Soterion’s SAP Security & GRC podcast with host Dudley Cartwright, helping you on your journey to effective access risk management in SAP.
…
continue reading
The ISACA Podcast gives you insight into the latest regulations, trends and threats experienced by information systems auditors and governance and security professionals. Whether you are beginning your career or have decades of experience, the ISACA Podcast can help you be better equipped to address industry challenges and embrace opportunities.
…
continue reading
The SAP Business Technology Platform Podcast
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Selva Kumar is SAP Career Trainer specializing in SAP Career Coaching, identifying skills for getting a Job. You can reach me @ 302 494 9476 or Email: [email protected] Download Free SAP GRC Guide. http://expressgrc.com/sap-grc-10-1-step-step-guide/
…
continue reading
Official Home of the Lead Head Brigade
…
continue reading
The Cloud Wars franchise, part of the Acceleration Economy Network, analyzes the major cloud vendors from the perspective of business customers. In Cloud Wars Live, Bob Evans talks with both sides about these profoundly transformative technologies, and with monthly All-Star guests from across the business community about the trends impacting how the world lives, works, plays, and dreams. Visit https://accelerationeconomy.com/category/cloud-wars/ for more.
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
We recruit and hire SAP talent from the CIO level to team members in virtually every type of SAP/ERP skill set. We will shrink your recruiting cycle and ensure you have premium access to the non-active talent pool. Request a FREE Consultation.
…
continue reading
Welcome to "Crying Out Cloud," the monthly podcast that keeps you up to date with the latest cloud security news. Hosted by experts Eden Naftali and Amitai Cohen, each episode provides in-depth coverage of the most important vulnerabilities and incidents from the previous month. Tune in for insightful analysis and expert recommendations to help you safeguard your cloud infrastructure.
…
continue reading
Listen to the HRchat Podcast by HR Gazette to get insights and tips from HR leaders, influencers and tech experts. Topics covered include HR Tech, HR, AI, Leadership, Talent, Recruitment, Employee Engagement, Recognition, Wellness, DEI, and Company Culture. Hosted by Bill Banham, Bob Goodwin, Pauline James, and other HR enthusiasts, the HRchat show publishes interviews with influencers, leaders, analysts, and those in the HR trenches 2-4 times each week. The show is approaching 1000 episodes ...
…
continue reading
A Federal Security & Compliance career is a very rewarding career - we get the honor and privilege of protecting some of the most guarded assets of our great country. However, it doesn’t come without a cost. We often take the brunt of the beating when it comes to the regulations that are impeding innovation. Join federal security professional Max Aulakh as he distills the challenges facing our career field, pulling back the curtain on culture, emerging technical knowledge, ATOs, CMMC and var ...
…
continue reading
State of the CIO features senior IT professionals from leading organizations across America. Talking points on the show include the role of the CIO in business transformation, innovative AI implementation, and consumer engagement as a path to growth. Tune in every week to hear insights from the leading lights of enterprise Information Technology.
…
continue reading
The traditional enterprise go-to-market motion is undergoing a transformational shift. B2B buyers are more sophisticated than ever, and operational efficiency is a key focus for every organization. One key function possesses a unique opportunity to shape the future of revenue generation: enablement. On this podcast, we’re bringing you the secrets, strategies, and tactics that successful enablement leaders are using to drive meaningful impact. The Enablement Edge is the go-to resource for sal ...
…
continue reading
Insights from the tech industry's top leaders in this podcast about Cloud, IT Modernization, and Digital Transformation - hosted by Alex Raul and sponsored by Rackner. Listen to find out how organizations large and small are using cloud technologies to further their mission. Topics discussed include Cloud Native technologies like Kubernetes, DevSecOps, Serverless, Cybersecurity, Hybrid Cloud, Private Cloud, AWS, Azure, GCP, Open Source and much more. The Cloud Native Show is presented by Rac ...
…
continue reading
Today, software is the power that moves society. To stay in control over their intellectual property and remain competitive on the market software publishers and intelligent device manufacturers need to integrate top-notch protections against counterfeiting, reverse engineering, and tampering and implement an orchestration of license models that fully respond to the customer’s needs on a global scale. CodeMeter by Wibu-Systems is a comprehensive and award-winning suite of hardware-, software ...
…
continue reading

1
The Future of Human-Robot Interaction with Professor Kerstin Fischer
26:10
26:10
Play later
Play later
Lists
Like
Liked
26:10Meet the woman who understands how robots think and more importantly, how we think about them. Professor Kerstin Fischer brings over 20 years of research expertise to this fascinating exploration of human-robot interaction and what it means for our workplaces. The conversation delves into a critical distinction most of us miss: the power of embodim…
…
continue reading

1
SANS Stormcast June, June 9th, 2025: Extracting PNG Data; GlueStack Packages Backdoor; MacOS targeted by Clickfix; INETPUB restore script
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022 16 React Native Packages for GlueStack Backdoored Overnight 16 npm packages with over a million weekly downloads between them were compro…
…
continue reading

1
SANS Stormcast Friday, June 6th, 2025: Fake Zoom Clients; Python tarfile vulnerability; HPE Insight Remote Support Patch
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01Be Careful With Fake Zoom Client Downloads Miscreants are tricking victims into downloading fake Zoom clients (and likely other meeting software) by first sending them fake meeting invites that direct victims to a page that offers malware for download as an update to the Zoom client. https://isc.sans.edu/diary/Be%20Careful%20With%20Fake%20Zoom%20Cl…
…
continue reading

1
SANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerability Details Released
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://is…
…
continue reading

1
Scattered Spider's Evolving Playbook, SentinelOne Outage
27:42
27:42
Play later
Play later
Lists
Like
Liked
27:42Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Scattered Spider's Focus on Tech Vendors How APT41 Abuses Google Calendar for C2 The SentinelOne Outage A New Void Blizzard Espionage Campaign Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat …
…
continue reading

1
Cyberrisk Quantification: Strengthening Financial Resilience
35:33
35:33
Play later
Play later
Lists
Like
Liked
35:33In this episode, ISACA's Lisa Cook engages with Yakir Golan, Executive Officer (CEO) and Co-Founder of Kovrr, to explore the critical role of Cyberrisk Quantification (CRQ) in enhancing organizational financial resilience. They discuss how CRQ solutions provide objective assessments of an organization's cybersecurity posture, enabling leaders to ma…
…
continue reading

1
SANS Stormcast Wednesday, June 4th, 2025: vBulletin Exploited; Chrome 0-Day Patch; Roundcube RCE Patch; Multiple HP StoreOnce Vulns Patched
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%…
…
continue reading

1
Inclusive Leadership at Scale with Sue Quackenbush, Dynatrace
22:54
22:54
Play later
Play later
Lists
Like
Liked
22:54What does it take to create a unified culture when your team spans 50 countries and includes thousands of employees? Sue Quackenbush, Chief People Officer at Dynatrace, reveals the secret sauce behind their "real vibes, real people" approach that keeps their global workforce connected. With 33% of Dynatrace's 4,000+ employees working fully remotely…
…
continue reading

1
SANS Stormcast Tuesday, June 3rd, 2025: Windows SSH C2; Google Removes CAs from trusted list; MSFT issues Emergency Patch to fix Crash issue; Qualcom Adreno GPU 0-day
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
…
continue reading

1
SANS Stormcast Monday, June 2nd, 2025: PNG with RAT; Cisco IOS XE WLC Exploit; vBulletin Exploit
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently p…
…
continue reading

1
SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2;
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
…
continue reading

1
AI-powered Security, Shared Fate, and an Archery Lesson with Dr. Anton Chuvakin
25:39
25:39
Play later
Play later
Lists
Like
Liked
25:39🎙️ Just dropped: Dr. Anton Chuvakin from Google Cloud, with legendary insights (and cloud security jokes).Eden Koby Naftali & Amitai Cohen sat down with Dr. Anton Chuvakin, Google Cloud's Office of the CISO, and the guy who made SIEM cool!What they got into ⬇️ 1) Why SOCs are broken (and full of toil)2) How to actually apply AI in security3) Why cl…
…
continue reading

1
SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
…
continue reading

1
SPECIAL: How Russian Market Fuels Credential-Based Attacks
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Factors Driving Russian Market's Popularity Attackers' Favorite Infostealers Infostealer Attack Paths Main Types and Exclusivity of Stolen Logs Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat…
…
continue reading

1
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
…
continue reading

1
Rethinking Workplace Connection in a Remote World with Marina Farthouat
18:49
18:49
Play later
Play later
Lists
Like
Liked
18:49In this episode, Bill Banham talks with Marina Farthouat, the new Vice President, People at Oyster - the global employment platform that enables companies to hire, pay, and care for distributed teams. Marina brings a refreshing perspective to the HRchat Show about transforming workplace norms through remote and distributed teams. Drawing from her d…
…
continue reading

1
Workday Leads the Future of AI Agent Management and Workforce Transformation | Cloud Wars Live
16:47
16:47
Play later
Play later
Lists
Like
Liked
16:47Assist, Accelerate, Transform The Big Themes: Workday’s Agent System of Record: Workday's Agent System of Record manages the emerging digital agent ecosystem. It provides structure and governance to what could otherwise become a chaotic sprawl of AI agents. By embedding agent management into existing organizational hierarchies, Workday ensures that…
…
continue reading

1
SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
…
continue reading

1
SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
…
continue reading

1
How SAP is Redefining Enterprise AI with Unified Data and Strategic Partnerships | Tinder on Customers
20:07
20:07
Play later
Play later
Lists
Like
Liked
20:07The Big Themes: SAP’s Flywheel Strategy: SAP introduced a compelling flywheel model that integrates applications, data, and AI to drive enterprise momentum. The idea is that integrated applications generate structured data, which then feeds a robust AI layer. As these layers build on one another, they create a self-reinforcing cycle of productivity…
…
continue reading

1
SANS Stormcast Thursday, May 22nd 2025: Crypto Confidence Scams; Extension Mayhem for VS Code and Chrome
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive VIP memberships to withdraw the money. https://isc.sans.edu/diary/New%20Variant%20of%20Crypto%20Confidence%20Scam/31968 Malicious Chrome Extensions Malici…
…
continue reading

1
The Threat Evolution: SAP Exploits, SEO Poisoning, and SkitNet Malware
29:03
29:03
Play later
Play later
Lists
Like
Liked
29:03Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Joey along with intelligence analysts John and Hayden as they discuss: ReliaQuest's investigation into hijacked routers and SEO poisoning fueling payroll heists Nation-state actors leveraging the SAP NetWeaver vulnerability en masse A new "Defendnot" tool that tricks Windows Defender into …
…
continue reading

1
Securing Your Legacy: The Missing Link in Employee Benefits with Curtis Vincent
14:09
14:09
Play later
Play later
Lists
Like
Liked
14:09Curtis Vincent, CHRO at The Estate Registry, offers a fascinating look at how digital estate management is transforming employee benefits packages and addressing a critical gap in financial wellness programs. The days of the fireproof lockbox stuffed with important papers are long behind us. As Curtis explains, modern employees lead increasingly co…
…
continue reading

1
SANS Stormcast Wednesday, May 21st 2025: Researchers Scanning the Internet; Forgotten DNS Records; openpgp.js Vulneraiblity
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do offer lists of researchers and just added three new groups today https://isc.sans.edu/diary/Researchers%20Scanning%20the%20Intern…
…
continue reading

1
SANS Stormcast Tuesday, May 20th 2025: AutoIT Code RAT; Fake Keepass Download; Procolored Printer Software Compromise
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960 RVTools compromise confirmed Robware.net, the site behind the popular tool RVTools now confirmed that it was compromi…
…
continue reading

1
Disrupt London and HR Analytics Summit with Douglas Leach
20:49
20:49
Play later
Play later
Lists
Like
Liked
20:49In this episode of the HRchat Show, Bill Banham talks with Douglas Leach about the upcoming Disrupt London and HR Analytics Summits. Doug's journey to founding the HR Analytics Summit reads like a masterclass in entrepreneurial resilience. Launching his venture in October 2019 - mere months before a global pandemic would shut down in-person events …
…
continue reading

1
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
…
continue reading

1
Building Better Organizations: ATD's Road Map for Talent Development with Mallory Flynn
19:15
19:15
Play later
Play later
Lists
Like
Liked
19:15Ever wondered what makes the Association for Talent Development (ATD) a key player in the world of HR and professional development? This episode pulls back the curtain as Bill Banham talks with Mallory Flynn, Content Manager for Career Development, Organization Development, and Talent Management Communities at ATD. Mallory walks us through three ga…
…
continue reading

1
TLP 574 -Heroes of WWII: The Extraordinary Saga of Joseph “Jumpin’ Joe” Beyrle
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36Join us for a thrilling addition to our 80th anniversary VE Day episode. We uncover the extraordinary tale of Joseph “Jumpin’ Joe” Beyrle, a WWII paratrooper whose courage defined a generation. From heart-pounding D-Day jumps with the 101st Airborne to a remarkable chapter fighting alongside the Soviet Red Army. Beyrle’s rare WWII dual service make…
…
continue reading

1
SANS Stormcast Friday, May 16th: Increase in Sonicwall Scans; RVTools Compromised?; RountPress
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
…
continue reading

1
Securing Desktops and Data from Ransomware Attacks
39:30
39:30
Play later
Play later
Lists
Like
Liked
39:30Ransomware remains one of the most formidable cybersecurity threats facing organizations worldwide. In this episode of the ISACA Podcast, host Chris McGowan speaks with Netwrix endpoint protection expert Jeremy Moskowitz, who explains how ransomware infiltrates and cripples desktop environments. He explains cybercriminals' tactics to exploit social…
…
continue reading

1
Speed Matters: How Career Sites Can Learn from Formula One with Bryan Adams, Happydance
24:58
24:58
Play later
Play later
Lists
Like
Liked
24:58Ever wondered what Formula One racing and career websites have in common? More than you might think, according to Bryan Adams, CEO and founder of Happydance, who recently joined Bill Banham on the HRchat Show to discuss an innovative new campaign that's bringing F1-inspired competition to the talent acquisition space. The "Careers Site Grand Prix" …
…
continue reading

1
SANS Stormcast Thursday, May 15th: Google Open Redirects; Adobe, Ivanti, and Samsung patches
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
…
continue reading

1
Will US Politics Reshape Russian Cyber Threats?
27:59
27:59
Play later
Play later
Lists
Like
Liked
27:59Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Hayden as they discuss: ReliaQuest's Forecast for How US Policy will Impact Russia-linked Cyber Threats Infostealers Spread by Fake AI Video Generators Kickidler Abuse by Ransomware Groups FBI Takedown of Huge Botnet Kim Bromley: Senior Cyber T…
…
continue reading

1
Parisa Tabriz on Google Chrome Enterprise Security and AI Innovation | Cloud Wars Live
15:03
15:03
Play later
Play later
Lists
Like
Liked
15:03Parisa Tabriz is vice president and general manager for Google Chrome, the world’s leading browser platform. She leads efforts to make Chrome a secure and essential enterprise workspace, integrating AI and advanced cybersecurity to meet evolving business needs. In this episode, Parisa joins Bob to explore how Chrome is redefining the browser as a p…
…
continue reading

1
UK Retail Breaches, SAP 0day, and CVE Troubles
29:05
29:05
Play later
Play later
Lists
Like
Liked
29:05🎙️ All you need to know from Ransomware to CVE Programs!☁️ Join Amitai Cohen and Eden Naftali as they break down the top stories in the cloud:- UK Retail Sector Hit by Ransomware (DragonForce & Scattered Spider)- SAP NetWeaver Vulnerability Exploited in the Wild- CVE Program Faces Major Backlog and Trust Issues…
…
continue reading

1
Beach Balls and Burnout: Why Leaders Need Emotional Skills with Dina Smith
43:22
43:22
Play later
Play later
Lists
Like
Liked
43:22The workplace has fundamentally transformed, dramatically increasing the emotional demands on leaders at all levels. From managing virtual teams to navigating workforce polarization, today's leaders face unprecedented challenges that require a new set of emotional skills to thrive. Executive coach and leadership strategist Dina Denham-Smith joins B…
…
continue reading

1
SANS Stormcast Wednesday, May 14th: Microsoft Patch Tuesday; 0-Days patched for Ivanti Endpoint Manager and Fortinet Products
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.san…
…
continue reading

1
SANS Stormcast Tuesday, May 12th: Apple Patches; Unipi Technologies Scans;
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking d…
…
continue reading

1
How Google Cloud Is Leading the AI Revolution Through Customer-Centric Innovation
18:57
18:57
Play later
Play later
Lists
Like
Liked
18:57Highlights Google Cloud’s AI Revolution and Customer Success (00:10) Renner talks about how, for Google Cloud, delivering great outcomes for customers must come before achieving returns. Efforts are underway to push brainpower and expertise directly to customers, while simplifying the sales process by infusing more industry-specific knowledge. Cust…
…
continue reading

1
SANS Stormcast Monday, May 11th: Steganography Challenge; End-of-Life Routers; ASUS Driverhub; RV-Tools SEO Poisoning
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/ FBI Warns of End-of-life routers The FBI is tracking larger…
…
continue reading

1
Trevor Noah, Adam Grant, and Why Workhuman Live Should Be on Your Calendar with Jackye Clayton
8:54
8:54
Play later
Play later
Lists
Like
Liked
8:54What makes an HR conference truly exceptional? According to veteran attendee Jackye Clayton, it's the willingness to tackle tough issues while maintaining a human-centered approach - precisely what sets Workhuman Live apart from the crowd. In this conversation with HRchat host Bill Banham, Jackye shares her enthusiasm for the upcoming Workhuman Liv…
…
continue reading

1
Recognition Revolution: The Hidden Data Gold Mine in Your Company with Jesse Harriott
17:39
17:39
Play later
Play later
Lists
Like
Liked
17:39What happens when artificial intelligence meets human connection in the workplace? Jesse Harriott, Executive Director of Workhuman iQ, reveals a groundbreaking approach to workplace analytics that's transforming how organizations understand their people and culture. Dive into the Human Intelligence 2025 release from Workhuman, which leverages recog…
…
continue reading

1
TLP 573 – Smashing Hitler at 80: VE Day’s Firepower & Grit
3:12:10
3:12:10
Play later
Play later
Lists
Like
Liked
3:12:10Scramble the squad with Lefty and the Lead Head Brigade for a full-throttle tribute to VE Day’s 80th anniversary, celebrating the Allied smackdown of Nazi Germany on May 8, 1945. In Smashing Hitler at 80: VE Day’s Firepower & Grit, we tear through the battles, weapons, and heroes that obliterated Hitler’s war machine. Joseph Collins (WWII Airborne …
…
continue reading

1
SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch
4:57
4:57
Play later
Play later
Lists
Like
Liked
4:57No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932 SAMSUNG magicINFO 9 Server Flaw Still exploitable The SAMSUNG magicINFO 9 Serv…
…
continue reading

1
Bug Bounty Secrets, Hacker Communities, and a Hit of Volleyball with Justin Gardner
40:24
40:24
Play later
Play later
Lists
Like
Liked
40:24🎙️ Listen to the biggest insights of bug bounty hunting with Justin Gardner 🚨 In this episode, Amitai Cohen and Eden Naftali are joined by none other than Justin, renowned bug bounty hunter and host of the Creative Thinking podcast (ctbbpodcast). Justin unpacks some of today's 🔥 topics: - Bug bounty disclosure challenges & trends - Security stories…
…
continue reading

1
SANS Stormcast Thursday, May 8th: Modular Malware; Sysaid Vuln; Cisco Wireless Controller Patch; Unifi Protect Camera Patch
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%22Modular%22%20Malware/31928 Sysaid XXE Vulnerabilities IT Service Management Software Sysaid patched a number of XXE vulner…
…
continue reading

1
Scattered Spider Strikes Again, Hunt for North Korean Insiders Heats Up
28:08
28:08
Play later
Play later
Lists
Like
Liked
28:08Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analyst John and threat hunter Tristan as they discuss: Scattered Spider Attacks UK Retail Orgs Bring Your Own Installer SentinelOne Bypass Hunting for North Korean Insiders Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research …
…
continue reading