Explore true stories of the dark side of the Internet with host Jack Rhysider as he takes you on a journey through the chilling world of hacking, data breaches, and cyber crime. ¿Hablas español? Escucha en español aquí ➔ https://darknetdiaries.com/es/
…
continue reading
Internet Security Podcasts
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
A brief daily summary of what is important in information security. The podcast is published every weekday and designed to get you ready for the day with a brief, usually 5 minutes long summary of current network security related events. The content is late breaking, educational and based on listener input as well as on input received by the SANS Internet Storm Center. You may submit questions and comments via our contact form at https://isc.sans.edu/contact.html .
…
continue reading
Unspoken Security is a raw and gritty podcast for security professionals who are looking to understand the most important issues related to making the world a safer place, including intelligence-driven security, risks and threats in the digital and physical world, and discussions related to corporate culture, leadership, and how world events impact all of us on and off our keyboards. In each episode, host AJ Nash engages with a range of industry experts to dissect current trends, share pract ...
…
continue reading
Twice per month, Peter House and Mike Chmielewski discuss current cyberthreats and issues. Internet Weather Report is recorded at the studios of Big Cabbage Radio in Palmer, Alaska.
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
The internet is broken—but it doesn’t have to be. If you’re concerned about how surveillance, online advertising, and automated content moderation are hurting us online and offline, the Electronic Frontier Foundation’s How to Fix the Internet podcast offers a better way forward. EFF has been defending your rights online for over thirty years and is behind many of the biggest digital rights protections since the invention of the internet. Through curious conversations with some of the leading ...
…
continue reading
In this podcast, networking guru Mattias Fridström, Chief Evangelist at Arelion and industry experts discuss all things Internet, networks, cloud and connectivity.
…
continue reading
Security Ledger is an independent security news website that explores the intersection of cyber security with business, commerce, politics and everyday life. Security Ledger provides well-reported and context-rich news and opinion about computer security topics that matter in our IP-enabled homes, workplaces and daily lives.
…
continue reading
Latest internet technology, trends, and solutions
…
continue reading
THEOS CyberNova is a cutting-edge podcast that explores the dynamic world of cybersecurity, hosted by THEOS Cyber CEO Paul Jackson. Each episode delves into the latest trends, challenges, and innovations shaping the cybersecurity landscape, featuring insights from industry experts, thought leaders, and technologists. Paul brings his expertise and passion for cyber security to engaging discussions on topics ranging from emerging threats and data privacy to the future of AI in cyber defense. W ...
…
continue reading
Internet safety, security, and digital parenting tips. You'll learn about protecting kids online (cybersafety), and general digital security and privacy (for adults as well as kids). https://DefendingDigital.com
…
continue reading
A podcast brought to you by Kosciusko Connect. On Connected Conversations, we talk about technology, the internet, and how to navigate the digital world in which we live.
…
continue reading
David Egts and Gunnar Hellekson discuss privacy, security, robots, and internet ephemera.
…
continue reading
computer help free. blogtvpccareman
…
continue reading
Johnny Ball is famous for knowing many things, so who better to tell you how to keep your computer safe from online fraud. Johnny's guides contain all you need to know about internet and email security. There are four wisdom-packed episodes to download onto your computer and portable audio player.
…
continue reading
Brought to you by IT Audit Labs. Trusted cyber security experts and their guests discuss common security threats, threat actor techniques and other industry topics. IT Audit Labs provides organizations with the leverage of a network of partners and specialists suited for your needs. We are experts at assessing security risk and compliance, while providing administrative and technical controls to improve our clients’ data security. Our threat assessments find the soft spots before the bad g ...
…
continue reading
Strange tales of hacking, tech, internet grifters, AI, and security with Jordan & Scott. Are internet hitmen really a thing? What does someone do with a crypto wallet full of millions and a lost password? Did a Minecraft scammer really hack the president? Hacked is a technology show about people hacking things together and apart, with your old pals Jordan Bloemen and Scott Francis Winder. Get at us via [email protected].
…
continue reading
The podcast where we choose a subject, read a single Wikipedia article about it, and pretend we’re experts. Because this is the internet, and that’s how it works now.
…
continue reading
Security Signal uncovers the signal from the noise for cybersecurity leaders, and helps them focus on important trends, threats and opportunities. Each episode translates cybersecurity complexities into actionable intelligence for executives at the helm. Security Signal helps leaders turn resilience into a competitive advantage. Follow us @CloudflareTV Explore our content hub for exclusive C-level conversations at cloudflare.tv/executive Read the full 2025 Cloudflare Security Signals report ...
…
continue reading
The Lawfare Podcast features discussions with experts, policymakers, and opinion leaders at the nexus of national security, law, and policy. On issues from foreign policy, homeland security, intelligence, and cybersecurity to governance and law, we have doubled down on seriousness at a time when others are running away from it. Visit us at www.lawfareblog.com. Support this show http://supporter.acast.com/lawfare. Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
The Pragmatic CSO podcast is a wide ranging discussion of information security topics, anchored by the 12-step Pragmatic CSO methodology to help security practitioners become more relevant in business operations.
…
continue reading
The Bid Picture podcast provides an array of information concerning cybersecurity. It includes the latest news and facts to keep listeners up-to-date with the most current events and developments in cybersecurity. At the same time, the podcast is not merely a factual digest; it also incorporates a range of opinions, encouraging its audience to consider different perspectives on cybersecurity matters. The Bid Picture podcast enriches its content by inviting a variety of guests. These guests c ...
…
continue reading
This is a weekly podcast on cyber security domains. We discuss, dissect and demystify the world of security by providing an in-depth coverage on the cybersecurity topics that matter most. All these in plain easy to understand language. Like it, share it, and most importantly enjoy it!
…
continue reading
Dive into the pulse of the Internet with This Week in NET. A weekly roundup of Cloudflare's latest news, innovations and the most impactful developments shaping the Internet. From security updates to performance breakthroughs, we deliver insights that matter to developers, businesses, and Internet enthusiasts alike. Each episode features expert analysis with special guests offering unique perspectives on today's digital challenges and evolving landscape. Follow us @CloudflareTV Read the blog ...
…
continue reading
Cybersecurity guru Steve Gibson joins Leo Laporte every Tuesday. Steve and Leo break down the latest cybercrime and hacking stories, offering a deep understanding of what's happening and how to protect yourself and your business. Security Now is a must listen for security professionals every week. Records live every Tuesday at 4:30pm Eastern / 1:30pm Pacific / 20:30 UTC.
…
continue reading
Join Matthew Chapman, a Cybersecurity Expert, as he interviews colleagues and industry professionals providing information, news, and hopefully a few laughs along the way. This podcast leverages 25 plus years of working in the industry on the front lines and architecting cybersecurity solutions for some of the largest companies in the world.
…
continue reading
RunAs Radio is a weekly Internet Audio Talk Show for IT Professionals working with Microsoft products.
…
continue reading
A helpful and hilarious take on the week's tech SNAFUs. Computer security industry veterans Graham Cluley and Carole Theriault chat with guests about cybercrime, hacking, and online privacy. It's not your typical cybersecurity podcast... Winner of the best and most entertaining cybersecurity podcast awards in 2018, 2019, 2022, 2023, and 2024, Smashing Security has had over ten million downloads. Past guests include Garry Kasparov, Mikko Hyppönen, and Rory Cellan-Jones. Follow the podcast on ...
…
continue reading
Felix explores Internet of Things (IoT) and Operational Technology cyber security. Perfect for project managers, developers, and those learning about penetration testing in this niche area. Email Felix using [email protected] Get more information at the website: yougottahackthat.com Find You Gotta Hack That on LinkedIn and X @gotta_hack
…
continue reading

1
Talkin' About [Infosec] News, Powered by Black Hills Information Security
Black Hills Information Security
Download and listen to our weekly infosec podcast where we discuss the latest attacks, breaches, and how they happened and why. We’re a team of penetration testers (ethical hackers) and friends that love how new technology can be broken and made to do things it was never intended to do.
…
continue reading
A series of Tips and Tricks to help entrepreneurs and business owners better understand what is needed when it comes to cyber security and business IT. A podcast brought to you by North Tech Group.
…
continue reading
Insightful audio from the global tech advisory firm.
…
continue reading
Host Jay Benjamin will help you learn how to use a new Linux Operating System. Find out how easy it is to keep your computer safe from preying eyes. When you need answers to questions concerning a Linux operating system or why you should consider converting your current laptop or desktop computer, we will promptly get you the information needed to confidently convert your computer and make the switch to an operating system that will give you Internet freedom for many years to come. "The Linu ...
…
continue reading
With readers from electric, gas, water and telecommunications, internet/cable utility organizations—as well as other key critical infrastructure segments—we reach a wide-spanning scope of decision makers across the industry. Because we have more than 20 years of established connections with the utility industry, we know this industry and our readership views us with trust that has been earned over many years.
…
continue reading
How does artificial intelligence change when people — not profit — truly come first? Join IRL’s host Bridget Todd, as she meets people around the world building responsible alternatives to the tech that’s changing how we work, communicate, and even listen to music.
…
continue reading
Here's where to find podcasts from The Nation. Political talk without the boring parts, featuring the writers, activists and artists who shape the news, from a progressive perspective.
…
continue reading

1
SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln;
6:47
6:47
Play later
Play later
Lists
Like
Liked
6:47Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44 Bluetooth Vulnerability Could Allow Eavesdropping A vulnerability i…
…
continue reading

1
SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln; (#)
6:48
6:48
Play later
Play later
Lists
Like
Liked
6:48SANS Stormcast Friday, June 27th, 2025: Open-VSX Flaw; Airoha Bluetooth Vulnerablity; Critical Cisco Identity Service Engine Vuln; Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-coul…
…
continue reading

1
Iran Shuts Down It's Own Internet - 2025-06-23
1:05:55
1:05:55
Play later
Play later
Lists
Like
Liked
1:05:55Register for Free, Live webcasts & summits: https://poweredbybhis.com 00:00 - PreShow Banter™ — Explaining the Muppets 03:09 - Iran Shuts Down It's Own Internet- BHIS - Talkin’ Bout [infosec] News 2025-06-23 04:52 - Story # 1: Iran’s government says it shut down internet to protect against cyberattacks 20:20 - Story # 2: Iranian bank linked to revo…
…
continue reading

1
SANS Stormcast Thursday, June 26th, 2025: Another Netscaler Vuln; CentOS Web Panel Vuln; IP Based Certs
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 Remote code execution in CentOS Web Panel - CVE-2025-48703 An arbitrary file upload vulnerab…
…
continue reading

1
Securing Journalism on the ‘Data-Greedy’ Internet
39:02
39:02
Play later
Play later
Lists
Like
Liked
39:02Public-interest journalism speaks truth to power, so protecting press freedom is part of protecting democracy. But what does it take to digitally secure journalists’ work in an environment where critics, hackers, oppressive regimes, and others seem to have the free press in their crosshairs? That’s what Harlo Holmes focuses on as Freedom of the Pre…
…
continue reading

1
SN 1030: Internet Foreground Radiation - The NPM Repository is Under Siege
2:48:29
2:48:29
Play later
Play later
Lists
Like
Liked
2:48:29An exploited iOS iMessage vulnerability Apple denies? The NPM repository is under siege with no end in sight. Were Comcast and Digital Realty compromised? Don't ask them. Matthew Green agrees: XChat does not offer true security. We may know how Russia is convicting Telegram users. Microsoft finally decides to block two insane Outlook file types. 40…
…
continue reading

1
EP58: Cloud connectivity, public internet, security standards, and enterprise networking trends
20:11
20:11
Play later
Play later
Lists
Like
Liked
20:11Misha Kuperman, Chief Reliability Officer at Zscaler is back on the podcast. In this episode he and Mattias Fridström discuss if the recent trade tariffs will impact services from Zscaler, whether people in general understand cloud connectivity, if security in the cloud is just a waste of bandwidth resources, what customers know about the public in…
…
continue reading

1
How Post-Quantum Computing (PQC) Will Save the Internet
1:03:40
1:03:40
Play later
Play later
Lists
Like
Liked
1:03:40In this unfiltered episode of Unspoken Security, host A. J. Nash explores the looming threat quantum computing poses to our digital infrastructure with experts Robert Clyde, Managing Director of Clyde Consulting and Chair of crypto-security firm CryptoQuanti, and Jamie Norton, a Board Director at ISACA with extensive cybersecurity credentials. They…
…
continue reading

1
Lawfare Archive: Natan Sachs on Israeli Anti-solutionism
27:09
27:09
Play later
Play later
Lists
Like
Liked
27:09From December 5, 2015: The show this week features Natan Sachs, a Fellow in Foreign Policy at the Brookings Institution, who recently published an article in Foreign Affairs on anti-solutionism as strategy in the Israel-Palestine conflict. During his conversation with Lawfare Editor-in-Chief Ben Wittes, Sachs argues that the apparent absence of a l…
…
continue reading

1
Lawfare Daily: Ukraine-Russia Negotiations with Eric Ciaramella and Samuel Charap
1:08:15
1:08:15
Play later
Play later
Lists
Like
Liked
1:08:15Lawfare Legal Fellow Mykhailo Soldatenko sits down with Eric Ciaramella, Senior Fellow at the Carnegie Endowment for International Peace, and Samuel Charap, Senior Political Scientist at Rand Corporation, to discuss the key issues in the Ukraine-Russia talks. They chat about the national interests of the interested parties, whether a negotiated set…
…
continue reading

1
Iran Strikes and Ceasefire, Nato Ups Defense Budgets, Supreme Court Okays Government Trafficking Migrants | American Prestige
40:04
40:04
Play later
Play later
Lists
Like
Liked
40:04Don’t forget to purchase our “Welcome to the Crusades” series before the price increases next week. Paid AP subscribers get a 25% discount, so subscribe today! Danny and Derek broadcast from an undisclosed resort location. This week: an update on the conflict with Iran, including the ceasefire (2:34), Trump’s disagreement with US intelligence asses…
…
continue reading

1
Rational Security: The “Pronghorn Shirt Daily” Edition
1:18:09
1:18:09
Play later
Play later
Lists
Like
Liked
1:18:09This week, Scott sat down with his Lawfare colleagues Benjamin Wittes and Natalie Orpett, and University of Virginia School of Law professor Ashley Deeks, to talk through the week’s big national security news, including: “Bracing for Fallout.” In a surprise move, President Trump joined Israel’s military campaign against Iran over the weekend, using…
…
continue reading

1
395. Local Restaurants Are Disappearing Worldwide.
43:08
43:08
Play later
Play later
Lists
Like
Liked
43:08Send Bidemi a Text Message! In this episode, host Bidemi Ologunde examines the disappearance of independent and small franchise restaurants as a result of multiple intersecting factors. Support the showBy CHIP STORY Media & Rainmaker Podcasts
…
continue reading

1
Lawfare Daily: ‘Ransom War’ with Max Smeets
53:06
53:06
Play later
Play later
Lists
Like
Liked
53:06Max Smeets, Co-Director of Virtual Routes and Senior Researcher at ETH Zurich, joins Lawfare’s Jonathan Cedarbaum and Justin Sherman to discuss his recently released book “Ransom War: How Cybercrime Became a Threat to National Security.” They discuss the history of ransomware (including the term itself), how the threats have evolved over the years,…
…
continue reading

1
Why is Fighting Cybercrime Worth the Effort?
45:52
45:52
Play later
Play later
Lists
Like
Liked
45:52Cyber crime continues to grow each year, but should organizations give up fighting it? On this episode of Unspoken Security, host AJ Nash speaks with Robert Duncan from Netcraft, who argues the answer is absolutely not. Robert makes the case that fighting cyber crime is worth the effort, even when it feels like an endless battle. Robert challenges …
…
continue reading

1
Chatbots Are Repeating Social Media’s Harms | Tech Won't Save Us
53:48
53:48
Play later
Play later
Lists
Like
Liked
53:48On this episode of Tech Won't Save Us, Paris Marx is joined by Nitasha Tiku to discuss how AI companies are preying on users to drive engagement and how that’s repeating many of the problems we’re belatedly trying to address with social media companies at an accelerated pace. Nitasha Tiku is a technology reporter at the Washington Post. Advertising…
…
continue reading

1
Operation Endgame, deepfakes, and dead slugs
54:59
54:59
Play later
Play later
Lists
Like
Liked
54:59In this episode, Graham unravels Operation Endgame - the surprisingly stylish police crackdown that is seizing botnets, mocking malware authors with anime videos, and taunting cybercriminals via Telegram. Meanwhile, Carole exposes the AI-generated remote hiring threat. Could your next coworker be a North Korean hacker with a perfect LinkedIn? And B…
…
continue reading

1
SANS Stormcast Thursday, June 26th, 2025: Another Netscaler Vuln; CentOS Web Panel Vuln; IP Based Certs (#)
5:53
5:53
Play later
Play later
Lists
Like
Liked
5:53SANS Stormcast Thursday, June 26th, 2025: Another Netscaler Vuln; CentOS Web Panel Vuln; IP Based Certs NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumbe…
…
continue reading
The Charge of the Light Brigade was a military action undertaken by British light cavalry against Russian forces during the Battle of Balaclava in the Crimean War, resulting in many casualties to the cavalry. On 25 October 1854, the Light Brigade, led by Lord Cardigan, mounted a frontal assault against a Russian artillery battery which was well-pre…
…
continue reading

1
Lawfare Daily: A Right to Warn: Protecting AI Whistleblowers with Charlie Bullock
41:11
41:11
Play later
Play later
Lists
Like
Liked
41:11In the wake of controversy over OpenAI’s restrictive nondisclosure agreements, a bipartisan group of senators has introduced the AI Whistleblower Protection Act. In this episode, Lawfare Research Director Alan Rozenshtein spoke with Charlie Bullock, Senior Research Fellow at the Institute for Law & AI and co-author of a new Lawfare article on the b…
…
continue reading

1
How E. Jean Carroll Beat Trump in Court—Plus, What Really Happened in the 2024 Election | Start Making Sense
36:45
36:45
Play later
Play later
Lists
Like
Liked
36:45Donald Trump, found guilty of sexual assault and defamation, owes E. Jean Carroll $88 million. She explains how she beat him in court, twice, proving that he attacked her in a Bergdorf dressing room and then lied about it. Her new book is Not My Type: One Woman vs. a President. Also, the leading autopsies on the 2024 defeat of Democrats are missing…
…
continue reading
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwante…
…
continue reading

1
SN 1031: How Salt Typhoon Gets In - What "AI" Really Means
3:00:38
3:00:38
Play later
Play later
Lists
Like
Liked
3:00:38China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwante…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each scans than they used to, but the average length of passwords did not change. https://isc.sans.edu/diary/Quick%20Pass…
…
continue reading
How do you get more from GitHub in your work routine? Richard chats with April Yoho about how sysadmins can take advantage of more GitHub features to make better quality scripts and more! April discusses the capabilities of GitHub Copilot to assist administrators in comprehending the intricacies of source management, including branching and merging…
…
continue reading
By Big Cabbage Radio
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix (#)
4:03
4:03
Play later
Play later
Lists
Like
Liked
4:03SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each s…
…
continue reading

1
Lawfare Daily: U.S. Strikes on Iranian Nuclear Facilities
59:34
59:34
Play later
Play later
Lists
Like
Liked
59:34In a live conversation on June 23, Lawfare Editor-in-Chief Benjamin Wittes spoke to Lawfare Senior Editor Scott Anderson, Lawfare Foreign Policy Editor and CSIS fellow Daniel Byman, and Vice President and Director of Foreign Policy at the Brookings Institution Suzanne Maloney about the American attacks on Iranian nuclear sites, what the reaction wi…
…
continue reading

1
Tracking Think Tanks w/ Ben Freeman and Nick Cleveland-Stout | American Prestige
54:33
54:33
Play later
Play later
Lists
Like
Liked
54:33Ben Freeman and Nick Cleveland-Stout from the Quincy Institute join the program to talk about their Think Tank Funding Tracker, a repository that tracks funding from foreign governments, the U.S. government, and Pentagon contractors to the top 50 think tanks in the United States over the past five years. The group discusses think tanks’ role in the…
…
continue reading
There are some good reasons to let AI into our brains. But how much do we know about the privacy of brain data? Host Bridget Todd explores how AI is interacting with our thoughts, memories and (dis)abilities, and what it all means for brain privacy. Ian Burkhart had an experimental brain implant that allowed him to move his hand and fingers after h…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%20AtHome%20IP%20Cameras/32062 Critical Netscaler Security Update CVE-2025-5777 CVE 2025-5777 is a critical severity vu…
…
continue reading

1
SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability (#)
5:04
5:04
Play later
Play later
Lists
Like
Liked
5:04SANS Stormcast Tuesday, June 24th, 2025: Ichano ATHome IP Camera Scans; Netscaler Vulnerability; WinRar Vulnerability Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%…
…
continue reading

1
Greater America and the Victims of Its Ambition | The Nation Podcast
40:55
40:55
Play later
Play later
Lists
Like
Liked
40:55On a recent trip to El Salvador, writer Viet Thanh Nguyen noticed striking parallels between the small Central American nation and his own country of origin, Vietnam. Both endured the atrocities of war, each fueled by anti-communist U.S. intervention. And both conflicts—the Vietnam War and El Salvador’s civil war—triggered refugee and migrant crise…
…
continue reading

1
Lawfare Daily: The Trials of the Trump Administration, June 20
1:34:12
1:34:12
Play later
Play later
Lists
Like
Liked
1:34:12In a live conversation on June 20, Lawfare Executive Editor Natalie Orpett sat down with Lawfare Legal Fellow James Pearce and Lawfare Senior Editors Anna Bower, Scott Anderson, and Roger Parloff to discuss the litigation over President Trump federalizing the California National Guard to send them to L.A., the the order for the release of Mahmoud K…
…
continue reading

1
SANS Stormcast Monday, June 23rd, 2025: ADS and Python; More Secure Cloud PCs; Zend.to Path Traversal; Parser Differentials
5:36
5:36
Play later
Play later
Lists
Like
Liked
5:36ADS & Python Tools Didier explains how to use his tools cut-bytes.py and filescanner to extract information from alternate data streams. https://isc.sans.edu/diary/ADS%20%26%20Python%20Tools/32058 Enhanced security defaults for Windows 365 Cloud PCs Microsoft announced more secure default configurations for its Windows 365 Cloud PC offerings. https…
…
continue reading