Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

5 Bytes Podcast

show episodes
 
Artwork

1
Lectionary Bytes

Hasse Memorial Library

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Lectionary Bytes is a podcast with short episodes featuring professors and students from Concordia Seminary in Saint Louis, narrowing in on an insight or two from the assigned scripture readings throughout the church year. Brought to you by the Hasse Memorial Library.
  continue reading
 
The commercial world is always changing and the legal landscape never stands still. Keeping pace with all those changes, and knowing how they affect your organisation, is a big responsibility and a challenging task. Ashurst Legal Outlook will keep you at the forefront of the most pressing legal issues, offering insights from legal experts across our international network.
  continue reading
 
Artwork
 
👋 Hello everyone, welcome to Take a Byte by Accton In this show, we discuss IT, networking technology, and industry news in a relaxed, conversational style. 🎙️ Each episode features the latest tech trends and practical technical knowledge. Whether you’re a professional or just curious about technology, there’s content for you here. 🌐 We bring you interesting stories, the latest in the world of networking, and easy-to-understand technical explanations. Take a Byte is not just a show; it’s an ...
  continue reading
 
Artwork

1
CyberBites Podcast

Nick Sturgeon

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
With cybersecurity becoming more complex and the threats even more dangerous… knowing what to do to protect yourself can seem like an impossible task. That is until now, welcome to the CyberBites Podcast. The Podcast where we help you filter through the noise one byte at a time.
  continue reading
 
Welcome to Bytes of Bio, a podcast where we explain Bioinformatics, an effective combination between Computer Science and Biology. We're May and Allamanda or Allie for short. Welcome to our show! So glad to have you here! We upload every 3 weeks on Sundays. Hope to see you then!
  continue reading
 
Artwork

1
Biblical Bytes Podcast

Adam Van Arsdale and Alison Howell

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Biblical Bytes, a podcast dedicated to equipping and inspiring Christians to deepen their relationship with the word of God. Join hosts Adam van Arsdale and Alison Howell as they share their passion for biblical literacy and provide practical tips and techniques for personal Bible study. Whether you're a seasoned Bible student or just starting your journey, this podcast is for you. Join us on our mission to reduce biblical illiteracy and grow in your understanding of God's word. S ...
  continue reading
 
Artwork

1
Bits Bytes & Beyond

Michael Herman, Andrew Schultz & Aaron Keele

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to Bits, Bytes, and Beyond, the podcast that fuels your passion for gaming, technology, and automotive adventures! Join us as we explore the latest in cutting-edge tech, the thrilling world of video games, and the ever-evolving landscape of the automotive industry. With a blend of insightful commentary, personal anecdotes, and expert insights, Bits, Bytes, and Beyond is your go-to source for all things tech and automotive. Tune in and join us on this journey as we uncover the interse ...
  continue reading
 
Keyword on the Street is an Australian podcast presenting the latest developments in the world of digital marketing and SEO. Listen in for actionable advice on boosting search rankings, nailing your keyword research, optimising your content strategy and making the most of website traffic. Stretched for time? We get that keeping up with the ever-changing digital landscape is hard. So tune into Quick Byte episodes for a 5-minute dose of the tech news and marketing tips you need to know about. ...
  continue reading
 
Artwork

1
Wrestling With The Locals

Divine And Jerry

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Our Podcast is here to bring back the best stories from the old days,share the history of the business we once loved and capture memories in sound bytes. We want to entertain you with our stories and the stories of all the legends, to introduce you to the way things were and still auto-be. allow you to learn about up and coming talent and shows as well as just review stories, pay per views and enjoy our show. Support this podcast: https://podcasters.spotify.com/pod/show/dale-troutman/support
  continue reading
 
Artwork

1
Bridges and Bytes

Bridges and Bytes

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the Bridges and Bytes Podcast, from the UCD College of Engineering and Architecture. Season 1 is a six-part series on the 'Student Voice on AI and Assessment'. Each episode was produced and hosted by groups of UCD Engineering and Architecture Students, and covers a different types of assessment. The Season is topped and tailed with a trailer and a review episode. Credits This season was supported by an award by the UCD Faculty Partnership Programme to Jennifer Keenahan and Mairead ...
  continue reading
 
Varrlyn is a consultancy firm established in 2010 and based in Amsterdam, The Netherlands. At Varrlyn, we are trained to think ahead. With advanced digital tools, we enjoy turning any obstacle into a chance to thrive. It’s all about thinking in terms of opportunities, together. With our four Valuestreams we help you propelling your dreams forward with ambition and excellence. Finance & Risk Asset Management Digital services Dealing room & Sustainability services Get ready to improve your cos ...
  continue reading
 
Artwork

1
Tip Top Tech

Switch Break Media

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Tip Top Tech, a tech news podcast by three college friends with a passion for exploring the wonders of the technological age we live in and the news that comes out of it. Find us on Twitter at www.twitter.com/TipTopTechCast !
  continue reading
 
Artwork

1
Boomer Bytes Podcast - Host Agi Anderson

Agi Anderon, ProAge Baby Boomer

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Why Bytes? Originally, a byte was any string of more than one bit that made up a simple piece of information. My goal is to provide a bit of information that supports, helps and inspires baby boomers to live their best life via my Boomer Bytes Podcast. We “Baby Boomers” were born between 1946 and 1964. We are known for our core values of optimism, team orientation, personal gratification, health and wellness, personal growth, youth (I have a mouthful to say about the pressure of looking 4-Ev ...
  continue reading
 
Artwork

1
Cyber Security Interviews

Douglas A. Brush | Weekly Interviews w/ InfoSec Pros

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
  continue reading
 
Loading …
show series
 
SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-3670629826 https://github.com/yuliskov/SmartTube/releases/tag/notification Two Years, 17K Downloads: The NPM Malware That Tried to Gas…
  continue reading
 
Hunting for SharePoint In-Memory ToolShell Payloads A walk-through showing how to analyze ToolShell payloads, starting with acquiring packets all the way to decoding embedded PowerShell commands. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Hunting%20for%20SharePoint%20In-Memory%20ToolShell%20Payloads/32524 Android Security Bulletin December 20…
  continue reading
 
Fake adult websites pop realistic Windows Update screen to deliver stealers via ClickFix The latest variant of ClickFix tricks users into copy/pasting commands by displaying a fake blue screen of death. https://www.acronis.com/en/tru/posts/fake-adult-websites-pop-realistic-windows-update-screen-to-deliver-stealers-via-clickfix/ B2B Guest Access Cre…
  continue reading
 
I cover some upcoming features for Windows 11 that are now in Insider preview, the announcement of WINS end of life and much more!Reference Links:https://www.rorymon.com/blog/is-win11-completely-broken-end-of-life-for-wins-patch-to-fix-issue-caused-by-november-update/By Rory Monaghan
  continue reading
 
Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications Spyware attacks messaging applications in part by triggering vulnerabilities in messaging applications but also by deploying tools like keystroke loggers and screenshot applications. https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-targ…
  continue reading
 
AI on the In-House Agenda Rhiannon Webster is joined by Rebecca Seaman and Abby Kay, who are Legal Counsel in the Product and Technology Legal team at Sage. Rebecca and Abby talk through their career journeys that have taken them from literature and languages degrees to leading legal support on AI strategy at a global tech company. They share how t…
  continue reading
 
Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control./32518 Sha1-Hulud, The Se…
  continue reading
 
Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%3F/32510 Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day Early exploit attem…
  continue reading
 
Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, indicating that exploitation may have occurred prior to the patch being released. https://isc.sans.edu/diary/Oracle%20Identity%20Manager%20Exploit%20…
  continue reading
 
Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names./32472 FortiWeb Multiple OS command injection in API and CLI A second silently patched vulnerability in FortiW…
  continue reading
 
On this episode, I cover many of the announcements made during Microsoft Ignite 2025, I do a roundup of Patch Tuesday news, dive into the latest in AI skepticism and more!Reference Links:https://www.rorymon.com/blog/microsoft-ignite-announcements-patch-tuesday-news-win10-esu-issues/By Rory Monaghan
  continue reading
 
KongTuke Activity This diary investigates how a recent Kong Tuke infections evolved all the way from starting with a ClickFix attack. https://isc.sans.edu/diary/KongTuke%20activity/32498 Cloudflare Outage Cloudflare suffered a large outage today after an oversized configuration file was loaded into its bot protection service https://x.com/dok2001 G…
  continue reading
 
In the final episode for 2025 in our Industrious Conversations series, Employment partners Talia Firth and Jane Harvey break down the wave of recent Fair Work Commission decisions on flexible work arrangements, and what they mean for Australian employers navigating changing work patterns. They explain the strict technical rules under the Fair Work …
  continue reading
 
Decoding Binary Numeric Expressions Didier updated his number to hex script to support simple arithmetic operations in the text. https://isc.sans.edu/diary/Decoding%20Binary%20Numeric%20Expressions/32490 Tea Token NPM Pollution The NPM repository was hit with around 150,000 submissions that did not contain any useful contributions, but instead atte…
  continue reading
 
Fortiweb Vulnerability Fortinet, with significant delay, acknowledged a recently patched vulnerability after exploit attempts were seen publicly. https://isc.sans.edu/diary/Honeypot+FortiWeb+CVE202564446+Exploits/32486 https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/ https://fo…
  continue reading
 
SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diar…
  continue reading
 
OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-disc…
  continue reading
 
Microsoft Patch Tuesday for November 2025 https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+for+November+2025/32468/ Gladinet Triofox Vulnerability Triofox uses the host header in lieu of proper access control, allowing an attacker to access the page managing administrators by simply setting the host header to localhost. https://cloud.google.com/b…
  continue reading
 
It isn t always defaults: Scans for 3CX Usernames Our honeypots detected scans for usernames that may be related to 3CX business phone systems https://isc.sans.edu/diary/It%20isn%27t%20always%20defaults%3A%20Scans%20for%203CX%20usernames/32464 Watchguard Default Password Controversy A CVE number was assigned to a default password commonly used in W…
  continue reading
 
Honeypot Requests for Code Repository Attackers continue to scan websites for source code repositories. Keep your repositories outside your document root and proactively scan your own sites. https://isc.sans.edu/diary/Honeypot%3A%20Requests%20for%20%28Code%29%20Repositories/32460 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads Ne…
  continue reading
 
On this episode, I cover questions about enterprise security issues relating to the recent heist at the Louvre, another example of technical debt at an organization costing millions, zero day vulnerabilities patched by QNAP and more!Reference Links:https://www.rorymon.com/blog/tech-debt-questions-for-louvre-config-man-update-cadence-to-change-win11…
  continue reading
 
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/diary/Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%5BGuest%20…
  continue reading
 
Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
  continue reading
 
Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
  continue reading
 
XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Num…
  continue reading
 
On this episode, I cover AI updates from OpenAI and Google, the painfully long issues plaguing Azure Front Door, an update on problems caused by recent Windows Updates and more! Reference Links:https://www.rorymon.com/blog/azure-front-door-issue-rolls-on-hotpatching-broken-by-update-long-running-windows-bug-fixed/…
  continue reading
 
Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https://isc.sans.edu/diary/Scans%20for%20Port%208530%208531%20%28TCP%29.%20Likely%20related%20to%20WSUS%20Vulnerability%20C…
  continue reading
 
X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
  continue reading
 
How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
  continue reading
 
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
  continue reading
 
Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
  continue reading
 
Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
  continue reading
 
Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
  continue reading
 
webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
  continue reading
 
We are pleased to share our latest World@Work global employment podcast on some practical challenges relating to the rapid rise of AI in the workplace. In this episode, we discuss several nations’ contrasting approaches to the regulation of AI. In particular, we shine a light on practical challenges for employers, including how they use AI in recru…
  continue reading
 
What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
  continue reading
 
On this episode, I cover the worrying breach disclosed by F5, the tumultuous services outage around the globe caused by an AWS outage and much more!Reference Links: https://www.rorymon.com/blog/major-aws-outage-concerning-breach-of-f5-many-issues-caused-by-windows-updates/By Rory Monaghan
  continue reading
 
Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/32384 AWS Outages AWS has had issues most of the day on Monday, affecting numerous services. http…
  continue reading
 
When major change hits, training isn't just about showing people the new system—it's about building new capabilities. This advanced Microlesson introduces the essential tool for any serious Change Management Practitioner: the KSA Chart (Knowledge, Skills, and Attitudes) for precise learning needs analysis. Moving past guesswork, the KSA chart provi…
  continue reading
 
For years, trainers relied on Learning Styles models (like VARK) to tailor training, believing that people learn best when information is matched to their preferred style (visual, auditory, kinesthetic, etc.). But what does modern cognitive science say about this theory? Beyond V-A-R-K: What Really Drives Learning This practical Microlesson cuts th…
  continue reading
 
Change initiatives often stall, not because of a bad plan, but because they fail to achieve Critical Mass—that tipping point where momentum becomes unstoppable. This essential Microlesson dissects the key roles responsible for generating, supporting, and executing change across the organisation. Tune in to learn how to identify, activate, and align…
  continue reading
 
Before you launch any major change, you must first answer a critical question: "Who is affected, and how significantly?" This focused Microlesson provides the foundational tools and techniques for conducting a robust Change Impact Assessment (CIA). Understanding technical changes is not enough; you must quantify the impact on roles, processes, and …
  continue reading
 
In an era of constant transformation, employee engagement isn't a bonus—it's the engine of successful change. This practical Microlesson cuts through the noise to deliver five actionable principles that foundationally shift how you lead people through change. This episode focuses on moving your workforce beyond simply complying with a new process t…
  continue reading
 
Communication is the bloodstream of change, but not all messages are created equal. This focused Microlesson explores the fundamental difference between One-Way and Two-Way communication and why the mix you choose can make or break your change initiative. Successful change leaders understand that effective communication is a balance between sharing…
  continue reading
 
To successfully implement change, you must first understand the journey your stakeholders are on. This short, practical episode focuses on the foundational Change Management technique of Stakeholder Empathy Mapping. Understanding the Human Element of Change Discover how moving beyond simple stakeholder identification to truly mapping their experien…
  continue reading
 
Change is cascaded from the top, but it is realised at the local level. This episode zeroes in on one of the most vital, yet often overlooked, roles in successful organisational transformation: the Local Leader (or people manager). Why Local Leaders are the Change Linchpin Local leaders are the daily face of change for front-line employees. They ho…
  continue reading
 
Every organisational shift requires individuals to learn new skills, adopt new processes, and even embrace new mindsets. But how do we actually absorb change? This Microlesson breaks down the predictable stages of learning that every person moves through when facing organisational change. Discover how to: Identify where your team members are on the…
  continue reading
 
TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Videos%20Promoting%20Malware%20Installation/32380 Google Ads Advertise Malware Targeting MacOS Developers Hun…
  continue reading
 
During this episode we'll clearly explain what a deployment baseline is, why it's essential, and how it acts as the frozen snapshot of your project plan against which all future progress and performance are measured. Perfect for those preparing for the APM Project Fundamentals Qualification (PFQ) or anyone looking to master the foundations of proje…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play