Player FM - Internet Radio Done Right
99 subscribers
Checked 16h ago
Lagt til three år siden
Treść dostarczona przez Risky.biz. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Risky.biz lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Player FM - aplikacja do podcastów
Przejdź do trybu offline z Player FM !
Przejdź do trybu offline z Player FM !
Podcasty warte posłuchania
SPONSOROWANY
T
TechSurge: Deep Tech VC Podcast


1 Understanding the Elegant Math Behind Modern Machine Learning 1:14:43
1:14:43
Na później
Na później
Listy
Polub
Polubione1:14:43
Artificial intelligence is evolving at an unprecedented pace—what does that mean for the future of technology, venture capital, business, and even our understanding of ourselves? Award-winning journalist and writer Anil Ananthaswamy joins us for our latest episode to discuss his latest book Why Machines Learn: The Elegant Math Behind Modern AI . Anil helps us explore the journey and many breakthroughs that have propelled machine learning from simple perceptrons to the sophisticated algorithms shaping today’s AI revolution, powering GPT and other models. The discussion aims to demystify some of the underlying math that powers modern machine learning to help everyone grasp this technology impacting our lives, even if your last math class was in high school. Anil walks us through the power of scaling laws, the shift from training to inference optimization, and the debate among AI’s pioneers about the road to AGI—should we be concerned, or are we still missing key pieces of the puzzle? The conversation also delves into AI’s philosophical implications—could understanding how machines learn help us better understand ourselves? And what challenges remain before AI systems can truly operate with agency? If you enjoy this episode, please subscribe and leave us a review on your favorite podcast platform. Sign up for our newsletter at techsurgepodcast.com for exclusive insights and updates on upcoming TechSurge Live Summits. Links: Read Why Machines Learn, Anil’s latest book on the math behind AI https://www.amazon.com/Why-Machines-Learn-Elegant-Behind/dp/0593185749 Learn more about Anil Ananthaswamy’s work and writing https://anilananthaswamy.com/ Watch Anil Ananthaswamy’s TED Talk on AI and intelligence https://www.ted.com/speakers/anil_ananthaswamy Discover the MIT Knight Science Journalism Fellowship that shaped Anil’s AI research https://ksj.mit.edu/ Understand the Perceptron, the foundation of neural networks https://en.wikipedia.org/wiki/Perceptron Read about the Perceptron Convergence Theorem and its significance https://www.nature.com/articles/323533a0…
Risky Bulletin
Oznacz wszystkie jako (nie)odtworzone ...
Manage series 3343211
Treść dostarczona przez Risky.biz. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Risky.biz lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
672 odcinków
Oznacz wszystkie jako (nie)odtworzone ...
Manage series 3343211
Treść dostarczona przez Risky.biz. Cała zawartość podcastów, w tym odcinki, grafika i opisy podcastów, jest przesyłana i udostępniana bezpośrednio przez Risky.biz lub jego partnera na platformie podcastów. Jeśli uważasz, że ktoś wykorzystuje Twoje dzieło chronione prawem autorskim bez Twojej zgody, możesz postępować zgodnie z procedurą opisaną tutaj https://pl.player.fm/legal.
Regular cybersecurity news updates from the Risky Business team...
…
continue reading
672 odcinków
Tutti gli episodi
×
1 Risky Bulletin: Research turns any Bluetooth device into an AirTag 5:54
5:54
Na później
Na później
Listy
Polub
Polubione5:54
Researchers turn any Bluetooth device into an AirTag tracker, VMware patches three ESXi zero-days, France debates encryption backdoors, and a fifth of the stolen Bybit funds are now untraceable. Show notes

1 RBTALKS6: Will Thomas on the Black Basta leaks 25:06
25:06
Na później
Na później
Listy
Polub
Polubione25:06
In this Risky Business Talks interview we invited Will Thomas to talk about the recent leak of internal chats from the Black Basta ransomware group. Will is a SANS Instructor, co-author of the SANS FOR589 course, and the co-founder of a community research project for CTI analysts called Curated Intelligence. Will walks us through the Black Basta leak and uses the group’s attack on US healthcare provider Ascension to break down how the gang operated. Show notes Risky Bulletin: BlackBasta implodes, internal chats leak online BlackBasta’s internal chats just got exposed BlackBasta Chat Logs BlackBastaGPT BlackBasta Leaks: Lessons from the Ascension Health attack Inside the Black Basta Leak: How Ransomware Operators Gain Access…

1 Between Two Nerds: NSA's 9 to 5 hacking campaign 35:29
35:29
Na później
Na później
Listy
Polub
Polubione35:29
In this edition of Between Two Nerds Tom Uren and The Grugq take a deep dive into incident response reports from Chinese cybersecurity firms that attribute the hack of one of the country’s top seven defence universities to the US National Security Agency. These reports were collated and translated into English by the security researcher known as Inversecos (https://x.com/inversecos). This episode is also available on Youtube . Show notes NSA (Equation Group) TTPs from a Chinese lens Northwestern Polytechnical University at the China Defence Universities tracker Risky Business podcast discussion with Inversecos…

1 Risky Bulletin: Trump admin halts Russia cyber operations 7:33
7:33
Na później
Na później
Listy
Polub
Polubione7:33
The Trump administration stops treating Russian hackers as a threat, Meta seeks a permanent NSO injunction, new Cellebrite zero-days come to light, and big name Russian cyber criminals get … home detention. Show notes

1 Sponsored: Prowler on the Open Cloud Security Movement 13:53
13:53
Na później
Na później
Listy
Polub
Polubione13:53
In this Risky Business News sponsor interview, Catalin Cimpanu talks with Toni de la Fuente, founder and CEO of cloud security firm Prowler. Toni talks about his company’s latest effort, the Open Cloud Security Movement, an initiative to get more cloud security vendors to open-source their core projects. Show notes Open Cloud Security Prowler on Github Risky Biz Product demo: Prowler, the free and open source cloud security platform…

1 Risky Bulletin: Cellebrite fires Serbia as a customer 6:44
6:44
Na później
Na później
Listy
Polub
Polubione6:44
Cellebrite bans Serbia from using its products, Chinese hackers breached the Belgian security service, the Republican National Committee hid a Chinese hack and Microsoft removes malicious extensions from the VSCode Marketplace. Show notes

1 Srsly Risky Biz: Canada's expulsion from Five Eyes would be a disaster 24:18
24:18
Na później
Na później
Listy
Polub
Polubione24:18
Tom Uren and Patrick Gray talk about the White House apparently considering kicking Canada out of the Five Eyes intelligence alliance to apply pressure on the country. It’s a terrible idea and even thinking about it undermines the strength of the alliance. They also discuss Sweden’s proposed legislation that would order apps like WhatsApp and Signal to store messages so they could be provided under warrant to authorities. The story is a vignette of the ongoing encryption debate, but we think apps like Signal will leave the country rather than comply. Finally, they talk about how the illicit cryptocurrency ecosystem is evolving in response to government action such as takedowns and sanctions. This episode is also available on Youtube . Show notes…

1 Risky Bulletin: Signal threatens to leave Sweden over backdoor request 6:59
6:59
Na później
Na później
Listy
Polub
Polubione6:59
Signal threatens to leave Sweden over backdoor request, the EU sanctions a North Korean general linked to two APTs, Australia bans Kaspersky products on government systems and Google will use QR codes for Gmail authentication. Show notes

1 Between Two Nerds: Hacking's first principles 29:52
29:52
Na później
Na później
Listy
Polub
Polubione29:52
In this edition of Between Two Nerds Tom, Uren and The Grugq examine the fundamental principles of network exploitation as described in Matthew Monte’s ‘Network Attacks and Exploitation: A Framework’ book using recent hacks as case studies. This episode is also available on Youtube . Show notes Network Attacks and Exploitation: A Framework Google's Signal hacking report Device code phishing…

1 Risky Bulletin: North Korean hackers steal $1.5 billion from Bybit 6:56
6:56
Na później
Na później
Listy
Polub
Polubione6:56
North Korean hackers steal one and a half billion dollars from Bybit, Apple disables iCloud backup encryption in the UK, stream-jacking hits the e-sports world and Palau faces its third ransomware attack in six years. Show notes

1 Sponsored: Nucleus Security on asset correlation and asset linking 12:23
12:23
Na później
Na później
Listy
Polub
Polubione12:23
In this Risky Business News sponsor interview, Catalin Cimpanu talks with Aaron Attarzadeh, Enterprise Security Engineer at Nucleus. Aaron goes into new concepts for the vulnerability management scene, such as asset correlation and asset linking. Show notes

1 Risky Bulletin: BlackBasta implodes, internal chats leak online 6:00
6:00
Na później
Na później
Listy
Polub
Polubione6:00
The BlackBasta ransomware group implodes, Russian military hackers target Signal with QR codes, Microsoft patches a Power Pages zero-day, and Meta sues a man who hacked accounts and extorted users. Show notes

1 Srsly Risky Biz: Why America needs its own Salt Typhoon 21:01
21:01
Na później
Na później
Listy
Polub
Polubione21:01
In this podcast Tom Uren and Patrick Gray talk about the idea of launching a retaliatory campaign to hack Chinese telcos in response to Salt Typhoon’s targeting of US ones. US Senator Mark Warner floated the idea as a way to persuade the Chinese government to pull back Salt Typhoon, but we think that kind of campaign has merit regardless. They also discuss how Samoa’s CERT calling out APT40 is a big deal. It’s striking to see a small country of 200,000 people calling out Chinese hacking. This episode is also available on Youtube . Show notes…

1 Risky Bulletin: Insight Partners discloses security breach 4:16
4:16
Na później
Na później
Listy
Polub
Polubione4:16
VC giant Insight Partners gets social engineered, OpenSSH patches an attacker-in-the-middle bug, Ecuador’s parliament hit by cyberattacks, and a Monero zero-day awaits a patch. Show notes

1 Between Two Nerds: Is 39 vulnerabilities a lot? 30:04
30:04
Na później
Na później
Listy
Polub
Polubione30:04
In this edition of Between Two Nerds Tom Uren and The Grugq talk about the United State’s Vulnerabilities Equities Program, which balances the need for intelligence collection with the need to protect the public. The government recently revealed that in 2023 it released 39 vulnerabilities, but what does this really tell us? This episode is also available on Youtube . Show notes The unclassified VEP appendix Kim Zetter's Zero Day substack…
Zapraszamy w Player FM
Odtwarzacz FM skanuje sieć w poszukiwaniu wysokiej jakości podcastów, abyś mógł się nią cieszyć już teraz. To najlepsza aplikacja do podcastów, działająca na Androidzie, iPhonie i Internecie. Zarejestruj się, aby zsynchronizować subskrypcje na różnych urządzeniach.