Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Polymorphic Podcasts

show episodes
 
Welcome to NADDPOD! Join Dungeon Master Brian Murphy as he leads players Emily Axford, Caldwell Tanner and Jake Hurwitz on a comedic, actual-play adventure through the realms of Bahumia and Beyond. The show also features a score composed and performed by Emily Axford. This team has created a variety of D&D campaigns, as well as numerous other series such as DUNGEON COURT and 8-BIT BOOK CLUB. They also occasionally hit the road and roll dice live on stage.
  continue reading
 
Artwork

1
SciPod

SciPod

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Weekly+
 
Listen to the story behind the science. SciPod boasts a rich reputation of bringing a new, authentic and easy communication style to lovers of science and technology. Best of all, you can listen for free! so what are you waiting for, click play and start enjoying. www.scipod.global
  continue reading
 
Prototype and See is a podcast produced by HLH Rapid, hosted by Co-founder and Director James Murphy. Hear from designers, engineers and veterans in some of the world's most innovative companies as they share their stories of success and failures and the ups and downs of bringing new products to market.
  continue reading
 
Artwork
 
Listen to a Board Certified Dermatologist with over 25 years of experience give expert information about all Dermatology topics both medical and cosmetic. We get to the important points fast and you can use what you learn to help your skin issues or to ask the right questions at your next dermatology appointment.
  continue reading
 
Artwork

1
Architect Tips

Jeffrey Palermo

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Architect Tips by Clear Measure Created to help .NET development teams move fast, deliver quality, and run their systems with confidence. This series is led by Chief Architect Jeffrey Palermo as well as other Clear Measure team members, publishing short clips of helpful tips to empower you to achieve more! Visit www.clearmeasure.com to view other content and learn more.
  continue reading
 
Artwork

1
Crimes and Cantrips

Gwen Malmquist, Miri Baker, Beatrix Ryle, Fennix

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Crimes and Cantrips is a narrative-focused TTRPG actual play audio podcast. We roll dice to tell stories about queer characters making ✨choices✨. This podcast is organized as a series of one-shots and mini-campaigns; different campaigns may feature different cast members. Our public episodes are free, and bonus content such as prologues, outtakes, GM notes, and cast discussions are featured on our Patreon.
  continue reading
 
People, Product and Crypto. Wild User Interviews is about open-sourcing open-ended conversations with the creative forces shaping up the decentralised world. In the wild, our guests range from Product Designers to Blockchain Architects, and include topics such as Philosophy and Proof-of-Stake. The common thread being our focus on the human side as he try to deconstruct the frameworks and processes to enable listeners to become the better version of themselves while venturing into the Metaverse.
  continue reading
 
Loading …
show series
 
The way molecules arrange themselves into crystals can affect the stability, safety, and effectiveness of medicines and advanced materials. Dr Ivo Rietveld at the University of Rouen Normandy and his collaborators are developing new benchmark data that help scientists to accurately predict the stability of crystal structures of molecules, helping t…
  continue reading
 
From hosting OutsideXbox and the Mom Can’t Cook! podcast, to winning awards for his horror writing, Andy Farrant is a renaissance man of geekery. He tells tales of how his parents used to bribe him with Red Dwarf videos, and the lines of Dwarf dialogue that live in his head. We also chat about how the show has aged, and explore the idea of series 1…
  continue reading
 
Polymorphic Python Malware Xavier discovered self-modifying Python code on Virustotal. The remote access tool takes advantage of the inspect module to modify code on the fly. https://isc.sans.edu/diary/Polymorphic%20Python%20Malware/32354 SSH ProxyCommand Vulnerability A user cloning a git repository may be tricked into executing arbitrary code via…
  continue reading
 
When we think about science, we often imagine a universal language of knowledge in the form of a shared code of numbers, graphs, and precise words that transcend borders. But what happens when the language of science is not the language of the scientist? This is the challenge explored in a recent study by a group of publication professionals from t…
  continue reading
 
webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
  continue reading
 
In the 20th century, antibiotics transformed medicine. Infections that once killed millions could be cured with a pill or injection. Surgeries became safer, cancer treatments more effective, and advanced medical interventions, such as organ transplants, became possible, all because doctors could rely on these drugs to control infections. Unfortunat…
  continue reading
 
What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
  continue reading
 
Across North America, the phrase “fuel management” is used almost as often as “climate change” when people talk about wildfires. The idea is simple: forests burn because they are full of fuel, including trees, shrubs, branches, and dried leaves. If you remove some of that material, you make it harder for a wildfire to spread. Provincial governments…
  continue reading
 
Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/32384 AWS Outages AWS has had issues most of the day on Monday, affecting numerous services. http…
  continue reading
 
TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Videos%20Promoting%20Malware%20Installation/32380 Google Ads Advertise Malware Targeting MacOS Developers Hun…
  continue reading
 
Raise a glass of chilled Sancerre for the return of Guy Kelly! We discuss catchphrases, competence and the swagger of series 6 – what does success mean for an underdog show? Obviously there’s some book chat. And Guy shares his brilliant theory about the one change that would have made Lister and Rimmer grow into completely different, happier adults…
  continue reading
 
New DShield Support Slack Workspace Due to an error on Salesforce s side, we had to create a new Slack Workspace for DShield support. https://isc.sans.edu/diary/New%20DShield%20Support%20Slack/32376 Attackers Exploiting Recently Patched Cisco SNMP Flaw (CVE-2025-20352) Trend Micro published details explaining how attackers took advantage of a recen…
  continue reading
 
The Lore Lords (and Jake) invite you to an evening of Theatre as they swing Werewolf Woods courtesy of the ultimate Lore Lord, R.L. Stein. Join us! For the moon is full and so are our hearts. CREDITS: Sound Mixing and Editing by Trevor Lyon 8-Bit Book Club Theme by Emily Axford See Privacy Policy at https://art19.com/privacy and California Privacy …
  continue reading
 
Clipboard Image Stealer Xavier presents an infostealer in Python that steals images from the clipboard. https://isc.sans.edu/diary/Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer/32372 F5 Compromise F5 announced a wide-ranging compromise today. Source code and information about unpatched vulnerabilities were stolen. https://my.f5.co…
  continue reading
 
Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivanti Advisory Ivanti released an advisory with some mitigation steps users can take until the recently m…
  continue reading
 
When we think of spies and their activities, we imagine trench coats, hidden cameras, and tense exchanges in safehouses. Hollywood has given us the daring adventures of James Bond and Jason Bourne, along with the clever trickery of films such as Argo. But behind the cinematic flair lies a quieter, more subtle reality: espionage often depends less o…
  continue reading
 
Scans for ESAFENET CDG V5 We do see some increase in scans for the Chinese secure document management system, ESAFENET. https://isc.sans.edu/diary/Heads%20Up%3A%20Scans%20for%20ESAFENET%20CDG%20V5%20/32364 Investigating targeted payroll pirate attacks affecting US universities Microsoft wrote about how payroll pirates redirect employee paychecks vi…
  continue reading
 
New Oracle E-Business Suite Patches Oracle released one more patch for the e-business suite. Oracle does not state if it is already exploited, but the timing of the patch suggests that it should be expedited. https://www.oracle.com/security-alerts/alert-cve-2025-61884.html Widespread Sonicwall SSLVPN Compromise Huntress Labs observed the widespread…
  continue reading
 
The Triplets mount a rescue mission inside the Abbey of St. Markovia! Onyx makes a call, Nyack nets a net and Jens reignites his passion as the Trinyvale X Strahd crossover continues! Subscribe to NaddPod on Patreon! - Patreon.com/Naddpod CREDITS Editing by Brian Murphy Production and Sound Design by Daniel Ramos (@Schubirds on IG) Logo Design by C…
  continue reading
 
Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to…
  continue reading
 
Oracle E-Business Suite 0-Day CVE-2025-61882 Last week, the Cl0p ransomware gang sent messages to many businesses stating that an Oracle E-Business Suite vulnerability was used to exfiltrate data. Initially, Oracle believed the root cause to be a vulnerability patched in June, but now Oracle released a patch for a new vulnerability. https://www.ora…
  continue reading
 
While hosting a literal feast for crows, the Triplets piece together the truth behind Vallaki’s most sinister secret! Jens calls in a hit, Nyack stays hydrated and Onyx gets fired up as the Trinyvale X Strahd Crossover continues! Support NaddPod on Patreon! - Patreon.com/Naddpod CREDITS Editing by Brian Murphy Production and Sound Design by Daniel …
  continue reading
 
More .well-known scans Attackers are using API documentation automatically published in the .well-known directory for reconnaissance. https://isc.sans.edu/diary/More%20.well-known%20Scans/32340 RedHat Patches Openshift AI Services A flaw was found in Red Hat Openshift AI Service. A low-privileged attacker with access to an authenticated account, fo…
  continue reading
 
You’ll know comedian, actor and writer Jessica Knappett from her sitcoms Drifters and Avoidance, Taskmaster, and from The Inbetweeners Movie. Red Dwarf is a childhood favourite and her comfort watch to this day. She talks about fancying Lister in her youth, the show’s lack of pretension, and the weird day when she was cast in the revived Red Dwarf …
  continue reading
 
Comparing Honeypot Passwords with HIBP Most passwords used against our honeypots are also found in the Have I been pwn3d list. However, the few percent that are not found tend to be variations of known passwords, extending them to find likely mutations. https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Comparing%20Honeypot%20Passwords%20with%20HIBP/…
  continue reading
 
In the Autumn of 2022, hopeful college students across the United States clicked through the questions on the Common Application, the digital gateway to more than one thousand colleges and universities. For the first time, alongside their grades, essays, and extracurricular lists, applicants had the chance to provide their gender and pronouns. Thes…
  continue reading
 
Sometimes you don t even need to log in Applications using simple, predictable cookies to verify a user s identity are still exploited, and relatively recent vulnerabilities are still due to this very basic mistake. https://isc.sans.edu/diary/%22user%3Dadmin%22.%20Sometimes%20you%20don%27t%20even%20need%20to%20log%20in./32334 Western Digital My Clo…
  continue reading
 
Research from Dr. Andrey Kostyuk at the Grenoble Ecole de Management supervised by Prof. Martina Battisti, a Senior Fellow of Higher Education Academy, and Director of European Council for Small Business and Entrepreneurship, reveals that successful startup mentoring operates as a complex social exchange where both mentors and entrepreneurs must be…
  continue reading
 
Apple Patches Apple released patches for iOS, macOS, and visionOS, fixing a single font parsing vulnerability https://isc.sans.edu/diary/Apple%20Patches%20Single%20Vulnerability%20CVE-2025-43400/32330 Increase in Scans for Palo Alto Global Protect Vulnerability (CVE-2024-3400). Our honeypots detected an increase in scans for a Palo Alto Global Prot…
  continue reading
 
Despite decades of awareness about gender equality, a persistent pleasure gap remains between women and men in sexual encounters, with women experiencing significantly fewer orgasms and less sexual pleasure. It is important to note that this gender difference exists primarily in contexts where women have sex with men, while women who have sex with …
  continue reading
 
Converting Timestamps in .bash_history Unix shells offer the ability to add timestamps to commands in the .bash_history file. This is often done in the form of Unix timestamps. This new tool converts these timestamps into a more readable format. https://isc.sans.edu/diary/New%20tool%3A%20convert-ts-bash-history.py/32324 Cisco ASA/FRD Compromises Ex…
  continue reading
 
Imagine a future where treating cancer doesn't just depend on high-tech machines or potent drugs, but also on something as simple, and as complex, as the bacteria living in your gut. This future might be closer than we think, thanks to groundbreaking research led by Professor Andrea Facciabene at the University of Pennsylvania. In a randomized pilo…
  continue reading
 
Research from communication scholars at The Ohio State University reveals fascinating new insights about the dynamics of conversations about race-related issues in the USA. Two complementary studies show that White participants expected more negative outcomes and were more likely to avoid conversations with fellow White people from different politi…
  continue reading
 
Webshells Hiding in .well-known Places Our honeypots registered an increase in scans for URLs in the .well-known directory, which appears to be looking for webshells. https://isc.sans.edu/diary/Webshells%20Hiding%20in%20.well-known%20Places/32320 Cisco Patches Critical Exploited Vulnerabilities Cisco released updates addressing already-exploited vu…
  continue reading
 
Star of the new Taskmaster series, Phil Ellis shares the jaw-dropping true story of the time he almost got cast in Red Dwarf. It’s one of the most bonkers and traumatic tales we’ve ever heard! A fan from the beginning, you won’t believe which character Phil wanted to be as a child. He also talks about loving the less-loved episodes. And he offers u…
  continue reading
 
When they design mechanical systems, engineers first need to understand how they will behave using mathematical modelling tools that can simulate their movements. In recent years, they have increasingly explored the possibilities of ‘compliant’ mechanisms: highly flexible systems which are now being applied across numerous leading fields of technol…
  continue reading
 
Dungeon Court is back in session! Join Justices Murphy, Tanner and Axford, along with Bailiff Jake, as they pass judgement on your trials at the table! CREDITS: Sound Mixing and Editing by Trevor Lyon Dungeon Court Theme Song by Sam Weiller See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do…
  continue reading
 
Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send credentials as part of the URL. https://isc.sans.edu/diary/Exploit%20Attempts%20Against%20Older%20Hikvision%20Camera%20Vulnerability/323…
  continue reading
 
Loneliness is often described as the invisible epidemic of our time. It creeps quietly into lives, eroding confidence, weakening social bonds, and, at its most dangerous, pushing individuals toward the edge of despair. Stigma can prevent the lonely from seeking help and as loneliness is largely experienced through the prism of isolation, those in n…
  continue reading
 
Operating and maintaining highway rest areas across the United States has long posed a costly challenge for state transportation departments, especially amid tightening budgets and rising demand. In a new study, Dr. Kishor Shrestha, associate professor at Washington State University finds that one outsourcing method known as method-based contractin…
  continue reading
 
Distracting the Analyst for Fun and Profit Our undergraduate intern, Tyler House analyzed what may have been a small DoS attack that was likely more meant to distract than to actually cause a denial of service https://isc.sans.edu/diary/%5BGuest%20Diary%5D%20Distracting%20the%20Analyst%20for%20Fun%20and%20Profit/32308 GitHub s plan for a more secur…
  continue reading
 
CISA Reports Ivanti EPMM Exploit Sightings Two different organizations submitted backdoors to CISA, which are believed to have been installed using Ivanti vulnerabilities patched in May. https://www.cisa.gov/news-events/analysis-reports/ar25-261a Lastpass Observes Impersonation on GitHub Lastpass noted a number of companies being impersonated via f…
  continue reading
 
Between 1982 and 2012, the 150-foot solar tower at Mount Wilson Observatory collected a vast archive of observations of the Sun’s surface. In a series of recent studies, Professor Roger Ulrich, together with colleagues Dr. Tham Tran and Dr. John Boyden at UCLA, have revisited these data, running a thorough recalibration of the findings. Their resul…
  continue reading
 
Help Wanted: What are these odd requests about? An odd request is hitting a number of our honeypots with a somewhat unusual HTTP request header. Please let me know if you no what the request is about. https://isc.sans.edu/forums/diary/Help+Wanted+What+are+these+odd+reuqests+about/32302/ Forta GoAnywhere MFT Vulnerability Forta s GoAnywhere MFT prod…
  continue reading
 
Haunted by strange visions from the Abbey, the Triplets launch a full-scale investigation into the Baron and his family! Onyx says yes to the dress, Nyack makes an angsty ally and Jens reflects on the situation as the Trinyvale X Strahd crossover continues! Support us on Patreon! - Patreon.com/Naddpod CREDITS Editing by Brian Murphy Production and …
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play