Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Homebrew Network Podcasts

show episodes
 
Dr. Homebrew breaks down your home brewed beer and gives you the feedback you're looking for to improve your brewing! Join JP, along with his co-hosts, BJCP Master Judges Brian Cooper and Brian Schar, as they dissect listener-submitted homebrew and provide tips and tricks to improve your brewing! Have questions or want your beer evaluated on Dr. Homebrew? Email us at [email protected]
  continue reading
 
Artwork

851
Magnificence

Tabletop Talespinners Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A strange funeral drags six unfamiliar faces from their homes to Seer's Mourning. None of them will leave the same. A D&D 5e actual play podcast produced by the Tabletop Talespinners Network. New episodes every other Friday! Cover art by Jee Prophet
  continue reading
 
Immersive Tabletop RPG storytelling meets audio drama in this narrative actual play podcast. Dive into the epic world of MythCraft with Ties the Bind, a cinematic actual play podcast where every relationship matters, every tie can bind, and family is everything. What to Expect: -Collaborative storytelling that puts character development first -Immersive sound design and atmospheric audio -Real dice rolls and authentic tabletop gaming moments Join us on Discord
  continue reading
 
Artwork
 
The Sanity Damage podcast is a series of TTRPG campaigns set in a multiverse cooked up by Nathan Heard and his peers. Sanity Damage's first campaign, To Whom the Sea Belongs, follows the story of an unlikely team of motley scalawags and genteel nobles as they stumble into a mind-bending conspiracy that reaches far beyond their mortal world. In this campaign, the party wrestles with the moderate good and considerable evil that arises from colonialism, and they experience the vast and diverse ...
  continue reading
 
The original live show that brings professional brewer and homebrewer interviews, and the best in beer-tainment, right to you as we talk about homebrewing beer and craft brewing. Each episode covers specific brewing topics to inform and entertain, and world class professional brewers as guests. All the fun of real radio, without the boredom. Live listeners can participate and ask questions by joining our chatroom. Watch the live show at YouTube.com/brewingnetwork. Have a brewing question or ...
  continue reading
 
Brew Strong, with hosts Jamil Zainasheff and John Palmer, combines the two most prominent authors and figures in homebrewing today in a live beer radio format that allows listeners to pose beginning and advanced brewing questions to expert hosts and guests from the Craft Beer industry. Designed as a brewing geek's must-listen show, Brew Strong is your source for cutting edge beer and brewing information, answers to technical questions, as well as a guide to a greater appreciation of all thin ...
  continue reading
 
World Weavers is a D&D actual play about world-building, storytelling, and imagination. The players not only have their character and play through a 5th edition actual play adventure but also shape the world and its people. They will craft landscapes, build towns, control factions, and breathe life into the stories springing into existence around them - and these will be the settings for our actual play adventures Live on Youtube Mondays at 7PM EST - https://youtube.com/@thehomebrewdnd World ...
  continue reading
 
Artwork
 
Power Word Fail is a fantasy actual play D&D 5e podcast powered by lush character dynamics, arcane mystery, and the hilarity of the players’ table. Take arms and take heed: all actions have consequences in the world of Power Word Fail. Our first campaign, Chosen of the Crystal Crown, is helmed by DM Cody Smith, with cast members Tyrell Nye, Austin Brady, Nathan Heard, Andi Casuras, Katie Franks, and Ian Davis. This is a Homebrew Podcast. Learn more at actualplaypods.com You can support the s ...
  continue reading
 
Artwork

1
Everything Matters

The Homebrew Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"It's all real, Everything Matters, and it Never Ends." Everything Matters is a Comedy Horror Podcast published every Tuesday. The show is focused on storytelling and features paranormal, surreal, absurd, and post-apocalyptic elements. This critically-acclaimed 7x Humanbody Award-winning collection of stories and coverage of contemporary issues affecting Tri Town and beyond is one of this planet's most popular programs. Hosted by Michael Taur and Dale Dallas, the show features intimate conve ...
  continue reading
 
Artwork

4
Brewing After Hours with Sarah Flora

Sarah Flora | Bleav Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Brewing After Hours Podcast is hosted by homebrewer and digital creator Sarah Flora (aka Flora Brewing), known for her popular Instagram and YouTube content breaking down the art of brewing from her home in Los Angeles. This series goes beyond the brew kettle — exploring the history, culture, and untold stories behind beer, with guest appearances from homebrewers and industry pros alike. While new episodes aren’t currently dropping, the full archive is packed with brewing deep-dives, fun ...
  continue reading
 
Artwork

1
The Sleight of Hand Podcast

The Sleight of Hand Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A Podcast built around the love of tabletop gaming! Sit back, relax and let your ears take it all in. As we dive into the ever so famous world of Dungeons & Dragons. A Fifth Edition rule-based Homebrew campaign! Created by the SOH Network The Cast: lan // Derek // Justin // Thomas // Isaiah // Christopher Want to know more? Follow and support us at: Instagram:thesleightofhandpodcast Twitter:SleightofhandPC Facebook:thesleightofhandpodcast Gmail:[email protected] Youtube:Sleig ...
  continue reading
 
Artwork
 
The Podcasters of the Dragon Wagon Radio podcast network venture into a mythical land in this DnD inspired actual-play homebrew RPG show that's heavy on the RP. Jake Lloyd Bacon, Alexandra Hoey and Matt Hingstman are joined by actor, improv and comic special guests, and must take on the roles of Half-Orcs, Dark Elves and more as they fight their way through a mythical land of peril, drama and hilarity all controlled by Dungeon Master Paul Bianchi and the chance rolls of dice!
  continue reading
 
Artwork

1
What's My Roll

Arcane Focus Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
What’s My Roll is a Dungeons & Dragons 5th Edition actual-play seasonal podcast recorded and produced in Hong Kong. Set in the homebrew world of Eresyn, in the country of Pelantus. DM Ben Margalith crafts an intricate, living world full of lore, intrigue, and memorable characters. Join the players and their Neighborhood Watch Association as they try to clean up the streets of Brighthallow one district at a time. Little do they know, there’s much more at stake than they signed up for! For upd ...
  continue reading
 
Artwork

1
The Devil's Antlers

Time To Die Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A Homebrewed TTRPG Actual Play Cryptid Campaign, with voice acting, sound FX, and original music. Set in the mid 1950s, this story follows four citizens around Pembine and Marinette, Wisconsin, as they begin to unveil some strange occurrences in the area.
  continue reading
 
Hosted by Jay Goodwin, co-founder of The Rare Barrel in Berkeley, California, The Sour Hour is an in-depth look into the process of making wild ales. With the help of some of the best mixed-fermentation brewers in the world, Jay discusses the techniques required to make world class sour beer. Have a question or comment? Email us at [email protected].
  continue reading
 
Artwork
 
The Few Who Speak Podcast is a general talk show with an emphasis on funny anecdotes from the show-runners. The show comes from the Fable Few Media Network and features the six main members: Alex, Ares, Gray, Lilith, Moke, and Tyler. If you're looking for a new chill podcast to listen to in the car or at work, this is the show for you.
  continue reading
 
Artwork

1
Taplines

VinePair

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
It’s modern American history, one beer at a time! Join VinePair contributing editor and columnist Dave Infante for Taplines, a weekly interview series with brewing icons, industry insiders, and outspoken experts about the United States’ most beloved and best-selling beers. Bros discussing their favorite IPAs, this ain’t. Taplines is a mix of journalism, history, and beer that you won’t find anywhere else but the VinePair Podcast Network. Hosted on Acast. See acast.com/privacy for more inform ...
  continue reading
 
Loading …
show series
 
We had this idea: what if we had a few adventurous homebrewers brew beers according to some old set of BJCP style guidelines? Could they do it? What would that judging be like? How much has beer changed over the last 20 years or so? Turns out, there were other people who wanted to know the answers to those questions, too! So on today's show, we hav…
  continue reading
 
Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the …
  continue reading
 
Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
  continue reading
 
Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
  continue reading
 
Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
  continue reading
 
SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
  continue reading
 
CONTENT WARNINGS: Descriptions of corpses (54:01 - 55:15) Body horror sfx (58:04 - 58:10, 59:01 - 59:04, 1:00:23 - 1:00:30, 1:02:19 - 1:02:28, 1:03:33 - 1:03:43) The party continues their descent into the earth and arrives at the heart of Mor Akkros. Will those hiding in the shadows present themselves as friend or foe? Find more of the Tabletop Tal…
  continue reading
 
In this episode, the Brew Strong team tackle the complex world of mixed fermentation (part 2). With so much information in the world of wild and sour beers, it took two episodes to cover this fascinating topic. Tune in to part two here and get ready to get wild! Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
AI and Faster Attack Analysis A few use cases for LLMs to speed up analysis https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198 Proxyware Malware Being Distributed on YouTube Video Download Site Popular YouTube download sites will attempt to infect users with proxyware. https://asec.ahnlab.com/en/89574/ Xero…
  continue reading
 
CVE-2017-11882 Will Never Die The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email. https://isc.sans.edu/diary/CVE-2017-11882%20Will%20Never%20Die/32196 Windows Kerberos El…
  continue reading
 
Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression…
  continue reading
 
Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of…
  continue reading
 
Google Paid Ads for Fake Tesla Websites Someone is setting up fake Tesla lookalike websites that attempt to collect credit card data from unsuspecting users trying to preorder Tesla products. https://isc.sans.edu/diary/Google%20Paid%20Ads%20for%20Fake%20Tesla%20Websites/32186 Compromising USB Devices for Persistent Stealthy Access USB devices, like…
  continue reading
 
Mass Internet Scanning from ASN 43350 Our undergraduate intern Duncan Woosley wrote up aggressive scans from ASN 43350 https://isc.sans.edu/diary/Mass+Internet+Scanning+from+ASN+43350+Guest+Diary/32180/#comments HTTP/1.1 Desync Attacks Portswigger released details about new types of HTTP/1.1 desync attacks it uncovered. These attacks are particular…
  continue reading
 
Do Sextortion Scams Still Work in 2025? Jan looked at recent sextortion emails to check if any of the crypto addresses in these emails received deposits. Sadly, some did, so these scams still work. https://isc.sans.edu/diary/Do%20sextortion%20scams%20still%20work%20in%202025%3F/32178 Akira Ransomware Group s use of Drivers Guidepoint Security obser…
  continue reading
 
Stealing Machinekeys for fun and profit (or riding the SharePoint wave) Bojan explains in detail how .NET uses Machine Keys to protect the VIEWSTATE, and how to abuse the VIEWSTATE for code execution if the Machine Keys are lost. https://isc.sans.edu/diary/Stealing%20Machine%20Keys%20for%20fun%20and%20profit%20%28or%20riding%20the%20SharePoint%20wa…
  continue reading
 
Daily Trends Report A new trends report will bring you daily data highlights via e-mail. https://isc.sans.edu/diary/New%20Feature%3A%20Daily%20Trends%20Report/32170 NVidia Triton RCE Wiz found an interesting information leakage vulnerability in NVidia s Triton servers that can be leveraged to remote code execution. https://www.wiz.io/blog/nvidia-tr…
  continue reading
 
Scans for pop3user with guessable password A particular IP assigned to a network that calls itself Unmanaged has been scanning telnet/ssh for a user called pop3user with passwords pop3user or 123456 . I assume they are looking for legacy systems that either currently run pop3 or ran pop3 in the past, and left the user enabled. https://isc.sans.edu/…
  continue reading
 
As the party continues to explore the underground passages of Mor Akkros, the pieces of the puzzle begin to come together. Will it lead to more answers or more questions? Find more of the Tabletop Talespinners Network and our sponsors here! Cast: GM - Jee Aelina - Jacqueline Cerridwen - Grace Khuvos - Emma Olwen - Andie Sage - Rosalie Suda - Winter…
  continue reading
 
Scattered Spider Related Domain Names A quick demo of our domain feeds and how they can be used to find Scattered Spider related domains https://isc.sans.edu/diary/Scattered+Spider+Related+Domain+Names/32162 Excel External Workbook Links to Blocked File Types Will Be Disabled by Default Excel will discontinue allowing links to dangerous file types …
  continue reading
 
Securing Firebase: Lessons Re-Learned from the Tea Breach Inspried by the breach of the Tea app, Brendon Evans recorded a video to inform of Firebase security issues https://isc.sans.edu/diary/Securing%20Firebase%3A%20Lessons%20Re-Learned%20from%20the%20Tea%20Breach/32158 WebKit Vulnerability Exploited before Apple Patch A WebKit vulnerablity patch…
  continue reading
 
Apple Updates Everything: July 2025 Edition Apple released updates for all of its operating systems patching 89 different vulnerabilities. Many vulnerabilities apply to multiple operating systems. https://isc.sans.edu/diary/Apple%20Updates%20Everything%3A%20July%202025/32154 Python Triage A quick python script by Xavier to efficiently search throug…
  continue reading
 
Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a bl…
  continue reading
 
Linux Namespaces Linux namespaces can be used to control networking features on a process-by-process basis. This is useful when trying to present a different network environment to a process being analysed. https://isc.sans.edu/diary/Sinkholing%20Suspicious%20Scripts%20or%20Executables%20on%20Linux/32144 Coyote in the Wild: First-Ever Malware That …
  continue reading
 
New File Integrity Tool: ficheck.py Jim created a new tool, ficheck.py, that can be used to verify file integrity. It is a drop-in replacement for an older tool, fcheck, which was written in Perl and no longer functions well on modern Linux distributions. https://isc.sans.edu/diary/New%20Tool%3A%20ficheck.py/32136 Mitel Vulnerability Mitel released…
  continue reading
 
Reversing SharePoint Toolshell Exploits CVE-2025-53770 and CVE-2025-53771 A quick walk-through showing how to decode the payload of recent SharePoint exploits https://isc.sans.edu/diary/Analyzing%20Sharepoint%20Exploits%20%28CVE-2025-53770%2C%20CVE-2025-53771%29/32138 Compromised JavaScript NPM is Package The popular npm package is was compromised …
  continue reading
 
In this episode, the Brew Strong team tackle the complex world of mixed fermentation. With so much information in the world of wild and sour beers, it's gonna take at least two episodes to cover this fascinating topic. Tune in to part one here and get ready to get wild! Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
Microsoft Updates SharePoint Vulnerability Guidance CVE-2025-53770 and CVE-2025-53771 Microsoft released its update for SharePoint 2016, completing the updates across all currently supported versions. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/ WinZip MotW Privacy Starting with version 7.10…
  continue reading
 
Microsoft Released Patches for SharePoint Vulnerability CVE-2025-53770 CVE-2025-53771 Microsoft released a patch for the currently exploited SharePoint vulnerability. It also added a second CVE number identifying the authentication bypass vulnerability. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-…
  continue reading
 
SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0Day+Vulnerablity+Exploited+CVE202553770+ToolShell/32122/ Veeam Voicemail Phishing Attackers appear to impersonate …
  continue reading
 
Battered and bruised, the party fights tooth and nail to escape the creatures lurking in the shadows. Meanwhile, Khuvos fights a verbal battle of his own. Find more of the Tabletop Talespinners Network and our sponsors here! Cast: GM - Jee Aelina - Jacqueline Cerridwen - Grace Khuvos - Emma Olwen - Andie Sage - Rosalie Suda - Winter Crew: Dialogue …
  continue reading
 
Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
  continue reading
 
More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112 Ongoing SonicWall Secure Mobile Access (SMA) Exploitation…
  continue reading
 
Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%20Stored%20in%20an%20ADS/32108 Malvertising Homebrew An attacker has been attempting to trick users into installing a malicious versi…
  continue reading
 
DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse s residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that Jesse runs. https://isc.sans.edu/diary/DSh…
  continue reading
 
Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102 Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812 Huntress saw active exploitation of…
  continue reading
 
SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this particular case, the Yandex mail server was the primary victim of these attacks. https://isc.sans.edu/diary/SSH%20Tunneling%20in%20Act…
  continue reading
 
Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20Development%3A%20Why%20and%20How./32092 Animation-Driven Tapjacking on Android Attackers can use a clic…
  continue reading
 
Microsoft Patch Tuesday, July 2025 Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was disclosed before being patched, and none of the vulnerabilities have so far been e…
  continue reading
 
What s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS infostealer adds backdoor for persistent attacks Malware analyst discovered a new version of the Atomic macOS info-st…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play