SSH or ServiceNow Store Highlights is a weekly show from Justin’s House in which Justin reviews new or updated applications in the ServiceNow Store. Listen so you can stay up to date on what’s new or updated and discover what may be relevant to your instance of ServiceNow.
…
continue reading
Ssh Podcasts
Audio versions of Teleport best technical blog posts. https://goteleport.com/blog/
…
continue reading
The Ssh-It cast is just as it says, not really prepared nor unprepared but just one guy or maybe a guest or two here and there talking about life and what is happening with them or around them. Talking about experiences from the past to maybe helping others through theirs. Send Comments, Questions and so on to [email protected] My Youtubes Gaming: https://www.youtube.com/user/Beamer2k7 Car-ish: https://www.youtube.com/channel/UCQ0qN3oT65o3nONuleMRm4g Support this podcast: https://podcasters ...
…
continue reading
Discover new software and hardware to get the best out of your network, control smart devices, and secure your data on cloud services. Self-Hosted is a chat show between Chris and Alex two long-time "self-hosters" who share their lessons and take you along for the journey as they learn new ones. A Jupiter Broadcasting podcast showcasing free and open source technologies you can host yourself.
…
continue reading
3 college seniors reflect on the stupid shit they do every Sunday afternoon while giving some advice on school, drinking, and girls. Segments include: FMK, SAD, LT, MOTW, BOTW, and SSH
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Listen to talk about computer forensic analysis, techniques, methodology, tool reviews and more.
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Software Engineering Radio is a podcast targeted at the professional software developer. The goal is to be a lasting educational resource, not a newscast. SE Radio covers all topics software engineering. Episodes are either tutorials on a specific topic, or an interview with a well-known character from the software engineering world. All SE Radio episodes are original content — we do not record conferences or talks given in other venues. Each episode comprises two speakers to ensure a lively ...
…
continue reading
The New Stack Podcast is all about the developers, software engineers and operations people who build at-scale architectures that change the way we develop and deploy software. For more content from The New Stack, subscribe on YouTube at: https://www.youtube.com/c/TheNewStack
…
continue reading
David Bombal interviews people in the networking world to learn about life, hacks, technology and networking and ways to improve your life!
…
continue reading
The Laravel News Podcast brings you all the latest news and events related to the Laravel PHP Framework
…
continue reading
Vhhbb
…
continue reading
yeee yeee
…
continue reading
Interviews with creators making cool things in Laravel
…
continue reading
Uptime and performance monitoring made easy.
…
continue reading
A podcast for Simulationists by Simulationists hosted by Amy Cowperthwait CEO, RN, MSN, CNS, CHSE-A and Megan Weldon, CHSE. Simulation Nation is here to make simulation as simple as possible. We know the headaches that you are seeing in your simulation center and we want to help alleviate problems by giving you guides on simulation writing, moulage, standardized patients, new technology and more!
…
continue reading
Hey, I Tom I Do Videos All About Technology Mostly apple i do unboxings, jailbreaks, reveiws,giveaways and much more! So Subscribe to Podcast!
…
continue reading
Taming the Terminal is a podcast based on the tutorial created by Bart Busschots and explained to Allison Sheridan.
…
continue reading
Join hosts Eddie Knight and Josh Kelley as they look at the latest trends and current events in the industry! Whether you're new to DevOps or a veteran of the industry, this podcast will help you continuously improve your DevOps game.
…
continue reading
In these short videos, experts from the Software Engineering Institute (SEI) deliver informative snapshots of our latest research on the changing world of all things cyber. The SEI is a federally funded research and development center sponsored by the U.S. Department of Defense and operated by Carnegie Mellon University.
…
continue reading
Just another WordPress.com weblog
…
continue reading
Join Robin Johns, and Bill Carter as we delve into the intricate world of cybersecurity, exploring the critical issues, fundamental concepts, and the latest security incidents that shape our digital landscape. In each episode, Robin and Bill bring their wealth of knowledge and experience to the forefront, unraveling complex cybersecurity topics and making them accessible to all listeners. Whether you're a seasoned professional, an aspiring cybersecurity enthusiast, or simply someone interest ...
…
continue reading

1
ServiceNow Store Highlights (SSH) v20250722
14:16
14:16
Play later
Play later
Lists
Like
Liked
14:16In this SSH episode I review 74 new, updated or removed applications in the ServiceNow Store. Watch or listen as I filter through the noise and review with you what's most relevant and what updates you may want to pay close attention to for your instance. #servicenow #apps #newrelease #feature #compatibility #releasenotes #fixes All applications in…
…
continue reading

1
SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches;
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this particular case, the Yandex mail server was the primary victim of these attacks. https://isc.sans.edu/diary/SSH%20Tunneling%20in%20Act…
…
continue reading

1
#501: Brute Force SSH & Build a Honeypot Now (Hydra and Cowrie Demo)
12:21
12:21
Play later
Play later
Lists
Like
Liked
12:21Big thank you to Cisco for sponsoring this video and sponsoring my trip to Cisco Live San Diego. This video features David Bombal and Kyle Winters demonstrating practical cybersecurity techniques. Kyle walks through how to use Hydra to brute force SSH passwords, explaining the process of leveraging wordlists and optimizing the attack. Following the…
…
continue reading
Wesley Beary of Anchor speaks with host Sam Taggart about designing APIs with a particular emphasis on user experience. Wesley discusses what it means to be an “API connoisseur”— paying attention to what makes the APIs we consume enjoyable or frustrating and then taking those lessons and using them when we design our own APIs. Wesley and Sam also e…
…
continue reading
…
continue reading

1
SANS Stormcast Tuesday, July 29th, 2025:Parasitic Exploits; Cisco ISE Exploit; MyASUS Vuln
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a bl…
…
continue reading

1
SANS Stormcast Monday, July 28th, 2025: Linux Namespaces; UI Automation Abuse; Autoswagger
5:39
5:39
Play later
Play later
Lists
Like
Liked
5:39Linux Namespaces Linux namespaces can be used to control networking features on a process-by-process basis. This is useful when trying to present a different network environment to a process being analysed. https://isc.sans.edu/diary/Sinkholing%20Suspicious%20Scripts%20or%20Executables%20on%20Linux/32144 Coyote in the Wild: First-Ever Malware That …
…
continue reading

1
How Fal.ai Went From Inference Optimization to Hosting Image and Video Models
52:41
52:41
Play later
Play later
Lists
Like
Liked
52:41Fal.ai, once focused on machine learning infrastructure, has evolved into a major player in generative media. In this episode of The New Stack Agents, hosts speak with Fal.ai CEO Burkay Gur and investor Glenn Solomon of Notable Capital. Originally aiming to optimize Python runtimes, Fal.ai shifted direction as generative AI exploded, driven by tool…
…
continue reading

1
SANS Stormcast Friday, July 25th, 2025: ficheck.py; Mital and SonicWall Patches
5:20
5:20
Play later
Play later
Lists
Like
Liked
5:20New File Integrity Tool: ficheck.py Jim created a new tool, ficheck.py, that can be used to verify file integrity. It is a drop-in replacement for an older tool, fcheck, which was written in Perl and no longer functions well on modern Linux distributions. https://isc.sans.edu/diary/New%20Tool%3A%20ficheck.py/32136 Mitel Vulnerability Mitel released…
…
continue reading

1
SANS Stormcast Thursday, July 24th, 2025: Reversing SharePoint Exploit; NPM “is” Compromise;
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53Reversing SharePoint Toolshell Exploits CVE-2025-53770 and CVE-2025-53771 A quick walk-through showing how to decode the payload of recent SharePoint exploits https://isc.sans.edu/diary/Analyzing%20Sharepoint%20Exploits%20%28CVE-2025-53770%2C%20CVE-2025-53771%29/32138 Compromised JavaScript NPM is Package The popular npm package is was compromised …
…
continue reading

1
SE Radio 678: Chris Love on Kubernetes Security
54:36
54:36
Play later
Play later
Lists
Like
Liked
54:36Chris Love, co-author of the book Core Kubernetes, joins host Robert Blumen for a conversation about kubernetes security. Chris identifies the node layer, secrets management, the network layer, contains, and pods as the most critical areas to be addressed. The conversation explores a range of topics, including when to accept defaults and when to ov…
…
continue reading

1
SANS Stormcast Wednesday, July 23rd, 2025: Sharepoint 2016 Patch; MotW Privacy and WinZip; Interlock Ransomware; Sophos Patches
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17Microsoft Updates SharePoint Vulnerability Guidance CVE-2025-53770 and CVE-2025-53771 Microsoft released its update for SharePoint 2016, completing the updates across all currently supported versions. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/ WinZip MotW Privacy Starting with version 7.10…
…
continue reading
…
continue reading

1
SANS Stormcast Tuesday, July 22nd, 2025: SharePoint Emergency Patches; How Long Does Patching Take; HPE Wifi Vuln; Zoho WorkDrive Abused
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00Microsoft Released Patches for SharePoint Vulnerability CVE-2025-53770 CVE-2025-53771 Microsoft released a patch for the currently exploited SharePoint vulnerability. It also added a second CVE number identifying the authentication bypass vulnerability. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-…
…
continue reading

1
SANS Stormcast Monday July 21st, 2025: Sharepoint Exploited; Veeam Fake Voicemail Phish; Passkey Phishing Attack
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0Day+Vulnerablity+Exploited+CVE202553770+ToolShell/32122/ Veeam Voicemail Phishing Attackers appear to impersonate …
…
continue reading

1
ServiceNow Store Highlights (SSH) v20250715
18:30
18:30
Play later
Play later
Lists
Like
Liked
18:30In this SSH episode I review 143 new, updated or removed applications in the ServiceNow Store. Watch or listen as I filter through the noise and review with you what's most relevant and what updates you may want to pay close attention to for your instance. #servicenow #apps #newrelease #feature #compatibility #releasenotes #fixes All applications i…
…
continue reading
Traditional headless browsers weren’t built for AI agents, often breaking when web elements shift even slightly. Paul Klein IV, founder of Browserbase and its open-source tool Stagehand, is tackling this by creating a browser infrastructure designed specifically for AI control. On The New Stack Agents podcast, Klein explained that Stagehand enables…
…
continue reading

1
SANS Stormcast Friday, July 18th, 2025: Extended File Attributes; Critical Cisco ISE Patch; VMWare Patches; Quarterly Oracle Patches
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
…
continue reading

1
Faster NativePHP, PHP pipes, and AI chat kits
46:48
46:48
Play later
Play later
Lists
Like
Liked
46:48Jake and Michael discuss all the latest Laravel releases, tutorials, and happenings in the community. Show links Conditionally Fail Queue Jobs While Throttling Exceptions in Laravel 12.20 JetBrains PHPverse 2025: Videos are now live! Laravel in the First Half of 2025 Run Laravel Pint Faster in Parallel Mode NativePHP for Mobile v1.1: Smaller, Smart…
…
continue reading

1
SANS Stormcast Thursday, July 17th, 2025: catbox.moe abuse; Sonicwall Attacks; Rendering Issues
5:09
5:09
Play later
Play later
Lists
Like
Liked
5:09More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112 Ongoing SonicWall Secure Mobile Access (SMA) Exploitation…
…
continue reading

1
SANS Stormcast Wednesday, July 16th, 2025: ADS Keystroke Logger; Fake Homebrew; Broadcom Altiris RCE; Malicious Cursor AI Extensions
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%20Stored%20in%20an%20ADS/32108 Malvertising Homebrew An attacker has been attempting to trick users into installing a malicious versi…
…
continue reading

1
SE Radio 677: Jacob Visovatti and Conner Goodrum on Testing ML Models for Enterprise Products
1:00:54
1:00:54
Play later
Play later
Lists
Like
Liked
1:00:54Jacob Visovatti and Conner Goodrum of Deepgram speak with host Kanchan Shringi about testing ML models for enterprise use and why it's critical for product reliability and quality. They discuss the challenges of testing machine learning models in enterprise environments, especially in foundational AI contexts. The conversation particularly highligh…
…
continue reading

1
DFSP # 491 INF-ltration: The Subtle Art of “Fetch and Execute”
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47
…
continue reading

1
SANS Stormcast Monday, July 14th, 2025: Web Honeypot Log Volume; Browser Extension Malware; RDP Forensics
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse s residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that Jesse runs. https://isc.sans.edu/diary/DSh…
…
continue reading

1
SANS Stormcast Monday, July 14th, 2025: Suspect Domain Feed; Wing FTP Exploited; FortiWeb Exploited; NVIDIA GPU Rowhammer
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102 Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812 Huntress saw active exploitation of…
…
continue reading

1
How AWS is Working to Help Developers with AI Reality
40:49
40:49
Play later
Play later
Lists
Like
Liked
40:49In a recent episode of The New Stack Agents livestream, Antje Barth, AWS Developer Advocate for Generative AI, discussed the growing developer interest in building agentic and multi-agent systems. While foundational model knowledge is now common, Barth noted that developers are increasingly focused on tools, frameworks, and protocols for scaling ag…
…
continue reading

1
SE Radio 676: Samuel Colvin on the Pydantic Ecosystem
1:02:06
1:02:06
Play later
Play later
Lists
Like
Liked
1:02:06Samuel Colvin, the CEO and founder of Pydantic, speaks with host Gregory M. Kapfhammer about the ecosystem of Pydantic’s Python frameworks, including Pydantic, Pydantic AI, and Pydantic Logfire. Along with discussing the design, implementation, and use of these frameworks, they dive into the refactoring of Pydantic and the follow-on performance imp…
…
continue reading

1
SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches;
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20Development%3A%20Why%20and%20How./32092 Animation-Driven Tapjacking on Android Attackers can use a clic…
…
continue reading

1
SANS Stormcast Wednesday, July 9th, 2025: Microsoft Patches; Opposum Attack;
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44Microsoft Patch Tuesday, July 2025 Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was disclosed before being patched, and none of the vulnerabilities have so far been e…
…
continue reading

1
ServiceNow Store Highlights (SSH) v20250708
17:37
17:37
Play later
Play later
Lists
Like
Liked
17:37In this SSH episode I review 29 new, updated or removed applications in the ServiceNow Store. Watch or listen as I filter through the noise and review with you what's most relevant and what updates you may want to pay close attention to for your instance. #servicenow #apps #newrelease #feature #compatibility #releasenotes #fixes All applications in…
…
continue reading
…
continue reading

1
SANS Stormcast Tuesday, July 8th, 2025: Detecting Filename (Windows); Atomic Stealer now with Backdoor; SEO Scams
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29What s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS infostealer adds backdoor for persistent attacks Malware analyst discovered a new version of the Atomic macOS info-st…
…
continue reading

1
SANS Stormcast Monday, July 7th, 2025: interesting usernames; More sudo issues; CitrixBleed2 PoC; Short Lived Certs
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48Interesting ssh/telnet usernames Some interesting usernames observed in our honeypots https://isc.sans.edu/diary/A%20few%20interesting%20and%20notable%20ssh%20telnet%20usernames/32080 More sudo trouble The host option in Sudo can be exploited to execute commands on unauthorized hosts. https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-s…
…
continue reading

1
How Shortwave Wants To Reinvent Email With AI
36:17
36:17
Play later
Play later
Lists
Like
Liked
36:17In this episode of The New Stack Agents, Andrew Lee, co-founder of Shortwave and Firebase, discusses the evolution of his Gmail-centric email client into an AI-first platform. Initially launched in 2020 with traditional improvements like better threading and search, Shortwave pivoted to agentic AI after the rise of large language models (LLMs). Ear…
…
continue reading

1
Eloquent builders, manipulating images, and translating apps
38:02
38:02
Play later
Play later
Lists
Like
Liked
38:02Jake and Michael discuss all the latest Laravel releases, tutorials, and happenings in the community. Show links Laravel 12.19 Adds a useEloquentBuilder Attribute, a FailOnException Queue Middleware, and More Larallow is a Permissions Package With Support for Scopes Manipulate Image URLs in Laravel with the Image Transform Package Lightning Fast Sc…
…
continue reading

1
SANS Stormcast Thursday July 3rd, 2025: sudo problems; polymorphic zip files; cisco vulnerablity
5:20
5:20
Play later
Play later
Lists
Like
Liked
5:20Sudo chroot Elevation of Privilege The sudo chroot option can be leveraged by any local user to elevate privileges to root, even if no sudo rules are defined for that user. https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot Polymorphic ZIP Files A zip file with a corrupt End of Central Directory Record may extract different …
…
continue reading

1
#500: MCP Demo using Python, AI and a self healing network (Model Context Protocol)
23:21
23:21
Play later
Play later
Lists
Like
Liked
23:21Big thank you to Cisco for sponsoring this video and sponsoring my trip to Cisco Live San Diego. See how Cisco engineer Kareem Iskander teams up with David Bombal at Cisco Live San Diego 2025 to build a self-healing network in real time. Using the new Model Context Protocol (MCP), Splunk logs, Meraki APIs, and Anthropic Claude, Kareem’s Python code…
…
continue reading
…
continue reading

1
SE Radio 675: Brian Demers on Observability into the Toolchain
47:41
47:41
Play later
Play later
Lists
Like
Liked
47:41Brian Demers, Developer Advocate at Gradle, speaks with host Giovanni Asproni about the importance of having observability in the toolchain. Such information about build times, compiler warnings, test executions, and any other system used to build the production code can help to reduce defects, increase productivity, and improve the developer exper…
…
continue reading

1
SANS Stormcast Monday June 30th, 2025: Scattered Spider; AMI BIOS Exploited; Secure Boot Certs Expiring; Microsoft Resliliency Initiative
7:29
7:29
Play later
Play later
Lists
Like
Liked
7:29Scattered Spider Update The threat actor known as Scattered Spider is in the news again, this time focusing on airlines. But the techniques used by Scattered Spider, social engineering, are still some of the most dangerous techniques used by various threat actors. https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-…
…
continue reading

1
SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln;
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44 Bluetooth Vulnerability Could Allow Eavesdropping A vulnerability i…
…
continue reading