Hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network
POPULARITY
Categories
Today’s show is in memory of Fred Baker, who passed away on June 18, 2025. Fred was a pivotal figure in the IPv6 community. He was the long-time chair of the v6ops working group, and had a distinguished career at Cisco as a Technical Fellow. To honor Fred and his contributions, we’re sharing our interview... Read more »
SEO Visibility for Better Business Structure with SEO Expert, Favour Obasi-ike, MBA, MSIn this SEO visibility episode, Favour emphasizes the crucial role of strategic business structure and SEO visibility tactics for online success. The core idea revolves around distributing content across various digital platforms, asserting that a strong online presence necessitates more than just social media. The discussion extends to the importance of keyword research, content pillars, and analytical tools like Google Search Console and SEO Gets, all aimed at optimizing a business's digital footprint for long-term growth and effective customer engagement.FAQs1. What is the fundamental principle for improving business visibility online?The core principle for improving online business visibility is having a strong business structure. Just as a soccer player needs to be in the right physical position to make a shot, a business needs to be in the right online position to make sales. 2. How does an effective website contribute to business visibility and customer retention?An effective website serves as a central hub for your online presence. To stay relevant in 2025 and beyond, a website must consistently create valuable content that encourages visitors to return. This is likened to a restaurant serving good food: if customers love it, they'll come back, tell their friends, and promote it.The more questions a website answers, the more useful and visible it becomes, leading to increased traffic and customer loyalty.3. What is a key SEO visibility tactic discussed, and why is it effective?Podcasting is highlighted as a highly effective SEO visibility tactic. The speaker's own podcast, "We Don't PLAY" has achieved significant global ranking, demonstrating its power. Podcasting is effective because, as a host, you become the author and controller of the content. Listeners learn from you, connect with your message, and are likely to return, share, and subscribe. 4. What is the significance of a business's "online location" and underlying internet infrastructure?Even without a physical "brick and mortar" location, a business has an online "location" rooted in its website and underlying internet infrastructure. This includes its domain name, which is managed by entities like ICANN (Internet Corporation for Assigned Names and Numbers) and translated by DNS (Domain Name System) into an IP address, connecting users to the desired website. Just as a physical business is registered within a state, an online business has its digital "address." Understanding this infrastructure, including elements like DNS records and mail exchange records for business emails, is crucial for maintaining operational stability, ensuring proper email function, and effectively distributing a business's online presence globally.Access to Resources ⬇️Need SEO Services?>> Join our club community for exclusive information
Today’s show is in memory of Fred Baker, who passed away on June 18, 2025. Fred was a pivotal figure in the IPv6 community. He was the long-time chair of the v6ops working group, and had a distinguished career at Cisco as a Technical Fellow. To honor Fred and his contributions, we’re sharing our interview... Read more »
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
Send us a textThe invisible threads connecting Kubernetes and networking infrastructure form the backbone of today's cloud-native world. In this revealing conversation with Marino Wijay from Kong, we unravel the complex relationship between traditional networking concepts and modern container orchestration.Marino brings a unique perspective as someone who entered the Kubernetes ecosystem through networking, explaining how fundamental networking principles directly translate to Kubernetes operations. "If you don't have a network, there is no Kubernetes," he emphasizes, highlighting how reachability between nodes forms the foundation of cluster communication.The network evolution within Kubernetes proves fascinating – from the early "black box" approach where connectivity was implicit to the sophisticated Container Network Interfaces (CNIs) like Cilium that offer granular control. Network engineers approaching Kubernetes for the first time might feel overwhelmed, but as we discover, concepts like DHCP with DNS registration, NAT, and load balancing all have direct parallels within the Kubernetes networking model.Our discussion ventures into the practical challenges organizations face when implementing service mesh technologies. While offering powerful capabilities for secure pod-to-pod communication through mutual TLS, service mesh introduces significant complexity. Marino shares insights on when this investment makes sense for enterprises versus smaller organizations with more controlled environments.The conversation takes an especially interesting turn when exploring how AI workloads are transforming Kubernetes networking requirements. From GPU-enabled clusters to specialized traffic patterns and the concept of Dynamic Resource Allocation as "QoS for AI," we examine how these resource-intensive applications are pushing the boundaries of what's possible.Whether you're a network engineer curious about containers or a Kubernetes administrator looking to deepen your networking knowledge, this episode bridges crucial gaps between these interconnected worlds. Subscribe to Cables to Clouds for more insights at the intersection of networking and cloud technologies!https://www.linkedin.com/in/mwijay/Purchase Chris and Tim's new book on AWS Cloud Networking: https://www.amazon.com/Certified-Advanced-Networking-Certification-certification/dp/1835080839/ Check out the Fortnightly Cloud Networking Newshttps://docs.google.com/document/d/1fkBWCGwXDUX9OfZ9_MvSVup8tJJzJeqrauaE6VPT2b0/Visit our website and subscribe: https://www.cables2clouds.com/Follow us on BlueSky: https://bsky.app/profile/cables2clouds.comFollow us on YouTube: https://www.youtube.com/@cables2clouds/Follow us on TikTok: https://www.tiktok.com/@cables2cloudsMerch Store: https://store.cables2clouds.com/Join the Discord Study group: https://artofneteng.com/iaatj
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
Making music with code in real time, fancy rsync, an open source real time strategy engine, advanced print debugging, EU-based DNS resolvers, and European government departments moving away from Microsoft and they might stick with Linux and FOSS this time. Discoveries Strudel rsyncy Spring IceCream DNS4EU News/discussion Two city governments in Denmark are... Read More
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine compliance. We'll discuss what a modern, strategic access management approach looks like and how passwordless authentication solutions are closing the gap between security and usability. To learn more about passwordless authentication in healthcare and other critical industries, check out our whitepapers on the topic: https://security.imprivata.com/putting-complex-passwords-to-work-for-you-wp.html https://www.imprivata.com/resources/whitepapers/passwordless-journey-healthcare This segment is sponsored by Imprivata. Visit https://securityweekly.com/imprivataidv to learn more about them! As digital identities multiply and certificate lifespans shrink, enterprises face growing challenges in securing trust across users, devices, and systems. This session explores why unifying PKI and IAM is essential to closing identity-related trust gaps and how platforms like DigiCert ONE—integrating PKI, DNS, and automation—help eliminate outages, streamline security operations, and future-proof organizations. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertidv to learn more about them! Identity-related attacks are now the dominant threat vector in cybersecurity, yet most organizations remain hindered by fragmented tools, siloed data, and disconnected teams. “Multiplayer AI” offers a new model for identity security, emphasizing interoperability between human experts and AI agents to create a unified, real-time system of systems. By fostering collaboration through open standards and shared intelligence, enterprises can close security gaps, reduce attacker dwell time, and respond faster—transforming identity security from isolated defense into coordinated resilience. https://www.radiantlogic.com/blog/the-dentity-security-paradox-when-more-tools-create-bigger-blind-spots/ This segment is sponsored by Radiant Logic. Visit https://securityweekly.com/radiantlogicidv to learn more about them! In this era of technological advancements where businesses are going digital and more cloud based while preferring remote work environment, cyber threats are surprising growing at the rate never seen before. This makes Identity and Access Management (IAM) and Privileged Access Management (PAM) no more an optional thing but a core crucial requirement. These are not just IT tools anymore- they are important for the security of people, data, and operations. More and more organizations from different industries are now turning to IAM and PAM as managed services to handle the growing complexity of access control and cybersecurity. Why? Because managing identity internally is becoming harder, more expensive, and riskier. With a trusted managed service partner, businesses gain expert support, 24/7 monitoring, scalability, and peace of mind—all while staying compliant and secure. This segment will explore how IAM and PAM managed services are helping companies reduce risk, simplify operations, and stay ahead of evolving security challenges. Whether you're an IT leader, security professional, or business decision-maker, you'll learn why outsourcing identity and access management is quickly becoming a smart, strategic move for the modern enterprise https://www.idmexpress.com/blogs https://www.idmexpress.com/post/cyberark-privileged-access-management-pam-implementation https://www.idmexpress.com/iam-products This segment is sponsored by IDMEXPRESS. Visit https://securityweekly.com/idmidv to implement and manage IAM and PAM solutions tailored to your business needs. Duo's biggest announcement since push-MFA. Duo is defining the future of Identity by unveiling a solution that attackers will hate and users will love. This segment is sponsored by Cisco Duo. Visit https://securityweekly.com/duoidv to learn more about them! In this interview, we will explore the power of data-driven identity leadership and how organizations can leverage analytics to enhance their identity security strategies. Hear insights on aligning data with business goals, improving decision-making, and proactively managing risk. Learn how analytics can transform your identity program from reactive to strategic, driving measurable success. This segment is sponsored by Saviynt. Visit https://securityweekly.com/saviyntidv to learn more about them or get a free demo! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-412
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine compliance. We'll discuss what a modern, strategic access management approach looks like and how passwordless authentication solutions are closing the gap between security and usability. To learn more about passwordless authentication in healthcare and other critical industries, check out our whitepapers on the topic: https://security.imprivata.com/putting-complex-passwords-to-work-for-you-wp.html https://www.imprivata.com/resources/whitepapers/passwordless-journey-healthcare This segment is sponsored by Imprivata. Visit https://securityweekly.com/imprivataidv to learn more about them! As digital identities multiply and certificate lifespans shrink, enterprises face growing challenges in securing trust across users, devices, and systems. This session explores why unifying PKI and IAM is essential to closing identity-related trust gaps and how platforms like DigiCert ONE—integrating PKI, DNS, and automation—help eliminate outages, streamline security operations, and future-proof organizations. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertidv to learn more about them! Identity-related attacks are now the dominant threat vector in cybersecurity, yet most organizations remain hindered by fragmented tools, siloed data, and disconnected teams. “Multiplayer AI” offers a new model for identity security, emphasizing interoperability between human experts and AI agents to create a unified, real-time system of systems. By fostering collaboration through open standards and shared intelligence, enterprises can close security gaps, reduce attacker dwell time, and respond faster—transforming identity security from isolated defense into coordinated resilience. https://www.radiantlogic.com/blog/the-dentity-security-paradox-when-more-tools-create-bigger-blind-spots/ This segment is sponsored by Radiant Logic. Visit https://securityweekly.com/radiantlogicidv to learn more about them! In this era of technological advancements where businesses are going digital and more cloud based while preferring remote work environment, cyber threats are surprising growing at the rate never seen before. This makes Identity and Access Management (IAM) and Privileged Access Management (PAM) no more an optional thing but a core crucial requirement. These are not just IT tools anymore- they are important for the security of people, data, and operations. More and more organizations from different industries are now turning to IAM and PAM as managed services to handle the growing complexity of access control and cybersecurity. Why? Because managing identity internally is becoming harder, more expensive, and riskier. With a trusted managed service partner, businesses gain expert support, 24/7 monitoring, scalability, and peace of mind—all while staying compliant and secure. This segment will explore how IAM and PAM managed services are helping companies reduce risk, simplify operations, and stay ahead of evolving security challenges. Whether you're an IT leader, security professional, or business decision-maker, you'll learn why outsourcing identity and access management is quickly becoming a smart, strategic move for the modern enterprise https://www.idmexpress.com/blogs https://www.idmexpress.com/post/cyberark-privileged-access-management-pam-implementation https://www.idmexpress.com/iam-products This segment is sponsored by IDMEXPRESS. Visit https://securityweekly.com/idmidv to implement and manage IAM and PAM solutions tailored to your business needs. Duo's biggest announcement since push-MFA. Duo is defining the future of Identity by unveiling a solution that attackers will hate and users will love. This segment is sponsored by Cisco Duo. Visit https://securityweekly.com/duoidv to learn more about them! In this interview, we will explore the power of data-driven identity leadership and how organizations can leverage analytics to enhance their identity security strategies. Hear insights on aligning data with business goals, improving decision-making, and proactively managing risk. Learn how analytics can transform your identity program from reactive to strategic, driving measurable success. This segment is sponsored by Saviynt. Visit https://securityweekly.com/saviyntidv to learn more about them or get a free demo! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-412
Making music with code in real time, fancy rsync, an open source real time strategy engine, advanced print debugging, EU-based DNS resolvers, and European government departments moving away from Microsoft and they might stick with Linux and FOSS this time. Discoveries Strudel rsyncy Spring IceCream DNS4EU News/discussion Two city governments in Denmark are... Read More
Pierre Pignault of MailSoar is this week's guest on Adult Site Broker Talk. Pierre Pignault is a seasoned email deliverability and security expert with over eight years of experience in optimizing email communications. As the CEO and Founder of MailSoar, he leads a dedicated team that enhances email infrastructure to maximize return on investment for clients worldwide. MailSoar's expertise encompasses auditing email infrastructure, setting up new infrastructure, and implementing deliverability best practices. The team's technical proficiency extends to SMTP protocols, mail servers, and DNS configurations, ensuring optimal email performance and security. Before establishing MailSoar, Pierre held various roles in business development and sales across the United States in multiple startups in California. These experiences have equipped him with a comprehensive understanding of client management and product-to-market fit. Pierre is also an active contributor to industry discussions, having participated in panels and summits focused on the future of email deliverability. His insights have been featured in various industry publications, reflecting his commitment to advancing the best email deliverability and security practices. MailSoar is a premium email deliverability agency that helps businesses improve their email performance by ensuring their messages land in recipients' inboxes instead of spam folders. The company specializes in deliverability audits and optimization, analyzing email performance, identifying issues, and improving inbox placement. Adult Site Broker is the most experienced company to broker adult sites. They've sold and helped people buy more xxx sites than any other broker. Adult Site Broker is the leading company to sell porn sites and buy porn sites. They help their clients work out equitable deals. Check out their at www.adultsitebroker.com, the leading destination to broker porn sites. Adult Site Broker also has an affiliate program, ASB Cash, at https://asbcash.com, where you can earn 20% by referring people to buy adult sites and sell adult sites to Adult Site Broker, the porn website broker. For more information, please visit us at www.adultsitebroker.com to help you broker adult sites. Listen to Pierre Pignault of MailSoar on Adult Site Broker Talk, starting today at https://adultsitebroker.com/podcast
In this podcast episode, host Michelle Frechette welcomes Carrie Dils, Mika Epstein, and Ryan McCue to discuss their roles in the WordPress community and the new FAIR project. The group explores FAIR's mission to create a federated independent repository system for WordPress plugins and themes, focusing on decentralization, community-driven moderation, inclusive governance, and privacy. They address challenges like supporting premium plugins, reducing environmental impact, and fostering global participation. The episode highlights FAIR's collaborative, open-source approach and invites listeners to get involved through GitHub and community meetings, aiming to shape a more innovative and inclusive WordPress ecosystem.Top Takeaways:FAIR Is Reimagining Plugin Discovery and Trust for WordPress: FAIR is building a more open, decentralized ecosystem for WordPress plugin discovery—empowering both end users and developers. By enabling verified directories and authenticated plugin listings (via methods like DNS verification), FAIR provides an alternative to the limitations of the WordPress.org repo, while increasing transparency, user safety, and trust.Community Participation Is Central to FAIR's Success: The FAIR initiative is deeply community-driven. Contributors are encouraged to get involved through GitHub Discussions, introduce themselves, offer help, or join working groups. The leadership team is intentionally building these groups based on people's skills and availability, rather than predefined roles—making FAIR flexible, inclusive, and open to evolving needs.FAIR Encourages Innovation Outside Traditional WordPress Constraints: The project provides an alternative path for plugin creators who may not want to follow the traditional WordPress.org model (e.g., having to release a free version first). With FAIR, creators can request to be listed in aggregator directories that are more flexible, values-aligned, or niche-focused—fostering innovation and lowering barriers to entry.FAIR Is Still in Early Development—and Actively Growing: While the FAIR plugin and protocol are live (accessible via fair.pm), the ecosystem is in its formative stages. The team is prioritizing essential needs (the “MVP”) and building infrastructure to support future growth in documentation, marketing, design, development, and user testing. They welcome feedback on plugin issues, conflicts, and ideas, encouraging broad experimentation and iteration.Mentioned in the Show:FAIRLinkedIn LearningAwesome MotiveLez Watch TVHuman MadeAspire PressGravatarLinux Foundation ProjectBlueskyWPCCBlack PressMastodon DrupalCourtney RobertsonAutomatticMediaWikiMonster InsightsGravity FormsFastly
Her early inspiration while growing up in Goa with limited exposure to career options. Her Father's intellectual influence despite personal hardships and shift in focus to technology.Personal tragedy sparked a resolve to become financially independent and learn deeply.Inspirational quote that shaped her mindset: “Even if your dreams haven't come true, be grateful that so haven't your nightmares.”Her first role at a startup with Hands-on work with networking protocols (LDAP, VPN, DNS). Learning using only RFCs and O'Reilly books—no StackOverflow! Importance of building deep expertise for long-term success.Experiences with Troubleshooting and System Thinking; Transitioned from reactive fixes to logical, structured problem-solving. Her depth of understanding helped in debugging and system optimization.Career move to Yahoo where she led Service Engineering for mobile and ads across global data centers got early exposure to big data and machine learning through ad recommendation systems and built "performance and scale muscle" through working at massive scale.Challenges of Scale and Performance Then vs. Now: Problems remain the same, but data volumes and complexity have exploded. How modern tools (like AI/ML) can help identify relevance and anomalies in large data sets.Design with Scale in Mind - Importance of flipping the design approach: think scale-first, not POC-first. Encourage starting with a big-picture view, even when building a small prototype. Highlights multiple scaling dimensions—data, compute, network, security.Getting Into ML and Data Science with early spark from MOOCs, TensorFlow experiments, and statistics; Transition into data science role at Infoblox, a cybersecurity firm with focus areas on DNS security, anomaly detection, threat intelligence.Building real-world ML model applications like supervised models for threat detection and storage forecasting; developing graph models to analyze DNS traffic patterns for anomalies and key challenges of managing and processing massive volumes of security data.Data stack and what it takes to build data lakes that support ML with emphasis on understanding the end-to-end AI pipelineShifts from “under the hood” ML to front-and-center GenAI & Barriers: Data readiness, ROI, explainability, regulatory compliance.Explainability in AI and importance of interpreting model decisions, especially in regulated industries.How Explainability Works -Trade-offs between interpretable models (e.g., decision trees) and complex ones (e.g., deep learning); Techniques for local and global model understanding.Aruna's Book on Interpretability and Explainability in AI Using Python (by Aruna C).The world of GenAI & Transformers - Explainability in LLMs and GenAI: From attention weights to neuron activation.Challenges of scale: billions of parameters make models harder to interpret. Exciting research areas: Concept tracing, gradient analysis, neuron behavior.GenAI Agents in Action - Transition from task-specific GenAI to multi-step agents. Agents as orchestrators of business workflows using tools + reasoning.Real-world impact of agents and AI for everyday lifeAruna Chakkirala is a seasoned leader with expertise in AI, Data and Cloud. She is an AI Solutions Architect at Microsoft where she was instrumental in the early adoption of Generative AI. In prior roles as a Data Scientist she has built models in cybersecurity and holds a patent in community detection for DNS querying. Through her two-decade career, she has developed expertise in scale, security, and strategy at various organizations such as Infoblox, Yahoo, Nokia, EFI, and Verisign. Aruna has led highly successful teams and thrives on working with cutting-edge technologies. She is a frequent technical and keynote speaker, panelist, author and an active blogger. She contributes to community open groups and serves as a guest faculty member at premier academic institutes. Her book titled "Interpretability and Explainability in AI using Python" covers the taxonomy and techniques for model explanations in AI including the latest research in LLMs. She believes that the success of real-world AI applications increasingly depends on well- defined architectures across all encompassing domains. Her current interests include Generative AI, applications of LLMs and SLMs, Causality, Mechanistic Interpretability, and Explainability tools.Her recently published book linkInterpretability and Explainability in AI Using Python: Decrypt AI Decision-Making Using Interpretability and Explainability with Python to Build Reliable Machine Learning Systems https://amzn.in/d/00dSOwAOutside of work, she is an avid reader and enjoys creative writing. A passionate advocate for diversity and inclusion, she is actively involved in GHCI, LeanIn communities.
Interpol's Operation Secure dismantles a major cybercrime network, and Singapore takes down scam centers. GitLab patches multiple vulnerabilities in its DevSecOps platform. Researchers unveil a covert method for exfiltrating data using smartwatches. EchoLeak allows for data exfiltration from Microsoft Copilot. Journalists are confirmed targets of Paragon's Graphite spyware. France calls for comments on tracking pixels. Fog ransomware operators deploy an unusual mix of tools. Skeleton Spider targets recruiters by posing as job seekers on LinkedIn and Indeed. Erie Insurance suffers ongoing outages following a cyberattack. Our N2K Lead Analyst Ethan Cook shares insights on Trump's antitrust policies. DNS neglect leads to AI subdomain exploits. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today, we share a selection from today's Caveat podcast where Dave Bittner and Ben Yelin are joined by N2K's Lead Analyst, Ethan Cook, to take a Policy Deep Dive into “The art of the breakup: Trump's antitrust surge.” You can listen to the full episode here and find new episodes of Caveat in your favorite podcast app each Thursday. Selected Reading Interpol takes down 20,000 malicious IPs and domains (Cybernews) Singapore leads multinational operation to shutter scam centers tied to $225 million in thefts (The Record) GitLab patches high severity account takeover, missing auth issues (Bleeping Computer) SmartAttack uses smartwatches to steal data from air-gapped systems (Bleeping Computer) Critical vulnerability in Microsoft 365 Copilot AI called EchoLeak enabled data exfiltration (Beyond Machines) Researchers confirm two journalists were hacked with Paragon spyware (TechCrunch) Tracking pixels: CNIL launches public consultation on its draft recommendation (CNIL) Fog ransomware attack uses unusual mix of legitimate and open-source tools (Bleeping Computer) FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters (The Record) Erie Insurance confirms cyberattack behind business disruptions (Bleeping Computer) Why Was Nvidia Hosting Blogs About 'Brazilian Facesitting Fart Games'? (404 Media) Secure your public DNS presence from subdomain takeovers and dangling DNS exploits (Silent Push) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
The Hexabuild team is providing a new community resource, an IPv6 compatibility checker, for those trying to figure out IPv6 network hardware and software compatibility. It’s currently in an alpha version. We talk about what inspired it, what it does, and possible future updates. We also want to get your feedback on whether this is... Read more »
The Hexabuild team is providing a new community resource, an IPv6 compatibility checker, for those trying to figure out IPv6 network hardware and software compatibility. It’s currently in an alpha version. We talk about what inspired it, what it does, and possible future updates. We also want to get your feedback on whether this is... Read more »
In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0 in Erlang/OTP's SSH library. Can Russia intercept Telegram? Perhaps. Spain's ISPs mistakenly block Google sites. Reddit sues Anthropic. Twitter's new encrypted DM's are as lame as the old ones. The Login.gov site may not have any backups. Apple explores the question of recent Large Reasoning Models "thinking" Show Notes - https://www.grc.com/sn/SN-1029-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow threatlocker.com for Security Now uscloud.com canary.tools/twit - use code: TWIT
In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0 in Erlang/OTP's SSH library. Can Russia intercept Telegram? Perhaps. Spain's ISPs mistakenly block Google sites. Reddit sues Anthropic. Twitter's new encrypted DM's are as lame as the old ones. The Login.gov site may not have any backups. Apple explores the question of recent Large Reasoning Models "thinking" Show Notes - https://www.grc.com/sn/SN-1029-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow threatlocker.com for Security Now uscloud.com canary.tools/twit - use code: TWIT
In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0 in Erlang/OTP's SSH library. Can Russia intercept Telegram? Perhaps. Spain's ISPs mistakenly block Google sites. Reddit sues Anthropic. Twitter's new encrypted DM's are as lame as the old ones. The Login.gov site may not have any backups. Apple explores the question of recent Large Reasoning Models "thinking" Show Notes - https://www.grc.com/sn/SN-1029-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow threatlocker.com for Security Now uscloud.com canary.tools/twit - use code: TWIT
In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0 in Erlang/OTP's SSH library. Can Russia intercept Telegram? Perhaps. Spain's ISPs mistakenly block Google sites. Reddit sues Anthropic. Twitter's new encrypted DM's are as lame as the old ones. The Login.gov site may not have any backups. Apple explores the question of recent Large Reasoning Models "thinking" Show Notes - https://www.grc.com/sn/SN-1029-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow threatlocker.com for Security Now uscloud.com canary.tools/twit - use code: TWIT
In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0 in Erlang/OTP's SSH library. Can Russia intercept Telegram? Perhaps. Spain's ISPs mistakenly block Google sites. Reddit sues Anthropic. Twitter's new encrypted DM's are as lame as the old ones. The Login.gov site may not have any backups. Apple explores the question of recent Large Reasoning Models "thinking" Show Notes - https://www.grc.com/sn/SN-1029-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow threatlocker.com for Security Now uscloud.com canary.tools/twit - use code: TWIT
In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0 in Erlang/OTP's SSH library. Can Russia intercept Telegram? Perhaps. Spain's ISPs mistakenly block Google sites. Reddit sues Anthropic. Twitter's new encrypted DM's are as lame as the old ones. The Login.gov site may not have any backups. Apple explores the question of recent Large Reasoning Models "thinking" Show Notes - https://www.grc.com/sn/SN-1029-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow threatlocker.com for Security Now uscloud.com canary.tools/twit - use code: TWIT
In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0 in Erlang/OTP's SSH library. Can Russia intercept Telegram? Perhaps. Spain's ISPs mistakenly block Google sites. Reddit sues Anthropic. Twitter's new encrypted DM's are as lame as the old ones. The Login.gov site may not have any backups. Apple explores the question of recent Large Reasoning Models "thinking" Show Notes - https://www.grc.com/sn/SN-1029-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow threatlocker.com for Security Now uscloud.com canary.tools/twit - use code: TWIT
In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0 in Erlang/OTP's SSH library. Can Russia intercept Telegram? Perhaps. Spain's ISPs mistakenly block Google sites. Reddit sues Anthropic. Twitter's new encrypted DM's are as lame as the old ones. The Login.gov site may not have any backups. Apple explores the question of recent Large Reasoning Models "thinking" Show Notes - https://www.grc.com/sn/SN-1029-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow threatlocker.com for Security Now uscloud.com canary.tools/twit - use code: TWIT
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
OctoSQL & Vulnerability Data OctoSQL is a neat tool to query files in different formats using SQL. This can, for example, be used to query the JSON vulnerability files from CISA or NVD and create interesting joins between different files. https://isc.sans.edu/diary/OctoSQL+Vulnerability+Data/32026 Mirai vs. Wazuh The Mirai botnet has now been observed exploiting a vulnerability in the open-source EDR tool Wazuh. https://www.akamai.com/blog/security-research/botnets-flaw-mirai-spreads-through-wazuh-vulnerability DNS4EU The European Union created its own public recursive resolver to offer a public resolver compliant with European privacy laws. This resolver is currently operated by ENISA, but the intent is to have a commercial entity operate and support it by a commercial entity. https://www.joindns4.eu/ WordPress FAIR Package Manager Recent legal issues around different WordPress-related entities have made it more difficult to maintain diverse sources of WordPress plugins. With WordPress plugins usually being responsible for many of the security issues, the Linux Foundation has come forward to support the FAIR Package Manager, a tool intended to simplify the management of WordPress packages. https://github.com/fairpm
The EU launches its own DNS service, Trump revises previous administrations' cyber executive orders, a supply chain attack hits popular NPM packages, and mysterious iOS attacks spotted in the wild. Show notes
Richard Feynman once dubbed turbulence “the last unsolved problem of classical physics.” Beyond the Navier–Stokes equations, no comprehensive statistical framework exists to predict how fluids spin, eddy, and cascade energy—whether in galactic jets, ocean currents, or the swirl of your morning coffee. But that might all be changing. In this episode, I sit down with theoretical physicist Sasha Migdal, who emerged from retirement with a bold, loop‑equation approach to turbulence. His formalism recasts the Navier–Stokes equations as an infinite number of linear, readily solvable equations that track circulation around closed loops in the fluid—offering, for the first time, a tractable statistical framework for chaotic flow. We chart Sasha's remarkable journey: from a promising career at the Landau Institute and Russian Space Institutes, where he resisted KGB pressure to compromise his work, to his defection to the United States in the late 1980s. We discuss his time outside of physics, and then delve into his return, and his novel approach to solving Navier–Stokes. Since we recorded, his theory has advanced rapidly. A rigorous proof now shows that it is the solution to the Navier–Stokes (NS) loop equation. The theory has also been extended to magnetohydrodynamics and turbulent mixing. Recent large-scale direct numerical simulations (DNS) match the theoretical predictions with even greater accuracy. ►Watch On YouTube: https://youtu.be/BNORi7mxxzg ►Find out more about Sasha's work here: https://alexandermigdal.com/ https://sashamigdal.github.io/TurbulenceDuality/index.html ►For a more technical overview of Sasha's work you can check out his recent talk at the IAS: https://www.youtube.com/watch?v=mgvGA6q7oPY
In this episode of Tech Talks Daily, I sat down with Ashley Stevenson, VP of Product and Solution Marketing at DigiCert, to explore the shifting landscape of digital trust. We are living in a time where certificate-related outages still disrupt critical systems, identity management is becoming more complex, and the arrival of quantum computing is no longer a distant concern. Ashley brought clarity to these issues with a practical look at how DigiCert is helping organizations manage trust at scale. Our conversation began with the foundational role DNS and PKI play in digital infrastructure. While most users never think about them, every secure connection begins with DNS resolving a domain and PKI establishing trust. DigiCert has combined these layers in a single platform, DigiCert1, designed to automate and simplify how trust is managed across networks, users, and connected devices. We explored the increasing importance of certificate lifecycle management. With certificate lifespans moving from 398 days to just 47 by 2029, and domain validations required every 10 days, automation is no longer a convenience. It is a necessity. DigiCert1 addresses this through centralized inventory, policy enforcement, proactive notifications, and full automation from issuance to installation. Ashley also shared insights on the convergence of PKI and identity and access management. From IoT to human users, digital identities are multiplying and evolving. PKI is playing a larger role in enabling passwordless authentication and supporting verifiable credentials, especially as organizations move toward privacy-enhancing and standards-based models. Looking ahead, we discussed quantum readiness and crypto agility. DigiCert is already helping customers evaluate which systems are most vulnerable and preparing them to adopt quantum-safe algorithms when needed. Whether the concern is policy change, an unexpected breach, or emerging tech, the ability to adapt quickly is key. How do you build a strategy for trust that adapts to this pace of change? This episode offers an inside look at how DigiCert is answering that question.
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.Two significant crypto security breaches occurred in close succession this month, affecting both decentralized and centralized platforms. On May 22, Cetus—a decentralized exchange built on the Sui Network—was exploited via a vulnerability in its automated market maker (AMM). Meanwhile, Coinbase confirmed what it called a “targeted insider threat operation” that compromised data from less than 1% of its active monthly users.A threat group identified as “Hazy Hawk” has been systematically hijacking cloud-based DNS resources tied to well-known organizations, including the US Centers for Disease Control and Prevention (CDC), since December 2023. A newly disclosed vulnerability in Windows Server 2025, dubbed BadSuccessor, has raised major concerns among enterprise administrators managing Active Directory environments.Federal and international law enforcement, alongside a significant number of private-sector partners, have successfully dismantled the Danabot botnet in a multiyear operation aimed at neutralizing one of the more advanced malware-as-a-service (MaaS) platforms tied to Russian cybercriminal activity.
From 2023 to 2024, ransomware has seen a 67 percent jump, with an average payment of $2 million and another $2.7 million in recovery costs for most companies that are hit by an attack. Fortunately, there are multiple steps businesses can take to lower the risk of being a victim. In this episode, Adam Keown, global CISO at Eastman, joins host Heather Engel to discuss protective DNS and how it can aid businesses in the fight against ransomware. • For more on cybersecurity, visit us at https://cybersecurityventures.com
Podcast: CiberAfterWork: ciberseguridad en Capital RadioEpisode: Episodio 298: El Apagón, las Infraestructuras Críticas y la CiberseguridadPub date: 2025-06-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationEn este episodio se habla del gran apagón que sufrió España y se analiza si pudo haber sido causado por un ciberataque, aunque el consenso del mercado lo descarta, y reflexionando sobre la vulnerabilidad de las infraestructuras críticas ante tales eventos. También se detalla la rápida aparición de ciberestafas relacionadas con el apagón, demostrando la adaptabilidad de los ciberdelincuentes. Posteriormente, el programa presenta una solución de seguridad basada en DNS para proteger la navegación web en empresas y dispositivos, enfatizando su facilidad de instalación y personalización. Finalmente, se informa sobre un ciberataque de ransomware al Ayuntamiento de Badajoz y el desmantelamiento por parte del FBI de una plataforma de "Fishing as a Service", resaltando la importancia de la prevención, detección y respuesta en ciberseguridad. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/The podcast and artwork embedded on this page are from psaneme, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
Podcast: CiberAfterWork: ciberseguridad en Capital RadioEpisode: Episode 298: The Blackout, Critical Infrastructures, and CybersecurityPub date: 2025-06-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationThis episode discusses the major power blackout in Spain, analyzing if it could have been caused by a cyberattack, although market consensus discards this possibility. It also reflects on the vulnerability of critical infrastructures to such events. The program also details the rapid appearance of cyber scams related to the blackout, demonstrating the adaptability of cybercriminals. Subsequently, the program presents a DNS-based security solution (Flash Start) to protect web browsing in companies and on devices, emphasizing its ease of installation and customization. Finally, it reports on a ransomware cyberattack on the Ayuntamiento de Badajoz and the dismantling by the FBI of a "Fishing as a Service" platform, highlighting the importance of prevention, detection, and response in cybersecurity. Twitter: @ciberafterwork Instagram: @ciberafterwork Panda Security: https://www.pandasecurity.com/es/ +info: https://psaneme.com/ https://bitlifemedia.com/ https://www.vapasec.com/ VAPASEC https://www.vapasec.com/ https://www.vapasec.com/webprotection/The podcast and artwork embedded on this page are from psaneme, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
A flashback to the invention of the DNS. One of my favorite interviews on the Domain Name Wire Podcast was from 2016, when I interviewed DNS inventor Paul Mockapetris. On today's show, I'm replaying that interview. You'll hear about the early days of the DNS, including why it was created. Paul also confirmed that some […] Post link: Greatest hits: inventing the DNS – DNW Podcast #537 © DomainNameWire.com 2025. This is copyrighted content. Domain Name Wire full-text RSS feeds are made available for personal use only, and may not be published on any site without permission. If you see this message on a website, contact editor (at) domainnamewire.com. Latest domain news at DNW.com: Domain Name Wire.
Send us a textIhab Shraim shares his expertise on domain security and why it represents the "missing chapter" in modern cybersecurity strategy. We explore how AI is accelerating cyber threats from years to weeks and why protecting your online presence is more critical than ever.• Domain security is often overlooked despite being critical to an organization's reputation and online presence• Over 93% of security professionals can't identify their company's domain registrar or DNS provider• Modern cyber criminals are sophisticated organizations who target "soft targets" rather than heavily defended perimeters• AI-powered tools like FraudGPT and WormGPT enable custom malware creation for as little as $200 on the dark web• Voice cloning and deepfake technologies are being used in increasingly convincing social engineering attacks• Zero Trust architecture and layered security approaches are essential for comprehensive protection• Blended attacks targeting multiple systems simultaneously represent the future of cyber warfare• Reputation management encompasses domain protection, brand abuse prevention, and counterfeit detection• Personal data protection requires vigilance about what you share online and implementing proper security at home• Companies must have actionable response plans, not just detection capabilitiesConnect with Ihab Shraim on LinkedIn or email him at ihab.shraim@cscglobal.com to learn more about domain security and protecting your online presence.Digital Disruption with Geoff Nielson Discover how technology is reshaping our lives and livelihoods.Listen on: Apple Podcasts SpotifySupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast
In this episode of Double Tap, Steven and Shaun dive into real-world accessibility wins, AI breakthroughs like Gemini Live, and listener feedback from around the globe. Plus, Hable Co-founder Freek van Welsenis shares a special offer on the Hable One and Hable Easy.The show kicks off with tech support frustrations, DNS workarounds, and the strange case of WhatsApp syncing only on mobile data. Steven and Shaun then explore Copilot integration, AI writing tools on Outlook, and new voice-activated features on Windows and iOS. A standout moment comes when Steven uses Gemini Live to help iron a shirt—demonstrating the growing usefulness of AI for blind users in everyday tasks.Later, they take listener emails, covering everything from Android accessibility tips and Linux editing challenges, to frustrations with podcast playback on Victor Reader. The episode also includes an in-depth conversation with Freek van Welsenis of Hable, who announces a worldwide 15% discount for Double Tap listeners and shares insights on user feedback, Hable Easy adoption, and training support.Relevant LinksSubscribe to Double Tap newsletter: https://doubletaponair.com/subscribeHable 15% discount code (double15): https://www.iamhable.com/pages/doubletapHable One & Easy overview: https://www.iamhable.com/ Find Double Tap online: YouTube, Double Tap Website---Follow on:YouTube: https://www.doubletaponair.com/youtubeX (formerly Twitter): https://www.doubletaponair.com/xInstagram: https://www.doubletaponair.com/instagramTikTok: https://www.doubletaponair.com/tiktokThreads: https://www.doubletaponair.com/threadsFacebook: https://www.doubletaponair.com/facebookLinkedIn: https://www.doubletaponair.com/linkedin Subscribe to the Podcast:Apple: https://www.doubletaponair.com/appleSpotify: https://www.doubletaponair.com/spotifyRSS: https://www.doubletaponair.com/podcastiHeadRadio: https://www.doubletaponair.com/iheart About Double TapHosted by the insightful duo, Steven Scott and Shaun Preece, Double Tap is a treasure trove of information for anyone who's blind or partially sighted and has a passion for tech. Steven and Shaun not only demystify tech, but they also regularly feature interviews and welcome guests from the community, fostering an interactive and engaging environment. Tune in every day of the week, and you'll discover how technology can seamlessly integrate into your life, enhancing daily tasks and experiences, even if your sight is limited. "Double Tap" is a registered trademark of Double Tap Productions Inc.
Thank you for joining us for our 2nd Cabral HouseCall of the weekend! I'm looking forward to sharing with you some of our community's questions that have come in over the past few weeks… Tricia: Hi Dr Cabral - I recently discovered your show about a year ago and I'm so glad I did! You are a wealth of knowledge and I appreciate you helping the community. I'm a 55 year old female diagnosed with spinal stenosis, spondylolisthesis and degenerative disc disease since 2017. Basically, I'm in and out of pain a lot. I stay in physical therapy and try to stay as active as possible. I hate taking OTC pain medicines but at time Aleve is the only thing that will get me through. My question is what do you think about taking NAC supplementation to assist my liver. Any advice is appreciated. I eat a very clean whole food based diet to assist with inflammation. I haven't tried your detox yet but have a 21 day supply. I take many of your vitamins. I love them! Thank you in advance. Rachel: Dr. Cabral, NO ONE talks about women with “lean” PCOS… insulin resistance seems to be at the root & center of PCOS but I've been tested & do not have it… I'm around 20% body fat & very muscular. I was on the birth control pill for about 10 years, when I came off I didn't have cycle. It was then we found the follicles on my ovaries & I developed cystic acne. Since then I dialed back my exercise, fed more & after 22 months got my cycle back for the last consecutive 6 months. Do you have any insight or advice for someone in a scenario like mine? Will the follicles ever dissipate back to normal? I am 32 & so concerned about fertility for when I hopefully meet my person. What can I do to optimize… if I was your daughter would you recommend freezing my eggs at this stage, all things considered? Yvonne: Did a search for a previous podcast but didn't find anything about reversing swollen finger joint by right index knuckle. Assume this was the first of an arthritic flare which has subsided but and the swelling went down from what it was but it won't go away completely. Is there a way to return to its normal size or is the damage permanent? Anonymous: Hi Doctor Cabral! Question about a 7 month old baby. She's happy, eats & sleeps well, breast fed, just started some solids, no medical ‘interventions'. She struggles with congestion & her right eye has been irritated since birth. It's almost always watery & boogery. She was born a month early & mom had pretty severe preeclampsia, baby's oxygen was low at birth so she was on oxygen for her 1st 12 hours or so, but quickly recovered on her own. Wondering if there's something that can be done naturally for her breathing & eye. We're not sure what is causing it. Clogged tear duct? Mom & dad eat healthy & live as close to a toxin free life as humanly possible. 1st thoughts are the pets or possible mold, but she doesn't improve when they leave their home for 3-4 day trips. Thoughts? Thanks!! Sarah: Hello!!! Context - Im 28, I've done 7 day detox, HTMA, CBO, heavy metal detox, gut testing about to do hormone testing. I take your DNS, greens, omegas, zinc, b complex, magnesium, digestive enzymes. I dry brush, sauna, weight training, lots of walking, daily breath work etc. I feel like my stress is the lowest it's been and yet I still experience debilitating fatigue that can last for few days/weeks where even just walking is a struggle. Could this just be part of the 'healing' process as I know it's not linear. Is there anything else I should look at/do? Sometimes when I'm moving around going on with my day I'm fine but then when I sit down a full load of fatigue hits me. I also notice when I drink coffee/green tea I yawn alot. I've experienced this for a few years. Thank you for tuning into this weekend's Cabral HouseCalls and be sure to check back tomorrow for our Mindset & Motivation Monday show to get your week started off right! - - - Show Notes and Resources: StephenCabral.com/3404 - - - Get a FREE Copy of Dr. Cabral's Book: The Rain Barrel Effect - - - Join the Community & Get Your Questions Answered: CabralSupportGroup.com - - - Dr. Cabral's Most Popular At-Home Lab Tests: > Complete Minerals & Metals Test (Test for mineral imbalances & heavy metal toxicity) - - - > Complete Candida, Metabolic & Vitamins Test (Test for 75 biomarkers including yeast & bacterial gut overgrowth, as well as vitamin levels) - - - > Complete Stress, Mood & Metabolism Test (Discover your complete thyroid, adrenal, hormone, vitamin D & insulin levels) - - - > Complete Food Sensitivity Test (Find out your hidden food sensitivities) - - - > Complete Omega-3 & Inflammation Test (Discover your levels of inflammation related to your omega-6 to omega-3 levels) - - - Get Your Question Answered On An Upcoming HouseCall: StephenCabral.com/askcabral - - - Would You Take 30 Seconds To Rate & Review The Cabral Concept? The best way to help me spread our mission of true natural health is to pass on the good word, and I read and appreciate every review!
Drive with Dr. Peter Attia: Read the notes at at podcastnotes.org. Don't forget to subscribe for free to our newsletter, the top 10 ideas of the week, every Monday --------- View the Show Notes Page for This Episode Become a Member to Receive Exclusive Content Sign Up to Receive Peter's Weekly Newsletter Kyler Brown is a sports rehab chiropractor who specializes in injury recovery, pre- and post-surgical rehabilitation, and guiding clients from rehab back to peak performance. As co-founder of the private training program 10 Squared alongside Peter, Kyler shares his approach to injury prevention and performance optimization—highlighting how overlooked movement patterns can quietly lead to chronic issues over time. He outlines a practical framework for assessing and treating individuals, highlights the importance of understanding movement dynamics and asymmetries, and discusses personalized rehab strategies through real-world case studies. The conversation also explores the psychological side of recovery, including the role of fear and mental barriers in rehabilitation. Kyler shares actionable tools to evaluate movement patterns and implement training strategies that support long-term strength and health. A companion video series demonstrating exercises for common problem areas—such as the lower back, neck, shoulders, and knees—is available exclusively to subscribers on the show notes page. We discuss: The personalized rehab strategy for Peter's shoulder surgery that sparked creation of a training program called 10 Squared [3:00]; Training for the marginal decade: why precision and purpose are essential for quality of life [11:00]; The Centenarian Decathlon: how training for long-term capacity enhances both current and future quality of life [18:00]; How the shortcomings of conventional rehab and performance systems led to the creation of 10 Squared, a personalized training model focused on long-term physical capacity and individualized care [23:45]; Case study: how personalized assessment and treatment at 10 Squared helps uncover the root causes of injuries [31:00]; The role of the “core” in movement and injury prevention, and the importance of training stability before strength [40:15]; The layered assessment process used at 10 Squared to determine whether a person is ready to perform dynamic movements [47:45]; Case study: the rehab plan designed to treat a hamstring injury while preserving fitness and preventing reinjury [51:45]; Training approach for clients with minimal training history: risk reduction, habit-building, and long-term consistency [55:30]; How to train foot reactivity, tendon resilience, and explosive capacity in a safe, progressive way [1:00:00]; Peter's foot and ankle pain: how to diagnose, treat, and strengthen the lower extremities [1:04:15]; How fear and perception influence recovery, what drives back pain, and when to choose surgery vs. treatment [1:13:15]; Could AI and app technology eventually deliver an individualized rehab and training experience? [1:22:30]; Kyler's professional evolution from traditional chiropractic care to a degree-agnostic, performance-based rehab philosophy [1:25:00]; How 10 Squared provides precision rehab and training in a remote format [1:30:30]; How Peter resolved a severe back pain flare-up using DNS-guided isometric exercise instead of passive treatments [1:33:15]; How to identify and treat common joint pain (neck, back, knee, shoulder) using a rehab framework that strengthens supporting structures and helps avoid surgery [1:39:00]; and More. Connect With Peter on Twitter, Instagram, Facebook and YouTube
Let’s chat about point-to-point links. On today’s episode we cover what should and shouldn’t be done, and discuss why following RFC's doesn't always get you to the right place. We dig into questions including: Don't we just use link-local addresses for point-to-points? Shouldn't we assign a /127, just like we do a /31 in IPv4?... Read more »
Let’s chat about point-to-point links. On today’s episode we cover what should and shouldn’t be done, and discuss why following RFC's doesn't always get you to the right place. We dig into questions including: Don't we just use link-local addresses for point-to-points? Shouldn't we assign a /127, just like we do a /31 in IPv4?... Read more »
In this episode of Tech Talks Daily, I speak with Samit D'Cunha, a legal advisor at the International Committee of the Red Cross (ICRC), about the innovative Digital Emblem Project. For over 160 years, the Red Cross emblem has symbolized protection in conflict zones, designating medical and humanitarian organizations as safe from attack. Now, as warfare increasingly extends into cyberspace, the ICRC is developing a digital version of this emblem to provide the same legal protections for online infrastructure. We examine the increasing frequency of cyberattacks on hospitals and aid organizations during armed conflict, and why the Digital Emblem is more crucial now than ever. Samit explains the technical side of the project, including the use of cryptographic certificates and DNS systems to ensure global, decentralized protection. He also discusses the importance of legal recognition and trust-building across governments, tech companies, and humanitarian sectors. As the digital battleground expands, this emblem could play a crucial role in safeguarding lives and ensuring that humanitarian operations continue uninterrupted. We also explore the challenges of implementing this system without increasing organizations' vulnerability, and why support from over 100 tech companies and states is crucial for its success. If you're interested in the intersection of cybersecurity, law, and humanitarian efforts, this is a conversation you won't want to miss.
In this episode of Cybersecurity Today, host Jim Love explores the intricacies behind phishing emails that cleverly spoof Microsoft addresses, making many fall for scams despite appearing legitimate. Love emphasizes the need for a stringent 'zero trust' approach to counter these advanced tactics. Additionally, the episode delves into the activities of the hacking group Hazy Hawk, which exploits misconfigured DNS records to hijack trusted domains and propagate malware. Organizations are warned about the importance of regular DNS audits to prevent such attacks. The episode also covers the alarming wave of departures at the Cybersecurity and Infrastructure Security Agency (CISA), raising concerns over the agency's effectiveness amid increasing cyber threats. In another segment, Love discusses a sophisticated fraud operation out of Hanoi, where perpetrators manipulated X's Creator Revenue Sharing Program to siphon funds through fraudulent engagement metrics. The need for built-in fraud prevention mechanisms in digital reward systems is stressed. The episode concludes with a call for listener feedback and support. 00:00 Introduction and Overview 00:27 Phishing Scams: Authentic-Looking Emails 02:58 DNS Misconfigurations and Hazy Hawk 05:36 CISA Leadership Exodus 08:16 X's Creator Revenue Sharing Fraud 10:56 Conclusion and Contact Information
View the Show Notes Page for This Episode Become a Member to Receive Exclusive Content Sign Up to Receive Peter's Weekly Newsletter Kyler Brown is a sports rehab chiropractor who specializes in injury recovery, pre- and post-surgical rehabilitation, and guiding clients from rehab back to peak performance. As co-founder of the private training program 10 Squared alongside Peter, Kyler shares his approach to injury prevention and performance optimization—highlighting how overlooked movement patterns can quietly lead to chronic issues over time. He outlines a practical framework for assessing and treating individuals, highlights the importance of understanding movement dynamics and asymmetries, and discusses personalized rehab strategies through real-world case studies. The conversation also explores the psychological side of recovery, including the role of fear and mental barriers in rehabilitation. Kyler shares actionable tools to evaluate movement patterns and implement training strategies that support long-term strength and health. A companion video series demonstrating exercises for common problem areas—such as the lower back, neck, shoulders, and knees—is available exclusively to subscribers on the show notes page. We discuss: The personalized rehab strategy for Peter's shoulder surgery that sparked creation of a training program called 10 Squared [3:00]; Training for the marginal decade: why precision and purpose are essential for quality of life [11:00]; The Centenarian Decathlon: how training for long-term capacity enhances both current and future quality of life [18:00]; How the shortcomings of conventional rehab and performance systems led to the creation of 10 Squared, a personalized training model focused on long-term physical capacity and individualized care [23:45]; Case study: how personalized assessment and treatment at 10 Squared helps uncover the root causes of injuries [31:00]; The role of the “core” in movement and injury prevention, and the importance of training stability before strength [40:15]; The layered assessment process used at 10 Squared to determine whether a person is ready to perform dynamic movements [47:45]; Case study: the rehab plan designed to treat a hamstring injury while preserving fitness and preventing reinjury [51:45]; Training approach for clients with minimal training history: risk reduction, habit-building, and long-term consistency [55:30]; How to train foot reactivity, tendon resilience, and explosive capacity in a safe, progressive way [1:00:00]; Peter's foot and ankle pain: how to diagnose, treat, and strengthen the lower extremities [1:04:15]; How fear and perception influence recovery, what drives back pain, and when to choose surgery vs. treatment [1:13:15]; Could AI and app technology eventually deliver an individualized rehab and training experience? [1:22:30]; Kyler's professional evolution from traditional chiropractic care to a degree-agnostic, performance-based rehab philosophy [1:25:00]; How 10 Squared provides precision rehab and training in a remote format [1:30:30]; How Peter resolved a severe back pain flare-up using DNS-guided isometric exercise instead of passive treatments [1:33:15]; How to identify and treat common joint pain (neck, back, knee, shoulder) using a rehab framework that strengthens supporting structures and helps avoid surgery [1:39:00]; and More. Connect With Peter on Twitter, Instagram, Facebook and YouTube
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Resilient Secure Backup Connectivity for SMB/Home Users Establishing resilient access to a home network via a second ISP may lead to unintended backdoors. Secure the access and make sure you have the visibility needed to detect abuse. https://isc.sans.edu/diary/Resilient%20Secure%20Backup%20Connectivity%20for%20SMB%20Home%20Users/31972 BadSuccessor: Abusing dMSA to Escalate Privileges in Active Directory An attacker with the ability to create service accounts may be able to manipulate these accounts to mark them as migrated accounts, inheriting all privileges the original account had access to. https://www.akamai.com/blog/security-research/abusing-dmsa-for-privilege-escalation-in-active-directory Flaw in samlify That Opens Door to SAML Single Sign-On Bypass CVE-2025-47949 The samlify Node.js library does not verify SAML assertions correctly. It will consider the entire assertion valid, not just the original one. An attacker may use this to obtain additional privileges or authenticate as a different user https://www.endorlabs.com/learn/cve-2025-47949-reveals-flaw-in-samlify-that-opens-door-to-saml-single-sign-on-bypass
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Researchers Scanning the Internet A newish RFC, RFC 9511, suggests researchers identify themselves by adding strings to the traffic they send, or by operating web servers on machines from which the scan originates. We do offer lists of researchers and just added three new groups today https://isc.sans.edu/diary/Researchers%20Scanning%20the%20Internet/31964 Cloudy with a change of Hijacking: Forgotten DNS Records Organizations do not always remove unused CNAME records. An attacker may take advantage of this if an attacker is able to take possession of the now unused public cloud resource the name pointed to. https://blogs.infoblox.com/threat-intelligence/cloudy-with-a-chance-of-hijacking-forgotten-dns-records-enable-scam-actor/ Message signature verification can be spoofed CVE-2025-47934 A vulnerability in openpgp.js may be used to spoof message signatures. openpgp.js is a popular library in systems implementing end-to-end encrypted browser applications. https://github.com/openpgpjs/openpgpjs/security/advisories/GHSA-8qff-qr5q-5pr8
Welcome back to our weekend Cabral HouseCall shows! This is where we answer our community's wellness, weight loss, and anti-aging questions to help people get back on track! Check out today's questions: Kris: Hi, I was wondering if you would have any suggestions ,help or feed back on dermatomyositis/antisynthetase syndrome . My husband (Anthony) was recently diagnosed with it, and everything I read and hear it seems little scary. We see a functional medicine dr. now but she is waiting to see what a rheumatologist suggests. Both my husband and myself are thinking detoxing would be the first thing we should do. Would you have any suggestions or thought on how we deal and handle this? thank you in advance Frankie: Hi Stephen, hope your having a great day. I've been dealing with post-nasal drip for a while, and my ENT believes it's caused by acid. I'm 21 and was prescribed two doses of Pantoprazole 40mg and two doses of Ranitidine 150mg, but I stopped after a month because I was supposed to take them for three months, and I don't want to stay on them that long. I had asthma when I was younger, so I wonder if that could be a factor. At this point, I don't know what else to do to get rid of it. any advice? Melissa: Hi Dr. Cabral, I took the food sensitivity test and the heavy metals test. On my food sensitivity test it showed Candida albicans and I had some heavy metals such as aluminum and mercury show up on my HM test. Do you recommend doing the detox before doing the CBO protocol or vice versa? If I could only do one, which one would you recommend? For the detox, would you recommend the heavy metals one or the general 7 days (I've never done a detox before). Also, would it be safe to start the estrogen balance and estrogen support supplements at the same time as starting a detox or CBO protocol? If I'm just trying help my body excrete estrogen would you recommend just the estrogen balance supplement? I don't make too much estrogen but it's high because my body isn't excreting it well. TY!!! Jill: Thank you Dr. Cabral for your honest and straight forward approach. I have the MTHFR gene and seek a daily vitamin with B vitamins & folate. Many products are available with the activated or methylated forms of folate, B6, and B12. However, when I take them I experience headaches, a feeling of overstimulation, and anxiousness. I spent months experimenting and broke down my multivitamin taking a complex without any B vitamins and then added in individual forms of non methylated folate and B vitamins. I had no issue when folate and B vitamins were methyl free such as folinic acid and the Hydroxocobalamin and Adenosylcobalamin forms of B12. Tell me I'm not crazy! Do you agree that some people may be sensitive to methylated nutrients? Would you consider making DNS with methyl free nutrients? Morgan: Hi Dr Cabral. I'm 34 years old and have recently been diagnosed with isolated high diastolic blood pressure (systolic is normal). I live a healthy lifestyle including daily exercise, balanced diet and maintain a healthy weight. I don't smoke or drink alcohol. I recently left a job causing me some stress but otherwise I live a pretty stress-free life and I also practice daily yoga and meditation. My mom was diagnosed with hypertension in her 20s and has been on medication since. My HCP suggested starting me on medication too. I feel very strongly about relying on a lifelong medication. My question is even though I do everything correct to prevent high blood pressure, is it possible that some things are just simply genetic? Any suggestions before trying medication? Anything helps! Thanks! Thank you for tuning into today's Cabral HouseCall and be sure to check back tomorrow where we answer more of our community's questions! - - - Show Notes and Resources: StephenCabral.com/3382 - - - Get a FREE Copy of Dr. Cabral's Book: The Rain Barrel Effect - - - Join the Community & Get Your Questions Answered: CabralSupportGroup.com - - - Dr. Cabral's Most Popular At-Home Lab Tests: > Complete Minerals & Metals Test (Test for mineral imbalances & heavy metal toxicity) - - - > Complete Candida, Metabolic & Vitamins Test (Test for 75 biomarkers including yeast & bacterial gut overgrowth, as well as vitamin levels) - - - > Complete Stress, Mood & Metabolism Test (Discover your complete thyroid, adrenal, hormone, vitamin D & insulin levels) - - - > Complete Food Sensitivity Test (Find out your hidden food sensitivities) - - - > Complete Omega-3 & Inflammation Test (Discover your levels of inflammation related to your omega-6 to omega-3 levels) - - - Get Your Question Answered On An Upcoming HouseCall: StephenCabral.com/askcabral - - - Would You Take 30 Seconds To Rate & Review The Cabral Concept? The best way to help me spread our mission of true natural health is to pass on the good word, and I read and appreciate every review!