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5B…
…
continue reading

1
A View on the Open-Source Video Editing Landscape (lgm2025)
23:04
23:04
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
23:04Whether it is stitching together some travel footage or producing high-quality film content, there are many ways people want to work with the medium "video". Their needs for video editing solutions are diverse, and so is their budget.Open-source video editing software seems great for beginners to get started at zero cost. What do you get and what d…
…
continue reading

1
Permacomputing: Fermenting Regenerative Aesthetics (lgm2025)
22:04
22:04
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
22:04Images created with digital graphic techniques have played a central rolein promoting the seemingly endless growth of a computing culture that manyof us now recognize as extractive, polluting and exploitative. Beyond that,something that once promised a utopian future now feels like it has delivereda rather crappy, disappointing reality. FLOSS has u…
…
continue reading

1
The Curious Case of Splines in FreeCAD (lgm2025)
18:01
18:01
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
18:01Splines, especially in their general form as NURBS, are an extremely versatile tool in a 3D designer's kit. They allow the designer to succinctly and efficiently model objects of arbitrary shape and smoothness. For converting these designs into physical objects, FreeCAD has a vast set of tools to operate on NURBS, both as planar curves and (with ad…
…
continue reading

1
Let's All Go Back To Bitmap Fonts! (lgm2025)
21:52
21:52
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
21:52Scalable vector fonts have been the norm for decades, but that doesn'tmean artists and hackers don't have use cases where a bitmap font fitsthe bill (and it doesn't mean that classic bitmap font designs deserveto be forgotten, either).This session explores two distinct scenarios where bitmap fonts have arole to play and looks at the tooling needed …
…
continue reading
UpStage, the artist-led platform for cyberformance (live online performance), celebrated its 20 th anniversaryin 2024 along with the completion of the four-year Creative Europe funded artistic projectMobilise/Demobilise. This project enabled a complete “RE:imagination” of the UpStage code, removing itsdependency on Flash, introducing new features a…
…
continue reading

1
The State of Processing: How We’re Bringing a Creative Coding Icon Back to Life (lgm2025)
21:17
21:17
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
21:17Processing is one of the most widely used open-source tools for creative coding and CS education. Since it was first released in 2001, it has been instrumental in teaching coding to students, artists, and designers worldwide, serving as a gateway into programming for people who might never have touched code otherwise.A remarkable thing about Proces…
…
continue reading

1
How Tebi Unified POS, Payments & Reservations Across iOS & Android Using Kotlin Multiplatform! | Enginears Podcast
40:43
40:43
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
40:43If you're keen to share your story, please reach out to us! Guest: https://www.linkedin.com/in/michael-nugent-355955198/ https://www.linkedin.com/in/mlstevanovic/ https://tebi.com/careers/ Powered by Artifeks! https://www.linkedin.com/company/artifeksrecruitment https://www.artifeks.co.uk https://www.linkedin.com/in/agilerecruiter LinkedIn: https:/…
…
continue reading

1
State of Libre Graphics (lgm2025)
35:57
35:57
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
35:57An update from the many projects of our community.## Submit Slides and ContentPlease submit your slides as Pull Requests to https://github.com/libregraphicsmeeting/state-of-lg-2025details to the format and process are in the README of the repository. Ifyou have trouble contributing this way, feel free to contact us directly:[libregraphicsmeeting@st…
…
continue reading

1
RE:imagination Primer (lgm2025)
20:17
20:17
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
20:17We're kicking of this years special focus -- RE:imagination -- exploring the possible futures of the Libre Graphics Meeting.## TODO: Keynote?This may be a placeholder for a keynote, that still needs to be determined.## Special focus – RE:imaginationThe Libre Graphics Meeting faced significant challenges during and afterthe pandemic. In [Rennes](/20…
…
continue reading
Welcome to Nuremberg, welcome the Libre Graphics Meeting!Licensed to the public under https://creativecommons.org/licenses/by/4.0/about this event: https://pretalx.c3voc.de/lgm25-upstream-2025/talk/2682810148/על ידי LGM Community, Lasse Fister
…
continue reading

1
EP 127 Secrets for Sale: Inside the Shadowy World of Corporate Espionage with former British Intelligence Officer Gavin Stone
1:07:16
1:07:16
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
1:07:16Send us a text ✍️ Short Podcast Summary: In this gripping episode of The Security Circle, former British intelligence officer Gavin Stone lifts the veil on the murky world of corporate espionage. From railgun leaks in Korea to bugs in boardrooms, Gavin shares shocking real-world tactics used to infiltrate companies, manipulate insiders, and extract…
…
continue reading

1
Quantum Readiness & Zero Trust: Strategies to Strengthen Digital Resilience - Jordan Avnaim, Chris Hickman, Amit Sinha, Albert Estevez Polo - BSW #397
1:07:59
1:07:59
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
1:07:59This segment explores how automated microsegmentation addresses critical Zero Trust gaps overlooked by traditional access controls and legacy segmentation solutions. We'll examine the limitations of perimeter-based defenses in today's dynamic threat landscape and reveal how automated microsegmentation enhances network security beyond conventional f…
…
continue reading

1
MathWorks confirms ransomware attack, Adidas has data breach, Dutch intelligence warns of cyberattack
6:32
6:32
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
6:32MathWorks, Creator of MATLAB, Confirms Ransomware Attack Adidas warns of data breach after customer service provider hack Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to prote…
…
continue reading

1
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API
6:37
6:37
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
6:37SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
…
continue reading

1
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API (#)
6:38
6:38
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
6:38SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and sho…
…
continue reading

1
Hacker, Hero, or Hostage of the Law_ The Alberto Hill Story.
14:07
14:07
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
14:07Hacker, Hero, or Hostage of the Law_ The Alberto Hill Story.
…
continue reading
This is a story about a Chief Hacking Officer who draws on his expertise in physical and virtual security assessments—along with some intuitive AI-driven coding—to safeguard Operational Technology. Colin Murphy of Frenos and Mitnick Security talks about how some of his early assessment work with Kevin Mitnick is helping him with OT security today.…
…
continue reading

1
Entry-level tech jobs are getting wiped out (News)
9:57
9:57
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
9:57The San Fransisco Standard published some sobering news for new graduates, the Forge team decided to put an AI agent in your shell, Fernando Borretti says you can choose tools that make you happy, Jujutsu’s flexibility and safety changed Nathan Witmer’s approach to version control, Anil Dash is as excited about MCP as almost everyone else is & Alex…
…
continue reading

1
AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more... - SWN #480
35:14
35:14
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
35:14AP Tests, Hyper-V, Notepad, Google, Nova Scotia, NHI, Bond, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-480
…
continue reading

1
Listen to "Chapter 3: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill"
12:42
12:42
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
12:42Listen to "Chapter 3: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill"
…
continue reading

1
Chapter 2: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill
30:02
30:02
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
30:02Chapter 2: Listen to "Overview of the book "Violeta Digital: A Novella of Code and
…
continue reading

1
Chapter 1: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill.
15:30
15:30
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
15:30Chapter 1: Listen to "Overview of the book "Violeta Digital: A Novella of Code and Conscience" by Alberto Daniel Hill.
…
continue reading

1
Overview of the book "Violeta Digital: A Novella of Code and Conscience
7:46
7:46
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
7:46Overview of the book "Violeta Digital: A Novella of Code and Conscience. By Alberto Daniel Hill
…
continue reading

1
#146 - What’s new in U.S. crypto law, with Justin Wales
32:45
32:45
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
32:45In this episode, Jacob Robinson is joined by Justin Wales (@bitcoin_wales), Head of Legal (Americas) at Crypto.com and author of The Crypto Legal Handbook. Sponsor: This episode is brought to you by Day One Law — a boutique law firm helping crypto startups navigate complex legal challenges. Visit https://www.dayonelaw.xyz/ to get in touch. With the…
…
continue reading

1
AI in AppSec: Agentic Tools, Vibe Coding Risks & Securing Non-Human Identities - Mo Aboul-Magd, Shahar Man, Brian Fox, Mark Lambert - ASW #332
1:04:35
1:04:35
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
1:04:35ArmorCode unveils Anya—the first agentic AI virtual security champion designed specifically for AppSec and product security teams. Anya brings together conversation and context to help AppSec, developers and security teams cut through the noise, prioritize risks, and make faster, smarter decisions across code, cloud, and infrastructure. Built into …
…
continue reading

1
SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection
7:13
7:13
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
7:13SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
…
continue reading

1
SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection (#)
7:13
7:13
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
7:13SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon…
…
continue reading

1
Agentic AI to the Rescue? From Billable Hours to Bots: The New Legal Workflow | A Conversation with Frida Torkelsen and Maged Helmy | Redefining CyberSecurity with Sean Martin
44:16
44:16
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
44:16⬥GUESTS⬥ Frida Torkelsen, PhD | AI Solution Architect at Newcode.ai | On LinkedIn: https://www.linkedin.com/in/frida-h-torkelsen/ Maged Helmy, PhD | Assoc. Professor - AI at University of South-Eastern Norway and Founder & CEO of Newcode.ai | On LinkedIn: https://www.linkedin.com/in/magedhelmy/ ⬥HOST⬥ Host: Sean Martin, Co-Founder at ITSPmagazine a…
…
continue reading

1
KubeBuddy, Can You Deploy? – Simplifying Kubernetes with The Pixel Robot🎙️
45:32
45:32
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
45:32In this episode of Code to Cloud, host Kevin Evans is joined by none other than Richard Hooper, a.k.a. The Pixel Robot! 🚀 We dive into Richard’s latest CNCF-nominated project, KubeBuddy — a tool designed to simplify production Kubernetes deployments and make life easier for platform engineers everywhere. Richard also shares insights into KRO(kro.ru…
…
continue reading

1
Reality check on SOC AI; Enterprise News; runZero and Imprivata RSAC interviews - Erik Bloch, HD Moore, Joel Burleson-Davis - ESW #408
1:49:38
1:49:38
הפעל מאוחר יותר
הפעל מאוחר יותר
רשימות
לייק
אהבתי
1:49:38Segment 1: Erik Bloch Interview The math on SOC AI just isn't adding up. It's not easy to do the math, either, as each SOC automation vendor is tackling alert fatigue and SecOps assistants a bit differently. Fortunately for us and our audience, Erik Bloch met with many of these vendors at RSAC and is going to share what he learned with us! Segment …
…
continue reading