My Honeypot History Podcast will deep dive into my 31 years of life and my honeypot history, the good and bad in all of its detail. Specifically, After 12 years of dealing with several health issues including Endometriosis, Adenomyosis, Uterine Fibroids, Ovarian cysts, and 500+ days of bleeding consistently - I underwent two surgeries that ultimately ended in a radical hysterectomy and removal of my left ovary. Between the physical health issues; my mental health also took a negative turn an ...
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
Please ENTER into the HoneyPot! Inside you will see ARTISTs flying on brooms or from ceiling tops. A canvas is being painted and a camera flashes blue at subjects as a piano creates a guitar melody 4 a song; HERE we make, see, smell, 👅 & eat up all art. Don't hesitate to enter, you will enjoy it!
…
continue reading
Archive 81 is a fiction podcast about horror, cities, and the subconscious. New episodes will be released every other Wednesday. Start from "01 - A Body In A New Place"
…
continue reading
The so-called ultra MAGA movement is about to overturn America's political status quo. Elon Musk threatens censorship at Twitter with free-speech absolutism.
…
continue reading
This series features brief discussions with leading China experts on a range of issues in the U.S.-China relationship, including domestic politics, foreign policy, economics, security, culture, the environment, and areas of global concern. For more interviews, videos, and links to events, visit our website: www.ncuscr.org. The National Committee on U.S.-China Relations is the leading nonprofit, nonpartisan organization that encourages understanding of China and the United States among citize ...
…
continue reading
The "Elephant in the Org" podcast is a daring dive into the unspoken challenges and opportunities in organizational development, particularly in the realm of employee experience. Hosted by the team at The Fearless PX, we tackle the "elephants" in the room—those taboo or ignored topics—that are critical for creating psychologically safe and highly effective workplaces.
…
continue reading
Heroine may cause a man to feel invincible. Cocaine may make a man feel like he can run past the speed of light. Ecstasy may make a man feel like every nerve in his body is coming alive. Still, no matter how potent those substances may be, it's a fact, love is the most potent drug of all. This fact is especially true when Juan awakens from a two-month coma, unsure of what his life had been. The only time he feels he is close to the truth is in the presence of women with specific characterist ...
…
continue reading
Eleanor "El" Rivkin is a misanthropic information broker who grapples with a tangled web of corruption, murder, and her own mysterious abilities in 1990s New York City. Starring Brigette Lundy-Paine (Atypical), Erin Darke (Mrs Maisel), Moises Airas (Hannah Montanna), Rich Sommer (Mad Men) and Kevin Pollak (A Few Good Men). Created by Carina Green and Ryan Patch.
…
continue reading
Every IT professional could use more knowledge about network security, but who has time to study? Grab some knowledge on the go with Radio Free Security, the network security podcast produced by WatchGuard LiveSecurity Service reporters.
…
continue reading
Static soul yet the voice being in echo tearing through everything and reaching the corners of the world. With this thought in mind, we at SECARMY are plausibly delighted to present the SECARMY podcast. SECARMY podcast is a exclusively and exquisitely interesting series published with an ambition to reach and teach people throughout the world. Where tons are stumbling across the existence, we bring this series to build a path for everyone to walk on. Embrace yourself; it's time for a journey ...
…
continue reading
The Quarter Life Crisis is a bi-weekly podcast by two millennials discussing their unfiltered confessions and revelations about first world problems: from relationships to careers and everything in between, this will make you relieved to know you’re not alone! Get in touch and let us know your QLCs, [email protected]
…
continue reading
Hi I'm melora leigh and sometimes you will here from my hubby of 15 yrs josh and we are from south Louisiana. I have no filter and I am extremely opinionated and very happy to vocalize my feelings about what ever. I'm also extremely Random and often get overly emotional and excited about the way things happen or something I see in tv movies and internet or hear on the radio. So I will randomly post my thoughts. So I hope to not offend anyone but I can try to give you a different perspective ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from governm ...
…
continue reading
Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from governm ...
…
continue reading

1
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
…
continue reading

1
SANS Stormcast Friday, May 16th: Increase in Sonicwall Scans; RVTools Compromised?; RountPress
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
…
continue reading

1
SANS Stormcast Thursday, May 15th: Google Open Redirects; Adobe, Ivanti, and Samsung patches
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
…
continue reading

1
China and the Hill: How Fentanyl Opened the Door to U.S.-China Tariff Talks—and What’s Next for Trade
7:48
7:48
Play later
Play later
Lists
Like
Liked
7:48China & the Hill is a weekly newsletter covering Washington DC’s China-focused debates, actions, and reactions. Readers will receive a curated digest of this week’s most pressing U.S.-China news and its impact on businesses and policy, and can listen to the top stories in podcast form on the U.S.-China Podcast. China & the Hill is published by the …
…
continue reading

1
We Look Inclusive. We Just Don’t Act Like It. with Dr. Angela Young
53:54
53:54
Play later
Play later
Lists
Like
Liked
53:54Send us a text Let’s talk about the difference between looking inclusive — and actually being inclusive. In this powerful episode, Marion and Danny are joined by Dr. Angela Young, a bold advocate for digital accessibility, to break down the emotional labor, internalized ableism, and corporate gaslighting that so many disabled, neurodivergent, and n…
…
continue reading

1
SANS Stormcast Wednesday, May 14th: Microsoft Patch Tuesday; 0-Days patched for Ivanti Endpoint Manager and Fortinet Products
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.san…
…
continue reading

1
SANS Stormcast Tuesday, May 12th: Apple Patches; Unipi Technologies Scans;
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking d…
…
continue reading

1
SANS Stormcast Monday, May 11th: Steganography Challenge; End-of-Life Routers; ASUS Driverhub; RV-Tools SEO Poisoning
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/ FBI Warns of End-of-life routers The FBI is tracking larger…
…
continue reading

1
CHINA Town Hall 2025 | The First 100 Days of President Trump's China Policy
1:02:54
1:02:54
Play later
Play later
Lists
Like
Liked
1:02:54CHINA Town Hall (CTH), a program that provides a snapshot of the current U.S.-China relationship and examines how that relationship reverberates at the local level – in our towns, states, and nation – connects people around the country with U.S. policymakers and thought leaders on China. The 2025 CHINA Town Hall program took place on Thursday, Apri…
…
continue reading

1
SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch
4:57
4:57
Play later
Play later
Lists
Like
Liked
4:57No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932 SAMSUNG magicINFO 9 Server Flaw Still exploitable The SAMSUNG magicINFO 9 Serv…
…
continue reading

1
SANS Stormcast Thursday, May 8th: Modular Malware; Sysaid Vuln; Cisco Wireless Controller Patch; Unifi Protect Camera Patch
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%22Modular%22%20Malware/31928 Sysaid XXE Vulnerabilities IT Service Management Software Sysaid patched a number of XXE vulner…
…
continue reading

1
SANS Stormcast Wednesday, May 7th: Infostealer with Webserver; Android Update; CISA Warning
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that, in addition to implementing typical infostealer functionality, includes a web server suitable to create local phishing sites. https://isc.sans.edu/diary/Python%20InfoStealer%20with%20Embedded%20Phishing%20Webserver/31924 Android Update Fixes Freetype 0…
…
continue reading

1
SANS Stormcast Tuesday, May 6th: Mirai Exploiting Samsung magicInfo 9; Kali Signing Key Lost;
6:57
6:57
Play later
Play later
Lists
Like
Liked
6:57Mirai Now Exploits Samsung MagicINFO CMS CVE-2024-7399 The Mirai botnet added a new vulnerability to its arsenal. This vulnerability, a file upload and remote code execution vulnerability in Samsung s MagicInfo 9 CMS, was patched last August but attracted new attention last week after being mostly ignored so far. https://isc.sans.edu/diary/Mirai+No…
…
continue reading

1
SANS Stormcast Monday, May 5th: Steganography Challenge; Microsoft Makes Passkeys Default and Moves Away from Authenticator as Password Manager; Magento Components Backdoored.
5:57
5:57
Play later
Play later
Lists
Like
Liked
5:57Steganography Challenge Didier published a fun steganography challenge. A solution will be offered on Saturday. https://isc.sans.edu/diary/Steganography+Challenge/31910 Microsoft Makes Passkeys Default Authentication Method Microsoft is now encouraging new users to use Passkeys as the default and only login method, further moving away from password…
…
continue reading

1
SANS Stormcast Friday, May 2nd: More Steganography; Malicious Python Packages GMail C2; BEC to Steal Rent Payments
7:16
7:16
Play later
Play later
Lists
Like
Liked
7:16Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
…
continue reading

1
SANS Stormcast Thursday, May 1st: Sonicwall Attacks; Cached Windows RDP Credentials
6:28
6:28
Play later
Play later
Lists
Like
Liked
6:28Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
…
continue reading

1
Data: Great for Marketing Plans, Terrifying for Fragile C-Suite Egos with Angelique Slob
50:53
50:53
Play later
Play later
Lists
Like
Liked
50:53Send us a text Leaders love to claim they're "data-driven" — right up until the numbers challenge their egos. In this episode, Marion, Cacha, and Danny sit down with Future of Work strategist Angelique Slob to dig into why industrial-era mindsets still dominate modern workplaces, why ignoring internal data is costing organizations dearly, and how r…
…
continue reading

1
SANS Stormcast Wednesday, April 30th: SMS Attacks; Apple Airplay Vulnerabilities
8:51
8:51
Play later
Play later
Lists
Like
Liked
8:51More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
…
continue reading

1
China & the Hill: The New U.S. Ambassador to China, Securing the Skies, and Tariffs Start to Bite
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58China & the Hill is a weekly newsletter covering Washington DC’s China-focused debates, actions, and reactions. Readers will receive a curated digest of this week’s most pressing U.S.-China news and its impact on businesses and policy, and can listen to the top stories in podcast form on the U.S.-China Podcast. China & the Hill is published by the …
…
continue reading

1
SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
…
continue reading

1
[Part 2] The black, white, and gray of Chinese funding in Brazil
29:48
29:48
Play later
Play later
Lists
Like
Liked
29:48China remains one of the largest capital exporters in the world, yet there is generally a lack of reliable information on the consequences of Chinese overseas projects. These projects range into the billions and can be transformative for local economies, especially for emerging technologies, large-scale infrastructure, and sustainable energy projec…
…
continue reading

1
[Part 1] The black, white, and gray of Chinese funding in Guinea
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50China remains one of the largest capital exporters in the world, yet there is generally a lack of reliable information on the consequences of Chinese overseas projects. These projects range into the billions and can be transformative for local economies, especially for emerging technologies, large-scale infrastructure, and sustainable energy projec…
…
continue reading

1
SANS Stormcast Monday, April 28th: Image Steganography; SAP Netweaver Exploited
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
…
continue reading

1
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues;
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
…
continue reading

1
SANS Stormcast Wednesday, April 23rd: More xorsearch Updates; DKIM Replay Attack; SSL.com Vulnerability Fixed
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
…
continue reading

1
SANS Stormcast Tuesday, April 22nd: Phishing via Google; ChatGPT Fingerprint; Asus AI Cloud Vuln; PyTorch RCE
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL. https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%2…
…
continue reading

1
China-India Relations: How Asia’s Giants Are Navigating a Changing Indo-Pacific
29:32
29:32
Play later
Play later
Lists
Like
Liked
29:32Efforts to normalize relations between India and China signal a potential shift in one of Asia’s most complex rivalries. As both countries navigate de-escalation efforts while advancing competing strategic interests and structural issues remain, we will examine the geopolitical calculus behind the apparent thaw and its implications for regional sec…
…
continue reading

1
SANS Stormcast Monday, April 21st: MSFT Entra Lockouts; Erlang/OTP SSH Exploit; Sonicwall Exploit; bubble.io bug
7:31
7:31
Play later
Play later
Lists
Like
Liked
7:31Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widesp…
…
continue reading

1
SANS Stormcast Friday, April 18th: Remnux Cloud Environment; Erlang/OTP SSH Vuln; Brickstorm Backdoor Analysis; GPT 4.1 Safety Controversy
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18RedTail: Remnux and Malware Management A description showing how to set up a malware analysis in the cloud with Remnux and Kasm. RedTail is a sample to illustrate how the environment can be used. https://isc.sans.edu/diary/RedTail%2C%20Remnux%20and%20Malware%20Management%20%5BGuest%20Diary%5D/31868 Critical Erlang/OTP SSH Vulnerability Researchers …
…
continue reading

1
What Lies Ahead for Global Climate Cooperation?
26:33
26:33
Play later
Play later
Lists
Like
Liked
26:33The National Committee on U.S.-China Relations, the Center on Global Energy Policy at Columbia University, and the Beijing Green Finance Association, under the guidance of the Institute of Energy, Environment, and Economy at Tsinghua University, convened the fourth Track II Dialogue on Climate Finance and Trade in September 2024. The teams discusse…
…
continue reading

1
SANS Stormcast Thursday April 17th: Apple Updates; Oracle Updates; Google Chrome Updates; CVE News;
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04Apple Updates Apple released updates for iOS, iPadOS, macOS, and VisionOS. The updates fix two vulnerabilities which had already been exploited against iOS. https://isc.sans.edu/diary/Apple%20Patches%20Exploited%20Vulnerability/31866 Oracle Updates Oracle released it quarterly critical patch update. The update addresses 378 security vulnerabilities…
…
continue reading

1
Your CEO Might Be a Narcissist… But Don’t Panic (Yet!) with Danny Wareham
59:07
59:07
Play later
Play later
Lists
Like
Liked
59:07Send us a text We’re going dark… but in a totally self-aware, psychologically fascinating kind of way. This week on The Elephant in the Org, we’re diving into the Dark Triad — narcissism, psychopathy, and Machiavellianism — and how these personality traits show up in leadership. Our guest, the brilliant Danny Wareham (organisational psychologist, c…
…
continue reading

1
SANS Stormcast Wednesday Apr 16th: File Upload Service Abuse; OpenSSH 10.0 Released; Apache Roller Vuln; Possible CVE Changes
5:54
5:54
Play later
Play later
Lists
Like
Liked
5:54Online Services Again Abused to Exfiltrate Data Attackers like to abuse free online services that can be used to exfiltrate data. From the originals , like pastebin, to past favorites like anonfiles.com. The latest example is gofile.io. As a defender, it is important to track these services to detect exfiltration early https://isc.sans.edu/diary/On…
…
continue reading

1
China & the Hill: Are Chinese Mercenaries Fighting in Ukraine? Did Beijing Just Admit to Cyberattacks?
9:43
9:43
Play later
Play later
Lists
Like
Liked
9:43China & the Hill is a weekly newsletter covering Washington DC’s China-focused debates, actions, and reactions. Readers will receive a curated digest of this week’s most pressing U.S.-China news and its impact on businesses and policy, and can listen to the top stories in podcast form on the U.S.-China Podcast. China & the Hill is published by the …
…
continue reading

1
SANS Stormcast Tuesday April 15th: xorsearch Update; Short Lived Certificates; New USB Malware
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35xorsearch Update Diedier updated his "xorsearch" tool. It is now a python script, not a compiled binary, and supports Yara signatures. With Yara support also comes support for regular expressions. https://isc.sans.edu/diary/xorsearch.py%3A%20Searching%20With%20Regexes/31854 Shorter Lived Certificates The CA/Brower Forum passed an update to reduce t…
…
continue reading

1
SANS Stormcast Monday April 14th: Langlow AI Attacks; Fortinet Attack Cleanup; MSFT Inetpub;
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248) After spotting individaul attempts to exploit the recent Langflow vulnerability late last weeks, we now see more systematic internet wide scans attempting to verify the vulnerability. https://isc.sans.edu/forums/diary/Exploit+Attempts+for+Recent+Langflow+AI+Vulnerability+CVE20253…
…
continue reading

1
SANS Stormcast Friday April 11th: Network Infraxploit; Windows Hello Broken; Dell Update; Langflow Exploit
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34Network Infraxploit Our undergraduate intern, Matthew Gorman, wrote up a walk through of CVE-2018-0171, an older Cisco vulnerability, that is still actively being exploited. For example, VOLT TYPHOON recently exploited this problem. https://isc.sans.edu/diary/Network+Infraxploit+Guest+Diary/31844 Windows Update Issues / Windows 10 Update Microsoft …
…
continue reading

1
SANS Stormcast ThursdayApril 10th: Getting Past PyArmor; CenterStack RCE; Android 0-Day Patch; VMware Tanzu Patches; Odd Win11 Directory; WhatsApp File Confusion; SANS AI Guide;
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35Getting Past PyArmor PyArmor is a python obfuscation tool used for malicious and non-malicious software. Xavier is taking a look at a sample to show what can be learned from these obfuscated samples with not too much work. https://isc.sans.edu/diary/Obfuscated%20Malicious%20Python%20Scripts%20with%20PyArmor/31840 CenterStack RCE CVE-2025-30406 Glad…
…
continue reading

1
SANS Stormcast Wednesday, April 10th: Microsoft Patch Tuesday; Adobe Patches; OpenSSL 3.5 with PQC; Fortinet
7:19
7:19
Play later
Play later
Lists
Like
Liked
7:19Microsoft Patch Tuesday Microsoft patched over 120 vulnerabilities this month. 11 of these were rated critical, and one vulnerability is already being exploited. https://isc.sans.edu/diary/Microsoft%20April%202025%20Patch%20Tuesday/31838 Adobe Updates Adobe released patches for 12 different products. In particular important are patches for Coldfusi…
…
continue reading

1
China & the Hill: 104% Tariffs, Honeypot Concerns, and the End of $5 Temu Hauls
11:04
11:04
Play later
Play later
Lists
Like
Liked
11:04China & the Hill is a weekly newsletter covering Washington DC’s China-focused debates, actions, and reactions. Readers will receive a curated digest of this week’s most pressing U.S.-China news and its impact on businesses and policy, and can listen to the top stories in podcast form on the U.S.-China Podcast. China & the Hill is published by the …
…
continue reading
XORsearch: Searching With Regexes Didier explains a workaround to use his tool XORsearch to search for regular expressions instead of simple strings. https://isc.sans.edu/diary/XORsearch%3A%20Searching%20With%20Regexes/31834 MCP Security Notification: Tool Poisoning Attacks Invariant labs summarized a critical weakness in the Model Context Protocol…
…
continue reading