5 Bytes Podcast features some of the highlights in enterprise IT for the last week as well as some useful resources for IT Pros and more!
…
continue reading
5 Bytes Podcast
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Podcast on everything crypto and finance featuring experts from all areas of the finance world.
…
continue reading
Don't just learn the cloud—BYTE it! Byte the Cloud is your go-to, on-the-go, podcast for mastering AWS, Azure, and Google Cloud certifications and exam prep!
…
continue reading
Tech topics, stories, and guests, for the everyday techy.
…
continue reading
A weekly discussion on health matters affecting Audrain County, Missouri residents from the Audrain County Health Department.
…
continue reading
1
Training ByteSize Project Management - insights, interviews and expertise
www.trainingbytesize.com
Welcome to Training ByteSize Project Management, a podcast about all things around projects, programmes and portfolios. Our episodes bring you top-tips, such as how to pass your next accredited exam, through to unique industry insights and interviews.
…
continue reading
Insights from the SEVEN psychology at work team, exploring common themes in the workplace using our expertise and research.
…
continue reading
Award-winning business writer Jonathan Berr makes the worlds of business, economics and investing less mysterious for the average person.
…
continue reading
Lectionary Bytes is a podcast with short episodes featuring professors and students from Concordia Seminary in Saint Louis, narrowing in on an insight or two from the assigned scripture readings throughout the church year. Brought to you by the Hasse Memorial Library.
…
continue reading
It's not all fun and games.
…
continue reading
The commercial world is always changing and the legal landscape never stands still. Keeping pace with all those changes, and knowing how they affect your organisation, is a big responsibility and a challenging task. Ashurst Legal Outlook will keep you at the forefront of the most pressing legal issues, offering insights from legal experts across our international network.
…
continue reading
👋 Hello everyone, welcome to Take a Byte by Accton In this show, we discuss IT, networking technology, and industry news in a relaxed, conversational style. 🎙️ Each episode features the latest tech trends and practical technical knowledge. Whether you’re a professional or just curious about technology, there’s content for you here. 🌐 We bring you interesting stories, the latest in the world of networking, and easy-to-understand technical explanations. Take a Byte is not just a show; it’s an ...
…
continue reading
Where Automation Meets Security
…
continue reading
you want to be on a Podcast? well heres your chance to talk about it..........Development mode of mach5.media website integration
…
continue reading
With cybersecurity becoming more complex and the threats even more dangerous… knowing what to do to protect yourself can seem like an impossible task. That is until now, welcome to the CyberBites Podcast. The Podcast where we help you filter through the noise one byte at a time.
…
continue reading
Welcome to Bytes of Bio, a podcast where we explain Bioinformatics, an effective combination between Computer Science and Biology. We're May and Allamanda or Allie for short. Welcome to our show! So glad to have you here! We upload every 3 weeks on Sundays. Hope to see you then!
…
continue reading
Welcome to Biblical Bytes, a podcast dedicated to equipping and inspiring Christians to deepen their relationship with the word of God. Join hosts Adam van Arsdale and Alison Howell as they share their passion for biblical literacy and provide practical tips and techniques for personal Bible study. Whether you're a seasoned Bible student or just starting your journey, this podcast is for you. Join us on our mission to reduce biblical illiteracy and grow in your understanding of God's word. S ...
…
continue reading
Welcome to Bits, Bytes, and Beyond, the podcast that fuels your passion for gaming, technology, and automotive adventures! Join us as we explore the latest in cutting-edge tech, the thrilling world of video games, and the ever-evolving landscape of the automotive industry. With a blend of insightful commentary, personal anecdotes, and expert insights, Bits, Bytes, and Beyond is your go-to source for all things tech and automotive. Tune in and join us on this journey as we uncover the interse ...
…
continue reading
Byte-sized tutorials to prepare for Comptia Network+ exam, and for beginners who want to enter into cybersecurity.
…
continue reading
Keyword on the Street is an Australian podcast presenting the latest developments in the world of digital marketing and SEO. Listen in for actionable advice on boosting search rankings, nailing your keyword research, optimising your content strategy and making the most of website traffic. Stretched for time? We get that keeping up with the ever-changing digital landscape is hard. So tune into Quick Byte episodes for a 5-minute dose of the tech news and marketing tips you need to know about. ...
…
continue reading
Our Podcast is here to bring back the best stories from the old days,share the history of the business we once loved and capture memories in sound bytes. We want to entertain you with our stories and the stories of all the legends, to introduce you to the way things were and still auto-be. allow you to learn about up and coming talent and shows as well as just review stories, pay per views and enjoy our show. Support this podcast: https://podcasters.spotify.com/pod/show/dale-troutman/support
…
continue reading
Welcome to the Bridges and Bytes Podcast, from the UCD College of Engineering and Architecture. Season 1 is a six-part series on the 'Student Voice on AI and Assessment'. Each episode was produced and hosted by groups of UCD Engineering and Architecture Students, and covers a different types of assessment. The Season is topped and tailed with a trailer and a review episode. Credits This season was supported by an award by the UCD Faculty Partnership Programme to Jennifer Keenahan and Mairead ...
…
continue reading
A fresh Apple tech news podcast from an Australian perspective. Get the latest news, rumours and reviews on Apple iPhone, iPad, Watch, Mac and more!
…
continue reading
Varrlyn is a consultancy firm established in 2010 and based in Amsterdam, The Netherlands. At Varrlyn, we are trained to think ahead. With advanced digital tools, we enjoy turning any obstacle into a chance to thrive. It’s all about thinking in terms of opportunities, together. With our four Valuestreams we help you propelling your dreams forward with ambition and excellence. Finance & Risk Asset Management Digital services Dealing room & Sustainability services Get ready to improve your cos ...
…
continue reading
Welcome to Tip Top Tech, a tech news podcast by three college friends with a passion for exploring the wonders of the technological age we live in and the news that comes out of it. Find us on Twitter at www.twitter.com/TipTopTechCast !
…
continue reading
Why Bytes? Originally, a byte was any string of more than one bit that made up a simple piece of information. My goal is to provide a bit of information that supports, helps and inspires baby boomers to live their best life via my Boomer Bytes Podcast. We “Baby Boomers” were born between 1946 and 1964. We are known for our core values of optimism, team orientation, personal gratification, health and wellness, personal growth, youth (I have a mouthful to say about the pressure of looking 4-Ev ...
…
continue reading
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
…
continue reading
1
SANS Stormcast Wednesday, December 3rd, 2025: SmartTube Compromise; NPM Malware Prompt Injection Attempt; Angular XSS Vulnerability
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-3670629826 https://github.com/yuliskov/SmartTube/releases/tag/notification Two Years, 17K Downloads: The NPM Malware That Tried to Gas…
…
continue reading
1
SANS Stormcast Tuesday, December 2nd, 2025: Analyzing ToolShell from Packdets; Android Update; Long Game Malicious Browser Ext.
5:49
5:49
Play later
Play later
Lists
Like
Liked
5:49Hunting for SharePoint In-Memory ToolShell Payloads A walk-through showing how to analyze ToolShell payloads, starting with acquiring packets all the way to decoding embedded PowerShell commands. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Hunting%20for%20SharePoint%20In-Memory%20ToolShell%20Payloads/32524 Android Security Bulletin December 20…
…
continue reading
1
SANS Stormcast Monday, December 1st, 2025: More ClickFix; Teams Guest Access; Geoserver XXE Vulnerablity
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42Fake adult websites pop realistic Windows Update screen to deliver stealers via ClickFix The latest variant of ClickFix tricks users into copy/pasting commands by displaying a fake blue screen of death. https://www.acronis.com/en/tru/posts/fake-adult-websites-pop-realistic-windows-update-screen-to-deliver-stealers-via-clickfix/ B2B Guest Access Cre…
…
continue reading
1
Is Win11 Completely Broken!? End of Life for WINS! Patch to Fix Issue Caused by November Update!
17:56
17:56
Play later
Play later
Lists
Like
Liked
17:56I cover some upcoming features for Windows 11 that are now in Insider preview, the announcement of WINS end of life and much more!Reference Links:https://www.rorymon.com/blog/is-win11-completely-broken-end-of-life-for-wins-patch-to-fix-issue-caused-by-november-update/By Rory Monaghan
…
continue reading
1
SANS Stormcast Wednesday, November 26th, 2025: Attacks Against Messaging; Passwords in Random Websites; Fluentbit Vuln; #thanksgiving
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications Spyware attacks messaging applications in part by triggering vulnerabilities in messaging applications but also by deploying tools like keystroke loggers and screenshot applications. https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-targ…
…
continue reading
AI on the In-House Agenda Rhiannon Webster is joined by Rebecca Seaman and Abby Kay, who are Legal Counsel in the Product and Technology Legal team at Sage. Rebecca and Abby talk through their career journeys that have taken them from literature and languages degrees to leading legal support on AI strategy at a global tech company. They share how t…
…
continue reading
1
SANS Stormcast Tuesday, November 25th, 2025: URL Mapping and Authentication; SHA1-Hulud; Hacklore
6:11
6:11
Play later
Play later
Lists
Like
Liked
6:11Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control./32518 Sha1-Hulud, The Se…
…
continue reading
1
SANS Stormcast Monday, November 24th, 2025: CSS Padding in Phishing; Oracle Identity Manager Scans Update;
4:59
4:59
Play later
Play later
Lists
Like
Liked
4:59Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%3F/32510 Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day Early exploit attem…
…
continue reading
1
SANS Stormcast Friday, November 21st, 2025: Oracle Idendity Manager Scans; SonicWall DoS Vuln; Adam Wilson (@sans_edu) reducing prompt injection.
14:09
14:09
Play later
Play later
Lists
Like
Liked
14:09Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, indicating that exploitation may have occurred prior to the patch being released. https://isc.sans.edu/diary/Oracle%20Identity%20Manager%20Exploit%20…
…
continue reading
1
SANS Stormcast Thursday, November 20th, 2025: Unicode Issues; FortiWeb More Vulns; DLink DIR-878 Vuln; Operation WrtHug and ASUS Routers
6:34
6:34
Play later
Play later
Lists
Like
Liked
6:34Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names./32472 FortiWeb Multiple OS command injection in API and CLI A second silently patched vulnerability in FortiW…
…
continue reading
1
Microsoft Ignite Announcements! Patch Tuesday News! Win10 ESU Issues!
33:19
33:19
Play later
Play later
Lists
Like
Liked
33:19On this episode, I cover many of the announcements made during Microsoft Ignite 2025, I do a roundup of Patch Tuesday news, dive into the latest in AI skepticism and more!Reference Links:https://www.rorymon.com/blog/microsoft-ignite-announcements-patch-tuesday-news-win10-esu-issues/By Rory Monaghan
…
continue reading
1
SANS Stormcast Wednesday, November 19th, 2025: Kong Tuke; Cloudflare Outage
4:38
4:38
Play later
Play later
Lists
Like
Liked
4:38KongTuke Activity This diary investigates how a recent Kong Tuke infections evolved all the way from starting with a ClickFix attack. https://isc.sans.edu/diary/KongTuke%20activity/32498 Cloudflare Outage Cloudflare suffered a large outage today after an oversized configuration file was loaded into its bot protection service https://x.com/dok2001 G…
…
continue reading
1
Industrious Conversations - What employers need to know about flexible work requests
17:02
17:02
Play later
Play later
Lists
Like
Liked
17:02In the final episode for 2025 in our Industrious Conversations series, Employment partners Talia Firth and Jane Harvey break down the wave of recent Fair Work Commission decisions on flexible work arrangements, and what they mean for Australian employers navigating changing work patterns. They explain the strict technical rules under the Fair Work …
…
continue reading
1
SANS Stormcast Tuesday, November 18th, 2025: Binary Expression Decoding. Tea NPM Pollution; IBM AIX NIMSH Vulnerability
4:58
4:58
Play later
Play later
Lists
Like
Liked
4:58Decoding Binary Numeric Expressions Didier updated his number to hex script to support simple arithmetic operations in the text. https://isc.sans.edu/diary/Decoding%20Binary%20Numeric%20Expressions/32490 Tea Token NPM Pollution The NPM repository was hit with around 150,000 submissions that did not contain any useful contributions, but instead atte…
…
continue reading
1
SANS Stormcast Monday, November 17th, 2025: New(isch) Fortiweb Vulnerability; Finger and ClickFix
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10Fortiweb Vulnerability Fortinet, with significant delay, acknowledged a recently patched vulnerability after exploit attempts were seen publicly. https://isc.sans.edu/diary/Honeypot+FortiWeb+CVE202564446+Exploits/32486 https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/ https://fo…
…
continue reading
1
SANS Stormcast Friday, November 14th, 2025: SmartApeSG and ClickFix; Formbook Obfuscation Tricks; Sudo-rs Vulnerabilities; SANS Holiday Hack Challenge
10:09
10:09
Play later
Play later
Lists
Like
Liked
10:09SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diar…
…
continue reading
1
SANS Stormcast Thursday, November 13th, 2025: OWASP Top 10 Update; Cisco/Citrix Exploits; Test post quantum readiness
6:33
6:33
Play later
Play later
Lists
Like
Liked
6:33OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-disc…
…
continue reading
1
SANS Stormcast Wednesday, November 12th, 2025: Microsoft Patch Tuesday; Gladinet Triofox Vulnerability; SAP Patches
6:03
6:03
Play later
Play later
Lists
Like
Liked
6:03Microsoft Patch Tuesday for November 2025 https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+for+November+2025/32468/ Gladinet Triofox Vulnerability Triofox uses the host header in lieu of proper access control, allowing an attacker to access the page managing administrators by simply setting the host header to localhost. https://cloud.google.com/b…
…
continue reading
1
SANS Stormcast Tuesday, November 11th, 2025: 3CX Related Scans; Watchguard Default Password;
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25It isn t always defaults: Scans for 3CX Usernames Our honeypots detected scans for usernames that may be related to 3CX business phone systems https://isc.sans.edu/diary/It%20isn%27t%20always%20defaults%3A%20Scans%20for%203CX%20usernames/32464 Watchguard Default Password Controversy A CVE number was assigned to a default password commonly used in W…
…
continue reading
1
SANS Stormcast Monday, November 10th, 2025: Code Repo Requests; Time Delayed ICS Attacks; Encrypted LLM Traffic Sidechannel Attacks
7:06
7:06
Play later
Play later
Lists
Like
Liked
7:06Honeypot Requests for Code Repository Attackers continue to scan websites for source code repositories. Keep your repositories outside your document root and proactively scan your own sites. https://isc.sans.edu/diary/Honeypot%3A%20Requests%20for%20%28Code%29%20Repositories/32460 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads Ne…
…
continue reading
1
Tech Debt Questions for Louvre! Config Man Update Cadence to Change! Win11 Market Share on the Rise!
17:07
17:07
Play later
Play later
Lists
Like
Liked
17:07On this episode, I cover questions about enterprise security issues relating to the recent heist at the Louvre, another example of technical debt at an organization costing millions, zero day vulnerabilities patched by QNAP and more!Reference Links:https://www.rorymon.com/blog/tech-debt-questions-for-louvre-config-man-update-cadence-to-change-win11…
…
continue reading
1
SANS Stormcast Friday, November 7th, 2025: PowerShell Log Correlation; RondoBox Disected; Google Chrome and Cisco Patches
5:31
5:31
Play later
Play later
Lists
Like
Liked
5:31Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/diary/Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%5BGuest%20…
…
continue reading
1
SANS Stormcast Thursday, November 6th, 2025: Domain API Update; Teams Spoofing; VShell Report
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
…
continue reading
1
SANS Stormcast Wednesday, November 5th, 2025: Apple Patches; Exploits against Trucking and Logistic; Google Android Patches
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
…
continue reading
1
SANS Stormcast Tuesday, November 4th, 2025: XWiki SolrSearch Exploits and Rapper Feud; AMD Zen 5 RDSEED Bug; More Malicious Open VSX Extensions
6:56
6:56
Play later
Play later
Lists
Like
Liked
6:56XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Num…
…
continue reading
1
Azure Front Door Issue Rolls On! Hotpatching Broken by Update! Long Running Windows Bug Fixed!
17:14
17:14
Play later
Play later
Lists
Like
Liked
17:14On this episode, I cover AI updates from OpenAI and Google, the painfully long issues plaguing Azure Front Door, an update on problems caused by recent Windows Updates and more! Reference Links:https://www.rorymon.com/blog/azure-front-door-issue-rolls-on-hotpatching-broken-by-update-long-running-windows-bug-fixed/…
…
continue reading
1
SANS Stormcast Monday, November 3rd, 2025: Port 8530/8531 Scans; BADCANDY Webshells; Open VSX Security Improvements
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https://isc.sans.edu/diary/Scans%20for%20Port%208530%208531%20%28TCP%29.%20Likely%20related%20to%20WSUS%20Vulnerability%20C…
…
continue reading
1
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability
6:19
6:19
Play later
Play later
Lists
Like
Liked
6:19X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
…
continue reading
1
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
…
continue reading
1
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
…
continue reading
1
Amazon Announces Layoffs! Pwn2Own Ireland! New Teams Monitoring Feature!
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05I cover layoffs from Amazon and GM, the root cause of the recent AWS outage, a concerning new Teams feature, my review of Pwn2Own Ireland and more!Reference Links:https://www.rorymon.com/blog/amazon-announces-layoffs-pwn2own-ireland-new-teams-monitoring-feature/By Rory Monaghan
…
continue reading
1
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
…
continue reading
1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
…
continue reading
1
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
…
continue reading
1
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability.
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
…
continue reading
1
World@Work: AI in the Workplace: some practical challenges
24:58
24:58
Play later
Play later
Lists
Like
Liked
24:58We are pleased to share our latest World@Work global employment podcast on some practical challenges relating to the rapid rise of AI in the workplace. In this episode, we discuss several nations’ contrasting approaches to the regulation of AI. In particular, we shine a light on practical challenges for employers, including how they use AI in recru…
…
continue reading
1
SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln;
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
…
continue reading
1
Major AWS Outage! Concerning Breach of F5! Many Issues Caused by Windows Updates!
19:46
19:46
Play later
Play later
Lists
Like
Liked
19:46On this episode, I cover the worrying breach disclosed by F5, the tumultuous services outage around the globe caused by an AWS outage and much more!Reference Links: https://www.rorymon.com/blog/major-aws-outage-concerning-breach-of-f5-many-issues-caused-by-windows-updates/By Rory Monaghan
…
continue reading
1
SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack
9:17
9:17
Play later
Play later
Lists
Like
Liked
9:17Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/32384 AWS Outages AWS has had issues most of the day on Monday, affecting numerous services. http…
…
continue reading
1
Analysing Learning Needs With KSA Charts ( Change Management Practitioner Microlesson )
2:14
2:14
Play later
Play later
Lists
Like
Liked
2:14When major change hits, training isn't just about showing people the new system—it's about building new capabilities. This advanced Microlesson introduces the essential tool for any serious Change Management Practitioner: the KSA Chart (Knowledge, Skills, and Attitudes) for precise learning needs analysis. Moving past guesswork, the KSA chart provi…
…
continue reading
1
The Great Learning Styles Debate, A Practical Guide For Trainers ( Change Manager Practitioner Microlesson )
1:53
1:53
Play later
Play later
Lists
Like
Liked
1:53For years, trainers relied on Learning Styles models (like VARK) to tailor training, believing that people learn best when information is matched to their preferred style (visual, auditory, kinesthetic, etc.). But what does modern cognitive science say about this theory? Beyond V-A-R-K: What Really Drives Learning This practical Microlesson cuts th…
…
continue reading
1
Driving Change, Understanding The Key Roles in Reaching Critical Mass ( Change Management Practitioner Microlesson )
2:12
2:12
Play later
Play later
Lists
Like
Liked
2:12Change initiatives often stall, not because of a bad plan, but because they fail to achieve Critical Mass—that tipping point where momentum becomes unstoppable. This essential Microlesson dissects the key roles responsible for generating, supporting, and executing change across the organisation. Tune in to learn how to identify, activate, and align…
…
continue reading
1
Master The Art of Change, How To Affectively Assess Impact ( Change Management Foundation Microlesson )
2:16
2:16
Play later
Play later
Lists
Like
Liked
2:16Before you launch any major change, you must first answer a critical question: "Who is affected, and how significantly?" This focused Microlesson provides the foundational tools and techniques for conducting a robust Change Impact Assessment (CIA). Understanding technical changes is not enough; you must quantify the impact on roles, processes, and …
…
continue reading
1
5 Principle for Building Engagement in a Changing World ( Change Management Foundation Microlesson )
2:33
2:33
Play later
Play later
Lists
Like
Liked
2:33In an era of constant transformation, employee engagement isn't a bonus—it's the engine of successful change. This practical Microlesson cuts through the noise to deliver five actionable principles that foundationally shift how you lead people through change. This episode focuses on moving your workforce beyond simply complying with a new process t…
…
continue reading
1
One-Way vs. Two-Way Communication in Change Management ( Change Management Foundation Microlesson )
2:10
2:10
Play later
Play later
Lists
Like
Liked
2:10Communication is the bloodstream of change, but not all messages are created equal. This focused Microlesson explores the fundamental difference between One-Way and Two-Way communication and why the mix you choose can make or break your change initiative. Successful change leaders understand that effective communication is a balance between sharing…
…
continue reading
1
Mapping Stakeholder Empathy for Effective Change ( Change Management Foundation Microlesson )
3:08
3:08
Play later
Play later
Lists
Like
Liked
3:08To successfully implement change, you must first understand the journey your stakeholders are on. This short, practical episode focuses on the foundational Change Management technique of Stakeholder Empathy Mapping. Understanding the Human Element of Change Discover how moving beyond simple stakeholder identification to truly mapping their experien…
…
continue reading
1
The Critical Role of Local Leadership in Change Management ( Change Management Foundation )
2:44
2:44
Play later
Play later
Lists
Like
Liked
2:44Change is cascaded from the top, but it is realised at the local level. This episode zeroes in on one of the most vital, yet often overlooked, roles in successful organisational transformation: the Local Leader (or people manager). Why Local Leaders are the Change Linchpin Local leaders are the daily face of change for front-line employees. They ho…
…
continue reading
1
Understanding The Stages of Learning During Change ( Change Management Foundation Microlesson )
3:16
3:16
Play later
Play later
Lists
Like
Liked
3:16Every organisational shift requires individuals to learn new skills, adopt new processes, and even embrace new mindsets. But how do we actually absorb change? This Microlesson breaks down the predictable stages of learning that every person moves through when facing organisational change. Discover how to: Identify where your team members are on the…
…
continue reading
1
SANS Stormcast Monday, October 20th, 2025: Malicious Tiktok; More Google Ad Problems; Satellite Insecurity
6:14
6:14
Play later
Play later
Lists
Like
Liked
6:14TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Videos%20Promoting%20Malware%20Installation/32380 Google Ads Advertise Malware Targeting MacOS Developers Hun…
…
continue reading
1
The Deployment Baseline, Your Project's North Star ( APM PFQ Microlesson )
4:02
4:02
Play later
Play later
Lists
Like
Liked
4:02During this episode we'll clearly explain what a deployment baseline is, why it's essential, and how it acts as the frozen snapshot of your project plan against which all future progress and performance are measured. Perfect for those preparing for the APM Project Fundamentals Qualification (PFQ) or anyone looking to master the foundations of proje…
…
continue reading