Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
Devpolicy Talks

Development Policy Centre, ANU

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Devpolicy Talks brings you interviews, event recordings and in-depth documentary features relating to the topics we research at the Development Policy Centre. The Centre, part of the Australian National University’s Crawford School of Public Policy, works on Australian aid, development in Papua New Guinea and the Pacific, and regional and global development issues. It is host to the Devpolicy Blog (devpolicy.org) and a range of public events including the annual PNG Update, the Pacific Updat ...
  continue reading
 
Welcome to a transformational journey with your host Kelley Beveridge! Have you tasted success but still feel that something's missing? Are you striving for that elusive 'next level' but finding yourself stuck in the hustle? I've been there too. Join me, a seasoned global entrepreneur and personal development enthusiast, as I dive into the shared challenges of high achievers. Together, we'll unravel the secrets to overcoming barriers, mastering consistency, and achieving fulfillment. Tune in ...
  continue reading
 
Artwork

1
Getting Real With Rob

Real Estate & Building Industry Coalition (REBIC)

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Getting Real With Rob is the official podcast of the Real Estate & Building Industry Coalition in Charlotte, North Carolina. Hosted by Executive Director Rob Nanfelt, Getting Real With Rob features real conversations with industry leaders about real estate, housing and community.
  continue reading
 
Artwork

1
Sage Public Health

SAGE Publications Ltd.

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to the official free Podcast site from SAGE for Public Health. SAGE is a leading international publisher of journals, books, and electronic media for academic, educational, and professional markets with principal offices in Los Angeles, London, New Delhi, and Singapore.
  continue reading
 
Join best-selling author and actress Melanie Avalon as she interviews today's leading health and wellness experts, going beyond the fads to bring you all the biohacking tips, tricks, and techniques to effortlessly upgrade your body, brain, and life. Because why not live awesome? You got this! Theme Music by Narek Mirzaei, Artwork by Barbara McGregor
  continue reading
 
Welcome to ClutchCast, the official podcast of Clutch Recruits USA, a nonprofit organization dedicated to empowering students, families, and underserved communities through education, mentorship, and career readiness. We started as a platform to help student-athletes navigate the college recruiting process, but we have grown into so much more. Today, Clutch Recruits USA provides academic support, leadership development, career training and college and career readiness programs for students o ...
  continue reading
 
Artwork

1
Out of the Blue: An AJRCCM Podcast

American Thoracic Society

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Out of the Blue podcast takes you out of the pages of the American Journal of Respiratory and Critical Care Medicine and into the minds of the most brilliant researchers in the fields of respiratory, critical care, and sleep medicine.
  continue reading
 
Artwork

1
Kurdistan in America

Kurdistan Regional Government Representation in the United States

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
The Kurdistan in America podcast is the official voice of the Kurdistan Regional Government Representation in the United States, headquartered in Washington, DC. Hosted by Delovan Barwari, the show explores the enduring ties between Kurdistan and the United States. Now in its fifth season, this English-language podcast focuses on U.S. foreign policy and the Kurdistan Region, covering key topics such as security, politics, humanitarian affairs, economic development, culture, and the arts. We’ ...
  continue reading
 
98.7 Chatt Tech…where 98.7 percent of our students earn a career. Chattahoochee Technical College is comprised of eight campuses that serve a six-county area in beautiful North Georgia: Bartow, Cherokee, Cobb, Gilmer, Paulding, Pickens. We’re proud to offer outstanding education and training services as part of the Technical College System of Georgia’s mission of “providing technical, academic and adult education and training focused on building a well-educated, globally competitive workforc ...
  continue reading
 
Artwork

1
BEST Together Podcast

BEST Together (Blind Early Services TN)

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
BEST, Blind Early Services TN, is a nonprofit organization co-founded by two moms of young boys who are blind. BEST provides family support, early intervention and advocacy services for families and providers of children who are blind or low vision. In each episode we will interview parents, providers and those with lived experiences in the blind/low vision community. We want to educate, empower, encourage and equip you with all the tools you need to ensure the BEST start for your child!
  continue reading
 
Loading …
show series
 
TRANSCRIPT AND FULL SHOW NOTES: melanieavalon.com/essentialoilsrecipes CARD DECK: Essential Oils Recipes: A 52-Card Deck for Healing and Home: 50 Recipes⁠ ⁠Free Essential Oils Masterclass⁠ FACEBOOK: Join Melanie's Facebook group for a weekly episode giveaway and to discuss and learn about all things biohacking. All conversations are welcome! ⁠⁠⁠⁠IF…
  continue reading
 
Be Careful With Fake Zoom Client Downloads Miscreants are tricking victims into downloading fake Zoom clients (and likely other meeting software) by first sending them fake meeting invites that direct victims to a page that offers malware for download as an update to the Zoom client. https://isc.sans.edu/diary/Be%20Careful%20With%20Fake%20Zoom%20Cl…
  continue reading
 
Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://is…
  continue reading
 
vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%…
  continue reading
 
I’m joined by David Gilks, a chartered herbalist, biokinesiologist, and former Medical Exercise Program Director with 30+ years of experience in the fields of natural medicine, neuroscience, and behavioral change. David brings a rare blend of ancient wisdom and modern science to the table as we unpack the one thing that truly changes everything—our…
  continue reading
 
Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
  continue reading
 
A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently p…
  continue reading
 
The episode opens with Leith Greensalde recounting her journey from rural Queensland to international global health work. After starting her career as a political adviser to senior Labor politicians including Brian Howe, she moved to the United States for graduate study at the Harvard Kennedy School prior to Labor's anticipated 1996 election loss. …
  continue reading
 
TRANSCRIPT AND FULL SHOW NOTES: ⁠melanieavalon.com/secretlanguage ⁠Book: The Secret Language of the Body: Regulate Your Nervous System, Heal Your Body, Free Your Mind FACEBOOK: Join Melanie's Facebook group for a weekly episode giveaway and to discuss and learn about all things biohacking. All conversations are welcome! ⁠⁠⁠IF Biohackers: Intermitte…
  continue reading
 
Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
  continue reading
 
Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
  continue reading
 
SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
  continue reading
 
I’m joined by Victoria Renaissance—brand strategist and Instagram content expert—who helps purpose-driven entrepreneurs turn their brilliance into bold, one-of-a-kind brands. We dive into the mindset blocks that keep people from showing up online, what makes content actually stick, and how to attract dream clients through authenticity, not performa…
  continue reading
 
SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
  continue reading
 
TRANSCRIPT AND FULL SHOW NOTES: melanieavalon.com/intentionality SPONSORS AND DISCOUNTS: LMNT: Get your free Sample Pack with any LMNT purchase at ⁠drinklmnt.com/melanieavalon⁠. FACEBOOK: Join Melanie's Facebook group for a weekly episode giveaway and to discuss and learn about all things biohacking. All conversations are welcome! ⁠⁠IF Biohackers: …
  continue reading
 
Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
  continue reading
 
New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive VIP memberships to withdraw the money. https://isc.sans.edu/diary/New%20Variant%20of%20Crypto%20Confidence%20Scam/31968 Malicious Chrome Extensions Malici…
  continue reading
 
Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do offer lists of researchers and just added three new groups today https://isc.sans.edu/diary/Researchers%20Scanning%20the%20Intern…
  continue reading
 
In this episode, we dive into what it takes to start and grow a mission-led business with no prior entrepreneurial experience. I am joined by the Waples sisters, co-founders of RESTOR, a thriving medical aesthetics and functional medicine brand. We explore how they reinvented themselves, built confidence through bold pivots, and turned a powerful m…
  continue reading
 
The episode opens with Helen describing her unexpected route into humanitarian law, beginning as a labour lawyer before being drawn into international work through her involvement with women from the former Yugoslavia in the 1990s. Her early efforts to help establish rape as a war crime led her to gather evidence for war crimes tribunals and pursue…
  continue reading
 
RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960 RVTools compromise confirmed Robware.net, the site behind the popular tool RVTools now confirmed that it was compromi…
  continue reading
 
A little-known fact about the important role played by UNC Charlotte in helping the city to attract large industries and corporations is its status as an R1 University (according to the Carnegie Classification of Institutions of Higher Education), meaning is a doctoral-granting institution with the highest level of research activity. It cannot be u…
  continue reading
 
xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
  continue reading
 
Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
  continue reading
 
TRANSCRIPT AND FULL SHOW NOTES: melanieavalon.com/metabolicfreedom SPONSORS AND DISCOUNTS: SEED: Get 25% off your first month of DS-01® with code 25MELANIE at ⁠seed.com/melanieavalon⁠. FACEBOOK: Join Melanie's Facebook group for a weekly episode giveaway and to discuss and learn about all things biohacking. All conversations are welcome! ⁠IF Biohac…
  continue reading
 
Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
  continue reading
 
Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.san…
  continue reading
 
In this episode, we dive into the entrepreneurial journey of a second-generation business builder. Inspired by the financial struggles he witnessed at home, he pursued a career in accounting and later launched a successful bookkeeping firm for construction businesses in Canada. He shares lessons learned from rapid startup growth, the importance of …
  continue reading
 
Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking d…
  continue reading
 
Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/ FBI Warns of End-of-life routers The FBI is tracking larger…
  continue reading
 
No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932 SAMSUNG magicINFO 9 Server Flaw Still exploitable The SAMSUNG magicINFO 9 Serv…
  continue reading
 
TRANSCRIPT AND FULL SHOW NOTES: melanieavalon.com/selfhatred BOOK: I Hate Myself LMNT: Get a free sample pack with any purchase at ⁠drinklmnt.com/melanieavalon⁠. INSTAGRAM: Follow Melanie on Instagram to see the latest moments, products, and #allthethings! ⁠@melanieavalon⁠ AVALONX: AvalonX Spirulina is out now! AvalonX supplements are free of toxic…
  continue reading
 
This week, President Kumara Jayasuriya has served as Southwest Minnesota State University’s president for six years, starting in 2019. We discussed his successes at SMSU with him and what he will miss most. He will retire after the 2025 spring commencement. President Jayasuriya will be greatly missed here on campus as he helped grow SMSU during his…
  continue reading
 
Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%22Modular%22%20Malware/31928 Sysaid XXE Vulnerabilities IT Service Management Software Sysaid patched a number of XXE vulner…
  continue reading
 
Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that, in addition to implementing typical infostealer functionality, includes a web server suitable to create local phishing sites. https://isc.sans.edu/diary/Python%20InfoStealer%20with%20Embedded%20Phishing%20Webserver/31924 Android Update Fixes Freetype 0…
  continue reading
 
In this episode we dive into the often overlooked truth: self-care isn't selfish - it's a business strategy. If you've ever felt guilty stepping away from your work to take care of yourself, you're not alone. Bu here's the reality - your well-being is a non negotiable when it comes to sustainable success. We explore practical self-care hacks so you…
  continue reading
 
Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung s MagicInfo 9 CMS, was patched last August but attracted new attention last week after being mostly ignored so far. https://isc.sans.edu/diary/Mirai+No…
  continue reading
 
Steganography Challenge Didier published a fun steganography challenge. A solution will be offered on Saturday. https://isc.sans.edu/diary/Steganography+Challenge/31910 Microsoft Makes Passkeys Default Authentication Method Microsoft is now encouraging new users to use Passkeys as the default and only login method, further moving away from password…
  continue reading
 
The interview opens with Postma reflecting on his career trajectory, from senior roles at the United Nations and the Dutch Ministry of Justice and Security to founding Justice for Prosperity. He explains how the organisation operates at the intersection of intelligence and advocacy, using advanced technologies — including AI-driven tools — to map a…
  continue reading
 
TRANSCRIPT AND FULL SHOW NOTES: ⁠melanieavalon.com/darkcalories⁠ INSTAGRAM: Follow Melanie on Instagram to see the latest moments, products, and #allthethings! ⁠@melanieavalon⁠ AVALONX: AvalonX Spirulina is out now! AvalonX supplements are free of toxic fillers and common allergens (including wheat, rice, gluten, dairy, shellfish, nuts, soy, eggs, …
  continue reading
 
Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
  continue reading
 
Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play