Podcasts about secure boot

Copy protection enforced by hardware

  • 103PODCASTS
  • 157EPISODES
  • 57mAVG DURATION
  • 1WEEKLY EPISODE
  • Oct 16, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about secure boot

Latest podcast episodes about secure boot

Paul's Security Weekly
AI, EDR, and Hacking Things - PSW #896

Paul's Security Weekly

Play Episode Listen Later Oct 16, 2025 124:54


First up is a technical segment on UEFI shells: determining if they contain dangerous functionality that allows attackers to bypass Secure Boot. Then in the security news: Your vulnerability scanner is your weakest link Scams that almost got me The state of EDR is not good You don't need to do that on a phone or Raspberry PI Hash cracking and exploits Revisiting LG WebOS Hardening Docker images Hacking Moxa NPort Shoddy academic research The original sin of computing Bodycam hacking A new OS for ESP32 The AI bubble is going to burt Mobile VPNs are not always secure Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-896

Technology Tap
A+ Fundamentals: Boot to Brains Chapter 4

Technology Tap

Play Episode Listen Later Oct 7, 2025 24:14 Transcription Available


professorjrod@gmail.comA dead PC at the worst moment is a gut punch—unless you have a roadmap. We walk through the exact thinking that turns “no lights, no fans, no display” into a calm, step‑by‑step recovery, starting where every system truly begins: firmware. BIOS and UEFI aren't trivia; they decide how your machine discovers drives, validates bootloaders, and applies security like Secure Boot and TPM. That's why a simple post‑update check of boot order, storage mode, and firmware toggles can rescue a lab full of “no boot device” errors in minutes.From there, we get brutally honest about power. PSUs age, rails sag, and idle tests lie. You'll learn the outside‑in “power ladder,” why a line‑interactive UPS prevents ghost errors, and how unstable XMP profiles masquerade as OS problems. We demystify boot and drive failures—wrong boot entries, NVMe lane conflicts, cloning driver mismatches—and show how SMART data, free space, cooling, and firmware updates revive sluggish SSDs. Then we cut through RAID mythology: 0 for speed, 1 for uptime, 5 for read‑heavy with risk, 6 for double‑parity safety, and 10 for fast resilience. And we repeat the rule that saves careers: RAID is not backup. Verify restores, keep copies offsite or offline, and schedule tests before disaster strikes.Video issues get the practical treatment too. No display? Check inputs and connect to the discrete GPU, not the motherboard. Blurry or artifacting under load? Validate refresh rates, cables, thermals, and PSU capacity. We close with a field checklist and a case study where a quality PSU upgrade stabilized 3D renders instantly—proof that systems thinking beats screen-chasing every time. If you want a technician's mindset—evidence over assumptions, one variable at a time—this guide will sharpen your process and speed your fixes.If this helped you think like a tech, follow the show, share it with a teammate who's on call this week, and leave a quick review so more builders and troubleshooters can find it.Support the showIf you want to help me with my research please e-mail me.Professorjrod@gmail.comIf you want to join my question/answer zoom class e-mail me at Professorjrod@gmail.comArt By Sarah/DesmondMusic by Joakim KarudLittle chacha ProductionsJuan Rodriguez can be reached atTikTok @ProfessorJrodProfessorJRod@gmail.com@Prof_JRodInstagram ProfessorJRod

BSD Now
631: Endorphin Rush

BSD Now

Play Episode Listen Later Sep 25, 2025 36:53


Secure Boot for FreeBSD, Systems lie about their proper functioning, Teching the tech and rushing the endorphins, Passing a Device Into A FreeBSD Jail With A Stable Name, ZFS snapshots aren't as immutable as I thought, due to snapshot metadata, Let's write a peephole optimizer for QBE's arm64 backend, Migrate a Peertube instance from Debian to FreeBSD, and more NOTES This episode of BSDNow is brought to you by Tarsnap (https://www.tarsnap.com/bsdnow) and the BSDNow Patreon (https://www.patreon.com/bsdnow) Headlines Secure Boot for FreeBSD (https://forums.FreeBSD.org/threads/how-to-set-up-secure-boot-for-freebsd.99169/) The Fundamental Failure-Mode Theorem: Systems lie about their proper functioning (https://devblogs.microsoft.com/oldnewthing/20250716-00/?p=111383) News Roundup Teching the tech and rushing the endorphins (https://vulcanridr.mataroa.blog/blog/teching-the-tech-and-rushing-the-endorphins) Passing a Device Into A FreeBSD Jail With A Stable Name (https://blog.feld.me/posts/2025/09/passing-device-freebsd-jail-with-stable-name/) ZFS snapshots aren't as immutable as I thought, due to snapshot metadata (https://utcc.utoronto.ca/~cks/space/blog/solaris/ZFSSnapshotsNotFullyImmutable) Let's write a peephole optimizer for QBE's arm64 backend (https://briancallahan.net/blog/20250901.html) Migrate a Peertube instance from Debian to FreeBSD (https://www.tumfatig.net/2025/migrate-a-peertube-instance-from-debian-to-freebsd) Tarsnap This weeks episode of BSDNow was sponsored by our friends at Tarsnap, the only secure online backup you can trust your data to. Even paranoids need backups. Feedback/Questions -Steve - Interviews (https://github.com/BSDNow/bsdnow.tv/blob/master/631/feedback/Steve%20-%20Interviews.md) Send questions, comments, show ideas/topics, or stories you want mentioned on the show to feedback@bsdnow.tv (mailto:feedback@bsdnow.tv) Join us and other BSD Fans in our BSD Now Telegram channel (https://t.me/bsdnow)

Les Cast Codeurs Podcast
LCC 330 - Nano banana l'AI de Julia

Les Cast Codeurs Podcast

Play Episode Listen Later Sep 15, 2025 108:38


Katia, Emmanuel et Guillaume discutent Java, Kotlin, Quarkus, Hibernate, Spring Boot 4, intelligence artificielle (modèles Nano Banana, VO3, frameworks agentiques, embedding). On discute les vulnerabilités OWASP pour les LLMs, les personalités de codage des différents modèles, Podman vs Docker, comment moderniser des projets legacy. Mais surtout on a passé du temps sur les présentations de Luc Julia et les différents contre points qui ont fait le buzz sur les réseaux. Enregistré le 12 septembre 2025 Téléchargement de l'épisode LesCastCodeurs-Episode-330.mp3 ou en vidéo sur YouTube. News Langages Dans cette vidéo, José détaille les nouveautés de Java entre Java 21 et 25 https://inside.java/2025/08/31/roadto25-java-language/ Aperçu des nouveautés du JDK 25 : Introduction des nouvelles fonctionnalités du langage Java et des changements à venir [00:02]. Programmation orientée données et Pattern Matching [00:43] : Évolution du “pattern matching” pour la déconstruction des “records” [01:22]. Utilisation des “sealed types” dans les expressions switch pour améliorer la lisibilité et la robustesse du code [01:47]. Introduction des “unnamed patterns” (_) pour indiquer qu'une variable n'est pas utilisée [04:47]. Support des types primitifs dans instanceof et switch (en preview) [14:02]. Conception d'applications Java [00:52] : Simplification de la méthode main [21:31]. Exécution directe des fichiers .java sans compilation explicite [22:46]. Amélioration des mécanismes d'importation [23:41]. Utilisation de la syntaxe Markdown dans la Javadoc [27:46]. Immuabilité et valeurs nulles [01:08] : Problème d'observation de champs final à null pendant la construction d'un objet [28:44]. JEP 513 pour contrôler l'appel à super() et restreindre l'usage de this dans les constructeurs [33:29]. JDK 25 sort le 16 septembre https://openjdk.org/projects/jdk/25/ Scoped Values (JEP 505) - alternative plus efficace aux ThreadLocal pour partager des données immutables entre threads Structured Concurrency (JEP 506) - traiter des groupes de tâches concurrentes comme une seule unité de travail, simplifiant la gestion des threads Compact Object Headers (JEP 519) - Fonctionnalité finale qui réduit de 50% la taille des en-têtes d'objets (de 128 à 64 bits), économisant jusqu'à 22% de mémoire heap Flexible Constructor Bodies (JEP 513) - Relaxation des restrictions sur les constructeurs, permettant du code avant l'appel super() ou this() Module Import Declarations (JEP 511) - Import simplifié permettant d'importer tous les éléments publics d'un module en une seule déclaration Compact Source Files (JEP 512) - Simplification des programmes Java basiques avec des méthodes main d'instance sans classe wrapper obligatoire Primitive Types in Patterns (JEP 455) - Troisième preview étendant le pattern matching et instanceof aux types primitifs dans switch et instanceof Generational Shenandoah (JEP 521) - Le garbage collector Shenandoah passe en mode générationnel pour de meilleures performances JFR Method Timing & Tracing (JEP 520) - Nouvel outillage de profilage pour mesurer le temps d'exécution et tracer les appels de méthodes Key Derivation API (JEP 510) - API finale pour les fonctions de dérivation de clés cryptographiques, remplaçant les implémentations tierces Améliorations du traitement des annotations dans Kotlin 2.2 https://blog.jetbrains.com/idea/2025/09/improved-annotation-handling-in-kotlin-2-2-less-boilerplate-fewer-surprises/ Avant Kotlin 2.2, les annotations sur les paramètres de constructeur n'étaient appliquées qu'au paramètre, pas à la propriété ou au champ Cela causait des bugs subtils avec Spring et JPA où la validation ne fonctionnait qu'à la création d'objet, pas lors des mises à jour La solution précédente nécessitait d'utiliser explicitement @field: pour chaque annotation, créant du code verbeux Kotlin 2.2 introduit un nouveau comportement par défaut qui applique les annotations aux paramètres ET aux propriétés/champs automatiquement Le code devient plus propre sans avoir besoin de syntaxe @field: répétitive Pour l'activer, ajouter -Xannotation-default-target=param-property dans les options du compilateur Gradle IntelliJ IDEA propose un quick-fix pour activer ce comportement à l'échelle du projet Cette amélioration rend l'intégration Kotlin plus fluide avec les frameworks majeurs comme Spring et JPA Le comportement peut être configuré pour garder l'ancien mode ou activer un mode transitoire avec avertissements Cette mise à jour fait partie d'une initiative plus large pour améliorer l'expérience Kotlin + Spring Librairies Sortie de Quarkus 3.26 avec mises à jour d'Hibernate et autres fonctionnalités - https://quarkus.io/blog/quarkus-3-26-released/ mettez à jour vers la 3.26.x car il y a eu une regression vert.x Jalon important vers la version LTS 3.27 prévue fin septembre, basée sur cette version Mise à jour vers Hibernate ORM 7.1, Hibernate Search 8.1 et Hibernate Reactive 3.1 Support des unités de persistance nommées et sources de données dans Hibernate Reactive Démarrage hors ligne et configuration de dialecte pour Hibernate ORM même si la base n'est pas accessible Refonte de la console HQL dans Dev UI avec fonctionnalité Hibernate Assistant intégrée Exposition des capacités Dev UI comme fonctions MCP pour pilotage via outils IA Rafraîchissement automatique des tokens OIDC en cas de réponse 401 des clients REST Extension JFR pour capturer les données runtime (nom app, version, extensions actives) Bump de Gradle vers la version 9.0 par défaut, suppression du support des classes config legacy Guide de démarrage avec Quarkus et A2A Java SDK 0.3.0 (pour faire discuter des agents IA avec la dernière version du protocole A2A) https://quarkus.io/blog/quarkus-a2a-java-0-3-0-alpha-release/ Sortie de l'A2A Java SDK 0.3.0.Alpha1, aligné avec la spécification A2A v0.3.0. Protocole A2A : standard ouvert (Linux Foundation), permet la communication inter-agents IA polyglottes. Version 0.3.0 plus stable, introduit le support gRPC. Mises à jour générales : changements significatifs, expérience utilisateur améliorée (côté client et serveur). Agents serveur A2A : Support gRPC ajouté (en plus de JSON-RPC). HTTP+JSON/REST à venir. Implémentations basées sur Quarkus (alternatives Jakarta existent). Dépendances spécifiques pour chaque transport (ex: a2a-java-sdk-reference-jsonrpc, a2a-java-sdk-reference-grpc). AgentCard : décrit les capacités de l'agent. Doit spécifier le point d'accès primaire et tous les transports supportés (additionalInterfaces). Clients A2A : Dépendance principale : a2a-java-sdk-client. Support gRPC ajouté (en plus de JSON-RPC). HTTP+JSON/REST à venir. Dépendance spécifique pour gRPC : a2a-java-sdk-client-transport-grpc. Création de client : via ClientBuilder. Sélectionne automatiquement le transport selon l'AgentCard et la configuration client. Permet de spécifier les transports supportés par le client (withTransport). Comment générer et éditer des images en Java avec Nano Banana, le “photoshop killer” de Google https://glaforge.dev/posts/2025/09/09/calling-nano-banana-from-java/ Objectif : Intégrer le modèle Nano Banana (Gemini 2.5 Flash Image preview) dans des applications Java. SDK utilisé : GenAI Java SDK de Google. Compatibilité : Supporté par ADK for Java ; pas encore par LangChain4j (limitation de multimodalité de sortie). Capacités de Nano Banana : Créer de nouvelles images. Modifier des images existantes. Assembler plusieurs images. Mise en œuvre Java : Quelle dépendance utiliser Comment s'authentifier Comment configurer le modèle Nature du modèle : Nano Banana est un modèle de chat qui peut retourner du texte et une image (pas simplement juste un modèle générateur d'image) Exemples d'utilisation : Création : Via un simple prompt textuel. Modification : En passant l'image existante (tableau de bytes) et les instructions de modification (prompt). Assemblage : En passant plusieurs images (en bytes) et les instructions d'intégration (prompt). Message clé : Toutes ces fonctionnalités sont accessibles en Java, sans nécessiter Python. Générer des vidéos IA avec le modèle Veo 3, mais en Java ! https://glaforge.dev/posts/2025/09/10/generating-videos-in-java-with-veo3/ Génération de vidéos en Java avec Veo 3 (via le GenAI Java SDK de Google). Veo 3: Annoncé comme GA, prix réduits, support du format 9:16, résolution jusqu'à 1080p. Création de vidéos : À partir d'une invite textuelle (prompt). À partir d'une image existante. Deux versions différentes du modèle : veo-3.0-generate-001 (qualité supérieure, plus coûteux, plus lent). veo-3.0-fast-generate-001 (qualité inférieure, moins coûteux, mais plus rapide). Rod Johnson sur ecrire des aplication agentic en Java plus facilement qu'en python avec Embabel https://medium.com/@springrod/you-can-build-better-ai-agents-in-java-than-python-868eaf008493 Rod the papa de Spring réécrit un exemple CrewAI (Python) qui génère un livre en utilisant Embabel (Java) pour démontrer la supériorité de Java L'application utilise plusieurs agents AI spécialisés : un chercheur, un planificateur de livre et des rédacteurs de chapitres Le processus suit trois étapes : recherche du sujet, création du plan, rédaction parallèle des chapitres puis assemblage CrewAI souffre de plusieurs problèmes : configuration lourde, manque de type safety, utilisation de clés magiques dans les prompts La version Embabel nécessite moins de code Java que l'original Python et moins de fichiers de configuration YAML Embabel apporte la type safety complète, éliminant les erreurs de frappe dans les prompts et améliorant l'outillage IDE La gestion de la concurrence est mieux contrôlée en Java pour éviter les limites de débit des APIs LLM L'intégration avec Spring permet une configuration externe simple des modèles LLM et hyperparamètres Le planificateur Embabel détermine automatiquement l'ordre d'exécution des actions basé sur leurs types requis L'argument principal : l'écosystème JVM offre un meilleur modèle de programmation et accès à la logique métier existante que Python Il y a pas mal de nouveaux framework agentic en Java, notamment le dernier LAngchain4j Agentic Spring lance un serie de blog posts sur les nouveautés de Spring Boot 4 https://spring.io/blog/2025/09/02/road_to_ga_introduction baseline JDK 17 mais rebase sur Jakarta 11 Kotlin 2, Jackson 3 et JUnit 6 Fonctionnalités de résilience principales de Spring : @ConcurrencyLimit, @Retryable, RetryTemplate Versioning d'API dans Spring Améliorations du client de service HTTP L'état des clients HTTP dans Spring Introduction du support Jackson 3 dans Spring Consommateur partagé - les queues Kafka dans Spring Kafka Modularisation de Spring Boot Autorisation progressive dans Spring Security Spring gRPC - un nouveau module Spring Boot Applications null-safe avec Spring Boot 4 OpenTelemetry avec Spring Boot Repos Ahead of Time (Partie 2) Web Faire de la recherche sémantique directement dans le navigateur en local, avec EmbeddingGemma et Transformers.js https://glaforge.dev/posts/2025/09/08/in-browser-semantic-search-with-embeddinggemma/ EmbeddingGemma: Nouveau modèle d'embedding (308M paramètres) de Google DeepMind. Objectif: Permettre la recherche sémantique directement dans le navigateur. Avantages clés de l'IA côté client: Confidentialité: Aucune donnée envoyée à un serveur. Coûts réduits: Pas besoin de serveurs coûteux (GPU), hébergement statique. Faible latence: Traitement instantané sans allers-retours réseau. Fonctionnement hors ligne: Possible après le chargement initial du modèle. Technologie principale: Modèle: EmbeddingGemma (petit, performant, multilingue, support MRL pour réduire la taille des vecteurs). Moteur d'inférence: Transformers.js de HuggingFace (exécute les modèles AI en JavaScript dans le navigateur). Déploiement: Site statique avec Vite/React/Tailwind CSS, déployé sur Firebase Hosting via GitHub Actions. Gestion du modèle: Fichiers du modèle trop lourds pour Git; téléchargés depuis HuggingFace Hub pendant le CI/CD. Fonctionnement de l'app: Charge le modèle, génère des embeddings pour requêtes/documents, calcule la similarité sémantique. Conclusion: Démonstration d'une recherche sémantique privée, économique et sans serveur, soulignant le potentiel de l'IA embarquée dans le navigateur. Data et Intelligence Artificielle Docker lance Cagent, une sorte de framework multi-agent IA utilisant des LLMs externes, des modèles de Docker Model Runner, avec le Docker MCP Tookit. Il propose un format YAML pour décrire les agents d'un système multi-agents. https://github.com/docker/cagent des agents “prompt driven” (pas de code) et une structure pour decrire comment ils sont deployés pas clair comment ils sont appelés a part dans la ligne de commande de cagent fait par david gageot L'owasp décrit l'independance excessive des LLM comme une vulnerabilité https://genai.owasp.org/llmrisk2023-24/llm08-excessive-agency/ L'agence excessive désigne la vulnérabilité qui permet aux systèmes LLM d'effectuer des actions dommageables via des sorties inattendues ou ambiguës. Elle résulte de trois causes principales : fonctionnalités excessives, permissions excessives ou autonomie excessive des agents LLM. Les fonctionnalités excessives incluent l'accès à des plugins qui offrent plus de capacités que nécessaire, comme un plugin de lecture qui peut aussi modifier ou supprimer. Les permissions excessives se manifestent quand un plugin accède aux systèmes avec des droits trop élevés, par exemple un accès en lecture qui inclut aussi l'écriture. L'autonomie excessive survient quand le système effectue des actions critiques sans validation humaine préalable. Un scénario d'attaque typique : un assistant personnel avec accès email peut être manipulé par injection de prompt pour envoyer du spam via la boîte de l'utilisateur. La prévention implique de limiter strictement les plugins aux fonctions minimales nécessaires pour l'opération prévue. Il faut éviter les fonctions ouvertes comme “exécuter une commande shell” au profit d'outils plus granulaires et spécifiques. L'application du principe de moindre privilège est cruciale : chaque plugin doit avoir uniquement les permissions minimales requises. Le contrôle humain dans la boucle reste essentiel pour valider les actions à fort impact avant leur exécution. Lancement du MCP registry, une sorte de méta-annuaire officiel pour référencer les serveurs MCP https://www.marktechpost.com/2025/09/09/mcp-team-launches-the-preview-version-of-the-mcp-registry-a-federated-discovery-layer-for-enterprise-ai/ MCP Registry : Couche de découverte fédérée pour l'IA d'entreprise. Fonctionne comme le DNS pour le contexte de l'IA, permettant la découverte de serveurs MCP publics ou privés. Modèle fédéré : Évite les risques de sécurité et de conformité d'un registre monolithique. Permet des sous-registres privés tout en conservant une source de vérité “upstream”. Avantages entreprises : Découverte interne sécurisée. Gouvernance centralisée des serveurs externes. Réduction de la prolifération des contextes. Support pour les agents IA hybrides (données privées/publiques). Projet open source, actuellement en version preview. Blog post officiel : https://blog.modelcontextprotocol.io/posts/2025-09-08-mcp-registry-preview/ Exploration des internals du transaction log SQL Server https://debezium.io/blog/2025/09/08/sqlserver-tx-log/ C'est un article pour les rugeux qui veulent savoir comment SQLServer marche à l'interieur Debezium utilise actuellement les change tables de SQL Server CDC en polling périodique L'article explore la possibilité de parser directement le transaction log pour améliorer les performances Le transaction log est divisé en Virtual Log Files (VLFs) utilisés de manière circulaire Chaque VLF contient des blocs (512B à 60KB) qui contiennent les records de transactions Chaque record a un Log Sequence Number (LSN) unique pour l'identifier précisément Les données sont stockées dans des pages de 8KB avec header de 96 bytes et offset array Les tables sont organisées en partitions et allocation units pour gérer l'espace disque L'utilitaire DBCC permet d'explorer la structure interne des pages et leur contenu Cette compréhension pose les bases pour parser programmatiquement le transaction log dans un prochain article Outillage Les personalités des codeurs des différents LLMs https://www.sonarsource.com/blog/the-coding-personalities-of-leading-llms-gpt-5-update/ GPT-5 minimal ne détrône pas Claude Sonnet 4 comme leader en performance fonctionnelle malgré ses 75% de réussite GPT-5 génère un code extrêmement verbeux avec 490 000 lignes contre 370 000 pour Claude Sonnet 4 sur les mêmes tâches La complexité cyclomatique et cognitive du code GPT-5 est dramatiquement plus élevée que tous les autres modèles GPT-5 introduit 3,90 problèmes par tâche réussie contre seulement 2,11 pour Claude Sonnet 4 Point fort de GPT-5 : sécurité exceptionnelle avec seulement 0,12 vulnérabilité par 1000 lignes de code Faiblesse majeure : densité très élevée de “code smells” (25,28 par 1000 lignes) nuisant à la maintenabilité GPT-5 produit 12% de problèmes liés à la complexité cognitive, le taux le plus élevé de tous les modèles Tendance aux erreurs logiques fondamentales avec 24% de bugs de type “Control-flow mistake” Réapparition de vulnérabilités classiques comme les failles d'injection et de traversée de chemin Nécessité d'une gouvernance renforcée avec analyse statique obligatoire pour gérer la complexité du code généré Pourquoi j'ai abandonné Docker pour Podman https://codesmash.dev/why-i-ditched-docker-for-podman-and-you-should-too Problème Docker : Le daemon dockerd persistant s'exécute avec des privilèges root, posant des risques de sécurité (nombreuses CVEs citées) et consommant des ressources inutilement. Solution Podman : Sans Daemon : Pas de processus d'arrière-plan persistant. Les conteneurs s'exécutent comme des processus enfants de la commande Podman, sous les privilèges de l'utilisateur. Sécurité Renforcée : Réduction de la surface d'attaque. Une évasion de conteneur compromet un utilisateur non privilégié sur l'hôte, pas le système entier. Mode rootless. Fiabilité Accrue : Pas de point de défaillance unique ; le crash d'un conteneur n'affecte pas les autres. Moins de Ressources : Pas de daemon constamment actif, donc moins de mémoire et de CPU. Fonctionnalités Clés de Podman : Intégration Systemd : Génération automatique de fichiers d'unité systemd pour gérer les conteneurs comme des services Linux standards. Alignement Kubernetes : Support natif des pods et capacité à générer des fichiers Kubernetes YAML directement (podman generate kube), facilitant le développement local pour K8s. Philosophie Unix : Se concentre sur l'exécution des conteneurs, délègue les tâches spécialisées à des outils dédiés (ex: Buildah pour la construction d'images, Skopeo pour leur gestion). Migration Facile : CLI compatible Docker : podman utilise les mêmes commandes que docker (alias docker=podman fonctionne). Les Dockerfiles existants sont directement utilisables. Améliorations incluses : Sécurité par défaut (ports privilégiés en mode rootless), meilleure gestion des permissions de volume, API Docker compatible optionnelle. Option de convertir Docker Compose en Kubernetes YAML. Bénéfices en Production : Sécurité améliorée, utilisation plus propre des ressources. Podman représente une évolution plus sécurisée et mieux alignée avec les pratiques modernes de gestion Linux et de déploiement de conteneurs. Guide Pratique (Exemple FastAPI) : Le Dockerfile ne change pas. podman build et podman run remplacent directement les commandes Docker. Déploiement en production via Systemd. Gestion d'applications multi-services avec les “pods” Podman. Compatibilité Docker Compose via podman-compose ou kompose. Détection améliorée des APIs vulnérables dans les IDEs JetBrains et Qodana - https://blog.jetbrains.com/idea/2025/09/enhanced-vulnerable-api-detection-in-jetbrains-ides-and-qodana/ JetBrains s'associe avec Mend.io pour renforcer la sécurité du code dans leurs outils Le plugin Package Checker bénéficie de nouvelles données enrichies sur les APIs vulnérables Analyse des graphes d'appels pour couvrir plus de méthodes publiques des bibliothèques open-source Support de Java, Kotlin, C#, JavaScript, TypeScript et Python pour la détection de vulnérabilités Activation des inspections via Paramètres > Editor > Inspections en recherchant “Vulnerable API” Surlignage automatique des méthodes vulnérables avec détails des failles au survol Action contextuelle pour naviguer directement vers la déclaration de dépendance problématique Mise à jour automatique vers une version non affectée via Alt+Enter sur la dépendance Fenêtre dédiée “Vulnerable Dependencies” pour voir l'état global des vulnérabilités du projet Méthodologies Le retour de du sondage de Stack Overflow sur l'usage de l'IA dans le code https://medium.com/@amareshadak/stack-overflow-just-exposed-the-ugly-truth-about-ai-coding-tools-b4f7b5992191 84% des développeurs utilisent l'IA quotidiennement, mais 46% ne font pas confiance aux résultats. Seulement 3,1% font “hautement confiance” au code généré. 66% sont frustrés par les solutions IA “presque correctes”. 45% disent que déboguer le code IA prend plus de temps que l'écrire soi-même. Les développeurs seniors (10+ ans) font moins confiance à l'IA (2,6%) que les débutants (6,1%), créant un écart de connaissances dangereux. Les pays occidentaux montrent moins de confiance - Allemagne (22%), UK (23%), USA (28%) - que l'Inde (56%). Les créateurs d'outils IA leur font moins confiance. 77% des développeurs professionnels rejettent la programmation en langage naturel, seuls 12% l'utilisent réellement. Quand l'IA échoue, 75% se tournent vers les humains. 35% des visites Stack Overflow concernent maintenant des problèmes liés à l'IA. 69% rapportent des gains de productivité personnels, mais seulement 17% voient une amélioration de la collaboration d'équipe. Coûts cachés : temps de vérification, explication du code IA aux équipes, refactorisation et charge cognitive constante. Les plateformes humaines dominent encore : Stack Overflow (84%), GitHub (67%), YouTube (61%) pour résoudre les problèmes IA. L'avenir suggère un “développement augmenté” où l'IA devient un outil parmi d'autres, nécessitant transparence et gestion de l'incertitude. Mentorat open source et défis communautaires par les gens de Microcks https://microcks.io/blog/beyond-code-open-source-mentorship/ Microcks souffre du syndrome des “utilisateurs silencieux” qui bénéficient du projet sans contribuer Malgré des milliers de téléchargements et une adoption croissante, l'engagement communautaire reste faible Ce manque d'interaction crée des défis de durabilité et limite l'innovation du projet Les mainteneurs développent dans le vide sans feedback des vrais utilisateurs Contribuer ne nécessite pas de coder : documentation, partage d'expérience, signalement de bugs suffisent Parler du project qu'on aime autour de soi est aussi super utile Microcks a aussi des questions specifiques qu'ils ont posé dans le blog, donc si vous l'utilisez, aller voir Le succès de l'open source dépend de la transformation des utilisateurs en véritables partenaires communautaires c'est un point assez commun je trouve, le ratio parlant / silencieux est tres petit et cela encourage les quelques grandes gueules La modernisation du systemes legacy, c'est pas que de la tech https://blog.scottlogic.com/2025/08/27/holistic-approach-successful-legacy-modernisation.html Un artcile qui prend du recul sur la modernisation de systemes legacy Les projets de modernisation legacy nécessitent une vision holistique au-delà du simple focus technologique Les drivers business diffèrent des projets greenfield : réduction des coûts et mitigation des risques plutôt que génération de revenus L'état actuel est plus complexe à cartographier avec de nombreuses dépendances et risques de rupture Collaboration essentielle entre Architectes, Analystes Business et Designers UX dès la phase de découverte Approche tridimensionnelle obligatoire : Personnes, Processus et Technologie (comme un jeu d'échecs 3D) Le leadership doit créer l'espace nécessaire pour la découverte et la planification plutôt que presser l'équipe Communication en termes business plutôt que techniques vers tous les niveaux de l'organisation Planification préalable essentielle contrairement aux idées reçues sur l'agilité Séquencement optimal souvent non-évident et nécessitant une analyse approfondie des interdépendances Phases projet alignées sur les résultats business permettent l'agilité au sein de chaque phase Sécurité Cyber Attaque su Musée Histoire Naturelle https://www.franceinfo.fr/internet/securite-sur-internet/cyberattaques/le-museum-nati[…]e-d-une-cyberattaque-severe-une-plainte-deposee_7430356.html Compromission massive de packages npm populaires par un malware crypto https://www.aikido.dev/blog/npm-debug-and-chalk-packages-compromised 18 packages npm très populaires compromis le 8 septembre 2025, incluant chalk, debug, ansi-styles avec plus de 2 milliards de téléchargements hebdomadaires combinés duckdb s'est rajouté à la liste Code malveillant injecté qui intercepte silencieusement l'activité crypto et web3 dans les navigateurs des utilisateurs Le malware manipule les interactions de wallet et redirige les paiements vers des comptes contrôlés par l'attaquant sans signes évidents Injection dans les fonctions critiques comme fetch, XMLHttpRequest et APIs de wallets (window.ethereum, Solana) pour intercepter le trafic Détection et remplacement automatique des adresses crypto sur multiple blockchains (Ethereum, Bitcoin, Solana, Tron, Litecoin, Bitcoin Cash) Les transactions sont modifiées en arrière-plan même si l'interface utilisateur semble correcte et légitime Utilise des adresses “sosies” via correspondance de chaînes pour rendre les échanges moins évidents à détecter Le mainteneur compromis par email de phishing provenant du faux domaine “mailto:support@npmjs.help|support@npmjs.help” enregistré 3 jours avant l'attaque sur une demande de mise a jour de son autheotnfication a deux facteurs après un an Aikido a alerté le mainteneur via Bluesky qui a confirmé la compromission et commencé le nettoyage des packages Attaque sophistiquée opérant à plusieurs niveaux: contenu web, appels API et manipulation des signatures de transactions Les anti-cheats de jeux vidéo : une faille de sécurité majeure ? - https://tferdinand.net/jeux-video-et-si-votre-anti-cheat-etait-la-plus-grosse-faille/ Les anti-cheats modernes s'installent au Ring 0 (noyau système) avec privilèges maximaux Ils obtiennent le même niveau d'accès que les antivirus professionnels mais sans audit ni certification Certains exploitent Secure Boot pour se charger avant le système d'exploitation Risque de supply chain : le groupe APT41 a déjà compromis des jeux comme League of Legends Un attaquant infiltré pourrait désactiver les solutions de sécurité et rester invisible Menace de stabilité : une erreur peut empêcher le démarrage du système (référence CrowdStrike) Conflits possibles entre différents anti-cheats qui se bloquent mutuellement Surveillance en temps réel des données d'utilisation sous prétexte anti-triche Dérive dangereuse selon l'auteur : des entreprises de jeux accèdent au niveau EDR Alternatives limitées : cloud gaming ou sandboxing avec impact sur performances donc faites gaffe aux jeux que vos gamins installent ! Loi, société et organisation Luc Julia au Sénat - Monsieur Phi réagi et publie la vidéo Luc Julia au Sénat : autopsie d'un grand N'IMPORTE QUOI https://www.youtube.com/watch?v=e5kDHL-nnh4 En format podcast de 20 minutes, sorti au même moment et à propos de sa conf à Devoxx https://www.youtube.com/watch?v=Q0gvaIZz1dM Le lab IA - Jérôme Fortias - Et si Luc Julia avait raison https://www.youtube.com/watch?v=KScI5PkCIaE Luc Julia au Senat https://www.youtube.com/watch?v=UjBZaKcTeIY Luc Julia se défend https://www.youtube.com/watch?v=DZmxa7jJ8sI Intelligence artificielle : catastrophe imminente ? - Luc Julia vs Maxime Fournes https://www.youtube.com/watch?v=sCNqGt7yIjo Tech and Co Monsieur Phi vs Luc Julia (put a click) https://www.youtube.com/watch?v=xKeFsOceT44 La tronche en biais https://www.youtube.com/live/zFwLAOgY0Wc Conférences La liste des conférences provenant de Developers Conferences Agenda/List par Aurélie Vache et contributeurs : 12 septembre 2025 : Agile Pays Basque 2025 - Bidart (France) 15 septembre 2025 : Agile Tour Montpellier - Montpellier (France) 18-19 septembre 2025 : API Platform Conference - Lille (France) & Online 22-24 septembre 2025 : Kernel Recipes - Paris (France) 22-27 septembre 2025 : La Mélée Numérique - Toulouse (France) 23 septembre 2025 : OWASP AppSec France 2025 - Paris (France) 23-24 septembre 2025 : AI Engineer Paris - Paris (France) 25 septembre 2025 : Agile Game Toulouse - Toulouse (France) 25-26 septembre 2025 : Paris Web 2025 - Paris (France) 30 septembre 2025-1 octobre 2025 : PyData Paris 2025 - Paris (France) 2 octobre 2025 : Nantes Craft - Nantes (France) 2-3 octobre 2025 : Volcamp - Clermont-Ferrand (France) 3 octobre 2025 : DevFest Perros-Guirec 2025 - Perros-Guirec (France) 6-7 octobre 2025 : Swift Connection 2025 - Paris (France) 6-10 octobre 2025 : Devoxx Belgium - Antwerp (Belgium) 7 octobre 2025 : BSides Mulhouse - Mulhouse (France) 7-8 octobre 2025 : Agile en Seine - Issy-les-Moulineaux (France) 8-10 octobre 2025 : SIG 2025 - Paris (France) & Online 9 octobre 2025 : DevCon #25 : informatique quantique - Paris (France) 9-10 octobre 2025 : Forum PHP 2025 - Marne-la-Vallée (France) 9-10 octobre 2025 : EuroRust 2025 - Paris (France) 16 octobre 2025 : PlatformCon25 Live Day Paris - Paris (France) 16 octobre 2025 : Power 365 - 2025 - Lille (France) 16-17 octobre 2025 : DevFest Nantes - Nantes (France) 17 octobre 2025 : Sylius Con 2025 - Lyon (France) 17 octobre 2025 : ScalaIO 2025 - Paris (France) 17-19 octobre 2025 : OpenInfra Summit Europe - Paris (France) 20 octobre 2025 : Codeurs en Seine - Rouen (France) 23 octobre 2025 : Cloud Nord - Lille (France) 30-31 octobre 2025 : Agile Tour Bordeaux 2025 - Bordeaux (France) 30-31 octobre 2025 : Agile Tour Nantais 2025 - Nantes (France) 30 octobre 2025-2 novembre 2025 : PyConFR 2025 - Lyon (France) 4-7 novembre 2025 : NewCrafts 2025 - Paris (France) 5-6 novembre 2025 : Tech Show Paris - Paris (France) 5-6 novembre 2025 : Red Hat Summit: Connect Paris 2025 - Paris (France) 6 novembre 2025 : dotAI 2025 - Paris (France) 6 novembre 2025 : Agile Tour Aix-Marseille 2025 - Gardanne (France) 7 novembre 2025 : BDX I/O - Bordeaux (France) 12-14 novembre 2025 : Devoxx Morocco - Marrakech (Morocco) 13 novembre 2025 : DevFest Toulouse - Toulouse (France) 15-16 novembre 2025 : Capitole du Libre - Toulouse (France) 19 novembre 2025 : SREday Paris 2025 Q4 - Paris (France) 19-21 novembre 2025 : Agile Grenoble - Grenoble (France) 20 novembre 2025 : OVHcloud Summit - Paris (France) 21 novembre 2025 : DevFest Paris 2025 - Paris (France) 27 novembre 2025 : DevFest Strasbourg 2025 - Strasbourg (France) 28 novembre 2025 : DevFest Lyon - Lyon (France) 1-2 décembre 2025 : Tech Rocks Summit 2025 - Paris (France) 4-5 décembre 2025 : Agile Tour Rennes - Rennes (France) 5 décembre 2025 : DevFest Dijon 2025 - Dijon (France) 9-11 décembre 2025 : APIdays Paris - Paris (France) 9-11 décembre 2025 : Green IO Paris - Paris (France) 10-11 décembre 2025 : Devops REX - Paris (France) 10-11 décembre 2025 : Open Source Experience - Paris (France) 11 décembre 2025 : Normandie.ai 2025 - Rouen (France) 14-17 janvier 2026 : SnowCamp 2026 - Grenoble (France) 2-6 février 2026 : Web Days Convention - Aix-en-Provence (France) 3 février 2026 : Cloud Native Days France 2026 - Paris (France) 12-13 février 2026 : Touraine Tech #26 - Tours (France) 22-24 avril 2026 : Devoxx France 2026 - Paris (France) 23-25 avril 2026 : Devoxx Greece - Athens (Greece) 17 juin 2026 : Devoxx Poland - Krakow (Poland) 4 septembre 2026 : JUG SUmmer Camp 2026 - La Rochelle (France) Nous contacter Pour réagir à cet épisode, venez discuter sur le groupe Google https://groups.google.com/group/lescastcodeurs Contactez-nous via X/twitter https://twitter.com/lescastcodeurs ou Bluesky https://bsky.app/profile/lescastcodeurs.com Faire un crowdcast ou une crowdquestion Soutenez Les Cast Codeurs sur Patreon https://www.patreon.com/LesCastCodeurs Tous les épisodes et toutes les infos sur https://lescastcodeurs.com/

Geekshow Podcast
Geekshow Arcade: Owen, that's an old article

Geekshow Podcast

Play Episode Listen Later Sep 5, 2025 45:01


Tony: -BF6 says no to RT: https://www.tomshardware.com/video-games/pc-gaming/battlefield-6-says-no-to-ray-tracing-now-and-in-the-near-future-dev-says-decision-made-to-focus-on-making-sure-it-was-performance-for-everyone-else -Insane Monitor speed: https://www.tomshardware.com/monitors/gaming-monitors/chinese-esports-firm-worked-with-amd-on-1-000-hz-gaming-monitor-primed-for-2026-debut -Abxylute unit of a handheld: https://www.tweaktown.com/news/107291/abxylute-preps-its-new-11-inch-3d-gaming-handheld-powered-by-intel-lunar-lake-cpu-costs-dollars1699/index.html?iabc=1 -Well, Well, Well, COD…: https://www.gamesradar.com/games/call-of-duty/call-of-duty-drops-a-whopping-100-gb-on-ps5-and-fans-think-its-due-to-battlefield-6-competition-is-always-good-for-gaming/ Jarron: -Perfect Dark almost saved: https://www.ign.com/articles/perfect-dark-was-nearly-saved-by-take-two-but-the-deal-fell-through -More Rayman is coming https://www.ign.com/articles/ubisoft-says-its-working-on-the-future-of-rayman-but-dont-expect-news-from-us-too-soon Owen: -Have YOU caught them all? Did you guys know about catching google pokemon?  -Secure Boot a requirement for BF6 https://www.eurogamer.net/it-really-sucks-battlefield-6-technical-director-bummed-out-about-those-unable-to-play-due-to-secure-boot-requirement-believes-anti-cheat-cat-and-mouse-game-will-never-end -GOG “sticking it” to the man! https://www.engadget.com/gaming/pc/gog-is-giving-away-a-selection-of-adult-games-to-protest-censorship-215048233.html

Podcast de tecnología e informática
Por qué Europa nunca migró sus administraciones a Linux

Podcast de tecnología e informática

Play Episode Listen Later Sep 1, 2025 11:13


En este episodio del Podcast de Tecnología e Informática con Tomás González analizamos por qué la gran idea de migrar todas las administraciones públicas de la Unión Europea a Linux nunca se llegó a ejecutar.Repasamos el contexto histórico de los años 2000, los problemas técnicos de las primeras distribuciones con UEFI y Secure Boot, la dependencia del ecosistema Microsoft con Windows XP, 7 y 10, y el papel del lobby político y económico que frenó cualquier intento serio de soberanía digital.Un recorrido para entender cómo la historia de la informática europea pudo ser distinta… pero no lo fue.

This Week in Linux
324: Secure Boot Linux issues, EU's Chat Control law, Linux Mint 22.2, Ubuntu Touch, & more Linux news

This Week in Linux

Play Episode Listen Later Aug 17, 2025 22:47


video: https://youtu.be/5T1Frk70LTQ Comment on the TWIL Forum (https://thisweekinlinux.com/forum) This week in Linux, we have a lot of news to cover. We have some good news and some bad news. Well, people like to start with bad news first, I guess. So there is a fiasco happening with Secure Boot and how it may be affecting Linux users. Also, the EU is proposing a law that is pretty close to being passed that is very scary and a step towards mass surveillance. We'll talk about that. Then also we have some good news and that the Pebble watches are back and we have some beta releases from Linux Mint and Ubuntu Touch as well as SyncThing is back, which is a really cool tool to sync your files across multiple devices. All of this and more on This Week in Linux, the weekly news show that keeps you up to date with what's going on in the Linux and open source world. Now let's jump right into Your Source for Linux GNews. Download as MP3 (https://aphid.fireside.fm/d/1437767933/2389be04-5c79-485e-b1ca-3a5b2cebb006/2e5d6a20-b358-4ee3-8837-8986dff684ee.mp3) Support the Show Become a Patron = tuxdigital.com/membership (https://tuxdigital.com/membership) Store = tuxdigital.com/store (https://tuxdigital.com/store) Chapters: 00:00 Intro 01:23 Secure Boot Fiasco coming for Linux Users? 03:43 EU Chat Control law is a step towards mass surveillance 06:15 KDE Gear 25.08 Released 08:19 Sandfly Security, agentless Linux security [ad] 10:38 Pebble Time 2 is coming 12:13 Linux Mint 22.2 Beta Released 13:43 Ubuntu Touch 24.04 1.0 Beta 15:05 Syncthing 2.0.0 released 17:28 SparkyLinux 8.0 released 18:39 LVFS Sustainability Plan 20:31 HandBrake 1.10 Released 21:55 Outro Links: Secure Boot Fiasco coming for Linux Users? https://mjg59.dreamwidth.org/72892.html (https://mjg59.dreamwidth.org/72892.html) https://lwn.net/Articles/1029767/ (https://lwn.net/Articles/1029767/) https://www.techradar.com/pro/security/linux-users-are-about-to-face-another-major-microsoft-secure-boot-issue (https://www.techradar.com/pro/security/linux-users-are-about-to-face-another-major-microsoft-secure-boot-issue) EU Chat Control law is a step towards mass surveillance https://fightchatcontrol.eu/ (https://fightchatcontrol.eu/) https://mullvad.net/en/chatcontrol (https://mullvad.net/en/chatcontrol) https://cointelegraph.com/news/eu-chat-control-plan-gains-support-threatens-encryption (https://cointelegraph.com/news/eu-chat-control-plan-gains-support-threatens-encryption) KDE Gear 25.08 Released https://kde.org/announcements/gear/25.08.0/ (https://kde.org/announcements/gear/25.08.0/) Sandfly Security, agentless Linux security [ad] https://thisweekinlinux.com/sandfly (https://thisweekinlinux.com/sandfly) Pebble Time 2 is coming https://ericmigi.com/blog/pebble-time-2-design-reveal (https://ericmigi.com/blog/pebble-time-2-design-reveal) https://www.youtube.com/watch?v=pcPzmDePH3E (https://www.youtube.com/watch?v=pcPzmDePH3E) https://techcrunch.com/2025/08/13/pebbles-smartwatch-is-back-pebble-time-2-specs-revealed/ (https://techcrunch.com/2025/08/13/pebbles-smartwatch-is-back-pebble-time-2-specs-revealed/) Linux Mint 22.2 Beta Released https://blog.linuxmint.com/?p=4876 (https://blog.linuxmint.com/?p=4876) Ubuntu Touch 24.04 1.0 Beta https://ubports.com/blog/ubports-news-1/ubuntu-touch-24-04-1-0-and-20-04-ota-10-call-for-testing-3963 (https://ubports.com/blog/ubports-news-1/ubuntu-touch-24-04-1-0-and-20-04-ota-10-call-for-testing-3963) Syncthing 2.0.0 released https://syncthing.net/ (https://syncthing.net/) https://github.com/syncthing/syncthing/releases/tag/v2.0.0 (https://github.com/syncthing/syncthing/releases/tag/v2.0.0) SparkyLinux 8.0 released https://sparkylinux.org/sparky-8-0/ (https://sparkylinux.org/sparky-8-0/) LVFS Sustainability Plan https://blogs.gnome.org/hughsie/2025/08/08/lvfs-sustainability-plan/ (https://blogs.gnome.org/hughsie/2025/08/08/lvfs-sustainability-plan/) https://www.omgubuntu.co.uk/2025/08/lvfs-sustainability-plan-vendor-funding (https://www.omgubuntu.co.uk/2025/08/lvfs-sustainability-plan-vendor-funding) HandBrake 1.10 Released https://handbrake.fr/ (https://handbrake.fr/) https://github.com/HandBrake/HandBrake/releases/tag/1.10.0 (https://github.com/HandBrake/HandBrake/releases/tag/1.10.0) https://www.omgubuntu.co.uk/2025/08/handbrake-1-10-released-new-features (https://www.omgubuntu.co.uk/2025/08/handbrake-1-10-released-new-features) Support the show https://tuxdigital.com/membership (https://tuxdigital.com/membership) https://store.tuxdigital.com/ (https://store.tuxdigital.com/)

M2 Podcast
Battlefield 6, EA Javelin, Secure Boot, 8bitdo S6E28

M2 Podcast

Play Episode Listen Later Aug 15, 2025 61:29


This week on the M2 Podcast, we're breaking down some of the biggest stories shaking up the gaming world. Krafton fires back at a lawsuit from Subnautica 2's former leads, accusing them of abandoning their roles and chasing a payout they “haven't earned.” Over in the FPS arena, Battlefield 6”s Javelin anti-cheat has already blocked a staggering 330,000 cheat attempts in just two days, while both *Call of Duty* and Battlefield 6 prepare to require Secure Boot and TPM 2.0 to fight hackers—sparking debates about performance and player choice. We wrap up with a look at 8BitDo's first wireless Xbox controller, a gorgeous Rare 40th Anniversary Edition packed with nostalgic Easter eggs for longtime fans.0:00 Intro1:11 Updates10:32 Ex-Subnautica 2 Leads' Lawsuit https://tinyurl.com/mtzbjscy 20:37 330,000 Cheat Attempts in Battlefield 6 https://tinyurl.com/4xbk589f 38:11 Call of Duty and Battlefield 6 require Secure Boot https://tinyurl.com/mvjcptbx 49:22 8BitDo's first wireless Xbox controller https://tinyurl.com/553t9zpy 59:15 OutroLeave a LIKE and a comment, thanks for watching/listening!-----------------------------------------------------------------------------------PODCAST ►► https://anchor.fm/m2podcastAMAZON Music ► https://music.amazon.com/podcasts/091902c3-b83b-487c-8fe7-4c96787434fe/M2-PodcastAPPLE ► https://podcasts.apple.com/podcast/id1531832410BREAKER ► https://www.breaker.audio/m2-podcast-2CASTRO ► https://castro.fm/podcast/6f69d373-d879-46d9-9f1c-bcf7c4bf1741GOOGLE ► https://podcasts.google.com/feed/aHR0cHM6Ly9hbmNob3IuZm0vcy8zNTYwNWZiMC9wb2RjYXN0L3Jzcw==OVERCAST ► https://overcast.fm/itunes1531832410/m2-podcastPOCKETCASTS ► https://pca.st/5jghvf6eRADIOPUBLIC ► https://radiopublic.com/m2-podcast-GMZkY4SPOTIFY ► https://open.spotify.com/show/2VedhO03IRoHERJqF6Sy87STICHER ► https://www.stitcher.com/podcast/m2-podcastTUNEIN ► http://tun.in/pj3ZI #podcastJOIN THE DISCORD! ►► https://discord.gg/Kp5Gre6FOLLOW THE TWITTER! ►►https://twitter.com/m2_podcastKyleHeath Socials:TWITTER ►► https://twitter.com/mrjkheathMadMikeWillEatU Socials:TWITTER ►► https://twitter.com/madmikewilleatu

GameFM » Mesa do Fliper
BATTLEFIELD ESTÁ FINALMENTE DE VOLTA? - 14/08/2025 - Mesa do Fliper - Podcast

GameFM » Mesa do Fliper

Play Episode Listen Later Aug 15, 2025 189:55


Battlefield 6 nem saiu e já é um sucesso. Quebrando recordes, parece que a franquia finalmente está de volta aos seus tempos de glória. Mas não pense que está tudo perfeito. Problemas com cheaters e toda a polêmica do Secure Boot estão gerando dúvidas sobre seu futuro. Entenda tudo sobre o assunto na nossa Treta da Semana.

Day One Patch Podcast
Starfield's “Cruise Mode” Leak | Horizon Lawsuit Drama | Battlefield 6 Secure Boot Woes

Day One Patch Podcast

Play Episode Listen Later Aug 10, 2025 88:57


In this episode of the Day One Patch Podcast, we cover the latest Starfield leak hinting at a new “Cruise Mode” for real-time space travel, break down Sony's lawsuit against Tencent over claims that Light of Motiram is a Horizon: Zero Dawn clone, and discuss the Secure Boot requirement causing headaches for Battlefield 6 players on PC. Plus, we share what we've been playing and this week's Video Game Fun Fact on the history of the Battlefield series.

Combo Wombo
Combo Wombo Podcast Ep 196 – AAA Anti Cheat

Combo Wombo

Play Episode Listen Later Aug 10, 2025 24:51


Gimpy and Chip talk about the Battlefield 6 beta, and the news that BF6 will be the first AAA game to require Secure Boot, with COD following shortly after. Is it too much?youtube available: https://youtu.be/0xA69554y7w

Podcast de tecnología e informática
Linux al Día: Malware, Intel, y las 10 noticias que marcan la semana

Podcast de tecnología e informática

Play Episode Listen Later Aug 9, 2025 5:40


En este episodio repasamos las 10 noticias más importantes del mundo Linux y el software libre de esta semana. Desde un nuevo y peligroso malware que roba contraseñas, hasta el fin de Clear Linux por parte de Intel, pasando por vulnerabilidades críticas en Sudo, cambios en Secure Boot y avances en KDE Plasma. También hablamos de la llegada de soporte para los futuros CPUs Nova Lake, la aparición de nuevas GPUs Intel Arc, y el creciente uso de Linux en escritorios. Todo en un formato ágil, claro y pensado para que estés informado en menos de 10 minutos.

Three Dads and a Console
NHL 26 News, Battlefield 6's Secure Boot Problem

Three Dads and a Console

Play Episode Listen Later Aug 7, 2025 65:53


EA has dropped NHL 26's cover athlete, cover, information about the game and a reveal trailer. Two of the biggest puck heads in the business talk about expectations for EA's hockey game. Battlefield 6 is making PC turn on secure boot through their bios, which could potentially cause a lot of problems with less experienced PC savants. Wabba finally played Expedition 33. FINALLY. 

Cyber Morning Call
834 - Pesquisa identifica patentes do APT Silk Typhoon

Cyber Morning Call

Play Episode Listen Later Jul 31, 2025 4:46


Referências do EpisódioChina's Covert Capabilities | Silk Spun From HafniumAnalysis of the latest Silver Fox attack campaign disguised as a Flash pluginNew Lenovo UEFI firmware updates fix Secure Boot bypass flawsRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia

Autonomous IT
Patch [FIX] Tuesday – July 2025: [BitLocker Attack, Secure Boot Expiry, Linux chroot+sudo privesc, and Malicious .Zips], E21

Autonomous IT

Play Episode Listen Later Jul 8, 2025 21:29


In this July 2025 Patch [FIX] Tuesday episode, Automox security experts Tom, Seth, and Cody unpack four high-impact threats — from Microsoft updates, to Linux vulns, and .zip exploit PoCs.Topics include a physical attack method bypassing BitLocker encryption (CVE-2025-48001), the looming expiration of secure boot certificates, a Linux privilege escalation flaw in chroot and sudo (CVE-2025-32463), and a proof-of-concept .zip exploit that hides malicious content during preview but runs it on unzip.Expect sharp technical insights, practical mitigation tips, and as always, a few laughs. 

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday June 30th, 2025: Scattered Spider; AMI BIOS Exploited; Secure Boot Certs Expiring; Microsoft Resliliency Initiative

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jun 30, 2025 7:29


Scattered Spider Update The threat actor known as Scattered Spider is in the news again, this time focusing on airlines. But the techniques used by Scattered Spider, social engineering, are still some of the most dangerous techniques used by various threat actors. https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-recommendations?e=48754805 AMI BIOS Vulnerability Exploited CVE-2024-54085 A vulnerability in the Redfish remote access software, including AMI s BIOS, is now being exploited. https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf https://eclypsium.com/blog/ami-megarac-vulnerabilities-bmc-part-3/ Act now: Secure Boot certificates expire in June 2026 The Microsoft certificates used in Secure Boot are the basis of trust for operating system security, and all will be expiring beginning June 2026. https://techcommunity.microsoft.com/blog/windows-itpro-blog/act-now-secure-boot-certificates-expire-in-june-2026/4426856 The Windows Resiliency Initiative: Building resilience for a future-ready enterprise Microsoft announced more details about its future security and resilience strategy for Windows. In particular, security tools will no longer have kernel access, which is supposed to prevent a repeat of the Cloudflare issue, but may also restrict security tools functionality. https://blogs.windows.com/windowsexperience/2025/06/26/the-windows-resiliency-initiative-building-resilience-for-a-future-ready-enterprise/

IIoT Use Case Podcast | Industrie
#174 | KUNBUS & Wendeware: Energiemanagement per IIoT skalieren | KUNBUS & Wendeware

IIoT Use Case Podcast | Industrie

Play Episode Listen Later Jun 25, 2025 33:44


www.iotusecase.com#ENERGIEMANAGEMENT #MODBUS #REVOLUTIONPIIn Episode 174 des IoT Use Case Podcasts spricht Gastgeberin Ing. Madeleine Mickeleit mit Jochend Marwede, Vorstand der Wendeware AG, und Boris Crismancich, Business Development Manager bei KUNBUS, über den praktischen Einsatz industrietauglicher IoT-Hardware und -Software in Energieprojekten. Im Fokus steht die Plattform AMPERIX zur intelligenten Steuerung von Batteriespeichern, Ladesäulen, Wärmepumpen und anderen Verbrauchern – in Kombination mit dem Revolution Pi von KUNBUS, der als robuste IIoT-Hardware im Feld eingesetzt wird. Folge 174 auf einen Blick (und Klick):(16:23) Herausforderungen, Potenziale und Status quo – So sieht der Use Case in der Praxis aus(19:53) Lösungen, Angebote und Services – Ein Blick auf die eingesetzten Technologien (28:09) Übertragbarkeit, Skalierung und nächste Schritte – so könnt Ihr diesen Use Case nutzenPodcast ZusammenfassungIn der industriellen Energiewende zählt jede Kilowattstunde – und jeder verlässliche Datenpunkt. Doch verteilte Standorte, inkompatible Geräte und fehlende Wartungsstrategien erschweren die Umsetzung skalierbarer IoT-Lösungen.In dieser Folge zeigen Jochen Marwede (Wendeware) und Boris Crismancich (KUNBUS), wie es trotzdem gelingen kann: mit einer durchdachten Systemarchitektur, industrietauglicher Hardware und einer Plattform, die sich flexibel in bestehende IT-/OT-Landschaften einfügt.Im Zentrum steht die IoT-Plattform AMPERIX, die große elektrische Verbraucher wie Ladesäulen, Wärmepumpen oder Wasserstoffanlagen in Echtzeit vernetzt, steuert und sich sicher remote updaten lässt. Eingesetzt wird das System unter anderem in Projekten mit modularen Batteriespeichern – wie sie auch bei TESVOLT genutzt werden.Die Hardware-Basis bildet der Revolution Pi von KUNBUS: offen, robust und ausgestattet mit Features wie Containerisierung, Secure Boot per TPM und OTA-Rollbacks – ideal für den Übergang vom Prototypen in den industriellen Dauerbetrieb.Die Episode liefert konkrete Best Practices zur Architektur, Integration und Wartung – und erklärt, wie man teure Zweit-Iterationen vermeiden kann. Auch regulatorische Anforderungen wie der kommende Cyber Resilience Act werden thematisiert.

The CyberWire
Darknet drug marketplace closed for business.

The CyberWire

Play Episode Listen Later Jun 16, 2025 37:24


International law enforcement takes down a darknet drug marketplace. The Washington Post is investigating a cyberattack targeting several journalists' email accounts. Anubis ransomware adds destructive capabilities. The GrayAlpha threat group uses fake browser update pages to deliver advanced malware. Researchers uncover a stealthy malware campaign that hides a malicious payload in a JPEG image. Tenable patches three high-severity vulnerabilities in Nessus Agent. Attackers can disable Secure Boot on many Windows devices by exploiting a firmware flaw. Lawmakers introduce a bipartisan bill to strengthen coordination between CISA and HHS. Harry Coker reflects on his tenure as National Cyber Director. Maria Varmazis checks in with Brandon Karpf on agentic AI. When online chatbots overshare, it's no laughing Meta.  CyberWire Guest Joining us today to discuss Agentic AI and it relates to cybersecurity and space with T-Minus Space Daily host Maria Varmazis is Brandon Karpf, friend of the show, founder of T-Minus Space Daily, and cybersecurity expert. Selected Reading Police seizes Archetyp Market drug marketplace, arrests admin (Bleeping Computer) Washington Post investigating cyberattack on journalists' email accounts, source says (Reuters) Anubis Ransomware Packs a Wiper to Permanently Delete Files (SecurityWeek) GrayAlpha Hacker Group Weaponizes Browser Updates to Deploy PowerNet Loader and NetSupport RAT (Cyber Security News) Malicious Payload Uncovered in JPEG Image Using Steganography and Base64 Obfuscation (Cyber Security News) Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus (Infosecurity Magazine) Microsoft-Signed Firmware Module Bypasses Secure Boot (Gov Infosecurity) Bipartisan bill aims to create CISA-HHS liaison for hospital cyberattacks (The Record) Coker: We can't have economic prosperity or national security without cybersecurity (The Record) The Meta AI app is a privacy disaster (TechCrunch) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Paul's Security Weekly
Not-So-Secure Boot - Rob Allen - PSW #868

Paul's Security Weekly

Play Episode Listen Later Apr 3, 2025 132:35


Rob Allen, Chief Product Officer at Threatlocker joins us for an interview segment on using AI in security products: What works and what's not fully baked! Then in the security news, There are more holes in your boot...loader according to Microsoft, related: Secure Boot is in danger and no one is really talking about it (still), Dear Microsoft: I don't want to send you my data, I don't grant you remote access, and I don't want to create a MS account, CrushFTP has to crush some bugs, bypassing unprivileged user namespace restrictions, FBI raids, attackers using your GPU, Find My anything, protecting GlobalProtect, the exploits will continue until things improve, your call records were not protected, good vs. bad drivers, AI is hacking AI, time traveling attacks, and a bizarre call for security researchers. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-868

Paul's Security Weekly TV
Not-So-Secure Boot - Rob Allen - PSW #868

Paul's Security Weekly TV

Play Episode Listen Later Apr 3, 2025 132:35


Rob Allen, Chief Product Officer at Threatlocker joins us for an interview segment on using AI in security products: What works and what's not fully baked! Then in the security news, There are more holes in your boot...loader according to Microsoft, related: Secure Boot is in danger and no one is really talking about it (still), Dear Microsoft: I don't want to send you my data, I don't grant you remote access, and I don't want to create a MS account, CrushFTP has to crush some bugs, bypassing unprivileged user namespace restrictions, FBI raids, attackers using your GPU, Find My anything, protecting GlobalProtect, the exploits will continue until things improve, your call records were not protected, good vs. bad drivers, AI is hacking AI, time traveling attacks, and a bizarre call for security researchers. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Show Notes: https://securityweekly.com/psw-868

Exploit Brokers - Hacking News
HN59 - Microsoft AI Discovers 20 Zero-Day Vulnerabilities in Bootloaders!

Exploit Brokers - Hacking News

Play Episode Listen Later Apr 3, 2025 19:22


Paul's Security Weekly (Podcast-Only)
Not-So-Secure Boot - Rob Allen - PSW #868

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Apr 3, 2025 132:35


Rob Allen, Chief Product Officer at Threatlocker joins us for an interview segment on using AI in security products: What works and what's not fully baked! Then in the security news, There are more holes in your boot...loader according to Microsoft, related: Secure Boot is in danger and no one is really talking about it (still), Dear Microsoft: I don't want to send you my data, I don't grant you remote access, and I don't want to create a MS account, CrushFTP has to crush some bugs, bypassing unprivileged user namespace restrictions, FBI raids, attackers using your GPU, Find My anything, protecting GlobalProtect, the exploits will continue until things improve, your call records were not protected, good vs. bad drivers, AI is hacking AI, time traveling attacks, and a bizarre call for security researchers. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-868

Paul's Security Weekly (Video-Only)
Not-So-Secure Boot - Rob Allen - PSW #868

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Apr 3, 2025 132:35


Rob Allen, Chief Product Officer at Threatlocker joins us for an interview segment on using AI in security products: What works and what's not fully baked! Then in the security news, There are more holes in your boot...loader according to Microsoft, related: Secure Boot is in danger and no one is really talking about it (still), Dear Microsoft: I don't want to send you my data, I don't grant you remote access, and I don't want to create a MS account, CrushFTP has to crush some bugs, bypassing unprivileged user namespace restrictions, FBI raids, attackers using your GPU, Find My anything, protecting GlobalProtect, the exploits will continue until things improve, your call records were not protected, good vs. bad drivers, AI is hacking AI, time traveling attacks, and a bizarre call for security researchers. This segment is sponsored by ThreatLocker. Visit https://www.securityweekly.com/threatlocker to learn more about them! Show Notes: https://securityweekly.com/psw-868

Brad & Will Made a Tech Pod.
275: The Bottomless Q Hole

Brad & Will Made a Tech Pod.

Play Episode Listen Later Feb 23, 2025 68:13


We had quite a PC-heavy Q&A this month, with multiple questions about Windows 10 and 11 with the former's end-of-support date looming in October, as well as Qs about pronouncing country-code domains, the latest Nvidia 50-series electrical-connector drama, why we haven't seen much Gallium Nitride in PC power supplies yet, ways to get e-books besides Amazon, combatting the dreaded bit rot, and what it would actually mean to print a podcast. Support the Pod! Contribute to the Tech Pod Patreon and get access to our booming Discord, a monthly bonus episode, your name in the credits, and other great benefits! You can support the show at: https://patreon.com/techpod

MP3 – mintCast
453 – Nice Rack, Joe!

MP3 – mintCast

Play Episode Listen Later Jan 22, 2025 72:33


First up in the news: Linux Mint 22.1 “Xia” released, Parallels can finally run x86 versions of Linux on Apple Silicon, German router maker is latest company to inadvertently clarify the LGPL license, Google and Linux Foundation form Chromium love club In security and privacy: Microsoft patches Windows to eliminate Secure Boot bypass threat, Then in our Wanderings: Joe enjoys prepares his rack , Dale does routing , and Eric shares 80s kid culture with his kid.

IT Privacy and Security Weekly update.
EP224.5 Deep Dive - Loose lips sink ships. The IT Privacy and Security Weekly Update for the Week Ending January 7th 2025.

IT Privacy and Security Weekly update.

Play Episode Listen Later Jan 9, 2025 17:44


Tech & Security Weekly FAQ: January 7th, 2025 1. Why is Apple paying $95 million in a lawsuit about Siri? Apple is settling a lawsuit alleging Siri "unintentionally" recorded private conversations without user consent. The lawsuit claimed these recordings were shared with third parties and used for targeted advertising. While denying wrongdoing, Apple will compensate affected users up to $20 per Siri-enabled device purchased between September 2014 and December 2024 and delete recordings obtained before October 2019. 2. What happened to MyGiftCardSupply's customer data? MyGiftCardSupply, an online gift card store, exposed hundreds of thousands of customers' identity documents due to a publicly accessible storage server with no password protection. This server contained sensitive information like driver licenses, passports, and selfies taken for KYC compliance, putting customers at risk of identity theft. 3. Are Chrome extensions safe to use? Hackers are increasingly targeting Chrome extensions, including popular VPNs and AI tools, by injecting malicious code through updates. This can compromise user data and accounts. Users are advised to carefully review extension permissions, only install extensions from trusted sources, and be cautious of unexpected updates. 4. Is Windows 10 still relevant despite the release of Windows 11? Despite Microsoft's promotion of Windows 11, Windows 10 remains the dominant desktop OS, holding a 62.7% market share. This is partly due to user reluctance to upgrade and a significant increase in Windows 10 installations in the US. However, support for many Windows 10 versions ends in October 2025, pushing users towards either extended security updates or potential vulnerabilities. 5. Why is outdated firmware a concern for medical devices? The Illumina iSeq 100 DNA sequencer and other medical devices use outdated firmware, leaving them vulnerable to malware attacks. Without security features like Secure Boot, malicious code can hide in the firmware, compromising device integrity and potentially patient safety. This highlights the need for manufacturers to prioritize firmware updates and security protocols in medical equipment. 6. How are Chinese hackers evolving their tactics? Chinese hackers, allegedly linked to the military and intelligence, have shifted from corporate espionage to targeting critical US infrastructure, including water utilities, airports, and energy grids. This suggests preparation for potential geopolitical conflicts, particularly concerning Taiwan, aiming to disrupt US response capabilities. The sophistication and potential impact of these attacks raise serious concerns about escalating cyber-warfare between the two countries. 7. Why are New Yorkers saying goodbye to the R46 subway cars? New York City is retiring its iconic R46 subway cars, known for their unique seating arrangement and nostalgic charm. These trains are being replaced by the modern R211 cars, featuring brighter lighting, enhanced accessibility, and longitudinal seating to optimize passenger flow. While some lament the loss of a cultural symbol, the upgrade promises a more efficient and modern transit experience. 8. What does Meta's decision to end fact-checking mean for Facebook and Instagram users? Meta, the parent company of Facebook and Instagram, is ending its fact-checking program and loosening content moderation policies. Zuckerberg claims this aims to promote free speech, but critics argue it will lead to a surge in misinformation and harmful content. This shift raises concerns about the platforms' role in shaping online discourse and their potential impact on political and social issues.

Microsoft Mechanics Podcast
Introducing Windows 365 Link

Microsoft Mechanics Podcast

Play Episode Listen Later Nov 22, 2024 5:54


Windows 365 Link is the first Cloud PC device purpose-built for Windows 365. It can connect to your Cloud PC in seconds with a simple sign-in, accessing a familiar Windows Desktop with high-fidelity performance. Windows 365 Link offers seamless setup and streamlined management through Microsoft Intune, ensuring your IT environment is efficiently maintained alongside other PCs. As a stateless and adminless device, it does not store user profile data or install additional software. Optimize your work experience with passwordless authentication, high-performance video conferencing, and support for essential peripherals. Designed with a robust security posture, Windows 365 Link provides data protection with features like Secure Boot, BitLocker encryption, Hypervisor-based Code Integrity, and more. Jalleen Ringer, Partner GPM for Windows Cloud Endpoints, shows how Windows 365 Link is the ideal choice for secure, scalable, and efficient cloud computing.   ► QUICK LINKS: 00:00 - Windows 365 Link—First Cloud PC device purpose-built for Windows 365 00:55 - What it's like to use Windows 365 Link 02:32 - Ports and connectivity 03:18 - Set it up 03:48 - Device management 05:26 - Wrap up   ► Link References Check out https://aka.ms/Windows365Link   ► Unfamiliar with Microsoft Mechanics?  As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast   ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics  • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics

The SysAdmin DOJO Podcast
Security of the Windows Boot Process

The SysAdmin DOJO Podcast

Play Episode Listen Later Oct 30, 2024 35:17


In this episode, Andy and Paul, the dynamic duo of the Security Swarm Podcast, delve into the often-overlooked security of the Windows boot process, revealing how recent leaks have compromised its integrity.  Join Andy Syrewicze and Paul Schnackenburg as they break down how the boot process has evolved from the BIOS days to today's sophisticated UEFI system. They explore features like Trusted Boot and Secure Boot, which are designed to stop rootkits and other malware from hijacking the system.   But things aren't as secure as they seem. Recent leaks of platform keys, including the infamous "PKFail" incident, have exposed vulnerabilities that threaten the whole system. Listen on to discover how these vulnerabilities are being exploited by attackers, the potential risks they pose to your system, and what you can do to safeguard your devices.  Do you want to join the conversation? Join us in our Security Lab LinkedIn Group!  Key Takeaways:  The Windows boot process is more complex than you think: It includes multiple phases, from basic hardware checks to kernel initialization and anti-malware checks, all before you even see the login screen.   Secure boot and measured boot aim to protect against rootkits and bootkits: These security features check for trusted components and fingerprint the boot process to detect unauthorized changes.   PKFail exposes a major vulnerability: A leaked test key used across 800 motherboard models allows attackers to bypass secure boot and load malicious software during the boot process as if it were legitimate.   Firmware vulnerabilities are widespread: The boot process isn't the only place where attackers can hide malware. Network cards, storage devices, and other components with firmware can also be compromised.   Rootkits and bootkits are persistent and difficult to remove: They can survive operating system reinstallation and are incredibly difficult to detect and remove, making them highly effective for attackers.   Updating firmware is crucial: You need to keep your firmware updated just like you update your operating system and software to protect yourself from vulnerabilities.   Beware of the dangers of compromised hardware: While less common than other attacks, these vulnerabilities should be addressed seriously. If you suspect a machine is infected, it's often best to discard it entirely.  Timestamps:  (01:27) Overview of Boot Process   (05:39) Breakdown of the Boot Process Steps   (08:44) Secure Boot and its Features   (12:13) The PKFail Leak: Leaked Platform Key Weakens Secure Boot   (17:18) Bootkits and Rootkits - The Types of Attacks   (22:41) Digital Supply Chain Issues and the Leaked Keys   (27:42) Mitigating PK Fail & Updating Firmware   (30:15) Balancing Risk Profile & Protecting Against Other Attacks   (31:39) Why Rootkits are a Major Persistence Threat  Episode Resources:  Github Repo of known compromised devices Ars Technica Article regarding UEFI Malware Intel Boot Guard News -- Hornetsecurity's Advanced Threat Protection (ATP) can help you stay ahead of these threats.  ATP provides:  Threat intelligence: Stay informed about emerging security threats like bootkit and rootkit vulnerabilities.   Advanced detection: Identify and block these highly sophisticated threats before they can compromise your systems.   Real-time protection: Prevent malicious code from executing, even at the boot level.  Don't wait for a breach! Contact Hornetsecurity today to learn how Advanced Threat Protection can help you secure your boot process and protect your organization from the most persistent malware threats. Click here to schedule a free consultation with a Hornetsecurity specialist. 

Passwort - der Podcast von heise security
News: Protokolle, Messenger, Bootloader – alles unsicher

Passwort - der Podcast von heise security

Play Episode Listen Later Sep 4, 2024 74:52


In der Folge mit der Unglückszahl 13 geht es um diverse Dinge, die unglücklich gelaufen sind, von Linux-Bootloadern, die Microsoft nur teilweise unabsichtlich blockiert hat, bis zur mangelhaften Sicherheit bei "MLOps", also dem KI-Pendant zu DevOps. Zuerst schauen sich Christopher und Sylvester aber eine sehr erfreuliche Diskussion zu OpenSSL an; die Entwickler haben ihre Community um Meinungen zu einer sicherheitsrelevanten Änderung gebeten. Außerdem geht es um die Festnahme von Pavel Durov, den Schöpfer des gar-nicht-so-sicheren Messengers Telegram, und das altehrwürdige Hacker-ezine "Phrack", das in Ausgabe 71 erschienen ist.

LINUX Unplugged
577: Summer Kernel Corn Roast

LINUX Unplugged

Play Episode Listen Later Sep 1, 2024 80:22


Sixty vulnerabilities and exposures disclosed in one week sounds like a lot. We'll explain why it's just business as usual.Sponsored By:Core Contributor Membership: Take $1 a month of your membership for a lifetime!Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. Support LINUX UnpluggedLinks:

Ubuntu Security Podcast
Episode 235

Ubuntu Security Podcast

Play Episode Listen Later Aug 23, 2024 17:40


A recent Microsoft Windows update breaks Linux dual-boot - or does it? This week we look into reports of the recent Windows patch-Tuesday update breaking dual-boot, including a deep-dive into the technical details of Secure Boot, SBAT, grub, shim and more, plus we look at a vulnerability in GNOME Shell and the handling of captive portals as well.

L8ist Sh9y Podcast
UEFI Trust & Secure Boot Issue

L8ist Sh9y Podcast

Play Episode Listen Later Aug 16, 2024 45:59


We explore the UEFI certificate issue in which secure boot is potentially compromised. Certificates that are included in most UEFI BIOSes have been compromised in ways that could easily be used as an attack vector, a very significant flaw and something that should be on your purview and radar to fix and patch. We're going to talk about what the issue is, why it's important, how secure boot works, and what you can do to mitigate this problem in your own infrastructure. An important episode for anybody running or managing desktops, data centers or any infrastructure of any type. Transcript: https://otter.ai/u/H15Z2NZDom8Hta8gHJn2mQwziFM?utm_source=copy_url

2.5 Admins
2.5 Admins 207: Insecure Boot

2.5 Admins

Play Episode Listen Later Aug 8, 2024 29:55


Secure boot is compromised on hundreds of devices, Amazon's desperate attempt to make money from Alexa, and how to decide which open source software on GitHub to trust.   Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes   News/discussion Secure Boot is completely broken on 200+ models from […]

Late Night Linux All Episodes
2.5 Admins 207: Insecure Boot

Late Night Linux All Episodes

Play Episode Listen Later Aug 8, 2024 29:55


Secure boot is compromised on hundreds of devices, Amazon's desperate attempt to make money from Alexa, and how to decide which open source software on GitHub to trust.   Plug Support us on patreon and get an ad-free RSS feed with early episodes sometimes   News/discussion Secure Boot is completely broken on 200+ models from... Read More

LINUX Unplugged
574: COSMIC Encounter

LINUX Unplugged

Play Episode Listen Later Aug 5, 2024 65:26


The COSMIC desktop is just around the corner. We get the inside scoop from System76 and go hands-on with an early press build.Sponsored By:Core Contributor Membership: Take $1 a month of your membership for a lifetime!Tailscale: Tailscale is a programmable networking software that is private and secure by default - get it free on up to 100 devices! 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. Support LINUX UnpluggedLinks:

5bytespodcast
Major Azure Outage! CrowdStrike Fallout Continues! Secure Boot Compromised on Many Devices!

5bytespodcast

Play Episode Listen Later Aug 1, 2024 20:13


In this episode I cover some more news from the CrowdStrike content update gone wrong, I share details on a significant Secure Boot compromise and a recent Azure outage plus much more! Reference Links: https://www.rorymon.com/blog/major-azure-outage-crowdstrike-fallout-continues-secure-boot-compromised-on-many-devices/

Risky Business
Risky Business #757 – The ClownStrike cleanup continues

Risky Business

Play Episode Listen Later Jul 31, 2024 60:49


On this week's show, Patrick Gray and Adam Boileau discuss the week's security news, including: The insurance industry's reaction to CrowdStrike's mess Google's Workspace email validation flaw and its consequences for OAuth'd applications Is the VMWare ESX group membership feature a CVE or an FYI? Secureboot continues to under-deliver North Korea's revenue neutral intelligence services And much, much more This episode is sponsored by allowlisting software vendor Airlock Digital. Airlock uses a kernel driver on Windows, so Chief Executive David Cottingham joined to discuss what the CrowdStrike kernel driver bug drama means for security vendors. This episode is also available on Youtube. If you want to ruin the magic of radio and see the faces behind the show, well, now you can! Show notes Business interruption claims will drive insurance losses linked to CrowdStrike IT disruption | Cybersecurity Dive Delta hires David Boies to seek damages from CrowdStrike, Microsoft CrowdStrike disruption direct losses to reach $5.4B for Fortune 500, study finds | Cybersecurity Dive (1145) Why CrowdStrike's Baffling BSOD Disaster Was Avoidable - YouTube CrowdStrike offers a $10 apology gift card to say sorry for outage | TechCrunch Crooks Bypassed Google's Email Verification to Create Workspace Accounts, Access 3rd-Party Services – Krebs on Security Hackers exploit VMware vulnerability that gives them hypervisor admin | Ars Technica Microsoft calls out apparent ESXi vulnerability that some researchers say is a ‘nothing burger' | CyberScoop AMI Platform Key leak undermines Secure Boot on 800+ PC models Chrome will now prompt some users to send passwords for suspicious files | Ars Technica Google Online Security Blog: Improving the security of Chrome cookies on Windows A Senate Bill Would Radically Improve Voting Machine Security | WIRED U.S. told Philippines it made ‘missteps' in secret anti-vax propaganda effort | Reuters Cyber firm KnowBe4 hired a fake IT worker from North Korea | CyberScoop North Korean hacker used hospital ransomware attacks to fund espionage | CyberScoop North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime's Military and Nuclear Programs North Korean hacking group makes waves to gain Mandiant, FBI spotlight | CyberScoop ServiceNow spots sales opportunities post-CrowdStrike outage | Cybersecurity Dive Chaining Three Bugs to Access All Your ServiceNow Data Cyber Supply Chain Risk Management Conference (CySCRM) 2024 | Conference | PNNL

This Week in Tech (Audio)
TWiT 990: Dogecoin Fort Knox - AI Cheese, SearchGPT, "Free" Facebook

This Week in Tech (Audio)

Play Episode Listen Later Jul 29, 2024 156:25


CrowdStrike Outage Has Roots in Microsoft's Antitrust Problems Trump proposes strategic national crypto stockpile at Bitcoin Conference An AI-built vegan cheese went viral. Here's what happened next AT&T February wireless outage blocked more than 92 million calls, agency says Secure Boot is completely broken on 200+ models from 5 big device makers Russia Throttles YouTube Access in Latest Attack on US Social Media (GOOGL) Video game performers to strike over AI concerns EU threatens to fine Meta for saying Facebook is 'free' OpenAI announces SearchGPT, its AI-powered search engine X's new data-sharing experience will train Grok with your Twitter data by default — Here's how to disable it Alexa Is in Millions of Households—and Amazon Is Losing Billions Host: Leo Laporte Guests: Jason Hiner, Owen Thomas, and Parris Lilly Download or subscribe to this show at https://twit.tv/shows/this-week-in-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: motific.ai NetSuite.com/TWIT expressvpn.com/twit panoptica.app 1password.com/twit

This Week in Tech (Video HI)
TWiT 990: Dogecoin Fort Knox - AI Cheese, SearchGPT, "Free" Facebook

This Week in Tech (Video HI)

Play Episode Listen Later Jul 29, 2024 156:25


CrowdStrike Outage Has Roots in Microsoft's Antitrust Problems Trump proposes strategic national crypto stockpile at Bitcoin Conference An AI-built vegan cheese went viral. Here's what happened next AT&T February wireless outage blocked more than 92 million calls, agency says Secure Boot is completely broken on 200+ models from 5 big device makers Russia Throttles YouTube Access in Latest Attack on US Social Media (GOOGL) Video game performers to strike over AI concerns EU threatens to fine Meta for saying Facebook is 'free' OpenAI announces SearchGPT, its AI-powered search engine X's new data-sharing experience will train Grok with your Twitter data by default — Here's how to disable it Alexa Is in Millions of Households—and Amazon Is Losing Billions Host: Leo Laporte Guests: Jason Hiner, Owen Thomas, and Parris Lilly Download or subscribe to this show at https://twit.tv/shows/this-week-in-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: motific.ai NetSuite.com/TWIT expressvpn.com/twit panoptica.app 1password.com/twit

All TWiT.tv Shows (MP3)
This Week in Tech 990: Dogecoin Fort Knox

All TWiT.tv Shows (MP3)

Play Episode Listen Later Jul 29, 2024 156:25 Transcription Available


CrowdStrike Outage Has Roots in Microsoft's Antitrust Problems Trump proposes strategic national crypto stockpile at Bitcoin Conference An AI-built vegan cheese went viral. Here's what happened next AT&T February wireless outage blocked more than 92 million calls, agency says Secure Boot is completely broken on 200+ models from 5 big device makers Russia Throttles YouTube Access in Latest Attack on US Social Media (GOOGL) Video game performers to strike over AI concerns EU threatens to fine Meta for saying Facebook is "free" OpenAI announces SearchGPT, its AI-powered search engine X's new data-sharing experience will train Grok with your Twitter data by default — Here's how to disable it Alexa Is in Millions of Households—and Amazon Is Losing Billions Host: Leo Laporte Guests: Jason Hiner, Owen Thomas, and Parris Lilly Download or subscribe to this show at https://twit.tv/shows/this-week-in-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: motific.ai NetSuite.com/TWIT expressvpn.com/twit panoptica.app 1password.com/twit

Radio Leo (Audio)
This Week in Tech 990: Dogecoin Fort Knox

Radio Leo (Audio)

Play Episode Listen Later Jul 29, 2024 156:25 Transcription Available


CrowdStrike Outage Has Roots in Microsoft's Antitrust Problems Trump proposes strategic national crypto stockpile at Bitcoin Conference An AI-built vegan cheese went viral. Here's what happened next AT&T February wireless outage blocked more than 92 million calls, agency says Secure Boot is completely broken on 200+ models from 5 big device makers Russia Throttles YouTube Access in Latest Attack on US Social Media (GOOGL) Video game performers to strike over AI concerns EU threatens to fine Meta for saying Facebook is "free" OpenAI announces SearchGPT, its AI-powered search engine X's new data-sharing experience will train Grok with your Twitter data by default — Here's how to disable it Alexa Is in Millions of Households—and Amazon Is Losing Billions Host: Leo Laporte Guests: Jason Hiner, Owen Thomas, and Parris Lilly Download or subscribe to this show at https://twit.tv/shows/this-week-in-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: motific.ai NetSuite.com/TWIT expressvpn.com/twit panoptica.app 1password.com/twit

All TWiT.tv Shows (Video LO)
This Week in Tech 990: Dogecoin Fort Knox

All TWiT.tv Shows (Video LO)

Play Episode Listen Later Jul 29, 2024 156:25 Transcription Available


CrowdStrike Outage Has Roots in Microsoft's Antitrust Problems Trump proposes strategic national crypto stockpile at Bitcoin Conference An AI-built vegan cheese went viral. Here's what happened next AT&T February wireless outage blocked more than 92 million calls, agency says Secure Boot is completely broken on 200+ models from 5 big device makers Russia Throttles YouTube Access in Latest Attack on US Social Media (GOOGL) Video game performers to strike over AI concerns EU threatens to fine Meta for saying Facebook is "free" OpenAI announces SearchGPT, its AI-powered search engine X's new data-sharing experience will train Grok with your Twitter data by default — Here's how to disable it Alexa Is in Millions of Households—and Amazon Is Losing Billions Host: Leo Laporte Guests: Jason Hiner, Owen Thomas, and Parris Lilly Download or subscribe to this show at https://twit.tv/shows/this-week-in-tech Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Sponsors: motific.ai NetSuite.com/TWIT expressvpn.com/twit panoptica.app 1password.com/twit

Risky Business News
Risky Biz News: AMI Platform Key leak undermines Secure Boot on 800+ PC models

Risky Business News

Play Episode Listen Later Jul 29, 2024 8:08


A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast here. Show notes Risky Biz News: AMI Platform Key leak undermines Secure Boot on 800+ PC models

TechLinked
Ryzen 9000 delayed, SearchGPT, Secure Boot broken + more!

TechLinked

Play Episode Listen Later Jul 27, 2024 9:01


Timestamps: 0:00 do that thing you do 0:12 Ryzen 9000 delay and Intel fix 1:45 OpenAI unveils SearchGPT 3:16 Secure Boot breaks 5:19 QUICK BITS INTRO 5:28 Epic Games and AltStore 6:04 Google Pixel 9 leaks 6:42 Wireless Android in W11 File Explorer 7:23 NASA tests space lasers News Sources: https://lmg.gg/YXekY Learn more about your ad choices. Visit megaphone.fm/adchoices

Computer Talk with TAB
Computer Tab 7-27-24 HR 1

Computer Talk with TAB

Play Episode Listen Later Jul 27, 2024 51:13


KnowBe4 di not know before they hired a North Korean Hacker!, AL Models are collapsing because they are using their own output, Crowdstrike mess with Delta, Secure Boot broken, My new Mac PC missing my music, Crowdstrike mess we need to improve, Norton 360 and Malwarebytes at the same time, What is the best internet for me?  

Autonomous IT
Patch [Fix] Tuesday – July 2024 [Major Vulnerabilities Uncovered on Patch Tuesday!], E09

Autonomous IT

Play Episode Listen Later Jul 9, 2024 25:51


Get the latest Patch Tuesday releases, mitigation tips, and learn about custom automations (aka Automox Worklets) that can help you with CVE remediations.

Business of Tech
Apple's WWDC 2024: AI, Private Cloud Compute, and Responsible Framework

Business of Tech

Play Episode Listen Later Jun 12, 2024 10:25


In the podcast episode, Dave Sobel delves deep into Apple's WWDC event, highlighting key announcements and advancements in AI technology. Apple introduced Apple Intelligence, an AI system for their devices, showcasing practical and familiar features like Siri upgrades and integration with OpenAI's Chat GPT. The event also unveiled new AI features across various Apple platforms, emphasizing a user-friendly and personalized approach to AI technology. Notably, the introduction of a calculator app for the iPad received a significant cheer from the audience, showcasing the importance of user-centric features.One of the most intriguing aspects discussed in the episode is Apple's Private Cloud Compute, a privacy-centric AI processing system designed to ensure data privacy and security. The innovative architecture of PCC utilizes Apple Silicon servers with advanced security measures like Secure Enclave and Secure Boot, emphasizing data protection and transparency. The episode highlights how Apple's approach to AI technology differs from other tech giants, focusing on privacy and user empowerment. The integration of PCC with Apple Intelligence showcases a thoughtful solution built around privacy and security.Dave emphasizes the significance of Apple's AI strategy, which seamlessly integrates AI technology into the operating system, making it accessible to all Apple users without additional fees. The episode underscores the role of IT service providers in understanding and leveraging AI features for their customers, emphasizing the importance of advice, guidance, and consulting work in implementing AI technology effectively. Apple's responsible AI principles, focusing on user empowerment, representation, design, and privacy, set a high standard for AI development and transparency, serving as a valuable case study for providers working with customers.In conclusion, the episode highlights the evolving landscape of AI technology and the importance of privacy and user-centric design in AI development. Dave encourages IT service providers to prepare for the integration of Apple's AI technology into their services, emphasizing the need for readiness and understanding of AI features for customer engagement. The episode provides insights into Apple's innovative approach to AI technology and the implications for the tech industry, setting a benchmark for responsible AI development and user privacy. Three things to know today. 00:00 Apple's WWDC 2024 Announcements04:38 A look at Apple's Private Cloud Compute07:17 Apple's AI Framework, and what providers can learn. Supported by:  https://trinitycyber.com/msp4/  All our Sponsors:   https://businessof.tech/sponsors/    Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/ Support the show on Patreon: https://patreon.com/mspradio/ Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessoftech.bsky.social

LINUX Unplugged
554: SCaLEing Nix

LINUX Unplugged

Play Episode Listen Later Mar 18, 2024 89:10


We're on the ground live at NixCon and SCaLE. We catch up with old friends, and discover how Nix is devouring the Linux world one function at a time.

The Daily Decrypt - Cyber News and Discussions
Facebook Job Posting Malware, Chinese Hack on Dutch Military, Linux Bootloader RCE Vulnerability – Cyber Security News

The Daily Decrypt - Cyber News and Discussions

Play Episode Listen Later Feb 8, 2024 7:50


We kick off with a report from BleepingComputer about Ov3r_Stealer malware, a devious program disseminated through Facebook job ads, illustrating the ever-present dangers lurking on social media. Then, we pivot to a strategic cyber assault attributed to Chinese hackers exploiting a FortiGate vulnerability to breach Dutch military defenses, as detailed by The Hacker News. Wrapping up, we delve into the Linux world, confronting a dire remote code execution flaw in the shim bootloader that threatens every distribution supporting Secure Boot, a saga reported by Dark Reading and the NVD. Tune in to decrypt the complexities of cybersecurity in our digital age. Ov3r_Stealer Malware Alert: Read more at BleepingComputer Dutch Military Cyber Breach: Read more at The Hacker News Linux Bootloader Vulnerability Exposed: NVD CVE-2023-40547 & Dark Reading Article