POPULARITY
Paty Cantú en Podcast Paranormal: Experiencias ParanormalesLlega al Podcast Paranormal una invitada de lujo y gran cantante: Paty Cantú. En este episodio estaremos sumergidos en sus fascinantes anécdotas; nos comparte los momentos que marcaron su vida y su conexión con lo paranormal desde su infancia.Paty nos cuenta sus experiencias más oscuras y aterradoras. Te aseguro que no querrás ni pestañear. Son relatos que pocos se atreven a contar y que podrían cambiar tu perspectiva. ¿Estás listo para explorar lo sorprendente e inexplicable? ¡No te puedes perder este capítulo interesantísimo!
¿Fue el Niño Fidencio un enviado de Dios? ¿Cómo realizó curaciones inexplicables? Acompañados del profesor Alejandro González sobrino del Niño Fidencio nos revela detalles asombrosos sobre la vida, legado y milagros del Niño Fidencio, una de las figuras espirituales misteriosas y veneradas de México. Nos cuenta desde su vínculo familiar, como era el Niño Fidencio en vida, hasta los mitos que lo rodean en internet. Conocerás un lado íntimo y revelador del curandero más famoso del norte del país.
Dos meses sin ella, dos meses sin justicia...En esta ocasión, dedicamos el Blog Criminal al caso de Sara Millerey, quien fue víctima de la transfobia que aún se vive en algunos lugares.En este compartimos la historia de Sara Millerey, una mujer trans que fue víctima de un acto de violencia atroz.Sara fue golpeada brutalmente y abandonada en una quebrada con agua contaminada. Este video no busca sensacionalismo. Está hecho desde el respeto, con la intención de darle voz a una historia que no debe ser olvidada y abrir la conversación sobre la violencia que muchas personas trans siguen enfrentando en silencio. No te pierdas nuestro capítulo de estreno y comparte tu opinión con nosotros.
Recibimos a Los Mortem, investigadores del terror y lo oculto, dueños de uno de los museos más perturbadores de México "El Museo del horror" que alberga objetos malditos: desde objetos poseídos y tableros ouija únicos, hasta muñecos diabólicos con historias aterradoras que han sido regalados a ellos. Descubre el trasfondo de cada pieza: fotografías post mortem, símbolos de Baphomet, reliquias de entidades demoníacas, artefactos cargados de energías oscuras y maldiciones reales. y objetos que abren portales a lo desconocido. ¿Puede un objeto maldito cambiar tu vida?
¿Quién mató a Luis Donaldo Colosio? Un crimen rodeado de misterio, pistas inconclusas y muchas preguntas sin respuesta. ¿Fue realmente Mario Aburto el asesino solitario o hay algo más detrás del magnicidio que marcó a México?En este episodio de Criminalmente, nos adentramos en uno de los casos más impactantes de la historia política mexicana: el asesinato de Colosio en Lomas Taurinas, Tijuana, el 23 de marzo de 1994. Analizamos teorías, inconsistencias y los archivos secretos que rodean el caso.Aquí te contamos todo lo que se sabe… y lo que sigue siendo un enigma.
En este episodio, tenemos a Lore de Long Soul System, quien nos comparte su experiencia viviendo con el Trastorno de Identidad Disociativo (TID). Desde pequeña, Lore ha convivido con varias personalidades, un reto enorme que ha logrado enfrentar con el paso del tiempo. Nos cuenta cómo es vivir día a día con este trastorno y el impacto real que tiene en su vida. Además, nos revela casos inquietantes de personas que, debido a este trastorno, cometieron crímenes sin ser plenamente conscientes de sus actos. Un episodio lleno de misterio y reflexión que no te puedes perder.
En este episodio, tenemos a Teka del podcast "Historia para Tontos", y nos adentraremos en tres casos que te van a dejar pensando. Primero, el de Felipe Espinoza, un hombre que perdió a su familia de una forma muy injusta y decidió vengarse de soldados estadounidenses, con la ayuda de su sobrino Viviano. Luego, exploramos los oscuros secretos del Palacio de Lecumberri, la cárcel más moderna de su tiempo, llena de historias aterradoras. Y para cerrar, hablamos de Goyo Cárdenas, el primer criminal serial documentado en México. No te lo puedes perder, porque lo que descubrirás cambiará todo lo que sabías…
En este episodio nos adentraremos en la historia de Miguel Cortés Miranda, un hombre que parecía llevar una vida normal en Iztacalco... pero tras su puerta se escondía un lado oscuro que nadie imaginaba.¿Qué secretos ocultaba en su hogar? ¿Cómo una madre valiente logró destapar la verdad que estremeció a todo México?Prepárate para descubrir los detalles más ocultos y las últimas actualizaciones de un caso que sigue causando miedo.
En este capítulo, Jesús de Nazaret nos comparte sus experiencias como paramédico en un entorno lleno de peligro y situaciones extremas. A lo largo de su carrera, ha tenido encuentros inesperados con personas involucradas en actividades oscuras, pero de alguna manera logró sobrevivir a situaciones que parecían imposibles. ¿Fue su fe en una figura espiritual protectora quien lo ayudó? En este episodio, exploramos la conexión entre esta figura y el mundo del crimen, aclarando si realmente pertenece a este entorno o si es simplemente una creencia más. Jesús también nos cuenta experiencias personales que vivió gracias a su confianza en esta poderosa entidad. Un relato profundo y revelador que explora la espiritualidad, la violencia y lo inexplicable.
En este episodio conoceremos los "Vengadores Mexicanos", exploraremos cinco historias de justicia imparable. El Vengador de la Marquesa y El Vengador de Naucalpan se convierten en sombras que persiguen a los culpables, llevando su búsqueda de justicia a nuevas alturas. Yolanda, una mujer valiente, enfrenta la captura de la madre de un hombre poderoso con una fuerza inesperada. Doña Carlota desafía todo para hacer justicia, y Don Alejo, el temido John Wick mexicano, deja una estela de miedo en aquellos que desafían su justicia. Cada uno de ellos, una leyenda en el mundo oscuro del crimen. Sin piedad, se convierten en figuras que alteran el curso de un país marcado por las injusticias. Sus historias siguen resonando, como advertencias para aquellos que cruzan la línea.
En esta ocasión, nos acompaña Chucho Calderón, host de La Zona Cero. Acompáñanos a sumergirnos en los enigmáticos y oscuros casos de Michael John Kricfalusi, el animador canadiense creador de Ren & Stimpy, cuyo legado está marcado por secretos inquietantes; Blake Leibel, quien convirtió sus escalofriantes cómics de terror en una aterradora realidad; y el caso de Chris Benoit, un luchador profesional canadiense cuya prometedora carrera en la WWE se vio trágicamente interrumpida, cambiando para siempre la historia del deporte. Después de ese día fatídico, nada fue igual.
Privacy Risks of 23andMe BankruptcyA breach impacting 7 million users, coupled with lawsuits and financial distress, means 23andMe's 15 million genetic profiles could be sold or misused under a new buyer. The California Attorney General has urged users to delete their data and destroy physical samples, highlighting the vulnerability of storing sensitive genetic information with for‑profit entities under financial strain.Clearview AI's Data Acquisition AttemptsClearview AI tried to buy a massive database of arrest records, mugshots, and personal details (like social security numbers). This would greatly expand its controversial facial recognition repository, fueling concerns about privacy, consent, and misuse by governments or private actors.Hungary's Use of Facial Recognition at Pride EventsHungary banned Pride events and authorized facial recognition to identify attendees, who may face fines under “child protection” laws. Critics view this as an attack on free assembly and expression, especially for LGBTQ+ communities, creating a chilling effect on peaceful protests.China's New Facial Recognition RulesFacial recognition is banned without consent and in private spaces, requiring privacy assessments and encryption. However, these rules exclude “algorithm training,” meaning facial images may still be collected for AI development, undermining the intended privacy protections given China's widespread CCTV presence.US Coordination on Russian Cyber Threats HaltedUS national security agencies ceased joint efforts against Russian cyberattacks, disinformation, and oligarch asset seizures. This abrupt stop raises concerns over weakened defenses against foreign interference, though official explanations remain unclear.Microsoft's Unpatched .LNK ExploitAn eight‑year‑old Windows shortcut (.LNK) exploit persists, with Microsoft labeling it a “UI issue” rather than a security flaw. Attackers, including state‑sponsored groups, hide malicious commands in whitespace, leaving users vulnerable to spying and data theft.Windows 10 End of SupportWith support ending in October 2025, Microsoft urges users—over half of its Windows base—to buy new hardware for Windows 11. This approach overlooks the financial burden on many and disregards feasible upgrades or affordable alternatives for existing devices.Dutch Universities Shifting Away from WhatsAppSchools such as Utrecht and Avans recommend moving to Signal over privacy and misinformation concerns tied to WhatsApp's data‑sharing practices. Signal's strong encryption, open‑source nature, and non‑profit status align with the need for secure, private communication in educational settings.
Three Buddy Problem - Episode 39: Luta Security CEO Katie Moussouris joins the buddies to parse news around a coordinated Chinese exposure of Taiwan APT actors, CitizenLab's report on Paragon spyware and WhatsApp exploits, an “official” Russian government exploit-buying operation shopping for Telegram exploits, the fragmentation of exploit markets and the future of CISA in the face of budget cuts and layoffs. Cast: Katie Moussouris (https://lutasecurity.com), Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Python Bot Delivered Through DLL Side-Loading A "normal", but vulnerable to DLL side-loading PDF reader may be used to launch additional exploit code https://isc.sans.edu/diary/Python%20Bot%20Delivered%20Through%20DLL%20Side-Loading/31778 Tomcat RCE Correction To exploit the Tomcat RCE I mentioned yesterday, two non-default configuration options must be selected by the victim. https://x.com/dkx02668274/status/1901893656316969308 SAML Roulette: The Hacker Always Wins This Portswigger blog explains in detail how to exploit the ruby-saml vulnerablity against GitLab. https://portswigger.net/research/saml-roulette-the-hacker-always-wins Windows Shortcut Zero Day Exploit Attackers are currently taking advantage of an unpatched vulnerability in how Windows displays Shortcut (.lnk file) details. Trendmicro explains how the attack works and provides PoC code. Microsoft is not planning to fix this issue https://www.trendmicro.com/en_us/research/25/c/windows-shortcut-zero-day-exploit.html
En este episodio nos adentramos en uno de los casos más mediáticos y controvertidos de México en 2022: el caso de Debanhi Escobar. Aunque el caso recibió una gran cobertura mediática, aún hoy persisten numerosas irregularidades y dudas sin resolver. ¿Qué realmente ocurrió aquella noche? Este caso despertó la indignación no solo en México, sino también en otros países de Latinoamérica, dejando preguntas que siguen sin respuestas. Prepárate para explorar los detalles que los medios no han contado y las teorías que han surgido alrededor de este misterio.
| Bet25 er kommerciel partner på programmet |Superligaen er tilbage! Efter en lang vinterpause er spillerne, tilskuerne og Monetos-eksperterne endelig klar til at tage fat på et spændende Superliga-forår.I studiet forventer Mikkel Westermann og Tonni Munk Jensen en hæsblæsende start i Brøndby fredag aften, og søndag forventer de også underholdning i Silkeborg samt et par potentielle overraskelser til meget høje odds.Lnk til Bet25 Chancen: https://konkurrence.bet25.dk/sport/bet25-chancen-monetosVært/ekspert: Mikkel Westermann.Ekspert: Tonni Munk Jensen. 18+ | stopspillet.dk | udeluk dig selv: ROFUS.nu | spil ansvarligt
[Referências do Episódio] Coyote Banking Trojan: A Stealthy Attack via LNK files - https://www.fortinet.com/blog/threat-research/coyote-banking-trojan-a-stealthy-attack-via-lnk-files No need to RSVP: a closer look at the Tria Stealer campaign - https://securelist.com/tria-stealer-collects-sms-data-from-android-devices/115295/ HTTP Client Tools Exploitation for Account Takeover Attacks - https://www.proofpoint.com/us/blog/threat-insight/http-client-tools-exploitation-account-takeover-attacks Roteiro e apresentação: Carlos Cabral e Bianca Oliveira Edição de áudio: Paulo Arruzzo Narração de encerramento: Bianca Garcia
Noong kabataan ko, narinig ko na ang mga tungkol sa Aswang at sa kung ano ang mga kinakain nila, anong anyo ang pinapakita nila, at anong mga lihim nilang kaalaman. Nitong iilang taon ko lang naisip, na pano kaya kung totoong ang mga kwento? Ngayong gabi meron tayong mga kwentuhan kasama ang ilang past guest at suki sa Discord tungkol sa mga nalalaman nila tungkol sa Aswang.Thank you ulit sa ating mga bumisitang guest at nagkwento nung mga experience nila at nalalaman tungkol sa mga Aswang. Eto ang mga past episodes nila:Marie - EP : Paranormal Tales: Marie - https://open.spotify.com/episode/3DiVeaNzuc4RO2pQ13usfV?si=3c366c282320482cAki - EP 201: Mga Kwentong Paramdam - https://open.spotify.com/episode/0r3cXhMSHQ9mKpIzh22hxV?si=1d96aaf9155848dcJayjay - EP 50: Si Lola at ang Lihim na Karunungan - https://open.spotify.com/episode/5bIdpyGYkYIUDFaUUaqser?si=27ca685f6bd042a2Tata J - EP 174: Ang Manggagamot - https://open.spotify.com/episode/4QqXEKatnV4CgPpakUTmFC?si=e54b856c1a004ad7Ninong - EP 189: Ang mga turo ni Ninong - https://open.spotify.com/episode/0tAwA2h72aBkKNMTAnhQsT?si=8114d3d2d4a74dd2Queen - EP 197: Ang mga anak kong Engkanto - https://open.spotify.com/episode/72MPZ4ok33FlD4mCBN2XEO?si=59132edb9a4b4e87Kung gusto mo yung parang ganito ring kwentuhan, baka gusto mo balikan yung past episode tungkol sa mga ganitong topic, check nyo sa Usapang Patay Episode 111 - https://open.spotify.com/episode/7lP8e6vosRbd1hHs1jCW5N?si=7444cb135fed4941 Kung meron kang mga experience gaya nung ng mga nakwento na gusto mo i-share, pwede mo yan email sa paranormalsph@gmail.com If you enjoy these kind of stories, you might want to subscribe :D Facebook - https://www.facebook.com/paranormalpodcast/ Spotify - https://spoti.fi/3tFjP58 YouTube - https://www.youtube.com/c/ParaNormalPodcast Tiktok - @paranormalpodcast1 Apple Podcast - https://podcasts.apple.com/ph/podcast/para-normal-podcast/id1485149642 Kung ito naman ang unang episode na napakinggan mo, baka gusto mo simulan sa Episode 1EPISODE 1 The Unexpected Visitor - https://youtu.be/AHSHtHOsNP0 Kung gusto mo tuloy ang kwentuhan sa chat, pasok lang sa Discord Server ng Podcast, click mo lang ang invite link sa baba: https://discord.gg/YWF4BpS4gQ Do you want to support the podcast? You can help keep us going by giving us a cup of joe! ko-fi.com/paranormalpodcast You can also support us on Patreon https://www.patreon.com/paranormalpodcast We have different tiers for supporters, from the general support to early access, to joining us on the calls way in advance. No pressure, just additional help for us :) The Para Normal Podcast. Engineered and Produced by f90 Productions Rate and Review our show on Spotify, Pocket Casts, and Apple PodcastsEnjoy.
Video Episode: https://youtu.be/7et_7YkwAHs In today’s episode, we dive into the alarming rise of malware delivery through fake job applications targeting HR professionals, specifically focusing on the More_eggs backdoor. We also discuss critical gaming performance issues in Windows 11 24H2 and the vulnerabilities in DrayTek routers that expose over 700,000 devices to potential hacking. Lastly, we address the urgent exploitation of a remote code execution flaw in Zimbra email servers, emphasizing the need for immediate updates to safeguard against evolving threats. Links to articles: 1. https://thehackernews.com/2024/10/fake-job-applications-deliver-dangerous.html 2. https://www.bleepingcomputer.com/news/microsoft/microsoft-warns-of-windows-11-24h2-gaming-performance-issues/ 3. https://thehackernews.com/2024/10/alert-over-700000-draytek-routers.html 4. https://www.bleepingcomputer.com/news/security/critical-zimbra-rce-flaw-exploited-to-backdoor-servers-using-emails/ Timestamps 00:00 – Introduction 01:14 – Zimbra RCE Vulnerability 02:17 – 700k DrayTek Routers Vulnerable 04:36 – Recruiters Targeted with Malware 06:14 – Microsoft blocks updates for gamers 1. What are today’s top cybersecurity news stories? 2. How is More_eggs malware targeting HR professionals? 3. What vulnerabilities exist in DrayTek routers? 4. Why did Microsoft block Windows 11 24H2 upgrades? 5. What is the impact of the Zimbra RCE flaw? 6. How do fake job applications spread malware? 7. What security measures can protect against More_eggs malware? 8. What are the latest gaming issues with Windows 11? 9. How can DrayTek router vulnerabilities be mitigated? 10. What are the latest tactics used by cybercriminals in email attacks? More_eggs, Golden Chickens, spear-phishing, credential theft, Microsoft, Windows 11, Asphalt 8, Intel Alder Lake+, DrayTek, vulnerabilities, exploits, cyber attackers, Zimbra, RCE, vulnerability, exploitation, # Intro HR professionals are under siege as a spear-phishing campaign disguised as fake job applications delivers the lethal More_eggs malware, leading to potentially devastating credential theft. Powered by the notorious Golden Chickens group, this malware-as-a-service targets recruiters with chilling precision. **How are recruitment officers unknowingly downloading malicious files, and what methods are threat actors using to bypass security measures?** “Microsoft is blocking Windows 11 24H2 upgrades on some systems due to critical gaming performance issues like Asphalt 8 crashes and Easy Anti-Cheat blue screens. The company is scrambling to resolve these problems that uniquely impact devices with Intel Alder Lake+ processors.” How can gamers with affected systems work around these issues until Microsoft releases a fix? Over 700,000 DrayTek routers are currently vulnerable to 14 newly discovered security flaws, with some critical exploits that could be used to take full control of the devices and infiltrate enterprise networks. Despite patches being released, many routers remain exposed, creating a lucrative target for cyber attackers. How can these vulnerabilities impact businesses that rely on DrayTek routers for network security? Hackers are leveraging a critical Zimbra RCE vulnerability to backdoor servers through specially crafted emails that execute malicious commands, revealing widespread exploitation just days after a proof-of-concept was published. Notable security experts warn of attackers embedding harmful code in the email’s CC field, which the Zimbra server inadvertently executes. How are attackers camouflaging their malicious emails to slip through security measures unnoticed? # Stories Welcome back to our podcast. Today, we’re talking about a new cyber threat targeting HR professionals. Researchers at Trend Micro have uncovered a spear-phishing campaign where fake job applications deliver a JavaScript backdoor called More_eggs to recruiters. This malware, sold as malware-as-a-service by a group known as Golden Chickens, can steal credentials for online banking, email accounts, and IT admin accounts. What’s unique this time is that attackers are using spear-phishing emails to build trust, as observed in a case targeting a talent search lead in engineering. The attack sequence involves downloading a ZIP file from a deceptive URL, leading to the execution of the More_eggs backdoor. This malware probes the host system, connects to a command-and-control server, and can download additional malicious payloads. Trend Micro’s findings highlight the persistent and evolving nature of these attacks, which are difficult to attribute because multiple threat actors can use the same toolkits. The latest insights also connect these activities to known cybercrime groups like FIN6. Stay vigilant, especially if you work in HR or recruitment. 1. **Spear-Phishing**: – **Definition**: A targeted phishing attack aiming at specific individuals or companies, typically using information about the victim to make fraudulent messages more convincing. – **Importance**: This method is specifically dangerous because it can trick even tech-savvy users by exploiting personalized details, leading to significant security breaches like credential theft. 2. **More_eggs**: – **Definition**: A JavaScript backdoor malware sold as a malware-as-a-service (MaaS) with capabilities to siphon credentials and provide unauthorized access to infected systems. – **Importance**: Due to its ability to latently steal sensitive information and its widespread use by various e-crime groups, More_eggs represents a significant threat to corporate cybersecurity. 3. **Malware-as-a-Service (MaaS)**: – **Definition**: A business model where malicious software is developed and sold to cybercriminals who can then use it to conduct attacks. – **Importance**: This model lowers the barrier of entry for cybercriminals, allowing even those with limited technical skills to launch sophisticated attacks using pre-made malware. 4. **Golden Chickens**: – **Definition**: A cybercriminal group (also known as Venom Spider) attributed with developing and distributing the More_eggs malware. – **Importance**: Understanding threat actors like Golden Chickens can help cybersecurity professionals anticipate and defend against specific threat tactics. 5. **Command-and-Control (C2) Server**: – **Definition**: A server used by threat actors to maintain communications with compromised systems within a target network to execute commands and control malware. – **Importance**: Disrupting C2 servers is crucial because it can cut off the attacker's control over their malware, mitigating the threat. 6. **LNK File**: – **Definition**: A shortcut file in Windows that points to another file or executable. – **Importance**: Misuse of LNK files in phishing campaigns can lead to automated execution of malicious payloads, making them an effective vector for malware distribution. 7. **PowerShell**: – **Definition**: A task automation framework from Microsoft consisting of a command-line shell and scripting language. – **Importance**: PowerShell is often used by attackers to execute and conceal malicious scripts due to its powerful capabilities and integration with Windows. 8. **Tactics, Techniques, and Procedures (TTPs)**: – **Definition**: The behavior patterns or methodologies used by cyber threat actors to achieve their goals. – **Importance**: Identifying TTPs helps security professionals understand, detect, and mitigate specific attack strategies used by threat actors. 9. **Obfuscation**: – **Definition**: The process of deliberately making code or data difficult to understand or interpret. – **Importance**: Obfuscation is commonly used by malware developers to conceal malicious activities and bypass security mechanisms. 10. **Cryptocurrency Miner**: – **Definition**: Software used to perform the computational work required to validate and add transactions to a blockchain ledger in exchange for cryptocurrency rewards. – **Importance**: Unauthorized cryptocurrency mining (cryptojacking) can misuse system resources for financial gain, leading to performance degradation and security vulnerabilities. — On today’s tech update: Microsoft has blocked upgrades to Windows 11 version 24H2 on certain systems due to gaming performance issues. Players of Asphalt 8 may encounter game crashes, while some systems running Easy Anti-Cheat might experience blue screens. These problems mainly affect devices with Intel Alder Lake+ processors. Until Microsoft resolves these issues, impacted users are advised not to manually upgrade using tools like the Media Creation Tool. Microsoft is working on fixes and will include them in upcoming updates. 1. **Windows 11 24H2**: A version of Microsoft’s Windows 11 operating system, released in the second half (H2) of 2024. It is significant because it represents Microsoft’s ongoing update cycle aimed at improving system performance and user experience, though it also highlights the challenges of software compatibility and stability. 2. **Asphalt 8 (Airborne)**: A popular racing video game often used for showcasing graphical and processing capabilities of devices. Its relevance lies in exposing potential software and hardware compatibility issues when new operating systems are released. 3. **Easy Anti-Cheat**: A software tool designed to detect and prevent cheating in multiplayer games. It is crucial for maintaining fair play and integrity in online gaming environments but can pose compatibility challenges with system updates. 4. **Blue Screen of Death (BSoD)**: An error screen displayed on Windows computers following a system crash. It is important as it signals serious software or hardware issues that could affect system stability and data integrity. 5. **Intel Alder Lake+ processors**: A generation of Intel’s microprocessors known for their hybrid architecture design. Understanding these chips is important for recognizing which systems might be more susceptible to the reported compatibility issues. 6. **vPro platform**: A set of Intel technologies aimed at enhancing business security and manageability. It’s critical to cybersecurity professionals because it allows for hardware-level encryption and more robust security management, but compatibility with OS updates can be problematic. 7. **MEMORY_MANAGEMENT error**: A specific type of error indicating system memory management problems, often leading to system crashes. It is crucial for cybersecurity and IT professionals as it affects the stability and reliability of a system. 8. **Compatibility holds (Safeguard IDs)**: Mechanisms employed by Microsoft to prevent system upgrades when known issues are detected. These are essential for protecting users from potential system failures and ensuring a stable computing environment. 9. **Media Creation Tool**: A Microsoft utility used for installing or upgrading Windows OS. It's important for IT professionals as it provides a means to manually deploy Windows updates, though it highlights the risks of bypassing automatic update safeguards. 10. **KB5043145 (Preview Update)**: A specific Windows update known to cause issues such as reboot loops and connection failures. Understanding these updates is crucial for maintaining system stability and ensuring that deployed systems are free from vulnerabilities and bugs. — In a recent cybersecurity alert, over 700,000 DrayTek routers have been identified as vulnerable to hacking due to 14 newly discovered security flaws. These vulnerabilities, found in both residential and enterprise routers, include two rated critical, with one receiving the maximum CVSS score of 10.0. This critical flaw involves a buffer overflow in the Web UI, potentially allowing remote code execution. Another significant vulnerability is OS command injection via communication binaries. The report highlights the widespread exposure of these routers’ web interfaces online, creating a tempting target for attackers, particularly in the U.S. DrayTek has released patches to address these vulnerabilities, urging users to apply updates, disable unnecessary remote access, and utilize security measures like ACLs and two-factor authentication. This development coincides with international cybersecurity agencies offering guidance to secure critical infrastructure, emphasizing the importance of safety, protecting valuable OT data, secure supply chains, and the role of people in cybersecurity. 1. **Vulnerability**: A weakness in a system or software that can be exploited by hackers. – **Importance**: Identifying vulnerabilities is crucial in cyber security because it helps protect systems from attacks. 2. **Router**: A device that routes data from one network to another, directing traffic on the internet. – **Importance**: Routers are essential for internet connectivity and their security is vital to prevent unauthorized access to networks. 3. **Buffer Overflow**: A coding error where a program writes more data to a buffer than it can hold, potentially leading to system crashes or unauthorized code execution. – **Importance**: Buffer overflows are common vulnerabilities that can be exploited to gain control of a system. 4. **Remote Code Execution (RCE)**: A type of vulnerability that allows an attacker to execute code on a remote system without authorization. – **Importance**: RCE vulnerabilities are highly critical as they enable attackers to take over affected systems. 5. **Cross-site Scripting (XSS)**: A web security vulnerability that allows attackers to inject malicious scripts into content from otherwise trusted websites. – **Importance**: XSS can be used to steal information, deface websites, and spread malware. 6. **Adversary-in-the-Middle (AitM) Attack**: An attack where the attacker secretly intercepts and possibly alters the communication between two parties who believe they are directly communicating with each other. – **Importance**: AitM attacks can lead to data theft, man-in-the-middle proxy attacks, and unauthorized access to sensitive information. 7. **Denial-of-Service (DoS)**: An attack intended to shut down a machine or network, making it inaccessible to its intended users. – **Importance**: DoS attacks disrupt the availability of services and can cause significant downtime and financial loss. 8. **Access Control List (ACL)**: A list of permissions attached to an object that specifies which users or system processes can access the object and what operations they can perform. – **Importance**: ACLs are crucial for implementing security policies to control access to resources. 9. **Two-Factor Authentication (2FA)**: A security process in which the user provides two different authentication factors to verify themselves. – **Importance**: 2FA improves security by adding an additional layer of verification, making it harder for attackers to gain unauthorized access. 10. **Operational Technology (OT)**: Hardware and software that detects or causes changes through direct monitoring and control of physical devices, processes, and events in an enterprise. – **Importance**: OT security is critical for the functioning and safety of critical infrastructure systems, such as those in manufacturing, power generation, and transportation. — Today, we’re discussing a critical remote code execution (RCE) vulnerability in Zimbra email servers, tracked as CVE-2024-45519, which hackers are actively exploiting. This flaw allows attackers to trigger malicious commands simply by sending specially crafted emails, which are processed by Zimbra’s post journal service. First flagged by Ivan Kwiatkowski of HarfangLab and confirmed by Proofpoint, the exploit involves spoofed emails with commands hidden in the “CC” field. Once processed, these emails deliver a webshell to the server, giving attackers full access for data theft or further network infiltration. A proof-of-concept exploit was released by Project Discovery on September 27, prompting immediate malicious activity. Administrators are urged to apply security updates released in Zimbra’s latest versions—9.0.0 Patch 41 and later—or disable the vulnerable postjournal service and ensure secure network configurations to mitigate the threat. Stay vigilant and update your Zimbra servers immediately to protect against this critical vulnerability. 1. **Remote Code Execution (RCE)** – **Definition**: A type of security vulnerability that enables attackers to run arbitrary code on a targeted server or computer. – **Importance**: This flaw can be exploited to gain full control over the affected machine, leading to data theft, unauthorized access, and further network penetration. 2. **Zimbra** – **Definition**: An open-source email, calendaring, and collaboration platform. – **Importance**: Popular among organizations for its integrated communication tools, making it a significant target for cyberattacks due to the sensitive data it handles. 3. **SMTP (Simple Mail Transfer Protocol)** – **Definition**: A protocol used to send and route emails across networks. – **Importance**: Integral to email services, its exploitation can deliver malicious content to servers and users, forming a vector for cyber-attacks. 4. **Postjournal Service** – **Definition**: A service within Zimbra used to parse incoming emails over SMTP. – **Importance**: Its vulnerability can be leveraged to execute arbitrary commands, making it a crucial attack point for hackers. 5. **Proof-of-Concept (PoC)** – **Definition**: A demonstration exploit showing that a vulnerability can be successfully taken advantage of. – **Importance**: PoC exploits serve as proof that theoretical vulnerabilities are practical and dangerous, necessitating urgent security responses. 6. **Base64 Encoding** – **Definition**: A method of encoding binary data into an ASCII string format. – **Importance**: Often used to encode commands within emails or other data streams to evade basic security detections. 7. **Webshell** – **Definition**: A type of malicious script that provides attackers with remote access to a compromised server. – **Importance**: Webshells afford attackers sustained control over a server, allowing for ongoing data theft, disruptions, and further exploits. 8. **CVE (Common Vulnerabilities and Exposures)** – **Definition**: A list of publicly known cybersecurity vulnerabilities and exposures, identified by unique CVE IDs. – **Importance**: Helps standardize and track security issues, facilitating communication and management of vulnerabilities across the cybersecurity community. 9. **Patch** – **Definition**: An update to software aimed at fixing security vulnerabilities or bugs. – **Importance**: Patching vulnerabilities is critical for protecting systems from attacks exploiting known security flaws. 10. **Execvp Function** – **Definition**: A function in Unix-like operating systems that executes commands with an argument vector, featuring improved input sanitization. – **Importance**: By replacing vulnerable functions like ‘popen,’ ‘execvp’ helps prevent the execution of malicious code, thus enhancing system security. —
Latvijas Futbola federācija 26. aprīlī aicinās savus biedrus uz ikgadējo kongresu, kur darba plānā ir arī prezidenta vēlēšanas. Vadims Ļašenko cer turpināt pirms četriem gadiem sākto darbu, kamēr Virslīgas valdes priekšsēdētājs Maksims Krivuņecs nāk ar savām idejām. "Uzskatu, ka varu labāk," sacīja Krivuņecs, kamēr Ļašenko lielāko daļu pārmetumu noraidīja ar vārdiem, ka tās jau tikai priekšvēlēšanu aktivitātes. Raidījumā "Ārpus kadra" abi satikās pagaidām pirmajā kopīgajā publiskajā diskusijā pirms LFF kongresa, apmainoties viedokļiem un jautājumiem par Latvijas futbola nākotni, izlasi, Virslīgu, infrastruktūru, jaunā stadiona iecerēm un finansēm, kā arī paskaidroja, kā tas īsti sanācis, ka divi principā LNK cilvēki kļuvuši par vēlēšanu konkurentiem. Podkāstu "Ārpus kadra" atbalsta Aizdevums.lv.
Op vrijdag 14 december 1883 strompelt Hendrik Frankhuizen doodziek een dokterspraktijk binnen in Leiden, Nederland. Zijn vrouw en kind zijn enkele dagen eerder overleden. Uit een autopsie blijkt dat hun overlijden niet natuurlijk is… Hier is aflevering 131!Zit je met iets? Praat bij Tele-Onthaal over wat jou bezighoudt. Bel anoniem en gratis naar 106 (24u/7d) of chat via www.tele-onthaal.beBespaar tot wel € 90 korting op je eerste 4 boxen met de code HELLODEVOLKSJURYLuister naar het nieuwe Justin Timberlake album ‘Everything I Thought It Was' op Spotify via https://LNK.to/JTvolksjuryVoornaamste bronnenStefan Glasbergen - Goeie Mie: Biografie van een seriemoordenaresStefan Glasbergen - ‘Goeie Mie' - Gifmengster uit Leiden: Een verhaal over gif en geldzuchtMakersRadio – Goeie Mie, de gifmengster #3Djanlissa Pringels - Het griezelige en verdrietige verhaal van Nederlands grootste vrouwelijke seriemoordenaarZie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
I spoke with Zara Larsson about her new album, aliens and breakfast.Listen to the album ‘Venus': http://zaralarsson.LNK.to/VENUSZara Larsson will perform live in Belgium on the 25th of february in Ancienne Belgique Brussels and on the 7th of july at Rock Werchter.This podcast contains 'publiciteit' for Zalando.Bonuscontent: petjeaf.com/gossipguyAudio podcast: https://open.spotify.com/show/6GagFxVDilTFfwbz7v2jmB?si=ffc271e79adf4124Follow me @enderscholtens orInstagram: https://www.instagram.com/enderscholtens/Twitter: https://twitter.com/enderscholtens?lang=enSnapchat: enderrrrrYouTube: https://www.youtube.com/channel/UC4F3QqJ-g0HDqvyWf-6K4SwTikTok: http://vm.tiktok.com/J61VUE/Edit: https://www.instagram.com/matthiasvollon/?hl=nlZie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
Life has a way of throwing curveballs, and like anyone else, we've had to juggle a few. We're on the second last episode of S3 before we take a short break, but not without leaving you with another episode that is as neurodivergent as you can imagine. First, we dive into the second season of "The Bear" which surprised us in the best possible way. It's more than just a food show—it's a slice of life that serves up a hearty meal of emotions and relatable experiences. Then we discuss "Canada's Drag Race," and our current love for Denim and finish the episode by diving into one of our favourite topics: cults. We share our thoughts, feelings, and insights into the docuseries on Netflix, "Escaping Twin Flames" and the Amazon Prime docuseries, "Desperately Seeking Soulmate: Escaping Twin Flame". We delve into the dark side of the groups, specifically how the captivating couple Jeff and Shaleia Divine forcibly transition their members and discuss the dark truths behind this alleged online love cult.Get ready for giggles, insights, and some seriously fabulous pop culture pondering! Don't forget to tune into our last episode of season three on Sunday, December 10th.If you liked what you heard, maybe think about rating us! You can also find all our social links by visiting our Lnk.Bio page. Heck, if you want - leave us a voicemail. We love to answer questions from our listeners or make suggestions about what you'd like us to cover. Maybe we'll even feature it in a future show! Support the show
In today's podcast we cover four crucial cyber and technology topics, including: 1. Anonfiles shuts down, sites overwhelming abuse 2. Clorox details cyberattack requiring shutdowns 3. Xurum malware used in attacks against Magento 4. Researchers uncover new phishing campaign abusing QR codes I'd love feedback, feel free to send your comments and feedback to | cyberandtechwithmike@gmail.com
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
From small LNK to large malicious BAT file with zero VT score https://isc.sans.edu/diary/From%20small%20LNK%20to%20large%20malicious%20BAT%20file%20with%20zero%20VT%20score/30094 Social Engineering via Microsoft Teams https://www.microsoft.com/en-us/security/blog/2023/08/02/midnight-blizzard-conducts-targeted-social-engineering-over-microsoft-teams/ Automating the Search for LOLBAS https://pentera.io/resources/whitepapers/the-lolbas-odyssey-finding-new-lolbas-and-how-you-can-too/ Sneaky Versioning Used to Bypass Scanners https://thehackernews.com/2023/08/malicious-apps-use-sneaky-versioning.html Aruba Patches https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-010.txt Mitel Patches https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0008
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
From small LNK to large malicious BAT file with zero VT score https://isc.sans.edu/diary/From%20small%20LNK%20to%20large%20malicious%20BAT%20file%20with%20zero%20VT%20score/30094 Social Engineering via Microsoft Teams https://www.microsoft.com/en-us/security/blog/2023/08/02/midnight-blizzard-conducts-targeted-social-engineering-over-microsoft-teams/ Automating the Search for LOLBAS https://pentera.io/resources/whitepapers/the-lolbas-odyssey-finding-new-lolbas-and-how-you-can-too/ Sneaky Versioning Used to Bypass Scanners https://thehackernews.com/2023/08/malicious-apps-use-sneaky-versioning.html Aruba Patches https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-010.txt Mitel Patches https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-23-0008
~If you would like to subscribe to only interviews by Retail Insider, a separate "The Interview Series" podcast show is now available (link to Apple Podcast show). If you would like to subscribe to only Canadian retail discussions between Craig and Lee by Retail Insider, a separate "The Weekly" podcast show is now available (link to Apple Podcast show).~ Craig Patterson, Founder and Publisher of Retail Insider Media, sits down with Sonya Gill, founder of the world's first global fashion/beauty eCom marketplace to only represent ethnically diverse indie brands called THE LNK.Gill explains how the innovative marketplace came about and how global indie brands are able to get into the Canadian market through online channels. Sustainability plays a big role and the future looks bright for the rapidly growing platform. Interviewed this episode:Sonya Gill, founder of THE LNK. The Interview Series podcast by Retail Insider Canada is available on Apple Podcasts, Stitcher, TuneIn, Google Play, or through our dedicated RSS feed for Overcast and other podcast players. Also check out our The Weekly podcast where Craig and Lee discuss popular content published on Retail Insider which is part of the The Retail Insider Podcast Network. Subscribe, Rate, and Review our Retail Insider Podcast!Follow Craig: LinkedIn: www.linkedin.com/in/CraigPattersonTorontoInstagram: @craig_patterson_torontoTwitter: @RI_EIC Follow Retail Insider: LinkedIn: www.linkedin.com/company/Retail-InsiderFacebook: https://www.facebook.com/RetailInsider/Twitter: @RetailInsider_Instagram: @Retail_Insider_Canada Listen & Subscribe:Apple PodcastsSpotifyOvercastStitcher Share your thoughts! Drop us a line at Craig@Retail-Insider.com. You can also rate us in Apple Podcasts or recommend us in Overcast to help more people discover the show! Background Music Credit: Hard Boiled Kevin MacLeod (incompetech.com). Licensed under Creative Commons: By Attribution 3.0 License. http://creativecommons.org/licenses/by/3.0/
In this episode of Talos Takes I am joined by security researcher Guilherme Venere to discuss their recent research on LNK files. The usage of these files by malicious actors has exploded over the last six months as actors look to move away from macro based initial infection vectors. LNK files do have unique metadata attributes to allows for useful actor and threat tracking capabilities. We'll dig deeper on LNK files as well as the metadata you can leverage. For full details check out the blog at https://blog.talosintelligence.com/following-the-lnk-metadata-trail/
Pakinggan ang mga kwento ni Tita Estella at ang iilang mga sekreto sa pamilya na hindi nya pa nasasabi sa kanyang anak na si Olivia.Salamat uli kay Tita Estella at Olivia sa pag share nung mga kwento nyo, sabi ko nga, parang halo na talaga si Olivia, may ET na may LNK pa, hehehe. Papaano kaya nya napapaghalo ito?Kung meron ka ring mga kwento gaya nito na gusto mo i-share, email nyo lang ako sa paranormalsph@gmail.com hehehehe.If gusto nyo tuloy ang kwentuhan, pwede kayo pumunta sa Discord Server kung saan may iba't ibang chat room na may iba ibang paranormal na topic na napapagusapan. Tignan ang link sa baba:https://discord.gg/YWF4BpS4gQ = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = Kung di mo pa napapakinggan ang mga naunang episode nila Olivia, eto yung mga link para mas maintindihan mo rin ang kwentuhan kanina. OliviaThe Tarot Reader - https://open.spotify.com/episode/6hTA80O8fgYq9Suspj1N4I?si=15efdd9075b04297Paranormal Tales - Francesca - https://open.spotify.com/episode/7AkDFlhVtLOaruRYV7m4Dx?si=831cce85ef4b4134Spirit Walk - https://open.spotify.com/episode/2rzFkpun8V6dXVVFZX4KxM?si=ffe2f7c2f892462fJPSoutheast Asian Folklore Part 1 - https://open.spotify.com/episode/7KN0ggvrUNoexn4fOSPUuR?si=fe7a626bcf16486eSoutheast Asian Folklore Part 2 - https://open.spotify.com/episode/3SKkOXirHJe7GMOoEPG6O6?si=32da607da9964966Southeast Asian Folklore Part 3 -https://open.spotify.com/episode/49mnoTPgEIvSQ2ccTyjbGO?si=3f2666c7fc824e6e Other family themed episodesSpiritual Secret Society - https://open.spotify.com/episode/6sHxYQI9vmHpLzoqh8QJFY?si=a2831e0a08bb480bParanormal Tales: Ellis and Mary - https://open.spotify.com/episode/4hJIjSYeAx9q4JLbm79WOm?si=4f5de7dcfe364c88 LL PortionStephen King's N - https://www.youtube.com/watch?v=7v9QegcTfq4&t=54s= = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = Do you want to support the podcast? You can help keep us going by giving us a cup of joe! ko-fi.com/paranormalpodcast You can also support us on Patreon https://www.patreon.com/paranormalpodcast We have different tiers for supporters, from the general support to early access, to joining us on the calls way in advance. No pressure, just additional help for us :) The Para Normal Podcast. Engineered and Produced by f90 Productions Rate and Review our show on Spotify, Pocket Casts, and Apple PodcastsEnjoy. #ParanormalPodcast #ParaNormal #FamilySecrets
In this episode, we share our first interview from last season with Alli Widman, ski mom and Founder & CEO of Avant Ski. Alli has been an avid skier and traveler her entire life. Following years of frustration with a lack of comprehensive, reliable ski resources for recreational skiers, Alli launched Avant Ski in 2018.We talk to Alli about a wide range of ski-related topics that are on our minds as we think of the season ahead - from the economics and perks of multi-mountain ski passes (Epic Pass, Ikon Pass, Indy Pass, Mountain Collective) to what factors to consider when picking a ski resort for your next family vacation.Alli shares some great tips on navigating Park City - everything from ski school drop off to finding great coffee and fun apres ski spots. Avant Ski resort guides give you this type of insider access so you can experience the mountain like a local. Resources:Avant Ski Pass Guide: https://www.theavantski.com/post/season-pass-updatesAvant Ski Packing List: https://www.theavantski.com/post/packing-list-essential-gearAvant Ski Resort Guides: https://www.theavantski.com/resortsStates Where Kids Ski Free: https://www.momtrends.com/travel/10-states-where-kids-ski-freeKeep up with the Latest from Avant Ski!Website: https://www.theavantski.com Facebook: https://www.facebook.com/theavantski/Twitter: https://twitter.com/getAvantSkiInstagram: https://www.instagram.com/theavantski/TikTok: http://Lnk.bio/avantskiCheck out the Ski Pack at www.puremountainfun.com and use code SKIMOMS2022 for20% off your order.Join the Ski Moms Fun Community!Follow us on Instagram @skimomsfunEmail us sarah@skimomsfun.comCheck out the Ski Moms Fun Store
In today's podcast we cover four crucial cyber and technology topics, including: 1. New Quantum Builder used in delivery of malware 2. Chaos malware, written in Go, and Chinese revealed 3. Brute Ratel tool leaked on criminal forum, for free 4. Okta reveals subsidiary had security event, says no customer impact I'd love feedback, feel free to send your comments and feedback to | cyberandtechwithmike@gmail.com
#067 - Join Jennie for a live coaching episode guiding her amazing client, Libby, through her overwhelm to create a step-by-step strategy for launching her coaching business. The ladies discuss:the best platforms for course creation (Jennie recommends Zenler). (*affiliate link)a new way of looking a creating content for social media (and how to make use of time blocking to schedule it at your leisure),how to record modules (the pros and cons of Zoom vs. Canva - and how to keep Canva from acting buggy),getting new clients,Jennie's top piece of advice,releasing what we can't control,what happens when you try to monetize everything,how to create content from content you're consuming, andwhat to do when you're spiraling.Social Media scheduling apps:FB Creator Studio is clunky but free.Later has some cool features but costs $250 a year (which adds up if you have multiple accounts). (*affiliate link)Lnk.Bio is $.99/month but super no-frills.Canva - post to ALL the major social media platforms with CanvaPRO for $54.99/year.This is Jennie's favorite meditation for dealing with overwhelm.Follow Jennie on Facebook and Instagram and come watch the video version of these episodes on YouTube!✨✨If you think this content is deserving of a tip, I'd be ever so grateful if you'd leave one here. I plan to use all proceeds for magick supplies and I promise to use my powers for good.
This episode reports on hackers dropping macros for RAR, LNK files, Robin Banks service offered for hackers, and warnings on malicious proxyware and browser extensions
Mai menü:A San Franciscó-i zsaruk valós idejű hozzáférést akarnak a magán biztonsági kamerákhoz a megfigyeléshezMiCODUS-GPS Tracker vulns.LNK fileok office fileok helyett es a VBA csikicsukiSATAn: adatok kiszivárgása a levegőben lévő rendszerekből SATA-kábeleken keresztülElítélték az ex-CIA hackert "az amerikai történelem egyik legkárosabb kémkedéséértOroszország 358 millió dollárra bírságolja a Google-t, mert nem távolította el a tiltott információkatOrosz hackerek becsapták az ukránokat hamis "DoS Android Apps to Target Oroszország"Elérhetőségeink:TelegramTwitterInstagramFacebookMail: info@hackeslangos.show
A daily look at the relevant information security news from overnight - 24 June, 2022Episode 252 - 24 June 2022Ransomware Decoy- https://www.theregister.com/2022/06/24/ransomware_as_espionage_distraction/ Quantum .LNK Builder - https://www.bleepingcomputer.com/news/security/malicious-windows-lnk-attacks-made-easy-with-new-quantum-builder/Python Backdoor- https://thehackernews.com/2022/06/multiple-backdoored-python-libraries.htmlHermit Spies Android and iOS - https://www.securityweek.com/sma-technologies-patches-critical-security-issue-workload-automation-solutionMitel VoIP Zero-Day - https://thehackernews.com/2022/06/hackers-exploit-mitel-voip-zero-day-bug.htmlHi, I'm Paul Torgersen. It's Friday June 24th, 2022, and this is a look at the information security news from overnight. From TheRegister.comA state-sponsored Chinese threat group that Secureworks has named Bronze Starlight, has a ransomware campaign that is targeting pharmaceutical companies, electronic component designers and manufacturers, US law firms, and aerospace and defense companies. The thing is, the ransomware is just a decoy. Researchers believe the true aim is cyber espionage, which explains why these specific types of companies are being targeted. Link to that research in the article. From BleepingComputer.com:Researchers have noticed a new tool they call Quantum that helps cybercriminals build malicious .LNK files to deliver payloads. These are especially popular in phishing campaigns, currently being used by Emotet, Bumblebee, Qbot, and IcedID. Quantum features a graphical interface and hundreds of icon and extension spoofing options, and you can rent it starting at less than 200 Euros a month. A link to the Cyble research in the article. From The HackerNews.com:Researchers have discovered a number of malicious Python packages in the official third-party software repository that are engineered to exfiltrate AWS credentials and environment variables to a publicly exposed endpoint. What's not for certain is if this is the result of an attack, or some sort of pen-test situation. This would be at least the third such example of a pen tester making a point in the last month or so. From ThreatPost.com:Google is warning that the Hermit spyware by RCS Labs out of Italy, is being deployed against Android and iOS users. The campaign is targeting victims in Kazakhstan and Italy. Last week it was learned that the Kazak government was using this same spyware against its own citizens. Google says the fake apps containing the spyware are not in the Google Play or Apple stores and are only downloaded from third party websites. And last today, from TheHackerNews.comA suspected ransomware intrusion against an unnamed target is leveraging a Linux based Mitel VoIP appliance as an entry point. CrowdStrike says the threat actor is exploiting a 9.8 severity bug that Mitel had patched back in April and are utilizing a couple of anti-forensic measures to erase traces of their actions. Details and links in the article. That's all for me today. Have a great weekend. Like and subscribe, and until next week, be safe out there.
Samahan kami sa mga kwento ni Carl tungkol sa mga nalalaman nya tungkol sa Lihim na Karunungan.Salamat kay Carl sa mga pakibahagi nya ng mga experience at nalalaman nya tungkol sa Lihim na Karunungan.Kung may karanasan ka rin sa mga LNK sa pamilya mo or mga kwentong narinig mo at gusto mo ibahagi samin, pwede mo kaming email sa paranormalsph@gmail.com Pwede ka rin sumali sa Discord Channel ng Para Normal Podcast - https://discord.gg/YWF4BpS4gQ = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = = Are you thinking...wow I want to support the podcast, well look no further! You can help keep us going by giving us a cup of joe! ko-fi.com/paranormalpodcast or you can also support us on Patreon! https://www.patreon.com/paranormalpodcast 111-brb The Para Normal Podcast. Engineered and Produced by f90 Productions Rate and Review our show on Spotify, Pocket Casts, and Apple Podcasts Enjoy. #ParanormalPodcast #ParaNormal #LNK #LihimNaKarunungan #Agimat #AntingAnting
Oh hi, we're so happy to see you're back! We are dropping episode 5 of S2 today, and it's a fun one! For this week's episode, we are exploring the gay history of wrestling and how it's really a form of athletic storytelling or heck, performance art akin to drag. To take us through the history and make a case for why this matters, Nova-Scotia-based winner of Masterchef Canada and pro wrestler Jennifer E. Crawford talks us through everything and shares with us their story of how they developed Moon Miss, their wrestling persona. Throughout the episode we also discuss: How wrestling is the purest iteration of campHow wrestling can foster a deep curiosity about our bodies and their relationship to themOK, but are drag and wrestling really that similar?Then to follow up with that, Ama has a segment with Eric Shorey aka DJ Accident Report, a Brooklyn-based freelance pop culture journalist who is one-third of The Nobodies, a supergroup with a penchant for pro-wrestling, and we discuss how wrestling has become queererJust how safe can the wrestling community be for queer folks?Finally, all three of us play a game where Ama and Ameema try to create their own wrestling personas and Jennifer helps them create a backstoryIf you liked what you heard, maybe think about rating us! You can also find all our social links by visiting our Lnk.Bio page. Heck, if you want - leave us a voicemail. We love to answer questions from our listeners or take suggestions about what you'd like us to cover. Maybe we'll even feature it in a future show! Hell, if you even want to support us (we're a small team and a lot of work goes into what you hear today) then we would love it if you send us a few bucks via our Ko-Fi! All the money helps us with production costs and creating the podcast you hear today.~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~Further Reading on this Topic!Pro Wrestling Is Super Gay Now - themQueer Performers Making Space in Wrestling - KALWWhat Do Drag and Wrestling Have in Common? More Than You Think! - VICEWrestling's Gay History and Optimistic Future - Pro Wrestling Stories~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~Support the show (https://ko-fi.com/highlowbrowpod)Support the show
We're back for our fourth full-length episode of S2! For this week's episode, we get into one of the hottest trends of 2021: parasocial relationships. No matter where you go on the Internet, it's all everyone is talking about. From the social and entertainment-kind, intense-personal, and borderline-pathological. Between us and our special guest for the week, Toronto-based arts and culture writer and editor Sadaf Ahsan, Ameema, and Ama analyze everything to do with parasocial relationships and even make a case for why some might even be healthy! So many people, from influencers to celebs, broadcast all the mundane aspects of their lives. From their new outfits to the latest restaurants they've tried and even the packages they open, practically nothing is off-limits. So we explore:What exactly is a parasocial relationship?The power dynamics in fandom culture How we grew up in fandoms ourselves and participated in fan cultureWhy do fans have such high expectations of the people they are in relationships with Whose boundaries and mental health matter here?Finally, Sadaf names our official podcast fandomFinally, all three of us play a game where Sadaf and Ameema try to guess the names of certain fandoms. Shout out to our listeners in the Navy ;) If you liked what you heard, maybe think about rating us! You can also find all our social links by visiting our Lnk.Bio page. Heck, if you want - leave us a voicemail. We love to answer questions from our listeners or take suggestions about what you'd like us to cover. Maybe we'll even feature it in a future show! Hell, if you even want to support us (we're a small team and a lot of work goes into what you hear today) then we would love it if you send us a few bucks via our Ko-Fi! All the money helps us with production costs and creating the podcast you hear today.~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~Further Reading on this Topic!YouTubers Are Not Your Friends - The VergeToo close for comfort: the pitfalls of parasocial relationships - The GuardianMeet the stans who DM their faves about their day - MashableWhen Grown-Ups Have Imaginary Friends - The New York TimesBo Burnham's Inside begs for our parasocial awareness - Polygon~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~Support the show (https://ko-fi.com/highlowbrowpod)Support the show
Laidoje „Prie aikštelės“ Karolis Tiškevičius kalbina sporto žurnalistą bei buvusį LNK sporto žinių vedėją Šarūną Mazalą ir TV3 Sport komentatorių bei krepsinis.net portalo įkūrėją Romaną Buršteiną. Šią tinklalaidę pristato 7bet: https://7bet.lt/ Temos: Studijoje – labai seni vyrai (00:00); Krepsinis.net ir Eurobasket.lt pradžioje (2:54); Informacijos šaltiniai prieš 15 metų (6:33); Neapsimeskime, kad tada buvo gerai (12:29); Didžiausia Buršteino paslauga Miklovui (14:13); Netikėtas Mazalo debiutas televizijoje (16:18); Romano Buršteino ir Gintaro Krapiko bendradarbiavimas (18:18); Paauglys žurnalistas Europos čempionate (19:42); Čempionate darbingiausi – lietuvių žurnalistai (21:18); Romano pradžia TV3 Sport kanale (22:23); Geriausias Romano transferas – Gediminas Reklaitis (27:17); Kas pavogė Čeponį? (29:14); Dviejų komentatorių standartas eteryje (30:42); Kodėl buvę profesionalai nekomentuoja krepšinio? (30:51); Kodėl TV3 Sport neturi studijos prieš rungtynes? (34:31); LRT ir TV3 Sport konkurencija (38:58); TV3 Sport komentatorių netrūksta (39:58); Mazalo konfliktas su Šarūnu Jasikevičiumi (40:52); Kas atrado Vyšniauską? (43:54); Kas komentuoja visur? (46:20).
We're back for our third full-length episode of S2! For our very first Low Brow Takes on High Brow Culture takedown episode, Ama and Ameema have invited on former co-host and fellow podcaster from the show We Really Like Her, Danita Steinberg to discuss all things Oscars 2022.Between the three of us, we analyze everything that has to do with the Oscars 2022 show that we hope hasn't already been discussed to death already (cough, The Slap, cough) including: How brand new producer Will Packer made the executive decision to present eight of the 23 awards before the live broadcast began and totally fumbled the bagHow diversity is still so lacking with The Oscars and what they could learn from independent awards showsHow influencers and content creators were invited to this year's Oscars to help appeal to a younger demographicWhy the Marvel Cinematic Universe has such a grip on cinema worldwide (no, but really)In our first segment, Danita Steinberg walks us through her top 10 snubs of the 2022 Oscars and if anyone disagrees, we will fight you.Making a case for why the Oscars are still relevant Discussing the fashion and why we miss Joan RiversFinally, all three of us decide to award our own Oscars! Some of the awards include Celeb with the Most Audacity (here's looking at you, Judd Apatow!) and the Celeb Who Was the Most Wholesome (yep, it was obviously Youn Yuh-jung and Troy Kotsur!) but that's just the tip of the iceberg!If you liked what you heard, maybe think about rating us! You can also find all our social links by visiting our Lnk.Bio page. Heck, if you want - leave us a voicemail. We love to answer questions from our listeners or take suggestions about what you'd like us to cover. Maybe we'll even feature it in a future show! Hell, if you even want to support us (we're a small team and a lot of work goes into what you hear today) then we would love it if you send us a few bucks via our Ko-Fi! All the money helps us with production costs and creating the podcast you hear today.~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~Further Reading on this Topic!Diversity at the Oscars: ‘CODA,' ‘Encanto,' ‘West Side Story' Wins Show Breadth of Inclusion - The Hollywood ReporterWe Aren't Just Watching the Decline of the Oscars. We're Watching the End of the Movies - The New York TimesWill Smith's slap after Chris Rock's joke dominated the Oscars. But how does inherited racial trauma fit into the story? - ABCCan TikTok Help Save the Oscars? - Vanity FairThe Oscars is a show fighting for its life, but should we even care? - CBC~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~Support the show
In the second full-length episode of season two, Ama & Ameema invite the iconic writer/director of LGBTQ+ reality shows such as Hot Haus and Slag Wars, our favourite sex-positive daddy (and soon to be yours!) Topher Cusumano. The three of us chat with Topher about why queer reality TV sucks so much and why mainstream media struggles with queer representation. We also dive deep into what it means to produce queer media and talk about what pleasure and desire look like. Because heh, who doesn't read a little erotica on their days off. So cozy up, and get ready to laugh because this episode is a journey from start to finish!Throughout the next hour, you'll hear the following: Topher tells us why it's harmful to pigeonhole marginalized creatorsOK, but why is queer reality TV so bad?What exactly goes into creating a reality TV show and how hard is it to make GOOD queer reality TV?Representation is a nuanced topic, so what exactly does it look like?In our first segment, Ama sits down with Kiara from Canada's Drag Race season one to discuss what it's like to appear on a reality TV and how the fandom can be (answer: not great, bob!) Then we wrap it all up by playing a game of #HeatOrTrash with Topher, where he ranks some of the top queer reality television shows in the last decade from god-tier to homophobic. If you liked what you heard, maybe think about rating us! You can also find all our social links by visiting our Lnk.Bio page. Heck, if you want - leave us a voicemail. We love to answer questions from our listeners or take suggestions about what you'd like us to cover. Maybe we'll even feature it in a future show! Hell, if you even want to support us (we're a small team and a lot of work goes into what you hear today) then we would love it if you send us a few bucks via our Ko-Fi! All the money helps us with production costs and creating the podcast you hear today.~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~Further Reading on this Topic!Queer representation in media: the good, the bad, and the ugly - Heckin' UnicornQueer Baiting: What is it and Why is it harmful for the LGBTQ+ Community - HYPEBAEWhy Can't Every Reality Show Be Season 8 of Are You the One? - VOGUE'Top Chef' Gave Queer Women a Platform Before It Was Cool - ShondalandIs Slag Wars TV's most inclusive reality show yet? - iD~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~Support the show
In the first full-length episode of season two, Ama & Ameema invite educator and YA author Tanya Boteju on to the show to chat with them about a topic that has been bothering the two of them for a while: why society seems to enjoy mocking teen girls and young women for their interests. Has this been bothering you as well? Oh buds, then get your earbuds ready because this is the episode for you.Throughout the next hour, you'll hear the following: Tanya shares her experience of writing her booksWhy the fuck are we so hard on teen girls Why don't we take teen girls seriously?What makes a good example of teen friendship in media?In our first segment, Courtney Summers, the New York Times bestselling and award-winning YA author shares the advice on teen friendship she wishes she was given sooner in lifeIn our second segment, Tanya shares some of her fave pieces of media that represent teen girls and friendshipThen we wrap it all up by playing a game of Pop Culture Yearbook to decide who would start their own MLM or lipsync on SNL.If you liked what you heard, maybe think about rating us! You can also find all our social links by visiting our Lnk.Bio page. Heck, if you want - leave us a voicemail. We love to answer questions from our listeners or take suggestions about what you'd like us to cover. Maybe we'll even feature it in a future show!~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~Further Reading5 Harmful Ways We Fail Teenage Girls as a Society - Everyday FeminismStop Indiscriminately Hating Things Teenage Girls Like - MediumSociety Hates Teen Girls - The ForewordThere's a culture of hating teenage girls and no one's talking about it - The Southerner~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~*~Want to support us? Then send us a few bucks on Ko-Fi! All the money helps us with production costs and creating the podcast you hear today.Support the show
After a nearly four-month hiatus, we're back and so excited for season two! And trust us: it's going to be bigger, and better than ever! Plus, we have a brand new co-host!!! Say hello to the wonderful and talented Ameema Saeed. In this short mini-episode, Ama and Ameema reminisce about life during the pandemic, how their own friendship blossomed, how TikTok sounds are taking over their minds, ask the question everyone wants to know: are vampires really gay and play a few High Low Brow games with one another to get you excited for season two. Plus, if that was enough for one single episode, we give y'all a sneak peek of some of the guests and topics we'll be exploring for season two including parasocial relationships, why is all queer reality TV bad, the thirst trap, and why parody accounts rule - just to name a few! If you liked what you heard, maybe think about rating us! You can also find all our social links by visiting our Lnk.Bio page and hell, if you have a question about an episode or any of our work... leave a voicemail. Maybe we'll feature it in a future show!Support the show
It is my final show of the year and the last episode of Season 2. Yes, 2021 was another difficult year, but there was a lot of joy, too. This week I talk about love, snow, and how to make homemade shave ice from the roof. (Wait...what?!) My guest is man-about-town Murray McNeil. Murray is a contract assistant with the state of Oregon and shares what has added brightness to his day and year. Additional information from today's show: - A performance of Seasons of Love from Rent is on YouTube.com. - At Home and Hummingbirds (Season 1, Episode 1) where you get podcasts. - The trailer for C'mon C'mon is on YouTube.com. - Find the trailer for The Queen's Gambit on YouTube.com. - ABBA's Voyage is out! Purchasing and streaming options at ABBA.Lnk.To/Voyage. - Lisa Hylton, ACC, can be reached: HyltonLisaB [at] gmail.com.
I #interview Tennille Griffith about her success as a professional makeup #artist, based in the #Caribbean. Additionally, we bring up the challenges she faces, living in an island that may not always provide the opportunities she seeks, but how she ultimately overcomes difficulties, thanks to the internet. @tresbellebytennille Lnk.Bio - Link in Bio Pond's Press On Spotify: rb.gy/n2knrd Pond's Press On Apple Podcast: rb.gy/cug5te
Blazin A Trail podcast welcomes Jacob Williams & Jason Gieselman to the podcast! Jason Gieselman is a co-owner at Ink Alley ScreenPrint + Design, UNL graduate, recent Fiance, a graphic designer, and mentor of mine for YATO. Jacob Williams is a co-owner at Ink Alley ScreenPrint + Design, UNL grad, marketer, another mentor for YATO, especially at the beginning. We spoke about their background and what led them to start a business after high school. They gave some advice to young adults who are about to graduate from college. We also spoke about the hardships that come with being an entrepreneur. We spoke about barriers they've faced while setting up their business, problems with naming the business, work-life balance, advice for young creatives, and about their daily lives! This was such an informative podcast! We had so much fun creating this and listening back. Make sure you listen to this episode all the way through and if you are sitting around, go to the link below and watch the whole episode and join us as we BLAZE A TRAIL!FOLLOW US ON INSTAGRAM:BLAZIN A TRAIL PODCAST: https://www.instagram.com/blazinatrailpodcast/K1NGTUT: https://www.instagram.com/k1ngtut11/Jacob Williams: https://www.instagram.com/jacoby_williams/Jason Gieselman: https://www.instagram.com/jas_gies/Ink Alley ScreenPrint + Design Instagram: https://www.instagram.com/inkalleyshirts/Ink Alley Website: http://inkalleyshirts.com/Jack Buchanan (Tech/Multimedia): https://www.instagram.com/buchanan_jack/Nelson King (Camera/Multimedia): https://www.instagram.com/nelsonkingphotography/YATO Clothing: www.yato.life/shop YATO Instagram: https://www.instagram.com/yatobrand/WATCH ALL EPISODES ON OUR YOUTUBE. PLEASE LIKE & SUB! https://www.youtube.com/channel/UCavktmcHRr67j1n4wSl8g2w/videos
Ashley is joined by Jamie London Wollberg talk about inclusivity within the cannabis community, particularly when it comes to trans issues. Ashley and Jamie stress the importance of voting for the changes you want to see. Bio: Humxn. Healer. Entrepreneur. Activist. As a New York to LA transplant, Jamie London Wollberg is a queer differently-able transgender man who live to fulfill his purpose of helping others cultivate unconditional self-love. He believes this is the key to an unconditional love around the world. He actualizes this through several businesses, predominantly in the cannabis wellness and lifestyle space to bring education from a unique medical patient perspective, as well as bridge the gap between the LGBTQAI+ and cannabis communities. Much of his time goes to offering his Trannabis Chi practice for healing, as well as cooking in the kitchen for his show The Trannabis Kitchen. Follow Jamie: Jamie On IG: https://www.instagram.com/trannabislifestyle/ Trannabis Chi on IG: https://www.instagram.com/trannabischi/ His website: Www.trannabischi.com Lnk.bio/Trannabis Lnk.bio/trannabischi To find more about Elevated Intimacy Podcast, visit www.ElevatedIntimacyPodcast.com or follow www.instagram.com/elevatedintimacy To keep up with Ashley, visit www.CannaSexual.com or her coaching website www.elevatedrelationship.com or follow her on IG www.instagram.com/cannasexual Special thanks to our sponsor, Sybian. DM Ashley for a special $100 off discount code for this magical device! If you have comments or ideas for future episodes, please send us a message on Instagram! Please like, subscribe, and review!
B Side (Brooke): The typical serial killer is a white male in his late 20's to early 30's. The Grim Sleeper, Lonnie David Franklin, was not your typical serial killer in many ways. He did fit the serial killer archetype and his victims did not fit the standard profile either (typically white females). His reign of terror stretched over several decades with a "sleep window" that spanned nearly two decades. Lonnie Franklin is one of the most prolific serial killers known (but apparently not wildly). A Side (Adam): In an effort to comfort himself during this second lockdown, Adam has been re-watching lots of old movies. One of those was a movie he's watched many times but hadn't thought about again until recently. Lnk.bio/asidebsidepodcast IG, FB, Website --- Support this podcast: https://anchor.fm/aside-bside/support