Josh and Kurt talk about the recent events around XZ. It's only been a few days, and it's amazing what we already know. We explain a lot of the basics we currently know with the attitude much of these details will change quickly over the coming week. We can't fix this problem as it stands, we don't know where to start yet. But that's not a reason to lose hope. We can fix this if we want to, but it won't be flashy, it'll be hard work.
Show NotesEpisode 427 - Will run0 replace sudo?
Episode 426 - Automatically exploiting CVEs with AI
Episode 425 - Video game cheaters, also pretendo
Episode 424 - The Notepad++ Parasite Website
Episode 423 - FCC cybersecurity label for consumer devices
Episode 422 - Do you have a security.txt file?
Episode 421 - CISA's new SSDF attestation form
Episode 420 - What's going on at NVD
Episode 419 - Malicious GitHub repositories
Episode 418 - Being right all the time is hard
Episode 417 - Linux Kernel security with Greg K-H
Episode 416 - Thomas Depierre on open source in Europe
Episode 415 - Reducing attack surface for less security
Episode 414 - The exploited ecosystem of open source
Episode 413 - PyTorch and NPM get attacked, but it's OK
Episode 412 - Blame the users for bad passwords!
Episode 411 - The security tools that started it all
Episode 410 - Package identifiers are really hard
Episode 409 - You wouldn't hack a train?
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
Black Wolf Feed (Chapo Premium Feed Bootleg)
Bannon`s War Room