SQL Server Radio is a Podcast for SQL Server DBAs, database developers, architects, system administrators, and anyone else who is interested in the Microsoft SQL Server platform and the Microsoft data platform in general. As the data world changes, we also occasionally talk about other platforms and services like Azure and Amazon cloud services, Elastic Search, Hadoop, MongoDB, Machine Learning, and much more.
…
continue reading
A weekly podcast about all things PostgreSQL
…
continue reading
SQL Down Under is a podcast for SQL Server and data professionals
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
Hosted by Carlos L Chacon, the SQL Data Partners Podcast focuses on Microsoft data platform related topics mixed with a sprinkling of professional development. Carlos and guests discuss new and familiar features and ideas and how you might apply them in your environments. Visit our website for episode show notes at marathonus.com/podcast and leave a comment if you have a topic you think we should discuss. We’ll see YOU on the SQL Trail.
…
continue reading
SQL (Structured Query Language) is a standardized programming language used for managing and manipulating relational databases. It allows users to create, read, update, and delete (CRUD) data stored in database tables. SQL operates through queries, which are commands that interact with the database
…
continue reading
Hosted by Bennett Bernard and Bradley Bernard, the dynamic duo of brothers who have professional experience in accounting and software engineering.
…
continue reading
Podcast by John White & Jason Himmelstein
…
continue reading
Conversations between DBA'S is the perfect podcast for DBA'S and especially those who use Microsoft's Data Platform. The podcast is moderated by Guy Glanzer and Eitan Blumin, Microsoft MVP'S, who have years of experience, and a lot of passion for the field, you will hear it yourself (: -The podcast is in Hebrew-
…
continue reading
Knee-Deep In Tech is a bi-weekly(-ish) podcast covering IT and technology, focusing on the Microsoft stack. We are three MVPs and Microsoft Certified Trainers with between us over 35 years of IT infrastructure experience. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Kendra Little's podcast discussing database performance tuning, software development, and working with data.
…
continue reading
This podcast is about SQL Family, from SQL Family and for SQL Family. We're been talking about many varies things including Microsoft Data Platform and all related stuff to well known SQL members. Do not know what a #SQLFamily is? Do you know who is a member of SQLFamily? Do you want to know what they do, why they are so popular or what their dog/cat name is? Or maybe you want to become a new member? The podcast is for you!
…
continue reading
Cyber Security for Small Businesses doesn't need to be complicated or expensive. Most of the time it comes down to planning, procedures and good Systems Administration. Learn the techniques that you can use to increase Cyber Resilience in your Small Business. The podcast covers auditing tools like the ACSC Essential 8, NIST and ISO 27001. It will look at ways that you can identify, protect, detect, respond and recovery to a cyber incident. You will learn about: Malware Denial of Service Man ...
…
continue reading
Welcome to The Analytics Pod, where we turn mind-numbing data into mind-blowing insights—and have a blast doing it! Join Kevin Naidoo as he guides you through the wild world of analytics. With over 20 years of experience in the industry, Kevin is your go-to guru for everything from decoding hidden trends to unlocking game-changing strategies that drive success. In each episode, we’ll tackle real-world challenges, and explore cutting-edge tech that’ll make your inner data geek jump for joy. W ...
…
continue reading
Weekly talks and fireside chats about everything that has to do with the new space emerging around DevOps for Machine Learning aka MLOps aka Machine Learning Operations.
…
continue reading
"Kanth Mentorship Podcast" is a podcast series hosted by Rajeev Kanth that focuses on career transition and development, particularly in Data Analytics, Data Science, Machine Learning, Data Engineering, Cloud Computing, AWS, Azure, DataBricks, SQL, Power BI, Tableau, Python Generative AI, Deep Learning, Computer Vision, LLMs, and Artificial Intelligence. The podcast covers various topics, including interview preparation, industry insights, and career path guidance, aimed at various individua ...
…
continue reading
Welcome to Energy Bytes - your essential guide to the intersection of data and energy. Hosted by industry veterans John Kalfayan and Bobby Neelon, this podcast dives deep into the world of energy, shedding light on how data, AI, and technology are revolutionizing this sector. Each episode equips listeners with insights into the most efficient tools and resources, paving the way for a data-driven future in energy. From technical nuances to broader industry trends, Energy Bytes offers an unpar ...
…
continue reading

1
Syntax - Tasty Web Development Treats
Wes Bos & Scott Tolinski - Full Stack JavaScript Web Developers
Full Stack Developers Wes Bos and Scott Tolinski dive deep into web development topics, explaining how they work and talking about their own experiences. They cover from JavaScript frameworks like React, to the latest advancements in CSS to simplifying web tooling.
…
continue reading
Tips on project management and technical stuff. Recorded sessions from Gazza's Corner blog, interviews and other topics.
…
continue reading
Discussion about all things data. From Data Science, to Engineering, to Analytics, professionals from a variety of backgrounds discuss their careers and interests working with data.
…
continue reading
We will be doing podcasts about data storage, backup & disaster recovery, and cloud storage solutions
…
continue reading
Two friends sitting around talking about code and stuff.
…
continue reading
A podcast about web and mobile app development tools, frameworks, and more by the folks at Éphémère Creative. It all ties into this neat framework we're building, codenamed the "Chewy Stack."
…
continue reading
Brought to you by Emergent Software, we talk about the latest news and tips in the software engineering and Microsoft world. Visit https://www.emergentsoftware.net/ to see how you can become more efficient and effective using the Microsoft Cloud.
…
continue reading
Join the Kinetica-ticians for conversations on the future of data, analytics, GPU databases and AI.
…
continue reading
Our podcast includes both technical & non-technical discussions on BigData, DataScience, BI, AI, DW, Business Intelligence, TDWI, SqlServer, SQL, NoSql, AWS, Azure, R, Python. Hosts: Rajib Bahar, Shabnam Khan
…
continue reading
A podcast series where we discuss community, database, open source, and other topics. Email us at [email protected] for your feedback or suggestions.
…
continue reading
It's all about Oracle APEX. But as we know, every Database Feature and every Frontend Feature can be used by APEX immediately, and therefore is an APEX feature too. I am interviewing members of the development team plus anyone else with a story to tell about APEX. Let me know if you want to be a guest at: [email protected]
…
continue reading
Each episode Chris and Chris will be discussing topics and news from the world of SQL Server, while enjoying and chatting about beer! So, grab yourself a beer and tune in, cheers.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Nikit Shingari is from New York. He is passionate about Investing, Day Trading, Swing Trading and also loves Coding, Python and other languages like SQL, Java etc. His hobbies include fitness and bodybuilding, apart from that he also likes to cook vegan food and likes to watch NBA.
…
continue reading
Nikit Shingari is passionate about investing, day trading, and swing trading and also love coding, python, and other languages like SQL, Java, etc.
…
continue reading
Through following this course, students will gain a basic understanding of the principles behind network security and the working of the main protocols, mechanisms and techniques in the area of security. The course consists of three parts: security mechanisms within network protocols, systems security and lab sessions. In the first part (security mechanisms within network protocols), the following topics will be discussed: IPSec, SSH, SSL, HTTPS and security for wireless networks. The second ...
…
continue reading
Nikit Shingari is from New York. He is passionate about Investing, Day Trading, Swing Trading and I love Coding, Python and other languages like SQL, Java etc. My hobbies include fitness and bodybuilding, apart from that he also likes to cook vegan food and likes to watch NBA.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Welcome to the Security Weekly Podcast Network, your all-in-one source for the latest in cybersecurity! This feed features a diverse lineup of shows, including Application Security Weekly, Business Security Weekly, Paul's Security Weekly, Enterprise Security Weekly, and Security Weekly News. Whether you're a cybersecurity professional, business leader, or tech enthusiast, we cover all angles of the cybersecurity landscape. Tune in for in-depth panel discussions, expert guest interviews, and ...
…
continue reading
Stay current on JavaScript, Node, and Front-End development. Learn from experts in programming, careers, and technology every week. Become a supporter of this podcast: https://www.spreaker.com/podcast/javascript-jabber--6102064/support.
…
continue reading
Concise, bi-weekly reviews of the most significant security stories, including malware, threats, government actions, and other cybersecurity topics. Hosted by Dr. Doug White. Co hosts: Josh Marpet, Aaran Leyland.
…
continue reading
Hello Everyone! This podcast will feature weekly discussions covering everything computer science. Topics include: game design 2D and 3D using Unity3D, Web Design topics including HTML, CSS, JavaScript, SQL and Apache webserver, Android Application Development, computer programming with Java, C# and C++, video/audio and image editing, and so, so much more. New episodes will be released weekly on Sunday evenings. Subscribe and join in on the newest topics related to computer science and infor ...
…
continue reading
High tech, IT education made easy for Microsoft DBA’s and application owners. Learn about the latest trends in technology and how to improve your application performance and availability. Topics include virtualization, backup, disaster recovery, SAN, and much more. If you run Microsoft Exchange or Microsoft SQL Server, on VMware or Hyper-V - please subscribe today!
…
continue reading

1
SQL Injection: The Hacker’s Backdoor to Your Data
11:38
11:38
Play later
Play later
Lists
Like
Liked
11:38Did you know a single line of malicious code could expose your entire database to hackers? SQL Injection (SQLi) remains one of the most dangerous and widely used cyberattack techniques, allowing attackers to manipulate databases, steal sensitive data, and even take full control of applications. In this episode, we dive deep into how SQL injection w…
…
continue reading

1
Episode 173 - SQL Noir and the fate of Azure Data Studio
34:36
34:36
Play later
Play later
Lists
Like
Liked
34:36Guy and Eitan discuss a few interesting topics. Including a fun new game called "SQL Noir", how to implement statistical clustering model in SQL, about surrogate and natural keys, and the recently announced deprecation of Azure Data Studio. Relevant links: SQL Noir - A Detective SQL Game How to Write a Recursive CTE in SQL Server | LearnSQL.com Azu…
…
continue reading

1
Tastovision, Trufflepig, Cisco, Windows, VSCode, OT, SQL Server, Android, Josh Marpet - SWN #456
35:33
35:33
Play later
Play later
Lists
Like
Liked
35:33Tastovision, Trufflepig, Cisco, Windows, VSCode, OT, SQL Server, Android, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-456
…
continue reading
In Agents in Production [Podcast Limited Series] - Episode Four, Donné Stevenson and Paul van der Boor break down the deployment of a Token Data Analyst agent at Prosus—why, how, and what worked. They discuss the challenges of productionizing the agent, from architecture to mitigating LLM overconfidence, key design choices, the role of pre-checks f…
…
continue reading
What do you get when three techies get a chance to ask questions to figure out how to make sense of Dynamics 365? Excited questions, “Aha!” moments and conversation going on far beyond that, all the way to pros and cons of standard systems. In this episode we are excited to have Business Applications MVP and serial podcaster Johan Persson of “En Li…
…
continue reading

1
SANS Stormcast Tuesday Mar 25th: Privacy Awware Bots; Ingress Nightmare; Malicious File Converters; VSCode Extension Leads to Ransomware
5:55
5:55
Play later
Play later
Lists
Like
Liked
5:55Privacy Aware Bots A botnet is using privacy as well as CSRF prevention headers to better blend in with normal browsers. However, in the process they may make it actually easier to spot them. https://isc.sans.edu/diary/Privacy%20Aware%20Bots/31796 Critical Ingress Nightmare Vulnerability ingress-nginx fixed four new vulnerabilities, one of which ma…
…
continue reading

1
Botnets Breakdown: From Zombies to Command Centers
23:23
23:23
Play later
Play later
Lists
Like
Liked
23:23In this gripping episode, we dive into the hidden world of botnets—massive networks of hijacked devices controlled by cybercriminals. These digital armies are responsible for launching devastating attacks, from crippling DDoS campaigns to massive data breaches. But what exactly makes botnets so dangerous, and how can organizations defend against th…
…
continue reading

1
Unveiling StoneFly: The Future of Enterprise Data Management
5:37
5:37
Play later
Play later
Lists
Like
Liked
5:37Data is more than just storage—it's about security, efficiency, and innovation. In this deep dive, we explore how StoneFly.com is transforming enterprise data management with high-performance storage solutions, hybrid cloud integration, and cutting-edge disaster recovery. Whether you're dealing with petabytes of data or ensuring compliance in regul…
…
continue reading

1
DDoS Attacks Decoded: How Hackers Take Down Networks
19:00
19:00
Play later
Play later
Lists
Like
Liked
19:00Imagine your website, servers, or entire business grinding to a halt—not because of a technical failure, but because of a massive, coordinated cyberattack. DDoS (Distributed Denial-of-Service) attacks have become one of the biggest threats to businesses, governments, and online services worldwide. But how do they work, and why are they so hard to s…
…
continue reading

1
The Long Game: How APTs Infiltrate, Persist, and Steal Data
10:18
10:18
Play later
Play later
Lists
Like
Liked
10:18Cyberattacks are getting smarter, but few threats are as stealthy and devastating as Advanced Persistent Threats (APTs). Unlike typical cyberattacks, APTs operate over months or even years, quietly infiltrating systems, stealing sensitive data, and evading detection. In this episode, we dive deep into the world of APTs—how they work, who they targe…
…
continue reading
Is Vibe Coding the future of software development or just a fun way to experiment? Scott and Wes talk about coding with AI, the risks of ignoring the details, and the cool (and sometimes cursed) projects they’ve Vibe Coded. Show Notes 00:00 Welcome to Syntax! 00:31 “Personal Software”. 01:30 What exactly is Vibe Coding. 02:46 The challenges of codi…
…
continue reading

1
Building the SOC of the Future - JP Bourget, Michael Mumcuoglu - ESW #399
1:50:43
1:50:43
Play later
Play later
Lists
Like
Liked
1:50:43What does a mature SecOps team look like? There is pressure to do more with less staff, increase efficiency and reduce costs. JP Bourget's experience has led him to believe that the answer isn't a tool upgrade, it's better planning, architecture, and process. In this interview, we'll discuss some of the common mistakes SecOps teams make, and where …
…
continue reading

1
SANS Stormcast Monday Mar 24th: Critical Next.js Vulnerability; Microsoft Trust Signing Platform Abuse
7:10
7:10
Play later
Play later
Lists
Like
Liked
7:10Critical Next.js Vulnerability CVE-2025-29927 A critical vulnerability in how the x-middleware-subrequest header is verified may lead to bypassing authorization in Next.js applications. https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware https://github.com/vercel/next.js/security/advisories/GHSA-f82v-jwr5-mffw http…
…
continue reading

1
Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More... - SWN #461
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More are on this edition of the Security Weekly News. Show Notes: https://securityweekly.com/swn-461
…
continue reading

1
Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More... - SWN #461
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-461
…
continue reading

1
Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More... - SWN #461
33:05
33:05
Play later
Play later
Lists
Like
Liked
33:05Orange Drop Caps, apps, Veeam, jobs, Heathrow, vpentest, Aaran Leyland, and More are on this edition of the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-461
…
continue reading
Nikolay talks Michael through using cloud snapshots — how they can be used to reduce RTO for huge Postgres setups, also to improve provisioning time, and some major catches to be aware of. Here are some links to things they mentioned: Snapshots on RDS https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_CreateSnapshot.html pgBackRest https:/…
…
continue reading

1
Claude Plays Pokémon - A Conversation with the Creator // David Hershey // #294
46:58
46:58
Play later
Play later
Lists
Like
Liked
46:58I Let An AI Play Pokémon! - Claude plays Pokémon Creator // MLOps Podcast #295 with David Hershey, Member of Technical Staff at Anthropic. Join the Community: https://go.mlops.community/YTJoinIn Get the newsletter: https://go.mlops.community/YTNewsletter // AbstractDemetrios chats with David Hershey from Anthropic's Applied AI team about his agent-…
…
continue reading

1
SANS Stormcast Friday Mar 21st: New Data Feeds; SEO Spam; Veeam Deserialization; IBM AIX RCE;
8:24
8:24
Play later
Play later
Lists
Like
Liked
8:24Some New Data Feeds and Little Incident We started offering additional data feeds, and an SEO spamer attempted to make us change a link from an old podcast episode. https://isc.sans.edu/diary/Some%20new%20Data%20Feeds%2C%20and%20a%20little%20%22incident%22./31786 Veeam Deserialization Vulnerability Veeam released details regarding the latest vulner…
…
continue reading
This week: Compliance, localization, blah blah, the Greatest Cybersecurity Myth Ever Told, trolling Microsoft with a video, Github actions give birth to a supply chain attack, prioritizing security research, I'm tired of 0-Days that are not 0-Days, sticking your head in the sand and believing everything is fine, I'm excited about AI crawlers, but s…
…
continue reading

1
6 AI Text Books, To Start Your Artificial Intelligence Journey!
11:12
11:12
Play later
Play later
Lists
Like
Liked
11:12✅ Book 1-on-1 Roadmap Call with ME, Related to Data Analytics, Data Science, AI, Generative AI and Data Engineering: https://bepec.in/courses/artificial-intelligence-course-bangalore/ 📲 Whatsapp Us Here: https://wa.me/919644466222 🔥 Be a Job-Ready Data Scientist in 9Months with Internship: https://bepec.in/courses/data-science-course-syllabus/ 🚀 Be…
…
continue reading

1
SANS Stormcast Thursday Mar 20th: Cisco Smart Licensing Attacks; Vulnerable Drivers again; Synology Advisories Updated
7:09
7:09
Play later
Play later
Lists
Like
Liked
7:09Exploit Attempts for Cisco Smart Licensing Utility CVE-2024-20439 CVE-2024-20440 Attackers added last September's Cisco Smart Licensing Utility vulnerability to their toolset. These attacks orginate most likely from botnets and the same attackers are scanning for a wide range of additional vulnerabilities. The vulnerability is a static credential i…
…
continue reading

1
Episode 287 - Microsoft Fabric January 2025 Feature Summary
35:31
35:31
Play later
Play later
Lists
Like
Liked
35:31This is episode 287 recorded on March 13th, 2025 where John & Jason talk the Microsoft Fabric January 2025 Feature Summary including Python Notebooks in preview, Lineage enhancements to spark notebooks, lots of DBA enhancements to Data Warehouse, Tenant Level Private Link for Databases, and CI/CD preview for most of Fabric.…
…
continue reading
Wes and Scott talk about Infrastructure as Code and how SST makes deploying to AWS easier than ever. They dive into SST’s features, developer experience, and how it simplifies managing services like databases, email, and more. Plus, insights on Cloudflare integration, auto-scaling, and real-world use cases. Show Notes 00:00 Welcome to Syntax! Suppe…
…
continue reading

1
Breaking Down Human-Element Breaches To Improve Cybersecurity - Jinan Budge - BSW #387
1:06:12
1:06:12
Play later
Play later
Lists
Like
Liked
1:06:12Organizations continue to suffer from security breaches, too many of which contain a human element. But there’s no consistent definition of the risk posed by human-related breaches, and recommendations are often limited to security awareness and training (SA&T). Understanding the depth and breadth of human-related breaches is critical to implementi…
…
continue reading

1
SANS Stormcast Wednesday Mar 19th 2025: Python DLL Side Loading; Tomcast RCE Correction; SAML Roulette; Windows Shortcut 0-Day
7:18
7:18
Play later
Play later
Lists
Like
Liked
7:18Python Bot Delivered Through DLL Side-Loading A "normal", but vulnerable to DLL side-loading PDF reader may be used to launch additional exploit code https://isc.sans.edu/diary/Python%20Bot%20Delivered%20Through%20DLL%20Side-Loading/31778 Tomcat RCE Correction To exploit the Tomcat RCE I mentioned yesterday, two non-default configuration options mu…
…
continue reading
How are you managing your AI costs? Richard chats with Sonia Cuff about how she's been helping sysadmins understand how AI technology is billed out and how to measure them within a given application and across the organization. Sonia starts with some definitions since the term AI is so broad. It's not just about large language models! The conversat…
…
continue reading

1
Angry Iguana, Squid Bot, Bruted, 0Auth, Dragon Medical, Clippy 2.0, CISA, Josh Marpet - SWN #460
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05Angry Iguana, Squid Bot 9000, Bruted, 0Auth, Dragon Medical One, Clippy 2.0, CISA, Josh Marpet, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-460
…
continue reading

1
Angry Iguana, Squid Bot, Bruted, 0Auth, Dragon Medical, Clippy 2.0, CISA, Josh Marpet - SWN #460
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05Angry Iguana, Squid Bot 9000, Bruted, 0Auth, Dragon Medical One, Clippy 2.0, CISA, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-460
…
continue reading

1
Angry Iguana, Squid Bot, Bruted, 0Auth, Dragon Medical, Clippy 2.0, CISA, Josh Marpet - SWN #460
35:05
35:05
Play later
Play later
Lists
Like
Liked
35:05Angry Iguana, Squid Bot 9000, Bruted, 0Auth, Dragon Medical One, Clippy 2.0, CISA, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-460
…
continue reading

1
From Rules to Reasoning Engines // George Mathew // #296
1:05:26
1:05:26
Play later
Play later
Lists
Like
Liked
1:05:26From Rules to Reasoning Engines // MLOps Podcast #297 with George Mathew, Managing Director at Insight Partners. Join the Community: https://go.mlops.community/YTJoinIn Get the newsletter: https://go.mlops.community/YTNewsletter // AbstractGeorge Mathew (Insight Partners) joins Demetrios to break down how AI and ML have evolved over the past few ye…
…
continue reading

1
Redlining the Smart Contract Top 10 - Shashank . - ASW #322
53:01
53:01
Play later
Play later
Lists
Like
Liked
53:01The crypto world is rife with smart contracts that have been outsmarted by attackers, with consequences in the millions of dollars (and more!). Shashank shares his research into scanning contracts for flaws, how the classes of contract flaws have changed in the last few years, and how optimistic we can be about the future of this space. Segment Res…
…
continue reading
In this episode, the trio talk cloud and devops with Jonas Svedberg (Chief Technical Architect, Advania Knowledge Factory), and Björn Sundling (devops consultant at Advania Knowledge Factory). Show Notes Hosted on Acast. See acast.com/privacy for more information.
…
continue reading

1
Time-Series Analysis: Forecasting the Future with Data Magic
8:16
8:16
Play later
Play later
Lists
Like
Liked
8:16🔮 Ever wish you could predict the future? Well, with Time-Series Analysis, you kinda can! In this episode, we break down how businesses forecast sales, how weather predictions work, and how Netflix somehow knows exactly what you want to watch next. 📊 What You’ll Learn: ✅ What time-series analysis is and why it matters ✅ The key components: trends, …
…
continue reading

1
SANS Stormcast Tuesday Mar 18th 2025: Analyzing GUID Encoded Shellcode; Node.js SAML Vuln; Tomcat RCE in the Wild; CSS e-mail obfuscation
7:03
7:03
Play later
Play later
Lists
Like
Liked
7:03Static Analysis of GUID Encoded Shellcode Didier explains how to decode shell code embeded as GUIDs in malware, and how to feed the result to his tool 1768.py which will extract Cobal Strike configuration information from the code. https://isc.sans.edu/diary/Static%20Analysis%20of%20GUID%20Encoded%20Shellcode/31774 SAMLStorm: Critical Authenticatio…
…
continue reading

1
Episode 286 - Power BI January 2025 Feature Summary
29:07
29:07
Play later
Play later
Lists
Like
Liked
29:07This is episode 286 recorded on March 12th, 2025 where John & Jason talk the Microsoft Fabric January 2025 Feature Summary, specifically the Power BI section, including Storytelling updates for the PowerPoint Add-in, Semantic Model version history, TMDL view in Power BI Desktop, and more.By John White & Jason Himmelstein
…
continue reading

1
StoneFly's Patent: Virtual Isolation Layer in Data Security
16:33
16:33
Play later
Play later
Lists
Like
Liked
16:33By Stonefly
…
continue reading

1
Remote Code Execution (RCE): How Hackers Take Over Systems Remotely
17:38
17:38
Play later
Play later
Lists
Like
Liked
17:38Remote Code Execution (RCE) is one of the most dangerous cyber threats, allowing attackers to take full control of systems from anywhere in the world. In this episode, we break down how RCE vulnerabilities work, the methods hackers use to exploit them, and real-world examples of devastating RCE attacks. We’ll cover the different types of RCE exploi…
…
continue reading

1
885: CSS Fonts Fallbacks, Variable and Trimming
23:10
23:10
Play later
Play later
Lists
Like
Liked
23:10Scott and Wes dig into the wild world of CSS fonts—covering fallbacks, variable fonts, and new tricks like text-box-trim. They also break down font-display, font kits, and how to avoid layout shifts when loading custom type. Show Notes 00:00 Welcome to Syntax! 01:06 Brought to you by Sentry.io. Damnit Sans. 02:53 @font-face. 03:27 Font Display. 07:…
…
continue reading

1
Penetration Tests: useful, pointless, harmful, required, ineffective? - Phillip Wylie, Marina Segal - ESW #398
1:40:36
1:40:36
Play later
Play later
Lists
Like
Liked
1:40:36Penetration tests are probably the most common and recognized cybersecurity consulting services. Nearly every business above a certain size has had at least one pentest by an external firm. Here's the thing, though - the average ransomware attack looks an awful lot like the bog standard pentest we've all been purchasing or delivering for years. Yet…
…
continue reading

1
SANS Stormcast Monday March 17th: Mirai Makes Mistakes; Compromised Github Action; ruby-saml vulnerability; Fake GitHub Security Alert Phishing
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Mirai Bot Now Incorporating Malformed DrayTek Vigor Router Exploits One of the many versions of the Mirai botnet added some new exploit strings attempting to take advantage of an old DrayTek Vigor Router vulnerability, but they got the URL wrong. https://isc.sans.edu/diary/Mirai%20Bot%20now%20incroporating%20%28malformed%3F%29%20DrayTek%20Vigor%20R…
…
continue reading

1
IHMA safeguards critical microbiology data and ensures compliance with Veeam and StoneFly solutions
16:37
16:37
Play later
Play later
Lists
Like
Liked
16:37In this episode, we dive into how IHMA, a global leader in microbiology and infectious disease research, safeguards its critical data while meeting strict compliance standards. Discover how Veeam and StoneFly work together to provide rock-solid data protection, seamless backup and recovery, and enterprise-grade storage—ensuring that vital research …
…
continue reading

1
Enterprise NAS Showdown: Dell vs. HPE vs. StoneFly
12:14
12:14
Play later
Play later
Lists
Like
Liked
12:14Choosing the right NAS solution is crucial for businesses that need reliable storage, scalability, and security. In this episode, we put three top contenders—Dell, HPE, and StoneFly—head-to-head in an enterprise NAS showdown. We’ll compare their performance, features, pricing, and real-world use cases to help you decide which solution best fits you…
…
continue reading