Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Sso Podcasts

show episodes
 
Artwork

1
Mac Admins Podcast

Mac Admins Podcast LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
A rotating panel of Mac admins and consultants are joined by members of the Mac admin community to discuss the latest news, issues, and challenges of managing Apple devices. New episodes weekly. Join the community at macadmins.org.
  continue reading
 
SSO ID Rajasthan is a single sign-on portal (sso.rajasthan.gov.in) that lets citizens, employees, and businesses access multiple state services like e-Mitra, Jan Aadhaar, GST, and job applications with one login ID and password.
  continue reading
 
Artwork
 
Welcome to our podcast! Today, we're discussing the SSO ID, a Single Sign-On portal launched by the Government of Pakistan. With SSO ID, citizens can access multiple government services, including pension, tax, health insurance, education, and passport services, using just one username and password. To get started, visit the official website and register. It's easy, convenient, and secure. Thanks for tuning in!
  continue reading
 
Artwork

1
PANCast™

Palo Alto Networks - LIVEcommunity

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Listen, Learn, Leverage! This Palo Alto Networks podcast offers insights to help you build knowledge, maximize investment, and improve your company’s cybersecurity posture.
  continue reading
 
Artwork

1
ASCO Guidelines

American Society of Clinical Oncology (ASCO)

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Explore pivotal recommendations from the latest evidence-based clinical practice guidance with ASCO Guidelines. Join us to discover essential insights and navigate the ever-evolving landscape of cancer research and treatment.
  continue reading
 
Unlock the power of digital governance with our podcast focused on Government Services and the SSO ID Rajasthan Portal. We explore how citizens can seamlessly access over 100+ government services—like job applications, land records, and e-Mitra—through a single login. Whether you're a student, professional, or entrepreneur, understanding SSO ID can save you time and simplify your interactions with the government. Each episode breaks down key services, guides you through the portal’s features ...
  continue reading
 
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
  continue reading
 
Artwork

1
Speaking of SurgOnc

Annals of Surgical Oncology and Society of Surgical Oncology

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"Speaking of SurgOnc" is a podcast series brought to you by the Annals of Surgical Oncology (ASO) and the Society of Surgical Oncology(SSO). Dr. Frederick L. (Rick) Greene, ASO Deputy Editor, will explore and expand upon ideas and concepts described in articles published in the Annals of Surgical Oncology. Dr. Greene will interview authors and leading experts about topics of current importance in surgical oncology.
  continue reading
 
Device management is complex. Security threats are constant. Apple ecosystems are evolving fast. Who's managing these challenges? What does it actually take? And most importantly, how do you stay ahead? Welcome to Jamf After Dark, where IT leaders, security professionals and Apple experts tackle the real issues facing organisations today. Join our hosts as they uncover what works, what doesn't, and how to build technology strategies that actually stick. Hear honest conversations about managi ...
  continue reading
 
Welcome to 'The Citrix Session,' where we bring you the latest in Citrix technologies and solutions. Hosted by XenTegra, this podcast dives deep into the world of Citrix digital workspace solutions, exploring everything from virtual apps and desktops to networking and security. Join us each episode as we discuss best practices, new features, and expert strategies to optimize your Citrix environment and enhance your user experience. Whether you're an IT professional seeking to expand your Cit ...
  continue reading
 
Artwork

1
Knowledgers

sebtiskills176

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Daily+
 
Welcome to Knowledgers, the informational podcast for all of you who are looking to navigate the world of online portal logins, registration, and account management. We provide deep knowledge about the processes of various websites, telling about how to sign up, login, and troubleshoot common issues users face and provide solution. From password recovery and id recovery to dealing with blocked accounts and security concerns, we provide step-by-step processes and details to expert insights.
  continue reading
 
Loading …
show series
 
Beyond RC4 for Windows authentication Microsoft outlined its transition plan to move away from RC4 for authentication and published guidance and tools to facilitate this change. https://www.microsoft.com/en-us/windows-server/blog/2025/12/03/beyond-rc4-for-windows-authentication FortiCloud SSO Login Vuln Exploited Arctic Wolf observed exploit attemp…
  continue reading
 
SANS Stormcast Wednesday, December 17th, 2025: Beyond RC4; Forticloud SSO Vuln Exploited; FortiGate SSO Exploited; Beyond RC4 for Windows authentication Microsoft outlined its transition plan to move away from RC4 for authentication and published guidance and tools to facilitate this change. https://www.microsoft.com/en-us/windows-server/blog/2025/…
  continue reading
 
Analysis using Gephi with DShield Sensor Data Gephi is a neat tool to create interactive data visualizations. It can be applied to honeypot data to find data clusters. https://isc.sans.edu/diary/Analysis%20using%20Gephi%20with%20DShield%20Sensor%20Data/32608 zlib v1.3.1.2 Global Buffer Overflow in TGZfname() of zlib untgz Utility The untgz utility …
  continue reading
 
SANS Stormcast Friday, January 9th, 2026: Gephi Analysis; zlib vuln; GnuPG Vulns; Cisco/Cloudflare DNS Issue Analysis using Gephi with DShield Sensor Data Gephi is a neat tool to create interactive data visualizations. It can be applied to honeypot data to find data clusters. https://isc.sans.edu/diary/Analysis%20using%20Gephi%20with%20DShield%20Se…
  continue reading
 
A phishing campaign with QR codes rendered using an HTML table Phishing emails are bypassing filters by encoding QR codes as HTML tables. https://isc.sans.edu/diary/A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%20table/32606 n8n vulnerabilities In recent days, several new n8n vulnerabilities were disclosed. Ensure that …
  continue reading
 
SANS Stormcast Thursday, January 8th, 2026: HTML QR Code Phishing; n8n vulnerability; Powerbank Feature Creep A phishing campaign with QR codes rendered using an HTML table Phishing emails are bypassing filters by encoding QR codes as HTML tables. https://isc.sans.edu/diary/A%20phishing%20campaign%20with%20QR%20codes%20rendered%20using%20an%20HTML%…
  continue reading
 
Tool Review: Tailsnitch Tailsnitch is a tool to audit your Tailscale configuration. It does a comprehensive analysis of your configuration and suggests (or even applies) fixes. https://isc.sans.edu/diary/Tool%20Review%3A%20Tailsnitch/32602 D-Link DSL Command Injection via DNS Configuration Endpoint A new vulnerability in very old D-Link DSL modems …
  continue reading
 
SANS Stormcast Wednesday, January 7th, 2026: Tailsnitch Review; D-Link DSL EoL Vuln; TOTOLINK Unpatched Vuln Tool Review: Tailsnitch Tailsnitch is a tool to audit your Tailscale configuration. It does a comprehensive analysis of your configuration and suggests (or even applies) fixes. https://isc.sans.edu/diary/Tool%20Review%3A%20Tailsnitch/32602 D…
  continue reading
 
Dr. Lisa Hicks and Dr. Joseph Mikhael discuss the updated guideline from ASCO and Ontario Health (Cancer Care Ontario) on the treatment of multiple myeloma. They cover recommendations for therapeutic options across smoldering multiple myeloma, transplant eligible multiple myeloma, transplant ineligible multiple myeloma, and relapsed or refractory m…
  continue reading
 
Risks of OOB Access via IP KVM Devices Recently, cheap IP KVMs have become popular. But their deployment needs to be secured. https://isc.sans.edu/diary/Risks%20of%20OOB%20Access%20via%20IP%20KVM%20Devices/32598 Tailsnitch Tailsnitch is a tool to review your Tailscale configuration for vulnerabilities https://github.com/Adversis/tailsnitch Net-SNMP…
  continue reading
 
SANS Stormcast Tuesday, January 6th, 2026: IPKVM Risks; Tailsnitch; Net-SNMP Vuln; Risks of OOB Access via IP KVM Devices Recently, cheap IP KVMs have become popular. But their deployment needs to be secured. https://isc.sans.edu/diary/Risks%20of%20OOB%20Access%20via%20IP%20KVM%20Devices/32598 Tailsnitch Tailsnitch is a tool to review your Tailscal…
  continue reading
 
2026 has begun. Lets look forwards and no backwards and talk about what we have in hope for the year. What are we hoping to see from a hardware perspective? What are we hanging out for at WWDC this year? What predictions do we have for our favourite community projects, conferences, vendors and integrations? What do we resolve to do more, of, less o…
  continue reading
 
Cryptocurrency Scam Emails and Web Pages As We Enter 2026 Scam emails are directing victims to confidence scams attempting to steal cryptocurrencies. https://isc.sans.edu/diary/Cryptocurrency%20Scam%20Emails%20and%20Web%20Pages%20As%20We%20Enter%202026/32594 Debugging DNS response times with tshark tshark is a powerful tool to debug DNS timing issu…
  continue reading
 
SANS Stormcast Monday, January 5th, 2026: MongoBleed/React2Shell Recap; Crypto Scams; DNS Stats; Old Fortinet Vulns Cryptocurrency Scam Emails and Web Pages As We Enter 2026 Scam emails are directing victims to confidence scams attempting to steal cryptocurrencies. https://isc.sans.edu/diary/Cryptocurrency%20Scam%20Emails%20and%20Web%20Pages%20As%2…
  continue reading
 
MongoDB Unauthenticated Attacker Sensitive Memory Leak CVE-2025-14847 Over the Christmas holiday, MongoDB patched a sensitive memory leak vulnerability that is now actively being exploited https://www.mongodb.com/community/forums/t/important-mongodb-patch-available/332977 https://github.com/mongodb/mongo/commit/505b660a14698bd2b5233bd94da3917b585c5…
  continue reading
 
SANS Stormcast Sunday, December 28th, 2025: MongoDB Unauthenticated Memory Leak CVE-2025-14847 MongoDB Unauthenticated Attacker Sensitive Memory Leak CVE-2025-14847 Over the Christmas holiday, MongoDB patched a sensitive memory leak vulnerability that is now actively being exploited https://www.mongodb.com/community/forums/t/important-mongodb-patch…
  continue reading
 
It's the End of the Year Special! We're here to break down the 2025 year with all the goods and bads! Hosts: Tom Bridge - @[email protected] Marcus Ransom - @marcusransom Selina Ali - LinkedIn Links: https://macadminmusings.com/blog/2025/12/14/stop-working-before-everything-is-finished/ Sponsors: Iru 1Password Backblaze Meter Watchman Moni…
  continue reading
 
DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. Bu…
  continue reading
 
SANS Stormcast Monday, December 22nd, 2025: TLS Callbacks; FreeBSD RCE; NIST Time Server Issues DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ("Thread Local Storage") and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND…
  continue reading
 
If you're clicking through Jamf Pro configs manually, you're about to learn why that's becoming a problem. Security teams are starting to ban console access. MSPs are wasting hours rebuilding the same configs for each client. And organizations scaling to hundreds of Macs are drowning in manual changes with zero audit trail. Ryan Legg, Jamf's Soluti…
  continue reading
 
Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn t quite clean for ISC, but SSL2 and SSL3 systems have been cut down by about half. https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ra…
  continue reading
 
SANS Stormcast Friday, December 19th, 2025: Less Vulnerabie Devices; Critical OneView Vulnerablity; Trufflehog finds JWTs Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn't quite clean for ISC, but SSL2 and SSL…
  continue reading
 
Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit applications that do not have Next.js exposed. https://isc.sans.edu/diary/Maybe%20a%20Little%20Bit%20More%20Intere…
  continue reading
 
SANS Stormcast Thursday, December 18th, 2025: More React2Shell; Donicwall and Cisco Patch; Updated Chrome Advisory Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit…
  continue reading
 
Welcome to the podcast, Rippling IT, who are working on a novel solution for full lifecycle management related to the devices that their platform enables. Hosts: Tom Bridge - @[email protected] Selina Ali - LinkedIn Guests: Zaafir Kherani - LinkedIn Sponsors: Iru 1Password Backblaze Meter Watchman Monitoring If you're interested in sponsor…
  continue reading
 
More React2Shell Exploits CVE-2025-55182 Our honeypots continue to detect numerous React2Shell variants. Some using slightly modified exploits https://isc.sans.edu/diary/More%20React2Shell%20Exploits%20CVE-2025-55182/32572 The Fragile Lock: Novel Bypasses For SAML Authentication SAML is a tricky protocol to implement correctly, in particular if dif…
  continue reading
 
SANS Stormcast Tuesday, December 16th, 2025: Current React2Shell Example; SAML woes; MSMQ issues after patch; More React2Shell Exploits CVE-2025-55182 Our honeypots continue to detect numerous React2Shell variants. Some using slightly modified exploits https://isc.sans.edu/diary/More%20React2Shell%20Exploits%20CVE-2025-55182/32572 The Fragile Lock:…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play