Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Sudo Podcasts

show episodes
 
Artwork

1
Sudo Show

TuxDigital Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Sudo Show covers topics ranging from Open Source in business to deep dives into complex technoloyg. The Sudo Show is a proud member of the TuxDigital Network (https://tuxdigital.com/)!
  continue reading
 
Artwork

1
Destination Linux

Deviant Airwaves

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Destination Linux is a weekly show where Ryan, Jill, & guests share their passion for Linux & Open Source. Destination Linux is a show for all experience levels, whether you’re a beginner to Open Source or a Guru of Sudo, this is the podcast for you. Destination Linux covers a wide range of topics from the latest news, discussions on Linux & Open Source, gaming on Linux, unique in-depth interviews and much more!
  continue reading
 
Artwork

1
Coping Conversations

Dr. Bob Phillips

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly
 
"Coping Conversations" is an entertaining, educational, and inspirational podcast, hosted by internationally renowned psychologist, Dr. Bob Phillips. The "Coping Conversations" show has been airing weekly for more than 30 years, having appeared on New York radio stations and as a nationally available audio-streamed radio program since 1991. Due to popular demand, it debuted as a podcast in 2019. In each episode, Dr. Phillips interviews a well-known celebrity or expert, bringing the listening ...
  continue reading
 
Artwork

1
Product Agility

Ben Maynard

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Less Method. More Meaning. The world of Product Discovery and Creation is becoming increasingly challenging due to mistakes and missed opportunities that are prevalent in agile teams, large-scale Scrum and all other agile frameworks. History has shown that when organisations try and scale their product development to more than one cross-functional team, mistakes are made that cut short many chances of getting all possible benefits. The route of this for many is the need for more attention pa ...
  continue reading
 
Artwork
 
A one-stop podcast destination to know about Programming and how to excel in it! I will be sharing about Programming, Web development, freelancing and mainly my experience on it. Make sure to Subscribe to the podcast on Spotify/Google Podcasts or on any platform you're listening to. Lead by Tharun Shiv. Visit me at https://www.tharunshiv.com
  continue reading
 
Artwork

1
Coffee with Product

Michael Fountain

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Coffee with Product is an interview/conversation podcast where a community of Product Leaders shares their best product wisdom & career tips for new and aspiring product managers. Tune in weekly to gain an advantage in your product career.
  continue reading
 
Loading …
show series
 
Risks of OOB Access via IP KVM Devices Recently, cheap IP KVMs have become popular. But their deployment needs to be secured. https://isc.sans.edu/diary/Risks%20of%20OOB%20Access%20via%20IP%20KVM%20Devices/32598 Tailsnitch Tailsnitch is a tool to review your Tailscale configuration for vulnerabilities https://github.com/Adversis/tailsnitch Net-SNMP…
  continue reading
 
Cryptocurrency Scam Emails and Web Pages As We Enter 2026 Scam emails are directing victims to confidence scams attempting to steal cryptocurrencies. https://isc.sans.edu/diary/Cryptocurrency%20Scam%20Emails%20and%20Web%20Pages%20As%20We%20Enter%202026/32594 Debugging DNS response times with tshark tshark is a powerful tool to debug DNS timing issu…
  continue reading
 
It’s the new season! Year in Review Joe Rosensteel and Dan Sturm Show Notes & Links Dan at the Sketch premiere | Instagram Dan’s Letterboxd Watched List Joe’s Letterboxd Watched List Apple Trailer Site Support this show and other shows like it on The Incomparable network by becoming a member. Members get early access to podcasts, bonus episodes, an…
  continue reading
 
MongoDB Unauthenticated Attacker Sensitive Memory Leak CVE-2025-14847 Over the Christmas holiday, MongoDB patched a sensitive memory leak vulnerability that is now actively being exploited https://www.mongodb.com/community/forums/t/important-mongodb-patch-available/332977 https://github.com/mongodb/mongo/commit/505b660a14698bd2b5233bd94da3917b585c5…
  continue reading
 
What’s Inside: The 5% Milestone: We analyze the data behind the massive surge in Linux desktop adoption and why gaming is the secret weapon. The UpTech Project: Máirín Duffy introduces us to a student-led initiative bridging the digital divide with Linux. 2026 Predictions: From RISC-V taking over wearables to the COSMIC desktop challenging the stat…
  continue reading
 
DLLs & TLS Callbacks As a follow-up to last week's diary about DLL Entrypoints, Didier is looking at TLS ( Thread Local Storage ) and how it can be abused. https://isc.sans.edu/diary/DLLs%20%26%20TLS%20Callbacks/32580 FreeBSD Remote code execution via ND6 Router Advertisements A critical vulnerability in FreeBSD allows for remote code execution. Bu…
  continue reading
 
Positive trends related to public IP range from the year 2025 Fewer ICS systems, as well as fewer systems with outdated SSL versions, are exposed to the internet than before. The trend isn t quite clean for ISC, but SSL2 and SSL3 systems have been cut down by about half. https://isc.sans.edu/diary/Positive%20trends%20related%20to%20public%20IP%20ra…
  continue reading
 
Maybe a Little Bit More Interesting React2Shell Exploit Attackers are branching out to attack applications that initial exploits may have missed. The latest wave of attacks is going after less common endpoints and attempting to exploit applications that do not have Next.js exposed. https://isc.sans.edu/diary/Maybe%20a%20Little%20Bit%20More%20Intere…
  continue reading
 
Beyond RC4 for Windows authentication Microsoft outlined its transition plan to move away from RC4 for authentication and published guidance and tools to facilitate this change. https://www.microsoft.com/en-us/windows-server/blog/2025/12/03/beyond-rc4-for-windows-authentication FortiCloud SSO Login Vuln Exploited Arctic Wolf observed exploit attemp…
  continue reading
 
This week on Destination Linux, we are joined by a special guest host: Craig Rowland, the CEO of Sandfly Security! We’re diving deep into the reality of modern security—specifically when third-party code knocks over your castle. From malicious VSCode extensions to the "React2Shell" vulnerability, we discuss why "Open Source" doesn't automatically m…
  continue reading
 
More React2Shell Exploits CVE-2025-55182 Our honeypots continue to detect numerous React2Shell variants. Some using slightly modified exploits https://isc.sans.edu/diary/More%20React2Shell%20Exploits%20CVE-2025-55182/32572 The Fragile Lock: Novel Bypasses For SAML Authentication SAML is a tricky protocol to implement correctly, in particular if dif…
  continue reading
 
Abusing DLLs EntryPoint for the Fun DLLs will not just execute code when some of their functions are called, but also as they are loaded. https://isc.sans.edu/diary/Abusing%20DLLs%20EntryPoint%20for%20the%20Fun/32562 Apple Patches Everything: December 2025 Edition Apple released patches for all of its operating systems, fixing two already exploited…
  continue reading
 
Using AI Gemma 3 Locally with a Single CPU Installing AI models on modes hardware is possible and can be useful to experiment with these models on premise https://isc.sans.edu/diary/Using%20AI%20Gemma%203%20Locally%20with%20a%20Single%20CPU%20/32556 Mystery Google Chrome 0-Day Vulnerability Google released an update for Google Chrome fixing a vulne…
  continue reading
 
My guest is an actress, comedian, entrepreneur, and more. She was the longtime host of the television show "USA: Up All Night," a show that she has brought back as the program "Up All Night." We discuss her multifaceted career, her acting, her interest and success in fashion, her attitude about resilience and reinventing herself, and much more.…
  continue reading
 
Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on. https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Comma…
  continue reading
 
Send us a text Productized in Lisbon is exceptional — an energising, thoughtful conference for product leaders. We're honoured to partner with Productized again and grateful to Bobcats Coding for making this Lisbon series possible. In this Talk in Ten from the Product Agility Podcast recorded live at Productized Lisbon, Nasreen (author of Product D…
  continue reading
 
Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution in ColdFusion, as well as the code execution issue in Acrobat, will very likely see exploits soon. h…
  continue reading
 
The Ultimate Geek Gift Guide for 2025 is here! Don't buy that RAM yet—we explain the massive AI-driven price spikes. Also, testing the powerful VDO Ninja for streaming and our reaction to Linus Tech Tips' latest Linux takes. 00:00:00 Intro 00:01:54 Community Feedback 00:07:34 Testing Out VDO Ninja: Open Source or Bust 00:09:15 Sandfly Security 00:1…
  continue reading
 
nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as undocumented may actually be documented in the underlying hardware description. https://www.tomshardware.com/tech-industry/cyber-security/researcher-finds-undocumented-microphone-and-major-security-flaws-in…
  continue reading
 
AutoIT3 Compiled Scripts Dropping Shellcodes Malicious AutoIT3 scripts are usign the FileInstall function to include additional scripts at compile time that are dropped as temporary files during execution. https://isc.sans.edu/diary/AutoIT3%20Compiled%20Scripts%20Dropping%20Shellcodes/32542 React2Shell Update The race is on to patch vulnerable syst…
  continue reading
 
Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Government%3F%20%5BGuest%20Diary%5D/32536 React Update Working exploits for the React vulnerability patched yesterday are n…
  continue reading
 
Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React server components. Exploitation is likely imminent. https://react.dev/blog/2025/12/03/critical-se…
  continue reading
 
SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-3670629826 https://github.com/yuliskov/SmartTube/releases/tag/notification Two Years, 17K Downloads: The NPM Malware That Tried to Gas…
  continue reading
 
Hunting for SharePoint In-Memory ToolShell Payloads A walk-through showing how to analyze ToolShell payloads, starting with acquiring packets all the way to decoding embedded PowerShell commands. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Hunting%20for%20SharePoint%20In-Memory%20ToolShell%20Payloads/32524 Android Security Bulletin December 20…
  continue reading
 
Fake adult websites pop realistic Windows Update screen to deliver stealers via ClickFix The latest variant of ClickFix tricks users into copy/pasting commands by displaying a fake blue screen of death. https://www.acronis.com/en/tru/posts/fake-adult-websites-pop-realistic-windows-update-screen-to-deliver-stealers-via-clickfix/ B2B Guest Access Cre…
  continue reading
 
Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications Spyware attacks messaging applications in part by triggering vulnerabilities in messaging applications but also by deploying tools like keystroke loggers and screenshot applications. https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-targ…
  continue reading
 
Matt from Linux Out Loud guest hosts with Jill and Ryan to dive into major internet events and Linux news! We tackle Ryan's "disappointing" take according to a listerner on EU censorship and free speech, discuss the massive Cloudflare outage that took half the internet down, debate if antivirus is necessary on Linux, and look at ProtonDB and the St…
  continue reading
 
Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control./32518 Sha1-Hulud, The Se…
  continue reading
 
Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%3F/32510 Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day Early exploit attem…
  continue reading
 
Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, indicating that exploitation may have occurred prior to the patch being released. https://isc.sans.edu/diary/Oracle%20Identity%20Manager%20Exploit%20…
  continue reading
 
Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names./32472 FortiWeb Multiple OS command injection in API and CLI A second silently patched vulnerability in FortiW…
  continue reading
 
Send us a text Welcome to another brisk Talk in Ten recorded live at this year's Productized conference. In this episode, Phil Hornby (founder of For Product People) explains why empowerment in product teams really means the ability to make decisions that stick — and how to raise the quality of those decisions. Key topics discussed: What a "high-qu…
  continue reading
 
KongTuke Activity This diary investigates how a recent Kong Tuke infections evolved all the way from starting with a ClickFix attack. https://isc.sans.edu/diary/KongTuke%20activity/32498 Cloudflare Outage Cloudflare suffered a large outage today after an oversized configuration file was loaded into its bot protection service https://x.com/dok2001 G…
  continue reading
 
Send us a text We’re honoured to partner again with the excellent Productized conference in Lisbon, Portugal — a brilliant gathering of product leaders, designers and builders that consistently sets the bar for thoughtful, practical conversations. A huge thank you to Productized for hosting us and to Bobcats Coding for making this Lisbon series pos…
  continue reading
 
Support the show by becoming a patron at tuxdigital.com/membership or get some swag at tuxdigital.com/store Hosted by: Ryan (DasGeek) = dasgeek.net Jill Bryant = jilllinuxgirl.com And Special Guest = Sherard Griffin https://www.redhat.com/en/authors/sherard-griffin 00:00:00 Intro 00:02:59 Community Feedback 00:13:02 Sandfly Security Segment 00:15:5…
  continue reading
 
Loading …
Copyright 2026 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play