Hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network
POPULARITY
Categories
In today's episode, host Jim Love covers recent cybersecurity threats, including malware hidden in DNS records, a custom backdoor targeting SonicWall SMA devices, the US military assuming a network compromise after Chinese hackers targeted VPNs and email servers, and a $27 million theft from the BigONE crypto exchange. The show highlights how attackers are using innovative techniques to evade detection and emphasizes the need for increased vigilance in monitoring and securing systems. 00:00 Introduction to Cybersecurity News 00:26 Malware Hidden in DNS Records 02:26 SonicWall Devices Under Attack 04:30 US Military Breach by Chinese Hackers 07:07 $27 Million Crypto Theft 08:58 Conclusion and Listener Engagement
För att kunna använda internet behövs en DNS-tjänst. Det är en tjänst som kan liknas vid internets motsvarighet till kontaktlistan i mobilen. Tack vare kontaktlistan i mobilen behöver du inte komma ihåg krångliga telefonnummer. Kontaktlistan översätter mellan namn och nummer åt dig. En DNS-tjänst gör samma sak för domännamn och IP-adresser. Du behöver inte komma ihåg IP-adressen till nikkasystems.com eftersom din DNS-tjänst letar upp IP-adressen åt dig helt automatiskt. Du kan själv välja vilken DNS-tjänst som du vill skicka dina domänuppslag till. Som standard används DNS-tjänsten som din internetoperatör har tilldelat dig, men du kan välja en annan för att exempelvis få filtrerade svar. DNS-filtrering kan skydda dig mot webbplatser som är kända för att sprida skadeprogram. Om din dator ber om IP-adressen till en känt skadlig domän svarar en filtrerande DNS-tjänst att den inte hittar någon tillhörande IP-adress, vilket i sin tur förhindrar att din dator ansluter till den skadliga webbplatsen. Din dator kan helt enkelt inte hitta dit. Under de senaste åren har EU finansierat utvecklingen av en EU-baserad och GDPR-förenlig DNS-tjänst med filtreringsfunktion. Tjänsten kallas DNS4EU. Tess och Nikka pratade om projektet i början av 2022, och i veckans poddavsnitt återvänder Peter och Nikka till ämnet. Nu har nämligen tjänsten lanserats och gjorts tillgänglig för allmänheten. DNS4EU är helt kostnadsfri och erbjuder flera olika filterfunktioner. Tjänsten uppfyller också hygienkraven för en säker och integritetsvärnande DNS-tjänst, med ett undantag. DNS4EU har ingen nolloggningspolicy. I veckans poddavsnitt berättar Nikka varför det oroar honom samt varför ”oroskryddan” från 2022 kvarstår: vad händer om DNS4EU utnyttjas för att censurera internet? Se fullständiga shownotes på https://go.nikkasystems.com/podd309.
Let’s talk about common misconceptions regarding DNS and IPv6. We’ve heard these often enough that we felt we should talk through each one. We cover issues including what kind of DNS record types can be returned via IPv6 (and IPv4, too), more details on what really goes on with Happy Eyeballs, and combining A/AAAA records... Read more »
Alt du trenger å vite om vin. Med Thomas Giertsen og DNs vinjournalist Merete Bø. Hosted on Acast. See acast.com/privacy for more information.
Google and Microsoft issue critical updates. CISA warns of active exploitation of a critical flaw in Wing FTP Server. Cloudflare restores their DNS Resolver service following a brief outage. A critical vulnerability in a PHP documentation tool allows attackers to execute code on affected servers. NSA and FBI officials say they've disrupted Chinese cyber campaigns targeting U.S. critical infrastructure. A UK data breach puts Afghan soldiers and their families at risk. Researchers find malware hiding in DNS records. A former U.S. Army soldier pleads guilty to charges of hacking and extortion. Ben Yelin joins us with insights on the Senate Armed Services Committee's response to rising threats to critical infrastructure.The large print giveth and the small print taketh away. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Ben Yelin, co host of our Caveat podcast and Program Director for Public Policy & External Affairs at the University of Maryland Center for Cyber Health and Hazard Strategies, discussing the Senate Armed Services Committee's and Trump administration nominees' recent conversation about rising threats to critical infrastructure. You can find the article Ben discusses here. Selected Reading Google fixes actively exploited sandbox escape zero day in Chrome (Bleeping Computer) Windows KB5064489 emergency update fixes Azure VM launch issues (Bleeping Computer) Exploited Wing file transfer bug risks ‘total server compromise,' CISA warns (The Record) Cloudflare 1.1.1.1 incident on July 14, 2025 (Cloudflare) Critical template Injection flaw in LaRecipe Documentation Package enables remote code execution (Beyond Machines) NSA: Volt Typhoon was ‘not successful' at persisting in critical infrastructure (The Record) Defence secretary 'unable to say' if anyone killed after Afghan data breach (BBC News) Hackers exploit a blind spot by hiding malware inside DNS records (Ars Technica) 21-year-old former US soldier pleads guilty to hacking, extorting telecoms (The Record) WeTransfer says files not used to train AI after backlash (BBC News) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Et halvt år etter Donald Trumps retur til Det hvite hus peker Oslo Børs opp tolv prosent, mens tollsatser, krig og uro kaster lange skygger over verdensøkonomien. I denne spesialepisoden har Finansredaksjonen og Den politiske situasjonen har slått seg sammen. DNs kommentator Anita Hoemsnes, finansredaktør Terje Erikstad, børskommentator Thor Chr. Jensen, politisk redaktør Frithjof Jakobsen og kommentator Eva Grinde, ser tilbake på halvåret som har gått. Med børser i uro, krig i Iran og Ukraina, USAs tollsatser, TACO og Donald Trump i Det hvite hus er det nok å snakke om. Hosted on Acast. See acast.com/privacy for more information.
Ever wonder why chronic pain persists or why some athletes effortlessly maintain peak performance? Join us for a powerful conversation with world-renowned chiropractor and DNS (Dynamic Neuromuscular Stabilization) expert, Dr. Michael Rintala. In this captivating and insightful episode, Dr. Rintala shares his personal journey from enduring a severe spinal injury as a collegiate tennis player to becoming one of the globe's top specialists in movement optimization and rehabilitation.What You'll Discover:DNS Explained: Learn how Dynamic Neuromuscular Stabilization taps into natural, infant-based movements to reset your body's innate stability patterns, relieving pain and enhancing performance.Breath as Medicine: Understand how something as simple as breathing can dramatically improve core strength, stability, and overall health.Mindful Movement: Hear how Dr. Rintala integrates mindfulness and meditation into rehabilitation, creating profound physical and mental resilience.Behind-the-Scenes Stories: Gain insights from Dr. Rintala's experiences working with professional surfers, PGA golfers, dancers, and everyday patients, including fascinating recovery success stories and surprising athletic insights.Practical Tools: Get actionable DNS exercises, posture tips, and breathing techniques you can apply immediately, whether you're a healthcare provider, athlete, or someone simply aiming for better movement and less pain in daily life.Who is Dr. Michael Rintala? Dr. Michael Rintala, DC, is one of only 18 international DNS instructors trained at the renowned Prague School of Rehabilitation under Prof. Pavel Kolář. He's a trusted practitioner for professional athletes from the World Surf League and the PGA Tour, blending chiropractic care, ART, and DNS principles to achieve remarkable outcomes in performance and injury recovery.Connect with Dr. Rintala:Website: Rintala Chiropractic & Sports MedicineInstagram: @rintalachiroFacebook: Rintala ChiropracticLearn more about DNS: Rehabilitation Prague SchoolJoin us as we laugh, learn, and dive deep into how rediscovering the basics of human movement can radically improve your life. Whether you're a seasoned clinician, athlete, or just someone seeking lasting health, this episode is filled with gems you won't want to miss!We are two sports chiropractors, seeking knowledge from some of the best resources in the world of health. From our perspective, health is more than just “Crackin Backs” but a deep dive into physical, mental, and nutritional well-being philosophies. Join us as we talk to some of the greatest minds and discover some of the most incredible gems you can use to maintain a higher level of health. Crackin Backs Podcast
Ever wondered what really goes on inside a Security Operations Center (SOC)? In this episode, host, Claire Quirion chats with Derek Halfyard from GoSecure about his journey from NSCC to leading threat hunts and helping clients stay safe around the clock. We break down what a SOC is, who works there, what roles like threat hunters and detection engineers actually do, and what it's really like to build a career in cybersecurity.Derek also opens up about the biggest challenges SOC professionals face, the stress of wondering if a threat has been missed, and the unmatched satisfaction of detecting a previously unknown threat. Whether you're curious about breaking into cyber security or want to understand the realities of life inside a SOC, this episode offers deep insights and career advice. From certifications to career pivots, this is real talk for anyone curious about joining the industry.
rWotD Episode 2992: Emcodec Welcome to random Wiki of the Day, your journey through Wikipedia's vast and varied content, one random article at a time.The random article for Sunday, 13 July 2025, is Emcodec.Trojan. Emcodec. E is a trojan horse that is mis-represented as an audio and video codec for Windows-based PCs. It exists in various variants with names such as Media Codec, Ecodec, Imediacodec, IntCodec, Pcodec, SVideocodec, Video iCodec, QualityCodec, Vcodec, Zip Codec, zCodec, ZCODEC and began to be widely used in spring 2005.When visiting certain web sites, in particular pornographic sites, and attempting to view a video file on the site, the user will be directed to download this software, purportedly in order to allow viewing of the video. Furthermore, a number of websites have been set up to mis-represent this malware as a legitimate codec, inviting the users to download the software, allegedly to allow for the playback of certain audio/video which claims to use the so-called codec.Once executed, the trojan copies a program into the Program Files folder, changes some registry keys and displays a fake EULA for the supposed codec.zCodec reportedly changes the machine's DNS settings, monitors the user's browsing and acts as adware.Some versions of the trojan install malware called Zlob, which in turn may lead to the installation of malicious and fake "security programs" such as SpywareQuake, SpyFalcon, WinFixer or other malware; some variants also install a backdoor into the infected computer.This recording reflects the Wikipedia text as of 00:03 UTC on Sunday, 13 July 2025.For the full current version of the article, see Emcodec on Wikipedia.This podcast uses content from Wikipedia under the Creative Commons Attribution-ShareAlike License.Visit our archives at wikioftheday.com and subscribe to stay updated on new episodes.Follow us on Mastodon at @wikioftheday@masto.ai.Also check out Curmudgeon's Corner, a current events podcast.Until next time, I'm neural Joanna.
Seit Wirksamwerden der Datenschutz-Grundverordnung (DSGVO) 2018 sind die Inhaberdaten von Domains weitgehend unter Verschluss. Was vorher über das sogenannte Whois-System frei zugänglich war, ist heute nur noch schwer zu bekommen. In Episode 138 diskutieren Holger und Joerg mit dem Domainrecht-Experten Thomas Rickert über die Auswirkungen dieser Entwicklung. Rickert ist geschäftsführender Gesellschafter der Rickert Rechtsanwaltsgesellschaft und außerdem im Rat der Generic Names Supporting Organization (GNSO Council) aktiv, die wiederum Teil der zentralen Domain-Verwaltung Internet Corporation for Assigned Names and Numbers (ICANN) ist. Außerdem leitet der Rechtsanwalt beim eco-Verband die KG Names & Numbers. Rickert schildert, dass vor der DSGVO für jede Domainregistrierung über 70 Datenelemente erhoben und veröffentlicht werden mussten - vom Namen über die Adresse bis zur Faxnummer. Diese Praxis führte dazu, dass Datenhändler die Informationen massenhaft abgriffen und Domaininhaber kurz nach der Registrierung mit Spam überhäuft wurden. Die ICANN reagierte auf die DSGVO mit einer Notlösung: Statt der Daten erscheint seitdem meist nur noch "Redacted for Privacy". Für Rechteinhaber wie Verlage, die gegen Urheberrechtsverletzungen vorgehen wollen, ist das ein Problem, betont Heidrich. Er berichtet frustriert, dass er bei offensichtlichen Rechtsverletzungen keine Kontaktmöglichkeit mehr findet. Die Täter verstecken sich bewusst hinter amerikanischen Anbietern, die keine Auskünfte erteilen. Rickert verteidigt die neue Praxis, die alte sei datenschutzrechtlich nicht haltbar gewesen. Zudem überschätze man den Wert der Registrierungsdaten bei der Bekämpfung von Cyberkriminalität. Über 50 Prozent der Phishing-Fälle liefen über kompromittierte Websites legitimer Betreiber. Wichtiger als der Zugriff auf Inhaberdaten sei die schnelle Reaktion durch Domainsuspendierung. Die ICANN arbeitet an Lösungen wie dem Registration Data Request System (RDRS), das Anfragen an die richtigen Stellen weiterleitet. Überdies soll die EU-Richtlinie NIS2 mit ihrem Art. 28 neue Rechtsgrundlagen für die Herausgabe von Domaindaten schaffen. Unternehmensdaten sollen wieder veröffentlicht werden müssen, und berechtigte Anfragen binnen 72 Stunden beantwortet werden. Die Diskussion zeigt exemplarisch am wichtigen DNS den Konflikt zwischen Datenschutz und berechtigten Transparenzinteressen. Während die einen das "Going Dark" des Whois-Systems beklagen, sehen andere darin eine überfällige Korrektur datenschutzwidriger Praktiken.
In this episode, DomainTools' Daniel Schwalbe is joined by Renee Burton (Infoblox), Raymond Dijkxhoorn (Surbl), and Peter Lowe (FIRST.org) to unpack the inaugural DomainTools Intelligence Report and what it reveals about DNS-based threats in 2024. The panel digs into evolving detection challenges, the pitfalls of domain scoring, the growing complexity of threat actor behavior, and why industry collaboration continues to lag. They explore topics like aging domains, TLD abuse, data sharing barriers, and the creative lengths bad actors go to avoid detection. Whether you're building threat intel tools or blocking domains at the edge, this conversation is a must-listen for anyone in DNS-based security.
AOBFreedom Tech Friday plugQ heading on another stagPrime/Core shipping updatesBeach retreat soonTreasury company hype a bubble?NEWSLedger seed backupLedger discontinuing support for Ledger nano SZach's takeAshigaru terminal on Start9Bitcoin as mortgage collateral in the USSeen some pushbackBitcoin tax exemption bill in USYouTube warpathUPDATES/RELEASESEnvoy 2.0 betaZeus v0.11.2-beta1Wallet of Satoshi back in the US with a 'self custody' optionCake Wallet 5.1.0Robosats v0.7.9BTCPay v2.1.6IMPORTANT LINKS https://freesamourai.comhttps://p2prights.org/donate.htmlhttps://ungovernablemisfits.comVALUE FOR VALUEThanks for listening you Ungovernable Misfits, we appreciate your continued support and hope you enjoy the shows.You can support this episode using your time, talent or treasure.TIME:- create fountain clips for the show- create a meetup- help boost the signal on social mediaTALENT:- create ungovernable misfit inspired art, animation or music- design or implement some software that can make the podcast better- use whatever talents you have to make a contribution to the show!TREASURE:- BOOST IT OR STREAM SATS on the Podcasting 2.0 apps @ https://podcastapps.com- DONATE via Monero @ https://xmrchat.com/ugmf- BUY SOME STICKERS @ https://www.ungovernablemisfits.com/shop/FOUNDATIONhttps://foundation.xyz/ungovernableFoundation builds Bitcoin-centric tools that empower you to reclaim your digital sovereignty.As a sovereign computing company, Foundation is the antithesis of today's tech conglomerates. Returning to cypherpunk principles, they build open source technology that “can't be evil”.Thank you Foundation Devices for sponsoring the show!Use code: Ungovernable for $10 off of your purchaseCAKE WALLEThttps://cakewallet.comCake Wallet is an open-source, non-custodial wallet available on Android, iOS, macOS, and Linux.Features:- Built-in Exchange: Swap easily between Bitcoin and Monero.- User-Friendly: Simple interface for all users.Monero Users:- Batch Transactions: Send multiple payments at once.- Faster Syncing: Optimized syncing via specified restore heights- Proxy Support: Enhance privacy with proxy node options.Bitcoin Users:- Coin Control: Manage your transactions effectively.- Silent Payments: Static bitcoin addresses- Batch Transactions: Streamline your payment process.Thank you Cake Wallet for sponsoring the show!MYNYMBOXhttps://mynymbox.ioYour go-to for anonymous server hosting solutions, featuring: virtual private & dedicated servers, domain registration and DNS parking. We don't require any of your personal information, and you can purchase using Bitcoin, Lightning, Monero and many other cryptos.Explore benefits such as No KYC, complete privacy & security, and human support.
Alt du trenger å vite om vin. Med Thomas Giertsen og DNs vinjournalist Merete Bø. Hosted on Acast. See acast.com/privacy for more information.
In this special fourth appearance, Wes Plate returns to HappyCast with a full breakdown of the inaugural Copper Kings 100—Montana's newest hundred-mile race and his most ambitious project yet. With co-hosts Stephanie and Andrew, Wes opens up about what it took to bring this dream to life: from months of preparation and a jam-packed U-Haul to navigating stormy skies, deadfall-filled trails, and the high-stakes logistics of a remote mountain race. Spoiler: not even a lightning storm during the race briefing could shake this crew.Stephanie recaps her experience captaining the Our Lady of the Rockies aid station—a mountaintop post where she and a team of volunteers (including both her and Wes's moms) kept runners alive with mashed potatoes, heated bathrooms, and the occasional mid-hallucination pep talk. Between walking every runner up the hill, managing drop bags and puke blankets, and making sure no one missed the cutoff, this became a spiritual checkpoint for runners and crew alike.With 90 finishers out of 105 starters and only one DNS, the Copper Kings 100 defied all expectations for a first-year race. Wes reflects on what went right, what he learned, and how much this community has grown around a course that winds through solitude, scenery, and suffering. Whether you're an aspiring race director, a trail runner dreaming of Montana, or just here for stories about flamingo costumes and blowing up propane heaters, this episode is packed with heart, hustle, and humor.Be sure to subscribe to the podcast wherever you listen, and we always appreciate you leaving a good rate and review. Join the Facebook Group and follow us on Instagram and check out our website for the more episodes, posts and merchandise coming soon. Have a topic you'd like to hear discussed in depth, or a guest you'd like to nominate? Email us at info@happyendingstc.org
Send us a textCloud network engineering interviews at tech giants require specialized knowledge beyond traditional networking – particularly when it comes to cloud-native services. In this final installment of our interview preparation series with Kam Agahian, we explore the specialized networking services that frequently appear in technical assessments.Security takes center stage as we discuss the critical boundary between networking and security responsibilities. Kam explains that while routing traffic to firewalls falls squarely on the network engineer, security policies and posture typically belong to dedicated security teams at larger organizations. We compare traditional VM-based third-party firewalls with cloud-native security services, highlighting the architectural considerations for each approach.DNS architectures represent another technical area where candidates must demonstrate proficiency. Beyond understanding traditional name resolution, you'll need familiarity with the hybrid cloud architectures that enable communication between on-premises and cloud environments. Kam singles out DNSSEC as deserving special attention during your preparation.The landscape of multi-cloud connectivity has evolved dramatically, moving beyond simple cross-cloud connections to sophisticated integration patterns. Candidates who demonstrate awareness of recent developments – like Oracle's strategy of placing databases directly in other providers' data centers – stand out in interviews by showing they stay current with industry trends.Throughout our conversation, we emphasize research as a critical interview preparation strategy. Review all cloud-related job postings at your target company to understand their technology ecosystem and identify potential multi-cloud scenarios. This contextual knowledge allows you to tailor your responses to the specific environment you'll potentially be working in.What questions do you have about preparing for cloud networking interviews? Share your thoughts and join the conversation about navigating these complex technical assessments.Connect with our guest:https://www.linkedin.com/in/agahian/Purchase Chris and Tim's new book on AWS Cloud Networking: https://www.amazon.com/Certified-Advanced-Networking-Certification-certification/dp/1835080839/ Check out the Fortnightly Cloud Networking Newshttps://docs.google.com/document/d/1fkBWCGwXDUX9OfZ9_MvSVup8tJJzJeqrauaE6VPT2b0/Visit our website and subscribe: https://www.cables2clouds.com/Follow us on BlueSky: https://bsky.app/profile/cables2clouds.comFollow us on YouTube: https://www.youtube.com/@cables2clouds/Follow us on TikTok: https://www.tiktok.com/@cables2cloudsMerch Store: https://store.cables2clouds.com/Join the Discord Study group: https://artofneteng.com/iaatj
The Road to Macstock Conference and Expo wraps up in a conversation with Jeff Gamet where he previews his Macstock session on improving online privacy and security in practical, accessible terms. He shares some strategies to reduce tracking, protect against identity theft, and safely browse and shop online—without overwhelming jargon. Topics Jeff will address include on-device safety, ad tracking, DNS, and HTTPS, all presented with real-world examples. This edition of MacVoices is supported by MacVoices Magazine, our free magazine on Flipboard. Updated daily with the best articles on the web to help you do more with your Apple gear and adjacent tech, access MacVoices Magazine content on Flipboard, on the web, or in your favorite RSS reader. Show Notes: Chapters: 00:08 Introduction to Macstock00:37 The Journey to Macstock02:25 Jeff's Presentation Insights03:27 Online Privacy and Security10:35 Understanding Privacy Concerns15:02 The Balance of Ads and Content18:10 Navigating Tracking and Ads20:54 Preparing for Macstock21:44 Discount Code for Attendees23:16 Closing Thoughts on Macstock Links: Macstock Conference and Expo Save $50 with Jeff's discount code: jgamet Save $50 with Chuck's discount code: macvoices50 Guests: Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
Monerokon + BTC Prague takeawaysBitcoin tracing is a problemhttps://x.com/coinbureau/status/1930888638814208107https://x.com/metaryuk/status/1938071197163634895OpenMonero hacked, loses all fundshttps://monero.observer/openmonero-hacked-reports-all-funds-stolen/FCMP++ updatehttps://monero.observer/monero-talk-diego-salazar-interview-fcmps-status/[..] we're pretty happy now with divisors and we let MRL know that this past Wednesday [..] The actual issue was that Monero Research Lab wanted an answer within X number of weeks. [..] That was the whole Twitter scare of like ‘FCMPs has been delayed'. What was actually delayed by the way was the testnet. FCMPs itself was never promised at a particular time.. (Diego @ 27:20)BTCPay CCS making progressFirst update from the guys working on improving Monero support in BTCPay is out nowFunding still needed!https://ccs.getmonero.org/proposals/btcpayserver-plugin.htmlhttps://monero.observer/deverickapollo-napoly-post-first-progress-report-btcpay-server-monero-plugin-ccs/Software updatesCake Wallet updated to v5.0.0/5.0.1https://blog.cakewallet.com/cake-wallet-launches-sleek-ui-improvements-bitcoin-silent-payments-fixes-and-more/p2pool updated to v4.8/4.8.1Primarily bug fixes and some important security updates, time to update if you haven't yet!https://monero.observer/schernykh-releases-p2pool-v4.8-security-fixes/https://monero.observer/schernykh-releases-p2pool-v4.8.1-security-fixes/Monerujo updated to v4.1.7Fixes a bug with QR code amounts and adds a better translation frameworkhttps://monero.observer/monerujo-v4.1.7-exolix-released-fixes-translations-update/Unstoppable Swap GUI updated to v2.0.0https://monero.observer/binarybaron-releases-unstoppableswap-gui-2.0.0/Haveno/RetoSwap updated with new UIhttps://monero.observer/woodser-releases-haveno-v1.1.2-major-ui-changes/Stack Wallet updated to v2.2.2https://monero.observer/rehrar-releases-stack-wallet-v2.2.2/IMPORTANT LINKS https://freesamourai.comhttps://p2prights.org/donate.htmlhttps://ungovernablemisfits.comVALUE FOR VALUEThanks for listening you Ungovernable Misfits, we appreciate your continued support and hope you enjoy the shows.You can support this episode using your time, talent or treasure.TIME:- create fountain clips for the show- create a meetup- help boost the signal on social mediaTALENT:- create ungovernable misfit inspired art, animation or music- design or implement some software that can make the podcast better- use whatever talents you have to make a contribution to the show!TREASURE:- BOOST IT OR STREAM SATS on the Podcasting 2.0 apps @ https://podcastapps.com- DONATE to Seth @ https://sethforprivacy.com/donate/- DONATE via Monero @ https://xmrchat.com/ugmf- BUY SOME STICKERS @ https://www.ungovernablemisfits.com/shop/FOUNDATIONhttps://foundation.xyz/ungovernableFoundation builds Bitcoin-centric tools that empower you to reclaim your digital sovereignty.As a sovereign computing company, Foundation is the antithesis of today's tech conglomerates. Returning to cypherpunk principles, they build open source technology that “can't be evil”.Thank you Foundation Devices for sponsoring the show!Use code: Ungovernable for $10 off of your purchaseCAKE WALLEThttps://cakewallet.comCake Wallet is an open-source, non-custodial wallet available on Android, iOS, macOS, and Linux.Features:- Built-in Exchange: Swap easily between Bitcoin and Monero.- User-Friendly: Simple interface for all users.Monero Users:- Batch Transactions: Send multiple payments at once.- Faster Syncing: Optimized syncing via specified restore heights- Proxy Support: Enhance privacy with proxy node options.Bitcoin Users:- Coin Control: Manage your transactions effectively.- Silent Payments: Static bitcoin addresses- Batch Transactions: Streamline your payment process.Thank you Cake Wallet for sponsoring the show!MYNYMBOXhttps://mynymbox.ioYour go-to for anonymous server hosting solutions, featuring: virtual private & dedicated servers, domain registration and DNS parking. We don't require any of your personal information, and you can purchase using Bitcoin, Lightning, Monero and many other cryptos.Explore benefits such as No KYC, complete privacy & security, and human support.(00:00:00) INTRO(00:01:12) Crypto Conference Craziness(00:12:23) The Lifestyle(00:16:15) MoneroKon Insights(00:23:49) OpenMonero Hack(00:27:11) FCMP++ Update(00:30:52) British Tangent(00:34:17) BTC Pay Monero Plugin(00:35:23) The Tracing Truth(00:41:41) The Tracing Truth Pt. 2: Intel Hacker(00:48:11) Whirlpool is Back(00:50:19) Cake Wallet 5.0: The BIg UI Update(00:52:48) P2Pool DDOS Patches(00:53:25) Monerujo Brings the Translations(00:53:55) Unstoppable Swap GUI 2.0(00:55:20) Haveno/RetoSwap New UI(00:56:02) Stack Wallet Adds Cryptocurrencies(00:57:04) XMRCHATS(01:20:05) BOOSTS(01:23:27) THANK YOU MYNYMBOX(01:24:27) THANK YOU FOUNDATION(01:24:56) THANK YOU CAKE WALLET
Alt du trenger å vite om vin. Med Thomas Giertsen og DNs vinjournalist Merete Bø. Hosted on Acast. See acast.com/privacy for more information.
The Road to Macstock Conference and Expo wraps up in a conversation with Jeff Gamet where he previews his Macstock session on improving online privacy and security in practical, accessible terms. He shares some strategies to reduce tracking, protect against identity theft, and safely browse and shop online—without overwhelming jargon. Topics Jeff will address include on-device safety, ad tracking, DNS, and HTTPS, all presented with real-world examples. This edition of MacVoices is supported by MacVoices Magazine, our free magazine on Flipboard. Updated daily with the best articles on the web to help you do more with your Apple gear and adjacent tech, access MacVoices Magazine content on Flipboard, on the web, or in your favorite RSS reader. Show Notes: Chapters: 00:08 Introduction to Macstock 00:37 The Journey to Macstock 02:25 Jeff's Presentation Insights 03:27 Online Privacy and Security 10:35 Understanding Privacy Concerns 15:02 The Balance of Ads and Content 18:10 Navigating Tracking and Ads 20:54 Preparing for Macstock 21:44 Discount Code for Attendees 23:16 Closing Thoughts on Macstock Links: Macstock Conference and Expo Save $50 with Jeff's discount code: jgamet Save $50 with Chuck's discount code: macvoices50 Guests: Jeff Gamet is a technology blogger, podcaster, author, and public speaker. Previously, he was The Mac Observer's Managing Editor, and the TextExpander Evangelist for Smile. He has presented at Macworld Expo, RSA Conference, several WordCamp events, along with many other conferences. You can find him on several podcasts such as The Mac Show, The Big Show, MacVoices, Mac OS Ken, This Week in iOS, and more. Jeff is easy to find on social media as @jgamet on Twitter and Instagram, jeffgamet on LinkedIn., @jgamet@mastodon.social on Mastodon, and on his YouTube Channel at YouTube.com/jgamet. Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss
After suffering an L1 compression fracture and two disc herniations (L3-L4 & L5-S1) with nerve root impingement, Whitney, a 36-year-old firefighter and mother of three, found herself unable to lift her toddler, sneeze without collapsing, or perform basic duties on the job. She was taken off work placed on light duty, something every firefighter dreads.Whitney tried everything: three ER visits, multiple specialists, injections, chiropractors, red light therapy, acupuncture, DNS, and more. Despite all her efforts, she was told she might need epidurals, medical-grade cement injections, or even surgery... yet she still wasn't getting answers or real solutions.Frustrated and at a breaking point, she found the Whealth Limitless Program:
Om en knapp uke går Trumps frist ut.Hvis ikke USA og EU da er blitt enige kan det bli 50 prosent toll på alle europeiske varer som skal til USA. Og handelskrigen mellom allierte kan være et faktum. I ukens utgave av Den politiske situasjonen analyserer DNs finansredaktør Terje Erikstad og utenrikskommentator Simen Ekern hvor forhandlingene står nå, og hva som kan bli konsekvensen av ulike utfall. Programleder er DNs politiske redaktør Frithjof Jacobsen. Hosted on Acast. See acast.com/privacy for more information.
2025 SEO Explained: What Are SEO, AIO, GEO, AEO, SXO?
Welcome back to our weekend Cabral HouseCall shows! This is where we answer our community's wellness, weight loss, and anti-aging questions to help people get back on track! Check out today's questions: Yvonne: Have just been advised, based upon blood work, that I have reduced pancreatic function (52.2%). My diet contains no sugar (I use stevia or monk fruit or natural sugars in fruits such as dates) and don't eat any highly processed foods, no gluten… so basically a clean diet. I also exercise, am not overweight. Was told I am pre-diabetic with an A1C of 6. Had a sample of a 4continuous glucose monitor - lowest rate was 5 and highest one time 2 hrs after eating was 10. I intermittent fast usually from about 2 - 3 p.m. until around 7 a.m. Is there anything else I can do to ensure pancreatic function doesn't continue to decline as I don't want to be on a pharmaceutical. Thanks. Lynn: I only recently heard about liposomal vitamins for the first time. Now I seem to be hearing about them everywhere, including on last week's House Call where you recommended Liposomal Glutathione to help with exposure to harsh toxins. Are liposomal vitamins better than "regular" vitamins. Or are there certain vitamins that are better if taken in liposomal form? Thanks! Jenna: I had 6 meniscus, 1 PCL & 2 ACL surgeries. Thank you collegiate soccer. I noticed in my mid 20's after half of the surgeries, I would get a deep tingling and itch in my thighs while taking walks. I could prevent it from getting out of control if I had very tight compression workout pants on. But if I wore shorts, game over… I would scratch my thighs til it broke blood vessels. I don't know if it's a neurological or lymph/blood issue but no one seems to understand what I'm talking about. I would love to find an answer. I listened to the podcast about tingling skin but I'm not sure where to start. Anonymous: Hi Dr Cabral, thank you for all you do! Was just wondering how often and how much Moringa powder is safe to use? Would it be okay to add to a smoothie daily along with the greens powder and DNS? I have a Moringa tree and like to make my own powder. Also what are your thoughts on creatine for after or before a workout? Thank you Laura: Hi dr. Cabral! Thank you so much for sharing all your experience and knowledge with the community! I have dealt with got issues probably my whole life and I've been told I probably have sibo and Candida. So I am currently doing the CBO protocol. At the end of my protocol, my family has a trip planned to go to Tokyo Japan. Do you have any tips for me of what I can do to not ruin all my progress? And keep my gut bacteria healthy? Should I start the CBO finisher while I am there? I also am interested in doing the parasite cleanse. Can I do the para cleanse while I'm doing the CBO finisher after I get home? Any travel suggestions would be great! Thank you so much! TAKEAWAYS Thank you for tuning into today's Cabral HouseCall and be sure to check back tomorrow where we answer more of our community's questions! - - - Show Notes and Resources: StephenCabral.com/3431 - - - Get a FREE Copy of Dr. Cabral's Book: The Rain Barrel Effect - - - Join the Community & Get Your Questions Answered: CabralSupportGroup.com - - - Dr. Cabral's Most Popular At-Home Lab Tests: > Complete Minerals & Metals Test (Test for mineral imbalances & heavy metal toxicity) - - - > Complete Candida, Metabolic & Vitamins Test (Test for 75 biomarkers including yeast & bacterial gut overgrowth, as well as vitamin levels) - - - > Complete Stress, Mood & Metabolism Test (Discover your complete thyroid, adrenal, hormone, vitamin D & insulin levels) - - - > Complete Food Sensitivity Test (Find out your hidden food sensitivities) - - - > Complete Omega-3 & Inflammation Test (Discover your levels of inflammation related to your omega-6 to omega-3 levels) - - - Get Your Question Answered On An Upcoming HouseCall: StephenCabral.com/askcabral - - - Would You Take 30 Seconds To Rate & Review The Cabral Concept? The best way to help me spread our mission of true natural health is to pass on the good word, and I read and appreciate every review!
Email marketing still converts better than most digital channels, yet many businesses overlook this powerful tool because of misconceptions about its effectiveness or complexity. • Email is definitely not dead – it's been generating millions in revenue for over a decade• Design doesn't matter in email – focus on consistency and authenticity instead• The sweet spot for email frequency is 2-4 times per month• DNS records (SPF, DKIM, DMARC) are now essential for good deliverability• Different platforms serve different needs – MailChimp for beginners, Active Campaign for automation, GoHighLevel for all-in-one• Lead magnets should provide genuine value worth at least a couple hundred dollars• Perfectionism kills results – "good enough to get it out there" is a winning philosophy• Structure emails with curiosity in subject lines, a hook at the beginning, storytelling in the middle, and a clear CTA• The 7-11-4 principle: prospects need 7 hours of content, seeing your message 11 times, across 4 channels• Being "unapologetically authentic" builds stronger connections than polished marketing-----Guest Information: https://www.linkedin.com/in/schwedelson/https://subjectline.com/https://guruconference.com/https://outcomemedia.com/------More from EWR and Matt:Leave a Review if it was content you enjoyed: https://g.page/r/CccGEk37CLosEB0/reviewFree SEO Consultation: https://www.ewrdigital.com/discovery-callOne-on-One Consulting: https://www.ewrdigital.com/digital-strategy-consulting/private-consulting-session—The Unknown Secrets of Internet Marketing podcast is a podcast hosted by Internet marketing expert Matthew Bertram. The show provides insights and advice on digital marketing, SEO, and online business. Topics covered include keyword research, content optimization, link building, local SEO, and more. The show also features interviews with industry leaders and experts who share their experiences and tips. Additionally, Matt shares his own experiences and strategies, as well as his own successes and failures, to help listeners learn from his experiences and apply the same principles to their businesses. The show is designed to help entrepreneurs and business owners become successful online and get the most out of their digital marketing efforts.Find more great episodes here: https://www.internetmarketingsecretspodcast.com/ https://seo-podcast-the-unknown-secrets-of-internet-marketing.buzzsprout.comFollow us on:Facebook: @bestseopodcastInstagram: @thebestseopodcastTiktok: @bestseopodcastLinkedIn: @bestseopodcastPowered by: ewrdigital.comHosts: Matt Bertram Disclaimer: For Educational and Entertainment purposes only.Support the show
Ever wondered what happens to those domain names gathering digital dust in your GoDaddy account? In this episode of The Index, host Alex Kehaya sits down with Michael Ho, Co-founder of D3, to explore how blockchain technology is transforming the overlooked world of domain trading and ownership.The domain industry hasn't changed much since the '90s. Selling a valuable name still involves clunky escrow services, manual transfers, and broker fees that can eat up 25% or more of your sale. D3 is changing that—by tokenizing domains as programmable digital assets on-chain.What makes D3's approach unique is its seamless integration. Instead of building a new siloed system, they're bringing Web3 functionality directly to where domain owners already are—through familiar registrar interfaces. Soon, you'll be able to tokenize, trade, lease, or fractionalize your domains with just a few clicks.At the heart of it all is Doma, the first DNS-compliant blockchain network. D3's DomainFi platform runs on Doma, bridging traditional Web2 domains with Web3 ecosystems. The result? New sources of liquidity, distribution, and innovation—unlocking value in what's currently a $350B+ real-world asset class.The biggest surprise? Half of all domains aren't even being used—just sitting idle. D3's technology brings those names to life, enabling domain holders to tap into new financial use cases, from collateral to leasing and beyond. And with the recent launch of .sol as an official top-level domain on Solana, the bridge between Web2 and Web3 is getting stronger by the day.Whether you're a domain investor, builder, or simply curious about the next wave of internet infrastructure, this conversation reveals what's possible when the world's original digital assets go decentralized.
Today’s show is in memory of Fred Baker, who passed away on June 18, 2025. Fred was a pivotal figure in the IPv6 community. He was the long-time chair of the v6ops working group, and had a distinguished career at Cisco as a Technical Fellow. To honor Fred and his contributions, we’re sharing our interview... Read more »
SEO Visibility for Better Business Structure with SEO Expert, Favour Obasi-ike, MBA, MSIn this SEO visibility episode, Favour emphasizes the crucial role of strategic business structure and SEO visibility tactics for online success. The core idea revolves around distributing content across various digital platforms, asserting that a strong online presence necessitates more than just social media. The discussion extends to the importance of keyword research, content pillars, and analytical tools like Google Search Console and SEO Gets, all aimed at optimizing a business's digital footprint for long-term growth and effective customer engagement.FAQs1. What is the fundamental principle for improving business visibility online?The core principle for improving online business visibility is having a strong business structure. Just as a soccer player needs to be in the right physical position to make a shot, a business needs to be in the right online position to make sales. 2. How does an effective website contribute to business visibility and customer retention?An effective website serves as a central hub for your online presence. To stay relevant in 2025 and beyond, a website must consistently create valuable content that encourages visitors to return. This is likened to a restaurant serving good food: if customers love it, they'll come back, tell their friends, and promote it.The more questions a website answers, the more useful and visible it becomes, leading to increased traffic and customer loyalty.3. What is a key SEO visibility tactic discussed, and why is it effective?Podcasting is highlighted as a highly effective SEO visibility tactic. The speaker's own podcast, "We Don't PLAY" has achieved significant global ranking, demonstrating its power. Podcasting is effective because, as a host, you become the author and controller of the content. Listeners learn from you, connect with your message, and are likely to return, share, and subscribe. 4. What is the significance of a business's "online location" and underlying internet infrastructure?Even without a physical "brick and mortar" location, a business has an online "location" rooted in its website and underlying internet infrastructure. This includes its domain name, which is managed by entities like ICANN (Internet Corporation for Assigned Names and Numbers) and translated by DNS (Domain Name System) into an IP address, connecting users to the desired website. Just as a physical business is registered within a state, an online business has its digital "address." Understanding this infrastructure, including elements like DNS records and mail exchange records for business emails, is crucial for maintaining operational stability, ensuring proper email function, and effectively distributing a business's online presence globally.Access to Resources ⬇️Need SEO Services?>> Join our club community for exclusive information
Western States may be the most iconic race in ultrarunning—but it also comes with carnage, heartbreak, and a pile of DNS and DNF drama. In this episode, I'm joined by the always-entertaining Allison Mercer (of FastestKnownTime.com) to break down the storylines, the runners who didn't make it to the start line, and wild ideas to spice up the sport (spoiler: mile-seeding starts for elites?).We also dive into the FKT world—John Kelly's latest madness, what's changing in the scene, and why FKTs still matter. Plus, I give a quick life update because I'm moving out, living out of a storage unit, and heading out for an Appalachian Trail FKT attempt.Big thanks to our sponsors:
Today’s show is in memory of Fred Baker, who passed away on June 18, 2025. Fred was a pivotal figure in the IPv6 community. He was the long-time chair of the v6ops working group, and had a distinguished career at Cisco as a Technical Fellow. To honor Fred and his contributions, we’re sharing our interview... Read more »
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
Send us a textThe invisible threads connecting Kubernetes and networking infrastructure form the backbone of today's cloud-native world. In this revealing conversation with Marino Wijay from Kong, we unravel the complex relationship between traditional networking concepts and modern container orchestration.Marino brings a unique perspective as someone who entered the Kubernetes ecosystem through networking, explaining how fundamental networking principles directly translate to Kubernetes operations. "If you don't have a network, there is no Kubernetes," he emphasizes, highlighting how reachability between nodes forms the foundation of cluster communication.The network evolution within Kubernetes proves fascinating – from the early "black box" approach where connectivity was implicit to the sophisticated Container Network Interfaces (CNIs) like Cilium that offer granular control. Network engineers approaching Kubernetes for the first time might feel overwhelmed, but as we discover, concepts like DHCP with DNS registration, NAT, and load balancing all have direct parallels within the Kubernetes networking model.Our discussion ventures into the practical challenges organizations face when implementing service mesh technologies. While offering powerful capabilities for secure pod-to-pod communication through mutual TLS, service mesh introduces significant complexity. Marino shares insights on when this investment makes sense for enterprises versus smaller organizations with more controlled environments.The conversation takes an especially interesting turn when exploring how AI workloads are transforming Kubernetes networking requirements. From GPU-enabled clusters to specialized traffic patterns and the concept of Dynamic Resource Allocation as "QoS for AI," we examine how these resource-intensive applications are pushing the boundaries of what's possible.Whether you're a network engineer curious about containers or a Kubernetes administrator looking to deepen your networking knowledge, this episode bridges crucial gaps between these interconnected worlds. Subscribe to Cables to Clouds for more insights at the intersection of networking and cloud technologies!https://www.linkedin.com/in/mwijay/Purchase Chris and Tim's new book on AWS Cloud Networking: https://www.amazon.com/Certified-Advanced-Networking-Certification-certification/dp/1835080839/ Check out the Fortnightly Cloud Networking Newshttps://docs.google.com/document/d/1fkBWCGwXDUX9OfZ9_MvSVup8tJJzJeqrauaE6VPT2b0/Visit our website and subscribe: https://www.cables2clouds.com/Follow us on BlueSky: https://bsky.app/profile/cables2clouds.comFollow us on YouTube: https://www.youtube.com/@cables2clouds/Follow us on TikTok: https://www.tiktok.com/@cables2cloudsMerch Store: https://store.cables2clouds.com/Join the Discord Study group: https://artofneteng.com/iaatj
China's Salt Typhoon claims another victim (or two). State healthcare portals are tracking and leaking. No kidding. Apple adopts FIDO's Passkeys and other credentials transport. Facebook gets Passkey logon. TikTok continues ticking for at least another 90 days. Canadian telco admits they were infiltrated by Salt Typhoon. Microsoft to remove unwanted (and hopefully unneeded) hardware drivers. The Austrian government legislates court-warranted message decryption. I (Steve) finally get full clarity on what today's "AI" means. A deep dive into the Salt Typhoon's operation and how they got in Show Notes - https://www.grc.com/sn/SN-1031-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow hoxhunt.com/securitynow outsystems.com/twit bigid.com/securitynow zscaler.com/security
In this episode of PING, APNIC's Chief Scientist, Geoff Huston, discusses the root zone of the DNS, and some emerging concerns in how much it costs to service query load at the root. In the absence of cacheing, all queries in the DNS (except ones the DNS system you ask is locally authoritative for anyway) have to be sent through the root of the DNS, to find the right nameserver to ask for the specific information. Thanks to cacheing, this system doesn't drown in the load of every worldwide query, all the time, going through the root. But, even taking cacheing into account there is an astronomical amount of query seen at the root, and it has two interesting qualities Firstly, its growing significantly faster than the normal rate of growth of the Internet. We're basically at small incremental growth overall in new users, but query load at the root increases significantly faster, even after some more unexpected loads have been reduced. Secondly, almost all of the queries demand the answer "No, that doesn't exist" and the fact most traffic to the root hunts the answer NO means that the nature of distributed DNS cacheing of negative answers isn't addressing the fundamental burden here. Geoff thinks we may be ignoring some recent developments in proving the contents of a zone, the ZONEMD record which is a DNSSEC signed check on the entire zone contents, and emerging systems to download the root zone, and localise all the queries sent onwards into a copy of the root held in the resolver. Basically, "can we do better" -And Geoff thinks, we very probably can.
Making music with code in real time, fancy rsync, an open source real time strategy engine, advanced print debugging, EU-based DNS resolvers, and European government departments moving away from Microsoft and they might stick with Linux and FOSS this time. Discoveries Strudel rsyncy Spring IceCream DNS4EU News/discussion Two city governments in Denmark are... Read More
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine compliance. We'll discuss what a modern, strategic access management approach looks like and how passwordless authentication solutions are closing the gap between security and usability. To learn more about passwordless authentication in healthcare and other critical industries, check out our whitepapers on the topic: https://security.imprivata.com/putting-complex-passwords-to-work-for-you-wp.html https://www.imprivata.com/resources/whitepapers/passwordless-journey-healthcare This segment is sponsored by Imprivata. Visit https://securityweekly.com/imprivataidv to learn more about them! As digital identities multiply and certificate lifespans shrink, enterprises face growing challenges in securing trust across users, devices, and systems. This session explores why unifying PKI and IAM is essential to closing identity-related trust gaps and how platforms like DigiCert ONE—integrating PKI, DNS, and automation—help eliminate outages, streamline security operations, and future-proof organizations. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertidv to learn more about them! Identity-related attacks are now the dominant threat vector in cybersecurity, yet most organizations remain hindered by fragmented tools, siloed data, and disconnected teams. “Multiplayer AI” offers a new model for identity security, emphasizing interoperability between human experts and AI agents to create a unified, real-time system of systems. By fostering collaboration through open standards and shared intelligence, enterprises can close security gaps, reduce attacker dwell time, and respond faster—transforming identity security from isolated defense into coordinated resilience. https://www.radiantlogic.com/blog/the-dentity-security-paradox-when-more-tools-create-bigger-blind-spots/ This segment is sponsored by Radiant Logic. Visit https://securityweekly.com/radiantlogicidv to learn more about them! In this era of technological advancements where businesses are going digital and more cloud based while preferring remote work environment, cyber threats are surprising growing at the rate never seen before. This makes Identity and Access Management (IAM) and Privileged Access Management (PAM) no more an optional thing but a core crucial requirement. These are not just IT tools anymore- they are important for the security of people, data, and operations. More and more organizations from different industries are now turning to IAM and PAM as managed services to handle the growing complexity of access control and cybersecurity. Why? Because managing identity internally is becoming harder, more expensive, and riskier. With a trusted managed service partner, businesses gain expert support, 24/7 monitoring, scalability, and peace of mind—all while staying compliant and secure. This segment will explore how IAM and PAM managed services are helping companies reduce risk, simplify operations, and stay ahead of evolving security challenges. Whether you're an IT leader, security professional, or business decision-maker, you'll learn why outsourcing identity and access management is quickly becoming a smart, strategic move for the modern enterprise https://www.idmexpress.com/blogs https://www.idmexpress.com/post/cyberark-privileged-access-management-pam-implementation https://www.idmexpress.com/iam-products This segment is sponsored by IDMEXPRESS. Visit https://securityweekly.com/idmidv to implement and manage IAM and PAM solutions tailored to your business needs. Duo's biggest announcement since push-MFA. Duo is defining the future of Identity by unveiling a solution that attackers will hate and users will love. This segment is sponsored by Cisco Duo. Visit https://securityweekly.com/duoidv to learn more about them! In this interview, we will explore the power of data-driven identity leadership and how organizations can leverage analytics to enhance their identity security strategies. Hear insights on aligning data with business goals, improving decision-making, and proactively managing risk. Learn how analytics can transform your identity program from reactive to strategic, driving measurable success. This segment is sponsored by Saviynt. Visit https://securityweekly.com/saviyntidv to learn more about them or get a free demo! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-412
In fast-paced, shared device environments like healthcare, manufacturing, and other critical industries, traditional access management approaches are falling short, quietly eroding both security and productivity. This episode explores how outdated methods, like shared credentials and clunky logins, create friction, increase risk, and undermine compliance. We'll discuss what a modern, strategic access management approach looks like and how passwordless authentication solutions are closing the gap between security and usability. To learn more about passwordless authentication in healthcare and other critical industries, check out our whitepapers on the topic: https://security.imprivata.com/putting-complex-passwords-to-work-for-you-wp.html https://www.imprivata.com/resources/whitepapers/passwordless-journey-healthcare This segment is sponsored by Imprivata. Visit https://securityweekly.com/imprivataidv to learn more about them! As digital identities multiply and certificate lifespans shrink, enterprises face growing challenges in securing trust across users, devices, and systems. This session explores why unifying PKI and IAM is essential to closing identity-related trust gaps and how platforms like DigiCert ONE—integrating PKI, DNS, and automation—help eliminate outages, streamline security operations, and future-proof organizations. This segment is sponsored by DigiCert. Visit https://securityweekly.com/digicertidv to learn more about them! Identity-related attacks are now the dominant threat vector in cybersecurity, yet most organizations remain hindered by fragmented tools, siloed data, and disconnected teams. “Multiplayer AI” offers a new model for identity security, emphasizing interoperability between human experts and AI agents to create a unified, real-time system of systems. By fostering collaboration through open standards and shared intelligence, enterprises can close security gaps, reduce attacker dwell time, and respond faster—transforming identity security from isolated defense into coordinated resilience. https://www.radiantlogic.com/blog/the-dentity-security-paradox-when-more-tools-create-bigger-blind-spots/ This segment is sponsored by Radiant Logic. Visit https://securityweekly.com/radiantlogicidv to learn more about them! In this era of technological advancements where businesses are going digital and more cloud based while preferring remote work environment, cyber threats are surprising growing at the rate never seen before. This makes Identity and Access Management (IAM) and Privileged Access Management (PAM) no more an optional thing but a core crucial requirement. These are not just IT tools anymore- they are important for the security of people, data, and operations. More and more organizations from different industries are now turning to IAM and PAM as managed services to handle the growing complexity of access control and cybersecurity. Why? Because managing identity internally is becoming harder, more expensive, and riskier. With a trusted managed service partner, businesses gain expert support, 24/7 monitoring, scalability, and peace of mind—all while staying compliant and secure. This segment will explore how IAM and PAM managed services are helping companies reduce risk, simplify operations, and stay ahead of evolving security challenges. Whether you're an IT leader, security professional, or business decision-maker, you'll learn why outsourcing identity and access management is quickly becoming a smart, strategic move for the modern enterprise https://www.idmexpress.com/blogs https://www.idmexpress.com/post/cyberark-privileged-access-management-pam-implementation https://www.idmexpress.com/iam-products This segment is sponsored by IDMEXPRESS. Visit https://securityweekly.com/idmidv to implement and manage IAM and PAM solutions tailored to your business needs. Duo's biggest announcement since push-MFA. Duo is defining the future of Identity by unveiling a solution that attackers will hate and users will love. This segment is sponsored by Cisco Duo. Visit https://securityweekly.com/duoidv to learn more about them! In this interview, we will explore the power of data-driven identity leadership and how organizations can leverage analytics to enhance their identity security strategies. Hear insights on aligning data with business goals, improving decision-making, and proactively managing risk. Learn how analytics can transform your identity program from reactive to strategic, driving measurable success. This segment is sponsored by Saviynt. Visit https://securityweekly.com/saviyntidv to learn more about them or get a free demo! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-412
Making music with code in real time, fancy rsync, an open source real time strategy engine, advanced print debugging, EU-based DNS resolvers, and European government departments moving away from Microsoft and they might stick with Linux and FOSS this time. Discoveries Strudel rsyncy Spring IceCream DNS4EU News/discussion Two city governments in Denmark are... Read More
In this podcast episode, host Michelle Frechette welcomes Carrie Dils, Mika Epstein, and Ryan McCue to discuss their roles in the WordPress community and the new FAIR project. The group explores FAIR's mission to create a federated independent repository system for WordPress plugins and themes, focusing on decentralization, community-driven moderation, inclusive governance, and privacy. They address challenges like supporting premium plugins, reducing environmental impact, and fostering global participation. The episode highlights FAIR's collaborative, open-source approach and invites listeners to get involved through GitHub and community meetings, aiming to shape a more innovative and inclusive WordPress ecosystem.Top Takeaways:FAIR Is Reimagining Plugin Discovery and Trust for WordPress: FAIR is building a more open, decentralized ecosystem for WordPress plugin discovery—empowering both end users and developers. By enabling verified directories and authenticated plugin listings (via methods like DNS verification), FAIR provides an alternative to the limitations of the WordPress.org repo, while increasing transparency, user safety, and trust.Community Participation Is Central to FAIR's Success: The FAIR initiative is deeply community-driven. Contributors are encouraged to get involved through GitHub Discussions, introduce themselves, offer help, or join working groups. The leadership team is intentionally building these groups based on people's skills and availability, rather than predefined roles—making FAIR flexible, inclusive, and open to evolving needs.FAIR Encourages Innovation Outside Traditional WordPress Constraints: The project provides an alternative path for plugin creators who may not want to follow the traditional WordPress.org model (e.g., having to release a free version first). With FAIR, creators can request to be listed in aggregator directories that are more flexible, values-aligned, or niche-focused—fostering innovation and lowering barriers to entry.FAIR Is Still in Early Development—and Actively Growing: While the FAIR plugin and protocol are live (accessible via fair.pm), the ecosystem is in its formative stages. The team is prioritizing essential needs (the “MVP”) and building infrastructure to support future growth in documentation, marketing, design, development, and user testing. They welcome feedback on plugin issues, conflicts, and ideas, encouraging broad experimentation and iteration.Mentioned in the Show:FAIRLinkedIn LearningAwesome MotiveLez Watch TVHuman MadeAspire PressGravatarLinux Foundation ProjectBlueskyWPCCBlack PressMastodon DrupalCourtney RobertsonAutomatticMediaWikiMonster InsightsGravity FormsFastly
Interpol's Operation Secure dismantles a major cybercrime network, and Singapore takes down scam centers. GitLab patches multiple vulnerabilities in its DevSecOps platform. Researchers unveil a covert method for exfiltrating data using smartwatches. EchoLeak allows for data exfiltration from Microsoft Copilot. Journalists are confirmed targets of Paragon's Graphite spyware. France calls for comments on tracking pixels. Fog ransomware operators deploy an unusual mix of tools. Skeleton Spider targets recruiters by posing as job seekers on LinkedIn and Indeed. Erie Insurance suffers ongoing outages following a cyberattack. Our N2K Lead Analyst Ethan Cook shares insights on Trump's antitrust policies. DNS neglect leads to AI subdomain exploits. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today, we share a selection from today's Caveat podcast where Dave Bittner and Ben Yelin are joined by N2K's Lead Analyst, Ethan Cook, to take a Policy Deep Dive into “The art of the breakup: Trump's antitrust surge.” You can listen to the full episode here and find new episodes of Caveat in your favorite podcast app each Thursday. Selected Reading Interpol takes down 20,000 malicious IPs and domains (Cybernews) Singapore leads multinational operation to shutter scam centers tied to $225 million in thefts (The Record) GitLab patches high severity account takeover, missing auth issues (Bleeping Computer) SmartAttack uses smartwatches to steal data from air-gapped systems (Bleeping Computer) Critical vulnerability in Microsoft 365 Copilot AI called EchoLeak enabled data exfiltration (Beyond Machines) Researchers confirm two journalists were hacked with Paragon spyware (TechCrunch) Tracking pixels: CNIL launches public consultation on its draft recommendation (CNIL) Fog ransomware attack uses unusual mix of legitimate and open-source tools (Bleeping Computer) FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters (The Record) Erie Insurance confirms cyberattack behind business disruptions (Bleeping Computer) Why Was Nvidia Hosting Blogs About 'Brazilian Facesitting Fart Games'? (404 Media) Secure your public DNS presence from subdomain takeovers and dangling DNS exploits (Silent Push) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
The Hexabuild team is providing a new community resource, an IPv6 compatibility checker, for those trying to figure out IPv6 network hardware and software compatibility. It’s currently in an alpha version. We talk about what inspired it, what it does, and possible future updates. We also want to get your feedback on whether this is... Read more »
In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0 in Erlang/OTP's SSH library. Can Russia intercept Telegram? Perhaps. Spain's ISPs mistakenly block Google sites. Reddit sues Anthropic. Twitter's new encrypted DM's are as lame as the old ones. The Login.gov site may not have any backups. Apple explores the question of recent Large Reasoning Models "thinking" Show Notes - https://www.grc.com/sn/SN-1029-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow threatlocker.com for Security Now uscloud.com canary.tools/twit - use code: TWIT
In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0 in Erlang/OTP's SSH library. Can Russia intercept Telegram? Perhaps. Spain's ISPs mistakenly block Google sites. Reddit sues Anthropic. Twitter's new encrypted DM's are as lame as the old ones. The Login.gov site may not have any backups. Apple explores the question of recent Large Reasoning Models "thinking" Show Notes - https://www.grc.com/sn/SN-1029-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow threatlocker.com for Security Now uscloud.com canary.tools/twit - use code: TWIT
In memoriam: Bill Atkinson Meta native apps & JavaScript collude for a localhost local mess. The EU rolls out its own DNS4EU filtered DNS service. Ukraine DDoS's Russia's Railway DNS ... and... so what? The Linux Foundation creates an alternative Wordpress package manager. Court tells OpenAI it must NOT delete ANYONE's chats. Period! :( A CVSS 10.0 in Erlang/OTP's SSH library. Can Russia intercept Telegram? Perhaps. Spain's ISPs mistakenly block Google sites. Reddit sues Anthropic. Twitter's new encrypted DM's are as lame as the old ones. The Login.gov site may not have any backups. Apple explores the question of recent Large Reasoning Models "thinking" Show Notes - https://www.grc.com/sn/SN-1029-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: hoxhunt.com/securitynow threatlocker.com for Security Now uscloud.com canary.tools/twit - use code: TWIT
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
OctoSQL & Vulnerability Data OctoSQL is a neat tool to query files in different formats using SQL. This can, for example, be used to query the JSON vulnerability files from CISA or NVD and create interesting joins between different files. https://isc.sans.edu/diary/OctoSQL+Vulnerability+Data/32026 Mirai vs. Wazuh The Mirai botnet has now been observed exploiting a vulnerability in the open-source EDR tool Wazuh. https://www.akamai.com/blog/security-research/botnets-flaw-mirai-spreads-through-wazuh-vulnerability DNS4EU The European Union created its own public recursive resolver to offer a public resolver compliant with European privacy laws. This resolver is currently operated by ENISA, but the intent is to have a commercial entity operate and support it by a commercial entity. https://www.joindns4.eu/ WordPress FAIR Package Manager Recent legal issues around different WordPress-related entities have made it more difficult to maintain diverse sources of WordPress plugins. With WordPress plugins usually being responsible for many of the security issues, the Linux Foundation has come forward to support the FAIR Package Manager, a tool intended to simplify the management of WordPress packages. https://github.com/fairpm