Automatic general-purpose device for performing arithmetic or logical operations
POPULARITY
Categories
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Detecting and Monitoring OpenClaw (clawdbot, moltbot) https://isc.sans.edu/diary.html/Detecting+and+Monitoring+OpenClaw+%28clawdbot%2C+moltbot%29/32678/#comment Synology telnetd Patch https://www.synology.com/en-us/releaseNote/DSM GlassWorm Loader Hits Open VSX via Developer Account Compromise https://socket.dev/blog/glassworm-loader-hits-open-vsx-via-suspected-developer-account-compromise
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Scanning for exposed Anthropic Models https://isc.sans.edu/diary/Scanning%20for%20exposed%20Anthropic%20Models/32674 Notepad++ Hijacked by State-Sponsored Hackers https://www.rapid7.com/blog/post/tr-chrysalis-backdoor-dive-into-lotus-blossoms-toolkit/ https://notepad-plus-plus.org/news/hijacked-incident-info-update/ Insecure Websockets in OpenClaw https://zeropath.com/blog/openclaw-clawdbot-credential-theft-vulnerability Malicious OpenClaw Skills https://www.koi.ai/blog/clawhavoc-341-malicious-clawedbot-skills-found-by-the-bot-they-were-targeting Exposed OpenClaw Instances https://censys.com/blog/openclaw-in-the-wild-mapping-the-public-exposure-of-a-viral-ai-assistant
Chapters 00:00 Caffeine Chronicles: The Morning Rituals 05:37 Chiefs, Patriots, and Super Bowl Memories 11:19 Tech Talk: The Future of Computers and AI 22:20 Conspiracy Theories: Patriots, Snow, and the NFL 27:28 Recent Internet Outages and Their Impact 30:14 The Role of AI in Modern Workplaces 32:59 AI: Benefits and Risks 34:13 The Future of AI and Human Dependency 36:18 Trivia Game with AI: A Fun Experiment 46:40 Creative Work vs. AI: The Final Thoughts
Please join my mailing list here
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Google Presentation Abuse https://isc.sans.edu/diary/Google+Presentations+Abused+for+Phishing/32668/ Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US Microsoft NTLM Strategy https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526
We talk about the 1984 book The Art of Computer Game Design by Chris Crawford. Order CMRN's book! Order here as well! Buy the shirt! Support this show on Patreon! Buy books from our Bookshop.org page! Chris Hunt created the theme song for this show.
Citty of New Britain Ransomware attack, Polland attacked by Russia via ICS. My PC will not Boot but works just fine otherwise, Can't view PDFs Windows warning, My Dell Latitude from the dumpster not working, Costco now taking RAM and Video cards out of Sample floor PCs, Old Win 7 looking to replace…need to replace. Peter Schiff asking MSTR how they are funding a 11% dividend while they are loosing so much on Bitcoin.
Frontier Fiber any good? EU is looking for “on-Prem” Data Centers vs a US Public Cloud. Open Source Excel - Libre Office, My computer upgraded itself now I need to upgrade the driver, Waymo hitting kids and other cars…., CISA defense chief “accidentally” uploaded government info into ChatGPT, Old HP Laptop updated and now my battery no longer works, How to configure OpenDNS on Win 11, iphone 11's what do I do? Iowa Sheriff costs the county $600,000.00 for defaming Red-Team hackers for doing their job.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network Google dismantled the IPIDEA network that used residential proxies to route malicious traffic. https://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-network Fake Clawdbot VS Code Extension Installs ScreenConnect RAT The news about Clawdbot (now Moltbot) is used to distribute malware, in particular malicious VS Code extensions. https://www.aikido.dev/blog/fake-clawdbot-vscode-extension-malware Threat Bulletin: Critical eScan Supply Chain Compromise Anti-virus vendor eScan was compromised, and its update servers were used to install malware on some customer systems. https://www.morphisec.com/blog/critical-escan-threat-bulletin/
Episode summary Computer-science-turned-cognitive-science researcher and yoga therapist Chen Or Bach joins Amy to share a candid journey from academia to cancer survivorship, from mat-based practice to living yoga moment-to-moment. We trace how the pañca-kośa model reframed her healing, why standards and accreditation helped yoga integrate into Israeli healthcare, and what it means to let go of familiar tools and still remain fully in the path. It's a forward-looking conversation about bringing steadiness (sthira) and sweetness (sukha) into real life—mountain trails, laundry folding, and all.Listen forNature as practice: Boulder's mountains as living teachers of stability in change.Pañca-kośa in plain life: tending annamaya, prāṇamaya, manomaya, vijñānamaya, and especially ānandamaya—not as theory but daily design.When the practice stops “working”: giving yourself permission to let go of certain tools (āsana, set routines) and allow yoga to become how you meet each moment.Healthcare integration: how Israel's modular 1,000-hour training (500 teacher + 500 therapy with specialty tracks) supported hospital uptake.Karma yoga without burnout: serving the field while protecting one's vitality (tapas with svādhyāya and īśvara-praṇidhāna—Kriyā Yoga in action).Key takeawaysĀnanda is not optional. Many of us optimize the outer layers (food, steps) and starve ānandamaya kośa. Intentionally design joy-creating activities; the outer layers flourish downstream.Your practice can change shape. If a tool stops serving, it's not failure—it's viveka (discernment). Let the aim (clarity, compassion, steadiness) stay constant while methods evolve.Standards serve people. Thoughtful accreditation isn't bureaucracy—it's ahimsā and satya for clients and health systems: clear scope, reliable skills, safer care.Karma yoga needs boundaries. Service without self-regulation fuels burnout. Pair tapas with rest, supervision, and community—abhyāsa with vairāgya.Practical micro-practices (try today)Joy audit (5 min): List three ordinary tasks. For each, name one sensory element you can savor (temperature of water while washing dishes, sound of leaves on a walk).Kośa check-in (2 min): Ask: What does my body/energy/mind/wisdom/joy need right now? Choose one small step.Walk as yoga (10–20 min): No metrics. Attend to breath cadence, ground contact, and horizon/sky—let attention, breath, and body cohere.Resources mentionedPātañjala Yoga Sūtra (as study companion during illness)Bhagavadgītā (as a source of resilience and meaning)IAYT-inspired standards and Israel's modular specialty pathways (trauma, oncology, etc.)About our guest — Chen Or Bach Chen Or Bach blends cognitive/neuroscience training with decades of yoga practice and service. In Israel, she helped advance standards that enabled yoga and yoga therapy to integrate into mainstream healthcare, including rehabilitation settings (e.g., TBI). Now based in Boulder, she continues to teach, mentor, and model a life where all life is yoga.Pull quotes“Once your attention, breath, and body are in the same place, the game changes.”“If one tool stops serving you, the tradition still has a thousand doors.”“I stopped ‘doing' yoga and started being it—moment by moment.”“Standards aren't red tape; they're how we protect people.”School of Integrative Health at NDMU: https://www.ndm.edu/academics/integrative-healthMaster of Science in Yoga Therapy at NDMU https://www.ndm.edu/academics/integrative-health/yoga-therapy Explore NDMU's Post-Master's Certificate in Therapeutic Yoga Practices, designed specifically for licensed healthcare professionals. https://www.ndm.edu/academics/integrative-health/yoga-therapy/post-masters-certificate-in-therapeutic-yoga-practices Try our Post-Bac Ayurveda Certification Program at NDMU: https://www.ndm.edu/academics/integrative-health/ayurveda/post-baccalaureate-ayurveda-certification#IntegrativeHealth #HealthcareEducation #InterprofessionalEducation #GraduateSchool #NDMUproud #SOIHproud #SOIHYoga #SOIHAyurveda #NDMUYoga #NDMUAyurveda #SOIHGraduateSchool
On this episode 191 of the Disruption Now podcast:What happens when an algorithm knows more about your health than your doctor ever will? When AI can process threats faster than any human operator? When China, Russia, Iran, and North Korea are probing our systems 24/7?Dr. Richard Harknett has spent 30+ years answering these questions at the highest levels. As the first Scholar-in-Residence at US Cyber Command and NSA, a key architect of the US Cybersecurity Strategy 2023, and Fulbright Professor in Cyber Studies at Oxford, he's one of the few people who's seen how cyber threats actually unfold—and what we're doing (or not doing) about them.In this conversation, Richard breaks down:
Computers not computing, random Steven King notes, and Spider-man shenanigans. A usual start to a usual episode! This week Matt talks World War crimes, Meghan gets real about brothels, and Zachary once again wonders if bank robbery is a good idea until he tells his story. So stick 'em up, put your headphones in, and come with us to ask.. what the f**k history? Hosted on Acast. See acast.com/privacy for more information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Odd WebLogic Request. Possible CVE-2026-21962 Exploit Attempt or AI Slop? We are seeing attempts to attack CVE-2026-21962, a recent weblog vulnerability, using a non-working AI slop exploit https://isc.sans.edu/diary/Odd%20WebLogic%20Request.%20Possible%20CVE-2026-21962%20Exploit%20Attempt%20or%20AI%20Slop%3F/32662 Fortinet Patches are Rolling Out Fortinet is starting to roll out patches for the recent SSO vulnerability https://fortiguard.fortinet.com/psirt/FG-IR-26-060 SolarWinds Web Helpdesk Vulnerability Another set of vulnerabilities in SolarWinds Web Helpdesk may result in unauthenticated system access https://horizon3.ai/attack-research/cve-2025-40551-another-solarwinds-web-help-desk-deserialization-issue/
-Scam/phishing calls and texts are rampant daily on our phones…let's bring awareness to that and give advice on how to handlethat-Also, watches and phones are important in the cold, but sometimes they act up…how can we help our Apple products stayfunctional when it gets freezing outside?Our Sponsors:* Check out Aura.com: https://aura.com/remove* Check out BetterHelp: https://www.betterhelp.com* Check out Progressive: https://www.progressive.comAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy
In this episode, the host interviews Howard Thai, a former top 50 Amazon seller and founder of the Elite Seller Society mastermind. Howard discusses how his mastermind group helps sellers solve problems, access mentorship, and gain valuable resources. He shares insights on black hat tactics in the Amazon marketplace and stresses the importance of understanding these to protect your business. Howard advises sellers to fully optimize their listings, monitor for unauthorized changes, and innovate through unique product bundles to stand out and succeed on Amazon.Chapters:Introduction to Howard Thai and His Amazon Journey (00:00:00)Host introduces Howard Thai, his Amazon success, and his background in educating Chinese sellers.Overview of the Elite Seller Society Mastermind (00:01:19)Howard explains the purpose, benefits, and unique resources of his mastermind group for Amazon sellers.Value of Mastermind Groups and Continuous Learning (00:03:16)Howard discusses attending other masterminds, the investment involved, and the importance of learning from top-tier groups.Black Hat Tactics: Stigma and Seller Concerns (00:04:22)Host and Howard address the stigma around Chinese sellers and black hat tactics on Amazon.Understanding and Defending Against Black Hat Tactics (00:04:52)Howard explains why sellers must understand black hat tactics to protect themselves and their listings.Current Black Hat Tactics and Amazon's Response (00:06:17)Howard lists active black hat tactics, notes their decline, and praises Amazon's efforts to protect sellers.Proactive Listing Protection Strategies (00:08:32)Howard details steps for sellers to proactively secure their listings, including team building and monitoring.Filling Out All Listing Fields for Security and Visibility (00:09:43)Howard explains the importance of completing all Amazon listing fields to prevent manipulation and improve searchability.Leveraging Filters and Searchability on Amazon (00:11:41)Howard highlights how properly filled fields affect product visibility in Amazon's filters and search results.Key Takeaways and Actionable Advice (00:12:52)Host summarizes three main takeaways: innovate with bundles, optimize listings, and understand black hat tactics for defense.Closing Remarks and Resources (00:15:59)Host thanks Howard, shares his website, and encourages listeners to follow his work and mastermind events.Links and Mentions:Elite Seller Society ShopifyFacebookAmazon Seller CentralTranscript:Josh 00:00:00 Without further ado, I am excited to introduce to you Howard Thai. Howard is a former top 50 seller on all of Amazon. And his origin story as a seller is an epic itself. Between selling thousands of units of hoverboards daily and battling with Amazon Incorporated on Amazon, Apple actually on Amazon. The story of his humble beginnings is a story too long to tell. He began his journey as an educator by single handedly spearheading the training of Chinese sellers on Amazon. The insights that Howard provided and the tools he developed led to what many in the United States consider the Chinese takeover of Amazon. He has saved, started, scaled and sold hundreds of businesses via Amazon and other virtual platforms. And he's done it time and time again. So welcome to the podcast, Howard. Howard, I think this is a good time to kind of talk about your mastermind. You do something with the elite seller society and you have a mastermind big, you know, kind of event that you do once a year, I believe.Josh 00:01:05 this is something that I've been very interested and I keep asking you about. I think every time I talk to you, I'm like, hey, do you have the dates? And do you know where you're going yet? So tell us more about that. And what is it all about? What content are you sharing?Howard 00:01:19 So the elite level of society is like, a mastermind that I have created. it's everyone that's been in our event, our mastermind events that gets, gets added into and, we kind of go in and help each other within our group, like how to solve problems, as well as, there's like, something that we can offer our group through, like, other mentorships or through, like, special, like things. I'm working on getting our, all our membership members. Members, that own, their own, account rep So that they don't have to go through the SAS program or SAS program. That really sucks. So they're getting like really good quality. employees and Amazon being able to support them.Howard 00:02:13 So I'm talking to Amazon on that on how we can actually make that work for our employees. So that's just something cool that I'm working with or things that things that are always open when you're in the mastermind. I like like you said, my shift change. Like you never you're in a box all the time. For most of the people that aren't in, in these mastermind I'm talking about, like, if you're even in these podcasts or in Facebook groups, you'll never get the same kind of, like information that you really could get on those different platforms than if it was in Bessemer. You probably know that, Josh. so, like, I'm just sitting there and learning and like, oh, there is this thing that out there to doing this stuff, you know, I'm not ready yet for it, but I know it's out there exists, so I need to do it. Like, for example, like, digital marketing, you know, I need to do some marketing, but I went to, I went to, custom conversion.Howard 00:03:16 I went to, a lot of, Carrie's events, like the weird events, you know, three and and even I'm thinking about getting into those two masterminds, right? One from all inside one site and also from Perry site, you know, so I'm trying to I'm looking into that. They're not cheap. They're like maybe 25,000 a year. but, yes, it's from the world, right?Josh 00:03:39 So yeah, I know that. That's great. And I agree with your statement there, Howard, in terms of, you know, the deeper tactics, if you want to go deep with stuff, you need to start reaching out and joining some of those mastermind groups. So I think it's going to take your learning to the next level. Now, Howard, you've educated a lot of Chinese sellers, right? And I think there's a negative stigma in the marketplace where it's like, oh, the Chinese sellers, they just want to implement black hat tactics, and that's who's always attacking me. you know, prior to this conversation, you and I discussed and you're like, you, you see kind of the black hat, black hat tactics kind of, you know, lessening to some extent or or another.Josh 00:04:22 But from your experience, you are so well versed on Amazon. I know a lot of sellers are fearful when it comes to black hat tactics, but would you mind kind of educating our audience in regards to what are the active black hat tactics that you see being implemented right now, and what are ways that sellers can do to protect themselves in advance, as well as what do you do if you do have a black hat tactic that actually affects you and attacks your listing?Howard 00:04:52 People think that, you know, like this stigma like, hey, you know, black hat and you do black hat, right? But the reality is, if a person has been in this industry for so long, they would need to know how to protect themselves. What kind of backpack techniques? Like what you're asking. Right. so, like, a computer security guy, right? Who does? Computer security? Needs to know how people are coming in and attacking the system. So if you're like a programmer an...
Andy Piper is a computer artist and currently Head of Communications at Mastodon. We chat about, what exactly computer art is, pen plotters, creativity, following your curiosity, paying attention and of course, building online and in-person communities. Check out Andy's work at AndyPiper.me
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Initial Stages of Romance Scams [Guest Diary] Romance scams often start with random text messages that appear to be misrouted . This guest diary by Faris Azhari is following some of the initial stages of such a scam. https://isc.sans.edu/diary/Initial%20Stages%20of%20Romance%20Scams%20%5BGuest%20Diary%5D/32650 Denial of Service Vulnerabilities in React Server Components Another folowup fix for the severe React vulnerability from last year, but now only fixing a DoS condition. https://github.com/facebook/react/security/advisories/GHSA-83fc-fqcc-2hmg OpenSSL Updates OpenSSL released its monthly updates, fixing a potential RCE. https://openssl-library.org/news/vulnerabilities/ Kubernetes Remote Code Execution Via Nodes/Proxy GET Permission Many Kubernetes Helm Charts are vulnerable to possible remote code executions due to unclear defined access controls. https://grahamhelton.com/blog/nodes-proxy-rce
Dan Nathan is joined by Steve Milunovich, a tech investor and retired sell-side analyst from Merrill Lynch. The discussion delves into the parallels between the AI boom and the dotcom era, touching on technological waves from the 1980s to the present. Milunovich highlights similarities such as early-stage winners, heavy capital expenditures, and the emergence of application layers later on. They also discuss the circular financing in the tech industry and potential risks, including heavy reliance on significant players like Nvidia and issues surrounding supply constraints. The conversation explores the broader implications of AI across various industries, including financial institutions and industrials, and considers the timeline for wider adoption and monetization of AI technologies. The dialogue is framed by historical context, with references to past tech bubbles, network effects, and the potential for new winners in unexpected sectors. Show Notes AI: The Wrong Kind of Bubble (Breadcrum.vc) Meta inks deal to pay Corning up to $6 billion for fiber-optic cables in AI data centers (CNBC) AI productivity is about to become visible and investable (FT) —FOLLOW USYouTube: @RiskReversalMediaInstagram: @riskreversalmediaTwitter: @RiskReversalLinkedIn: RiskReversal Media
Join Amigo Aaron and THE BRENT edition of the Coco Show! Today, we're looking at the newest offering from the gaming legend Nick Marentes for the TRS-80 Color Computer 3- A pinball game simply known as PINBALL! The boys know a thing or two about pinball, so it's time to put this one through it's paces! Purchase Pinball at: https://nickolasmarentes.itch.io/Support Amigathon and donate at Https://www.amigathon.comEmail: theretrorotation@gmailFacebook: Amigos Retro GamingTwitch: amigosretrogaming#trsgaming #Retrorotation#Retrocomputing
In this special episode of The Cybersecurity Defenders Podcast, a panel of cybersecurity experts discuss the irreversible changes AI has brought to the industry. This panel originally aired on January 20th, 2026.The panel attendees include:Christopher Luft (host) - Co-Founder / CCO, LimaCharlieMaxime Lamothe-Brassard - Founder / CEO, LimaCharlieEric Capuano - Co-Founder, Digital Defense InstituteJoshua Neil - Co-Founder, Alpha LevelKris Merritt - AdvisorDaniel Lees - Sr Staff Cloud Security Architect, GoogleLimaCharlie has watched the AI SOC conversation unfold and stayed quiet. Until now.Security vendors are racing to attach chatbots to legacy platforms and call it innovation. AI SOC startups have raised hundreds of millions to build better alert triage. Both approaches solve the same narrow problem: helping analysts click faster.Service providers managing hundreds or thousands of tenants face a different reality. Alert triage matters, but so does deployment, configuration, detection engineering, reporting, and onboarding. The tedious work that eats margin and slows growth spans the entire operation.What if AI could operate your entire security infrastructure with the same access as your best analyst?We built LimaCharlie for complete programmatic access from day one. we were building for AI operators before AI operators existed. On January 20th, we'll show you what happens when AI agents can do everything in a security platform, across every tenant, through natural language.No marketing theater. Just real conversations and a demonstration of AI-driven security operations where you stay in control.Learn more at https://limacharlie.io/
Come hear the new BrailleNote Evolve from HumanWare speak for itself. During this presentation, Joel Zimba and Rachel Ramos, (Product Specialists at HumanWare), will demonstrate the BrailleNote Evolve- a full-fledged Windows 11 Computer in the form factor of a convenient travel-sized note-taker. You'll hear about why the Evolve was designed, a physical description of the device, a tour of the Main Menu, the enhancements to the full-featured Microsoft Office Suite, and how Windows is taking us into the future with Braille at the center. You won't want to miss it, as this will be an info-packed session! Please register your interest and be the first to know new information about the BrailleNote Evolve when it becomes available here: https://forms.office.com/r/7FV7VAx1Zg Presenter Contact Info Joel Zimba Email: joel.zimba@humanware.com Rachel Ramos Email: rachel.ramos@humanware.com
Manas, the thinking and analytical mind, plays a crucial role in perception, cognition, and decision-making. It processes sensory input and helps interpret both internal and external experiences, such as hunger, pain, or movement. In Yoga, the practice serves as an inquiry into the nature of the mind, consciousness, and human experience. The quality of Manas, likened to a computer screen, depends on how many mental "files" are open, influenced by memory (samskaras) and habits (vasanas). Restlessness arises from fluctuating thoughts (vrittis), creating challenges in stillness. Manas influences perception, cognition and decision-making, guiding actions like setting intentions, focusing, coordinating breath, maintaining mind-body connection, and regulating emotions during yoga practice. It helps you stay present, aware of bodily sensations, and balanced in each pose, ultimately fostering a mindful, intentional practice.To read more and to practice with Zephyr Wildman, click here. To support Zephyr Yoga Podcast, donate here. Hosted on Acast. See acast.com/privacy for more information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Scanning Webserver with pwd as a Starting Path Attackers are adding the output of the pwd command to their web scans. https://isc.sans.edu/diary/x/32654 Microsoft Office Security Feature Bypass Vulnerability CVE-2026-21509 Microsoft released an out-of-band patch for Office fixing a currently exploited vulnerability. https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21509 Exposed Clawdbot Instances Many users of the AI tool clawdbot expose instances without access control. https://x.com/theonejvo/status/2015485025266098536
The cells of all living things are filled with highly detailed information. The incredible system that is used for storing this information makes our best computer information systems look like a child's simple slate board!Believe it or not, it takes more information to make a complete human being than can be stored in the average city library. And all of this information is stored in less than a few thousand millionths of a gram of material within each of our cells. You have literally billions of copies of it! Our most sophisticated computer system cannot even come close to being able to store information like that.It is estimated that one billion species of plants and animals have existed since creation. The information storage system within the cell is so compact that all of the information to make every one of those one billion species could be held in a teaspoon—with room left over to hold all the books ever written if they, too, were stored with the same efficient system. Even more amazing is that this information storage system is not only able to store information like a computer but, unlike a computer, it can also copy itself and correct errors if any creep into the information!How could anyone believe that this brilliant information storage, copying and correction system could have come about by chance? To believe that this could be created by no one is certainly an act of faith. But it is clearly the wrong faith! And that highlights what the origins debate is really all about.Exodus 15:11"'Who is like You, O LORD, among the gods? Who is like You, glorious in holiness, fearful in praises, doing wonders?'"Prayer: Father; I believe in Your forgiving grace to me in Jesus Christ. For this reason, help me to abandon all trust in myself. For Jesus' sake. Amen.Image: Plant cells under a microscope and a plant cell illustration. To support this ministry financially, visit: https://www.oneplace.com/donate/1232/29?v=20251111
Segment 1: We're All Judging You on Zoom (Let's Be Honest)Intro / SetupEveryone's been on Zoom or Microsoft Teams since COVIDEven if we don't admit it… we are judging people on virtual callsWhat People Get Judged On During Virtual CallsPoor Internet ConnectionFreezing, lagging, staticky audioPerception: “They can't even get their internet right — are they professional?”Bad Microphone EtiquetteTalking while mutedEveryone awkwardly saying, “I think you're muted”The classic: “Oh, sorry, I didn't know”Backgrounds (Real vs. Virtual)Clean, intentional backgrounds (bookshelves, studio branding) = professionalOver-the-top virtual backgrounds = suspicion“What are they hiding?”Green screen glitches, blurring when people move = distractingDistractions on CameraCats walking across the screenDogs barkingCamera cutting in and outResult: audience hears nothing you sayUnmuted ChaosSide conversationsSomeone forgetting they're on a callRadio people doing voice tracks during meetingsWhy It MattersNot about liking or disliking someoneDistractions take focus away from what you're actually sayingVisual and audio clutter = credibility lossWrap-Up / AdviceGood internet is essentialKnow how to use mute/unmuteBe intentional about your backgroundTreat virtual calls like real meetings Segment 2: “Rich Kid Stuff” That's Totally Normal NowTransitionThings we take for granted today were once considered major luxuriesEspecially noticeable across generationsMiddle-Class Luxuries From the PastHaving a Computer at HomeOnce felt like “rich kid” statusFloppy disks, typewriters before computersNow: basically required to functionDishwashersSome households never had oneOthers can't imagine life without itLong-Distance CallingCalling cardsCharges by the minuteUnlimited minutes felt revolutionaryPhysical EncyclopediasFull sets = rich and smartMassive investment, rarely usedSingle-Income HouseholdsDad working, mom at homeMuch less common todayAir ConditioningCars without A/CHouses relying on window unitsCordless PhonesHuge upgrade from wall-mounted phonesFollowed by car phones (with cords!)Water BedsUltimate flex at the timeRare nowMicrowavesOnce a big household eventNow standardFlyingUsed to be for business or wealthy travelersDressing up for flights was expectedLuxury AppliancesFridges that make ice and dispense waterNo more ice trays or tap waterCar FeaturesRoll-up windowsSunroofs as a sign of “we made it”Personal AnecdotesRenting a U-Haul with roll-up windows shocking younger generationsSunroofs feeling limo-level fancyClosing ThoughtWhat once felt extravagant is now basicMakes you wonder what today's luxuries will feel normal in 20 yearsSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Analysis of Single Sign-On Abuse on FortiOS Fortinet released an advisory. FortiOS devices are vulnerable if configured with any SAML integration, not just FortiCloud https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios Outlook OOB Update Microsoft released a non-security OOB Update for Outlook, fixing an issue introduced with this months security patches. https://support.microsoft.com/en-us/topic/january-24-2026-kb5078127-os-builds-26200-7628-and-26100-7628-out-of-band-cf5777f6-bb4e-4adb-b9cd-2b64df577491 VMware vCenter Server Vulnerabilities Exploited (CVE-2024-37079, CVE-2024-37080, CVE-2024-37081) A VMWare vCenter vulnerability patched last June is now actively exploited. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453
PAJAMA PODCAST! We're going to let the chat take the wheel, but there's a TON of news out about the raging dumpster fires our social media have become. Plus, why is Apple working on an AI pin? Let's get our tech week started off RIGHT! -- Show Notes and Links: https://somegadgetguy.com/b/4aN Support Talking Tech with SomeGadgetGuy by contributing to their tip jar: https://tips.pinecast.com/jar/talking-tech-with-somegadgetgu Find out more at https://talking-tech-with-somegadgetgu.pinecast.co This podcast is powered by Pinecast. Try Pinecast for free, forever, no credit card required. If you decide to upgrade, use coupon code r-c117ce for 40% off for 4 months, and support Talking Tech with SomeGadgetGuy.
Mike and Chad invite Norman Birge, Professor of Physics at Michigan State University, and PhD advisor to Mike, to discuss some research into developing computers that use superconducting materials. Superconducting computers would create less heat, which would be helpful for large data centers.If you haven't already, subscribe to the podcast to download the latest episodes as soon as they are available.
If you enjoy this episode, we're sure you will enjoy more content like this on The Occult Rejects. In fact, we have curated playlists on occult topics like grimoires, esoteric concepts and phenomena, occult history, analyzing true crime and cults with an occult lens, Para politics, and occultism in music. Whether you enjoy consuming your content visually or via audio, we've got you covered - and it will always be provided free of charge. So, if you enjoy what we do and want to support our work of providing accessible, free content on various platforms, please consider making a donation to the links provided below. Thank you and enjoy the episode!Links For The Occult Rejects and The Spiritual Gangsters https://linktr.ee/theoccultrejectsOccult Research Institutehttps://www.occultresearchinstitute.org/Cash Apphttps://cash.app/$theoccultrejectsVenmo@TheOccultRejectsBuy Me A Coffeebuymeacoffee.com/TheOccultRejectsPatreonhttps://www.patreon.com/TheOccultRejects
If you enjoy this episode, we're sure you will enjoy more content like this on The Occult Rejects. In fact, we have curated playlists on occult topics like grimoires, esoteric concepts and phenomena, occult history, analyzing true crime and cults with an occult lens, Para politics, and occultism in music. Whether you enjoy consuming your content visually or via audio, we've got you covered - and it will always be provided free of charge. So, if you enjoy what we do and want to support our work of providing accessible, free content on various platforms, please consider making a donation to the links provided below. Thank you and enjoy the episode!Links For The Occult Rejects and The Spiritual Gangsters https://linktr.ee/theoccultrejectsOccult Research Institutehttps://www.occultresearchinstitute.org/Cash Apphttps://cash.app/$theoccultrejectsVenmo@TheOccultRejectsBuy Me A Coffeebuymeacoffee.com/TheOccultRejectsPatreonhttps://www.patreon.com/TheOccultRejects
Dominic Williams, President & Chief Scientist of the DFINITY Foundation and CEO of Caffeine AI, explains the Internet Computer and his vision of a “sovereign cloud where AI builds the web.” He breaks down core innovations like the Network Nervous System, Motoko, and orthogonal persistence, and how AI coding could remove adoption barriers. The conversation explores unstoppable applications, real-world case studies like OpenChat, and the tension between control, security, and decentralization in AI governance. LINKS: Anthropic article on smart contracts Caffeine AI official website Internet Computer network dashboard Liquid Reign book website Sponsors: Blitzy: Blitzy is the autonomous code generation platform that ingests millions of lines of code to accelerate enterprise software development by up to 5x with premium, spec-driven output. Schedule a strategy session with their AI solutions consultants at https://blitzy.com MongoDB: Tired of database limitations and architectures that break when you scale? MongoDB is the database built for developers, by developers—ACID compliant, enterprise-ready, and fluent in AI—so you can start building faster at https://mongodb.com/build Serval: Serval uses AI-powered automations to cut IT help desk tickets by more than 50%, freeing your team from repetitive tasks like password resets and onboarding. Book your free pilot and guarantee 50% help desk automation by week four at https://serval.com/cognitive Tasklet: Tasklet is an AI agent that automates your work 24/7; just describe what you want in plain English and it gets the job done. Try it for free and use code COGREV for 50% off your first month at https://tasklet.ai CHAPTERS: (00:00) About the Episode (03:37) Origins of Internet Computer (10:09) Decentralization philosophy and AI (15:12) Tamper-proof architecture explained (Part 1) (19:43) Sponsors: Blitzy | MongoDB (22:08) Tamper-proof architecture explained (Part 2) (25:25) Network design and scaling (Part 1) (33:30) Sponsors: Serval | Tasklet (35:50) Network design and scaling (Part 2) (36:56) Replication costs and cloud (50:35) Network Nervous System governance (59:33) Caffeine, Motoko and persistence (01:20:19) Self-writing cloud disruption (01:32:30) Resilience and security guarantees (01:41:23) Use cases and limitations (01:49:56) AI misalignment and ensembles (02:00:47) Kill switches and governance (02:09:12) Future of self-writing software (02:11:40) Outro PRODUCED BY: https://aipodcast.ing
Panelists: Paul Hagstrom (hosting), Quinn Dunki, and Earl Evans Topic: 1988 In 1988, NeXT introduced its cube, bundled with Mathematica 1.0. IRC was developed. Sound Blaster changed gaming. Microsoft Office was announced. Lots of software was developed, and hardware incrementally improved. Topic/Feedback links: NeXT cube Laser 128EX/2 Mathematica Celebrating 35 Years of Mathematica (YouTube, first few sections show it in action on an SE/30) The Mathematica Story – A Scrapbook Sound Blaster (but 1990? 1989?) Microsoft Office (announced 1988, shipped 1990) IRC developed – /me likes this Apple IIc Plus – last 8-bit computer introduced by Apple? IBM PS/2 Model 70 Lemonamiga games for 1988 Retro Computing News: Video of production of new Commodore 64s in the factory Ken Shirrif repairs a Commodore PET Vintage Computer(-related) commercials: Amstrad Portable PC Microsoft Office System: It’s Showtime Retro Computing Gift Idea: Viking Electronics DLE-200B Two-Way Phone Line Simulator See also: Open House H650 Integrated Voice Networking System Auction Picks: Earl: Altos 580 Computer, Z80 system, supported multi-user MP/M, could accommodate hard drives, 4 RS232 ports See also: http://www.bitsavers.org/pdf/altos/580_Series_5/ Paul: NeXT Cube NeXT Video Cable Amstrad PPC 640 Adventure International Buckaroo Banzai Akalabeth Contributed Programs See also: Street Life (Apple II disk image) Closing notes: Ivan Loves the 80s Steve Jobs Unveils the NeXT Computer Other ways to experience this episode: a2stream file for this episode: http://lo-fi.rcrpodcast.com/rcr288.a2stream YouTube episode 288 Feedback/Discussion: feedback@rcrpodcast.com rcrpodcast@podcast.social on Mastodon rcrpodcast.com on bluesky Vintage Computer Forum RCR Podcast on Facebook Intro / Closing Song: Back to Oz by John X Listen/Download:
On tonight's show we discuss all sorts of shenanigans as usual. Owen is likely in Las Vegas for work as this show is released, so lay off me. anyway, i think this is what we talked about; Bird feeders and wet jackets sad new years Screaming children Scrap wood box All in one Kwik E mart, Pet grooming and Computer/electronics repair Floating hot tub wiener Radio Shack Weird Al Plus So much more. give us money at patreon.com/onrs heres the links: to stuff: The Oh No Radio Show | Call Live @ 407-906-6466 | Live shows every week at Twitch.tv/onrslive and facebook.com/ohnoradioshow
Michael Caron - Former PURA commissioner talks electricity! Microsoft onedrive, TPM talk, RAM Talk, Old Win 10 PC to be upgraded but…it's 7th Gen, Photographs downloads but HD is full? Should I change my email-box? Microsoft commercial for Edge directed users to Chrome!
Lexus kills your car's heater in Germany if it's idling to warm up. Microsoft outage was 10hrs! Microsoft giving up BitLocker encryption Keys to FBI, SONY getting out of TV business, Can I upgrade my PC to Win 11 so I can pay my Taxes? Am I a Verizon customer? New PC and I migrated my Files to the Cloud by accident!
This week- Nick & Roy's special guest is Dr. David Gomez, accomplished musician, conductor, academic, educator, and global classical music industry business leader. Why were boys singing soprano? Are there computers produced without internet access? Listen, laugh, and learn with Nick & Roy. Brought to you by Tom's Place in Kensington Market in Toronto. Boxing Week Sale on now!
Computer und Kommunikation (komplette Sendung) - Deutschlandfunk
Kloiber, Manfred www.deutschlandfunk.de, Computer und Kommunikation
Join Alan Perry, technology tutor and host, with Terry Sirup, Computer Tech and Store Sales Manager at Priority 1 Computers, for the latest in tech news, deals, and tips. This weekend, they'll cover the hottest mobile plans, discounts on laptops and gadgets, rising RAM and SSD prices, and major updates from Apple, Microsoft, TikTok, and OpenAI. Plus, essential advice on avoiding online scams and protecting your security and privacy.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Is AI-Generated Code Secure? Xavier used the free static code analysis tool Bandit to review code he wrote with heavy AI support. https://isc.sans.edu/diary/Is%20AI-Generated%20Code%20Secure%3F/32648 Malicious Configuration Changes On Fortinet FortiGate Devices via SSO Accounts Arctic Wolf summarized some of the attacks it is seeing against FortiGate devices via the insufficiently patched SSL vulnerability. https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-configuration-changes-fortinet-fortigate-devices-via-sso-accounts/ ISC BIND DoS vulnerability in Drone ID Records HHIT and BRID records, which are used as part of Drone ID, can be used to crash named if their length is 3 bytes. https://marlink.com/resources/knowledge-hub/isc-bind-vulnerability-discovered-and-disclosed-by-marlink-cyber/ SmarterTools SmarterMail Password Reset Vulnerability SmarterTools recently patched a trivial vulnerability in SmarterMail that would allow anybody without authentication to reset administrator passwords. https://labs.watchtowr.com/attackers-with-decompilers-strike-again-smartertools-smartermail-wt-2026-0001-auth-bypass/
The Roundtable Panel: a daily open discussion of issues in the news and beyond. Today's panelists are Professor of History and International Relations at Vassar College Robert Brigham, Tetherless World Senior Constellation Professor of Computer, Web and Cognitive Science at RPI Jim Hendler, Professor of History at CUNY John Jay College of Criminal Justice and the CUNY Graduate Center and Director of the Humanities and Justice program Allison Kavey, and Executive Director of The Legal Aid Society of Northeastern New York Nic Rangel.
Donate your RV to a great cause, Matt the Dead to Me Intern stops by for Patriots-Broncos trash talk, The Wine Yogi stops by for Valentine's Day talk & GO BRONCOS! GET STIDDY!
What are you thoughts from todays episode?
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Automatic Script Execution In Visual Studio Code Visual Studio Code will read configuration files within the source code that may lead to code execution. https://isc.sans.edu/diary/Automatic%20Script%20Execution%20In%20Visual%20Studio%20Code/32644 Cisco Unified Communications Products Remote Code Execution Vulnerability A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance could allow an unauthenticated, remote attacker to execute arbitrary commands on the underlying operating system of an affected device. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-voice-rce-mORhqY4b Zoom Vulnerability A Command Injection vulnerability in Zoom Node Multimedia Routers (MMRs) before version 5.2.1716.0 may allow a meeting participant to execute remote code on the MMR via network access. https://www.zoom.com/en/trust/security-bulletin/zsb-26001/ Possible new SSO Exploit (CVE-2025-59718) on 7.4.9 https://www.reddit.com/r/fortinet/comments/1qibdcb/possible_new_sso_exploit_cve202559718_on_749/ SANS SOC Survey The 2026 SOC Survey is open, and we need your input to create a meaningful report. Please share your experience so we can advocate for what actually works in the trenches. https://survey.sans.org/jfe/form/SV_3ViqWZgWnfQAzkO?is=socsurveystormcenter
In this episode, we discuss how artificial intelligence is increasingly blurring the line between assistance and deception, from using AI tools to troubleshoot everyday problems to the growing risks of deepfake images and AI-generated pornography. We examine questions of name, image, and likeness as property, the limits of regulation, and whether government enforcement can realistically keep pace with rapidly evolving technology. We also dive into the foolishness of the week involving the Smithsonian and renewed debates over Trump's impeachments, before turning to broader political questions about gerrymandering, census data, immigration, and representation. The conversation closes with a look at election denial, political extremism, rising distrust in institutions, and how economic anxiety continues to fuel anger and division across American society. 00:00 Introduction and Overview 00:26 Fixing a Computer with AI Assistance 02:00 Listener Calendar Story and Patreon Banter 03:52 AI, Deepfake Porn, and Image Ownership 05:14 Grok and AI Image Manipulation 08:01 AI Guardrails 10:44 Foolishness of the Week: Smithsonian and Trump's Impeachments 12:15 Trump, Impeachment, and Historical Legacy 14:54 Does Trump Care About His Legacy? 17:05 Midterm Elections and House Control 18:45 Gerrymandering, Courts, and State Power 20:15 Urban vs Rural Political Divide 22:09 Redistricting, Census Rules, and Immigration 24:25 Census Overreach and Bad Data 26:00 Political Representation and Imperfect Systems 27:52 Why America Still Attracts Immigrants 28:47 Peaceful Transfers of Power and January 6 29:53 Election Denial and Institutional Trust 33:21 Political Extremism and Rising Violence 35:01 Protests, Policing, and Fear of Government 37:57 Midterms, Election Fallout, and Political Violence 38:54 Economic Anxiety and Political Anger Learn more about your ad choices. Visit podcastchoices.com/adchoices
A routine call about a repaired computer suddenly spirals into full-blown panic. On this Jubal Phone Prank, a man is told his hard drive was “serviced”… and that extra files were added without his permission. What kind of files? That’s where things get wildly uncomfortable. As the explanation gets more detailed—and way more invasive—tensions explode, threats are made, and it feels like things might go completely off the rails. Is this a massive privacy violation… or something else entirely? Press play to hear how far this prank goes and the moment everything finally snaps into focus. The wildest, most hilarious prank call podcast from The Jubal Show! Join Jubal Fresh as he masterminds the funniest and most outrageous phone pranks, catching unsuspecting victims off guard with his quick wit, absurd scenarios, and unmatched comedic timing. Whether he's posing as an over-the-top customer service rep, a clueless boss, or an eccentric neighbor, no call is safe from his unpredictable humor. Get ready to laugh out loud and cringe in the best way possible! New episodes drop every weekday—tune in and let the prank wars begin!➡︎ Submit your Jubal Phone Prank - https://thejubalshow.com This is just a tiny piece of The Jubal Show. You can find every podcast we have, including the full show every weekday right here…➡︎ https://thejubalshow.com/podcasts The Jubal Show is everywhere, and also these places: Website ➡︎ https://thejubalshow.com Instagram ➡︎ https://instagram.com/thejubalshow X/Twitter ➡︎ https://twitter.com/thejubalshow Tiktok ➡︎ https://www.tiktok.com/@the.jubal.show Facebook ➡︎ https://facebook.com/thejubalshow YouTube ➡︎ https://www.youtube.com/@JubalFresh Support the show: https://the-jubal-show.beehiiv.com/subscribeSee omnystudio.com/listener for privacy information.
www.Patreon.com/KillTheComputer
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Add Punycode to your Threat Hunting Routine Punycode patterns in DNS queries make excellent hunting opportunities. https://isc.sans.edu/diary/Add%20Punycode%20to%20your%20Threat%20Hunting%20Routine/32640 GNU InetUtils Security Advisory: remote authentication by-pass intelnetd telnetd shipping with InetUtils suffers from a critical authentication by-pass vulnerability. https://www.openwall.com/lists/oss-security/2026/01/20/2 6-day and IP Address Certificates are Generally Available Let s Encrypt will now offer 6-day certificates as an option. These short-lived certificates can be used for IP addresses. https://letsencrypt.org/2026/01/15/6day-and-ip-general-availability Oracle Quarterly Critical Patch Update Oracle released its first quarterly patches for 2026, fixing 337 vulnerabilities https://www.oracle.com/security-alerts/cpujan2026.html#AppendixFMW
When Dr. Elizabeth Boham was diagnosed with aggressive triple negative breast cancer at just 30 -- during her medical residency, with no family history -- what she later discovered years later through functional medicine were the forces that might have led to her and countless others being susceptible to developing breast cancer. Today, with decades of regained health and of caring for patients, Dr. Boham is a wealth of knowledge, experience and practicality. We dive into small steps we can take to address some of the key drivers of breast wellness, so join us for this uplifting and empowering conversation! LET'S TALK THE WALK! Join here for support, motivation and fun! Wellness While Walking Facebook page Walking to Wellness Together Facebook GROUP Wellness While Walking on Instagram Wellness While Walking on Threads Wellness While Walking on Twitter Wellness While Walking website for show notes and other information wellnesswhilewalking@gmail.com RESOURCES AND SOURCES (some links may be affiliate links) DR. ELIZABETH BOHAM, MD MS RD, IFMCP Breast Wellness: Tools to Prevent and Heal From Breast Cancer Kindle edition Paperback edition Dr. Boham's 15 Tips for Breast Wellness Dr. Boham's Website Dr. Boham on Instagram The UltraWellness Center, Lenox, MA (Caring for patients worldwide) Main Page About the Team, Including Medical Director Dr. Elizabeth Boham Clinical Approach How to Work with The UltraWellness Center HEALTH COACH CAROLYN Get on the waitlist for the first Lifestyle Change Workshop of 2026: Email wellnesswhilewalking@gmail.com with your interest (but no obligation)! Details to follow Past Wellness While Walking Episodes with Dr. Boham Ep. 32: Reducing Inflammation for Optimal Health Ep. 33: Food as Medicine, Gratitude, Movement + More HOW TO RATE AND REVIEW WELLNESS WHILE WALKING How to Leave a Review on Apple Podcasts on Your iOS Device 1. Open Apple Podcast App (purple app icon that says Podcasts). 2. Go to the icons at the bottom of the screen and choose "search" 3. Search for "Wellness While Walking" 4. Click on the SHOW, not the episode. 5. Scroll all the way down to "Ratings and Reviews" section 6. Click on "Write a Review" (if you don't see that option, click on "See All" first) 7. Then you will be able to rate the show on a five-star scale (5 is highest rating) and write a review! 8. Thank you! I so appreciate this! How to Leave a Review on Apple Podcasts on a Computer 1. Visit Wellness While Walking page on Apple Podcasts in your web browser (search for Apple Podcasts or click here) https://www.apple.com/apple-podcasts/ 2. Click on "Listen on Apple Podcasts" or "Open the App" 3. This will open Apple Podcasts and put in search bar at top left "Wellness While Walking" 4. This should bring you to the show, not a particular episode – click on the show's artwork 5. Scroll down until you see "Rating and Reviews" 6. Click on "See All" all the way to the right, near the Ratings and Review Section and its bar chart 7. To leave a written review, please click on "Write a Review" 8. You'll be able to leave a review, along with a title for it, plus you'll be able to rate the show on the 5-star scale (with 5 being the highest rating) 9. Thank you so very much!! OTHER APPS WHERE RATINGS OR REVIEWS ARE POSSIBLE Spotify Goodpods Overcast (if you star certain episodes, or every one, that will help others find the show) Castbox Podcast Addict Podchaser Podbean HOW TO SHARE WELLNESS WHILE WALKING Tell a friend or family member about Wellness While Walking, maybe while you're walking together or lamenting not feeling 100% Follow up with a quick text with more info, as noted below! (My favorite is pod.link/walking because it works with all the apps!) Screenshot a favorite episode playing on your phone and share to social media or to a friend via text or email! Wellness While Walking on Apple – click the up arrow to share with a friend via text or email, or share to social media Wellness While Walking on Spotify -- click the up arrow to share with a friend via text or email, or share to social media Use this universal link for any podcast app: pod.link/walking – give it to friends or share on social media Tell your pal about the Wellness While Walking website Thanks for listening and now for sharing! : ) DISCLAIMER Neither I nor many of my podcast guests are doctors or healthcare professionals of any kind, and nothing on this podcast or associated content should be considered medical advice. The information provided by Wellness While Walking Podcast and associated material, by Whole Life Workshop and by Bermuda Road Wellness LLC is for informational and entertainment purposes only. It is not intended to be a substitute for professional medical advice, diagnosis or treatment. Always seek the advice of your physician or other qualified health care provider with any questions you may have regarding a medical condition or treatment, and before undertaking a new health care regimen, including walking. Thanks for listening to Wellness While Walking, a walking podcast and a "best podcast for walking"!
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
"How many states are there in the United States?" Attackers are actively scanning for LLMs, fingerprinting them using the query How many states are there in the United States? . https://isc.sans.edu/diary/%22How%20many%20states%20are%20there%20in%20the%20United%20States%3F%22/32618 Closing the Door on Net-NTLMv1: Releasing Rainbow Tables to Accelerate Protocol Deprecation Mandiant is publicly releasing a comprehensive dataset of Net-NTLMv1 rainbow tables to underscore the urgency of migrating away from this outdated protocol. https://cloud.google.com/blog/topics/threat-intelligence/net-ntlmv1-deprecation-rainbow-tables Out-of-band update to address issues observed with the January 2026 Windows security update Microsoft has identified issues upon installing the January 2026 Windows security update. To address these issues, an out-of-band (OOB) update was released today, January 17, 2026 https://learn.microsoft.com/en-us/windows/release-health/windows-message-center
Please enjoy this encore of Career Notes. Deepen Desai, Global Chief Information Security Officer at Zscaler, shares his story as a doctor that treats computer viruses. He describes how he got into the security field and his work with Zscaler. He says what it's like learning and growing in this field and shares great advice for people who are up and coming in the field. Deepen describes working with an incredible team and how much joy it brings him to see his team learning and growing beyond their roles working with him. He says he want's to be remembered as a mentor among his colleagues. He says "I still remember my first team that I built, 15 years ago. Most of those guys are leading key technologies at many of the major security vendors, and some of them are still with me." We thank Deepen for sharing his story. Learn more about your ad choices. Visit megaphone.fm/adchoices