Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Polymorphic Podcasts

show episodes
 
Welcome to NADDPOD! Join Dungeon Master Brian Murphy as he leads players Emily Axford, Caldwell Tanner and Jake Hurwitz on a comedic, actual-play adventure through the realms of Bahumia and Beyond. The show also features a score composed and performed by Emily Axford. This team has created a variety of D&D campaigns, as well as numerous other series such as DUNGEON COURT and 8-BIT BOOK CLUB. They also occasionally hit the road and roll dice live on stage.
  continue reading
 
Artwork

1
SciPod

SciPod

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Listen to the story behind the science. SciPod boasts a rich reputation of bringing a new, authentic and easy communication style to lovers of science and technology. Best of all, you can listen for free! so what are you waiting for, click play and start enjoying. www.scipod.global
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Prototype and See is a podcast produced by HLH Rapid, hosted by Co-founder and Director James Murphy. Hear from designers, engineers and veterans in some of the world's most innovative companies as they share their stories of success and failures and the ups and downs of bringing new products to market.
  continue reading
 
Artwork

1
Architect Tips

Jeffrey Palermo

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Architect Tips by Clear Measure Created to help .NET development teams move fast, deliver quality, and run their systems with confidence. This series is led by Chief Architect Jeffrey Palermo as well as other Clear Measure team members, publishing short clips of helpful tips to empower you to achieve more! Visit www.clearmeasure.com to view other content and learn more.
  continue reading
 
Artwork
 
Listen to a Board Certified Dermatologist with over 25 years of experience give expert information about all Dermatology topics both medical and cosmetic. We get to the important points fast and you can use what you learn to help your skin issues or to ask the right questions at your next dermatology appointment.
  continue reading
 
Artwork

1
Crimes and Cantrips

Gwen Malmquist, Miri Baker, Beatrix Ryle, Fennix

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Crimes and Cantrips is a narrative-focused TTRPG actual play audio podcast. We roll dice to tell stories about queer characters making ✨choices✨. This podcast is organized as a series of one-shots and mini-campaigns; different campaigns may feature different cast members. Our public episodes are free, and bonus content such as prologues, outtakes, GM notes, and cast discussions are featured on our Patreon.
  continue reading
 
People, Product and Crypto. Wild User Interviews is about open-sourcing open-ended conversations with the creative forces shaping up the decentralised world. In the wild, our guests range from Product Designers to Blockchain Architects, and include topics such as Philosophy and Proof-of-Stake. The common thread being our focus on the human side as he try to deconstruct the frameworks and processes to enable listeners to become the better version of themselves while venturing into the Metaverse.
  continue reading
 
Loading …
show series
 
The way molecules arrange themselves into crystals can affect the stability, safety, and effectiveness of medicines and advanced materials. Dr Ivo Rietveld at the University of Rouen Normandy and his collaborators are developing new benchmark data that help scientists to accurately predict the stability of crystal structures of molecules, helping t…
  continue reading
 
From hosting OutsideXbox and the Mom Can’t Cook! podcast, to winning awards for his horror writing, Andy Farrant is a renaissance man of geekery. He tells tales of how his parents used to bribe him with Red Dwarf videos, and the lines of Dwarf dialogue that live in his head. We also chat about how the show has aged, and explore the idea of series 1…
  continue reading
 
Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnerability A user cloning a git repository may be tricked into executing arbitrary code via…
  continue reading
 
SANS Stormcast Thursday, October 9th, 2025: Polymorphic Python; ssh ProxyCommand Vuln; Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnera…
  continue reading
 
X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
  continue reading
 
It’s time to put a bow on the first six series of Red Dwarf. So we sit down with Gemma Arrowsmith to discuss our favourite episodes from across the classic Grant-Naylor era. It’s a great big celebration of just how brilliant the show and its people are. Then Fergus pits John against Tom Neenan and Guy Kelly in a Red Dwarf quiz that’s alright for yo…
  continue reading
 
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are sup…
  continue reading
 
How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
  continue reading
 
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like "dd" do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%2…
  continue reading
 
Penelope J. Corfield’s groundbreaking book, entitled Time-Space: We Are All in It Together, presents a multidimensional framework for understanding how humans exist within the cosmic continuum of time and space. Corfield agrees with the modern scientific consensus post-Einstein, where time is understood not as a separate dimension but as being inte…
  continue reading
 
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
  continue reading
 
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters…
  continue reading
 
Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
  continue reading
 
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vul…
  continue reading
 
Research from Professor Dr Susanne Maria Maurer, former chair of social pedagogy at the Philipps-Universität Marburg, reveals how social work institutions and practices serve as repositories of knowledge about historical struggles over class, gender, and race. She conceptualizes social work as both a "memory of conflicts" and an "open archive" that…
  continue reading
 
Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
  continue reading
 
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysi…
  continue reading
 
Soil is one of the most important resources on the planet. It grows our food, regulates water, supports ecosystems, and stores vast amounts of carbon. But it’s also incredibly complex, and surprisingly poorly understood. In Australia, Prof. Alex McBratney of the University of Sydney and his colleagues are changing that. By working with the Soil Sec…
  continue reading
 
Soil sits at the heart of nearly every major challenge humanity faces, from food, water and energy security to climate change, biodiversity loss, human health, and the delivery of vital ecosystem services. But, soil itself is increasingly under threat. As these pressures intensify, soil security has become a global priority in its own right. Yet de…
  continue reading
 
The Triplets confront the Abbot of St. Markovia and attempt to stop a strange wedding ritual! Jens tests his blade, Nyack bags a big one and Onyx gets a god complex as the Trinyvale X Strahd crossover continues! Subscribe to NaddPod on Patreon! - Patreon.com/Naddpod CREDITS Editing by Brian Murphy Production and Sound Design by Daniel Ramos (@Schub…
  continue reading
 
Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
  continue reading
 
To close out the Grant-Naylor era of Red Dwarf, the genius Gemma Arrowsmith returns. We explore why these glory days came to an end, and ponder if the show’s creators could ever return. Gemma will be back in a near-future episode to give an overview of the first six series of Britain’s best loved sci-fi sitcom – because this week, we’ve got more th…
  continue reading
 
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu…
  continue reading
 
When we think about science, we often imagine a universal language of knowledge in the form of a shared code of numbers, graphs, and precise words that transcend borders. But what happens when the language of science is not the language of the scientist? This is the challenge explored in a recent study by a group of publication professionals from t…
  continue reading
 
webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
  continue reading
 
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability. webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans…
  continue reading
 
In the 20th century, antibiotics transformed medicine. Infections that once killed millions could be cured with a pill or injection. Surgeries became safer, cancer treatments more effective, and advanced medical interventions, such as organ transplants, became possible, all because doctors could rely on these drugs to control infections. Unfortunat…
  continue reading
 
What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
  continue reading
 
SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln; What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu webs…
  continue reading
 
Across North America, the phrase “fuel management” is used almost as often as “climate change” when people talk about wildfires. The idea is simple: forests burn because they are full of fuel, including trees, shrubs, branches, and dried leaves. If you remove some of that material, you make it harder for a wildfire to spread. Provincial governments…
  continue reading
 
Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/32384 AWS Outages AWS has had issues most of the day on Monday, affecting numerous services. http…
  continue reading
 
SANS Stormcast Tuesday, October 21st, 2025: Syscall() Obfuscation; AWS down; Beijing Time Attack Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/…
  continue reading
 
TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Videos%20Promoting%20Malware%20Installation/32380 Google Ads Advertise Malware Targeting MacOS Developers Hun…
  continue reading
 
SANS Stormcast Monday, October 20th, 2025: Malicious Tiktok; More Google Ad Problems; Satellite Insecurity TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Vi…
  continue reading
 
Raise a glass of chilled Sancerre for the return of Guy Kelly! We discuss catchphrases, competence and the swagger of series 6 – what does success mean for an underdog show? Obviously there’s some book chat. And Guy shares his brilliant theory about the one change that would have made Lister and Rimmer grow into completely different, happier adults…
  continue reading
 
New DShield Support Slack Workspace Due to an error on Salesforce s side, we had to create a new Slack Workspace for DShield support. https://isc.sans.edu/diary/New%20DShield%20Support%20Slack/32376 Attackers Exploiting Recently Patched Cisco SNMP Flaw (CVE-2025-20352) Trend Micro published details explaining how attackers took advantage of a recen…
  continue reading
 
SANS Stormcast Friday, October 17th, 2025: New Slack Workspace; Cisco SNMP Exploited; BIOS Backdoor; @sans_edu reseach: Active Defense New DShield Support Slack Workspace Due to an error on Salesforce's side, we had to create a new Slack Workspace for DShield support. https://isc.sans.edu/diary/New%20DShield%20Support%20Slack/32376 Attackers Exploi…
  continue reading
 
The Lore Lords (and Jake) invite you to an evening of Theatre as they swing Werewolf Woods courtesy of the ultimate Lore Lord, R.L. Stein. Join us! For the moon is full and so are our hearts. CREDITS: Sound Mixing and Editing by Trevor Lyon 8-Bit Book Club Theme by Emily Axford See Privacy Policy at https://art19.com/privacy and California Privacy …
  continue reading
 
Clipboard Image Stealer Xavier presents an infostealer in Python that steals images from the clipboard. https://isc.sans.edu/diary/Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer/32372 F5 Compromise F5 announced a wide-ranging compromise today. Source code and information about unpatched vulnerabilities were stolen. https://my.f5.co…
  continue reading
 
SANS Stormcast Thursday, October 16th, 2025: Clipboard Image Stealer; F5 Compromise; Adobe Updates; SAP Patchday Clipboard Image Stealer Xavier presents an infostealer in Python that steals images from the clipboard. https://isc.sans.edu/diary/Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer/32372 F5 Compromise F5 announced a wide-ra…
  continue reading
 
Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivanti Advisory Ivanti released an advisory with some mitigation steps users can take until the recently m…
  continue reading
 
SANS Stormcast Wednesday, October 15th, 2025: Microsoft Patchday; Ivanti Advisory; Fortinet Patches Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivanti…
  continue reading
 
When we think of spies and their activities, we imagine trench coats, hidden cameras, and tense exchanges in safehouses. Hollywood has given us the daring adventures of James Bond and Jason Bourne, along with the clever trickery of films such as Argo. But behind the cinematic flair lies a quieter, more subtle reality: espionage often depends less o…
  continue reading
 
Scans for ESAFENET CDG V5 We do see some increase in scans for the Chinese secure document management system, ESAFENET. https://isc.sans.edu/diary/Heads%20Up%3A%20Scans%20for%20ESAFENET%20CDG%20V5%20/32364 Investigating targeted payroll pirate attacks affecting US universities Microsoft wrote about how payroll pirates redirect employee paychecks vi…
  continue reading
 
SANS Stormcast Tuesday, October 14th, 2025: ESAFENET Scans; Payroll Priates; MSFT Edge IE Mode Scans for ESAFENET CDG V5 We do see some increase in scans for the Chinese secure document management system, ESAFENET. https://isc.sans.edu/diary/Heads%20Up%3A%20Scans%20for%20ESAFENET%20CDG%20V5%20/32364 Investigating targeted "payroll pirate" attacks a…
  continue reading
 
New Oracle E-Business Suite Patches Oracle released one more patch for the e-business suite. Oracle does not state if it is already exploited, but the timing of the patch suggests that it should be expedited. https://www.oracle.com/security-alerts/alert-cve-2025-61884.html Widespread Sonicwall SSLVPN Compromise Huntress Labs observed the widespread…
  continue reading
 
SANS Stormcast Monday, October 13th, 2025: More Oracle Patches; Sonicwall Compromisses; Unpatched Gladinet; 7-Zip Patches New Oracle E-Business Suite Patches Oracle released one more patch for the e-business suite. Oracle does not state if it is already exploited, but the timing of the patch suggests that it should be expedited. https://www.oracle.…
  continue reading
 
The Triplets mount a rescue mission inside the Abbey of St. Markovia! Onyx makes a call, Nyack nets a net and Jens reignites his passion as the Trinyvale X Strahd crossover continues! Subscribe to NaddPod on Patreon! - Patreon.com/Naddpod CREDITS Editing by Brian Murphy Production and Sound Design by Daniel Ramos (@Schubirds on IG) Logo Design by C…
  continue reading
 
Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to…
  continue reading
 
SANS Stormcast Friday, October 10th, 2025: RedTail Defenses; SonicWall Breach; Crowdstrike "Issues"; Ivanti 0-days; Mapping Agentic Attack Surface (@sans_edu paper) https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Defending against attacks like RedTail is more then blocking IoCs, but instead…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play