show episodes
 
Artwork

1
For The Culture Live

Comedy Pop-Up Podcast Network

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
For The Culture Podcast focuses on Engaging banter amongst Hosts Nick Alexander, Ty Sterlin & Guests as they try to speak to the Pulse of Today’s Hip Hop, Comedy, Sports & Newsworthy related subjects.
  continue reading
 
Artwork

1
Future Role Model w/Natasha Pearl Hansen

Comedy Pop-Up Podcast Network

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Natasha Pearl Hansen is a comedian, actress, producer, writer and Second City Chicago alum. She has performed in top comedy festivals nationwide and continues to tour both nationally and internationally, sharing the stage with the best comedians of today. A viral author for Men's Health Magazine, she will eventually release her series of "Future Role Model" books she began writing at age 14: a collection of hilarious stories, quotes, and F***ed up situations she has put herself in. "Future R ...
  continue reading
 
Artwork

1
They Tried To Bury Us with Tamer Kattan

Comedy Pop-Up Podcast Network

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Each week, an immigrant of the United States shares their American origin story. THEY TRIED TO BURY US is a weekly podcast hosted by Egyptian-born comedian Tamer Kattan and his mother Kity. Being the son of a Muslim father and a Jewish mother left Tamer struggling with notions of identity. It’s that exact struggle that Tamer and his mom dive into as they sit down with guests to hear about their American origin stories. “They tried to bury us, they didn’t know we were seeds” is a Mexican sayi ...
  continue reading
 
Artwork

1
Hardware Addicts

TuxDigital Network

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
If you’re addicted to Computer Hardware and technology, this podcast is for you. Hardware Addicts brings you the latest trends in tech along with brain filling tips and tricks to help you get the most out of your hardware. Join Ryan, Wendy, and Michael as we geek out on the physical technology that powers our addiction. Hardware Addicts is a podcast brought to you by the TuxDigital Network (https://tuxdigital.com/)!
  continue reading
 
Artwork

1
Calling All Beings

CallingAllBeings

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
Welcome to the Calling All Beings Network of Friends! In the wake of the government’s acknowledgement of the reality of Unidentified Aerial Phenomenon (UAP), the CAB is driven to take the topic of UAP and the wider Phenomenon beyond the halls of the weird and into the broader public arena. Our goal is to ask “what if?” of professionals, academics, entertainers, athletes, and everyday people in order to inspire, enlighten, and explore how the potential reality of contact with Non-Human Intell ...
  continue reading
 
Loading …
show series
 
XWorm Cocktail: A Mix of PE data with PowerShell Code Quick analysis of an interesting XWrom sample with powershell code embedded inside an executable https://isc.sans.edu/diary/XWorm+Cocktail+A+Mix+of+PE+data+with+PowerShell+Code/31700 Microsoft's Majorana 1 Chip Carves New Path for Quantum Computing Microsoft announced a breack through in Quantum…
  continue reading
 
ModelScan: Protection Against Model Serialization Attacks ModelScan is a tool to inspect AI models for deserialization attacks. The tool will detect suspect commands and warn the user. https://isc.sans.edu/diary/ModelScan%20-%20Protection%20Against%20Model%20Serialization%20Attacks/31692 OpenSSH MitM and DoS Vulnerabilities OpenSSH Patched two vuln…
  continue reading
 
CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead James Jackson of the J.F.K Show! Real as it gets, James Jackson of the J.F.K who has just launched his own show on YouTube @JamesJksn honored us with his presence and the nature of his advocacy which is without a veneer, just the lesso…
  continue reading
 
My Very Personal Guidance and Strategies to Protect Network Edge Devices A quick summary to help you secure edge devices. This may be a bit opinionated, but these are the strategies that I find work and are actionable. https://isc.sans.edu/diary/My%20Very%20Personal%20Guidance%20and%20Strategies%20to%20Protect%20Network%20Edge%20Devices/31660 Postg…
  continue reading
 
CALLING ALL BEINGS: YouTube = https://www.youtube.com/@CallingAllBeings/streams James Iandoli | Awakening Human Potential Through UAP & Consciousness Studies. Research and Field Work investigating UFOs and related phenomena: UFO/UAP, CE-5, Consciousness, and more! Engaging The Phenomenon; Directly, Intellectually, Philosophically, Socially, and Bey…
  continue reading
 
Fake BSOD Delivered by Malicious Python Script Xavier found an odd malicious Python script that displays a blue screen of death to users. The purpose isn't quite clear. It could be a teach support scam tricking users into calling the 800 number displayed, or a simple anti-reversing trick https://isc.sans.edu/diary/Fake%20BSOD%20Delivered%20by%20Mal…
  continue reading
 
DShield SIEM Docker Updates Interested in learning more about the attacks hitting your honeypot? Guy assembled a neat SIEM to create dashboards summarizing the attacks. https://isc.sans.edu/diary/DShield%20SIEM%20Docker%20Updates/31680 PANOS Path Confusion Auth Bypass Palo Alto Networks fixed a path confusion vulnerability introduced by the overly …
  continue reading
 
An Ontology for Threats: Cybercrime and Digital Forensic Investigation on Smart City Infrastructure Smart cities is a big topic for many local governments. With building these complex systems, attacks will follow. https://isc.sans.edu/diary/An%20ontology%20for%20threats%2C%20cybercrime%20and%20digital%20forensic%20investigation%20on%20Smart%20City%…
  continue reading
 
Microsoft Patch Tuesday Microsoft released patches for 55 vulnerabilities. Three of them are actagorized as critical, two are already exploited and another two have been publicly disclosed. The LDAP server vulnerability could become a huge deal, but it is not clear if an exploit will appear. https://isc.sans.edu/diary/Microsoft%20February%202025%20…
  continue reading
 
CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead Nurse Kim – Brother Counsel– Nan Gallagher – Olivia Nile/Lambo Fascinating conversation between two passionate, brilliant Lawyers and a Legal Researcher who is without peer! 😊 Guests: Brother Counsel: https://www.youtube.com/@BrotherCo…
  continue reading
 
Reminder: 7-Zip MoW The MoW must be added to any files extracted from ZIP or other compound file formats. 7-Zip does not do so by default unless you alter the default configuration. https://isc.sans.edu/diary/Reminder%3A%207-Zip%20%26%20MoW/31668 Apple Fixes 0-Day Apple released updates to iOS and iPadOS fixing a bypass for USB Restricted Mode. The…
  continue reading
 
SSL 2.0 Turns 30 This Sunday SSL was created in February 1995. However, back in 2005, only a year later, SSL 3.0 was released, and as of 2011, SSL 2.0 was deprecated, and support was removed from many crypto libraries. However, over 400k hosts are still exposed via SSL 2.0. https://isc.sans.edu/diary/SSL%202.0%20turns%2030%20this%20Sunday...%20Perh…
  continue reading
 
The Unbreakable Multi-Layer Anti-Debugging System Xavier found a nice Python script that included what it calls the "Unbreakable Multi-Layer Anti-Debugging System". Leave it up to Xavier to tear it appart for you. https://isc.sans.edu/diary/The%20Unbreakable%20Multi-Layer%20Anti-Debugging%20System/31658 Take my money: OCR crypto stealers in Google …
  continue reading
 
Phishing via com- prefix domains Every day, attackers are registering a few hunder domain names starting with com-. These are used in phishing e-mails, like for example "toll fee scams", to create more convincing phishing links. https://isc.sans.edu/diary/Phishing%20via%20%22com-%22%20prefix%20domains/31654 Microsoft Windows 10 Extended Security Up…
  continue reading
 
CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead #MazzaMedia! #FKR Preview for this Tuesday night, 7pm EST on @CallingBeings "An Evening with @MazzaMedia "!! Bring your favorite 80s & 90s movie selections to the Live Chat, as @Beatriz_JW2024 & I do our best to keep up with/Mazza! 😁😁 …
  continue reading
 
Some Updates to Our Data Feeds We made some updates to the documentation for our data feeds, and added the neat Rosti Feed to our list as well as to our ipinfo page. https://isc.sans.edu/diary/Some%20updates%20to%20our%20data%20feeds/31650 8 Million Request Later We Meade the Solarwindws Supply Chain Attack Look Amateur While the title is a bit of …
  continue reading
 
Crypto Wallet Scam YouTube spam messages leak private keys to crypto wallets. However, these keys can not be used to withdraw funds. Victims are scammed into depositing "gas fees" which are then collected by the scammer. https://isc.sans.edu/diary/Crypto%20Wallet%20Scam/31646 Mediatek Patches Mediatek patched numerous vulnerabilities in its WLAN pr…
  continue reading
 
CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead Nurse Kim – Jen Altman – Auntie Deb – Michelle Littlefield fantastic, fun, and entertaining conversation with these courageous folks, then Mystery Guest from the Stoughton District Court Michelle Littlefield joined us to tell of her jo…
  continue reading
 
To Simulate or Replicate: Crafting Cyber Ranges Automating the creation of cyber ranges. This will be a multi part series and this part covers creating the DNS configuration in Windows https://isc.sans.edu/diary/To%20Simulate%20or%20Replicate%3A%20Crafting%20Cyber%20Ranges/31642 Scammers Exploiting Deepseek Hype Scammers are using the hype around D…
  continue reading
 
PCAPs or It Didn't Happen: Exposing an Old Netgear Vulnerability Still Active in 2025 [Guest Diary] https://isc.sans.edu/diary/PCAPs%20or%20It%20Didn%27t%20Happen%3A%20Exposing%20an%20Old%20Netgear%20Vulnerability%20Still%20Active%20in%202025%20%5BGuest%20Diary%5D/31638 RCE Vulnerablity in AI Development Platform Lightning AI Noma Security discover…
  continue reading
 
From PowerShell to a Python Obfuscation Race! This information stealer not only emulates a PDF document convincingly, but also includes its own Python environment for Windows https://isc.sans.edu/diary/From%20PowerShell%20to%20a%20Python%20Obfuscation%20Race!/31634 Alleged Active Exploit Sale of CVE-2024-55591 on Fortinet Devices An exploit for thi…
  continue reading
 
Learn about fileless crypto stealers written in Python, the ongoing exploitation of recent SimpleHelp vulnerablities, new Apple Silicon Sidechannel attacks a Team Viewer Vulnerablity and an odd QR Code Fileless Python InfoStealer Targeting Exodus This Python script targets Exodus crypto wallet and password managers to steal crypto currencies. It do…
  continue reading
 
This episode shows how attackers are bypassing phishing filter by abusing the "shy" softhyphen HTML entitiy. We got an update from Apple fixing a 0-day vulnerability in addition to a number of other issues. watchTowr show how to exploit an interesting FortiOS vulnerability and we have patches for Github Desktop and Apache Solr An unusal shy z-wasp …
  continue reading
 
Guest Diary: How Access Brokers Maintain Persistence Explore how cybercriminals utilize access brokers to persist within networks and the impact this has on organizational security. https://isc.sans.edu/forums/diary/Guest+Diary+How+Access+Brokers+Maintain+Persistence/31600/ Critical Vulnerability in Meta's Llama Stack (CVE-2024-50050) A deep dive i…
  continue reading
 
CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #UFO #UAP Journalist Christopher Sharp joined us to discuss his latest reporting on UFO Disclosure, what the new administration may do relative to UFO disclosure. We spoke of Special Forces UFO Experiencers who’ve come out, Jake Barber, Fred Baker, a…
  continue reading
 
In today's episode, learn how an attacker attempted to exploit webmail XSS vulnerablities against us. Sonicwall released a critical patch fixing an already exploited vulnerability in its SMA 1000 appliance. Cisco fixed vulnerabilities in ClamAV and its Meeting Manager REST API. Learn from SANS.edu student Anthony Russo how to take advantage of AI f…
  continue reading
 
In today's episode, we start by talking about the PFSYNC protocol used to synchronize firewall states to support failover. Oracle released it's quarterly critical patch update. ESET is reporting about a critical VPN supply chain attack and CISA released guidance for victims of recent Ivanti related attacks. Catching CARP: Fishing for Firewall State…
  continue reading
 
This episodes covers how Starlink users can be geolocated and how Cloudflare may help deanonymize users. The increased use of AI helpers leads to leaking data via careless prompts. Geolocation and Starlink https://isc.sans.edu/diary/Geolocation%20and%20Starlink/31612 Discover the potential geolocation risks associated with Starlink and how they mig…
  continue reading
 
In this episode, we talk about downloading and analyzing partial ZIP files, how legitimate remote access tools are used in recent compromises and how a research found an SSRF vulnerability in Azure DevOps Partial ZIP File Downloads A closer look at how attackers are leveraging partial ZIP file downloads to bypass file verification systems and plant…
  continue reading
 
CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead French Canadians Jon Comeau Researcher and Broadcaster Tom Derosier (CPU) joined us to discuss Jon’s research relative to Karen’s taillight that was smashed by MSP and Canton PD Officers, and various inconsistencies in Persecution witn…
  continue reading
 
In this episode, we cover how to use honeypot data to keep your offensive infrastructure alive longer, three critical vulnerabilities in SimpleHelp that must be patched now, and an interesting vulnerability affecting many systems allowing UEFI Secure Boot bypass. Leveraging Honeypot Data for Offensive Security Operations [Guest Diary] A recent gues…
  continue reading
 
CALLING ALL BEINGS YouTube = https://www.youtube.com/@CallingAllBeings/streams #Paranormal Calling All Beings was delighted to be joined by Tyler Transue and Chris Ruppert from Docside Media, Directors/Producers of 7 films, and most recently “Surrounded by Spirits” in which they hired 3 individuals who are gifted in various disciplines of the Paran…
  continue reading
 
CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead #Paranormal This is the wildest experience we’ve EVER had on CAB, and that’s saying a lot… Josie Flynn joined us to tell of ghost happenings in her home and then had an impromptu experience with a spirit, in real time, LIVE On-Air. Not…
  continue reading
 
In this episode, we explore the efficient storage of honeypot logs in databases, issues with Citrix's Session Recording Agent and Windows Update. Ivanti is having another interesting security event and our SANS.edu graduate student Rich Green talks about his research on Passkeys. Extracting Practical Observations from Impractical Datasets: A SANS I…
  continue reading
 
Today's episode covers an odd 12 year old Netgear vulnerability that only received a proper CVE number last year. Learn about how to properly identify OpenID connect users and avoid domain name resue. Good old rsync turns out to be in need of patching and Fortinet: Not sure if it needs patching. Probably it does. Go ahead and patch it. The Curious …
  continue reading
 
Today, Microsoft Patch Tuesday headlines our news with Microsoft patching 209 vulnerabilities, some of which have already been exploited. Fortinet suspects a so far unpatched Node.js authentication bypass to be behind some recent exploits of FortiOS and FortiProxy devices. Microsoft January 2025 Patch Tuesday This month's Microsoft patch update add…
  continue reading
 
Episode Summary: This episode covers brute-force attacks on the password reset functionality of Hikvision devices, a macOS SIP bypass vulnerability, Linux rootkit malware, and a novel ransomware campaign targeting AWS S3 buckets. Topics Covered: Hikvision Password Reset Brute Forcing URL: https://isc.sans.edu/diary/Hikvision%20Password%20Reset%20Br…
  continue reading
 
In today's episode, we cover the latest updates in cybersecurity: Windows Defender Enhances Chrome Extension Detection Microsoft's Defender now catalogs Chrome extensions to identify malicious ones. Learn how this improves enterprise security. https://isc.sans.edu/diary/Windows%20Defender%20Chrome%20Extension%20Detection/31574 Multi-OLE Analysis in…
  continue reading
 
In this episode, we explore the following stories: "Examining Redtail: Analyzing a Sophisticated Cryptomining Malware and its Advanced Tactics" Overview of Redtail's multi-architecture cryptomining malware exploiting vulnerabilities and deploying persistence techniques. URL: Examining Redtail: Analyzing a Sophisticated Cryptomining Malware and its …
  continue reading
 
In this episode, we discuss critical vulnerabilities in Ivanti Connect Secure and Policy Secure, command injection risks in Aviatrix Network Controllers, and the risks posed by hijacked abandoned backdoors. Episode Links and Topics: More Governments Backdoors in Your Backdoors https://labs.watchtowr.com/more-governments-backdoors-in-your-backdoors/…
  continue reading
 
CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead OG Meredith O’Neil II Joins us in the CAB to discuss a bit more of her life, her background, her motivation toward protest, and her love of Cats!! 😊 Guests: Meredith O’Neil’s Twitter: https://x.com/meredithoneil CAB Collaborator: Beatr…
  continue reading
 
In this episode, we dive into active exploitation of a zero-day in SonicWall SSL-VPN, privilege escalation vulnerabilities in Moxa devices, and a BitLocker bypass in Windows 11. We also cover cryptocurrency mining malware hitting PHP servers and the White House's launch of the U.S. Cyber Trust Mark to secure connected devices. Episode Links and Top…
  continue reading
 
In this episode of the SANS Internet Storm Center's Stormcast, we cover critical vulnerabilities affecting OpenSSH, BeyondTrust, and Nuclei, including the newly discovered "RegreSSHion" flaw and a bypass vulnerability in Nuclei. We also discuss how malware evasion techniques can impact analysis environments and highlight the dangers of fake exploit…
  continue reading
 
In this episode of the SANS Internet Storm Center's Stormcast, we cover the latest cybersecurity threats and defenses, including Python-delivered malware, goodware hash sets, SSL/TLS protocol updates, and critical vulnerabilities in ASUS routers and Paessler PRTG. Stay informed and secure your systems! Full details and links to all stories: SwaetRA…
  continue reading
 
CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead OG Meredith O’Neil! Joins us in the CAB to discuss a bit of her life, her background, her entryway into the movement, read some of Olivia’s tweets and more 😊 Guests: Meredith O’Neil’s Twitter: https://x.com/meredithoneil CAB Collaborat…
  continue reading
 
CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead Researcher / Analyst Olivia Lambo aka Olivia Nile! I was both surprised and delighted that Olivia made my show tonight! She gave me some documentation, tweets, and photos of Karen’s vehicle that essentially made the show! Thank you as …
  continue reading
 
CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead Researcher / Knights of the Canton Roundtable! Honored to be joined by these Warriors who live amongst the intimidation tactics of the McAlbert led Canton band of law breakers. Tom, Scott, Peter, Dennis, Brenda, Dina, & Kristin! All Fi…
  continue reading
 
CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead Researcher / Data Analyst Grace of DreamFeed Media! Grace dropped by to tell our listeners of her research, and what hypotheses she’s able to affirm. She wowed the audience and the hosts with her intellect, her delivery, and delight to…
  continue reading
 
CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #UnitedWeStandDividedWeFall: Opening Space/Understanding/Conflict Resolution😊 Hosts: 1Love! D.J. #FreeKarenRead #JusticeForJohnOkeefe #JusticeForSandraBirchmore #TrueCrime #JusticeForEnrique #cantoncoverup #freekarenread #massstatepolice #cantoncorru…
  continue reading
 
CALLING ALL BEINGS-True Crime Unsolved: YouTube = https://www.youtube.com/@CallingAllBeings/streams #FreeKarenRead Listener Hangout & Chat: We just wanted to have a chat with listeners and enjoy the moment 😊 Hosts: Sara “Shawk and Horrah’s” Twitter: https://x.com/BostonGirl58 Christina’s Twitter is: https://x.com/ChristinaR26882 1Love! D.J. #FreeKa…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play