Patch And Switch public
[search 0]
More
Download the App!
show episodes
 
Artwork

1
Patch And Switch

Joey Snow, Rick Claus

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
It's the Patch and Switch show. Two guys that couldn't cut it in the landscaping business entertain you with their talk about their lives as IT pros. This is the audio only recorded archive of their live bi-weekly Twitch LiveStream / Call In Tech Podcast Q&A. #GeekHumour
  continue reading
 
Hello everybody, and welcome to Some Patches Required. Every other Wednesday, your hosts Aaron and Zak use their backgrounds in game development and analysis to discuss various facets of the ever-turbulent games industry. From interviews with AAA/indie devs to deep dives on timely topics, the duo hopes to entertain and educate you on this wild medium we all love.
  continue reading
 
Artwork

1
3 Terrible Gamers

3 Terrible Gamers Podcast Company

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Just a few guys discussing hot gaming topics, news, and rumors across a variety of consoles. On the fence about whether or not to buy a new game; this is the podcast for you! Wondering what next gen games are on the rise; this is the podcast for you! Curious what other gamers are into playing; this is the podcast for you!
  continue reading
 
Comedian Adam Blank hosts "Remember The Game?", a retro gaming podcast. Each week, Adam and his guest will select a video game that they grew up playing, and spend time reminiscing about what they loved (or hated) about it. Not intended to be a history lesson, "Remember The Game?" is more like a conversation you'd overhear on the playground as a kid. The discussions are all over the place, and are guaranteed to fill you with that warm, nostalgic feeling. (Or rage, like you felt with the unde ...
  continue reading
 
Pop culture and movie news from around the globe. No celebrity gossip here, just the most important film, comic, tv, streaming, video game and book news suited for any level of geek. Whether you’re a Star Wars fan, or just can’t get enough of Batman, we’re happy to help you...Let your Geek SideShow! Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork
 
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
  continue reading
 
The Geeky+Nerdy Show for Geeky+Nerdy People! Every week your host, David, talks with his ever-shuffling panel of guest about the news in gaming, anime, and other fandom fare. The "ConMentary" is the major discussion topic of the show and you can send in YOUR thoughts on the subject so they can be read/listened to the following week!
  continue reading
 
Loading …
show series
 
We're hot off the heels of the Nintendo Switch 2 Direct where an absolute ton of information was dropped about the much anticipated console. In this episode, we'll be recapping and sharing opinions about the hardware, games, and controversies surrounding the Switch 2 - including some information that Nintendo has since dropped on websites and other…
  continue reading
 
Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
  continue reading
 
The PSW crew discusses tips, tricks, and traps for using AI and LLMs. We discuss a wide range of AI-related topics, including how to utilize AI tools for writing, coding, data analysis, website design, and more! Some key takeaways include: AI has rapidly shifted from novelty to an essential tool in security and other fields. Paid AI versions offer …
  continue reading
 
Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
  continue reading
 
This week, Zak and Aaron sit down to discuss Bungie's newest project, Marathon! The dig into everything from the upcoming extraction shooter's aesthetic to its narrative to its choice of genre in service of answering one question — will this finally be the game to make good on Sony's lofty live service ambitions? Please, enjoy. Listen to Beach Girl…
  continue reading
 
In today’s ever-evolving business landscape, organizations face diverse risks, including cyber risks, that can significantly affect their operations and overall prosperity. Aligning risk management strategies with organizational objectives is crucial for effectively mitigating these potential threats and fostering sustainable growth. Easier said th…
  continue reading
 
Are you on social media? Of course you are. So follow us! Twitter: @MemberTheGame Instagram: @MemberTheGame Twitch.tv/MemberTheGame ⁠Youtube.com/RememberTheGame⁠ ⁠Facebook.com/RememberTheGamePodcast⁠ ⁠TikTok.com/@MemberTheGame⁠ And if you want access to hundreds of bonus (ad-free) podcasts, INCLUDING Remember The Game?, along with multiple new show…
  continue reading
 
More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
  continue reading
 
In this live recording from BSidesSF we explore the factors that influence a secure design, talk about how to avoid the bite of UX dragons, and why designs should put classes of vulns into dungeons. But we can't threat model a secure design forever and we can't oversimplify guidance for a design to be "more secure". Kalyani Pawar and Jack Cable joi…
  continue reading
 
SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
  continue reading
 
Welcome to the SHIRO! SHOW! news updates! This week, we'll be discussing:- Eadmaster Declares Princess Crown Translation Release-Worthy - Under the Microscope: Astal - Exploring New Homebrew: MOAI Talks and Haiku - English Patch for Dark Seed Is Available Now - Atelier Marie: The Alchemist of Salburg Ver. 1.3 #BestOfSaturn - Sakura Wars 2 Fan Trans…
  continue reading
 
In this episode, we dive into the major shift happening in the U.S. diabetes tech industry: insulin pumps are moving from Durable Medical Equipment (DME) to pharmacy benefits, offering easier access, lower costs, and more flexibility for users. I’m joined by Jeff DelVerne, author of The Healthcare Economy Substack and Director of Payer Relations at…
  continue reading
 
As organizations embrace hybrid work, SaaS sprawl, and employee-owned devices, traditional Identity and Access Management (IAM) tools are failing to keep up. The rise of shadow IT, unmanaged applications, and evolving cyber threats have created an "Access-Trust Gap", a critical security challenge where IT lacks visibility and control over how emplo…
  continue reading
 
Please forgive me for that dorky, bad-joke title, True Avatars! I’m just really excited because this week, I went to the Nintendo Switch 2 Experience event in Toronto and had the chance to test out the Switch 2 over a month before its official release! I also got to play a bunch of games, including Mario Kart World, Donkey Kong Bananza, Metroid Pri…
  continue reading
 
Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
  continue reading
 
Step into the enchanting world of Cyrodiil as we revisit one of gaming’s most beloved classics: Oblivion. In this special episode, Matt and Tim dive deep into the magic of the remastered edition—unpacking their impressions, sharing nostalgic memories, and discussing what still makes this game a timeless masterpiece. Whether you're a long-time fan o…
  continue reading
 
Beating the AI Game, Ripple (not that one), Numerology, Darcula, Special Guests, and More, on this edition of the Security Weekly News. Special Guests from Hidden Layer to talk about this article: https://www.forbes.com/sites/tonybradley/2025/04/24/one-prompt-can-bypass-every-major-llms-safeguards/ Visit https://www.securityweekly.com/swn for all t…
  continue reading
 
Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
  continue reading
 
The crosswalk is talking to me man!, don't block my website without due process, Florida is demanding encryption backdoors, attacking boilers and banning HackRF Ones, time to update your flipper zero, using AI to create working exploits, what happens when you combine an RP2350 and an ESP32? Hopefully good hackery things!, more evidence that patchin…
  continue reading
 
Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
  continue reading
 
AI Governance, the next frontier for AI Security. But what framework should you use? ISO/IEC 42001 is an international standard that specifies requirements for establishing, implementing, maintaining, and continually improving an Artificial Intelligence Management System (AIMS) within organizations. It is designed for entities providing or utilizin…
  continue reading
 
Are you on social media? Of course you are. So follow us! Twitter: @MemberTheGame Instagram: @MemberTheGame Twitch.tv/MemberTheGame Youtube.com/RememberTheGame Facebook.com/RememberTheGamePodcast TikTok.com/@MemberTheGame And if you want access to hundreds of bonus (ad-free) podcasts, INCLUDING Remember The Game?, along with multiple new shows EVER…
  continue reading
 
xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
  continue reading
 
In this episode, we dive into Sony's recent updates to the PS Portal cloud gaming, exploring how these changes impact gamers. We'll also discuss Pocketpair's firm stance against acquisition, the exciting reveal of Switch 2 pre-order dates, and the surprising news that Zelda editions for Switch 2 won't support cloud saves. Plus, we’ll cover the late…
  continue reading
 
Secrets end up everywhere, from dev systems to CI/CD pipelines to services, certificates, and cloud environments. Vlad Matsiiako shares some of the tactics that make managing secrets more secure as we discuss the distinctions between secure architectures, good policies, and developer friendly tools. We've thankfully moved on from forced 90-day user…
  continue reading
 
It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL. https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%2…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play