The pod dedicated to the hardworking network operators who keep the bitpipes running smoothly. We focus on sharing best practices, the operations tool stack, and engage with vendors and solution providers to get insights into new technologies and tools so you can make informed decisions for your ops environment. Hosted by your friendly neighborhood internet plumber, Scott Robohn.
…
continue reading
Juniper Networks Podcasts
Join us as we explore the world of Network Engineering! In each episode, we explore new topics, talk about technology, and interview people in our industry. We peek behind the curtain and get insights into what it's like being a network engineer - and spoiler alert - it's different for everyone! For more information check out our website https://artofnetworkengineering.com | Be sure to follow us on Twitter and Instagram as well @artofneteng | Co-Host Twitter Handle: Andy @andylapteff
…
continue reading
In 2189, Earth narrowly won a war against extraterrestrials. The Strange Case of Starship Iris is about what comes after. It's a story of outer space, survival, espionage, resistance, identity, friendship, found family, romance, and secrets. (Also, there’s jokes.) For more info, visit http://procyonpodcasts.com/starship-iris
…
continue reading
Unlock the secrets of channel marketing with Channel Chats with Tina. Host Tina O'Dell, Juniper Networks’ channel marketing powerhouse, and co-host Harry Radcliffe deliver actionable advice on AI, leadership, and more. With a perfect blend of expertise and humor, this podcast is a must-listen for marketers and business professionals at any stage of their career.
…
continue reading
Daily cybersecurity news for practitioners. Vulnerabilities, defenses, threats, network security insight, research and more to make you sound smarter as you get to the office in the morning. New each weekday.
…
continue reading
AI and digital expert Suchi Srinivasan and fintech practice leader Kamila Rakhimova from Boston Consulting Group (BCG) talk to the women at the vanguard of business, digital, and technology. They’re digging into how these powerhouse leaders got where they are—everything from the joy of projects gone right to the realities of family responsibilities. And crucially, asking: what was that moment you knew you weren't merely getting there...you had arrived? That's when you know you're in your ele ...
…
continue reading
Under the Juniper Tree with Andrew Crowe-- In this fast-paced, modern world, depression and anxiety entangle the minds of millions. Just as God provided comfort to Elijah under the juniper tree, each episode endeavors to bring biblical light to the shadows of life.
…
continue reading
All of your flavor news and views right in one podcast from comedian Jesse Elias and friend-of-comedian Adam. Season 2 begins in Spring 2019!
…
continue reading
Once a week we get together in a studio somewhere in London to take the piss out of telecoms and technology for an hour or so.
…
continue reading
Wireless LAN Professionals is a place to Educate, Inform, Encourage and Entertain those involved in Wireless LANs. This Wireless LAN Professionals Podcast is an audio manifestation of those goals. Our host is Wireless LAN veteran, consultant, designer, and teacher… Keith Parsons.
…
continue reading
Podcast on entrepreneurship and investment by Riana Shah, concurrent degree student at MIT and Harvard. Support this podcast: https://podcasters.spotify.com/pod/show/venture-vignettes/support
…
continue reading
Each week, TechTarget’s news team provides candid insight and analysis of the biggest IT news headlines of the week.
…
continue reading
The Routing Table podcast is hosted by Melchior Aelmans and Rick Mur. We talk about technology and anything related.
…
continue reading
Summary: Getting (some of) the band back together. Note: If you haven't yet listened to Episode 3.00.5, Juniper Liu's Reporter Notebook, please do that first. Be advised this episode contains discussion of war, discussion of death, and portrayal of a residential area being bombed by a government. Transcripts available at https://www.procyonpodcastn…
…
continue reading

1
SANS Stormcast Thursday, June 12th, 2025: Quasar RAT; Windows 11 24H2 Delay; SMB Client Vuln PoC; Connectwise Signing Keys; KDE Telnet code exec
6:27
6:27
Play later
Play later
Lists
Like
Liked
6:27Quasar RAT Delivered Through Bat Files Xavier is walking you through a quick reverse analysis of a script that will injection code extracted from a PNG image to implement a Quasar RAT. https://isc.sans.edu/diary/Quasar%20RAT%20Delivered%20Through%20Bat%20Files/32036 Delayed Windows 11 24H2 Rollout Microsoft slightly throttled the rollout of windows…
…
continue reading

1
SANS Stormcast Wednesday, June 11th, 2025: Microsoft Patch Tuesday; Acrobat Patches
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Microsoft Patch Tuesday Microsoft today released patches for 67 vulnerabilities. 10 of these vulnerabilities are rated critical. One vulnerability has already been exploited and another vulnerability has been publicly disclosed before today. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20June%202025/32032 Adobe Vulnerabilities Adobe relea…
…
continue reading

1
SANS Stormcast June, Tuesday, June 10th, 2025: Octosql; Mirai vs. Wazuh DNS4EU; Wordpress Fair Package Manager
6:09
6:09
Play later
Play later
Lists
Like
Liked
6:09OctoSQL & Vulnerability Data OctoSQL is a neat tool to query files in different formats using SQL. This can, for example, be used to query the JSON vulnerability files from CISA or NVD and create interesting joins between different files. https://isc.sans.edu/diary/OctoSQL+Vulnerability+Data/32026 Mirai vs. Wazuh The Mirai botnet has now been obser…
…
continue reading

1
The Power of Hope in High-Stakes Leadership with BCG’s Kirsten Rulf
27:39
27:39
Play later
Play later
Lists
Like
Liked
27:39We want to hear from you! Email us at [email protected] with a voice memo describing your In Your Ellement moment. We might feature your story in an upcoming episode! *** What can ancient Greek myths teach us about modern leadership? Kirsten Rulf has spent her career at the intersection of tech, policy, and public service. In this episode, K…
…
continue reading
A sketch of life in San Ramos, a surprising development, and the prologue to the third and final season of Starship Iris. This episode was made possible by our generous patrons. To support the show, visit www.patreon.com/starshipiris Please be advised this episode contains discussion of war and discussion of living in a place being bombed by a gove…
…
continue reading

1
SANS Stormcast June, June 9th, 2025: Extracting PNG Data; GlueStack Packages Backdoor; MacOS targeted by Clickfix; INETPUB restore script
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Extracting With pngdump.py Didier extended his pngdump.py script to make it easier to extract additional data appended to the end of the image file. https://isc.sans.edu/diary/Extracting%20With%20pngdump.py/32022 16 React Native Packages for GlueStack Backdoored Overnight 16 npm packages with over a million weekly downloads between them were compro…
…
continue reading
The guys were delighted to welcome special guest Juliette Scott from Openreach, following their half-term break. Openreach is the UK’s biggest wholesaler of telecoms infrastructure, including all the legacy stuff, and Juliette is one of the people responsible for migration from old to new. So they start by talking about that, as well as the broader…
…
continue reading
The first episode of the third and final season of Starship Iris drops on June 12th. In the meantime, let Arkady take you through what happened in the first two seasons. This mini episode was made possible by our wonderful Patreon backers. If you'd like to throw a few bucks our way and get cool perks in return, visit https://www.patreon.com/starshi…
…
continue reading

1
SANS Stormcast Friday, June 6th, 2025: Fake Zoom Clients; Python tarfile vulnerability; HPE Insight Remote Support Patch
5:01
5:01
Play later
Play later
Lists
Like
Liked
5:01Be Careful With Fake Zoom Client Downloads Miscreants are tricking victims into downloading fake Zoom clients (and likely other meeting software) by first sending them fake meeting invites that direct victims to a page that offers malware for download as an update to the Zoom client. https://isc.sans.edu/diary/Be%20Careful%20With%20Fake%20Zoom%20Cl…
…
continue reading

1
SANS Stormcast Thursday, June 5th, 2025: Phishing Comment Trick; AWS default logging mode change; Cisco Backdoor Fixed; Infoblox Vulnerability Details Released
5:26
5:26
Play later
Play later
Lists
Like
Liked
5:26Phishing e-mail that hides malicious links from Outlook users Jan found a phishing email that hides the malicious link from Outlook users. The email uses specific HTML comment clauses Outlook interprets to render or not render specific parts of the email s HTML code. Jan suggests that the phishing email is intented to not expose users of https://is…
…
continue reading
Send us a text Artificial intelligence isn't just a buzzword anymore. It's fundamentally changing how we approach networking and IT infrastructure. In the inaugural "Whitreboard Wednesday episode, Jeff Clark joins Andy to demonstrate practical AI applications that are transforming everyday tasks for network engineers. Jeff walks through powerful to…
…
continue reading

1
SANS Stormcast Wednesday, June 4th, 2025: vBulletin Exploited; Chrome 0-Day Patch; Roundcube RCE Patch; Multiple HP StoreOnce Vulns Patched
7:25
7:25
Play later
Play later
Lists
Like
Liked
7:25vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%…
…
continue reading

1
SANS Stormcast Tuesday, June 3rd, 2025: Windows SSH C2; Google Removes CAs from trusted list; MSFT issues Emergency Patch to fix Crash issue; Qualcom Adreno GPU 0-day
6:06
6:06
Play later
Play later
Lists
Like
Liked
6:06Simple SSH Backdoor Xavier came across a simple SSH backdoor taking advantage of the ssh client preinstalled on recent Windows systems. The backdoor is implemented via an SSH configuration file that instructs the SSH client to connect to a remote system and forward a shell on a random port. This will make the shell accessible to anybody able to con…
…
continue reading

1
SANS Stormcast Monday, June 2nd, 2025: PNG with RAT; Cisco IOS XE WLC Exploit; vBulletin Exploit
5:42
5:42
Play later
Play later
Lists
Like
Liked
5:42A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently p…
…
continue reading

1
TNO031: Attracting New Talent to Networking, Pairing Dev With NetOps, and More With Justin Ryburn
45:22
45:22
Play later
Play later
Lists
Like
Liked
45:22Total Networks Operations sits down with Justin Ryburn for a wide-ranging discussion on the state of the networking industry. Topics including how to attract new talent to network engineering and network operations; getting literate in DevOps/infrastructure tools such as GitHub, Terraform, and Python; pairing Dev and NetOps to maximize domain exper…
…
continue reading

1
SANS Stormcast Friday, May 30th 2025: Alternate Data Streams; Connectwise Breach; Google Calendar C2;
13:47
13:47
Play later
Play later
Lists
Like
Liked
13:47Alternate Data Streams: Adversary Defense Evasion and Detection Good Primer of alternate data streams and how they are abused, as well as how to detect and defend against ADS abuse. https://isc.sans.edu/diary/Alternate%20Data%20Streams%20%3F%20Adversary%20Defense%20Evasion%20and%20Detection%20%5BGuest%20Diary%5D/31990 Connectwise Breach Affects Scr…
…
continue reading

1
SANS Stormcast Thursday May 29th 2025: LLM Assisted Analysis; MSP Ransomware; Everetz Vulnerability
6:10
6:10
Play later
Play later
Lists
Like
Liked
6:10Exploring a Use Case of Artificial Intelligence Assistance with Understanding an Attack Jennifer Wilson took a weird string found in a recent honeypot sample and worked with ChatGPT to figure out what it is all about. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Exploring%20a%20Use%20Case%20of%20Artificial%20Intelligence%20Assistance%20with%20U…
…
continue reading

1
SANS Stormcast Wednesday May 28th 2025: Securing authorized_keys; ADAuditPlus SQL Injection; Dero Miner vs Docker API
6:37
6:37
Play later
Play later
Lists
Like
Liked
6:37SSH authorized_keys File One of the most common techniques used by many bots is to add rogue keys to the authorized_keys file, implementing an SSH backdoor. Managing these files and detecting unauthorized changes is not hard and should be done if you operate Unix systems. https://isc.sans.edu/diary/Securing%20Your%20SSH%20authorized_keys%20File/319…
…
continue reading

1
SANS Stormcast Tuesday, May 27th 2025: SVG Steganography; Fortinet PoC; GitLab Duo Prompt Injection
7:13
7:13
Play later
Play later
Lists
Like
Liked
7:13SVG Steganography Steganography is not only limited to pixel-based images but can be used to embed messages into vector-based formats like SVG. https://isc.sans.edu/diary/SVG%20Steganography/31978 Fortinet Vulnerability Details CVE-2025-32756 Horizon3.ai shows how it was able to find the vulnerability in Fortinet s products, and how to possibly exp…
…
continue reading
The guys were delighted to welcome special guest Brandon Larson of Mavenir to this last pod before a brief break. It doesn’t take long for AI to make an appearance in the conversation, but that’s fair enough because it’s a big part of Brandon’s day job. They focus on what AI means for telcos, but there are inevitable tangents in the direction of as…
…
continue reading

1
Discovering Your Leadership Style with WEX’s Karen Stroup
27:53
27:53
Play later
Play later
Lists
Like
Liked
27:53We want to hear from you! Email us at [email protected] with a voice memo describing your In Your Ellement moment. We might feature your story in an upcoming episode! *** What happens when you bring startup lessons into the C-suite? This episode kicks off our mini series called Builders, where we talk with founders, product managers, and dig…
…
continue reading

1
TNO030: The Backbone of AI: Data Center Ops in the Age of Explosive Growth (Sponsored)
52:58
52:58
Play later
Play later
Lists
Like
Liked
52:58Data Center construction has reached an incredible pace over the last few years with implications on NetOps and operations of all kinds. Today we with talk with sponsor Siemon regarding the state of data centers, past, present and future. We explore legacy data centers and how they are evolving to work in today’s environments. We... Read more »…
…
continue reading

1
SANS Stormcast Friday, May 23rd 2025: Backup Connectivity; Windows 2025 dMSA Abuse; Samlify Vulnerability
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor…
…
continue reading

1
SANS Stormcast Thursday, May 22nd 2025: Crypto Confidence Scams; Extension Mayhem for VS Code and Chrome
6:21
6:21
Play later
Play later
Lists
Like
Liked
6:21New Variant of Crypto Confidence Scam Scammers are offering login credentials for what appears to be high value crypto coin accounts. However, the goal is to trick users into paying for expensive VIP memberships to withdraw the money. https://isc.sans.edu/diary/New%20Variant%20of%20Crypto%20Confidence%20Scam/31968 Malicious Chrome Extensions Malici…
…
continue reading
Send us a text The networking industry stands at a crossroads where traditional command-line mastery meets modern automation requirements. Few professionals embody this intersection better than Muna Chimso, a Network Automation Engineer at Google who joins us to share his remarkable journey and insights. Muna's story begins in Nigeria, where fixing…
…
continue reading

1
SANS Stormcast Wednesday, May 21st 2025: Researchers Scanning the Internet; Forgotten DNS Records; openpgp.js Vulneraiblity
7:51
7:51
Play later
Play later
Lists
Like
Liked
7:51Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do offer lists of researchers and just added three new groups today https://isc.sans.edu/diary/Researchers%20Scanning%20the%20Intern…
…
continue reading

1
SANS Stormcast Tuesday, May 20th 2025: AutoIT Code RAT; Fake Keepass Download; Procolored Printer Software Compromise
6:41
6:41
Play later
Play later
Lists
Like
Liked
6:41RAT Dropped By Two Layers of AutoIT Code Xavier explains how AutoIT was used to install a remote admin tool (RAT) and how to analyse such a tool https://isc.sans.edu/diary/RAT%20Dropped%20By%20Two%20Layers%20of%20AutoIT%20Code/31960 RVTools compromise confirmed Robware.net, the site behind the popular tool RVTools now confirmed that it was compromi…
…
continue reading

1
SANS Stormcast Monday, May 18th 2025: xorsearch python functions; pwn2own Berlin; senior govt official impersonation; dynamic domain risk
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30xorsearch.py: Python Functions Didier s xorsearch tool now supports python functions to filter output https://isc.sans.edu/diary/xorsearch.py%3A%20Python%20Functions/31858 Pwn2Own Berlin 2025 Last weeks Pwn2Own contest in Berlin allowed researchers to demonstrate a number of new exploits with a large focus on privilege escalation and virtual machin…
…
continue reading
6G, GSMA and geopolitics by Telecoms.comBy Telecoms.com
…
continue reading

1
TNO029: The Power of Curiosity With Michael Costello
45:41
45:41
Play later
Play later
Lists
Like
Liked
45:41Michael Costello shares his career journey on today’s Total Network Operations. Currently on the Board of Directors at NANOG and a Distinguished Engineer at Saviynt, Michael talks about his early days learning the ropes as a junior network engineer, trying to start an ISP, his stint in graduate school, and a very interesting role at... Read more »…
…
continue reading

1
SANS Stormcast Friday, May 16th: Increase in Sonicwall Scans; RVTools Compromised?; RountPress
6:26
6:26
Play later
Play later
Lists
Like
Liked
6:26Web Scanning SonicWall for CVE-2021-20016 - Update Scans for SonicWall increased by an order of magnitude over the last couple of weeks. Many of the attacks appear to originate from Global Host , a low-cost virtual hosting provider. https://isc.sans.edu/diary/Web%20Scanning%20SonicWall%20for%20CVE-2021-20016%20-%20Update/31952 Google Update Patches…
…
continue reading

1
SANS Stormcast Thursday, May 15th: Google Open Redirects; Adobe, Ivanti, and Samsung patches
6:16
6:16
Play later
Play later
Lists
Like
Liked
6:16Another day, another phishing campaign abusing google.com open redirects Google s links from it s maps page to hotel listings do suffer from an open redirect vulnerability that is actively exploited to direct users to phishing pages. https://isc.sans.edu/diary/Another%20day%2C%20another%20phishing%20campaign%20abusing%20google.com%20open%20redirect…
…
continue reading
This special mid-week recording of the pod was scheduled so we could speak to spectrum policy consultant Dave Wright while he was in town. Scott starts by asking Dave why operators and the industry associations who represent them are constantly begging for more spectrum in frequency bands that have limited utility. That conversation goes on to cove…
…
continue reading

1
Episode 34: The Accidental Marketer Episode
52:08
52:08
Play later
Play later
Lists
Like
Liked
52:08In this episode of Channel Chats, join Tina and Harry for a candid conversation about career evolution in marketing. Tina's journey from tech support to global marketing leadership, her insights on "accidental marketing," and her three-phase career framework. A must-listen for anyone navigating their marketing career path!…
…
continue reading

1
SANS Stormcast Wednesday, May 14th: Microsoft Patch Tuesday; 0-Days patched for Ivanti Endpoint Manager and Fortinet Products
6:38
6:38
Play later
Play later
Lists
Like
Liked
6:38Microsoft Patch Tuesday Microsoft patched 70-78 vulnerabilities (depending on how you count them). Five of these vulnerabilities are already being exploited. In particular, a remote code execution vulnerability in the scripting engine should be taken seriously. It requires the Microsoft Edge browser to run in Internet Explorer mode. https://isc.san…
…
continue reading

1
SANS Stormcast Tuesday, May 12th: Apple Patches; Unipi Technologies Scans;
6:29
6:29
Play later
Play later
Lists
Like
Liked
6:29Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking d…
…
continue reading

1
Driving National-Scale Innovation with Pritha Mehra
27:51
27:51
Play later
Play later
Lists
Like
Liked
27:51We want to hear from you! Email us at [email protected] with a voice memo describing your In Your Ellement moment. We might feature your story in an upcoming episode! *** Pritha Mehra is the Chief Information Officer and Executive Vice President of the U.S. Postal Service, where she leads the digital transformation of a network that delivers…
…
continue reading

1
SANS Stormcast Monday, May 11th: Steganography Challenge; End-of-Life Routers; ASUS Driverhub; RV-Tools SEO Poisoning
6:39
6:39
Play later
Play later
Lists
Like
Liked
6:39Steganography Challenge Didier revealed the solution to last weekend s cryptography challenge. The image used the same encoding scheme as Didier described before, but the columns and rows were transposed. https://isc.sans.edu/forums/diary/Steganography%20Challenge%3A%20My%20Solution/31912/ FBI Warns of End-of-life routers The FBI is tracking larger…
…
continue reading
The lads are uncharacteristically smart this week ahead of an event Scott chaired immediately after recording. One of the speakers at that event was Analyst Roz Roseboro of Omdia and she was able to join the pod for a bit. They start by reflecting on another recent event they all attended called FutureNet World, which covered a lot of telecoms indu…
…
continue reading

1
TNO028: Move From Monitoring to Full Internet Stack Observability: New Strategies for NetOps (Sponsored)
52:35
52:35
Play later
Play later
Lists
Like
Liked
52:35Network monitoring, Internet monitoring, and observability are all key components of NetOps. We speak with sponsor Catchpoint to understand how Catchpoint can help network operators proactively identify and resolve issues before they impact customers. We discuss past and current network monitoring strategies and the challenges that operators face w…
…
continue reading

1
SANS Stormcast Friday, May 9th: SSH Exfil Tricks; magicINFO still vulnerable; SentinelOne Vulnerability; Commvault insufficient patch
4:57
4:57
Play later
Play later
Lists
Like
Liked
4:57No Internet Access: SSH to the Rescue If faced with restrictive outbound network access policies, a single inbound SSH connection can quickly be turned into a tunnel or a full-blown VPN https://isc.sans.edu/diary/No%20Internet%20Access%3F%20SSH%20to%20the%20Rescue!/31932 SAMSUNG magicINFO 9 Server Flaw Still exploitable The SAMSUNG magicINFO 9 Serv…
…
continue reading

1
SANS Stormcast Thursday, May 8th: Modular Malware; Sysaid Vuln; Cisco Wireless Controller Patch; Unifi Protect Camera Patch
5:41
5:41
Play later
Play later
Lists
Like
Liked
5:41Example of Modular Malware Xavier analyzes modular malware that downloads DLLs from GitHub if specific features are required. In particular, the webcam module is inspected in detail. https://isc.sans.edu/diary/Example%20of%20%22Modular%22%20Malware/31928 Sysaid XXE Vulnerabilities IT Service Management Software Sysaid patched a number of XXE vulner…
…
continue reading
Send us a text Consulting Engineers (CEs) at networking vendors blend deep technical expertise with customer-facing skills to bridge the gap between account managers and specialized solution design. They operate as specialists who support Sales Engineers when customer requirements demand deeper technical knowledge. • CEs often join from traditional…
…
continue reading

1
SANS Stormcast Wednesday, May 7th: Infostealer with Webserver; Android Update; CISA Warning
6:44
6:44
Play later
Play later
Lists
Like
Liked
6:44Python InfoStealer with Embedded Phishing Webserver Didier found an interesting infostealer that, in addition to implementing typical infostealer functionality, includes a web server suitable to create local phishing sites. https://isc.sans.edu/diary/Python%20InfoStealer%20with%20Embedded%20Phishing%20Webserver/31924 Android Update Fixes Freetype 0…
…
continue reading