Used for user authentication to prove identity or access approval
POPULARITY
Categories
Un ataque está cambiando las direcciones de envío para bitcoin y cripto. Te explico de que se trata y cómo evitarloAnálisis del ataqueClases nuevas de la semana en: https://cursosbitcoin.comEstablecimiento de memoria post sincronizaciónd e la blockchain (Minibolt)Solución error de conexión I2P (Minibolt)
CyberArk's technology leader discusses their strategy for securing against AI threats, protecting agentic AI systems, and their vision for the future in an increasingly AI-driven cybersecurity landscape.Topics Include:CyberArk celebrates recent exciting news while discussing their incredible cybersecurity journeyFounded in 1999, CyberArk pioneered privilege access management and expanded into comprehensive identity securityCompany executed textbook SaaS transformation from perpetual licensing to subscription-based cloud modelLeadership set clear customer expectations, framing SaaS shift as faster innovation deliveryAddressed customer concerns about cost predictability, security compliance, and data residency requirementsTechnical team implemented lift-and-shift architecture with AWS RDS and multi-tenant improvementsCorporate initiative tracked weekly metrics and milestones throughout full development lifecycle processCustomer Success evolved from transactional support to strategic partnership embedded in security journeysAWS partnership fundamental to cloud journey with 25+ integrations and Marketplace collaborationAI strategy focuses on three pillars: using AI, securing against AI threatsFuture 12-24 months: continue securing all identities while expanding AI capabilities and solutionsAWS partnership expanding in 2025 leveraging machine identity leadership and GenAI advancesParticipants:Peretz Regev – Chief Product & Technology Officer, CyberArkBoaz Ziniman – Principal Developer Advocate - EMEA, Amazon Web ServicesFurther Links:· CyberArk: Website – LinkedIn – AWS MarketplaceSee how Amazon Web Services gives you the freedom to migrate, innovate, and scale your software company at https://aws.amazon.com/isv/
Thousands had data leaked in blood center ransomware attack UK Electoral Commission recovers, 3 years after China hack Npm packages with 2 billion weekly downloads targeted in supply chain attack Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines.
I remember working at a large organization with a team of other IT Operations staffers. We rotated this one job every month amongst a few people, each taking turns, where we'd lose a day to update all the privileged passwords for our servers. This was before Managed Service Accounts and the cloud, when we were required to change these every 30 days and then store the new ones in an encrypted store. What struck me when I got stuck with this wasn't the requirement to change every 30 days; that seemed normal. The thing that bothered me was how manual this was. As a former developer, I wrote some scripts to automated this, pre-PowerShell, and make the task easier on my fellow sys admins. I had scripts to generate a password, change it in AD, then print the pwd to be copied into our secure storage (no API there). This ran in a loop so I didn't lose a whole day to changing password. Read the rest of Password Guidance
Podemos llevar la descentralización más allá de bitcoin, en este episodio te hablo sobre el montaje de un servidor persona, sus usos, beneficios y riesgosClases nuevas de la semana en: https://cursosbitcoin.com* Instalación bitcoin core (Minibolt)* Configuración del bitcoin core, seguridad y privacidad
Etiquette, manners, and beyond! In this episode, Nick and Leah tackle using paper napkins in Italy, changing streaming service passwords on friends, hanging strangers your phone, and much more. Please follow us! (We'd send you a hand-written thank you note if we could.) Have a question for us? Call or text (267) CALL-RBW or visit ask.wyrbw.com EPISODE CONTENTS AMUSE-BOUCHE: Paper napkins in Italy A QUESTION OF ETIQUETTE: Being an AirBNB host QUESTIONS FROM THE WILDERNESS: Do I need to let an old acquaintance know that I've changed my streaming service password and their free access has ended? What's the polite way to get people to stop giving me books to read? VENT OR REPENT: Strangers giving you their phones, Taking too long to make coffee CORDIALS OF KINDNESS: Thanks to a neighbor, Thanks for doing your homework THINGS MENTIONED DURING THE SHOW Pasticceria Romolo in Salerno, Italy YOU ARE CORDIALLY INVITED TO... Support our show through Patreon Subscribe and rate us 5 stars on Apple Podcasts Call, text, or email us your questions Follow us on Instagram, Facebook, and Twitter Visit our official website Sign up for our newsletter Buy some fabulous official merchandise CREDITS Hosts: Nick Leighton & Leah Bonnema Producer & Editor: Nick Leighton Theme Music: Rob Paravonian ADVERTISE ON OUR SHOW Click here for details TRANSCRIPT Episode 278 Learn more about your ad choices. Visit megaphone.fm/adchoices
See omnystudio.com/listener for privacy information.
Maed in India is 10 YEARS OLD and this episode we are spinning back to 2019! This year was a medley of emotions: righteous anger, spontaneous joy, extreme chaos, much yearning, an urge to leave parties early to go to sleep – it was also the year before we knew how bad the world could get. In this episode, we celebrate songs that reminisce about the time (almost) everyone left the band, and spontaneously jammed about a long lost off-white sari with a gold zari border. 2019 was also made extra special by our very first Ladies Special, a now-annual tradition where we spotlight indie women on that oh-so-auspicious occasions of International Women's Day. The voice you hear at the top of this episode is, our very own Audio Engineer, Nihar Temkar, who goes back to being 10 and when his curious mind was fascinated by his grandfather’s cassette recorder, wondering, “how on earth does this little ribbon of tape hold music?” Song List: Sid Sriram - 2 am Prayer (04:50 - 09:01) MC Manmeet Kaur - Liberal Slavery (10:14 - 12:57) Aankh Micholi - Sacchai (13:32 - 18:48) The Fanculos - Can I Ask You A Rhetorical Question (19:24 - 24:23) Ladies Compartment & Friends - Conversation (25:24 - 33:19) Swadesi - Akhri Mauka (33:53 - 36:47) Abhilasha Sinha - After Party (38:06 - 42:13) Blackstratblues - [Random Improv At Sunset] (43:16 - 47:11) tig3rbabu - Maria (48:34 - 54:56) Voctronica - [Spontaneous Jam] (55:50 - 58:43) Kamakshi Khanna Collective - Breathe (59:47 - 01:05:31) aswekeepsearching - Rooh (01:08:18 - 01:12:41) Fame The Band - Over And Out (01:13:17 - 01:17:02) Come be our friend: Instagram @maedinindia Twitter @maedinindia CREDITS: Host: Mae Instagram: @maemariyam Twitter: @maebemaebe Producer: Shaun Fanthome and Meghna Gulati Sound Edited & Mastered by: Kartik Kulkarni Artwork: Alika Gupta
When I invited Or Eshed, CEO and co-founder of LayerX Security, onto Tech Talks Daily, I wanted to challenge a blind spot most teams carry into work each day. We talk about phishing, ransomware, and endpoint controls, yet we skip the place where employees actually live online. The browser. That quiet tab bar has become the front door to identities, payments, SaaS, and now AI. Or calls it a different operating system in its own right, and once you hear his examples of how extensions can intercept cookies, mimic logins, or even meddle with AI chats, the penny drops fast. Here's the thing. Blocking extensions across the board no longer fits how people work. Developers, marketers, sales teams, and support agents all lean on extensions for real productivity gains. Or's argument is simple. If the business depends on extensions, security has to meet people where they are with continuous, risk-based controls inside the browser itself. That means assessing code, permissions, ownership changes, and live behaviors, not relying on a static allow list that grows and grows while attackers slip through the cracks. We also unpack Extensionpedia, LayerX's free resource that lets anyone look up the risk profile of a specific extension. It is part education, part early warning system, and it serves a wider mission to raise the floor for everyone. Or shares how a technology alliance with Google has helped the team analyze extensions at serious scale, and why better data beats clever slogans in a space where signals change hour by hour. Malicious Extensions, AI Shortcuts, And The Culture Shift Security Needs One of the standout moments is a real-world story that starts at home and ends inside a corporate network. A spouse installs a screen-recording extension on a personal device, the browser profile syncs at work, and suddenly corporate credentials and sensitive sessions are mirrored to an untrusted machine. No shadowy APT needed. Just everyday sync doing exactly what it was designed to do. It is messy, human, and exactly why policy needs to be paired with continuous visibility in the browser. We explore the gray zone where productivity tools collide with privacy. Password managers, VPN helpers, and AI-everywhere extensions promise convenience, yet they can scrape data across SaaS apps or sync credentials in ways security leaders never intended. Or's advice is refreshingly pragmatic. Assume extensions are staying. Instrument the browser, score risk in real time, and adapt access based on what an extension actually does, not what it claims on a store page. Looking ahead, Or sees the browser taking an even bigger role as email, SaaS, and AI agents converge in one place. With AI companies building their own browsers, the last mile of user interaction gets denser, faster, and more valuable to protect. If 99 percent of enterprise users already run at least one extension, the task is clear. Know which ones are in play, understand how they behave, and keep policy dynamic. If this conversation sparks a rethink of your own approach, check your extensions in Extensionpedia, and then consider what modern, in-browser controls would look like in your environment. After this episode, you may never look at that tidy row of icons the same way again. ********* Visit the Sponsor of Tech Talks Network: Land your first job in tech in 6 months as a Software QA Engineering Bootcamp with Careerist https://crst.co/OGCLA
Common & Alec Lewis vs. Lil' B & Paul AllenSee omnystudio.com/listener for privacy information.
Common & Alec Lewis vs. Lil' B & Paul AllenSee omnystudio.com/listener for privacy information.
Examine the evolving landscape of digital trust and identity security with Jacob DePriest, VP of Security and CISO at 1Password. Drawing from his diverse experience at the NSA, GitHub, and 1Password, DePriest shares best practices for managing shadow AI, implementing confidential computing, and addressing the emerging challenges of agentic AI. He emphasizes the critical balance between enabling innovation and maintaining robust security measures in an AI-driven world. From securing credentials with advanced authentication to navigating the complexities of AI governance, this episode examines how to build trust and security in an era where AI is reshaping digital identity management.
Fake fact check: Not Every Picture Tells the Password by Radio Islam
The password sharing crackdown is on! Starting next month, free shipping will be restricted to household members only for Amazon Prime. So if you're using your parents account to ship to your house...you'll have to pay for shipping. Greg and Holly discuss the latest on the fight against password sharing for multiple companies.
Passkeys promise safer and easier logins to websites and apps. But if you're wondering what they are or how they work, you're not alone. WSJ contributor Sean Captain will explain. Plus, WSJ reporter Ann-Marie Alcántara will join us to get you up to speed on how tech companies are navigating the new age-verification rules. Julie Chang hosts. Sign up for the WSJ's free Technology newsletter. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
pdf-parser: All Streams Didier released a new version of pdf-parser.py. This version fixes a problem with dumping all filtered streams. https://isc.sans.edu/diary/pdf-parser%3A%20All%20Streams/32248 Salesloft Drift Putting OAuth Tokens at Risk OAuth tokens used by Salesloft Drift users to provide access to integrations with Salesforce, Google Workspace, and others have been compromised and heavily abused for additional compromise and large-scale data exfiltration from exposed services. https://cloud.google.com/blog/topics/threat-intelligence/data-theft-salesforce-instances-via-salesloft-drift Velociraptor incident response tool abused for remote access Attackers are using the open source incident response tool Velociraptor to access remote systems in breached networks. Tools like Velocitraptor are ideal for attackers to perform lateral movement. https://news.sophos.com/en-us/2025/08/26/velociraptor-incident-response-tool-abused-for-remote-access/ Default Password in NeuVector (Rancher Desktop) SuSE fixed a default password vulnerability in NeuVector, a security tool included in Rancher Desktop. https://github.com/neuvector/neuvector/security/advisories/GHSA-8pxw-9c75-6w56
Want to work in cybersecurity but don't know where to begin? Or just curious what it takes to break into the field? This week, we're joined by the internet's very own Heath Adams, better known as The Cyber Mentor. He demystifies the application process and what it takes to build a career in cybersecurity – no matter your background.
In the Season 2 premiere, we meet Bethany and Brian, a couple stuck in a painful cycle of conflict fueled by their attachment styles, Brian's anxious patterns and Bethany's avoidant retreat. This session lays the groundwork for the season as we explore how they each respond when triggered. We dive into a recent fight over a Wi-Fi password, which activated Brian's deep-seated trust issues. Then, we explore Bethany's experience of being cast as the "bad guy" and her pattern of rationalizing her actions to avoid Brian's reaction. The episode culminates in a powerful breakthrough as Brian steps into vulnerability for the first time, describing the feeling as putting on a "corny suit." Can putting on that suit be the first step toward changing their entire dynamic? We'd love to hear from you. Send your questions, comments, or your own stories via email or voice note to support@thesecurerelationship.com. Your submission might be featured on a future episode. This week's prompt is: How do you want to feel in conflict with your partner? Follow Julie Menanno on social media @thesecurerelationship. For weekly homework assignments visit our website: The Secure Relationship Podcast Attend a course or worshop hosted by Julie: Attachment Theory and Relationship Growth Courses Purchase Julie's book Secure Love: Create a Relationship That Lasts a Lifetime
Adam Sandler earns raves for his dramatic role in J. Kelly. Matt Rife goes all in on Billy Idol with a tribute tattoo and biopic dreams. Weird Al tops July's comedy tour earnings. Patton Oswalt bombs Millionaire and Star Trek. Plus: SNL exits, Jimmy Fallon's Password renewed, and Eric Idle critiques satire and royalty.Become a supporter of this podcast: https://www.spreaker.com/podcast/daily-comedy-news-with-johnny-mac--4522158/support.Become a premium subscriber! (no ads). For Apple users, hit the banner on your Apple podcasts app which says UNINTERRUPTED LISTENING and the bonus “DCN8” show.You also get 25+ other series (it's only $4.99 a month with a free-trial month)Contact John at john@thesharkdeck dot com Media Thoughts is mcdpod.substack.com dailycomedynews.substack.com DCN on Threads: https://www.threads.net/@dailycomedynews https://linktr.ee/dailycomedynews www.buymeacoffee.com/dailycomedynews
* Another round of the fortified roof lottery opens today. We get the details from Insurance Commissioner Tim Temple. * Bank On It, financial insights you can count on with Jason Shields, the COO of Gulf Coast Bank & Trust
Bank On It, financial insights you can count on with Jason Shields, the COO of Gulf Coast Bank & Trust. So many people reuse passwords for most - or even all - of their online accounts, and that can spell big trouble for you.
This show has been flagged as Explicit by the host. New hosts Welcome to our new host: Manon. Last Month's Shows Id Day Date Title Host 4435 Fri 2025-08-01 Philosophy, Cosmology, Physics, and just what is up with Hairy Larry's brain. hairylarry 4436 Mon 2025-08-04 HPR Community News for July 2025 HPR Volunteers 4437 Tue 2025-08-05 One Possible Definition of "Hacker" Antoine 4438 Wed 2025-08-06 doodoo zero Jezra 4439 Thu 2025-08-07 Rejecting a show ? Ken Fallon 4440 Fri 2025-08-08 The HOPE conference. murph 4441 Mon 2025-08-11 Voice Over IP Lee 4442 Tue 2025-08-12 Orthopedagogiek - what it is. Manon 4443 Wed 2025-08-13 The First Doctor, Part 3 Ahuka 4444 Thu 2025-08-14 Introduction into the E.R.P. application called Odoo Jeroen Baten 4445 Fri 2025-08-15 doodoo one Jezra 4446 Mon 2025-08-18 Calling on AI to resque HPR Trollercoaster 4447 Tue 2025-08-19 Interview with Margreet Pakkert at the Flevoland 2025 Field Work Archaeology Open Day. Ken Fallon 4448 Wed 2025-08-20 YouTube Subscriptions 2025 #4 Ahuka 4449 Thu 2025-08-21 How to install Odoo 18 on a virtual machine Jeroen Baten 4450 Fri 2025-08-22 Playing Civilization V, Part 2 Ahuka 4451 Mon 2025-08-25 Game Modding operat0r 4452 Tue 2025-08-26 Turn Coffee Into Code - Slogans from Tech(Companies, App, People) Antoine 4453 Wed 2025-08-27 IPv6 for Luddites beni 4454 Thu 2025-08-28 AI, It's a Trap! Archer72 4455 Fri 2025-08-29 YouTube Subscriptions 2025 #5 Ahuka Comments this month These are comments which have been made during the past month, either to shows released during the month or to past shows. There are 32 comments in total. Past shows There are 2 comments on 2 previous shows: hpr4377 (2025-05-13) "Password store and the pass command" by Klaatu. Comment 2: أحمد المحمودي on 2025-08-13: "Look at KeePass" hpr4429 (2025-07-24) "Handcrafting and Bartering discussion w. Elsbeth" by Elsbeth. Comment 1: Archer72 on 2025-08-04: "Good to hear a craftier" This month's shows There are 30 comments on 13 of this month's shows: hpr4435 (2025-08-01) "Philosophy, Cosmology, Physics, and just what is up with Hairy Larry's brain." by hairylarry. Comment 1: Bob Jonkman on 2025-08-11: "How could playing music fit HPR?"Comment 2: hairylarry on 2025-08-11: "Reply to Bob"Comment 3: paulj on 2025-08-14: "Great Show" hpr4437 (2025-08-05) "One Possible Definition of "Hacker"" by Antoine. Comment 1: Elsbeth on 2025-08-10: "Love this content"Comment 2: Antoine on 2025-08-11: ": )" hpr4438 (2025-08-06) "doodoo zero " by Jezra. Comment 1: Archer72 on 2025-08-04: "I was just thinking about this"Comment 2: jezra on 2025-08-23: "development happened faster than the show release cadence" hpr4439 (2025-08-07) "Rejecting a show ?" by Ken Fallon. Comment 1: Torin Doyle on 2025-08-09: "Please keep HPR a religion-free zone."Comment 2: Ken Fallon on 2025-08-10: "Respond on the mail list" hpr4440 (2025-08-08) "The HOPE conference." by murph. Comment 1: FXB on 2025-08-09: "HOPE Conference Talks" hpr4442 (2025-08-12) "Orthopedagogiek - what it is." by Manon. Comment 1: Archer72 on 2025-08-04: "Interesting approach"Comment 2: Dave Morriss on 2025-08-12: "I enjoyed this a lot"Comment 3: Antoine on 2025-08-13: "What a very specific field!" hpr4444 (2025-08-14) "Introduction into the E.R.P. application called Odoo" by Jeroen Baten. Comment 1: Archer72 on 2025-08-04: "My wife has a side business"Comment 2: Jason Lewis on 2025-08-14: "Migrating from NetSuite"Comment 3: Henrik Hemrin on 2025-08-20: "Odoo - new to me" hpr4445 (2025-08-15) "doodoo one" by Jezra. Comment 1: Reto on 2025-08-16: "I can follow your thoughts"Comment 2: jezra on 2025-08-23: "noted!" hpr4446 (2025-08-18) "Calling on AI to resque HPR" by Trollercoaster. Comment 1: candycanearter07 on 2025-08-18: "Interesting episode"Comment 2: trollercoaster on 2025-08-19: "I guess I didn't get my point over" hpr4447 (2025-08-19) "Interview with Margreet Pakkert at the Flevoland 2025 Field Work Archaeology Open Day." by Ken Fallon. Comment 1: Clinton Roy on 2025-08-20: "Pictures too!"Comment 2: Henrik Hemrin on 2025-08-20: "Interesting talk about this boat and archeology"Comment 3: Antoine on 2025-08-21: "That was sure a show!"Comment 4: jezra on 2025-08-26: "time to head to the woodshop!" hpr4449 (2025-08-21) "How to install Odoo 18 on a virtual machine" by Jeroen Baten. Comment 1: Archer72 on 2025-08-04: "Oodo in a vm" hpr4451 (2025-08-25) "Game Modding" by operat0r. Comment 1: candycanearter07 on 2025-08-25: ""moddable" games" hpr4453 (2025-08-27) "IPv6 for Luddites" by beni. Comment 1: Rho`n on 2025-08-27: "Great intro to IPv6"Comment 2: norrist on 2025-08-27: "Please post your talk"Comment 3: wheresalice on 2025-08-28: "IPv6 on HPR"Comment 4: Ken Fallon on 2025-08-29: "I opened a bug, you can help fix it." Mailing List discussions Policy decisions surrounding HPR are taken by the community as a whole. This discussion takes place on the Mailing List which is open to all HPR listeners and contributors. The discussions are open and available on the HPR server under Mailman. The threaded discussions this month can be found here: https://lists.hackerpublicradio.com/pipermail/hpr/2025-August/thread.html Events Calendar With the kind permission of LWN.net we are linking to The LWN.net Community Calendar. Quoting the site: This is the LWN.net community event calendar, where we track events of interest to people using and developing Linux and free software. Clicking on individual events will take you to the appropriate web page. Provide feedback on this episode.
(Romans 3:9-20)Today, we camp on these verses for a bit by talking more theological. What is the place of theology? What is Pelagianism? What is total depravity? We start to explore these concepts in today's conversation.We trust it would bless you!Don't forget to leave a rating and share it with a friend!Got any questions? Feel free to reach out to me (Daniel Babalola) on IG: @daniel.babz--------------------------------------------If you want to be a part of the ongoing live zoom teachings, we meet every Saturday at 9am CST:Zoom ID: 89834204951Password: epistles-------------------------------------------Benediction:I am a diligent student and doer of the word.I am a teacher of the word.The word is profitable for my growth.Call: By the wordRes: I am correctedCall: By the wordRes: I am trained in righteousnessCall: And in the wordRes: My spirit rejoices!
Common Man Progrum HOUR 2 --Lil B--Cove -- Gaardsy
Common Man Progrum HOUR 3 --PP--Dark Star --MGGSee omnystudio.com/listener for privacy information.
Common Man Progrum HOUR 3 --PP--Dark Star --MGG
Common Man Progrum HOUR 2 --Lil B--Cove -- GaardsySee omnystudio.com/listener for privacy information.
Common Man Progrum HOUR 3 --PP--Dark Star --MGGSee omnystudio.com/listener for privacy information.
Common Man Progrum HOUR 2 --Lil B--Cove -- GaardsySee omnystudio.com/listener for privacy information.
In this episode of Cybersecurity Today, host Jim Love delves into the latest cyber threats and risks. Key topics include the new phishing campaign Zipline that flips traditional tactics, Google's call for 2.5 billion Gmail users to reset passwords due to a phishing attack by Shiny Hunters, and the emergence of AI-driven ransomware like Prompt Lock. The episode also covers a hijack of the NX build platform leading to a sophisticated supply chain attack, and a whistleblower's claims that the Social Security Administration put personal data at risk by improperly handling sensitive information. Tune in to stay informed on these evolving cyber threats and defensive measures. 00:00 Introduction to Cybersecurity News 00:31 Zipline Phishing: A New Threat 02:14 Google Urges Password Resets 03:51 AI-Powered Ransomware: Prompt Lock 05:48 NX Supply Chain Attack 07:35 Social Security Data at Risk 09:20 Conclusion and Upcoming Shows
Mike Schur. Is. BACK. Mike and Jeremy chat about where things stand in MLB as we approach the final month of the regular season, but with the promotions of "Big Sugar" and "The Password," it's important they get to the best nicknames in the sport. And Jeremy and Chris square off in another hotly contested battle of Taylor's Trivia on 90s MVPs. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Google warned all 2.5 billion Gmail users about a password hack, ByteDance’s share buyback program values TikTok at over $330 billion, and Samsung's next Unpacked event is September 4th. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none of this would be possible. IfContinue reading "Google Issues A Warning To All Gmail Users Over Password Hack – DTH"
Password managers in 2025: Which ones are worth your trust? Dom Bettinelli, Fr. Andrew Kinstetter, and Pat Scott weigh pros and cons of top tools, debate AI replacing jobs, and unpack new laws reshaping social media. The post Best Password Managers in 2025 appeared first on StarQuest Media.
Alarm bells are ringing over a supposed browser zero-day, but is the threat as bad as it sounds? Steve reveals why "clickjacking" might be more whac-a-mole than breaking news, and what that really means for your passwords. • Germany may soon outlaw ad blockers • What's happening in the courts over AI • The U.K. drops its demands of Apple • New Microsoft 365 tenants being throttled • Is Russia preparing to block Google Meet? • Bluesky suspends its service in Mississippi • How to throttle AI • A tricky SSH-busting Go library • Here comes the Linux desktop malware • Apple just patched a doozy of a vulnerability • A trivial Docker escape was found and fixed • Why the recent browser 0-day clickjacking is really just whac-a-mole Show Notes - https://www.grc.com/sn/sn-1040-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow zscaler.com/security bigid.com/securitynow uscloud.com
Alarm bells are ringing over a supposed browser zero-day, but is the threat as bad as it sounds? Steve reveals why "clickjacking" might be more whac-a-mole than breaking news, and what that really means for your passwords. • Germany may soon outlaw ad blockers • What's happening in the courts over AI • The U.K. drops its demands of Apple • New Microsoft 365 tenants being throttled • Is Russia preparing to block Google Meet? • Bluesky suspends its service in Mississippi • How to throttle AI • A tricky SSH-busting Go library • Here comes the Linux desktop malware • Apple just patched a doozy of a vulnerability • A trivial Docker escape was found and fixed • Why the recent browser 0-day clickjacking is really just whac-a-mole Show Notes - https://www.grc.com/sn/sn-1040-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow zscaler.com/security bigid.com/securitynow uscloud.com
Alarm bells are ringing over a supposed browser zero-day, but is the threat as bad as it sounds? Steve reveals why "clickjacking" might be more whac-a-mole than breaking news, and what that really means for your passwords. • Germany may soon outlaw ad blockers • What's happening in the courts over AI • The U.K. drops its demands of Apple • New Microsoft 365 tenants being throttled • Is Russia preparing to block Google Meet? • Bluesky suspends its service in Mississippi • How to throttle AI • A tricky SSH-busting Go library • Here comes the Linux desktop malware • Apple just patched a doozy of a vulnerability • A trivial Docker escape was found and fixed • Why the recent browser 0-day clickjacking is really just whac-a-mole Show Notes - https://www.grc.com/sn/sn-1040-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow zscaler.com/security bigid.com/securitynow uscloud.com
Alarm bells are ringing over a supposed browser zero-day, but is the threat as bad as it sounds? Steve reveals why "clickjacking" might be more whac-a-mole than breaking news, and what that really means for your passwords. • Germany may soon outlaw ad blockers • What's happening in the courts over AI • The U.K. drops its demands of Apple • New Microsoft 365 tenants being throttled • Is Russia preparing to block Google Meet? • Bluesky suspends its service in Mississippi • How to throttle AI • A tricky SSH-busting Go library • Here comes the Linux desktop malware • Apple just patched a doozy of a vulnerability • A trivial Docker escape was found and fixed • Why the recent browser 0-day clickjacking is really just whac-a-mole Show Notes - https://www.grc.com/sn/sn-1040-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: 1password.com/securitynow zscaler.com/security bigid.com/securitynow uscloud.com
What password do you use to open up a device or an account? Reprogram your password to remind yourself of your one word focus.
See omnystudio.com/listener for privacy information.
The Boston Red Sox take 3 of 4 games from the New York Yankees in the Bronx, as the Yanks prove once again that they are not a good baseball team. Joey Copponi and Scott Neville discuss the biggest moments of the series, The Password's promotion to the major leagues, thank Abraham Toro for his service, and look ahead to the upcoming series with the Baltimore Orioles. All that, and much more!
On Hands-On Tech, Mikah helps out viewer Jim with selecting a new password manager. Send in your questions for Mikah to answer on the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah helps out viewer Jim with selecting a new password manager. Send in your questions for Mikah to answer on the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
On Hands-On Tech, Mikah helps out viewer Jim with selecting a new password manager. Send in your questions for Mikah to answer on the show! hot@twit.tv Host: Mikah Sargent Download or subscribe to Hands-On Tech at https://twit.tv/shows/hands-on-tech Want access to the ad-free video and exclusive features? Become a member of Club TWiT today! https://twit.tv/clubtwit Club TWiT members can discuss this episode and leave feedback in the Club TWiT Discord.
Nick Kurtz continues to look like a stud (3:36). ... Roman Anthony hit a majestic home run in Yankee Stadium (9:58). ... The Rays promoted Carson Williams and the Red Sox promoted The Password (15:38). ... News (23:10): Austin Riley had season-ending surgery. ... Brenton Doyle is having a big second half (28:28). ... Any interest in these deep-league pitchers (31:01)? ... Is Shota Imanaga back (35:23)? ... Start, sit or drop these pitchers (38:35)? ... Let's preview Week 23, with an eye on two-start pitchers and sleeper hitters (51:01). ... We wrap up with leftovers, bullpens and streamers (58:00). Fantasy Baseball Today is available for free on the Audacy app as well as Apple Podcasts, Spotify and wherever else you listen to podcasts. Subscribe to our YouTube channel: youtube.com/FantasyBaseballToday Download and Follow Fantasy Baseball Today on Spotify: https://sptfy.com/QiKv Get awesome Fantasy Baseball Today merch here: http://bit.ly/3y8dUqi Follow FBT on TikTok: https://www.tiktok.com/@fbtpod?_t=8WyMkPdKOJ1&_r=1 Follow our FBT team on Twitter: @FBTPod, @CPTowers @CBSScottWhite, @Roto_Frank Join our Facebook group at https://www.facebook.com/groups/fantasybaseballtoday Sign up for the FBT Newsletter at https://www.cbssports.com/newsletters/fantasy-baseball-today/ For more fantasy baseball coverage from CBS Sports, visit https://www.cbssports.com/fantasy/baseball/ To hear more from the CBS Sports Podcast Network, visit https://www.cbssports.com/podcasts/ You can listen to Fantasy Baseball Today on your smart speakers! Simply say "Alexa, play the latest episode of the Fantasy Baseball Today podcast" or "Hey Google, play the latest episode of the Fantasy Baseball Today podcast." To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
On Friday's, August 22, Daily Puck Drop, Jason “Puck” Puckett is joinedby Jim Moore, the Go-2-Guy, Chris Egan from KING 5 and “The Scout”, Puck's anonymous MLB scout. Puck and Jim start off the show taking about Egan's trip to Louisville which leads them to Muhammed Ali and a random obscure boxer from Renton, Boone Kirkman. Egan joins the fun and they go down the wikipedia of Kirkman and discover he once owned a great restaurant in Renton that they have all frequented. They also discuss a run in with Pat Chun Egan's visit to Kentucky to send off his son to play baseball, a throwback video from Eric Johnson of KOMO news on a young standout basketball player, parenting in today's day and age. “In Other News…” Covers a big contract given out by the Orioles for an unproven catcher, the Red Sox are calling up the “Password”, pregnancy robots from China and good news to share on two great people, Todd Milles, formerly of the Tacoma News-Tribune and Ian Furness. Puck wraps up the show with “Hey, What the Puck!?” Mike Macdonald is playing with fire with joint practices (1:00) Puck and Jim (9:46) Chris Egan, KING 5 (51:21) “In Other News…” (1:01:20) “The Scout” (1:13:00) Puck's Posse Show Wrap-Up (1:17:42) “Hey, What the Puck!?”
Take 10 with Tim – August 22, 2025 @ 9:30 am – 60 minutesMicrosoft Teams:1.Let's review the standingsa.American Leagueb.National League2.Wilyer Abreu hits the IL and the Red Sox are calling up Jhostynxon Garcia, 'the Password.' There's some chase in his approach but big power ,potential. Are you interested?3.The September callups continue – remember, after 8/15, they will, likely retain rookie eligibility. Here's a list – Who are you bidding on? Rank these guys in who you want the rest of the season.a.Bubba Chandler (RHP, Pit) – Reportedly coming in to pitch in relief (bummer)b.Parker Messick (LHP, Cle) – Looked good in his debut on Wednesdayc.Carson Williams (SS, TB) – Scary strikeout rate (34%) but speed and power (23 HR, 22 SB)d.Maximo Acosta (IF, Mia) – He's 1 for 10, but the hit was a home run.4.Rank these players that came up in the last couple of weeks of who you want to roster for the rest of the seasona.Owen Caissie (OF, CHC) – Already has a home run.b.Samuel Basallo (C/1B, Bal) – He's 3 for 10 in three games with some long outsc.Dylan Beavers (OF, Bal) – Hasn't done much in four gamesd.Jakob Marsee (OF, Mia) – He ranks 3rd over the two weeks in outfield rankings. Just in front of the has-beens, Corbin Carroll and Juan Soto.5.In researching the question above, I noticed that Brenton Doyle has been hot of late. In the last two weeks, he's hit .372 with four home runs and two stolen bases.a.Too little, too late? Or, will you take it?b.What about next season? He's a __________ outfielder for you.6.Speaking of next season, which hitter or two are you hoping performs poorly over the last six weeks so they might be cheaper at the draft table?7.What pitcher?8.Shohei Ohtani has not looked good on the mound this season. Does he stay a two-way player?9.What one hitter are you targeting for this weekend's FAAB?10.What one pitcher are you targeting for this weekend's FAAB?
Marney and Lil B vs Common and Maxx
Marney and Lil B vs Common and MaxxSee omnystudio.com/listener for privacy information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Airtel Router Scans and Mislabeled Usernames A quick summary of some odd usernames that show up in our honeypot logs https://isc.sans.edu/diary/Airtel%20Router%20Scans%2C%20and%20Mislabeled%20usernames/32216 Apple Patches 0-Day CVE-2025-43300 Apple released an update for iOS, iPadOS and MacOS today patching a single, already exploited, vulnerability in ImageIO. https://support.apple.com/en-us/124925 Microsoft Copilot Audit Logs A user retrieving data via copilot obscures the fact that the user may have had access to data in a specific file https://pistachioapp.com/blog/copilot-broke-your-audit-log Password Managers Susceptible to Clickjacking Many password managers are susceptible to clickjacking, and only few have fixed the problem so far https://marektoth.com/blog/dom-based-extension-clickjacking/