An indispensable resource for all those engaged in ministry, this weekly podcast covers important practical issues for today's parish ministers.
…
continue reading
The NPM Interconnections Podcast features in-depth interviews with top power and data center industry insiders across the development, finance, M&A, and corporate community.
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses the latest trends in network management.
…
continue reading
Daily stories from the world of information security. To delve into any daily story, head to CISOseries.com.
…
continue reading
Two friends map, filter and reduce streams of mostly development-related thoughts into audio form.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
You want to raise great kids. We want to help. (Parenting advice for every stage: birth—high school) This podcast was designed to be a resource for all things parenting. We plan to bring you great content and the advice of leading experts on topics like technology, faith, sexuality, pandemic parenting and toddler temper tantrums as we work toward helping our kids grow in their faith.
…
continue reading
A show in which we address various issues that may come up with the technological tools that we depend on in our work or daily lives and how we can overcome them before they overcome us! We also cover JavaScript applications and workflows, both front end and backend (Node.js, npm, MongoDB, to name a few). And we have started introducing Python related subject matter as well. Please visit the blog on our website to view transcripts and embeds of our podcast episodes. Support this podcast: htt ...
…
continue reading
Andrew Connell, through Voitanos®, his newsletter, and YouTube channel, helps you be the irreplaceable Microsoft 365 expert developer in your organization. This podcast includes exclusive podcast episodes as well as the audio from videos published in our YouTube channel and articles published on our site, delivered straight to your favorite podcasting app!
…
continue reading
We cover the intersection of software development and open source.
…
continue reading
Мужчина средних лет ворчит про вещи, которые ему вроде бы нравятся. Дочерний подкаст сайта https://usilenie.plus; там примерно то же самое, но выраженное через возмутительно длинные тексты. Патреон: https://patreon.com/usilenie Да, ваш клиент или поисковик скорее всего не переваривает плюсик в названии при поиске. Я никуда не буду его убирать. Это принципиальный момент.
…
continue reading
A group of software developers, mostly from western Canada, mostly in the Microsoft .NET space, and all west of someplace else get together to discuss topics that tickle their fancy.
…
continue reading
Dive into JavaScript and Web development stories with hosts John Papa, Ward Bell, Craig Shoemaker, and Dan Wahlin. Web Rush is a weekly podcast where we tackle the challenges facing Web developers today and invite expert guests on the show to share their experience solving concrete problems while building real Web applications. Listen for practical insights and honest talk about the topics you are facing today, with Web Rush. Sponsored by AG Grid and Nrwl.io
…
continue reading

1
Malicious npm codes, Nova Scotia cyberattack, ChatGPT refuses shutdown command
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19Malicious npm and VS Code packages stealing data Nova Scotia Power confirms ransomware attack Researchers claim ChatGPT o3 bypassed shutdown in controlled test Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ran…
…
continue reading

1
NPM Interconnections (US) – Episode 148: Don Dimitrievich | Nuveen
24:03
24:03
Play later
Play later
Lists
Like
Liked
24:03Don Dimitrievich, portfolio manager for Infrastructure Credit & Senior Managing Director for Nuveen, joins the NPM podcast this week to discuss how tariff risk and uncertainty around the Inflation Reduction Act's longevity has created an opportunity in the private credit sector across different renewable energy technologies. Later in the program, D…
…
continue reading

1
Windows startup failures, Victoria’s Secret cyberattack, stolen cookie threat
7:21
7:21
Play later
Play later
Lists
Like
Liked
7:21Windows 11 might fail to start after installing KB5058405, says Microsoft Victoria’s Secret website goes offline following cyberattack Billions of stolen cookies available, worrying security experts Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect b…
…
continue reading

1
SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2;
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
…
continue reading
Shamus McGillicuddy, VP of Research, Network Infrastructure and Operations, at Enterprise Management Associates (EMA) discusses hybrid multi-cloud network observability.By Enterprise Management Associates + APMdigest
…
continue reading

1
Microsoft updates Update, LexisNexis leak, cyber insurance premiums
7:58
7:58
Play later
Play later
Lists
Like
Liked
7:58Microsoft wants to update all the things LexisNexis breach impacts 364,000 people Cyber insurance premium volume expected to double Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operat…
…
continue reading

1
SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
…
continue reading

1
MathWorks confirms ransomware attack, Adidas has data breach, Dutch intelligence warns of cyberattack
6:32
6:32
Play later
Play later
Lists
Like
Liked
6:32MathWorks, Creator of MATLAB, Confirms Ransomware Attack Adidas warns of data breach after customer service provider hack Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to prote…
…
continue reading

1
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
…
continue reading
This episode of Ministry Monday is brought to you by Boston College Clough School of Theology and Ministry (CSTM). Boston College Clough School of Theology and Ministry (CSTM) is accepting applications for Courage to Preach: A Post-Master’s Certificate. Courage to Preach trains participants to read and interpret Scripture and use it as a foundation…
…
continue reading

1
SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
…
continue reading

1
CISA’s Commvault warning, updated Killnet returns, fake VPN malware
9:13
9:13
Play later
Play later
Lists
Like
Liked
9:13CISA warns Commvault clients of campaign targeting cloud applications Russian hacker group Killnet returns with slightly adjusted mandate Fake VPN and browser NSIS installers used to deliver Winos 4.0 malware Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to…
…
continue reading

1
Week in Review: Disabling Microsoft Defender, corrupted power inverters, bipartisan training bill
24:49
24:49
Play later
Play later
Lists
Like
Liked
24:49Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest George Finney, CISO, The University of Texas System – check out George’s new book plus all his other achievements at his website, WellAwareSecurity. Thanks to our show sponsor, Conveyor Still spending hours maintaining a massive sprea…
…
continue reading

1
Signal shutters Recall, Windows Server vulnerability, pathology lab breach
8:33
8:33
Play later
Play later
Lists
Like
Liked
8:33Signal adds Recall blocker Critical Windows Server 2025 dMSA vulnerability warning Pathology lab suffers data breach Huge thanks to our sponsor, Conveyor Still spending hours maintaining a massive spreadsheet of Q&A pairs or using RFP tools to answer security questionnaires? Conveyor’s AI doesn’t need hand-holding and gets you accurate answers ever…
…
continue reading

1
SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
…
continue reading

1
Kettering Health outage, Lumma disrupted, Opexus "major lapse"
7:18
7:18
Play later
Play later
Lists
Like
Liked
7:18Ransomware attack knocks out Kettering Health Lumma malware operation disrupted Federal agencies impacted by “major lapse” at Opexus Huge thanks to our sponsor, Conveyor Half-baked AI answers to security questionnaires are worse than no answer at all. Conveyor’s AI gets it right the first time—with market-leading accuracy rates and full citations f…
…
continue reading

1
SANS Stormcast Thursday, May 22nd 2025: Crypto Confidence Scams; Extension Mayhem for VS Code and Chrome
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive VIP memberships to withdraw the money. https://isc.sans.edu/diary/New%20Variant%20of%20Crypto%20Confidence%20Scam/31968 Malicious Chrome Extensions Malici…
…
continue reading

1
DOJ investigates Coinbase attack, Dutch cyber-espionage law passes, VanHelsing ransomeware leaked
6:43
6:43
Play later
Play later
Lists
Like
Liked
6:43US DOJ opens investigation into Coinbase's recent cyberattack Dutch government passes law to criminalize cyber-espionage Ransomware attack on food distributor spells more pain for UK supermarkets Huge thanks to our sponsor, Conveyor What if your sales team could answer security questions themselves—without blowing up your Slack or email every 10 mi…
…
continue reading

1
SANS Stormcast Wednesday, May 21st 2025: Researchers Scanning the Internet; Forgotten DNS Records; openpgp.js Vulneraiblity
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do offer lists of researchers and just added three new groups today https://isc.sans.edu/diary/Researchers%20Scanning%20the%20Intern…
…
continue reading

1
Legal Aid breached, patients at risk from cyberattacks, 23andMe buyer
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19UK’s Legal Aid Agency breached NHS patients put at risk from cyberattacks 23andMe has a buyer Huge thanks to our sponsor, Conveyor Ever spent an hour in a clunky portal questionnaire with UI from 1999 just to lose your work because it timed out? Conveyor’s got you. Our browser extension completes questionnaires in the most tedious portals for you b…
…
continue reading

1
SANS Stormcast Tuesday, May 20th 2025: AutoIT Code RAT; Fake Keepass Download; Procolored Printer Software Compromise
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960 RVTools compromise confirmed Robware.net, the site behind the popular tool RVTools now confirmed that it was compromi…
…
continue reading

1
UK retailer update, Microsoft Defender disabler, deepfakes target officials
8:10
8:10
Play later
Play later
Lists
Like
Liked
8:10Scattered Spider facilitates UK retail hacks and is moving to the U.S. Defendnot tool can disable Microsoft Defender FBI warns government officials about new waves of deepfakes Huge thanks to our sponsor, Conveyor Are you dealing with security questionnaire chaos this week? If so, get Conveyor’s AI to knock them out for you. Connect Conveyor to any…
…
continue reading

1
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
…
continue reading

1
Week in Review: Hackers pump stocks, Microsoft stops screenshots, AI encrypts cybersecurity
29:05
29:05
Play later
Play later
Lists
Like
Liked
29:05Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Nick Espinosa, host, The Deep Dive Radio Show. Here’s where you can find him: Daily Podcast on SoundCloud | YouTube | Forbes | Twitter/X | Facebook | BlueSky | Mastodon Thanks to our show sponsor, Vanta Do you know the status of your …
…
continue reading

1
Coinbase hackers bribe staff, Windows 11 hacked at Pwn2Own, Telegram purges black market group
8:08
8:08
Play later
Play later
Lists
Like
Liked
8:08Coinbase says hackers bribed staff to steal customer data and are demanding $20 million ransom Windows 11 and Red Hat Linux hacked on first day of Pwn2Own The Internet’s biggest-ever black market just shut down amid a Telegram purge Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We …
…
continue reading

1
SANS Stormcast Friday, May 16th: Increase in Sonicwall Scans; RVTools Compromised?; RountPress
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
…
continue reading

1
Attack on steel producer, EUVD online, CISA advisory overhaul
8:01
8:01
Play later
Play later
Lists
Like
Liked
8:01Steel producer disrupted by cyberattack European Vulnerability Database (EUVD) is online CISA pauses advisory overhaul Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in…
…
continue reading

1
SANS Stormcast Thursday, May 15th: Google Open Redirects; Adobe, Ivanti, and Samsung patches
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
…
continue reading

1
Radware clarifies patch, retailer data stolen, Alabama suffers cyberattack
8:49
8:49
Play later
Play later
Lists
Like
Liked
8:49Radware says recently WAF bypasses were patched in 2023 Marks & Spencer confirms data stolen in ransomware attack Alabama suffers cybersecurity event Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our G…
…
continue reading

1
SANS Stormcast Wednesday, May 14th: Microsoft Patch Tuesday; 0-Days patched for Ivanti Endpoint Manager and Fortinet Products
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.san…
…
continue reading

1
NPM Interconnections (US) – Episode 147: Greg Lavigne | Sidley Austin
35:20
35:20
Play later
Play later
Lists
Like
Liked
35:20Greg Lavigne, a partner in energy and infrastructure practice for Sidley Austin, joins the NPM podcast this week to discuss the ongoing tariff situation and its impact on developers, how the growth of private credit is supporting today’s clean energy pipeline and how the industry might get impacted by changes coming in the inflation reduction act. …
…
continue reading

1
GlobalX breach, Google settles lawsuits, UK software security guidelines
7:52
7:52
Play later
Play later
Lists
Like
Liked
7:52Global Crossing Airlines Group confirms cyberattack Google settles privacy lawsuits UK launches software security guidelines Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on po…
…
continue reading

1
SANS Stormcast Tuesday, May 12th: Apple Patches; Unipi Technologies Scans;
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking d…
…
continue reading
Growing up in the Catholic Church I was familiar with the poster of the liturgical calendar. You know the one: its circular design reflects the changing colors and seasons in the Church calendar. I always found this poster to be fascinating, even as a very young person: What did it mean? How did the The Church decide these things? Why do the colors…
…
continue reading

1
Japan finance hacks, Pearson suffers cyberattack, Teams blocks screen captures
8:28
8:28
Play later
Play later
Lists
Like
Liked
8:28Hackers hijack Japanese financial accounts to conduct billions in trades Education giant Pearson hit by cyberattack exposing customer data Microsoft Teams will soon block screen capture during meetings Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility …
…
continue reading

1
SANS Stormcast Monday, May 11th: Steganography Challenge; End-of-Life Routers; ASUS Driverhub; RV-Tools SEO Poisoning
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/ FBI Warns of End-of-life routers The FBI is tracking larger…
…
continue reading

1
Week in Review: Agriculture ransomware increase, Congress challenges CISA cuts, Disney’s slacker hacker
29:37
29:37
Play later
Play later
Lists
Like
Liked
29:37Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Dan Holden, CISO, BigCommerce Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. Threa…
…
continue reading

1
Cisco IOS XE vulnerability, Pentagon CIO nomination, new SonicWall vulnerability
8:45
8:45
Play later
Play later
Lists
Like
Liked
8:45Cisco patches a level 10 vulnerability in IOS XE President nominates former Unilever CISO to be Pentagon CIO SonicWall patches a new zero-day vulnerability Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and …
…
continue reading

1
SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch
4:57
4:57
Play later
Play later
Lists
Like
Liked
4:57No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932 SAMSUNG magicINFO 9 Server Flaw Still exploitable The SAMSUNG magicINFO 9 Serv…
…
continue reading

1
Europol shuts down DDoS-for-hire services, CrowdStrike lays off 500 workers, GOV.UK embraces passkeys
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28Europol shuts down six DDoS-for-hire services used in global attacks CrowdStrike says it will lay off 500 workers Passkeys set to protect GOV.UK accounts against cyber-attacks Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from z…
…
continue reading

1
SANS Stormcast Thursday, May 8th: Modular Malware; Sysaid Vuln; Cisco Wireless Controller Patch; Unifi Protect Camera Patch
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%22Modular%22%20Malware/31928 Sysaid XXE Vulnerabilities IT Service Management Software Sysaid patched a number of XXE vulner…
…
continue reading

1
Congress challenges CISA cuts, Texas school breached, NSO pays WhatsApp
8:32
8:32
Play later
Play later
Lists
Like
Liked
8:32Congress challenges Noem over proposed CISA cuts Texas school district breach impacts over 47,000 people NSO Group to pay WhatsApp $167 million in damages Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and r…
…
continue reading

1
SANS Stormcast Wednesday, May 7th: Infostealer with Webserver; Android Update; CISA Warning
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that, in addition to implementing typical infostealer functionality, includes a web server suitable to create local phishing sites. https://isc.sans.edu/diary/Python%20InfoStealer%20with%20Embedded%20Phishing%20Webserver/31924 Android Update Fixes Freetype 0…
…
continue reading

1
NPM Interconnections (US) – Episode 147: Data Center Developers & Speed to Power | PANEL
1:05:43
1:05:43
Play later
Play later
Lists
Like
Liked
1:05:43This episode of the NPM Podcast is the full panel discussion titled “Data Centers: Powering the Next Generation of Renewable Demand” held at NPM’s recent US Development & Finance Forum 2025 in NYC. Not yet an NPM subscriber? For more comprehensive coverage of data centers & power year-round, go to www.newprojectmedia.com to learn more. The panel in…
…
continue reading

1
Signal clones, easyjson warning, UK retail hacker
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37Signal clone gets hacked Sounding the alarm on easyjson Ransomware group takes credit for UK retail attacks Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default…
…
continue reading

1
SANS Stormcast Tuesday, May 6th: Mirai Exploiting Samsung magicInfo 9; Kali Signing Key Lost;
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung s MagicInfo 9 CMS, was patched last August but attracted new attention last week after being mostly ignored so far. https://isc.sans.edu/diary/Mirai+No…
…
continue reading

1
Microsoft Authenticator passkeys, StealC malware upgraded, CISA budget slashed
8:02
8:02
Play later
Play later
Lists
Like
Liked
8:02Microsoft ends Authenticator password autofill in favor of Edge StealC malware enhanced with stealth upgrades and data theft White House proposes cutting $491M from CISA budget Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from …
…
continue reading

1
SANS Stormcast Monday, May 5th: Steganography Challenge; Microsoft Makes Passkeys Default and Moves Away from Authenticator as Password Manager; Magento Components Backdoored.
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57Steganography Challenge Didier published a fun steganography challenge. A solution will be offered on Saturday. https://isc.sans.edu/diary/Steganography+Challenge/31910 Microsoft Makes Passkeys Default Authentication Method Microsoft is now encouraging new users to use Passkeys as the default and only login method, further moving away from password…
…
continue reading

1
Week in Review: Cybersecurity CEO busted, Cloudflare’s DDoS increase, FBI’s help request
31:36
31:36
Play later
Play later
Lists
Like
Liked
31:36Link to episode page This week’s Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest DJ Schleen, Head of Security, Boats Group Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ranso…
…
continue reading

1
UK’s Co-op cyberattack, LabHost domains released, NSO WhatsApp damages
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55UK retailer Co-Op suffers cyberattack FBI shares list of 42,000 LabHost phishing domains NSO group looking at hefty damages in WhatsApp case Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. Thr…
…
continue reading