Podcasts about dns

Hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network

  • 1,617PODCASTS
  • 4,734EPISODES
  • 43mAVG DURATION
  • 1DAILY NEW EPISODE
  • Aug 18, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about dns

Show all podcasts related to dns

Latest podcast episodes about dns

Think BIG Bodybuilding
Drugs n Stuff 277 Evolution of Old School Steroid Cycles

Think BIG Bodybuilding

Play Episode Listen Later Aug 18, 2025 77:58


DNS 277 Dave Crosland & Scott McNally 2:45 The Evolution of Old School Cycles 19:00 Do you want a Superdrol Breakdown again? 20:40 Risk of infection from L-Carnitine 23:20 Training hard without joint issues as you age 29:46 Short 4 wk, low dose cycles with 4 wks TRT between 33:00 Cycle Planning for older guy 34:45 Getting stronger but not growing 39:20 3 wks off cycle and missing the pumps 44:00 Anadrol for a Sprinter ? 46:00 Scott's Client dieted on TRT with 3 wks Winny 48:50 Teenage gyno but no sensitivity as an adult 52:30 Uncle Dave's Wisdom - Controlling Tempter 58:30 Picking up girls, uncle Dave style 1:02:00 Struggle Balancing bodybuilding and life ✅ ✅ Modern Aminos New Peptide and Research Chem Affiliate : https://tinyurl.com/y4nts94n ✅ ✅Code THINKBIG ✅ Parabolic Peptides Great Research Tabs and Peps https://tinyurl.com/ycpnbjzd ✅ ✅Code THINK ✅ ✅SomaChems https://somachems.com ✅ ✅Code THINK

Packet Pushers - Full Podcast Feed
IPB181: Answering Your IPv6 Questions

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Aug 14, 2025 25:46


You’ve sent in questions and on today’s IPv6 Buzz episode Ed, Nick, and Tom answer them. Questions include using DHCPv6 versus SLAAC in a home network, IPv6 and email services, a NAT66 recap, and more. Stay tuned for full episodes coming up that cover Path MTU discovery and IPv6 and containers.  Episode Links: Google IPv6... Read more »

Comfort Zone
I'd Like to Sell You a Big Ball

Comfort Zone

Play Episode Listen Later Aug 14, 2025 68:48


Matt wonders why there are so many face computers, Niléane has an awesome podcast app update, and Chris figures out which of two compelling pitches he gets to buy. How would you have done our challenges? How would you answer the question at the end of the show? Let us know! Main Topics Meta Ray-Bans Castro Other stuff Adam's HTTP, DNS, and SMTP stickers Meta Reality Labs is losing tons of money Eve Flare…aka the big ball Nomad Slim Wallet Nomadic wallet Follow the Hosts Chris on YouTube Matt on Birchtree Niléane on Mastodon Comfort Zone on Mastodon Comfort Zone on Bluesky

XenTegra XenCast
Quantum-Ready Security with Citrix NetScaler: Protecting Data Today and Tomorrow

XenTegra XenCast

Play Episode Listen Later Aug 12, 2025 37:40 Transcription Available


In Episode 185 of The Citrix Session, Andy Whiteside, Bill Sutton, and Todd Smith explore how Citrix NetScaler is evolving into a true Swiss Army knife for security—delivering protection not just for Citrix workloads, but for all applications. The conversation dives into the looming challenge of quantum computing and the “harvest now, decrypt later” threat, where bad actors collect encrypted data today to exploit when quantum capabilities emerge.Todd and Bill unpack how NetScaler is leading the way with post-quantum cryptography (PQC) readiness, new encryption standards aligned with NIST guidelines, and GA support for quantum-resistant algorithms. They also cover key advancements like HTTP/3 over QUIC, enhanced DNS security, reCAPTCHA v3 integration, and the Netscaler Console for fleet-wide visibility, compliance, and automation.Whether you're concerned about securing sensitive data, meeting future compliance requirements, or leveraging cutting-edge application firewall capabilities, this episode will help you understand why now—not later—is the time to prepare for the quantum era.

Packet Pushers - Full Podcast Feed
NB538: AI Copilot To Help Steer HPE SASE; SoftBank Will Test 5G Airships

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Aug 11, 2025 57:56


Take a Network Break! We start with follow-up on post-quantum support in firewalls and DPDK, then highlight a command injection vulnerability in Ruckus SmartZone software. In tech news, Broadcom rolls out the Jericho4 ASIC to help scale AI across multiple data centers, InfoBlox beefs up DNS protection to spot malicious domains faster, and HPE announces... Read more »

Packet Pushers - Network Break
NB538: AI Copilot To Help Steer HPE SASE; SoftBank Will Test 5G Airships

Packet Pushers - Network Break

Play Episode Listen Later Aug 11, 2025 57:56


Take a Network Break! We start with follow-up on post-quantum support in firewalls and DPDK, then highlight a command injection vulnerability in Ruckus SmartZone software. In tech news, Broadcom rolls out the Jericho4 ASIC to help scale AI across multiple data centers, InfoBlox beefs up DNS protection to spot malicious domains faster, and HPE announces... Read more »

Packet Pushers - Fat Pipe
NB538: AI Copilot To Help Steer HPE SASE; SoftBank Will Test 5G Airships

Packet Pushers - Fat Pipe

Play Episode Listen Later Aug 11, 2025 57:56


Take a Network Break! We start with follow-up on post-quantum support in firewalls and DPDK, then highlight a command injection vulnerability in Ruckus SmartZone software. In tech news, Broadcom rolls out the Jericho4 ASIC to help scale AI across multiple data centers, InfoBlox beefs up DNS protection to spot malicious domains faster, and HPE announces... Read more »

The PowerShell Podcast
PSStucco, Accessibility, and the Power of Templating in PowerShell with Gilbert Sanchez & Jake Hildreth

The PowerShell Podcast

Play Episode Listen Later Aug 11, 2025 33:38


In this high-energy episode, returning guests Gilbert Sanchez and Jake Hildreth join Andrew for a deep dive into: Module templating with PSStucco Building for accessibility in PowerShell Creating open source GitHub orgs like PSInclusive How PowerShell can lead to learning modern dev workflows like GitHub Actions and CI/CD What begins with a conversation about a live demo gone hilariously sideways turns into an insightful exploration of how PowerShell acts as a launchpad into bigger ecosystems like GitHub, YAML, JSON, and continuous integration pipelines.Bios &   Bios: Gilbert Sanchez is a Staff Software Development Engineer at Tesla, specifically working on PowerShell. Formerly known as "Señor Systems Engineer" at Meta. A loud advocate for DEI, DevEx, DevOps, and TDD.   Jake Hildreth is a Principal Security Consultant at Semperis, Microsoft MVP, and longtime builder of tools that make identity security suck a little less. With nearly 25 years in IT (and the battle scars to prove it), he specializes in helping orgs secure Active Directory and survive the baroque disaster that is Active Directory Certificate Services. He's the creator of Locksmith, BlueTuxedo, and PowerPUG!, open-source tools built to make life easier for overworked identity admins. When he's not untangling Kerberos or wrangling DNS, he's usually hanging out with his favorite people and most grounding reality check: his wife and daughter.   Links https://gilbertsanchez.com/posts/stucco-create-powershell-module/ https://jakehildreth.github.io/blog/2025/07/02/PowerShell-Module-Scaffolding-with-PSStucco.html https://github.com/PSInclusive https://jakehildreth.com/ https://andrewpla.tech/links https://discord.gg/pdq https://pdq.com/podcast https://youtu.be/w-z2-0ii96Y  

We Don't PLAY
How Do I Know If My Website Is Penalized by Google & Search Engines? (Website Health & Technical SEO Masterclass with Favour Obasi-Ike)

We Don't PLAY

Play Episode Listen Later Aug 10, 2025 105:57


How Do I Know If My Website Is Penalized by Google? Website Health & Technical SEO Masterclass with SEO Expert, ⁠Favour Obasi-ike, MBA, MS⁠⁠⁠ | Get exclusive SEO newsletters in your inbox.This extensive SEO audio provides an in-depth discussion on technical SEO and how businesses can identify and address Google penalties impacting their websites. Favour uses analogies like a car's engine or a leaking roof to explain complex concepts, emphasizing that a penalty often signals a need for correction and improvement, not failure. Key areas covered include website structure, content quality (thin vs. thick content), proper use of tags and categories, image optimization, video embedding, and leveraging Google Search Console for diagnostics. The conversation also touches on the distinction between manual and algorithmic penalties and offers practical advice, such as using search operators, to check website visibility and performance.Frequently Asked Questions1. How can I tell if Google has penalized my website, and what does it mean?Google penalizes websites when they violate webmaster guidelines, often due to issues with content quality, relevance, or technical structure. A penalty means your site's search ranking is negatively affected, leading to reduced visibility and traffic. While a penalty might seem negative, it's actually an opportunity for correction and improvement, indicating that your site is at least visible enough for Google to notice. You might receive email notifications from Google, or you can check your Google Search Console for specific error messages and performance insights.2. What are the two main types of Google penalties, and how do they differ?There are two primary types of Google penalties:Manual Penalty: This occurs when a human reviewer from Google's web spam team flags your website for violating guidelines, often due to manipulative practices like spammy or hidden links ("black hat SEO"). These are rare but indicate a severe violation.Algorithmic Penalty: This is far more common and happens automatically due to issues detected by Google's algorithms. Reasons can include outdated or "thin" content, low quality or irrelevant information, generic AI-generated content, unnatural links, or regurgitated content. These penalties lead to automatic demotion or removal from search results.3. How does "thin content" contribute to Google penalties, and what makes content "thick"?"Thin content" refers to web pages that lack depth, context, or comprehensive information on a given topic. It's often characterized by a low word count, insufficient detail, and a lack of supporting elements. Google measures articles by reading time, word count, and character count. If your content is significantly shorter than the industry average for a similar topic (e.g., 300 words vs. 3,000 words), it's considered thin and unlikely to outrank competitors."Thick content," conversely, is rich in information and provides a thorough exploration of a topic. To create thick content, you should:Expand on topics: Go beyond basic definitions, offering more context and depth.Include various elements: Incorporate images (optimized for size), embedded videos (not uploaded), audio clips, statistics, examples, comparison charts, quotes, listicles, proper formatting (headings, links), and frequently asked questions (FAQs).Answer user intent: Ensure your content directly addresses the questions and needs of your target audience.4. Why is connecting my website to Google Search Console crucial for identifying and resolving penalties?Google Search Console (GSC) is the primary tool Google provides for website owners to monitor their site's performance in search results and identify issues. Connecting your website to GSC is the first essential step because it allows Google to communicate error messages and indexing problems directly to you. Within GSC, you can view performance insights, check the "Pages" section under "Indexing" to see which pages are known, submitted, or unsubmitted, and understand why certain pages might not be indexed. This diagnostic information is vital for understanding the root causes of any penalties and guiding your corrective actions.5. What are common technical SEO issues that can lead to Google penalties, beyond content quality?Technical SEO issues relate to the structural and operational aspects of your website that affect how search engines crawl and index it. Common problems include:Website size and image optimization: Large file sizes, especially for images and uploaded videos, can slow down your website, leading to a poor user experience and penalties. Use compression tools (e.g., compressor.io) for images and embed videos instead of uploading them.Broken or inaccessible links: Ensure all links within your sitemap and across your site are functional and lead to valid destinations.Incorrect robots.txt or "no index" tags: The robots.txt file and "no index" meta tags tell search engine robots which pages to crawl or not to crawl. Accidentally blocking important pages (a common default issue with platforms like Wix for blog tags) can prevent Google from indexing your content.Outdated website structure: An inefficient or poorly organized website structure can hinder crawlability and overall performance.Slow loading times: Directly linked to website size and optimization, slow loading speeds can negatively impact user experience and search rankings.6. What's the recommended first step for a business owner who suspects their website is penalized by Google?The immediate first step is to connect your website to Google Search Console (GSC) if you haven't already.Go to google.com and search for "Google Search Console."Click on the official Google Search Console Tools link.Click "Start Now."If your site isn't connected, GSC will provide a unique verification code (often a TXT record).Go to your domain name server (DNS) settings within your website hosting provider's control panel.Add the provided TXT record to your DNS settings.Return to GSC and click "Verify."A green bar indicates successful connection. Once connected, GSC will begin providing insights into your site's performance, indexing status, and any specific error messages or penalty notifications, allowing you to diagnose and address issues effectively.Digital Marketing SEO Resources:>> ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Join our exclusive SEO Marketing community⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠>> ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEO Optimization Blogs⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠>> ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Book Complimentary SEO Discovery Call⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠>> ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Subscribe to We Don't PLAY Podcast⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Brands We Love and Support⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Loving Me Beauty | Buy Vegan-based Luxury Products⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Unlock your future in real estate—get certified in Ghana today!⁠See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

We Don't PLAY
What's the Fastest Way to Get Webpages Indexed (Technical SEO) by Search Engines? (SEO Masterclass with Favour Obasi-ike)

We Don't PLAY

Play Episode Listen Later Aug 9, 2025 63:08


What's the Fastest Way to Get Webpages Indexed (Technical SEO) by Search Engines? with SEO Expert, ⁠Favour Obasi-ike, MBA, MS⁠⁠⁠ | Get exclusive SEO newsletters in your inbox.This episode focuses on search engine optimization (SEO) and the fastest ways to get indexed by search engines, extending beyond just Google to include other platforms and AI-powered large language models (LLMs) like ChatGPT emphasizing that building trust with search engine algorithms is paramount, achieved through consistent content creation, linking strategies (backlinks), and connecting websites via tools like Google Search Console. Favour highlights the importance of updating existing content and addressing user queries to improve visibility across various search and AI platforms, ultimately advocating for a strategic and patient approach to online presence rather than solely focusing on a single ranking metric.AD BREAK: Get 20% off your first booking & be the first to know about our new arrivals, spa deals, and events with Somatic MassageFrequently Asked Questions about Search Engine Indexing and Online PresenceWhat is the fastest way to get indexed by search engines?The fastest way to get indexed by search engines is by building trust and establishing connections. This means having conversations around the questions people are asking and providing answers in the form of website links. These links should then be shared on other reputable websites to create backlinks, which signal to search engines that your website has authority. It's not just about creating a lot of content, but about creating relevant, high-quality content that answers user queries and is linked to by trusted sources.Why isn't my website ranking on search engines?There are several reasons why your website might not be ranking. Common issues include not having your website manually indexed or automatically discovered by search engines, or not being connected to Google Search Console. Additionally, your content might not be seen if it's not frequently updated, as AI servers and search engines prioritize recently modified content. A lack of engagement and underutilization of your website compared to time spent on social media can also hinder its visibility. Essentially, if search engines aren't "seeing" your content, they can't recommend it.How long does it take for SEO efforts to show results?Ranking SEO web pages on Google and other search engines takes time and consistency. While immediate indexing can occur within hours or days for consistent posters, significant milestones, such as receiving your first 10 clicks, can take around six months, even with hundreds of articles. The key is consistent effort, building trust with algorithms, and maintaining an active online presence. The compound effect of consistent content creation can lead to substantial impressions over time.How does trust factor into search engine ranking?Trust is paramount for search engine ranking. Just as in human relationships, search engines, particularly Google, rely on trust to refer content. This trust is established when other third-party websites, which Google already trusts, link to your website, thereby vouching for your site's authority. These "off-page SEO referring domains" (like links on Reddit, Trustpilot, LinkedIn, Pinterest) may have varying impact, but they contribute to your credibility and signal to search engines that your content is valuable and reliable.Is traditional SEO still relevant with the rise of AI and Large Language Models (LLMs) like ChatGPT?Yes, traditional SEO is still very relevant and, in fact, synergistic with AI and LLMs. While AI provides generative answers, it often sources its information from traditional search engines like Google. Therefore, optimizing your content for Google through good SEO practices (like answering frequently asked questions, using appropriate keywords, and having a well-structured site map) directly contributes to your brand being cited and mentioned in AI-generated responses. AI and SEO are not competing but are interdependent, with AI leveraging the foundation built by strong SEO.How can I optimize my content for AI search engines?To optimize for AI search engines, focus on providing succinct, evidence-based answers to specific, question-based headings, similar to "People Also Ask" sections on Google. Ensure your content is frequently updated ("last modified" date is recent) as AI prioritizes fresh information. AI servers are looking for up-to-date, relevant context. By consistently creating and updating content that answers user queries and by connecting your website to search engines via tools like Google Search Console, you increase the likelihood of being sourced and mentioned by AI.What is the significance of a "sitemap" and "DNS" in getting indexed?A sitemap acts as a map of your website, providing search engines with a structured list of all your pages, products, and blogs. Submitting an updated sitemap is crucial for search engines to crawl and understand your site's content. DNS (Domain Name Server) is like your unique digital DNA for your website, confirming your ownership of the domain. Connecting your DNS record with a unique identification number (like a TXT record from Google Search Console) gives search engines access to your site's architecture, allowing them to effectively read and index your content.What is the difference between manual and auto-indexing, and how do they impact visibility?Manual indexing involves actively submitting your website or specific pages to search engines (e.g., through Google Search Console) to ensure they are discovered. Auto-indexing refers to the automatic discovery and crawling of your site by search engines over time due to consistent activity and established trust. While manual indexing provides an initial push, consistent content creation and updates increase your "crawl budget," leading to higher priority and more frequent auto-indexing. Both are important; consistent manual effort eventually leads to more efficient auto-indexing and better long-term visibility.Digital Marketing Resources:>> ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Join our exclusive SEO Marketing community⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠>> ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠SEO Optimization Blogs⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠>> ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Book Complimentary SEO Discovery Call⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠>> ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Subscribe to We Don't PLAY Podcast⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Brands We Love and Support⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Loving Me Beauty | Buy Vegan-based Luxury Products⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Unlock your future in real estate—get certified in Ghana today!⁠See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

The Daily Quiz Show
Science and Nature | In medical terms, what is the name of a condition in which a blood vessel gets blocked by an air bubble moving through the bloodstream? (+ 7 more...)

The Daily Quiz Show

Play Episode Listen Later Aug 9, 2025 8:06


The Daily Quiz - Science and Nature Today's Questions: Question 1: In medical terms, what is the name of a condition in which a blood vessel gets blocked by an air bubble moving through the bloodstream? Question 2: An animal is a fish if it has what? Question 3: What is Allergology the study of? Question 4: In computer networking, what does DNS stand for? Question 5: Which of these medical terms comes from an Ancient Greek word meaning "without sensation"? Question 6: What name is given to animals which only eat plants? Question 7: Excluding humans, what is the longest living land mammal? Question 8: A male chicken is known as what? This podcast is produced by Klassic Studios Learn more about your ad choices. Visit megaphone.fm/adchoices

Reimagining Cyber
The Cyber Threat Blind Spot: Domain Risk

Reimagining Cyber

Play Episode Listen Later Aug 6, 2025 18:55


In this episode of Reimagining Cyber, host Rob Aragao sits down with cybersecurity executive and domain security expert Ihab Shraim to spotlight one of the most overlooked yet critical areas of cyber risk—fraudulent domain registrations and DNS hijacking. As the digital attack surface expands, bad actors are exploiting unmonitored domain portfolios and exposed DNS infrastructure to launch phishing campaigns, malware distribution, and business email compromise—all while flying under the radar of traditional security tools.Ihab explains why domain risk is a foundational weakness in many organizations' security postures and argues that without domain security, cybersecurity is incomplete. From shadow IT and orphaned domains to poor DNS hygiene and lack of domain portfolio governance, Ihab outlines the blind spots that make companies vulnerable—and provides actionable strategies CISOs and security leaders must adopt to regain control.Whether you're managing brand reputation, protecting customer trust, or looking to tighten your security fundamentals, this episode delivers an eye-opening exploration into why domain risk needs to be a board-level conversation.Key Takeaways:Why domain name portfolios are a high ROI target for cybercriminalsThe dangers of DNS exposure and subdomain hijackingHow social media abuse and unauthorized resellers magnify brand riskWhy domain monitoring, locking, and defensive registrations are essentialThe case for making CISOs accountable for domain strategy and protectionFollow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.

PolySécure Podcast
Spécial - Gérer le bruit dans la détection d'événements de cybersécurité à la grandeur du Canada - Parce que... c'est l'épisode 0x616!

PolySécure Podcast

Play Episode Listen Later Aug 6, 2025 32:03


Parce que… c'est l'épisode 0x616! Shameless plug 12 au 17 octobre 2025 - Objective by the sea v8 10 au 12 novembre 2025 - IAQ - Le Rendez-vous IA Québec 17 au 20 novembre 2025 - European Cyber Week 25 et 26 février 2026 - SéQCure 2065 Description Introduction et contexte Joey D., superviseur d'une équipe de détection au Centre canadien pour la cybersécurité du gouvernement fédéral, présente les défis majeurs auxquels fait face son organisation dans la gestion de la cybersécurité à l'échelle nationale. Lors de sa présentation à NorthSec, il a abordé un problème critique : la pollution causée par le bruit dans les systèmes de détection. Le défi du volume de données Le centre canadien traite un volume impressionnant de données : plus de 200 000 événements par seconde provenant de 167 clients (et plus), couvrant l'ensemble du territoire canadien. Cette télémétrie massive est corrélée avec un grand volume d'indicateurs de compromission provenant de diverses sources et partenariats internationaux. Si cette richesse d'informations constitue un atout considérable, elle génère également un défi majeur : le bruit. La combinaison de ces deux éléments - volume important de télémétrie et grand nombre d'indicateurs - crée une pollution informationnelle qui peut submerger les analystes. Les faux positifs et les mauvaises détections prolifèrent, risquant de masquer de véritables menaces ou de mobiliser inutilement les ressources d'analyse. L'approche de filtrage intelligent Pour résoudre ce problème, Joey et son équipe ont développé une approche basée sur l'identification et la caractérisation de ce qui est “non malicieux”. Plutôt que de simplement bloquer automatiquement les alertes, ils créent des filtres informatifs qui aident les analystes dans leur processus de triage. Cette méthode permet d'éviter les faux négatifs, où un véritable compromis pourrait être filtré par erreur. L'équipe préfère maintenir un niveau de prudence élevé. Comme l'explique Joey : “À un moment donné, nous, on n'aime pas prendre ce risque-là de manquer un vrai événement de compromission.” Les filtres automatisés sont donc principalement informatifs, bien que certains, lorsque l'équipe a une confiance élevée, puissent déclencher des actions automatisées. Le cas des administrateurs créatifs Un exemple particulièrement intéressant concerne les administrateurs système. Ces professionnels, dotés de privilèges élevés sur les réseaux, font parfois preuve d'une créativité remarquable dans l'accomplissement de leur travail. Ils peuvent utiliser des outils ou des techniques habituellement associés à des acteurs malveillants, mais dans un contexte parfaitement légitime. Cette créativité administrative pose un défi constant : comment distinguer une technique légitime d'une utilisation malveillante ? L'équipe de Joey a développé plusieurs approches pour gérer ce problème, allant de filtres très spécifiques (par exemple, tel script exécuté par tel utilisateur à telle heure) à des filtres plus génériques basés sur la compréhension des technologies. L'étude du système Delivery Optimization Joey a mené une étude approfondie du système Delivery Optimization de Microsoft, un service de partage de fichiers présent par défaut sur tous les appareils Windows depuis Windows 10. Ce système permet d'accélérer les mises à jour en utilisant un mécanisme de peer-to-peer au sein du réseau local, réduisant ainsi la bande passante utilisée vers les serveurs Microsoft. Le problème survient lorsque ce système est configuré pour partager avec des machines sur Internet plutôt que seulement sur le réseau local. Dans un contexte de télétravail, cela peut créer des connexions vers des adresses IP dans différents pays, générant des alertes suspectes pour les analystes qui voient des transferts de données importants vers des destinations potentiellement douteuses. Cette recherche illustre parfaitement l'importance de comprendre le fonctionnement normal des systèmes pour mieux détecter les anomalies. Comme le souligne Joey, peu de chercheurs en sécurité s'intéressent à ces mécanismes non malveillants, créant un angle mort dans la détection. La corrélation multi-sources Une des forces du système développé par l'équipe réside dans sa capacité à corréler différents types de télémétrie. En combinant les données réseau (NetFlow, captures de paquets) avec les données d'endpoints (EDR), ils peuvent obtenir un contexte beaucoup plus riche pour leurs analyses. Par exemple, dans le cas des “fake captchas” - ces pages web malveillantes qui demandent aux utilisateurs d'exécuter des commandes via Windows+R et Ctrl+V - la corrélation permet de faire la distinction entre une simple visite du domaine malveillant (comportement normal) et l'exécution effective de la chaîne de processus malveillante (comportement à investiguer). L'architecture de détection à plusieurs niveaux Le système développé par l'équipe fonctionne selon une architecture sophistiquée à plusieurs niveaux. Au niveau le plus bas, on trouve les “hits” - des événements détectés qui ne nécessitent pas nécessairement l'intervention humaine. Par exemple, l'exécution de la commande “ping” génère un hit, mais celui-ci n'est traité que par des algorithmes. Ces hits peuvent être “promus” en alertes lorsque des algorithmes détectent des patterns suspects - par exemple, une séquence ping-ping-ping suivie de “whoami”. À l'inverse, certaines détections génèrent directement des alertes en raison de leur gravité (comme PowerShell téléchargeant du contenu depuis Internet après l'ouverture d'un document Word). Le système inclut également des algorithmes de “démotion” qui peuvent reclasser une alerte en hit lorsqu'il s'avère qu'elle correspond à un comportement légitime d'un administrateur système connu. L'intégration des indicateurs de compromission L'intégration des feeds de threat intelligence (comme MISP) représente un défi particulier. Ces indicateurs, souvent rudimentaires, nécessitent un travail important de contextualisation. Plusieurs équipes au Centre Canadien pour la cybersécurité ajoutent systématiquement du contexte lors de l'ingestion : si un fournisseur ne livre que des adresses IP mais que tous ses indicateurs concernent des botnets, cette information contextuelle est ajoutée automatiquement. Cette approche permet aux analystes de disposer du contexte nécessaire dès le moment du triage, améliorant significativement l'efficacité du processus d'analyse. Les défis de la contextualisation La contextualisation des indicateurs présente plusieurs difficultés. Les concepts peuvent être contradictoires entre différentes sources, la temporalité joue un rôle crucial (un indicateur valide il y a deux semaines peut ne plus l'être aujourd'hui), et la géolocalisation peut être trompeuse, notamment lorsque des acteurs malveillants utilisent des routeurs compromis pour masquer leur origine réelle. L'équipe doit constamment évaluer son appétit au risque pour déterminer quels indicateurs méritent une investigation et lesquels peuvent être filtrés sans risque. Les bénéfices pour les citoyens Au-delà de la protection des infrastructures gouvernementales, le travail de l'équipe de Joey bénéficie directement aux citoyens canadiens. Grâce à un partenariat avec CIRA (l'organisme responsable du domaine .ca), les indicateurs de compromission identifiés par le centre sont intégrés au service Canadian Shield. Ce service DNS gratuit permet à tout citoyen de bénéficier de cette protection en configurant simplement son routeur domestique. Conclusion et enseignements Le travail présenté par Joey D. illustre l'importance d'investir dans la qualité des données en amont du processus de détection Plutôt que de déployer des solutions “out-of-the-box” et de s'en contenter, son équipe démontre qu'un investissement significatif dans la compréhension, la contextualisation et le filtrage intelligent des données peut transformer radicalement l'efficacité d'un SOC. L'approche développée au Centre canadien pour la cybersécurité offre un modèle inspirant pour d'autres organisations confrontées aux mêmes défis de volume et de bruit. En se concentrant sur la caractérisation du comportement normal et en développant des systèmes de corrélation sophistiqués, il devient possible de gérer efficacement des volumes de données considérables tout en maintenant un niveau de détection élevé. Cette présentation souligne également l'importance de la collaboration et du partage d'informations dans le domaine de la cybersécurité, démontrant comment le travail d'une équipe gouvernementale peut bénéficier à l'ensemble de la communauté, des grandes organisations aux citoyens individuels. Notes Le Bouclier canadien Collaborateurs Joey D. Crédits Montage par Intrasecure inc Locaux réels par Northsec

Predictable B2B Success
Why 95% of Cold Email Deliverability Strategies Fail CEOs

Predictable B2B Success

Play Episode Listen Later Aug 5, 2025 50:34


Ever wondered why your meticulously crafted B2B emails sometimes vanish into the digital ether instead of landing in your prospect's inbox? In this episode, we speak with Benny Rubin, founder and CEO of Senders, a platform that has mastered the science (and art) of email deliverability and cold outreach. Benny's journey, which improbably began in the world of music, took a sharp turn into B2B sales and tech entrepreneurship, with his teams generating hundreds of millions in pipeline for big-name brands like Starbucks, Visa, and Coca-Cola. But why is something as basic as getting an email delivered such a huge challenge for marketers, especially when 61% cite it as a top hurdle? Benny breaks down the secret sauce behind high-performing cold emails, from technical game-changers like DNS records to innovative strategies that move leads down the funnel without the hard sell. If you think email marketing is just about catchy subject lines and clever copy, get ready for a reality check. Benny reveals the hidden gaps no one's talking about, and what separates successful email campaigns from the rest. Whether you're at a startup searching for product-market fit or at a scale-up hungry for predictable growth, this episode will change the way you think about your inbox. Some areas we explore in this episode include: Benny Rubin's Journey – Transitioning from a music background to founding Senders and working in email deliverability and B2B sales.Unit Economics – The importance of understanding core business economics, especially in smaller businesses.Email Deliverability Fundamentals – Core technical essentials: domains, IP addresses, and DNS records.Common Email Pitfalls – Misconceptions, basic technical errors, and the problem with chasing random tactics.Technical vs. Messaging Strategy – The need to balance infrastructure fixes with crafting resonant messaging.Cold Email as a Growth Channel – Real-world examples and how cold email is used for pipeline and revenue generation.Lead Generation Tactics – Using cold email to nurture leads by inviting them to communities, roundtables, or events.Role of Content & Education – Why educating teams and prospects around email is critical for results.Iterative Messaging – The value of flexibility and testing in cold email campaigns.Industry Noise & Misinformation – The abundance of poor or narrowly-informed cold email advice online.And much, much more...

BIT-BUY-BIT's podcast
Monero Under Attack | MONERO MONTHLY 08

BIT-BUY-BIT's podcast

Play Episode Listen Later Aug 4, 2025 46:45 Transcription Available


A monthly show where Max and Seth take a trip down memory lane to see what happened in the last 4 weeks of Monero.What to knowSupposedly launching a 51% attack on August 2ndTheoretically have shown the ability to deploy ~30% of the network hashrate for a 6h period, and only peaking at 20% over a 24h period as of July 28thFounder has been doxxing Monero community members and slandering many othersClearly a marketing ploy of a dying coin IMO, but a good test of Monero's PoW decentralization and resistanceTheir goal, quote by Luke Parker:Fear-mongering and promoting a project which aims to remove Monero's decentralized block building, and appears to be the same as any other centralized mining pool (even if shares are submitted over some centralized network), don't contribute though. Don't get manipulated into it.What you can doMine Monero via p2pool to do your part securing Monerohttps://x.com/sethforprivacy/status/1949842968673751330If the attack actually happens, be wary of accepting Monero without sufficient confirmations for goods and servicesThe more confirmations, the more hashrate required to re-org the chain and double spendIf running BTCPay, you can easily change the number of confirmations required in the "XMR Wallet" settings on the left side barCall out Selsta's tireless effortshttps://monero.observer/selsta-posts-monero-dev-report-june-2025/Software updatesCake Wallet released v5.2.0BIP 353 proof support for hardware walletsImproved support for CupcakeMonero and Bitcoin view-only supportLedger for desktopmacOS and WindowsAutomatic node switchingMinor Silent Payment enhancements and fixesCake Wallet released v5.1.0, 5.1.1, 5.1.2FeaturingAn all-new Cake Pay UIFurther Silent Payment fixes and enhancementsBuilt-in Tor supportAndroid-only for nowMuch improved Ledger supportPayjoin improvements and bug fixeshttps://github.com/cake-tech/cake_wallet/releasesMonero v0.18.4.1 releasedhttps://monero.observer/monero-v0.18.4.1-fluorine-fermi-released/p2pool v4.9 releasedFocused on reproducible buildshttps://monero.observer/schernykh-releases-p2pool-v4.9-reproducible-builds/Eigenwallet v3.0.0-beta releasedPreviously known as UnstoppableSwap, recently rebrandedhttps://monero.observer/unstoppableswap-completes-eigenwallet-rebrand-3.0.0-beta-release/Cuprate v0.0.5 releasedhttps://monero.observer/cuprated-v0.0.5-molybdenite-released/IMPORTANT LINKS https://freesamourai.comhttps://p2prights.org/donate.htmlhttps://ungovernablemisfits.comVALUE FOR VALUEThanks for listening you Ungovernable Misfits, we appreciate your continued support and hope you enjoy the shows.You can support this episode using your time, talent or treasure.TIME:- create fountain clips for the show- create a meetup- help boost the signal on social mediaTALENT:- create ungovernable misfit inspired art, animation or music- design or implement some software that can make the podcast better- use whatever talents you have to make a contribution to the show!TREASURE:- BOOST IT OR STREAM SATS on the Podcasting 2.0 apps @ https://podcastapps.com- DONATE via Monero @ https://xmrchat.com/ugmf- BUY SOME STICKERS @ https://www.ungovernablemisfits.com/shop/FOUNDATIONhttps://foundation.xyz/ungovernableFoundation builds Bitcoin-centric tools that empower you to reclaim your digital sovereignty.As a sovereign computing company, Foundation is the antithesis of today's tech conglomerates. Returning to cypherpunk principles, they build open source technology that “can't be evil”.Thank you Foundation Devices for sponsoring the show!Use code: Ungovernable for $10 off of your purchaseCAKE WALLEThttps://cakewallet.comCake Wallet is an open-source, non-custodial wallet available on Android, iOS, macOS, and Linux.Features:- Built-in Exchange: Swap easily between Bitcoin and Monero.- User-Friendly: Simple interface for all users.Monero Users:- Batch Transactions: Send multiple payments at once.- Faster Syncing: Optimized syncing via specified restore heights- Proxy Support: Enhance privacy with proxy node options.Bitcoin Users:- Coin Control: Manage your transactions effectively.- Silent Payments: Static bitcoin addresses- Batch Transactions: Streamline your payment process.Thank you Cake Wallet for sponsoring the show!MYNYMBOXhttps://mynymbox.ioYour go-to for anonymous server hosting solutions, featuring: virtual private & dedicated servers, domain registration and DNS parking. We don't require any of your personal information, and you can purchase using Bitcoin, Lightning, Monero and many other cryptos.Explore benefits such as No KYC, complete privacy & security, and human support.

Jeg kan ingenting om vin
GJENHØR: 157 - De beste vinene fra Provence

Jeg kan ingenting om vin

Play Episode Listen Later Aug 4, 2025 25:30


Alt du trenger å vite om vin. Med Thomas Giertsen og DNs vinjournalist Merete Bø. Hosted on Acast. See acast.com/privacy for more information.

The Cabral Concept
3466: Proteolytic Enzymes & Inflammation, Itchy Compression Socks, Rheumatoid Arthritis & Twisting Fingers, Para Support Protocol or CBO Protocol, Trauma & Dis-ease

The Cabral Concept

Play Episode Listen Later Aug 2, 2025 20:22


Welcome back to our weekend Cabral HouseCall shows! This is where we answer our community's wellness, weight loss, and anti-aging questions to help people get back on track! Check out today's questions:    Trish: Hi Dr. Cabral - I'm a 55-year-old female working on lowering overall inflammation in my body. My CRP levels are (4.1), ApoB (118 nmol/L and Lipoprotein (A) (281 nmol/L) as you can see are high. Total Cholesterol 221 and Triglycerides are 70. I have a lot of stiffness with joint discomfort. I started taking 2 Proteolytic Enzymes upon waking. Then your DNS, D3/k2, Cell Boost, Inflamma Soothe, Collagen with GLP Tone System and some of your other products (eye and hair). I follow your Med diet. My pain and stiffness have improved ALOT in a matter of days. I'm going to retest my CRP and chol levels in 4 months. My question is how long can I take Proteolytic Enzymes and in your opinion am I taking the proper protocol for these issues? I'm retesting in 4 mos. Thank you in advance          Sheena: Hi Dr Cabral! Hope you and all of your health family are well. I'm a surgical Processor and on my feet all day. I've tried all kinds of compression socks but by the end of the day, after taking it off, my leg are soo itchy! I scratch it sometimes so bad it starts to bleed. I'm only wearing the average 15-20 mmHG so its not too tight. I'm curious if you have a recommendation for compression socks that wont causes itching but is effective? Thanks in advance for answering!      Christina: Stephen, I have listened on one of your podcasts about Rheumatoid Arthritis and detoxing. My mother is in her early 70s and her fingers are twisting. I am 48 and recently the base of my thumbs have started bothering me. My question is, what detox protocol should my mother start with to prevent further twisting of her fingers and what detox protocol should I do to prevent this from happening to me? I would love to do the heavy metals and organic acid tests, but unfortunately I live in NY. Would my functional medicine doctor be able to order them for me? I have had HELLP, HUS, DIC, Guillian Barre, and Pulminary Edema in my pregnancy at 21. My son was delivered with no issues! At this time, we learned that I have ITTP. I have had IBS issues. Thank you, Christina                      Ryan: Hi dr cabral, Im a 29 year old male who has addisons disease, chronic post nasal drip, food intolerance's and teeth grinding a stool test confirmed klebsiella pneumonie overgrowth and blastocystis hominis as well as some yeast and fungus with no Bifidobacteria and Lactobacillus detected, I recently started the cbo protocol with citricidal drops im 7 days in untill i came across one of your videos where you mentioned you should go for the parasite first should i stop the cbo protocol and start the para support protocol and then continue the cbo after or just continue the cbo protocol Thank you for your time wishing you all the best ryan.                                                                                                                                     Kay: Hi Dr. Cabral, I I love your podcasts and look forward to them every week. Anyway, I was wondering if you could please explain how a traumatic event could spur the onset of a "dis-ease" such as asthma. My daughter's asthma began shortly after her father and I were separated and he moved out of state. According to her pediatrician at the time, she was "more prone to having asthma because she also had eczema." This was 2 decades ago, and now she's 31 and we know more about autoimmune issues. Although she continues to carry an inhaler with her, she hardly needs to use it anymore. What would you recommend for a more root cause approach to someone with her condition? Thank you.                                  Thank you for tuning into today's Cabral HouseCall and be sure to check back tomorrow where we answer more of our community's questions!    - - - Show Notes and Resources: StephenCabral.com/3466 - - - Get a FREE Copy of Dr. Cabral's Book: The Rain Barrel Effect - - - Join the Community & Get Your Questions Answered: CabralSupportGroup.com - - - Dr. Cabral's Most Popular At-Home Lab Tests: > Complete Minerals & Metals Test (Test for mineral imbalances & heavy metal toxicity) - - - > Complete Candida, Metabolic & Vitamins Test (Test for 75 biomarkers including yeast & bacterial gut overgrowth, as well as vitamin levels) - - - > Complete Stress, Mood & Metabolism Test (Discover your complete thyroid, adrenal, hormone, vitamin D & insulin levels) - - - > Complete Food Sensitivity Test (Find out your hidden food sensitivities) - - - > Complete Omega-3 & Inflammation Test (Discover your levels of inflammation related to your omega-6 to omega-3 levels) - - - Get Your Question Answered On An Upcoming HouseCall: StephenCabral.com/askcabral - - - Would You Take 30 Seconds To Rate & Review The Cabral Concept? The best way to help me spread our mission of true natural health is to pass on the good word, and I read and appreciate every review!  

trauma ny disease med protocol fingers socks inflammation ibs alot d3 collagen dns cabral compression itchy rheumatoid arthritis twisting enzymes processor crp hus free copy dic lactobacillus triglycerides apob hellp mmhg proteolytic total cholesterol complete stress complete omega complete candida metabolic vitamins test test mood metabolism test discover complete food sensitivity test find inflammation test discover ittp
The Boulder Boys Show
Ep. 52. LIVE FROM BOULDER!!

The Boulder Boys Show

Play Episode Listen Later Aug 2, 2025 45:45


Welcome Back! The Boulder Boys Show Ep. 52 WE ARE LIVE! We hosted our first group run and live pod with the help of Intrepid Camp Gear. We chat about Moi's major life change, DNS vs. DNF, and field some listener questions.  Thanks for listening!  This Episode is brought to you by Intrepid Camp Gear.  https://intrepidcampgear.com/discount/BoulderBoys Code: BoulderBoys for 10% off Boulderboys.show Year Of The Boy: https://youtu.be/KsClhdWc5-8 Moi's training app: https://vert.run Matt's substack: https://substack.com/@mattdaniels480?utm_source=substack-feed-item 

Packet Pushers - Full Podcast Feed
IPB180: IPv6 Basics – Deployment

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Jul 31, 2025 31:39


We’re continuing our IPv6 Basics series discussing on this episode deployment.  We’ll help you sort out why you should deploy IPv6, things to consider before starting a deployment, and what approach you should take such as “inside out” vs. “outside in” and when you should deploy IPv6. Lastly we explain why you should seek out... Read more »

Packet Pushers - IPv6 Buzz
IPB180: IPv6 Basics – Deployment

Packet Pushers - IPv6 Buzz

Play Episode Listen Later Jul 31, 2025 31:39


We’re continuing our IPv6 Basics series discussing on this episode deployment.  We’ll help you sort out why you should deploy IPv6, things to consider before starting a deployment, and what approach you should take such as “inside out” vs. “outside in” and when you should deploy IPv6. Lastly we explain why you should seek out... Read more »

Jeg kan ingenting om vin
GJENHØR: 116 - De beste sommervinene (2023)

Jeg kan ingenting om vin

Play Episode Listen Later Jul 31, 2025 24:17


Alt du trenger å vite om vin. Med Thomas Giertsen og DNs vinjournalist Merete Bø. Hosted on Acast. See acast.com/privacy for more information.

Passwort - der Podcast von heise security
DNSSEC, die DNS Security Extensions

Passwort - der Podcast von heise security

Play Episode Listen Later Jul 30, 2025 106:56


Das Domain Name System - kurz DNS - ist einer der Grundpfeiler des modernen Internet. Umso wichtiger, dass es zuverlässige und unfälschbare Informationen liefert. Dabei hilft DNSSEC - die DNS Security Extensions. Was das ist, was es kann, wie man es aktiviert und was man davon hat, erklärt den Hosts in dieser Folge ein Gast: DNSSEC-Experte Peter Thomassen arbeitet seit Jahren an vorderster Front bei verschiedenen Gremien mit und entwickelt die Sicherhetismerkmale von DNS weiter. Er kümmert sich besonders um Automatisierung - ein Thema, bei dem DNSSEC anderen großen Ökosystemen wie dem CA-Kosmos noch hinterherhinkt. - https://desec.io/ - Malware in TXT Records: https://arstechnica.com/security/2025/07/hackers-exploit-a-blind-spot-by-hiding-malware-inside-dns-records/ - Post-Quantum DNSSEC Testbed & Feldstudie: https://pq-dnssec.dedyn.io/ - DS-Automatisierung: RFC 7344, 8078, 9615 - IETF-Draft: "Dry run DNSSEC" - ICANN SSAC Report zu DS-Automatisierung (SAC126): https://itp.cdn.icann.org/en/files/security-and-stability-advisory-committee-ssac-reports/sac-126-16-08-2024-en.pdf - Automatisierungs-Guidelines für Registrierungsstellen (Entwurf): https://datatracker.ietf.org/doc/draft-shetho-dnsop-ds-automation/ - Folgt uns im Fediverse: @christopherkunz@chaos.social @syt@social.heise.de Mitglieder unserer Security Community auf heise security PRO hören alle Folgen bereits zwei Tage früher. Mehr Infos: https://pro.heise.de/passwort

Telecom Reseller
EasyDMARC Empowers MSPs to Monetize Security and Grow with Confidence, Podcast

Telecom Reseller

Play Episode Listen Later Jul 29, 2025


“It's not about solving for DMARC. Yeah, you do that as a byproduct, but we really enable the MSP to go grow their business.” — Mike Anderson, EasyDMARC Technology Reseller News sat down with Mike Anderson of EasyDMARC for a live podcast recording at the opening day of ChannelCon, GTIA's signature event. In a candid and engaging conversation with publisher Doug Green, Anderson revealed how EasyDMARC is turning email authentication into a growth engine for managed service providers (MSPs). While DMARC (Domain-based Message Authentication, Reporting, and Conformance) may sound like a technical checkbox, Anderson says it's actually a gateway to new revenue and customer acquisition when paired with EasyDMARC's purpose-built analytics and sales enablement platform. “We're not just a tool,” Anderson explained. “We're a full go-to-market engine for MSPs.” The company offers a platform that not only simplifies DMARC configuration with built-in DNS templates and documentation for 1,500+ top providers, but also delivers white-labeled reports, risk assessments, and automated marketing assets—like drip campaigns, call scripts, and email templates—designed to help MSPs win new business. With over 2,500 MSPs onboard and growing by 70–100 per month, Anderson attributes the rapid adoption to a combination of ease-of-use and tangible results. He recounted a typical success story: an MSP identifies a law firm with broken email delivery and marketing systems, costing them $30,000 in missed revenue. “The MSP comes in, fixes it for a fraction of that, and signs them to a monitoring plan—immediate ROI, happy client, and recurring revenue.” EasyDMARC's platform is not only about fixing email authentication but enabling MSPs to create their own economic momentum. “We give MSPs the tools to go prospect, sell, and close,” Anderson said, pointing to the company's growing international reach and dedicated MSP portal. Learn more at EasyDMARC.com, where MSPs can start a free trial. ChannelCon attendees can mention the event for a free first month. About EasyDMARC EasyDMARC is a leading DMARC and email security platform designed to help businesses and MSPs protect their domains, prevent phishing, and ensure compliant email delivery. With built-in sales tools, automation, and analytics, EasyDMARC transforms security into a growth opportunity.

BIT-BUY-BIT's podcast
Ragnarök

BIT-BUY-BIT's podcast

Play Episode Listen Later Jul 29, 2025 94:09 Transcription Available


In this emergency episode of Ungovernable Misfits, we explore the potential cosmic and earthly threats that could impact our world. Return guest, Kerim, presents a theory that combines astrophysical phenomena with the current state of our planet, suggesting that we may be on the brink of a significant event. 1 - Solar Maximum - The Sun is at the maximal peak of it's 11 year cycle, there is a confirmed increase in solar flare activity which suggests an increased risk of a Coronal Mass Ejection (CME).https://www.scientificamerican.com/article/solar-maximum-could-hit-us-harder-and-sooner-than-we-thought-how-dangerous-will-the-suns-chaotic-peak-be/https://science.nasa.gov/science-research/heliophysics/nasa-noaa-sun-reaches-maximum-phase-in-11-year-solar-cycle/https://www.nytimes.com/2017/07/14/science/sun-cycles-solar-maximum-minimum-corona.html2 - Earth's magnetic field is weakened - The magnetic field that sheilds us from solar plasma is at a low which leaves us more vulnerable to solar particle radiation and plasma discharges such as a CME.https://www.esa.int/Applications/Observing_the_Earth/FutureEO/Swarm/Swarm_probes_weakening_of_Earth_s_magnetic_fieldhttps://www.space.com/23131-earth-magnetic-field-shift-explained.htmlhttps://www.sciencefocus.com/planet-earth/earth-magnetic-fieldhttps://www.livescience.com/62577-earth-magnetic-field-drifts.html3 - Local Nova activity & Energy storage - Two confirmed Nova are currently visible. V462 Lupi (in the constellation Lupus, the wolf, one Ptolomy's 48 constellations) and V572 Velorum (in the large constellation Argo Navis, a great ship shaped constellation) are both classic nova. These are binary star systems that undergo periodic explosions. Exploding stars pulse a direct current through the normally alternating current plasma system of the galaxy. Almost all astronomical bodies have alternating layers of conductive plasmas and insulating uncharged matter (Earth's layers include the Ionosphere, Plasmasphere, Magnetosheath, Magnetosphere and could include the oceans and or subterranean plasma layers) in this manner they can act as multilayered capacitors. When an Alternating Current (AC) is applied to a capacitor, it acts like a resistor in a DC circuits, dissipating energy and attenuating it's flow.When a Direct Current (DC) is applied to a capacitor, it acts as a battery as electric potential difference builds between the conductive plasma layers. This stores energy in the system increasing the risk of plasma discharges such as a CME.In short, the local Nova activity generates DC pulses into the local plasma system making bodies act as batteries instead of resistors increasing the energy potentials and the risk of a CME. https://www.iflscience.com/for-only-the-second-recorded-time-two-novae-are-visible-with-the-naked-eye-at-once-79824https://www.sciencedirect.com/science/article/abs/pii/S1364682617303711https://www.sciencedirect.com/science/article/abs/pii/B0122270908001445https://www.sciencedirect.com/science/article/abs/pii/S1364682612000995https://www.nature.com/articles/s41550-019-0819-74 - The Taurid meteor stream - The presence of a conductive material into the solar system (such as a comet stream made up of metallic meteor fragments) could mediate an electrical discharge by lowering the resistance of the system.Meteors are largely comprised of Iron. The meteor stream could act as "Iron filings" sprinkled between highly charged conductive plates. This could trigger a plasma discharge (arc discharge, essentially lightning) or CME.An even more dangerous scenario could see the discharge diverting one or more meteors from the stream towards Earth. This could be a beautiful display of shooting stars and Northern Lights or a Younger Dryas Level event.We pass through the stream every June and November.5 - Psychosocial Temperature - Pick any issue, any fucking issue. Epstein, JFK, 911, Macron's Husband, Mass migration, the Genocide of the Palestinians. The people in power are acting like they will never face accountability for their crimes. In fact they are behaving like they know everything is coming down and they've known about it for a while and are prepped, ready and taking advantage of teh situation like the parasites they are. There are rumours of a 21 Trillion dollar breakaway civilisation (Caroline Fitz solari.com). Underground structures and spaceships. Elon Musk is boring tunnels and he and Bezos are sending rockets to space. It certainly seems like the people who would know about this are acting exactly as you would expect them to if it were true.The Sun will have dropped back to minimum activity levels by 2030. The greatest risk is over the next three months. If we make it past November then the immediate danger is over and we could have hundreds or even thousands of years before this level of risk is approached again.FOUNDATIONhttps://foundation.xyz/ungovernableFoundation builds Bitcoin-centric tools that empower you to reclaim your digital sovereignty.As a sovereign computing company, Foundation is the antithesis of today's tech conglomerates. Returning to cypherpunk principles, they build open source technology that “can't be evil”.Thank you Foundation Devices for sponsoring the show!Use code: Ungovernable for $10 off of your purchaseCAKE WALLEThttps://cakewallet.comCake Wallet is an open-source, non-custodial wallet available on Android, iOS, macOS, and Linux.Features:- Built-in Exchange: Swap easily between Bitcoin and Monero.- User-Friendly: Simple interface for all users.Monero Users:- Batch Transactions: Send multiple payments at once.- Faster Syncing: Optimized syncing via specified restore heights- Proxy Support: Enhance privacy with proxy node options.Bitcoin Users:- Coin Control: Manage your transactions effectively.- Silent Payments: Static bitcoin addresses- Batch Transactions: Streamline your payment process.Thank you Cake Wallet for sponsoring the show!MYNYMBOXhttps://mynymbox.ioYour go-to for anonymous server hosting solutions, featuring: virtual private & dedicated servers, domain registration and DNS parking. We don't require any of your personal information, and you can purchase using Bitcoin, Lightning, Monero and many other cryptos.Explore benefits such as No KYC, complete privacy & security, and human support.

Think BIG Bodybuilding
Drugs n Stuff 275 Steroid Cycles For Older Guys, SS31 Update, Gear for a 3D Look

Think BIG Bodybuilding

Play Episode Listen Later Jul 28, 2025 78:24


DNS 275 Dave Crosland & Scott McNally 0:00 teaser clip 0:20 Intro and advertisers 2:00 Suck it England! 3:40 Masters Cycles 11:50 Raw Powder Supply Chain Update 18:45 Compounds for the 3D look? 21:50 Will GLP meds take away the achievement of condition? 31:45 Lifetime Natty First Cycle? 34:00 Multiple Pathways on Cycle 37:40 GH Releasing Peptides 40:20 Does T3 Burn Muscle? 43:16 Correcting Constipation 46:05 Cycle Proposal 47:15 Adding Exogenous Estrogen to Cycles? 51:15 BP Meds? 53:00 Gear that is most damaging to male fertility 54:30 Cycle Proposal for Off Season with 1g test 56:25 SS31 Update 59:00 Correcting Low SHBG 1:00:45 Correcting Joint Pain 1:07:45 Infection or Allergic Reaction? 1:11:15 Best Fish and Chips by Dave 1:13:00 Strom SupportMax

Jeg kan ingenting om vin
GJENHØR: 115 - De beste italienske hvitvinene

Jeg kan ingenting om vin

Play Episode Listen Later Jul 28, 2025 25:05


Alt du trenger å vite om vin. Med Thomas Giertsen og DNs vinjournalist Merete Bø. Hosted on Acast. See acast.com/privacy for more information.

The Cabral Concept
3460: BPC 157, Stasis & ADHD, Caffeine & Mood, Unsweetened DNS, Small Vessel Polyigitis (HouseCall)

The Cabral Concept

Play Episode Listen Later Jul 27, 2025 19:09


Thank you for joining us for our 2nd Cabral HouseCall of the weekend! I'm looking forward to sharing with you some of our community's questions that have come in over the past few weeks…   John: I wanted to know if you have any info on bpc 157 thats all over the internet thanks                                                  Jessica: Hi Dr. Cabral, First, thank you for sharing your knowledge and for all that you do! I was skeptical of naturopathy, but you have made a believer out of me. With a few podcasts and diet changes, my life has been changing for the better. Question about a new supplement that I recently heard about called Stasis. I was diagnosed with ADD/ADHD in the first grade. I am now 32yrs old and have been on medication since then. Recently, I heard about a supplement. Have you heard of this? If so, what are your thoughts?                                                                                                                Charlene: Hi thank you for all your help. I was wondering if you had any info about caffeine and mood. I stopped all caffeine for a time but every now and then I have a regular coffee and my mood seems better on those days. Is there anything I can do to help not need caffeine to be in a good mood?                                                                                                      Lilian: Hello Dr. Cabral, thank you for all you do! I have been struggling with the DNS flavor, it is incredibly sweet. I have seen many posts on the support group of people having the same problem and struggling with it. Many have tried the spices and all the other recommendation. My question is: do you think at some point there will be an unflavored, unsweet DNS powder available? I know Michelle has said that the flavor of the vitamins would be prevalent, but I really would rather have that than the sweetness in it. Besides, if we would add greens and blueberries/fruit that would not be an issue. Are there any chances that there will be one made? Please!                                                                                                                                    Shawn: My sister-in-law was recently diagnosed with small vessel polyigitis. She's in her late 50's, and overall she is very healthy... works out, stays active and eats healthy. What course of treatment/recommendations would you suggest for her? Thank you! I appreciate your input and guidance.             Thank you for tuning into this weekend's Cabral HouseCalls and be sure to check back tomorrow for our Mindset & Motivation Monday show to get your week started off right! - - - Show Notes and Resources: StephenCabral.com/3460 - - - Get a FREE Copy of Dr. Cabral's Book: The Rain Barrel Effect - - - Join the Community & Get Your Questions Answered: CabralSupportGroup.com - - - Dr. Cabral's Most Popular At-Home Lab Tests: > Complete Minerals & Metals Test (Test for mineral imbalances & heavy metal toxicity) - - - > Complete Candida, Metabolic & Vitamins Test (Test for 75 biomarkers including yeast & bacterial gut overgrowth, as well as vitamin levels) - - - > Complete Stress, Mood & Metabolism Test (Discover your complete thyroid, adrenal, hormone, vitamin D & insulin levels) - - - > Complete Food Sensitivity Test (Find out your hidden food sensitivities) - - - > Complete Omega-3 & Inflammation Test (Discover your levels of inflammation related to your omega-6 to omega-3 levels) - - - Get Your Question Answered On An Upcoming HouseCall: StephenCabral.com/askcabral - - - Would You Take 30 Seconds To Rate & Review The Cabral Concept? The best way to help me spread our mission of true natural health is to pass on the good word, and I read and appreciate every review!  

adhd mood caffeine vessel dns cabral add adhd free copy stasis unsweetened complete stress complete omega complete candida metabolic vitamins test test mood metabolism test discover complete food sensitivity test find inflammation test discover
The Cabral Concept
3459: IgG Food Reactions, Lowering Cholesterol, Genetics & Supplements, Heavy Metal Detox & Supplements, Help for Lymphedema (HouseCall)

The Cabral Concept

Play Episode Listen Later Jul 26, 2025 18:14


Welcome back to our weekend Cabral HouseCall shows! This is where we answer our community's wellness, weight loss, and anti-aging questions to help people get back on track! Check out today's questions:    Ann: Hi Dr. Cabral- everyone out here SO appreciates all you do :) You have mentioned that there is a difference between an IGG reaction to a food and a digestive issue that would cause bloating and gas etc. Could you explain how you can tell if you are having an IGG reaction? I used to think that the bloat was the reaction. The 3 foods I am moderately sensitive to based on my Food Sensitivity test have never given me OVERT symptoms , so I'm wondering how to tell if these or any food combos are giving me inflammation without telltale rash, swelling etc. Im 61 and don't have any pressing health issues so healthspan is my focus right now and I don't want to be eating anything that may be causing me hidden inflammation. Thank you again :)                                                                                                                                                       Kavita: Hello Dr. Cabral, Thank you for your incredible work! I have successfully reversed many of my health issues thanks to your guidance and support. I recently received my test results, and I am pleased to report that they look fantastic overall. However, my cholesterol levels are on the higher side. What recommendations do you have for addressing this? I  walk frequently and work out three to four times a week, including strength training. I am currently focused on my weight, aiming to reach 170 pounds; I weigh 191 pounds at the moment. Additionally, I have been struggling with migraines for most of my life, and I recently started seeing a chiropractor in hopes that this will help alleviate my symptoms. I would greatly appreciate any advice.                                                                                                           David: Hi Dr.Cabral, Really appreciate everything you do and I can't stress enough how much of a positive impact you have had on my life and many of those around me as a result of being the health coach in my home. I've been revisiting my personal protocol to optimize for my genes even more than I do and boy is it a confusing area. Specifically, I am trying to balance MTHFR and COMT. After speaking with a methylation focused nutritionist, she recommended that I switch my DNS to beef liver and beef organ supplements (about 4-5 caps of each) I have taken Equi Life's organ complex and generally tolerated it well, but was wondering if there is a time and place (such as having my genotype) where using a whole food based multi makes sense and is better than synthetic multi-vitamins?                                                                                John: Hey dr I asked you a question on 3410 but you misread the question I wanted to know if I should stop all my supplements when I'm on the heavy metal detox not the regular detox . Just want to make sure the heavy metal doesn't cancel out everything thanks                                                                                                                                                                Tammy: As a healthcare worker, I am seeing an increase in patients with lymphedema, where the calf and ankle areas are very swollen and many times gets blistering sores and veins issues What are your recommendations for lymphedema and venous problems?       Thank you for tuning into today's Cabral HouseCall and be sure to check back tomorrow where we answer more of our community's questions!    - - - Show Notes and Resources: StephenCabral.com/3459 - - - Get a FREE Copy of Dr. Cabral's Book: The Rain Barrel Effect - - - Join the Community & Get Your Questions Answered: CabralSupportGroup.com - - - Dr. Cabral's Most Popular At-Home Lab Tests: > Complete Minerals & Metals Test (Test for mineral imbalances & heavy metal toxicity) - - - > Complete Candida, Metabolic & Vitamins Test (Test for 75 biomarkers including yeast & bacterial gut overgrowth, as well as vitamin levels) - - - > Complete Stress, Mood & Metabolism Test (Discover your complete thyroid, adrenal, hormone, vitamin D & insulin levels) - - - > Complete Food Sensitivity Test (Find out your hidden food sensitivities) - - - > Complete Omega-3 & Inflammation Test (Discover your levels of inflammation related to your omega-6 to omega-3 levels) - - - Get Your Question Answered On An Upcoming HouseCall: StephenCabral.com/askcabral - - - Would You Take 30 Seconds To Rate & Review The Cabral Concept? The best way to help me spread our mission of true natural health is to pass on the good word, and I read and appreciate every review!  

reactions supplements genetics lowering cholesterol dns cabral food sensitivities mthfr free copy igg comt lymphedema overt heavy metal detox complete stress john hey complete omega complete candida metabolic vitamins test test mood metabolism test discover complete food sensitivity test find inflammation test discover
Check Point CheckMates Cyber Security Podcast
S07E12: SharePoint CVEs and More!

Check Point CheckMates Cyber Security Podcast

Play Episode Listen Later Jul 25, 2025 10:11


PhoneBoy plays an excerpt from our SharePoint CVEs Deep Dive, 3 Features You Should Start Using, different DNS servers per domain, using dnsmasq prior to R82, interpreting fwaccel stat output, ordered versus inline layers, and a SmartConsole cheat cheat.

Jeg kan ingenting om vin
GJENHØR: 86 - De beste vinene til salat

Jeg kan ingenting om vin

Play Episode Listen Later Jul 25, 2025 25:32


Alt du trenger å vite om vin. Med Thomas Giertsen og DNs vinjournalist Merete Bø. Hosted on Acast. See acast.com/privacy for more information.

BIT-BUY-BIT's podcast
Sub 1 Sat Summer | THE BITCOIN BRIEF 62

BIT-BUY-BIT's podcast

Play Episode Listen Later Jul 24, 2025 54:23 Transcription Available


In this episode of The Bitcoin Brief, Max and Q delve into the latest happenings in the world of Bitcoin and privacy. They discuss the current state of Bitcoin's value and the surprising low transaction fees despite its high price, reflecting on the implications for mass adoption and self-custody. They also explore the technical intricacies of Ashigaru's new Whirlpool implementation, addressing privacy concerns and the potential for malicious coordinators. The conversation touches on the importance of layered privacy and the role of tools like Monero swaps and Lightning channels in enhancing user security.Max and Q highlight recent software updates, including the release of Envoy 2.0, Cake Wallet's new features, and the introduction of FrostSnap, a new consumer-ready product for Taproot multisig. The episode wraps up with a discussion on the benefits of multisig, the potential of Frost technology, and the ongoing developments in the Bitcoin ecosystem. Join us as we navigate the complexities of Bitcoin privacy, security, and innovation.AOBFreedom Tech FridayQ heading on holiday ThursdayLive stream with Katie from CitizenXRiga weekend afterCore starts shipping this weekNEWSRoman Storm case under way (see latest FTF)Trump signs GENIUS Act into lawCLARITY act passes the houseMempool now shows sub 1 sat.vb feesAshigaru terminal critiques and responsesUPDATES/RELEASESEnvoy 2.0 main releaseAshigaru terminal coming to startOS 0.4Cake Wallet v5.1.2Zeus 0.11.2 main releasePhoenix v2.6.2Electrum Desktop 4.6Bitcoin Keeper v2.5.0 (and 2.5.1)Frostsnap releaseBTC Sesstions quick tutorial on a no HWW multisig with Blue/SparrowIMPORTANT LINKS https://freesamourai.comhttps://p2prights.org/donate.htmlhttps://ungovernablemisfits.comVALUE FOR VALUEThanks for listening you Ungovernable Misfits, we appreciate your continued support and hope you enjoy the shows.You can support this episode using your time, talent or treasure.TIME:- create fountain clips for the show- create a meetup- help boost the signal on social mediaTALENT:- create ungovernable misfit inspired art, animation or music- design or implement some software that can make the podcast better- use whatever talents you have to make a contribution to the show!TREASURE:- BOOST IT OR STREAM SATS on the Podcasting 2.0 apps @ https://podcastapps.com- DONATE via Monero @ https://xmrchat.com/ugmf- BUY SOME STICKERS @ https://www.ungovernablemisfits.com/shop/FOUNDATIONhttps://foundation.xyz/ungovernableFoundation builds Bitcoin-centric tools that empower you to reclaim your digital sovereignty.As a sovereign computing company, Foundation is the antithesis of today's tech conglomerates. Returning to cypherpunk principles, they build open source technology that “can't be evil”.Thank you Foundation Devices for sponsoring the show!Use code: Ungovernable for $10 off of your purchaseCAKE WALLEThttps://cakewallet.comCake Wallet is an open-source, non-custodial wallet available on Android, iOS, macOS, and Linux.Features:- Built-in Exchange: Swap easily between Bitcoin and Monero.- User-Friendly: Simple interface for all users.Monero Users:- Batch Transactions: Send multiple payments at once.- Faster Syncing: Optimized syncing via specified restore heights- Proxy Support: Enhance privacy with proxy node options.Bitcoin Users:- Coin Control: Manage your transactions effectively.- Silent Payments: Static bitcoin addresses- Batch Transactions: Streamline your payment process.Thank you Cake Wallet for sponsoring the show!MYNYMBOXhttps://mynymbox.ioYour go-to for anonymous server hosting solutions, featuring: virtual private & dedicated servers, domain registration and DNS parking. We don't require any of your personal information, and you can purchase using Bitcoin, Lightning, Monero and many other cryptos.Explore benefits such as No KYC, complete privacy & security, and human support.

Federal Tech Podcast: Listen and learn how successful companies get federal contracts
Ep. 260 How Akamai can make the Internet work better by preventing ransomware.

Federal Tech Podcast: Listen and learn how successful companies get federal contracts

Play Episode Listen Later Jul 24, 2025 33:45


Want to listen to other episodes? www.Federaltechpodcast.com In 2018, ransomware was a quaint little cyberattack.  Suddenly, the first half of 2024 saw $459 million paid in ransomware.  Everyone is being targeted: retailers in the UK, resellers in LA, and even the federal government can be included in the target for ransomware attackers. Today, we sit down with Douglas Holland to see what role Akamai plays in preventing these rapidly proliferating attacks. One of the strengths of Akamai is its ability to handle a wide range of internet activity, as Akamai processes 11 trillion DNS queries daily.  This gives them a perfect perspective to identify troublesome sites and apply Domain Name Systems (DNS) to provide robust cybersecurity. Douglas Holland puts this situation into perspective by noting that during the COVID-19 pandemic, more and more people started using VPN technology, making systems vulnerable to phishing attacks. He notes the rise of ransomware-as-a-service and phishing-as-a-service, emphasizing the importance of employee training and education. Holland also addresses the challenges of VPNs and remote desktop security, advocating for zero-trust architectures and multi-factor authentication. The interview ends with discussing the role of AI and machine learning in Akamai's threat protection.

IT Privacy and Security Weekly update.
EP 252.5 Deep Dive. The IT Privacy and Security Weekly Update for the Week Ending July 22nd., 2025 and no Trucks

IT Privacy and Security Weekly update.

Play Episode Listen Later Jul 24, 2025 13:19


A single compromised password led to the collapse of 158-year-old UK logistics firm KNP, after hackers—suspected to be the Akira gang—used it to gain access, encrypt systems, and demand a £5 million ransom. Unable to pay, the company lost all its data and folded, putting 700 employees out of work. The breach underscores how weak access controls can have catastrophic consequences.To counter massive botnets, Google is now combining technical defenses with legal action. Its lawsuit against the “BadBox 2.0” operators marks a major shift: targeting criminals behind malware that infected over 10 million Android devices. Google's strategy includes leveraging the CFAA and RICO Act to not just stop malware but dismantle the entire criminal infrastructure—signaling a more aggressive, litigation-driven cybersecurity era.Meanwhile, a new malware delivery method is exploiting DNS—a common but often under-monitored network function. Attackers hide malware in DNS TXT records, break it into chunks, and reassemble it on target systems using standard DNS queries. Since DNS traffic is rarely scrutinized, this technique bypasses traditional defenses, making DNS monitoring essential for comprehensive protection.Travelers to China face serious privacy risks. Authorities are using malware like “Massistant” to extract sensitive data from mobile phones during inspections. Developed by Chinese firm Meiya Pico, the software accesses encrypted texts, location history, and even Signal messages upon installation. Though evidence of compromise may remain, the intrusion happens before detection, raising concerns for anyone bringing devices into the country.China has also shifted its cyberattack strategy by outsourcing operations to private firms. These companies now discover and sell zero-day vulnerabilities to government agencies. This model, which evolved from loosely affiliated hacker groups, blurs the line between state and private enterprise, making attribution difficult. As a result, China-linked hackers increasingly infiltrate U.S. critical infrastructure while masking their origins, and exposure alone no longer seems to deter them.In response to national security concerns, Microsoft has removed China-based engineers from U.S. military cloud projects. A ProPublica investigation revealed their prior involvement, prompting a Pentagon ban on such support. Previously, Chinese engineers worked under U.S. supervision, a practice now deemed too risky for defense-related systems.Microsoft's SharePoint is also under siege. Chinese state actors exploited a critical flaw dubbed “ToolShell” to compromise at least 54 organizations, including those in critical infrastructure. The attack allowed for deep system access, extraction of encryption keys, and installation of web shells—despite prior patches. The incident stresses the need for rapid patching and vigilance, even on widely used enterprise platforms.Cyberwarfare is influencing real-world military dynamics. Ukrainian cyber operatives claim to have digitally crippled a major Russian drone manufacturer, deleting 47TB of production data and disabling access systems. Allegedly backed by military intelligence, the attack highlights how digital sabotage can directly disrupt military production and reshape conflict outcomes. Code is now as consequential as conventional weapons on the modern battlefield.

Telecom Reseller
Reinventing the Network: Alkira and Astrotel Bring Infrastructure-as-a-Service to the Cloud Era, Podcast

Telecom Reseller

Play Episode Listen Later Jul 23, 2025


“You can now connect everything—cloud workloads, offices, data centers, users—on one software-defined network, without the hardware.” — Elizabeth Aris, CEO, Astrotel In this Technology Reseller News podcast, Publisher Doug Green interviews David Klebanov, a leading architect at Alkira, and Elizabeth Aris, CEO of Astrotel, to explore how their partnership is delivering Network Infrastructure as a Service (NIaaS) to global enterprises—without the capital investment or complexity of traditional networking. Born in the Cloud, Built for the AI Era Alkira, founded in 2018, was born with a vision to deliver networking the same way cloud services are consumed: on demand, scalable, and usage-based. The Alkira platform runs entirely in the cloud—across AWS, Azure, and Google Cloud—allowing enterprises to deploy secure, high-performance global networks in hours, not months. “Our platform is the networking and security foundation for today's distributed, cloud-first enterprise,” said Klebanov. “And it's built to support AI workloads and multi-cloud architectures from day one.” Channel-Driven and Globally Deployed Astrotel, based in Sydney, is a service provider and Alkira partner helping customers across the Asia-Pacific region deploy network services in minutes using Alkira's cloud-native platform. Aris emphasized the advantage: no hardware, no CapEx, and up to 60% cost savings. “We're setting up entire global networks using Alkira's software-based cloud exchange points. It's a massive differentiator,” said Aris. “From remote Australia to Hong Kong to London, you just connect your sites to the nearest cloud region—there's no need to negotiate with local telcos or install new gear.” Enterprise-Grade Security and Simplicity The Alkira platform integrates firewall, DNS, DHCP, and other critical services directly into its virtualized architecture. IT teams can manage and secure the network through Alkira's centralized portal—or via REST APIs and Terraform for programmatic deployments. A single control plane manages the entire hybrid network—connecting public cloud workloads, private data centers, branch offices, remote users, and partner networks. This includes secure extranet support for M&A environments, allowing partial segmentation during network convergence. A Win for Carriers, Too Interestingly, carriers are also using Alkira to extend their reach. Aris explained that tier-one telcos are deploying Alkira to serve customers in markets where they lack infrastructure. “Instead of buying wholesale access from foreign providers, they spin up Alkira and deliver services in hours. It's flexible, fast, and operationally simple.” Where to Learn More Visit alkira.com to explore Alkira's cloud-first networking platform. Visit astrotel.io to learn how Astrotel deploys Alkira services across Asia-Pacific. Partner Opportunities: Alkira's 100% channel-focused model is open to partners in the U.S., Canada, and globally who are ready to offer NIaaS and cloud-native connectivity solutions.

Jeg kan ingenting om vin
GJENHØR: 63 - Sancerre - druen for sommersesongen

Jeg kan ingenting om vin

Play Episode Listen Later Jul 23, 2025 27:08


Alt du trenger å vite om vin. Med Thomas Giertsen og DNs vinjournalist Merete Bø. Hosted on Acast. See acast.com/privacy for more information.

IT Privacy and Security Weekly update.
The IT Privacy and Security Weekly Update for the Week Ending July 22nd., 2025 and no Trucks.

IT Privacy and Security Weekly update.

Play Episode Listen Later Jul 23, 2025 17:16


EP 252. In this week's update:​A single compromised password enabled ransomware actors to bankrupt a 158-year-old British logistics firm, exposing the catastrophic business risks of weak access controls.Google launches its most aggressive legal action yet to dismantle a massive botnet infecting over 10 million devices, signaling a strategic shift toward litigation-led cyber defense.Security researchers have identified a new malware technique leveraging overlooked DNS traffic to bypass traditional defenses—highlighting a critical blind spot in enterprise monitoring.Chinese authorities are deploying powerful forensic malware to extract encrypted data from seized mobile devices, raising red flags (literally) for travelers and privacy advocates alike.China's outsourcing of cyberattacks to private firms marks a new era of state-sponsored hacking thoroughly blurring the lines between national strategy and commercial enterprise.Microsoft is removing China-based engineers from U.S. military cloud projects following national security concerns—prompting a major policy shift in federal tech partnerships.Microsoft has attributed a wave of advanced SharePoint breaches to Chinese threat actors, urging critical infrastructure operators to reevaluate patching protocols and on-premise defenses.Ukrainian cyber operatives claim to have obliterated a major Russian drone producer's entire digital infrastructure... potentially stalling military production and reshaping electronic warfare dynamics.Let's put the pedal to the metal.Find the complete transcript to this week's podcast here.

Roaring Elephant
Episode 463 – DNS4EU: Non-commercial DNS services offered by the EU, makes sense?

Roaring Elephant

Play Episode Listen Later Jul 22, 2025 21:46


Who said politics never did anything good for us? Here is a (not so?) brand-new DNS service that you can use to avoid giving ever more data to commercial entities, but to the E.U. instead! Please use the Contact Form on this blog or our twitter feed to send us your questions, or to suggest future episode topics you would like us to cover.

Cyber Security Today
Cybersecurity Today: DNS Malware, SonicWall Backdoor, Military Breach, and BigONE Crypto Hack

Cyber Security Today

Play Episode Listen Later Jul 18, 2025 9:31 Transcription Available


In today's episode, host Jim Love covers recent cybersecurity threats, including malware hidden in DNS records, a custom backdoor targeting SonicWall SMA devices, the US military assuming a network compromise after Chinese hackers targeted VPNs and email servers, and a $27 million theft from the BigONE crypto exchange. The show highlights how attackers are using innovative techniques to evade detection and emphasizes the need for increased vigilance in monitoring and securing systems. 00:00 Introduction to Cybersecurity News 00:26 Malware Hidden in DNS Records 02:26 SonicWall Devices Under Attack 04:30 US Military Breach by Chinese Hackers 07:07 $27 Million Crypto Theft 08:58 Conclusion and Listener Engagement

Packet Pushers - Full Podcast Feed
IPB179: IPv6 DNS Gotchas

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Jul 17, 2025 23:51


Let’s talk about common misconceptions regarding DNS and IPv6. We’ve heard these often enough that we felt we should talk through each one. We cover issues including what kind of DNS record types can be returned via IPv6 (and IPv4, too), more details on what really goes on with Happy Eyeballs, and combining A/AAAA records... Read more »

Packet Pushers - IPv6 Buzz
IPB179: IPv6 DNS Gotchas

Packet Pushers - IPv6 Buzz

Play Episode Listen Later Jul 17, 2025 23:51


Let’s talk about common misconceptions regarding DNS and IPv6. We’ve heard these often enough that we felt we should talk through each one. We cover issues including what kind of DNS record types can be returned via IPv6 (and IPv4, too), more details on what really goes on with Happy Eyeballs, and combining A/AAAA records... Read more »

The Hedge
Hedge 274: DNS DELEG

The Hedge

Play Episode Listen Later Jul 17, 2025 46:09 Transcription Available


What is DNS Delegation and what is it used for? What is new in the Delegation world, and what impact does it have on DNS security and operations? George Michaelson joins Tom Ammon and Russ White for a discussion about DNS DELEG in this episode of the Hedge.

Jeg kan ingenting om vin
GJENHØR: 32 - Den beste vinen til Grillmat

Jeg kan ingenting om vin

Play Episode Listen Later Jul 17, 2025 31:28


Alt du trenger å vite om vin. Med Thomas Giertsen og DNs vinjournalist Merete Bø. Hosted on Acast. See acast.com/privacy for more information.

The CyberWire
Chrome's high-risk bug gets squashed.

The CyberWire

Play Episode Listen Later Jul 16, 2025 30:20


Google and Microsoft issue critical updates. CISA warns of active exploitation of a critical flaw in Wing FTP Server. Cloudflare restores their DNS Resolver service following a brief outage. A critical vulnerability in a PHP documentation tool allows attackers to execute code on affected servers. NSA and FBI officials say they've disrupted Chinese cyber campaigns targeting U.S. critical infrastructure. A UK data breach puts Afghan soldiers and their families at risk. Researchers find malware hiding in DNS records. A former U.S. Army soldier pleads guilty to charges of hacking and extortion. Ben Yelin joins us with insights on the Senate Armed Services Committee's response to rising threats to critical infrastructure.The large print giveth and the small print taketh away.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Ben Yelin, co host of our Caveat podcast and Program Director for Public Policy & External Affairs at the University of Maryland Center for Cyber Health and Hazard Strategies, discussing the Senate Armed Services Committee's and Trump administration nominees' recent conversation about rising threats to critical infrastructure. You can find the article Ben discusses here. Selected Reading Google fixes actively exploited sandbox escape zero day in Chrome (Bleeping Computer) Windows KB5064489 emergency update fixes Azure VM launch issues (Bleeping Computer) Exploited Wing file transfer bug risks ‘total server compromise,' CISA warns (The Record) Cloudflare 1.1.1.1 incident on July 14, 2025 (Cloudflare) Critical template Injection flaw in LaRecipe Documentation Package enables remote code execution (Beyond Machines) NSA: Volt Typhoon was ‘not successful' at persisting in critical infrastructure (The Record) Defence secretary 'unable to say' if anyone killed after Afghan data breach  (BBC News) Hackers exploit a blind spot by hiding malware inside DNS records (Ars Technica) 21-year-old former US soldier pleads guilty to hacking, extorting telecoms  (The Record) WeTransfer says files not used to train AI after backlash (BBC News) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Crackin' Backs Podcast
Move Like a Baby, Heal Like a Pro - Dr. Michael Rintala

The Crackin' Backs Podcast

Play Episode Listen Later Jul 14, 2025 51:52 Transcription Available


Ever wonder why chronic pain persists or why some athletes effortlessly maintain peak performance? Join us for a powerful conversation with world-renowned chiropractor and DNS (Dynamic Neuromuscular Stabilization) expert, Dr. Michael Rintala. In this captivating and insightful episode, Dr. Rintala shares his personal journey from enduring a severe spinal injury as a collegiate tennis player to becoming one of the globe's top specialists in movement optimization and rehabilitation.What You'll Discover:DNS Explained: Learn how Dynamic Neuromuscular Stabilization taps into natural, infant-based movements to reset your body's innate stability patterns, relieving pain and enhancing performance.Breath as Medicine: Understand how something as simple as breathing can dramatically improve core strength, stability, and overall health.Mindful Movement: Hear how Dr. Rintala integrates mindfulness and meditation into rehabilitation, creating profound physical and mental resilience.Behind-the-Scenes Stories: Gain insights from Dr. Rintala's experiences working with professional surfers, PGA golfers, dancers, and everyday patients, including fascinating recovery success stories and surprising athletic insights.Practical Tools: Get actionable DNS exercises, posture tips, and breathing techniques you can apply immediately, whether you're a healthcare provider, athlete, or someone simply aiming for better movement and less pain in daily life.Who is Dr. Michael Rintala? Dr. Michael Rintala, DC, is one of only 18 international DNS instructors trained at the renowned Prague School of Rehabilitation under Prof. Pavel Kolář. He's a trusted practitioner for professional athletes from the World Surf League and the PGA Tour, blending chiropractic care, ART, and DNS principles to achieve remarkable outcomes in performance and injury recovery.Connect with Dr. Rintala:Website: Rintala Chiropractic & Sports MedicineInstagram: @rintalachiroFacebook: Rintala ChiropracticLearn more about DNS: Rehabilitation Prague SchoolJoin us as we laugh, learn, and dive deep into how rediscovering the basics of human movement can radically improve your life. Whether you're a seasoned clinician, athlete, or just someone seeking lasting health, this episode is filled with gems you won't want to miss!We are two sports chiropractors, seeking knowledge from some of the best resources in the world of health. From our perspective, health is more than just “Crackin Backs” but a deep dive into physical, mental, and nutritional well-being philosophies. Join us as we talk to some of the greatest minds and discover some of the most incredible gems you can use to maintain a higher level of health. Crackin Backs Podcast

Breaking Badness
Why DNS Is Still the Biggest Blind Spot in Threat Intelligence

Breaking Badness

Play Episode Listen Later Jul 10, 2025 46:40


In this episode, DomainTools' Daniel Schwalbe is joined by Renee Burton (Infoblox), Raymond Dijkxhoorn (Surbl), and Peter Lowe (FIRST.org) to unpack the inaugural DomainTools Intelligence Report and what it reveals about DNS-based threats in 2024. The panel digs into evolving detection challenges, the pitfalls of domain scoring, the growing complexity of threat actor behavior, and why industry collaboration continues to lag. They explore topics like aging domains, TLD abuse, data sharing barriers, and the creative lengths bad actors go to avoid detection. Whether you're building threat intel tools or blocking domains at the edge, this conversation is a must-listen for anyone in DNS-based security.

HappyCast
The Copper Kings 100 Recap: Grit, Grace, and a Little Too Much Cheese

HappyCast

Play Episode Listen Later Jul 9, 2025 106:19


In this special fourth appearance, Wes Plate returns to HappyCast with a full breakdown of the inaugural Copper Kings 100—Montana's newest hundred-mile race and his most ambitious project yet. With co-hosts Stephanie and Andrew, Wes opens up about what it took to bring this dream to life: from months of preparation and a jam-packed U-Haul to navigating stormy skies, deadfall-filled trails, and the high-stakes logistics of a remote mountain race. Spoiler: not even a lightning storm during the race briefing could shake this crew.Stephanie recaps her experience captaining the Our Lady of the Rockies aid station—a mountaintop post where she and a team of volunteers (including both her and Wes's moms) kept runners alive with mashed potatoes, heated bathrooms, and the occasional mid-hallucination pep talk. Between walking every runner up the hill, managing drop bags and puke blankets, and making sure no one missed the cutoff, this became a spiritual checkpoint for runners and crew alike.With 90 finishers out of 105 starters and only one DNS, the Copper Kings 100 defied all expectations for a first-year race. Wes reflects on what went right, what he learned, and how much this community has grown around a course that winds through solitude, scenery, and suffering. Whether you're an aspiring race director, a trail runner dreaming of Montana, or just here for stories about flamingo costumes and blowing up propane heaters, this episode is packed with heart, hustle, and humor.Be sure to subscribe to the podcast wherever you listen, and we always appreciate you leaving a good rate and review. Join the Facebook Group and follow us on Instagram and check out our website for the more episodes, posts and merchandise coming soon. Have a topic you'd like to hear discussed in depth, or a guest you'd like to nominate? Email us at info@happyendingstc.org

Cables2Clouds
How To Interview With a Tech Giant: Part 3

Cables2Clouds

Play Episode Listen Later Jul 9, 2025 34:32 Transcription Available


Send us a textCloud network engineering interviews at tech giants require specialized knowledge beyond traditional networking – particularly when it comes to cloud-native services. In this final installment of our interview preparation series with Kam Agahian, we explore the specialized networking services that frequently appear in technical assessments.Security takes center stage as we discuss the critical boundary between networking and security responsibilities. Kam explains that while routing traffic to firewalls falls squarely on the network engineer, security policies and posture typically belong to dedicated security teams at larger organizations. We compare traditional VM-based third-party firewalls with cloud-native security services, highlighting the architectural considerations for each approach.DNS architectures represent another technical area where candidates must demonstrate proficiency. Beyond understanding traditional name resolution, you'll need familiarity with the hybrid cloud architectures that enable communication between on-premises and cloud environments. Kam singles out DNSSEC as deserving special attention during your preparation.The landscape of multi-cloud connectivity has evolved dramatically, moving beyond simple cross-cloud connections to sophisticated integration patterns. Candidates who demonstrate awareness of recent developments – like Oracle's strategy of placing databases directly in other providers' data centers – stand out in interviews by showing they stay current with industry trends.Throughout our conversation, we emphasize research as a critical interview preparation strategy. Review all cloud-related job postings at your target company to understand their technology ecosystem and identify potential multi-cloud scenarios. This contextual knowledge allows you to tailor your responses to the specific environment you'll potentially be working in.What questions do you have about preparing for cloud networking interviews? Share your thoughts and join the conversation about navigating these complex technical assessments.Connect with our guest:https://www.linkedin.com/in/agahian/Purchase Chris and Tim's new book on AWS Cloud Networking: https://www.amazon.com/Certified-Advanced-Networking-Certification-certification/dp/1835080839/ Check out the Fortnightly Cloud Networking Newshttps://docs.google.com/document/d/1fkBWCGwXDUX9OfZ9_MvSVup8tJJzJeqrauaE6VPT2b0/Visit our website and subscribe: https://www.cables2clouds.com/Follow us on BlueSky: https://bsky.app/profile/cables2clouds.comFollow us on YouTube: https://www.youtube.com/@cables2clouds/Follow us on TikTok: https://www.tiktok.com/@cables2cloudsMerch Store: https://store.cables2clouds.com/Join the Discord Study group: https://artofneteng.com/iaatj

The Cabral Concept
3431: Reduced Pancreatic Function, Liposomal Glutathione & Toxins, Itching During Exercise, Using Moringa Powder, Protocols While Traveling (HouseCall)

The Cabral Concept

Play Episode Listen Later Jun 28, 2025 15:35


Welcome back to our weekend Cabral HouseCall shows! This is where we answer our community's wellness, weight loss, and anti-aging questions to help people get back on track! Check out today's questions:    Yvonne: Have just been advised, based upon blood work, that I have reduced pancreatic function (52.2%). My diet contains no sugar (I use stevia or monk fruit or natural sugars in fruits such as dates) and don't eat any highly processed foods, no gluten… so basically a clean diet. I also exercise, am not overweight. Was told I am pre-diabetic with an A1C of 6. Had a sample of a 4continuous glucose monitor - lowest rate was 5 and highest one time 2 hrs after eating was 10. I intermittent fast usually from about 2 - 3 p.m. until around 7 a.m. Is there anything else I can do to ensure pancreatic function doesn't continue to decline as I don't want to be on a pharmaceutical. Thanks.                                                            Lynn: I only recently heard about liposomal vitamins for the first time. Now I seem to be hearing about them everywhere, including on last week's House Call where you recommended Liposomal Glutathione to help with exposure to harsh toxins. Are liposomal vitamins better than "regular" vitamins. Or are there certain vitamins that are better if taken in liposomal form? Thanks!                                                                         Jenna: I had 6 meniscus, 1 PCL & 2 ACL surgeries. Thank you collegiate soccer. I noticed in my mid 20's after half of the surgeries, I would get a deep tingling and itch in my thighs while taking walks. I could prevent it from getting out of control if I had very tight compression workout pants on. But if I wore shorts, game over… I would scratch my thighs til it broke blood vessels. I don't know if it's a neurological or lymph/blood issue but no one seems to understand what I'm talking about. I would love to find an answer. I listened to the podcast about tingling skin but I'm not sure where to start.                    Anonymous: Hi Dr Cabral, thank you for all you do! Was just wondering how often and how much Moringa powder is safe to use? Would it be okay to add to a smoothie daily along with the greens powder and DNS? I have a Moringa tree and like to make my own powder. Also what are your thoughts on creatine for after or before a workout? Thank you             Laura: Hi dr. Cabral! Thank you so much for sharing all your experience and knowledge with the community! I have dealt with got issues probably my whole life and I've been told I probably have sibo and Candida. So I am currently doing the CBO protocol. At the end of my protocol, my family has a trip planned to go to Tokyo Japan. Do you have any tips for me of what I can do to not ruin all my progress? And keep my gut bacteria healthy? Should I start the CBO finisher while I am there? I also am interested in doing the parasite cleanse. Can I do the para cleanse while I'm doing the CBO finisher after I get home? Any travel suggestions would be great! Thank you so much!                                                                                                                       TAKEAWAYS     Thank you for tuning into today's Cabral HouseCall and be sure to check back tomorrow where we answer more of our community's questions!    - - - Show Notes and Resources: StephenCabral.com/3431 - - - Get a FREE Copy of Dr. Cabral's Book: The Rain Barrel Effect - - - Join the Community & Get Your Questions Answered: CabralSupportGroup.com - - - Dr. Cabral's Most Popular At-Home Lab Tests: > Complete Minerals & Metals Test (Test for mineral imbalances & heavy metal toxicity) - - - > Complete Candida, Metabolic & Vitamins Test (Test for 75 biomarkers including yeast & bacterial gut overgrowth, as well as vitamin levels) - - - > Complete Stress, Mood & Metabolism Test (Discover your complete thyroid, adrenal, hormone, vitamin D & insulin levels) - - - > Complete Food Sensitivity Test (Find out your hidden food sensitivities) - - - > Complete Omega-3 & Inflammation Test (Discover your levels of inflammation related to your omega-6 to omega-3 levels) - - - Get Your Question Answered On An Upcoming HouseCall: StephenCabral.com/askcabral - - - Would You Take 30 Seconds To Rate & Review The Cabral Concept? The best way to help me spread our mission of true natural health is to pass on the good word, and I read and appreciate every review!  

exercise traveling function acl protocols toxins reduced powder dns cabral cbo itching house calls a1c glutathione free copy pancreatic tokyo japan moringa pcl liposomal complete stress complete omega inflammation test discover complete candida metabolic vitamins test test mood metabolism test discover complete food sensitivity test find
Security Now (MP3)
SN 1031: How Salt Typhoon Gets In - What "AI" Really Means

Security Now (MP3)

Play Episode Listen Later Jun 25, 2025 180:38


China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security