Endpoint Management Today is a podcast brought to you by Rhonda and James from the BigFix team. Listen in to understand how IT operations and security teams fully automate discovery, management and remediation of endpoints – whether on-premise, virtual, or cloud – regardless of operating system, location or connectivity. Hear from technical experts, customers, thought leaders and more as we bring you new episodes each month. FIND more. FIX more. DO more.
…
continue reading
…
continue reading
The daily cybersecurity news and analysis industry leaders depend on. Published each weekday, the program also includes interviews with a wide spectrum of experts from industry, academia, and research organizations all over the world.
…
continue reading
The Agency Uplift Podcast: Agency Scaling Strategies & Growth Tips Unlock proven frameworks, AI‑powered workflows, and client acquisition blueprints to scale your digital agency from freelance to Fortune. Each week, host Sean Lang, co‑founder of Social Commerce Club and agency growth coach, sits down with a wide array of agency leaders—sharing battle‑tested tactics on profitability, processes, and people management. Whether you’re aiming to double client retention, streamline operations, or ...
…
continue reading
Soul Soiree is a weekly podcast hosted by Danielle Brooker, from The Daisy Patch, which helps people who are stuck—wanting to reclaim their lives from ‘busy’ and reconnect with themselves. This podcast is a celebration of bringing out more of ourselves. We share tips and insights to reconnect to your inner spark & interviews Soulful Inspirers who are creating more of what they want in their lives – all so you too can embrace and live your life more fully. This is about balance, wellness, not ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
That's Theatre Darling is a podcast celebrating theatre in all it's glory. I'll be joined by a whole host of inspiring guests, each with a story to tell about their life, career and an abundance of theatrical anecdotes. -Music kindly provided by the wonderful Patch and The Giant. Find more of their music at https://www.patchandthegiant.com/ [Track: Patch and The Giant - The Sleeping Boat] Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
5 Bytes Podcast features some of the highlights in enterprise IT for the last week as well as some useful resources for IT Pros and more!
…
continue reading
Bradley Chambers and various experts discuss the latest with Apple in the enterprise and K-12. New episodes come out bi-weekly on Tuesday.
…
continue reading
What if you could get a no-nonsense look at security solutions in just 15 minutes? Security You Should Know, the latest podcast from the CISO Series, does just that. Hosted by Rich Stroffolino, each episode brings together one security vendor and two security leaders to break down a real-world problem and the solution trying to fix it. Expect straight answers on: How to explain the issue to your CEO What the solution actually does (and doesn’t do) How the pricing model works Then, our securi ...
…
continue reading
Anesthesiology News will be publishing a new season of our popular podcast series, “On the Case” and “Ask the Experts.” “On the Case” is a review series that features the authors of our popular case report series. We hear the behind-the-scenes story on the most unique clinical case studies published in the magazine directly from the professionals who managed them. The first episode of this new season features an interview with L. Jane Stewart, MD, JD, MPH, who co-wrote a case report about a ...
…
continue reading

1
Security Insights - Cybersecurity for Real-World Workplaces
Ivanti: Cybersecurity and Information Technology Solutions
Welcome to Security Insights, where best-practice cybersecurity meets the real-world risks facing workplaces every day. Ivanti's VP of Product Management, Chris Goettl, brings in a rotating cast of guests to discuss the strategies and tactics that truly matter to the security teams protecting organizations, agencies and businesses like yours.
…
continue reading
This show interviews the “smart money” (large money managers & CEOs) for timeless investing advice. My goal is to provide you with timeless/actionable advice that you can use to make smarter investment decisions, and help you become intellectually wealthy. The Host: Adam Sarhan, Author, Investor, and Forbes Contributor, interviews real money managers with over $100 million in assets under management (AUM) and CEOs for timeless advice. Disclaimer: All our work is general in nature and for edu ...
…
continue reading
Welcome to the Flexera Security Vulnerability Insight Podcast, your go-to source for all things related to cybersecurity, software vulnerabilities, and threat intelligence. In this engaging podcast series, we will dive deep into the ever-evolving world of digital security, providing you with valuable insights, expert interviews, and the latest industry trends. Hosted by Jeroen Braak and leading experts in the field, each episode explores critical topics such as: Vulnerability Management: Sta ...
…
continue reading
A podcast dedicated to the past, present, and future of the higher education industry. Featuring in-depth conversations with some of our nation’s higher education leaders.
…
continue reading
We have plenty of people within Foundation IT that like to talk and like to talk technology. What better way to share our knowledge, our frustrations and our thoughts for the future than via a podcast. Technology, specifically IT infrastructure, remains under invested in; whilst as a nation we responded brilliantly to the pandemic in terms of homeworking, many businesses cobbled something together and made do. With a mixture of podcast guests we’ll be tackling some of the technology challeng ...
…
continue reading
Welcome to the Backend Engineering Show podcast with your host Hussein Nasser. If you like software engineering you’ve come to the right place. I discuss all sorts of software engineering technologies and news with specific focus on the backend. All opinions are my own. Most of my content in the podcast is an audio version of videos I post on my youtube channel here http://www.youtube.com/c/HusseinNasser-software-engineering Buy me a coffee https://www.buymeacoffee.com/hnasr 🧑🏫 Courses I Te ...
…
continue reading
The Self Mastery Show documents the journey of internet-entrepreneur, David Wong on the path towards becoming the best version of himself. Join us in discovering your potential and definition of self mastery. David shares the lessons, struggles and feelings along his journey and also interviews like-minded individuals, thought leaders and influential celebrities to share their story. The Self Mastery Show is for you whether you're going through a bit of a rough patch in life or are already l ...
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Downtime Procedures is the podcast where healthcare innovation meets human ingenuity. Hosted by Rich G. Kenny, Chief Clinical Officer at Veritas Labs, and Dr. Dan Weberg, a healthcare leader with expertise in innovation and transformation, this show dives into the real stories behind healthcare’s operational challenges. Each week features candid conversations with executives, frontline leaders, and innovators tackling everything from workforce transformation to crisis management. Hear how sy ...
…
continue reading
The Shift is a regular podcast series produced by DemandFarm that brings strategic sales and account management leaders from global companies, as guests, to share their stories & experiences about the transition to digital Key Account Management. Increasingly, as customers prefer their B2B Sales interactions to remain virtual, Key Account Management has also shifted towards a virtual direction where technology comes to the forefront as a key differentiator and enabler. Account Managers and S ...
…
continue reading
The Hormone Solutions Podcast with Karen Martel is your ultimate guide to understanding the complexities of hormone health, hormone replacement therapy (HRT), and optimizing your health in midlife. Hosted by Karen Martel, known as the “Hormone Whisperer,” this podcast taps into her deep understanding of hormones—something that sets her apart from most practitioners. As a Certified Hormone Specialist, Transformational Nutrition Coach, speaker, podcaster, and passionate advocate for women’s he ...
…
continue reading
Safeguarding Your Business in the Digital Age Welcome to The Cyberdap Podcast, your go-to resource for navigating the complex world of cybersecurity tailored specifically for small and medium business owners. In an era where digital threats lurk around every corner, staying ahead of cyber attacks is paramount to the success and security of your business. Join us as we delve deep into the ever-evolving landscape of cybersecurity, shedding light on the latest threats, vulnerabilities, and atta ...
…
continue reading
SAM is the leading provider of cloud-native security and intelligence services for unmanaged networks and IoTs, covering upwards of 500 million connected devices globally. With its powerful and intuitive AI technology, SAM addresses the challenges of our hyperconnected world, in which an explosion of IoT devices exposes potential attack surfaces for companies and consumers alike. SAM's device-agnostic software provides deep network visibility to not only protect against sophisticated cyber- ...
…
continue reading
Join Director of Security Research, Neil Weitzel, for the Cygilant Cybersecurity Podcast. We’ve decided to create this cast to discuss security trends and best practices. Future casts will feature hot topics in security news, best practices, information from Cygilant labs and interviews with industry experts.
…
continue reading
This Week in Enterprise Tech explores the complex, cutting edge world of enterprise technology. Hosted by Lou Maresca, TWiET features IT professionals explaining the ins and outs of enterprise solutions. Although the show is no longer in production, you can enjoy episodes from our archives.
…
continue reading
We are a show about nature’s role in tackling climate change. A new industry is taking shape, and our goal is to host a candid, cross-disciplinary conversation on nature and its role in addressing climate change. We are three friends with diverse backgrounds who met in business school at Stanford and share a common interest in demystifying natural climate solutions. Together, we’ll unpack this growing field and connect the dots across the people and ideas shaping its future. Whether you work ...
…
continue reading

1
The Evolution of Patch Management with Eric Schultze
24:02
24:02
Play later
Play later
Lists
Like
Liked
24:02Join us for a stroll down patch memory lane! Ivanti's Chris Goettl invites an old colleague to the show -- Eric Schultze, a former software development leader at Amazon, Microsoft, and Shavlik Technologies -- to look back on the early days of Patch Tuesday and how patch management has evolved over the decades since. Join the conversation online on …
…
continue reading

1
Q&A With Karen: TRT Side Effects, Stubborn Weight, Fibroids & Estrogen, Timing Effects of HRT, Post 10 Years HRT Use, Period Cramps, Progesterone Troches and More!
1:02:18
1:02:18
Play later
Play later
Lists
Like
Liked
1:02:18Get ready for another insightful Q&A episode featuring your questions! Curious about hormone health and its impact on your well-being? Ever wondered why testosterone cream might cause pesky side effects like acne or hair growth? We discuss potential solutions and alternatives to consider. Struggling with weight gain or stubborn weight loss during m…
…
continue reading

1
Signed, sealed, exploitable. [Research Saturday]
19:22
19:22
Play later
Play later
Lists
Like
Liked
19:22Dustin Childs, Head of Threat Awareness at Trend Micro Zero Day Initiative, joins to discuss their work on "ZDI-23-1527 and ZDI-23-1528: The Potential Impact of Overly Permissive SAS Tokens on PC Manager Supply Chains." The research explores two critical vulnerabilities (ZDI-23-1527 and ZDI-23-1528) that could have enabled attackers to hijack the M…
…
continue reading
An historic data breach that wasn’t. Aflac says it stopped a ransomware attack. Cloudflare thwarts a record breaking DDoS attack. Mocha Manakin combines clever social engineering with custom-built malware. The Godfather Android trojan uses a sophisticated virtualization technique to hijack banking and crypto apps. A British expert on Russian inform…
…
continue reading

1
Ep 38: Are You Losing Money on Clients? Two Steps to Financial Clarity
9:07
9:07
Play later
Play later
Lists
Like
Liked
9:07Key Takeaways Implementing Profit First creates essential financial clarity and structure Separate your revenue into 4 simple accounts: OpEx, Owner’s Comp, Taxes, and Profit Most agency owners unknowingly overspend and underpay themselves Tracking profitability per client reveals which clients are profitable vs. loss-making Use a basic Google Sheet…
…
continue reading

1
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, N…
…
continue reading

1
SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords (#)
5:47
5:47
Play later
Play later
Lists
Like
Liked
5:47SANS Stormcast Friday, June 20th, 2025: New Employee Phishing; Malicious Tech Support Links; Social Engineering App Sepecific Passwords How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.s…
…
continue reading

1
Juneteenth: Reflecting, belonging, and owning your seat at the table. [Special Edition]
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26We put together an open conversation between our podcast hosts, CyberWire Daily's Dave Bittner, T-Minus Space Daily’s Maria Varmazis, and CISO Perspectives podcast’s Kim Jones. Their conversation goes deeper than just the historical significance of Juneteenth, diving into candid conversations on allyship, representation, and the enduring value of d…
…
continue reading
Viasat confirms it was breached by Salt Typhoon. Microsoft’s June 2025 security update giveth, and Microsoft’s June 2025 security update taketh away. Local privilege escalation flaws grant root access on major Linux distributions. BeyondTrust patches a critical remote code execution flaw. SMS low cost routing exposes users to serious risks. Erie In…
…
continue reading

1
Ep 37: Niche Down, Level Up: Why Specialization Changed Everything for This Agency, with Chase Clymer of Electric Eye
34:23
34:23
Play later
Play later
Lists
Like
Liked
34:23Key Takeaways Chase transitioned from music and photography into digital freelancing before co-founding Electric Eye. The agency became “real” after three years, shaped by key books like Built to Sell, Profit First, and Traction. Niching down into Shopify design and development significantly improved operations, profitability, and client fit. Partn…
…
continue reading
A House oversight committee requests DOGE documents from Microsoft. Predatory Sparrow claims a cyberattack on an Iranian bank. Microsoft says data that happens in Europe will stay in Europe. A complex malware campaign is using heavily obfuscated Visual Basic files to deploy RATs. A widely used CMS platform suffers potential RCE bugs. North Korea’s …
…
continue reading

1
This $450M Money Manager Uses Stocks & Options To Gain An Edge In The Market - Meet Paul S. Stanley
23:29
23:29
Play later
Play later
Lists
Like
Liked
23:29This $450M Money Manager Uses Stocks & Options To Gain An Edge In The Market - Meet Paul S. Stanley Managing Partner At Granite Bay Wealth Management Guest: Paul S. Stanley, CFP®, CPM® Managing Partner At Granite Bay Wealth Management $450M AUM Website: https://granitebaywm.com/ Bio: Paul graduated from Bentley College with a Bachelor’s in Economic…
…
continue reading

1
Quick Hits: The Dark Side of Estrogen: Managing Environmental Xenoestrogen Toxicity with Julie Donaldson
20:39
20:39
Play later
Play later
Lists
Like
Liked
20:39Welcome to Quick Hits: Blasts from The Past. Join Karen as she explores her podcast archives, offering you short, impactful excerpts from standout episodes. In just 15 minutes, you'll experience the essence of past conversations, packed with valuable insights and memorable moments from our guests. If you want to dive deeper, you'll find links to th…
…
continue reading

1
Breaking down multi-display support on the Mac
23:35
23:35
Play later
Play later
Lists
Like
Liked
23:35Apple @ Work is exclusively brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that integrates in a single professional-grade platform all the solutions necessary to seamlessly and automatically deploy, manage & protect Apple devices at work. Over 45,000 organizations trust Mosyle to make millions of Apple device…
…
continue reading

1
SANS Stormcast Monday, June 16th, 2025: Extracting Data from JPEG; Windows Recall Export; Anubis Wiper; Mitel Vuln and PoC
5:46
5:46
Play later
Play later
Lists
Like
Liked
5:46Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider build for Windows 11, Microsoft is testing an export feature for data stored by Recall. The feature is limited to European …
…
continue reading

1
Managing Tough Client Talks: Lessons from a $20 Billion AUM Firm
27:49
27:49
Play later
Play later
Lists
Like
Liked
27:49Description: In this episode, Johnson Investment Counsel’s managing director Chad Maggard joins Adam in a conversation about getting started in wealth management, a snapshot of the industry today and strategies for navigating tough client conversations. Chad shares his perspective on building trust, addressing client concerns and delivering value —…
…
continue reading

1
Ep 36: Inside a Latin American Agency: Growth, Challenges, and Opportunities with Ale Zanetti
26:40
26:40
Play later
Play later
Lists
Like
Liked
26:40Key Takeaways Ale started his career as an engineer and later transitioned into marketing with a data-driven mindset. Orkesta specializes in helping eCommerce and SaaS companies with performance marketing and full-funnel strategy. The agency has evolved to include creative services, video content, and AI integration to stay competitive. AI is viewe…
…
continue reading

1
SANS Stormcast Monday, June 16th, 2025: Extracing Data from JPEG; Windows Recall Export; Anubis Wiper; Mitel Vuln and PoC (#)
5:47
5:47
Play later
Play later
Lists
Like
Liked
5:47SANS Stormcast Monday, June 16th, 2025: Extracing Data from JPEG; Windows Recall Export; Anubis Wiper; Mitel Vuln and PoC Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider b…
…
continue reading

1
Darknet drug marketplace closed for business.
37:24
37:24
Play later
Play later
Lists
Like
Liked
37:24International law enforcement takes down a darknet drug marketplace. The Washington Post is investigating a cyberattack targeting several journalists' email accounts. Anubis ransomware adds destructive capabilities. The GrayAlpha threat group uses fake browser update pages to deliver advanced malware. Researchers uncover a stealthy malware campaign…
…
continue reading

1
SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://unit42.paloaltonetworks.com/malicious-javascript-using-jsfiretruck-as-obfuscation/ JavaScript obfuscated with JSF*CK is bei…
…
continue reading

1
Microsoft 365 Authentication Issues! Danish Agency to Ditch Office! June Update Issue!
12:28
12:28
Play later
Play later
Lists
Like
Liked
12:28On this episode, I provide an update on the recent Windows updates and report of an issue caused by one of the updates. I cover some new enhancements from OpenAI, the culmination of a 4 year study into remote work and more!Reference Links:https://www.rorymon.com/blog/microsoft-365-authentication-issues-danish-agency-to-ditch-office-june-update-issu…
…
continue reading

1
SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil (#)
6:45
6:45
Play later
Play later
Lists
Like
Liked
6:45SANS Stormcast Monday, June 16th, 2025: Katz Stealer in JPG; JavaScript Attacks; Reviving expired Discord Invites for Evil Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://…
…
continue reading

1
Mark Nunnikhoven: Providing clarity about security. [Cloud strategy]
8:53
8:53
Play later
Play later
Lists
Like
Liked
8:53Please enjoy this encore of Career Notes. Distinguished Cloud Strategist at Lacework, Mark Nunnikhoven, has gone from taking technology to its limits for his own understanding to providing clarity about security for others. Mark fell in love with his Commodore 128 and once he realized he could bend the machine to his will, it set him on the path to…
…
continue reading

1
Prep Like a Pro: HRT, Peptides & Nutrition Hacks to Crush Surgery Recovery and Combat Osteoarthritis in Menopause with Zora Benhamou
1:24:39
1:24:39
Play later
Play later
Lists
Like
Liked
1:24:39Curious about how estrogen affects your joint health during menopause? Ever wondered if there's a link between biohacking and managing osteoarthritis? In this episode, join us as we delve into the world of peptides and surgery recovery with Zora Benhamou, a gerontologist and healthy aging coach. Discover how you can empower yourself with practical …
…
continue reading
This week, Dave is joined by Ziv Karliner, Pillar Security’s Co-Founder and CTO, sharing details on their work on "New Vulnerability in GitHub Copilot and Cursor: How Hackers Can Weaponize Code Agents." Vibe Coding - where developers use AI assistants like GitHub Copilot and Cursor to generate code almost instantly - has become central to how e…
…
continue reading
Cloudflare says yesterday’s widespread outage was not caused by a cyberattack. Predator mobile spyware remains highly active. Microsoft is investigating ongoing Microsoft 365 authentication services issues. An account takeover campaign targets Entra ID users by abusing a popular pen testing tool. Palo Alto Networks documents a JavaScript obfuscatio…
…
continue reading

1
Ep 35: The Agency Leaky Bucket: How to Patch Churn Before It Sinks You
12:57
12:57
Play later
Play later
Lists
Like
Liked
12:57Key Takeaways Client churn often feels sudden but usually stems from deeper issues than just performance. Reacting to churn with more sales efforts alone treats the symptom, not the cause. Real solutions come from diagnosing and addressing foundational operational and leadership gaps. Agencies must assess fit and alignment with their ICP before onb…
…
continue reading
Fundamentals of Operating Systems Course https://oscourse.winktls is brilliant.TLS encryption/decryption often happens in userland. While TCP lives in the kernel. With ktls, userland can hand the keys to the kernel and the kernel does crypto. When calling write, the kernel encrypts the packet and send it to the NIC.When calling read, the kernel dec…
…
continue reading

1
SANS Stormcast Friday, June 13th, 2025: Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln;
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot…
…
continue reading

1
SANS Stormcast Friday, June 13th, 2025: Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln; (#)
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43SANS Stormcast Friday, June 13th, 2025: Honeypot Scripts; EchoLeak MSFT Copilot Vuln; Thunderbolt mailbox URL Vuln; Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copi…
…
continue reading
Interpol’s Operation Secure dismantles a major cybercrime network, and Singapore takes down scam centers. GitLab patches multiple vulnerabilities in its DevSecOps platform. Researchers unveil a covert method for exfiltrating data using smartwatches. EchoLeak allows for data exfiltration from Microsoft Copilot. Journalists are confirmed targets of P…
…
continue reading

1
SANS Stormcast Thursday, June 12th, 2025: Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; Connectwise Signing Keys; KDE Telnet code exec
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows…
…
continue reading

1
Apple Announcements from WWDC! Patch Tuesday News! Grim Job Forecast for IT Pros!
23:19
23:19
Play later
Play later
Lists
Like
Liked
23:19On this episode, I talk about a worrying job forecast for IT Pros, several consumer side announcements from Apple and Microsoft, Patch Tuesday news and much more!Reference Links:https://www.rorymon.com/blog/apple-announcements-from-wwdc-patch-tuesday-news-grim-job-forecast-for-it-pros/By Rory Monaghan
…
continue reading

1
SANS Stormcast Thursday, June 12th, 2025: Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; Connectwise Signing Keys; KDE Telnet code exec (#)
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28SANS Stormcast Thursday, June 12th, 2025: Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; Connectwise Signing Keys; KDE Telnet code exec Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu…
…
continue reading

1
Ghost students “haunting” online colleges.
37:06
37:06
Play later
Play later
Lists
Like
Liked
37:06Patch Tuesday. Mozilla patches two critical FireFox security flaws. A critical flaw in Salesforce OmniStudio exposes sensitive customer data stored in plain text. The Badbox botnet continues to evolve. AI-powered “ghost students” enrolling in online college courses to steal government funds. Hackers steal nearly 300,000 vehicle crash reports from t…
…
continue reading

1
Ep 34: Built for Impact: How Pasha Knish Turned Freelance Scraps into an Amazon Powerhouse
35:38
35:38
Play later
Play later
Lists
Like
Liked
35:38Key Takeaways Pasha’s agency journey started as a side hustle while bootstrapping his own Amazon brand. AMZ Optimized helps FBA sellers scale faster and more cost-effectively than hiring in-house. The human relationship element is essential to long-term agency success—automation alone can’t replace it. Applying principles from permaculture, Pasha b…
…
continue reading

1
SANS Stormcast Wednesday, June 11th, 2025: Microsoft Patch Tuesday; Acrobat Patches
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20June%202025/32032 Adobe Vulnerabilities Adobe relea…
…
continue reading

1
SANS Stormcast Wednesday, June 11th, 2025: Microsoft Patch Tuesday; Acrobat Patches (#)
6:59
6:59
Play later
Play later
Lists
Like
Liked
6:59SANS Stormcast Wednesday, June 11th, 2025: Microsoft Patch Tuesday; Acrobat Patches Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/dia…
…
continue reading