Podcasts about Stormwatch

  • 241PODCASTS
  • 630EPISODES
  • 57mAVG DURATION
  • 1WEEKLY EPISODE
  • May 13, 2025LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about Stormwatch

Show all podcasts related to stormwatch

Latest podcast episodes about Stormwatch

Storm⚡️Watch by GreyNoise Intelligence
AI Layoffs, Bug Bounty Fails & Cyber Workforce Crisis

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later May 13, 2025 57:59


Forecast = Expect scattered AI layoffs, a flurry of bogus bug bounties, and a persistent workforce drought-so keep your firewalls up and your résumés handy! ‍ On this episode of GreyNoise Storm⚡️Watch, we kick things off with our usual round of introductions before diving into the latest cyber weather and threat landscape. If you're new here, Storm⚡️Watch is where we break down what's moving the needle in cybersecurity, spotlighting the people, tools, and trends shaping the field. For today's poll, we're feeling nostalgic and asking: What do you miss most from the Slow Internet days? Whether it's the wild west of Myspace, the quirky chaos of Fark, the creative playground of Wattpad, or the endless flash animations on Albino Blacksheep, we want to know what old-school internet experience you'd revive if you could. We're also talking about the pitfalls of AI in bug bounty programs. The open-source project curl has had enough of users flooding them with AI-generated “slop” vulnerabilities that waste maintainers' time and don't actually move security forward. It's a reminder that, despite the hype, AI isn't a silver bullet for finding real bugs and can actually create more noise than signal. Speaking of AI, the conversation shifts to how major companies are reshaping their workforce in the name of artificial intelligence. CrowdStrike just announced it's cutting 5% of its jobs, citing AI-driven restructuring and the need for efficiency. It's not just CrowdStrike-Duolingo is pushing AI into every corner of its product and workflow, with leadership urging engineers to “start with AI for every task,” even as they admit the tech is still error-prone and often less effective than human effort. The end result? Workers are being asked to manage and troubleshoot clumsy AI tools instead of using their expertise, and users are left with content that's sometimes flat-out wrong or just less engaging than before. But while AI is shaking up tech jobs, the cybersecurity workforce shortage isn't going away. The PIVOTT Act has been revived in Congress to address the growing gap, offering full scholarships for two-year degrees in cyber fields in exchange for government service. It's aimed at making it easier for people to pivot into cyber careers, especially as professionals in other sectors worry about AI-driven job cuts. The Act is being administered by CISA and is designed to streamline the path into government cyber roles, including those requiring security clearances. As always, we spotlight some of the latest developments from Censys, VulnCheck, runZero, and GreyNoise; then wrap up with some quick goodbyes and reminders to check out the latest from all our partners and contributors. Thanks for tuning in to Storm⚡️Watch-where the only thing moving faster than the threats is the conversation. Storm Watch Homepage >> Learn more about GreyNoise >>  

Storm⚡️Watch by GreyNoise Intelligence
Biggest Cybersecurity Threats EXPOSED: Zero-Day Attacks, Chinese Hackers & Enterprise Breaches

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later May 6, 2025 52:42


Forecast = Cloudy with a chance of zero-days-watch for Spellbinder storms and scattered Git leaks! ‍ On this episode of Storm⚡️Watch, the crew dives into the fast-moving world of vulnerability tracking and threat intelligence, spotlighting how defenders are moving beyond the traditional CVE system to keep pace with real-world attacks. The show kicks off with a look at the latest listener poll, always a source of lively debate, before jumping into some of the most pressing cybersecurity stories of the week. A major focus of this episode is the recent revelation that a China-aligned APT group, dubbed TheWizards, is using a tool called Spellbinder to abuse IPv6 SLAAC for adversary-in-the-middle attacks. This technique lets attackers move laterally through networks by hijacking software update mechanisms-specifically targeting popular Chinese applications like Sogou Pinyin and Tencent QQ-to deliver malicious payloads such as the modular WizardNet backdoor. The crew unpacks how this approach leverages IPv6's stateless address autoconfiguration to intercept and redirect legitimate traffic, underscoring the evolving sophistication of lateral movement techniques in targeted campaigns. The episode then turns to Google's 2024 zero-day exploitation analysis, which reports a drop in the total number of zero-days exploited compared to last year but highlights a worrying shift: attackers are increasingly targeting enterprise products and infrastructure. Microsoft, Ivanti, Palo Alto Networks, and Cisco are among the most targeted vendors, with nearly half of all zero-day exploits now aimed at enterprise systems and network appliances. The discussion covers how attackers are chaining vulnerabilities for more impactful breaches and why defenders need to be vigilant as threat actors pivot to harder-to-monitor enterprise environments. Censys is in the spotlight for its recent research and tooling, including a new Ports & Protocols Dashboard that gives organizations granular visibility into their attack surface across all ports and protocols. This helps teams quickly spot risky exposures and misconfigurations, making it easier to prioritize remediation efforts and automate alerting for high-risk assets. The crew also highlights Censys's collaborative work on botnet hunting and their ongoing push to retire stale threat indicators, all of which are reshaping proactive defense strategies. runZero's latest insights emphasize the importance of prioritizing risks at the asset stack level, not just by CVE. The crew explains how misconfigurations, outdated software, and weak network segmentation can create stacked risks that traditional scanners might miss, urging listeners to adopt a more holistic approach to asset management and vulnerability prioritization. Rounding out the episode, GreyNoise shares new research on a dramatic spike in scanning for Ivanti Connect Secure VPNs and a surge in crawling activity targeting Git configuration files. These trends highlight the persistent risk of codebase exposure and the critical need to secure developer infrastructure, as exposed Git configs can lead to the leak of sensitive credentials and even entire codebases. As always, the show wraps up with some final thoughts and goodbyes, leaving listeners with actionable insights and a reminder to stay vigilant in the face of rapidly evolving cyber threats. If you have questions or want to hear more about any of these topics, let us know-what's on your mind this week? Storm Watch Homepage >> Learn more about GreyNoise >>  

Storm⚡️Watch by GreyNoise Intelligence
2025 Cybersecurity Report Breakdown: FBI, Mandiant, GreyNoise, VulnCheck

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Apr 29, 2025 61:44


Forecast = Scattered phishing attempts with a 90% chance of encrypted clouds. ‍ In this episode of Storm⚡️Watch, the crew dissects the evolving vulnerability tracking landscape and the challenges facing defenders as they move beyond the aging CVE system. The show also highlights the rise of sophisticated bot traffic, the expansion of GreyNoise's Global Observation Grid, and fresh tools from VulnCheck and Censys that are helping security teams stay ahead of real-time threats. In our listener poll this week, we ask: what would you do if you found a USB stick? It's a classic scenario that always sparks debate about curiosity versus caution in cybersecurity. It's officially cyber report season, and we're breaking down the latest findings from some of the industry's most influential threat intelligence teams. GreyNoise's new research spotlights the growing risk from resurgent vulnerabilities-those old flaws that go quiet for years before suddenly making a comeback, often targeting edge devices like routers and VPNs. The FBI's 2024 IC3 report is out, revealing a record $16.6 billion in reported losses last year, with phishing, extortion, and business email compromise topping the charts. Mandiant's M-Trends 2025, VulnCheck's Q1 exploitation trends, and other reports all point to a relentless pace of vulnerability weaponization, with nearly a third of new CVEs being exploited within 24 hours of disclosure. We also dig into a series of ace blog posts and research from Censys, including their push to end stale indicators and their deep dives into the sharp rise in attacks targeting edge security devices. Their recent work with GreyNoise and CursorAI on botnet hunting, as well as their new threat hunting module, are changing the game for proactive defense. VulnCheck's quarterly report is raising eyebrows with the revelation that 159 vulnerabilities were exploited in Q1 2025 alone, and 28% of those were weaponized within a single day of disclosure. This underscores how quickly attackers are operationalizing new exploits and why defenders need to move faster than ever. We round out the show with the latest from runZero and a look at GreyNoise's recent findings, including a ninefold surge in Ivanti Connect Secure scanning and a spike in Git configuration crawling-both of which highlight the ongoing risk of codebase exposure and the need for continuous vigilance. Storm Watch Homepage >> Learn more about GreyNoise >>  

Storm⚡️Watch by GreyNoise Intelligence
CVE Chaos: The Fragmented Future of Vulnerability Tracking, Bad Bots & Real-Time Threat Intel

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Apr 22, 2025 56:41


Forecast = Prepare for scattered CVEs, rising bot storms, and real-time threat lightning. Keep your digital umbrellas handy! ‍ On this episode of Storm⚡️Watch, we're breaking down the latest shifts in the vulnerability tracking landscape, starting with the ongoing turbulence in the CVE program. As the MITRE-run CVE system faces funding uncertainty and a potential transition to nonprofit status, the global security community is rapidly adapting. New standards and databases are emerging to fill the gaps—Europe's ENISA is rolling out the EU Vulnerability Database to ensure regional control, while China continues to operate its own state-mandated systems. Meanwhile, the CVE ecosystem's chronic delays and the NVD's new “Deferred” status for tens of thousands of older vulnerabilities are pushing teams to look elsewhere for timely, enriched vulnerability data. Open-source projects like OSV.dev and commercial players such as VulnCheck and Snyk are stepping up, offering real-time enrichment, exploit intelligence, and predictive scoring to help organizations prioritize what matters most. The result is a fragmented but innovative patchwork of regional, decentralized, open-source, and commercial solutions, with hybrid approaches quickly becoming the norm for defenders worldwide. We're also diving into Imperva's 2024 Bad Bot Report, which reveals that nearly a third of all internet traffic last year came from malicious bots. These bots are getting more sophisticated—using residential proxies, mimicking human behavior, and bypassing traditional defenses. The report highlights a surge in account takeover attacks and shows that industries like entertainment and retail are especially hard hit, with bot traffic now outpacing human visitors in some sectors. The rise of simple bots, fueled by easy-to-use AI tools, is reshaping the threat landscape, while advanced and evasive bots continue to challenge even the best detection systems. On the threat intelligence front, GreyNoise has just launched its Global Observation Grid—now the largest deception sensor network in the world, with thousands of sensors in over 80 countries. This expansion enables real-time, verifiable intelligence on internet scanning and exploitation, helping defenders cut through the noise and focus on the threats that matter. GreyNoise's latest research shows attackers are exploiting vulnerabilities within hours of disclosure, with a significant portion of attacks targeting legacy flaws from years past. Their data-driven insights are empowering security teams to prioritize patching and response based on what's actually being exploited in the wild, not just theoretical risk. We're also spotlighting Censys and its tools for tracking botnets and advanced threats, including collaborative projects with GreyNoise and CursorAI. Their automated infrastructure mapping and pivoting capabilities are helping researchers quickly identify related malicious hosts and uncover the infrastructure behind large-scale attacks. Finally, VulnCheck continues to bridge the gap during the CVE program's uncertainty, offering autonomous enrichment, real-time exploit tracking, and comprehensive coverage—including for CVEs that NVD has deprioritized. Their Known Exploited Vulnerabilities catalog and enhanced NVD++ service are giving defenders a broader, faster view of the threat landscape, often surfacing critical exploitation activity weeks before it's reflected in official government feeds. As the vulnerability management ecosystem splinters and evolves, organizations are being forced to rethink their strategies—embracing a mix of regional, open-source, and commercial intelligence to maintain visibility and stay ahead of attackers. The days of relying on a single source of truth for vulnerability data are over, and the future is all about agility, automation, and real-time insight. Storm Watch Homepage >> Learn more about GreyNoise >>  

Storm⚡️Watch by GreyNoise Intelligence
Cyber Threat Horizon: InfosecSherpa Interview, Ukraine Drone Malware, & VulnCon Recap

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Apr 15, 2025 65:37


Forecast = Scattered exploits, Mirai storms brewing, and rogue drones dropping malware over Russia. Keep your firewalls up—a vulnerability front is rolling in fast! ‍ On this episode of Storm⚡️Watch, we're bringing you a packed episode that covers the latest in cyber threat intelligence, industry news, and a few stories you won't want to miss. We kick things off with our usual round of introductions and a quick look at the cyber weather, setting the stage for what's happening across the threat landscape. In our first segment, Tod shares his wrap-up from VulnCon 2025, highlighting the key takeaways and emerging trends from this year's conference. From new vulnerability research to the latest in exploit techniques, Tod breaks down what security professionals need to know and what's likely to shape the industry in the coming months. Next up, we sit down with Tracy Z. Maleeff, better known as InfosecSherpa, for an interview that traces her journey from librarian to cybersecurity professional. Tracy shares insights on career pivots, the importance of information literacy in security, and her ongoing work to make the field more accessible. Her story is a must-listen for anyone considering a move into cyber or looking for inspiration from someone who's successfully navigated the transition. We then turn our attention to a headline-grabbing story out of Ukraine, where reports indicate that drones sent into Russian territory are not just for surveillance or kinetic impact—they're also carrying malware designed to infect military systems if captured. This blend of physical and cyber warfare is a stark reminder of how modern conflicts are increasingly fought on multiple fronts, with digital payloads now as critical as traditional munitions. If we need to fill a little extra time, we'll explore some of the more bizarre aspects of hybrid warfare, including reports of weaponized consumer goods—think exploding sex toys and cosmetics—being used as part of psychological and disruption campaigns targeting the West. It's a strange new world where almost anything can be turned into a tool of conflict. We also spotlight recent research from Censys on the Salt Typhoon attacks, which underscore the need for advanced defenses as attackers continue to exploit edge devices and cloud infrastructure. Their findings highlight the importance of proactive monitoring and rapid response to emerging threats. On the GreyNoise front, we've observed a threefold surge in exploitation attempts targeting TVT DVRs, likely linked to Mirai botnet activity. This uptick is a clear signal that attackers are constantly scanning for vulnerable devices to conscript into their botnets, and it's a reminder for defenders to stay vigilant and patch exposed systems. As always, we wrap up with a round of goodbyes and a reminder to subscribe for more insights, interviews, and real-time threat intelligence. Thanks for tuning in to Storm⚡️Watch—where we keep you ahead of the cyber storms. Storm Watch Homepage >> Learn more about GreyNoise >>  

The Weather Man Podcast... I talk about weather!
Northeast Storm Watch: Rain, Snow, and Travel Impacts

The Weather Man Podcast... I talk about weather!

Play Episode Listen Later Apr 6, 2025 2:53 Transcription Available


Storm⚡️Watch by GreyNoise Intelligence
Cybercrime Evolution: Robot Dog Backdoors & Mob's Digital Takeover

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Apr 1, 2025 58:12


Forecast = Cloudy with a chance of cyber meatballs. ‍ We're not fooling around in this episode of Storm⚡️Watch! The show kicks off with some positive news about the Journal Times returning to full operations following a cyberattack. This is followed by important information for VMware users regarding Broadcom's significant licensing changes effective April 10, including an increase in minimum core requirements from 16 to 72 cores per command line and a new 20% penalty for late subscription renewals that will be applied retroactively. The crew then reviews results from their recent poll asking listeners which feature of encrypted messaging apps concerns them most, with options including data storage, unencrypted backups, metadata, and accidental adds. In our first segment, we discuss security concerns with the Unitree Go1 consumer-grade robot dog, specifically focusing on the recently disclosed Zhexi Oray Tunnel backdoor that has raised alarm in the security community. Next up, the team explores FamousSparrow and their SparrowDoor malware, examining the techniques and implications of this threat actor's operations. In light of recent event, the hosts provide comprehensive guidance on secure messaging practices, drawing from recent Washington Post and Wired articles. They emphasize that secure communication depends not just on the app but also on how you use it. Key recommendations include choosing contacts wisely, securing your devices by using personal rather than work equipment, setting messages to automatically delete, and selecting the right messaging apps with Signal being the top recommendation for its verifiable end-to-end encryption. They also warn about potential vulnerabilities in cross-platform messaging and advise caution with apps like Telegram. We quickly review Europol's 2025 report on the evolving landscape of organized crime, which now heavily intersects with cybercrime. Traditional criminal networks have transformed into technology-driven enterprises using AI, blockchain, and cryptocurrency to enhance their operations. The internet has become the primary theater for organized crime with data as the new currency of power. The report identifies seven key threat areas and calls for improved global financial security measures, noting that criminal asset confiscation remains stagnant at around 2%. Finally, we conclude with updates from our benevolent overlords, including Censys' reports on JunOS vulnerabilities and Kubernetes issues, VulnCheck's partnership with Filigran, runZero's approach to exposure management, and GreyNoise's observations on DrayTek router activity and Palo Alto Networks scanner activity that may indicate upcoming threats. Storm Watch Homepage >> Learn more about GreyNoise >>  

BEYOND SIGHT AND SOUND
3/19/25 Storm watch and more___

BEYOND SIGHT AND SOUND

Play Episode Listen Later Mar 20, 2025 66:29


Shooters and Prospectors (309) 737-3248 https://www.facebook.com/SWShooterSuppliesAndProspecting/ Adventures In Prospecting(A.I.P.) http://www.adventuresinprospecting.com/ XTREME SCOOPS https://www.facebook.com/XTREMEScoops/ TheRingFinders https://theringfinders.com/ BEYOND SIGHT AND SOUND YouTube https://www.youtube.com/channel/UCk7YDKf4Bxdw0Lwdat9VoRA All Metal Militia on Facebook https://www.facebook.com/groups/AllMetalMilitia/ DetectEd Outdoors https://www.youtube.com/channel/UCjLV9vNNhgmPJut2vMq0iNA Crazy Spider Adventures on YouTube https://www.youtube.com/channel/UCsKNJc6jKCnYthGmyp-QYEQ Illinois Iowa treasure hunters Facebook group https://www.facebook.com/groups/251326456035/ BOOT CAMP VIDEOS Night 1 silvers https://m.facebook.com/groups/576627622397397?view=permalink&id=2969793473080788 Night 2 coppers https://m.facebook.com/groups/576627622397397?view=permalink&id=2978808162179319 Night 3 tips, tricks and tweaks https://www.facebook.com/groups/detectamerica/permalink/2985422534851215/ NOKTA WEBSITE https://www.noktadetectors.com/ Midwest refineries https://www.midwestrefineries.com/ All Metal Militia on YouTube https://www.youtube.com/channel/UCT22mRQ_QQ0LfHrZy22IaaA?fbclid=IwAR1s1ma_fkWv9VzBVDKyLF10rQZq2wg0IJwQwJAKP21tWCHMYa7yiIs26l8 The Relic Hunter Facebook group https://www.facebook.com/groups/249978366379006/?ref=share $10K diamond ring return https://theringfinders.com/blog/Josh.Kimmel/2020/10/1-25-1-5-carat-diamond-gold-ring-returned-trf-celina-ohio-potential-replacement-8-10k/?fbclid=IwAR2tULpBnqX3Uwuc7FVRVASecMO0lF0tpxvy8OXbiBNk7bCbdB8W530xBc4 Metal Detecting:- Beyond Sight and Sound https://www.facebook.com/groups/421832374617055 FIND US ON AMAZON AND AUDIBLE https://www.amazon.com/BEYOND-SIGHT-AND-SOUND/dp/B08JJS1FC1 Sapphire and diamond arthritic wedding ring returned https://theringfinders.com/blog/Josh.Kimmel/2021/05/sapphire-diamond-arthritic-wedding-ring-returned-trf-celina-ohio/?fbclid=IwAR10iM9GH2BDcf3BHywNMhvQiyP_g0bHL_360zscykDQfiMK1R3fWe1ZCB0 MDCI Facebook group https://www.facebook.com/groups/259089097602307/ Terry Shannon's website https://terryshannon.com/ Quarter Hoarder YouTube channel https://m.youtube.com/@QuarterHoarder Bark's Detecting Bits on YouTube https://www.youtube.com/@barksdetectingbits3298 MANTICORE SOFTWARE UPDATE https://www.minelab.com/usa/manticore-software-upgrade... Ill Digger YouTube https://www.youtube.com/@Ill_Digger BEYOND SIGHT AND SOUND on PodBean https://www.podbean.com/pu/pbblog-hbn8z-10fc2c8

Storm⚡️Watch by GreyNoise Intelligence
Unforgivable Vulnerabilities & The Ballista Botnet Nightmare: Why Your Router Might Be Part of a Global Attack

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Mar 18, 2025 62:30


Forecast = Router-geddon: Ballista storms brewing with a chance of unforgivable vulnerabilities. Patch umbrella required. ‍ In this episode of Storm ⚡ ️Watch, the crew laments the sorry state of modern edge computing through the lens of Steve Coley's 2007 paper on "Unforgivable Vulnerabilities". The discussion examines security flaws that should never appear in properly developed software yet continue to plague systems today. These vulnerabilities demonstrate a systematic disregard for secure development practices and would be immediately obvious to anyone with basic security awareness. The team breaks down "The Lucky 13" vulnerabilities, including buffer overflows, cross-site scripting, SQL injection, and hard-coded credentials, while also exploring how modern AI tools might inadvertently introduce these same issues into today's codebase, and how one might go about properly and safely use them in coding and security engineering. The episode also features an in-depth analysis of the newly discovered Ballista botnet that's actively targeting TP-Link Archer routers through a vulnerability discovered two years ago. First detected on January 10, 2025, this botnet has already infected over 6,000 devices worldwide, with the most recent activity observed in mid-February. The threat actors behind Ballista, believed to be based in Italy, have targeted organizations across multiple sectors including manufacturing, healthcare, services, and technology in the US, Australia, China, and Mexico. The botnet exploits CVE-2023-1389 to spread malware that establishes encrypted command and control channels, enabling attackers to launch DDoS attacks and further compromise vulnerable systems. The team rounds out the episode with updates from their partner organizations. Censys shares insights on JunOS vulnerabilities and the RedPenguin threat actor, along with an investigation into server misidentification issues. RunZero discusses the importance of cybersecurity labeling for end-of-life and end-of-support consumer IoT devices. GreyNoise alerts listeners to a new surge in SSRF exploitation attempts reminiscent of the 2019 Capital One breach and promotes their upcoming webinar on March 24th. As always, the Storm⚡️Watch crew delivers actionable intelligence and expert analysis to help security professionals stay ahead of emerging threats in the ever-evolving cybersecurity landscape. Storm Watch Homepage >> Learn more about GreyNoise >>  

Storm⚡️Watch by GreyNoise Intelligence
Cybersecurity Chaos: CISA Controversy, Telecom Hacks, and Exploited Vulnerabilities

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Mar 11, 2025 62:30


Forecast: Cloudy with a chance of compromised credentials and scattered vulnerabilities—stay alert out there! ‍ In this episode of Storm⚡️Watch, we're unpacking some of the most pressing developments in cybersecurity and what they mean for the industry. First, we tackle the state of CISA and its mounting challenges. From allegations that the Trump administration ordered U.S. Cyber Command and CISA to stand down on addressing Russian cyber threats, to financial groups pushing back against CISA's proposed incident reporting rule, there's no shortage of turbulence. Adding fuel to the fire, Homeland Security Secretary Kristi Noem has disbanded eight federal advisory committees, including key cybersecurity groups, citing compliance with a Trump-era executive order. Critics argue these cuts could weaken public-private collaboration and hinder CISA's ability to protect critical infrastructure. We'll break down what all this means for the future of cybersecurity leadership in the U.S. Next, we revisit a shocking case involving a U.S. soldier who plans to plead guilty to hacking 15 telecom carriers. This story highlights the ongoing risks posed by insider threats and the vulnerabilities within telecom networks, which are often targeted for their treasure troves of sensitive data. We'll explore how this case unfolded, what it reveals about vetting processes for individuals with access to critical systems, and the broader implications for cybersecurity in government-affiliated organizations. We also spotlight some fascinating research from Censys on a phishing scam exploiting toll systems across multiple states. Attackers are leveraging cheap foreign SIM cards and Chinese-hosted infrastructure in a campaign that keeps evolving. Plus, RunZero sheds light on a critical vulnerability affecting Edimax IP cameras (CVE-2025-1316), while GreyNoise reports on mass exploitation of a PHP-CGI vulnerability (CVE-2024-4577) and active threats linked to Silk Typhoon-associated CVEs. Storm Watch Homepage >> Learn more about GreyNoise >>  

Diagnose: Comics
WildStorm Special: WildStorm Rising | WS21

Diagnose: Comics

Play Episode Listen Later Mar 7, 2025 44:52


Es ist so weit, das den Podcast abschließende WildStorm Rising Crossover steht vor der Tür. Während StormWatch auf die WildC.A.T.s treffen, implodiert Defiles über lange Zeit vorbereiteter Plan und das gesamte WildStorm Universum macht sich gemeinsam auf Schlüsselsuche. Thorsten und Björn diskutieren, ob der Rest der Story ebenso implodiert, und wieso Daemonite Lords alle mit erhobener Hand sterben. Gelesen wurde das gesamte in den USA von Image publizierte WildStorm Rising Crossover, bestehend aus Team 7: Objective Hell #1, WildStorm Rising #1, WildC.A.T.s (Vol. 1) #20, Union (Vol. 2) #4, Gen13 (Vol. 2) #2, Grifter (Vol. 1) #1, Deathblow (Vol. 1) #16, Wetworks (Vol. 1) #8, Backlash (Vol. 1) #8, StormWatch (Vol. 1) #22, und WildStorm Rising #2 Folgt uns auf Instagram und Bluesky, und lest Thorstens Blog. Intromusik von Markus Schneider

Storm⚡️Watch by GreyNoise Intelligence
Cybersecurity Under Fire: MiC Leadership, Edge Device Threats, and Black Basta Secrets

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Feb 25, 2025 65:07


Forecast = Expect a storm of insights as we tackle cybersecurity's cloudy diversity gaps, edge device downpours, and ransomware winds blowing from Black Basta! ‍ In this episode of Storm⚡️Watch, we kick things off with an insightful interview with Mary N. Chaney, the CEO of Minorities in Cybersecurity (MiC). MiC is a groundbreaking organization dedicated to addressing the lack of support and representation for women and minority leaders in cybersecurity. Mary shares how MiC is building a community that fosters leadership development and equips members with essential skills for career advancement. We also discuss the alarming statistics that highlight the underrepresentation of minorities in cybersecurity leadership roles and explore how MiC's programs, like The MiC Inclusive Community™ and The MiC Leadership Series™, are making a tangible difference. Next, the crew descends into a critical discussion about edge security products, drawing on insights from Censys. These devices, while vital for network protection, are increasingly becoming prime targets for attackers. We examine recent vulnerabilities added to CISA's Known Exploited Vulnerabilities catalog, including flaws in products from Palo Alto Networks and SonicWall, and explore how state-sponsored actors like Salt Typhoon are exploiting these weaknesses. The conversation underscores the importance of proactive patch management and tools like attack surface monitoring to mitigate risks. In the next segment, we analyze leaked chat logs from the Black Basta ransomware group with insights from VulnCheck. These logs reveal how Black Basta prioritizes vulnerabilities in widely used enterprise technologies, their rapid response to new advisories, and even their pre-publication knowledge of certain CVEs. We break down their strategy for selecting targets based on financial viability, industry focus, and vulnerability presence, offering actionable advice for defenders to stay ahead. Finally, we turn our attention to GreyNoise's recent observations of active exploitation campaigns targeting Cisco vulnerabilities by Salt Typhoon, a Chinese state-sponsored group. Using data from GreyNoise's global observation grid, we discuss how legacy vulnerabilities like CVE-2018-0171 remain valuable tools for advanced threat actors. This segment highlights the importance of patching unaddressed issues and leveraging real-time threat intelligence to protect critical infrastructure. Storm Watch Homepage >> Learn more about GreyNoise >>  

Diagnose: Comics
WildStorm Special: Union Vol. 2 | WS19

Diagnose: Comics

Play Episode Listen Later Feb 21, 2025 30:13


Wer nach der ersten Union Serie noch nicht genug hatte, bekommt hier noch die Origin und eine weitere Serie hinterher. Union in New York, Tibet und Chicago. Alte Freunde, Beziehungsprobleme und eine Barnacht mit Savage Dragon. Außerdem: Stormwatch ruft. Gelesen wurden die US Hefte Union #0, Union (Vol. 2) #1-3 sowie die Story "Crusade" aus dem Killer Instinct Tour Book. Auf Deutsch gibt es das natürlich alles nicht. Ursprung allen Übels: bunte Bildchen auf Instagram Wiege der Zivilisation: Bluesky Quell der Freude: Thorstens Blog Originäre Intromusik von Markus Schneider

Storm⚡️Watch by GreyNoise Intelligence
The Untold Stories: North Korean Hacks, Exploited Vulnerabilities & Cybersecurity Legends

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Feb 18, 2025 65:47


Forecast: Expect increased malicious activity targeting enterprise network infrastructure and remote work platforms. ‍ In this episode of Storm⚡️Watch, the crew tackles some of the most pressing stories in cybersecurity and tech. First, we explore the case of Christian Marie Chapman, an Arizona woman who faces federal prison time for orchestrating a scheme that allowed North Korean IT workers to pose as U.S.-based employees. This operation, which generated over $17 million for North Korea, involved Chapman running a "laptop farm" that enabled remote access to U.S. company networks. The scheme not only compromised sensitive company data but also funneled money to North Korea's weapons programs. This story underscores the critical need for robust identity verification and background checks in hiring processes, especially in remote IT roles, to avoid inadvertently aiding malicious actors. Next, we discuss GreyNoise's findings on the active exploitation of a high-severity vulnerability in Palo Alto Networks PAN-OS (CVE-2025-0108). This authentication bypass flaw allows attackers to execute unauthorized PHP scripts, posing significant risks to unpatched systems. Organizations are urged to apply security patches immediately and restrict access to firewall management interfaces to mitigate potential breaches. GreyNoise's real-time intelligence highlights the importance of staying vigilant against evolving threats. In our featured segment, we sit down with Dennis Fisher, a celebrated journalist with over two decades of experience in cybersecurity reporting. Fisher shares insights from his career, including his work as co-founder of *Threatpost* and Editor-in-Chief at *Decipher*. Known for his analytical approach, Fisher has covered major cybersecurity events and delved into the motivations behind both attackers and defenders. His expertise offers a unique perspective on the complexities of information security. Finally, we touch on broader issues in vulnerability management and encryption policies. From GreyNoise's observations of exploitation surges in vulnerabilities like ThinkPHP and ownCloud to Censys' argument against weakening encryption standards, these discussions emphasize the need for proactive measures and smarter prioritization in cybersecurity strategies. Whether it's patching overlooked vulnerabilities or resisting calls to weaken encryption under the guise of security, staying informed is key to navigating today's threat landscape. Storm Watch Homepage >> Learn more about GreyNoise >>  

Petros And Money
A Crunchy Groove Thursday (Hour 1) 2/13/25

Petros And Money

Play Episode Listen Later Feb 14, 2025 41:34 Transcription Available


A FLEX ALERT before the Clippers-Jazz game. Storm Watch 2025. 3 Things Thursday on the NBA first half of the season. Secret Textoso Roundup

Weekend Shows
HR 1: Travis Thomas - Super Bowl preview + Winter storm watch

Weekend Shows

Play Episode Listen Later Feb 8, 2025 44:47


Travis Thomas is bored with this week's coverage of Super Bowl. The only way for Mahomes to pass Brady is by winning more rings. Travis asks about winter in New England and the calls start pouring in.

Rock Brook Church
Week 1: Storm Watch

Rock Brook Church

Play Episode Listen Later Feb 2, 2025 29:55


Anchored | Week 1: Storm Watch // Ryland Walter // Are you prepared for your next life storm? We all have something we cling to when we face the storms of life, and what you grab onto matters. In this series, we'll study the storms in scripture and discuss how to grab onto the right anchor. From Jesus shouting at a storm, to the drift that occurs from the current we can't see… From the disciples being sent into a storm to Jonah being thrown overboard... We'll see how to be prepared when storms come our way, and how to build a life that can weather the storm.

Storm⚡️Watch by GreyNoise Intelligence
Mastercard's 4-Year DNS Nightmare, DHS Axes Cyber Board & New Botnet Wreaks Havoc

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Jan 28, 2025 61:41


Forecast: Murdoc botnet storms hit IoT devices, Mastercard's DNS flaw clouds visibility, and DHS shutdowns leave security in the dark. ‍ In this episode of Storm⚡️Watch, we explore a major DNS misconfiguration at Mastercard that went undetected for over four years. Security researcher Philippe Caturegli uncovered a simple but critical typo in Mastercard's DNS nameserver records where "akam.net" was written as "akam.ne". This error affected one in five DNS requests to Mastercard's infrastructure and could have allowed attackers to intercept emails, capture Windows authentication credentials, and distribute malware through trusted domains. The cybersecurity community was rocked by news that several crucial Department of Homeland Security advisory committees have been terminated. The Cyber Safety Review Board, which was actively investigating the Salt Typhoon hacks targeting U.S. telecommunications companies, was among the disbanded groups. This move has interrupted ongoing investigations into communications targeting high-profile political figures and raised concerns about gaps in information sharing and policy recommendations. A sophisticated new variant of the Mirai malware called the Murdoc Botnet has emerged, targeting IoT devices worldwide. With over 1,300 compromised devices and more than 100 command-and-control servers, this botnet specifically exploits vulnerabilities in AVTECH IP cameras and Huawei HG532 routers. Between December 2024 and January 2025, the botnet has launched significant DDoS campaigns against Japanese corporations, banks, and organizations across multiple sectors in various countries. The 2022 HIPAA Breach Report reveals concerning trends in healthcare security. There were 626 incidents affecting over 41 million people, with hacking and IT incidents accounting for 74% of all large breaches. Surprisingly, paper records remain a significant vulnerability, especially in smaller breaches. The report highlights persistent issues with weak authentication practices, insufficient audit controls, and incomplete risk analyses, resulting in major settlements totaling over $2.4 million. Join us for an in-depth discussion of these critical cybersecurity developments and their implications for the industry. Don't forget to check out the upcoming GreyNoise University Live event for more insights into threat intelligence and network security. Storm Watch Homepage >> Learn more about GreyNoise >>  

Storm⚡️Watch by GreyNoise Intelligence
From Bans to Breaches: TikTok, PlugX, FortiGate, and Salt Typhoon

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Jan 21, 2025 56:02


Forecast: TikTok storm clears out as critical infrastructure takes a hit from FortiGate downpours. ‍ In this episode of Storm⚡️Watch, we explore the dramatic conclusion of TikTok's presence in the United States and its unexpected return. The saga, which began in 2019 with initial government scrutiny, culminated in a series of significant events in January 2025, including the Supreme Court's unanimous decision to uphold the federal ban law and TikTok's brief operational shutdown. We'll discuss the emergence of alternative platforms like Xiaohongshu (REDNote) in the U.S. market and examine recent security concerns, including Remy's investigation into potential backdoor vulnerabilities. The conversation then shifts to a major cybersecurity operation where the Justice Department and FBI successfully removed malware deployed by China-backed hackers using PlugX. We'll share insights from CISA Director Jen Easterly's recent comments on the Salt Typhoon campaign and their approach to tracking cyber threats. A significant portion of our discussion focuses on the FortiGate configuration leak incident. The Belsen Group's release of sensitive data from over 15,000 FortiGate devices has exposed critical infrastructure vulnerabilities across multiple countries. The leak, stemming from a 2022 authentication bypass vulnerability (CVE-2022-40684), primarily affected devices in Mexico and the UAE, with configuration files containing firewall rules, VPN credentials, and digital certificates being exposed. We wrap up with an analysis of recent Volt Typhoon activities and their implications for global cybersecurity, along with some suspicious thoughts from GreyNoise. This episode provides crucial insights into the evolving landscape of international cyber threats and the continuous challenges faced by security professionals worldwide. Storm Watch Homepage >> Learn more about GreyNoise >>  

Storm⚡️Watch by GreyNoise Intelligence
Ivanti's Blast Radius Expands, CFIUS Hack, & Censeye Automates Threat Hunting

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Jan 14, 2025 60:13


Forecast: Breach storms surge with Chinese actors, Ivanti spreads wider, and malware disguises itself—stay alert and patched! ‍ This episode of Storm⚡️Watch features exciting developments in security tooling and concerning breaches in critical infrastructure. We're thrilled to finally talk about Censeye on the pod! It's Censys's powerful new automated hunting platform that's revolutionizing how security teams conduct threat hunting. This innovative tool combines automation with Censys's comprehensive internet scanning capabilities, complete with new gadgets that enhance threat detection and analysis capabilities. In major security news, a significant breach at the US Treasury's Committee on Foreign Investment (CFIUS) has been attributed to Chinese state-sponsored actors. This concerning development potentially exposed sensitive data about national security reviews of foreign investments in American companies. The Ivanti vulnerability situation continues to evolve, with UK domain registry giant Nominet now confirming they've been impacted by the recent Ivanti VPN exploits. This development highlights the expanding blast radius of this critical security issue. 2025 has already seen sophisticated threat actors weaponizing exploits, with researchers uncovering an information stealer disguised as a proof-of-concept exploit for the LDAPNightmare vulnerability (CVE-2024-49113). We'll explore how Censys Search is strengthening phishing prevention through advanced SSL/TLS certificate monitoring, providing organizations with crucial tools to identify and prevent potential phishing campaigns. The episode concludes with an in-depth look at GreyNoise classifications, particularly focusing on suspicious activity patterns identified in the last 24 hours. We'll break down what these classifications mean for security teams and how to leverage this intelligence effectively. Storm Watch Homepage >> Learn more about GreyNoise >>  

Storm⚡️Watch by GreyNoise Intelligence
Chinese Hackers Strike Again: BeyondTrust & Salt Typhoon Breaches Expose Critical U.S. Infrastructure

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Jan 7, 2025 63:37


Forecast: Cyber conditions are turbulent with two major Chinese state-sponsored storms impacting U.S. infrastructure, with aftershocks expected into mid-January. ‍ In today's episode of Storm Watch, we cover two major cybersecurity incidents that have significantly impacted U.S. infrastructure. The BeyondTrust breach, initially discovered in early December 2024, involved a compromised Remote Support SaaS API key that allowed attackers to reset passwords and access workstations remotely. The Treasury Department was notably affected, with attackers accessing unclassified documents in the Office of Financial Research and Office of Foreign Assets Control. The incident exposed critical vulnerabilities, including a severe command injection flaw with a CVSS score of 9.8, and over 13,500 BeyondTrust instances remain exposed online. The conversation then shifts to the extensive telecommunications breaches known as the Salt Typhoon campaign, where Chinese state actors successfully infiltrated nine major U.S. telecom companies. This sophisticated espionage operation gained the capability to geolocate millions of individuals and potentially record phone calls, though actual communication interception was limited to fewer than 100 high-profile targets. The breach revealed shocking security lapses, such as a single administrator account having access to over 100,000 routers and the use of primitive passwords like "1111" for management systems. Major carriers including AT&T, Verizon, and Lumen Technologies were among the affected companies, with varying degrees of impact and response effectiveness. T-Mobile stands out for their quick detection and mitigation of the attack. In response to these incidents, the FCC is preparing to vote on new cybersecurity regulations by mid-January 2025, while the White House has outlined key areas for improvement including configuration management, vulnerability management, network segmentation, and enhanced information sharing across the sector. The episode wraps up with insights from recent Censys Rapid Response posts and the latest GreyNoise blog entry about profiling benign internet scanners in 2024, along with VulnCheck's analysis of the most dangerous software weaknesses and a discussion of the Four-Faith Industrial Router vulnerability being exploited in the wild. Storm Watch Homepage >> Learn more about GreyNoise >>  

A New Morning
A winter storm watch is posted for parts of WNY

A New Morning

Play Episode Listen Later Dec 30, 2024 2:57


A winter storm watch has been posted from Wednesday afternoon to Sunday afternoon for Southern Erie, Wyoming, Chautauqua and Cattaraugus counties. Meteorologist Kirk Apfel tells us what to expect.

Storm⚡️Watch by GreyNoise Intelligence
Hackers Get Glazed: Krispy Kreme's Security Hole & Holiday Cyber Threats

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Dec 17, 2024 54:29


Forecast: Glazed skies with Krispy breaches ahead! Holiday phishing flurries, fatigue fog, and scattered Clop showers roll in, with vulnerability storms on the horizon. ‍ On this week's episode of Storm⚡️Watch, we dive into our latest cybersecurity poll results, which revealed fascinating insights about holiday season security concerns. End-of-year tech fatigue emerged as the primary worry among respondents at 38%, while increased phishing scams followed at 34%. Holiday staffing gaps garnered 24% of responses, and supply chain threats rounded out the concerns at 14%. The cybersecurity world got a sweet taste of chaos this week with Krispy Kreme's cybersecurity incident making headlines. The famous doughnut maker faced disruptions to their online ordering system, leading to a flurry of creative headlines across the media landscape that couldn't resist playing with doughnut-themed puns while covering this serious security breach. We'll explore the latest insights from Censys's 2024 State of the Internet Report, offering a comprehensive look at the current digital landscape. The conversation then shifts to recent developments in the ransomware scene, specifically examining the Clop ransomware group's claimed responsibility for the Cleo data theft attacks. The show rounds out with an analysis of VulnCheck's latest research, covering exploitation detection through Initial Access Intelligence, an examination of the Common Vulnerability Scoring System (CVSS), and a deep look into active Command and Control (C2) servers. These technical insights provide valuable context for understanding current cyber threats and defensive strategies. Storm Watch Homepage >> Learn more about GreyNoise >>  

Storm⚡️Watch by GreyNoise Intelligence
Kansas City Hacking Indictment, ProjectSend Zero-Day & The Greyt Migreytion

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Dec 3, 2024 62:56


Forecast: Strong vulnerability management systems roll in, with scattered threat hunting ahead. Brace for ProjectSend exploits and turbulence near Kansas City. ‍ In this episode of Storm⚡️Watch, we explore crucial cybersecurity trends and breaking developments across the industry. Our recent community poll revealed fascinating insights into resource allocation priorities, with Vulnerability Management and Patching emerging as the clear frontrunner, chosen by half of respondents. Threat Intelligence and Hunting secured the second spot with 27.3% of votes, while Security Awareness and Incident Response capabilities tied for third place. Breaking news from Kansas City highlights a significant cybersecurity incident with a federal indictment for computer hacking, demonstrating the ongoing challenges in cybercrime enforcement. Meanwhile, the cybersecurity community continues to experience shifts in social media dynamics, particularly noting the ongoing migration of cyber professionals from X (formerly Twitter) to alternative platforms. Censys has made waves with their latest release of Censeye, an innovative automated hunting tool now available to the security community. This development arrives alongside VulnCheck's critical discovery of CVE-2024-11680, a ProjectSend vulnerability currently being exploited in the wild, emphasizing the importance of rapid threat detection and response. The GreyNoise team shares exciting news about "The Greyt Migreytion," heralding the rollout of their new global observation grid, a game-changing advancement in threat detection and response. Storm Watch Homepage >> Learn more about GreyNoise >>  

Storm⚡️Watch by GreyNoise Intelligence
Russian Wi-Fi Hacks, Baltic Cable Sabotage, and Security Skills Poll Results

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Nov 26, 2024 70:56


Forecast: Stormy skies with APT28's Wi-Fi exploits and rough seas in the Baltics as undersea cables are mysteriously cut. ‍ In this episode of Storm⚡️Watch, we review the fascinating poll results that reveal communication with non-technical leaders as the most undervalued skill in modern security, garnering 220 votes across three social media platforms and significantly outpacing other critical abilities like incident report writing, OSINT, and threat hunting. The crew then examines a groundbreaking cyber attack technique dubbed the "Nearest Neighbor Attack," executed by Russian APT28. This sophisticated operation allowed attackers to breach a U.S. organization's network by exploiting nearby Wi-Fi networks through a series of calculated steps, including password spraying and compromising adjacent organizations. The attack, occurring just before Russia's invasion of Ukraine, showcases a novel vector that combines the advantages of physical proximity with remote operation capabilities. Maritime security takes center stage as we explore two major undersea cable cuts in the Baltic Sea this November. The BSC East-West Interlink between Sweden and Lithuania and the C-Lion1 connecting Finland and Germany were severed, causing notable network latency increases. A Chinese vessel, Yi Peng 3, has drawn attention in the investigation, with German Defense Minister Boris Pistorius suggesting these incidents were deliberate hybrid actions rather than accidents. We round out the episode with updates from our respective organizations, including Censys's 2024 State of the Internet Report, VulnCheck's analysis of CISA's top exploited vulnerabilities, and GreyNoise's latest insights on critical infrastructure risks and technical challenges involving null bytes. Storm Watch Homepage >> Learn more about GreyNoise >>  

The Jason Rantz Show
Hour 2: Everett cracks down on homelessness, storm watch, former Hamas hostage confronts antisemite

The Jason Rantz Show

Play Episode Listen Later Nov 20, 2024 46:59


What’s Trending: Everett is cracking down on homelessness even more by banning lying and sitting in certain public spaces. Rep. Nancy Mace is getting blowback for introducing a bill that would be prohibit biological men from using the women’s bathrooms on Capitol Hill. This comes on the heels of the first transgender person being elected to Congress. Seattle’s Chinatown International district witnessed yet another violent incident as woman was shot. // Big Local: The Eastside and South King County are bracing themselves for tonight’s windstorm as they are expected to be the areas that are hit hardest. A man in Silverdale pretended to consume fentanyl in order to get out of being arrested. Residents in Snohomish County are fighting back against a potential 8% property tax increase. // A former Hamas hostage destroyed an antisemitic student activist at UCLA during a very awkward exchange. 

Radio Cayman News
LOCAL NEWS - STORMWATCH 7 AM

Radio Cayman News

Play Episode Listen Later Nov 6, 2024 4:31


Shelter in place remains for Sister Islands. All Clear issued for Grand Cayman. Damage Assessments in motion. #rcnews #radiocayman #caymannews #rafael #localnews

Radio Cayman News
LOCAL NEWS - STORMWATCH 8 AM

Radio Cayman News

Play Episode Listen Later Nov 6, 2024 2:08


Latest from HMCI and the Deputy Governor #rcnews #radiocayman #caymanislands #caymannews

Radio Cayman News
LOCAL NEWS - Storm Watch

Radio Cayman News

Play Episode Listen Later Nov 5, 2024 5:57


12 Cubans Migrants land on Cayman Brac Cayman prepared for Rafael - Governor and Premier update the community Telecoms outage #rcnews #localnews #caymannews #radiocayman #rafael

Radio Cayman News
LOCAL NEWS - 8 AM STORM WATCH

Radio Cayman News

Play Episode Listen Later Nov 5, 2024 4:34


Latest on Tropical Storm Rafael Premier on Shelters Miss P reports Crews shutter government buildings in 4 hours, 29 minutes. #rcnews #radiocayman #caymannews #rafael

Radio Cayman News
LOCAL NEWS - STORMWATCH 9 AM

Radio Cayman News

Play Episode Listen Later Nov 5, 2024 2:12


Cayman Islands National Weather Service Chief Meteorologist Kerry Powery discussion Tropical Storm Rafael The Health Services Authority moves Faith Hospital to the Aston Rutty Medical Wing. #rcnews #radiocayman #tropicalstormrafael #caymannews #stormwatch

Radio Cayman News
LOCAL NEWS - STORMWATCH 10 AM

Radio Cayman News

Play Episode Listen Later Nov 5, 2024 3:14


The latest coordinates from the National Hurricane Center in it's 10:00 am interim update The Deputy Governors stops by Radio Cayman to discuss preparations and resources deployed for the storm. Radio Cayman's Carsley Fuller reports from Lower Valley. #rcnews #radiocayman #caymannews #rafael

Radio Cayman News
LOCAL NEWS - STORMWATCH 11 AM

Radio Cayman News

Play Episode Listen Later Nov 5, 2024 2:03


A Shelter-in-Place is ordered for 12pm in the Sister Islands. #rcnews #radiocayman #caymannews #rafael

Radio Cayman News
LOCAL NEWS - STORMWATCH 12PM

Radio Cayman News

Play Episode Listen Later Nov 5, 2024 4:36


Sister Islands prepare for Rafael Cuban migrants to be transferred to Grand Cayman Field reports from West Bay and George Town #rcnews #radiocayman #caymannews #caymanislands

Radio Cayman News
LOCAL NEWS - STORMWATCH 1PM

Radio Cayman News

Play Episode Listen Later Nov 5, 2024 1:21


Rafael is expected to become a hurricane as it passes near the Cayman Islands. A shelter in place order is in effect for the Sister Islands. #rcnews #radiocayman #caymanislands

Capes & Lunatics: Sidekicks
Sector 2814 Ep #194: Red Lanterns - The Death The Red Lanterns

Capes & Lunatics: Sidekicks

Play Episode Listen Later Nov 1, 2024 55:13


Sector 2814 Ep #194: Red Lanterns - The Death The Red Lanterns Welcome back to Sector 2814, the Green Lantern podcast. In this episode Phil and Will review New 52 Red Lanterns #9-#12 and #0 (July-November 2012) featuring the Red Lanterns at the edge of death, another Stormwatch appearance, and the origin of Atrocitus.PLUS: discussion on NYCC Green Lantern and Jeremy Adams news and Phil's review of NEW issue Green Lantern #16.   Tune in today and don't forget to review the show on Apple Podcasts, Spotify, YouTube, and anywhere else you can!     Sector 2814's Links  → Twitter https://www.twitter.com/GreenLanternPod → Instagram https://www.instagram.com/clsidekicks → Facebook https://www.facebook.com/GreenLanternPod → YouTube https://www.youtube.com/c/CapesandLunatics   ==================  

Capes & Lunatics: Sidekicks
Sector 2814 Ep #193: Red Lanterns - Blood and Rage Part 2

Capes & Lunatics: Sidekicks

Play Episode Listen Later Oct 25, 2024 53:36


Sector 2814 Ep #193: Red Lanterns - Blood and Rage Part 2 Welcome back to Sector 2814, the Green Lantern podcast. In this episode Phil and Will review New 52 Red Lanterns #5-#8 and Stormwatch #9 (March-July 2012) featuring Bleez's takeover of the Red Lantern Corps, Atrocitus discovers the deadly secret of the Krona corpse, and special guest star Guy Gardner meets new Red Lantern Jack Moore. PLUS: discussion on the final casting of our live action Hal Jordan and John Stewart and Phil's review of Green Lantern: Civli Corps.   Tune in today and don't forget to review the show on Apple Podcasts, Spotify, YouTube, and anywhere else you can!     Sector 2814's Links  → Twitter https://www.twitter.com/GreenLanternPod → Instagram https://www.instagram.com/clsidekicks → Facebook https://www.facebook.com/GreenLanternPod → YouTube https://www.youtube.com/c/CapesandLunatics   ==================  

Storm⚡️Watch by GreyNoise Intelligence
Security Meltdown: American Water Attacked, Internet Archive Breached, Rackspace Hit by 0-Day

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Oct 22, 2024 50:48


Forecast = Turbulent conditions persist as major platforms face relentless attacks, with data breaches and DDoS storms threatening critical infrastructure and digital archives ‍ In this episode of Storm⚡️Watch, we wade into several significant cybersecurity incidents and updates. First, The American Water attack has raised concerns about the vulnerability of critical infrastructure, with potential implications for military services and water supply systems across the United States. We'll explore the details of this cyberattack and its broader impact on national security. The Internet Archive, a vital resource for digital preservation, has been facing a series of relentless attacks. We'll discuss the ongoing distributed denial-of-service (DDoS) attacks that have disrupted services, as well as a major data breach affecting 31 million users. Our conversation will cover the challenges of protecting such a vast repository of information and the potential motivations behind these persistent assaults on the "Wayback Machine" and other Archive services. On the tools and intelligence front, we'll highlight Censys' new CVE search feature, which promises to enhance vulnerability management for security professionals. We'll also discuss GreyNoise's latest analysis of Russian cyber threats, revealing that 9 out of 12 vulnerabilities tracked by GreyNoise from a recent U.S. and UK advisory are currently being actively probed. Additionally, we'll touch on GreyNoise's upcoming Quarterly Roadmap Showcase, offering listeners a glimpse into future developments. Lastly, we'll examine the recently disclosed ScienceLogic vulnerability, which has been added to CISA's Known Exploited Vulnerabilities catalog. This zero-day flaw has been linked to a breach at Rackspace, underscoring the critical nature of prompt patching and the ongoing challenges in securing third-party utilities. Join us as we break down these crucial cybersecurity stories and their implications for the digital world. Storm Watch Homepage >> Learn more about GreyNoise >>  

Storm⚡️Watch by GreyNoise Intelligence
Healthcare Data at Risk & Chinese Hackers Exploit 30-Year-Old Law

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Oct 15, 2024 60:40


Forecast = Healthcare and telecom under stormy skies—watch for cyber squalls and gusts of disinformation In this episode of Storm⚡️Watch, we dive into the world of cybersecurity with a focus on healthcare and telecommunications. We kick things off with a look at the current state of Internet of Healthcare Things (IoHT) exposures on public-facing networks. A recent study by Censys revealed some alarming findings about the security of DICOM servers, which are used for storing and transmitting medical images. With over 3,800 publicly exposed servers and data from 59 million patients at risk, it's clear that the healthcare industry needs to step up its cybersecurity game. We then shift gears to discuss a major cybersecurity incident involving Chinese hackers who managed to compromise wiretap systems of major U.S. telecom and internet providers. This breach is directly linked to the Communications Assistance for Law Enforcement Act (CALEA), a 30-year-old federal law that has long been criticized by security experts. The incident raises important questions about the balance between government surveillance needs and cybersecurity concerns. For those interested in staying up-to-date with the latest vulnerability intelligence, we highlight recent blog posts from VulnCheck, including their KEV Report and Initial Access Intelligence for September 2024. We also touch on GreyNoise's latest blog post about protecting democracy from the growing threat of deepfakes and disinformation. As always, we wrap up the episode with our "We Need to Talk About KEV" segment, where we discuss the latest additions to CISA's Known Exploited Vulnerabilities catalog. This roundup helps listeners stay informed about the most critical vulnerabilities that require immediate attention. Storm Watch Homepage >> Learn more about GreyNoise >>  

Made of Stars
Severe Geomagnetic Storm Watch Tonight!

Made of Stars

Play Episode Listen Later Oct 10, 2024 30:36


Severe geomagnetic storms could produce another night of auroral activity like what we experienced in May. Also, there are now two comets lighting up the night sky over the next few days. The HERA spacecraft successfully launched before Hurricane Milton's arrival. JWST has given us valuable information about the formation of stars and their frequency. Become a supporter of this podcast: https://www.spreaker.com/podcast/made-of-stars--4746260/support.

Storm⚡️Watch by GreyNoise Intelligence
Cyber Chaos Unleashed: Kaspersky's Vanishing Act & CUPS Vulnerability Mayhem

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Oct 1, 2024 61:19


Forecast = 50% chance of unexpected software installations followed by scattered UDP packet sprays. ‍ In this episode of Storm⚡️Watch, we follow up on the intriguing 'Noise Storms' that had the cybersecurity community buzzing. Security researcher David Schuetz has made some fascinating discoveries about these mysterious ping packets flooding the internet. His investigation, detailed at darthnull.org/noisestorms/, takes us on a journey through packet analysis, timestamp decoding, and network protocol deep-dives, offering new perspectives on the potential origins of those enigmatic 'LOVE' packets. Our Cyberside Chat segment dives into the recent CUPS daemon vulnerability, exploring the implications of this daft uncoordinated disclosure. We'll break down the details provided by Censys in their analysis of the Common Unix Printing Service vulnerabilities. In our Cyber Focus segment, we discuss the surprising news about Kaspersky antivirus software deleting itself and installing UltraAV and other bits of code without warnings. We'll also highlight some recent blog posts from Censys, VulnCheck, and GreyNoise. These articles cover topics ranging from Fox Kitten infrastructure analysis to securing internet-exposed industrial control systems, and even delve into phishing tactics targeting election security. Our "We Need to Talk About KEV" segment rounds up the latest additions to CISA's Known Exploited Vulnerabilities catalog, keeping you informed about the most critical security issues to address. Storm Watch Homepage >> Learn more about GreyNoise >>  

The Ben Maller Show
The Fifth Hour: Straight A's & Cancellations

The Ben Maller Show

Play Episode Listen Later Sep 28, 2024 26:42 Transcription Available


Maller & Danny G. have a great Saturday podcast for you! They talk: Straight A's, Storm Watch, Auburn/MLB Cancellations, & more!  ...Follow, rate & review "The Fifth Hour!" https://podcasts.apple.com/us/podcast/the-fifth-hour-with-ben-maller/id1478163837 Engage with the podcast by emailing us at RealFifthHour@gmail.com ... Follow Ben on Twitter @BenMaller and on Instagram @BenMallerOnFOX ... Danny is on Twitter @DannyGRadio and on Instagram @DannyGRadio #BenMaller #FSRWeekends See omnystudio.com/listener for privacy information.

Fox Sports Radio Weekends
The Fifth Hour: Straight A's & Cancellations

Fox Sports Radio Weekends

Play Episode Listen Later Sep 28, 2024 26:42 Transcription Available


Maller & Danny G. have a great Saturday podcast for you! They talk: Straight A's, Storm Watch, Auburn/MLB Cancellations, & more!  ...Follow, rate & review "The Fifth Hour!" https://podcasts.apple.com/us/podcast/the-fifth-hour-with-ben-maller/id1478163837 Engage with the podcast by emailing us at RealFifthHour@gmail.com ... Follow Ben on Twitter @BenMaller and on Instagram @BenMallerOnFOX ... Danny is on Twitter @DannyGRadio and on Instagram @DannyGRadio #BenMaller #FSRWeekends See omnystudio.com/listener for privacy information.

Bill Handel on Demand
Handel on the News

Bill Handel on Demand

Play Episode Listen Later Sep 27, 2024 30:50 Transcription Available


Amy King & Neil Saavedra join Bill for Handel on the News. Storm poses threat hours after landfall. NTSB issues ‘urgent' safety warning for some Boeing 737s, including MAX, in latest blow to struggling planemaker. Netanyahu to speak to U.N. amid calls for Israel-Hezbollah cease-fire. Semi-truck carrying lithium batteries overturns, sparks fire in San Pedro. LA Metro searching for solutions after deadly bus hijacking.

Storm⚡️Watch by GreyNoise Intelligence
Bluetooth Mayhem: Firewalls Fail & Insulin Pumps Panic

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Sep 24, 2024 74:19


Forecast = Expect heavy BTLE storms with a high chance of UUID leaks. Pack your Faraday umbrellas and watch out for rogue packets raining from the cloud. ‍ On this episode of Storm⚡️Watch, we're diving into some major cybersecurity developments that have been making waves. We'll start by unpacking the ongoing saga of the Columbus, Ohio cyberattack, which has turned into a complex web of legal battles, data leaks, and questions about municipal cybersecurity preparedness. We'll explore how this incident is affecting the city's tech aspirations and what it means for residents' data security. Next, we're excited to bring you our Cyberside Chat, where we'll be discussing a fascinating topic: BLUUID. We'll explore how Bluetooth vulnerabilities are impacting everything from insulin pumps to firewalls. We'll break down the technical details of extracting BTLE UUIDs from Android APK files and how this process can be used to identify devices. We'll also delve into some serious vulnerabilities discovered in Firewalla firewall products, including potential remote code execution risks. As always, we'll be sharing some of our recent work in the cybersecurity field. We've got some intriguing analyses from Censys, including a deep dive into Fox Kitten infrastructure and a challenging look at securing internet-exposed industrial control systems. VulnCheck has been busy too, with a new blog post about the Flax Typhoon botnet. And don't miss our GreyNoise blog, where we're questioning assumptions about ICS security. We'll wrap up with our regular "We Need to Talk About KEV" segment, where we'll round up the latest additions to CISA's Known Exploited Vulnerabilities catalog. It's a packed episode that you won't want to miss, so tune in to stay on top of the latest in the world of cybersecurity. Storm Watch Homepage >> Learn more about GreyNoise >>  

Storm⚡️Watch by GreyNoise Intelligence
Andrew Morris on Noise Storms & Finding a Hidden Message in Millions of ICMP Packets

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Sep 17, 2024 56:21


On this episode, we're joined by GreyNoise Founder and Chief Architect, Andrew Morris, to take a ride in the Mystery Mobile to discover a hidden message buried in the payloads of over two million mis-directed ICMP packets. Along the way, we discuss the history of "noise storms" seen through the lens of GreyNoise's planetary-scale network of internet sensors, talk about some other, recent mega-storms, then don our bestest tin-foil hats to conspiracy theorize who sent this encoded message and why. Forecast - Digital Disturbance Advisory! Subscribe to Storm⚡️Watch - https://stormwatch.ing Storm Watch Homepage >> Learn more about GreyNoise >>  

The Garden Fellowship
Storm Watch

The Garden Fellowship

Play Episode Listen Later Aug 21, 2024 55:01


Storm Watch | 1 Timothy 3:14-151. God Designed the Church to Operate in a Specific Way for a Specific Purpose2. God OWNS the Church3. The Church of the Living God is the Pillar and Ground of TruthTeaching by Pastor Ted Leavenworth at The Garden Fellowship on 8.21.24.More information and teachings online at thegardenfellowship.com.

The Garden Fellowship
Storm Watch

The Garden Fellowship

Play Episode Listen Later Aug 21, 2024 55:01


Storm Watch | 1 Timothy 3:14-151. God Designed the Church to Operate in a Specific Way for a Specific Purpose2. God OWNS the Church3. The Church of the Living God is the Pillar and Ground of TruthTeaching by Pastor Ted Leavenworth at The Garden Fellowship on 8.21.24.More information and teachings online at thegardenfellowship.com.

Short Wave
NEWS: NOAA Issues First Severe Geomagnetic Storm Watch Since 2005

Short Wave

Play Episode Listen Later May 10, 2024 13:29


Scientists at the National Oceanic and Atmospheric Administration observed a cluster of sunspots on the surface of the sun this week. With them came solar flares that kicked off a severe geomagnetic storm. That storm is expected to last throughout the weekend as at least five coronal mass ejections — chunks of the sun — are flung out into space, towards Earth! NOAA uses a five point scale to rate these storms, and this weekend's storm is a G4. It's expected to produce auroras as far south as Alabama. To contextualize this storm, we are looking back at the largest solar storm on record: the Carrington Event. Want us to cover more about the sun? Email us at shortwave@npr.org.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy

Attitudes!
Trad Wives, Kristi Noem, Millionaire Matchmaker and Storm Watch 2024

Attitudes!

Play Episode Listen Later Feb 8, 2024 57:22


Bryan is in NYC again as our west coast correspondent Erin checks in amidst one of the worst storms hitting LA.  Bryan delves into the UK defamation case from drag queen Crystal against conservative talking head Laurence Fox and Kristi Noem's defunding of the Transformation Project.  Erin takes us into the world of “Trad Wives” and the weird glorification by conservatives women “making the choice” to be subservient to their husbands and how this idea of womanhood has been in our ingrained in our culture since the 1950s.  For hours of bonus content like our Dateline and Columbo recaps check out www.patreon.com/attitudes Join our Discord for Wednesday night watch parties here: https://discord.gg/wDF49YKwhtSee omnystudio.com/listener for privacy information.