show episodes
 
Fusing the liberal arts with architecture, construction and real estate to build a more beautiful, resilient, and thriving world for PEOPLE. I believe a more thriving world is possible through restoring our built environment. But today's hyper-segregated, financialized building industry is not conducive to solving complex problems or creating dynamic places for human flourishing. I interview a wide range of guests involved with crafting the built world: developers, architects, urban designer ...
  continue reading
 
Artwork

1
Gospel Con Carne

Mobile Loaves & Fishes

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The ‘Gospel Con Carne’ is a gritty journey of Tex-Mex theology that explores the woundedness of society through untold stories of homelessness. Our host, Alan Graham, is the founder and CEO of Austin, TX-based Mobile Loaves and Fishes – a social outreach ministry that has been empowering communities into a lifestyle of service with the homeless for more than two decades. Alan also is the lead visionary behind the innovative Community First! Village – the country’s only master-planned communi ...
  continue reading
 
Loading …
show series
 
Send us a text The Tampa Morgue- Episode #76 Tony and Ed talk about some upcoming Tampa Morgue guests, shows and some upcoming releases. Guitarist/Vocalist Vincent Lepore (Voidrium, Exinfernum) and drummer Joe Austin (Tunnels Of Set, x-Dry Spell ) hang out and talk about each of their band's history and the upcoming Bay Of Fire Black Metal & art fe…
  continue reading
 
Send us a text This week's episode is a rare guest free episode where we hang in the Morgue and talk about last week's interview with Jeff "Mantas" Dunn, upcoming releases, upcoming shows, some 1998 Florida releases and much more. See you at the Morgue! music: Siren-City of Lost Souls Divine Empire-Pray for Deliverance original air date 2/21/2025 c…
  continue reading
 
Conspiracy radio legend Richard Syrett has seen it all in his time on the airwaves, and he leans on that experience when analyzing this uniquely contentious moment between Canada and the United States. Who is Mark Carney, the man poised to become Canada's next PM? Should we be concerned about his connections to the Bank of England and Ghislaine Max…
  continue reading
 
Using ES|QL In Kibana to Query DShield Honeypot Logs Using the "Elastic Search Piped Query Language" to query DShield honeypot logs https://isc.sans.edu/diary/Using%20ES%7CQL%20in%20Kibana%20to%20Queries%20DShield%20Honeypot%20Logs/31704 Mongoose Flaws Put MongoDB at risk The Object Direct Mapping library Mongoose suffers from an injection vulnerab…
  continue reading
 
Moses Kagan has a unique take on real estate development and investing – and he’s influenced my thinking substantially over the past couple of years. He is a highly successful syndicator, investor and developer with over $200 million in assets under management. He runs Adaptive Realty, having renovated over 100 multi-family buildings in Los Angeles…
  continue reading
 
XWorm Cocktail: A Mix of PE data with PowerShell Code Quick analysis of an interesting XWrom sample with powershell code embedded inside an executable https://isc.sans.edu/diary/XWorm+Cocktail+A+Mix+of+PE+data+with+PowerShell+Code/31700 Microsoft's Majorana 1 Chip Carves New Path for Quantum Computing Microsoft announced a breack through in Quantum…
  continue reading
 
Today's guest Mark Passio knows what the Church of Satan and other shadowy organizations are up to behind the scenes because he used to be on their side. In his former life as a priest in the Church of Satan, Mark espoused eugenics and witnessed firsthand what many elites desire for the world. Thank you for your support. Grab your copy of the 2nd i…
  continue reading
 
ModelScan: Protection Against Model Serialization Attacks ModelScan is a tool to inspect AI models for deserialization attacks. The tool will detect suspect commands and warn the user. https://isc.sans.edu/diary/ModelScan%20-%20Protection%20Against%20Model%20Serialization%20Attacks/31692 OpenSSH MitM and DoS Vulnerabilities OpenSSH Patched two vuln…
  continue reading
 
My Very Personal Guidance and Strategies to Protect Network Edge Devices A quick summary to help you secure edge devices. This may be a bit opinionated, but these are the strategies that I find work and are actionable. https://isc.sans.edu/diary/My%20Very%20Personal%20Guidance%20and%20Strategies%20to%20Protect%20Network%20Edge%20Devices/31660 Postg…
  continue reading
 
Fake BSOD Delivered by Malicious Python Script Xavier found an odd malicious Python script that displays a blue screen of death to users. The purpose isn't quite clear. It could be a teach support scam tricking users into calling the 800 number displayed, or a simple anti-reversing trick https://isc.sans.edu/diary/Fake%20BSOD%20Delivered%20by%20Mal…
  continue reading
 
DShield SIEM Docker Updates Interested in learning more about the attacks hitting your honeypot? Guy assembled a neat SIEM to create dashboards summarizing the attacks. https://isc.sans.edu/diary/DShield%20SIEM%20Docker%20Updates/31680 PANOS Path Confusion Auth Bypass Palo Alto Networks fixed a path confusion vulnerability introduced by the overly …
  continue reading
 
Ghostly encounters, hauntings and general spookiness characterize the work of today's guest, paranormal researcher and filmmaker Colin Browen, who has also used his expertise to investigate the The North Fox Island pedophile ring, and other evil groups like the Midnight Productions snuff film outfit. Grab your copy of the 2nd issue of the Chaos Twi…
  continue reading
 
An Ontology for Threats: Cybercrime and Digital Forensic Investigation on Smart City Infrastructure Smart cities is a big topic for many local governments. With building these complex systems, attacks will follow. https://isc.sans.edu/diary/An%20ontology%20for%20threats%2C%20cybercrime%20and%20digital%20forensic%20investigation%20on%20Smart%20City%…
  continue reading
 
Send us a text Legendary guitarist Jeff "Mantas" Dunn (Mantas, x-Venom, X- Venom Inc, X-M:Pire of Evil) takes over the Morgue for over 5 hours to talk about his 45 year plus musical journey and he does not hold back and sets the record straight on the deep history of Venom, his years with Venom Inc, the demise of his time with each band, dying and …
  continue reading
 
Microsoft Patch Tuesday Microsoft released patches for 55 vulnerabilities. Three of them are actagorized as critical, two are already exploited and another two have been publicly disclosed. The LDAP server vulnerability could become a huge deal, but it is not clear if an exploit will appear. https://isc.sans.edu/diary/Microsoft%20February%202025%20…
  continue reading
 
According to Dr. Wil Spencer and MMA legend Pat Miletich, modern agriculture is poisoning us, and we’re being misled by our government, the pharmaceutical industry, and many so-called health professionals. In this episode of Tin Foil Hat, we dive into that, along with a hybrid take on terrain theory. It’s packed with eye-opening insights—this episo…
  continue reading
 
Reminder: 7-Zip MoW The MoW must be added to any files extracted from ZIP or other compound file formats. 7-Zip does not do so by default unless you alter the default configuration. https://isc.sans.edu/diary/Reminder%3A%207-Zip%20%26%20MoW/31668 Apple Fixes 0-Day Apple released updates to iOS and iPadOS fixing a bypass for USB Restricted Mode. The…
  continue reading
 
Was Jesus actually Jewish? Which religions are truly "Abrahamic"? Dustin Nemos joins us to answer those questions, and to dive into the demonic forces behind government authority at almost every level. Grab your copy of the 2nd issue of the Chaos Twins now and join the Army Of Chaos: https://bit.ly/415fDfY Check out Sam Tripoli's new special "Why i…
  continue reading
 
SSL 2.0 Turns 30 This Sunday SSL was created in February 1995. However, back in 2005, only a year later, SSL 3.0 was released, and as of 2011, SSL 2.0 was deprecated, and support was removed from many crypto libraries. However, over 400k hosts are still exposed via SSL 2.0. https://isc.sans.edu/diary/SSL%202.0%20turns%2030%20this%20Sunday...%20Perh…
  continue reading
 
Jason Bassler of the Free Thought Project joins us this week to talk about the modern tech oligarchs -- "broligarchs" -- and how this may be a new paradigm in American politics. We also discuss the rebranding of the War on Drugs and the War on Terror, and whether Trump is truly "anti-war." Listen to us recap this week's headlines at 01:41:58! Grab …
  continue reading
 
The Unbreakable Multi-Layer Anti-Debugging System Xavier found a nice Python script that included what it calls the "Unbreakable Multi-Layer Anti-Debugging System". Leave it up to Xavier to tear it appart for you. https://isc.sans.edu/diary/The%20Unbreakable%20Multi-Layer%20Anti-Debugging%20System/31658 Take my money: OCR crypto stealers in Google …
  continue reading
 
What if our cities weren’t just places we lived, but places that made us feel alive? In this episode, we welcome back Coby, an urban planner, developer, and author of Building Optimism, to talk about how we can move beyond pessimism and reclaim the built environment. We dive into the philosophy of traditional urbanism versus traditional architectur…
  continue reading
 
Phishing via com- prefix domains Every day, attackers are registering a few hunder domain names starting with com-. These are used in phishing e-mails, like for example "toll fee scams", to create more convincing phishing links. https://isc.sans.edu/diary/Phishing%20via%20%22com-%22%20prefix%20domains/31654 Microsoft Windows 10 Extended Security Up…
  continue reading
 
Thank you for tuning in to another episode of Tin Foil Hat with Sam Tripoli! In this episode, we’re joined by film documentarian Nick Alvear, who shares his unbelievable story of being a January 6th political prisoner. This is a wild one, and trust me, it's a banger. Thanks so much for your continued support!" Grab your copy of the 2nd issue of the…
  continue reading
 
Some Updates to Our Data Feeds We made some updates to the documentation for our data feeds, and added the neat Rosti Feed to our list as well as to our ipinfo page. https://isc.sans.edu/diary/Some%20updates%20to%20our%20data%20feeds/31650 8 Million Request Later We Meade the Solarwindws Supply Chain Attack Look Amateur While the title is a bit of …
  continue reading
 
Crypto Wallet Scam YouTube spam messages leak private keys to crypto wallets. However, these keys can not be used to withdraw funds. Victims are scammed into depositing "gas fees" which are then collected by the scammer. https://isc.sans.edu/diary/Crypto%20Wallet%20Scam/31646 Mediatek Patches Mediatek patched numerous vulnerabilities in its WLAN pr…
  continue reading
 
To Simulate or Replicate: Crafting Cyber Ranges Automating the creation of cyber ranges. This will be a multi part series and this part covers creating the DNS configuration in Windows https://isc.sans.edu/diary/To%20Simulate%20or%20Replicate%3A%20Crafting%20Cyber%20Ranges/31642 Scammers Exploiting Deepseek Hype Scammers are using the hype around D…
  continue reading
 
PCAPs or It Didn't Happen: Exposing an Old Netgear Vulnerability Still Active in 2025 [Guest Diary] https://isc.sans.edu/diary/PCAPs%20or%20It%20Didn%27t%20Happen%3A%20Exposing%20an%20Old%20Netgear%20Vulnerability%20Still%20Active%20in%202025%20%5BGuest%20Diary%5D/31638 RCE Vulnerablity in AI Development Platform Lightning AI Noma Security discover…
  continue reading
 
Thanks for tuning in to another episode of Tin Foil Hat with Sam Tripoli! This week, author Ryan Gable joins us to discuss the often misunderstood and trivialized aspects of American history, and how world history—from Japan to Rome—still applies today. We explore the symbolism in politics, psychic manifestations of UFOs, and the darker occult them…
  continue reading
 
Send us a text Tony and Ed review the Tampa Metal Museum exhibit and talk about new upcoming guests. Vocalist Knox Colby (Enforced) visits the Morgue to talk about the history of Enforced, living in Taiwan, touring, Food Poisoning, their latest E.P. “A Leap Into The Dark”, and much more. See you at the Morgue! music: Enforced: Aggressive Menace Enf…
  continue reading
 
From PowerShell to a Python Obfuscation Race! This information stealer not only emulates a PDF document convincingly, but also includes its own Python environment for Windows https://isc.sans.edu/diary/From%20PowerShell%20to%20a%20Python%20Obfuscation%20Race!/31634 Alleged Active Exploit Sale of CVE-2024-55591 on Fortinet Devices An exploit for thi…
  continue reading
 
Thank you for tuning in to another episode of Tin Foil Hat with Sam Tripoli. In this episode, we’re joined by special guests Austin Wade Picard and Jose Galison to dive into a range of intense topics, from domestic black sites and manufactured mass shooters to sleeper cells. We also discuss psychological operations, mind control, and the media’s ha…
  continue reading
 
Learn about fileless crypto stealers written in Python, the ongoing exploitation of recent SimpleHelp vulnerablities, new Apple Silicon Sidechannel attacks a Team Viewer Vulnerablity and an odd QR Code Fileless Python InfoStealer Targeting Exodus This Python script targets Exodus crypto wallet and password managers to steal crypto currencies. It do…
  continue reading
 
This episode shows how attackers are bypassing phishing filter by abusing the "shy" softhyphen HTML entitiy. We got an update from Apple fixing a 0-day vulnerability in addition to a number of other issues. watchTowr show how to exploit an interesting FortiOS vulnerability and we have patches for Github Desktop and Apache Solr An unusal shy z-wasp …
  continue reading
 
Guest Diary: How Access Brokers Maintain Persistence Explore how cybercriminals utilize access brokers to persist within networks and the impact this has on organizational security. https://isc.sans.edu/forums/diary/Guest+Diary+How+Access+Brokers+Maintain+Persistence/31600/ Critical Vulnerability in Meta's Llama Stack (CVE-2024-50050) A deep dive i…
  continue reading
 
Send us a text On this episode Tony and Ed discuss some upcoming events and future guests. Vocalist Martin Missy (Protector, Obrero, Phidion, Ruins of Time, Talion, Zombie Lake) enters the Morgue to talk about his musical Journey that dates back to 1984. We talk about the 80's German Metal scene, Protector's early years and much more. See you at th…
  continue reading
 
In today's episode, learn how an attacker attempted to exploit webmail XSS vulnerablities against us. Sonicwall released a critical patch fixing an already exploited vulnerability in its SMA 1000 appliance. Cisco fixed vulnerabilities in ClamAV and its Meeting Manager REST API. Learn from SANS.edu student Anthony Russo how to take advantage of AI f…
  continue reading
 
Thank you for tuning in to another episode of Tin Foil Hat with Sam Tripoli! This week, we’re joined by podcast favorite, Crrow777, who brings some mind-blowing evidence suggesting we may, in fact, have two Suns. We dive deep into why this truth is being kept from us, explore the spiritual war currently unfolding between the elites and humanity, an…
  continue reading
 
Most Americans think painting brick is as simple as grabbing a bucket of latex or oil-based paint, but this common approach can wreak havoc on your home–and is uglier to boot. In this episode, I sit down with Matt Plechan, the founder of Mineral Stains. We dive deep into the art and science of finishing brick with mineral stains like limewash, pota…
  continue reading
 
In today's episode, we start by talking about the PFSYNC protocol used to synchronize firewall states to support failover. Oracle released it's quarterly critical patch update. ESET is reporting about a critical VPN supply chain attack and CISA released guidance for victims of recent Ivanti related attacks. Catching CARP: Fishing for Firewall State…
  continue reading
 
This episodes covers how Starlink users can be geolocated and how Cloudflare may help deanonymize users. The increased use of AI helpers leads to leaking data via careless prompts. Geolocation and Starlink https://isc.sans.edu/diary/Geolocation%20and%20Starlink/31612 Discover the potential geolocation risks associated with Starlink and how they mig…
  continue reading
 
Thank you for tuning in to another episode of Tin Foil Hat with Sam Tripoli. This week, we’re joined by the hilarious Bridget Phetasy to unpack the current chaos unfolding in America. From the upcoming Trump administration to the deepening division and unrest across the nation, we leave no stone unturned. We also dive into California’s increasingly…
  continue reading
 
In this episode, we talk about downloading and analyzing partial ZIP files, how legitimate remote access tools are used in recent compromises and how a research found an SSRF vulnerability in Azure DevOps Partial ZIP File Downloads A closer look at how attackers are leveraging partial ZIP file downloads to bypass file verification systems and plant…
  continue reading
 
In this episode, we cover how to use honeypot data to keep your offensive infrastructure alive longer, three critical vulnerabilities in SimpleHelp that must be patched now, and an interesting vulnerability affecting many systems allowing UEFI Secure Boot bypass. Leveraging Honeypot Data for Offensive Security Operations [Guest Diary] A recent gues…
  continue reading
 
In this episode, we explore the efficient storage of honeypot logs in databases, issues with Citrix's Session Recording Agent and Windows Update. Ivanti is having another interesting security event and our SANS.edu graduate student Rich Green talks about his research on Passkeys. Extracting Practical Observations from Impractical Datasets: A SANS I…
  continue reading
 
Thank you for tuning in to another episode of Tin Foil Hat with Sam Tripoli! In this episode, we’re joined once again by Jesse On Fire to dive into the latest cultural decay, P. Diddy and Jay Z, sex trafficking rings, the LA fires, and the twisted world of American Psycho politicians. This one’s absolutely insane—nothin but bangers! As always, than…
  continue reading
 
Today's episode covers an odd 12 year old Netgear vulnerability that only received a proper CVE number last year. Learn about how to properly identify OpenID connect users and avoid domain name resue. Good old rsync turns out to be in need of patching and Fortinet: Not sure if it needs patching. Probably it does. Go ahead and patch it. The Curious …
  continue reading
 
Today, Microsoft Patch Tuesday headlines our news with Microsoft patching 209 vulnerabilities, some of which have already been exploited. Fortinet suspects a so far unpatched Node.js authentication bypass to be behind some recent exploits of FortiOS and FortiProxy devices. Microsoft January 2025 Patch Tuesday This month's Microsoft patch update add…
  continue reading
 
Thanks for tuning in to another episode of Tin Foil Hat with Sam Tripoli! In this episode, we’re excited to welcome back Ian Carroll, who dives deep into his research on a range of hot topics, including the recent fires, the Fed, Controlled Ops, H-1B visas, and the CyberTruck attacks. You won’t want to miss this one—pure bangers from start to finis…
  continue reading
 
Episode Summary: This episode covers brute-force attacks on the password reset functionality of Hikvision devices, a macOS SIP bypass vulnerability, Linux rootkit malware, and a novel ransomware campaign targeting AWS S3 buckets. Topics Covered: Hikvision Password Reset Brute Forcing URL: https://isc.sans.edu/diary/Hikvision%20Password%20Reset%20Br…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play