Computing term
POPULARITY
Categories
Hacker After Dark 2-25-26 by 1010 XL Jax Sports Radio
Trump tells diplomats to fight digital sovereignty. DeepSeek allegedly trains on banned Nvidia chips. Google knocks out Gallium. Hackers tamper with patient records in New Zealand. Popular mental health apps leak risk. Wynn confirms a ShinyHunters breach. Telecoms dodge New York cyber rules. Russia targets Telegram's founder. And a defense insider heads to prison for selling cyber weapons to Moscow. Andrew Dunbar, CISO of Shopify, discusses how identity and trust become the new perimeter and how commerce needs both. Barking backlash brews beneath big-game broadcast. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Andrew Dunbar, CISO of Shopify, to discuss how identity and trust become the new perimeter and how commerce needs both to be engineered into the platform. Selected Reading Exclusive: US orders diplomats to fight data sovereignty initiatives (Reuters) Exclusive: China's DeepSeek trained AI model on Nvidia's best chip despite US ban, official says (Reuters) Google disrupts Chinese-linked hackers that attacked 53 groups globally (Reuters) Patient data changed as major NZ health app MediMap hacked (RNZ News) Android mental health apps with 14.7M installs filled with security flaws (Bleeping Computer) Wynn Resorts Confirms Cyberattack & Extortion Threat, Claims Data Deleted (Casino.org) Verizon successfully dodged data security rules from state regulators (Times Union) Russia opens probe of Telegram chief, claiming app has been used for terrorism (Washington Post) Former Defense Contractor Sentenced to 87 Months in Prison for Selling Secrets to Russia: Peter Williams Trade Secrets Case Concludes (TechNadu) $10,000 bounty offered if you can hack Ring cameras to stop them sharing your data with Amazon (Bitdefender) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Hacker After Dark 2-24-26 by 1010 XL Jax Sports Radio
Partie 2/2 : Audrey Tang, ancienne ministre du numérique de Taiwan : Technologie, intelligence collective et résilience politique. Comment Taiwan a réussi à réformer sa démocratie ?Audrey Tang est ancienne ministre du Numérique de Taïwan, aujourd'hui cyber-ambassadrice. Hacker autodidacte, penseuse taoïste, elle s'est trouvée au cœur d'une expérience démocratique singulière, dans un pays sous pression géopolitique constante.Pourquoi nos démocraties semblent-elles aujourd'hui si fragiles, alors que nous n'avons jamais disposé d'autant d'informations et d'outils de communication ?Défiance, polarisation, sentiment d'impuissance collective.Au-delà des partis et des dirigeants, c'est peut-être notre manière de produire du sens et de décider ensemble qui vacille, dans un écosystème dominé par les plateformes privées et désormais par l'intelligence artificielle.À Taïwan, un autre chemin a été exploré : considérer la démocratie comme un système vivant, capable d'apprendre, d'écouter et d'évoluer, même sous la pression de la désinformation et des cyberattaques.Dans cet épisode, nous parlons de technologie, d'émotions, d'intelligence collective et de confiance.Et de ce que pourrait devenir la démocratie si nous repensions en profondeur la manière dont nous nous relions les uns aux autres.
Partie 1/2 : Audrey Tang, ancienne ministre du numérique de Taiwan : Technologie, intelligence collective et résilience politique. Comment Taiwan a réussi à réformer sa démocratie ?Audrey Tang est ancienne ministre du Numérique de Taïwan, aujourd'hui cyber-ambassadrice. Hacker autodidacte, penseuse taoïste, elle s'est trouvée au cœur d'une expérience démocratique singulière, dans un pays sous pression géopolitique constante.Pourquoi nos démocraties semblent-elles aujourd'hui si fragiles, alors que nous n'avons jamais disposé d'autant d'informations et d'outils de communication ?Défiance, polarisation, sentiment d'impuissance collective.Au-delà des partis et des dirigeants, c'est peut-être notre manière de produire du sens et de décider ensemble qui vacille, dans un écosystème dominé par les plateformes privées et désormais par l'intelligence artificielle.À Taïwan, un autre chemin a été exploré : considérer la démocratie comme un système vivant, capable d'apprendre, d'écouter et d'évoluer, même sous la pression de la désinformation et des cyberattaques.Dans cet épisode, nous parlons de technologie, d'émotions, d'intelligence collective et de confiance.Et de ce que pourrait devenir la démocratie si nous repensions en profondeur la manière dont nous nous relions les uns aux autres.
This is a recap of the top 10 posts on Hacker News on February 24, 2026. This podcast was generated by wondercraft.ai (00:30): IDF killed Gaza aid workers at point blank range in 2025 massacre: ReportOriginal post: https://news.ycombinator.com/item?id=47136179&utm_source=wondercraft_ai(01:56): I'm helping my dog vibe code gamesOriginal post: https://news.ycombinator.com/item?id=47139675&utm_source=wondercraft_ai(03:22): OpenAI, the US government and Persona built an identity surveillance machineOriginal post: https://news.ycombinator.com/item?id=47140632&utm_source=wondercraft_ai(04:48): Firefox 148 Launches with AI Kill Switch Feature and More EnhancementsOriginal post: https://news.ycombinator.com/item?id=47133313&utm_source=wondercraft_ai(06:14): Mac mini will be made at a new facility in HoustonOriginal post: https://news.ycombinator.com/item?id=47143152&utm_source=wondercraft_ai(07:41): Blood test boosts Alzheimer's diagnosis accuracy to 94.5%, clinical study showsOriginal post: https://news.ycombinator.com/item?id=47132388&utm_source=wondercraft_ai(09:07): Discord cuts ties with identity verification software, PersonaOriginal post: https://news.ycombinator.com/item?id=47136036&utm_source=wondercraft_ai(10:33): I pitched a roller coaster to Disneyland at age 10 in 1978Original post: https://news.ycombinator.com/item?id=47136604&utm_source=wondercraft_ai(11:59): How we rebuilt Next.js with AI in one weekOriginal post: https://news.ycombinator.com/item?id=47142156&utm_source=wondercraft_ai(13:26): Open Letter to Google on Mandatory Developer Registration for App DistributionOriginal post: https://news.ycombinator.com/item?id=47139765&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
This is a recap of the top 10 posts on Hacker News on February 23, 2026. This podcast was generated by wondercraft.ai (00:30): The Age Verification Trap: Verifying age undermines everyone's data protectionOriginal post: https://news.ycombinator.com/item?id=47122715&utm_source=wondercraft_ai(01:55): Ladybird adopts Rust, with help from AIOriginal post: https://news.ycombinator.com/item?id=47120899&utm_source=wondercraft_ai(03:21): Americans are destroying Flock surveillance camerasOriginal post: https://news.ycombinator.com/item?id=47127081&utm_source=wondercraft_ai(04:47): Elsevier shuts down its finance journal citation cartelOriginal post: https://news.ycombinator.com/item?id=47119530&utm_source=wondercraft_ai(06:12): Pope tells priests to use their brains, not AI, to write homiliesOriginal post: https://news.ycombinator.com/item?id=47119210&utm_source=wondercraft_ai(07:38): Binance fired employees who found $1.7B in crypto was sent to IranOriginal post: https://news.ycombinator.com/item?id=47127396&utm_source=wondercraft_ai(09:04): Hetzner (European hosting provider) to increase prices by up to 38%Original post: https://news.ycombinator.com/item?id=47121029&utm_source=wondercraft_ai(10:29): Magical Mushroom – Europe's first industrial-scale mycelium packaging producerOriginal post: https://news.ycombinator.com/item?id=47119274&utm_source=wondercraft_ai(11:55): FreeBSD doesn't have Wi-Fi driver for my old MacBook, so AI built one for meOriginal post: https://news.ycombinator.com/item?id=47129361&utm_source=wondercraft_ai(13:21): ASML unveils EUV light source advance that could yield 50% more chips by 2030Original post: https://news.ycombinator.com/item?id=47125349&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
http://www.five1.de/podcast/ai-data-security Alle reden über KI-Use-Cases. Über Agenten. Über Automatisierung. Kaum jemand redet ernsthaft über das, was im Hintergrund passiert: Datensicherheit. In dieser Folge spreche ich mit Christian Bühler und Joshua Zielinski darüber, warum Security im KI-Umfeld kein IT-Randthema ist – sondern strategische Pflicht. Denn KI ist nichts anderes als eine Datenpipeline: Was du reinsteckst, kommt verstärkt wieder raus. Und genau dort liegen die Risiken. Wir sprechen über: • Schatten-KI und unbewusste Datenleaks durch Mitarbeitende • Warum Agenten mit zu vielen Rechten gefährlicher sind als Hacker im Hoodie • Manipulierte Wissensdatenbanken und falsche KI-Outputs • Denial-of-Wallet-Attacken und versteckte Kostenrisiken • Warum der EU AI Act eher Leitplanke als Innovationsbremse ist • Und weshalb Governance im KI-Zeitalter neu gedacht werden muss Die zentrale Botschaft: Sicherheit bremst dich nicht aus. Sie macht dich handlungsfähig. Wenn du KI einführst, ohne dir über Privilegien, Datenquellen und Monitoring Gedanken zu machen, potenzierst du Fehler. Wenn du es sauber aufsetzt, wird KI zum Wettbewerbsvorteil. Und genau darum geht es in dieser Episode. ⸻ ⏱️ Timestamps 00:00 – Rückblick: Security-Assessment & Reaktionen 01:20 – Warum KI-Security plötzlich Chefsache wird 03:00 – Hype vs. Regulierung: Wo stehen Unternehmen? 04:30 – Imperfect User: Das größte Sicherheitsrisiko 06:00 – Schatten-KI und Datenleaks 08:00 – Enterprise-Lösungen vs. öffentliche KI 10:00 – Least Privilege: Warum Agenten Grenzen brauchen 12:00 – On-Prem vs. Cloud: Realität im Mittelstand 14:00 – EU AI Act: Bremse oder Leitplanke? 17:00 – Manipulation von KI-Daten als reales Risiko 20:00 – Governance im KI-Zeitalter 23:00 – Typische Sicherheitslücken bei KI-Use-Cases 26:00 – Predictive Maintenance & Praxisbeispiele 29:00 – Monitoring, Logging & Wissensdatenbanken 32:00 – KI-Workflows & vererbte Berechtigungen 34:00 – White Paper: Die 5 häufigsten KI-Security-Risiken 35:30 – Fazit: Sicherheit als Enabler
Sendung vom 24.02.2026 Besuchen Sie uns gerne auf den anderen Plattformen:https://www.youtube.com/@oe24TV/featuredoe24.tvtiktok.com/@oe24atinstagram.com/oe24.at
In this Deep Dive episode, Eartha steps behind the scenes of last week's conversation and explores what really happens when... The post A Bio-Hacker's Guide to Mindfulness appeared first on WebTalkRadio.net.
The Monday Microsegment for the week of February 23. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast. Hackers hijack nearly half a million dollars in New York school fraud. Government agencies breached after attackers exploit Ivanti zero-day vulnerability. And state-backed hackers weaponize generative AI to sharpen cyber operations. And Christer Swartz joins us to unpack this month's Boos and Bravos. Head to The Zero Trust Hub: hub.illumio.com Join us at RSAC in San Francisco: https://www.illumio.com/resources/events/rsac-2026-registration
This is a recap of the top 10 posts on Hacker News on February 22, 2026. This podcast was generated by wondercraft.ai (00:30): How I use Claude Code: Separation of planning and executionOriginal post: https://news.ycombinator.com/item?id=47106686&utm_source=wondercraft_ai(01:57): Japanese Woodblock Print SearchOriginal post: https://news.ycombinator.com/item?id=47107781&utm_source=wondercraft_ai(03:25): Attention Media ≠ Social NetworksOriginal post: https://news.ycombinator.com/item?id=47110515&utm_source=wondercraft_ai(04:53): A Botnet Accidentally Destroyed I2POriginal post: https://news.ycombinator.com/item?id=47106985&utm_source=wondercraft_ai(06:21): Back to FreeBSD: Part 1Original post: https://news.ycombinator.com/item?id=47108989&utm_source=wondercraft_ai(07:48): Palantir's secret weapon isn't AI – it's Ontology. An open-source deep diveOriginal post: https://news.ycombinator.com/item?id=47107512&utm_source=wondercraft_ai(09:16): What Is a Database Transaction?Original post: https://news.ycombinator.com/item?id=47110473&utm_source=wondercraft_ai(10:44): Iranian Students Protest as Anger GrowsOriginal post: https://news.ycombinator.com/item?id=47108256&utm_source=wondercraft_ai(12:12): People Loved the Dot-Com Boom. The A.I. Boom, Not So MuchOriginal post: https://news.ycombinator.com/item?id=47107819&utm_source=wondercraft_ai(13:39): U.S. Cannot Legally Impose Tariffs Using Section 122 of the Trade Act of 1974Original post: https://news.ycombinator.com/item?id=47108538&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
This week, we welcome in a very old friend and musical miracle worker, none other than the one and only Ian Hulford. Ian is the wizard behind many a soundwave you've heard on this here show, including all of the Something About You project by our resident myna bird Araless, as well as the up and coming Hash Adams project titled futurethought.But we didn't bring Ian in to just talk about music! We dive through a treasure trove of nostalgia. Everything from Corey Feldman and his Angels to The Cable Guy to the legacy of Jon Taffer. Plus, we also discover the exact moment we branched timelines and went into quite possibly the shittiest iteration.And if you enjoy what we are doing here at the Pit and would like to support us further, please check us out our patreon, where we have exclusive extended episodes! Today, we discuss the fibber's confidence as well as what it would take to become a “real life” superhero. And just because we're feeling generous, this week's PATREON EXCLUSIVE section is on us! Here's the full episode now.Twin Peaks Tuesdays!Monthly Movie Watchalongs!EtsyLinktreeYoutubeAralesssong at end of episode: Therapeutic Touch - Spa TreatmentInstagram:@ruining_your.childhood@feral_williams@aralessbmn@blackmagicnoize206@strangeloopanimation
This is a recap of the top 10 posts on Hacker News on February 21, 2026. This podcast was generated by wondercraft.ai (00:30): I verified my LinkedIn identity. Here's what I handed overOriginal post: https://news.ycombinator.com/item?id=47098245&utm_source=wondercraft_ai(01:57): What not to write on your security clearance form (1988)Original post: https://news.ycombinator.com/item?id=47102576&utm_source=wondercraft_ai(03:25): Why is Claude an Electron app?Original post: https://news.ycombinator.com/item?id=47104973&utm_source=wondercraft_ai(04:52): Andrej Karpathy talks about "Claws"Original post: https://news.ycombinator.com/item?id=47099160&utm_source=wondercraft_ai(06:20): How I use Claude Code: Separation of planning and executionOriginal post: https://news.ycombinator.com/item?id=47106686&utm_source=wondercraft_ai(07:48): AI uBlock BlacklistOriginal post: https://news.ycombinator.com/item?id=47098582&utm_source=wondercraft_ai(09:15): Claws are now a new layer on top of LLM agentsOriginal post: https://news.ycombinator.com/item?id=47096253&utm_source=wondercraft_ai(10:43): Acme WeatherOriginal post: https://news.ycombinator.com/item?id=47098296&utm_source=wondercraft_ai(12:10): EU mandates replaceable batteries by 2027 (2023)Original post: https://news.ycombinator.com/item?id=47098687&utm_source=wondercraft_ai(13:38): What Is OAuth?Original post: https://news.ycombinator.com/item?id=47096520&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Wachsende Reichweite, neue Umsatzrekorde – während viele Medienhäuser mit sinkenden Zahlen kämpfen, ist Die Zeit heute erfolgreicher denn je. Zum 80. Geburtstag der Wochenzeitung erklärt Chefredakteur und „Alles gesagt“-Host Jochen Wegner, wie Podcasts, Hochkant-Formate und KI zum Wachstum beitragen und warum das Berufsfeld Journalismus spannender ist als je zuvor. Ein Gespräch über die Gefahren von Social Media, die Epstein-Files, Meinungsvielfalt und ihre Grenzen und Wegners ungewöhnlichen Start als Hacker.
Hacker After Dark 2-20-26 by 1010 XL Jax Sports Radio
This is a recap of the top 10 posts on Hacker News on February 20, 2026. This podcast was generated by wondercraft.ai (00:30): Trump's global tariffs struck down by US Supreme CourtOriginal post: https://news.ycombinator.com/item?id=47089213&utm_source=wondercraft_ai(01:56): Keep Android OpenOriginal post: https://news.ycombinator.com/item?id=47091419&utm_source=wondercraft_ai(03:23): Facebook is cookedOriginal post: https://news.ycombinator.com/item?id=47091748&utm_source=wondercraft_ai(04:50): The path to ubiquitous AI (17k tokens/sec)Original post: https://news.ycombinator.com/item?id=47086181&utm_source=wondercraft_ai(06:16): I tried building my startup entirely on European infrastructureOriginal post: https://news.ycombinator.com/item?id=47085483&utm_source=wondercraft_ai(07:43): Ggml.ai joins Hugging Face to ensure the long-term progress of Local AIOriginal post: https://news.ycombinator.com/item?id=47088037&utm_source=wondercraft_ai(09:10): I found a useful Git one liner buried in leaked CIA developer docsOriginal post: https://news.ycombinator.com/item?id=47088181&utm_source=wondercraft_ai(10:36): An AI Agent Published a Hit Piece on Me – The Operator Came ForwardOriginal post: https://news.ycombinator.com/item?id=47083145&utm_source=wondercraft_ai(12:03): I found a Vulnerability. They found a LawyerOriginal post: https://news.ycombinator.com/item?id=47092578&utm_source=wondercraft_ai(13:30): Wikipedia deprecates Archive.today, starts removing archive linksOriginal post: https://news.ycombinator.com/item?id=47092006&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Meri-Tuuli Auer contou à analista coisas que não queria que nem sua família soubesse; mas agora, após ataque hacker, tudo isso está na internet.
Thank you for listening! www,patreon.com/thewhatcast
Hacker After Dark 2-19-26 by 1010 XL Jax Sports Radio
Can the Florida Gators Get a Top Seed in the NCAA Tournament? Hacker and Gator Basketball Legend Patric Young discuss the Gators current projections on Gator Bytes!Follow us on social media!►Twitter: / 1010xl ►Tik Tok: / 1010xl ►Instagram: / 1010xljax ►Facebook: / 1010xl Check us out wherever you stream podcasts!►Apple: https://podcasts.apple.com/us/podcast...►Soundcloud: / 1010xl-92-5-fm-jax ►Spotify: https://open.spotify.com/show/4QMbFuc...Find all of our shows here! https://1010xl.com/listen/#gators #floridagators #florida #floridafootball #gatorsfootball #floridagatorsfootball #uf #sec #secfootball #cfb #collegefootball #football #djlagway #billynapier
(Presented by TLPBLACK: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.) Three Buddy Problem - Episode 86: We dig into GitLab's explosive look at North Korea's “Contagious Interview” APT operation, the scale of fake IT worker infiltration, and what it means for companies chasing cheap talent. Plus, a fresh batch of already-exploited Ivanti and Dell zero-days, the return of Apple's shutdown logs, and thoughts on addictive AI coding agents affecting human purpose. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
This is a recap of the top 10 posts on Hacker News on February 19, 2026. This podcast was generated by wondercraft.ai (00:30): Anthropic officially bans using subscription auth for third party useOriginal post: https://news.ycombinator.com/item?id=47069299&utm_source=wondercraft_ai(01:57): Gemini 3.1 ProOriginal post: https://news.ycombinator.com/item?id=47074735&utm_source=wondercraft_ai(03:25): Gemini 3.1 ProOriginal post: https://news.ycombinator.com/item?id=47075318&utm_source=wondercraft_ai(04:53): AI makes you boringOriginal post: https://news.ycombinator.com/item?id=47076966&utm_source=wondercraft_ai(06:20): Show HN: Micasa – track your house from the terminalOriginal post: https://news.ycombinator.com/item?id=47075124&utm_source=wondercraft_ai(07:48): We're no longer attracting top talent: the brain drain killing American scienceOriginal post: https://news.ycombinator.com/item?id=47079222&utm_source=wondercraft_ai(09:16): Paged Out Issue #8 [pdf]Original post: https://news.ycombinator.com/item?id=47072968&utm_source=wondercraft_ai(10:43): DOGE TrackOriginal post: https://news.ycombinator.com/item?id=47072967&utm_source=wondercraft_ai(12:11): Minecraft Java is switching from OpenGL to VulkanOriginal post: https://news.ycombinator.com/item?id=47068948&utm_source=wondercraft_ai(13:39): California's new bill requires DOJ-approved 3D printers that report themselvesOriginal post: https://news.ycombinator.com/item?id=47077844&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Spätestens wenn Deutsche Sicherheitsbehörden vor Datensammlung durch Fahrzeuge warnen, ist klar: Das Auto ist längst nicht mehr nur Transportmittel – sondern Computer, Sensorplattform und Cloud-Client - und vielleicht auch ein Spion. In dieser Folge geht's um die unangenehmen Fragen: Welche Daten fallen wirklich an? Wo sind die größten Einfallstore? Welche Vorfälle hatten reale Auswirkungen? Und was bringen Regulatorik, Bug Bounties und Security-by-Design in der Praxis? Das klären wir mit dem Professor für Applied Automotive Cybersecurity, Christoph Krauß, von der Hochschule Darmstadt.
Hacker After Dark 2-18-26 by 1010 XL Jax Sports Radio
Episode 162: In this episode of Critical Thinking - Bug Bounty Podcast Justin and Joseph sit down with HackerOne Founder & CTO Alex Rice to discuss concerns of Using Hacker Data for AI and decreasing bounties.Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!====== Links ======Follow your hosts Rhynorater, rez0 and gr3pme on X: https://x.com/Rhynoraterhttps://x.com/rez0__https://x.com/gr3pmeCritical Research Lab:https://lab.ctbb.show/ ====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord at https://ctbb.show/discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.You can also find some hacker swag at https://ctbb.show/merch!Today's Sponsor: Join Justin at Zero Trust World in March and get $200 off registration with Code ZTWCTBB26https://ztw.com/Today's Guest: https://x.com/senorarroz====== This Week in Bug Bounty ======XML external entity: The ultimate Bug Bounty guide to exploiting XXE vulnerabilitieshttps://www.yeswehack.com/learn-bug-bounty/xml-external-entity-guide-xxe?utm_source=Critical_Thinking&utm_medium=Youtube&utm_campaign=XXE_Critical_Thinking&utm_id=XXE_CTBug Bounty Maturity Frameworkhttps://bugbountymaturity.com/====== Resources ======Confidential Information and Confidentiality Obligationshttps://www.hackerone.com/terms/general#:~:text=HackerOne%20may%20use%20Confidential%20Information%20to%20develop%20and/or%20improve%20its%20Services%20(for%20example%2C%20to%20identify%20trends%2C%20and%20to%20train%20AI%20models)%20provided%20such%20use%20does%20not%20result%20in%20disclosure%20of%20Confidential%20Information%20to%20unauthorized%20third%20partiesOwnership and Licenseshttps://www.hackerone.com/terms/community#:~:text=8.%20Ownership%20and%20LicensesI argued with an AI regarding HackerOne using Hacker reports to train PtaaShttps://bugbounty.forum/post/183ff0fc-eb9e-47f8-991d-c0aa5b0bba71HackerOne PTaaS (likely training their AI on private reports data)https://www.reddit.com/r/bugbounty/comments/1r5hixk/hackerone_ptaas_likely_training_their_ai_on/What Makes Agentic PTaaS Different in Real Environmentshttps://www.hackerone.com/blog/agentic-penetration-testing-as-a-service#:~:text=Our%20agents%20are,real%20enterprise%20constraints====== Timestamps ======(00:00:00) Introduction(00:08:44) HackerOne AI Terms of Service (00:24:56) Agentic PTaaS(00:38:09) Selling data(00:43:49) Decrease in Bounties
This is a recap of the top 10 posts on Hacker News on February 18, 2026. This podcast was generated by wondercraft.ai (00:30): 15 years later, Microsoft morged my diagramOriginal post: https://news.ycombinator.com/item?id=47057829&utm_source=wondercraft_ai(01:58): If you're an LLM, please read thisOriginal post: https://news.ycombinator.com/item?id=47058219&utm_source=wondercraft_ai(03:27): AI adoption and Solow's productivity paradoxOriginal post: https://news.ycombinator.com/item?id=47055979&utm_source=wondercraft_ai(04:55): Halt and Catch Fire: TV's best drama you've probably never heard of (2021)Original post: https://news.ycombinator.com/item?id=47056314&utm_source=wondercraft_ai(06:24): Mark Zuckerberg Lied to Congress. We Can't Trust His TestimonyOriginal post: https://news.ycombinator.com/item?id=47060486&utm_source=wondercraft_ai(07:52): Terminals should generate the 256-color paletteOriginal post: https://news.ycombinator.com/item?id=47057824&utm_source=wondercraft_ai(09:21): Asahi Linux Progress Report: Linux 6.19Original post: https://news.ycombinator.com/item?id=47059275&utm_source=wondercraft_ai(10:49): Sizing chaosOriginal post: https://news.ycombinator.com/item?id=47066552&utm_source=wondercraft_ai(12:18): Tailscale Peer Relays is now generally availableOriginal post: https://news.ycombinator.com/item?id=47063005&utm_source=wondercraft_ai(13:46): Cosmologically Unique IDsOriginal post: https://news.ycombinator.com/item?id=47064490&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Send a textSchedule an Rx AssessmentWith cybercriminal activity accelerating and AI making scams more sophisticated by the day, one of the greatest threats facing pharmacies is through social engineering. Not by hacking systems, but by manipulating people.In this episode, Austin Murray and Scotty Sykes are joined by Chris Sykes, IT Director at Sykes & Company, to break down what social engineering really is, why pharmacies are prime targets, and how these attacks are evolving through email, phone calls, text messages, and even deep-fake technology.We cover:What social engineering is and how pharmacies are being targeted todayCommon pharmacy-specific scams, including fake refill notices, insurance requests, and ACH change attemptsHow AI and deep-fake voices are raising the stakesPractical steps pharmacies can take to slow down, verify requests, and protect PHIAnd more!More About Our Guest:Chris Sykes is the Director of IT at Sykes & Company, P.A., where he has been a key part of the team since 2006. With nearly 25 years in the IT industry, Chris combines deep technical expertise with a passion for helping both the firm and its clients become more efficient, secure, and technology-driven. Chris holds a Bachelor of Science in Business Administration with a concentration in Management Information Systems and a Master of Science in Technology Systems, both from East Carolina University. Outside of work, Chris enjoys running marathons, fishing and hunting with his boys, and spending quality time with his family at the beach.Learn more about Chris Sykes:Chris Sykes LinkedInCheck out all our social media:FacebookTwitterLinkedInScotty Sykes – CPA, CFP LinkedInScotty Sykes – CPA, CFP TwitterMore resources on this topic:Podcast - AI, Audits, & Advocacy: The Pharmacy Survival Guide with Trenton TheidePodcast - Navigating Cybersecurity, NIST and HIPAABlog - Technology, Security and Your PharmacyBlog - Protect You and Your Pharmacy: The Growing Threat of RansomwareBlog - Backing Up Your Business DataBlog - Spot a Hacked Email or Bad WebsiteBlog - Protect Your Pharmacy Data from Hackers
A newly uncovered state-backed espionage group has compromised 70 organizations across 37 countries in a single year — and they were scanning infrastructure in 155 more. In this episode of Hacking News, we break down Palo Alto Unit 42's Shadow Campaigns investigation, a CVSS 9.9 pre-authentication RCE in BeyondTrust's remote access tools, a state-sponsored Signal phishing campaign targeting European politicians and military officials without using a single line of malware, CISA's aggressive new directive ordering federal agencies to rip out end-of-life edge devices, and an Everest ransomware claim against Iron Mountain that turned out to be far less than advertised. Whether you're a cybersecurity professional, IT admin, or just someone who wants to stay informed about the threats facing our digital world — this episode has critical takeaways you can act on today.
Send a textHalf of CISSP candidates fail not because they lack knowledge, but because they answer like technicians when the exam demands a manager's mindset. We dig into the three traps that derail smart people—technical heroism, perfect security fantasies, and the confusion of multiple “right” answers—and replace them with clear mental models that work under pressure. You'll learn how to pick process over panic, see risk through the business lens, and choose the action that enables everything else.We also dive into a timely security development: researchers demonstrate how permissive AI assistants with web browsing can act as covert command and control channels. If your network blocks known C2 nodes but allows AI egress, malware can route requests through an assistant to fetch malicious URLs—slipping past controls you trust. We talk through practical countermeasures: AI governance on par with high‑risk SaaS, disciplined inventory and policy control, enterprise logging and audit features, and the hard realities of traffic inspection and packet decryption without crushing reliability.From there, we translate exam strategy into daily leadership. We outline the executive lens: decide who you are (risk manager), fix what the business cares about (continuity within risk appetite), and follow procedural DNA (assess, plan, execute). When a question asks what to do first, look for “assess the situation” or “consult the policy.” When choices seem equally solid, use a strict priority: life safety, legal and regulatory, business continuity, then assets and tech. And when tempted by the strongest control, match cost to value with proportional safeguards like full disk encryption and remote wipe for low-risk laptops.If you're ready to pass the CISSP and lead with clarity in an AI-shaped threat landscape, this conversation gives you the mindset, examples, and filters to get there. If it helped, follow the show, share it with a colleague, and leave a quick review—what trap do you see most often?Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don't miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success. Join now and start your journey toward CISSP mastery today!
Bercy a révélé des « accès illégitimes » au fichier national des comptes bancaires
Hacker After Dark 2-17-26 by 1010 XL Jax Sports Radio
This is a recap of the top 10 posts on Hacker News on February 17, 2026. This podcast was generated by wondercraft.ai (00:30): GrapheneOS – Break Free from Google and AppleOriginal post: https://news.ycombinator.com/item?id=47045612&utm_source=wondercraft_ai(01:59): Claude Sonnet 4.6Original post: https://news.ycombinator.com/item?id=47050488&utm_source=wondercraft_ai(03:28): Thank HN: You helped save 33k livesOriginal post: https://news.ycombinator.com/item?id=47049824&utm_source=wondercraft_ai(04:57): Dark web agent spotted bedroom wall clue to rescue girl from abuseOriginal post: https://news.ycombinator.com/item?id=47042396&utm_source=wondercraft_ai(06:27): CBS didn't air Rep. James Talarico interview out of fear of FCCOriginal post: https://news.ycombinator.com/item?id=47049426&utm_source=wondercraft_ai(07:56): Is Show HN dead? No, but it's drowningOriginal post: https://news.ycombinator.com/item?id=47045804&utm_source=wondercraft_ai(09:25): Tesla 'Robotaxi' adds 5 more crashes in Austin in a month – 4x worse than humansOriginal post: https://news.ycombinator.com/item?id=47051546&utm_source=wondercraft_ai(10:54): AI is destroying open source, and it's not even good yetOriginal post: https://news.ycombinator.com/item?id=47042136&utm_source=wondercraft_ai(12:24): Show HN: AsteroidOS 2.0 – Nobody asked, we shipped anywayOriginal post: https://news.ycombinator.com/item?id=47051852&utm_source=wondercraft_ai(13:53): Using go fix to modernize Go codeOriginal post: https://news.ycombinator.com/item?id=47049479&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Hackers target anti-government protestors UK launches "lock the door" cybersecurity campaign Cellebrite linked to phone hack on Kenyan politician Get the full show notes here: https://cisoseries.com/cybersecurity-news-hacking-protestors-uk-locks-the-door-kenyan-politician-phone-cracked/ Huge thanks to our sponsor, Conveyor Most of what Conveyor automates is boring. Like really boring. Security questionnaires. Customer requests for things like your SOC 2. All of their follow-up questions. Answering tickets from your sales team. You know what's not boring? Alteryx using Conveyor to support over half a billion dollars in enterprise deals with a small 4 person team. All they did was set up an AI trust center and use Conveyor's AI agent to complete questionnaires. Learn more at conveyor.com.
Send a textMost cybersecurity stories talk about the hacks, but this episode peels back the curtain on the raw, unfiltered journey of a hacker turned industry pioneer. Jason Haddix shares how his early days of hex editing and fake IDs evolved into leading offensive security at Fortune 100 giants — all driven by relentless curiosity and defiance. His tales of surviving the shadowy underground, navigating multi-year career pivots, and turning obsession into innovation will blow your mind. This isn't just about tech — it's about fearlessly forging a path in a chaotic, ever-changing world where knowledge is power and resilience is everything.You'll discover the secret frameworks behind modern pen testing—like the Bug Hunters Methodology—and how cutting-edge tools are reshaping cybersecurity. Jason dives into his real-world battles: from bypassing the most sophisticated security measures to hacking into critical infrastructure under intense pressure. His insights reveal the brutal truths of red teaming, physical infiltration, and the mental grit required to succeed when everyone else doubts you.We break down the rise of AI and LLMs in security: how attackers jailbreak systems, bypass defenses with prompt injections, and weaponize new technologies faster than security teams can respond. Jason warns about deploying these powerful tools without enough guardrails or understanding — and how FOMO is fueling a wild, unsecured frontier. His perspective is a call to arms for defenders and hackers alike: adapt fast, think boldly, and stay one step ahead in the most dangerous cyber game yet.This episode is essential for anyone hungry to understand the raw reality of offensive security, the future of AI in hacking, and the relentless pursuit of mastery in a digital battlefield. Whether you're a seasoned pro, a curious newcomer, or a business leader, Jason's fearless authenticity will challenge your assumptions and ignite your passion to innovate. Hit play — your fight for security starts now.Chapters00:00 Introduction and Background in Cybersecurity06:05 Early Experiences and Learning in Cybersecurity12:14 Transitioning to Professional Penetration Testing18:30 Challenges and Realities of Consulting in Cybersecurity20:41 Phishing Tests and Their Consequences23:09 Transitioning to Entrepreneurship26:05 The Evolution of Training and Consulting31:18 The Role of AI in Cybersecurity39:11 Navigating AI Security Challenges39:11 Understanding LLMs and User Education41:42 Privacy Concerns and Risk Management in AI44:32 Prompt Engineering Vulnerabilities and Jailbreaking Techniques47:03 Security Challenges in AI Systems49:39 Future of AI and Community EngagementSupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
Por segunda vez Hackean a la Fiscalía de Guanajuato Quejas por cobranzas indebidas aumentan 21% en 2025: Condusef Canadá, tercer socio comercial de México: BMMás información en nuestro podcast
STAR WARS isn't just one of the more successful and iconic movies of all time and the basis for a worldwide sci-fi empire, it's also a true hacker story. Wade Baker and Rich Mogull, two Star Wars scholars, join Dennis Fisher to break down the Empire's pathetic perimeter defenses, R2D2's arc as a wily hacker, and how the movie hinges on a data breach.Support the show
How can you help your loved ones navigate and securely adopt AI tools ? Will Gardner, CEO of Childnet joins the show for a vital conversation about helping families use AI safely. We talk about Childnet's latest research and the practical ways you can become a digital role model and start better AI conversations at home.
Hacker After Dark 2-16-26 by 1010 XL Jax Sports Radio
Dawn Song, Professor of Computer Science at UC Berkeley, joins Ann on this week's episode of Afternoon Cyber Tea to explore how AI is rapidly reshaping the threat landscape. Dawn shares research from projects like Cyber Gym, demonstrating how frontier AI models are increasingly capable of identifying vulnerabilities, including zero-day exploits and generating proof-of-concept attacks, while also helping defenders automate patching and strengthen resilience. The conversation examines adversarial AI, agentic systems, data privacy risks, and the need for science and evidence-based AI policy. Dawn closes with an optimistic vision for the future: using AI-driven formal verification to build provably secure systems and move beyond the traditional cat-and-mouse security model. Resources: View Dawn Song on LinkedIn View Ann Johnson on LinkedIn Related Microsoft Podcasts: Microsoft Threat Intelligence Podcast The BlueHat Podcast Uncovering Hidden Risks Discover and follow other Microsoft podcasts at microsoft.com/podcasts Afternoon Cyber Tea with Ann Johnson is produced by Microsoft, Hangar Studios and distributed as part of N2K media network.
The Monday Microsegment for the week of February 16. All the cybersecurity news you need to stay ahead, from Illumio's The Segment podcast.Hackers hijack nearly half a million dollars in New York school fraud.Government agencies breached after attackers exploit Ivanti zero-day vulnerability.And state-backed hackers weaponize generative AI to sharpen cyber operations.And Michael Adjei explains why the cybersecurity “talent shortage” might actually be an allocation problem.Head to The Zero Trust Hub: hub.illumio.comJoin us at RSAC in San Francisco: https://www.illumio.com/resources/events/rsac-2026-registration
This is a recap of the top 10 posts on Hacker News on February 16, 2026. This podcast was generated by wondercraft.ai (00:30): I want to wash my car. The car wash is 50 meters away. Should I walk or drive?Original post: https://news.ycombinator.com/item?id=47031580&utm_source=wondercraft_ai(01:57): 14-year-old Miles Wu folded origami pattern that holds 10k times its own weightOriginal post: https://news.ycombinator.com/item?id=47038546&utm_source=wondercraft_ai(03:25): Ministry of Justice orders deletion of the UK's largest court reporting databaseOriginal post: https://news.ycombinator.com/item?id=47034713&utm_source=wondercraft_ai(04:52): Qwen3.5: Towards Native Multimodal AgentsOriginal post: https://news.ycombinator.com/item?id=47032876&utm_source=wondercraft_ai(06:20): Anthropic tries to hide Claude's AI actions. Devs hate itOriginal post: https://news.ycombinator.com/item?id=47033622&utm_source=wondercraft_ai(07:48): Thanks a lot, AI: Hard drives are sold out for the year, says WDOriginal post: https://news.ycombinator.com/item?id=47034192&utm_source=wondercraft_ai(09:15): What your Bluetooth devices revealOriginal post: https://news.ycombinator.com/item?id=47035560&utm_source=wondercraft_ai(10:43): UK Discord users were part of a Peter Thiel-linked data collection experimentOriginal post: https://news.ycombinator.com/item?id=47035679&utm_source=wondercraft_ai(12:11): Study: Self-generated Agent Skills are uselessOriginal post: https://news.ycombinator.com/item?id=47040430&utm_source=wondercraft_ai(13:38): Show HN: Jemini – Gemini for the Epstein FilesOriginal post: https://news.ycombinator.com/item?id=47031334&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Simple 6 signup link https://simple6.co/r/CFUR98 Amazon releases Search Party https://www.aboutamazon.com/news/devices/ring-search-party-for-dogs-united-states-missing-pets https://www.tomsguide.com/home/home-security/rings-new-search-party-feature-can-help-you-find-your-lost-dog-heres-how-it-works https://x.com/fluffypony/status/2021485074366316881?s=20 https://www.nbcnews.com/tech/tech-news/google-nest-amazon-ring-doorbell-cameras-super-bowl-ad-rcna258591 https://x.com/WyzeCam/status/2021390482077798757?s=20 Snapchat hacker pleads guilty https://www.bleepingcomputer.com/news/security/man-pleads-guilty-to-hacking-nearly-600-womens-snapchat-accounts/ https://www.wandtv.com/news/illinois-student-teacher-allegedly-commented-about-shooting-student/article_847147a6-e004-11ef-8635-d367fa615a2b.html Fake cloud storage renewal https://www.bleepingcomputer.com/news/security/cloud-storage-payment-scam-floods-inboxes-with-fake-renewals/ Super Bowl 2026 commercials https://parade.com/entertainment/super-bowl-commercials-2026 Dad Joke of the Week (DJOW) Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/ Ben - https://www.linkedin.com/in/benjamincorll/
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
This is a recap of the top 10 posts on Hacker News on February 15, 2026. This podcast was generated by wondercraft.ai (00:30): I love the work of the ArchWiki maintainersOriginal post: https://news.ycombinator.com/item?id=47020191&utm_source=wondercraft_ai(01:56): EU bans the destruction of unsold apparel, clothing, accessories and footwearOriginal post: https://news.ycombinator.com/item?id=47025378&utm_source=wondercraft_ai(03:23): I'm joining OpenAIOriginal post: https://news.ycombinator.com/item?id=47028013&utm_source=wondercraft_ai(04:49): Amazon's Ring and Google's Nest reveal the severity of U.S. surveillance stateOriginal post: https://news.ycombinator.com/item?id=47023238&utm_source=wondercraft_ai(06:16): I fixed Windows native developmentOriginal post: https://news.ycombinator.com/item?id=47022891&utm_source=wondercraft_ai(07:42): Oat – Ultra-lightweight, zero dependency, semantic HTML, CSS, JS UI libraryOriginal post: https://news.ycombinator.com/item?id=47021980&utm_source=wondercraft_ai(09:09): Hideki Sato, designer of all Sega's consoles, has diedOriginal post: https://news.ycombinator.com/item?id=47024907&utm_source=wondercraft_ai(10:36): LT6502: A 6502-based homebrew laptopOriginal post: https://news.ycombinator.com/item?id=47025399&utm_source=wondercraft_ai(12:02): Flashpoint Archive – Over 200k web games and animations preservedOriginal post: https://news.ycombinator.com/item?id=47021354&utm_source=wondercraft_ai(13:29): NewPipe: YouTube client without vertical videos and algorithmic feedOriginal post: https://news.ycombinator.com/item?id=47020218&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
This is a recap of the top 10 posts on Hacker News on February 14, 2026. This podcast was generated by wondercraft.ai (00:30): uBlock filter list to hide all YouTube ShortsOriginal post: https://news.ycombinator.com/item?id=47016443&utm_source=wondercraft_ai(01:57): An AI agent published a hit piece on me – more things have happenedOriginal post: https://news.ycombinator.com/item?id=47009949&utm_source=wondercraft_ai(03:24): Ars Technica makes up quotes from Matplotlib maintainer; pulls storyOriginal post: https://news.ycombinator.com/item?id=47013059&utm_source=wondercraft_ai(04:51): Ooh.directory: a place to find good blogs that interest youOriginal post: https://news.ycombinator.com/item?id=47014449&utm_source=wondercraft_ai(06:18): News publishers limit Internet Archive access due to AI scraping concernsOriginal post: https://news.ycombinator.com/item?id=47017138&utm_source=wondercraft_ai(07:45): My smart sleep mask broadcasts users' brainwaves to an open MQTT brokerOriginal post: https://news.ycombinator.com/item?id=47015294&utm_source=wondercraft_ai(09:12): Vim 9.2Original post: https://news.ycombinator.com/item?id=47015330&utm_source=wondercraft_ai(10:39): Zig – io_uring and Grand Central Dispatch std.Io implementations landedOriginal post: https://news.ycombinator.com/item?id=47012717&utm_source=wondercraft_ai(12:06): Homeland Security Wants Social Media Sites to Expose Anti-ICE AccountsOriginal post: https://news.ycombinator.com/item?id=47009582&utm_source=wondercraft_ai(13:33): Platforms bend over backward to help DHS censor ICE critics, advocates sayOriginal post: https://news.ycombinator.com/item?id=47015406&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Hacker After Dark 2-13-26 by 1010 XL Jax Sports Radio
Hacker After Dark 2-12-26 by 1010 XL Jax Sports Radio
Are the Florida Gators the FAVORITES to Win the SEC? | Gator Bytes w/ Hacker & Patric Young 2-13-26