Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Msft Podcasts

show episodes
 
The Intrazone is a show about the Microsoft 365 intelligent intranet, taking you into the building blocks of your Microsoft 365 intranet. It's about how SharePoint, OneDrive, Teams, Yammer and more fit into your everyday work life – with the goal being to share and manage content, knowledge, and applications to empower teamwork throughout your organization.
  continue reading
 
Artwork
 
Join Downtown Josh Brown, Michael Batnick, and a rotation of their friends every Tuesday and Friday for expert insight and hot takes on the latest in business and investing. See our disclosures here - https://ritholtzwealth.com/podcast-youtube-disclosures/
  continue reading
 
Artwork

1
theCUBE Podcast

SiliconANGLE

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to theCUBE Podcast, where we provide you with the latest news and developments in the world of technology. Join us as we explore the exciting world of technology and its ever-evolving landscape. Tune in to gain valuable insights and stay up-to-date with the latest tech news.
  continue reading
 
Causal Bandits Podcast with Alex Molak is here to help you learn about causality, causal AI and causal machine learning through the genius of others. The podcast focuses on causality from a number of different perspectives, finding common grounds between academia and industry, philosophy, theory and practice, and between different schools of thought, and traditions. Your host, Alex Molak is an a machine learning engineer, best-selling author, and an educator who decided to travel the world t ...
  continue reading
 
Artwork
 
This is It's EdtechNICal with Nic Finelli. A podcast that walks you through how to do new and exciting things with technology for education. About Nic Nic is a freelance digital teaching specialist with 20 years of classroom teaching experience as well as working with companies like Google, Apple, and Microsoft. Support this podcast: https://podcasters.spotify.com/pod/show/its-edtechnical/support
  continue reading
 
Artwork

1
Power Trader Radio

Power Trader Radio

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Power Trader Radio is a weekly internet radio show that airs every Wednesday at 4:30 PM CST, covering options trading for educational purposes only. This show is divided into four segments which we call the NEAR Report - News, Analysis, Events, and Research.
  continue reading
 
Artwork
 
One of the great things about the Microsoft partner channel is the breadth and depth of organisations worldwide that use technology and their expertise to solve customer challenges every day. In this weekly series, we will be hearing from partners of all types about who they are, the challenges that they are hearing from their customers and advice that they would give to anyone they work with. Please join us every Thursday at 2pm (UK)
  continue reading
 
Artwork

1
AI With Friends

AI With Friends LLC

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
Welcome to AI With Friends, your weekly launchpad into the world of Artificial Intelligence. Hosted by Marlon Avery, a pioneer in GenAI innovation, alongside Adrian Green, VP of Engineering at LiveNation, and Sekou Doumbouya, Senior Staff Cloud Systems Engineer, this show is your go-to source for all things AI. Our hosts bring diverse expertise—from AI strategy and tech innovation to industry leadership. Every week, they break down the latest AI trends, interview top experts, and simplify co ...
  continue reading
 
Loading …
show series
 
W najnowszym odcinku CTO Morning Brew: Tomek, Wojtek i Sebastian siadają, by porozmawiać o rzeczach ważnych, poważnych, niepoważnych, technologicznych i nie tylko. Oto 7 najważniejszych tematów, o których w odcinku: 📖 Kącik książkowy: Sebastian poleca nową, wyczekiwaną książkę Raya Dalio o cyklach długu i upadku państw oraz udostępnioną w surowej w…
  continue reading
 
Watch the latest episode of theCUBE Pod, where analysts John Furrier and Dave Vellante break down the biggest trends and innovations shaping the tech world. From industry disruptions to emerging technologies, we bring you expert analysis and insider insights — so you stay ahead in the fast-evolving enterprise landscape. New episodes every Friday. S…
  continue reading
 
On episode 200 of The Compound and Friends, ⁠⁠⁠⁠⁠Michael Batnick⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Downtown Josh Brown⁠⁠⁠⁠⁠ are joined by TCAF legend JC Parets to discuss: the most important sector in the market, the biggest contrarian call, the only people losing money right now, Bitcoin dominance crashing, what could derail the market, and much more! This episode is…
  continue reading
 
Hiding Payloads in Linux Extended File Attributes Xavier today looked at ways to hide payloads on Linux, similar to how alternate data streams are used on Windows. Turns out that extended file attributes do the trick, and he presents some scripts to either hide data or find hidden data. https://isc.sans.edu/diary/Hiding%20Payloads%20in%20Linux%20Ex…
  continue reading
 
More Free File Sharing Services Abuse The free file-sharing service catbox.moe is abused by malware. While it officially claims not to allow hosting of executables, it only checks extensions and is easily abused https://isc.sans.edu/diary/More%20Free%20File%20Sharing%20Services%20Abuse/32112 Ongoing SonicWall Secure Mobile Access (SMA) Exploitation…
  continue reading
 
Keylogger Data Stored in an ADS Xavier came across a keystroke logger that stores data in alternate data streams. The data includes keystroke logs as well as clipboard data https://isc.sans.edu/diary/Keylogger%20Data%20Stored%20in%20an%20ADS/32108 Malvertising Homebrew An attacker has been attempting to trick users into installing a malicious versi…
  continue reading
 
On this TCAF Tuesday, Josh and Michael are joined by Sam Broner of a16z crypto to break down the biggest developments in the world of stablecoins. From PayPal and Circle to the role of U.S. regulators, this conversation covers where the money’s moving and why it matters. Sam explains how stablecoins are quietly reshaping payments, banking, global f…
  continue reading
 
DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse s residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that Jesse runs. https://isc.sans.edu/diary/DSh…
  continue reading
 
Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102 Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812 Huntress saw active exploitation of…
  continue reading
 
On episode 199 of The Compound and Friends, ⁠⁠⁠⁠⁠Michael Batnick⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Downtown Josh Brown⁠⁠⁠⁠⁠ are joined by Ryan Detrick and Sonu Varghese to discuss: how AI saved the market, mid-year market takeaways, Bitcoin's new highs, economic indicators, and much more! This episode is sponsored by Russell Investments and Apex Fintech Solutions Look…
  continue reading
 
SSH Tunneling in Action: direct-tcp requests Attackers are compromising ssh servers to abuse them as relays. The attacker will configure port forwarding direct-tcp connections to forward traffic to a victim. In this particular case, the Yandex mail server was the primary victim of these attacks. https://isc.sans.edu/diary/SSH%20Tunneling%20in%20Act…
  continue reading
 
Setting up Your Own Certificate Authority for Development: Why and How. Some tips on setting up your own internal certificate authority using the smallstep CA. https://isc.sans.edu/diary/Setting%20up%20Your%20Own%20Certificate%20Authority%20for%20Development%3A%20Why%20and%20How./32092 Animation-Driven Tapjacking on Android Attackers can use a clic…
  continue reading
 
Microsoft Patch Tuesday, July 2025 Today, Microsoft released patches for 130 Microsoft vulnerabilities and 9 additional vulnerabilities not part of Microsoft's portfolio but distributed by Microsoft. 14 of these are rated critical. Only one of the vulnerabilities was disclosed before being patched, and none of the vulnerabilities have so far been e…
  continue reading
 
On this TCAF Tuesday, ⁠⁠⁠⁠Michael Batnick⁠⁠⁠⁠ is here with a special edition of What Are Your Thoughts with special guests Cullen Roche, Eric Balchunas and Alex Kantrowitz. They discuss: who can replace the dollar, will the deficit crush us, the most successful ETF ever, if Apple should buy Perplexity, Meta vs OpenAI, and more. This episode is spon…
  continue reading
 
What s My File Name Malware may use the GetModuleFileName API to detect if it was renamed to a name typical for analysis, like sample.exe or malware.exe https://isc.sans.edu/diary/What%27s%20My%20%28File%29Name%3F/32084 Atomic macOS infostealer adds backdoor for persistent attacks Malware analyst discovered a new version of the Atomic macOS info-st…
  continue reading
 
W dzisiejszym odcinku Tomek, Wojtek i Sebastian nadrabiają technologiczne zaległości z ostatnich tygodni. Zastanawiamy się, czy Sam Altman dzwonił już do nas z ofertą ☎️ i dyskutujemy o tym, czy za rogiem czeka nas kolejna wojna przeglądarek ⚔️. Rozmawiamy też o tym, jak wielkie pieniądze kształtują rynek i czy Tesla faktycznie jest w kryzysie. A o…
  continue reading
 
Interesting ssh/telnet usernames Some interesting usernames observed in our honeypots https://isc.sans.edu/diary/A%20few%20interesting%20and%20notable%20ssh%20telnet%20usernames/32080 More sudo trouble The host option in Sudo can be exploited to execute commands on unauthorized hosts. https://www.stratascale.com/vulnerability-alert-CVE-2025-32462-s…
  continue reading
 
On episode 198 of The Compound and Friends, ⁠⁠⁠⁠⁠Michael Batnick⁠⁠⁠⁠⁠ is joined by Joe Fahmy and Shay Boloor to discuss: where we are in the market cycle, the outlook for AI stocks, how Apple got left behind, the next Mag 7, the bull case for Tesla, and much more! This episode is sponsored by Betterment Advisor Solutions and Rocket Money. Grow your…
  continue reading
 
Sudo chroot Elevation of Privilege The sudo chroot option can be leveraged by any local user to elevate privileges to root, even if no sudo rules are defined for that user. https://www.stratascale.com/vulnerability-alert-CVE-2025-32463-sudo-chroot Polymorphic ZIP Files A zip file with a corrupt End of Central Directory Record may extract different …
  continue reading
 
On this TCAF Tuesday, Josh Brown sits down with Joe Davis, Vanguard’s Global Chief Economist and Global Head of the Investment Strategy Group to discuss Vanguard's 50th anniversary, Joe's new book, AI, megatrends, inflation, and more! Then at 48:48, hear an all-new episode of What Are Your Thoughts with ⁠⁠⁠⁠Downtown Josh Brown⁠⁠⁠⁠ and ⁠⁠⁠⁠Michael B…
  continue reading
 
Watch the latest episode of theCUBE Pod, where analysts John Furrier and Dave Vellante break down the biggest trends and innovations shaping the tech world. From industry disruptions to emerging technologies, we bring you expert analysis and insider insights — so you stay ahead in the fast-evolving enterprise landscape. New episodes every Friday. S…
  continue reading
 
Scattered Spider Update The threat actor known as Scattered Spider is in the news again, this time focusing on airlines. But the techniques used by Scattered Spider, social engineering, are still some of the most dangerous techniques used by various threat actors. https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-…
  continue reading
 
On episode 197 of The Compound and Friends, ⁠⁠⁠⁠Michael Batnick⁠⁠⁠⁠ and ⁠⁠⁠⁠Downtown Josh Brown⁠⁠⁠⁠ are joined by Cole Wilcox, Founder, CEO and CIO of Longboard Asset Management to discuss: all things trend following, using systems to overcome emotion, technical analysis, Nvidia, the new generation of investors, and much more! This episode is spons…
  continue reading
 
Open-VSX Flaw Puts Developers at Risk A flaw in the open-vsx extension marketplace could have let to the compromise of any extension offered by the marketplace. https://blog.koi.security/marketplace-takeover-how-we-couldve-taken-over-every-developer-using-a-vscode-fork-f0f8cf104d44 Bluetooth Vulnerability Could Allow Eavesdropping A vulnerability i…
  continue reading
 
NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 Remote code execution in CentOS Web Panel - CVE-2025-48703 An arbitrary file upload vulnerab…
  continue reading
 
Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each scans than they used to, but the average length of passwords did not change. https://isc.sans.edu/diary/Quick%20Pass…
  continue reading
 
On this TCAF Tuesday, Josh Brown sits down with Ric Edelman, Founder of Edelman Financial Engines to discuss: how far Bitcoin has come, the correct Bitcoin allocation, Tokenization, Stablecoins, and much more! Then at 01:03:40 hear an all-new episode of What Are Your Thoughts with ⁠⁠⁠Downtown Josh Brown⁠⁠⁠ and ⁠⁠⁠Michael Batnick⁠⁠⁠! This episode is…
  continue reading
 
Scans for Ichano AtHome IP Cameras A couple days ago, a few sources started scanning for the username super_yg and the password 123. This is associated with Ichano IP Camera software. https://isc.sans.edu/diary/Scans%20for%20Ichano%20AtHome%20IP%20Cameras/32062 Critical Netscaler Security Update CVE-2025-5777 CVE 2025-5777 is a critical severity vu…
  continue reading
 
ADS & Python Tools Didier explains how to use his tools cut-bytes.py and filescanner to extract information from alternate data streams. https://isc.sans.edu/diary/ADS%20%26%20Python%20Tools/32058 Enhanced security defaults for Windows 365 Cloud PCs Microsoft announced more secure default configurations for its Windows 365 Cloud PC offerings. https…
  continue reading
 
On this special episode of The Compound and Friends, ⁠⁠⁠⁠⁠Michael Batnick⁠⁠⁠⁠⁠ and ⁠⁠⁠⁠⁠Downtown Josh Brown⁠⁠⁠⁠⁠ are joined by Matt Cerminaro and Todd Sohn for the ultimate CHART ON session! They discuss: the Fed, market sentiment, the future of Apple, and much more! This episode is sponsored by Apex Fintech Solutions. Learn more at: http://apexfin…
  continue reading
 
How Long Until the Phishing Starts? About Two Weeks After setting up a Google Workspace and adding a new user, it took only two weeks for the new employee to receive somewhat targeted phishing emails. https://isc.sans.edu/diary/How%20Long%20Until%20the%20Phishing%20Starts%3F%20About%20Two%20Weeks/32052 Scammers hijack websites of Bank of America, N…
  continue reading
 
On this TCAF Tuesday, hear an all-new episode of What Are Your Thoughts with ⁠⁠⁠Downtown Josh Brown⁠⁠⁠ and ⁠⁠⁠Michael Batnick⁠⁠⁠! This episode is sponsored by GrayScale. Curious about investing in crypto and not sure where to start? Visit: https://www.grayscale.com/ to learn more. Sign up for ⁠⁠⁠The Compound Newsletter⁠⁠⁠ and never miss out! Instag…
  continue reading
 
Extracting Data From JPEGs Didier shows how to efficiently extract data from JPEGs using his tool jpegdump.py https://isc.sans.edu/diary/A%20JPEG%20With%20A%20Payload/32048 Windows Recall Export in Europe In its latest insider build for Windows 11, Microsoft is testing an export feature for data stored by Recall. The feature is limited to European …
  continue reading
 
Katz Stealer in JPG Xavier found some multistage malware that uses an Excel Spreadsheet and an HTA file to load an image that includes embeded a copy of Katz stealer. https://isc.sans.edu/diary/More+Steganography/32044 https://unit42.paloaltonetworks.com/malicious-javascript-using-jsfiretruck-as-obfuscation/ JavaScript obfuscated with JSF*CK is bei…
  continue reading
 
Watch the latest episode of theCUBE Pod, where analysts John Furrier and Dave Vellante break down the biggest trends and innovations shaping the tech world. From industry disruptions to emerging technologies, we bring you expert analysis and insider insights — so you stay ahead in the fast-evolving enterprise landscape. New episodes every Friday. S…
  continue reading
 
On episode 196 of The Compound and Friends, ⁠⁠⁠Michael Batnick⁠⁠⁠ and ⁠⁠⁠Downtown Josh Brown⁠⁠⁠ are joined by Steve Eisman to discuss: behind-the-scenes on The Big Short, what's going on with the trade war, what looks good in financials, the labor market, what's going on at Apple, and much more! This episode is sponsored by VanEck. Learn more about…
  continue reading
 
Automated Tools to Assist with DShield Honeypot Investigations https://isc.sans.edu/diary/Automated%20Tools%20to%20Assist%20with%20DShield%20Honeypot%20Investigations%20%5BGuest%20Diary%5D/32038 EchoLeak: Zero-Click Microsoft 365 Copilot Data Leak Microsoft fixed a vulnerability in Copilot that could have been abused to exfiltrate data from Copilot…
  continue reading
 
Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows…
  continue reading
 
Rozwój. (...) The final frontier (...). Zawsze na czołowym miejscu w oczekiwaniach co do firmy, zmiany pracy. Rozwój TAK.. ale jaki i jak? 🔥Coffee #74: Developing People 👯 To porozmawiajmy o tym, jak podejść do rozwoju ludzi w firmie jako procesu. Takiego, który trwa, jest ciągły i ma jakieś wyniki. Rozwój zespołów, jednostek, podejście do rozwoju …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play