Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
SplunkTalk is the podcast that's all Splunk and no junk. We talk about Splunk! What is Splunk? Glad you asked! It's software, and well, we like to talk about it, so you *might* want to join us for the ride! In this show, you'll hear news, events, and interviews with experts and special personalities from the Splunk ecosystem. We may also do technical Q&A and deep dives into cool topics, and anything else YOU might be interested in!
  continue reading
 
Covering everything from the future of organizational culture to accelerated cloud adoption, in this inaugural podcast series, Splunk thought leaders sit down with Principal Analyst Daniel Newman to discuss the unique intricacies organizations are navigating in an era of rapid digital transformation and how data remains the key solution to thriving in uncertain times.
  continue reading
 
Cyber security is dynamic and fast changing. Keep up-to-date with the latest news, vulnerabilities, threats and new research. For latest cyber security blogs, visit https://rasoolirfan.com and tweet @ → twitter.com/rasoolirfan
  continue reading
 
Artwork

1
The Ensign's Log Podcast

Lemme Listen Podcast Productions

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Join two low ranking officers aboard a well known exploratory vessel as they break regulations and broadcast a behind the scenes podcast of what life is really like going where no one has gone before.
  continue reading
 
Artwork

1
It's All Been Done Radio Hour

It's All Been Done Presents

icon
Unsubscribe
icon
Unsubscribe
Weekly+
 
It's All Been Done Radio Hour is a comedy show in the style of old-time radio serials. We perform live monthly near Columbus, Ohio, and those performances are broken down into a weekly podcast (with bonus content). Episodes come from a rotating stable of programs and content is roughly PG-13 rated.
  continue reading
 
The world has changed drastically in the last two years and businesses have to change with it. The need to move to the cloud, create digital experiences, and operate in real-time is more prescient than ever. The Data Economy is a podcast about leaders, like you, who use data to meet these new challenges. Michael Krigsman, Industry Analyst and Publisher of CXOTalk, sits down with executives at companies like Splunk, HP, UPS, Siemens, and EA to find out how they leverage data to power real-tim ...
  continue reading
 
Artwork
 
This podcast is brought to you by the Empowerment Project. It’s for kids and all the trusted adults who love them and want them to stay safe, empowered and thriving. With over three decades of experience teaching self-defense to children, teens, and adults, host Silvia Smart is a sixth-degree black belt and Head Instructor at her martial arts school in Oregon. Smart was inducted into the Association of Women’s Martial Arts Instructors Hall of Fame in 2020, recognized for both her dedication ...
  continue reading
 
Automation Alley is Michigan’s leading nonprofit technology and manufacturing business association, connecting industry, academia and government to fuel Southeast Michigan’s economy and accelerate innovation. Automation Alley focuses its efforts on innovation and technology, entrepreneurship, talent development, defense and international business, providing resources, funding and actionable intelligence to help members grow and prosper in the digital age. Automation Alley programs and servic ...
  continue reading
 
Artwork
 
The Intersection is a platform that provides a behind the scenes look at the challenges, triumphs, and minds of people early in their careers in the technology space who are having a massive impact on society today and our future. Devin is a female product manager in technology who has lived and worked all over the world. She is a top ranked performer at Intuit, a global fintech company with numerous awards including Glassdoor’s “Best Places to Work,” Fortune’s “Most Admired Software Compani ...
  continue reading
 
Artwork

1
The Product Marketing Experts

Jeffrey Vocell, Sharebird

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
A deep dive into the craft of Product Marketing with the best Product Marketers in the world. Each week we sit down with Product Marketing experts at some of the fastest growing technology companies in the world. Hosted by Jeffrey Vocell, Director of Product Marketing at Iterable and brought to you by Sharebird.com, the leading Product Marketing question and answer site.
  continue reading
 
Loading …
show series
 
It's All Been Done Radio Hour Commercial #284 Splunk #5 "Rogue Splunk" Another commercial from IABD Kids for that great product, Splunk! Visit our website http://iabdpresents.com Script books, clothing, and more at https://amzn.to/3km2TLm Please support us at http://patreon.com/IABD Find more from It's All Been Done Radio Hour here: Instagram: http…
  continue reading
 
Steganography Analysis With pngdump.py: Bitstreams More details from Didiear as to how to extract binary content hidden inside images https://isc.sans.edu/diary/Steganography%20Analysis%20With%20pngdump.py%3A%20Bitstreams/31904 Using Trusted Protocols Against You: Gmail as a C2 Mechanism Attackers are using typosquatting to trick developers into in…
  continue reading
 
Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Gro…
  continue reading
 
It's All Been Done Radio Hour Commercial # 285 The Ballad of Boxland #2 "Part 2" Wendy builds a wondrous land of boxes, but Jeff finds out! Visit our website http://iabdpresents.com Script books, clothing, and more at https://amzn.to/3km2TLm Please support us at http://patreon.com/IABD Find more from It's All Been Done Radio Hour here: Instagram: h…
  continue reading
 
More Scans for SMS Gateways and APIs Attackers are not just looking for SMS Gateways like the scans we reported on last week, but they are also actively scanning for other ways to use APIs and add on tools to send messages using other people s credentials. https://isc.sans.edu/diary/More%20Scans%20for%20SMS%20Gateways%20and%20APIs/31902 AirBorne: A…
  continue reading
 
SRUM-DUMP Version 3: Uncovering Malware Activity in Forensics Mark Baggett released SRUM-DUMP Version 3. The tool simplifies data extraction from Widnows System Resource Usage Monitor (SRUM). This database logs how much resources software used for 30 days, and is invaluable to find out what software was executed when and if it sent or received netw…
  continue reading
 
Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20…
  continue reading
 
It's All Been Done Radio Hour #523 Travels With T.I.M. #16 "An Unearthly Peach" In 1950s England, Calvert Wheatley pines over Christine Green, who doesn't seem interested, and then encounters a time traveling machine. Visit our website http://iabdpresents.com Script books, clothing, and more at https://amzn.to/3km2TLm Please support us at http://pa…
  continue reading
 
Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, publishe…
  continue reading
 
Honeypot Iptables Maintenance and DShield-SIEM Logging In this diary, Jesse is talking about some of the tasks to maintain a honeypot, like keeping filebeats up to date and adjusting configurations in case your dynamic IP address changes https://isc.sans.edu/diary/Honeypot%20Iptables%20Maintenance%20and%20DShield-SIEM%20Logging/31876 XRPL.js Compro…
  continue reading
 
xorsearch.py: Ad Hoc YARA Rules Adhoc YARA rules allow for easy searches using command line arguments without having to write complete YARA rules for simple use cases like string and regex searches https://isc.sans.edu/diary/xorsearch.py%3A%20%22Ad%20Hoc%20YARA%20Rules%22/31856 Google Spoofed via DKIM Replay Attack DKIM replay attacks are a known i…
  continue reading
 
It's 2025, so why are malicious advertising URLs still going strong? Phishing attacks continue to take advantage of Google s advertising services. Sadly, this is still the case for obviously malicious links, even after various anti-phishing services flag the URL. https://isc.sans.edu/diary/It%27s%202025...%20so%20why%20are%20obviously%20malicious%2…
  continue reading
 
Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widesp…
  continue reading
 
It's All Been Done Radio Hour #522 Itsahlbend Theatre #26 "Pooh and Piglet Go Hunting and Nearly Catch a Woozle" Pooh and Piglet follow tracks in the woods and find something very unexpected. Visit our website http://iabdpresents.com Script books, clothing, and more at https://amzn.to/3km2TLm Please support us at http://patreon.com/IABD Find more f…
  continue reading
 
RedTail: Remnux and Malware Management A description showing how to set up a malware analysis in the cloud with Remnux and Kasm. RedTail is a sample to illustrate how the environment can be used. https://isc.sans.edu/diary/RedTail%2C%20Remnux%20and%20Malware%20Management%20%5BGuest%20Diary%5D/31868 Critical Erlang/OTP SSH Vulnerability Researchers …
  continue reading
 
Apple Updates Apple released updates for iOS, iPadOS, macOS, and VisionOS. The updates fix two vulnerabilities which had already been exploited against iOS. https://isc.sans.edu/diary/Apple%20Patches%20Exploited%20Vulnerability/31866 Oracle Updates Oracle released it quarterly critical patch update. The update addresses 378 security vulnerabilities…
  continue reading
 
Online Services Again Abused to Exfiltrate Data Attackers like to abuse free online services that can be used to exfiltrate data. From the originals , like pastebin, to past favorites like anonfiles.com. The latest example is gofile.io. As a defender, it is important to track these services to detect exfiltration early https://isc.sans.edu/diary/On…
  continue reading
 
In this episode of Cisco Champion Radio, we explore how Cisco XDR (Extended Detection and Response) is transforming cybersecurity through automation and seamless integration with leading security tools. Our experts break down how Cisco XDR reduces alert fatigue, automates incident handling, and streamlines workflows to enhance security operations. …
  continue reading
 
xorsearch Update Diedier updated his "xorsearch" tool. It is now a python script, not a compiled binary, and supports Yara signatures. With Yara support also comes support for regular expressions. https://isc.sans.edu/diary/xorsearch.py%3A%20Searching%20With%20Regexes/31854 Shorter Lived Certificates The CA/Brower Forum passed an update to reduce t…
  continue reading
 
Exploit Attempts for Recent Langflow AI Vulnerability (CVE-2025-3248) After spotting individaul attempts to exploit the recent Langflow vulnerability late last weeks, we now see more systematic internet wide scans attempting to verify the vulnerability. https://isc.sans.edu/forums/diary/Exploit+Attempts+for+Recent+Langflow+AI+Vulnerability+CVE20253…
  continue reading
 
It's All Been Done Radio Hour #521 Privates #19 "Their Story II" Jake is missing and presumed dead, at least by Judy, who ordered his execution. Can Frank discover what happened to his erstwhile friend and partner? Visit our website http://iabdpresents.com Script books, clothing, and more at https://amzn.to/3km2TLm Please support us at http://patre…
  continue reading
 
Network Infraxploit Our undergraduate intern, Matthew Gorman, wrote up a walk through of CVE-2018-0171, an older Cisco vulnerability, that is still actively being exploited. For example, VOLT TYPHOON recently exploited this problem. https://isc.sans.edu/diary/Network+Infraxploit+Guest+Diary/31844 Windows Update Issues / Windows 10 Update Microsoft …
  continue reading
 
Getting Past PyArmor PyArmor is a python obfuscation tool used for malicious and non-malicious software. Xavier is taking a look at a sample to show what can be learned from these obfuscated samples with not too much work. https://isc.sans.edu/diary/Obfuscated%20Malicious%20Python%20Scripts%20with%20PyArmor/31840 CenterStack RCE CVE-2025-30406 Glad…
  continue reading
 
Microsoft Patch Tuesday Microsoft patched over 120 vulnerabilities this month. 11 of these were rated critical, and one vulnerability is already being exploited. https://isc.sans.edu/diary/Microsoft%20April%202025%20Patch%20Tuesday/31838 Adobe Updates Adobe released patches for 12 different products. In particular important are patches for Coldfusi…
  continue reading
 
It's All Been Done Radio Hour Commercial #283 Halftime Report #18 "Dave's Leave of Absence" Dave tells Cheryl he'll be going away and introduces her to a new co-host, Bob. Visit our website http://iabdpresents.com Script books, clothing, and more at https://amzn.to/3km2TLm Please support us at http://patreon.com/IABD Find more from It's All Been Do…
  continue reading
 
XORsearch: Searching With Regexes Didier explains a workaround to use his tool XORsearch to search for regular expressions instead of simple strings. https://isc.sans.edu/diary/XORsearch%3A%20Searching%20With%20Regexes/31834 MCP Security Notification: Tool Poisoning Attacks Invariant labs summarized a critical weakness in the Model Context Protocol…
  continue reading
 
New SSH Username Report A new ssh/telnet username reports makes it easier to identify new usernames attackers are using against our telnet and ssh honeypots https://isc.sans.edu/diary/New%20SSH%20Username%20Report/31830 Quickshell Sharing is Caring: About an RCE Attack Chain on Quick Share The Google Quick Share protocol is susceptible to several v…
  continue reading
 
It's All Been Done Radio Hour #520 Morning Show #24 "Good Intentions " Brooks brings in a media consultant, who has an idea to boost Gus's visibility. But Gus won't like it. Visit our website http://iabdpresents.com Script books, clothing, and more at https://amzn.to/3km2TLm Please support us at http://patreon.com/IABD Find more from It's All Been …
  continue reading
 
Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive Using frequency analysis, and training the model with honeypot data as well as log data from legitimate websites allows for a fairly simple and reliable triage of web server logs to identify possible malicious activity. https://isc.sans.edu/diary/Exploring%20Statistical%20Mea…
  continue reading
 
Surge in Scans for Juniper t128 Default User Lasst week, we dedtect a significant surge in ssh scans for the username t128 . This user is used by Juniper s Session Smart Routing, a product they acquired from 128 Technologies which is the reason for the somewhat unusual username. https://isc.sans.edu/diary/Surge%20in%20Scans%20for%20Juniper%20%22t12…
  continue reading
 
It's All Been Done Radio Hour Commercial #282 Awkward Moments in IABD History #6 "Kristin Gets Cut Off" Kristin tries to pitch an idea at the IABD Story Retreat. Visit our website http://iabdpresents.com Script books, clothing, and more at https://amzn.to/3km2TLm Please support us at http://patreon.com/IABD Find more from It's All Been Done Radio H…
  continue reading
 
Apple Patches Everything Apple released updates for all of its operating systems. Most were released on Monday with WatchOS patches released today on Tuesday. Two already exploited vulnerabilities, which were already patched in the latest iOS and macOS versions, are now patched for older operating systems as well. A total of 145 vulnerabilities wer…
  continue reading
 
Apache Camel Exploit Attempt by Vulnerability Scans A recently patched vulnerability in Apache Camel has been integrated into some vulnerability scanners, like for example OpenVAS. We do see some exploit attempts in our honeypots, but they appear to be part of internal vulnerablity scans https://isc.sans.edu/diary/Apache%20Camel%20Exploit%20Attempt…
  continue reading
 
A Tale of Two Phishing Sties Two phishing sites may use very different backends, even if the site itself appears to be visually very similar. Phishing kits are often copied and modified, leading to sites using similar visual tricks on the user facing site, but very different backends to host the sites and reporting data to the miscreant. https://is…
  continue reading
 
It's All Been Done Radio Hour #519 Universe Journey #120 "Lost in Translation" Because the A.S.S. Thrifty 2 Fast 2 Furious is no longer communicating with Earth and updating their systems, apps break down across the vessel, including the universal translator. Visit our website http://iabdpresents.com Script books, clothing, and more at https://amzn…
  continue reading
 
Sitecore "thumbnailsaccesstoken" Deserialization Scans (and some new reports) CVE-2025-27218 Our honeypots detected a deserialization attack against the CMS Sitecore using a thumnailaccesstoken header. The underlying vulnerability was patched in January, and security firm Searchlight Cyber revealed details about this vulnerability a couple of weeks…
  continue reading
 
Leveraging CNNs and Entropy-Based Feature Selection to Identify Potential Malware Artifacts of Interest This diary explores a novel methodology for classifying malware by integrating entropy-driven feature selection with a specialized Convolutional Neural Network (CNN). Motivated by the increasing obfuscation tactics used by modern malware authors,…
  continue reading
 
It's All Been Done Radio Hour #518 Exit Interview #4 "Alexis Augustus Armentrout" Jerome Wetzel sits down with Joe Morales following the death of his popular character. Writer Kristin Green also talks to Joe about *that* scene. Visit our website http://iabdpresents.com Script books, clothing, and more at https://amzn.to/3km2TLm Please support us at…
  continue reading
 
XWiki Search Vulnerablity Exploit Attempts (CVE-2024-3721) Our honeypot detected an increase in exploit attempts for an XWiki command injection vulnerablity. The vulnerability was patched last April, but appears to be exploited more these last couple days. The vulnerability affects the search feature and allows the attacker to inject Groovy code te…
  continue reading
 
Privacy Aware Bots A botnet is using privacy as well as CSRF prevention headers to better blend in with normal browsers. However, in the process they may make it actually easier to spot them. https://isc.sans.edu/diary/Privacy%20Aware%20Bots/31796 Critical Ingress Nightmare Vulnerability ingress-nginx fixed four new vulnerabilities, one of which ma…
  continue reading
 
Critical Next.js Vulnerability CVE-2025-29927 A critical vulnerability in how the x-middleware-subrequest header is verified may lead to bypassing authorization in Next.js applications. https://zhero-web-sec.github.io/research-and-things/nextjs-and-the-corrupt-middleware https://github.com/vercel/next.js/security/advisories/GHSA-f82v-jwr5-mffw http…
  continue reading
 
It's All Been Done Radio Hour #517 Story Roundtable #17 "Daniel Kravitz, Chosen One Volume 4" Jerome Wetzel sits down with series stars Nathan Haley, Wendy Parks, Joe Morales, Shane Stefanchik, Ryan Yohe, Ashley Clements, and Katie Boissoneault to talk about the penultimate volume. Visit our website http://iabdpresents.com Script books, clothing, a…
  continue reading
 
In this episode of Cisco Champion Radio, we dive into Cisco's groundbreaking efforts to simplify network architecture and streamline the future of networking. The discussion focuses on the evolution of network design, from the collapse of transponders into routers in routed optical networking to the benefits of adopting coherent optics and segment …
  continue reading
 
Some New Data Feeds and Little Incident We started offering additional data feeds, and an SEO spamer attempted to make us change a link from an old podcast episode. https://isc.sans.edu/diary/Some%20new%20Data%20Feeds%2C%20and%20a%20little%20%22incident%22./31786 Veeam Deserialization Vulnerability Veeam released details regarding the latest vulner…
  continue reading
 
Loading …
Listen to this show while you explore
Play