Download the App!

show episodes
 
Cody Sullivan, Saltine’s godson, writes works to be read, performed and listened to and facilitates and performs in works of improvisation. Sullivan is a contributing writer for Cards Against Humanity. While in Chicago he performed at the iO Theater from 2015 to 2019. Saltine is a world renown lecturer, art historian and former financial advisor to the Ford Administration. Due to Sullivan’s crippling social ineptitude, Saltine handles the public and business affairs.
 
Poetry as F*ck is a spoken word podcast, containing three different shows: 'Poets Against Humanity' - a Creative Commons remix of 'Cards Against Humanity' where poets desecrate each others' work in a panel show format. 'Lies, Dreaming' - a digital open mic night based around a theme, with recorded spoken word submitted by listeners. 'Eight Poems That, If You Had To Be Trapped In Some Way For a Prolonged Period Of Time With Little Hope of Rescue, You'd Quite Like to Bring Along For Coping Pur ...
 
Informative and immature. This is the podcast for The Jonathan Wier Show! Join Jonathan and Rod and sometimes James on a mystical journey of news/gossip/personal hilarity. It was the #1 show in Kansas City radio and now it's one of the most downloaded podcasts in the country! Help support the show and become a member of the 11 through our Patreon right here: https://www.patreon.com/thejws Join our facebook group here: https://www.facebook.com/groups/401528960672967/
 
Presenting the Manga Raiders Community Happy Hour!!! Or the MR Happy Hour for short. This is where a community of Manga Writers and Artists get together and we talk about...well Manga and Anime. There's reviews, games, challenges, tips for aspiring writers and artists and much more, so if that sounds like your kind of thing then pull up a barstool, crack open a cold one because here, its always Happy Hour!
 
Shifting between Earth and Mars, Badge of Infamy focuses on the gripping tale of a former doctor who becomes a pariah due to being temporarily governed by emotion and compassion, rather than complying with the highly regarded rules established by the Medical Lobby. Furthermore, the novel covers numerous topics including justice, brutality, betrayal, ethics, political control, and lobbying. Set in the year 2100, the novel begins with the introduction of its protagonist, Daniel Feldman, an eth ...
 
When you combine two loud mouths, an annoying laugh and no filter, you get this piece of $%^! podcast. You can depend on them to report useless information and give it to you straight up. Featured segments: - F**ckery Of The Week - Masterdebaters ...more to come.
 
Join us at AMCast every few weeks to discuss... stuff. You know, like the stuff that comes to our mind when we hit record or whats new at the theater or that new show on Netflix. That stuff. We talk about theories and pop culture... and stuff. We have a lot of fun with this podcast and hope you too!
 
Have you ever had an idea for a new product but just didn't know how to get started? If so, then this is the podcast for you! Each week, we highlight a different product entrepreneur who turned a great new idea into a successful new product. You'll hear about their challenges, their triumphs, their ups, and their downs. But, most of all, you'll learn how each guest was able to take nothing more than an idea, and turn it into a viable, marketable product or business. Our guests have been feat ...
 
20 something year old who has overcome several obstacles and life, i like to talk about those things that i have gone through, in a very relaxed chill enviroment, with my cohost a loving boyfriend Dax. New official Co-Host. Music Mondays Being one of the days i upload, and topic tuesdays, where i sit down with my co-host and talk about things we are passoinate about, or find interseting, my podcast is intented for those around my age group who have similiar trouble, so we can learn from and ...
 
Loading …
show series
 
Dinner with SchmucksEpisode 148 “The Gang Plays Cards Against Humanity (Again)” - A DWS Gamenight Cast: Chris, Yajaria, Dieter, Jess, Joey, Tracy and JackieWelcome to a special episode of the Dinner with Schmucks Podcast! It’s our Gamenight V - The Gang Plays Cards Against Humanity (Again)!We got a group together for some good old fashioned fun & g…
 
Iran says Israel was responsible for sabotaging the Natanz nuclear facility yesterday, and Tehran promises revenge. Online plotting results in the arrest of a Texas man alleged to have planned an attack on an Amazon Web Services center. Scraped, not hacked, data from LinkedIn and Clubhouse are being hawked online. Andrea Little Limbago from Interos…
 
Chief Technology Officer and Senior Vice President, Engineering for Digital Guardian Debra Danielson shares her career journey. From aspirations of becoming an astronaut studying mechanical and aerospace engineering, Finding her first job at a local software company that turned into a long term commitment after it was acquired by another firm. Debr…
 
Guests Gage Mele, Winston Marydasan, and Yury Polozov from Anomali join Dave to discuss their research into Static Kitten targeting government agencies in the UAE and Kuwait. Anomali Threat Research uncovered malicious activity very likely attributed to the Iran-nexus cyberespionage group, Static Kitten (Seedworm, MERCURY, Temp.Zagros, POWERSTATS, …
 
Lazarus Group has a new backdoor. Bogus Clubhouse app advertised on Facebook. Cryptojacking goes to school. A ransomware cartel is forming, but so far apparently without much profit-sharing. The US Senate is preparing to make strategic competition with China the law of the land. Dinah Davis from Arctic Wolf looks at phony COVID sites. Our guest is …
 
With their powers combined they form… a horrible amalgamation of quite possibly your worst nightmares sprinkled with some glitter, recorded to 8mm and left in a box in the attic of the house you are about to buy. Cecil, Britshark, Zyber, and Blue hang out and talk about DOOOOOOOOOOOOOOOM! Ironically not the doom that the human race is, but the vide…
 
Cring ransomware afflicts vulnerable Fortigate VPN servers. Distance learning in France stumbles due to sudden high demand, and possibly also because of cyberattacks. Hafnium’s attack on Microsoft Exchange Servers may have been long in preparation, and may have used data obtained in earlier breaches. Commerce Department adds seven Chinese organizat…
 
Goblin Panda’s upped its game in recent attacks on Vietnamese government targets. The EU is investigating cyberattacks against a number of its organizations. Scraped LinkedIn data is being sold in a hackers’ forum. Facebook talks about the causes of its recent data incident. New Android malware poses as a Netflix app. Joe Carrigan shares comments f…
 
A watering hole campaign compromised several Ukrainian sites (and one Canadian one). File transfer blues. A couple of looks into the criminal-to-criminal marketplace: establishing a brand and selling malicious document building tools. Ben Yelin has details on a privacy suit against Intel. Our guest is Steve Ginty from RiskIQ on the threat actors be…
 
An old leaked database has been delivered into the hands of skids. (The news isn’t that the data are out there; it’s that the skids now have it. For free.) CISA and the FBI warn that APTs are scanning for vulnerable Fortinet instances. Cryptojackers pan for alt-coin in GitHub’s infrastructure. Holiday Bear may have looked for network defenders. Thr…
 
Dinner with SchmucksEpisode 147 “Racist Pancakes” Cast: Chris, Yajaria, Dieter & AngelaDinner: Creamy Dill Chicken with Purple Potatoes and AsparagusWelcome back to another new episode of Dinner with Schmucks!This week we welcome special guest Angela to the crew! You would think this being her 1st episode, we might take it easy, but that’s just not…
 
Co-founder and Chief Strategy Officer for Corelight Greg Bell describes the twists and turns of his career bringing him back to his childhood joy of computers. Working in a myriad of fields from human rights to Hollywood to writing a history of conspiracy belief before pivoting back to technology. Focusing on the relationships within the open sourc…
 
Guests Fernando Martinez and Tom Hegel from AT&T Alien Labs join Dave to discuss their team's research "Malware using new Ezuri memory loader." Multiple threat actors have recently started using a Go language (Golang) tool to act as a packer and avoid Antivirus detection. Additionally, the Ezuri memory loader tool acts as a malware loader and execu…
 
Goblin Panda might be out and about. Ubiquiti confirms that an extortion attempt was made, but says the attempted attack on data and source code was unsuccessful. The Accellion compromise claims more university victims. It’s National Supply Chain Integrity Awareness Month in the US. BOLO Mr. Korhsunov. Andrea Little Limbago from Interos on supply c…
 
US Cyber Command and CISA plan to publish an analysis of the malware Holiday Bear used against SolarWinds. The DPRK is again phishing for security researchers. Exchange Server exploitation continues. Stone Panda goes after industrial data in Japan. Human error remains the principal source of cyber risk. A US Executive Order on cyber hygiene and bre…
 
Charming Kitten is back, and interested in medical researchers’ credentials. Russian services appear to have been reading some US State Department emails (it’s thought their access was confined to unclassified systems). Risk management practices and questions about the risks of growing too blasé about “management.” Recognizing the approach of an in…
 
The US Administration continues to prepare its response to Holiday Bear’s romp through the SolarWinds supply chain. Congress is asking for details on what was compromised in the incident, and why the Department of Homeland Security failed to detect the intrusion. The UN offers some recommendations on norms of conduct in cyberspace. Ben Yelin on a N…
 
German politicians’ emails are under attack, and the GRU is the prime suspect. Australia’s Nine Network was knocked off the air by a cyberattack, and a nation-state operation is suspected. PHP takes steps to protect itself from an attempt to insert a backdoor in its source code. Apple fixes browser engine bugs. FatFace pays the ransom. Project Zero…
 
Dinner with SchmucksEpisode 146 “State of Emergency” Cast: Chris, Yajaria & DieterDinner: Shrimp & Fish BangBang TacosWelcome back to another new episode of Dinner with Schmucks! This week spring is here! We discuss our dinner, and Chris’s favorite place to find recipes these days, there is a spring theme throughout the episode including our “Sprin…
 
Vice President of Raytheon's Cyber Offense, Defense Experts Teresa Shea speaks of her journey from math to adapting new technologies on the cutting edge, With a love of math, Teresa was offered a scholarship by the Society of Women Engineering and decided to pursue a degree in electrical engineering. Unsurprisingly, there were few other women in he…
 
Guest Sergio Caltagirone from Dragos joins us to take us through their 2020 ICS Cybersecurity Year in Review report. Dragos's annual ICS Year in Review provides an overview and analysis of ICS vulnerabilities, global threat activity targeting industrial environments, and industry trends and observations gathered from customer engagements worldwide.…
 
Criminal-on-criminal cyber crime. Ransomware hits European and North American businesses. Big Tech goes (virtually) to Capitol Hill to talk disinformation and Section 230. The head or NSA and US Cyber Command discusses election security and cyber defense with the Senate Armed Services Committee. Russia complains of a US assault on Russia’s “civiliz…
 
The FBI warns organizations that Mamba ransomware is out and about in a newly evolved form. Facebook takes down a Chinese cyberespionage operation targeting Uyghurs. Huawei joins the Organization of Islamic Cooperation. Slack thinks it might have made a security and privacy misstep. Caleb Barlow from CynergisTek on Healthcare Interoperability. Our …
 
COVID-themed phishbait has shifted to vaccines. Notes on the ransomware exploiting vulnerable Exchange Servers. Purple Fox gets wormy. Sierra Wireless halts operations to remediate a ransomware incident. Notes on ICS vulnerabilities. More victims of third-party risk. Joe Carrigan looks at SMS security issues. Our guest is Ron Brash from Verve Indus…
 
The CyberWire partners with Recorded Future's threat intelligence podcast and our Dave Bittner is the host. It's a weekly show that comes out each Monday afternoon. We thought you might want to check it out and are adding it to our feed today. We hope you like it and consider subscribing in your favorite podcast app. The COVID-19 global pandemic ha…
 
Exchange Server patching is going well, they say, but they also say that patching isn’t enough. Crooks are continuing to look for unpatched instances, and even in the patched systems, you’ve got to check to make sure the bad actors have been found and ejected. AFCEA and Shell both disclose being affected by third-party breaches. Citizen Lab sees no…
 
Indian authorities warn the country’s transportation sector that it may be a target for cyberespionage. Google’s Project Zero describes an elaborate and expensive campaign that exploited zero-day vulnerabilities. The SilverFish threat group is elaborate, well-resourced, and well-organized. Threat actors are quietly altering mailbox permissions. REv…
 
Dinner with SchmucksEpisode 145 “Unsolicited D*ck Pics” Cast: Chris, Yajaria & DieterDinner: Sweet Sriracha Turkey Stir FryWelcome back to another new episode of Dinner with Schmucks! This week Another week brings another hodgepodge of topics! In this weeks edition of Nothing and Everything In Between we discuss Dick Pics, Yajaira’s weird stalker, …
 
Chief Security Officer of Microsoft Canada Kevin Magee shares his background as a historian and how it applies to his work in cybersecurity. Likening himself to a dashing Indiana Jones, Kevin talks about how he sees history unfolding and the most interesting things right now are happening in security. Spending time tinkering with things in the univ…
 
Guest Jen Miller-Osborn from Palo Alto Networks' Unit 42 joins us to discuss their research into BendyBear. Highly malleable, highly sophisticated and over 10,000 bytes of machine code. The code behavior and features strongly correlate with that of the WaterBear malware family, which has been active since as early as 2009. The malware is associated…
 
Helsinki blames Beijing’s APT31 for cyberespionage against Finland’s parliament. Russia withdraws its ambassador to the US, calling him home for consultation, post the US IC’s report on election influence ops. Risk management for industrial control systems, and especially for an often overlooked part of the power grid. Johannes Ullrich from SANS on…
 
On Tap Today: Join Vacant, Manimal, Coryn and Nairbons as they open up the bar one last time! We look back at the podcast as a whole and get a little misty eyed. Also drunk. Drunk enough to descend into a 3 hour ramble, in keeping with the true spirit of the Happy Hour. Thank you all if you ever chosen to listen to even a single second of the show.…
 
Disinformation about a radiation leak that wasn’t. Another warning about Trickbot. The FBI says cybercrime cost victims more than $4.2 billion last year. Investigation and remediation of the SolarWinds and Exchange Server compromises continue. Crypters become a commodity for malware developers. Robert M. Lee from Dragos on lessons from the recent T…
 
The US Intelligence Community has released its report on 2020 foreign election meddling. It found no successful hacking, but a lot of clever influence operations. Ukraine says it stopped a significant Russian cyberespionage campaign. Recovery from the SolarWinds and Exchange Server compromises continues. Joe Carrigan shares thoughts on the Verkada …
 
McAfee describes Operation Diànxùn, a probable Chinese collection effort directed against telecoms and 5G technology. Organizations around the world continue to work to thwart exploitation of Exchange Server vulnerabilities. What’s a webshell, and what can it do? Ben Yelin looks at cell phone data gathered from the US Capitol riot. Our guest is Ros…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login