<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Tue, 21 Apr 2026 20:17:32 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>PodRocket - Episodes Tagged with “Security”</title>
    <link>https://podrocket.logrocket.com/tags/security</link>
    <pubDate>Tue, 16 Dec 2025 08:00:00 -0500</pubDate>
    <description>PodRocket covers everything you need to know about frontend web development on a weekly basis. Join our hosts as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>A web development podcast from LogRocket</itunes:subtitle>
    <itunes:author>LogRocket</itunes:author>
    <itunes:summary>PodRocket covers everything you need to know about frontend web development on a weekly basis. Join our hosts as they interview experienced developers about all the libraries, frameworks, and tech industry issues they deal with every day.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>front-end, web development, front-end development, frontend development, tech, </itunes:keywords>
    <itunes:owner>
      <itunes:name>LogRocket</itunes:name>
      <itunes:email>elizabeth.becz@logrocket.com</itunes:email>
    </itunes:owner>
<itunes:category text="Technology"/>
<item>
  <title>React got hacked with David Mytton</title>
  <link>http://podrocket.logrocket.com/react2shell-javascript-security-wake-up-call-david-mytton</link>
  <guid isPermaLink="false">7c2d0dc8-3318-4c56-a5c6-6f82972df765</guid>
  <pubDate>Tue, 16 Dec 2025 08:00:00 -0500</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/7c2d0dc8-3318-4c56-a5c6-6f82972df765.mp3" length="92777567" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>In this episode, Noel sits down with David Mytton, founder and CEO of Arcjet, to unpack the React2Shell vulnerability and why it became such a serious remote code execution risk for apps using React server components and Next.js. They explain how server-side features introduced in React 19 changed the attack surface, why cloud providers leaned on WAF mitigation instead of instant patching, and what this incident reveals about modern JavaScript supply chain risk. The conversation also covers dependency sprawl, rushed patches, and why security as a feature needs to start long before production.</itunes:subtitle>
  <itunes:duration>37:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/7/7c2d0dc8-3318-4c56-a5c6-6f82972df765/cover.jpg?v=1"/>
  <description>In this episode, Noel sits down with David Mytton, founder and CEO of Arcjet, to unpack the React2Shell vulnerability and why it became such a serious remote code execution risk for apps using React server components and Next.js. They explain how server-side features introduced in React 19 changed the attack surface, why cloud providers leaned on WAF mitigation instead of instant patching, and what this incident reveals about modern JavaScript supply chain risk. The conversation also covers dependency sprawl, rushed patches, and why security as a feature needs to start long before production.
Links
X: https://x.com/davidmytton
Blog: https://davidmytton.blog
Resources
Multiple Threat Actors Exploit React2Shell: https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182
We want to hear from you!
How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?
Fill out our listener survey (https://t.co/oKVAEXipxu)! https://t.co/oKVAEXipxu
Let us know by sending an email to our producer, Elizabeth, at elizabeth.becz@logrocket.com (mailto:elizabeth.becz@logrocket.com), or tweet at us at PodRocketPod (https://twitter.com/PodRocketpod).
Check out our newsletter (https://blog.logrocket.com/the-replay-newsletter/)! https://blog.logrocket.com/the-replay-newsletter/
Follow us. Get free stickers.
Follow us on Apple Podcasts, fill out this form (https://podrocket.logrocket.com/get-podrocket-stickers), and we’ll send you free PodRocket stickers!
What does LogRocket do?
LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. Try LogRocket for free today. (https://logrocket.com/signup/?pdr)
Chapters
</description>
  <itunes:keywords>React to Shell vulnerability, React2Shell, React2Shell vulnerability, Reactor Shell vulnerability, React security, React 19, Next.js security, Next.js 15, Next.js 14, Next.js 13, React server components, server functions, server actions, remote code execution, environment variables, crypto miners, data exfiltration, internal infrastructure requests, web application firewall, WAF mitigation, supply chain issues, npm supply chain attacks, Shai-Hulud attacks, dependency tree explosion, dependency updates, semantic versioning, npm install scripts, npm ci, package-lock, GitHub security alerts, Socket security tool, Vercel, Netlify, AWS, Google Cloud, Cloudflare, runtime mitigations, bug bounty program, dev containers, password manager secrets, outbound firewall, secure by design, security as a feature</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode, Noel sits down with David Mytton, founder and CEO of Arcjet, to unpack the React2Shell vulnerability and why it became such a serious remote code execution risk for apps using React server components and Next.js. They explain how server-side features introduced in React 19 changed the attack surface, why cloud providers leaned on WAF mitigation instead of instant patching, and what this incident reveals about modern JavaScript supply chain risk. The conversation also covers dependency sprawl, rushed patches, and why security as a feature needs to start long before production.</p>

<h3>Links</h3>

<p>X: <a href="https://x.com/davidmytton" rel="nofollow">https://x.com/davidmytton</a><br>
Blog: <a href="https://davidmytton.blog" rel="nofollow">https://davidmytton.blog</a></p>

<h3>Resources</h3>

<p>Multiple Threat Actors Exploit React2Shell: <a href="https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182" rel="nofollow">https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182</a></p>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p><strong>Fill out our <a href="https://t.co/oKVAEXipxu" rel="nofollow">listener survey</a>!</strong> <a href="https://t.co/oKVAEXipxu" rel="nofollow">https://t.co/oKVAEXipxu</a></p>

<p>Let us know by sending an email to our producer, Elizabeth, at <a href="mailto:elizabeth.becz@logrocket.com" rel="nofollow">elizabeth.becz@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<p><strong>Check out our <a href="https://blog.logrocket.com/the-replay-newsletter/" rel="nofollow">newsletter</a>!</strong> <a href="https://blog.logrocket.com/the-replay-newsletter/" rel="nofollow">https://blog.logrocket.com/the-replay-newsletter/</a></p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p>

<h3>Chapters</h3>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode, Noel sits down with David Mytton, founder and CEO of Arcjet, to unpack the React2Shell vulnerability and why it became such a serious remote code execution risk for apps using React server components and Next.js. They explain how server-side features introduced in React 19 changed the attack surface, why cloud providers leaned on WAF mitigation instead of instant patching, and what this incident reveals about modern JavaScript supply chain risk. The conversation also covers dependency sprawl, rushed patches, and why security as a feature needs to start long before production.</p>

<h3>Links</h3>

<p>X: <a href="https://x.com/davidmytton" rel="nofollow">https://x.com/davidmytton</a><br>
Blog: <a href="https://davidmytton.blog" rel="nofollow">https://davidmytton.blog</a></p>

<h3>Resources</h3>

<p>Multiple Threat Actors Exploit React2Shell: <a href="https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182" rel="nofollow">https://cloud.google.com/blog/topics/threat-intelligence/threat-actors-exploit-react2shell-cve-2025-55182</a></p>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p><strong>Fill out our <a href="https://t.co/oKVAEXipxu" rel="nofollow">listener survey</a>!</strong> <a href="https://t.co/oKVAEXipxu" rel="nofollow">https://t.co/oKVAEXipxu</a></p>

<p>Let us know by sending an email to our producer, Elizabeth, at <a href="mailto:elizabeth.becz@logrocket.com" rel="nofollow">elizabeth.becz@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<p><strong>Check out our <a href="https://blog.logrocket.com/the-replay-newsletter/" rel="nofollow">newsletter</a>!</strong> <a href="https://blog.logrocket.com/the-replay-newsletter/" rel="nofollow">https://blog.logrocket.com/the-replay-newsletter/</a></p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p>

<h3>Chapters</h3>]]>
  </itunes:summary>
</item>
<item>
  <title>Google’s antitrust win, AI mandates, npm attacks and robots.txt</title>
  <link>http://podrocket.logrocket.com/googles-antitrust-win-ai-mandates-npm-attacks-robots-txt</link>
  <guid isPermaLink="false">94e1df24-d1a0-4ea1-983d-0b3085486c50</guid>
  <pubDate>Thu, 25 Sep 2025 08:00:00 -0400</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/94e1df24-d1a0-4ea1-983d-0b3085486c50.mp3" length="98837888" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>Is the web breaking under the weight of AI crawlers, platform consolidation, and nonstop security breaches? We dive into the state of browsers, developer burnout, and whether tech regulation can actually keep up.

In this panel discussion:

* We debate if robots.txt and AI licensing standards like RSL can realistically control how AI scrapes the web.

* The fallout from DIA’s acquisition by Atlassian and what it means for indie browser innovation in a Chromium-dominated world.

* Why Google’s antitrust victory might embolden other tech giants, and what that means for competition.

* How supply chain attacks like the NPM malware and Shai Hulud worm are exploiting GitHub workflows and package vulnerabilities.

* The pushback against AI mandates at work, including Coinbase’s controversial policy requiring developers to use Copilot.</itunes:subtitle>
  <itunes:duration>41:10</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/9/94e1df24-d1a0-4ea1-983d-0b3085486c50/cover.jpg?v=1"/>
  <description>Is the web breaking under the weight of AI crawlers, platform consolidation, and nonstop security breaches? We dive into the state of browsers, developer burnout, and whether tech regulation can actually keep up.
In this panel discussion:
We debate if robots.txt and AI licensing standards like RSL can realistically control how AI scrapes the web.
The fallout from DIA’s acquisition by Atlassian and what it means for indie browser innovation (like the Helium browser, Zen) in a Chromium-dominated world.
Why Google’s antitrust victory might embolden other tech giants, and what that means for competition.
How supply chain attacks like the NPM malware and Shai Hulud worm are exploiting GitHub workflows and package vulnerabilities.
The pushback against AI mandates at work, including Coinbase’s controversial policy requiring developers to use Copilot.
Resources
Inside the battle for the future of the web: https://www.businessinsider.com/google-microsoft-openai-fight-standards-limit-ai-access-websites-2025-9 
The web has a new system for making AI companies pay up: https://www.theverge.com/news/775072/rsl-standard-licensing-ai-publishing-reddit-yahoo-medium 
The Browser Company, maker of Arc and Dia, is being acquired: https://www.theverge.com/web/770947/browser-company-arc-dia-acquired-atlassian 
Google stock jumps 8% after search giant avoids worst-case penalties in antitrust case: https://www.cnbc.com/2025/09/02/google-antitrust-search-ruling.html 
Massive data breach sees 16 million PayPal accounts leaked online - here's what we know, and how to stay safe:https://www.techradar.com/pro/massive-data-breach-sees-16-million-paypal-accounts-leaked-online-heres-what-we-know-and-how-to-stay-safe 
PayPal’s Glitch Puts €10 Billion on Ice Across European Banks: https://fintechnews.ch/payments/paypal-glitch-freezes-european-banks-10-billion-transactions/77974/ 
npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack: https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack
Compromised files replace npm packages with a combined 2 billion weekly downloads: https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads 
Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing Malware: https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack 
Coinbase CEO explains why he fired engineers who didn’t try AI immediately: https://techcrunch.com/2025/08/22/coinbase-ceo-explains-why-he-fired-engineers-who-didnt-try-ai-immediately/ 
Chapters
We want to hear from you!
How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?
Fill out our listener survey (https://t.co/oKVAEXipxu)! 
Let us know by sending an email to our producer, Elizabeth, at elizabet.becz@logrocket.com (mailto:elizabeth.becz@logrocket.com), or tweet at us at PodRocketPod (https://twitter.com/PodRocketpod).
Follow us. Get free stickers.
Follow us on Apple Podcasts, fill out this form (https://podrocket.logrocket.com/get-podrocket-stickers), and we’ll send you free PodRocket stickers!
What does LogRocket do?
LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. Try LogRocket for free today. (https://logrocket.com/signup/?pdr) 
</description>
  <itunes:keywords>Helium browser, AI training crawlers, robots.txt enforcement, AI content licensing, browser consolidation, DIA acquisition Atlassian, indie browser innovation, Ladybird browser, chromium dominance, Google antitrust ruling, tech regulation limits, platform consolidation, supply chain attacks, NPM malware, debug chalk breach, Shy Ude worm, GitHub secrets exfiltration, developer burnout AI, AI usage mandates, Coinbase AI coding, post-install script vulnerability, digital security breaches 2025, web security awareness</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Is the web breaking under the weight of AI crawlers, platform consolidation, and nonstop security breaches? We dive into the state of browsers, developer burnout, and whether tech regulation can actually keep up.</p>

<p>In this panel discussion:</p>

<ul>
<li>We debate if robots.txt and AI licensing standards like RSL can realistically control how AI scrapes the web.</li>
<li>The fallout from DIA’s acquisition by Atlassian and what it means for indie browser innovation (like the Helium browser, Zen) in a Chromium-dominated world.</li>
<li>Why Google’s antitrust victory might embolden other tech giants, and what that means for competition.</li>
<li>How supply chain attacks like the NPM malware and Shai Hulud worm are exploiting GitHub workflows and package vulnerabilities.</li>
<li>The pushback against AI mandates at work, including Coinbase’s controversial policy requiring developers to use Copilot.</li>
</ul>

<h3>Resources</h3>

<p>Inside the battle for the future of the web: <a href="https://www.businessinsider.com/google-microsoft-openai-fight-standards-limit-ai-access-websites-2025-9" rel="nofollow">https://www.businessinsider.com/google-microsoft-openai-fight-standards-limit-ai-access-websites-2025-9</a> </p>

<p>The web has a new system for making AI companies pay up: <a href="https://www.theverge.com/news/775072/rsl-standard-licensing-ai-publishing-reddit-yahoo-medium" rel="nofollow">https://www.theverge.com/news/775072/rsl-standard-licensing-ai-publishing-reddit-yahoo-medium</a> </p>

<p>The Browser Company, maker of Arc and Dia, is being acquired: <a href="https://www.theverge.com/web/770947/browser-company-arc-dia-acquired-atlassian" rel="nofollow">https://www.theverge.com/web/770947/browser-company-arc-dia-acquired-atlassian</a> </p>

<p>Google stock jumps 8% after search giant avoids worst-case penalties in antitrust case: <a href="https://www.cnbc.com/2025/09/02/google-antitrust-search-ruling.html" rel="nofollow">https://www.cnbc.com/2025/09/02/google-antitrust-search-ruling.html</a> </p>

<p>Massive data breach sees 16 million PayPal accounts leaked online - here&#39;s what we know, and how to stay safe:<a href="https://www.techradar.com/pro/massive-data-breach-sees-16-million-paypal-accounts-leaked-online-heres-what-we-know-and-how-to-stay-safe" rel="nofollow">https://www.techradar.com/pro/massive-data-breach-sees-16-million-paypal-accounts-leaked-online-heres-what-we-know-and-how-to-stay-safe</a> </p>

<p>PayPal’s Glitch Puts €10 Billion on Ice Across European Banks: <a href="https://fintechnews.ch/payments/paypal-glitch-freezes-european-banks-10-billion-transactions/77974/" rel="nofollow">https://fintechnews.ch/payments/paypal-glitch-freezes-european-banks-10-billion-transactions/77974/</a> </p>

<p>npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack: <a href="https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack" rel="nofollow">https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack</a></p>

<p>Compromised files replace npm packages with a combined 2 billion weekly downloads: <a href="https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads" rel="nofollow">https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads</a> </p>

<p>Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing Malware: <a href="https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack" rel="nofollow">https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack</a> </p>

<p>Coinbase CEO explains why he fired engineers who didn’t try AI immediately: <a href="https://techcrunch.com/2025/08/22/coinbase-ceo-explains-why-he-fired-engineers-who-didnt-try-ai-immediately/" rel="nofollow">https://techcrunch.com/2025/08/22/coinbase-ceo-explains-why-he-fired-engineers-who-didnt-try-ai-immediately/</a> </p>

<h3>Chapters</h3>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p><strong>Fill out our <a href="https://t.co/oKVAEXipxu" rel="nofollow">listener survey</a>!</strong> <br>
Let us know by sending an email to our producer, Elizabeth, at <a href="mailto:elizabeth.becz@logrocket.com" rel="nofollow">elizabet.becz@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Is the web breaking under the weight of AI crawlers, platform consolidation, and nonstop security breaches? We dive into the state of browsers, developer burnout, and whether tech regulation can actually keep up.</p>

<p>In this panel discussion:</p>

<ul>
<li>We debate if robots.txt and AI licensing standards like RSL can realistically control how AI scrapes the web.</li>
<li>The fallout from DIA’s acquisition by Atlassian and what it means for indie browser innovation (like the Helium browser, Zen) in a Chromium-dominated world.</li>
<li>Why Google’s antitrust victory might embolden other tech giants, and what that means for competition.</li>
<li>How supply chain attacks like the NPM malware and Shai Hulud worm are exploiting GitHub workflows and package vulnerabilities.</li>
<li>The pushback against AI mandates at work, including Coinbase’s controversial policy requiring developers to use Copilot.</li>
</ul>

<h3>Resources</h3>

<p>Inside the battle for the future of the web: <a href="https://www.businessinsider.com/google-microsoft-openai-fight-standards-limit-ai-access-websites-2025-9" rel="nofollow">https://www.businessinsider.com/google-microsoft-openai-fight-standards-limit-ai-access-websites-2025-9</a> </p>

<p>The web has a new system for making AI companies pay up: <a href="https://www.theverge.com/news/775072/rsl-standard-licensing-ai-publishing-reddit-yahoo-medium" rel="nofollow">https://www.theverge.com/news/775072/rsl-standard-licensing-ai-publishing-reddit-yahoo-medium</a> </p>

<p>The Browser Company, maker of Arc and Dia, is being acquired: <a href="https://www.theverge.com/web/770947/browser-company-arc-dia-acquired-atlassian" rel="nofollow">https://www.theverge.com/web/770947/browser-company-arc-dia-acquired-atlassian</a> </p>

<p>Google stock jumps 8% after search giant avoids worst-case penalties in antitrust case: <a href="https://www.cnbc.com/2025/09/02/google-antitrust-search-ruling.html" rel="nofollow">https://www.cnbc.com/2025/09/02/google-antitrust-search-ruling.html</a> </p>

<p>Massive data breach sees 16 million PayPal accounts leaked online - here&#39;s what we know, and how to stay safe:<a href="https://www.techradar.com/pro/massive-data-breach-sees-16-million-paypal-accounts-leaked-online-heres-what-we-know-and-how-to-stay-safe" rel="nofollow">https://www.techradar.com/pro/massive-data-breach-sees-16-million-paypal-accounts-leaked-online-heres-what-we-know-and-how-to-stay-safe</a> </p>

<p>PayPal’s Glitch Puts €10 Billion on Ice Across European Banks: <a href="https://fintechnews.ch/payments/paypal-glitch-freezes-european-banks-10-billion-transactions/77974/" rel="nofollow">https://fintechnews.ch/payments/paypal-glitch-freezes-european-banks-10-billion-transactions/77974/</a> </p>

<p>npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack: <a href="https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack" rel="nofollow">https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack</a></p>

<p>Compromised files replace npm packages with a combined 2 billion weekly downloads: <a href="https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads" rel="nofollow">https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads</a> </p>

<p>Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing Malware: <a href="https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack" rel="nofollow">https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack</a> </p>

<p>Coinbase CEO explains why he fired engineers who didn’t try AI immediately: <a href="https://techcrunch.com/2025/08/22/coinbase-ceo-explains-why-he-fired-engineers-who-didnt-try-ai-immediately/" rel="nofollow">https://techcrunch.com/2025/08/22/coinbase-ceo-explains-why-he-fired-engineers-who-didnt-try-ai-immediately/</a> </p>

<h3>Chapters</h3>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p><strong>Fill out our <a href="https://t.co/oKVAEXipxu" rel="nofollow">listener survey</a>!</strong> <br>
Let us know by sending an email to our producer, Elizabeth, at <a href="mailto:elizabeth.becz@logrocket.com" rel="nofollow">elizabet.becz@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p>]]>
  </itunes:summary>
</item>
<item>
  <title>Unpacking the NPM supply chain attacks with Feross Aboukhadijeh</title>
  <link>http://podrocket.logrocket.com/unpacking-npm-supply-chain-attacks-feross-aboukhadijeh</link>
  <guid isPermaLink="false">aa347acf-4511-4eba-a082-f865dc8e8948</guid>
  <pubDate>Tue, 23 Sep 2025 08:00:00 -0400</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/aa347acf-4511-4eba-a082-f865dc8e8948.mp3" length="96378368" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>Feross Aboukhadijeh, founder of Socket, joins us to break down the recent wave of NPM supply chain attacks hitting the JavaScript ecosystem, including how attackers used phishing to target developers, snuck malware into popular packages like Prettier and "is", and even abused tools like Claude, Gemini, and TruffleHog. 
We dig into how GitHub Actions vulnerabilities were exploited, what makes postinstall scripts risky, and and what you can do to protect yourself from future attacks.</itunes:subtitle>
  <itunes:duration>40:09</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/a/aa347acf-4511-4eba-a082-f865dc8e8948/cover.jpg?v=1"/>
  <description>Feross Aboukhadijeh, founder of Socket, joins us to break down the recent wave of NPM supply chain attacks hitting the JavaScript ecosystem, including how attackers used phishing to target developers, snuck malware into popular packages like Prettier and "is", and even abused tools like Claude, Gemini, and TruffleHog. 
We dig into how GitHub Actions vulnerabilities were exploited, what makes postinstall scripts risky, and and what you can do to protect yourself from future attacks.
Links
Website: https://feross.org
X: https://x.com/feross
GitHub: https://github.com/feross
LinkedIn: https://www.linkedin.com/in/feross
YouTube: https://www.youtube.com/channel/UCHM4OEvQDUq8UszyUrdov-w
Resources
npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack: https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack
Compromised files replace npm packages with a combined 2 billion weekly downloads: https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads
Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing Malware: https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack
Chapters
00:00 Intro: NPM supply chain attacks explained
01:10 What is a software supply chain attack?
02:00 NPM phishing campaign: Fake login pages
03:00 Prettier ecosystem compromised
04:00 The “is” package malware incident
05:30 NX package breach (August 27 attack)
06:40 AI-powered supply chain exploit
08:00 GitHub Actions misconfiguration
12:00 Lessons from recent NPM attacks
20:00 How malicious packages get published
25:00 Why install scripts are so risky
30:00 Limitations of banning install scripts
35:00 Open source maintainer challenges
40:00 Smarter approaches to dependency updates
44:00 The future of open source supply chain security
47:00 Closing thoughts and resources
We want to hear from you!
How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?
Fill out our listener survey (https://t.co/oKVAEXipxu)! 
Let us know by sending an email to our producer, Elizabeth, at elizabet.becz@logrocket.com (mailto:elizabeth.becz@logrocket.com), or tweet at us at PodRocketPod (https://twitter.com/PodRocketpod).
Follow us. Get free stickers.
Follow us on Apple Podcasts, fill out this form (https://podrocket.logrocket.com/get-podrocket-stickers), and we’ll send you free PodRocket stickers!
What does LogRocket do?
LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. Try LogRocket for free today. (https://logrocket.com/signup/?pdr) Special Guest: Feross Aboukhadijeh.
</description>
  <itunes:keywords>NPM supply chain attacks, JavaScript ecosystem security, phishing npm credentials, prettier package hack, is package malware, nx build system attack, GitHub Actions vulnerability, Claude and Gemini exploited, trufflehog misuse, crypto wallet drainer, Levenshtein address spoofing, socket malware detection, install scripts NPM, postinstall malware, open source security, AI in security, typo squat packages, package worm propagation, secure software development, dependency vetting tools</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Feross Aboukhadijeh, founder of Socket, joins us to break down the recent wave of NPM supply chain attacks hitting the JavaScript ecosystem, including how attackers used phishing to target developers, snuck malware into popular packages like Prettier and &quot;is&quot;, and even abused tools like Claude, Gemini, and TruffleHog. <br>
We dig into how GitHub Actions vulnerabilities were exploited, what makes postinstall scripts risky, and and what you can do to protect yourself from future attacks.</p>

<h3>Links</h3>

<p>Website: <a href="https://feross.org" rel="nofollow">https://feross.org</a><br>
X: <a href="https://x.com/feross" rel="nofollow">https://x.com/feross</a><br>
GitHub: <a href="https://github.com/feross" rel="nofollow">https://github.com/feross</a><br>
LinkedIn: <a href="https://www.linkedin.com/in/feross" rel="nofollow">https://www.linkedin.com/in/feross</a><br>
YouTube: <a href="https://www.youtube.com/channel/UCHM4OEvQDUq8UszyUrdov-w" rel="nofollow">https://www.youtube.com/channel/UCHM4OEvQDUq8UszyUrdov-w</a></p>

<h3>Resources</h3>

<p>npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack: <a href="https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack" rel="nofollow">https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack</a><br>
Compromised files replace npm packages with a combined 2 billion weekly downloads: <a href="https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads" rel="nofollow">https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads</a><br>
Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing Malware: <a href="https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack" rel="nofollow">https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack</a></p>

<h3>Chapters</h3>

<p>00:00 Intro: NPM supply chain attacks explained<br>
01:10 What is a software supply chain attack?<br>
02:00 NPM phishing campaign: Fake login pages<br>
03:00 Prettier ecosystem compromised<br>
04:00 The “is” package malware incident<br>
05:30 NX package breach (August 27 attack)<br>
06:40 AI-powered supply chain exploit<br>
08:00 GitHub Actions misconfiguration<br>
12:00 Lessons from recent NPM attacks<br>
20:00 How malicious packages get published<br>
25:00 Why install scripts are so risky<br>
30:00 Limitations of banning install scripts<br>
35:00 Open source maintainer challenges<br>
40:00 Smarter approaches to dependency updates<br>
44:00 The future of open source supply chain security<br>
47:00 Closing thoughts and resources</p>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p><strong>Fill out our <a href="https://t.co/oKVAEXipxu" rel="nofollow">listener survey</a>!</strong> <br>
Let us know by sending an email to our producer, Elizabeth, at <a href="mailto:elizabeth.becz@logrocket.com" rel="nofollow">elizabet.becz@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Feross Aboukhadijeh.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Feross Aboukhadijeh, founder of Socket, joins us to break down the recent wave of NPM supply chain attacks hitting the JavaScript ecosystem, including how attackers used phishing to target developers, snuck malware into popular packages like Prettier and &quot;is&quot;, and even abused tools like Claude, Gemini, and TruffleHog. <br>
We dig into how GitHub Actions vulnerabilities were exploited, what makes postinstall scripts risky, and and what you can do to protect yourself from future attacks.</p>

<h3>Links</h3>

<p>Website: <a href="https://feross.org" rel="nofollow">https://feross.org</a><br>
X: <a href="https://x.com/feross" rel="nofollow">https://x.com/feross</a><br>
GitHub: <a href="https://github.com/feross" rel="nofollow">https://github.com/feross</a><br>
LinkedIn: <a href="https://www.linkedin.com/in/feross" rel="nofollow">https://www.linkedin.com/in/feross</a><br>
YouTube: <a href="https://www.youtube.com/channel/UCHM4OEvQDUq8UszyUrdov-w" rel="nofollow">https://www.youtube.com/channel/UCHM4OEvQDUq8UszyUrdov-w</a></p>

<h3>Resources</h3>

<p>npm Author Qix Compromised via Phishing Email in Major Supply Chain Attack: <a href="https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack" rel="nofollow">https://socket.dev/blog/npm-author-qix-compromised-in-major-supply-chain-attack</a><br>
Compromised files replace npm packages with a combined 2 billion weekly downloads: <a href="https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads" rel="nofollow">https://www.techradar.com/pro/security/compromised-files-replace-npm-packages-with-a-combined-2-billion-weekly-downloads</a><br>
Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing Malware: <a href="https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack" rel="nofollow">https://www.wiz.io/blog/shai-hulud-npm-supply-chain-attack</a></p>

<h3>Chapters</h3>

<p>00:00 Intro: NPM supply chain attacks explained<br>
01:10 What is a software supply chain attack?<br>
02:00 NPM phishing campaign: Fake login pages<br>
03:00 Prettier ecosystem compromised<br>
04:00 The “is” package malware incident<br>
05:30 NX package breach (August 27 attack)<br>
06:40 AI-powered supply chain exploit<br>
08:00 GitHub Actions misconfiguration<br>
12:00 Lessons from recent NPM attacks<br>
20:00 How malicious packages get published<br>
25:00 Why install scripts are so risky<br>
30:00 Limitations of banning install scripts<br>
35:00 Open source maintainer challenges<br>
40:00 Smarter approaches to dependency updates<br>
44:00 The future of open source supply chain security<br>
47:00 Closing thoughts and resources</p>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p><strong>Fill out our <a href="https://t.co/oKVAEXipxu" rel="nofollow">listener survey</a>!</strong> <br>
Let us know by sending an email to our producer, Elizabeth, at <a href="mailto:elizabeth.becz@logrocket.com" rel="nofollow">elizabet.becz@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket provides AI-first session replay and analytics that surfaces the UX and technical issues impacting user experiences. Start understanding where your users are struggling by trying it for free at LogRocket.com. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Feross Aboukhadijeh.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Secure by design with Vanessa Villa</title>
  <link>http://podrocket.logrocket.com/secure-by-design-vanessa-villa</link>
  <guid isPermaLink="false">4f1abcca-5d56-4fed-b471-a587b4eb9474</guid>
  <pubDate>Wed, 14 Feb 2024 08:00:00 -0500</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/4f1abcca-5d56-4fed-b471-a587b4eb9474.mp3" length="36305056" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>4</itunes:season>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>We welcome on Vanessa Villa, Developer Advocate at Pangea, to explain what the secure by design movement is about and how it shifts security to the beginning of the development cycle.</itunes:subtitle>
  <itunes:duration>30:15</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/4/4f1abcca-5d56-4fed-b471-a587b4eb9474/cover.jpg?v=1"/>
  <description>We welcome on Vanessa Villa, Developer Advocate at Pangea, to explain what the secure by design movement is about and how it shifts security to the beginning of the development cycle.
Links
https://www.linkedin.com/in/vanessa-villa-tech
https://twitter.com/vavillaiot
https://pangea.cloud/blog/
We want to hear from you!
How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?
Let us know by sending an email to our producer, Emily, at emily.kochanekketner@logrocket.com (mailto:emily.kochanekketner@logrocket.com), or tweet at us at PodRocketPod (https://twitter.com/PodRocketpod).
Follow us. Get free stickers.
Follow us on Apple Podcasts, fill out this form (https://podrocket.logrocket.com/get-podrocket-stickers), and we’ll send you free PodRocket stickers!
What does LogRocket do?
LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. Try LogRocket for free today. (https://logrocket.com/signup/?pdr) Special Guest: Vanessa Villa.
</description>
  <itunes:keywords>Security, web security, secure by design, dev security</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>We welcome on Vanessa Villa, Developer Advocate at Pangea, to explain what the secure by design movement is about and how it shifts security to the beginning of the development cycle.</p>

<h3>Links</h3>

<p><a href="https://www.linkedin.com/in/vanessa-villa-tech" rel="nofollow">https://www.linkedin.com/in/vanessa-villa-tech</a><br>
<a href="https://twitter.com/vavillaiot" rel="nofollow">https://twitter.com/vavillaiot</a><br>
<a href="https://pangea.cloud/blog/" rel="nofollow">https://pangea.cloud/blog/</a></p>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p>Let us know by sending an email to our producer, Emily, at <a href="mailto:emily.kochanekketner@logrocket.com" rel="nofollow">emily.kochanekketner@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Vanessa Villa.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>We welcome on Vanessa Villa, Developer Advocate at Pangea, to explain what the secure by design movement is about and how it shifts security to the beginning of the development cycle.</p>

<h3>Links</h3>

<p><a href="https://www.linkedin.com/in/vanessa-villa-tech" rel="nofollow">https://www.linkedin.com/in/vanessa-villa-tech</a><br>
<a href="https://twitter.com/vavillaiot" rel="nofollow">https://twitter.com/vavillaiot</a><br>
<a href="https://pangea.cloud/blog/" rel="nofollow">https://pangea.cloud/blog/</a></p>

<h3>We want to hear from you!</h3>

<p>How did you find us? Did you see us on Twitter? In a newsletter? Or maybe we were recommended by a friend?</p>

<p>Let us know by sending an email to our producer, Emily, at <a href="mailto:emily.kochanekketner@logrocket.com" rel="nofollow">emily.kochanekketner@logrocket.com</a>, or tweet at us at <a href="https://twitter.com/PodRocketpod" rel="nofollow">PodRocketPod</a>.</p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Vanessa Villa.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Security and path traversal with Liran Tal</title>
  <link>http://podrocket.logrocket.com/security-and-path-traversal</link>
  <guid isPermaLink="false">ffb2cabe-446a-4695-87a5-fc75f62f2ebd</guid>
  <pubDate>Tue, 23 May 2023 08:00:00 -0400</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/ffb2cabe-446a-4695-87a5-fc75f62f2ebd.mp3" length="28560256" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>3</itunes:season>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>Today, we have Liran Tal, Director of Developer Advocacy at Snyk, to talk about a security risk all developers should know about: path traversal.</itunes:subtitle>
  <itunes:duration>23:47</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/f/ffb2cabe-446a-4695-87a5-fc75f62f2ebd/cover.jpg?v=1"/>
  <description>Today, we have Liran Tal, Director of Developer Advocacy at Snyk, to talk about a security risk all developers should know about: path traversal.
Links
https://twitter.com/liran_tal
https://lirantal.com/
https://github.com/lirantal
https://lirantal.com/blog
https://www.linkedin.com/in/talliran
Tell us what you think of PodRocket
We want to hear from you! We want to know what you love and hate about the podcast. What do you want to hear more about? Who do you want to see on the show? Our producers want to know, and if you talk with us, we’ll send you a $25 gift card!
If you’re interested, schedule a call with us (https://podrocket.logrocket.com/contact-us) or you can email producer Kate Trahan at kate@logrocket.com (mailto:kate@logrocket.com)
Follow us. Get free stickers.
Follow us on Apple Podcasts, fill out this form (https://podrocket.logrocket.com/get-podrocket-stickers), and we’ll send you free PodRocket stickers!
What does LogRocket do?
LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. Try LogRocket for free today. (https://logrocket.com/signup/?pdr) Special Guest: Liran Tal.
</description>
  <itunes:keywords>security, path traversal</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Today, we have Liran Tal, Director of Developer Advocacy at Snyk, to talk about a security risk all developers should know about: path traversal.</p>

<h3>Links</h3>

<p><a href="https://twitter.com/liran_tal" rel="nofollow">https://twitter.com/liran_tal</a><br>
<a href="https://lirantal.com/" rel="nofollow">https://lirantal.com/</a><br>
<a href="https://github.com/lirantal" rel="nofollow">https://github.com/lirantal</a><br>
<a href="https://lirantal.com/blog" rel="nofollow">https://lirantal.com/blog</a><br>
<a href="https://www.linkedin.com/in/talliran" rel="nofollow">https://www.linkedin.com/in/talliran</a></p>

<h3>Tell us what you think of PodRocket</h3>

<p>We want to hear from you! We want to know what you love and hate about the podcast. What do you want to hear more about? Who do you want to see on the show? Our producers want to know, and if you talk with us, we’ll send you a $25 gift card!</p>

<p>If you’re interested, <a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">schedule a call with us</a> or you can email producer Kate Trahan at <a href="mailto:kate@logrocket.com" rel="nofollow">kate@logrocket.com</a></p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Liran Tal.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Today, we have Liran Tal, Director of Developer Advocacy at Snyk, to talk about a security risk all developers should know about: path traversal.</p>

<h3>Links</h3>

<p><a href="https://twitter.com/liran_tal" rel="nofollow">https://twitter.com/liran_tal</a><br>
<a href="https://lirantal.com/" rel="nofollow">https://lirantal.com/</a><br>
<a href="https://github.com/lirantal" rel="nofollow">https://github.com/lirantal</a><br>
<a href="https://lirantal.com/blog" rel="nofollow">https://lirantal.com/blog</a><br>
<a href="https://www.linkedin.com/in/talliran" rel="nofollow">https://www.linkedin.com/in/talliran</a></p>

<h3>Tell us what you think of PodRocket</h3>

<p>We want to hear from you! We want to know what you love and hate about the podcast. What do you want to hear more about? Who do you want to see on the show? Our producers want to know, and if you talk with us, we’ll send you a $25 gift card!</p>

<p>If you’re interested, <a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">schedule a call with us</a> or you can email producer Kate Trahan at <a href="mailto:kate@logrocket.com" rel="nofollow">kate@logrocket.com</a></p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Liran Tal.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Azure security with Sarah Young</title>
  <link>http://podrocket.logrocket.com/azure-security</link>
  <guid isPermaLink="false">ee272d76-65eb-4c70-a970-d0675dc9fa0d</guid>
  <pubDate>Fri, 28 Oct 2022 08:00:00 -0400</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/ee272d76-65eb-4c70-a970-d0675dc9fa0d.mp3" length="45303778" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>2</itunes:season>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>Sarah Young is a Senior Cloud Security Advocate at Microsoft. Sarah joins us today to talk about Azure security, Zero Trust principles, and important investments in the security ecosystem.</itunes:subtitle>
  <itunes:duration>36:30</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/e/ee272d76-65eb-4c70-a970-d0675dc9fa0d/cover.jpg?v=1"/>
  <description>Sarah Young is a Senior Cloud Security Advocate at Microsoft. Sarah joins us today to talk about Azure security, Zero Trust principles, and important investments in the security ecosystem.
Links
https://twitter.com/_sarahyo
https://www.sarahyoung.io
https://ignite.microsoft.com
https://azure.microsoft.com
Tell us what you think of PodRocket
We want to hear from you! We want to know what you love and hate about the podcast. What do you want to hear more about? Who do you want to see on the show? Our producers want to know, and if you talk with us, we’ll send you a $25 gift card!
If you’re interested, schedule a call with us (https://podrocket.logrocket.com/contact-us) or you can email producer Kate Trahan at kate@logrocket.com (mailto:kate@logrocket.com)
Follow us. Get free stickers.
Follow us on Apple Podcasts, fill out this form (https://podrocket.logrocket.com/get-podrocket-stickers), and we’ll send you free PodRocket stickers!
What does LogRocket do?
LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. Try LogRocket for free today. (https://logrocket.com/signup/?pdr) Special Guest: Sarah Young.
</description>
  <itunes:keywords>Azure, Microsoft, Cloud Security, Security, Zero Trust</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Sarah Young is a Senior Cloud Security Advocate at Microsoft. Sarah joins us today to talk about Azure security, Zero Trust principles, and important investments in the security ecosystem.</p>

<h3>Links</h3>

<p><a href="https://twitter.com/_sarahyo" rel="nofollow">https://twitter.com/_sarahyo</a><br>
<a href="https://www.sarahyoung.io" rel="nofollow">https://www.sarahyoung.io</a><br>
<a href="https://ignite.microsoft.com" rel="nofollow">https://ignite.microsoft.com</a><br>
<a href="https://azure.microsoft.com" rel="nofollow">https://azure.microsoft.com</a></p>

<h3>Tell us what you think of PodRocket</h3>

<p>We want to hear from you! We want to know what you love and hate about the podcast. What do you want to hear more about? Who do you want to see on the show? Our producers want to know, and if you talk with us, we’ll send you a $25 gift card!</p>

<p>If you’re interested, <a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">schedule a call with us</a> or you can email producer Kate Trahan at <a href="mailto:kate@logrocket.com" rel="nofollow">kate@logrocket.com</a></p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Sarah Young.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Sarah Young is a Senior Cloud Security Advocate at Microsoft. Sarah joins us today to talk about Azure security, Zero Trust principles, and important investments in the security ecosystem.</p>

<h3>Links</h3>

<p><a href="https://twitter.com/_sarahyo" rel="nofollow">https://twitter.com/_sarahyo</a><br>
<a href="https://www.sarahyoung.io" rel="nofollow">https://www.sarahyoung.io</a><br>
<a href="https://ignite.microsoft.com" rel="nofollow">https://ignite.microsoft.com</a><br>
<a href="https://azure.microsoft.com" rel="nofollow">https://azure.microsoft.com</a></p>

<h3>Tell us what you think of PodRocket</h3>

<p>We want to hear from you! We want to know what you love and hate about the podcast. What do you want to hear more about? Who do you want to see on the show? Our producers want to know, and if you talk with us, we’ll send you a $25 gift card!</p>

<p>If you’re interested, <a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">schedule a call with us</a> or you can email producer Kate Trahan at <a href="mailto:kate@logrocket.com" rel="nofollow">kate@logrocket.com</a></p>

<h3>Follow us. Get free stickers.</h3>

<p>Follow us on Apple Podcasts, fill out this <a href="https://podrocket.logrocket.com/get-podrocket-stickers" rel="nofollow">form</a>, and we’ll send you free PodRocket stickers!</p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Sarah Young.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>1Password with Andrew Beyer</title>
  <link>http://podrocket.logrocket.com/1password</link>
  <guid isPermaLink="false">b32672cd-8ba9-4f13-8c0f-e9fbb508e64d</guid>
  <pubDate>Wed, 20 Apr 2022 08:00:00 -0400</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/b32672cd-8ba9-4f13-8c0f-e9fbb508e64d.mp3" length="78679068" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>2</itunes:season>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>In this episode, we talk to Andrew Beyer, senior engineering manager at 1Password, about how 1Password helps people generate and store unique passwords, how 1Password's engineering org has evolved, and the future of passwords.</itunes:subtitle>
  <itunes:duration>40:07</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/b/b32672cd-8ba9-4f13-8c0f-e9fbb508e64d/cover.jpg?v=1"/>
  <description>In this episode, we talk to Andrew Beyer, senior engineering manager at 1Password, about how 1Password helps people generate and store unique passwords, how 1Password's engineering org has evolved, and the future of passwords.
Links
https://1password.com/
https://twitter.com/firebeyer
https://www.w3.org/community/webextensions/
https://www.future.1password.com/
https://1password.com/jobs/
Review us
Reviews are what help us grow and tailor our content to what you want to hear. Give us a review here (https://ratethispodcast.com/podrocket).
Contact us
https://podrocket.logrocket.com/contact-us
@PodRocketpod (https://twitter.com/PodRocketpod)
What does LogRocket do?
LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. Try LogRocket for free today. (https://logrocket.com/signup/?pdr) Special Guest: Andrew Beyer.
</description>
  <itunes:keywords>security, web development, 1password, frontend</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>In this episode, we talk to Andrew Beyer, senior engineering manager at 1Password, about how 1Password helps people generate and store unique passwords, how 1Password&#39;s engineering org has evolved, and the future of passwords.</p>

<h3>Links</h3>

<p><a href="https://1password.com/" rel="nofollow">https://1password.com/</a><br>
<a href="https://twitter.com/firebeyer" rel="nofollow">https://twitter.com/firebeyer</a><br>
<a href="https://www.w3.org/community/webextensions/" rel="nofollow">https://www.w3.org/community/webextensions/</a><br>
<a href="https://www.future.1password.com/" rel="nofollow">https://www.future.1password.com/</a><br>
<a href="https://1password.com/jobs/" rel="nofollow">https://1password.com/jobs/</a></p>

<h3>Review us</h3>

<p>Reviews are what help us grow and tailor our content to what you want to hear. Give us a review <a href="https://ratethispodcast.com/podrocket" rel="nofollow">here</a>.</p>

<h3>Contact us</h3>

<p><a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">https://podrocket.logrocket.com/contact-us</a><br>
<a href="https://twitter.com/PodRocketpod" rel="nofollow">@PodRocketpod</a></p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Andrew Beyer.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>In this episode, we talk to Andrew Beyer, senior engineering manager at 1Password, about how 1Password helps people generate and store unique passwords, how 1Password&#39;s engineering org has evolved, and the future of passwords.</p>

<h3>Links</h3>

<p><a href="https://1password.com/" rel="nofollow">https://1password.com/</a><br>
<a href="https://twitter.com/firebeyer" rel="nofollow">https://twitter.com/firebeyer</a><br>
<a href="https://www.w3.org/community/webextensions/" rel="nofollow">https://www.w3.org/community/webextensions/</a><br>
<a href="https://www.future.1password.com/" rel="nofollow">https://www.future.1password.com/</a><br>
<a href="https://1password.com/jobs/" rel="nofollow">https://1password.com/jobs/</a></p>

<h3>Review us</h3>

<p>Reviews are what help us grow and tailor our content to what you want to hear. Give us a review <a href="https://ratethispodcast.com/podrocket" rel="nofollow">here</a>.</p>

<h3>Contact us</h3>

<p><a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">https://podrocket.logrocket.com/contact-us</a><br>
<a href="https://twitter.com/PodRocketpod" rel="nofollow">@PodRocketpod</a></p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Andrew Beyer.</p>]]>
  </itunes:summary>
</item>
<item>
  <title>Open-source supply chain security with Feross Aboukhadijeh</title>
  <link>http://podrocket.logrocket.com/socket</link>
  <guid isPermaLink="false">ea6c356b-f4fb-4e9f-a286-14f603f5b706</guid>
  <pubDate>Tue, 22 Mar 2022 08:00:00 -0400</pubDate>
  <author>LogRocket</author>
  <enclosure url="https://dts.podtrac.com/redirect.mp3/aphid.fireside.fm/d/1437767933/3911462c-bca2-48c2-9103-610ba304c673/ea6c356b-f4fb-4e9f-a286-14f603f5b706.mp3" length="86853029" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:season>2</itunes:season>
  <itunes:author>LogRocket</itunes:author>
  <itunes:subtitle>Feross Aboukhadijeh is the creator of WebTorrent, StandardJS, and Wormhole. We talked to Feross about Wormhole back in June and he joins us now to talk about Socket.dev, a new security company that can protect your most critical apps from supply chain attacks. </itunes:subtitle>
  <itunes:duration>44:08</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/3/3911462c-bca2-48c2-9103-610ba304c673/episodes/e/ea6c356b-f4fb-4e9f-a286-14f603f5b706/cover.jpg?v=1"/>
  <description>Feross Aboukhadijeh is the creator of WebTorrent, StandardJS, and Wormhole. We talked to Feross about Wormhole back in June and he joins us now to talk about Socket.dev, a new security company that can protect your most critical apps from supply chain attacks. 
Links
https://twitter.com/feross
https://socket.dev
https://socket.dev/npm/category/removed
https://socketdev.notion.site/Join-the-Socket-Team
https://webtorrent.io
https://standardjs.com
https://wormhole.app
https://podrocket.logrocket.com/wormhole
Review us
Reviews are what help us grow and tailor our content to what you want to hear. Give us a review here (https://ratethispodcast.com/podrocket).
Contact us
https://podrocket.logrocket.com/contact-us
@PodRocketpod (https://twitter.com/PodRocketpod)
What does LogRocket do?
LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. Try LogRocket for free today. (https://logrocket.com/signup/?pdr)
 Special Guest: Feross Aboukhadijeh.
</description>
  <itunes:keywords>security, open source, web development, </itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Feross Aboukhadijeh is the creator of WebTorrent, StandardJS, and Wormhole. We talked to Feross about Wormhole back in June and he joins us now to talk about Socket.dev, a new security company that can protect your most critical apps from supply chain attacks. </p>

<h3>Links</h3>

<p><a href="https://twitter.com/feross" rel="nofollow">https://twitter.com/feross</a><br>
<a href="https://socket.dev" rel="nofollow">https://socket.dev</a><br>
<a href="https://socket.dev/npm/category/removed" rel="nofollow">https://socket.dev/npm/category/removed</a><br>
<a href="https://socketdev.notion.site/Join-the-Socket-Team" rel="nofollow">https://socketdev.notion.site/Join-the-Socket-Team</a><br>
<a href="https://webtorrent.io" rel="nofollow">https://webtorrent.io</a><br>
<a href="https://standardjs.com" rel="nofollow">https://standardjs.com</a><br>
<a href="https://wormhole.app" rel="nofollow">https://wormhole.app</a><br>
<a href="https://podrocket.logrocket.com/wormhole" rel="nofollow">https://podrocket.logrocket.com/wormhole</a></p>

<h3>Review us</h3>

<p>Reviews are what help us grow and tailor our content to what you want to hear. Give us a review <a href="https://ratethispodcast.com/podrocket" rel="nofollow">here</a>.</p>

<h3>Contact us</h3>

<p><a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">https://podrocket.logrocket.com/contact-us</a><br>
<a href="https://twitter.com/PodRocketpod" rel="nofollow">@PodRocketpod</a></p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Feross Aboukhadijeh.</p>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Feross Aboukhadijeh is the creator of WebTorrent, StandardJS, and Wormhole. We talked to Feross about Wormhole back in June and he joins us now to talk about Socket.dev, a new security company that can protect your most critical apps from supply chain attacks. </p>

<h3>Links</h3>

<p><a href="https://twitter.com/feross" rel="nofollow">https://twitter.com/feross</a><br>
<a href="https://socket.dev" rel="nofollow">https://socket.dev</a><br>
<a href="https://socket.dev/npm/category/removed" rel="nofollow">https://socket.dev/npm/category/removed</a><br>
<a href="https://socketdev.notion.site/Join-the-Socket-Team" rel="nofollow">https://socketdev.notion.site/Join-the-Socket-Team</a><br>
<a href="https://webtorrent.io" rel="nofollow">https://webtorrent.io</a><br>
<a href="https://standardjs.com" rel="nofollow">https://standardjs.com</a><br>
<a href="https://wormhole.app" rel="nofollow">https://wormhole.app</a><br>
<a href="https://podrocket.logrocket.com/wormhole" rel="nofollow">https://podrocket.logrocket.com/wormhole</a></p>

<h3>Review us</h3>

<p>Reviews are what help us grow and tailor our content to what you want to hear. Give us a review <a href="https://ratethispodcast.com/podrocket" rel="nofollow">here</a>.</p>

<h3>Contact us</h3>

<p><a href="https://podrocket.logrocket.com/contact-us" rel="nofollow">https://podrocket.logrocket.com/contact-us</a><br>
<a href="https://twitter.com/PodRocketpod" rel="nofollow">@PodRocketpod</a></p>

<h3>What does LogRocket do?</h3>

<p>LogRocket combines frontend monitoring, product analytics, and session replay to help software teams deliver the ideal product experience. <a href="https://logrocket.com/signup/?pdr" rel="nofollow">Try LogRocket for free today.</a></p><p>Special Guest: Feross Aboukhadijeh.</p>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
