Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
Astronomy Cast

Fraser Cain and Dr. Pamela Gay

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Take a fact-based journey through the cosmos. Tune in to hear weekly discussions on astronomical topics ranging from planets to cosmology. Hosted by Fraser Cain (Universe Today) and Dr. Pamela L. Gay (Planetary Science Institute), this show brings the questions of an avid astronomy lover direct to an astronomer. Together Fraser and Pamela explore what is known and being discovered about the universe around us. Astronomy Cast is supported thru patreon.com/AstronomyCast.
  continue reading
 
Artwork
 
Do you love Dungeons and Dragons and other TTRPGs? Then come join us at our table! Reckless Attack is a Dungeons and Dragons 5th Edition Real Play podcast, hosted by a group of cheery, diverse, regular folks in Chicago who love their game and want to share it with you. If you want to find out more, visit us at recklessattack.com or chat with us on Twitter at @Reckless_Attack. Hang out with other fans on our Discord, and check out our bonus content at patreon.com/recklessattack.
  continue reading
 
Whether you work in the Space industry or dreamed about becoming an astronaut as a kid, we all have some sort of a connection to Space. Space enthusiast, Ben Gamble, brings you a weekly podcast all about Space. Although Ben currently works in events and hospitality, he has always had an interest in the Space industry. As a preliminary jump into the Space world, Ben created this podcast to explore what goes on in the industry with the dream of launching his own Space tech company later in lif ...
  continue reading
 
Artwork
 
Welcome to SK Productions, producing the best episodes of fandom related content on the web. Shows: BHAD Podcast, Mars Attack, Special Friend of FandomBite. Support this podcast: https://podcasters.spotify.com/pod/show/skproductions/support
  continue reading
 
Artwork
 
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
  continue reading
 
Harvest of Mars seeks to uncover the essentials of war. Essentials that have been swept under the rug or forgotten by people and societies eager to rewrite history in a way that is intellectually pleasing. This podcast seeks to open your eyes to aspects of military history that, as Paul Fussell accurately noted, never got into the books because of what he called the Disneyfication of war. Here you will get authentic insights from someone who has a genuine love for the material.If you are cur ...
  continue reading
 
This podcast is created to provide motivation for people going into the week. My goal is to inspire people and to have people attack their day! I hope you all enjoy my few words of encouragement. Peace and Love to you all.
  continue reading
 
Whether you call them guilty pleasures, B-movies, shlock, or bad movies, acknowledging what we like and embracing why we like it is essential. So, join me and a carousel of guests as we delve into the bad movies we hold dear and discuss what makes them loveable.
  continue reading
 
Artwork
 
B-Movie Buddies is a Podcast run by two mates from Australia with an affinity with terrible movies. Join Berti and Crow as they put themselves through hours of sub-par cinema for your enjoyment! It'll be a hoot!
  continue reading
 
Artwork

1
Filmography

Consequence Podcast Network

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Filmography is a deep dive into a director's oeuvre - film by film - to get the big picture. Every quarter, join Consequence of Sound Film Editor, Dominick Suzanne-Mayer, and a rotating cast of guest commentators for new filmic explorations.
  continue reading
 
A weekly podcast where two friends work their way through a Director's theatrical filmography from their first film all the way through to their last. To kick of our second volume, Season Six, focuses on the work of Kathryn Bigelow, while previous directors have been Robert Zemeckis, Zack Snyder, Sam Raimi, Joe Carnahan and Ron Howard.
  continue reading
 
Artwork

1
Rotten Rewind

rotten rewind

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A film podcast that digs through the bottom half of the Rotten Tomatoes barrel to re-evaluate, over-analyze and show our appreciation for all things Rotten. Find us on Patreon for early access, bonus episodes and other exclusive content at www.patreon.com/rottenrewind
  continue reading
 
Artwork

1
SmashFilm

Kevin and Sobie

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
We're here each week to bring you the internet's funniest movie analysis and criticism. A podcast dedicated to bringing you films you know, films you don't, and films you may wish you didn't. Join Kevin, Sobie, and Apryl every Monday as we hand out awards, answer questions, and generally dig way too deeply into the details. We're also hosts of the ComicNoobs Podcast! Dedicated to making sense of comic books for fans of comic book movies. Each month we will recap some of the most important, m ...
  continue reading
 
Artwork

1
Conspiracy and Chill Podcast

"$awbuck" Mike & "Headhunter" Higgins

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to "Conspiracy and Chill,"! We are Two Truth Seekers, Exposing The Keepers with Chill Vibes and Deep Dives. Each session is a captivating exploration of conspiracy theories, enigmatic events, and the unexplained phenomena that keep us questioning the world around us. Hosted by "$awbuck" Mike & "Headhunter" Higgins, both passionate researchers and seasoned conspiracy enthusiasts, "Conspiracy and Chill" provides a unique blend of in-depth analysis, expert interviews, and a touch of hum ...
  continue reading
 
Eric grew up watching Babylon 5, Andrew has never seen it, what happens when these two perspectives collide!? We take a fun, if slightly off color look at Babylon 5 one episode at a time. Join us as we find out if Babylon 5 was really as good as Eric remembers and whether its good enough to make Andrew a super fan too! Drop us a line at [email protected]!
  continue reading
 
Artwork

1
Switchblade Sisters

MaximumFun.org

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Switchblade Sisters is a podcast providing deep cuts on genre flicks from a female perspective. Every week, film critic and screenwriter April Wolfe sits down with a phenomenal female film-maker to slice-and-dice a classic genre movie - horror, exploitation, sci-fi and many others! Along the way, they cover craft, the state of the industry, how films get made, and more. Mothers, lock up your sons, the Switchblade Sisters are coming!
  continue reading
 
Loading …
show series
 
SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
  continue reading
 
“Laundry Bear” airs dirty cyber linen in the Netherlands. AI coding agents are tricked by malicious prompts in a Github MCP vulnerability.Tenable patches critical flaws in Network Monitor on Windows. MathWorks confirms ransomware behind MATLAB outage. Feds audit NVD over vulnerability backlog. FBI warns law firms of evolving Silent Ransom Group tac…
  continue reading
 
SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
  continue reading
 
Astronomy Cast Ep. 757: CubeSats By Fraser Cain & Dr. Pamela Gay Streamed live on May 19, 2025. Computers are getting smaller, faster and more capable, which has enabled an entirely mew class of satellites: CubeSats. A mission small enough that you can hold it in your hands, and yet powerful enough to even travel to other planets and send messages …
  continue reading
 
While our team is observing Memorial Day in the United States, please enjoy this episode from the N2K CyberWire network partner, Microsoft Security. You can hear new episodes of Ann Johnson's Afternoon Cyber Tea podcast every other Tuesday. Dr. Hugh Thompson, Executive Chairman of RSA Conference and Managing Partner at Crosspoint Capital joins Ann …
  continue reading
 
While our team is observing Memorial Day in the United States, please enjoy this episode from our team from T-Minus Space Daily recorded recently at Space Symposium. You can learn more about AWS in Orbit at space.n2k.com/aws. Our guests on this episode are Dax Garner, CTO at Cognitive Space and Ed Meletyan, AWS Sr Solutions Architect. Remember to l…
  continue reading
 
Please enjoy this encore of Career Notes. Product Manager in Anti-Fraud Solutions at SpyCloud, Pattie Dillon shares her journey from raising her family to specializing in the anti-fraud space. Upon reentering the workforce, Pattie worked on identity verification and developed a system with privacy concerns in mind. She moved to work in gift cards a…
  continue reading
 
In large enterprise software companies, Red and Blue Teams collaborate through Purple Teaming to proactively detect, respond to, and mitigate advanced threats. In this episode of CyberWire-X, N2K's Dave Bittner is joined by Adobe’s Justin Tiplitsky, Director of Red Team and Ivan Koshkin, Senior Detection Engineer to discuss how their teams work tog…
  continue reading
 
This week, we are joined by Deepen Desai, Zscaler's Chief Security Officer and EVP of Cyber and AI Engineering, taking a dive deep into Mustang Panda’s latest campaign. Zscaler ThreatLabz uncovered new tools used by Mustang Panda, including the backdoors TONEINS, TONESHELL, PUBLOAD, and the proxy tool StarLoader, all delivered via phishing. They al…
  continue reading
 
Operation Endgame dismantles cybercriminal infrastructure. DOGE’s use of the Grok AI chatbot raises ethical and privacy concerns. Malware on the npm registry uses malicious packages to quietly gather intelligence on developer environments. Researchers link Careto malware to the Spanish government. Exploring proactive operations via letters of marqu…
  continue reading
 
🎸 March & April 2025 Albums Review | Signals From Mars – May 16, 2025 🚀🎸 March & April 2025 New Music Roundup on Signals From Mars with Jeremy Weltman! 🌟 Jeremy Weltman is back on Signals From Mars to break down the latest hard rock and metal releases from March and April 2025! Whether you're overwhelmed by the flood of new music or just want the b…
  continue reading
 
Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
  continue reading
 
A joint operation takes down Lumma infrastructure. The FTC finalizes a security settlement with GoDaddy. The Telemessage breach compromised far more U.S. officials than initially known. Twin hackers allegedly breach a major federal software provider from the inside. U.S. telecom providers fail to notify the Senate when law enforcement agencies requ…
  continue reading
 
New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive VIP memberships to withdraw the money. https://isc.sans.edu/diary/New%20Variant%20of%20Crypto%20Confidence%20Scam/31968 Malicious Chrome Extensions Malici…
  continue reading
 
A joint advisory warns of Fancy Bear targeting Western logistics and technology firms. A nonprofit hospital network in Ohio suffers a disruptive ransomware attack. The Consumer Financial Protection Bureau (CFPB) drops plans to subject data brokers to tighter regulations. KrebsOnSecurity and Google block a record breaking DDoS attack. A phishing cam…
  continue reading
 
Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do offer lists of researchers and just added three new groups today https://isc.sans.edu/diary/Researchers%20Scanning%20the%20Intern…
  continue reading
 
President Trump signs the Take It Down Act into law. A UK grocer logistics firm gets hit by ransomware. Researchers discover trojanized versions of the KeePass password manager. Researchers from CISA and NIST promote a new metric to better predict actively exploited software flaws. A new campaign uses SEO poisoning to deliver Bumblebee malware. A s…
  continue reading
 
RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960 RVTools compromise confirmed Robware.net, the site behind the popular tool RVTools now confirmed that it was compromi…
  continue reading
 
The UK’s Ministry of Justice suffers a major breach. Mozilla patches two critical JavaScript engine flaws in Firefox. Over 200,000 patients of a Georgia-based health clinic see their sensitive data exposed. Researchers track increased malicious targeting of iOS devices. A popular printer brand serves up malware. PupkinStealer targets Windows system…
  continue reading
 
Astronomy Cast Ep. 756: SphereX By Fraser Cain & Dr. Pamela Gay Streamed live on May 12, 2025. NASA’s newly launched SphereX mission is up & operational and has completed its initial checkout and “first light”. Everything looks good! And now it’s starting its science operations. And that’s good enough for Pamela! And THAT means we can talk about it…
  continue reading
 
The Fast and the Furious: Tokyo Drift (2006) A teenager becomes a major competitor in the world of drift racing after moving in with his father in Tokyo to avoid a jail sentence in America. Director: Justin Lin Writer: Chris Morgan Starring: Lucas Black, Nathalie Kelly, Shad Moss, Sung Kang Join the Resistance: Members Only for just $5 a month Plea…
  continue reading
 
xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
  continue reading
 
Please enjoy this encore of Career Notes. Host of the CyberWire Podcast, Dave Bittner, wanted to work with the Muppets, so naturally he landed in cybersecurity. Dave and his Cookie Monster puppet spent much of his childhood putting on shows for his parents friends. During one of those performances, he was discovered and got his start at the local P…
  continue reading
 
This week, Dave speaks with Max Gannon of Cofense Intelligence to dive into his team's research on "The Rise of Precision-Validated Credential Theft: A New Challenge for Defenders." Threat actors continuously develop new tactics, techniques, and procedures (TTPs) to bypass existing defenses. When defenders identify these methods and implement count…
  continue reading
 
NATO hosts the world’s largest cyber defense exercise. The DOJ charges a dozen people in a racketeering conspiracy involving the theft of over $230 million in cryptocurrency. Japan has enacted a new Active Cyberdefense Law. Lawmakers push to reauthorize the Cybersecurity Information Sharing Act. Two critical Ivanti Endpoint Manager Mobile vulnerabi…
  continue reading
 
🔥 In this episode of Signals From Mars, we’re throwing it back to 1989—one of the most iconic years in hard rock and heavy metal history! 🤘 And just like before, the rankings come straight from YOU, our awesome listeners and patrons! 🙌 💿 Each voter submitted a ranked Top 10 list of their favorite albums from 1989. We used a point system (10 points …
  continue reading
 
Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
  continue reading
 
Google issues an emergency patch for a high-severity Chrome browser flaw. Researchers bypass BitLocker encryption in minutes. A massive Chinese-language black market has shut down. The CFPB cancels plans to curb the sale of personal information by data brokers. A cyberespionage campaign called Operation RoundPress targets vulnerable webmail servers…
  continue reading
 
Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
  continue reading
 
A busy Patch Tuesday. Investigators discover undocumented communications devices inside Chinese-made power inverters. A newly discovered Branch Privilege Injection flaw affects Intel CPUs. A UK retailer may claim up to £100mn from its cyber insurers after a major cyberattack. A Kosovo national has been extradited to the U.S. for allegedly running a…
  continue reading
 
Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.san…
  continue reading
 
House Republicans look to limit state regulation of AI. Spain investigates potential cybersecurity weak links in the April 28 power grid collapse. A major security flaw has been found in ASUS mainboards’ automatic update system. A new macOS info-stealing malware uses PyInstaller to evade detection. The U.S. charges 14 North Korean nationals in a re…
  continue reading
 
Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking d…
  continue reading
 
Astronomy Cast Ep. 755: Intermediate Mass Black Holes By Fraser Cain & Dr. Pamela Gay Streamed live on May 5, 2025. Hosted by: Fraser Cain and Dr. Pamela L. Gay. There are stellar-mass and supermassive black holes. But very little evidence of anything in between. Where are all the intermediate-mass black holes that should be the building blocks of …
  continue reading
 
A major student engagement platform falls victim to the ClickFix social engineering attack. Google settles privacy allegations with Texas for over one point three billion dollars. Stores across the UK face empty shelves due to an ongoing cyberattack. Ascension Health reports that over 437,000 patients were affected by a third-party data breach. A c…
  continue reading
 
Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/ FBI Warns of End-of-life routers The FBI is tracking larger…
  continue reading
 
Enjoy this encore of Career Notes. Executive Security Advisor at IBM Security Limor Kessem says she started her cybersecurity career by pure chance. Limor made a change from her childhood dream of being a doctor and came into cybersecurity with her passion, investment, discipline, and perseverance. Limor talks about how we must tighten our core sec…
  continue reading
 
Cybersecurity is no longer confined to the digital world or just a technical challenge, it’s a global imperative. The NightDragon Innovation Summit convened a group of industry leaders to discuss how public and private entities can work together to address emerging threats and harness the power of AI, cybersecurity, and innovation to strengthen nat…
  continue reading
 
This week, we are joined by Lucija Valentić, Software Threat Researcher from ReversingLabs, who is discussing "Atomic and Exodus crypto wallets targeted in malicious npm campaign." Threat actors have launched a malicious npm campaign targeting Atomic and Exodus crypto wallets by distributing a fake package called "pdf-to-office," which secretly pat…
  continue reading
 
The messaging app used by CBP and the White House faces continued security scrutiny. Hacktivists breach the airline used for U.S. deportation flights. The FBI warns that threat actors are exploiting outdated, unsupported routers. Education giant Pearson confirms a cyberattack. Researchers report exploitation of Windows Remote Management (WinRM) for…
  continue reading
 
In Episode 117 of The Astro Ben Podcast, Ben sits down with Mamta Patel Nagaraja, former Associate Chief Scientist for Exploration and Applied Research at NASA, who recently left the agency amid its office closures in February 2025. Mamta reflects on her career leading biomedical and physical sciences for the ISS, Artemis, and commercial space miss…
  continue reading
 
No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932 SAMSUNG magicINFO 9 Server Flaw Still exploitable The SAMSUNG magicINFO 9 Serv…
  continue reading
 
The LockBit ransomware gang has been hacked. Google researchers identify a new infostealer called Lostkeys. SonicWall is urging customers to patch three critical device vulnerabilities. Apple patches a critical remote code execution flaw. Cisco patches 35 vulnerabilities across multiple products. Iranian hackers cloned a German modeling agency’s we…
  continue reading
 
From the N2K CyberWire network T-Minus team, please enjoy this podcast episode recorded at Space Symposium 2025. Find out how AWS for Aerospace and Satellite is  empowering exploration on the Moon, Mars, and beyond with Lunar Outpost. You can learn more about AWS in Orbit at space.n2k.com/aws. Our guests on this episode are AJ Gemer, CTO at Lunar O…
  continue reading
 
Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%22Modular%22%20Malware/31928 Sysaid XXE Vulnerabilities IT Service Management Software Sysaid patched a number of XXE vulner…
  continue reading
 
A jury orders NSO Group to pay $167 millions dollars to Meta over spyware allegations. CISA warns of hacktivists targeting U.S. ICS and SCADA systems. Researcher Micah Lee documents serious privacy risks in the TM SGNL app used by high level Trump officials. The NSA plans significant workforce cuts. Nations look for alternatives to U.S. cloud provi…
  continue reading
 
Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that, in addition to implementing typical infostealer functionality, includes a web server suitable to create local phishing sites. https://isc.sans.edu/diary/Python%20InfoStealer%20with%20Embedded%20Phishing%20Webserver/31924 Android Update Fixes Freetype 0…
  continue reading
 
Loading …
Listen to this show while you explore
Play