Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

NTP Podcasts

show episodes
 
Welcome to Engineering Success! This NTP podcast features some of the brightest engineering and manufacturing minds in the Hunter region and beyond. Join us for insightful conversations with the folks behind the region's most exciting projects. We'll dive into their career stories, the challenges they've faced, and the awesome tech they're working on. Whether you're in the industry or just curious, Engineering Success will give you a peek into the vibrant world of local engineering and manuf ...
  continue reading
 
Artwork

1
NTP Podcast

NewyTechPeople

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to the NTP Podcast. Each episode highlights the incredible work of talented tech professionals in Australia. We chat with people who are at the top of their game to learn all about their craft—why they’re passionate about their work and what resources help power their success. By delving into their experiences, we gain insights into the constantly evolving tech scene, explore how it has changed, and see where it may be headed.
  continue reading
 
Artwork

1
IBS Freedom Podcast

Dr. Nicole DiNezza, DC, NTP and Amy Hollenkamp, RD

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly+
 
You can treat your gut without restrictive, awful diets... You can trust us to show you how! Whether you're newly diagnosed with IBS or a veteran, the IBS Freedom Podcast will provide clarity for your healing journey. Each week your IBS experts will cover topics within the world of IBS including small intestinal bacterial overgrowth (SIBO), leaky gut syndrome, dysbiosis, the low FODMAP diet, candida, and so much more.Meet your hosts!- Dr. Nicole DiNezza, DC, NTP is a functional medicine doct ...
  continue reading
 
Artwork
 
A K12TechPro Podcast. This podcast is about trending K12 technology topics and issues. Josh, Chris, and Mark have real conversations, real arguments, and real banter on IT issues and trends in K12 Schools. Current and Past Sponsors: Absolute, Arista, HPE Aruba Networking, Blocksi, Chromebookparts.com, ClassLink, CTL, Eaton, Extreme Networks, Fortinet, Howard Technology Solutions, iDoc, Infoblox, INVZBL, Jupiter Education, Lightspeed Systems, Luma Technologies, Managed Methods, NTP, Papercut, ...
  continue reading
 
Artwork
 
Welcome to the "Healthy Mom, Happy Home" podcast, a heartwarming and insightful exploration of holistic well-being for moms who believe that when they thrive, their families flourish. Hosted by Nutritional Therapy Practitioner Jenna Huff, a passionate advocate for both health and motherhood. This podcast is a place for moms seeking to embrace a healthy and joyful living, as we dive into the world of self- care, holistic health, and family life.
  continue reading
 
Artwork

1
Small Steps

Aimée Suen, NTP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Aimée Suen, Nutritional Therapy Practitioner Nutritional Therapy Practitioner, multi-passionate creative and mixed race woman of color is here to help mono and multiracial women of color get clear on what health and wellness truly means to them and leave the dominant narratives behind to feel aligned, empowered, and seen, one small step at a time. This podcast will share a health at every size, diet-free, social justice and culturally informed approach to health and wellness, as well as touc ...
  continue reading
 
Artwork

1
Women of Calibre

Claire Fowler NTP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
This is a podcast for all the girls and women, who've ever worked for an employer or for themselves. I want to hear about your experiences of the workplace, whether it's virtual or a physical place you have to show up to every day and what it's like for you on a day-to-day basis. In the first series of episodes, I share my experience of working in a male-dominated industry in the UK. I worked as a consultant in Building Engineering and after nearly 15 years, I decided to take my talent, my e ...
  continue reading
 
Artwork

1
Digitally Diverse

NewyTechPeople

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Welcome to Digitally Diverse! This podcast takes a deep dive into the journeys of the movers and shakers in the design and tech industry with the help of host Ellen Bennett. Join us as we sit down with industry leaders, innovators, and creative minds to explore their unique career paths, the lessons they've learned, and the fascinating stories they have to share. Whether you're a seasoned professional, a budding designer, or simply curious about the digital landscape, our episodes offer insi ...
  continue reading
 
Artwork

1
The Between Meals Podcast

Beth Manos Brickey, RYT, NTP

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
The Between Meals Podcast features Beth Manos Brickey, FNTP, RWS, RYT, of TastyYummies.com. Food and nutrition, while very important, this is JUST ONE piece of a much larger puzzle. Movement, stress, sleep, emotions, spirit, community, play – these are just as crucial to our wellness and vitality. And should too, be investigated as both potential causes and as cures. What happens between meals is equally as important to our health. We are complex machines. Our system is a delicate symphony o ...
  continue reading
 
Artwork

1
Number Two Podcast

Lourdes and Tello

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Number Two Podcast is the journey of two cousins from a dysfunctional Latino family trying to make it through life by laughing at it. Support this podcast: https://podcasters.spotify.com/pod/show/numtwopod/support
  continue reading
 
Artwork

1
The Balanced Babes Podcast

Amanda Montalvo & Kim Perez

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
We're Kim & Amanda- functional nutritionists on a mission to help women learn how to nourish their bodies, balance their hormones, and feel good in their skin. Tune in every Wednesday to hear expert interviews with the best in women's health, Q&A episodes where we answer listener questions, and our deep dive episodes where we pick a topic and share our expertise. Join our Balanced Babes Community on Facebook where listeners can gather, relate, and connect with one another.
  continue reading
 
The Network+ Audio Course is your comprehensive audio training series for mastering the CompTIA Network+ certification. Designed for learners on the go, this Audio Course transforms exam objectives into clear, structured, and engaging episodes tailored for auditory learning. Whether you're walking, commuting, or studying between shifts, each episode breaks down complex networking topics into digestible segments aligned with the official CompTIA blueprint. From OSI layers and IP addressing to ...
  continue reading
 
Do you worry you won’t get pregnant, stay pregnant, or have a healthy baby? Infertility rates are on the rise. Women are waiting until later in life to start a family. It is more important than ever to start understanding exactly how to take control of your fertility. Your host is Kristin Cornett, a functional nutritional therapy practitioner and fertility specialist at Tiny Feet. She dives deep into the true causes of infertility and what you can do to get your health and fertility back on ...
  continue reading
 
Loading …
show series
 
In this episode of Engineering Success, Melinda Sietsma interviews Neil Hunt, Managing Director of McLanahan Group, for a conversation that blends personal resilience, engineering leadership, and an extraordinary company legacy spanning 190 years. Neil shares his unconventional career journey, immigrating to Australia and navigating multiple indust…
  continue reading
 
Microsoft Patch Tuesday Microsoft released its regular monthly patch on Tuesday, addressing 57 flaws. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20December%202025/32550 Adobe Patches Adobe patched five products. The remote code execution in ColdFusion, as well as the code execution issue in Acrobat, will very likely see exploits soon. h…
  continue reading
 
nanoKVM Vulnerabilities The nanoKVM device updates firmware insecurely; however, the microphone that the authors of the advisory referred to as undocumented may actually be documented in the underlying hardware description. https://www.tomshardware.com/tech-industry/cyber-security/researcher-finds-undocumented-microphone-and-major-security-flaws-in…
  continue reading
 
AutoIT3 Compiled Scripts Dropping Shellcodes Malicious AutoIT3 scripts are usign the FileInstall function to include additional scripts at compile time that are dropped as temporary files during execution. https://isc.sans.edu/diary/AutoIT3%20Compiled%20Scripts%20Dropping%20Shellcodes/32542 React2Shell Update The race is on to patch vulnerable syst…
  continue reading
 
Episode 242 digs into the messy rollout of ChatGPT for Teachers and what it means for districts. We discuss the first‑in admin problem, educator verification (pay‑stub/DNS issues), SSO/SAML concerns, the 18‑month trial/pricing uncertainty, and whether OpenAI rushed the launch to capture market share. We also cover recent news: the FTC’s action agai…
  continue reading
 
Nation-State Attack or Compromised Government? [Guest Diary] An IP address associated with the Indonesian Government attacked one of our interns' honeypots. https://isc.sans.edu/diary/Nation-State%20Attack%20or%20Compromised%20Government%3F%20%5BGuest%20Diary%5D/32536 React Update Working exploits for the React vulnerability patched yesterday are n…
  continue reading
 
Attempts to Bypass CDNs Our honeypots recently started receiving scans that included CDN specific headers. https://isc.sans.edu/diary/Attempts%20to%20Bypass%20CDNs/32532 React Vulnerability CVE-2025-55182 React patched a critical vulnerability in React server components. Exploitation is likely imminent. https://react.dev/blog/2025/12/03/critical-se…
  continue reading
 
SmartTube Android App Compromise The key a developer used to sign the Android YouTube player SmartTube was compromised and used to publish a malicious version. https://github.com/yuliskov/SmartTube/issues/5131#issue-3670629826 https://github.com/yuliskov/SmartTube/releases/tag/notification Two Years, 17K Downloads: The NPM Malware That Tried to Gas…
  continue reading
 
Hunting for SharePoint In-Memory ToolShell Payloads A walk-through showing how to analyze ToolShell payloads, starting with acquiring packets all the way to decoding embedded PowerShell commands. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Hunting%20for%20SharePoint%20In-Memory%20ToolShell%20Payloads/32524 Android Security Bulletin December 20…
  continue reading
 
In this episode, hosts Nikki and Amy announce that they will be taking a break for the month of December to enjoy the holiday season and avoid the stress of creating content during this busy time. They discuss their holiday plans, including Nikki's trip to Buffalo for a snowy Christmas. The hosts emphasize the importance of practicing self-care and…
  continue reading
 
Fake adult websites pop realistic Windows Update screen to deliver stealers via ClickFix The latest variant of ClickFix tricks users into copy/pasting commands by displaying a fake blue screen of death. https://www.acronis.com/en/tru/posts/fake-adult-websites-pop-realistic-windows-update-screen-to-deliver-stealers-via-clickfix/ B2B Guest Access Cre…
  continue reading
 
Send us a text Our minds and guts are connected in ways that extend far beyond what conventional medicine recognizes, with unresolved trauma and subconscious programming potentially driving persistent gut symptoms despite perfect diet and lifestyle habits. Matt Travis shares his journey from fitness professional to hypnotherapist and German New Med…
  continue reading
 
Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications Spyware attacks messaging applications in part by triggering vulnerabilities in messaging applications but also by deploying tools like keystroke loggers and screenshot applications. https://www.cisa.gov/news-events/alerts/2025/11/24/spyware-allows-cyber-threat-actors-targ…
  continue reading
 
Conflicts between URL mapping and URL based access control. Mapping different URLs to the same script, and relying on URL based authentication at the same time, may lead to dangerous authentication and access control gaps. https://isc.sans.edu/diary/Conflicts%20between%20URL%20mapping%20and%20URL%20based%20access%20control./32518 Sha1-Hulud, The Se…
  continue reading
 
In this episode, hosts Nikki and Amy discuss strategies for managing and enjoying the holiday season while dealing with IBS. They share personal experiences and offer practical advice on how to shift from a survival mentality to one of enjoyment and connection. The conversation emphasizes the importance of mindset, self-compassion, and finding joy …
  continue reading
 
Use of CSS stuffing as an obfuscation technique? Phishing sites stuff their HTML with benign CSS code. This is likely supposed to throw of simple detection engines https://isc.sans.edu/diary/Use%20of%20CSS%20stuffing%20as%20an%20obfuscation%20technique%3F/32510 Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day Early exploit attem…
  continue reading
 
Episode 241 covers ChatGPT’s new free teacher tier (available through June 2027), Google’s Gemini 3.0 release, and Wired’s investigation into bathroom vape detectors (aka “snitch boxes”) that raise serious privacy and microphone concerns. The guys also discuss the Canadian Privacy Commissioner’s findings on the PowerSchool breach, camera and sensor…
  continue reading
 
Oracle Identity Manager Exploit Observation from September (CVE-2025-61757) We observed some exploit attempts in September against an Oracle Identity Manager vulnerability that was patched in October, indicating that exploitation may have occurred prior to the patch being released. https://isc.sans.edu/diary/Oracle%20Identity%20Manager%20Exploit%20…
  continue reading
 
Unicode: It is more than funny domain names. Unicode can cause a number of issues due to odd features like variance selectors and text direction issues. https://isc.sans.edu/diary/Unicode%3A%20It%20is%20more%20than%20funny%20domain%20names./32472 FortiWeb Multiple OS command injection in API and CLI A second silently patched vulnerability in FortiW…
  continue reading
 
KongTuke Activity This diary investigates how a recent Kong Tuke infections evolved all the way from starting with a ClickFix attack. https://isc.sans.edu/diary/KongTuke%20activity/32498 Cloudflare Outage Cloudflare suffered a large outage today after an oversized configuration file was loaded into its bot protection service https://x.com/dok2001 G…
  continue reading
 
Decoding Binary Numeric Expressions Didier updated his number to hex script to support simple arithmetic operations in the text. https://isc.sans.edu/diary/Decoding%20Binary%20Numeric%20Expressions/32490 Tea Token NPM Pollution The NPM repository was hit with around 150,000 submissions that did not contain any useful contributions, but instead atte…
  continue reading
 
In this episode recorded around Halloween, the hosts discuss the multifaceted benefits of vitamin C for overall health, beyond its well-known role in boosting immunity. They explore its impact on gut health, including its role as an antioxidant, its necessity in collagen synthesis for tissue repair and gut barrier function, and its influence on mit…
  continue reading
 
Fortiweb Vulnerability Fortinet, with significant delay, acknowledged a recently patched vulnerability after exploit attempts were seen publicly. https://isc.sans.edu/diary/Honeypot+FortiWeb+CVE202564446+Exploits/32486 https://labs.watchtowr.com/when-the-impersonation-function-gets-used-to-impersonate-users-fortinet-fortiweb-auth-bypass/ https://fo…
  continue reading
 
Send us a text Heather Sunderland shares her remarkable healing journey from 28 years of chronic illness to vibrant health by addressing the root causes of mold toxicity and Systemic Inflammatory Response Syndrome (SIRS). Her experience reveals crucial insights into healing complex chronic conditions that conventional medicine often misses. • Diffe…
  continue reading
 
On this episode of K12 Tech Talk, we cover a busy week in school tech: Linewize and Google outages, handling suspicious Google logins, parental pushes to tighten cell phone rules, and worries about AI being used to draft IEPs and 504 plans. We discuss reports of malware tied to Teachers Pay Teachers and discuss the question - Should schools block T…
  continue reading
 
SmartApeSG campaign uses ClickFix page to push NetSupport RAT A detailed analysis of a recent SamtApeSG campaign taking advantage of ClickFix https://isc.sans.edu/diary/32474 Formbook Delivered Through Multiple Scripts An analysis of a recent version of Formbook showing how it takes advantage of multiple obfuscation tricks https://isc.sans.edu/diar…
  continue reading
 
OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-disc…
  continue reading
 
Microsoft Patch Tuesday for November 2025 https://isc.sans.edu/diary/Microsoft+Patch+Tuesday+for+November+2025/32468/ Gladinet Triofox Vulnerability Triofox uses the host header in lieu of proper access control, allowing an attacker to access the page managing administrators by simply setting the host header to localhost. https://cloud.google.com/b…
  continue reading
 
It isn t always defaults: Scans for 3CX Usernames Our honeypots detected scans for usernames that may be related to 3CX business phone systems https://isc.sans.edu/diary/It%20isn%27t%20always%20defaults%3A%20Scans%20for%203CX%20usernames/32464 Watchguard Default Password Controversy A CVE number was assigned to a default password commonly used in W…
  continue reading
 
Honeypot Requests for Code Repository Attackers continue to scan websites for source code repositories. Keep your repositories outside your document root and proactively scan your own sites. https://isc.sans.edu/diary/Honeypot%3A%20Requests%20for%20%28Code%29%20Repositories/32460 Malicious NuGet Packages Deliver Time-Delayed Destructive Payloads Ne…
  continue reading
 
Your driving record tells the story of who you are behind the wheel, but how much does it really affect your CDL? In this episode of Successful Driver, we break down what counts as a serious violation, what’s considered minor, and how far back carriers and licensing agencies look when reviewing your record. You’ll learn how to read your driving his…
  continue reading
 
Join Josh and Mark on this week’s K‑12 Tech Talk as they break down the real-world effects of the federal government shutdown on schools, walk through a new federal AI bill (the GARD Act) and discuss major service outages that disrupted classrooms — including Chromebook/Google login problems, recent AWS and Entra incidents, and how districts should…
  continue reading
 
Binary Breadcrumbs: Correlating Malware Samples with Honeypot Logs Using PowerShell [Guest Diary] Windows, with PowerShell, has a great scripting platform to match common Linux/Unix command line utilities. https://isc.sans.edu/diary/Binary%20Breadcrumbs%3A%20Correlating%20Malware%20Samples%20with%20Honeypot%20Logs%20Using%20PowerShell%20%5BGuest%20…
  continue reading
 
Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
  continue reading
 
Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
  continue reading
 
XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Num…
  continue reading
 
In the grand finale of the single nutrient series on B vitamins, Amy and Nikki dive deep into cobalamin (Vitamin B12). They discuss interesting facts about B12, its distinct status as the only vitamin containing a mineral, and how it's the largest of the B vitamins. The conversation covers various aspects such as its functions in energy metabolism,…
  continue reading
 
Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https://isc.sans.edu/diary/Scans%20for%20Port%208530%208531%20%28TCP%29.%20Likely%20related%20to%20WSUS%20Vulnerability%20C…
  continue reading
 
Send us a text Courtney shares her transformative experience attending Dr. Joe Dispenza's advanced retreat and how it deepened her understanding of the mind-body connection for healing chronic conditions. • Six-day intensive retreat featuring 38 hours of meditation • Foundation in energy work and Chinese medicine provided helpful context • Dr. Joe …
  continue reading
 
Holy MFA, Batman! This week, the guys discuss the sentencing of the individual behind the PowerSchool data breach, the recent AI weapons detection system that mistook a bag of chips for a gun and prompted police response, and Mark's Batman mask. Yes, it's Halloween time! The main segment is an interview with the tech team from Tahoe-Truckee Unified…
  continue reading
 
X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
  continue reading
 
How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
  continue reading
 
From a childhood without electricity to co-founding a listed betting company, Oliver Shanahan’s story is a masterclass in technical grit and commercial pivots. As the Group Head of Cybersecurity and Infrastructure at BetMakers Technology Group, Oliver traces his path from wiring up early ISPs and mining ERPs to building TopBetta from a two-person L…
  continue reading
 
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
  continue reading
 
Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
  continue reading
 
Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
  continue reading
 
In this episode, we debrief last week’s Campus Guardian Angel interview, dig into Google’s new policy to delete inactive accounts after two years, and reflect on the recent AWS/DNS outage that impacted services. Then, K12TechPro's Hayden the New Guy brings multiple on‑site interviews from the MOREnet conference! Tech Department Salary Survey View t…
  continue reading
 
Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
  continue reading
 
webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play