Security Unlocked explores the technology and people powering Microsoft's Security solutions. In each episode, Microsoft Security evangelists Nic Fillingham and Natalia Godyla take a closer look at the latest innovations in threat intelligence, security research, and data science, with a special focus on demystifying artificial intelligence and machine learning. Be sure to listen in and follow us! Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Microsoft Ml Podcasts

1
The TWIML AI Podcast (formerly This Week in Machine Learning & Artificial Intelligence)
Sam Charrington
Machine learning and artificial intelligence are dramatically changing the way businesses operate and people live. The TWIML AI Podcast brings the top minds and ideas from the world of ML and AI to a broad and influential community of ML/AI researchers, data scientists, engineers and tech-savvy business and IT leaders. Hosted by Sam Charrington, a sought after industry analyst, speaker, commentator and thought leader. Technologies covered include machine learning, artificial intelligence, de ...
…
continue reading
The Everyday AI podcast is a daily livestream, podcast and free newsletter where we help everyday people grow their careers with AI. The Everyday AI podcast is hosted by Jordan Wilson, a former journalist who's now the owner of a boutique digital strategy company with 20 years of martech experience. Our main focus is to help you keep up with AI trends to make your job easier. Get your work done faster. Increase your output. - Sign up for our free Prime Prompt Polish ChatGPT course: https://p ...
…
continue reading
Technical interviews about software topics.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading

1
SANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerability Details Released
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://is…
…
continue reading

1
Grokking, Generalization Collapse, and the Dynamics of Training Deep Neural Networks with Charles Martin - #734
1:25:21
1:25:21
Play later
Play later
Lists
Like
Liked
1:25:21Today, we're joined by Charles Martin, founder of Calculation Consulting, to discuss Weight Watcher, an open-source tool for analyzing and improving Deep Neural Networks (DNNs) based on principles from theoretical physics. We explore the foundations of the Heavy-Tailed Self-Regularization (HTSR) theory that underpins it, which combines random matri…
…
continue reading

1
EP 539: The 1 new Claude feature that changes knowledge work and how to use it
49:06
49:06
Play later
Play later
Lists
Like
Liked
49:06Stop what you're doing and read this 👇 ↳ Claude just dropped something new that slipped under the radar. ↳ Other companies have been working on it for a bit as well. ↳ This is the future of knowledge work. ↳ So you should learn now. ↳ Join us to find out what it is. Newsletter: Sign up for our free daily newsletter More on this Episode: Episode Pag…
…
continue reading

1
SANS Stormcast Wednesday, June 4th, 2025: vBulletin Exploited; Chrome 0-Day Patch; Roundcube RCE Patch; Multiple HP StoreOnce Vulns Patched
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%…
…
continue reading

1
EP 538: 50% Jobs Gone due to AI? Anthropic CEO’s Explosive AI Job Warning
51:44
51:44
Play later
Play later
Lists
Like
Liked
51:44Is AI gonna wipe out 50% of entry-level jobs? Anthropic's CEO says that's the case when it comes to AI jobs disruption and entry-level, white-collar jobs. So..... is that for real? Or just an AI CEO trying to pump his company's newly released tools? Join us to find out! Newsletter: Sign up for our free daily newsletter More on this Episode: Episode…
…
continue reading
Agentic AI is seen as a key frontier in artificial intelligence, enabling systems to autonomously act, adapt in real-time, and solve complex, multi-step problems based on objectives and context. Unlike traditional rule-based or generative AI, which are limited to predefined or reactive tasks, agentic AI processes vast information, models uncertaint…
…
continue reading

1
SANS Stormcast Tuesday, June 3rd, 2025: Windows SSH C2; Google Removes CAs from trusted list; MSFT issues Emergency Patch to fix Crash issue; Qualcom Adreno GPU 0-day
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
…
continue reading

1
EP 537: Perplexity goes agentic, Google Gemini updates, NYT/Amazon team up & more AI News That Matters
51:04
51:04
Play later
Play later
Lists
Like
Liked
51:04Perplexity is pivoting hard... and we like it. The New York Times (even amidst its fight with Big AI) just partnered with a big AI company. And Google Gemini just got a lot better for workspace users, and you won't have to lift a finger. AI got a lot more useful this week. Join us to find out how it's changing how we work. Newsletter: Sign up for o…
…
continue reading

1
SANS Stormcast Monday, June 2nd, 2025: PNG with RAT; Cisco IOS XE WLC Exploit; vBulletin Exploit
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently p…
…
continue reading

1
EP 536: Agentic AI - The risks and how to tackle them responsibly
31:45
31:45
Play later
Play later
Lists
Like
Liked
31:45We only talk about the upside of agentic AI. But why don't we talk about the risks? As AI agents grow exponentially more capable, so too does the likelihood of something going wrong. So how can we take advantage of agentic AI while also addressing the risks head-on? Join us to learn from a global leader on Responsible AI. Newsletter: Sign up for ou…
…
continue reading

1
SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2;
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
…
continue reading

1
EP 535: How AI Is Changing Personal Data and Privacy Forever
32:10
32:10
Play later
Play later
Lists
Like
Liked
32:10We're so quick to give AI access to see the world around us, but what are the dangers? And what are some powers that you're not aware of? We'll be sharing both as Michael Tiffany, Co-Founder and CEO of Fulcra Dynamics, joins us to discuss. Newsletter: Sign up for our free daily newsletter More on this Episode: Episode Page Join the discussion: Have…
…
continue reading

1
Chip Design in the AI Era with Thomas Andersen
50:15
50:15
Play later
Play later
Lists
Like
Liked
50:15Synopsys is a leading electronic design automation company specializing in silicon design and verification, as well as software integrity and security. Their tools are foundational to the creation of modern chips and embedded software, powering everything from smartphones to cars. Chip design is a deeply complex process, often taking months or year…
…
continue reading

1
SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
…
continue reading
Today, I’m excited to share a special crossover edition of the podcast recorded live from Google I/O 2025! In this episode, I join Shawn Wang aka Swyx from the Latent Space Podcast, to interview Logan Kilpatrick and Shrestha Basu Mallick, PMs at Google DeepMind working on AI Studio and the Gemini API, along with Kwindla Kramer, CEO of Daily and cre…
…
continue reading

1
EP 534: Claude 4 - Your Guide to Opus 4, Sonnet 4 & New Features
45:23
45:23
Play later
Play later
Lists
Like
Liked
45:23Claude 4: Game-changer or just more AI noise? Anthropic's new Opus 4 and Sonnet 4 models are officially out and crushing coding benchmarks like breakfast cereal. They're touting big coding gains, fresh tools, and smarter AI agentic capabilities. Need to know what's actually up with Claude 4, minus the marketing fluff? Join us as we dive in. Newslet…
…
continue reading

1
Protecting AI at the Edge with David Weston
38:36
38:36
Play later
Play later
Lists
Like
Liked
38:36In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone share David Weston’s keynote from BlueHat India 2025. David explores the growing role of on-device AI in Windows, the security risks it introduces, and how Microsoft is rethinking architecture to defend against new threats like model tampering, data exfiltration, and AI-po…
…
continue reading

1
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
…
continue reading

1
EP: 533 Google drops dozens of AI updates, Anthropic drops Claude 4, Microsoft unveils huge Copilot upgrades and more AI news that matters
57:21
57:21
Play later
Play later
Lists
Like
Liked
57:21AI went boom this week. 🤯 ↳ Google announced their biggest AI updates ever at I/O. ↳ Microsoft unveiled dozens of AI updates at its Build conference. ↳ Anthropic unveiled Cluade 4 at its first conference. And none of those are the biggest AI takeaways of the week. Sheeeeesh. The implications on work are nutty. What's new and how will it impact you?…
…
continue reading

1
OpenTofu with Cory O’Daniel and Malcolm Matalka
47:58
47:58
Play later
Play later
Lists
Like
Liked
47:58OpenTofu is an open-source alternative to Terraform, designed for managing infrastructure as code. It enables users to define, provision, and manage their cloud and on-premises resources using a declarative configuration language. OpenTofu was created to ensure an open and community-driven approach to infrastructure tooling, and it emphasizes compa…
…
continue reading

1
SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
…
continue reading

1
EP 532: Inside Multi-Agent AI: Rethinking Enterprise Decisions
39:12
39:12
Play later
Play later
Lists
Like
Liked
39:12What happens when.... AI agents are everywhere? To learn, we tapped into the insights from one of the leading voices in AI, Babak Hodjat, who's resume includes helping create the tech behind the original AI agents like Siri. So, how do enterprises prepare for a multi-agent environment? Tune in and find out. Newsletter: Sign up for our free daily ne…
…
continue reading

1
SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
…
continue reading

1
Ep 531: Google I/O AI Updates: 15 new features and how they can grow your business (Pt 2 of 2)
55:25
55:25
Play later
Play later
Lists
Like
Liked
55:25So many new Google AI updates at Google I/O, we had to do an encore. Google dropped dozens of new AI tools, features and modes inside their Gemini model and just about everywhere else. We already counted down the first half, so join us LIVE as we talk about the best of the best of hashtag #GoogleIO announcements. Newsletter: Sign up for our free da…
…
continue reading

1
Mojo and Building a CUDA Replacement with Chris Lattner
55:56
55:56
Play later
Play later
Lists
Like
Liked
55:56Python is the dominant language for AI and data science applications, but it lacks the performance and low-level control needed to fully leverage GPU hardware. As a result, developers often rely on NVIDIA’s CUDA framework, which adds complexity and fragments the development stack. Mojo is a new programming language designed to combine the simplicit…
…
continue reading

1
SANS Stormcast Thursday, May 22nd 2025: Crypto Confidence Scams; Extension Mayhem for VS Code and Chrome
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive VIP memberships to withdraw the money. https://isc.sans.edu/diary/New%20Variant%20of%20Crypto%20Confidence%20Scam/31968 Malicious Chrome Extensions Malici…
…
continue reading

1
Ep 530: Google I/O AI Updates: 15 new features and how they can grow your business (Pt 1 of 2)
46:06
46:06
Play later
Play later
Lists
Like
Liked
46:06Google just dropped like 3 years of AI updates on us in 3 hours. 🫨 Welp...... cool. What do we do, now? And how does this change how your business operates? Don't worry... we'll tackle it all. In 2 parts. Google I/O AI Updates: 15 new features and how they can grow your business Pt 1 of 2 -- An Everyday AI Chat with Jordan Wilson Newsletter: Sign u…
…
continue reading

1
RAG Risks: Why Retrieval-Augmented LLMs are Not Safer with Sebastian Gehrmann - #732
57:09
57:09
Play later
Play later
Lists
Like
Liked
57:09Today, we're joined by Sebastian Gehrmann, head of responsible AI in the Office of the CTO at Bloomberg, to discuss AI safety in retrieval-augmented generation (RAG) systems and generative AI in high-stakes domains like financial services. We explore how RAG, contrary to some expectations, can inadvertently degrade model safety. We cover examples o…
…
continue reading

1
SANS Stormcast Wednesday, May 21st 2025: Researchers Scanning the Internet; Forgotten DNS Records; openpgp.js Vulneraiblity
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do offer lists of researchers and just added three new groups today https://isc.sans.edu/diary/Researchers%20Scanning%20the%20Intern…
…
continue reading

1
EP 529: Microsoft Build Updates: 5 new Copilot AI updates and how to use them
41:49
41:49
Play later
Play later
Lists
Like
Liked
41:49Microsoft legit just dropped a book of AI updates at the Build Conference. We're going to go over the 5 most impactful AI-powered Microsoft Copilot updates and how they will change the future of work. Newsletter: Sign up for our free daily newsletter More on this Episode: Episode Page Join the discussion: Have a question? Join the convo here. Upcom…
…
continue reading

1
Building PostgreSQL for the Future with Heikki Linnakangas
42:12
42:12
Play later
Play later
Lists
Like
Liked
42:12PostgreSQL is an open-source database known for its robustness, extensibility, and compliance with SQL standards. Its ability to handle complex queries and maintain high data integrity has made it a top choice for both start-ups and large enterprises. Heikki Linnakangas is a leading developer for the PostgreSQL project, and he’s a co-founder at Neo…
…
continue reading

1
SANS Stormcast Tuesday, May 20th 2025: AutoIT Code RAT; Fake Keepass Download; Procolored Printer Software Compromise
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960 RVTools compromise confirmed Robware.net, the site behind the popular tool RVTools now confirmed that it was compromi…
…
continue reading

1
EP 528: OpenAI rolls out Codex coder, Google goes full AI multimedia & more AI News That Matters
44:23
44:23
Play later
Play later
Lists
Like
Liked
44:23OpenAI made a coding splash. Anthropic is in legal trouble for .... using its own Claude tool? Google went full multimedia. And that's only the half of it. Don't spend hours a day trying to keep up with AI. That's what we do. Join us (most) Mondays as we bring you the AI News That Matters. Newsletter: Sign up for our free daily newsletter More on t…
…
continue reading

1
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
…
continue reading

1
EP 527: AI’s First Chapter: Why Generative AI Is Only the Beginning
30:09
30:09
Play later
Play later
Lists
Like
Liked
30:09Think AI is hitting a wall? Nope. This is just the start. Actually, we're at the first chapter. Here's what that means, and how you can move your company ahead. Newsletter: Sign up for our free daily newsletter More on this Episode: Episode Page Join the discussion: Thoughts on this? Join the conversation Upcoming Episodes: Check out the upcoming E…
…
continue reading

1
SANS Stormcast Friday, May 16th: Increase in Sonicwall Scans; RVTools Compromised?; RountPress
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
…
continue reading

1
EP 526: LLM May Updates: What’s new in ChatGPT, Gemini, Claude and more
51:17
51:17
Play later
Play later
Lists
Like
Liked
51:17Blink, and you’ve already missed like 7 AI updates. The large language models we use and rely on? They change out more than your undies. (No judgement here.) But real talk — businesses have made LLMs a cornerstone of their business operations, yet don’t follow the updates. Don’t worry shorties. We’ve got ya. In our first ever LLM Monthly roundup, w…
…
continue reading
Cryptocurrency exchanges face unique security challenges that require specialized threat assessments and planning. Coinbase is a cryptocurrency exchange based in the United States. It was founded in 2012 and has evolved alongside cryptocurrency as a technology. Philip Martin is the Chief Security Officer at Coinbase. Prior to Coinbase, Philip built…
…
continue reading

1
SANS Stormcast Thursday, May 15th: Google Open Redirects; Adobe, Ivanti, and Samsung patches
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
…
continue reading

1
EP 525: AI-Informed, Human-Led: Thoughtful AI Use in Qualitative Research
28:36
28:36
Play later
Play later
Lists
Like
Liked
28:36AI is shaking up qualitative research: speeding things up, cleaning messy transcripts, and even identifying hidden patterns. Sounds amazing, right? Buuuuuuuut there’s a catch. When does AI go from helpful assistant to heavy-handed editor, scrubbing out the human insights qualitative research was built on? In this episode of Everyday AI, we're tackl…
…
continue reading
In this episode of The BlueHat Podcast, host Nic Fillingham and Wendy Zenone are joined by Felix Boulet fresh off his participation in Zero Day Quest. Felix talks about his unique journey from industrial maintenance to becoming a full-time vulnerability researcher, and how that background fuels his passion for hacking and bug bounty work. He explai…
…
continue reading

1
SANS Stormcast Wednesday, May 14th: Microsoft Patch Tuesday; 0-Days patched for Ivanti Endpoint Manager and Fortinet Products
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.san…
…
continue reading

1
From Prompts to Policies: How RL Builds Better AI Agents with Mahesh Sathiamoorthy - #731
1:01:25
1:01:25
Play later
Play later
Lists
Like
Liked
1:01:25Today, we're joined by Mahesh Sathiamoorthy, co-founder and CEO of Bespoke Labs, to discuss how reinforcement learning (RL) is reshaping the way we build custom agents on top of foundation models. Mahesh highlights the crucial role of data curation, evaluation, and error analysis in model performance, and explains why RL offers a more robust altern…
…
continue reading

1
EP 524: Agentic AI Done Right - How to avoid missing out or messing up.
18:33
18:33
Play later
Play later
Lists
Like
Liked
18:33Agentic AI is equally as daunting as it is dynamic. So…… how do you not screw it up? After all, the more robust and complex agentic AI becomes, the more room there is for error. Luckily, we’ve got Dr. Maryam Ashoori to guide our agentic ways. Maryam is the Senior Director of Product Management of watsonx at IBM. She joined us at IBM Think 2025 to b…
…
continue reading

1
Anthropic and the Model Context Protocol with David Soria Parra
51:02
51:02
Play later
Play later
Lists
Like
Liked
51:02The Model Context Protocol, or MCP, is a new open standard that connects AI assistants to arbitrary data sources and tools, such as codebases, APIs, and content repositories. Instead of building bespoke integrations for each system, developers can use MCP to establish secure, scalable connections between AI models and the data they need. By standar…
…
continue reading

1
SANS Stormcast Tuesday, May 12th: Apple Patches; Unipi Technologies Scans;
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking d…
…
continue reading

1
EP 523: OpenAI could go public, Gemini 2.5 continues dominance and more AI News That Matters
46:32
46:32
Play later
Play later
Lists
Like
Liked
46:32OpenAI is making moves to go public. Apple and Anthropic are teaming up for vibe coding. And Google is quietly continuing its dominance with a quiet update to the world's most powerful AI model. Once again, the big names are shaking up the AI space. Don't burn hours a day trying to keep up. Spend your Mondays with Everyday AI and our weekly 'AI New…
…
continue reading

1
SANS Stormcast Monday, May 11th: Steganography Challenge; End-of-Life Routers; ASUS Driverhub; RV-Tools SEO Poisoning
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/ FBI Warns of End-of-life routers The FBI is tracking larger…
…
continue reading

1
EP 522: AI Strategies Driving Business Growth Today
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31Still experimenting with AI? Cool. While you tinker with prompts and pilot projects, real businesses are stacking wins—and actual revenue. They’re not chasing shiny tools. They’re building unfair advantages. They’re automating what matters and scaling faster than their competition can. And no, it’s not just Big Tech. It’s manufacturers. Retailers. …
…
continue reading

1
SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch
4:57
4:57
Play later
Play later
Lists
Like
Liked
4:57No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932 SAMSUNG magicINFO 9 Server Flaw Still exploitable The SAMSUNG magicINFO 9 Serv…
…
continue reading