Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

PowerShell Podcasts

show episodes
 
The PowerShell Podcast is a weekly show about building your career with PowerShell. Each episode features the tips, tech, and modules that make PowerShell the premier automation and scripting tool for IT professionals. Join us as we interview PowerShell experts to discover what makes PowerShell and its community so amazing and awesome.
  continue reading
 
Sync Up is your one-stop shop for all things OneDrive. Join hosts, Stephen Rice and Arvind Mishra, as they shed light on how OneDrive connects you to all of your files in Microsoft and enables you to share and work together from anywhere, and any device! Hear from experts behind the design and development of OneDrive, as well as customers and Microsoft MVPs! Each episode will give you news and announcements, tips and best practices for your OneDrive experience, and some fun and humor!
  continue reading
 
Artwork

1
Talos Takes

Cisco Talos

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Every fortnight, host Hazel Burton brings on a new guest from Talos or the broader Cisco Security world to break down a complicated security topic. We cover everything from breaking news to attacker trends and emerging threats.
  continue reading
 
Inside IT Automation is a podcast gathering IT professionals who are passionate about automation. Every episode consists of a friendly conversation with a guest who is generally an IT Automation professional. Check our episodes to learn more.
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork
 
Welcome to Inside ScriptRunner, the podcast that dives deep into the ideas, challenges, and innovations in IT operations, Microsoft 365 and ITSM. Each episode unpacks insights from ScriptRunner’s blog articles, exploring how IT teams can overcome governance gaps, scale automation securely, and ensure compliance.
  continue reading
 
Artwork

1
SnipCast

TechSnips

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
TechSnips is an IT career development platform that provides free learning content (not training!) to people in information technology (IT). We provide short, 1-10 minute screencasts or snips on a range of technology-related topics like cloud computing, programming, system administration and a whole lot more.
  continue reading
 
Join Father Robert Ballecer and Lou Maresca on Coding 101, a weekly instructional, project-oriented programming show with appeal for beginning to intermediate programmers. Using a combination of classroom-style teaching, guest programmers, and special interest segments, Coding 101 offers beginner, intermediate, and "applied" programming topics within several interchangeable modules. Learn programming languages such as Java, C++, Visual Basic, PHP, Perl, and more! Although the show is no long ...
  continue reading
 
Join Father Robert Ballecer and Lou Maresca on Coding 101, a weekly instructional, project-oriented programming show with appeal for beginning to intermediate programmers. Using a combination of classroom-style teaching, guest programmers, and special interest segments, Coding 101 offers beginner, intermediate, and "applied" programming topics within several interchangeable modules. Learn programming languages such as Java, C++, Visual Basic, PHP, Perl, and more! Although the show is no long ...
  continue reading
 
Mike Walton reveals his knowledge and experience being a Systems Administrator. I want to help others get into the SysAdmin field and improve their knowledge and career. Advance your career as a Systems Administrator and enjoy a better life.
  continue reading
 
Artwork

1
VMware Podcasts

VMware Podcasts

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
VMware, a global leader in cloud infrastructure and digital workspace technology, accelerates digital transformation by enabling unprecedented freedom and flexibility in how our customers build and evolve IT environments. With VMware solutions, organizations are improving business agility by modernizing data centers and integrating public clouds, driving innovation with modern apps, creating exceptional experiences by empowering the digital workspace, and safeguarding customer trust by trans ...
  continue reading
 
Loading …
show series
 
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/diary/Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%5BGuest%20…
  continue reading
 
SANS Stormcast Friday, November 7th, 2025: PowerShell Log Correlation; RondoBox Disected; Google Chrome and Cisco Patches Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/d…
  continue reading
 
https://mcdn.podbean.com/mf/web/6f2n4xfczgqqmymc/The_PowerShell_Podcast_episode_199_Josh_Kingbjjuf.mp3 Andrew's longtime friend, mentor, and PowerShell legend Josh King joins The PowerShell Podcast to celebrate the tenth anniversary and version 1.0 release of his popular open-source module BurntToast, which powers customizable Windows toast notific…
  continue reading
 
Andrew's longtime friend, mentor, and PowerShell legend Josh King joins The PowerShell Podcast to celebrate the tenth anniversary and version 1.0 release of his popular open-source module BurntToast, which powers customizable Windows toast notifications. Josh shares the story behind the project’s evolution, the challenges of maintaining an open-sou…
  continue reading
 
Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
  continue reading
 
SANS Stormcast Thursday, November 6th, 2025: Domain API Update; Teams Spoofing; VShell Report Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing V…
  continue reading
 
Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
  continue reading
 
Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
  continue reading
 
The future of updating Windows is here! Richard talks to Aria Hanson about Windows Autopatch, the consolidation of Microsoft's various update mechanisms to keep your managed Windows devices current. Aria discusses the deprecation of Windows Server Update Services (WSUS) and the move to always-on cloud updates. The conversation turns to the various …
  continue reading
 
XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Num…
  continue reading
 
SANS Stormcast Tuesday, November 4th, 2025: XWiki SolrSearch Exploits and Rapper Feud; AMD Zen 5 RDSEED Bug; More Malicious Open VSX Extensions XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.ed…
  continue reading
 
Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https://isc.sans.edu/diary/Scans%20for%20Port%208530%208531%20%28TCP%29.%20Likely%20related%20to%20WSUS%20Vulnerability%20C…
  continue reading
 
SANS Stormcast Monday, November 3rd, 2025: Port 8530/8531 Scans; BADCANDY Webshells; Open VSX Security Improvements Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https:/…
  continue reading
 
X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
  continue reading
 
SANS Stormcast Friday, October 31st, 2025: Bug Bounty Headers; Exchange hardening; MOVEIt vulnerability X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are sup…
  continue reading
 
How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
  continue reading
 
SANS Stormcast Thursday, October 30th, 2025: Memory Only Filesystems Forensics; Azure Outage; docker-compose patch How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like "dd" do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%2…
  continue reading
 
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
  continue reading
 
SANS Stormcast Wednesday, October 29th, 2025: Invisible Subject Character Phishing; Tomcat PUT Vuln; BIND9 Spoofing Vuln PoC Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters…
  continue reading
 
How can the new AI tools help DBAs? Richard chats with Grant Fritchey about his experiences using various types of LLMs to help with his work as a DBA. Grant discusses having an LLM open as a side window to pass questions by, such as ideas for tuning, query optimization, scripts, and so on. Not all LLMs are the same - it's worth experimenting with …
  continue reading
 
Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
  continue reading
 
SANS Stormcast Tuesday, October 28th, 2025: Bytes over DNS; Unifi Access Vuln; OpenAI Atlas Prompt Injection Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vul…
  continue reading
 
https://mcdn.podbean.com/mf/web/mu6c5xdcqg92iprk/The_PowerShell_Podcast_episode_198_Hailey_Phillips7bgxm.mp3 Microsoft MVP Hailey Phillips joins The PowerShell Podcast to share her journey from systems engineer to automation innovator. She talks about IntuneStack, her new PowerShell-driven CI/CD project for Intune environments, and how it bridges t…
  continue reading
 
Microsoft MVP Hailey Phillips joins The PowerShell Podcast to share her journey from systems engineer to automation innovator. She talks about IntuneStack, her new PowerShell-driven CI/CD project for Intune environments, and how it bridges the gap between systems engineering and DevOps. Hailey also reflects on her path to becoming an MVP, her exper…
  continue reading
 
Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
  continue reading
 
SANS Stormcast Monday, October 27th, 2025: Bilingual Phishing; Kaitai Struct WebIDE Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysi…
  continue reading
 
On this episode of Talos Takes, Hazel welcomes Cisco Duo experts Steven Leung and Tess Mishoe to bust the most common myths around passwordless security and multi-factor authentication (MFA). Discover why not all MFA is created equal, why passwordless doesn't mean less security, and the most seamless way to adopt passwordless solutions. Plus, learn…
  continue reading
 
Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
  continue reading
 
SANS Stormcast Friday, October 24th, 2025: Android Infostealer; SessionReaper Exploited; BIND/unbound DNS Spoofing fix; WSUS Exploit Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu…
  continue reading
 
Your most experienced PowerShell engineer just gave notice. During the handover meetings, you realize what you've suspected for a while now: the critical PowerShell automation running your environment lives almost entirely in his head. Sure, the scripts execute daily processes, but understanding why they work the way they do, what they actually dep…
  continue reading
 
webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
  continue reading
 
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability. webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans…
  continue reading
 
What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
  continue reading
 
How do you become a cybersecurity expert? While at Cybersecurity Intersection in Orlando, Richard chatted with Paula Januszkiewicz about her career in cybersecurity. Paula talks about insatiable curiosity to understand how things work the way they do - why an exploit happens and following the twists and turns that lead to root cause and permanent s…
  continue reading
 
SANS Stormcast Wednesday, October 22nd, 2025: NTP Pool; Xubuntu Compromise; Squid Vulnerability; Lanscope Vuln; What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu webs…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play