For The Culture Podcast focuses on Engaging banter amongst Hosts Nick Alexander, Ty Sterlin & Guests as they try to speak to the Pulse of Today’s Hip Hop, Comedy, Sports & Newsworthy related subjects.
…
continue reading
Natasha Pearl Hansen is a comedian, actress, producer, writer and Second City Chicago alum. She has performed in top comedy festivals nationwide and continues to tour both nationally and internationally, sharing the stage with the best comedians of today. A viral author for Men's Health Magazine, she will eventually release her series of "Future Role Model" books she began writing at age 14: a collection of hilarious stories, quotes, and F***ed up situations she has put herself in. "Future R ...
…
continue reading
Each week, an immigrant of the United States shares their American origin story. THEY TRIED TO BURY US is a weekly podcast hosted by Egyptian-born comedian Tamer Kattan and his mother Kity. Being the son of a Muslim father and a Jewish mother left Tamer struggling with notions of identity. It’s that exact struggle that Tamer and his mom dive into as they sit down with guests to hear about their American origin stories. “They tried to bury us, they didn’t know we were seeds” is a Mexican sayi ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
If you’re addicted to Computer Hardware and technology, this podcast is for you. Hardware Addicts brings you the latest trends in tech along with brain filling tips and tricks to help you get the most out of your hardware. Join Ryan, Wendy, and Michael as we geek out on the physical technology that powers our addiction. Hardware Addicts is a podcast brought to you by the TuxDigital Network (https://tuxdigital.com/)!
…
continue reading
Welcome to the Calling All Beings Network of Friends! In the wake of the government’s acknowledgement of the reality of Unidentified Aerial Phenomenon (UAP), the CAB is driven to take the topic of UAP and the wider Phenomenon beyond the halls of the weird and into the broader public arena. Our goal is to ask “what if?” of professionals, academics, entertainers, athletes, and everyday people in order to inspire, enlighten, and explore how the potential reality of contact with Non-Human Intell ...
…
continue reading

1
SANS Stormcast Wednesday Feb 20th: XWorm Cocktail; Quantum Computing Breakthrough; Signal Phishing
7:01
7:01
Play later
Play later
Lists
Like
Liked
7:01XWorm Cocktail: A Mix of PE data with PowerShell Code Quick analysis of an interesting XWrom sample with powershell code embedded inside an executable https://isc.sans.edu/diary/XWorm+Cocktail+A+Mix+of+PE+data+with+PowerShell+Code/31700 Microsoft's Majorana 1 Chip Carves New Path for Quantum Computing Microsoft announced a breack through in Quantum…
…
continue reading

1
SANS Stormcast Tuesday Feb 19th: ModelScan AI Model Security; OpenSSH Vuln; Juniper Patches; Dell BIOS Vulnerability
6:55
6:55
Play later
Play later
Lists
Like
Liked
6:55ModelScan: Protection Against Model Serialization Attacks ModelScan is a tool to inspect AI models for deserialization attacks. The tool will detect suspect commands and warn the user. https://isc.sans.edu/diary/ModelScan%20-%20Protection%20Against%20Model%20Serialization%20Attacks/31692 OpenSSH MitM and DoS Vulnerabilities OpenSSH Patched two vuln…
…
continue reading
CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead James Jackson of the J.F.K Show! Real as it gets, James Jackson of the J.F.K who has just launched his own show on YouTube @JamesJksn honored us with his presence and the nature of his advocacy which is without a veneer, just the lesso…
…
continue reading

1
SANS Stormcast: Securing the Edge; PostgreSQL Exploit; Ivanti Exploit; WinZip Vulnerablity; Xerox Patch
4:39
4:39
Play later
Play later
Lists
Like
Liked
4:39My Very Personal Guidance and Strategies to Protect Network Edge Devices A quick summary to help you secure edge devices. This may be a bit opinionated, but these are the strategies that I find work and are actionable. https://isc.sans.edu/diary/My%20Very%20Personal%20Guidance%20and%20Strategies%20to%20Protect%20Network%20Edge%20Devices/31660 Postg…
…
continue reading

1
#138 James Iandoli - Engaging The Phenomenon
1:45:50
1:45:50
Play later
Play later
Lists
Like
Liked
1:45:50CALLING ALL BEINGS: YouTube = https://www.youtube.com/@CallingAllBeings/streams James Iandoli | Awakening Human Potential Through UAP & Consciousness Studies. Research and Field Work investigating UFOs and related phenomena: UFO/UAP, CE-5, Consciousness, and more! Engaging The Phenomenon; Directly, Intellectually, Philosophically, Socially, and Bey…
…
continue reading

1
SANS Stormcast Monday Feb 17th: Fake BSOD; Volatile IPs; Postgresql libpq SQL Injection; OAUTH Phishing
8:32
8:32
Play later
Play later
Lists
Like
Liked
8:32Fake BSOD Delivered by Malicious Python Script Xavier found an odd malicious Python script that displays a blue screen of death to users. The purpose isn't quite clear. It could be a teach support scam tricking users into calling the 800 number displayed, or a simple anti-reversing trick https://isc.sans.edu/diary/Fake%20BSOD%20Delivered%20by%20Mal…
…
continue reading

1
SANS Stormcast Feb 14th 2025: DShield Honeypot SIEM; PAN OS Auth Bypass; Salt Typhone vs. Cisco; Crowdstrike Patch
6:02
6:02
Play later
Play later
Lists
Like
Liked
6:02DShield SIEM Docker Updates Interested in learning more about the attacks hitting your honeypot? Guy assembled a neat SIEM to create dashboards summarizing the attacks. https://isc.sans.edu/diary/DShield%20SIEM%20Docker%20Updates/31680 PANOS Path Confusion Auth Bypass Palo Alto Networks fixed a path confusion vulnerability introduced by the overly …
…
continue reading

1
SANS Stormcast Feb 13th 2025: Smart City Threats; Advanced Social Engineering Attacks; Wazuh Vulnerability; PAM Vulnerability; Ivanti Patches
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58An Ontology for Threats: Cybercrime and Digital Forensic Investigation on Smart City Infrastructure Smart cities is a big topic for many local governments. With building these complex systems, attacks will follow. https://isc.sans.edu/diary/An%20ontology%20for%20threats%2C%20cybercrime%20and%20digital%20forensic%20investigation%20on%20Smart%20City%…
…
continue reading

1
SANS Stormcast Feb 12th 2025: MSFT Patch Tuesday; Adobe Patches; FortiNet Acknowledges Exploitation of FortiOS
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53Microsoft Patch Tuesday Microsoft released patches for 55 vulnerabilities. Three of them are actagorized as critical, two are already exploited and another two have been publicly disclosed. The LDAP server vulnerability could become a huge deal, but it is not clear if an exploit will appear. https://isc.sans.edu/diary/Microsoft%20February%202025%20…
…
continue reading

1
#FKR Legal Roundtable! Brother Counsel - Nan Gallagher Esq. - Olivia Nile!
2:12:32
2:12:32
Play later
Play later
Lists
Like
Liked
2:12:32CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead Nurse Kim – Brother Counsel– Nan Gallagher – Olivia Nile/Lambo Fascinating conversation between two passionate, brilliant Lawyers and a Legal Researcher who is without peer! 😊 Guests: Brother Counsel: https://www.youtube.com/@BrotherCo…
…
continue reading

1
SANS Stormcast Feb 11th 2025: 7zip and MoW; Apple 0-Day Fix; AMD Microcode Overwrite; Trimble CityWorks 0-Day; MageCart Update
7:15
7:15
Play later
Play later
Lists
Like
Liked
7:15Reminder: 7-Zip MoW The MoW must be added to any files extracted from ZIP or other compound file formats. 7-Zip does not do so by default unless you alter the default configuration. https://isc.sans.edu/diary/Reminder%3A%207-Zip%20%26%20MoW/31668 Apple Fixes 0-Day Apple released updates to iOS and iPadOS fixing a bypass for USB Restricted Mode. The…
…
continue reading

1
SANS Internet Stormcast Feb 10th 2025: Podcast Anniversary; SSL 2.0; Exposed Deepseek Installs; Crypto Scam costs
6:52
6:52
Play later
Play later
Lists
Like
Liked
6:52SSL 2.0 Turns 30 This Sunday SSL was created in February 1995. However, back in 2005, only a year later, SSL 3.0 was released, and as of 2011, SSL 2.0 was deprecated, and support was removed from many crypto libraries. However, over 400k hosts are still exposed via SSL 2.0. https://isc.sans.edu/diary/SSL%202.0%20turns%2030%20this%20Sunday...%20Perh…
…
continue reading

1
SANS Internet Stormcast Feb 7th 2025: Unbreakable Anti-Debugging;
6:22
6:22
Play later
Play later
Lists
Like
Liked
6:22The Unbreakable Multi-Layer Anti-Debugging System Xavier found a nice Python script that included what it calls the "Unbreakable Multi-Layer Anti-Debugging System". Leave it up to Xavier to tear it appart for you. https://isc.sans.edu/diary/The%20Unbreakable%20Multi-Layer%20Anti-Debugging%20System/31658 Take my money: OCR crypto stealers in Google …
…
continue reading

1
SANS Internet Stormcast Feb 6th 2025: com- prefix domain phishing; Win 10 ESU pricing; Firefox CT Policy; Veeam and Netgear patches
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Phishing via com- prefix domains Every day, attackers are registering a few hunder domain names starting with com-. These are used in phishing e-mails, like for example "toll fee scams", to create more convincing phishing links. https://isc.sans.edu/diary/Phishing%20via%20%22com-%22%20prefix%20domains/31654 Microsoft Windows 10 Extended Security Up…
…
continue reading

1
An Evening with MazzaMedia! his fave 80s 90s Movies & Music #FKR !!
1:29:18
1:29:18
Play later
Play later
Lists
Like
Liked
1:29:18CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead #MazzaMedia! #FKR Preview for this Tuesday night, 7pm EST on @CallingBeings "An Evening with @MazzaMedia "!! Bring your favorite 80s & 90s movie selections to the Live Chat, as @Beatriz_JW2024 & I do our best to keep up with/Mazza! 😁😁 …
…
continue reading

1
SANS Internet Stormcast Feb 5th 2025: Feed Updates and Rosti; Resurrecting Dead S3 Buckets; Let's Encrypt Changes; Edge Device Security
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21Some Updates to Our Data Feeds We made some updates to the documentation for our data feeds, and added the neat Rosti Feed to our list as well as to our ipinfo page. https://isc.sans.edu/diary/Some%20updates%20to%20our%20data%20feeds/31650 8 Million Request Later We Meade the Solarwindws Supply Chain Attack Look Amateur While the title is a bit of …
…
continue reading

1
SANS ISC Stormcast Feb 4th 2025: Crypto Scam; Mediatek and D-Link Patches; Microsoft ends VPN Service
6:13
6:13
Play later
Play later
Lists
Like
Liked
6:13Crypto Wallet Scam YouTube spam messages leak private keys to crypto wallets. However, these keys can not be used to withdraw funds. Victims are scammed into depositing "gas fees" which are then collected by the scammer. https://isc.sans.edu/diary/Crypto%20Wallet%20Scam/31646 Mediatek Patches Mediatek patched numerous vulnerabilities in its WLAN pr…
…
continue reading

1
Wildin Out #FKR Style! Jen Altman - Auntie Deb - Nurse Kim - Michelle Littlefield!
1:45:09
1:45:09
Play later
Play later
Lists
Like
Liked
1:45:09CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead Nurse Kim – Jen Altman – Auntie Deb – Michelle Littlefield fantastic, fun, and entertaining conversation with these courageous folks, then Mystery Guest from the Stoughton District Court Michelle Littlefield joined us to tell of her jo…
…
continue reading

1
SANS ISC Stormcast Feb 3rd 2025: Automating Cyber Ranges; Deepseek Scams; PyPi Archived State; Medical Backdoors
6:23
6:23
Play later
Play later
Lists
Like
Liked
6:23To Simulate or Replicate: Crafting Cyber Ranges Automating the creation of cyber ranges. This will be a multi part series and this part covers creating the DNS configuration in Windows https://isc.sans.edu/diary/To%20Simulate%20or%20Replicate%3A%20Crafting%20Cyber%20Ranges/31642 Scammers Exploiting Deepseek Hype Scammers are using the hype around D…
…
continue reading

1
SANS ISC Stormcast Jan 31st 2025: Old Netgear Vuln in Depth; Lightning AI RCE; Canon Printer RCE; Deepseek Leak;
5:40
5:40
Play later
Play later
Lists
Like
Liked
5:40PCAPs or It Didn't Happen: Exposing an Old Netgear Vulnerability Still Active in 2025 [Guest Diary] https://isc.sans.edu/diary/PCAPs%20or%20It%20Didn%27t%20Happen%3A%20Exposing%20an%20Old%20Netgear%20Vulnerability%20Still%20Active%20in%202025%20%5BGuest%20Diary%5D/31638 RCE Vulnerablity in AI Development Platform Lightning AI Noma Security discover…
…
continue reading

1
SANS ISC Stormcast, Jan 30th 2025: Python vs. Powershell; Fortinet Exploits and Patch Policy; Voyager PHP Framework Vuln; Zyxel Targeted; VMWare AVI Patch
5:33
5:33
Play later
Play later
Lists
Like
Liked
5:33From PowerShell to a Python Obfuscation Race! This information stealer not only emulates a PDF document convincingly, but also includes its own Python environment for Windows https://isc.sans.edu/diary/From%20PowerShell%20to%20a%20Python%20Obfuscation%20Race!/31634 Alleged Active Exploit Sale of CVE-2024-55591 on Fortinet Devices An exploit for thi…
…
continue reading

1
SANS ISC Stormcast, Jan 29th 2025: Python Crypto Stealer; SimpleHelp Exploited; Apple Silicon Vuln; Teamviewer Vuln; Odd QR Code
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07Learn about fileless crypto stealers written in Python, the ongoing exploitation of recent SimpleHelp vulnerablities, new Apple Silicon Sidechannel attacks a Team Viewer Vulnerablity and an odd QR Code Fileless Python InfoStealer Targeting Exodus This Python script targets Exodus crypto wallet and password managers to steal crypto currencies. It do…
…
continue reading

1
SANS ISC Stormcast, Jan 28th 2025: Z-Shy Phishing; Apple Patches 0-Day; Fortinet Exploit Details; Github and Apache Solr Patches
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14This episode shows how attackers are bypassing phishing filter by abusing the "shy" softhyphen HTML entitiy. We got an update from Apple fixing a 0-day vulnerability in addition to a number of other issues. watchTowr show how to exploit an interesting FortiOS vulnerability and we have patches for Github Desktop and Apache Solr An unusal shy z-wasp …
…
continue reading

1
SANS ISC Stormcast, Jan 27, 2025: Access Brokers; Llama Stack Vuln; ESXi SSH Tunnels; Zyxel Boot Loops; Subary StarLeak
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Guest Diary: How Access Brokers Maintain Persistence Explore how cybercriminals utilize access brokers to persist within networks and the impact this has on organizational security. https://isc.sans.edu/forums/diary/Guest+Diary+How+Access+Brokers+Maintain+Persistence/31600/ Critical Vulnerability in Meta's Llama Stack (CVE-2024-50050) A deep dive i…
…
continue reading

1
CAB #137 Christopher Sharp - The Liberation Times
1:52:48
1:52:48
Play later
Play later
Lists
Like
Liked
1:52:48CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #UFO #UAP Journalist Christopher Sharp joined us to discuss his latest reporting on UFO Disclosure, what the new administration may do relative to UFO disclosure. We spoke of Special Forces UFO Experiencers who’ve come out, Jake Barber, Fred Baker, a…
…
continue reading

1
SANS ISC Stormcast, Jan 24, 2025: XSS in Email, SonicWall Exploited; Cisco Vulnerablities; AI and SOAR (@sans_edu research paper by Anthony Russo)
14:45
14:45
Play later
Play later
Lists
Like
Liked
14:45In today's episode, learn how an attacker attempted to exploit webmail XSS vulnerablities against us. Sonicwall released a critical patch fixing an already exploited vulnerability in its SMA 1000 appliance. Cisco fixed vulnerabilities in ClamAV and its Meeting Manager REST API. Learn from SANS.edu student Anthony Russo how to take advantage of AI f…
…
continue reading

1
SANS ISC Stormcast, Jan 23, 2025: PFSync Protocol; Oracle CPU; Korean VPN Supply Chain Attack; Ivanti Guidance
7:49
7:49
Play later
Play later
Lists
Like
Liked
7:49In today's episode, we start by talking about the PFSYNC protocol used to synchronize firewall states to support failover. Oracle released it's quarterly critical patch update. ESET is reporting about a critical VPN supply chain attack and CISA released guidance for victims of recent Ivanti related attacks. Catching CARP: Fishing for Firewall State…
…
continue reading

1
SANS ISC Stormcast, Jan 22, 2025: Geolocation via Starlink and Cloudflare; AI Prompt Risks; Homebrew Phishing
9:16
9:16
Play later
Play later
Lists
Like
Liked
9:16This episodes covers how Starlink users can be geolocated and how Cloudflare may help deanonymize users. The increased use of AI helpers leads to leaking data via careless prompts. Geolocation and Starlink https://isc.sans.edu/diary/Geolocation%20and%20Starlink/31612 Discover the potential geolocation risks associated with Starlink and how they mig…
…
continue reading

1
SANS ISC Stormcast, Jan 21, 2025: Downloading Partial ZIP files; Remote Tools Used in Attakcs; Azure DevOps SSRF
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20In this episode, we talk about downloading and analyzing partial ZIP files, how legitimate remote access tools are used in recent compromises and how a research found an SSRF vulnerability in Azure DevOps Partial ZIP File Downloads A closer look at how attackers are leveraging partial ZIP file downloads to bypass file verification systems and plant…
…
continue reading

1
French Canadian #FKR Invasion Jon Comeau & Tom CPU!!
2:06:06
2:06:06
Play later
Play later
Lists
Like
Liked
2:06:06CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead French Canadians Jon Comeau Researcher and Broadcaster Tom Derosier (CPU) joined us to discuss Jon’s research relative to Karen’s taillight that was smashed by MSP and Canton PD Officers, and various inconsistencies in Persecution witn…
…
continue reading

1
SANS ISC Stormcast, Jan 20, 2025: Honeypots for Offense; SimpleHelp and UEFI Secure Boot Vulnerabilities
3:24
3:24
Play later
Play later
Lists
Like
Liked
3:24In this episode, we cover how to use honeypot data to keep your offensive infrastructure alive longer, three critical vulnerabilities in SimpleHelp that must be patched now, and an interesting vulnerability affecting many systems allowing UEFI Secure Boot bypass. Leveraging Honeypot Data for Offensive Security Operations [Guest Diary] A recent gues…
…
continue reading

1
CAB #136 - Surrounded By Spirits With Doc Side Media
1:50:39
1:50:39
Play later
Play later
Lists
Like
Liked
1:50:39CALLING ALL BEINGS YouTube = https://www.youtube.com/@CallingAllBeings/streams #Paranormal Calling All Beings was delighted to be joined by Tyler Transue and Chris Ruppert from Docside Media, Directors/Producers of 7 films, and most recently “Surrounded by Spirits” in which they hired 3 individuals who are gifted in various disciplines of the Paran…
…
continue reading

1
Wednesday Listener Live Chat w/Bea, D.J. & Special Guest Josie Flynn !!
1:57:44
1:57:44
Play later
Play later
Lists
Like
Liked
1:57:44CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead #Paranormal This is the wildest experience we’ve EVER had on CAB, and that’s saying a lot… Josie Flynn joined us to tell of ghost happenings in her home and then had an impromptu experience with a spirit, in real time, LIVE On-Air. Not…
…
continue reading

1
SANS ISC Stormcast, Jan 17, 2025: Analyzing Complex Datasets, Citrix Update Issues, Ivanti's Security Advisory, and the Future of Passkeys (@sans_edu)
12:50
12:50
Play later
Play later
Lists
Like
Liked
12:50In this episode, we explore the efficient storage of honeypot logs in databases, issues with Citrix's Session Recording Agent and Windows Update. Ivanti is having another interesting security event and our SANS.edu graduate student Rich Green talks about his research on Passkeys. Extracting Practical Observations from Impractical Datasets: A SANS I…
…
continue reading

1
SANS ISC Stormcast, Jan 16, 2025: Critical Vulnerabilities and Cybersecurity Updates You Need to Know
9:02
9:02
Play later
Play later
Lists
Like
Liked
9:02Today's episode covers an odd 12 year old Netgear vulnerability that only received a proper CVE number last year. Learn about how to properly identify OpenID connect users and avoid domain name resue. Good old rsync turns out to be in need of patching and Fortinet: Not sure if it needs patching. Probably it does. Go ahead and patch it. The Curious …
…
continue reading

1
SANS ISC Stormcast, Jan 14 2025: Microsoft Patch Tuesday, FortiOS and FortiProxy Patches; Paessler PRTG Patches
7:48
7:48
Play later
Play later
Lists
Like
Liked
7:48Today, Microsoft Patch Tuesday headlines our news with Microsoft patching 209 vulnerabilities, some of which have already been exploited. Fortinet suspects a so far unpatched Node.js authentication bypass to be behind some recent exploits of FortiOS and FortiProxy devices. Microsoft January 2025 Patch Tuesday This month's Microsoft patch update add…
…
continue reading

1
SANS ISC Stormcast, Jan 14, 2025: Brute-Forcing Hikvision Devices, macOS SIP Bypass, Linux Rootkits, Aviatrix Exploits, and AWS Ransomware Tactics
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51Episode Summary: This episode covers brute-force attacks on the password reset functionality of Hikvision devices, a macOS SIP bypass vulnerability, Linux rootkit malware, and a novel ransomware campaign targeting AWS S3 buckets. Topics Covered: Hikvision Password Reset Brute Forcing URL: https://isc.sans.edu/diary/Hikvision%20Password%20Reset%20Br…
…
continue reading

1
SANS ISC Stormcast, Jan 13, 2025: Defender Updates, Ivanti RCE, Apple USB-C Hack and more
6:43
6:43
Play later
Play later
Lists
Like
Liked
6:43In today's episode, we cover the latest updates in cybersecurity: Windows Defender Enhances Chrome Extension Detection Microsoft's Defender now catalogs Chrome extensions to identify malicious ones. Learn how this improves enterprise security. https://isc.sans.edu/diary/Windows%20Defender%20Chrome%20Extension%20Detection/31574 Multi-OLE Analysis in…
…
continue reading

1
SANS ISC Stormcast: Cryptomining Malware, Fake PoC Exploit, Malicious Browser Extensions, and Palo Alto Vulnerabilities. Jan 9th 2024
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19In this episode, we explore the following stories: "Examining Redtail: Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics" Overview of Redtail's multi-architecture cryptomining malware exploiting vulnerabilities and deploying persistence techniques. URL: Examining Redtail: Analyzing a Sophisticated Cryptomining Malware and its …
…
continue reading

1
SANS ISC Stormcast, Jan 9, 2025: Critical Vulnerabilities in Ivanti, Aviatrix, and Hijacked Backdoors in Compromised Systems
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04In this episode, we discuss critical vulnerabilities in Ivanti Connect Secure and Policy Secure, command injection risks in Aviatrix Network Controllers, and the risks posed by hijacked abandoned backdoors. Episode Links and Topics: More Governments Backdoors in Your Backdoors https://labs.watchtowr.com/more-governments-backdoors-in-your-backdoors/…
…
continue reading

1
Monday #FKR Listener Live w/Meredith O_Neil II... The Cat Invasion!!
1:11:50
1:11:50
Play later
Play later
Lists
Like
Liked
1:11:50CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead OG Meredith O’Neil II Joins us in the CAB to discuss a bit more of her life, her background, her motivation toward protest, and her love of Cats!! 😊 Guests: Meredith O’Neil’s Twitter: https://x.com/meredithoneil CAB Collaborator: Beatr…
…
continue reading

1
SANS ISC Stormcast, Jan 8, 2025: Critical Vulnerabilities in SonicWall, Moxa, and Windows BitLocker – Plus, Malware Targets PHP Servers and the Launch of U.S. Cyber Trust Mark
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39In this episode, we dive into active exploitation of a zero-day in SonicWall SSL-VPN, privilege escalation vulnerabilities in Moxa devices, and a BitLocker bypass in Windows 11. We also cover cryptocurrency mining malware hitting PHP servers and the White House's launch of the U.S. Cyber Trust Mark to secure connected devices. Episode Links and Top…
…
continue reading

1
ISC StormCast for Tuesday, January 7th, 2025
4:52
4:52
Play later
Play later
Lists
Like
Liked
4:52In this episode of the SANS Internet Storm Center's Stormcast, we cover critical vulnerabilities affecting OpenSSH, BeyondTrust, and Nuclei, including the newly discovered "RegreSSHion" flaw and a bypass vulnerability in Nuclei. We also discuss how malware evasion techniques can impact analysis environments and highlight the dangers of fake exploit…
…
continue reading
In this episode of the SANS Internet Storm Center's Stormcast, we cover the latest cybersecurity threats and defenses, including Python-delivered malware, goodware hash sets, SSL/TLS protocol updates, and critical vulnerabilities in ASUS routers and Paessler PRTG. Stay informed and secure your systems! Full details and links to all stories: SwaetRA…
…
continue reading

1
CAB welcomes #FreeKarenRead Activist Meredith O'Neil!!
1:26:03
1:26:03
Play later
Play later
Lists
Like
Liked
1:26:03CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead OG Meredith O’Neil! Joins us in the CAB to discuss a bit of her life, her background, her entryway into the movement, read some of Olivia’s tweets and more 😊 Guests: Meredith O’Neil’s Twitter: https://x.com/meredithoneil CAB Collaborat…
…
continue reading

1
#FKR Solo Live with D.J. to talk Richard Green + Special Guest Olivia Nile in Chat!
1:16:20
1:16:20
Play later
Play later
Lists
Like
Liked
1:16:20CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead Researcher / Analyst Olivia Lambo aka Olivia Nile! I was both surprised and delighted that Olivia made my show tonight! She gave me some documentation, tweets, and photos of Karen’s vehicle that essentially made the show! Thank you as …
…
continue reading

1
#FKR Canton Knights gather at the Roundtable!
2:06:14
2:06:14
Play later
Play later
Lists
Like
Liked
2:06:14CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead Researcher / Knights of the Canton Roundtable! Honored to be joined by these Warriors who live amongst the intimidation tactics of the McAlbert led Canton band of law breakers. Tom, Scott, Peter, Dennis, Brenda, Dina, & Kristin! All Fi…
…
continue reading

1
Researcher_Analyst Grace of DreamFeed Media_ Experiments at 34 Fairview!
2:18:41
2:18:41
Play later
Play later
Lists
Like
Liked
2:18:41CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead Researcher / Data Analyst Grace of DreamFeed Media! Grace dropped by to tell our listeners of her research, and what hypotheses she’s able to affirm. She wowed the audience and the hosts with her intellect, her delivery, and delight to…
…
continue reading

1
#FKR Solo Live Community Togetherness my 2 cents #UnitedWeStandDividedWeFall
1:16:22
1:16:22
Play later
Play later
Lists
Like
Liked
1:16:22CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #UnitedWeStandDividedWeFall: Opening Space/Understanding/Conflict Resolution😊 Hosts: 1Love! D.J. #FreeKarenRead #JusticeForJohnOkeefe #JusticeForSandraBirchmore #TrueCrime #JusticeForEnrique #cantoncoverup #freekarenread #massstatepolice #cantoncorru…
…
continue reading

1
Friday Night #FKR Hangout w/Sara Shawk & Horrah, Christina R. & D.J.!!
1:45:20
1:45:20
Play later
Play later
Lists
Like
Liked
1:45:20CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead Listener Hangout & Chat: We just wanted to have a chat with listeners and enjoy the moment 😊 Hosts: Sara “Shawk and Horrah’s” Twitter: https://x.com/BostonGirl58 Christina’s Twitter is: https://x.com/ChristinaR26882 1Love! D.J. #FreeKa…
…
continue reading