Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Streaming Protocols Podcasts

show episodes
 
Artwork

1
Voices of Video

NETINT Technologies

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Explore the inner workings of video technology with Voices of Video: Inside the Tech. This podcast gathers industry experts and innovators to examine every facet of video technology, from decoding and encoding processes to the latest advancements in hardware versus software processing and codecs. Alongside these technical insights, we dive into practical techniques, emerging trends, and industry-shaping facts that define the future of video. Ideal for engineers, developers, and tech enthusia ...
  continue reading
 
Artwork

1
4 Guys Talking About AI

Andy Steuer, Neal Polachek, Greg Sterling, and John Girard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
“4 Guys Talking About AI” is a weekly podcast breaking down the latest AI news, tools, and ethical debates—from ChatGPT to AI companions—served up with humor and hot takes. Join four industry pros as they explore the latest breakthroughs in AI technology. Each episode delivers fresh insights, expert opinions, and in-depth discussions on the future of AI. Tune in on YouTube and in all your favorite audio-streaming platforms and stay ahead of the curve!
  continue reading
 
Artwork

1
Transplanar RPG

Transplanar RPG

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
Transplanar RPG is an all-transgender, people of color-led dark fantasy actual play series streaming THE CHAOS PROTOCOL Saturdays at 8pm ET on Twitch. Podcast episodes drop Tuesdays and Thursdays. Transplanar RPG is GMed by Connie Chang and produced by Sea Thomas.
  continue reading
 
Artwork

1
Possibly Unsafe

Possibly Unsafe

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
POSSIBLY UNSAFE is a hands-on adventure in DIY hosted by Patrick Norton and Michael Hand. Whether it’s experimenting with bacon in the kitchen, building an amazing gaming PC, or hacking brains with Arduinos- Possibly Unsafe is ready to help viewers get end results while not necessarily following the proper protocols.
  continue reading
 
Business Compass LLC is an AWS Advanced Consulting Partner and Well-Architected Partner. We have been recognized as APN Certification Distinction. We specialize in cloud migration, serverless solutions, AI/ML, IoT, DevOps, data and analytics, web development, media services, and Well-Architected Framework Reviews. We provide high-performance applications, scalable infrastructure, and cost-optimized deployments with expertise in Generative AI, Data Analytics, Live Streaming, Pay-Per-View, Vid ...
  continue reading
 
Artwork

1
Healthier

Reena A Jadhav

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Ready to become the luckiest person you know? Disease-free, madly in love, aging backward, and financially blessed? Then Reena's THE BLISS LIFE podcast is perfect for you as you'll learn how to create your perfect life by raising your VIBE. A Harvard MBA, founder of 5 tech startups, investor, advisor and board member, Reena is now on a mission to help you choose BLISS. A Harvard MBA, tech founder, investor, and philanthropist, Reena faced colon cancer at 35 years and a bigger crisis at 45 ye ...
  continue reading
 
Loading …
show series
 
Scans for pop3user with guessable password A particular IP assigned to a network that calls itself Unmanaged has been scanning telnet/ssh for a user called pop3user with passwords pop3user or 123456 . I assume they are looking for legacy systems that either currently run pop3 or ran pop3 in the past, and left the user enabled. https://isc.sans.edu/…
  continue reading
 
Scattered Spider Related Domain Names A quick demo of our domain feeds and how they can be used to find Scattered Spider related domains https://isc.sans.edu/diary/Scattered+Spider+Related+Domain+Names/32162 Excel External Workbook Links to Blocked File Types Will Be Disabled by Default Excel will discontinue allowing links to dangerous file types …
  continue reading
 
The numbers are staggering: using AWS Media Live for HD video processing costs approximately $10,117 per stream over three years, while the NetInsight/NetInt solution delivers the same capabilities for around $3,500 – a reduction of 66-70%. These aren't theoretical projections but real-world figures that are opening eyes throughout the industry. We…
  continue reading
 
Securing Firebase: Lessons Re-Learned from the Tea Breach Inspried by the breach of the Tea app, Brendon Evans recorded a video to inform of Firebase security issues https://isc.sans.edu/diary/Securing%20Firebase%3A%20Lessons%20Re-Learned%20from%20the%20Tea%20Breach/32158 WebKit Vulnerability Exploited before Apple Patch A WebKit vulnerablity patch…
  continue reading
 
Apple Updates Everything: July 2025 Edition Apple released updates for all of its operating systems patching 89 different vulnerabilities. Many vulnerabilities apply to multiple operating systems. https://isc.sans.edu/diary/Apple%20Updates%20Everything%3A%20July%202025/32154 Python Triage A quick python script by Xavier to efficiently search throug…
  continue reading
 
Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a bl…
  continue reading
 
Linux Namespaces Linux namespaces can be used to control networking features on a process-by-process basis. This is useful when trying to present a different network environment to a process being analysed. https://isc.sans.edu/diary/Sinkholing%20Suspicious%20Scripts%20or%20Executables%20on%20Linux/32144 Coyote in the Wild: First-Ever Malware That …
  continue reading
 
New File Integrity Tool: ficheck.py Jim created a new tool, ficheck.py, that can be used to verify file integrity. It is a drop-in replacement for an older tool, fcheck, which was written in Perl and no longer functions well on modern Linux distributions. https://isc.sans.edu/diary/New%20Tool%3A%20ficheck.py/32136 Mitel Vulnerability Mitel released…
  continue reading
 
Starting with signal reception at massive satellite dishes, Martin Azpiroz, director at Bold MSS walks us through the complete delivery chain, from transcoding and packaging to content protection and playback. We explore Bold MS's fascinating technical evolution from CPU to GPU to their current ASIC-based encoding approach. This shift hasn't just i…
  continue reading
 
Reversing SharePoint Toolshell Exploits CVE-2025-53770 and CVE-2025-53771 A quick walk-through showing how to decode the payload of recent SharePoint exploits https://isc.sans.edu/diary/Analyzing%20Sharepoint%20Exploits%20%28CVE-2025-53770%2C%20CVE-2025-53771%29/32138 Compromised JavaScript NPM is Package The popular npm package is was compromised …
  continue reading
 
Our 40th episode is a dystopian one. We dig into the backlash around Grok and the increasingly blurry line between “helpful assistant” and “mass surveillance.” And what happens when your personal data becomes a training set? Or when your next customer isn’t human, but an agent? We unpack the rise of agentic AI: from browsers that watch everything y…
  continue reading
 
Microsoft Updates SharePoint Vulnerability Guidance CVE-2025-53770 and CVE-2025-53771 Microsoft released its update for SharePoint 2016, completing the updates across all currently supported versions. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/ WinZip MotW Privacy Starting with version 7.10…
  continue reading
 
Microsoft Released Patches for SharePoint Vulnerability CVE-2025-53770 CVE-2025-53771 Microsoft released a patch for the currently exploited SharePoint vulnerability. It also added a second CVE number identifying the authentication bypass vulnerability. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-…
  continue reading
 
SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0Day+Vulnerablity+Exploited+CVE202553770+ToolShell/32122/ Veeam Voicemail Phishing Attackers appear to impersonate …
  continue reading
 
Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
  continue reading
 
Hardware acceleration is changing the economics of video delivery, and Scalstrm is at the forefront of this revolution. After showcasing their just-in-time transcoding solution at NAB, Dominic returns to Voices of Video to share how they've partnered with NETINT to create a groundbreaking platform that's already winning customer deployments. • Scal…
  continue reading
 
More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112 Ongoing SonicWall Secure Mobile Access (SMA) Exploitation…
  continue reading
 
Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%20Stored%20in%20an%20ADS/32108 Malvertising Homebrew An attacker has been attempting to trick users into installing a malicious versi…
  continue reading
 
DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse s residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that Jesse runs. https://isc.sans.edu/diary/DSh…
  continue reading
 
Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102 Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812 Huntress saw active exploitation of…
  continue reading
 
SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this particular case, the Yandex mail server was the primary victim of these attacks. https://isc.sans.edu/diary/SSH%20Tunneling%20in%20Act…
  continue reading
 
Casey Bateman, Principal Engineer at Huddle, reveals how their video platform revolutionized sports analysis by replacing the old system of coaches exchanging physical tapes with instant digital access. Founded in 2006 at the University of Nebraska, Huddle now serves 97% of US high school football programs and has expanded globally to 40+ sports. •…
  continue reading
 
Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20Development%3A%20Why%20and%20How./32092 Animation-Driven Tapjacking on Android Attackers can use a clic…
  continue reading
 
Microsoft Patch Tuesday, July 2025 Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was disclosed before being patched, and none of the vulnerabilities have so far been e…
  continue reading
 
What s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS infostealer adds backdoor for persistent attacks Malware analyst discovered a new version of the Atomic macOS info-st…
  continue reading
 
The AI search war just got real: and Samsung’s opening move might have changed everything. In this episode of 4 Guys Talking About AI, we break down why Samsung’s new deal with Perplexity could be a bigger threat to Google than anyone expected, and how Apple might be scrambling to catch up. This isn’t just a corporate headline; it’s the beginning o…
  continue reading
 
Kara Goodwin's recent book How to Awaken Authentically is a guide for the soul awakening and this interview is a fun and insightful conversation on all topics realated to having a spiritual life. We talk about everything from what it means to awaken, meditation, choosing a new reality, bliss amidst chaos and the dark energies. Tune in if you are re…
  continue reading
 
Interesting ssh/telnet usernames Some interesting usernames observed in our honeypots https://isc.sans.edu/diary/A%20few%20interesting%20and%20notable%20ssh%20telnet%20usernames/32080 More sudo trouble The host option in Sudo can be exploited to execute commands on unauthorized hosts. https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-s…
  continue reading
 
ARM architecture is revolutionizing video processing with power-efficient processors that deliver predictable performance without the computational gymnastics required by traditional x86 systems. • Ampere builds ARM-based processors with massive core counts (up to 192 cores) focused on sustainable computing • Traditional x86 architecture struggles …
  continue reading
 
Sudo chroot Elevation of Privilege The sudo chroot option can be leveraged by any local user to elevate privileges to root, even if no sudo rules are defined for that user. https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot Polymorphic ZIP Files A zip file with a corrupt End of Central Directory Record may extract different …
  continue reading
 
AI is officially changing how consumers search, shop, and discover—and if your business isn’t ready, you’re already behind. In this episode of 4 Guys Talking About AI, we break down the results of a groundbreaking survey on real consumer behavior with ChatGPT, Gemini, and other AI tools. From how people find local businesses to what platforms they …
  continue reading
 
Scattered Spider Update The threat actor known as Scattered Spider is in the news again, this time focusing on airlines. But the techniques used by Scattered Spider, social engineering, are still some of the most dangerous techniques used by various threat actors. https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-…
  continue reading
 
Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44 Bluetooth Vulnerability Could Allow Eavesdropping A vulnerability i…
  continue reading
 
WebRTC pioneer Tsahi Levent-Levi shares his extensive knowledge on this real-time communication protocol, explaining its inner workings, challenges, and proper implementation approaches. • WebRTC consists of both a protocol stack (standard specification) and Google's implementation (libwebrtc) used in all major browsers • The protocol is designed s…
  continue reading
 
NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 Remote code execution in CentOS Web Panel - CVE-2025-48703 An arbitrary file upload vulnerab…
  continue reading
 
Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each scans than they used to, but the average length of passwords did not change. https://isc.sans.edu/diary/Quick%20Pass…
  continue reading
 
Claude and ChatGPT aren’t just chatbots anymore—they’re stepping out of the text box and taking action. In this episode of 4 Guys Talking About AI, we explore how AI assistants are evolving into agents, running apps, managing tasks, and navigating the web on your behalf. This is the beginning of a new internet experience—one built less for humans, …
  continue reading
 
Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%20AtHome%20IP%20Cameras/32062 Critical Netscaler Security Update CVE-2025-5777 CVE 2025-5777 is a critical severity vu…
  continue reading
 
ADS & Python Tools Didier explains how to use his tools cut-bytes.py and filescanner to extract information from alternate data streams. https://isc.sans.edu/diary/ADS%20%26%20Python%20Tools/32058 Enhanced security defaults for Windows 365 Cloud PCs Microsoft announced more secure default configurations for its Windows 365 Cloud PC offerings. https…
  continue reading
 
How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, N…
  continue reading
 
Reza Rasool, CEO of nonprofit AI lab KWAI, shares his vision for democratizing artificial intelligence through personal AI systems that prioritize user privacy and local computing. • KWAI aims to create personal AI assistants that run locally on users' devices rather than in the cloud • Current cloud-based AI services create privacy concerns as the…
  continue reading
 
Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider build for Windows 11, Microsoft is testing an export feature for data stored by Recall. The feature is limited to European …
  continue reading
 
Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://unit42.paloaltonetworks.com/malicious-javascript-using-jsfiretruck-as-obfuscation/ JavaScript obfuscated with JSF*CK is bei…
  continue reading
 
Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot…
  continue reading
 
What happens when engineering brilliance meets streaming challenges? Peter Jan Spielmans, co-founder and CTO of Theo Technologies, takes us behind the scenes of video player technology and revolutionary low-latency streaming. Most viewers never think about the video player - it's the invisible interface between complex streaming technology and the …
  continue reading
 
Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows…
  continue reading
 
Is wearable tech the next big AI moment? OpenAI buys Jony Ive’s firm, debuts self-rewriting AI, and Anthropic warns of mass job loss. In this episode, the guys break down OpenAI’s jaw-dropping $6.5 billion acquisition of Jony Ive’s design company and what it might mean for the future of consumer hardware. Could we be heading toward AI-powered smart…
  continue reading
 
Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20June%202025/32032 Adobe Vulnerabilities Adobe relea…
  continue reading
 
OctoSQL & Vulnerability Data OctoSQL is a neat tool to query files in different formats using SQL. This can, for example, be used to query the JSON vulnerability files from CISA or NVD and create interesting joins between different files. https://isc.sans.edu/diary/OctoSQL+Vulnerability+Data/32026 Mirai vs. Wazuh The Mirai botnet has now been obser…
  continue reading
 
Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022 16 React Native Packages for GlueStack Backdoored Overnight 16 npm packages with over a million weekly downloads between them were compro…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play