Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

The Homebrew Network Podcasts

show episodes
 
Artwork
 
The Sanity Damage podcast is a series of TTRPG campaigns set in a multiverse cooked up by Nathan Heard and his peers. Sanity Damage's first campaign, To Whom the Sea Belongs, follows the story of an unlikely team of motley scalawags and genteel nobles as they stumble into a mind-bending conspiracy that reaches far beyond their mortal world. In this campaign, the party wrestles with the moderate good and considerable evil that arises from colonialism, and they experience the vast and diverse ...
  continue reading
 
Dr. Homebrew breaks down your home brewed beer and gives you the feedback you're looking for to improve your brewing! Join JP, along with his co-hosts, BJCP Master Judges Brian Cooper and Brian Schar, as they dissect listener-submitted homebrew and provide tips and tricks to improve your brewing! Have questions or want your beer evaluated on Dr. Homebrew? Email us at [email protected]
  continue reading
 
World Weavers is a D&D actual play about world-building, storytelling, and imagination. The players not only have their character and play through a 5th edition actual play adventure but also shape the world and its people. They will craft landscapes, build towns, control factions, and breathe life into the stories springing into existence around them - and these will be the settings for our actual play adventures Live on Youtube Mondays at 7PM EST - https://youtube.com/@thehomebrewdnd World ...
  continue reading
 
Artwork
 
Power Word Fail is a fantasy actual play D&D 5e podcast powered by lush character dynamics, arcane mystery, and the hilarity of the players’ table. Take arms and take heed: all actions have consequences in the world of Power Word Fail. Our first campaign, Chosen of the Crystal Crown, is helmed by DM Cody Smith, with cast members Tyrell Nye, Austin Brady, Nathan Heard, Andi Casuras, Katie Franks, and Ian Davis. This is a Homebrew Podcast. Learn more at actualplaypods.com You can support the s ...
  continue reading
 
Artwork

1
Everything Matters

The Homebrew Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
"It's all real, Everything Matters, and it Never Ends." Everything Matters is a Comedy Horror Podcast published every Tuesday. The show is focused on storytelling and features paranormal, surreal, absurd, and post-apocalyptic elements. This critically-acclaimed 7x Humanbody Award-winning collection of stories and coverage of contemporary issues affecting Tri Town and beyond is one of this planet's most popular programs. Hosted by Michael Taur and Dale Dallas, the show features intimate conve ...
  continue reading
 
Artwork

1
Magnificence

Tabletop Talespinners Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A strange funeral drags six unfamiliar faces from their homes to Seer's Mourning. None of them will leave the same. A D&D 5e actual play podcast produced by the Tabletop Talespinners Network. New episodes every other Friday! Cover art by Jee Prophet
  continue reading
 
Immersive Tabletop RPG storytelling meets audio drama in this narrative actual play podcast. Dive into the epic world of MythCraft with Ties the Bind, a cinematic actual play podcast where every relationship matters, every tie can bind, and family is everything. What to Expect: -Collaborative storytelling that puts character development first -Immersive sound design and atmospheric audio -Real dice rolls and authentic tabletop gaming moments Join us on Discord
  continue reading
 
The original live show that brings professional brewer and homebrewer interviews, and the best in beer-tainment, right to you as we talk about homebrewing beer and craft brewing. Each episode covers specific brewing topics to inform and entertain, and world class professional brewers as guests. All the fun of real radio, without the boredom. Live listeners can participate and ask questions by joining our chatroom. Watch the live show at YouTube.com/brewingnetwork. Have a brewing question or ...
  continue reading
 
Artwork

1
The Sleight of Hand Podcast

The Sleight of Hand Podcast

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
A Podcast built around the love of tabletop gaming! Sit back, relax and let your ears take it all in. As we dive into the ever so famous world of Dungeons & Dragons. A Fifth Edition rule-based Homebrew campaign! Created by the SOH Network The Cast: lan // Derek // Justin // Thomas // Isaiah // Christopher Want to know more? Follow and support us at: Instagram:thesleightofhandpodcast Twitter:SleightofhandPC Facebook:thesleightofhandpodcast Gmail:[email protected] Youtube:Sleig ...
  continue reading
 
Brew Strong, with hosts Jamil Zainasheff and John Palmer, combines the two most prominent authors and figures in homebrewing today in a live beer radio format that allows listeners to pose beginning and advanced brewing questions to expert hosts and guests from the Craft Beer industry. Designed as a brewing geek's must-listen show, Brew Strong is your source for cutting edge beer and brewing information, answers to technical questions, as well as a guide to a greater appreciation of all thin ...
  continue reading
 
Artwork
 
The Podcasters of the Dragon Wagon Radio podcast network venture into a mythical land in this DnD inspired actual-play homebrew RPG show that's heavy on the RP. Jake Lloyd Bacon, Alexandra Hoey and Matt Hingstman are joined by actor, improv and comic special guests, and must take on the roles of Half-Orcs, Dark Elves and more as they fight their way through a mythical land of peril, drama and hilarity all controlled by Dungeon Master Paul Bianchi and the chance rolls of dice!
  continue reading
 
Artwork

1
Brewing After Hours with Sarah Flora

Sarah Flora | Bleav Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Brewing After Hours Podcast is hosted by homebrewer and digital creator Sarah Flora (aka Flora Brewing), known for her popular Instagram and YouTube content breaking down the art of brewing from her home in Los Angeles. This series goes beyond the brew kettle — exploring the history, culture, and untold stories behind beer, with guest appearances from homebrewers and industry pros alike. While new episodes aren’t currently dropping, the full archive is packed with brewing deep-dives, fun ...
  continue reading
 
Artwork

1
What's My Roll

Arcane Focus Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
What’s My Roll is a Dungeons & Dragons 5th Edition actual-play seasonal podcast recorded and produced in Hong Kong. Set in the homebrew world of Eresyn, in the country of Pelantus. DM Ben Margalith crafts an intricate, living world full of lore, intrigue, and memorable characters. Join the players and their Neighborhood Watch Association as they try to clean up the streets of Brighthallow one district at a time. Little do they know, there’s much more at stake than they signed up for! For upd ...
  continue reading
 
Artwork

1
The Devil's Antlers

Time To Die Podcast Network

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
A Homebrewed TTRPG Actual Play Cryptid Campaign, with voice acting, sound FX, and original music. Set in the mid 1950s, this story follows four citizens around Pembine and Marinette, Wisconsin, as they begin to unveil some strange occurrences in the area.
  continue reading
 
Hosted by Jay Goodwin, co-founder of The Rare Barrel in Berkeley, California, The Sour Hour is an in-depth look into the process of making wild ales. With the help of some of the best mixed-fermentation brewers in the world, Jay discusses the techniques required to make world class sour beer. Have a question or comment? Email us at [email protected].
  continue reading
 
Artwork
 
The Few Who Speak Podcast is a general talk show with an emphasis on funny anecdotes from the show-runners. The show comes from the Fable Few Media Network and features the six main members: Alex, Ares, Gray, Lilith, Moke, and Tyler. If you're looking for a new chill podcast to listen to in the car or at work, this is the show for you.
  continue reading
 
Artwork

1
Taplines

VinePair

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
It’s modern American history, one beer at a time! Join VinePair contributing editor and columnist Dave Infante for Taplines, a weekly interview series with brewing icons, industry insiders, and outspoken experts about the United States’ most beloved and best-selling beers. Bros discussing their favorite IPAs, this ain’t. Taplines is a mix of journalism, history, and beer that you won’t find anywhere else but the VinePair Podcast Network. Hosted on Acast. See acast.com/privacy for more inform ...
  continue reading
 
Loading …
show series
 
CISA Reports Ivanti EPMM Exploit Sightings Two different organizations submitted backdoors to CISA, which are believed to have been installed using Ivanti vulnerabilities patched in May. https://www.cisa.gov/news-events/analysis-reports/ar25-261a Lastpass Observes Impersonation on GitHub Lastpass noted a number of companies being impersonated via f…
  continue reading
 
Help Wanted: What are these odd requests about? An odd request is hitting a number of our honeypots with a somewhat unusual HTTP request header. Please let me know if you no what the request is about. https://isc.sans.edu/forums/diary/Help+Wanted+What+are+these+odd+reuqests+about/32302/ Forta GoAnywhere MFT Vulnerability Forta s GoAnywhere MFT prod…
  continue reading
 
Exploring Uploads in a Dshield Honeypot Environment This guest diary by one of our SANS.edu undergraduate interns shows how to analyze files uploaded to Cowrie https://isc.sans.edu/diary/Exploring%20Uploads%20in%20a%20Dshield%20Honeypot%20Environment%20%5BGuest%20Diary%5D/32296 Sonicwall Breach SonicWall MySonicWall accounts were breached via crede…
  continue reading
 
CTRL-Z DLL Hooking Attackers may use a simple reload trick to overwrite breakpoints left by analysts to reverse malicious binaries. https://isc.sans.edu/diary/CTRL-Z%20DLL%20Hooking/32294 Global Admin in every Entra ID tenant via Actor tokens As part of September s patch Tuesday, Microsoft patched CVE-2025-55241. The discoverer of the vulnerability…
  continue reading
 
Why You Need Phishing-Resistant Authentication NOW. The recent compromise of a number of high-profile npmjs.com accounts has yet again shown how dangerous a simple phishing email can be. https://isc.sans.edu/diary/Why%20You%20Need%20Phishing%20Resistant%20Authentication%20NOW./32290 S1ngularity/nx Attackers Strike Again A second wave of attacks has…
  continue reading
 
Apple Updates Apple released major updates for all of its operating systems. In addition to new features, these updates patch 33 different vulnerabilities. https://isc.sans.edu/diary/Apple%20Updates%20Everything%20-%20iOS%20macOS%2026%20Edition/32286 Microsoft End of Life October 14th, support for Windows 10, Exchange 2016, and Exchange 2019 will e…
  continue reading
 
Web Searches For Archives Didier observed additional file types being searched for as attackers continue to focus on archive files as they spider web pages https://isc.sans.edu/diary/Web%20Searches%20For%20Archives/32282 FBI Flash Alert: Salesforce Attacks The FBI is alerting users of Salesforce of two different threat actors targeting Salesforce. …
  continue reading
 
DShield SIEM Docker Updates Guy updated the DShield SIEM which graphically summarizes what is happening inside your honeypot. https://isc.sans.edu/diary/DShield%20SIEM%20Docker%20Updates/32276 Again: Sonicwall SSL VPN Compromises The Australian Government s Signals Directorate noted an increase in compromised Sonicwall devices. https://www.cyber.go…
  continue reading
 
BASE64 Over DNS The base64 character set exceeds what is allowable in DNS. However, some implementations will work even with these invalid characters. https://isc.sans.edu/diary/BASE64%20Over%20DNS/32274 Google Chrome Update Google released an update for Google Chrome, addressing two vulnerabilities. One of the vulnerabilities is rated critical and…
  continue reading
 
Check out our friends from Aurita Missionpodcasts.apple.com/gb/podcast/auri…on/id1753466372patreon.com/advantagedndDarkmore Podcast Networkdiscord.gg/qbCMYsddarkmorepodcasts.comCreditsEditing by TolaMusic by Blake Bost, and Ormin AudioLogo and Maps by Daniel GraylingCharacter Art by Emmaline KellyWebsite by Labor of Love GraphicsElaris Gaeldrim by …
  continue reading
 
Microsoft Patch Tuesday As part of its September patch Tuesday, Microsoft addressed 177 different vulnerabilities, 86 of which affect Microsoft products. None of the vulnerabilities has been exploited before today. Two of the vulnerabilities were already made public. Microsoft rates 13 of the vulnerabilities are critical. https://isc.sans.edu/diary…
  continue reading
 
Major npm compromise A number of high-profile npm libraries were compromised after developers fell for a phishing email. This compromise affected libraries with a total of hundreds of millions of downloads a week. https://bsky.app/profile/bad-at-computer.bsky.social/post/3lydioq5swk2y https://github.com/orgs/community/discussions/172738 https://git…
  continue reading
 
From YARA Offsets to Virtual Addresses Xavier explains how to convert offsets reported by YARA into offsets suitable for the use with debuggers. https://isc.sans.edu/diary/From%20YARA%20Offsets%20to%20Virtual%20Addresses/32262 Phishing via JavaScript in SVG Files Virustotal uncovered a Colombian phishing campaign that takes advantage of JavaScript …
  continue reading
 
Unauthorized Issuance of Certificate for 1.1.1.1 Cloudflare published a blog post with more details regarding the bad 1.1.1.1 certificate that was issued by Fina. https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/ AI Model Namespace Reuse Deleted accounts on Huggingface can be taken over by other entities unrelated to th…
  continue reading
 
Exploit Attempts for Dassault DELMIA Apriso. CVE-2025-5086 Our honeypots detected attacks against the manufacturing management system DELMIA Apriso. The deserialization vulnerability was patched in June and is one of a few critical vulnerabilities patched in recent months. https://isc.sans.edu/diary/Exploit%20Attempts%20for%20Dassault%20DELMIA%20Ap…
  continue reading
 
A Quick Look at Sextortion at Scale Jan analyzed 1900 different sextortion messages using 205 different Bitcoin addresses to look at the success rate, lifetime, and other metrics defining these campaigns. https://isc.sans.edu/diary/A%20quick%20look%20at%20sextortion%20at%20scale%3A%201%2C900%20messages%20and%20205%20Bitcoin%20addresses%20spanning%2…
  continue reading
 
pdf-parser: All Streams Didier released a new version of pdf-parser.py. This version fixes a problem with dumping all filtered streams. https://isc.sans.edu/diary/pdf-parser%3A%20All%20Streams/32248 Salesloft Drift Putting OAuth Tokens at Risk OAuth tokens used by Salesloft Drift users to provide access to integrations with Salesforce, Google Works…
  continue reading
 
CONTENT WARNINGS: Body horror sfx (23:12 - 23:15, 49:22 - 49:26) Insect sfx (8:07 - 8:12, 14:20 - 14:28) The battle with the corpse has begun as the party is trapped within the heart of Mor Akkros. Will they have what it takes to survive? Find more of the Tabletop Talespinners Network and our sponsors here! Cast: GM - Jee Aelina - Jacqueline Cerrid…
  continue reading
 
Increasing Searches for ZIP Files Attackers are scanning our honeypots more and more for .zip files. They are looking for backups of credential files and the like left behind by careless administrators and developers. https://isc.sans.edu/diary/Increasing%20Searches%20for%20ZIP%20Files/32242 FreePBX Vulnerability An upatched vulnerability in FreePB…
  continue reading
 
Interesting Technique to Launch a Shellcode Xavier came across malware that PowerShell and the CallWindowProcA() API to launch code. https://isc.sans.edu/diary/Interesting%20Technique%20to%20Launch%20a%20Shellcode/32238 NX Compromised to Steal Wallets and Credentials The popular open source NX build package was compromised. Code was added that uses…
  continue reading
 
Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabil…
  continue reading
 
Reading Location Position Value in Microsoft Word Documents Jessy investigated how Word documents store the last visited document location in the registry. https://isc.sans.edu/diary/Reading%20Location%20Position%20Value%20in%20Microsoft%20Word%20Documents/32224 Weaponizing image scaling against production AI systems AI systems often downscale imag…
  continue reading
 
The end of an era: Properly formatted IP addresses in all of our data. When initiall designing DShield, addresses were zero padded , an unfortunate choice. As of this week, datafeeds should no longer be zero padded . https://isc.sans.edu/diary/The%20end%20of%20an%20era%3A%20Properly%20formated%20IP%20addresses%20in%20all%20of%20our%20data./32228 .d…
  continue reading
 
Don't Forget The "-n" Command Line Switch Disabling reverse DNS lookups for IP addresses is important not just for performance, but also for opsec. Xavier is explaining some of the risks. https://isc.sans.edu/diary/Don%27t%20Forget%20The%20%22-n%22%20Command%20Line%20Switch/32220 watchTowr releases details about recent Commvault flaws Users of the …
  continue reading
 
Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerabilit…
  continue reading
 
Increased Elasticsearch Recognizance Scans Our honeypots noted an increase in reconnaissance scans for Elasticsearch. In particular, the endpoint /_cluster/settings is hit hard. https://isc.sans.edu/diary/Increased%20Elasticsearch%20Recognizance%20Scans/32212 Microsoft Patch Tuesday Issues Microsoft noted some issues deploying the most recent patch…
  continue reading
 
Keeping an Eye on MFA Bombing Attacks Attackers will attempt to use authentication fatigue by bombing users with MFA authentication requests. Rob is talking in this diary about how to investigate these attacks in a Microsoft ecosystem. https://isc.sans.edu/diary/Keeping+an+Eye+on+MFABombing+Attacks/32208 Critical Cisco Secure Firewall Management Ce…
  continue reading
 
SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations Researchers from the Singapore University of Technology and Design released a new framework, SNI5GECT, to passively sniff and inject traffic into 5G data streams, leading to DoS, downgrade and other attacks. https://isc.sans.edu/diary/SNI5GECT%3A%20Sniffing%20and%20Injecting%20…
  continue reading
 
CONTENT WARNINGS: Descriptions of corpses (54:01 - 55:15) Body horror sfx (58:04 - 58:10, 59:01 - 59:04, 1:00:23 - 1:00:30, 1:02:19 - 1:02:28, 1:03:33 - 1:03:43) The party continues their descent into the earth and arrives at the heart of Mor Akkros. Will those hiding in the shadows present themselves as friend or foe? Find more of the Tabletop Tal…
  continue reading
 
In this episode, the Brew Strong team tackle the complex world of mixed fermentation (part 2). With so much information in the world of wild and sour beers, it took two episodes to cover this fascinating topic. Tune in to part two here and get ready to get wild! Learn more about your ad choices. Visit megaphone.fm/adchoices…
  continue reading
 
AI and Faster Attack Analysis A few use cases for LLMs to speed up analysis https://isc.sans.edu/diary/AI%20and%20Faster%20Attack%20Analysis%20%5BGuest%20Diary%5D/32198 Proxyware Malware Being Distributed on YouTube Video Download Site Popular YouTube download sites will attempt to infect users with proxyware. https://asec.ahnlab.com/en/89574/ Xero…
  continue reading
 
CVE-2017-11882 Will Never Die The (very) old equation editor vulnerability is still being exploited, as this recent sample analyzed by Xavier shows. The payload of the Excel file attempts to download and execute an infostealer to exfiltrate passwords via email. https://isc.sans.edu/diary/CVE-2017-11882%20Will%20Never%20Die/32196 Windows Kerberos El…
  continue reading
 
Microsoft Patch Tuesday https://isc.sans.edu/diary/Microsoft%20August%202025%20Patch%20Tuesday/32192 https://cymulate.com/blog/zero-click-one-ntlm-microsoft-security-patch-bypass-cve-2025-50154/ libarchive Vulnerability A libarchive vulnerability patched in June was upgraded from a low CVSS score to a critical one. Libarchive is used by compression…
  continue reading
 
Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of…
  continue reading
 
We had this idea: what if we had a few adventurous homebrewers brew beers according to some old set of BJCP style guidelines? Could they do it? What would that judging be like? How much has beer changed over the last 20 years or so? Turns out, there were other people who wanted to know the answers to those questions, too! So on today's show, we hav…
  continue reading
 
Google Paid Ads for Fake Tesla Websites Someone is setting up fake Tesla lookalike websites that attempt to collect credit card data from unsuspecting users trying to preorder Tesla products. https://isc.sans.edu/diary/Google%20Paid%20Ads%20for%20Fake%20Tesla%20Websites/32186 Compromising USB Devices for Persistent Stealthy Access USB devices, like…
  continue reading
 
Mass Internet Scanning from ASN 43350 Our undergraduate intern Duncan Woosley wrote up aggressive scans from ASN 43350 https://isc.sans.edu/diary/Mass+Internet+Scanning+from+ASN+43350+Guest+Diary/32180/#comments HTTP/1.1 Desync Attacks Portswigger released details about new types of HTTP/1.1 desync attacks it uncovered. These attacks are particular…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play