Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo

Sound Bytes Podcasts

show episodes
 
Artwork
 
At the intersection of ideas and action, showcasing innovative insights from industry professionals around the world presented by Longitude.site fellows. Our episodes explore thought provoking values that are essential in every career - ranging from imagination, motivation, and collaboration to many others.
  continue reading
 
Artwork

1
BASSWALD

John Eckhardt

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
as basswald, john eckhardt scans the cosmos for ever new patterns in time, space & bass with a special taste for sound system culture. drawing from a vast horizon and collection of varied bass music, a basswald selection is always deep and trancy, full of haptic bass pleasures and good for surprises.
  continue reading
 
Technology changes fast, yet leadership is still about people. “Flourish” is your dose of inspiration, growth, and practical wisdom in healthcare IT. Hosted by Sarah Richardson—health system executive and trusted mentor, this channel shares personal stories, career journeys, and leadership lessons from across the industry. Whether it’s a rapid-fire Q&A, a culture-building conversation, or a behind-the-scenes look at someone’s career pivot, each episode helps health leaders thrive in work and ...
  continue reading
 
Fairphone builds a deeper understanding between people and their products, driving conversations about what “fair” really means. Follow our monthly conversations with the luminaries of sustainable electronics and let us bring you a little closer to our world.
  continue reading
 
UFR ... Raising the Barre Undies funded records and radio is presented by your host, ConDenSayShun; who is an experienced (22yrs) songwriter and performer in the independent music ‘scene’ in Australia. In this podcast we go from ow to WOW, from oh to D’oh! And from drafts to full productions, so you at home can “see how the musical sausage is squooshed into sound!” mental health, music art and motherhood in every byte! Feel free to disagree, but we believe that before long you’ll be cheering ...
  continue reading
 
Artwork

1
Octal FM

Octal FM

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Listen to Brits Jalada and Sefran discuss gaming, technology and more in short, easily digestible episodes. Topics include talking to robots, visiting Japan, making coffee, diversity in tech and why Nintendo is awesome.
  continue reading
 
Artwork

1
Life's a Holladay

Candy Holladay

icon
Unsubscribe
icon
icon
Unsubscribe
icon
Monthly
 
Have fun & feel amazing with Life's A Holladay, the first podcast to broadcast from a spa. Relax from your hectic day & tag along as spa & fashion expert Candy discovers fashion, retreat & beauty ideas to create a vivacious life. Whether roadtripping on a spa vacay, getting ready in the morning, shopping the cutest small towns, scouting beauty goodies or filming her youtube channel. Shop the Show on lifesaholladay.com & get behind the scenes skinny on @CandyHolladay instagram
  continue reading
 
Loading …
show series
 
October 30, 2025: After 25 years leading transformational change in healthcare IT, Erik Howell, VP and Head of Technology at Callen-Lorde Community Health Center, made an unconventional decision that most leaders only dream about: he took a sabbatical. Following major EHR implementations, enterprise PMO leadership, and scaling a Silicon Valley AI s…
  continue reading
 
Updates to Domainname API Some updates to our domainname API will make it more flexible and make it easier and faster to get the complete dataset. https://isc.sans.edu/diary/Updates%20to%20Domainname%20API/32452 Microsoft Teams Impersonation and Spoofing Vulnerabilities Checkpoint released details about recently patched spoofing and impersonation v…
  continue reading
 
Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tool…
  continue reading
 
XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Num…
  continue reading
 
November 3, 2025: What are healthcare IT leaders really concerned about? Fresh from three 229 Project summits across the country, Bill Russell, Sarah Richardson, and Drex DeFord pull back the curtain on the most pressing conversations happening right now. From simplifying AI governance with a two-track vendor approach to rethinking hiring strategie…
  continue reading
 
Scans for WSUS: Port 8530/8531 TCP, CVE-2025-59287 We did observe an increase in scans for TCP ports 8530 and 8531. These ports are associated with WSUS and the scans are likely looking for servers vulnerable to CVE-2025-59287 https://isc.sans.edu/diary/Scans%20for%20Port%208530%208531%20%28TCP%29.%20Likely%20related%20to%20WSUS%20Vulnerability%20C…
  continue reading
 
X-Request-Purpose: Identifying "research" and bug bounty related scans? Our honeypots captured a few requests with bug bounty specific headers. These headers are meant to make it easier to identify requests related to bug bounty, and they are supposed to identify the researcher conducting the scans https://isc.sans.edu/diary/X-Request-Purpose%3A%20…
  continue reading
 
How to Collect Memory-Only Filesystems on Linux Systems Getting forensically sound copies of memory-only file systems on Linux can be tricky, as tools like dd do not work. https://isc.sans.edu/diary/How%20to%20collect%20memory-only%20filesystems%20on%20Linux%20systems/32432 Microsoft Azure Front Door Outage Today, Microsoft s Azure Front Door servi…
  continue reading
 
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line…
  continue reading
 
Bytes over DNS Didiear investigated which bytes may be transmitted as part of a hostname in DNS packets, depending on the client resolver and recursive resolver constraints https://isc.sans.edu/diary/Bytes%20over%20DNS/32420 Unifi Access Vulnerability Unifi fixed a critical vulnerability in it s Access product https://community.ui.com/releases/Secu…
  continue reading
 
October 27, 2025: Bill, Drex, and Sarah discuss the realities of implementing AI agents across organizations. The group tackles uncomfortable questions about workforce displacement, the critical thinking skills being lost to automation, and the massive energy demands threatening AI sustainability. From simplifying complex systems to understanding w…
  continue reading
 
Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/dia…
  continue reading
 
Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-542…
  continue reading
 
webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch…
  continue reading
 
What time is it? Accuracy of pool.ntp.org. How accurate and reliable is pool.ntp.org? Turns out it is very good! https://isc.sans.edu/diary/What%20time%20is%20it%3F%20Accuracy%20of%20pool.ntp.org./32390 Xubuntu Compromise The Xubuntu website was compromised last weekend and served malware https://floss.social/@bluesabre/115401767635718361 Squid Pro…
  continue reading
 
October 21, 2025: Martha Lawrence, CEO and Co-Founder of AccendoWave, reveals a stunning gap in healthcare: pain is the number one reason patients seek care, yet no system actually measures it. After observing 300 ER intakes, she discovered the chaos of subjective pain reporting—some rating their pain a "10" while calmly chatting, others ashamed to…
  continue reading
 
Using Syscall() for Obfuscation/Fileless Activity Fileless malware written in Python can uses syscall() to create file descriptors in memory, evading signatures. https://isc.sans.edu/diary/Using%20Syscall%28%29%20for%20Obfuscation%20Fileless%20Activity/32384 AWS Outages AWS has had issues most of the day on Monday, affecting numerous services. http…
  continue reading
 
Multi-factor authentication isn't the bulletproof security measure it once was. Preston Duren, VP of Threat Services at Fortified Health Security, explores how cybercriminals are outsmarting traditional MFA through sophisticated phishing tactics and MFA bombing. The conversation shifts to the debate over platform consolidation—does fewer mean safer…
  continue reading
 
TikTok Videos Promoting Malware InstallationTikTok Videos Promoting Malware Installation Tiktok videos advertising ways to obtain software like Photoshop for free will instead trick users into downloading https://isc.sans.edu/diary/TikTok%20Videos%20Promoting%20Malware%20Installation/32380 Google Ads Advertise Malware Targeting MacOS Developers Hun…
  continue reading
 
New DShield Support Slack Workspace Due to an error on Salesforce s side, we had to create a new Slack Workspace for DShield support. https://isc.sans.edu/diary/New%20DShield%20Support%20Slack/32376 Attackers Exploiting Recently Patched Cisco SNMP Flaw (CVE-2025-20352) Trend Micro published details explaining how attackers took advantage of a recen…
  continue reading
 
October 16, 2025: Rebekah Panepinto, Enterprise Account Executive at Artisan Studios, has built a powerhouse career in healthcare IT sales by embracing Amazon's leadership principles and proving that grit isn't just a buzzword. From navigating the complexities of healthcare transformation to driving innovation in retail with brands like Shutterfly …
  continue reading
 
Clipboard Image Stealer Xavier presents an infostealer in Python that steals images from the clipboard. https://isc.sans.edu/diary/Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer/32372 F5 Compromise F5 announced a wide-ranging compromise today. Source code and information about unpatched vulnerabilities were stolen. https://my.f5.co…
  continue reading
 
Microsoft Patch Tuesday Microsoft not only released new patches, but also the last patches for Windows 10, Office 2016, Office 2019, Exchange 2016 and Exchange 2019. https://isc.sans.edu/diary/Microsoft%20Patch%20Tuesday%20October%202025/32368 Ivanti Advisory Ivanti released an advisory with some mitigation steps users can take until the recently m…
  continue reading
 
Scans for ESAFENET CDG V5 We do see some increase in scans for the Chinese secure document management system, ESAFENET. https://isc.sans.edu/diary/Heads%20Up%3A%20Scans%20for%20ESAFENET%20CDG%20V5%20/32364 Investigating targeted payroll pirate attacks affecting US universities Microsoft wrote about how payroll pirates redirect employee paychecks vi…
  continue reading
 
October 13, 2025: Healthcare IT leaders are exhausted, CIO positions remain unfilled for months, and the pressure keeps mounting. In this candid conversation, Laura O'Toole, CEO and Founder of SureTest, explores why traditional CIO roles are transforming faster than organizations can define them. They discuss the widening gap between leadership exp…
  continue reading
 
New Oracle E-Business Suite Patches Oracle released one more patch for the e-business suite. Oracle does not state if it is already exploited, but the timing of the patch suggests that it should be expedited. https://www.oracle.com/security-alerts/alert-cve-2025-61884.html Widespread Sonicwall SSLVPN Compromise Huntress Labs observed the widespread…
  continue reading
 
Loading …
Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play