The Library Of Mistakes public
[search 0]
More
Download the App!
show episodes
 
Nightly news that’s not afraid of fun. Every weeknight hosts Nil Köksal and Chris Howden bring you the people at the centre of the day’s most hard-hitting, hilarious and heartbreaking stories: powerful leaders, proud eccentrics and ordinary people in extraordinary circumstances. And plenty of puns too. Find out why As It Happens is one of Canada’s longest-running and most beloved shows.
  continue reading
 
Artwork

1
Library of Mistakes

The Library of Mistakes

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Based in Edinburgh, with branches in Switzerland and India, the Library of Mistakes is a free public library designed to improve understanding of finance (and life in general), one mistake at a time. In this podcast series the Library's Keeper, Professor Russell Napier, speaks to authors of some of the most interesting books in the ever-expanding collection exploring insights into finance, business, society and human nature. Fascinating, educational and often rather funny. Produced and edite ...
  continue reading
 
Artwork

1
An Imperfect Leader

Dr. Peter Stiepleman

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
An Imperfect Leader: Leadership in (After) Action is a series of conversations with leaders who look back at decisions they made and ask themselves: What happened? What got overlooked? What did you learn about relationships or what new relationships were formed? What frustrated you? What could you have done differently? And in the end, what was something good that came out of the experience – because it is through our mistakes where our greatest learning takes place. I’m Dr. Peter Stiepleman ...
  continue reading
 
We are a growing community looking to give credit and much-needed attention to Africa's Unique Audio/Voice talents, (podcasts, voice-over artists, spoken word artists, poets, and more) Hang Out with APVA are member-centered streamed events via member channels and Oralvault radio, looking to address African challenges and issues (industry-specific and contemporary) as well as create safe spaces for the growth of the African audio creative.
  continue reading
 
I am your kid lit tour guide around these parts and the author of The Intentional Bookshelf. I believe we all have the power to be incredible, impactful parents if we simply look to our bookshelves! If you crave to raise children that love to read, build a library of resources that help you take purposeful action as a parent & connect with your children unlike ever before - I encourage you to listen to the Addison Reads audio blog. Build your intentional bookshelf & learn to parent with lite ...
  continue reading
 
Artwork

1
Crunches & Cosmos (Home Exercise Reviews and Recommendations for Women)

Home Fitness Expert and founder of One Strong Southern Girl

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Join Mickie (20+ year home exerciser and founder of One Strong Southern Girl) as she shares unbiased reviews of the hottest programs, products, and services in the women's health and fitness industry and tips, strategies and how-to's for women at every fitness level and season of life.
  continue reading
 
Loading …
show series
 
What if the greatest threat to creative careers isn't competition but rather the rapid advancement of technology itself? In this thought-provoking conversation, wordsmith Leila Johnston pulls back the curtain on the real world of freelance writing. Leila's journey from journalism to digital copywriting reveals the psychological challenges of freela…
  continue reading
 
In this episode of An Imperfect Leader: The Superintendents and Leadership Podcast, I sit down with Lori Weigel, Principal at New Bridge Strategy, and Jonathan Voss, Former-Partner at Lake Research Partners and Founder of Voss Research and Strategy. Two leaders from opposite ends of the political spectrum who are united by a common mission: to help…
  continue reading
 
SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
  continue reading
 
From the workings of financial markets to our response to the ecological crisis, economic theory shapes the world. But where do these ideas come from? Ricardo’s Dream: How Economists Forgot the Real World and Led Us Astray (Bristol University Press, 2024) tells the fascinating story of David Ricardo, Adam Smith’s only real rival as the ‘founder of …
  continue reading
 
Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
  continue reading
 
Tattoos are not merely decorative; they contain deep meaning for individuals and communities. They document their wearers' personal histories and position in families or society, and they engage with a communal understanding of symbols. Stories on Skin: A Librarian's Guide to Tattoos as Personal Archives (Bloomsbury, 2025) by Terry Baxter & Libby C…
  continue reading
 
According to the Taliban, Manizha Bakhtari no longer represents Afghanistan abroad. But that hasn't stopped the country's one-time top diplomat in Austria from keeping the doors of its embassy in Vienna open and now her efforts are the subject of the new documentary, The Last Ambassador. Nil Köksal sits down with Bakhtari and director Natalie Halla…
  continue reading
 
Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
  continue reading
 
Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
  continue reading
 
Plus: Nil reaches Nardwuar the Human Serviette, who’s snagged more interviews with Canadian political leaders during this campaign than anyone. Also: Up until 2015, academics at Oxford drank wine out of a chalice made from the human skull -- likely that of an enslaved woman. Archeologist Dan Hicks uncovered that history and says it's now his goal t…
  continue reading
 
xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
  continue reading
 
Plus: How getting stuck in quicksand led to a rom-com worthy love story for a Michigan couple. Also: Canadian author Robin Stevenson’s book Pride Puppy is at the centre of a Supreme Court decision on 2SLGTBQ+ books in schools. She says she was shocked to hear a Justice repeat the false claim that her alphabet book -- about a puppy at a Pride parade…
  continue reading
 
In this episode of An Imperfect Leader: The Superintendents and Leadership Podcast, Peter Stiepleman sits down with Josh Reppun, host and Global Community Director of What School Could Be. Josh, a former history teacher turned educational innovator, shares his journey of challenging traditional education models. Through his work with the What Schoo…
  continue reading
 
It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL. https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%2…
  continue reading
 
Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widesp…
  continue reading
 
RedTail: Remnux and Malware Management A description showing how to set up a malware analysis in the cloud with Remnux and Kasm. RedTail is a sample to illustrate how the environment can be used. https://isc.sans.edu/diary/RedTail%2C%20Remnux%20and%20Malware%20Management%20%5BGuest%20Diary%5D/31868 Critical Erlang/OTP SSH Vulnerability Researchers …
  continue reading
 
In 2012, Steve Green, billionaire and president of the Hobby Lobby chain of craft stores, announced a recent purchase of a Biblical artefact—a fragment of papyrus, just discovered, carrying lines from Paul's letter to the Romans, and dated to the second century CE. Noted scholar Roberta Mazza was stunned. When was this piece discovered, and how cou…
  continue reading
 
Apple Updates Apple released updates for iOS, iPadOS, macOS, and VisionOS. The updates fix two vulnerabilities which had already been exploited against iOS. https://isc.sans.edu/diary/Apple%20Patches%20Exploited%20Vulnerability/31866 Oracle Updates Oracle released it quarterly critical patch update. The update addresses 378 security vulnerabilities…
  continue reading
 
Plus: A Michigan bookstore gets a lot of unexpected help moving its entire inventory. Also: Ahead of the inaugural game of the new Northern Super League, founder and soccer star Diana Matheson tells Nil it's been years in the making to get to the first professional women's soccer game ever played on Canadian soil. But now that we're here, she knows…
  continue reading
 
Online Services Again Abused to Exfiltrate Data Attackers like to abuse free online services that can be used to exfiltrate data. From the originals , like pastebin, to past favorites like anonfiles.com. The latest example is gofile.io. As a defender, it is important to track these services to detect exfiltration early https://isc.sans.edu/diary/On…
  continue reading
 
Plus: Boston Globe reporter Billy Baker investigates a shockingly violent woodpecker terrorizing Rockport, Mass. Also: It was no surprise that Paige Beuckers was picked first overall at last night's WNBA draft -- least of all to Gary Knox, a dad who just happened to be at the right place at the right time and predict her stardom way back in 2013, w…
  continue reading
 
In this episode of An Imperfect Leader: The Superintendents and Leadership Podcast, I sit down with Dr. Justin Irish, Superintendent of the Anacortes School District in Washington and a former principal at Edmonds School District. Dr. Justin Irish shares how systems thinking, co-design, and meaningful partnerships have helped his district navigate …
  continue reading
 
xorsearch Update Diedier updated his "xorsearch" tool. It is now a python script, not a compiled binary, and supports Yara signatures. With Yara support also comes support for regular expressions. https://isc.sans.edu/diary/xorsearch.py%3A%20Searching%20With%20Regexes/31854 Shorter Lived Certificates The CA/Brower Forum passed an update to reduce t…
  continue reading
 
Plus: CBC's Kate McKenna tells us about stumbling onto a story of campaign “dirty tricks” in an Ottawa bar. Also: Speaking of watering holes, An Edinburgh man embarks on an ambitious project: creating miniature versions of some 300 pubs across the city. And he says attention to detail is the key to his success.…
  continue reading
 
Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248) After spotting individaul attempts to exploit the recent Langflow vulnerability late last weeks, we now see more systematic internet wide scans attempting to verify the vulnerability. https://isc.sans.edu/forums/diary/Exploit+Attempts+for+Recent+Langflow+AI+Vulnerability+CVE20253…
  continue reading
 
The secret insights of economics, translated for the rest of us. Should I buy or rent? Do I ask for a promotion? Should I tell people I’m pregnant? What salary do I deserve? Should I just quit this job? Common anxieties about life are often grounded in economics. In an increasingly win-lose society, these economic decisions—where to work, where to …
  continue reading
 
Network Infraxploit Our undergraduate intern, Matthew Gorman, wrote up a walk through of CVE-2018-0171, an older Cisco vulnerability, that is still actively being exploited. For example, VOLT TYPHOON recently exploited this problem. https://isc.sans.edu/diary/Network+Infraxploit+Guest+Diary/31844 Windows Update Issues / Windows 10 Update Microsoft …
  continue reading
 
Getting Past PyArmor PyArmor is a python obfuscation tool used for malicious and non-malicious software. Xavier is taking a look at a sample to show what can be learned from these obfuscated samples with not too much work. https://isc.sans.edu/diary/Obfuscated%20Malicious%20Python%20Scripts%20with%20PyArmor/31840 CenterStack RCE CVE-2025-30406 Glad…
  continue reading
 
Plus: We follow up with the starting pitcher for one of two absolutely terrible teams who both ended epic losing streaks this week. Also: The mother of an Indigenous woman killed by police in New Brunswick tells us about her efforts to effect change in policing -- and about how one police chief on the other side of the country has responded.…
  continue reading
 
Microsoft Patch Tuesday Microsoft patched over 120 vulnerabilities this month. 11 of these were rated critical, and one vulnerability is already being exploited. https://isc.sans.edu/diary/Microsoft%20April%202025%20Patch%20Tuesday/31838 Adobe Updates Adobe released patches for 12 different products. In particular important are patches for Coldfusi…
  continue reading
 
John Kay's The Corporation in the 21st Century: Why (Almost) Everything We Are Told about Business Is Wrong (Yale UP, 2025) is an accessible and entertaining reappraisal of what business is for and how it works. Full of history and written in a compelling narrative style, this book describes a shift in the underlying assumptions of the relationship…
  continue reading
 
In this episode of An Imperfect Leader: The Superintendents and Leadership Podcast, I sit down with Dr. Lupita Ley Hightower, the 2023 Arizona Superintendent of the Year and the 2024 Voice for Equity Lifetime Achievement Award recipient. Dr. Hightower, who recently retired from her role as the superintendent of the Tolleson Elementary School Distri…
  continue reading
 
XORsearch: Searching With Regexes Didier explains a workaround to use his tool XORsearch to search for regular expressions instead of simple strings. https://isc.sans.edu/diary/XORsearch%3A%20Searching%20With%20Regexes/31834 MCP Security Notification: Tool Poisoning Attacks Invariant labs summarized a critical weakness in the Model Context Protocol…
  continue reading
 
Plus: Baseball YouTuber Dan Sarmiento of Enjoy The Show breaks down an epic match up between two of the worst teams ever. Also: Drumheller, Alberta is home to the world's largest replica dinosaur. And its owners say they plan to take it down. But a local food truck owner is launching a rebellion, hoping to save Tyra.…
  continue reading
 
New SSH Username Report A new ssh/telnet username reports makes it easier to identify new usernames attackers are using against our telnet and ssh honeypots https://isc.sans.edu/diary/New%20SSH%20Username%20Report/31830 Quickshell Sharing is Caring: About an RCE Attack Chain on Quick Share The Google Quick Share protocol is susceptible to several v…
  continue reading
 
As a new podcaster or voiceover artist, navigating the audio industry can be daunting. With so many talented artists vying for attention, it's easy to make mistakes that can hinder your success. In this informative and engaging session, we'll explore the most common mistakes new podcasters and voiceover artists make, and provide practical tips and …
  continue reading
 
On the other hand: It's boom time for the maker of Louisville Slugger baseball bats, thanks to a fad that’s taking the sport by storm. Also: With Jordan's Principle funding up in the air, the Council for Yukon First Nations is forced to halt crucial community services. And the executive director tells us it's heartbreaking for the people she serves…
  continue reading
 
Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive Using frequency analysis, and training the model with honeypot data as well as log data from legitimate websites allows for a fairly simple and reliable triage of web server logs to identify possible malicious activity. https://isc.sans.edu/diary/Exploring%20Statistical%20Mea…
  continue reading
 
Surge in Scans for Juniper t128 Default User Lasst week, we dedtect a significant surge in ssh scans for the username t128 . This user is used by Juniper s Session Smart Routing, a product they acquired from 128 Technologies which is the reason for the somewhat unusual username. https://isc.sans.edu/diary/Surge%20in%20Scans%20for%20Juniper%20%22t12…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play