Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Research Excellence Framework Podcasts

show episodes
 
On this channel are ACSI’s four podcasts: Sharpening Kingdom Leaders, with President & CEO Dr. Larry Taylor. Grafted Together, with Chief Ministry Officer Jerry Nelson. Student Leadership & Learning, with SLL Director Emily Pigott. The Flourishing Journey, with Director of Leadership Programs Dr. Edward Bunn. ACSI’s podcasts aim to equip Christian school educators and strengthen you in your calling to impact the next generation for Christ. On a weekly basis, you can hear interviews, stories, ...
  continue reading
 
Dr. Su Yeong Kim is a thought leader and recognized scholar researching child development in immigrant families with a focus on cultural, familial, and linguistic influences. She also serves as Professor of Human Development and Family Sciences at the University of Texas at Austin and as the Editor for the Journal of Research on Adolescence. Previously, she has held the position of editor for Cultural Diversity and Ethnic Minority Psychology, and Associate Editor for Developmental Psychology ...
  continue reading
 
This is a weekly podcast focused on developer productivity and the teams and leaders dedicated to improving it. Topics include in-depth interviews with Platform and DevEx teams, as well as the latest research and approaches on measuring developer productivity. The EE podcast is hosted by Abi Noda, the founder and CEO of DX (getdx.com) and published researcher focused on developing measurement methods to help organizations improve developer experience and productivity.
  continue reading
 
Artwork

1
Department of Statistics

Oxford University

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Department of Statistics at Oxford is a world leader in research including computational statistics and statistical methodology, applied probability, bioinformatics and mathematical genetics. In the 2014 Research Excellence Framework (REF), Oxford's Mathematical Sciences submission was ranked overall best in the UK. This is an exciting time for the Department. We have now moved into our new home on St Giles and we are currently settling in. The new building provides improved lecture and ...
  continue reading
 
Artwork

4
King's College London

King's College London

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
King's College London is one of the top 10 UK universities in the world (QS World University Rankings, 2018/19) and among the oldest in England. King's has more than 31,000 students (including more than 12,800 postgraduates) from some 150 countries worldwide, and some 8,500 staff. King's has an outstanding reputation for world-class teaching and cutting-edge research. In the 2014 Research Excellence Framework (REF), eighty-four per cent of research at King’s was deemed ‘world-leading’ or ‘in ...
  continue reading
 
Loading …
show series
 
View the Show Notes Page for This Episode Become a Member to Receive Exclusive Content Sign Up to Receive Peter’s Weekly Newsletter In this special episode of The Drive, Peter addresses the recent headlines linking acetaminophen (Tylenol) use during pregnancy to autism in exposed children. Recognizing the confusion these claims have sparked among p…
  continue reading
 
Oracle E-Business Suite 0-Day �CVE-2025-61882 Last week, the Cl0p ransomware gang sent messages to many businesses stating that an Oracle E-Business Suite vulnerability was used to exfiltrate data. Initially, Oracle believed the root cause to be a vulnerability patched in June, but now Oracle released a patch for a new vulnerability. https://www.or…
  continue reading
 
Hear about the 2025 Public Policy & Advocacy Summit that just wrapped up in D.C., get to know ACSI's new Board Chair, Elisa Carlson, and enjoy a spotlight on an ACSI school seeing a revival in its student body. For more on ACSI accreditation, visit acsi.org/accreditation.By ACSI
  continue reading
 
More .well-known scans Attackers are using API documentation automatically published in the .well-known directory for reconnaissance. https://isc.sans.edu/diary/More%20.well-known%20Scans/32340 RedHat Patches Openshift AI Services A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, fo…
  continue reading
 
Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/…
  continue reading
 
Sometimes you don t even need to log in Applications using simple, predictable cookies to verify a user s identity are still exploited, and relatively recent vulnerabilities are still due to this very basic mistake. https://isc.sans.edu/diary/%22user%3Dadmin%22.%20Sometimes%20you%20don%27t%20even%20need%20to%20log%20in./32334 Western Digital My Clo…
  continue reading
 
Apple Patches Apple released patches for iOS, macOS, and visionOS, fixing a single font parsing vulnerability https://isc.sans.edu/diary/Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400/32330 Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400). Our honeypots detected an increase in scans for a Palo Alto Global Prot…
  continue reading
 
In this episode of Ask Dr. Su Yeong Kim, Professor Su Yeong Kim from the University of Texas at Austin shares essential guidance for students evaluating PhD program offers. Drawing on her extensive experience in graduate education and research, she highlights the three most critical factors to consider: funding, location, and culture. Dr. Su Yeong …
  continue reading
 
View the Show Notes Page for This Episode Become a Member to Receive Exclusive Content Sign Up to Receive Peter’s Weekly Newsletter Joe Liemandt is a software entrepreneur turned education reformer who left Stanford in 1989 to found Trilogy, a highly profitable private software company, before pivoting to transforming K-12 learning. In this episode…
  continue reading
 
Converting Timestamps in .bash_history Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This new tool converts these timestamps into a more readable format. https://isc.sans.edu/diary/New%20tool%3A%20convert-ts-bash-history.py/32324 Cisco ASA/FRD Compromises Ex…
  continue reading
 
Billy Sparacio brings nearly 30 years of experience in high school athletics, and he uses sports as a platform to mold young men and women for life beyond the game. Learn more about Spiritual Formation Network meetings: https://www.acsi.org/professional-development/connect-with-networking-groups The Grafted Together Podcast examines how biblical wo…
  continue reading
 
CEO Abi Noda is joined by DX CTO Laura Tacho to discuss the evolving role of Platform and DevProd teams in the AI era. Together, they unpack how AI is reshaping platform responsibilities, from evaluation and rollout to measurement, tool standardization, and guardrails. They explore why fundamentals like documentation and feedback loops matter more …
  continue reading
 
Webshells Hiding in .well-known Places Our honeypots registered an increase in scans for URLs in the .well-known directory, which appears to be looking for webshells. https://isc.sans.edu/diary/Webshells%20Hiding%20in%20.well-known%20Places/32320 Cisco Patches Critical Exploited Vulnerabilities Cisco released updates addressing already-exploited vu…
  continue reading
 
Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send credentials as part of the URL. https://isc.sans.edu/diary/Exploit%20Attempts%20Against%20Older%20Hikvision%20Camera%20Vulnerability/323…
  continue reading
 
Distracting the Analyst for Fun and Profit Our undergraduate intern, Tyler House analyzed what may have been a small DoS attack that was likely more meant to distract than to actually cause a denial of service https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Distracting%20the%20Analyst%20for%20Fun%20and%20Profit/32308 GitHub s plan for a more secur…
  continue reading
 
CISA Reports Ivanti EPMM Exploit Sightings Two different organizations submitted backdoors to CISA, which are believed to have been installed using Ivanti vulnerabilities patched in May. https://www.cisa.gov/news-events/analysis-reports/ar25-261a Lastpass Observes Impersonation on GitHub Lastpass noted a number of companies being impersonated via f…
  continue reading
 
View the Show Notes Page for This Episode Become a Member to Receive Exclusive Content Sign Up to Receive Peter’s Weekly Newsletter In this special episode of The Drive, Peter hosts a strength and conditioning roundtable with three experts in the field—Gabrielle Lyon, Jeff Cavaliere, and Mike Boyle. Together they explore why maintaining muscle mass…
  continue reading
 
Help Wanted: What are these odd requests about? An odd request is hitting a number of our honeypots with a somewhat unusual HTTP request header. Please let me know if you no what the request is about. https://isc.sans.edu/forums/diary/Help+Wanted+What+are+these+odd+reuqests+about/32302/ Forta GoAnywhere MFT Vulnerability Forta s GoAnywhere MFT prod…
  continue reading
 
In Episode 2 of Ask Dr. Su Yeong Kim, Professor Su Yeong Kim shares practical insights on how to craft a strong PhD application. She explains what faculty value most research experience that aligns with advisors, solid performance in statistics and methods courses, compelling statements of purpose, and recommendation letters that highlight resilien…
  continue reading
 
Exploring Uploads in a Dshield Honeypot Environment This guest diary by one of our SANS.edu undergraduate interns shows how to analyze files uploaded to Cowrie https://isc.sans.edu/diary/Exploring%20Uploads%20in%20a%20Dshield%20Honeypot%20Environment%20%5BGuest%20Diary%5D/32296 Sonicwall Breach SonicWall MySonicWall accounts were breached via crede…
  continue reading
 
CTRL-Z DLL Hooking Attackers may use a simple reload trick to overwrite breakpoints left by analysts to reverse malicious binaries. https://isc.sans.edu/diary/CTRL-Z%20DLL%20Hooking/32294 Global Admin in every Entra ID tenant via Actor tokens As part of September s patch Tuesday, Microsoft patched CVE-2025-55241. The discoverer of the vulnerability…
  continue reading
 
Why You Need Phishing-Resistant Authentication NOW. The recent compromise of a number of high-profile npmjs.com accounts has yet again shown how dangerous a simple phishing email can be. https://isc.sans.edu/diary/Why%20You%20Need%20Phishing%20Resistant%20Authentication%20NOW./32290 S1ngularity/nx Attackers Strike Again A second wave of attacks has…
  continue reading
 
Apple Updates Apple released major updates for all of its operating systems. In addition to new features, these updates patch 33 different vulnerabilities. https://isc.sans.edu/diary/Apple%20Updates%20Everything%20-%20iOS%20macOS%2026%20Edition/32286 Microsoft End of Life October 14th, support for Windows 10, Exchange 2016, and Exchange 2019 will e…
  continue reading
 
In the first episode of Ask Dr. Su Yeong Kim, Professor Su Yeong Kim shares insights from two decades of research and editorial leadership. With over 170 publications and experience as editor of leading journals, she guides scholars on crafting strong titles, research designs and navigating timelines to succeed in competitive academic publishing.…
  continue reading
 
View the Show Notes Page for This Episode Become a Member to Receive Exclusive Content Sign Up to Receive Peter’s Weekly Newsletter In this “Ask Me Anything” (AMA) episode, Peter explores how to determine the right diet for yourself rather than searching for a universal “best” diet. He begins by laying out five non-negotiable criteria that any sust…
  continue reading
 
Web Searches For Archives Didier observed additional file types being searched for as attackers continue to focus on archive files as they spider web pages https://isc.sans.edu/diary/Web%20Searches%20For%20Archives/32282 FBI Flash Alert: Salesforce Attacks The FBI is alerting users of Salesforce of two different threat actors targeting Salesforce. …
  continue reading
 
In this episode, host Laura Tacho speaks with Jesse Adametz, Senior Engineering Leader on the Developer Platform at Twilio. Jesse is leading Twilio’s multi-year platform consolidation, unifying tech stacks across large acquisitions and driving migrations at enterprise scale. He discusses platform adoption, the limits of Kubernetes, and how Twilio b…
  continue reading
 
Even if students know they're meant to stand for truth, are they equipped to do so? Emily Pigott shares ways to equip students to actually follow through on their mission to impact their community with courageous influence. -- Do you read the quarterly Student Leadership & Learning newsletters? Subscribe at www.acsi.org/subscribe The Student Leader…
  continue reading
 
DShield SIEM Docker Updates Guy updated the DShield SIEM which graphically summarizes what is happening inside your honeypot. https://isc.sans.edu/diary/DShield%20SIEM%20Docker%20Updates/32276 Again: Sonicwall SSL VPN Compromises The Australian Government s Signals Directorate noted an increase in compromised Sonicwall devices. https://www.cyber.go…
  continue reading
 
BASE64 Over DNS The base64 character set exceeds what is allowable in DNS. However, some implementations will work even with these invalid characters. https://isc.sans.edu/diary/BASE64%20Over%20DNS/32274 Google Chrome Update Google released an update for Google Chrome, addressing two vulnerabilities. One of the vulnerabilities is rated critical and…
  continue reading
 
Microsoft Patch Tuesday As part of its September patch Tuesday, Microsoft addressed 177 different vulnerabilities, 86 of which affect Microsoft products. None of the vulnerabilities has been exploited before today. Two of the vulnerabilities were already made public. Microsoft rates 13 of the vulnerabilities are critical. https://isc.sans.edu/diary…
  continue reading
 
Major npm compromise A number of high-profile npm libraries were compromised after developers fell for a phishing email. This compromise affected libraries with a total of hundreds of millions of downloads a week. https://bsky.app/profile/bad-at-computer.bsky.social/post/3lydioq5swk2y https://github.com/orgs/community/discussions/172738 https://git…
  continue reading
 
View the Show Notes Page for This Episode Become a Member to Receive Exclusive Content Sign Up to Receive Peter’s Weekly Newsletter Edward Chang is a neurosurgeon, scientist, and a pioneering leader in functional neurosurgery and brain-computer interface technology, whose work spans the operating room, the research lab, and the engineering bench to…
  continue reading
 
From YARA Offsets to Virtual Addresses Xavier explains how to convert offsets reported by YARA into offsets suitable for the use with debuggers. https://isc.sans.edu/diary/From%20YARA%20Offsets%20to%20Virtual%20Addresses/32262 Phishing via JavaScript in SVG Files Virustotal uncovered a Colombian phishing campaign that takes advantage of JavaScript …
  continue reading
 
In this episode of Engineering Enablement, host Laura Tacho talks with Bruno Passos, Product Lead for Developer Experience at Booking.com, about how the company is rolling out AI tools across a 3,000-person engineering team. Bruno shares how Booking.com set ambitious innovation goals, why cultural change mattered as much as technology, and the educ…
  continue reading
 
Stuart Salazar, ACSI Divisional Director for Latin America, provides an update. Beth Afanador, a longtime international school educator, gives her reasons why teaching overseas is impactful to both students and the teacher themself. And finally, we highlight the ACSI Early Education workshops with Dr. Tyler Groves. -- The Stronger Together Podcast …
  continue reading
 
Unauthorized Issuance of Certificate for 1.1.1.1 Cloudflare published a blog post with more details regarding the bad 1.1.1.1 certificate that was issued by Fina. https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/ AI Model Namespace Reuse Deleted accounts on Huggingface can be taken over by other entities unrelated to th…
  continue reading
 
Exploit Attempts for Dassault DELMIA Apriso. CVE-2025-5086 Our honeypots detected attacks against the manufacturing management system DELMIA Apriso. The deserialization vulnerability was patched in June and is one of a few critical vulnerabilities patched in recent months. https://isc.sans.edu/diary/Exploit%20Attempts%20for%20Dassault%20DELMIA%20Ap…
  continue reading
 
A Quick Look at Sextortion at Scale Jan analyzed 1900 different sextortion messages using 205 different Bitcoin addresses to look at the success rate, lifetime, and other metrics defining these campaigns. https://isc.sans.edu/diary/A%20quick%20look%20at%20sextortion%20at%20scale%3A%201%2C900%20messages%20and%20205%20Bitcoin%20addresses%20spanning%2…
  continue reading
 
pdf-parser: All Streams Didier released a new version of pdf-parser.py. This version fixes a problem with dumping all filtered streams. https://isc.sans.edu/diary/pdf-parser%3A%20All%20Streams/32248 Salesloft Drift Putting OAuth Tokens at Risk OAuth tokens used by Salesloft Drift users to provide access to integrations with Salesforce, Google Works…
  continue reading
 
View the Show Notes Page for This Episode Become a Member to Receive Exclusive Content Sign Up to Receive Peter’s Weekly Newsletter Stuart McGill is a distinguished professor emeritus at the University of Waterloo and the chief scientific officer at Backfitpro where he specializes in evaluating complex cases of lower back pain from across the globe…
  continue reading
 
Dr. Steve Mason, Student Success Services Teacher at Southside Christian School in South Carolina, joins the Grafted Together Podcast to discuss Artificial Intelligence, biblical worldview integration, and human intelligence. Read a chapter of Steve Mason's forthcoming book here, on Biblical Integration of Human Intelligence and Artificial Intellig…
  continue reading
 
Increasing Searches for ZIP Files Attackers are scanning our honeypots more and more for .zip files. They are looking for backups of credential files and the like left behind by careless administrators and developers. https://isc.sans.edu/diary/Increasing%20Searches%20for%20ZIP%20Files/32242 FreePBX Vulnerability An upatched vulnerability in FreePB…
  continue reading
 
Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallets and Credentials The popular open source NX build package was compromised. Code was added that uses…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play