show episodes
 
Artwork

1
Security Weekly Podcast Network (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni giorno
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
Artwork

1
Error Code

Robert Vamosi

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni mese+
 
Error Code is a biweekly narrative podcast that provides you both context and conversation with some of the best minds working today toward code resilience and dependability. Work that can lead to autonomous vehicles and smart cities. It’s your window in the research solving tomorrow’s code problems today.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Artwork

1
Law of Code

Jacob Robinson

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni mese
 
Discussions with regulators, top lawyers and entrepreneurs about the legal framework for blockchain technology. We look at international regulations, trends, and jurisprudence impacting crypto and its related parts.
  continue reading
 
Artwork

1
Security Noise

TrustedSec

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni mese
 
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
  continue reading
 
Artwork

1
Paul's Security Weekly (Audio)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni settimana
 
For the latest in computer security news, hacking, and research! We sit around, drink beer, and talk security. Our show will feature technical segments that show you how to use the latest tools and techniques. Special guests appear on the show to enlighten us and change your perspective on information security. Note: This is only Paul's Security Weekly, a 2-hour show recorded once per week.
  continue reading
 
Artwork

1
Three Buddy Problem

Security Conversations

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni settimana
 
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
  continue reading
 
Artwork

1
Hacker Valley Studio

Hacker Valley Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni settimana
 
Welcome back to the show! Hacker Valley Studio podcast features Host Ron Eddings, as he explores the world of cybersecurity through the eyes of professionals in the industry. We cover everything from inspirational real-life stories in tech, to highlighting influential cybersecurity companies, and we do so in a fun and enthusiastic way. We’re making cybersecurity accessible, creating a whole new form of entertainment: cybertainment.
  continue reading
 
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 21:30 UTC.
  continue reading
 
Artwork

1
The Security Ledger Podcast

The Security Ledger

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni mese
 
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
  continue reading
 
Artwork

1
Code. Deploy. Go Live.

Andrew Connell & Julie Turner

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni mese+
 
Welcome to the Code. Deploy. Go Live. podcast! By Microsoft MVPs Andrew Connell and Julie Turner, our mission is to deliver prescriptive guidance on Microsoft 365 and Azure for Full-Stack Developers. Get the latest news, discussions, and interviews on topics ranging from Microsoft 365, Microsoft Azure, and related topics. For developers, by developers!
  continue reading
 
Artwork

1
The Michael Knowles Show

The Daily Wire

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni giorno
 
Bask in the simple joys of being right. The Michael Knowles Show cuts through the madness of our politics and culture, analyzing the top stories of the day. Monday through Friday. If you like The Michael Knowles Show, become a Daily Wire member TODAY with promo code: KNOWLES and enjoy the exclusive benefits for 25% off at https://utm.io/ueEss
  continue reading
 
Artwork

1
Beyond the Code

Yitzy Hammer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni mese+
 
Welcome to Beyond the Code, the podcast where we dive into the legal, regulatory, and ethical issues surrounding emerging technologies. Each week, we bring you in-depth conversations with industry experts, discussing the latest advancements in technology and their implications on society and the legal system. From artificial intelligence to blockchain, we'll be exploring all the hot topics in the field. Your host, Yitzy Hammer, a lawyer and tech enthusiast, is joined by a diverse group of ex ...
  continue reading
 
Artwork

1
Grumpy Old Geeks

Jason DeFillippo & Brian Schulmeister with Dave Bittner

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni settimana
 
We dissect the tech news train wrecks of the week, calling out what went wrong and who’s to blame. Think of this podcast as if Kurt Cobain threw down with Tom from MySpace, Elon Musk, and Mark Zuckerberg in a back alley brawl. No mercy, no filter—if tech had a walk of shame, this would be it.
  continue reading
 
Artwork

1
YusufOnSecurity.com

YusufOnSecurity.Com

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni settimana
 
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
  continue reading
 
Artwork

1
The Stack Overflow Podcast

The Stack Overflow Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni settimana+
 
For more than a dozen years, the Stack Overflow Podcast has been exploring what it means to be a developer and how the art and practice of software programming is changing our world. From Rails to React, from Java to Node.js, we host important conversations and fascinating guests that will help you understand how technology is made and where it’s headed. Hosted by Ben Popper, Cassidy Williams, and Ceora Ford, the Stack Overflow Podcast is your home for all things code.
  continue reading
 
Artwork

1
Paul's Security Weekly (Video)

Security Weekly Productions

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni settimana
 
Where security veterans unpack the latest IT security news, vulnerabilities, and research through a historical and technical lens that can cut through even the thickest cigar smoke. Hosted by Paul Asadoorian and Larry Pesce. Co-hosts: Josh Marpet, Jeff Man, Mandy Logan, Tyler Robinson.
  continue reading
 
The cybersecurity podcast about application security and those who practice it. Hosted by tech industry veterans, each episode focuses on a specific area of cybersecurity, with the hosts and their guests sharing their practitioners’ experiences and opinions, sprinkled liberally with a solid dose of humor and anecdotes.
  continue reading
 
Artwork

1
AI Security Ops

Black Hills Information Security

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni settimana
 
Join in on weekly podcasts that aim to illuminate how AI transforms cybersecurity—exploring emerging threats, tools, and trends—while equipping viewers with knowledge they can use practically (e.g., for secure coding or business risk mitigation). Brought to you by the experts at Black Hills Information Security https://blackhillsinfosec.com -------------------------------------------------- About Joff Thyer - https://blackhillsinfosec.com/team/joff-thyer/ About Derek Banks - https://blackhil ...
  continue reading
 
Automation, Generative AI, Shift Left - the world of application security is evolving fast, and so are the conversations that shape it. Welcome to The Security Champions Podcast, the go-to resource for insights from the front lines of application security. The podcast is cohosted by Michael Burch, Director of Application Security for Security Journey, and Dustin Lehr, the Director of AppSec Advocacy. Each month, one of them shares a candid conversation with security leaders, engineering voic ...
  continue reading
 
Artwork

1
Enginears

Enginears

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni mese+
 
We created Enginears as a place to share Engineering stories and to aid knowledge sharing and discovery into how companies build their products. Hosted on Ausha. See ausha.co/privacy-policy for more information.
  continue reading
 
Artwork

1
Forward Deployed

Microsoft

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni mese+
 
As organizations accelerate their adoption of generative AI and intelligent agents to transform how they build and manage solutions, IT professionals and developers are expanding their expertise to design, deploy, and govern AI-powered systems—leveraging Microsoft Copilot Studio and Azure AI Foundry to integrate collaboration tools, enforce enterprise-grade compliance, and support both low-code and pro-code development. With built-in security frameworks, governance controls, and seamless int ...
  continue reading
 
Cybermidnight Club– Hackers, Cyber Security and Cyber Crime is a trailblazing podcast by Alberto Daniel Hill, an expert in cybersecurity and the first person in Uruguay to serve prison for a computer-related crime. A crime he isn’t guilty of, perhaps one which never happened. Join Alberto as he dives deep into the world of hackers and cybersecurity in his riveting podcast. In this series, Alberto provides firsthand insights into the dark web and expert analysis of cybersecurity issues that a ...
  continue reading
 
Artwork

1
Iron Butterfly

Iron Butterfly Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni mese
 
Stories from the most powerful women you've never heard of. Eighty years ago, Eloise Page joined the OSS, trailblazing a path for what ultimately became the United States Intelligence Community. She rose the ranks from secretary to case officer, defying the norms of her time, and eventually became the first female Chief of Station at CIA. Along the way, Eloise earned the code name “Iron Butterfly.” These are the women who have shaped our world, and whose influence continues to ripple through ...
  continue reading
 
Artwork

1
Cloud Security Podcast

Cloud Security Podcast Team

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Ogni settimana
 
Learn Cloud Security in Public Cloud the unbiased way from CyberSecurity Experts solving challenges at Cloud Scale. We can be honest because we are not owned by Cloud Service Provider like AWS, Azure or Google Cloud. We aim to make the community learn Cloud Security through community stories from small - Large organisations solving multi-cloud challenges to diving into specific topics of Cloud Security. We LIVE STREAM interviews on Cloud Security Topics every weekend on Linkedin, YouTube, Fa ...
  continue reading
 
Artwork
 
The development world is cluttered with buzzwords and distractions. Speed, focus, and freedom? Gone. I’m Nicky Pike. And it’s time for a reset. [Dev]olution is here to help you get back to what matters: creating, solving, and making an impact. No trend chasing, just asking better questions. What do devs really want? How can platform teams drive flow, not friction? How does AI actually help? Join me every two weeks for straight talk with the people shaping the future of dev. This is the [Dev] ...
  continue reading
 
The podcast of foojay.io, a central resource for the Java community’s daily ​information needs, a place for friends of OpenJDK, ​and a community platform for the Java ecosystem​ — bringing together and helping Java professionals everywhere.
  continue reading
 
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
  continue reading
 
Loading …
show series
 
Australia's nationwide social media ban has put tech's age verification tools under the spotlight, exposing the flaws and privacy risks in today's facial detection systems and sparking worldwide debate about what's coming for the rest of us. Home Depot's puzzling reluctance to close a bad hole. GNOME's shell extension manager is unhappy with AI. Ho…
  continue reading
 
Code ships faster than anyone can review it. Jack Cable, CEO and Co-Founder of Corridor, explains what actually gets missed when teams stop reviewing every pull request, why most security tools surface noise instead of risk, and how Corridor approaches secure-by-design when speed is non-negotiable. Jack: https://www.linkedin.com/in/jackcable Corrid…
  continue reading
 
Join Andrew Connell and Julie Turner as they recap Microsoft Ignite 2025, diving deep into the latest announcements for developers. They discuss Agent 365's new governance capabilities, Copilot API updates, including retrieval and search features, and exciting declarative agent enhancements. The hosts also cover Security Copilot's inclusion with E5…
  continue reading
 
Tune in for some hands-on tips on how to use Claude code to create some amazing and not-so-amazing software. Paul will walk you through what worked and what didn't as he 100% vibe-coded a Python Flask application. The discussion continues with the crew discussing the future of vibe coding and how AI may better help in creating and securing software…
  continue reading
 
Diversity in healthcare devices complicates segmentation, security controls, and zero-trust approaches. New certifications aim to help. Bob Lyle, CRO of Medcrypt, identifies how layered defenses, rigorous cybersecurity requirements for new devices, continuous monitoring, and dark-web credential surveillance can reduce risk.…
  continue reading
 
Coding Assistants wie Github Copilot, Cursor oder Claude versprechen einen Effizienzboost für die Softwareentwicklung. Doch welchen Einfluss hat die Nutzung dieser Tools auf die Software Security?Dieser Vortrag analysiert die Vor- und Nachteile von Coding Assistants in Hinblick auf die Sicherheit des entstehenden Codes. Er gibt einen Überblick über…
  continue reading
 
Vibe coding is allowing even non-developers to produce fully functional web applications by using LLMs to generate code – but how secure are they? In this episode of AppSec Serialized, special guest Bogdan Calin joins hosts Dan Murphy and Ryan Bergquist to talk about his research, which involved vibe-coding over 20,000 applications and analyzing th…
  continue reading
 
What are your favorite resources for secure code? Co-hosts John Kinsella and Kalyani Pawar talk about the reality of bringing security into a business. We talk about the role of the OWASP Top 10 and the OWASP ASVS in crafting security programs. And balance that with a discussion in what's the best use of everyone's time -- developers and appsec fol…
  continue reading
 
President Trump addresses the nation, Dan Bongino is leaving the FBI, and Jasmine Crockett gives the real reason they want mass migration. Ep.1878 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlri - - - Today's Sponsors: Equip Foods - Equip’s Prime Bar is a real food protein bar with nothing to hide: just 11 i…
  continue reading
 
Three banks in four days isn't just a bragging right for penetration testers. It's a wake-up call showing that expensive security tools and alarm systems often fail when tested by skilled operators who understand both human behavior and technical vulnerabilities. Greg Hatcher and John Stigerwalt, co-founders of White Knight Labs, talk about their l…
  continue reading
 
Supply-chain vulnerabilities are getting more frequent and dangerous, with the Shai-Hulud npm worm and React2Shell RCE vulnerability being just two of the recent ones. In this episode of AppSec Serialized, Dan Murphy and Ryan Bergquist analyze those recent threats (plus a bonus Django vulnerability) and talk about the implications of security risk …
  continue reading
 
This episode of the Nextcloud Podcast is an exciting story from the community. And just in time before holidays, we are talking about cooking… and code. Meet Christian Wolf, a long-term Nextcloud contributor and maintainer of the famous Cookbook app! During his early coding days, Christian was trying to learn more about web applications. Seeking an…
  continue reading
 
Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit applications that do not have Next.js exposed. https://isc.sans.edu/diary/Maybe%20a%20Little%20Bit%20More%20Intere…
  continue reading
 
Brown deletes records of a they-them pro-Palestine leftist amid the shooting investigation, Jasmine Crockett claims white supremacists commit most violent crime, and a "civil rights icon" no one's heard of replaces Robert E. Lee at the Capitol. Ep.1877 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlri - - - To…
  continue reading
 
In this episode of Code Deploy GoLive, hosts Julie Turner and Andrew Connell explore why Microsoft 365 Copilot experiences vary significantly depending on where you access them—whether in Outlook, Word, Teams, or the standalone Copilot app. Through real-world examples and technical insights, they explain how different orchestrators power various Co…
  continue reading
 
If you're keen to share your story, please reach out to us! Guest: Powered by Artifeks! https://www.linkedin.com/company/artifeksrecruitment https://www.artifeks.co.uk https://www.linkedin.com/in/agilerecruiter LinkedIn: https://www.linkedin.com/company/enginearsio Twitter: https://x.com/Enginearsio All Podcast Platforms: https://smartlink.ausha.co…
  continue reading
 
DeFi has always promised trust without intermediaries, but as the ecosystem matures, that promise is being stress-tested by hacks, institutional risk limits, and regulatory pressure. To unpack whether DeFi can scale without sacrificing neutrality or permissionlessness, Katherine Kirkpatrick Bos, General Counsel of StarkWare, and Jessi Brooks, Gener…
  continue reading
 
Business Security Weekly is well aware of the cybersecurity hiring challenges. From hiring CISOs to finding the right skills to developing your employees, we cover it weekly in the leadership and communications segment. But this week, our guest interview digs into the global cybersecurity hiring trends. Jim McCoy, CEO at Atlas, joins Business Secur…
  continue reading
 
Everyone loves a “vibe coded this in a weekend” story. Almost nobody shows you the infrastructure that keeps it from falling over the second you charge a credit card. In this episode, host Nicky Pike sits down with Noel Jackson, founder of Sonica, a zero-platform-fee music platform built by one person using AI agents and Coder workspaces. Noel spen…
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love discusses a range of pressing cybersecurity threats. The show covers the escalating React2Shell vulnerability, which has led to widespread automated exploitation campaigns involving crypto miners and back doors. Additionally, Jim reports on the Black Force phishing kit, which bypasses multifacto…
  continue reading
 
Australia's nationwide social media ban has put tech's age verification tools under the spotlight, exposing the flaws and privacy risks in today's facial detection systems and sparking worldwide debate about what's coming for the rest of us. Home Depot's puzzling reluctance to close a bad hole. GNOME's shell extension manager is unhappy with AI. Ho…
  continue reading
 
Beyond RC4 for Windows authentication Microsoft outlined its transition plan to move away from RC4 for authentication and published guidance and tools to facilitate this change. https://www.microsoft.com/en-us/windows-server/blog/2025/12/03/beyond-rc4-for-windows-authentication FortiCloud SSO Login Vuln Exploited Arctic Wolf observed exploit attemp…
  continue reading
 
Ben Shapiro, Michael Knowles, Andrew Klavan, and special guest Batya Ungar-Sargon debate the merits of Islamophobia, Europe’s security issues, and what the West is facing. They break down Trump’s first year back in office and roast the worst movies they sat through. Ep. 05 - - - Today's Sponsors: American Financing - Visit http://www.AmericanFinanc…
  continue reading
 
The FBI stops a major terror plot in LA, another victim of the Brown Shooting is identified, and a Lib finds the Pine Tree flag problematic. Ep.1876 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlri - - - Today's Sponsors: Birch Gold - Text KNOWLES to 989898 for your free information kit. Done with Debt - Star…
  continue reading
 
Think your cloud backups will save you from a ransomware attack? Think again. In this episode, Matt Castriotta (Field CTO at Rubrik) explains why the traditional "I have backups" mindset is dangerous. He distinguishes between Disaster Recovery (business continuity for operational errors) and Cyber Resilience (recovering from a malicious attack wher…
  continue reading
 
Welcome back for Part 2 of our Season 9 premiere of the Iron Butterfly Podcast that goes inside our first feature documentary film, The Power We Hold: Stories from Women Spies. For five years, this podcast has been our way of amplifying stories from the most powerful women the world has never heard of. More than 100 episodes later, this community h…
  continue reading
 
Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different ways people can make meaningful contributions to it. One of the underlying themes is that code is written for other people. That means PRs need to be understandable, discussions need to be enlightening…
  continue reading
 
Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different ways people can make meaningful contributions to it. One of the underlying themes is that code is written for other people. That means PRs need to be understandable, discussions need to be enlightening…
  continue reading
 
Open source projects benefit from support that takes many shapes. Kat Cosgrove shares her experience across the Kubernetes project and the different ways people can make meaningful contributions to it. One of the underlying themes is that code is written for other people. That means PRs need to be understandable, discussions need to be enlightening…
  continue reading
 
Ryan is joined by Stack Overflow’s CEO Prashanth Chandrasekar and Director of Data Science Michael Foree on the floor at re:Invent to discuss all they’ve seen and heard at the event, from the future of AI agents to the trust issues the enterprise has around AI and the impact of AI and robotics on the job market. Episode Notes: This episode was reco…
  continue reading
 
More React2Shell Exploits CVE-2025-55182 Our honeypots continue to detect numerous React2Shell variants. Some using slightly modified exploits https://isc.sans.edu/diary/More%20React2Shell%20Exploits%20CVE-2025-55182/32572 The Fragile Lock: Novel Bypasses For SAML Authentication SAML is a tricky protocol to implement correctly, in particular if dif…
  continue reading
 
A shooting at Brown leaves two people dead, another shooting at a Sydney Hanukkah celebration leaves sixteen people dead, and as always the Left won't condemn the people that cause the bloodshed. Ep.1875 - - - Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlri - - - Today's Sponsors: ARMRA - Receive 30% off your firs…
  continue reading
 
In this episode, Jonathan Schmalfeld and Jacob Robinson walk through the biggest crypto law and policy developments of the month of November. Jonathan is the Policy Director at The Digital Chamber, where he leads federal and state advocacy on digital asset regulation. Timestamps: ➡️ 1:19 — Senate Agriculture Committee releases market structure draf…
  continue reading
 
Interview Segment: Tony Kelly Illuminating Data Blind Spots As data sprawls across clouds and collaboration tools, shadow data and fragmented controls have become some of the biggest blind spots in enterprise security. In this segment, we’ll unpack how Data Security Posture Management (DSPM) helps organizations regain visibility and control over th…
  continue reading
 
In this episode of Cybersecurity Today, host David Shipley discusses significant developments in the cybersecurity landscape. Apple releases security updates to address two actively exploited WebKit vulnerabilities. Scammers manipulate AI-powered search tools to recommend fake support numbers, reflecting a growing security risk. Bitdefender uncover…
  continue reading
 
Abusing DLLs EntryPoint for the Fun DLLs will not just execute code when some of their functions are called, but also as they are loaded. https://isc.sans.edu/diary/Abusing%20DLLs%20EntryPoint%20for%20the%20Fun/32562 Apple Patches Everything: December 2025 Edition Apple released patches for all of its operating systems, fixing two already exploited…
  continue reading
 
Michael Knowles MIC DROP Moments From BAR FIGHT Debates - - - Today’s Sponsor: ExpressVPN - Protect your online privacy today by going to https://ExpressVPN.com/michaelYT and you can get an extra 4 months FREE - - - 🎄✨ LET’S KICK OFF THE CHRISTMAS SALE! ✨🎄 Campaign Dates: 12/10/2025 – 1/5/2026 Bring out the cocoa, cue the carols, and crank up the c…
  continue reading
 
Did Somalians really build America? Michael Knowles breaks down the viral claim sweeping TikTok and X — separating historical fact from political fantasy. In just four minutes, Knowles explains where the narrative came from, what the data actually shows, and why activists keep pushing these revisionist talking points. If you've seen the memes, the …
  continue reading
 
In this episode of Cybersecurity Today, host Jim Love discusses the shocking discovery of over 80,000 leaked credentials and secrets in online code formatting tools with Jake Knott, a principal security researcher from Watchtower. They delve into the vulnerabilities exposed by these tools, the inadvertent leaking of sensitive information, and how a…
  continue reading
 
The AI revolution isn't replacing Java developers. No, it's forcing us to think harder. Welcome to another episode of the Foojay Podcast! Today, we're talking about AI and Java, how it's changing the way we work, what we need to watch out for, and why understanding what's really happening matters more than ever. I recorded interviews at Devoxx and …
  continue reading
 
The labor market has swung from the Great Resignation to “job hugging,” where workers cling to their roles out of fear of AI-driven layoffs and inflation, crushing engagement and accelerating burnout. At the same time, OpenAI is accused of suppressing research showing job losses, ignoring internal warnings about chatbot mental health risks, and ble…
  continue reading
 
"Las fuentes contienen extractos de una discusión de audio en varias partes, aparentemente un podcast o un chat en vivo, donde los oradores exploran temas relacionados con el satanismo, el luciferismo, el ocultismo y el hacking. La conversación se centra fuertemente en las diferencias filosóficas entre estos sistemas de creencias y las religiones t…
  continue reading
 
Loading …

Guida rapida

Ascolta questo spettacolo mentre esplori
Riproduci