Environmental Data Services Ends public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Eco Chamber

Environmental Data Services (ENDS)

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Every week, the ENDS team runs down the biggest green news stories, shines a spotlight on some pretty nasty chemicals, and takes a forensic look at one of the more deep-rooted environmental issues facing us today. Read more on the issues covered at www.endsreport.com or follow us on Twitter @TheENDSReport Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Banking on Innovation

Personetics Technologies Ltd

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Welcome to Personetics’ Banking on Innovation podcast, where banking leaders driving customer-centric Innovation to share their stories and reveal their insights on how financial data-driven personalization impacts business results and banking customers’ financial wellbeing. Hosted by Jody Bhagat, President of Americas at Personetics, the biweekly podcast helps executives in banks, fintechs and banking providers consider how to lead customer-driven Innovation in their own organizations. Gues ...
  continue reading
 
Budget overruns. Bricked devices. Data breaches. Building connected products is hard. Join us every other Thursday for unfiltered conversations with executives about their AI journeys — the mistakes they made, the lessons they learned, and what they wish they’d known when they started. In each episode of Over the Air, our expert guests will make bold predictions, reveal unpopular opinions, and share stories you won’t hear anywhere else.
  continue reading
 
Loading …
show series
 
xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
  continue reading
 
A grassroots effort to eliminate property taxes in Ohio received the green light this week to begin gathering signatures for the proposed ballot measure. Citizens for Property Tax Reform must gather 443,000 valid signatures from 44 of Ohio's 88 by July 2 to qualify for the November ballot. Property taxes and relief have been a major concern for Ohi…
  continue reading
 
Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
  continue reading
 
Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
  continue reading
 
The formal inauguration mass for Pope Leo the Fourteenth will be celebrated this weekend in Rome where he will be enthroned as the leader of the Catholic Church. Coming up, we will talk with Northeast Ohio Catholics about the selection of Pope Leo and how the choice is impacting the church. Later, did you have a list of chores to do as a kid? Many …
  continue reading
 
Every week, the ENDS team enters the ECO Chamber to discuss the UK’s biggest green news stories and bring you up to speed on the latest developments in environmental policy. This week, ENDS journalists are joined by RSK Wilding's legal counsel Alexa Culver as they breakdown the consequences of the Planning and Infrastructure Bill and make sense of …
  continue reading
 
Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.san…
  continue reading
 
Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking d…
  continue reading
 
Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/ FBI Warns of End-of-life routers The FBI is tracking larger…
  continue reading
 
Cleveland Hopkins Airport will be getting a major makeover in the next decade. The city unveiled a $1.1 billion renovation including a new terminal that will open in 2032, and other enhancements including more parking and a new Regional Transit Authority Red Line rapid transit station. Mayor Just Bibb said in announcing the makeover that in order t…
  continue reading
 
No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932 SAMSUNG magicINFO 9 Server Flaw Still exploitable The SAMSUNG magicINFO 9 Serv…
  continue reading
 
Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%22Modular%22%20Malware/31928 Sysaid XXE Vulnerabilities IT Service Management Software Sysaid patched a number of XXE vulner…
  continue reading
 
Every week, the ENDS team enters the ECO Chamber to discuss the UK’s biggest green news stories and bring you up to speed on the latest developments in environmental policy. This week, ENDS journalists discuss: The fall out of the local elections and Nigel Farage and Reform UK's plans for net zero. A landmark victory for sandeels as environmentalis…
  continue reading
 
Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that, in addition to implementing typical infostealer functionality, includes a web server suitable to create local phishing sites. https://isc.sans.edu/diary/Python%20InfoStealer%20with%20Embedded%20Phishing%20Webserver/31924 Android Update Fixes Freetype 0…
  continue reading
 
Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung s MagicInfo 9 CMS, was patched last August but attracted new attention last week after being mostly ignored so far. https://isc.sans.edu/diary/Mirai+No…
  continue reading
 
Steganography Challenge Didier published a fun steganography challenge. A solution will be offered on Saturday. https://isc.sans.edu/diary/Steganography+Challenge/31910 Microsoft Makes Passkeys Default Authentication Method Microsoft is now encouraging new users to use Passkeys as the default and only login method, further moving away from password…
  continue reading
 
Akron’s board of education accepted the resignation of the current superintendent and hired its next district leader without a search. It all happened in one very long meeting this week. Out is Michael Robinson who leaves after less than two years leading the district. An investigation found allegations that he bullied and intimidated staff were cr…
  continue reading
 
Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
  continue reading
 
Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
  continue reading
 
Every week, the ENDS team enters the ECO Chamber to discuss the UK’s biggest green news stories and bring you up to speed on the latest developments in environmental policy. This week, ENDS journalists discuss: The accusations levelled against Natural England chief executive Marian Spain who has been described as having an “epic misunderstanding” o…
  continue reading
 
In this episode of Banking on Innovation, David M. Brear, CEO of 11:FS, joins Jody Bhagat, President of Global Banking at Personetics, to share his bold vision for the future of banking. As customers demand more personalized, value-driven engagement, banks must move beyond product promotions to deliver intelligent, contextual experiences. This conv…
  continue reading
 
More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
  continue reading
 
SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
  continue reading
 
Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
  continue reading
 
Cleveland Mayor Justin Bibb delivered his state of the city Wednesday and said the city needs to be resilient due to cuts and proposed cuts from the Trump administration and Congress. Washington is not coming to save us, the mayor said. He touched on the accomplishments made in his first term and touched on a number of other topics. Bibb said the c…
  continue reading
 
Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
  continue reading
 
Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
  continue reading
 
Catholics worldwide are mourning the death of Pope Francis. The 88-year-old pontiff died Monday, one day after he blessed the Easter crowds gathered in Rome. Pope Francis leaves behind a legacy of social justice with his primary concern for the world's poor and a focus on environmental stewardship.By Ideastream Public Media
  continue reading
 
Every week, the ENDS team enters the ECO Chamber to discuss the UK’s biggest green news stories and bring you up to speed on the latest developments in environmental policy. This week, ENDS journalists discuss: The attempts being made by MPs to amend the controversial Planning and Infrastructure Bill. How documents obtained by ENDS have revealed th…
  continue reading
 
xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
  continue reading
 
It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL. https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%2…
  continue reading
 
Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widesp…
  continue reading
 
The board of the Akron Public Schools placed Superintendent Michael Robinson on paid administrative leave this week after an independent investigation found credible allegations of abusive behavior, bullying and retaliation toward staff. The board held a special meeting this week after receiving the report. Robinson signed a five-year contract with…
  continue reading
 
RedTail: Remnux and Malware Management A description showing how to set up a malware analysis in the cloud with Remnux and Kasm. RedTail is a sample to illustrate how the environment can be used. https://isc.sans.edu/diary/RedTail%2C%20Remnux%20and%20Malware%20Management%20%5BGuest%20Diary%5D/31868 Critical Erlang/OTP SSH Vulnerability Researchers …
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play