In 2012, three teenagers met online over their mutual love of Nickelodeon's House of Anubis. Now, almost 10 years later, they're rewatching the series as adults and breaking it down episode by episode. Follow us! Twitter: https://twitter.com/anubispodcast Instagram: https://www.instagram.com/anubisbackwardspod/ TikTok: https://www.tiktok.com/@anubisbackwardspod?lang=en
…
continue reading
Anubis Podcasts
The thoughts and life of Sheddy_Anubis
…
continue reading
A boozy dive into mythology, legends, and folklore. Every week we pour a drink and dive into a new story from around the world. Hear fresh takes on classic myths and learn new stories from around the world. New episodes every Wednedsay!
…
continue reading
Introducing a new mythological god, monster, or story in just five minutes.
…
continue reading
Hello and welcome to my podcast. I am long time atheist youtuber Anubis2814. Here is a collection of my old videos on atheism from 10 years ago. If you are nostolgic for good old youtube atheism please subscribe. If you are more interested in politics please subcribe to my podcast "After School Democracy" or go to my channel. Support this podcast: https://podcasters.spotify.com/pod/show/vault-of-anubis/support
…
continue reading
How do people perceive the meaning of human existence? Judith Baylin-Stern, M.A. and Donna Jensen, M.A. are the creators and co-interviewers of The Halls of Anubis podcast.
…
continue reading
Brainwashing myself into loving science fiction, one book at a time.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
HLTV.org's live talk show hosted by Chad "SPUNJ" Burchill dedicated to hot topics surrounding the professional Counter-Strike scene. Catch us live here: https://twitch.tv/hltvorg
…
continue reading
We are Damsels who love reading spicy, exciting, and sometimes hilarious romance. We deep dive into the literary bowels of the romance genre and discuss what we liked, what we LOVED, and what we found downright ridiculous. Join us monthly as we discuss our spicy picks. This podcast contains mature adult content that may not be suitable for everyone. Damsel discretion is advised.
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
The Dreamscape Chronicles peer into realms beyond our dreams and the many types of paranormal experiences that occur during the night. We view the multiple facets of reality involving lucid dreaming, astral projection, sleep paralysis, shadow entities, prophetic dreams, OBE's, NDE, and so much more. From first hand personal stories involving the paranormal to ancient esoterica and hidden occultism knowledge we look through the veil. Throughout the podcast we discuss the history, lore, and pa ...
…
continue reading
Focus on personal protection, both armed and unarmed and related topics.
…
continue reading
The Chondro Lounge, a podcast hosted by The Reptile Lounge Network is an educational interview-based podcast about Green Tree Pythons (Morelia Viridis complex) and those that keep them. Lucas Bagnara of LAB Exotics and Chuck Amicone JR of Chill Chondros host bi-weekly episodes to deepen, expand, and proliferate the knowledge of keeping Chondros in captvity.
…
continue reading

1
TYLOO dream win, Anubis is out, Cologne preview | HLTV Confirmed S7E34
2:19:29
2:19:29
Play later
Play later
Lists
Like
Liked
2:19:29TYLOO win a $1mil event despite playing with a coach while top contenders fumble, Overpass replaces Anubis and its implications, and IEM Cologne new team previews in this epsiode of HLTV Confirmed!➡️ Follow us for updates: / hltvconfirmed 📺 Watch live: / hltvorg 🔊 Listen to audio (Spotify, iTunes, Google): https://anchor.fm/hltvHLTV Confirmed is pr…
…
continue reading
It's finally here... Nina and Eddie had a summer romance! We dissect the summer romance allegations, question if Alfie's character was written accurately, and play a round of ship it or rip it. The Neddie fake dating fic Brennah mentioned (not quite the plot we were discussing but close enough): https://archive.transformativeworks.org/works/2683262…
…
continue reading

1
SANS Stormcast Thursday July 31st, 2025: Firebase Security; WebKit Vuln Exploited; Scattered Spider Update
6:40
6:40
Play later
Play later
Lists
Like
Liked
6:40Securing Firebase: Lessons Re-Learned from the Tea Breach Inspried by the breach of the Tea app, Brendon Evans recorded a video to inform of Firebase security issues https://isc.sans.edu/diary/Securing%20Firebase%3A%20Lessons%20Re-Learned%20from%20the%20Tea%20Breach/32158 WebKit Vulnerability Exploited before Apple Patch A WebKit vulnerablity patch…
…
continue reading

1
Full CrushFTP Attack Chain, Plus BreachForums is Back!
27:44
27:44
Play later
Play later
Lists
Like
Liked
27:44Resources: https://linktr.ee/ReliaQuestShadowTalk Curious how the latest CrushFTP exploit works? Join host Kim along with intelligence analyst Hayden and threat hunter Leo as they discuss: BreachForums Back, XSS Out (1:28) Warlock Ransomware Hits SharePoint (5:28) Fire Ant Stings ESXi (9:39) ReliaQuest Uncovers CrushFTP Attack Chain (13:35 Kim Brom…
…
continue reading

1
The Serpent That Holds—and Destroys—the World | Ep89
6:55
6:55
Play later
Play later
Lists
Like
Liked
6:55Jörmungandr, the Midgard Serpent, is more than just a monstrous snake—he is the living embodiment of boundaries, both holding the world together and threatening its collapse. Born of Loki and Angrboða, this colossal serpent circles the earth, his endless length coiling around the very fabric of reality. But his existence is a paradox: a guardian wh…
…
continue reading

1
A Prophetic Middle School Crush | Your Urban Legends 110
43:31
43:31
Play later
Play later
Lists
Like
Liked
43:31Have you been dreaming about a new urban legend episode? Maybe your dreams are a little bit prophetic! We dig into some sweet and also terrifying prophetic dreams, creepy child ghosts, and why we trust night nurses over any other profession to combat the supernatural. Content Warning: This episode contains conversations about or mentions of illness…
…
continue reading

1
SANS Stormcast Wednesday July 30th, 2025: Apple Updates; Python Triage; Papercut Vuln Exploited
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Apple Updates Everything: July 2025 Edition Apple released updates for all of its operating systems patching 89 different vulnerabilities. Many vulnerabilities apply to multiple operating systems. https://isc.sans.edu/diary/Apple%20Updates%20Everything%3A%20July%202025/32154 Python Triage A quick python script by Xavier to efficiently search throug…
…
continue reading

1
SANS Stormcast Tuesday, July 29th, 2025:Parasitic Exploits; Cisco ISE Exploit; MyASUS Vuln
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a bl…
…
continue reading

1
SANS Stormcast Monday, July 28th, 2025: Linux Namespaces; UI Automation Abuse; Autoswagger
5:39
5:39
Play later
Play later
Lists
Like
Liked
5:39Linux Namespaces Linux namespaces can be used to control networking features on a process-by-process basis. This is useful when trying to present a different network environment to a process being analysed. https://isc.sans.edu/diary/Sinkholing%20Suspicious%20Scripts%20or%20Executables%20on%20Linux/32144 Coyote in the Wild: First-Ever Malware That …
…
continue reading

1
Paranormal Files.18 Dream Prophets The Oracles Of Legend
1:14:53
1:14:53
Play later
Play later
Lists
Like
Liked
1:14:53Join Percival and Viviane as they gaze into the visions of legends from our past. From Gilgamesh to Edgar Cayce we find connections hidden behind dreams. This is the story of Dream Prophets a glimpse into their lives and how they have shaped concepts of our modern traditions and practices through their visions and in sleep. CLICK HERE to TEXT us yo…
…
continue reading

1
Who Is the Incubus? Secrets of the Night | Ep88
7:28
7:28
Play later
Play later
Lists
Like
Liked
7:28In the quiet moments between waking and sleeping, something stirs in the shadows. The incubus, a creature that has haunted the world for centuries, slips in to claim the most vulnerable hours of the night. From ancient Mesopotamia to medieval Europe, and across continents, this shape-shifting demon takes many forms—sometimes a lover’s embrace, some…
…
continue reading

1
Right Where You Are Sitting Now #2 - Routine Excercise
6:27:22
6:27:22
Play later
Play later
Lists
Like
Liked
6:27:22"You can't have feelings alone" - William Burroughs, Naked Lunch
…
continue reading

1
SANS Stormcast Friday, July 25th, 2025: ficheck.py; Mital and SonicWall Patches
5:20
5:20
Play later
Play later
Lists
Like
Liked
5:20New File Integrity Tool: ficheck.py Jim created a new tool, ficheck.py, that can be used to verify file integrity. It is a drop-in replacement for an older tool, fcheck, which was written in Perl and no longer functions well on modern Linux distributions. https://isc.sans.edu/diary/New%20Tool%3A%20ficheck.py/32136 Mitel Vulnerability Mitel released…
…
continue reading

1
SANS Stormcast Thursday, July 24th, 2025: Reversing SharePoint Exploit; NPM “is” Compromise;
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53Reversing SharePoint Toolshell Exploits CVE-2025-53770 and CVE-2025-53771 A quick walk-through showing how to decode the payload of recent SharePoint exploits https://isc.sans.edu/diary/Analyzing%20Sharepoint%20Exploits%20%28CVE-2025-53770%2C%20CVE-2025-53771%29/32138 Compromised JavaScript NPM is Package The popular npm package is was compromised …
…
continue reading

1
Hecate: Goddess of Crossroads and Uncertainty | Ep87
7:38
7:38
Play later
Play later
Lists
Like
Liked
7:38At the crossroads of myth and mystery stands Hecate, the goddess of thresholds, transformation, and the unknown. With her three faces and shifting forms, she is both protector and danger, guiding spirits between life and death while watching over the overlooked spaces where decisions hang in the balance. From her ancient, tangled origins to her rol…
…
continue reading

1
New SharePoint Flaw, How Cybercriminals Use AI
26:09
26:09
Play later
Play later
Lists
Like
Liked
26:09Resources: https://linktr.ee/ReliaQuestShadowTalk Curious about how cybercriminals use AI? Join host Kim along with detection engineer Marken and intelligence analyst Alex as they discuss: New SharePoint Vulnerability (1:34) LameHug AI-Powered Malware (5:55) UK Bans Ransomware Payments (9:44) AI Tactics Behind the Latest Cyber Threats (14:11) Kim B…
…
continue reading

1
Queering the Tarot w/ Charlie Claire Burgess
49:40
49:40
Play later
Play later
Lists
Like
Liked
49:40Shuffle through your Tarot deck as we’re joined by author and artist Charlie Claire Burgess who talks about their work around tarot and the intersection of spirituality and queerness. We talk about witchy awakenings courtesy of the CW network, getting rid of the binary in tarot readings, and so much more! Content Warning: This episode contains conv…
…
continue reading

1
SANS Stormcast Wednesday, July 23rd, 2025: Sharepoint 2016 Patch; MotW Privacy and WinZip; Interlock Ransomware; Sophos Patches
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17Microsoft Updates SharePoint Vulnerability Guidance CVE-2025-53770 and CVE-2025-53771 Microsoft released its update for SharePoint 2016, completing the updates across all currently supported versions. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-53770/ WinZip MotW Privacy Starting with version 7.10…
…
continue reading

1
SANS Stormcast Tuesday, July 22nd, 2025: SharePoint Emergency Patches; How Long Does Patching Take; HPE Wifi Vuln; Zoho WorkDrive Abused
6:00
6:00
Play later
Play later
Lists
Like
Liked
6:00Microsoft Released Patches for SharePoint Vulnerability CVE-2025-53770 CVE-2025-53771 Microsoft released a patch for the currently exploited SharePoint vulnerability. It also added a second CVE number identifying the authentication bypass vulnerability. https://msrc.microsoft.com/blog/2025/07/customer-guidance-for-sharepoint-vulnerability-cve-2025-…
…
continue reading

1
SANS Stormcast Monday July 21st, 2025: Sharepoint Exploited; Veeam Fake Voicemail Phish; Passkey Phishing Attack
8:05
8:05
Play later
Play later
Lists
Like
Liked
8:05SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0Day+Vulnerablity+Exploited+CVE202553770+ToolShell/32122/ Veeam Voicemail Phishing Attackers appear to impersonate …
…
continue reading

1
Geryon: The Three-Headed Titan Who Defied Nature | Ep86
5:58
5:58
Play later
Play later
Lists
Like
Liked
5:58Meet Geryon, the monstrous, three-bodied titan whose very form defies the laws of nature. From the crimson sands of Erytheia, where the sun turns back, to the mythic battle with Heracles, Geryon’s story is one of grandeur and strangeness. Armed with three heads, six arms, and wings that could blot out the sun, this unique being wasn’t just a formid…
…
continue reading

1
SANS Stormcast Friday, July 18th, 2025: Extended File Attributes; Critical Cisco ISE Patch; VMWare Patches; Quarterly Oracle Patches
4:55
4:55
Play later
Play later
Lists
Like
Liked
4:55Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
…
continue reading

1
Ep 41: I Got Abducted by Alien and Now I'm Trapped in A Rom-Com
1:17:35
1:17:35
Play later
Play later
Lists
Like
Liked
1:17:35Send us a text Lions and Dinosaurs and Aliens, Oh my! Dorothy Valentine, an aspiring wildlife biologist, is intent on achieving her lifelong dream of getting her PhD and becoming a world-renowned biologist. So, life has no room for anything but work, and a relationship is out of the question. But life has a funny way of derailing even the best laid…
…
continue reading

1
SANS Stormcast Thursday, July 17th, 2025: catbox.moe abuse; Sonicwall Attacks; Rendering Issues
5:09
5:09
Play later
Play later
Lists
Like
Liked
5:09More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112 Ongoing SonicWall Secure Mobile Access (SMA) Exploitation…
…
continue reading

1
Do You Really Need IOCs? Plus Zero-Day Exploits, AI Data Leaks, and Phishing for VIPs
23:53
23:53
Play later
Play later
Lists
Like
Liked
23:53Resources: https://linktr.ee/ReliaQuestShadowTalk Ever wondered if IOCs are still relevant in a world of polymorphic malware and zero-day exploits? Join host Kim along with intelligence analyst Joey and threat hunter Tristan as they discuss: North American APT Targets China (1:25) Chatbot Exposes Thousands of Job Applications (4:57) New Phishing Ca…
…
continue reading
Fenrir, the monstrous wolf of Norse legend, is more than just a creature of brute strength. Born of Loki and the giantess Angrboða, Fenrir embodies the inevitable reckoning that awaits all things—no matter how powerful or cunning. Raised among the gods in Asgard, he grew too strong to tame, and his eventual binding became a contest of will and fear…
…
continue reading
We’ve talked about so many American cryptids on the show, but have you heard about the Flatwoods Monster of West Virginia? Settle around the camp fire as we tell a tale of UFO crash landings, Men in Black, and government conspiracy in small town America. Content Warning: This episode contains conversations about or mentions of vomiting, child endan…
…
continue reading

1
SANS Stormcast Wednesday, July 16th, 2025: ADS Keystroke Logger; Fake Homebrew; Broadcom Altiris RCE; Malicious Cursor AI Extensions
5:45
5:45
Play later
Play later
Lists
Like
Liked
5:45Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%20Stored%20in%20an%20ADS/32108 Malvertising Homebrew An attacker has been attempting to trick users into installing a malicious versi…
…
continue reading

1
SANS Stormcast Monday, July 14th, 2025: Web Honeypot Log Volume; Browser Extension Malware; RDP Forensics
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse s residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that Jesse runs. https://isc.sans.edu/diary/DSh…
…
continue reading

1
jL explains his break; broky & Perfecto are back, G2 complete | HLTV Confirmed S7E33
2:27:19
2:27:19
Play later
Play later
Lists
Like
Liked
2:27:19In this Confirmed, jL joins to explain the decision to take the break and talk about his future as well as G2 complete their roster, broky returned, magixx future in question, jks joins FlyQuest, and FISSURE Playground with Astralis, FURIA, and more team. ➡️ Follow us for updates: / hltvconfirmed 📺 Watch live: / hltvorg 🔊 Listen to audio (Spotify, …
…
continue reading

1
SANS Stormcast Monday, July 14th, 2025: Suspect Domain Feed; Wing FTP Exploited; FortiWeb Exploited; NVIDIA GPU Rowhammer
6:53
6:53
Play later
Play later
Lists
Like
Liked
6:53Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102 Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812 Huntress saw active exploitation of…
…
continue reading

1
Paranormal Files.17 Dream Incubation & The Portals Within
44:56
44:56
Play later
Play later
Lists
Like
Liked
44:56Join Percival and Viviane as this episode takes us beyond the boundary of the known, through sacred temples, ancient rites, and into the inner sanctum of the subconscious. This is the story of Dream Incubation and the strange, often terrifying, always profound encounters with the entities who dwell within our sleep. CLICK HERE to TEXT us your stori…
…
continue reading

1
The Monster Who Birthed Legends of Terror | Ep84
6:17
6:17
Play later
Play later
Lists
Like
Liked
6:17Beneath the earth’s surface, where light dares not linger, resides Echidna—a creature whose beauty and horror intertwine in a form that haunts both gods and mortals. Half-woman, half-serpent, she is the mother of some of the most notorious monsters in Greek mythology. From Cerberus to the Hydra, Echidna's children have become legends in their own r…
…
continue reading

1
SANS Stormcast Friday, July 11th, 2025: SSH Tunnel; FortiWeb SQL Injection; Ruckus Unpatched Vuln; Missing Motherboard Patches;
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this particular case, the Yandex mail server was the primary victim of these attacks. https://isc.sans.edu/diary/SSH%20Tunneling%20in%20Act…
…
continue reading

1
SANS Stormcast Thursday, July 10th, 2025: Internal CA with ACME; TapJacking on Android; Adobe Patches;
5:18
5:18
Play later
Play later
Lists
Like
Liked
5:18Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20Development%3A%20Why%20and%20How./32092 Animation-Driven Tapjacking on Android Attackers can use a clic…
…
continue reading

1
The Silent Power Behind Kingship and Grain | Ep83
7:02
7:02
Play later
Play later
Lists
Like
Liked
7:02Dagan, the ancient god of the Euphrates, is a figure who defies spectacle and grand myth. Not a thunderous deity nor a creature of legend, Dagan’s power lies in quiet authority, bestowing kingship, prosperity, and the enduring rule of the land. His legacy, though faded from modern imagination, is etched in the rituals of harvest, the coronation of …
…
continue reading

1
SafePay Ransomware Rises, North Korea Adopts ClickFix
24:20
24:20
Play later
Play later
Lists
Like
Liked
24:20Resources: https://linktr.ee/ReliaQuestShadowTalk Have you heard of SafePay ransomware? Join host Kim along with intelligence analysts Hayden and John as they discuss: SafePay Targets Ingram Micro (1:16) Updates on Iran-Israel (5:43) North Korea Adopts ClickFix & Attacks Web3 (8:24) Insights from ReliaQuest Customer Incidents (13:14) Kim Bromley: S…
…
continue reading
Hear no evil, see no evil, speak no evil. You might have heard this phrase before (or at least seen the cute little monkey emojis on your phone), but do you know where it comes from? 🙉 🙈 🙊 We do a deep dive into the philosophical and religious origins of the Three Wise Monkeys! Content Warning: This episode contains conversations about or mentions …
…
continue reading

1
SANS Stormcast Wednesday, July 9th, 2025: Microsoft Patches; Opposum Attack;
7:44
7:44
Play later
Play later
Lists
Like
Liked
7:44Microsoft Patch Tuesday, July 2025 Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was disclosed before being patched, and none of the vulnerabilities have so far been e…
…
continue reading

1
SANS Stormcast Tuesday, July 8th, 2025: Detecting Filename (Windows); Atomic Stealer now with Backdoor; SEO Scams
5:29
5:29
Play later
Play later
Lists
Like
Liked
5:29What s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS infostealer adds backdoor for persistent attacks Malware analyst discovered a new version of the Atomic macOS info-st…
…
continue reading

1
SANS Stormcast Monday, July 7th, 2025: interesting usernames; More sudo issues; CitrixBleed2 PoC; Short Lived Certs
5:48
5:48
Play later
Play later
Lists
Like
Liked
5:48Interesting ssh/telnet usernames Some interesting usernames observed in our honeypots https://isc.sans.edu/diary/A%20few%20interesting%20and%20notable%20ssh%20telnet%20usernames/32080 More sudo trouble The host option in Sudo can be exploited to execute commands on unauthorized hosts. https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-s…
…
continue reading

1
Right Where You Are Sitting Now #1 - My Past, Like A Terrible River
3:43:46
3:43:46
Play later
Play later
Lists
Like
Liked
3:43:46Works covered: And The Hippos Were Boiled In Their Tanks Junky: The Definitve Text Of Junk Queer Yage Redux
…
continue reading

1
Can Music Tame the Three-Headed Guardian? | Ep82
7:22
7:22
Play later
Play later
Lists
Like
Liked
7:22Cerberus, the monstrous guardian of the Underworld, is more than just a three-headed hound. Born from the chaos of Echidna and Typhon, this creature embodies the boundary between life and death, ensuring that no soul escapes or enters without consequence. From his poisonous breath to his volcanic-eyed gaze, Cerberus is a force of nature, a sentinel…
…
continue reading

1
SANS Stormcast Thursday July 3rd, 2025: sudo problems; polymorphic zip files; cisco vulnerablity
5:20
5:20
Play later
Play later
Lists
Like
Liked
5:20Sudo chroot Elevation of Privilege The sudo chroot option can be leveraged by any local user to elevate privileges to root, even if no sudo rules are defined for that user. https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot Polymorphic ZIP Files A zip file with a corrupt End of Central Directory Record may extract different …
…
continue reading

1
The Wild Grandmother Who Eats or Saves | Ep81
7:47
7:47
Play later
Play later
Lists
Like
Liked
7:47Baba Yaga, the enigmatic witch of Slavic folklore, dwells in a hut on chicken legs, forever shifting its position in the heart of an ever-changing forest. Neither purely evil nor purely good, Baba Yaga embodies contradictions: she is both a terrifying cannibal and a surprising benefactor. Her moods and intentions are as unpredictable as the forest …
…
continue reading

1
Citrix Bleed 2, Scattered Spider Hits Aviation
26:51
26:51
Play later
Play later
Lists
Like
Liked
26:51Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Ivan and John as they discuss: Citrix Bleed 2 Scattered Spider Hits Aviation From ClickFix to FileFix Ransomware Threats from Q2 Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research Team. She joined ReliaQuest in June …
…
continue reading

1
What are the MOUTH PROPORTIONS?! | Your Urban Legends 109
49:57
49:57
Play later
Play later
Lists
Like
Liked
49:57Some kids are gay. Some kids are obsessed with death. Some kids are gay AND obsessed with death. And we love that for them! Also featuring astral projecting to family functions and helping your family break the cycle of buying haunted houses. Content Warning: This episode contains conversations about or mentions of defecation, drug use, death, miso…
…
continue reading

1
zweih to Spirit, makazze to NAVI for... who? Summer rostermania! | HLTV Confirmed S7E32
2:53:44
2:53:44
Play later
Play later
Lists
Like
Liked
2:53:44Roster changes hit the scene! Analyzing all the moves that have happened and are yet to happen, including makazze to NAVI (for who?), zweih to Spirit, Perfecto to VP, and more in addition to season breakdown. ➡️ Follow us for updates: / hltvconfirmed 📺 Watch live: / hltvorg 🔊 Listen to audio (Spotify, iTunes, Google): https://anchor.fm/hltv HLTV Co…
…
continue reading

1
SANS Stormcast Monday June 30th, 2025: Scattered Spider; AMI BIOS Exploited; Secure Boot Certs Expiring; Microsoft Resliliency Initiative
7:29
7:29
Play later
Play later
Lists
Like
Liked
7:29Scattered Spider Update The threat actor known as Scattered Spider is in the news again, this time focusing on airlines. But the techniques used by Scattered Spider, social engineering, are still some of the most dangerous techniques used by various threat actors. https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-…
…
continue reading

1
Paranormal Files.16 Liminal Spaces: Lurkers At The Threshold
44:49
44:49
Play later
Play later
Lists
Like
Liked
44:49This week Percival and Viviane explore the many types of entities that transverse liminal spaces as well as the question of what really defines a liminal space. We dip into a vast ocean of questions while we search the depths of this unsettling mystery. CLICK HERE to TEXT us your stories! Support the show Click Support For Patreon Access! Want to c…
…
continue reading