Process of converting plaintext to ciphertext
POPULARITY
ZFS Scrubs and Data integrity, Propolice, FreeBSD vs Slackware and more. NOTES This episode of BSDNow is brought to you by Tarsnap and the BSDNow Patreon Headlines Understanding ZFS Scrubs and Data Integrity The story of Propolice Desk reviews describe comment ask questions No reponses, no justications. [Tj's Desk](media/bsdnow649-tjs-desk.jpg) [Ruben's Desk](media/bsdnow649-rubens-desk.jpg) News Roundup FreeBSD vs. Slackware: Which super stable OS is right for you? Prometheus, Let's Encrypt, and making sure all our TLS certificates are monitored Wait, a repairable ThinkPad!? Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv Join us and other BSD Fans in our BSD Now Telegram channel
oaring RAM prices are about to hit your security gear where it hurts, and the fallout could change what's protecting your network. Find out who's about to pay and why the AI gold rush is reshaping more than just your server specs. RAM pricing to affect enterprise firewall equipment. Anthropic provides sizeable support to Python Foundation. The FTC clamps down on GM's secret sale of driving data. "ANCHOR" replaces "CIPAC" for industry-government sharing. Germany planning to legislate total access to global data. Grubhub becomes the latest ShinyHunters extortion victim. Let's Encrypt's 6-Day certs are available to everyone. Iran planning to permanently take itself off the Internet. HD Tune before and after a SpinRite Level 3 refresh. Some great listener feedback, and More trouble from GhostPoster malicious browser extensions Show Notes - https://www.grc.com/sn/SN-1061-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit canary.tools/twit - use code: TWIT threatlocker.com/twit meter.com/securitynow joindeleteme.com/twit promo code TWIT
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Add Punycode to your Threat Hunting Routine Punycode patterns in DNS queries make excellent hunting opportunities. https://isc.sans.edu/diary/Add%20Punycode%20to%20your%20Threat%20Hunting%20Routine/32640 GNU InetUtils Security Advisory: remote authentication by-pass intelnetd telnetd shipping with InetUtils suffers from a critical authentication by-pass vulnerability. https://www.openwall.com/lists/oss-security/2026/01/20/2 6-day and IP Address Certificates are Generally Available Let s Encrypt will now offer 6-day certificates as an option. These short-lived certificates can be used for IP addresses. https://letsencrypt.org/2026/01/15/6day-and-ip-general-availability Oracle Quarterly Critical Patch Update Oracle released its first quarterly patches for 2026, fixing 337 vulnerabilities https://www.oracle.com/security-alerts/cpujan2026.html#AppendixFMW
Soaring RAM prices are about to hit your security gear where it hurts, and the fallout could change what's protecting your network. Find out who's about to pay and why the AI gold rush is reshaping more than just your server specs. RAM pricing to affect enterprise firewall equipment. Anthropic provides sizeable support to Python Foundation. The FTC clamps down on GM's secret sale of driving data. "ANCHOR" replaces "CIPAC" for industry-government sharing. Germany planning to legislate total access to global data. Grubhub becomes the latest ShinyHunters extortion victim. Let's Encrypt's 6-Day certs are available to everyone. Iran planning to permanently take itself off the Internet. HD Tune before and after a SpinRite Level 3 refresh. Some great listener feedback, and More trouble from GhostPoster malicious browser extensions Show Notes - https://www.grc.com/sn/SN-1061-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit canary.tools/twit - use code: TWIT threatlocker.com/twit meter.com/securitynow joindeleteme.com/twit promo code TWIT
Soaring RAM prices are about to hit your security gear where it hurts, and the fallout could change what's protecting your network. Find out who's about to pay and why the AI gold rush is reshaping more than just your server specs. RAM pricing to affect enterprise firewall equipment. Anthropic provides sizeable support to Python Foundation. The FTC clamps down on GM's secret sale of driving data. "ANCHOR" replaces "CIPAC" for industry-government sharing. Germany planning to legislate total access to global data. Grubhub becomes the latest ShinyHunters extortion victim. Let's Encrypt's 6-Day certs are available to everyone. Iran planning to permanently take itself off the Internet. HD Tune before and after a SpinRite Level 3 refresh. Some great listener feedback, and More trouble from GhostPoster malicious browser extensions Show Notes - https://www.grc.com/sn/SN-1061-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit canary.tools/twit - use code: TWIT threatlocker.com/twit meter.com/securitynow joindeleteme.com/twit promo code TWIT
Soaring RAM prices are about to hit your security gear where it hurts, and the fallout could change what's protecting your network. Find out who's about to pay and why the AI gold rush is reshaping more than just your server specs. RAM pricing to affect enterprise firewall equipment. Anthropic provides sizeable support to Python Foundation. The FTC clamps down on GM's secret sale of driving data. "ANCHOR" replaces "CIPAC" for industry-government sharing. Germany planning to legislate total access to global data. Grubhub becomes the latest ShinyHunters extortion victim. Let's Encrypt's 6-Day certs are available to everyone. Iran planning to permanently take itself off the Internet. HD Tune before and after a SpinRite Level 3 refresh. Some great listener feedback, and More trouble from GhostPoster malicious browser extensions Show Notes - https://www.grc.com/sn/SN-1061-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit canary.tools/twit - use code: TWIT threatlocker.com/twit meter.com/securitynow joindeleteme.com/twit promo code TWIT
Soaring RAM prices are about to hit your security gear where it hurts, and the fallout could change what's protecting your network. Find out who's about to pay and why the AI gold rush is reshaping more than just your server specs. RAM pricing to affect enterprise firewall equipment. Anthropic provides sizeable support to Python Foundation. The FTC clamps down on GM's secret sale of driving data. "ANCHOR" replaces "CIPAC" for industry-government sharing. Germany planning to legislate total access to global data. Grubhub becomes the latest ShinyHunters extortion victim. Let's Encrypt's 6-Day certs are available to everyone. Iran planning to permanently take itself off the Internet. HD Tune before and after a SpinRite Level 3 refresh. Some great listener feedback, and More trouble from GhostPoster malicious browser extensions Show Notes - https://www.grc.com/sn/SN-1061-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit canary.tools/twit - use code: TWIT threatlocker.com/twit meter.com/securitynow joindeleteme.com/twit promo code TWIT
Soaring RAM prices are about to hit your security gear where it hurts, and the fallout could change what's protecting your network. Find out who's about to pay and why the AI gold rush is reshaping more than just your server specs. RAM pricing to affect enterprise firewall equipment. Anthropic provides sizeable support to Python Foundation. The FTC clamps down on GM's secret sale of driving data. "ANCHOR" replaces "CIPAC" for industry-government sharing. Germany planning to legislate total access to global data. Grubhub becomes the latest ShinyHunters extortion victim. Let's Encrypt's 6-Day certs are available to everyone. Iran planning to permanently take itself off the Internet. HD Tune before and after a SpinRite Level 3 refresh. Some great listener feedback, and More trouble from GhostPoster malicious browser extensions Show Notes - https://www.grc.com/sn/SN-1061-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit canary.tools/twit - use code: TWIT threatlocker.com/twit meter.com/securitynow joindeleteme.com/twit promo code TWIT
Soaring RAM prices are about to hit your security gear where it hurts, and the fallout could change what's protecting your network. Find out who's about to pay and why the AI gold rush is reshaping more than just your server specs. RAM pricing to affect enterprise firewall equipment. Anthropic provides sizeable support to Python Foundation. The FTC clamps down on GM's secret sale of driving data. "ANCHOR" replaces "CIPAC" for industry-government sharing. Germany planning to legislate total access to global data. Grubhub becomes the latest ShinyHunters extortion victim. Let's Encrypt's 6-Day certs are available to everyone. Iran planning to permanently take itself off the Internet. HD Tune before and after a SpinRite Level 3 refresh. Some great listener feedback, and More trouble from GhostPoster malicious browser extensions Show Notes - https://www.grc.com/sn/SN-1061-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit canary.tools/twit - use code: TWIT threatlocker.com/twit meter.com/securitynow joindeleteme.com/twit promo code TWIT
The storage apocalypse has arrived. An old friend drops by to talk survival strategies as prices explode, and we pitch our own unapologetically 90s approach to stretching storage.Sponsored By:Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. CrowdHealth: Discover a Better Way to Pay for Healthcare with Crowdfunded Memberships. Join CrowdHealth to get started today for $99 for your first three months using UNPLUGGED. Support LINUX UnpluggedLinks:
◯Meta、デスクトップ版「Messenger」を終了。ブラウザ版への移行を強制 https://gori.me/facebook/facebook-news/162776 ◯ついにAndroid←→iPhoneでAirDropが可能に!実際使えるのか徹底検証した https://pc.watch.impress.co.jp/docs/topic/feature/2070612.html ◯Apple Music、ChatGPTと連携可能に https://www.musicman.co.jp/business/706494 ◯36GB積んだM3 Maxなのに「足りない」。“4倍高騰”の波を見て、M4 Max 128GBを本気で検討し始めた話 https://gori.me/macbookpro/162805 ◯ドコモ、コミケ会場周辺の5G強化 初の「3セクタMMU車両」も投入へ https://www.itmedia.co.jp/news/articles/2512/23/news115.html ◯なぜ叩かれなかった? AIイラストの「嫌悪感」、コロプラ新作ゲーの“かわし方”がうまかった https://www.itmedia.co.jp/business/articles/2512/17/news023.html ◯NTT東日本が“最大25Gbps”の極太回線「フレッツ 光25G」を発表。月額2万7500円。東京都中央区の一部エリアで2026年3月31日より提供開始。最大50Gbpsのサービス提供も検討中、夢はひろがる https://news.denfaminicogamer.jp/news/2512232a ◯マイナポータル強化へ、1月1日に大規模改修 31日22時から利用停止 https://www.watch.impress.co.jp/docs/news/2075014.html ◯Let's Encryptが証明書の有効期間を45日間に短縮すると発表 https://gigazine.net/news/20251203-lets-encrypt-decreasing-certificate-lifetimes-45-days/
What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer clouds. Insecure Docker API servers are also hosting cryptominers. A new and truly massive SmartTV-based botnet discovery. DNS Benchmark's 4th release. Who, besides Let's Encrypt, offers free automated certs. Some interesting listener feedback. And how a PNG Icon was used to infect 50,000 Firefox users Show Notes - https://www.grc.com/sn/SN-1057-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: zscaler.com/security
What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer clouds. Insecure Docker API servers are also hosting cryptominers. A new and truly massive SmartTV-based botnet discovery. DNS Benchmark's 4th release. Who, besides Let's Encrypt, offers free automated certs. Some interesting listener feedback. And how a PNG Icon was used to infect 50,000 Firefox users Show Notes - https://www.grc.com/sn/SN-1057-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: zscaler.com/security
What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer clouds. Insecure Docker API servers are also hosting cryptominers. A new and truly massive SmartTV-based botnet discovery. DNS Benchmark's 4th release. Who, besides Let's Encrypt, offers free automated certs. Some interesting listener feedback. And how a PNG Icon was used to infect 50,000 Firefox users Show Notes - https://www.grc.com/sn/SN-1057-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: zscaler.com/security
What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer clouds. Insecure Docker API servers are also hosting cryptominers. A new and truly massive SmartTV-based botnet discovery. DNS Benchmark's 4th release. Who, besides Let's Encrypt, offers free automated certs. Some interesting listener feedback. And how a PNG Icon was used to infect 50,000 Firefox users Show Notes - https://www.grc.com/sn/SN-1057-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: zscaler.com/security
What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer clouds. Insecure Docker API servers are also hosting cryptominers. A new and truly massive SmartTV-based botnet discovery. DNS Benchmark's 4th release. Who, besides Let's Encrypt, offers free automated certs. Some interesting listener feedback. And how a PNG Icon was used to infect 50,000 Firefox users Show Notes - https://www.grc.com/sn/SN-1057-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: zscaler.com/security
What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer clouds. Insecure Docker API servers are also hosting cryptominers. A new and truly massive SmartTV-based botnet discovery. DNS Benchmark's 4th release. Who, besides Let's Encrypt, offers free automated certs. Some interesting listener feedback. And how a PNG Icon was used to infect 50,000 Firefox users Show Notes - https://www.grc.com/sn/SN-1057-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: zscaler.com/security
What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer clouds. Insecure Docker API servers are also hosting cryptominers. A new and truly massive SmartTV-based botnet discovery. DNS Benchmark's 4th release. Who, besides Let's Encrypt, offers free automated certs. Some interesting listener feedback. And how a PNG Icon was used to infect 50,000 Firefox users Show Notes - https://www.grc.com/sn/SN-1057-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: zscaler.com/security
What if your smart TV and Firefox extensions were secretly hijacking your security and privacy? This episode reveals the jaw-dropping discovery of a massive TV botnet and the surprisingly clever malware lurking behind innocent browser icons. North Korea's profitable fixation on cryptocurrency. Amazon uncovers a cryptomining sneaking into customer clouds. Insecure Docker API servers are also hosting cryptominers. A new and truly massive SmartTV-based botnet discovery. DNS Benchmark's 4th release. Who, besides Let's Encrypt, offers free automated certs. Some interesting listener feedback. And how a PNG Icon was used to infect 50,000 Firefox users Show Notes - https://www.grc.com/sn/SN-1057-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsor: zscaler.com/security
Tooltips (Tüddelkrams) für Container, Kubernetes und Lets Encrypt/ACME mit Felix, Moritz und Volkmar vom FOCUS ON: DevOps Podcast.Im Engineering-Kiosk-Adventskalender 2025 sprechen befreundete Podcaster⋅innen und wir selbst, Andy und Wolfi, jeden Tag kurz & knackig innerhalb weniger Minuten über ein interessantes Tech-Thema.Unsere aktuellen Werbepartner findest du auf https://engineeringkiosk.dev/partnersDas schnelle Feedback zur Episode:
Australia's nationwide social media ban has put tech's age verification tools under the spotlight, exposing the flaws and privacy risks in today's facial detection systems and sparking worldwide debate about what's coming for the rest of us. Home Depot's puzzling reluctance to close a bad hole. GNOME's shell extension manager is unhappy with AI. How attacks on open source repositories compares in 2025. China's researchers have taken aim at the US power grid. How bad has the React2Shell vulnerability turned out to be. More new React vulnerabilities. Apple moves to iOS 26.2. Let's Encrypt's crosses into one billion servers managed. A DNS Benchmark update. Some interesting listener feedback, then... How things going with Australia's social media ban and what we are learning https://www.grc.com/sn/SN-1056-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zapier.com/securitynow threatlocker.com/twit joindeleteme.com/twit promo code TWIT veeam.com bitwarden.com/twit
Australia's nationwide social media ban has put tech's age verification tools under the spotlight, exposing the flaws and privacy risks in today's facial detection systems and sparking worldwide debate about what's coming for the rest of us. Home Depot's puzzling reluctance to close a bad hole. GNOME's shell extension manager is unhappy with AI. How attacks on open source repositories compares in 2025. China's researchers have taken aim at the US power grid. How bad has the React2Shell vulnerability turned out to be. More new React vulnerabilities. Apple moves to iOS 26.2. Let's Encrypt's crosses into one billion servers managed. A DNS Benchmark update. Some interesting listener feedback, then... How things going with Australia's social media ban and what we are learning https://www.grc.com/sn/SN-1056-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zapier.com/securitynow threatlocker.com/twit joindeleteme.com/twit promo code TWIT veeam.com bitwarden.com/twit
Australia's nationwide social media ban has put tech's age verification tools under the spotlight, exposing the flaws and privacy risks in today's facial detection systems and sparking worldwide debate about what's coming for the rest of us. Home Depot's puzzling reluctance to close a bad hole. GNOME's shell extension manager is unhappy with AI. How attacks on open source repositories compares in 2025. China's researchers have taken aim at the US power grid. How bad has the React2Shell vulnerability turned out to be. More new React vulnerabilities. Apple moves to iOS 26.2. Let's Encrypt's crosses into one billion servers managed. A DNS Benchmark update. Some interesting listener feedback, then... How things going with Australia's social media ban and what we are learning https://www.grc.com/sn/SN-1056-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zapier.com/securitynow threatlocker.com/twit joindeleteme.com/twit promo code TWIT veeam.com bitwarden.com/twit
Australia's nationwide social media ban has put tech's age verification tools under the spotlight, exposing the flaws and privacy risks in today's facial detection systems and sparking worldwide debate about what's coming for the rest of us. Home Depot's puzzling reluctance to close a bad hole. GNOME's shell extension manager is unhappy with AI. How attacks on open source repositories compares in 2025. China's researchers have taken aim at the US power grid. How bad has the React2Shell vulnerability turned out to be. More new React vulnerabilities. Apple moves to iOS 26.2. Let's Encrypt's crosses into one billion servers managed. A DNS Benchmark update. Some interesting listener feedback, then... How things going with Australia's social media ban and what we are learning https://www.grc.com/sn/SN-1056-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zapier.com/securitynow threatlocker.com/twit joindeleteme.com/twit promo code TWIT veeam.com bitwarden.com/twit
Australia's nationwide social media ban has put tech's age verification tools under the spotlight, exposing the flaws and privacy risks in today's facial detection systems and sparking worldwide debate about what's coming for the rest of us. Home Depot's puzzling reluctance to close a bad hole. GNOME's shell extension manager is unhappy with AI. How attacks on open source repositories compares in 2025. China's researchers have taken aim at the US power grid. How bad has the React2Shell vulnerability turned out to be. More new React vulnerabilities. Apple moves to iOS 26.2. Let's Encrypt's crosses into one billion servers managed. A DNS Benchmark update. Some interesting listener feedback, then... How things going with Australia's social media ban and what we are learning https://www.grc.com/sn/SN-1056-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zapier.com/securitynow threatlocker.com/twit joindeleteme.com/twit promo code TWIT veeam.com bitwarden.com/twit
Australia's nationwide social media ban has put tech's age verification tools under the spotlight, exposing the flaws and privacy risks in today's facial detection systems and sparking worldwide debate about what's coming for the rest of us. Home Depot's puzzling reluctance to close a bad hole. GNOME's shell extension manager is unhappy with AI. How attacks on open source repositories compares in 2025. China's researchers have taken aim at the US power grid. How bad has the React2Shell vulnerability turned out to be. More new React vulnerabilities. Apple moves to iOS 26.2. Let's Encrypt's crosses into one billion servers managed. A DNS Benchmark update. Some interesting listener feedback, then... How things going with Australia's social media ban and what we are learning https://www.grc.com/sn/SN-1056-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zapier.com/securitynow threatlocker.com/twit joindeleteme.com/twit promo code TWIT veeam.com bitwarden.com/twit
Australia's nationwide social media ban has put tech's age verification tools under the spotlight, exposing the flaws and privacy risks in today's facial detection systems and sparking worldwide debate about what's coming for the rest of us. Home Depot's puzzling reluctance to close a bad hole. GNOME's shell extension manager is unhappy with AI. How attacks on open source repositories compares in 2025. China's researchers have taken aim at the US power grid. How bad has the React2Shell vulnerability turned out to be. More new React vulnerabilities. Apple moves to iOS 26.2. Let's Encrypt's crosses into one billion servers managed. A DNS Benchmark update. Some interesting listener feedback, then... How things going with Australia's social media ban and what we are learning https://www.grc.com/sn/SN-1056-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zapier.com/securitynow threatlocker.com/twit joindeleteme.com/twit promo code TWIT veeam.com bitwarden.com/twit
Australia's nationwide social media ban has put tech's age verification tools under the spotlight, exposing the flaws and privacy risks in today's facial detection systems and sparking worldwide debate about what's coming for the rest of us. Home Depot's puzzling reluctance to close a bad hole. GNOME's shell extension manager is unhappy with AI. How attacks on open source repositories compares in 2025. China's researchers have taken aim at the US power grid. How bad has the React2Shell vulnerability turned out to be. More new React vulnerabilities. Apple moves to iOS 26.2. Let's Encrypt's crosses into one billion servers managed. A DNS Benchmark update. Some interesting listener feedback, then... How things going with Australia's social media ban and what we are learning https://www.grc.com/sn/SN-1056-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free audio and video feeds, a members-only Discord, and exclusive content. Join today: https://twit.tv/clubtwit Sponsors: zapier.com/securitynow threatlocker.com/twit joindeleteme.com/twit promo code TWIT veeam.com bitwarden.com/twit
This show has been flagged as Clean by the host. Setting up Linux Mint with Custom LVM and Luks Linux Mint with Custom LVM on LUKS Overview The current Linux Mint installer doesn't support custom partitions when setting up a new machine with LUKS encryption using LVM. I prefer having a separate partition for my home directory and a backup partition for Timeshift, so that reinstalling or fixing issues won't overwrite my home directory. I found several approaches to achieve this. One method involves setting up partitions first and then using the installer to select them, but this requires extensive post-installation configuration to get boot working with the encrypted drive. I discovered this blog which explains how to repartition your drive after installation. Combined with my guide on setting up hibernation, I created this documentation to help remember how to install a fresh copy of Linux Mint with LVM and LUKS. Tested on: Linux Mint 22 Cinnamon Partition Layout For this guide, I'm working with a 1TB drive that will be split into the following logical volumes: Root - 100GB (system files and applications) Swap - 32GB (for hibernation support) Home - 700GB (user files and documents) Backup - 100GB (Timeshift snapshots) Unallocated - ~68GB (reserved for future expansion) This setup ensures that system snapshots and user data remain separate, making system recovery much easier. Installation Guide Step 1: Initial Linux Mint Installation Start the Linux Mint installation process as normal: Boot from your Linux Mint installation media Follow the installation wizard (language, keyboard layout, etc.) When you reach the Installation type screen: Select "Erase disk and install Linux Mint" Click "Advanced features" Enable both options: ✓ Use LVM with the new Linux Mint installation ✓ Encrypt the new Linux Mint installation for security Click Continue Enter a strong encryption password when prompted Complete the rest of the installation (timezone, user account, etc.) When installation finishes, do NOT click "Restart Now" - we'll repartition first Important: Do NOT reboot after installation completes. We need to repartition before the first boot. Step 2: Access Root Terminal After installation finishes, open a terminal and switch to root: sudo -i This gives you administrative privileges needed for disk operations. Step 3: Check Current Disk Layout View your current partition structure: lsblk -f This displays your filesystem layout. You should see your encrypted volume group (typically vgmint) with a large root partition consuming most of the space. Step 4: Resize Root Partition Shrink the root partition from its default size (nearly full disk) to 100GB: lvresize -L 100G --resizefs vgmint/root What this does: -L 100G sets the logical volume size to exactly 100GB --resizefs automatically resizes the filesystem to match This frees up ~900GB for our other partitions Step 5: Resize Swap Partition The default swap is usually small (a few GB). We need to increase it to 32GB for hibernation: lvresize --verbose -L +32G /dev/mapper/vgmint-swap_1 What this does: -L +32G adds 32GB to the current swap size --verbose shows detailed progress information This ensures enough swap space for RAM contents during hibernation Note: For hibernation to work, swap should be at least equal to your RAM size. Adjust accordingly. Step 6: Create Home Partition Create a new logical volume for your home directory: lvcreate -L 700G vgmint -n home What this does: -L 700G creates a 700GB logical volume vgmint is the volume group name -n home names the new volume "home" Step 7: Create Backup Partition Create a logical volume for Timeshift backups: lvcreate -L 100G vgmint -n backup What this does: Creates a dedicated 100GB space for system snapshots Keeps backups separate from user data Prevents backups from filling up your home partition Step 8: Format New Partitions Format both new partitions with the ext4 filesystem: mkfs.ext4 /dev/vgmint/backup mkfs.ext4 /dev/vgmint/home What this does: Creates ext4 filesystems on both logical volumes ext4 is the standard Linux filesystem with good performance and reliability Step 9: Mount Partitions Create mount points and mount your partitions: mkdir /mnt/{root,home} mount /dev/vgmint/root /mnt/root/ mount /dev/vgmint/home /mnt/home/ What this does: Creates temporary directories to access the filesystems Mounts root and home so we can configure them Step 10: Move Home Directory Contents Move the existing home directory contents from the root partition to the new home partition: mv /mnt/root/home/* /mnt/home/ What this does: Transfers all user files and directories from the old location to the new home partition Preserves your user account settings and any files created during installation Without this step, your home directory would be empty on first boot Step 11: Update fstab Add the home partition to the system's fstab file so it mounts automatically at boot: echo "/dev/mapper/vgmint-home /home ext4 defaults 0 2" >> /mnt/root/etc/fstab What this does: Appends a mount entry to /etc/fstab Ensures /home partition mounts automatically at startup The 0 2 values enable filesystem checks during boot Step 12: Clean Up and Prepare for Reboot Unmount the partitions and deactivate the volume group: umount /mnt/root umount /mnt/home swapoff -a lvchange -an vgmint What this does: Safely unmounts all mounted filesystems Turns off swap Deactivates the volume group to prevent conflicts Ensures everything is properly closed before reboot Step 13: Reboot Now you can safely reboot into your new system: reboot Enter your LUKS encryption password at boot, then log in normally. Verification After rebooting, verify your partition setup: lsblk -f df -h You should see: Root (/) mounted with ~100GB Home (/home) mounted with ~700GB Swap available with 32GB Backup partition ready for Timeshift configuration Setting Up Timeshift To complete your backup solution: Install Timeshift (if not already installed): sudo apt install timeshift Launch Timeshift and select RSYNC mode Choose the backup partition as your snapshot location Configure your backup schedule (daily, weekly, monthly) Create your first snapshot Additional Resources Original blog post on LVM rearrangement Setting up hibernation on Linux Mint Conclusion This setup gives you the best of both worlds: the security of full-disk encryption with LUKS, and the flexibility of custom LVM partitions. Your home directory and system backups are now isolated, making system recovery and upgrades much safer and more manageable. Automating Your Linux Mint Setup After a Fresh Install Automating Your Linux Mint Setup After a Fresh Install Setting up a fresh Linux Mint installation can be time-consuming, especially when you want to replicate your perfect development environment. This guide will show you how to automate the entire process using Ansible and configuration backups, so you can go from a fresh install to a fully configured system in minutes. Why Automate Your Setup? Whether you're setting up a new machine, recovering from a system failure, or just want to maintain consistency across multiple computers, automation offers several key benefits: Time Savings: What normally takes hours can be done in minutes Consistency: Identical setup across all your machines Documentation: Your setup becomes self-documenting Recovery: Quick recovery from system failures Reproducibility: Never forget to install that one crucial tool again Discovering Your Installed Applications Before creating your automation setup, you need to identify which applications you've manually installed since the initial OS installation. This helps you build a complete picture of your custom environment. Finding APT and .deb Packages To see all manually installed packages (excluding those that came with the OS): comm -23
In this potluck episode, Wes and Scott answer your questions about paid vs. free SSL, the state of frontend jobs, headless WordPress trade-offs, organizing TypeScript types, and more! Show Notes 00:00 Welcome to Syntax! 00:51 Recapping the GitHub Meetup 05:14 Is there any real benefit to picking a paid SSL over Let's Encrypt? 08:03 Is the pure frontend role disappearing? 11:17 Is the gravy train over for software devs? 20:48 How Scott automates versioning with GitHub Actions changesets Intro to using changesets zero-svelte graffiti 25:16 Brought to you by Sentry.io 25:41 Thoughts on VS Code alternatives and the rise of Zed 33:01 Should I switch to headless WordPress or continue rolling my own PHP templates? 37:33 How do you organize TypeScript types in a frontend project? 40:55 How do I continue to level up as a developer? 45:36 Stay in a comfortable job or embrace new challenges? Hit us up on Socials! Syntax: X Instagram Tiktok LinkedIn Threads Wes: X Instagram Tiktok LinkedIn Threads Scott: X Instagram Tiktok LinkedIn Threads Randy: X Instagram YouTube Threads
At JupyterCon 2025, Jupyter Deploy was introduced as an open source command-line tool designed to make cloud-based Jupyter deployments quick and accessible for small teams, educators, and researchers who lack cloud engineering expertise. As described by AWS engineer Jonathan Guinegagne, these users often struggle in an “in-between” space—needing more computing power and collaboration features than a laptop offers, but without the resources for complex cloud setups. Jupyter Deploy simplifies this by orchestrating an entire encrypted stack—using Docker, Terraform, OAuth2, and Let's Encrypt—with minimal setup, removing the need to manually manage 15–20 cloud components. While it offers an easy on-ramp, Guinegagne notes that long-term use still requires some cloud understanding. Built by AWS's AI Open Source team but deliberately vendor-neutral, it uses a template-based approach, enabling community-contributed deployment recipes for any cloud. Led by Brian Granger, the project aims to join the official Jupyter ecosystem, with future plans including Kubernetes integration for enterprise scalability. Learn more from The New Stack about the latest in Jupyter AI development: Introduction to Jupyter Notebooks for DevelopersDisplay AI-Generated Images in a Jupyter Notebook Join our community of newsletter subscribers to stay on top of the news and at the top of your game. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »
Certificates are the socks of IT—everyone needs them, and you always lose track of a few. On today’s show we dive into the ACME protocol, an IETF standard to help automate how a domain owner gets a domain validation certificate from a Certificate Authority (CA). Our guest, Ed Harmoush, a former network engineer with AWS... Read more »
Worried about your data if your computer goes missing? Whole-disk encryption can keep prying eyes out. I'll show you simple, practical ways to encrypt your entire drive so your information stays safe even if your computer doesn't.
Want to keep your folders private? This article shows three ways to encrypt everything inside a folder. Each method has pros and cons, so you'll learn which one best protects your files while balancing ease of use.
Want to send a file safely by email? I'll show you how to use the simple .zip format with a strong passphrase so your private documents stay protected across Windows, Mac, or Linux platforms.
A panel discussion with AI industry leaders revealing how enterprises are scaling AI today, with predictions on coming breakthroughs for AI and the impact on Fortune 500 companies and beyond.Topics Include:Three technical leaders discuss production challenges: security, interoperability, and scaling agentic systemsPanelists represent Enkrypt (security), Anyscale (infrastructure), and CrewAI (agent orchestration platforms)Industry moving from flashy demos to dependable agents with real business outcomesBreakthrough examples include 70-page IRS form processing and multimodal workflow automationMultimodal data integration becoming crucial - incorporating video, audio, screenshots into decisionsLess than 10% of future applications expected to be text-onlyCompanies shifting from experimenting with individual models to deploying agent networksNeed for governance frameworks as enterprises scale to hundreds of agentsGrowing software stack complexity requires specialized infrastructure between applications and GPUsSecurity teams need centralized visibility across fragmented agent deployments across enterprisesExisting industry regulations apply to AI services - no special AI laws neededInteroperability standards debate: MCP gaining adoption while A2A seems premature solutionMCP shows higher API reliability than OpenAI tool calling for implementationsMultimodal systems more vulnerable to attacks but value proposition too high ignoreFortune 500 company automated price operations approval process using 630 brands data87% of enterprise customers deploy agents in private VPCs or on-premises infrastructureSpecialized AI systems needed to oversee other agents at machine speed scalesCost optimization through model specialization rather than always using most powerful modelsFuture learning may happen through context/prompting rather than traditional weight fine-tuningPredictions include AI meeting moderators and agents working autonomously for hoursParticipants:Robert Nishihara - Co-founder, AnyscaleJoão Moura - CEO, CrewAISahil Agarwal - Co-Founder & CEO, Enkrypt AIJillian D'Arcy - Sr. ISV Sales Leader, Amazon Web ServicesFurther Links:Anyscale – Website | LinkedIn | AWS MarketplaceCrewAI - Website | LinkedIn | AWS MarketplaceEnkrypt AI - Website | LinkedIn | AWS MarketplaceSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/
Christopher und Sylvester sind aus dem Urlaub zurück, haben direkt mehr Themen als in einen Passwort-Podcast passen und teilen deshalb auf: In dieser Folge geht es um eine großangelegte Studie, der zufolge viele übliche Anti-Phishing-Maßnahmen kaum oder gar nicht helfen. Außerdem grübeln die beiden über das Tempo, mit dem Let's Encrypt seine alten CT-Logs abschalten will, und verzweifeln an Microsoft. Die Firma aus Redmond ist mit gleich zwei Geschichten im Podcast vertreten, die nicht nur von Sicherheitslücken und (zweifelhaften) technischen Lösungen handeln, sondern auch totale Kommunikationsdesaster skizzieren. - Phrack Ausgabe 72: https://phrack.org/issues/72/1 - Phising-Studie: https://arianamirian.com/docs/ieee-25.pdf - Slide-Deck der Phishing-Studie: https://i.blackhat.com/BH-USA-25/Presentations/US-25-Dameff-Pwning-Phishing-Training-Through-Scientific-Lure-Crafting-Wednesday.pdf - Blogpost von Microsoft Threat Intelligence zu den Sharepoint- Angriffen: https://www.microsoft.com/en-us/security/blog/2025/07/22/disrupting-active-exploitation-of-on-premises-sharepoint-vulnerabilities - Jürgen Schmidts Kommentar zu Microsofts Secure Future Initiative: https://heise.de/-10505985 - Video des Vortrags „Living off Microsoft Copilot“: https://www.youtube.com/watch?v=FH6P288i2PE - Windows' Kopieren-Dialog: https://xkcd.com/612/ - Copilot broke your audit log: https://pistachioapp.com/blog/copilot-broke-your-audit-log - Folgt uns im Fediverse: - @christopherkunz@chaos.social - @syt@social.heise.de
Two recent outages were handled very differently but show the dangers of centralisation, Let's Encrypt is introducing certificates for IP addresses, and the differences between backup and production systems. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes News/discussion Microsoft's 19-hour Outlook outage exposes fragility in cloud […]
Two recent outages were handled very differently but show the dangers of centralisation, Let's Encrypt is introducing certificates for IP addresses, and the differences between backup and production systems. Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes News/discussion Microsoft's 19-hour Outlook outage exposes fragility in cloud... Read More
• Let's Encrypt drops its long-running email notifications. • Microsoft's new "Unexpected Restart Experience". • Microsoft's response to last year's massive CrowdStrike outage. • Windows 10's extended service updates will sort of be free. • Russia-sold iPhones MUST include the RuStore app. • Lyon, in France, says bye-bye to Windows. Hello to Linux. • The US Gov gets more serious about memory-safe languages. • A new unbelievable AI malware scanner evaSion technique. • A new pair of Cisco 9.8 and 10.0 vulnerabilities. • The current state of post-Elon government cybersecurity. • PNGv3, Swift on Android, and the Samsung email purge. • Andy Weir's "Hail Mary" movie trailer. • And a close look at the pervasiveness of web browser tracking fingerprinting. Show Notes - https://www.grc.com/sn/sn-1032-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: go.acronis.com/twit bitwarden.com/twit threatlocker.com/twit joindeleteme.com/twit promo code TWIT
• Let's Encrypt drops its long-running email notifications. • Microsoft's new "Unexpected Restart Experience". • Microsoft's response to last year's massive CrowdStrike outage. • Windows 10's extended service updates will sort of be free. • Russia-sold iPhones MUST include the RuStore app. • Lyon, in France, says bye-bye to Windows. Hello to Linux. • The US Gov gets more serious about memory-safe languages. • A new unbelievable AI malware scanner evaSion technique. • A new pair of Cisco 9.8 and 10.0 vulnerabilities. • The current state of post-Elon government cybersecurity. • PNGv3, Swift on Android, and the Samsung email purge. • Andy Weir's "Hail Mary" movie trailer. • And a close look at the pervasiveness of web browser tracking fingerprinting. Show Notes - https://www.grc.com/sn/sn-1032-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: go.acronis.com/twit bitwarden.com/twit threatlocker.com/twit joindeleteme.com/twit promo code TWIT
• Let's Encrypt drops its long-running email notifications. • Microsoft's new "Unexpected Restart Experience". • Microsoft's response to last year's massive CrowdStrike outage. • Windows 10's extended service updates will sort of be free. • Russia-sold iPhones MUST include the RuStore app. • Lyon, in France, says bye-bye to Windows. Hello to Linux. • The US Gov gets more serious about memory-safe languages. • A new unbelievable AI malware scanner evaSion technique. • A new pair of Cisco 9.8 and 10.0 vulnerabilities. • The current state of post-Elon government cybersecurity. • PNGv3, Swift on Android, and the Samsung email purge. • Andy Weir's "Hail Mary" movie trailer. • And a close look at the pervasiveness of web browser tracking fingerprinting. Show Notes - https://www.grc.com/sn/sn-1032-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: go.acronis.com/twit bitwarden.com/twit threatlocker.com/twit joindeleteme.com/twit promo code TWIT
• Let's Encrypt drops its long-running email notifications. • Microsoft's new "Unexpected Restart Experience". • Microsoft's response to last year's massive CrowdStrike outage. • Windows 10's extended service updates will sort of be free. • Russia-sold iPhones MUST include the RuStore app. • Lyon, in France, says bye-bye to Windows. Hello to Linux. • The US Gov gets more serious about memory-safe languages. • A new unbelievable AI malware scanner evaSion technique. • A new pair of Cisco 9.8 and 10.0 vulnerabilities. • The current state of post-Elon government cybersecurity. • PNGv3, Swift on Android, and the Samsung email purge. • Andy Weir's "Hail Mary" movie trailer. • And a close look at the pervasiveness of web browser tracking fingerprinting. Show Notes - https://www.grc.com/sn/sn-1032-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: go.acronis.com/twit bitwarden.com/twit threatlocker.com/twit joindeleteme.com/twit promo code TWIT
• Let's Encrypt drops its long-running email notifications. • Microsoft's new "Unexpected Restart Experience". • Microsoft's response to last year's massive CrowdStrike outage. • Windows 10's extended service updates will sort of be free. • Russia-sold iPhones MUST include the RuStore app. • Lyon, in France, says bye-bye to Windows. Hello to Linux. • The US Gov gets more serious about memory-safe languages. • A new unbelievable AI malware scanner evaSion technique. • A new pair of Cisco 9.8 and 10.0 vulnerabilities. • The current state of post-Elon government cybersecurity. • PNGv3, Swift on Android, and the Samsung email purge. • Andy Weir's "Hail Mary" movie trailer. • And a close look at the pervasiveness of web browser tracking fingerprinting. Show Notes - https://www.grc.com/sn/sn-1032-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: go.acronis.com/twit bitwarden.com/twit threatlocker.com/twit joindeleteme.com/twit promo code TWIT
• Let's Encrypt drops its long-running email notifications. • Microsoft's new "Unexpected Restart Experience". • Microsoft's response to last year's massive CrowdStrike outage. • Windows 10's extended service updates will sort of be free. • Russia-sold iPhones MUST include the RuStore app. • Lyon, in France, says bye-bye to Windows. Hello to Linux. • The US Gov gets more serious about memory-safe languages. • A new unbelievable AI malware scanner evaSion technique. • A new pair of Cisco 9.8 and 10.0 vulnerabilities. • The current state of post-Elon government cybersecurity. • PNGv3, Swift on Android, and the Samsung email purge. • Andy Weir's "Hail Mary" movie trailer. • And a close look at the pervasiveness of web browser tracking fingerprinting. Show Notes - https://www.grc.com/sn/sn-1032-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: go.acronis.com/twit bitwarden.com/twit threatlocker.com/twit joindeleteme.com/twit promo code TWIT
• Let's Encrypt drops its long-running email notifications. • Microsoft's new "Unexpected Restart Experience". • Microsoft's response to last year's massive CrowdStrike outage. • Windows 10's extended service updates will sort of be free. • Russia-sold iPhones MUST include the RuStore app. • Lyon, in France, says bye-bye to Windows. Hello to Linux. • The US Gov gets more serious about memory-safe languages. • A new unbelievable AI malware scanner evaSion technique. • A new pair of Cisco 9.8 and 10.0 vulnerabilities. • The current state of post-Elon government cybersecurity. • PNGv3, Swift on Android, and the Samsung email purge. • Andy Weir's "Hail Mary" movie trailer. • And a close look at the pervasiveness of web browser tracking fingerprinting. Show Notes - https://www.grc.com/sn/sn-1032-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: go.acronis.com/twit bitwarden.com/twit threatlocker.com/twit joindeleteme.com/twit promo code TWIT
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
NetScaler ADC and NetScaler Gateway Security Bulletin for CVE-2025-6543 Citrix patched a memory overflow vulnerability leading to unintended control flow and denial of service. https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694788 Remote code execution in CentOS Web Panel - CVE-2025-48703 An arbitrary file upload vulnerability in the user (not admin) part of Web Panel can be used to execute arbitrary code https://fenrisk.com/rce-centos-webpanel Gogs Arbitrary File Deletion Vulnerability Due to the insufficient patch for the CVE-2024-39931, it's still possible to delete files under the .git directory and achieve remote command execution. https://github.com/gogs/gogs/security/advisories/GHSA-wj44-9vcg-wjq7 Let s Encrypt Will Soon Issue IP Address-Based Certs Let s Encrypt is almost ready to issue certificates for IP address SANs from Let's Encrypt's production environment. They'll only be available under the short-lived profile (which has a 6-day validity period), and that profile will remain allowlist-only for a while. https://community.letsencrypt.org/t/getting-ready-to-issue-ip-address-certificates/238777
Locating people with just a phone call, Google forces a change to Let's Encrypt certificates, yet another example of a “lifetime” subscription being cut short, connecting drives to a small form factor machine, and managing ssh keys with LDAP. Plugs Support us on patreon and get an ad-free RSS feed with early episodes sometimes […]
In this practical tutorial episode, Siddharth Mahajan walks listeners through the step-by-step process of encrypting a folder on a Mac using built-in macOS tools. This episode is perfect for anyone who needs to temporarily hand over their Mac to someone else but wants to keep personal or sensitive files secure.What You'll Learn:Why it's important to secure private folders on your MacHow to create an encrypted disk image (.dmg) that password-protects your folderDetailed navigation through macOS Disk Utility to select and encrypt your folderHow to set and confirm a password for your encrypted folderHow to access your encrypted folder later by entering the passwordBest practices for managing and deleting the original unencrypted folderWhy This Matters: Sharing your Mac without proper privacy controls can risk exposing your personal documents, photos, and other sensitive files. Siddharth highlights how easy it is to leverage built-in macOS functionality to safeguard your data with strong AES encryption, giving you peace of mind.Episode Highlights:Opening Disk Utility via Spotlight SearchUsing the “New Image from Folder” feature to create an encrypted disk imageSelecting 128-bit AES encryption and setting a strong passwordDemonstration of mounting and unmounting the encrypted volumeTips on deleting the original folder after encryption to ensure privacySiddharth's contact info for follow-up questionsUseful Links:macOS Disk Utility: https://support.apple.com/en-us/HT201250Email Siddharth: siddarthmahajan15@gmail.comTranscriptDisclaimer: This transcript was generated by AI Note Taker – VoicePen, an AI-powered transcription app. It is not edited or formatted, and it may not accurately capture the speakers' names, voices, or content.Siddarth: Are you in that situation where you need to give your Mac to someone for maybe a few hours or a few days, but worried about what if they might access my private files, my private folders? Of course, everyone has their own privacy, right? You might have private documents or messages or pictures, videos, whatever.Siddarth: Do you know that we can lock or we can encrypt the folder on Mac with a password? Well, if you don't know that, yes, we can actually do that. How can we do that? That's what I'm here for. I'm Siddharth Mahajan. In this episode, I'll be demonstrating that. How can we encrypt a folder with a password on our Mac? So let's get started.Siddarth: I'm on my desktop here.VoiceOver: Siddharth Private Files folder.Siddarth: This is my folder, Siddharth Private Files.VoiceOver: Siddharth Private Files folder.Siddarth: Let me press Vivo space to open.VoiceOver: Finder has new window.Siddarth: Okay, let me interact.VoiceOver: In list view, table.Siddarth…