Podcasts about Apt

  • 839PODCASTS
  • 2,276EPISODES
  • 45mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 15, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Apt

Show all podcasts related to apt

Latest podcast episodes about Apt

Percepticon.de
48 WTF sind chinesische Cyber-Operationen und Chinas Cyberstrategie?

Percepticon.de

Play Episode Listen Later May 15, 2025 43:12


IIn dieser Podcastfolge beleuchte ich die vielschichtige Welt chinesischer Cyberangriffe und erkläre, wie Chinas Cyberstrategie gezielt Wirtschaft, Politik und Militär im In- und Ausland beeinflusst. Du erfährst, wie Wirtschaftsspionage und technologische Wissensübertragung zentrale Ziele sind – gestützt durch nationale Programme wie „Made in China 2025“ und ambitionierte Fünfjahrespläne. Wir sprechen über die Rolle der Volksbefreiungsarmee (PLA) und neu geschaffener Cyber-Einheiten, die mit modernsten Methoden kritische Infrastrukturen angreifen. Anhand realer Beispiele wie den Operationen APT1, Volt Typhoon und Salt Typhoon zeige ich, wie chinesische Hackergruppen mit ausgefeilten Techniken westliche Unternehmen und Regierungen infiltrieren. Außerdem analysiere ich aktuelle Trends: Von gezielten, schwer erkennbaren Angriffen über den Einsatz von Zero-Day-Exploits bis hin zu Outsourcing an private Dienstleister. Du erfährst, wie China mit strengen Gesetzen und zentralisierter Kontrolle seine Cyberfähigkeiten stetig ausbaut – und warum gerade Deutschland dringend handeln muss, um sich vor chinesischen Cyberangriffen zu schützen. Shownotes Jon Lindsay et. Al., China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain, https://www.jonrlindsay.com/china-and-cybersecurity APT1 Exposing One of China's Cyber Espionage Units, https://services.google.com/fh/files/misc/mandiant-apt1-report.pdf The 14th Five-Year Plan of the People's Republic of China—Fostering High-Quality Development, https://www.adb.org/publications/14th-five-year-plan-high-quality-development-prc China's Massive Belt and Road Initiative, https://www.cfr.org/backgrounder/chinas-massive-belt-and-road-initiative “Here to stay” – Chinese state-affiliated hacking for strategic goals, https://merics.org/en/report/here-stay-chinese-state-affiliated-hacking-strategic-goals China's New Data Security Law Will Provide It Early Notice Of Exploitable Zero Days, https://breakingdefense.com/2021/09/chinas-new-data-security-law-will-provide-it-early-notice-of-exploitable-zero-days/#:~:text=WASHINGTON%3A%20China's%20new%20Data%20Security,technologies%20used%20by%20the%20Defense China's Expanding Cyber Playbook, https://dgap.org/en/research/publications/chinas-expanding-cyber-playbook U.S. Hunts Chinese Malware That Could Disrupt American Military Operations, https://www.nytimes.com/2023/07/29/us/politics/china-malware-us-military-bases-taiwan.html China is turning to private firms for offensive cyber operations, https://www.defenseone.com/threats/2024/06/china-turning-private-firms-offensive-cyber-operations/397767/ China-Linked Hackers Breach U.S. Internet Providers in New ‘Salt Typhoon' Cyberattack, https://www.wsj.com/politics/national-security/china-cyberattack-internet-providers-260bd835 Top U.S. Cybersecurity Official: China Attacks on American Infrastructure ‘Tip of the Iceberg', https://www.thecipherbrief.com/top-u-s-cybersecurity-official-china-attacks-on-american-infrastructure-tip-of-the-iceberg Jen Easterly on Linkedin: https://www.linkedin.com/posts/jen-easterly_follow-up-chinas-cyber-program-presents-activity-7292191131293892612-uhFW China has debuted its new landing barges – what does this mean for Taiwan? https://www.theguardian.com/world/2025/mar/20/china-landing-barges-shuqiao-ships-what-does-this-mean-for-taiwan BSI Hafnium Warnung, https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2021/2021-197772-1132.pdf?__blob=publicationFile&v=8 Timecodes 1:00 1) Übersicht über Chinas offensiver Cyber-Strategie 02:00 Wirtschaftsspionage  04:03 APT 1 07:20 Snowden Leaks 08:03 Militärische Cyberwarfarestrategie: Meisterschaft des ersten Schlages 10:58 Überwachung 12:11 2) Chinas Cybersicherheitsarchitektur 13:30 Volksbefreiungsarmee, PLA 17:11 Cyber Milizen & Civil & Military Fusion 18:10 Ministerium für Staatssicherheit 19:08 iSoon

Minuto de Lectura
Oppa! Las sincronías de la vida!

Minuto de Lectura

Play Episode Listen Later May 14, 2025 46:33


Nos bajaron el episodio porque agregamos la canción de APT, volvemos a subir el episodio ya sin ella…pero escuchen la canción! apt apt apt!

Risky Business News
Risky Bulletin: EU launches its own vulnerability database

Risky Business News

Play Episode Listen Later May 14, 2025 6:49


The EU launches its own vulnerability database, a Turkish APT deploys a zero-day in Iraq, North Korea tasks an APT to Ukraine, and Spain will probe cyber's role in last month's energy grid collapse. Show notes

Slacker & Steve
Full show - Monday | Erica believed this about her grandmother for way too long | Excuse me, this burger has a weird wang on it | Sleeping with Erica | Lip filler with an N | OPP - Hubby wants her gone while his friends visit | APT. | T. Hack and Erin don

Slacker & Steve

Play Episode Listen Later May 6, 2025 54:12


Full show - Monday | Erica believed this about her grandmother for way too long | Excuse me, this burger has a weird wang on it | Sleeping with Erica | Lip filler with an N | OPP - Hubby wants her gone while his friends visit | APT. | T. Hack and Erin don't understand what FU money is | Stupid stories @theslackershow @ericasheaaa @thackiswack @radioerin

Storm⚡️Watch by GreyNoise Intelligence
Biggest Cybersecurity Threats EXPOSED: Zero-Day Attacks, Chinese Hackers & Enterprise Breaches

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later May 6, 2025 52:42


Forecast = Cloudy with a chance of zero-days-watch for Spellbinder storms and scattered Git leaks! ‍ On this episode of Storm⚡️Watch, the crew dives into the fast-moving world of vulnerability tracking and threat intelligence, spotlighting how defenders are moving beyond the traditional CVE system to keep pace with real-world attacks. The show kicks off with a look at the latest listener poll, always a source of lively debate, before jumping into some of the most pressing cybersecurity stories of the week. A major focus of this episode is the recent revelation that a China-aligned APT group, dubbed TheWizards, is using a tool called Spellbinder to abuse IPv6 SLAAC for adversary-in-the-middle attacks. This technique lets attackers move laterally through networks by hijacking software update mechanisms-specifically targeting popular Chinese applications like Sogou Pinyin and Tencent QQ-to deliver malicious payloads such as the modular WizardNet backdoor. The crew unpacks how this approach leverages IPv6's stateless address autoconfiguration to intercept and redirect legitimate traffic, underscoring the evolving sophistication of lateral movement techniques in targeted campaigns. The episode then turns to Google's 2024 zero-day exploitation analysis, which reports a drop in the total number of zero-days exploited compared to last year but highlights a worrying shift: attackers are increasingly targeting enterprise products and infrastructure. Microsoft, Ivanti, Palo Alto Networks, and Cisco are among the most targeted vendors, with nearly half of all zero-day exploits now aimed at enterprise systems and network appliances. The discussion covers how attackers are chaining vulnerabilities for more impactful breaches and why defenders need to be vigilant as threat actors pivot to harder-to-monitor enterprise environments. Censys is in the spotlight for its recent research and tooling, including a new Ports & Protocols Dashboard that gives organizations granular visibility into their attack surface across all ports and protocols. This helps teams quickly spot risky exposures and misconfigurations, making it easier to prioritize remediation efforts and automate alerting for high-risk assets. The crew also highlights Censys's collaborative work on botnet hunting and their ongoing push to retire stale threat indicators, all of which are reshaping proactive defense strategies. runZero's latest insights emphasize the importance of prioritizing risks at the asset stack level, not just by CVE. The crew explains how misconfigurations, outdated software, and weak network segmentation can create stacked risks that traditional scanners might miss, urging listeners to adopt a more holistic approach to asset management and vulnerability prioritization. Rounding out the episode, GreyNoise shares new research on a dramatic spike in scanning for Ivanti Connect Secure VPNs and a surge in crawling activity targeting Git configuration files. These trends highlight the persistent risk of codebase exposure and the critical need to secure developer infrastructure, as exposed Git configs can lead to the leak of sensitive credentials and even entire codebases. As always, the show wraps up with some final thoughts and goodbyes, leaving listeners with actionable insights and a reminder to stay vigilant in the face of rapidly evolving cyber threats. If you have questions or want to hear more about any of these topics, let us know-what's on your mind this week? Storm Watch Homepage >> Learn more about GreyNoise >>  

Apt. 5B Podcast Hosted by Kil
Apt. 5B Podcast Hosted by Kil: What Are The Top 12 Dopest Hip Hop Songs From The 90's?!?!

Apt. 5B Podcast Hosted by Kil

Play Episode Listen Later May 5, 2025 152:27


For this week's ep of my podcast Apt. 5B we're chopping it up about what are the top 12 dopest Hip Hop & R&B songs from the 90's? Don't forget to subscribe to our YouTube channel and check us out wherever you listen to your fave podcasts at!@Kil889www.willmakebeatsforfood.com

Eye on Security
UNC5221 and The Targeting of Ivanti Connect Secure VPNs

Eye on Security

Play Episode Listen Later May 5, 2025 27:55


Matt Lin (Senior Incident Response Consultant, Mandiant) and Daniel Spicer (Chief Security Officer, Ivanti) dive into the research and response of UNC5221's campaigns against Ivanti. They cover how this threat actor has evolved from earlier campaigns, the continued focus of edge infrastructure by APT actors, and the shared responsibility of security in mitigating threats like this. https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerabilityhttps://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-dayhttps://www.ivanti.com/blog/an-update-on-ivantis-ongoing-commitment-to-enhanced-product-securityhttps://www.ivanti.com/resources/secure-by-design/2024https://cloud.google.com/blog/topics/threat-intelligence/2024-zero-day-trends?e=48754805

Apt. 5B Podcast Hosted by Kil
Apt. 5B Podcast Hosted by Kil: What Are Your Hip Hop Cornerstones?

Apt. 5B Podcast Hosted by Kil

Play Episode Listen Later May 3, 2025 136:24


For this week's ep of my podcast Apt. 5B we're chopping it up about cultural cornerstones which is my definitions of albums that are SO big that calling them a classic is a disservice!  Just another DOOOOOOOOOPE ep ya'll and don't forget to to subscribe to our Youtube  channel and check us out wherever you listen to your fave podcasts at!@Kil889www.willmakebeatsforfood.com

The IT Pro Podcast
RSAC Conference 2025: AI and quantum complicate security

The IT Pro Podcast

Play Episode Listen Later May 2, 2025 23:29


RSAC Conference 2025 has been full on, with cybersecurity experts from all over the world descending on San Francisco to share trends, data, and announcements.This year, ITPro has been providing both remote and on the ground coverage from the event, across talks covering topics such as AI security and threat actor methodology.In this episode, Jane speaks to Rory about some of his RSAC coverage and key takeaways from the event.Read more:RSAC Conference 2025 was a sobering reminder of the challenges facing cybersecurity professionalsRSAC Conference Day One: Vibe Is 'All In' on AI for Security“Governance is an irreplaceable role”: Microsoft Security VP on why diversity and sector expertise will keep security workers relevant in the age of agentic AIRSAC Conference day two: A focus on what attackers are doing"There needs to be an order of magnitude more effort"": AI security experts call for focused evaluation of frontier models and agentic systemsCyber defenders need to remember their adversaries are human, says Trellix research headRSAC Conference day three: using AI to do more with less and facing new attack techniques"China has almost doubled their aggression in cyber': Kevin Mandia and Nicole Perlroth warn organizations aren't waking up to growing APT threats

The CyberWire
AI on the offensive.

The CyberWire

Play Episode Listen Later May 1, 2025 33:08


Updates from RSAC 2025. Former NSA cyber chief Rob Joyce warns that AI is rapidly approaching the ability to develop high-level software exploits. An FBI official warns that China is the top threat to U.S. critical infrastructure. Mandiant and Google raise alarms over widespread infiltration of global companies by North Korean IT workers. France accuses Russia's Fancy Bear of targeting at least a dozen French government and institutional entities. SonicWall has issued an urgent alert about active exploitation of a high-severity vulnerability in its Secure Mobile Access appliances. A China-linked APT group known as “TheWizards” is abusing an IPv6 networking feature. Gremlin Stealer emerges as a serious threat. A 23-year-old Scottish man linked to the Scattered Spider hacking group has been extradited from Spain to the U.S. Senators urge FTC action on consumer neural data. New WordPress malware masquerades as an anti-malware plugin. Our guest is Andy Cao from ProjectDiscovery, the Winner of the 20th Annual RSAC™ Innovation Sandbox Contest. Our intern Kevin returns with some Kevin on the Street interviews from the RSAC floor.  Research reveals the risk of juice jacking isn't entirely imaginary.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Our guest is Andy Cao from ProjectDiscovery, who is the Winner of the 20th Annual RSAC™ Innovation Sandbox Contest 2025 event. Kevin on the Street Joining us this week from RSAC 2025, we have our partner Kevin Magee, Global Director of Cybersecurity Startups at Microsoft for Startups. Stay tuned to the CyberWire Daily podcast for “Kevin on the Street” updates on all things RSAC 2025 from Kevin all week. Today Kevin is joined by Shane Harding CEO of Devicie and Nathan Ostrowski Co-Founder Petrą Security.  You can also catch Kevin on our Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, where we shine a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. Kevin and Dave talk with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur, then speak with three Microsoft for Startups members: Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. Whether you are building your own startup or just love a good innovation story, listen and learn more here. Selected Reading Ex-NSA cyber boss: AI will soon be a great exploit dev (The Register)  AI makes China leading threat to US critical infrastructure, says FBI official (SC World) North Korean operatives have infiltrated hundreds of Fortune 500 companies (CyberScoop) France Blames Russia for Cyberattacks on Dozen Entities (SecurityWeek) SonicWall OS Command Injection Vulnerability Exploited in the Wild (Cyber Security News) Hackers abuse IPv6 networking feature to hijack software updates (Bleeping Computer)  New Gremlin Stealer Advertised on Hacker Forums Targets Credit Card Data and Login Credentials (GB Hackers) Alleged ‘Scattered Spider' Member Extradited to U.S. (Krebs on Security) Senators Urge FTC Action on Consumer Neural Data, Signaling Heightened Scrutiny (Cooley) New WordPress Malware as Anti-Malware Plugin Take Full Control of Website (Cyber Security News)  iOS and Android juice jacking defenses have been trivial to bypass for years (Ars Technica)Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Dissect DJs
Bruno Mars and ROSÉ - APT

Dissect DJs

Play Episode Listen Later Apr 25, 2025 26:48


Episode 135 breaks down Bruno Mars' latest hit single alongside K-Pop star ROSÉ titled "APT."  What does APT mean? How do you pronounce it? Why does this sound so familiar? Is Bruno Mars the best modern performer we got right now? And what is his all-time greatest jam? We dissect it all in this electric pink video, check out the full video episode here: https://youtu.be/YGbNtlzhw9cNEXT!

Apt. 5B Podcast Hosted by Kil
Apt. 5B Podcast Hosted by Kil: So Tonight We're Gonna Party Like It's 1999!

Apt. 5B Podcast Hosted by Kil

Play Episode Listen Later Apr 21, 2025 151:31


For this ep of my podcast Apt. 5B we're saluting the year of 1999! We're looking at the 5 dopest albums, slept on albums, disappointing albums, how was the dopest MC, slept on MC, dopest producer and slept on producer from '99! We're also chopping it up about was '99 the beginning of the end with the Wu solo albums and what if Nas' OG I Am drops...does that mean he has 3 classics in a row? Just another DOOOOOOOOOPE ep ya'll and don't forget to subscribe to our You Tube channel & you can check us out wherever you listen to your fave podcasts at!@Kil889www.willmakebeatsforfood.com

MP3 – mintCast
459 – Travel Digital Hygene

MP3 – mintCast

Play Episode Listen Later Apr 19, 2025 120:31


First up in the news: Mint Monthly News, Linux 6.16 To Add Asahi UAPI Header For Apple Silicon, Switzerland battles privacy intrusions, Firefox adds HEVC playback in Linux, Debian releases APT 3.0, Apple may add Mx GCC core support, Git turns 20, ProtonMail adds advanced features, ArcoLinux ends it all Then in our Wanderings: Bill is having trouble on the road and won't be here, Joe returns to us, Moss juggles tablets, Majid learns things, and Eric is AWOL In our Innards section: we talk travel computing In Bodhi Corner, Robert Wiley releases a script which can be used to install Moksha on any version of Debian, including Trixie

Overthinking It Podcast
Episode 875: The Popluck

Overthinking It Podcast

Play Episode Listen Later Apr 14, 2025


On the Overthinking It Podcast, we tackle modern pop music through the lens of “APT.” by ROSÉ and Bruno Mars; “Red Wine Supernova” by Chappell Roan, and “It's ok I'm ok” by Tate McRae. Episode 875: The Popluck originally appeared on Overthinking It, the site subjecting the popular culture to a level of scrutiny it probably doesn't deserve. [Latest Posts | Podcast (iTunes Link)]

This Week in Linux
306: Debian levels up APT, Sony serious about Steam Deck, Quantum Cryptography & more Linux news

This Week in Linux

Play Episode Listen Later Apr 12, 2025 23:04


video: https://youtu.be/ua-RPOtdcF8 Comment on the TWIL Forum (https://thisweekinlinux.com/forum) This week in Linux, App 3.0 drops, bringing big changes under the hood. Amiga OS, yes, that Amiga OS, is still alive and getting updates, apparently. Open SSL 3.5 and Open SSH 10.0 both rolled out new features this week with also some future-proofing involved. And Sony, yes, that Sony, has released The Last of Us Part II on PC and it's Steam Deck verified. All that and much more on This Week in Linux, the weekly news show that keeps you plugged into everything happening in the Linux and Open Source world. Now let's jump right into Your Source for Linux GNews. Download as MP3 (https://aphid.fireside.fm/d/1437767933/2389be04-5c79-485e-b1ca-3a5b2cebb006/c5514bc1-148c-43d2-a6eb-4d0fcbfd6966.mp3) Support the Show Become a Patron = tuxdigital.com/membership (https://tuxdigital.com/membership) Store = tuxdigital.com/store (https://tuxdigital.com/store) Chapters: 00:00 Intro 00:39 APT 3.0 Released 02:48 Last of US Part 2 Verified for Steam Deck 05:47 MPV 0.40 Released 08:58 Sandfly Security [ad] 10:54 AmigaOS still exists and getting updates apparently 14:24 TUXEDO Provides Update On Their Snapdragon X Elite Linux Laptop 17:20 OpenSSL 3.5 Released 19:19 OpenSSH 10.0 Released 21:41 Support the show Links: APT 3.0 Released https://tracker.debian.org/news/1635519/accepted-apt-300-source-into-unstable/ (https://tracker.debian.org/news/1635519/accepted-apt-300-source-into-unstable/) https://9to5linux.com/apt-3-0-debian-package-manager-released-with-revamped-command-line-interface (https://9to5linux.com/apt-3-0-debian-package-manager-released-with-revamped-command-line-interface) https://www.phoronix.com/news/Debian-APT-3.0-Released (https://www.phoronix.com/news/Debian-APT-3.0-Released) Last of US Part 2 Verified for Steam Deck https://gameinformer.com/interview/2025/04/01/naughty-dog-and-nixxes-on-the-pc-port-of-the-last-of-us-part-ii-we-take-the (https://gameinformer.com/interview/2025/04/01/naughty-dog-and-nixxes-on-the-pc-port-of-the-last-of-us-part-ii-we-take-the) https://www.pcguide.com/news/steam-deck-support-is-so-important-says-the-last-of-us-part-2-pc-project-director/ (https://www.pcguide.com/news/steam-deck-support-is-so-important-says-the-last-of-us-part-2-pc-project-director/) MPV 0.40 Released https://mpv.io/ (https://mpv.io/) https://github.com/mpv-player/mpv/releases/tag/v0.40.0 (https://github.com/mpv-player/mpv/releases/tag/v0.40.0) https://www.phoronix.com/news/MPV-0.40-Released (https://www.phoronix.com/news/MPV-0.40-Released) https://9to5linux.com/mpv-0-40-open-source-video-player-released-with-native-hdr-support-on-linux (https://9to5linux.com/mpv-0-40-open-source-video-player-released-with-native-hdr-support-on-linux) Sandfly Security [ad] https://thisweekinlinux.com/sandfly (https://thisweekinlinux.com/sandfly) https://destinationlinux.net/409 (https://destinationlinux.net/409) discount code: destination50 (Home Edition) AmigaOS still exists and getting updates apparently https://www.hyperion-entertainment.com/index.php/news/1-latest-news/320-new-update-3-for-amigaos-32-available-for-download (https://www.hyperion-entertainment.com/index.php/news/1-latest-news/320-new-update-3-for-amigaos-32-available-for-download) https://www.theregister.com/2025/04/10/amigaos32_3/ (https://www.theregister.com/2025/04/10/amigaos_3_2_3/) TUXEDO Provides Update On Their Snapdragon X Elite Linux Laptop https://www.tuxedocomputers.com/en/How-is-TUXEDOCOes-ARM-Notebook-Coming-Along.tuxedo (https://www.tuxedocomputers.com/en/How-is-TUXEDOCOes-ARM-Notebook-Coming-Along.tuxedo) https://www.qualcomm.com/products/mobile/snapdragon/laptops-and-tablets/snapdragon-x-elite (https://www.qualcomm.com/products/mobile/snapdragon/laptops-and-tablets/snapdragon-x-elite) https://www.linaro.org/ (https://www.linaro.org/) https://www.phoronix.com/news/TUXEDO-Snapdragon-Laptop-Update (https://www.phoronix.com/news/TUXEDO-Snapdragon-Laptop-Update) OpenSSL 3.5 Released https://openssl-library.org/ (https://openssl-library.org/) https://github.com/openssl/openssl/releases/tag/openssl-3.5.0 (https://github.com/openssl/openssl/releases/tag/openssl-3.5.0) https://lwn.net/Articles/1016851/ (https://lwn.net/Articles/1016851/) https://9to5linux.com/openssl-3-5-released-with-support-for-pqc-algorithms-server-side-quic (https://9to5linux.com/openssl-3-5-released-with-support-for-pqc-algorithms-server-side-quic) https://www.phoronix.com/news/OpenSSL-3.5-Released (https://www.phoronix.com/news/OpenSSL-3.5-Released) OpenSSH 10.0 Released https://www.openssh.com/ (https://www.openssh.com/) https://www.openssh.com/releasenotes.html#10.0p1 (https://www.openssh.com/releasenotes.html#10.0p1) https://www.phoronix.com/news/OpenSSH-10.0-Released (https://www.phoronix.com/news/OpenSSH-10.0-Released) https://lwn.net/Articles/1016924/ (https://lwn.net/Articles/1016924/) Support the show https://tuxdigital.com/membership (https://tuxdigital.com/membership) https://store.tuxdigital.com/ (https://store.tuxdigital.com/)

Capitol Journal
April 10, 2025

Capitol Journal

Play Episode Listen Later Apr 10, 2025 26:41


We are covering a consequential day in the State House, with the education budget and farm bureau health plan legislation moving. @Trish_Crain breaks down the ETF and then I'm pleased to welcome APT's Young Heroes of 2025.

Ask Noah Show
Ask Noah Show 436

Ask Noah Show

Play Episode Listen Later Apr 9, 2025 53:57


This week Steve builds a backup server, and tells us how and why! -- During The Show -- 01:13 GrapheneOS & Teams - Kevin Needed unsandboxed play services Broke on the next update This problem reported across OSes (https://answers.microsoft.com/en-us/msteams/forum/all/new-ms-teams-version-not-working-getting-error-no/8a4e48a0-e97b-47f6-9ab9-4c82bc8ba768?page=1) People reported needing to install "the framework" Apps stay in their sandbox Use app in a web browser 06:26 VMs - Mike Covered later in the show 07:35 searXNG - Donald More than a proxy Better results than other search engines 10:00 News Wire Curl 8.13 - curl.se (https://curl.se/ch/) GnuCash 5.11 - gnucash.org (https://www.gnucash.org/download.phtml) GNU Nano 8.4 - lists.gnu.org (https://lists.gnu.org/archive/html/info-gnu/2025-04/msg00001.html) Apt 3.0 - debian.org (https://tracker.debian.org/news/1635519/accepted-apt-300-source-into-unstable/) Thunderbird 137 - thunderbird.net (https://www.thunderbird.net/en-US/thunderbird/137.0/releasenotes/) Firefox 137 - mozilla.org (https://www.mozilla.org/en-US/firefox/137.0/releasenotes/) KDE Plasma 6.3.4 - kde.org (https://kde.org/announcements/plasma/6/6.3.4/) Rust 1.86 - releases.rs (https://releases.rs/docs/1.86.0/) Qt 6.9 - wiki.qt.io (https://wiki.qt.io/Qt_6.9_Release) Nvidia PhysX and Flow - wccftech.com (https://wccftech.com/nvidia-physx-and-flow-are-now-fully-open-source/) Outlaw Malware - thehackernews.com (https://thehackernews.com/2025/04/outlaw-group-uses-ssh-brute-force-to.html) Open Source Malware Index - infoworld.com (https://www.infoworld.com/article/3953841/sonatype-warns-of-18000-open-source-malware-packages.html) ProteuX 2.0 - github.com (https://github.com/porteux/porteux/releases/tag/v2.0) New Fedora Project Lead Jef Spaleta - fedoramagazine.org (https://fedoramagazine.org/introducing-fedora-project-leader-jef-spaleta/) 11:30 Interview Jon Segar VP of Engineering at Ubuntu uutils coreutils Licenses Growing the Ubuntu Community Feature parity & rough edges Default in 25.10 build Memory safe languages Moving people's cheese 23:00 Steve's Off Site Backup Backup server in an out building What's the most important thing Swim lanes Breaking things down Nextcloud island Containers vs VMs Nginx vs Apache Managing and backing up data Storage, NFS vs Direct Block access Sanoid (https://github.com/jimsalterjrs/sanoid) Supermicro motherboards iDrac, IPMI, PiKVM SOC vs standard system backup server considerations Moving Home Assistant from dev to prod -- The Extra Credit Section -- For links to the articles and material referenced in this week's episode check out this week's page from our podcast dashboard! This Episode's Podcast Dashboard (http://podcast.asknoahshow.com/436) Phone Systems for Ask Noah provided by Voxtelesys (http://www.voxtelesys.com/asknoah) Join us in our dedicated chatroom #GeekLab:linuxdelta.com on Matrix (https://element.linuxdelta.com/#/room/#geeklab:linuxdelta.com) -- Stay In Touch -- Find all the resources for this show on the Ask Noah Dashboard Ask Noah Dashboard (http://www.asknoahshow.com) Need more help than a radio show can offer? Altispeed provides commercial IT services and they're excited to offer you a great deal for listening to the Ask Noah Show. Call today and ask about the discount for listeners of the Ask Noah Show! Altispeed Technologies (http://www.altispeed.com/) Contact Noah live [at] asknoahshow.com -- Twitter -- Noah - Kernellinux (https://twitter.com/kernellinux) Ask Noah Show (https://twitter.com/asknoahshow) Altispeed Technologies (https://twitter.com/altispeed) Special Guest: Jon Seager.

Linux Weekly Daily Wednesday
Ploopy Classic And APT 3.0

Linux Weekly Daily Wednesday

Play Episode Listen Later Apr 9, 2025 37:20


RasPi-powered trackballs, colour-coated APT, breakout boards for old cell phones, and 45W of unadulterated excitement!

Apt. 5B Podcast Hosted by Kil
Apt. 5B Podcast Hosted by Kil: Put Some RESPECT On Their Names!

Apt. 5B Podcast Hosted by Kil

Play Episode Listen Later Apr 7, 2025 143:03


Was Phife a "hype man?!?!?" Why do y'all act like Big Boi wasn't nice?!?!?! The Roots were basically Black Thought's solo work...like Malik B NEVER existed?!?!? For this ep of my podcast Apt. 5B we're chopping it up about MC's that we see CONSTANTLY disrespected on social media and people need to start putting some respect on their names!@Kil889 www.willmakebeatsforfood.com

All TWiT.tv Shows (MP3)
Untitled Linux Show 197: You Linux Fool

All TWiT.tv Shows (MP3)

Play Episode Listen Later Apr 6, 2025 99:11


This week we talk about the OnePackage to rule them all, APT 3.0, Desktop Wayland benchmarking, and Steam's April first update. Then we talk Mozilla, The Nitrux distro and its new browser, and Jeff's Beta experience with Kubuntu 25.04. For tips we have flock for command line file locking, apt modernize sources for automated source file upgrades, pw-dot for visualizing the Pipewire graph, and trash for interacting with the trash can from the command line. You can find the show notes at https://bit.ly/4iVzT9A and enjoy! Host: Jonathan Bennett Co-Hosts: Jeff Massie, Ken McDonald, and Rob Campbell Download or subscribe to Untitled Linux Show at https://twit.tv/shows/untitled-linux-show Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.

The Cyberman Show
March 2025 Cybersecurity Recap EP 94

The Cyberman Show

Play Episode Listen Later Apr 6, 2025 17:43


Send us a textGet up to speed with everything that mattered in cybersecurity this month. In this episode of The Cyberman Show, we break down March 2025's top cyber incidents, threat actor tactics, security product launches, and vulnerabilities actively exploited in the wild.Here's what we cover:

The CyberWire
Ransom demands and medical data for sale.

The CyberWire

Play Episode Listen Later Mar 31, 2025 35:52


A cyberattack targeting Oracle Health compromises patient data. The DOJ nabs over $8 million tied to romance scams. Trend Micro examines a China-linked APT group conducting cyber-espionage. A new Android banking trojan called Crocodilus has emerged. North Korea's Lazarus Group targets job seekers in the crypto industry. CISA IDs a new malware variant targeting Ivanti Connect Secure appliances. Maria Varmazis, host of N2K's T-Minus Space Daily show chats with Jake Braun, former White House Principal Deputy National Cyber Director and chairman of DEF CON Franklin. They discuss designating space as critical infrastructure. Nulling out your pizza payment.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Maria Varmazis, host of N2K's T-Minus Space Daily show sits down with Jake Braun, former White House Principal Deputy National Cyber Director and chairman of DEF CON Franklin, and they discuss designating space as critical infrastructure and sharing an overview of its attack surface. Selected Reading Oracle Health breach compromises patient data at US hospitals (Bleeping Computer) Oracle Warns Health Customers of Patient Data Breach (Bloomberg) Critical Condition: Legacy Medical Devices Remain Easy Targets for Ransomware (SecurityWeek) U.S. seized $8.2 million in crypto linked to 'Romance Baiting' scams (Bleeping Computer) DOJ Seizes USD 8.2M Tied to Pig Butchering Scheme (TRM Labs) Earth Alux Hackers Employ VARGIET Malware to Attack Organizations (Cyber Security News)  'Crocodilus' Android Banking Trojan Allows Device Takeover, Data Theft (SecurityWeek) ClickFake Interview – Lazarus Hackers Exploit Windows and macOS Users Fake Job Campaign (Cyber Security News)  CISA Analyzes Malware Used in Ivanti Zero-Day Attacks (SecurityWeek) How A Null Character Was Used to Bypass Payments (System Weakness on Medium)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

InfluenceWatch Podcast
IW EP 358 Sixty Billion Foreign Dollars Go to College

InfluenceWatch Podcast

Play Episode Listen Later Mar 28, 2025 20:31


Sixty billion dollars—that is the estimate of foreign funding of American universities that Americans for Public Trust released earlier this week. Of that $60 billion, $20 billion went to just ten prestigious schools including Harvard, the University of Pennsylvania, MIT, Yale, and Columbia, among others. Joining us to discuss the findings and the implications of the foreign funding of these major universities is Caitlin Sutherland, executive director of APT.Links:New report sounds alarm on 'staggering' amount of foreign money pouring into US universitiesNew Study Reveals ‘Pro-Palestinian' Groups Promote Violence and Anti-AmericanismLinda McMahon to Education May Choke Foreign Influence Operations on Campus

Play Therapy Podcast
Q&A Lightning Round #8: Four Questions From Three Listeners Answered

Play Therapy Podcast

Play Episode Listen Later Mar 27, 2025 34:48 Transcription Available


In this episode, I answer four questions from three different listeners in another Q&A Lightning Round. I talk with Megan in Pennsylvania about how to present CCPT case conceptualizations in group supervision meetings when others don't understand or support the model. I walk through how to use these opportunities to drip-feed CCPT principles and advocate for the model without needing to defend it in full each time. Next, I respond to Natalie, who's struggling to hold boundaries with a dysregulated child in a non-governable school library setting. I explain how to define a play space and stay adherent to the model while managing safety and environmental limitations. Then I answer Rob's question about using CCPT with a 17-year-old client on the spectrum who presents emotionally much younger. Finally, I share my thoughts on a creative boundary-testing scenario involving sticker choices and session wrap-ups, sent in by Lexi in Minnesota. These practical questions show just how adaptable—and powerful—the CCPT model can be across different ages, settings, and challenges. LIVE, APT-approved Advanced "4-Pillars" CEU Training (Reflecting Feelings, Choice-Giving, Encouragement, Limit-Setting) Series Starting Friday March 28th Through April 11th, 2025 PlayTherapyNow.com is my HUB for everything I do! playtherapynow.com. Sign up for my email newsletter, stay ahead with the latest CCPT CEU courses, personalized coaching opportunities and other opportunities you need to thrive in your CCPT practice. If you click one link in these show notes, this is the one to click! If you would like to ask me questions directly, check out www.ccptcollective.com, where I host two weekly Zoom calls filled with advanced CCPT case studies and session reviews, as well as member Q&A. You can take advantage of the two-week free trial to see if the CCPT Collective is right for you. Ask Me Questions: Call ‪(813) 812-5525‬, or email: brenna@thekidcounselor.com Brenna's CCPT Hub: https://www.playtherapynow.com CCPT Collective (online community exclusively for CCPTs): https://www.ccptcollective.com Podcast HQ: https://www.playtherapypodcast.com APT Approved Play Therapy CE courses: https://childcenteredtraining.com Twitter: @thekidcounselor https://twitter.com/thekidcounselor Facebook: https://facebook.com/playtherapypodcast Common References: Cochran, N., Nordling, W., & Cochran, J. (2010). Child-Centered Play Therapy (1st ed.). Wiley. VanFleet, R., Sywulak, A. E., & Sniscak, C. C. (2010). Child-centered play therapy. Guilford Press. Landreth, G.L. (2023). Play Therapy: The Art of the Relationship (4th ed.). Routledge. Bratton, S. C., Landreth, G. L., Kellam, T., & Blackard, S. R. (2006). Child parent relationship therapy (CPRT) treatment manual: A 10-session filial therapy model for training parents. Routledge/Taylor & Francis Group. Benedict, Helen. Themes in Play Therapy. Used with permission to Heartland Play Therapy Institute.

Play Therapy Podcast
CCPT Purism: How The Guerneys and Filial Therapy Extended the CCPT Model

Play Therapy Podcast

Play Episode Listen Later Mar 25, 2025 17:45 Transcription Available


In this episode of the CCPT Purism series, I explore the work of Bernard and Louise Guerney, who extended the principles of child-centered play therapy beyond the playroom through the development of filial therapy. Their innovation marked a major turning point in the model's evolution by shifting the role of the therapist from the primary change agent to a coach who empowers parents to support their children at home through non-directive play. I walk through how filial therapy remains fully adherent to CCPT while providing a framework for training parents in tracking, reflecting feelings, and setting therapeutic limits. The Guerneys' work laid the foundation for programs like CPRT, which combine CCPT principles with family engagement to dramatically improve outcomes. This episode is a call to remember our roots, honor the legacy of those who shaped this model, and stay grounded in the principles that make CCPT so powerful. Episode References: Guerney, B. G. (1964). Filial therapy: Description and rationale. Journal of Consulting Psychology, 28(4), 304–310. https://doi.org/10.1037/h0044594 Guerney, L. F. (2000). Parent-child interaction therapy: Filial therapy and child-centered play therapy. International Journal of Play Therapy, 9(2), 33–49. https://doi.org/10.1037/h0089442 Landreth, G. L., & Bratton, S. C. (2006). Child parent relationship therapy (CPRT): A 10-session filial therapy model. New York, NY: Routledge. Bratton, S. C., Ray, D., Rhine, T., & Jones, L. (2005). The efficacy of play therapy with children: A meta-analytic review of treatment outcomes. Professional Psychology: Research and Practice, 36(4), 376–390. https://doi.org/10.1037/0735-7028.36.4.376 Ray, D. C. (2011). Advanced play therapy: Essential conditions, knowledge, and skills for child practice. New York, NY: Routledge. LIVE, APT-approved Advanced "4-Pillars" CEU Training (Reflecting Feelings, Choice-Giving, Encouragement, Limit-Setting) Series Starting Friday March 28th Through April 11th, 2025 PlayTherapyNow.com is my HUB for everything I do! playtherapynow.com. Sign up for my email newsletter, stay ahead with the latest CCPT CEU courses, personalized coaching opportunities and other opportunities you need to thrive in your CCPT practice. If you click one link in these show notes, this is the one to click! If you would like to ask me questions directly, check out www.ccptcollective.com, where I host two weekly Zoom calls filled with advanced CCPT case studies and session reviews, as well as member Q&A. You can take advantage of the two-week free trial to see if the CCPT Collective is right for you. Ask Me Questions: Call ‪(813) 812-5525‬, or email: brenna@thekidcounselor.com Brenna's CCPT Hub: https://www.playtherapynow.com CCPT Collective (online community exclusively for CCPTs): https://www.ccptcollective.com Podcast HQ: https://www.playtherapypodcast.com APT Approved Play Therapy CE courses: https://childcenteredtraining.com Twitter: @thekidcounselor https://twitter.com/thekidcounselor Facebook: https://facebook.com/playtherapypodcast Common References: Cochran, N., Nordling, W., & Cochran, J. (2010). Child-Centered Play Therapy (1st ed.). Wiley. VanFleet, R., Sywulak, A. E., & Sniscak, C. C. (2010). Child-centered play therapy. Guilford Press. Landreth, G.L. (2023). Play Therapy: The Art of the Relationship (4th ed.). Routledge. Bratton, S. C., Landreth, G. L., Kellam, T., & Blackard, S. R. (2006). Child parent relationship therapy (CPRT) treatment manual: A 10-session filial therapy model for training parents. Routledge/Taylor & Francis Group. Benedict, Helen. Themes in Play Therapy. Used with permission to Heartland Play Therapy Institute.

HPE Tech Talk
What's the state of the cyber security field in 2025?

HPE Tech Talk

Play Episode Listen Later Mar 20, 2025 21:21


In this episode we are looking once again at our digital security, particularly around the state of the industry in 2025, and the way threats and consumer behaviours are evolving.We'll be looking at the adoption of new kinds of security, how VPNs are still an evolving part of the security equation, and how Security Service Edge (SSE) is beginning to be taken more seriously. Joining us to discuss is Jaye Tillson, Field CTO and Distinguished Technologist at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Jaye Tillson: https://jayetillson.tech/ Sources cited in this week's episode:WEF 2025 cyber security report: https://www.weforum.org/publications/global-cybersecurity-outlook-2025/ Nuclear batteries: https://www.sciencedirect.com/science/article/pii/S2590147825000038?via%3DihubStatistics on nuclear energy: https://www.iea.org/energy-system/electricity/nuclear-power

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
What's the state of the cyber security field in 2025?

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise

Play Episode Listen Later Mar 20, 2025 21:21


In this episode we are looking once again at our digital security, particularly around the state of the industry in 2025, and the way threats and consumer behaviours are evolving.We'll be looking at the adoption of new kinds of security, how VPNs are still an evolving part of the security equation, and how Security Service Edge (SSE) is beginning to be taken more seriously. Joining us to discuss is Jaye Tillson, Field CTO and Distinguished Technologist at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Jaye Tillson: https://jayetillson.tech/ Sources cited in this week's episode:WEF 2025 cyber security report: https://www.weforum.org/publications/global-cybersecurity-outlook-2025/ Nuclear batteries: https://www.sciencedirect.com/science/article/pii/S2590147825000038?via%3DihubStatistics on nuclear energy: https://www.iea.org/energy-system/electricity/nuclear-power

Flavors of Northwest Arkansas
Heirloom at the 1907- Jason Paul

Flavors of Northwest Arkansas

Play Episode Listen Later Mar 19, 2025 66:18


In this week's episode of the Flavors of Northwest Arkansas, we're in Rogers at Heirloom at the 1907 talking with Co-owner and Chef Jason Paul, but before we get to him?!?! (*FOOD NEWS!!*) We are anniversary-heavy this week! Happy 75 years to Maxine's in Fayetteville! Happy 54 years to Patrick's Hamburgers in Springdale! Happy 29 years to Susan's Restaurant in Springdale! Happy 8th to the Odd Soul, while enjoying a beard trim with Jeffro! Update on Apt. 7 in Fayetteville. Spice & Tea Exchange Opens in Bentonville Mezzaluna Pastaria gets BIG designation Homegrown in opening in Bentonville soon! A few CSA Shares still available at Cobblestone Farms. Thai Spice opens in Springdale. Get your Waffle Hut breakfast in a new spot in Rogers! Stoic Brews opens to serve gluten-free beer in NWA! Heirloom at the 1907 is a reservation-only tasting menu restaurant in the Onyx building in downtown Rogers. We talked to co-owner and Executive Chef Jason Paul, who along with his partner Danielle, have built something unique to our area. If you've not been, you're just not quick enough. Let's just say this- if Taylor Swift were playing the AMP, you might have an easier time getting a ticket. BUT! Chef Jason has a tip for you on that front. They don't seat many, and if you get a reservation, the seat is yours for the night. Though it's a tasting menu, it has many courses- sometimes up to 10! Chef Jason is from Arizona, and got his first kitchen experience in a restaurant when he was 14, and it was all because of a book signing. It's a great story... The kitchen where he worked at that age? It just so happened to be in the nicest restaurant in the Phoenix area... He'll explain. And what's it like to work in a Vegas kitchen under the age of 21? Jason's got the deets. Finally, how did he end up in Northwest Arkansas? The way MANY people do. We talk to Chef Jason Paul from Heirloom at the 1907, next here on the Flavors of Northwest Arkansas!

Risky Business News
Risky Bulletin: Google buys Wiz for $32 billion

Risky Business News

Play Episode Listen Later Mar 19, 2025 5:44


Google buys Wiz for $32 billion, China attributes the Poison Ivy APT group to the Taiwanese Military, APT groups abuse a Windows zero-day and a judge tells CISA to reinstate fired workers. Show notes

Breaking Badness
APT 41's VPN Exploits & The Great Firewall's Leaky Secrets

Breaking Badness

Play Episode Listen Later Mar 18, 2025 31:17


In this episode of Breaking Badness, we dive into two major cybersecurity stories: the exploitation of a VPN vulnerability by Chinese APT 41 and the newly discovered “Wall Bleed” flaw in the Great Firewall of China. APT 41 has been using a critical VPN vulnerability to infiltrate operational technology (OT) organizations, targeting industries like aerospace and defense. Meanwhile, researchers have uncovered a flaw in China's DNS injection system, which inadvertently leaks internal data—an ironic twist for a government known for its strict internet censorship. Join us as we break down these exploits, their impact on cybersecurity, and what they reveal about modern cyber espionage. We also discuss best practices for securing VPNs, firewall vulnerabilities, and the ethical implications of studying censorship technologies.

Big Technology Podcast
Gruber Slams Apple, Tech Stocks In Freefall, Vibecoding & OpenAI's Agents

Big Technology Podcast

Play Episode Listen Later Mar 14, 2025 61:50


Reed Albergotti is the technology editor at Semafor. He's back for our weekly discussion of the latest tech news. We cover 1) Gruber turns on Apple 2) Has Apple lost its credibility? 3) Apple stock takes a hit after downgrades 4) Will we even use a phone in the future? 5) Will AI investing stop in a tough market? 6) The spectrum of AI outcomes and the wisdom of massive capex 7) Tesla risks and opportunities 8) OpenAI releasing agent APT 9) Vibecoding is fun 10) Reed on Amazon's proprietary AI chips --- Enjoying Big Technology Podcast? Please rate us five stars ⭐⭐⭐⭐⭐ in your podcast app of choice. For weekly updates on the show, sign up for the pod newsletter on LinkedIn: https://www.linkedin.com/newsletters/6901970121829801984/ Want a discount for Big Technology on Substack? Here's 40% off for the first year: https://tinyurl.com/bigtechnology Questions? Feedback? Write to: bigtechnologypodcast@gmail.com

The Cybersecurity Defenders Podcast
#202 - Intel Chat: CISA, BianLian (not), Crafty Camel, Github malvertising & SCADA

The Cybersecurity Defenders Podcast

Play Episode Listen Later Mar 14, 2025 38:28


In this episode of The Cybersecurity Defenders Podcast, we discuss some cutting-edge intel coming out of the LimaCharlie community.The Cybersecurity and Infrastructure Security Agency (CISA) is facing significant operational challenges as budget constraints force it to scale back key cybersecurity programs.Scammers are taking a new approach to extortion by mailing physical ransom letters to victims, claiming to be the operators of the BianLian ransomware group.A newly identified advanced persistent threat (APT) group, dubbed "Crafty Camel," has been targeting aviation operational technology (OT) systems using a sophisticated technique involving polyglot files. A new malvertising campaign is leveraging deceptive online ads to distribute information-stealing malware hosted on GitHub, highlighting an ongoing evolution in cybercriminal tactics.Security researchers have disclosed details of multiple vulnerabilities in Supervisory Control and Data Acquisition (SCADA) systems that could be exploited to facilitate attacks on industrial environments.

HPE Tech Talk
AI and Security - the opportunities and challenges

HPE Tech Talk

Play Episode Listen Later Mar 13, 2025 18:41


In this episode we are taking a fresh look at how AI is affecting the world of cybersecurity. As we've explored on the podcast in previous episodes, artificial intelligence has opened up a whole new world of opportunities for our organizations, but it also brings fresh challenges for cybersecurity professionals.We'll be looking at the current state of play, and asking whether AI as a tool to defend us can match AI as a weapon to attack us, with guest Simon Leech, Director of the Cyber Security Centre of Excellence at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Karim Abou Zahab: https://www.linkedin.com/in/karim-abouzahab/Sources cited in this week's episode:McKinsey report into AI use: https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai Statista report into cybercrime costs:  https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide  Improvements to swarm robot insects: https://news.mit.edu/2025/fast-agile-robotic-insect-could-someday-aid-mechanical-pollination-0115

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise
AI and Security - the opportunities and challenges

Tech behind the Trends on The Element Podcast | Hewlett Packard Enterprise

Play Episode Listen Later Mar 13, 2025 18:41


In this episode we are taking a fresh look at how AI is affecting the world of cybersecurity. As we've explored on the podcast in previous episodes, artificial intelligence has opened up a whole new world of opportunities for our organizations, but it also brings fresh challenges for cybersecurity professionals.We'll be looking at the current state of play, and asking whether AI as a tool to defend us can match AI as a weapon to attack us, with guest Simon Leech, Director of the Cyber Security Centre of Excellence at HPE.This is Technology Now, a weekly show from Hewlett Packard Enterprise. Every week we look at a story that's been making headlines, take a look at the technology behind it, and explain why it matters to organizations and what we can learn from it. About this week's guest, Karim Abou Zahab: https://www.linkedin.com/in/karim-abouzahab/Sources cited in this week's episode:McKinsey report into AI use: https://www.mckinsey.com/capabilities/quantumblack/our-insights/the-state-of-ai Statista report into cybercrime costs:  https://www.statista.com/forecasts/1280009/cost-cybercrime-worldwide  Improvements to swarm robot insects: https://news.mit.edu/2025/fast-agile-robotic-insect-could-someday-aid-mechanical-pollination-0115

Steve Talks Books
Page Burners: Deadhouse Gates by Steven Erikson - Chapters 11 & 12

Steve Talks Books

Play Episode Listen Later Mar 13, 2025 109:47


In this episode, the group discusses chapters 11 and 12 of 'Deadhouse Gates' from the Malazan Book of the Fallen series. They explore various themes such as the nature of reality, the significance of memory, and the complexities of character relationships. The conversation delves into the role of magic, the influence of ascendants, and the moral quandaries faced by characters like Icarium. The discussion also touches on the power of words and historical narratives, as well as the implications of the houses and the holds within the Malazan universe. In this conversation, the participants delve into the intricate themes of power dynamics, history, and morality within the Malazan series, particularly focusing on the character Icarium and his metaphorical representation of humanity. They explore the consequences of historical atrocities, the nature of genocide, and the complexities of characters like Shadowthrone and Apt. The discussion also touches on the dark humor present in the narrative and the haunting imagery of the city of the dead, ultimately reflecting on the legacy of the T'lan Imass and the philosophical questions raised throughout the series.Send us a messageSupport the showFilm Chewing Podcast: https://www.buzzsprout.com/2235582/followLens Chewing on YouTube: https://www.youtube.com/@lenschewingSpeculative Speculations: https://creators.spotify.com/pod/show/speculative-speculationsSupport the podcast: https://www.paypal.com/ncp/payment/7EQ7XWFUP6K9EJoin Riverside.fm: https://riverside.fm/?via=steve-l

Play Therapy Podcast
Client "Fit" in CCPT Isn't About the Child—It's About Expectations, Policies, and Processes

Play Therapy Podcast

Play Episode Listen Later Mar 13, 2025 13:05 Transcription Available


In this episode, I answer a question from Chloe in Georgia about how to assess whether a client or family is a good "fit" for CCPT. I clarify that CCPT is developmentally appropriate for every child, and that therapist-client "fit" isn't an issue when the therapist is fully adherent to the model. The real question, then, is about alignment between the family's expectations and the therapist's approach, policies and processes. I walk through how we screen for alignment early—during the intake call and initial consultation—and what red flags suggest a mismatch. I also explain how we use clear scripts, consistent messaging, and strong boundaries to prevent misaligned expectations from creating conflict down the road. If you've ever wondered how to handle resistant parents or when (and how) to refer out, this episode provides a detailed look at the systems we use to protect the therapeutic process. LIVE, APT-approved Advanced "4-Pillars" CEU Training (Reflecting Feelings, Choice-Giving, Encouragement, Limit-Setting) Series Starting Friday March 28th Through April 11th, 2025 PlayTherapyNow.com is my HUB for everything I do! playtherapynow.com. Sign up for my email newsletter, stay ahead with the latest CCPT CEU courses, personalized coaching opportunities and other opportunities you need to thrive in your CCPT practice. If you click one link in these show notes, this is the one to click! If you would like to ask me questions directly, check out www.ccptcollective.com, where I host two weekly Zoom calls filled with advanced CCPT case studies and session reviews, as well as member Q&A. You can take advantage of the two-week free trial to see if the CCPT Collective is right for you. Ask Me Questions: Call ‪(813) 812-5525‬, or email: brenna@thekidcounselor.com Brenna's CCPT Hub: https://www.playtherapynow.com CCPT Collective (online community exclusively for CCPTs): https://www.ccptcollective.com Podcast HQ: https://www.playtherapypodcast.com APT Approved Play Therapy CE courses: https://childcenteredtraining.com Twitter: @thekidcounselor https://twitter.com/thekidcounselor Facebook: https://facebook.com/playtherapypodcast Common References: Cochran, N., Nordling, W., & Cochran, J. (2010). Child-Centered Play Therapy (1st ed.). Wiley. VanFleet, R., Sywulak, A. E., & Sniscak, C. C. (2010). Child-centered play therapy. Guilford Press. Landreth, G.L. (2023). Play Therapy: The Art of the Relationship (4th ed.). Routledge. Bratton, S. C., Landreth, G. L., Kellam, T., & Blackard, S. R. (2006). Child parent relationship therapy (CPRT) treatment manual: A 10-session filial therapy model for training parents. Routledge/Taylor & Francis Group. Benedict, Helen. Themes in Play Therapy. Used with permission to Heartland Play Therapy Institute.

Play Therapy Podcast
CCPT Purism: The Core Tenets & Conditions That Shaped Child-Centered Play Therapy

Play Therapy Podcast

Play Episode Listen Later Mar 11, 2025 24:22 Transcription Available


In this episode, I continue the CCPT Purism series with a deep dive into the core tenets and core conditions of Child-Centered Play Therapy. I walk through Rogers' foundational ideas—including the tendency to actualize, self-concept, and the organismic valuing process—and explain how these principles shape our understanding of children and the healing power of the therapeutic relationship. I also break down the three core conditions Rogers identified as necessary for growth: unconditional positive regard, empathy, and congruence. These are not techniques to apply—they are ways of being that must be consistently present in our relationships with children. If we want to be CCPT therapists—not just practice CCPT—we have to embody these principles in everything we do. Finally, I challenge you to consider Rogers' tenets and conditions to reflect on where you are in your own CCPT journey and how to move closer to full alignment with the model. Episode References: Rogers, C. R. (1951). Client-centered therapy: Its current practice, implications and theory. Boston, MA: Houghton Mifflin. Rogers, C. R. (1961). On becoming a person: A therapist's view of psychotherapy. Boston, MA: Houghton Mifflin. Rogers, C. R. (1980). A way of being. Boston, MA: Houghton Mifflin. Kirschenbaum, H., & Henderson, V. L. (Eds.). (1990). The Carl Rogers reader. Boston, MA: Houghton Mifflin. Thorne, B. (2003). Carl Rogers (2nd ed.). London, UK: SAGE Publications. Mearns, D., & Thorne, B. (2007). Person-centred counselling in action (3rd ed.). London, UK: SAGE Publications. Cooper, M., O'Hara, M., Schmid, P. F., & Bohart, A. C. (Eds.). (2013). The handbook of person-centered psychotherapy and counseling (2nd ed.). London, UK: Palgrave Macmillan.   CCPT Training! LIVE, APT-approved Advanced "4-Pillars" CEU Training (Reflecting Feelings, Choice-Giving, Encouragement, Limit-Setting) Series Starting Friday March 28th Through April 11th, 2025 PlayTherapyNow.com is my HUB for everything I do! playtherapynow.com. Sign up for my email newsletter, stay ahead with the latest CCPT CEU courses, personalized coaching opportunities and other opportunities you need to thrive in your CCPT practice. If you click one link in these show notes, this is the one to click! If you would like to ask me questions directly, check out www.ccptcollective.com, where I host two weekly Zoom calls filled with advanced CCPT case studies and session reviews, as well as member Q&A. You can take advantage of the two-week free trial to see if the CCPT Collective is right for you. Ask Me Questions: Call ‪(813) 812-5525‬, or email: brenna@thekidcounselor.com Brenna's CCPT Hub: https://www.playtherapynow.com CCPT Collective (online community exclusively for CCPTs): https://www.ccptcollective.com Podcast HQ: https://www.playtherapypodcast.com APT Approved Play Therapy CE courses: https://childcenteredtraining.com Twitter: @thekidcounselor https://twitter.com/thekidcounselor Facebook: https://facebook.com/playtherapypodcast Common References: Cochran, N., Nordling, W., & Cochran, J. (2010). Child-Centered Play Therapy (1st ed.). Wiley. VanFleet, R., Sywulak, A. E., & Sniscak, C. C. (2010). Child-centered play therapy. Guilford Press. Landreth, G.L. (2023). Play Therapy: The Art of the Relationship (4th ed.). Routledge. Bratton, S. C., Landreth, G. L., Kellam, T., & Blackard, S. R. (2006). Child parent relationship therapy (CPRT) treatment manual: A 10-session filial therapy model for training parents. Routledge/Taylor & Francis Group. Benedict, Helen. Themes in Play Therapy. Used with permission to Heartland Play Therapy Institute.

Apt. 5B Podcast Hosted by Kil
Apt. 5B Podcast Hosted by Kil: What 5 Verses Deserve To Be In the Smithsonian?!?!

Apt. 5B Podcast Hosted by Kil

Play Episode Listen Later Mar 10, 2025 157:01


For this ep of my podcast Apt. 5B we're chopping it up about what 5 verses deserve to be in the Smithsonian and why? Just another DOOOOOOOOOOPE ep y'all and don't forget to subscribe to our Youtube channel and check us out wherever you listen to your fave podcasts at!@Kil889www.willmakebeatsforfood.com

Security Conversations
Revisiting the Lamberts, i-Soon indictments, VMware zero-days

Security Conversations

Play Episode Listen Later Mar 8, 2025 99:32


Three Buddy Problem - Episode 37: This week, we revisit the public reporting on a US/Russia cyber stand down order, CISA declaring no change to its position on tracking Russian threats, and the high-level diplomatic optics at play. Plus, a dissection of ‘The Lamberts' APT and connections to US intelligence agencies, attribution around ‘Operation Triangulation' and the lack of recent visibility into these actors. We also discuss a fresh batch of VMware zero-days, China's i-Soon ‘hackers-for-hire' indictments, the Pangu/i-Soon connection, and a new wave of Apple threat-intel warnings about mercenary spyware infections. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday Mar 7th: Chrome vs Extensions; Kibana Update; PrePw0n3d Android TV Sticks; Identifying APTs (@sans_edu, Eric LeBlanc)

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Mar 7, 2025 13:53


Latest Google Chrome Update Encourages UBlock Origin Removal The latest update to Google Chrome not only disabled the UBlock Origin ad blocker, but also guides users to uninstall the extension instead of re-enabling it. https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html https://www.reddit.com/r/youtube/comments/1j2ec76/ublock_origin_is_gone/ Critical Kibana Update Elastic published a critical Kibana update patching a prototype polution vulnerability that would allow arbitrary code execution for users with the "Viewer" role. https://discuss.elastic.co/t/kibana-8-17-3-security-update-esa-2025-06/375441 Certified PrePw0n3d Android TV Sticks Wired is reporting of over a million Android TV sticks that were found to be pre-infected with adware https://www.wired.com/story/android-tv-streaming-boxes-china-backdoor/ SANS.edu Research Paper Advanced Persistent Threats (APTs) are among the most challenging to detect in enterprise environments, often mimicking authorized privileged access prior to their actions on objectives. https://www.sans.edu/cyber-research/identifying-advanced-persistent-threat-activity-through-threat-informed-detection-engineering-enhancing-alert-visibility-enterprises/

Sarah and Vinnie Full Show
SEG 1 Kim K Has A Giant Blowup Doll In NYC

Sarah and Vinnie Full Show

Play Episode Listen Later Mar 6, 2025 34:23


6a-7a Sarah wants to cover APT, Kim Kardashian has giant blow up doll in NYC, Dawson Creek house for sale, just the house. People say they want more privacy in public toilets and a superglue prank goes wrong for a family.

Play Therapy Podcast
Following a Child's Lead vs. Returning Responsibility: Knowing the Difference

Play Therapy Podcast

Play Episode Listen Later Mar 5, 2025 11:08 Transcription Available


In this episode, I answer a question from Sandi in Iowa about how to respond when children ask or tell us to do things in the playroom. Whether it's a power and control need, learned helplessness, or collaborative play, understanding the why behind the request is essential for responding in a way that aligns with CCPT principles. I break down when to comply (such as in power and control play), when to return responsibility (especially in cases of learned helplessness), and when it's appropriate to engage in collaboration without violating CCPT adherence. If you've ever wondered whether you should follow a child's instructions in session or redirect responsibility, this episode provides a clear framework for making those in-the-moment clinical decisions. Play Therapy Podcast Meetup - RICHMOND, VIRGINIA - March 7th, 2025 at 6:30pm RSVP here: https://www.playtherapypodcast.com/meetup LIVE, APT-approved Advanced "4-Pillars" CEU Training (Reflecting Feelings, Choice-Giving, Encouragement, Limit-Setting) Series Starting Friday March 28th Through April 11th, 2025 PlayTherapyNow.com is my HUB for everything I do! playtherapynow.com. Sign up for my email newsletter, stay ahead with the latest CCPT CEU courses, personalized coaching opportunities and other opportunities you need to thrive in your CCPT practice. If you click one link in these show notes, this is the one to click! If you would like to ask me questions directly, check out www.ccptcollective.com, where I host two weekly Zoom calls filled with advanced CCPT case studies and session reviews, as well as member Q&A. You can take advantage of the two-week free trial to see if the CCPT Collective is right for you. Ask Me Questions: Call ‪(813) 812-5525‬, or email: brenna@thekidcounselor.com Brenna's CCPT Hub: https://www.playtherapynow.com CCPT Collective (online community exclusively for CCPTs): https://www.ccptcollective.com Podcast HQ: https://www.playtherapypodcast.com APT Approved Play Therapy CE courses: https://childcenteredtraining.com Twitter: @thekidcounselor https://twitter.com/thekidcounselor Facebook: https://facebook.com/playtherapypodcast Common References: Cochran, N., Nordling, W., & Cochran, J. (2010). Child-Centered Play Therapy (1st ed.). Wiley. VanFleet, R., Sywulak, A. E., & Sniscak, C. C. (2010). Child-centered play therapy. Guilford Press. Landreth, G.L. (2023). Play Therapy: The Art of the Relationship (4th ed.). Routledge. Bratton, S. C., Landreth, G. L., Kellam, T., & Blackard, S. R. (2006). Child parent relationship therapy (CPRT) treatment manual: A 10-session filial therapy model for training parents. Routledge/Taylor & Francis Group. Benedict, Helen. Themes in Play Therapy. Used with permission to Heartland Play Therapy Institute.

Play Therapy Podcast
Room Wrecking, Risk-Taking, and Sensory-Seeking: What's Behind the Play?

Play Therapy Podcast

Play Episode Listen Later Mar 1, 2025 13:07 Transcription Available


In this episode, I answer a question from Danielle in Georgia about a six-year-old child processing grief after the loss of his father. His play includes room wrecking, risk-taking, and sensory-seeking behaviors, and Danielle wanted insight into how these might relate to his trauma. While CCPT doesn't require us to interpret play, understanding the root of behaviors can help us stay present and responsive in the playroom. I discuss how room wrecking often reflects internal chaos, risk-taking may be a form of fear-facing play or dysregulation, and sensory-seeking can serve as self-soothing in response to high anxiety. I also touch on why children experiencing emotional overwhelm often show withdrawal and disinterest in schoolwork. If you've ever worked with a grieving child and wondered how their play connects to their healing process, this episode provides practical insights while reinforcing the trust-the-process mindset of CCPT. LIVE, APT-approved Advanced "4-Pillars" CEU Training (Reflecting Feelings, Choice-Giving, Encouragement, Limit-Setting) Series Starting Friday March 28th Through April 11th, 2025 Virginia Association for Play Therapy 2025 Annual Conference March 7-8, 2025 PlayTherapyNow.com is my HUB for everything I do! playtherapynow.com. Sign up for my email newsletter, stay ahead with the latest CCPT CEU courses, personalized coaching opportunities and other opportunities you need to thrive in your CCPT practice. If you click one link in these show notes, this is the one to click! If you would like to ask me questions directly, check out www.ccptcollective.com, where I host two weekly Zoom calls filled with advanced CCPT case studies and session reviews, as well as member Q&A. You can take advantage of the two-week free trial to see if the CCPT Collective is right for you. Ask Me Questions: Call ‪(813) 812-5525‬, or email: brenna@thekidcounselor.com Brenna's CCPT Hub: https://www.playtherapynow.com CCPT Collective (online community exclusively for CCPTs): https://www.ccptcollective.com Podcast HQ: https://www.playtherapypodcast.com APT Approved Play Therapy CE courses: https://childcenteredtraining.com Twitter: @thekidcounselor https://twitter.com/thekidcounselor Facebook: https://facebook.com/playtherapypodcast Common References: Cochran, N., Nordling, W., & Cochran, J. (2010). Child-Centered Play Therapy (1st ed.). Wiley. VanFleet, R., Sywulak, A. E., & Sniscak, C. C. (2010). Child-centered play therapy. Guilford Press. Landreth, G.L. (2023). Play Therapy: The Art of the Relationship (4th ed.). Routledge. Bratton, S. C., Landreth, G. L., Kellam, T., & Blackard, S. R. (2006). Child parent relationship therapy (CPRT) treatment manual: A 10-session filial therapy model for training parents. Routledge/Taylor & Francis Group. Benedict, Helen. Themes in Play Therapy. Used with permission to Heartland Play Therapy Institute.

Sarah and Vinnie Full Show
SEG 4 The Show Is High On Sugar and Rose

Sarah and Vinnie Full Show

Play Episode Listen Later Feb 27, 2025 32:45


9a-10a Hear what happens when the show mixes sugar and APT, more on the celeb deaths, Billy McFarlane says there really are acts for Fyre 2, Shaboozey breaks another record, and it turns out Husein Bolt was fueled by chicken nuggets.

The CyberWire
From small-time scams to billion-dollar threats. [Research Saturday]

The CyberWire

Play Episode Listen Later Feb 22, 2025 27:06


This week, we are joined by Selena Larson from Proofpoint, and co-host of the "Only Malware in the Building" podcast, as she discusses the research on "Why Biasing Advanced Persistent Threats over Cybercrime is a Security Risk." The cybersecurity industry has historically prioritized Advanced Persistent Threats (APTs) from nation-state actors over cybercrime, but this distinction is outdated as cybercriminals now employ equally sophisticated tactics. Financially motivated threat actors, especially ransomware groups, have evolved to the point where they rival state-backed hackers in technical capability and impact, disrupting businesses, infrastructure, and individuals on a massive scale. To enhance security, defenders must shift focus from an APT-centric mindset to a broader approach that equally prioritizes combating cybercrime, which poses an immediate and tangible risk to global stability. The research can be found here: Why Biasing Advanced Persistent Threats over Cybercrime is a Security Risk Learn more about your ad choices. Visit megaphone.fm/adchoices

Noisy Neighbors Podcast
Manalamoush

Noisy Neighbors Podcast

Play Episode Listen Later Feb 18, 2025 72:18


Joey & Mulv reflect on Manchester City's best performance and result of the season against Newcastle.  The boys look ahead to leg 2 v Real Madrid in the UCL, and give expert opinions on APT rules.

Everything is Black and White - a Newcastle United podcast
Newcastle United transfers: Please sign up Matheus Cunha as APT ruling offers false hope of real change

Everything is Black and White - a Newcastle United podcast

Play Episode Listen Later Feb 18, 2025 60:26


Hello and welcome to The Everything is Black and White Podcast. It's time for The Mulliner and Musgrove Show. Sam and Andrew are back to talk the biggest topics in football. The pair discuss the impact of David Moyes at Everton, Liverpool's luck with decisions, why Newcastle should sign Matheus Cunha, and what does the future hold for the Toon after the latest APT ruling? *** Get your NORD VPN deal here: https://nordvpn.com/toon Learn more about your ad choices. Visit megaphone.fm/adchoices

Apt. 5B Podcast Hosted by Kil
Apt. 5B Podcast Hosted by Kil: There's A Sign On the Door No Biting Allowed!

Apt. 5B Podcast Hosted by Kil

Play Episode Listen Later Feb 17, 2025 160:09


For this ep of my podcast Apt. 5B we're chopping it up about the cardinal hip hop sin...biting! We're talking about the 1st time we heard about biting, why it was a sin back in the 80's and 90's but no so much anymore, the top 5 worse biting incidents and we look at a couple of examples of the difference between biting vs. influence! Just another DOOOOOOOOOPE ep y'all and don't forget to subscribe to our Youtube channel and check us out wherever you listen to your fave podcasts at!@Kil889www.willmakebeatsforfood.com

Oncology Brothers
How to Treat HER2+ Breast Cancer - Discussion with Dr. Sarah Sammons

Oncology Brothers

Play Episode Listen Later Feb 17, 2025 22:39


In this episode of the Oncology Brothers podcast, Drs. Rohit and Rahul Gosain welcome Dr. Sarah Sammons from Dana-Farber Cancer Institute to discuss the treatment landscape for HER2-positive breast cancer. Building on their previous discussions about triple-negative breast cancer, Drs. Gosain and Sammons dive deep into the treatment algorithms for early-stage, locally advanced, and metastatic HER2-positive breast cancer. Key topics include: •⁠  ⁠Treatment paradigms for early-stage HER2-positive breast cancer, including the APT trial and considerations for neoadjuvant therapy. •⁠  ⁠The standard of care for locally advanced disease with TCHP and managing associated toxicities. •⁠  ⁠Insights into the latest data from the PATINA trial and its implications for metastatic HER2-positive patients. •⁠  ⁠Discussion on the use of T-DXd and other treatment options in the second and third-line settings, especially for patients with brain metastases. Join us for an informative conversation filled with clinical pearls and practical insights that can help guide treatment decisions in HER2-positive breast cancer. Don't forget to like, subscribe, and check out our other episodes in the treatment algorithm series! #OncologyBrothers #HER2Positive #BreastCancer #BreastCancerTreatment #CancerPodcast #DanaFarber YouTube: https://youtu.be/_y0xSxJTptw Follow us on social media: •⁠  ⁠X/Twitter: https://twitter.com/oncbrothers •⁠  ⁠Instagram: https://www.instagram.com/oncbrothers

Sarah and Vinnie Full Show
LOST- APT Is Vinnie's Favorite

Sarah and Vinnie Full Show

Play Episode Listen Later Jan 16, 2025 14:12


5:40a Vinnie's kids have him singing APT, do you conk out after sex, and once again we learn how weird Matty is.