The official Talkin Shop with ShopSabre podcast hosted by Brandon Bombardo from ShopSabre covers all things CNC. Covered will be a variety of CNC topics, discussions, tips, tricks, humor, and collaborations with other industry professionals. If you have an interest in CNC Routers or CNC Plasma machines, this is a podcast for you! https://www.instagram.com/shopsabre/ www.youtube.com/shopsabre www.shopsabre.com
…
continue reading
Solwise for all your WiFi and 4G/5G needs. Hosted by Louise Barrett, and produced by Sarah Sharpless. www.solwise.co.uk. Solwise are an independent technical distribution company based in Hessle UK. All our products are carefully selected to represent the best value for money within their sector. We also understand our products, whether you need help selecting a product before buying, or help to get your system working when it arrives, we will be able to give quality advice. This is because ...
…
continue reading
Our mission is to help those who's lives are being adversely impacted through the reckless spread of harmful man-made electromagnetic radiation by equipping them to understand, measure and remediate EMF in their own homes. We also help with the harder part -- undoing the social programming and gaslighting so you can free yourself from the electromagnetic 'matrix'.
…
continue reading
Join the UQ Computing Society as we explore the human side of studying and working in technology.
…
continue reading
CNC Router Tips Podcast is a show which answers one question from you, the listener about cnc router tables, cnc software, hardware, web hosting and business. We'll help you get started in your CNC hobby or business and help you CUT THROUGH THE CONFUSION. http://cncroutertips.com
…
continue reading
Murdering electrons in the woodworking workshop.
…
continue reading
Join terrestrial radio's most unproduceable presenters Elis James and John Robins for big laughs and top quality #content. Hilarious, warm and unashamedly ashamed, let their award-winning chemistry get you over the finish line of the working week. Email: [email protected] #elisandjohn
…
continue reading
LINKSYS ROUTER Tech Support +1:866:760:7833 Phone Number LINKSYS ROUTER have expanded throughout in recent years. But the LINKSYS ROUTER Tech Support Phone Number, sometimes the users face some technical issues with it. If you are facing problems with your LINKSYS ROUTER or LINKSYS ROUTER account, then fret not! You can establish contact with the expert team of LINKSYS ROUTER by dialing up the LINKSYS ROUTER Tech Support Phone Number +1 866-760-7833 US/CA and let them solve your issues easil ...
…
continue reading
Ever struggled with slow internet, forgotten Wi-Fi passwords, or weak security? In this episode of TechTalk, Talha and Ubaid break down the essentials of router settings! Learn how to access your router, change passwords, optimize speed, and secure your network like a pro. Whether you're a beginner or tech enthusiast, this guide will help you take control of your Wi-Fi. Stay tuned for expert tips and tricks to keep your internet fast and secure! #WiFiTips #RouterSettings #TechTalk
…
continue reading
When you’re looking for a router to push your internet connectivity performance over the top, Netgear is one of the most trusted brand names for this type of hardware. The Netgear routers give you a stable Wi-Fi connection and good range and can help you connect multiple devices. The company offers standard dual-band routers, gaming-oriented tri-band routers, Whole Home Mesh WiFi, and Wi-Fi Range Extenders. If you`ve bought a new Netgear router or got from your ISP, you must be looking at ho ...
…
continue reading
APPLE ROUTER have expanded throughout in recent years. But the APPLE ROUTER Tech Support Phone Number, sometimes the users face some technical issues with it. If you are facing problems with your APPLE ROUTER or APPLE ROUTER account, then fret not! You can establish contact with the expert team of APPLE ROUTER by dialing up the APPLE ROUTER Tech Support Phone Number +1 866-760-7833 US/CA and let them solve your issues easily! read less
…
continue reading
BELKIN ROUTER have expanded throughout in recent years. But the BELKIN ROUTER Tech Support Phone Number, sometimes the users face some technical issues with it. If you are facing problems with your BELKIN ROUTER or BELKIN ROUTER account, then fret not! You can establish contact with the expert team of BELKIN ROUTER by dialing up the BELKIN ROUTER Tech Support Phone Number +1 866-760-7833 US/CA and let them solve your issues easily! read less
…
continue reading
CISCO ROUTER have expanded throughout in recent years. But the CISCO ROUTER Tech Support Phone Number, sometimes the users face some technical issues with it. If you are facing problems with your CISCO ROUTER or CISCO ROUTER account, then fret not! You can establish contact with the expert team of CISCO ROUTER by dialing up the CISCO ROUTER Tech Support Phone Number +1 866-760-7833 US/CA and let them solve your issues easily! read less
…
continue reading
NETGEAR ROUTER have expanded throughout in recent years. But the NETGEAR ROUTER Tech Support Phone Number, sometimes the users face some technical issues with it. If you are facing problems with your NETGEAR ROUTER or NETGEAR ROUTER account, then fret not! You can establish contact with the expert team of NETGEAR ROUTER by dialing up the NETGEAR ROUTER Tech Support Phone Number +1 866-760-7833 US/CA and let them solve your issues easily! read less
…
continue reading
Bleep has chosen a number of partners to produce weekly podcasts - each an expert in their respective fields.
…
continue reading
D-LINK ROUTER have expanded throughout in recent years. But the D-LINK ROUTER Tech Support Phone Number, sometimes the users face some technical issues with it. If you are facing problems with your D-LINK ROUTER or D-LINK ROUTER account, then fret not! You can establish contact with the expert team of D-LINK ROUTER by dialing up the D-LINK ROUTER Tech Support Phone Number +1 866-760-7833 US/CA and let them solve your issues easily! read less
…
continue reading
TP-LINK ROUTER have expanded throughout in recent years. But the TP-LINK ROUTER Tech Support Phone Number, sometimes the users face some technical issues with it. If you are facing problems with your TP-LINK ROUTER or TP-LINK ROUTER account, then fret not! You can establish contact with the expert team of TP-LINK ROUTER by dialing up the TP-LINK ROUTER Tech Support Phone Number +1 866-760-7833 US/CA and let them solve your issues easily! read less
…
continue reading
Learn how to think not what to think.
…
continue reading
Have you gotten interested in CNC machines, such as CNC routers, CNC lasers, or even plasma cutters? Why do people like you and me get so fascinated by these technological wonders? It's because it is amazing to watch your design come to life right before your eyes. I always wondered about the deeper reasons. But I figured it out. It's because most of us start to realize we haven't been living life for ourselves, doing our thing. We've been doing it all for someone else. then we finally decid ...
…
continue reading
BELKIN ROUTER Technical Support 1 (866‒688‒9269) Phone’ Number What Is The BELKIN ROUTER Technical Support Phone’ Number?What Is The SBC Global Technical Support Phone’ Number?Assuming you are referring to AT&T/BELKIN ROUTER, the customer service number isHow to Contact SBC Global Technical Support Phone’ NumberSBC Global is a leading provider of telecommunications and internet services. They offer a wide range of products and services to their customers, including technical support.If you n ...
…
continue reading
LINKSYS ROUTER Technical Support 1 (866‒688‒9269) Phone’ Number What Is The LINKSYS ROUTER Technical Support Phone’ Number?What Is The SBC Global Technical Support Phone’ Number?Assuming you are referring to AT&T/LINKSYS ROUTER, the customer service number isHow to Contact SBC Global Technical Support Phone’ NumberSBC Global is a leading provider of telecommunications and internet services. They offer a wide range of products and services to their customers, including technical support.If yo ...
…
continue reading
NETGEAR ROUTER Technical Support 1 (866‒688‒9269) Phone’ Number What Is The NETGEAR ROUTER Technical Support Phone’ Number?What Is The SBC Global Technical Support Phone’ Number?Assuming you are referring to AT&T/NETGEAR ROUTER, the customer service number isHow to Contact SBC Global Technical Support Phone’ NumberSBC Global is a leading provider of telecommunications and internet services. They offer a wide range of products and services to their customers, including technical support.If yo ...
…
continue reading
DLINK ROUTER Technical Support 1 (866‒688‒9269) Phone’ Number What Is The DLINK ROUTER Technical Support Phone’ Number?What Is The SBC Global Technical Support Phone’ Number?Assuming you are referring to AT&T/DLINK ROUTER, the customer service number isHow to Contact SBC Global Technical Support Phone’ NumberSBC Global is a leading provider of telecommunications and internet services. They offer a wide range of products and services to their customers, including technical support.If you need ...
…
continue reading
TPLINK ROUTER Technical Support 1 (866‒688‒9269) Phone’ Number What Is The TPLINK ROUTER Technical Support Phone’ Number?What Is The SBC Global Technical Support Phone’ Number?Assuming you are referring to AT&T/TPLINK ROUTER, the customer service number isHow to Contact SBC Global Technical Support Phone’ NumberSBC Global is a leading provider of telecommunications and internet services. They offer a wide range of products and services to their customers, including technical support.If you n ...
…
continue reading
Belkin extender setup is crucial for extending signals to every corner of your house. visit Range Setup and follow the step to connect the belkin extender to your main router network.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
The regular podcast about Free Software and ongoing activities hosted by the FSFE
…
continue reading
Gadget Professor Don Baine brings you the latest Gadget News and Information.
…
continue reading
N Is For Networking deconstructs the concepts, jargon and acronyms of the data networking industry. Join grumpy old network engineer Ethan Banks with networking newcomer Holly Metlitzky for these episodes that will help you place context around networking terminology.
…
continue reading
Matt, HK and Producer Dave are trying to do a tech show.
…
continue reading
ConversingLabs Podcast brings you conversations with the best and brightest minds in malware analysis, threat hunting, incident response and software assurance. Hosted by Paul Roberts, Cyber Content Lead at ReversingLabs, ConversingLabs digs into cutting edge topics that are most pressing in the world of cybersecurity.
…
continue reading
Renewable Rides is the guide to the corporate energy transition. Featuring interviews with industry experts and business leaders, Renewable Rides aims to help companies tackle challenges and maximize opportunities in the pursuit of a resilient, profitable, and thriving energy future. Hosts Gareth Evans and Dan Roberts, founders of VECKTA, shed light on the energy transition and the benefits it presents for company brand, operations and resilience.
…
continue reading
Welcome aboard the Rocket Ship, the ultimate podcast voyage into the heart of React Native development with Simon Grimm! Whether you're a seasoned mobile app developer or just starting your journey, this is your go-to destination for all things React Native and Expo.
…
continue reading
The Call Kent podcast is a regular podcast where you call in with a question and Kent answers. Call in with your questions right from your web browser with any device at https://kentcdodds.com/call
…
continue reading
The Three Buddy Problem is a popular Security Conversations podcast that goes beyond industry talking points to discuss what others won’t -- nation-state malware, attribution, cyberwar, ethics, privacy, and the messy realities of securing computers and corporate networks. Hosted by three veteran security pros -- journalist Ryan Naraine and malware paleontologists Costin Raiu and Juan Andres Guerrero-Saade -- the weekly show attracts a highly engaged audience of security researchers, corporat ...
…
continue reading
Escape Frustration: Transform Your Live Production, Broadcast, and Corporate AV with Smart Technologies.
…
continue reading
Each week, we dive into the latest developments from the world of business technology, with a focus on how these trends impact the tools and systems we use for work. From breaking news to in-depth discussions on business strategy, this podcast is designed to keep you informed and ahead of the curve. Whether you're a business leader, tech enthusiast, or just someone who wants to stay updated, this show is all about learning and discussing the latest happenings together. Join us as we uncover ...
…
continue reading
The Imperial Senate Podcast is a show that discusses Star Wars in a uniquely earnest and eccentric fashion! Join hosts Charlie Ashby, Nicky Kumar & Clare Stribling as they discuss the latest news and reviews with some comedic levity. Get bonus content on Patreon Hosted on Acast. See acast.com/privacy for more information.
…
continue reading
Sound like a tech pro, even if you’re not! Award-winning popular host Kim Komando is your secret weapon. Kim is in a class all her own. Her widely successful radio show is heard on over 500 stations in the United States and internationally in 175 different countries. Kim has millions of fans who love her down-to-earth, deeply relatable, and easy-to-understand way of talking about consumer tech. Every episode is loaded with the scoop about the latest gadgets, online security, social media tre ...
…
continue reading
Welcome to ’Hacker Hacks,’ the podcast where we dive deep into the mysterious world of cybersecurity. Each episode unveils the tactics, techniques, and procedures used by both ethical and malicious hackers, empowering you with knowledge to defend your digital realm. Whether you’re a seasoned IT professional, an emerging tech enthusiast, or just curious about the digital shadows, ’Hacker Hacks’ is your ultimate guide to understanding the tricks of the trade and the tools to thwart them. Subsc ...
…
continue reading
A radically new way of learning about web3
…
continue reading
Hi! I am Rajesh Prajapati, a Cybersecurity addict from India who spends time in reading every aspect of technology and love to go down the rabbit hole of Security and Privacy.
…
continue reading
Lessons learned from the daily drive of a Building Automation Technician.
…
continue reading
Providing insights to HR leaders around their greatest challenge - their People
…
continue reading
All This Science - entertaining Science explanations in five minutes !
…
continue reading
A woodworking podcast and sometimes other stuff podcast. I am not an expert, just an hobbyist learning the craft. Come along with me on my journey and if you are lucky I might just might mess something up
…
continue reading
Occasional topics on technology. Support this podcast: https://podcasters.spotify.com/pod/show/brubaker-consulting/support
…
continue reading
We cover the latest in cybersecurity news, including what new threats are out there and what you can do to protect yourself and your clients.
…
continue reading
I’m transitioning from SPAs with REST APIs to SSR applications using React Router Framework. While I’ve used layout routes and tools like SWR/React Query for route protection in React Router DOM, I just found out that actions in React Router Framework are still vulnerable to unauthorized POST requests. I use JWT auth with tokens stored in cookies—d…
…
continue reading
Welcome to The Gadget Professor Show #732 hosted by Don Baine. TP-Link AX3000 Whole Home Wi-Fi 6 Mesh System (Deco X55 Pro) | Up to 6500 Sq.Ft. 𝟮×𝟮.𝟱𝗚 WAN/LAN Ports Wired Ethernet Backhaul 𝗜𝗱𝗲𝗮𝗹 𝗳𝗼𝗿 𝟭𝗚𝗶𝗴+ 𝗜𝗻𝘁𝗲𝗿𝗻𝗲𝘁 2023 Release (3-Pack) 𝗪𝗶-𝗙𝗶 𝟲 𝗠𝗲𝘀𝗵: AX3000 whole home Wi-Fi 6 mesh system eliminates weak Wi-Fi for good (2×2/HE160 2402 Mbps plus 2×2 5…
…
continue reading

1
Ep 82: Tech Spotlight: DG Matrix and its Power Router for Scalable Building Electrification
44:35
44:35
Play later
Play later
Lists
Like
Liked
44:35What if energy solutions could be simpler, more scalable, and more reliable while significantly reducing emissions? In this episode, Michael Wood, Chief of Staff at DG Matrix, and Haroon Inam, CEO of DG Matrix, break down how their groundbreaking technology is revolutionizing the power industry. They discuss how DG Matrix is tackling grid constrain…
…
continue reading

1
#432 - Roast Goose, Intro Sequels and The Volkswagen Barrel of Paint
1:07:02
1:07:02
Play later
Play later
Lists
Like
Liked
1:07:02“This question will have enormous ramifications for my mental health for the rest of my life.” It’s that sort of episode. Today is MASSIVE for Robins, as Producer Dave surprises him with a humdinger of a special guest. It's John's time to enjoy the fruits of 14 months worth of Made Up Games labour. But it’s not all about fruit - which, yes, could b…
…
continue reading

1
Ep 86: The Business Value of Sustainability: Our Discussion with UPS, CBRE, Jamestown and Southface Institute
47:26
47:26
Play later
Play later
Lists
Like
Liked
47:26What if the key to long-term profit isn’t faster growth, but smarter, greener strategy? In this panel discussion, leaders from UPS, CBRE, Jamestown, and Southface Institute break down why sustainability isn’t just good for the planet—it’s smart business. James Marlow opens the conversation by challenging the obsession with quarterly gains, advocati…
…
continue reading

1
SANS Stormcast Tuesday, April 29th: SRUM-DUMP 3; Policy Puppetry; Choice Jacking; @sansinstitute at #RSAC
7:37
7:37
Play later
Play later
Lists
Like
Liked
7:37SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
…
continue reading

1
SANS Stormcast Monday, April 28th: Image Steganography; SAP Netweaver Exploited
7:55
7:55
Play later
Play later
Lists
Like
Liked
7:55Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
…
continue reading

1
The Imperial Senate Podcast: Episode 143 - LIVE From Star Wars Celebration 2025
34:54
34:54
Play later
Play later
Lists
Like
Liked
34:54THIS WEEK: Charlie and Nicky bring you a LIVE episode from the final day of Star Wars Celebration Japan! ALSO: You can purchase Scotty's book, 'Midi-chlorians: An Alliance of Science, Mythology, and Magic' here Contact Us: Find us on Bluesky or e-mail us at [email protected]. Website: www.imperialsenatepodcast.com Support us on Patreo…
…
continue reading

1
Thomas Rid joins the show: AI consciousness, TP-Link's China connection, trust in hardware security
1:33:42
1:33:42
Play later
Play later
Lists
Like
Liked
1:33:42Three Buddy Problem - Episode 43: Director of the Alperovitch Institute for Cybersecurity Studies Thomas Rid joins the show for a deep-dive into the philosophical and ethical considerations surrounding AI consciousness and anthropomorphism. We dig into the multifaceted implications of AI technology, particularly focusing on data privacy, national s…
…
continue reading

1
#431 - Corner Energy, Non-Playable John and Tubing The Room
1:00:59
1:00:59
Play later
Play later
Lists
Like
Liked
1:00:59John and Producer Dave are back from a high after John turned 2,000 revellers up to eleven with his problematic walk in music. Elis has questions but Robins simply adds so much value to live events. And he’s been adding his own energy to another live event - that of the singles night variety. And he sure did set the vibe by diving straight in with …
…
continue reading
Questions we answer in this episode What is a DDoS attack? What social media platform was recently the target of a DDoS attack? How can your home network be impacted by one? What can you do to protect your home network? Episode summary DDoS attacks are growing faster than the squash in my garden - seriously, it's wild! The slaves in the army? Devic…
…
continue reading

1
SANS Stormcast Friday, April 25th: SMS Gateway Scans; Comvault Exploit; Patch Window Shrinkage; More inetpub issues;
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
…
continue reading
The Domain Name System (DNS) keeps the Internet running. On today’s N Is For Networking podcast, we talk about how DNS transforms human-readable host names into IP addresses so that Internet traffic can be sent to the right place. We talk about root name servers, Top Level Domains (TLDs), and other elements of the DNS... Read more »…
…
continue reading

1
#066 - Expo 53 BETA, FlashList v2, React Native Popularity, App Sales & OTA Alternative
27:16
27:16
Play later
Play later
Lists
Like
Liked
27:16The Expo SDK 53 Beta was released, FlashList v2 is a complete rewrite and is React Native actually popular? I dive into the latest news from the React Native community, and share updates on the projects I'm working on. Also in this episode: - How I use Convex and ElevenLabs to build a Captions clone - Why are you not using AI? - My vacation in Cope…
…
continue reading

1
SANS Stormcast Thursday, April 24th: Honeypot iptables Maintenance; XRPL.js Compromise; Erlang/OTP SSH Vuln affecting Cisco
5:44
5:44
Play later
Play later
Lists
Like
Liked
5:44Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
…
continue reading
Her 5-year-old fell asleep in the backseat, and the driver left with her still inside. Uber refused to help until police stepped in. Their apology? A $7 credit. Plus, what's up with Instagram Edits, Meta's AI glasses now transcribe your convos, and chatbots place bets on the next pope.By Kim Komando
…
continue reading
Welcome to The Gadget Professor Show #735 hosted by Don Baine. CUKTECH 15 Ultra Power Bank, 20000mAh 140W Laptop Charger, 3-Port USB C Charger, PD3.1 Fast Charging Battery Pack with Smart Display, Compatible with iPhone 16/15/14/13, Samsung, MacBook, Dell, etc. PD3.1 165W Max Output, Ultimate Fast Charging: Single-port maximum PD3.1 140W, our power…
…
continue reading
From garage start-ups to full-scale CNC operations, we’ll highlight some true success stories and share smart strategies for scaling. If you’ve ever wondered what it takes to grow, this episodes for you. Join us on Talkin’ Shop for an action-packed episode featuring: Internet is Broken – Explore the crazy, funny, and frustrating moments the interne…
…
continue reading

1
SANS Stormcast Wednesday, April 23rd: More xorsearch Updates; DKIM Replay Attack; SSL.com Vulnerability Fixed
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
…
continue reading

1
SFP#33: Policy and EU: Coalition treaty in Germany and its role for Free Software
37:56
37:56
Play later
Play later
Lists
Like
Liked
37:56SFP#33: Policy and EU: Coalition treaty in Germany and its role for Free Software Recently, the German coalition treaty from the CDU/CSU and SPD has been published with over 140 pages. In our latest episode Alexander Sander and Bonnie Mehring talk about the coalition treaty and break down the standing of Free Software in it. Listen to the 33rd epis…
…
continue reading

1
Google Next 2025 Recap: Sphere AI Exclusive, Starline Interview & HUGE Studio Upgrade! | Tech for Work
29:28
29:28
Play later
Play later
Lists
Like
Liked
29:28Jesse Nowlin back with another episode of Tech for Work after a busy few weeks, including the Passover holiday and an incredible trip to Google Cloud Next 2025 in Las Vegas! In this episode, I'm recapping all the action, sharing exclusive stories (like getting that footage from the Sphere 🤯), discussing upcoming content, and revealing a MAJOR studi…
…
continue reading

1
#430 - Grief Granola, Psephologist Wildfowl and How is Scratching Free?
1:22:10
1:22:10
Play later
Play later
Lists
Like
Liked
1:22:10You’ve probably heard it whispered on the train on your way into work. You’ve likely heard mutterings about it on the concourse at the football. And you’ve almost certainly heard your grandma claim it at Sunday dinner. Well, this episode confirms the rumours; no one else is doing this. Especially if by ‘this’ you mean an extensive chat about spare …
…
continue reading

1
Ep 85: Reflecting on the Ending Intermittent Energy Subsidies Act and a Phased-Down Investment Tax Credit
16:48
16:48
Play later
Play later
Lists
Like
Liked
16:48Today we are looking into the latest developments around the 48E tax credits and a proposed bill—the Ending Intermittent Energy Subsidies Act—that could drastically reshape clean energy investment. You'll learn what these changes mean for solar, wind, and energy storage projects and how they're being weighed against long-standing subsidies in the o…
…
continue reading

1
SANS Stormcast Tuesday, April 22nd: Phishing via Google; ChatGPT Fingerprint; Asus AI Cloud Vuln; PyTorch RCE
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL. https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%2…
…
continue reading

1
SANS Stormcast Monday, April 21st: MSFT Entra Lockouts; Erlang/OTP SSH Exploit; Sonicwall Exploit; bubble.io bug
7:31
7:31
Play later
Play later
Lists
Like
Liked
7:31Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widesp…
…
continue reading

1
Kim Komando Show Preview: Why does the TSA scan your face?
34:56
34:56
Play later
Play later
Lists
Like
Liked
34:56Rosemary from Florida wants to know what really happens to your face scan at the airport. Is it stored forever? Plus, secrets not to tell ChatGPT, why 5G isn't always what it claims to be, and how to score money with Google Opinion Rewards.By Kim Komando
…
continue reading

1
#429 - Czecholate, 11 Years of Silence, and No One Else is Doing This
58:22
58:22
Play later
Play later
Lists
Like
Liked
58:22We join our heroes during a telling off session, because someone is being a naughty boy. Has John eaten too much chocolate on the way in and he’s about to experience the mother of all choco crashes? Has Elis insisted that we scrap the proposed running order to talk instead about every conceivable permutation of the Nations League? Or could Producer…
…
continue reading

1
59. Why Everyone Needs an Outbound Firewall
41:35
41:35
Play later
Play later
Lists
Like
Liked
41:35Helpful episodes to listen to first Episode 40 - Website and Email Filtering Episode 56 - Home Network Attacks From Within Episode 57 - How Firewalls Protect You And What You Might Be Missing Questions we answer in this episode What is a trojan horse? What are two ways an outbound firewall protects you? What is an outbound firewall's greatest frust…
…
continue reading
Welcome to The Gadget Professor Show #734 hosted by Don Baine. 2025 Latest Magnetic Wireless Charger for iPhone: 3 in 1 Travel Charging Station Devices for iPhone 16 15 14 13 12 Pro Max Plus-Foldable Charging Pad for Apple Watch Series & Air pods 4 3 2 Pro About this item 3 in 1 portable charger:The charging station for Apple multiple devices is a …
…
continue reading

1
SANS Stormcast Friday, April 18th: Remnux Cloud Environment; Erlang/OTP SSH Vuln; Brickstorm Backdoor Analysis; GPT 4.1 Safety Controversy
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18RedTail: Remnux and Malware Management A description showing how to set up a malware analysis in the cloud with Remnux and Kasm. RedTail is a sample to illustrate how the environment can be used. https://isc.sans.edu/diary/RedTail%2C%20Remnux%20and%20Malware%20Management%20%5BGuest%20Diary%5D/31868 Critical Erlang/OTP SSH Vulnerability Researchers …
…
continue reading

1
China doxxes NSA, CVE's funding crisis, Apple's zero-day troubles
1:39:19
1:39:19
Play later
Play later
Lists
Like
Liked
1:39:19Three Buddy Problem - Episode 42: We dig into news that China secretly fessed up to the Volt Typhoon hacks and followed up with claims that named NSA agents launched advanced cyberattacks against the Asian Winter Games. Plus, the MITRE CVE funding crisis, new Apple 0days in the wild includes PAC bypass exploit, Microsoft Patch Tuesday zero-days. Pl…
…
continue reading
How could a user authenticate themselves to access certain information that isn't public. Referring to Epicstack's MCP example. MCP Spec on Authorization Cloudflare Blog Post on MCPs Adding Auth to MCPsBy Kent C. Dodds
…
continue reading
Following last week’s introduction to network monitoring, we discuss the Simple Network Management Protocol (SNMP), one of the most implemented types of network monitoring. We discuss how it is organized, operations that SNMP can perform, and versions of SNMP. This week’s bonus conversation is a discussion on the future for SNMP. Episode Links: MIB…
…
continue reading

1
#065 - Expo SDK 53 Preview, RevenueCat Paywalls, AI Images & Gemini
25:35
25:35
Play later
Play later
Lists
Like
Liked
25:35What's coming with Expo SDK 53? I dive into the latest news, trends and upcoming features of Expo and React Native, and share updates on the projects I'm working on. Also in this episode: - How RevenueCat Paywalls make my life better - I talked with Google - "Is this sponsored by Expo?" - AI Image Trends 💰 Try RevenueCat: https://get.revenuecat.com…
…
continue reading

1
SANS Stormcast Thursday April 17th: Apple Updates; Oracle Updates; Google Chrome Updates; CVE News;
6:04
6:04
Play later
Play later
Lists
Like
Liked
6:04Apple Updates Apple released updates for iOS, iPadOS, macOS, and VisionOS. The updates fix two vulnerabilities which had already been exploited against iOS. https://isc.sans.edu/diary/Apple%20Patches%20Exploited%20Vulnerability/31866 Oracle Updates Oracle released it quarterly critical patch update. The update addresses 378 security vulnerabilities…
…
continue reading
This episode highlights the power of shifting from a victim mindset to an ownership mentality, encouraging listeners to embrace challenges as opportunities for growth and to lead with positive, solution-focused energy. It emphasizes that mindset not only drives personal success but also shapes workplace culture and team performance. Join us on Talk…
…
continue reading

1
SANS Stormcast Wednesday Apr 16th: File Upload Service Abuse; OpenSSH 10.0 Released; Apache Roller Vuln; Possible CVE Changes
5:54
5:54
Play later
Play later
Lists
Like
Liked
5:54Online Services Again Abused to Exfiltrate Data Attackers like to abuse free online services that can be used to exfiltrate data. From the originals , like pastebin, to past favorites like anonfiles.com. The latest example is gofile.io. As a defender, it is important to track these services to detect exfiltration early https://isc.sans.edu/diary/On…
…
continue reading

1
#428 - Hunting Aled, Gen Sea and Harriet Kemsley
1:13:22
1:13:22
Play later
Play later
Lists
Like
Liked
1:13:22Acceptance is the word on everybody’s lips today, but it has different meanings for Elis and John. For John it’s a meaningful form of accepting things as they are in life. For Elis it’s about accepting that his wife Isy will never be interested in the Nations League. Both are valid, I'm sure you'll agree. Also getting in on the acceptance game is t…
…
continue reading

1
Ep 84: How the U.S. Tariffs Will Impact Onsite Energy Project Economics
20:00
20:00
Play later
Play later
Lists
Like
Liked
20:00What if all the chaos in the tariff headlines isn’t as disastrous as it seems? In this episode, we cut through the noise to break down the real economic impact of the latest tariff developments on onsite energy projects. From the initial bloodbath in the markets to a surprising bounce back, we unpack what’s driving energy project economics—and it’s…
…
continue reading

1
SANS Stormcast Tuesday April 15th: xorsearch Update; Short Lived Certificates; New USB Malware
5:35
5:35
Play later
Play later
Lists
Like
Liked
5:35xorsearch Update Diedier updated his "xorsearch" tool. It is now a python script, not a compiled binary, and supports Yara signatures. With Yara support also comes support for regular expressions. https://isc.sans.edu/diary/xorsearch.py%3A%20Searching%20With%20Regexes/31854 Shorter Lived Certificates The CA/Brower Forum passed an update to reduce t…
…
continue reading

1
SANS Stormcast Monday April 14th: Langlow AI Attacks; Fortinet Attack Cleanup; MSFT Inetpub;
7:07
7:07
Play later
Play later
Lists
Like
Liked
7:07Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248) After spotting individaul attempts to exploit the recent Langflow vulnerability late last weeks, we now see more systematic internet wide scans attempting to verify the vulnerability. https://isc.sans.edu/forums/diary/Exploit+Attempts+for+Recent+Langflow+AI+Vulnerability+CVE20253…
…
continue reading

1
Kim Komando Show Preview: How to make your pet go viral
36:10
36:10
Play later
Play later
Lists
Like
Liked
36:10Got a super cute pup or kitty? I chat with the creator behind The Oreo Cat on how to make your pet a social media superstar — and even make a little cash doing it. Plus, scientists clone direwolves (kind of), and AI is outpacing doctors on MRIs.By Kim Komando
…
continue reading

1
MIMO-3 Vs MIMO-4 – Poynting 4G/5G Vehicle Antennas
10:19
10:19
Play later
Play later
Lists
Like
Liked
10:19Ep25 - A Word from the Wise – MIMO-3 Vs MIMO-4 – Poynting 4G/5G Vehicle Antennas Join Louise and Gen in the latest episode of 'the Solwise Podcast', as they compare the MiMO-3 & MIMO-4 Antenna ranges from Poynting Antennas. So what is the difference? Other than their appearance, the two ranges offer different frequency bands, meaning they will work…
…
continue reading

1
#427 - OALPs, Scared To Stand and Career Progression In Feudal Britain
49:20
49:20
Play later
Play later
Lists
Like
Liked
49:20Elis and Producer Dave are fresh from taking breaths of the night DJ’ing. The only two people on planet Earth to become hipper as they age. But Mixmag has it that Elis spent most of it seated. Because that’s what the top DJs do. Harris, Tong, Guetta, all from a seated position whilst sucking on Werther’s Originals. Yes Elis got a little bit tired b…
…
continue reading

1
SANS Stormcast Friday April 11th: Network Infraxploit; Windows Hello Broken; Dell Update; Langflow Exploit
5:34
5:34
Play later
Play later
Lists
Like
Liked
5:34Network Infraxploit Our undergraduate intern, Matthew Gorman, wrote up a walk through of CVE-2018-0171, an older Cisco vulnerability, that is still actively being exploited. For example, VOLT TYPHOON recently exploited this problem. https://isc.sans.edu/diary/Network+Infraxploit+Guest+Diary/31844 Windows Update Issues / Windows 10 Update Microsoft …
…
continue reading

1
58. How a Guest Network Can Protect Your Home
27:06
27:06
Play later
Play later
Lists
Like
Liked
27:06Helpful episodes to listen to first How to Access Your Router Home Network Attacks From Within Questions we answer in this episode What is a guest network? How can it protect my home network? Does everyone need to use it? What are the 3 categories of Internet of Things (IoT) devices? Episode summary A guest network is a second wifi network you can …
…
continue reading
In this episode, host Carolynn van Arsdale interviews Tanya Janca (aka SheHacksPurple), a world-renowned application security (AppSec) leader, author, speaker and educator. In addition to having multiple bestselling books, such as ‘Alice and Bob Learn Secure Coding,’ Janca is the founder of We Hack Purple and leads education and community for Semgr…
…
continue reading

1
N4N021: Is It the Network? Network Monitoring Basics
56:03
56:03
Play later
Play later
Lists
Like
Liked
56:03How do you know what is happening within your network, especially when something isn’t working? Network monitoring is the answer. On today’s show, we’ll start with the basics of network monitoring. We’ll cover what it is, how it’s used, and suggest some paid and open source network monitoring tools. This week’s bonus material is a... Read more »…
…
continue reading

1
SANS Stormcast ThursdayApril 10th: Getting Past PyArmor; CenterStack RCE; Android 0-Day Patch; VMware Tanzu Patches; Odd Win11 Directory; WhatsApp File Confusion; SANS AI Guide;
6:35
6:35
Play later
Play later
Lists
Like
Liked
6:35Getting Past PyArmor PyArmor is a python obfuscation tool used for malicious and non-malicious software. Xavier is taking a look at a sample to show what can be learned from these obfuscated samples with not too much work. https://isc.sans.edu/diary/Obfuscated%20Malicious%20Python%20Scripts%20with%20PyArmor/31840 CenterStack RCE CVE-2025-30406 Glad…
…
continue reading