RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Hyper V Podcasts
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Heya! I'm V. and this podcast here is a way for me to talk about my current hyper fixations whether that's to do with movies, television or K-Dramas, we'll see just how many tangents I go along the way of breaking down these topics.
…
continue reading
Follow Veeam Podcasts to stay on top of the recent virtualization news and VMware and Hyper-V data-protection best practices. Join us now to become an Always-On Business™!
…
continue reading
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
…
continue reading
Enterprise security topics are discussed through the lens of current events, which catapult us into a discussion about hacking methods, security measures, and outcomes. Your hosts are Carl Franklin, Patrick Hynds, and Duane LaFlotte
…
continue reading
Humorous technology demonstrations tackling design, implementation, and support of IT infrastructures. Presented by our resident geeks using video and screencasting. Nicky Curtis an IT consultant, and Microsoft Certified Trainer specialises in enterprise technologies. Nicholas Hill introduces alternative open source solutions.
…
continue reading
It’s not another recap podcast- it’s a gameshow! First, we hyper-binge the series and analyze each season. In order to out-write the HWIC themselves, we have to first learn what makes them tick! Then, we will predict episode by episode what will happen in the final season. Finally, we’re going to write two unique and complete screenplays predicting the big ending of our beloved Riverdale. Who among us (Katie, Chantal, and the HWIC) has it in them to create the most bombastic, shocking, and e ...
…
continue reading
Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR DetectionBy Carl Franklin
…
continue reading
51
Hackers use Hyper-V, Cisco UCCX flaw, The Louvre's password
7:58
7:58
Play later
Play later
Lists
Like
Liked
7:58Hackers use Windows Hyper-V to evade EDR detection Critical Cisco UCCX flaw lets attackers run commands as root The Louvre's video security password was reportedly Louvre Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatL…
…
continue reading
1
Azure hit by DDoS, Kenyan government sites recover, EVALUSION emerges
7:42
7:42
Play later
Play later
Lists
Like
Liked
7:42Azure hit by DDoS using 500K IPs Kenyan government websites back online EVALUSION emerges Huge thanks to our episode sponsor, KnowBe4 Your email gateway isn't catching everything — and cybercriminals know it. That's why there's KnowBe4's Cloud Email Security platform. It's not just another filter—it's a dynamic, AI-powered layer of defense that det…
…
continue reading
1
Department of Know: Autonomous AI cyberattack, CISOs back to work, bus kill switches
39:26
39:26
Play later
Play later
Lists
Like
Liked
39:26Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Robb Dunewood, Host, Daily Tech News Show, and Howard Holton, CEO, GigaOm Thanks to our show sponsor, KnowBe4 Your email gateway isn't catching everything — and cybercriminals know it. That's why there's KnowBe4's Cloud Email Security platform. It's not ju…
…
continue reading
1
Windows 10 update failure, autonomous AI cyberattack, Feds fumble Cisco patches
8:07
8:07
Play later
Play later
Lists
Like
Liked
8:07Microsoft warns of potential Windows 10 update failure China-backed hackers launch first large-scale autonomous AI cyberattack Feds fumbled Cisco patches requirements, says CISA Huge thanks to our episode sponsor, KnowBe4 Your email gateway isn't catching everything — and cybercriminals know it. That's why there's KnowBe4's Cloud Email Security pla…
…
continue reading
1
NWWITA - Episode 28 - When The Moon Hits Your Eye...
49:56
49:56
Play later
Play later
Lists
Like
Liked
49:56Better late then never I guess! Whoopsies! Meant to record this last night but only could get to it tonight! I'm talking Moonstruck (1987) starring Cher and Nicolas Cage! A fun dramatic movie! Follow my Substack! https://vnoire.substack.com Find me on: https://www.instagram.com/v_noire_ https://www.tiktok.com/@v_noire I also stream on Twitch on Sat…
…
continue reading
1
Cyber laws reprieved, Microsoft screen capture, FBI highlights Akira
8:22
8:22
Play later
Play later
Lists
Like
Liked
8:22Two key cyber laws are back as president signs bill to end shutdown Microsoft's screen capture prevention for Teams users is finally rolling out FBI calls Akira top five ransomware variant out of 130 targeting U.S. businesses Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my…
…
continue reading
1
Mobile blackout for Russian travelers, Windows 11 supports 3rd party passkeys, Synology patches BeeStation flaw
7:23
7:23
Play later
Play later
Lists
Like
Liked
7:23Mobile internet blackout for Russian travelers Windows 11 supports 3rd-party passkey apps Synology patches BeeStation flaw Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ....or the really scary one: "how do I get out from under these old tools and manual …
…
continue reading
1
Google's remote-wipe weapon, Qilin ransomware activity surges, GootLoader is back
8:08
8:08
Play later
Play later
Lists
Like
Liked
8:08Google's Find Hub turns into remote-wipe weapon Qilin ransomware activity surges GootLoader is back Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ....or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta.…
…
continue reading
How resilient are your Azure deployments? Richard chats with Chris Ayers about his work on Azure reliability - not only for customers using Azure, but for Azure itself! Chris focuses on the Well-Architected Framework as a guideline for thinking through all the elements of resiliency in Azure. As with all things, there are trade-offs of cost and rel…
…
continue reading
1
Reauthorizing CISA, Electric bus kill switches, GDPR for AI
7:33
7:33
Play later
Play later
Lists
Like
Liked
7:33CISA reauthorization Denmark and Norway investigating electric bus "kill switches" European Commission looking to simplify privacy laws for AI Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ....or the really scary one: "how do I get out from under these o…
…
continue reading
1
Department of Know: Cybercriminals join forces, SleepyDuck" exploits Ethereum, passwords still awful
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Jacob Coombs, CISO, Tandem Diabetes Care, and Ross Young, Co-host, CISO Tradecraft Thanks to our show sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ….or the really scary one: "how…
…
continue reading
1
runC Docker threats, lost iPhone scam, Landfall spyware warning
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51runC flaws could allow hackers to escape Docker containers Lost iPhone scam warning Landfall Android spyware targets Samsung Galaxy phones Huge thanks to our sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ....or the really scary one: "how do I get out from under these old t…
…
continue reading
No one pays ransomware demands anymore - so attackers have a new goal. Also: Ransomware Surge in Europe: Cybercriminals Exploit GDPR Penalties, Target Key SectorsBy Carl Franklin
…
continue reading
1
NWWITA - Episode 27 - Frankenstein Is Not Nosferatu
1:40:04
1:40:04
Play later
Play later
Lists
Like
Liked
1:40:04This week I was able to catch Guillermo del Toro's Frankenstein in theaters ahead of it dropping in Netflix! I'm so so glad Toro was able to get a relatively long theater run as Netflix I've noticed usually only does about a week or so of a theatrical release before it gets put on its platform unfortunately smh. This is a goregous film! And unlike …
…
continue reading
1
Google uncovers PROMPFLUX, CISA warns of CentOS Web Panel bug, Threat group targets academics
7:56
7:56
Play later
Play later
Lists
Like
Liked
7:56Google uncovers PROMPTFLUX malware CISA warns of CentOS Web Panel bug Threat group targets academics Huge thanks to our sponsor, ThreatLocker Cybercriminals don't knock — they sneak in through the cracks other tools miss. That's why organizations are turning to ThreatLocker. As a zero-trust endpoint protection platform, ThreatLocker puts you back i…
…
continue reading
1
Scattered Spider, LAPSUS$, ShinyHunters join forces, Nikkei data breach impacts 17k people, React Native NPM flaw leads to attacks
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59Scattered Spider, LAPSUS$, and ShinyHunters join forces Nikkei reports data breach impacting 17,000 people React Native NPM flaw leads to attacks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's what ThreatLocker delivers. As a zero…
…
continue reading
1
Managing Updates using Autopatch with Aria Hanson
31:54
31:54
Play later
Play later
Lists
Like
Liked
31:54The future of updating Windows is here! Richard talks to Aria Hanson about Windows Autopatch, the consolidation of Microsoft's various update mechanisms to keep your managed Windows devices current. Aria discusses the deprecation of Windows Server Update Services (WSUS) and the move to always-on cloud updates. The conversation turns to the various …
…
continue reading
1
"SleepyDuck" uses Ethereum, SesameOp abuses OpenAI API, cybercrooks steal physical cargo
7:36
7:36
Play later
Play later
Lists
Like
Liked
7:36"SleepyDuck" uses Ethereum to keep command server alive SesameOp abuses OpenAI Assistants API Organized crime cybercrooks steal cargo Huge thanks to our sponsor, ThreatLocker Cybercriminals don't knock — they sneak in through the cracks other tools miss. That's why organizations are turning to ThreatLocker. As a zero-trust endpoint protection platf…
…
continue reading
1
Department of Know: Azure security pitfalls, retailer cyberattack profits, Aardvark eats bugs
33:46
33:46
Play later
Play later
Lists
Like
Liked
33:46Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Davi Ottenheimer, vp, digital trust and ethics, Inrupt, and Rob Teel, Field CTO, GigaOm Thanks to our show sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's w…
…
continue reading
1
Australia BadCandy warning, Cisco firewall attack, Aardvark eats bugs
8:25
8:25
Play later
Play later
Lists
Like
Liked
8:25Australia warns of BADCANDY attacks exploiting Cisco IOS XE Chinese hackers exploiting Cisco ASA firewalls used by governments worldwide OpenAI's Aardvark GPT-5 agent finds and fixes code flaws automatically Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything…
…
continue reading
1
Quick Reviews: Devil in the Flesh 1998 - NWWITA bonus
1:47
1:47
Play later
Play later
Lists
Like
Liked
1:47Follow my Substack! https://vnoire.substack.com Find me on: https://www.instagram.com/v_noire_ https://www.tiktok.com/@v_noire I also stream on Twitch on Saturdays https://www.twitch.tv/v_noire/ Podcast archive: https://www.nwwitapod.com/ Support me on Patreon: https://patreon.com/vnoiresfilmclubBy V. Noire
…
continue reading
1
NWWITA - Episode 26 - A Good Boy or A Good Son?
1:03:34
1:03:34
Play later
Play later
Lists
Like
Liked
1:03:34Kind of late but here it is! Episode 26! I'm talking Good Boy (2025) and The Good Son (1993)! With Halloween now come and gone I can switch over to talking about different kinds of movies now but I think there will probably still be an enthasis on horror movies as that's my favorite genre! (maybe I'll do a deep dive into clown movies? 🤔 Follow my S…
…
continue reading
AWS crash causes $2,000 Smart Beds to overheat and get stuck uprightBy Carl Franklin
…
continue reading
1
LinkedIn AI opt-out, NSA leadership candidates, Python foundation withdraws
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25LinkedIn users have until Monday to opt out of its AI training program New names surface for NSA leadership Open-source security group pulls out of U.S. grant, citing DEI restrictions Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer re…
…
continue reading
1
LG Uplus confirms breach, Conduent attack impacts 10M+, hackers exploit tools against Ukraine
7:08
7:08
Play later
Play later
Lists
Like
Liked
7:08LG Uplus confirms cybersecurity incident 10 million+ impacted by Conduent breach Russian hackers exploit tools against Ukrainian targets Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Convey…
…
continue reading
1
Android malware types like a human, sanctions weaken cyber ecosystems, side-channel extracts Intel, AMD secrets
7:41
7:41
Play later
Play later
Lists
Like
Liked
7:41New Android malware types like a human Sanctions weaken nation-state cyber ecosystems Side-channel attack extracts Intel, AMD secrets Huge thanks to our sponsor, Conveyor Have you been personally victimized by a questionnaire this week? The queue never ends. But Conveyor can change that story. With AI that answers questionnaires of any format, and …
…
continue reading
How can the new AI tools help DBAs? Richard chats with Grant Fritchey about his experiences using various types of LLMs to help with his work as a DBA. Grant discusses having an LLM open as a side window to pass questions by, such as ideas for tuning, query optimization, scripts, and so on. Not all LLMs are the same - it's worth experimenting with …
…
continue reading
1
Atlas browser hijacked, Bye, bye Twitter birdie, Dante spyware surfaces
8:15
8:15
Play later
Play later
Lists
Like
Liked
8:15Atlas browser hijacked Bye, bye Twitter birdie Dante spyware surfaces Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Conveyor takes all that chaos and turns it into calm. AI fills in the que…
…
continue reading
1
Department of Know: Promoting passphrases, questioning international security conferences, gift card hackers
34:00
34:00
Play later
Play later
Lists
Like
Liked
34:00Link to episode page This week's edition of The Department of Know is hosted by Rich Stroffolino with guests Bil Harmer, operating partner and CISO, Craft Ventures, and Sasha Pereira, CISO, WASH Thanks to our show sponsor, ThreatLocker If security questionnaires make you feel like you're drowning in chaos, you're not alone. Endless spreadsheets, po…
…
continue reading
1
Microsoft WSUS vulnerability, LastPass death hoax, Copilot phishing technique
9:36
9:36
Play later
Play later
Lists
Like
Liked
9:36Microsoft WSUS vulnerability could allow for remote code execution Fake LastPass death claims used to breach password vaults New CoPhish attack steals OAuth tokens via Copilot Studio agents Huge thanks to our sponsor, Conveyor If security questionnaires make you feel like you're drowning in chaos, you're not alone. Endless spreadsheets, portals, an…
…
continue reading
1
Week in Review: AI powered cyberattacks, Chinese time hacked, the 72 hour workweek
32:19
32:19
Play later
Play later
Lists
Like
Liked
32:19Link to episode page This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guests David Cross, CISO, Atlassian, and davidcrosstravels.com, and Montez Fitzpatrick, CISO, Navvis Thanks to our show sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everyth…
…
continue reading
1
NWWITA - Episode 25 - The Last Dragon Might Just Be A Devil In The Flesh....
1:15:37
1:15:37
Play later
Play later
Lists
Like
Liked
1:15:37Been tired cause of work so sorry for not doing consistent uploads as of late :( But I'm back this week with two movie reviews and some fun little tangents on shows I've been watching recently! I touch on a very late for me 24 years later disappointment in Moesha's series finale, some talks on the latest season of Gen V then I get into Berry Gordy'…
…
continue reading
151
Jingle Thief exploit, Lazarus targets jobseekers, the 72 hour workweek
9:26
9:26
Play later
Play later
Lists
Like
Liked
9:26Jingle Thief hackers steal millions in gift cards by exploiting cloud infrastructure Lazarus hackers targeted European defense companies Deep Tech work culture pushes for 72 hour workweeks Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. T…
…
continue reading
151
TP-Link urges updates, MuddyWater espionage campaign, flaw hits Adobe Commerce
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26TP-Link urges updates for Omada gateways MuddyWater targets organizations in espionage campaign "SessionReaper" flaw exploited in Adobe Commerce Huge thanks to our sponsor, ThreatLocker Cybercriminals don't knock — they sneak in through the cracks other tools miss. That's why organizations are turning to ThreatLocker. As a zero-trust endpoint prote…
…
continue reading
151
Russian hackers replace malware with new tools, Windows updates cause login issues, campaign targets high-profile servers
8:03
8:03
Play later
Play later
Lists
Like
Liked
8:03Russian state hackers replace burned malware with new tools Recent Windows updates cause login issues on some PCs Sophisticated campaign targets servers of high-profile organizations Huge thanks to our sponsor, ThreatLocker Imagine having the power to decide exactly what runs in your IT environment — and blocking everything else by default. That's …
…
continue reading
1
Becoming a Cybersecurity Expert with Paula Januszkiewicz
38:22
38:22
Play later
Play later
Lists
Like
Liked
38:22How do you become a cybersecurity expert? While at Cybersecurity Intersection in Orlando, Richard chatted with Paula Januszkiewicz about her career in cybersecurity. Paula talks about insatiable curiosity to understand how things work the way they do - why an exploit happens and following the twists and turns that lead to root cause and permanent s…
…
continue reading
1
AWS outage, NSA hacking accusations, High risk WhatsApp automation
8:19
8:19
Play later
Play later
Lists
Like
Liked
8:19DNS failure leads to AWS outage China accuses NSA of hacking national time center Chrome store flooded with high-risk WhatsApp automation Huge thanks to our sponsor, ThreatLocker Cybercriminals don't knock — they sneak in through the cracks other tools miss. That's why organizations are turning to ThreatLocker. As a zero-trust endpoint protection p…
…
continue reading