POPULARITY
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy. In this segment, we'll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker. Segment Resources: Pro-Russian Hackers Use Linux VMs to Hide in Windows Russian Hackers Abuse Hyper-V to Hide Malware in Linux VMs Qilin ransomware abuses WSL to run Linux encryptors in Windows This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Segment 2: Topic - Threat Modeling Humanoid Robots We're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance... Resources https://www.unitree.com/H2 (watch the video!) China's humanoid robots get factory jobs as UBTech's model scores US$112 million in orders The big reveal: Xpeng founder unzips humanoid robot to prove it's not human Exploit Allows for Takeover of Fleets of Unitree Robots - Security researchers find a wormable vulnerability 100-page Paper: The Cybersecurity of a Humanoid Robot 5-page Paper: Cybersecurity AI: Humanoid Robots as Attack Vectors Amazingly, $300 smart vacuums have some of the same exact vulnerabilities and backdoors built into them as the $16,000 humanoid robots! The Day My Smart Vacuum Turned Against Me Segment 3: Weekly News Finally, in the enterprise security news, A $435M venture round A $75M seed round a few acquisitions the producer of the movie Half Baked bought a spyware company AI isn't going well, or is it? maybe we just need to adopt it more slowly and deliberately? ad-blockers are enterprise best practices firewalls and VPNs are security risks, according to insurance claims could you power an entire house with disposable vapes? All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-433
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy. In this segment, we'll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker. Segment Resources: Pro-Russian Hackers Use Linux VMs to Hide in Windows Russian Hackers Abuse Hyper-V to Hide Malware in Linux VMs Qilin ransomware abuses WSL to run Linux encryptors in Windows This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Segment 2: Topic - Threat Modeling Humanoid Robots We're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance... Resources https://www.unitree.com/H2 (watch the video!) China's humanoid robots get factory jobs as UBTech's model scores US$112 million in orders The big reveal: Xpeng founder unzips humanoid robot to prove it's not human Exploit Allows for Takeover of Fleets of Unitree Robots - Security researchers find a wormable vulnerability 100-page Paper: The Cybersecurity of a Humanoid Robot 5-page Paper: Cybersecurity AI: Humanoid Robots as Attack Vectors Amazingly, $300 smart vacuums have some of the same exact vulnerabilities and backdoors built into them as the $16,000 humanoid robots! The Day My Smart Vacuum Turned Against Me Segment 3: Weekly News Finally, in the enterprise security news, A $435M venture round A $75M seed round a few acquisitions the producer of the movie Half Baked bought a spyware company AI isn't going well, or is it? maybe we just need to adopt it more slowly and deliberately? ad-blockers are enterprise best practices firewalls and VPNs are security risks, according to insurance claims could you power an entire house with disposable vapes? All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-433
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy. In this segment, we'll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker. Segment Resources: Pro-Russian Hackers Use Linux VMs to Hide in Windows Russian Hackers Abuse Hyper-V to Hide Malware in Linux VMs Qilin ransomware abuses WSL to run Linux encryptors in Windows This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Segment 2: Topic - Threat Modeling Humanoid Robots We're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance... Resources https://www.unitree.com/H2 (watch the video!) China's humanoid robots get factory jobs as UBTech's model scores US$112 million in orders The big reveal: Xpeng founder unzips humanoid robot to prove it's not human Exploit Allows for Takeover of Fleets of Unitree Robots - Security researchers find a wormable vulnerability 100-page Paper: The Cybersecurity of a Humanoid Robot 5-page Paper: Cybersecurity AI: Humanoid Robots as Attack Vectors Amazingly, $300 smart vacuums have some of the same exact vulnerabilities and backdoors built into them as the $16,000 humanoid robots! The Day My Smart Vacuum Turned Against Me Segment 3: Weekly News Finally, in the enterprise security news, A $435M venture round A $75M seed round a few acquisitions the producer of the movie Half Baked bought a spyware company AI isn't going well, or is it? maybe we just need to adopt it more slowly and deliberately? ad-blockers are enterprise best practices firewalls and VPNs are security risks, according to insurance claims could you power an entire house with disposable vapes? All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-433
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy. In this segment, we'll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker. Segment Resources: Pro-Russian Hackers Use Linux VMs to Hide in Windows Russian Hackers Abuse Hyper-V to Hide Malware in Linux VMs Qilin ransomware abuses WSL to run Linux encryptors in Windows This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Segment 2: Topic - Threat Modeling Humanoid Robots We're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance... Resources https://www.unitree.com/H2 (watch the video!) China's humanoid robots get factory jobs as UBTech's model scores US$112 million in orders The big reveal: Xpeng founder unzips humanoid robot to prove it's not human Exploit Allows for Takeover of Fleets of Unitree Robots - Security researchers find a wormable vulnerability 100-page Paper: The Cybersecurity of a Humanoid Robot 5-page Paper: Cybersecurity AI: Humanoid Robots as Attack Vectors Amazingly, $300 smart vacuums have some of the same exact vulnerabilities and backdoors built into them as the $16,000 humanoid robots! The Day My Smart Vacuum Turned Against Me Segment 3: Weekly News Finally, in the enterprise security news, A $435M venture round A $75M seed round a few acquisitions the producer of the movie Half Baked bought a spyware company AI isn't going well, or is it? maybe we just need to adopt it more slowly and deliberately? ad-blockers are enterprise best practices firewalls and VPNs are security risks, according to insurance claims could you power an entire house with disposable vapes? All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-433
He contratado 120 Mb de ADSL y no noto la diferencia con los 30, otras posibles causas. Tu router si tiene la tecnología IEEE 802.11n pero no notas la diferencia entre tu red antigua de 30Mb y la nueva de 120Mb vamos a buscar otras posibles causas Gracias por escucharnos, soy Pedro Vicente y estáis […] La entrada 334 Programa 334. He contratado 120 Mb de ADSL y no noto la diferencia con los 30, otras posibles causas. aparece primero en Simple informatica.
He contratado 120 Mb de ADSL y no noto la diferencia con los 30 actuales. Te ha llamado tu proveedor de ADSL y te ha convencido por 10€ más al mes pasa de 30 Mb a 120Mb. Pero cuando te conectas no notas la diferencia de la red de antes. Has pasado el test de […] La entrada 333 Programa 333. He contratado 120 Mb de ADSL y no noto la diferencia con los 30 actuales. aparece primero en Simple informatica.
Vocabulario fotográfico | Descentrables |Búffer de cámara y contraluz Hola y bienvenidos, un día más, a Aprender Fotografía. Soy Fran Valverde y me acompaña Pere Larrègula, fotógrafo de moda y publicidad y formador. Hoy respondemos algunas preguntas de nuestros oyentes y seguimos con nueva sección sobre vocabulario fotográfico. Como siempre, os recordamos que Studio Lightroom es un espacio de alquiler para el fotógrafo aficionado y profesional. Ofrecemos tanto el alquiler del espacio, un estudio de 90m2 bañados por luz natural, cómo alquiler de material fotográfico. Además, ofrecemos cursos y talleres de manera habitual. Os recordamos que usando la palabra "podcast" recibiréis un 20% de descuento en todos los cursos. Preguntas de los oyentes: Fetel: A mitad podcast no resisto ya a decir: "queridos reyes magos..." ???? ojala os tuviera en mi ciudad para alquilar un b2x para una boda. Que envidia aqui en castellon no hay casi nada. Ya me disteis ganas de mirar los B1. Pero he descubierto innovafoto y morando su web he visto lo de los martes Profoto. Me acercaré. Y lo del taller de valencia me apunto ya!!! A ver si dais datos para tener agenda despejada. Jon López: Buenos días! Un apunte. Decía Nico en este podcast que el enemigo de todo es el 'cuñao'. Corrijo, el enemigo de todo es mi "cuñao" Un abrazo a los tres y feliz fin de semana. Gracias una vez más por el podcast. Objetivo DESCENTRABLE: Objetivo que puede desplazarse respecto a su eje, reproduce en parte los movimientos de las cámaras de gran formato. Básicamente sirven para el control de la perspectiva y se desplazan horizontal y verticalmente. Se utilizan en fotografía de arquitectura e interiorismo para corregir la convergencia vertical, y también en bodegón. BUFER de cámara: Memoria de la cámara que almacena las fotos digitales antes que se graben en la tarjeta de memoria. Y la importancia de la velocidad de la tarjeta 100x = 15MB/s 133x = 20MB/s 200x = 30MB/s 300x = 45MB/s 400x = 60MBs 600x = 90MB/s 800x = 120MB/s 1000x= 160MB/s Es la velocidad de Lectura… la de escritura suele ser un tercio menor. Lleva las tarjetas de memoria SD o CF protegidas contra los golpes, humedad, etc… CONTRALUZ: Luz natural o artificial situada por detrás del motivo. El contraste elevado que casi siempre le es característico dificulta el cálculo de la exposición. Como la lectura medida de toda la escena suele provocar sobre o subexposición es aconsejable tomar una lectura independiente de la parte del motivo que se quiera reproducir de forma normal. El contraluz aunque crea problemas tiene gran valor creativo y permite crear siluetas y halos en torno al cabello por ejemplo. También queremos invitarte a participar y a asistir a nuestros cursos y talleres de fotografía en Barcelona. Descuento: usando la palabra "podcast" en la cesta de compra podrás obtener un 20% de descuento. Como siempre, te pedimos que nos valores con una reseña de 5 estrellas en iTunes e iVoxx. ¡Muchísimas gracias por tu feedback! Y no dudes en escribirnos si tienes alguna duda o pregunta adicional.
The New York Times’ is claiming they’ve been hacked by Russia & we question their “proof”. We follow up on on the pro-Assad gang forming between Iran, China, India & Russia and what that means for the US’ future actions in Syria. More details about the recent NSA tools leak, including a mysterious 120MB encrypted file. Plus a breakdown of the weeks other big events around the world, our election analysis, a high note & a packed overtime.
For Episode 12, I had a fascinating chat with Simon Whistler, host of The Rocking Self-Publishing Podcast and author of Audiobooks for Indies. We talk about Simon's career as an audio book narrator, his experience with the podcast (which has 74 episodes at the time of recording), and publishing in general. Some takeaways: Simon suggests I perform my own memoir for audiobook, but not fiction. You can break script in an audiobook and you don't have to include everything Simon's show notes are great (which made feel inadequate as I was writing these, so I expanded them to put in this "takeaways" section.) Indy authors (and podcasters) tend to be cooperative more than competitive People who succeed work hard (sounds obvious, but worth repeating) Multiple sources of income is the way to go. Having a job is risky. Location independence is one great benefit of working independently. Podcasting is a great way to make connections. In Prague, Simon can choose between 8 different Internet Providers and has a 120Mb/s connection for $20!!! Nonfiction e-books don't have to be terribly long. If you have books out, audio books are "money on the table," another possible revenue stream for your book. Links Mentioned Audiobooks for Indies - Simon's Book Rocking Self Publishing - Simon's Podcast Self Publishing Podcast The Creative Penn Podcast Sell More Books Show Coverville - The first podcast I recall listening to Steven Pressfield