Fortinet’s cybersecurity podcast provides highlights and commentary about securing the largest enterprise, service provider, and government organizations around the world. Join Fortinet’s top experts as they discuss today’s most important cybersecurity topics. The Fortinet Security Fabric platform addresses the most critical security challenges and protect data across the entire digital infrastructure, whether in networked, application, multi-cloud or edge environments. Both a technology com ...
…
continue reading
A K12TechPro Podcast. This podcast is about trending K12 technology topics and issues. Josh, Chris, and Mark have real conversations, real arguments, and real banter on IT issues and trends in K12 Schools. Current and Past Sponsors: Absolute, HPE Aruba Networking, Blocksi, ClassLink, CTL, Eaton, Extreme Networks, Fortinet, Howard Technology Solutions, iDoc, Infoblox, INVZBL, Jupiter Education, K12TechPro, Luma Technologies, Managed Methods, MidwestTechTalk, NTP, Papercut, Provision Data Solu ...
…
continue reading
Series devoted to the education and general discussion around the Fortinet technology fabric.
…
continue reading
The podcast about Fortinet technology. Episodes can be found at forticast.fortinet.com.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Intelligent Wealth Podcast is about investing in great businesses with Tony Byrne, Awet Ghirmay, and Carl Roberts.
…
continue reading
Tech Bytes are short sponsored audio segments that appear at the end of Network Break episodes. We also separate them into this standalone feed so it’s easy to stay in the loop on new vendor developments.
…
continue reading
Take a listen to the #LighthouseITPodcast every other week as we discuss both cybersecurity and digital marketing news! It's time to stop dreaming IT. Let's start doing IT. #GetLITS
…
continue reading
The FortiGuard Labs Threat Intelligence Podcast provides highlights and commentary about the ever-evolving cyber threat landscape. Join Fortinet’s top threat experts as they delve into today’s critical cybersecurity topics. FortiGuard Labs is the global threat intelligence and research organization at Fortinet. Its mission is to provide customers the industry’s best threat intelligence to protect them from malicious cyberattacks. Using millions of global network sensors, FortiGuard Labs moni ...
…
continue reading
Joe House and Nathan Hubbard break down the latest headlines in the world of golf, with special guests, coverage of the major championships, and all the drama in the sport. Welcome to Fairway Rollin'!
…
continue reading
Want to hear what industry experts really think about the cyber threats they face? ShadowTalk is a weekly cybersecurity podcast, made by practitioners for practitioners, featuring analytical insights on the latest cybersecurity news and threat research. Threat Intelligence Analyst Kim Bromley brings over 15 years of experience in threat intelligence across the public and private sectors. Kim and her guests provide practical perspectives on the week’s top cybersecurity news and share knowledg ...
…
continue reading
Interviewing partner experts, I get to ask the questions and get personal insights into the topics we all talk about; game-changing technologies that construct this complex matrix of information that we frequently use as we live, work and play.
…
continue reading
Welcome to "Powering SMB," the ultimate podcast dedicated to empowering small to medium-sized businesses (SMBs) with the knowledge, tools, and inspiration they need to thrive in today's competitive landscape. Hosted by XenTegra One, a leader in SMB-focused technology solutions, this podcast brings you insightful conversations with industry experts, thought leaders, and successful entrepreneurs who have mastered the art of powering SMBs to new heights. In each episode, we dive deep into the c ...
…
continue reading

1
The cybersecurity stock you can’t ignore in 2025 | Fortinet deep dive
31:40
31:40
Play later
Play later
Lists
Like
Liked
31:40Is Fortinet the future of cybersecurity investing? In this episode of the Intelligent Wealth Podcast, we deep dive into Fortinet (NASDAQ: FTNT) — one of the world’s fastest-growing cybersecurity companies with 31% annual returns since IPO! **Takeaways** 1. Why Fortinet ticks all the boxes for quality investing 2. The massive $14 trillion cybersecur…
…
continue reading

1
Black Basta's Enduring Legacy, Qilin Exploits Fortinet Flaws
29:55
29:55
Play later
Play later
Lists
Like
Liked
29:55Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Alex and John as they discuss: The Enduring Legacy of Black Basta Qilin's Exploitation of Fortinet Flaws Vishing for Salesforce Data Atomic Stealer x ClickFix Campaign Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Resear…
…
continue reading

1
SANS Stormcast Monday June 30th, 2025: Scattered Spider; AMI BIOS Exploited; Secure Boot Certs Expiring; Microsoft Resliliency Initiative
7:29
7:29
Play later
Play later
Lists
Like
Liked
7:29Scattered Spider Update The threat actor known as Scattered Spider is in the news again, this time focusing on airlines. But the techniques used by Scattered Spider, social engineering, are still some of the most dangerous techniques used by various threat actors. https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-…
…
continue reading

1
Scattered Spider, Handheld Wars, and the Future of AI Search
30:19
30:19
Play later
Play later
Lists
Like
Liked
30:19The Lighthouse IT Podcast - June 27th, 2025 This week, Matt and Griff dive into critical cyber alerts as the "Scattered Spider" group targets insurance firms and CISA issues urgent warnings for TP-Link and Zyxel devices. In the gaming world, a new handheld war begins with the Microsoft/Asus ROG Ally taking on the record-breaking Nintendo Switch 2. …
…
continue reading

1
Episode 220 - ISTE Preview and Summer Staff Transitions
39:48
39:48
Play later
Play later
Lists
Like
Liked
39:48Welcome to this week's episode with Chris and Mark (Josh is on vacation!). We give a sneak peek of ISTE and its EdTech index and the five quality indicators that are setting new standards for EdTech vendors. This episode also examines the timely topic of staff transitions over the summer, unpacking the challenges associated with tech handovers, acc…
…
continue reading

1
SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln;
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44 Bluetooth Vulnerability Could Allow Eavesdropping A vulnerability i…
…
continue reading

1
SANS Stormcast Thursday, June 26th, 2025: Another Netscaler Vuln; CentOS Web Panel Vuln; IP Based Certs
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 Remote code execution in CentOS Web Panel - CVE-2025-48703 An arbitrary file upload vulnerab…
…
continue reading

1
Analyzing Iran-Israel Cyber Threats, New Scattered Spider Attack Chain
34:49
34:49
Play later
Play later
Lists
Like
Liked
34:49Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with Intelligence Analyst Hayden and Threat Hunter Leo as they discuss: New Scattered Spider Attack Chain Israel and Iran Cyber Threat Deep Dive Top Iran-linked Threat Groups & How to Mitigate Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat Research…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each scans than they used to, but the average length of passwords did not change. https://isc.sans.edu/diary/Quick%20Pass…
…
continue reading

1
Tech Bytes: New From HPE Discover—Networking, AI, and More (Sponsored)
20:59
20:59
Play later
Play later
Lists
Like
Liked
20:59Today on the Tech Bytes podcast, sponsored by HPE, we get a preview of HPE Discover. We talk about networking, security, and agentic AI announcements coming out of the event. We’ll also talk about how HPE is converging network and security in its product portfolio, and HPE’s approach to AI both as a tool being... Read more »…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%20AtHome%20IP%20Cameras/32062 Critical Netscaler Security Update CVE-2025-5777 CVE 2025-5777 is a critical severity vu…
…
continue reading

1
SANS Stormcast Monday, June 23rd, 2025: ADS and Python; More Secure Cloud PCs; Zend.to Path Traversal; Parser Differentials
5:36
5:36
Play later
Play later
Lists
Like
Liked
5:36ADS & Python Tools Didier explains how to use his tools cut-bytes.py and filescanner to extract information from alternate data streams. https://isc.sans.edu/diary/ADS%20%26%20Python%20Tools/32058 Enhanced security defaults for Windows 365 Cloud PCs Microsoft announced more secure default configurations for its Windows 365 Cloud PC offerings. https…
…
continue reading

1
Episode 219 - Do you enable GenAI tools for all age levels?
46:12
46:12
Play later
Play later
Lists
Like
Liked
46:12Join Josh, Chris, and Mark for Episode 219! We dive into the latest news, including the State of Maine's Yubikey deployment, the reintroduction of KOSA, and Google's Gemini and NotebookLM now available for K12. Plus, we'll cover the ongoing E-rate decision. Our main topic for this episode: How are you deploying AI in your district now that major LL…
…
continue reading

1
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, N…
…
continue reading

1
Israel-Iran Cyber Warfare, Anubis Ransomware, and More Attacker Trends
36:07
36:07
Play later
Play later
Lists
Like
Liked
36:07Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analyst Joey and detection engineer Marken as they discuss: Anubis Ransomware Wiper Capability Teamfiltration Pentesting Tool Cyber Implications of Israel-Iran Conflict The Most Up to Date Attacker Trends Kim Bromley: Senior Cyber Threat Intelligence Analyst on …
…
continue reading

1
SANS Stormcast Monday, June 16th, 2025: Extracting Data from JPEG; Windows Recall Export; Anubis Wiper; Mitel Vuln and PoC
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider build for Windows 11, Microsoft is testing an export feature for data stored by Recall. The feature is limited to European …
…
continue reading
House and Hubbard fire up the microphones after the conclusion of the U.S. Open as J.J. Spaun secured the first major win of his career (0:00). Then, they share their thoughts on the course and its conditions (0:45). Later they discuss Bryson DeChambeau missing the cut (23:35) and Rory McIlroy’s behavior through the weekend (28:35) The Ringer is co…
…
continue reading

1
SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://unit42.paloaltonetworks.com/malicious-javascript-using-jsfiretruck-as-obfuscation/ JavaScript obfuscated with JSF*CK is bei…
…
continue reading

1
Claude 4, Forever Trials, Gen Z Data Deals, LinkedIn Algorithm & SEO 2.0
33:27
33:27
Play later
Play later
Lists
Like
Liked
33:27The Lighthouse IT Podcast - June 13th, 2025 This week, Matt and Griff discuss the future of AI, spacey software loopholes, Apples rebranding, Gen Z's surprising take on data privacy and why your LinkedIn post probably isn't going viral. https://hub.lighthousesol.com/blog/lighthouse-podcast-2/claude-4-forever-trials-gen-z-data-deals-linkedin-algorit…
…
continue reading

1
Warren Buffett steps down: Should you still invest in Berkshire Hathaway?
36:06
36:06
Play later
Play later
Lists
Like
Liked
36:06Welcome to the Intelligent Wealth Podcast! In this episode, we dive deep into Warren Buffett’s legacy, the future of Berkshire Hathaway, and whether it’s still a smart investment in 2025. With Buffett stepping down as CEO after nearly 60 years, investors are asking: Is it time to hold, buy more, or move on? We explore Buffett's investing philosophy…
…
continue reading

1
Episode 218 - Rethinking Guest WiFi (Without Mark)
43:53
43:53
Play later
Play later
Lists
Like
Liked
43:53On this week's episode, Chris and Josh discuss guest WiFi, in particular whether or not to offer it to students during the school day, new employees (training, accounts, and more), and tech dept vacation days. https://www.the74million.org/article/school-districts-unaware-boarddocs-software-published-their-private-files/ https://www.bleepingcomputer…
…
continue reading

1
SANS Stormcast Friday, June 13th, 2025: Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln;
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot…
…
continue reading

1
SANS Stormcast Thursday, June 12th, 2025: Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; Connectwise Signing Keys; KDE Telnet code exec
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows…
…
continue reading

1
SANS Stormcast Wednesday, June 11th, 2025: Microsoft Patch Tuesday; Acrobat Patches
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20June%202025/32032 Adobe Vulnerabilities Adobe relea…
…
continue reading

1
2025 U.S. Open Preview, Picks, and Sleepers With Justin Ray!
1:09:52
1:09:52
Play later
Play later
Lists
Like
Liked
1:09:52House and Hubbard are joined by Twenty First Group’s Justin Ray to preview the U.S. Open! They start off with the top contenders for the major (00:48), before delving into their thoughts on their favorite plays for rest of the field (41:02), and more (54:16). Finally, they predict who will win the U.S. Open (58:12). The Ringer is committed to respo…
…
continue reading

1
SANS Stormcast June, Tuesday, June 10th, 2025: Octosql; Mirai vs. Wazuh DNS4EU; Wordpress Fair Package Manager
6:09
6:09
Play later
Play later
Lists
Like
Liked
6:09OctoSQL & Vulnerability Data OctoSQL is a neat tool to query files in different formats using SQL. This can, for example, be used to query the JSON vulnerability files from CISA or NVD and create interesting joins between different files. https://isc.sans.edu/diary/OctoSQL+Vulnerability+Data/32026 Mirai vs. Wazuh The Mirai botnet has now been obser…
…
continue reading

1
SANS Stormcast June, June 9th, 2025: Extracting PNG Data; GlueStack Packages Backdoor; MacOS targeted by Clickfix; INETPUB restore script
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022 16 React Native Packages for GlueStack Backdoored Overnight 16 npm packages with over a million weekly downloads between them were compro…
…
continue reading
On this week's episode, hosts Josh, Chris, and Mark discuss the Dept of Education's proposed budget and what the cuts could mean for K-12 education. Many of the programs may seem distant from our world but the trickle-down effects could be felt immediately for many districts. We also dive into some additional changes at the FCC as well as MS-ISAC, …
…
continue reading

1
SANS Stormcast Friday, June 6th, 2025: Fake Zoom Clients; Python tarfile vulnerability; HPE Insight Remote Support Patch
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01Be Careful With Fake Zoom Client Downloads Miscreants are tricking victims into downloading fake Zoom clients (and likely other meeting software) by first sending them fake meeting invites that direct victims to a page that offers malware for download as an update to the Zoom client. https://isc.sans.edu/diary/Be%20Careful%20With%20Fake%20Zoom%20Cl…
…
continue reading

1
SANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerability Details Released
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://is…
…
continue reading

1
Scattered Spider's Evolving Playbook, SentinelOne Outage
27:36
27:36
Play later
Play later
Lists
Like
Liked
27:36Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Scattered Spider's Focus on Tech Vendors How APT41 Abuses Google Calendar for C2 The SentinelOne Outage A New Void Blizzard Espionage Campaign Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat …
…
continue reading

1
SANS Stormcast Wednesday, June 4th, 2025: vBulletin Exploited; Chrome 0-Day Patch; Roundcube RCE Patch; Multiple HP StoreOnce Vulns Patched
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%…
…
continue reading

1
SANS Stormcast Tuesday, June 3rd, 2025: Windows SSH C2; Google Removes CAs from trusted list; MSFT issues Emergency Patch to fix Crash issue; Qualcom Adreno GPU 0-day
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
…
continue reading

1
Tech Bytes: NetFlow Optimizer: More Insights, Less Flow Volume (Sponsored)
17:25
17:25
Play later
Play later
Lists
Like
Liked
17:25Today on the Tech Bytes podcast, we talk about how to get more out of your NetFlow records with sponsor NetFlow Logic. NetFlow’s been around for a long time, and if you’re already including flow records as part of your monitoring and management arsenal, you may think you’re extracting all the value you can from... Read more »…
…
continue reading

1
SANS Stormcast Monday, June 2nd, 2025: PNG with RAT; Cisco IOS XE WLC Exploit; vBulletin Exploit
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently p…
…
continue reading

1
Holy Cards, Cheating Grads, Coinbase Bribery, Buying 23andMe & IT Cuts
47:29
47:29
Play later
Play later
Lists
Like
Liked
47:29The Lighthouse IT Podcast - May 30th, 2025 This week, Matt and Griff talk about how HBO is renaming itself again, the Pope's trading card craze, Collage students using AI to "cheat", Apple and BYOD, Coinbase's breach due to bribery, Regeneron buying 23andMe, why your IT budget might be dangerously low, and much more! https://hub.lighthousesol.com/b…
…
continue reading

1
This stock beat Amazon by 3x – But you’ve never heard of it
31:58
31:58
Play later
Play later
Lists
Like
Liked
31:58Welcome to the Intelligent Wealth Podcast! In this episode, we uncover one of the most powerful and under-the-radar companies in the world — Mercado Libre, often called the "Amazon + PayPal + Shopify of Latin America." 👉 If you had invested just $10,000 eighteen years ago, you'd have nearly $1 million today. But this e-commerce and fintech giant is…
…
continue reading

1
Episode 216 - How do you handle a curious or mischievous tech student?
50:40
50:40
Play later
Play later
Lists
Like
Liked
50:40Tune in for an engaging chat about the latest educational AI updates from Microsoft, which include new tools and changes, such as Microsoft co-pilot chat features for students aged 13 and up. The discussion also touches on the dynamics of summer school technology mishaps. The hosts also discuss how to handle students' tech misadventures, exploring …
…
continue reading

1
SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2;
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
…
continue reading

1
SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
…
continue reading

1
The Revelation of Ben Griffin, Tour Championship Changes, and Memorial Tournament Preview!
51:46
51:46
Play later
Play later
Lists
Like
Liked
51:46House and Hubbard tee off with their recap of the Charles Schwab Challenge, including Ben Griffin’s win (00:52), Then, they hit on Ryder Cup team positioning (05:40), potential driver testing (10:54), and Tour Championship changes (18:06). Finally, they preview and offer their favorite plays for the Memorial Tournament (26:55). The Ringer is commit…
…
continue reading

1
SPECIAL: How Russian Market Fuels Credential-Based Attacks
44:17
44:17
Play later
Play later
Lists
Like
Liked
44:17Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Kim along with intelligence analysts Joey and Alex as they discuss: Factors Driving Russian Market's Popularity Attackers' Favorite Infostealers Infostealer Attack Paths Main Types and Exclusivity of Stolen Logs Kim Bromley: Senior Cyber Threat Intelligence Analyst on the ReliaQuest Threat…
…
continue reading

1
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
…
continue reading

1
SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
…
continue reading

1
Episode 215 - PowerSchool Hacker Has Been Caught!
49:27
49:27
Play later
Play later
Lists
Like
Liked
49:27Josh and Mark dive into the arrest of the notorious PowerSchool hacker, revealing the unexpected identity of the mastermind behind one of the year's biggest cyber breaches. Join them as they speak with cybersecurity expert Michael Klein, who provides insights into the hacker's profile and discusses the implications for school districts and policyma…
…
continue reading

1
SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
…
continue reading

1
SANS Stormcast Thursday, May 22nd 2025: Crypto Confidence Scams; Extension Mayhem for VS Code and Chrome
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive VIP memberships to withdraw the money. https://isc.sans.edu/diary/New%20Variant%20of%20Crypto%20Confidence%20Scam/31968 Malicious Chrome Extensions Malici…
…
continue reading

1
The Threat Evolution: SAP Exploits, SEO Poisoning, and SkitNet Malware
29:03
29:03
Play later
Play later
Lists
Like
Liked
29:03Resources: https://linktr.ee/ReliaQuestShadowTalk Join host Joey along with intelligence analysts John and Hayden as they discuss: ReliaQuest's investigation into hijacked routers and SEO poisoning fueling payroll heists Nation-state actors leveraging the SAP NetWeaver vulnerability en masse A new "Defendnot" tool that tricks Windows Defender into …
…
continue reading

1
SANS Stormcast Wednesday, May 21st 2025: Researchers Scanning the Internet; Forgotten DNS Records; openpgp.js Vulneraiblity
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do offer lists of researchers and just added three new groups today https://isc.sans.edu/diary/Researchers%20Scanning%20the%20Intern…
…
continue reading

1
The PGA Championship Afterglow and Charles Schwab Challenge Preview!
45:02
45:02
Play later
Play later
Lists
Like
Liked
45:02House and Hubbard are back with their final thoughts from the PGA Championship and discuss whether it’s weird that we still haven’t heard from Rory McIlroy after his lackluster performance (01:16). They also discuss Scottie Scheffler’s win and why his competitive spirit sets him apart from the field (09:34). Finally, they preview and offer their fa…
…
continue reading