Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Anubis Podcasts

show episodes
 
In 2012, three teenagers met online over their mutual love of Nickelodeon's House of Anubis. Now, almost 10 years later, they're rewatching the series as adults and breaking it down episode by episode. Follow us! Twitter: https://twitter.com/anubispodcast Instagram: https://www.instagram.com/anubisbackwardspod/ TikTok: https://www.tiktok.com/@anubisbackwardspod?lang=en
  continue reading
 
Hello and welcome to my podcast. I am long time atheist youtuber Anubis2814. Here is a collection of my old videos on atheism from 10 years ago. If you are nostolgic for good old youtube atheism please subscribe. If you are more interested in politics please subcribe to my podcast "After School Democracy" or go to my channel. Support this podcast: https://podcasters.spotify.com/pod/show/vault-of-anubis/support
  continue reading
 
We are Damsels who love reading spicy, exciting, and sometimes hilarious romance. We deep dive into the literary bowels of the romance genre and discuss what we liked, what we LOVED, and what we found downright ridiculous. Join us monthly as we discuss our spicy picks. This podcast contains mature adult content that may not be suitable for everyone. Damsel discretion is advised.
  continue reading
 
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
  continue reading
 
The Dreamscape Chronicles peer into realms beyond our dreams and the many types of paranormal experiences that occur during the night. We view the multiple facets of reality involving lucid dreaming, astral projection, sleep paralysis, shadow entities, prophetic dreams, OBE's, NDE, and so much more. From first hand personal stories involving the paranormal to ancient esoterica and hidden occultism knowledge we look through the veil. Throughout the podcast we discuss the history, lore, and pa ...
  continue reading
 
Artwork

1
The Chondro Lounge

The Reptile Lounge Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
The Chondro Lounge, a podcast hosted by The Reptile Lounge Network is an educational interview-based podcast about Green Tree Pythons (Morelia Viridis complex) and those that keep them. Lucas Bagnara of LAB Exotics and Chuck Amicone JR of Chill Chondros host bi-weekly episodes to deepen, expand, and proliferate the knowledge of keeping Chondros in captvity.
  continue reading
 
Loading …
show series
 
TYLOO win a $1mil event despite playing with a coach while top contenders fumble, Overpass replaces Anubis and its implications, and IEM Cologne new team previews in this epsiode of HLTV Confirmed!➡️ Follow us for updates: / hltvconfirmed 📺 Watch live: / hltvorg 🔊 Listen to audio (Spotify, iTunes, Google): https://anchor.fm/hltvHLTV Confirmed is pr…
  continue reading
 
It's finally here... Nina and Eddie had a summer romance! We dissect the summer romance allegations, question if Alfie's character was written accurately, and play a round of ship it or rip it. The Neddie fake dating fic Brennah mentioned (not quite the plot we were discussing but close enough): https://archive.transformativeworks.org/works/2683262…
  continue reading
 
Securing Firebase: Lessons Re-Learned from the Tea Breach Inspried by the breach of the Tea app, Brendon Evans recorded a video to inform of Firebase security issues https://isc.sans.edu/diary/Securing%20Firebase%3A%20Lessons%20Re-Learned%20from%20the%20Tea%20Breach/32158 WebKit Vulnerability Exploited before Apple Patch A WebKit vulnerablity patch…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Curious how the latest CrushFTP exploit works? Join host Kim along with intelligence analyst Hayden and threat hunter Leo as they discuss: BreachForums Back, XSS Out (1:28) Warlock Ransomware Hits SharePoint (5:28) Fire Ant Stings ESXi (9:39) ReliaQuest Uncovers CrushFTP Attack Chain (13:35 Kim Brom…
  continue reading
 
Jörmungandr, the Midgard Serpent, is more than just a monstrous snake—he is the living embodiment of boundaries, both holding the world together and threatening its collapse. Born of Loki and Angrboða, this colossal serpent circles the earth, his endless length coiling around the very fabric of reality. But his existence is a paradox: a guardian wh…
  continue reading
 
Have you been dreaming about a new urban legend episode? Maybe your dreams are a little bit prophetic! We dig into some sweet and also terrifying prophetic dreams, creepy child ghosts, and why we trust night nurses over any other profession to combat the supernatural. Content Warning: This episode contains conversations about or mentions of illness…
  continue reading
 
Apple Updates Everything: July 2025 Edition Apple released updates for all of its operating systems patching 89 different vulnerabilities. Many vulnerabilities apply to multiple operating systems. https://isc.sans.edu/diary/Apple%20Updates%20Everything%3A%20July%202025/32154 Python Triage A quick python script by Xavier to efficiently search throug…
  continue reading
 
Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a bl…
  continue reading
 
Linux Namespaces Linux namespaces can be used to control networking features on a process-by-process basis. This is useful when trying to present a different network environment to a process being analysed. https://isc.sans.edu/diary/Sinkholing%20Suspicious%20Scripts%20or%20Executables%20on%20Linux/32144 Coyote in the Wild: First-Ever Malware That …
  continue reading
 
Join Percival and Viviane as they gaze into the visions of legends from our past. From Gilgamesh to Edgar Cayce we find connections hidden behind dreams. This is the story of Dream Prophets a glimpse into their lives and how they have shaped concepts of our modern traditions and practices through their visions and in sleep. CLICK HERE to TEXT us yo…
  continue reading
 
In the quiet moments between waking and sleeping, something stirs in the shadows. The incubus, a creature that has haunted the world for centuries, slips in to claim the most vulnerable hours of the night. From ancient Mesopotamia to medieval Europe, and across continents, this shape-shifting demon takes many forms—sometimes a lover’s embrace, some…
  continue reading
 
New File Integrity Tool: ficheck.py Jim created a new tool, ficheck.py, that can be used to verify file integrity. It is a drop-in replacement for an older tool, fcheck, which was written in Perl and no longer functions well on modern Linux distributions. https://isc.sans.edu/diary/New%20Tool%3A%20ficheck.py/32136 Mitel Vulnerability Mitel released…
  continue reading
 
Reversing SharePoint Toolshell Exploits CVE-2025-53770 and CVE-2025-53771 A quick walk-through showing how to decode the payload of recent SharePoint exploits https://isc.sans.edu/diary/Analyzing%20Sharepoint%20Exploits%20%28CVE-2025-53770%2C%20CVE-2025-53771%29/32138 Compromised JavaScript NPM is Package The popular npm package is was compromised …
  continue reading
 
At the crossroads of myth and mystery stands Hecate, the goddess of thresholds, transformation, and the unknown. With her three faces and shifting forms, she is both protector and danger, guiding spirits between life and death while watching over the overlooked spaces where decisions hang in the balance. From her ancient, tangled origins to her rol…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Curious about how cybercriminals use AI? Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss: New SharePoint Vulnerability (1:34) LameHug AI-Powered Malware (5:55) UK Bans Ransomware Payments (9:44) AI Tactics Behind the Latest Cyber Threats (14:11) Kim B…
  continue reading
 
Shuffle through your Tarot deck as we’re joined by author and artist Charlie Claire Burgess who talks about their work around tarot and the intersection of spirituality and queerness. We talk about witchy awakenings courtesy of the CW network, getting rid of the binary in tarot readings, and so much more! Content Warning: This episode contains conv…
  continue reading
 
Microsoft Updates SharePoint Vulnerability Guidance CVE-2025-53770 and CVE-2025-53771 Microsoft released its update for SharePoint 2016, completing the updates across all currently supported versions. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/ WinZip MotW Privacy Starting with version 7.10…
  continue reading
 
Microsoft Released Patches for SharePoint Vulnerability CVE-2025-53770 CVE-2025-53771 Microsoft released a patch for the currently exploited SharePoint vulnerability. It also added a second CVE number identifying the authentication bypass vulnerability. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-…
  continue reading
 
SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0Day+Vulnerablity+Exploited+CVE202553770+ToolShell/32122/ Veeam Voicemail Phishing Attackers appear to impersonate …
  continue reading
 
Meet Geryon, the monstrous, three-bodied titan whose very form defies the laws of nature. From the crimson sands of Erytheia, where the sun turns back, to the mythic battle with Heracles, Geryon’s story is one of grandeur and strangeness. Armed with three heads, six arms, and wings that could blot out the sun, this unique being wasn’t just a formid…
  continue reading
 
Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
  continue reading
 
Send us a text Lions and Dinosaurs and Aliens, Oh my! Dorothy Valentine, an aspiring wildlife biologist, is intent on achieving her lifelong dream of getting her PhD and becoming a world-renowned biologist. So, life has no room for anything but work, and a relationship is out of the question. But life has a funny way of derailing even the best laid…
  continue reading
 
More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112 Ongoing SonicWall Secure Mobile Access (SMA) Exploitation…
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Ever wondered if IOCs are still relevant in a world of polymorphic malware and zero-day exploits? Join host Kim along with intelligence analyst Joey and threat hunter Tristan as they discuss: North American APT Targets China (1:25) Chatbot Exposes Thousands of Job Applications (4:57) New Phishing Ca…
  continue reading
 
Fenrir, the monstrous wolf of Norse legend, is more than just a creature of brute strength. Born of Loki and the giantess Angrboða, Fenrir embodies the inevitable reckoning that awaits all things—no matter how powerful or cunning. Raised among the gods in Asgard, he grew too strong to tame, and his eventual binding became a contest of will and fear…
  continue reading
 
We’ve talked about so many American cryptids on the show, but have you heard about the Flatwoods Monster of West Virginia? Settle around the camp fire as we tell a tale of UFO crash landings, Men in Black, and government conspiracy in small town America. Content Warning: This episode contains conversations about or mentions of vomiting, child endan…
  continue reading
 
Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%20Stored%20in%20an%20ADS/32108 Malvertising Homebrew An attacker has been attempting to trick users into installing a malicious versi…
  continue reading
 
DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse s residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that Jesse runs. https://isc.sans.edu/diary/DSh…
  continue reading
 
In this Confirmed, jL joins to explain the decision to take the break and talk about his future as well as G2 complete their roster, broky returned, magixx future in question, jks joins FlyQuest, and FISSURE Playground with Astralis, FURIA, and more team. ➡️ Follow us for updates: / hltvconfirmed 📺 Watch live: / hltvorg 🔊 Listen to audio (Spotify, …
  continue reading
 
Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102 Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812 Huntress saw active exploitation of…
  continue reading
 
Join Percival and Viviane as this episode takes us beyond the boundary of the known, through sacred temples, ancient rites, and into the inner sanctum of the subconscious. This is the story of Dream Incubation and the strange, often terrifying, always profound encounters with the entities who dwell within our sleep. CLICK HERE to TEXT us your stori…
  continue reading
 
Beneath the earth’s surface, where light dares not linger, resides Echidna—a creature whose beauty and horror intertwine in a form that haunts both gods and mortals. Half-woman, half-serpent, she is the mother of some of the most notorious monsters in Greek mythology. From Cerberus to the Hydra, Echidna's children have become legends in their own r…
  continue reading
 
SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this particular case, the Yandex mail server was the primary victim of these attacks. https://isc.sans.edu/diary/SSH%20Tunneling%20in%20Act…
  continue reading
 
Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20Development%3A%20Why%20and%20How./32092 Animation-Driven Tapjacking on Android Attackers can use a clic…
  continue reading
 
Dagan, the ancient god of the Euphrates, is a figure who defies spectacle and grand myth. Not a thunderous deity nor a creature of legend, Dagan’s power lies in quiet authority, bestowing kingship, prosperity, and the enduring rule of the land. His legacy, though faded from modern imagination, is etched in the rituals of harvest, the coronation of …
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Have you heard of SafePay ransomware? Join host Kim along with intelligence analysts Hayden and John as they discuss: SafePay Targets Ingram Micro (1:16) Updates on Iran-Israel (5:43) North Korea Adopts ClickFix & Attacks Web3 (8:24) Insights from ReliaQuest Customer Incidents (13:14) Kim Bromley: S…
  continue reading
 
Hear no evil, see no evil, speak no evil. You might have heard this phrase before (or at least seen the cute little monkey emojis on your phone), but do you know where it comes from? 🙉 🙈 🙊 We do a deep dive into the philosophical and religious origins of the Three Wise Monkeys! Content Warning: This episode contains conversations about or mentions …
  continue reading
 
Microsoft Patch Tuesday, July 2025 Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was disclosed before being patched, and none of the vulnerabilities have so far been e…
  continue reading
 
What s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS infostealer adds backdoor for persistent attacks Malware analyst discovered a new version of the Atomic macOS info-st…
  continue reading
 
Interesting ssh/telnet usernames Some interesting usernames observed in our honeypots https://isc.sans.edu/diary/A%20few%20interesting%20and%20notable%20ssh%20telnet%20usernames/32080 More sudo trouble The host option in Sudo can be exploited to execute commands on unauthorized hosts. https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-s…
  continue reading
 
Cerberus, the monstrous guardian of the Underworld, is more than just a three-headed hound. Born from the chaos of Echidna and Typhon, this creature embodies the boundary between life and death, ensuring that no soul escapes or enters without consequence. From his poisonous breath to his volcanic-eyed gaze, Cerberus is a force of nature, a sentinel…
  continue reading
 
Sudo chroot Elevation of Privilege The sudo chroot option can be leveraged by any local user to elevate privileges to root, even if no sudo rules are defined for that user. https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot Polymorphic ZIP Files A zip file with a corrupt End of Central Directory Record may extract different …
  continue reading
 
Baba Yaga, the enigmatic witch of Slavic folklore, dwells in a hut on chicken legs, forever shifting its position in the heart of an ever-changing forest. Neither purely evil nor purely good, Baba Yaga embodies contradictions: she is both a terrifying cannibal and a surprising benefactor. Her moods and intentions are as unpredictable as the forest …
  continue reading
 
Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Ivan and John as they discuss: Citrix Bleed 2 Scattered Spider Hits Aviation From ClickFix to FileFix Ransomware Threats from Q2 Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June …
  continue reading
 
Some kids are gay. Some kids are obsessed with death. Some kids are gay AND obsessed with death. And we love that for them! Also featuring astral projecting to family functions and helping your family break the cycle of buying haunted houses. Content Warning: This episode contains conversations about or mentions of defecation, drug use, death, miso…
  continue reading
 
Roster changes hit the scene! Analyzing all the moves that have happened and are yet to happen, including makazze to NAVI (for who?), zweih to Spirit, Perfecto to VP, and more in addition to season breakdown. ➡️ Follow us for updates: / hltvconfirmed 📺 Watch live: / hltvorg 🔊 Listen to audio (Spotify, iTunes, Google): https://anchor.fm/hltv HLTV Co…
  continue reading
 
Scattered Spider Update The threat actor known as Scattered Spider is in the news again, this time focusing on airlines. But the techniques used by Scattered Spider, social engineering, are still some of the most dangerous techniques used by various threat actors. https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-…
  continue reading
 
This week Percival and Viviane explore the many types of entities that transverse liminal spaces as well as the question of what really defines a liminal space. We dip into a vast ocean of questions while we search the depths of this unsettling mystery. CLICK HERE to TEXT us your stories! Support the show Click Support For Patreon Access! Want to c…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play