All about the Middle Ages from Medievalists.net. Join Danièle Cybulskie and her guests as they talk about the medieval world, from Byzantium to the Vikings.
…
continue reading
Defense Forensics Podcasts
Real American cases with definitive endings. Each episode unpacks the investigation, courtroom strategy, and proof behind a guilty verdict—while honoring victims and noting appeals.
…
continue reading
Megyn Kelly's MK Media podcast network home for true crime shows, live trial coverage and recaps, expert legal analysis, and more.
…
continue reading
Join Defense Forensic's Rob Walensky in this week's episode of "Digital Forensics, Redefined." As a 20-year veteran of law enforcement, Rob has seen it all, from near-death experiences with alligators to nationwide drug busts. Using digital forensics, he solved thousands of cases and still attends court for hundreds more. The life of a law enforcement agent never stops. Tune in each week as he brings on guests to discuss more of their digital forensic findings while reminiscing on past lives ...
…
continue reading
Think like a hacker. Defend like a pro. Welcome to the Secure AF Cybersecurity Podcast — your tactical edge in the ever-evolving cyber battlefield. Hosted by industry veterans including Donovan Farrow and Jonathan Kimmitt, this podcast dives deep into real-world infosec challenges, red team tactics, blue team strategies, and the latest tools shaping the cybersecurity landscape. Whether you're a seasoned pentester, a SOC analyst, or just breaking into the field, you'll find actionable insight ...
…
continue reading
The AI in Business Podcast is for non-technical business leaders who need to find AI opportunities, align AI capabilities with strategy, and deliver ROI. Each week, Emerj research staff and journalists interview top AI executives from Fortune 2000 firms and unicorn startups - uncovering trends, use-cases, and best practices for practical AI adoption. Visit our advertising page to learn more about reaching our executive audience of Fortune 2000 AI adopters: https://emerj.com/advertise
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The ultimate celebrity crime podcast where Hollywood scandals meet real detective work. Host Steve Stanulis - former NYPD officer, celebrity bodyguard, and private investigator - exposes celebrity secrets and entertainment industry crime stories you've never heard before. Unlike typical true crime podcasts, Bulletproof delivers active celebrity crime investigations happening right now. Steve's unprecedented access to celebrity inner circles, combined with 20+ years of detective experience, b ...
…
continue reading
Discussions with industry professionals and lawyers who use our services on the latest developments and news in digital forensics, digital evidence, privacy and data security law and cyber security/incident response. Hosted by Tyler Hatch, B.A., LL.B., CCFE CMFE, a former lawyer and the founder of DFI Forensics (https://dfiforensics.com), a Canadian digital forensics and incident response firm.
…
continue reading
Michael W Lanier Attorney retrofitted his entire operation to meet the needs of the North Florida community through loan modifications, foreclosure defense, loan forensics, credit repair, and credit restarts. In 1998, Michael W Lanier attend law school at night while working as a mortgage loan officer for some of the country’s most prestigious banks and lenders. He worked as a mortgage professional for several years, as well as conducting real estate closings and settling title issues.
…
continue reading
We are on a mission to help Lawyers, Risk Managers and Claims professionals stay on top of the hottest legal trends and issues impacting their day-to-day. The Defense Never Rests brings together guests from varying backgrounds and opposing views to discuss issues unique to the defense side of civil litigation. We aren't citing case law or speaking legalese here. We're having real discussions, sometimes serious and sometimes not, in an entertaining way that is both educational AND fun!
…
continue reading
Dr. Joseph and Alfredzo Nash discuss various cybersecurity related topics, trends and the coffee that keeps them going throughout the Cybersecurity industry.
…
continue reading
Hidden Threads uncovers the untold true crime stories behind private investigators' most chilling and high-stakes cases. Each episode exposes hidden connections, dark secrets, and shocking twists—from unsolved murders and missing persons to betrayals that span decades—while revealing the rare political threads that quietly shape the shadows of justice. Available on ALL Streaming Platforms Spotify • Apple • YouTube • Amazon
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Wait Just an Infosec is a weekly hour-long cybersecurity-focused broadcast produced by SANS Institute, streamed live on LinkedIn and YouTube, Tuesdays at 10am ET and available to listen to in podcast format on Wednesdays. Our hosts and invited guests are a rotating lineup of SANS faculty members and experts across all infosec domains – some of the brightest minds in cybersecurity, with decades of experience as practitioners. Each week will offer thought-provoking, rich content for a full ran ...
…
continue reading
Legal Rights Radio is a Podcast focusing on all things cops and robbers and Criminal law. From, "when the police search me?" to "I was not read my rights," LRR is a weekly show, by David Zwanetz, discussing the ins and outs of the morbidly curious area of Criminal Law in Maryland with, of course, a Defense oriented spin.
…
continue reading
Hosted by criminal defense lawyer Elizabeth Kelley, Mental Disabilities and the Criminal Justice System provides information - and hope - to people with mental disabilities ensnared by the criminal justice system, as well as to their families and attorneys.
…
continue reading
If you eat, sleep, and breathe true crime, TRUE CRIME TONIGHT is serving up your nightly fix. Five nights a week, KT STUDIOS & iHEART RADIO invite listeners to pull up a seat for an unfiltered look at the biggest cases making headlines, celebrity scandals, and the trials everyone is watching. With a mix of expert analysis, hot takes, and listener call-ins, TRUE CRIME TONIGHT goes beyond the headlines to uncover the twists, turns, and unanswered questions that keep us all obsessed—because, at ...
…
continue reading
Interviews and fun with professionals, hackers, and everything in between.
…
continue reading
Welcome to The Geiser Files, the true crime podcast of Rachael Geiser, a 26-year veteran criminal defense investigator, where she walks you through her most unforgettable, and challenging investigations. Each week, Rachael pulls back the curtain on the painstaking work of a defense investigation—tracking down overlooked witnesses, re-examining evidence, and uncovering the hidden facts that never make the news. From life-or-death murder trials to wrongful convictions, you'll hear the unfilter ...
…
continue reading
Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!
…
continue reading
The Suitcase Murder: The Trial of Sarah Boone takes you inside the courtroom for one of the most gripping murder trials of our time. Sarah Boone, accused of the shocking and tragic death of her boyfriend, who was found suffocated inside a suitcase, faces a high-stakes battle for justice. Each episode brings you live trial coverage, expert analysis, and in-depth discussions with legal experts, psychologists, and true crime aficionados. Whether you’re following the trial day by day or diving i ...
…
continue reading
1
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
…
continue reading
1
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch (#)
6:07
6:07
Play later
Play later
Lists
Like
Liked
6:07SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like "dd" do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%2…
…
continue reading
1
CAPTCHA Con: Hackers' Evolving ClickFix Malware Trap
7:50
7:50
Play later
Play later
Lists
Like
Liked
7:50Got a question or comment? Message us here! “I’m not a robot.” 🤖 Hackers are exploiting fake “I’m not a robot” CAPTCHA pages to deliver malware. Host Andrew Hickman breaks down how this ClickFix attack uses social engineering to steal data and evade detection. Tune in to learn key defense tactics and how to keep your team protected. Support the sho…
…
continue reading
1
Tyler Robinson Request Granted, Teacher Shot by Child Sues, Bizarre Texts in Kada Scott Case
1:01:39
1:01:39
Play later
Play later
Lists
Like
Liked
1:01:39MK True Crime contributors Mark Geragos, Matt Murphy, and Phil Holloway join the show to discuss the judge in the Tyler Robinson case ruling that the alleged Charlie Kirk shooter will be allowed to wear civilian clothing during all of his upcoming court hearings, whether this is a win for the defense or the state, Abby Zwerner, a teacher shot by a …
…
continue reading
1
The Haunting Toy Box Killer, Ellen Greenberg Theories, and Unpacking ‘Phroggers’
1:34:13
1:34:13
Play later
Play later
Lists
Like
Liked
1:34:13It’s Talkback Tuesday, and we’re responding to your messages on everything from the controversial 2011 death of Ellen Greenberg, to internet crimes and keeping children safe, to the disturbing case of the “Toy Box Killer.” Baudi traumatizes Courtney and Taha by explaining what “phroggers” are. Tune in for all the details. See omnystudio.com/listene…
…
continue reading
1
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC
8:04
8:04
Play later
Play later
Lists
Like
Liked
8:04Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
…
continue reading
1
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC (#)
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters…
…
continue reading
1
Mafia Bets, Missing Jewels, and Shocking Surrogacy Scams
1:33:34
1:33:34
Play later
Play later
Lists
Like
Liked
1:33:34NBA stars Chauncey Billups and Terry Rozier are among 34 people charged in a multi-state Mafia betting ring. DNA evidence leads to arrests in the case of the missing Louvre crown jewels, and ex-deputy Sean Grayson testifies in his trial for the murder of Sonya Massey. Plus, a deep dive into Sean “Diddy” Combs’s prison release, the case against the …
…
continue reading
1
Rethinking Clinical Trial Operations with AI and Remote Monitoring - with Scott Bradley of Novartis
29:13
29:13
Play later
Play later
Lists
Like
Liked
29:13Today's guest is Scott Bradley, VP of AI and Innovation at Novartis. As the eighth largest pharmaceutical company in the world by revenue, Novartis' medicines reach millions of people worldwide. Their focus on the discovery and development of novel, breakthrough treatments sees them reimagining not just the delivery of said treatments, but the prac…
…
continue reading
1
Birmingham's Bloodiest Enforcer: Unpacking Damien McDaniel's 18-Murder Spree
14:16
14:16
Play later
Play later
Lists
Like
Liked
14:16Send us a text In this gripping episode of Hidden Threads, hosts Macky Outlaw and Jus dive into the chilling case of Damien McDaniel, the 23-year-old Fairfield man accused of being Birmingham, Alabama's deadliest hitman, tied to 18 murders, including two mass shootings and the tragic deaths of firefighter Jordan Melton and a pregnant woman with her…
…
continue reading
1
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
…
continue reading
1
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection (#)
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vul…
…
continue reading
1
Halloweek Begins; Bryan Kohberger Witness List, Ellen Greenberg Forensics, and a Brush With Evil
1:33:06
1:33:06
Play later
Play later
Lists
Like
Liked
1:33:06It’s Scientific Sunday, and we're joined by forensic death investigator and host of the podcast Body Bags, Joseph Scott Morgan, to discuss Bryan Kohberger’s unsealed witness list, “experimental” wounds, Ellen Greenberg’s alleged suicide, the Delphi murders, and more. Joseph walks through how forensic investigators determine time of death at a crime…
…
continue reading
1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE
6:20
6:20
Play later
Play later
Lists
Like
Liked
6:20Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
…
continue reading
1
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE (#)
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysi…
…
continue reading
1
Kohberger’s Final Insult, Designer Shoes Blamed for Deadly Crash, Netflix’s “The Perfect Neighbor”
48:09
48:09
Play later
Play later
Lists
Like
Liked
48:09MK True Crime contributors Ashleigh Merchant, Jonna Spilbor, and Dave Aronberg join the show to discuss Bryan Kohberger and his attorney’s refusing to pay additional restitution to his victims’ families, Jake Haro, father of missing baby Emmanuel Haro, pleads guilty to second-degree murder, Kristina Chambers unorthodox defense of blaming a deadly c…
…
continue reading
1
Roblox Under Fire, Brian Walshe Defense Win, and the Hidden Crimes Behind a Donut Shop
1:25:57
1:25:57
Play later
Play later
Lists
Like
Liked
1:25:57Covering the arrest of a suspect in the murder of 23-year-old Kada Scott, whose remains were found near an abandoned school; Florida’s Attorney General targets Roblox, calling the platform a hotspot for child predators; and a USC Ph.D. student faces charges for drugging and sexually assaulting multiple women. Plus, Alan Wieder joins to discuss his …
…
continue reading
1
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
…
continue reading
1
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit (#)
6:25
6:25
Play later
Play later
Lists
Like
Liked
6:25SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu…
…
continue reading
1
Cyberpsychology, Product Security, and Governance | Dr. Jeree Spicer
1:25:53
1:25:53
Play later
Play later
Lists
Like
Liked
1:25:53Dr. Jeree Spicer stops through the Cyber Coffee Hour, who masterfully blends cyberpsychology with cybersecurity strategy. From developing robust governance frameworks to her current role as a product manager, Dr. Spicer shows us how to bake security in from the start. Plus, hear about her mission with ReeTheCyberBoss to democratize digital safety e…
…
continue reading
1
Labeled and Misjudged: Unpacking Fascism, Nazism, and White Supremacy Myths
22:10
22:10
Play later
Play later
Lists
Like
Liked
22:10Send us a text In this fiery episode of Hidden Threads, Jus and I tackle the heavy labels thrown at conservatives: fascist, Nazi, white supremacist. Why do these terms get weaponized against us for simply holding traditional views? We dive into the history and true meanings of fascism, Nazism, and white supremacy, exposing how they're misused to si…
…
continue reading
1
Bryan Kohberger Pushes Back, the Sonya Massey Trial Begins, and the Louvre Heist
1:33:25
1:33:25
Play later
Play later
Lists
Like
Liked
1:33:25Breaking down Kohberger’s legal team surprise argument and what it could mean for the case. The Louvre reopens after a shocking jewel heist, the murder trial of former Sangamon County deputy Sean Grayson is underway — he stands accused of the fatal shooting of Sonya Massey — and a beloved Texas teacher is found dead under bizarre circumstances. In …
…
continue reading
1
The Silence on the Shooter: Why Thomas Crooks Faded from the Headlines
14:06
14:06
Play later
Play later
Lists
Like
Liked
14:06Send us a text In this eye-opening episode of Hidden Threads, hosts Macky Outlaw and Jus peel back the layers on Thomas Crooks—the 20-year-old loner who nearly assassinated President Trump at a Butler, Pennsylvania rally on July 13, 2024, grazing his ear, killing bystander Corey Comperatore, and wounding two others before being gunned down by Secre…
…
continue reading
1
The Two Hundred Years' War with Michael Livingston
44:59
44:59
Play later
Play later
Lists
Like
Liked
44:59Although a lot of medieval history is murky, the whys and wherefores – not to mention the timeline – of the Hundred Years’ War are firmly nailed down. Or are they? This week, Danièle speaks with Michael Livingston about why the Hundred Years’ War should actually be called the Two Hundred Years’ War, what actually touched off the conflict, and why w…
…
continue reading
1
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability.
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
…
continue reading
1
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability. (#)
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability. webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans…
…
continue reading
1
RondoDox Botnet Expansion: The Shotgun Approach to IoT Exploitation
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19Got a question or comment? Message us here! This week on the #SOCBrief, Andrew breaks down RondoDox, a rapidly growing botnet campaign taking aim at routers, DVRs, and IoT devices worldwide. With over 50 vulnerabilities across 30+ vendors, this “shotgun” exploitation strategy is fueling massive DDoS and crypto-mining attacks. Support the show Watch…
…
continue reading
1
Could Diddy Get a Trump Pardon, Remains of Beauty Queen Found, Halloween Prank Pushes the Limits
50:45
50:45
Play later
Play later
Lists
Like
Liked
50:45MK True Crime contributors Matt Murphy, Dave Aronberg, and Mark Geragos join the show to discuss the appeal filed by Diddy and his lawyers, rumors of a presidential commutation for the rapper that could happen as soon as this week, the remains of missing Philadelphia beauty queen Kada Scott have been found and the maddening reasons behind why the s…
…
continue reading
1
Virginia Giuiffre’s Memoir Released, Mark Sanchez Scandal, and is Courtney The Louvre Thief ?!?
1:31:22
1:31:22
Play later
Play later
Lists
Like
Liked
1:31:22It’s Talkback Tuesday, and we're replying to your messages on everything from Jeffrey Epstein to Mark Sanchez—and taking your case and documentary suggestions. Plus, a caller brings up an interesting theory about our very own Courtney Armstrong. Tune in for all the details. See omnystudio.com/listener for privacy information.…
…
continue reading
1
SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln;
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
…
continue reading
1
SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln; (#)
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln; What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu webs…
…
continue reading
1
Louvre Heist Fallout, D4vd Private Investigator Reveals Findings, and Prince Andrew Faces Royal Exile
1:33:07
1:33:07
Play later
Play later
Lists
Like
Liked
1:33:07The Louvre remains shuttered after a four-minute, chainsaw-led jewel heist—breaking down what was taken and who may be behind it. The private investigator linked to the D4vd Tesla case drops major revelations; human remains have been discovered in the search for missing Philadelphia beauty queen Kada Scott; and a mother has been convicted of murder…
…
continue reading
1
Building AI-Ready Cultures in Life Sciences R&D - with Xiong Liu of Novartis
30:57
30:57
Play later
Play later
Lists
Like
Liked
30:57Today's guest is Xiong Liu, Director of Data Science and AI at Novartis. Novartis is among the world's leading pharmaceutical companies, pioneering data and advanced analytics in the pursuit of new medicines and patient outcomes. Xiong joins Emerj Editorial Director Matthew DeMello to examine how generative AI and foundation models are transforming…
…
continue reading
1
SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack
9:17
9:17
Play later
Play later
Lists
Like
Liked
9:17Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/32384 AWS Outages AWS has had issues most of the day on Monday, affecting numerous services. http…
…
continue reading
1
SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack (#)
9:17
9:17
Play later
Play later
Lists
Like
Liked
9:17SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/…
…
continue reading