POPULARITY
“Coverage on demand is here—and it's being built by the community.”—Mario Di Dio, General Manager, Network Helium, Nova Labs Mario Di Dio In a groundbreaking step toward redefining wireless connectivity, Helium Network and Nova Labs have teamed up with AT&T to deliver seamless, secure Wi-Fi access across the U.S. through a decentralized network model. In a podcast interview with Technology Reseller News, Mario Di Dio, General Manager of Network Helium at Nova Labs, walked us through this major milestone and explained how Helium is reshaping the economics and delivery of mobile data. Unlike traditional networks built on costly infrastructure and centralized control, the Helium model allows individuals and businesses to host "mini cell towers"—hotspots that contribute to a nationwide mesh network. Now, with AT&T onboard, the Helium Network enables AT&T customers to connect automatically to these community-powered hotspots without any manual setup, thanks to Passpoint-enabled, WPA3-secure connections. “Just walk into a participating venue like a restaurant or community center,” said Di Dio, “and your phone automatically connects to the network without passwords, boosting coverage in hard-to-reach indoor areas.” The benefits extend to small business owners who can offer secure, guest Wi-Fi while earning Helium Network Tokens (HNT) for hosting a hotspot. This not only enhances customer satisfaction but also introduces a new revenue stream. Deployment is flexible—businesses can install purpose-built Helium devices or convert existing hardware from brands like Ubiquiti, Cisco Meraki, and Aruba into Helium-compatible units. A central element of Helium's transparency and scalability is Helium World (world.helium.com), a live, blockchain-backed dashboard that displays real-time data on hotspot locations, user traffic, and network usage. With over 90,000 active hotspots and peaks of over 900,000 users, the platform provides both visibility for carriers and insights for potential deployers. Another standout innovation is Helium's real-time quality of experience (QoE) metrics. “For the first time, carriers can get live KPIs from third-party Wi-Fi connections just like they do from their own cellular networks,” said Di Dio. This allows providers like AT&T to monitor and dynamically manage the user experience, toggling between Wi-Fi and cellular as needed. As Helium expands through partnerships with other mobile and virtual network operators, its vision for “coverage on demand” continues to gain traction. Using an innovative “expansion zone” feature, carriers can request network growth in targeted areas, and Helium's community of deployers responds. With this shift, Di Dio believes we're witnessing the future of wireless—one that's scalable, community-driven, and more responsive to real-world needs. “It's a very interesting economic proposition for carriers, and a practical one for the people and places that make up our connected world,” he said. Learn more: www.helium.com Live dashboard: world.helium.com #HeliumNetwork #NovaLabs #DecentralizedWiFi #AT&T #TelecomInnovation #WiFiConvergence #BlockchainConnectivity #vCon #TechReseller #HotspotEconomy #WirelessInfrastructure #ConnectivitySolutions
In Episode 55: DJI RS3 Pro and Mic, Tilta Ring, Lidar, and More!! Rod and Keith Discuss all things computer, video, cinematography gear including... In this Episode: Go Techmovepodcast.com to WATCH this episode in FULL COLOR! (00:00:00) Intro to Episode 55 Keith and Rod catch up and discuss last year's NAB 2024 and upcoming NAB 2025 (00:18:24) Keith Shows and Tells his new Panasonic Lumix GH7, Blackmagic Pyxis and L-Mount Adapters, Ursa Mini 12K, Canon C70, DJI Pocket 3 Cage, DJI Mini 4 Pro Drone, DJI Flip Drone, and the upcoming Mac Studio M3 Ultra... (01:16:08) 2.4ghz Overload - Networking Upgrade with Ubiquiti (01:53:29) NAB 2024 Reprise - Blackmagic Design with Bob Caniglia (02:18:52) Keith's Unboxing of the World's Best Something... (02:49:20) NAB 2024 Reprise - Offshoot with CEO Paul Lombard (03:09:36) NAB 2024 Reprise - DJI - Jorge Cruz with the Focus Pro, RS4 Pro, Transmission :35:47) Episode 55 Wrap-up and NAB 2025 Look Ahead with Rod and Keith (03:42:05) The End (Finally) For More Info, go to techmovepodcast.com For More Info, go to techmovepodcast.com Please remember to support TechMove – it's easy and doesn't cost you anything, just go to techmovepodcast.com/amazon. Or you can use Patreon to donate,just go to patreon.com/techmovepodcast.
Alex's server meets a tragic end—but its replacement is shaping up to be a beast. Meanwhile, Chris experiments with budget CO₂ detectors, sirens, and smart integrations. Plus some surprises!
On this week's show: People want OLED and big TVs, Abode is now on AppleTV, Switchbot launches shades, Ubiquiti has a number of new WiFi 7 products, ThirdReality has a mmWave sensor, we answer a few letters from listeners, project updates, and so much more!
In this episode, the hosts delve into maximizing earnings from the Amazon Affiliate Program, including the requirement to link clients to a webpage first for tracking and credit. They discuss the importance of managing Mac software updates through MDM and the emerging DDM approach, addressing their methods and challenges with client systems. Additionally, they touch on using Ubiquiti equipment effectively and maintaining client hardware. The episode covers practical insights, from affiliate program strategies to technical management of software updates in Apple devices.
Episodio 304. Cumpleaños, bautizos y fiestas: Yo no tengo la edad para hacer eso. Chinos por favor, pónganse a trabajar… Yo quiero invitaciones como las de antes para usarlas de pote. Eventualmente en marzo, esos chinos me las enviarán. Sandisk se acaba de unir al grupo.
Navigating Modern Hardware Challenges and NDAA Compliance: A Conversation with John Moder In this episode of Command Control Power, returning guest John Moder joins the hosts to discuss a variety of topics ranging from hardware issues with the latest generation of MacBooks to the intricacies of NDAA compliance concerning network hardware. John shares his experiences with the transition from an Intel MacBook to an M4 Max, highlighting issues with USB power and hubs. The conversation also takes a deep dive into the National Defense Authorization Act (NDAA) and its implications for network security, especially concerning Ubiquiti devices. John provides insights into the process of obtaining compliance certification from Ubiquiti, emphasizing the complexities involved. Alongside the technical discussions, John shares personal anecdotes about his career journey, owning a remote campground during the pandemic, and his current role with Creative Techs. This episode serves as an insightful resource for consultants and tech enthusiasts navigating the ever-evolving landscape of hardware and security compliance. 00:00 Introduction and Welcome Back, John Moder! 00:16 Tech Troubles: USB Issues with New MacBooks 01:56 John's Experience with USB Hubs and MacBook 03:34 Solutions and Frustrations with USB Connectivity 08:51 John's Career Journey: From Tech to Campground Owner 09:36 Pandemic Impact and Campground Challenges 12:02 Life at the Campground: The Reality Sets In 18:44 Transitioning Back: RV Adventures and Remote Work 22:05 The High Costs and Logistics of RV Living 23:23 The Challenges of RV Maintenance and Repairs 25:14 Transitioning to a Stable Home Life 26:10 A New Career in Education Technology 26:52 The Reality of Working in Education 27:28 Returning to Consulting and Remote Work 35:26 Navigating Government Compliance in Tech 35:57 The Complexity of NDAA Compliance 37:56 Ubiquiti's Compliance Process 48:23 Final Thoughts and Reflections
Check out the New Bond account with an initial APY of 6.9%, only at https://public.com/csi This episode of Chip Stock Investor tackles two topics: First, the risk revenue from China posed to companies like Qualcomm and Broadcom; and second, what Qualcomm and Broadcom customer Ubiquiti might be indicating to investors about a new growth cycle. Join Nick and Kasey to learn why 2025 could be another big year for semiconductors. Join us on Discord with Semiconductor Insider: https://ko-fi.com/chipstockinvestor
A proposed solution to the WHOIS TLS verification problem gets a surprising amount of pushback. Plus isolating IoT devices, our thoughts on Ubiquiti gear, setting up WiFi in a new house, remote access with WireGuard, and our mini PC recommendations. Plug Support us on patreon and get an ad-free RSS feed with early episodes […]
A proposed solution to the WHOIS TLS verification problem gets a surprising amount of pushback. Plus isolating IoT devices, our thoughts on Ubiquiti gear, setting up WiFi in a new house, remote access with WireGuard, and our mini PC recommendations. Plug Support us on patreon and get an ad-free RSS feed with early episodes... Read More
Welcome to Tech For Work, a new show all about business technology news. Each week, we dive into the latest developments from the world of business technology, with a focus on how these trends impact the tools and systems we use for work. From breaking news to in-depth discussions on business strategy, this podcast is designed to keep you informed and ahead of the curve. Whether you're a business leader, tech enthusiast, or just someone who wants to stay updated, this show is all about learning and discussing the latest happenings together. Join us as we uncover how technology is shaping the future of work—and how you can make the most of it. In this show, I discuss various topics including my live stream setup, the success of my Starlink video, the new iPhone and Apple products, the DJI Mini 4 Pro drone, and the SpaceX Polaris Dawn mission. I also mentions my plans for future videos and my goal of reaching 3,000 subscribers on YouTube. Takeaways I discuss my live stream setup and the challenges I faced during a recent live stream. I share the success of my Starlink video and the impact it had on my YouTube channel. I talk about the new iPhone and Apple products, including the dedicated camera button on the iPhone 16 Pro Max. I highlight the features of the DJI Mini 4 Pro drone and its suitability for IT professionals. I mention the SpaceX Polaris Dawn mission and the first-ever civilian spacewalk.
Odcinek powrotny. Internetowy taki, że o internecie domowym dużo w nim. Ale też trochę techniki z Google Maps. Enjoy!Linki z odcinka:Ubiquiti: https://ui.com/Google Maps i listy: https://support.google.com/maps/answer/7280933?hl=plNasze sociale:Nasza instancja Fediverse: https://wspanialy.euArlena: https://x.com/wittaminaPaweł: https://wspanialy.eu/@pawelWojtek: https://social.lol/@wojtekZostań mecenasem naszego podcastu. Już od 15 zł lub 3$ odblokuj dostęp do półodcinków After Dark dostępnych tylko dla Patronów. Kliknij tu (https://www.patreon.com/ywp) i wspieraj redakcję Yes Was.Potrzebujesz maila albo VPN? Polecamy: Fastmail – https://bit.ly/FastmailYWP, Surfshark – https://surfshark.deals/yeswas.Porozmawiaj z nami i naszą cudowną społecznością na forum Yes Was Podcast: https://forum.yeswas.pl.Możesz być z nami w kontakcie także na grupie na Telegramie: https://yeswas.club (00:11) Infrastruktura sieciowa na pełnej(47:47) Trochę techniki - listy na Google Maps(58:28) Patreonici(59:26) Outro BMC
It's CEDIA time and once again we will be hosting a HomeTech Happy Hour in Denver. More information and how to RSVP is here!On this week's show: CEDIA is right around the corner, Ubiquiti unveils UniFi Premium Audio, Luon launches Apple Home compatible devices, Wyze introduces a smart bird feeder, Chick-fil-A surprisingly enters the streaming service arena, Ring adds package detection to its budget doorbell, Samsung promises 7 years of TV updates, Amazon's Echo Show 8 loses a key feature, and Govee releases Matter-compatible outdoor lights. We dive into a mailbag question about window sensors, share a thrilling pick of the week, give project updates, and take a look at things for TJ to do in Springfield, Missouri. All this and more on this packed episode!
Si parla di come comprimere foto e video senza comprometterne la qualità, di come vedere YouTube in maniera alternativa, di come progettare la propria rete wifi con Ubiquiti, di come funziona il DHCP, gli IP statici e la DHCP reservation.
Forecast = Expect partly cloudy skies with a high chance of old vulnerabilities resurfacing - don't forget your patch umbrella (or lamp shade)! What's old is new, again, in this episode of Storm⚡️Watch, as we explore the "0.0.0.0 Day" vulnerability, a critical flaw affecting major web browsers like Chrome, Firefox, and Safari. This vulnerability allows malicious websites to bypass browser security mechanisms and potentially gain unauthorized access to local services. We break down the technical details, real-world implications, and the responses from browser developers to this threat. Next, we shed light on a 2017 vulnerability still affecting over 20,000 Ubiquiti devices, including cameras and routers. This issue exposes these devices to amplification attacks and privacy risks due to custom privileged processes on specific network ports. We discuss the discovery protocol, the types of information exposed, and provide practical mitigation strategies for users and administrators of Ubiquiti equipment. In our Cyber Spotlight segment, we cover the National Public Data (NPD) breach, a massive cybersecurity incident that has exposed sensitive personal information of millions of individuals. We take a look at the scope of the breach, the data that was leaked and put up for sale, and the analysis provided by cybersecurity expert Troy Hunt. The implications of this breach are far-reaching, highlighting ongoing concerns in the data broker industry and the potential for long-term impacts on affected individuals. We wrap up the episode with our regular segments, including a look at recent tags from the GreyNoise visualization tool and a roundup of the latest additions to CISA's Known Exploited Vulnerabilities catalog. As always, we encourage our listeners to stay informed and implement necessary security measures to protect themselves in this ever-evolving cyber landscape. Storm Watch Homepage >> Learn more about GreyNoise >>
No episódio de hoje do Camada 8, Samuel Brito, gerente técnico na Ubiquiti, está de volta para continuar a conversa sobre as redes sem fios, e explorar o que mudou desde a nossa última conversa em 2023, quando o Wi-Fi 7 ainda não era um padrão oficial. Samuel falou sobre a evolução dos diferentes padrões de Wi-Fi ao longo dos anos, as melhorias que o Wi-Fi 6, Wi-Fi 6E e Wi-Fi 7 trouxeram em comparação com os seus antecessores e quais são as vantagens da adoção da banda de 6 GHz. Ele também nos explica o que é o Wi-Fi 7, o que tem de novo, quais as principais diferenças e vantagens do Wi-Fi 7 em comparação ao Wi-Fi 6/6E, e muito mais. Dê o play e confira agora mesmo o novo episódio do quadro Roteamento de Ideias do Camada 8! #Camada8 #wifi #wifi7 #wifi6 #wifi6e #wireless #wirelesscommunication #wlan #Infraestrutura #Redes #2.4GHz #5GHz #6GHz Participantes: Antonio Marcos Moreiras (Host) - Gerente de projetos e desenvolvimento no NIC.br https://www.linkedin.com/in/moreiras Eduardo Barasal Morales (Host) - Coordenador da área de formação de sistemas autônomos do Ceptro.br no NIC.br https://www.linkedin.com/in/eduardo-barasal-morales Samuel Brito (Convidado) -Gerente Técnico na UBIQUITI https://www.linkedin.com/in/shbbrito/ Links citados: Semana de Infraestrutura da Internet no Brasil: https://nic.br/semanainfrabr/ Live Intra Rede - “Cabos submarinos na américa latina”: https://intrarede.nic.br/live-intra-rede-ep33/ IX Fórum Regional Norte: https://regional.forum.ix.br/52-AM/ Curso BCOP Presencial: https://cursoseventos.nic.br/curso/curso-bcop/ Curso BCOP EaD: https://cursoseventos.nic.br/curso/curso-bcop-ead/ Curso Fundamentos de RF e Wi-Fi: https://cursoseventos.nic.br/curso/curso-wifi-ubiquiti-nicbr/ Curso de Wi-Fi 7/6E: https://cursoseventos.nic.br/curso/curso-wifi7-ubiquiti-nicbr/ Agenda de ursos do Ceptro|NIC.br: https://ceptro.br/cursos-eventos Redes Sociais: https://www.youtube.com/nicbrvideos/ https://www.twitter.com/comunicbr/ https://www.telegram.me/nicbr/ https://www.linkedin.com/company/nic-br/ https://www.instagram.com/nicbr/ https://www.facebook.com/nic.br/ https://www.flickr.com/NICbr/ Contato: Equipe Ceptro.br cursosceptro@nic.br Direção e edição de áudio: Wanderson Modesto - Analista do Ceptro.br Equipe de Comunicação do NIC.br YouProject Veja também: https://nic.br/ https://ceptro.br/
Pato no está, Pato se fue. Ramza se escapa a hacer el podcast. Coches chinos, SearchGPT, ROG Ally X, las últimas de Nintendo y Ubiquiti.
Catherine Gray, the host of Invest In Her, interviews Laura Kiernan, SVP GuideLign, for Rivel, Inc. She is an advisor and strategist with over three decades of experience working with directorial boards, Fortune 500 and Russell 2000 companies to develop, lead and implement successful investor relations and corporate strategies. She is the Founder and CEO of two boutique investor relations businesses, High Touch Investor Relations and Raising Millions, an incubator and e-learning platform for business founders. High Touch Investor Relations, founded in 2009, is a financial communications and strategic analysis firm that serves international and domestic publicly listed clients. Laura and her team advise clients on strategy and company positioning at pivotal stages, including brand, valuation and other key metrics for business longevity and success. Merging her entrepreneurial know-how with a passion for conscious capitalism, Laura formed Raising Millions in 2021, the go-to network for underrepresented early-stage founders and creators wanting to expand, fundraise and build their businesses through financial education. Laura's unique skillset has allowed her to expertly advise firms and boards on how to best optimize valuations through C suite and board advisory, financial media, targeting, communication, valuation strategy and analyses, capital raising, short surveillance and investor story development. Several of her career successes include overseeing investor relations for World Wrestling Entertainment, the acquisition of the Harry Winston Diamond Corporation by Swatch Group Ltd. and as SVP, Investor Relations at Ubiquiti responsible for improving valuation and advising the C-suite on business strategies. Laura is invited to share her insights by guest lecturing at business-oriented educational institutions including Fordham University, Northeastern University, the University of Pretoria and the National Investor Relations Institute. She holds a BSc in Accounting from Ithaca College and an MBA in Finance and Strategy from NYU Stern School of Business. www.sheangelinvestors.com Follow Us On Social Facebook | Instagram | Twitter | LinkedIn
In 2009 Discord cofounder and CEO, Jason Citron, started building tools and infrastructure for games. Fast forward to today and the platform has over 200 million monthly active users. In this episode, Jason, alongside a16z General Partner Anjney Midha—who merged his company Ubiquiti 6 with Discord in 2021—shares insights on the nuances of community-driven product development, the shift from gamer to developer, and Discord's longstanding commitment to platform extensibility. Now, with Discord's recent release of embeddable apps, what can we expect now that it's easier than ever for developers to build? Resources: Find Jason on Twitter: https://twitter.com/jasoncitronFind Anjney on Twitter: https://twitter.com/AnjneyMidha Stay Updated: Find a16z on Twitter: https://twitter.com/a16zFind a16z on LinkedIn: https://www.linkedin.com/company/a16zSubscribe on your favorite podcast app: https://a16z.simplecast.com/Follow our host: https://twitter.com/stephsmithioPlease note that the content here is for informational purposes only; should NOT be taken as legal, business, tax, or investment advice or be used to evaluate any investment or security; and is not directed at any investors or potential investors in any a16z fund. a16z and its affiliates may maintain investments in the companies discussed. For more details please see a16z.com/disclosures.
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/ask-the-tech-guys Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/all-twittv-shows Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/total-leo Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/ask-the-tech-guys Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/all-twittv-shows Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/total-mikah Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/total-leo Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
The people are pushing for the ban of TikTok within the U.S. Trying to use your WiFi network while on your mobile hotspot. Why is my Safari browser constantly crashing on start up? Be aware when purchasing SD cards on websites like Amazon. What happens with data that is stored in your iCloud but not on your phone? Plus, Scott Wilkinson stops by to talk about the new TVs Sony announced recently. Arc Browser available for Windows. Heat Death of the Internet. Apple reports second quarter results. Meet the powerful tech insiders behind the push to ban TikTok Can you use a WiFi network when using a hotspot on the AT&T network? Scott Wilkinson and Sony's 2024 TV's. A caller suggests some novels for Leo & Mikah to read. A follow-up question to last week's show about images stored within BitWarden and the idea of a "secure delete." Talking about the AT&T security breach that happened recently. How does the iPhone manage files & data on your phone and within iCloud when handling older files and data from a previous iPhone? After upgrading to Sonoma OS on my Mac, why is the Safari browser constantly crashing on startup for me? How can I know when I'm purchasing a legitimate SD card on websites like Amazon? Are there any bank institutions that offer 2FA through applications such as Authy or Google Authenticator rather than text messages? How can I block outgoing traffic from Amazon's Alexa on my Ubiquiti network? If I have a bunch of HDMI cables from over the years, how can I test the cables to tell which is HDMI 1.0 and the other is HDMI 2.0? Why is my Windows Start menu disappearing after my machine goes to sleep mode? What's the best way to encrypt a USB drive? Hosts: Leo Laporte and Mikah Sargent Guest: Scott Wilkinson Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit Show notes and links for this episode are available at: https://twit.tv/shows/ask-the-tech-guys/episodes/2023 Download or subscribe to this show at: https://twit.tv/shows/total-mikah Sponsors: Stamps.com promo code TWiT eufy.com cachefly.com/twit
Today, we discuss the deceptive world of the "Financial Hardship Department Scam," where unsuspecting Americans are tricked into revealing personal data with the false promise of government aid. Explore the intricacies of this scam and how to protect yourself from becoming a victim. This episode also sheds light on the alarming strategies of Russian Sandworm hackers and global brute-force attacks targeting VPN and SSH services, revealing a complex cybersecurity landscape. Original URLs: Financial Hardship Department Scam: https://cyberguy.com/privacy/the-unsubscribe-email-scam-is-targeting-americans/, https://malwaretips.com/blogs/financial-hardship-department-email-scam-explained/ Russian Sandworm Hackers: https://www.bleepingcomputer.com/news/security/russian-sandworm-hackers-pose-as-hacktivists-in-water-utility-breaches/ Cisco Warning on Brute-Force Attacks: https://thehackernews.com/2024/04/cisco-warns-of-global-surge-in-brute.html Follow us on Instagram: https://www.instagram.com/the_daily_decrypt/ Thanks to Jered Jones for providing the music for this episode. https://www.jeredjones.com/ Logo Design by https://www.zackgraber.com/ Tags for the Episode: Financial Hardship Department Scam, cybersecurity, Russian Sandworm hackers, brute-force attacks, VPN, SSH, email scams, government subsidies scam, cyber threats, cyber protection, Mandiant, Cisco Search Phrases: How to protect against Financial Hardship Department Scam What is the Financial Hardship Department Scam Russian Sandworm hackers in US utilities Cisco alert on brute-force attacks Cybersecurity threats in 2024 Email scams involving government aid Preventing cyber attacks on VPN and SSH How Russian hackers disguise as hacktivists Identifying and preventing email scams Latest cybersecurity reports from Cisco and Mandiant Transcript Apr18 Americans are being targeted by a sophisticated scam from the Financial Hardship Department, which promises government subsidies and stimulus checks as a facade to steal personal information and money. Stick around cause we're gonna give them a call. Russian sandworm hackers, disguised as hacktivist groups, have infiltrated water utilities in the United States and Europe, executing sophisticated cyberattacks that manipulate public narratives in favor of Russia according to recent findings by Mandiant. And finally, Cisco has issued an alert on a sharp rise in global brute force attacks targeting VPN and SSH services, revealing a sophisticated threat landscape that exploits Tor exit nodes and various anonymizing proxies since March 18th of 2024. What steps can organizations take to protect their networks from these global brute force attacks? So in recent news, a concerning scam from the Financial Hardship Department is targeting Americans across the country. This was actually brought to my attention from my mother. She reported something suspicious to her IT department, which is me. She received an email with the subject that was her full name, and inside the email was a very compelling argument. That she was entitled to some sort of student loan forgiveness plan, and the money is available right away. And this specific scam isn't necessarily breaking news, but this type of scam, this category of scam, is very effective and very prevalent. And this is because of a thing called OSINT, or Open Source Intelligence, where people can use information they find online about you in order to get you to do things. So, if someone wrote you an email And they knew exactly how much student debt you had, and they knew your full name, and they knew you ran to school. You might be more enticed to give them a call, respond to the email, or even click a link. If you're interested in seeing this email and walking through all of the key indicators that this is not a legit email, and it is in fact a scam, I'm going to be posting a reel a little bit later today on our Instagram that we'll have the email and we're going to go through each one of the indicators that this is a scam so that you can help protect yourself against this scam. But just a high level, the email came from someone at hotmail. com. Nobody with any clout is going to email you from a personal email address. Step one. All right. Number two, there's a sense of urgency. It says that you have a case open, but for only one more day. So give us a call back at this number. And just for fun, I went ahead and gave this number a call using my google voice number and was ready to record it and talk to them and see what they were gonna try to get out of me and maybe give them some fake information. The email was received yesterday and since then the number has been decommissioned. Calling the scammer. Bummer. There are also some weird formatting issues with this email. And then at the bottom, it says you opted into advertising services, provides an address, and then it provides a URL to unsubscribe. This specific email is formatted so poorly that the URL doesn't even become clickable. But they're trying to get you on two directions here. They're trying to get you to call and give up your information. And they're trying to get you to click this unsubscribe link. Now that kind of gets your wheels turning, doesn't it? Most emails have unsubscribe links, and most of them are from emails you might not even recognize. You just want to get them out of your inbox. Now trust me, I am all for inbox sanitization and organization, but clicking unsubscribe links as a habit is a bad one. Clicking any links in an email is a bad habit. And yes, unsubscribe is URL that could take you wherever you want. And usually, when you're about to click it, you're kind of in a hurry, you're not really checking, you're not thinking about it. So attackers know this, and they're going to send you something you really don't want, and they're going to provide a link to unsubscribe. Probably don't click it. Instead, send it to spam. Send it to junk. Train your inbox to send that somewhere else where you don't have to worry about it. Even if the unsubscribe link isn't malicious, it can serve a different purpose. It can let attackers or scammers know that that email address is active. And might actually ramp up the amount of spam, scam emails, or newsletters you may get because people are interested in buying your email address if they know it's an active email address. So now you've just confirmed it, they might go sell it to some other people. It might actually increase the amount of spam you get. There is a service called unroll. me that can help consolidate and manage email subscriptions efficiently. It allows you to view all your subscriptions in one place and makes it easy to unsubscribe from them. Another thing you can do is use alias emails. So if you're an iPhone user, The iPhone will often prompt you to mask your email address. It's a good idea because you can delete that email address at any time. If you start getting spam from it, you can also use tools like fast mail or start mail, and just generate a new email address that forwards to your normal email address. This will also help protect you and your privacy online because they're not just mapping one email address to your identity. Now they have to map tons and tons to keep track of you. So it'll help reduce trackers on Google. It'll help reduce. The efficacy of certain attacks when your password is breached on the dark web. So for more tips and tricks, and for a further analysis on these scam emails, be Instagram later today. Cybersecurity firm Mandiant has exposed how the notorious Sandworm hacking group linked to Russian military intelligence, has camouflaged its cyberattacks by masquerading as hacktivist groups. The Russian ensemble, known by aliases such as Black Energy, Seashell Blizzard, and Voodoo Bear, has been active since 2009, and their operations are accredited to Unit 74455 of Russian's GRU. Mandian's latest findings suggest that Sandworm operates under several online personas to launch data leaks and disrupt operations. Notably, three hacktivist branded telegram channels named Zaxnet Team, Cyber Army of Russia Reborn, and SolSopec, that's Russian, have been instrumental in disseminating pro Russian narratives and misleading the audience about the origin of the cyberattacks. These personas act independently, yet share a common goal of aligning their activities with Russian interests. So, before we move on, just a quick note on hacktivism. There are a few main motivators for attackers when placing an attack. Money, power, fame. And activism is a pretty popular one. So to help give an idea of what a hacktivist organization would be like, it's maybe a pro Ukraine organization that's working to spread the truth about what's going on in a foreign war, and so they might be trying to actually hack the Russian government to help Ukraine, or something like that. Their motivation is not money, so they're not out there trying to get credentials to their bank accounts and stuff like that. They're trying to work towards their organization's mission, which is to spread the truth about foreign wars in favor of a certain country. So these Russian attackers that are responsible for many attacks on U. S. critical infrastructure, especially water utilities, are gaining footholds by pretending to be a hacktivist group. Maybe they're pro Russia, maybe they're pro Ukraine. They're doing what they can to try to sway public opinion in Russia's favor, which involves all sorts of propaganda that I'm not even aware of. But Mandiant's report extends beyond the facade of hacktivism. They have traced back multiple cyber incidents to Sandworm, including attacks on water utilities in the U. S. and Poland, and hydroelectric facilities in France. The authenticity of these intrusion remains under investigation, but confirmation of related malfunctions by U. S. utility officials lends proof. Furthermore, Sandworm's influence operations are designed to bolster Russian wartime objectives by seeding misinformation and creating an illusion of widespread support for the war. The sophistication of these tactics illustrates a strategic shift from direct sabotage in Ukraine, where they targeted critical infrastructure like state networks and the power grid, to a more nuanced cyber espionage and intrusion. influence operations. Mandiant also highlights APT44's activities over the past year including targeting NATO countries electoral systems and engaging in intelligence collection to aid Russian military efforts. The threat posed by APT44 is severe, with ongoing operations focused on Ukraine and an elevated risk of interference in upcoming national elections and significant political events worldwide. So this election season, especially in the United States, is going to be absolutely crazy. The simplicity of access that these foreign, quote, hacktivists or propaganda pushers have over the United States is huge. It's palpable. They can just create TikToks about something you're interested in, which is Ukraine and the things that are happening in this foreign war, and you share it, and the more it gets shared, the more validity it accumulates in people's eyes. And this rapid consumption of social media has almost completely forgotten about citing sources or doing any sort of further research into what you just saw on a 60 second video clip. So I encourage you personally to, I mean, first of all, don't spend too much time on social media. If you get, if you catch yourself doom scrolling, try to get off and go on a walk. And second of all, think about everything you watch as if it were a lie. How could this video be lying to you right now? How could this video be stretching the truth? You know, are these videos actually shot where they are? Are they in front of a green screen? What sources do these people have? to claim what they're saying. Is what they're saying promoting a specific narrative? Maybe for Russia, maybe for Ukraine. And if so, that increases the likelihood that what they're saying is stretched or slightly untrue. So just as we have to look at every email with a lot of scrutiny, make sure we don't click any bad links, we also have to look at everything we consume because our brains are very vulnerable to what we see. And the internet right now is just pushing what we already believe, further enforcing our misbeliefs. There's been a notable spike in brute force attacks globally, as reported by Cisco. Specifically targeting devices such as VPNs, or virtual private networks, web application authentication interfaces, and SSH services. Cisco Talos experts pinpointed that these attacks have been originating from Tor exit nodes and various anonymizing tunnels and proxies since at least March 18th of 2024. The implication of these attacks are serious, potentially leading to unauthorized network access, account lockouts, or even denial of service conditions. A range of devices have come under siege, including popular VPN solutions like Cisco Secure Firewall VPN, Checkpoint, Fortinet, SonicWall, along with RD web services and brands such as Mikrotik, Draytek, and Ubiquiti. Stomp's foot on Ubiquiti. Cisco Talos has identified that the brute forcing attempts not only utilize generic credentials, but Also valid usernames tied to specific organizations, indicating a methodical approach to this cybersecurity threat. The attack traffic, as analyzed, predominantly flows through known proxy services such as TOR, VPNgate, IPDEA proxy, BigMama proxy, SpaceProxies, NexusProxy, ProxyRack, etc. And details on the IP addresses and the credentials used in these attacks have been compiled and made accessible for the concerned parties to bolster their defenses. So check out the show notes if you want more IOCs of this, so that you can maybe set up some signature detections or behavior detections, etc. In parallel to these brute force incidents, Cisco has raised alarms about password spray attacks, etc. targeting remote access VPN services as well. This trend was highlighted alongside a recent disclosure from Fortinet FortiGuard labs reporting the exploitation of a patched vulnerability in TP Link Archer AX21 routers by DDoS botnet malware facilities. Which brings us back to our SoHo days, right? If you're running one of these routers, make sure it's patched. Make sure your home router is up to date. You don't want to be getting DDoS'd by a botnet. Or you don't want to be part of the botnet that does the de tossing, excuse me. Security researchers, Cara Lin and Vincent Lee from FortiGuard Labs underscore the continuous threat posed by botnets, which exploit IOT vulnerabilities relentlessly. They strongly advise users to remain vigilant against DDoS botnets and to apply patches promptly. Cisco has provided several recommendations to mitigate the risks associated with these type of cyberattacks. These include enabling logging, okay, securing default remote access VPN profiles, and blocking connection attempts from identified malicious sources. Specific guidance involves implementing interface level ACLs using the shun command and configuring control plane ACLs to further fortify network defenses against unauthorized access attempts. Moreover, Cisco suggests considering additional hardening implementations for RAVPN, such as adopting certificate based authentication to enhance the security posture against these ongoing cyber threats. So I will definitely be taking a. Much deeper look at these IOCs for my own personal network, because yeah, this can apply to enterprises and this can apply to tech enthusiasts who set up VPNs to access their own home network. So let's, uh, not to point any fingers at myself, but that's definitely something I want to avoid being compromised. So if you're hearing this, IOCs in the show notes and let's stay ahead of this. And that's all we got for you today. Tomorrow, we're going to be releasing just a discussion episode about the key takeaways from HackspaceCon, which occurred last weekend. The two co hosts from this podcast were lucky enough to be able to attend and boy, were we inspired. So if you're interested in hacking satellites or what kind of vulnerabilities satellites have. Or other things that I never considered from a non space background. Be sure to check that episode out tomorrow.
Part 2 of our podcast with Dr. Gerald Auger who is an Adjunct Professor in the Department of Cyber and Computer Sciences at The Citadel in Charleston and a content creator and founder simplycyber.io. He really he brings Information security related content to help IT or Information Security professionals take their career further, faster. So, being a cybersecurity guru of sorts – he also spent sometime supporting DIB as a contractor.Today we chat about CMMC 2.0, the FBI issuing a alert on Russian threats targeting Ubiquiti routers, the FBI warning that China's computer attacks are at a greater scale than ever seen before, and how the US healthcare sector is a big target for ransomware attacks. Hosted on Acast. See acast.com/privacy for more information.
Sam Valencia, Jerry Zigmont and Joe Saponare discuss working with Apple technology and clients. Drawn from their combined experience of over 20 years in the Apple Consultants Network, they discuss technical support issues both with the technology and working with clients.
On this week's show: Z-Wave LR may be soon coming to DIY systems, Ubiquiti's product and software preview, Dropcam is now gone, Lifx launches some bight lights, a few questions from the mailbag, project updates and probably the best pick of the week yet.Probably.
Imagine your Ubiquiti router as an open treasure chest amidst cyber pirates—how long before it's plundered? This episode throws you a lifeline, urging IoT and critical infrastructure pros to safeguard their digital booty by updating those default credentials, stat! But it's not all about fending off Russian cyber threats; we also turn the tables with CISSP Question Thursday, sharpening your cybersecurity smarts. We dissect the anatomy of a bulletproof security policy, navigate the waters of compliance, and tailor guidelines fit for the remote access odyssey. For those mapping their course through the CISSP certification, this treasure map of insight isn't just for exam prep, it's your compass to mastering the cybersecurity seas.Hoist the sails to the cloud and set a course for the uncharted realms of security standards. This episode's horizon teems with ISO 27001 and ISO 27018—beacons of security in the nebulous cloud. You'll learn to detect anomalies with the sextant of configuration baselines and craft password management protocols as unique as your crew's roles. By charting the tricky waters of BYOD policies and weighing the merits of government-recommended frameworks, we ensure your vessel is shipshape for whatever digital squalls may come. Remember, my cyber training blueprint is your trusty first mate, here to guide you to that CISSP certification, with a trove of resources for every buccaneer, whether ye be sailing solo or with a fleet.Gain access to 30 FREE CISSP Exam Questions each and every month by going to FreeCISSPQuestions.com and sign-up to join the team for Free.
The US Department of Justice is at it again with a new team for Operation Dying Ember. Sounds spooky, right? This time it was to undertake a secret court order to remove malware from Ubiquiti devices infected by Fancy Bear. The devices in question had default administration passwords as well as remote admin access on the public Internet. The DOJ reinfected the routers with the original malware used to compromise them in the first place and then used that compromise to remove remote access and clean up the secondary payload that had been installed to turn them into a potential botnet. The DOJ said it would then notify users to do a factory reset and install the latest firmware as well as changing their admin password. There's a lot to unpack here! This and more on the Gestalt IT Rundown hosted by Tom Hollingsworth and guest Max Mortillaro. Hosts: Tom Hollingsworth: https://www.linkedin.com/in/networkingnerd/ Max Mortillaro: https://www.linkedin.com/in/maxmortillaro/ Follow Gestalt IT Website: https://www.GestaltIT.com/ Twitter: https://www.twitter.com/GestaltIT LinkedIn: https://www.linkedin.com/company/Gestalt-IT Tags: #Rundown, #Security, #AI, #DataCenters, #GenAI, #Data, @NGINX, @LockbitTeam, @GestaltIT, @NetworkingNerd, @MaxMortillaro
Try Notion AI for free at https://www.Notion.com/wan Try some unique flavors of coffee at https://lmg.gg/boneswan and use code LINUS for 20% off your first order! Looking for electronic components and equipment? Consult the specialists! Head over to https://lmg.gg/CircuitSpecialists and save 10% using code LMG Timestamps (Courtesy of NoKi1119) Note: Timing may be off due to sponsor change: 0:00 Chapters 1:07 Intro 1:38 Topic #1 - Ubisoft claims users are comfortable with not owning games 1:54 Linus lists down Ubisoft's launcher naming history 4:07 Ubisoft Classic & Premium, pricing, games published, Luke's hot take 6:02 Linus's FP exclusive interview with Terren the CEO, 7:27 Tremblay's quote, Linus mentions CDs, streaming services 13:12 Game servers that were shut down, company trust, Ubisoft's stock & finances 22:26 Linus mentions Nvidia, Intel, gambling, countries' funds, Pentagon's $52,000 trash can 30:49 Swen Vincke on the future of games, games, movies, gaming on keyboard 42:54 Topic #2 - SSD shortage expected to increase SSD prices by up to 50% 44:03 How do you deal with these shortages? ft. Linus's retired LEGO set, games 51:07 LTTStore's "The Steve" turtleneck ft. Linus's new profile picture 53:22 Linus's Steve Jobs in a past NCIX video, history of controversy 58:19 Merch Messages #1 58:50 Where is the tech industry going? Dealing with pessimism? 1:03:00 Which LMG video do you want to serve as a future resource for techies? 1:08:29 Topic #3 - Research shows search engines are getting worse 1:11:12 Luke mentions articles, Linus on site subscriptions, Wikipedia's revenue 1:18:02 Linus mentions Apple's alleged habits, Luke on its worth 1:19:21 Topic #4 - Google blames slow YouTube videos loading on extensions 1:21:04 Adblock's past buffer bug, Luke on people jumping on the hate wagon 1:24:06 Google Incognito, Canary's "more privately" change 1:26:22 Sponsors 1:31:55 Merch messages #2 1:32:01 Screen time & social media's impact on mental health? 1:33:16 Linus's favorite gadgets? ft. GamersGrass site 1:37:22 HDPLEX's 500W GaN ATX PSU, do you see GaN PSUs in the consumer market? 1:40:14 LTT laptop bag & shoulder bag update? ft. Flocking machine, cable magnetic management, backpack relationship 1:43:26 Topic #5 - Fujitsu's software causes huge blunders in UK post offices 1:49:40 Topic #6 - Haier threatens to sue home assistant plugin developer 1:55:32 Topic #7 - OpenAI's new policy change, quietly removes ban on military use 1:56:24 Topic #8 - Alexa Plus, a new model with ChatGPT 2:04:58 Topic #10 - YouTube lays off 100 employees 2:05:31 Topic #11 - AMD's Ryzen 8000G limits PCIe 40 2:07:39 Merch Messages #3 ft. dbrand sponsors WAN Show After Dark 2:09:21 Sarah Butt chose grass, dbrand non-MagSafe soon to release 2:11:30 Do you use a funky Windows login process? 2:13:26 Early days of LMG's forum & community 2:16:12 How do Linus's socks & sandals fair during the Canadian winter? 2:19:38 Future bionic augments for your body, how far will you go? 2:26:36 Tips on effectively researching products before purchase? 2:29:31 Any features you wished Wikipedia had? 2:31:28 Why can't you emulate CUDA on other hardware? 2:33:55 What would it take for a new WAN Show intro & set? 2:37:20 Alternatives for Ubiquiti? 2:38:35 If Nvidia buys ARM, do you think it can topple Intel & AMD? 2:40:47 Your opinion on the community porting Spiderman 2 to PC? 2:43:01 Progress on the water resistant ballcap? 2:43:13 Has Luke heard of TARKOV'S SPT? 2:45:43 Thoughts on algorithm-sorting network switches? 2:47:47 Advice on how to know what I'm doing as a software engineer? 2:49:48 If SE remakes Final Fantasy VI, what approach should they take? 2:51:36 Luke on making a birb-rito 2:52:18 What advice does Linus have for starting a business in 2024? 2:56:52 Any updates Linus would've done to his home network? 3:03:41 What game do you think was underhyped & overperforming this year? Which one killed the studio? 3:05:05 Outro
Si parla di uno switch Ubiquiti che si alimenta con una porta POE, di Telepass Pay come alternativa ad EasyPark, di UnipolMove come alternativa a Telepass, di come contare gli iMessage, del guasto alla caldaia di Federico intercettato grazie alla...
Free, ungated access to all 295+ episodes of “It's 5:05!” on your favorite podcast platforms: https://bit.ly/505-updates. You're welcome to
Take part in what's turning out to be the largest online Secret Santa EVER. Enroll now at https://lmg.gg/thronesecretsanta Try some unique flavors of coffee at https://lmg.gg/boneswan and use code LINUS for 20% off your first order! Looking for electronic components and equipment? Consult the specialists! Head over to https://lmg.gg/CircuitSpecialists and save 10% using code LMG Timestamps (Courtesy of NoKi1119) Note: Timing may be off due to sponsor change: 0:00 Chapters 1:31 Intro ft. RPS, putting on silicon & X's 5:02 Topic #1 - Twitch's artistic nudity policy rolled back 6:10 Twitch's quote, what was the motivation behind the policy change? 9:24 Luke on defined rules, mentions YouTube, Linus on Twitter & OnlyFans 14:01 Discussing Twitch's brand, "minor-friendly," should Twitch not budge? 17:43 Luke on Twitch's difficult discovery & traffic ft. Linus "dancing" 19:45 Luke on Twitch not being gaming centered, compares categories viewership 21:51 Luke mentions whether this should be opt-in, Linus on money & traffic 23:18 Chat tells Luke to sort by views, still finds "artistic nudity" 24:25 Luke recalls HasanAbi's PC build, Linus instantly finds NSFW on home page 27:41 Topic #2 - YouTube removes code that shows whether a channel is monetized 32:25 Linus on YouTube's algorithm, does YouTube benefit if you knew a creator was monetized? 38:44 Controversies sell, platforms are often shown as negative on news 40:56 Luke on the traffic LTT's hack brought, Linus recalls Karate Kid's car scene 45:43 Luke on trying to stay out of his phone in person, both discuss Google news 51:47 LTTStore's multipack stick locks combo 52:08 LTT backpack warranty update 53:38 LTT's precision screwdriver newsletter ft. covering pre orders 1:04:52 Merch Messages #1 1:10:50 Did Linus learn ASL? 1:19:44 Did Linus play Sea of Stars yet? ftFF6 crashes, How to Train your Dragon 3 1:32:31 Sponsors 1:37:18 Topic #3 - Epic Games wins antitrust case against Google 1:43:11 Linus on WAN Show V.S. podcasts? ft. Spotify VOD, Canadian work hours 1:50:09 Topic #4 - Tesla calls 1st amendment rights against California's DMV 1:53:57 Merch Messages #2 1:57:56 What was the most legitimate yet hard hitting viewer criticism? 2:08:14 What would happen to AMD if NVIDIA leaves the graphics market? 2:10:53 ElectroBOOM's tech upgrade LTT video 2:15:12 Game Show - Advergames! 2:16:29 Round #1: Pepsi Invaders, Dan covers its history 2:18:25 Round #2: Darkened Skye, magic through Skittles, Dan mentions fun facts 2:26:40 Round #3: Doritos Crash Course, Linus puts on the cuffs 2:34:14 Topic #5 - Overclocking AMD CPU shows warning that void warranty 2:38:43 Topic #6 - Electronic Entertainment Expo is now dead 2:40:15 Topic #7 - Ubiquiti's bug allows receiving others' security cameras 2:42:15 Topic #8 - Google to stop sharing user location history with the police 2:44:56 Topic #9 - The Day Before removed from stores 2:46:18 Merch Messages #3 ft. WAN Show After Dark, Luke forces end of show 2:48:12 When will LTT toques come back in stock? 2:50:37 Parents monitoring minors's web activity as a solution for explicit sites? 2:53:19 More LTTStore Luxe items? 2:55:25 LTT screwdriver holster update 2:57:12 What LTT product you thought was great but turned out as horrible? 2:58:40 Actions you've avoided assuming your SO's disapproval despite them not mentioning it? 3:06:09 Will teachers not be able to teach concepts due to copyright? 3:10:46 After doing LMG for a long time, what would Linus's answer be to "Who are you?" 3:11:44 TALL SHIRTS WHEN? TALL SHIRTS WHEN?? 3:13:28 If Dan's birthday coincided with the WAN Show, would you let him co-host? 3:15:09 Do you have analytics on which country buys the most LTT merch? 3:15:56 LTT screwdrivers are clean room approved, do you want to tour our fab? 3:17:22 Favorite hockey stories? 3:22:07 Linus looks at Shopify order data, looks at who is the biggest whale 3:28:13 Outro ft. Linus didn't believe he kept the silicon on all show
Apple @ Work is brought to you by Mosyle, the only Apple Unified Platform. Mosyle is the only solution that fully integrates 5 different applications on a single Apple-only platform, allowing Businesses to easily and automatically deploy, manage & protect all their Apple devices. Over 38,000 organizations leverage Mosyle solutions to automate the deployment, management, and security of millions of Apple devices daily. Request a FREE account today and discover how you can put your Apple fleet on auto-pilot at a price point that is hard to believe. In this episode of Apple @ Work, I talk with Alex Lowe from HostiFi about the state of Wi-Fi 6E, what to expect from Wi-Fi 7, and the state of the UniFi ecosystem. Show Notes What are the best management options for Ubiquiti networks? The Interface HostiFi Connect with Bradley Nostr Twitter LinkedIn Listen and subscribe Apple Podcasts Overcast Spotify Pocket Casts Castro RSS Listen to Past Episodes
Brett Terpstra, Mark Fuccio, and Patrice Brend'amour and host Chuck Joiner finish off MacVoices Holiday Gift Guide #3 with suggestions that are tech-oriented, health-oriented, and protection-oriented. (Part 2) This edition of MacVoices is supported by The MacVoices Slack. Available all Patrons of MacVoices. Sign up at Patreon.com/macvoices. Show Notes: Chapters: 0:03:02 Price update: OWC enclosure now $249 on Amazon 0:05:01 USB-C Hub: A Solution for Port Challenged Devices 0:07:10 Compact and Portable: Perfect for Traveling and Remote Work 0:07:45 Introducing Ubiquiti - Professional Network Equipment for Prosumers 0:12:35 Scalable and Flexible Networking Solution for Various Needs 0:14:30 Upgrade Your Wi-Fi Infrastructure for a Speed Boost 0:17:05 A Recommendation from DocRock: Consider Switching to Ubiquiti 0:17:23 The Dread of Yard Work 0:19:18 The Emotional Satisfaction of Burning Weeds 0:20:15 Propane tank discussion and its balance while in use. 0:29:27 Patrice's Last Pick: Fiction Book Recommendation 0:34:19 Affordable Screen Protectors for iPhone and iPad 0:35:47 Importance of Screen Protectors for iPhones and iPads 0:39:05 Quick and Easy Application of Screen Protectors 0:41:01 Game for Cats and Potential Damage to iPad Screens Links: Brett Terpstra's Picks: Better Touch Tool https://folivora.ai OWC Express 4M2 4-Slot M.2 NVMe SSD Enclosure w/ Thunderbolt3 Ports https://amzn.to/3QZd49E Elgato Stream Deck Pedal – Hands-Free Studio Controller, 3 macro footswitches, trigger actions in apps and software https://amzn.to/40DCL2J Mark Fuccio's Picks: Belkin Connect USB-C™ to 4-Port USB-C Hub, Multiport Adapter Dongle with 4 USB-C 3.2 Gen2 Ports & 100W PD with Max 10Gbps High Speed Data Transfer https://amzn.to/49BLK8G Metabolical: The Lure and the Lies of Processed Food, Nutrition, and Modern Medicine by Robert H. Lustig https://amzn.to/47yBjAN Patrice Brend'amour's Picks: Ubiquity Dream Router https://ui.com/us/cloud-gateways/dream-router Columbus Day (Expeditionary Force) by Craig Alanson https://amzn.to/3R57gvu Chuck Joiner's Picks: Flame King YSNPQ810CGA Propane Torch Weed Burner with Integrated Lighter https://amzn.to/40WD1dv amFilm Easiest Installation OneTouch for iPhone 15 Pro Max [6.7 Inch] Screen Protector Tempered Glass + Camera Lens Protector, Auto-Alignment Tech, Bubble Free, Case Friendly, Anti-Scratch https://amzn.to/3MMLk5L amFilm (2 Pack for iPad Pro 12.9 (2022, 2021, 2020, 2018) Glass Screen Protector for iPad Pro 12.9 inch, Tempered Glass, Ultra Sensitive, Face ID and Apple Pencil Compatible https://amzn.to/3ug7U0a Guests: Support: Become a MacVoices Patron on Patreon http://patreon.com/macvoices Enjoy this episode? Make a one-time donation with PayPal Connect: Web: http://macvoices.com Twitter: http://www.twitter.com/chuckjoiner http://www.twitter.com/macvoices Mastodon: https://mastodon.cloud/@chuckjoiner Facebook: http://www.facebook.com/chuck.joiner MacVoices Page on Facebook: http://www.facebook.com/macvoices/ MacVoices Group on Facebook: http://www.facebook.com/groups/macvoice LinkedIn: https://www.linkedin.com/in/chuckjoiner/ Instagram: https://www.instagram.com/chuckjoiner/ Subscribe: Audio in iTunes Video in iTunes Subscribe manually via iTunes or any podcatcher: Audio: http://www.macvoices.com/rss/macvoicesrss Video: http://www.macvoices.com/rss/macvoicesvideorss 00:03:01 Price update: OWC enclosure now $249 on Amazon 00:05:00 USB-C Hub: A Solution for Port Challenged Devices 00:07:10 Compact and Portable: Perfect for Traveling and Remote Work 00:07:44 Introducing Ubiquiti - Professional Network Equipment for Prosumers 00:12:35 Scalable and Flexible Networking Solution for Various Needs 00:14:29 Upgrade Your Wi-Fi Infrastructure for a Speed Boost 00:17:05 A Recommendation from DocRock: Consider Switching to Ubiquiti 00:17:23 The Dread of Yard Work 00:19:18 The Emotional Satisfaction of Burning Weeds 00:20:15 Propane tank discussion and its balance while in use. 00:29:26 Patrice's Last Pick: Fiction Book Recommendation 00:34:19 Affordable Screen Protectors for iPhone and iPad 00:35:46 Importance of Screen Protectors for iPhones and iPads 00:39:05 Quick and Easy Application of Screen Protectors 00:41:00 Game for Cats and Potential Damage to iPad Screens
Chris Farris, Cloud Security Nerd at PrimeHarbor Technologies, LLC, joins Corey on Screaming in the Cloud to discuss his new project, breaches.cloud, and why he feels having a centralized location for cloud security breach information is so important. Corey and Chris also discuss what it means to dive into entrepreneurship, including both the benefits of not having to work within a corporate structure and the challenges that come with running your own business. Chris also reveals what led him to start breaches.cloud, and what he's learned about some of the biggest cloud security breaches so far. About ChrisChris Farris is a highly experienced IT professional with a career spanning over 25 years. During this time, he has focused on various areas, including Linux, networking, and security. For the past eight years, he has been deeply involved in public-cloud and public-cloud security in media and entertainment, leveraging his expertise to build and evolve multiple cloud security programs.Chris is passionate about enabling the broader security team's objectives of secure design, incident response, and vulnerability management. He has developed cloud security standards and baselines to provide risk-based guidance to development and operations teams. As a practitioner, he has architected and implemented numerous serverless and traditional cloud applications, focusing on deployment, security, operations, and financial modeling.He is one of the organizers of the fwd:cloudsec conference and presented at various AWS conferences and BSides events. Chris shares his insights on security and technology on social media platforms like Twitter, Mastodon and his website https://www.chrisfarris.com.Links Referenced: fwd:cloudsec: https://fwdcloudsec.org/ breaches.cloud: https://breaches.cloud Twitter: https://twitter.com/jcfarris Company Site: https://www.primeharbor.com TranscriptAnnouncer: Hello, and welcome to Screaming in the Cloud with your host, Cloud Economist at The Duckbill Group, Corey Quinn. This weekly show features conversations with people doing interesting work in the world of cloud, thoughtful commentary on the state of the technical world, and ridiculous titles for which Corey refuses to apologize. This is Screaming in the Cloud.Corey: Welcome to Screaming in the Cloud, I'm Corey Quinn. My returning guest today is Chris Farris, now at PrimeHarbor, which is his own consultancy. Chris, welcome back. Last time we spoke, you were a Turbot, and now you've decided to go independent because you don't like sleep anymore.Chris: Yeah, I don't like sleep.Corey: [laugh]. It's one of those things where when I went independent, at least in my case, everyone thought that it was, oh, I have this grand vision of what the world could be and how I could look at these things, and that's going to just be great and awesome and everyone's going to just be a better world for it. In my case, it was, no, just there was quite literally nothing else for me to do that didn't feel like an exact reframing of what I'd already been doing for years. I'm a terrible employee and setting out on my own was important. It was the only way I found that I could wind up getting to a place of not worrying about getting fired all the time because that was my particular skill set. And I look back at it now, almost seven years in, and it's one of those things where if I had known then what I know now, I never would have started.Chris: Well, that was encouraging. Thank you [laugh].Corey: Oh, of course. And in sincerity, it's not one of those things where there's any one thing that stops you, but it's the, a lot of people get into the independent consulting dance because they want to do a thing and they're very good at that thing and they love that thing. The problem is, when you're independent, and at least starting out, I was spending over 70% of my time on things that were not billable, which included things like go and find new clients, go and talk to existing clients, the freaking accounting. One of the first hires I made was a fractional CFO, which changed my life. Up until that, my business partner and I were more or less dead reckoning of looking at the bank account and how much money is in there to determine if we could afford things. That's a very unsophisticated way of navigating. It's like driving by braille.Chris: Yeah, I think I went into it mostly as a way to define my professional identity outside of my W-2 employer. I had built cloud security programs for two major media companies and felt like that was my identity: I was the cloud security person for these companies. And so, I was like, ehh, why don't I just define myself as myself, rather than define myself as being part of a company that, in the media space, they are getting overwhelmed by change, and job security, job satisfaction, wasn't really something that I could count on.Corey: One of the weird things that I found—it's counterintuitive—is that when you're independent, you have gotten to a point where you have hit a point of sustainability, where you're not doing the oh, I'm just going to go work for 40 billable hours a week for a client. It's just like being an employee without a bunch of protections and extra steps. That doesn't work super well. But now, at the point where I'm at where the largest client we have is a single-digit percentage of revenue, I can't get fired anymore, without having a whole bunch of people suddenly turn on me because I've done something monstrous, in which case, I probably deserve not to have business anymore, or there's something systemic in the macro environment, which given that I do the media side and I do the cost-cutting side, I work on the way up, I work on the way down, I'm questioning what that looks like in a scenario that doesn't involve me hunting for food. But it's counterintuitive to people who have been employees their whole life, like I was, where, oh, it's risky and dangerous to go out on your own.Chris: It's risky and dangerous to be, you know, tied to a single, yeah, W-2 paycheck. So.Corey: Yeah. The question I'd like to ask is, how many people need to be really pissed off before you have one of those conversations with HR that doesn't involve giving you a cup of coffee? That's the tell: when you don't get coffee, it's a bad conversation.Chris: Actually, that you haven't seen [unintelligible 00:04:25] coffee these days. You don't want the cup of coffee, you know. That's—Corey: Even when they don't give you the crappy percolator navy coffee, like, midnight hobo diner style, it's still going to be a bad meeting because [unintelligible 00:04:37] pretend the coffee's palatable.Chris: Perhaps, yes. I like not having to deal with my own HR department. And I do agree that yeah, getting out of the W-2 space allows me to work on side projects that interests me or, you know, volunteer to do things like continuing the fwd:cloudsec, developing breaches.cloud, et cetera.Corey: I'll never forget, one of my last jobs I had a boss who walked past and saw me looking at Reddit and asked me if that was really the best use of my time. At first—it was in, I think, the sysadmin forum at the time, so yes, it was very much the best use of my time for the problem I was focusing on, but also, even if it wasn't, I spent an inordinate amount of time on social media, just telling stories and building audiences, on some level. That's the weird thing is that what counts as work versus what doesn't count as work gets very squishy when you're doing your own marketing.Chris: True. And even when I was a W-2 employee, I spent a lot of time on Twitter because Twitter was an intel source for us. It was like, “Hey, who's talking about the latest cloud security misconfigurations? Who's talking about the latest data breach? What is Mandiant tweeting about?” It was, you know—I consider it part of my job to be on Twitter and watching things.Corey: Oh, people ask me that. “So, you're on Twitter an awful lot. Don't you have a newsletter to write?” Like, yeah, where do you think that content comes from, buddy?Chris: Exactly. Twitter and Mastodon. And Reddit now.Corey: There's a whole argument to be had about where to find various things. For me at least, because I'm only security adjacent, I was always trying to report the news that other people had, not make the news myself.Chris: You don't want to be the one making the news in security.Corey: Speaking of, I'd like to talk a bit about what you just alluded to breaches.cloud. I don't think I've seen that come across my desk yet, which tells me that it has not been making a big splash just yet.Chris: I haven't been really announcing it; it got published the other night and so basically, yeah, is this is sort of a inaugural marketing push for breaches.cloud. So, what we're looking to do is document all the public cloud security breaches, what happened, why, and more importantly, what the companies did or didn't do that led to the security incident or the security breach.Corey: How are you slicing the difference between broad versus deep? And what I mean by that is, there are some companies where there are indictments and massive deep dives into everything that happens with timelines and blows-by-blows, and other times you wind up with the email that shows up one day of, “Security is very important to us. Now, listen to how we completely dropped the ball on it.” And it just makes the biggest description that they can get away with of what happened. Occasionally, you find out oh, it was an open S3 buckets, or they'll allude to something that sounds like it. Does that count for inclusion? Does it not? How do you make those editorial decisions?Chris: So, we haven't yet built a page around just all of the recipients of the Bucket Negligence Award. We're looking at the specific ones where there's been something that's happened that's usually involving IAM credentials—oftentimes involving IAM credentials found in GitHub—and what led to that. So, in a lot of cases, if there's a detailed company postmortem that they send their customers that said, “Hey, we goofed up, but complete transparency—” and then they hit all the bullet points of how they goofed up. Or in the case of certain others, like Uber, “Hey, we have court transcripts that we can go to,” or, “We have federal indictments,” or, “We have court transcripts, and federal indictments and FTC civil actions.” And so, we go through those trying to suss out what the company did or did not do that led to the breach. And really, the goal here is to be able to articulate as security practitioners, hey, don't attach S3 full access to this role on EC2. That's what got Capital One in trouble.Corey: I have a lot of sympathy for the Capital One breach and I wish they would talk about it more than they do, for obvious reasons, just because it was not, someone showed up and made a very obvious dumb decision, like, “Oh, that was what that giant red screaming thing in the S3 console means.” It was a series of small misconfigurations that led to another one, to another one, to another one, and eventually gets to a point where a sophisticated attacker was able to chain them all together. And yes, it's bad, yes, they're a bank and the rest, but I look at that and it's—that's the sort of exploit that you look at and it's okay, I see it. I absolutely see it. Someone was very clever, and a bunch of small things that didn't rise to the obvious. But they got dragged and castigated as if they basically had a four-character password that they'd left on the back of the laptop on a Post-It note in an airport lounge when their CEO was traveling. Which is not the case.Chris: Or all of the highlighting the fact that Paige Thompson was a former Amazon employee, making it seem like it was her insider abilities that lead to the incident, rather than she just knew that, hey, there's a metadata service and it gives me creds if I ask it.Corey: Right. That drove me nuts. There was no maleficence as an employee. And to be very direct, from what I understand of internal AWS controls, had there been, it would have been audited, flagged, caught, interdicted. I have talked to enough Amazonians that either a lot of them are lying to me very consistently despite not knowing each other, or they're being honest when they say that you can't get access to customer data using secret inside hacks.Chris: Yeah. I have reasonably good faith in AWS and their ability to not touch customer data in most scenarios. And I've had cases that I'm not allowed to talk about where Amazon has gone and accessed customer data, and the amount of rigmarole and questions and drilling that I got as a customer to have them do that was pretty intense and somewhat, actually, annoying.Corey: Oh, absolutely. And, on some level, it gets frustrating when it's a, look, this is a test account. I have nothing of sensitive value in here. I want the thing that isn't working to start working. Can I just give you a whole, like, admin-powered user account and we can move on past all of this? And their answer is always absolutely not.Chris: Yes. Or, “Hey, can you put this in our bucket?” “No, we can't even write to a public bucket or a bucket that, you know, they can share too.” So.Corey: An Amazonian had to mail me a hard drive because they could not send anything out of S3 to me.Chris: There you go.Corey: So, then I wound up uploading it back to S3 with, you know, a Snowball Edge because there's no overkill like massive overkill.Chris: No, the [snowmobile 00:11:29] would have been the massive overkill. But depending on where you live, you know, you might not have been able to get a permit to park the snowmobile there.Corey: They apparently require a loading dock. Same as with the outposts. I can't fake having one of those on my front porch yet.Chris: Ah. Well, there you go. I mean, you know it's the right height though, and you don't mind them ruining your lawn.Corey: So, help me understand. It makes sense to me at least, on some level, why having a central repository of all the various cloud security breaches in one place that's easy to reference is valuable. But what caused you to decide, you know, rather than saying it'd be nice to have, I'm going to go build that thing?Chris: Yeah, so it was actually right before the last time we spoke, Nicholas Sharp was indicted. And there was like, hey, this person was indicted for, you know, this cloud security case. And I'm like, that name rings a bell, but I don't remember who this person was. And so, I kind of realized that there's so many of these things happening now that I forget who is who. And so, when a new piece of news comes along, I'm like, where did this come from and how does this fit into what my knowledge of cloud security is and cloud security cases?So, I kind of realized that these are all running together in my mind. The Department of Justice only referenced ‘Company One,' so it wasn't clear to me if this even was a new cloud incident or one I already knew about. And so basically, I decided, okay, let's build this. Breaches.cloud was available; I think I kind of got the idea from hackingthe.cloud.And I had been working with some college students through the Collegiate Cyber Defense Competition, and I was like, “Hey, anybody want a spring research project that I will pay you for?” And so yeah, PrimeHarbor funded two college students to do quite a bit of the background research for me, I mentored them through, “Hey, so here's what this means,” and, “Hey, have we noticed that all of these seem to relate to credentials found in GitHub? You know, maybe there's a pattern here.” So, if you're not yet scanning for secrets in GitHub, I recommend you start scanning for secrets in your GitHub, private and public repos.Corey: Also, it makes sense to look at the history. Because, oh, I committed a secret. I'm going to go ahead and revert that commit and push that. That solves the problem, right?Chris: No, no, it doesn't. Yes, apparently, you can force push and delete an entire commit, but you really want to use a tool that's going to go back through the commit history and dig through it because as we saw in the Uber incident, when—the second Uber incident, the one that led to the CSOs conviction—yeah, the two attackers, [unintelligible 00:14:09] stuffed a Uber employee's personal GitHub account that they were also using for Uber work, and yeah, then they dug through all the source code and dug through the commit histories until they found a set of keys, and that's what they used for the second Uber breach.Corey: Awful when that hits. It's one of those things where it's just… [sigh], one thing leads to another leads to another. And on some level, I'm kind of amazed by the forensics that happen around all of these things. With the counterpoint, it is so… freakishly difficult, I think, for lack of a better term, just to be able to say what happened with any degree of certainty, so I can't help but wonder in those dark nights when the creeping dread starts sinking in, how many things like this happen that we just never hear about because they don't know?Chris: Because they don't turn on CloudTrail. Probably a number of them. Once the data gets out and shows up on the dark web, then people start knocking on doors. You know, Troy Hunt's got a large collection of data breach stuff, and you know, when there's a data breach, people will send him, “Hey, I found these passwords on the dark web,” and he loads them into Have I Been Pwned, and you know, [laugh] then the CSO finds out. So yeah, there's probably a lot of this that happens in the quiet of night, but once it hits the dark web, I think that data starts becoming available and the victimized company finds out.Corey: I am profoundly cynical, in case that was unclear. So, I'm wondering, on some level, what is the likelihood or commonality, I suppose, of people who are fundamentally just viewing security breach response from a perspective of step one, make sure my resume is always up to date. Because we talk about these business continuity plans and these DR approaches, but very often it feels like step one, secure your own mask before assisting others, as they always say on the flight. Where does personal preservation come in? And how does that compare with company preservation?Chris: I think down at the [IaC 00:16:17] level, I don't know of anybody who has not gotten a job because they had Equifax on their resume back in, what, 2017, 2018, right? Yes, the CSO, the CEO, the CIO probably all lost their jobs. And you know, now they're scraping by book deals and speaking engagements.Corey: And these things are always, to be clear, nuanced. It's rare that this is always one person's fault. If you're a one-person company, okay, yeah, it's kind of your fault, let's be clear here, but there are controls and cost controls and audit trails—presumably—for all of these things, so it feels like that's a relatively easy thing to talk around, that it was a process failure, not that one person sucked. “Well, didn't you design and implement the process?” “Yes. But it turned out there were some holes in it and my team reported that those weren't there and it turned out that they were and, well, live and learn.” It feels like that's something that could be talked around.Chris: It's an investment failure. And again, you know, if we go back to Harry Truman, “The buck stops here,” you know, it's the CEO who decides that, hey, we're going to buy a corporate jet rather than buy a [SIIM 00:17:22]. And those are the choices that happen at the top level that define, do you have a capable security team, and more importantly, do you have a capable security culture such that your security team isn't the only ones who are actually thinking about security?Corey: That's, I guess, a fair question. I saw a take on Twitter—which is always a weird thing—or maybe was Blue-ski or somewhere else recently, that if you don't have a C-level executive responsible for security with security in their title, your company does not take security seriously. And I can see that past a certain point of scale, but as a one-person company, do you have a designated CSO?Chris: As a one-person company and as a security company, I sort of do have a designated CSO. I also have, you know, the person who's like, oh, I'm going to not put MFA on the root of this one thing because, while it's an experiment and it's a sandbox and whatever else, but I also know that that's not where I'm going to be putting any customer data, so I can measure and evaluate the risk from both a security perspective and a business existential investment perspective. When you get to the larger the organization, the more detached the CEO gets from the risk and what the company is building and what the company is doing, is where you get into trouble. And lots of companies have C-level somebody who's responsible for security. It's called the CSO, but oftentimes, they report four levels down, or even more, from the chief executive who is actually the one making the investment decisions.Corey: On some level, the oh yeah, that's my responsibility, too, but it feels like it's a trap that falls into. Like, well, the CTO is responsible for security at a publicly traded company. Like, well… that tends to not work anymore, past certain points of scale. Like when I started out independently, yes, I was the CSO. I was also the accountant. I was also the head of marketing. I was also the janitor. There's a bunch of different roles; we all wear different hats at different times.I'm also not a big fan of shaming that oh, yeah. This is a universal truth that applies to every company in existence. That's also where I think Twitter started to go wrong where you would get called out whenever making an observation or witticism or whatnot because there was some vertex case to which it did not necessarily apply and then people would ‘well, actually,' you to death.Chris: Yeah. Well, and I think there's a lot of us in the security community who are in the security one-percenters. We're, “Hey, yes, I'm a cloud security person on a 15-person cloud security team, and here's this awesome thing we're doing.” And then you've got most of the other companies in this country that are probably below the security poverty line. They may or may not have a dedicated security person, they certainly don't have a SIIM, they certainly don't have anybody who's monitoring their endpoints for malware attacks or anything else, and those are the companies that are getting hit all the time with, you know, a lot of this ransomware stuff. Healthcare is particularly vulnerable to that.Corey: When you take a look across the industry, what is it that you're doing now at PrimeHarbor that you feel has been an unmet need in the space? And let me be clear, as of this recording earlier today, we signed a contract with you for a project. There's more to come on that in the future. So, this is me asking you to tell a story, not challenging, like, what do you actually do? This is not a refund request, let's be very clear here. But what's the unmet need that you saw?Chris: I think the unmet need that I see is we don't talk to our builder community. And when I say builder, I mean, developers, DevOps, sysadmins, whatever. AWS likes the term builder and I think it works. We don't talk to our builder community about risk in a way that makes sense to them. So, we can say, “Hey, well, you know, we have this security policy and section 24601 says that all data's classifications must be signed off by the data custodian,” and a developer is going to look at you with their head tilted, and be like, “Huh? What? I just need to get the sprint done.”Whereas if we can articulate the risk—and one of the reasons I wanted to do breaches.cloud was to have that corpus of articulated risk around specific things—I can articulate the risk and say, “Hey, look, you know how easy it is for somebody to go in and enumerate an S3 bucket? And then once they've enumerated and guessed that S3 bucket exists, they list it, and oh, hey, look, now that they've listed it, they know all of the objects and all of the juicy PII that you just made public.” If you demonstrate that to them, then they're going to be like, “Oh, I'm going to add the extra story point to this story to go figure out how to do CloudFront origin access identity.” And now you've solved, you know, one more security thing. And you've done in a way that not just giving a man a fish or closing the bucket for them, but now they know, hey, I should always use origin access identity. This is why I need to do this particular thing.Corey: One of the challenges that I've seen in a variety of different sites that have tried to start cataloging different breaches and other collections of things happening in public is the discoverability or the library management problem. The most obvious example of this is, of course, the AWS console itself, where when it paginates things like, oh, there are 3000 things here, ten at a time, through various pages for it. Like, the marketplace is just a joke of discoverability. How do you wind up separating the stuff that is interesting and notable, rather than, well, this has about three sentences to it because that's all the company would say?Chris: So, I think even the ones where there's three sentences, we may actually go ahead and add it to the repo, or we may just hold it as a draft, so that we know later on when, “Hey, look, here's a federal indictment for Company Three. Oh, hey, look. Company Three was actually this breach announcement that we heard about three months ago,” or even three years ago. So like, you know, Chegg is a great example of, you know, one of those where, hey, you know, there was an incident, and they disclosed something, and then, years later, FTC comes along and starts banging them over the head. And in the FTC documentation, or in the FTC civil complaint, we got all sorts of useful data.Like, not only were they using root API keys, every contractor and employee there was sharing the root API keys, so when they had a contractor who left, it was too hard to change the keys and share it with everybody, so they just didn't do that. The contractor still had the keys, and that was one of the findings from the FTC against Chegg. Similar to that, Cisco didn't turn off contractors' access, and I think—this is pure speculation—I think the poor contractor one day logged into his Google Cloud Shell, cd'ed into a Terraform directory, ran ‘terraform destroy', and rather than destroying what he thought he was destroying, it had the access keys back to Cisco WebEx and took down 400 EC2 instances that made up all of WebEx. These are the kinds of things that I think it's worth capturing because the stories are going to come out over time.Corey: What have you seen in your, I guess, so far, a limited history of curating this that—I guess, first what is it you've learned that you've started seeing as far as patterns go, as far as what warrants inclusion, what doesn't, and of course, once you started launching and going a bit more public with it, I'm curious to hear what the response from companies is going to be.Chris: So, I want to be very careful and clear that if I'm going to name somebody, that we're sourcing something from the criminal justice system, that we're not going to say, “Hey, everybody knows that it was Paige Thompson who was behind it.” No, no, here's the indictment that said it was Paige Thompson that was, you know, indicted for this Capital One sort of thing. All the data that I'm using, it all comes from public sources, it's all sited, so it's not like, hey, some insider said, “Hey, this is what actually happened.” You know? I very much learned from the Ubiquiti case that I don't want to be in the position of Brian Krebs, where it's the attacker themselves who's updating the site and telling us everything that went wrong, when in fact, it's not because they're in fact the perpetrator.Corey: Yeah, there's a lot of lessons to be learned. And fortunately, for what it's s—at least it seems… mostly, that we've moved past the battle days of security researchers getting sued on a whim from large companies for saying embarrassing things about them. Of course, watch me be tempting fate and by the time this publishes, I'll get sued by some company, probably Azure or whatnot, telling me that, “Okay, we've had enough of you saying bad things about our security.” It's like, well, cool, but I also read the complaint before you file because your security is bad. Buh-dum-tss. I'm kidding. I'm kidding. Please don't sue me.Chris: So, you know, whether it's slander or libel, depending on whether you're reading this or hearing it, you know, truth is an actual defense, so I think Microsoft doesn't have a case against you. I think for what we're doing in breaches, you know—and one of the reasons that I'm going to be very clear on anybody who contributes—and just for the record, anybody is welcome to contribute. The GitHub repo that runs breaches.cloud is public and anybody can submit me a pull request and I will take their write-ups of incidents. But whatever it is, it has to be sourced.One of the things that I'm looking to do shortly, is start soliciting sponsorships for breaches so that we can afford to go pull down the PACER documents. Because apparently in this country, while we have a right to a speedy trial, we don't have a right to actually get the court transcripts for less than ten cents a page. And so, part of what we need to do next is download those—and once we've purchased them, we can make them public—download those, make them public, and let everybody see exactly what the transcript was from the Capital One incident, or the Joey Sullivan trial.Corey: You're absolutely right. It drives me nuts that I have to wind up budgeting money for PACER to pull up court records. And at ten cents a page, it hasn't changed in decades, where it's oh, this is the cost of providing that data. It's, I'm not asking someone to walk to the back room and fax it to me. I want to be very clear here. It just feels like it's one of those areas where the technology and government is not caught up and it's—part of the problem is, of course, having no competition.Chris: There is that. And I think I read somewhere that the ent—if you wanted to download the entire PACER, it would be, like, $100 million. Not that you would do that, but you know, it is the moneymaker for the judicial system, and you know, they do need to keep the lights on. Although I guess that's what my taxes are for. But again, yes, they're a monopoly; they can do that.Corey: Wildly frustrating, isn't it?Chris: Yeah [sigh]… yeah, yeah, yeah. Yeah, I think there's a lot of value in the court transcripts. I've held off on publishing the Capital One case because one, well, already there's been a lot of ink spilled on it, and two, I think all the good detail is going to be in the trial transcripts from Paige Thompson's trial.Corey: So, I am curious what your take is on… well, let's called the ‘FTX thing.' I don't even know how to describe it at this point. Is it a breach? Is it just maleficence? Is it 15,000 other things? But I noticed that it's something that breaches.cloud does talk about a bit.Chris: Yeah. So, that one was a fascinating one that came out because as I was starting this project, I heard you know, somebody who was tweeting was like, “Hey, they were storing all of the crypto private keys in AWS Secrets Manager.” And I was like, “Errr?” And so, I went back and I read John J. Ray III's interim report to the creditors.Now, John Ray is the man who was behind the cleaning up of Enron, and his comment was “FTX is the”—“Never in my career have I seen such a complete failure of corporate controls and such a complete absence of trustworthy information as occurred here.” And as part of his general, broad write-up, they went into, in-depth, a lot of the FTX AWS practices. Like, we talk about, hey, you know, your company should be multi-account. FTX was worse. They had three or four different companies all operating in the same AWS account.They had their main company, FTX US, Alameda, all of them had crypto keys in Secrets Manager and there was no access control between any of those. And what ended up happening on the day that SBF left and Ray came in as CEO, the $400 million worth of crypto somehow disappeared out of FTX's wallets.Corey: I want to call this out because otherwise, I will get letters from the AWS PR spin doctors. Because on the surface of it, I don't know that there's necessarily a lot wrong with using Secrets Manager as the backing store for private keys. I do that with other things myself. The question is, what other controls are there? You can't just slap it into Secrets Manager and, “Well, my job is done. Let's go to lunch early today.”There are challenges [laugh] around the access levels, there are—around who has access, who can audit these things, and what happens. Because most of the secrets I have in Secrets Manager are not the sort of thing that is, it is now a viable strategy to take that thing and abscond to a country with a non-extradition treaty for the rest of my life, but with private keys and crypto, there kind of is.Chris: That's it. It's like, you know, hey, okay, the RDS database password is one thing, but $400 million in crypto is potentially another thing. Putting it in and Secrets Manager might have been the right answer, too. You get KMS customer-managed keys, you get full auditability with CloudTrail, everything else, but we didn't hear any of that coming out of Ray's report to the creditors. So again, the question is, did they even have CloudTrail turned on? He did explicitly say that FTX had not enabled GuardDuty.Corey: On some level, even if GuardDuty doesn't do anything for you, which in my case, it doesn't, but I want to be clear, you should still enable it anyway because you're going to get dragged when there's inevitable breach because there's always a breach somewhere, and then you get yelled at for not having turned on something that was called GuardDuty. You already sound negligent, just with that sentence alone. Same with Security Hub. Good name on AWS's part if you're trying to drive service adoption. Just by calling it the thing that responsible people would use, you will see adoption, even if people never configure or understand it.Chris: Yeah, and then of course, hey, you had Security Hub turned on, but you ignore the 80,000 findings in it. Why did you ignore those 80,000 findings? I find Security Hub to probably be a little bit too much noise. And it's not Security Hub, it's ‘Compliance Hub.' Everything—and I'm going to have a blog post coming out shortly—on this, everything that Security Hub looks at, it looks at it from a compliance perspective.If you look at all of its scoring, it's not how many things are wrong; it's how many rules you are a hundred percent compliant to. It is not useful for anybody below that AWS security poverty line to really master or to really operationalize.Corey: I really want to thank you for taking the time to catch up with me once again. Although now that I'm the client, I expect I can do this on demand, which is just going to be delightful. If people want to learn more, where can they find you?Chris: So, they can find breaches.cloud at, well https://breaches.cloud. If you're looking for me, I am either on Twitter, still, at @jcfarris, or you can find me and my consulting company, which is www.primeharbor.com.Corey: And we will, of course, put links to all of that in the [show notes 00:33:57]. Thank you so much for taking the time to speak with me. As always, I appreciate it.Chris: Oh, thank you for having me again.Corey: Chris Farris, cloud security nerd at PrimeHarbor. I'm Cloud Economist Corey Quinn and this is Screaming in the Cloud. If you've enjoyed this podcast, please leave a five-star review on your podcast platform of choice, whereas if you've hated this podcast, please leave a five-star review on your podcast platform of choice, along with an angry, insulting comment that you're also going to use as the storage back-end for your private keys.Corey: If your AWS bill keeps rising and your blood pressure is doing the same, then you need The Duckbill Group. We help companies fix their AWS bill by making it smaller and less horrifying. The Duckbill Group works for you, not AWS. We tailor recommendations to your business and we get to the point. Visit duckbillgroup.com to get started.
Last week in security news: The ex-Ubiquiti engineer who stole a giant pile of their data gets a six year prison term, Bitbucket will be updating their SSH host keys, AWS Reported a GuardDuty Finding Issue, and more!Links: The ex-Ubiquiti engineer who stole a giant pile of their data gets a six year prison term Bitbucket will be updating their SSH host keys Google has decided to free up inactive accounts after two years. Okay, that's their policy, but then they have the audacity to lie to our faces and say it's for "security." I have a bunch of Wemo devices at home that control lights. I found out that they've got a buffer overflow that Wemo "will not be fixing" because the devices are end of life. AWS Reported a GuardDuty Finding Issue The tool of the week: IAMbic lets you tailor AWS Identity Center permissions per account.
Take a Network Break! This week we cover some follow-up on Lumen. Then we dive into a massive Cisco blunder that let a digital certificate expire on some models of the Viptela SD-WAN appliance, causing device failures. Extreme Networks release a new Wi-Fi 6e AP and core and aggregation switches, a Ubiquiti employee who stole... Read more »
Take a Network Break! This week we cover some follow-up on Lumen. Then we dive into a massive Cisco blunder that let a digital certificate expire on some models of the Viptela SD-WAN appliance, causing device failures. Extreme Networks release a new Wi-Fi 6e AP and core and aggregation switches, a Ubiquiti employee who stole […] The post Network Break 430: Cisco Viptela Customers Have A Certifiably Bad Day; IT Crimes And Punishments appeared first on Packet Pushers.
Take a Network Break! This week we cover some follow-up on Lumen. Then we dive into a massive Cisco blunder that let a digital certificate expire on some models of the Viptela SD-WAN appliance, causing device failures. Extreme Networks release a new Wi-Fi 6e AP and core and aggregation switches, a Ubiquiti employee who stole... Read more »
Take a Network Break! This week we cover some follow-up on Lumen. Then we dive into a massive Cisco blunder that let a digital certificate expire on some models of the Viptela SD-WAN appliance, causing device failures. Extreme Networks release a new Wi-Fi 6e AP and core and aggregation switches, a Ubiquiti employee who stole […] The post Network Break 430: Cisco Viptela Customers Have A Certifiably Bad Day; IT Crimes And Punishments appeared first on Packet Pushers.
Take a Network Break! This week we cover some follow-up on Lumen. Then we dive into a massive Cisco blunder that let a digital certificate expire on some models of the Viptela SD-WAN appliance, causing device failures. Extreme Networks release a new Wi-Fi 6e AP and core and aggregation switches, a Ubiquiti employee who stole... Read more »
Take a Network Break! This week we cover some follow-up on Lumen. Then we dive into a massive Cisco blunder that let a digital certificate expire on some models of the Viptela SD-WAN appliance, causing device failures. Extreme Networks release a new Wi-Fi 6e AP and core and aggregation switches, a Ubiquiti employee who stole […] The post Network Break 430: Cisco Viptela Customers Have A Certifiably Bad Day; IT Crimes And Punishments appeared first on Packet Pushers.
On this week's show Patrick Gray and Adam Boileau discuss the week's security news, including: Unpatched ESXi boxes are getting rinsed GoAnywhere MFT file transfer boxes are too Royal Mail data being ransomed by Lockbit Advanced materials manufacturer and finance company among latest rware victims Guilty plea in Ubiquiti case Much, much more This week's show is brought to you by Red Canary. Red Canary's Adam Mashinchi is this week's sponsor guest. He joins us to talk about the impact layoffs are having on infosec teams. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes Risky Biz News: Ransomware wave hits thousands of VMWare ESXi servers Risky Biz News: Zero-day alert for GoAnywhere file transfer servers Royal Mail faces threat from ransomware group LockBit | Reuters ION brings clients back online after ransomware attack: Source | Business Insurance Hackers who breached ION say ransom paid; company declines comment | Reuters Blow to Morgan Advanced Materials as cyber-attack to cost millions to deal with | Evening Standard K-12 schools in Tucson, Nantucket respond to cyberattacks - The Record from Recorded Future News Ransomware gang attempts to extort UK school by posting files about at-risk children - The Record from Recorded Future News British steel industry supplier Vesuvius ‘currently managing cyber incident' - The Record from Recorded Future News Tallahassee hospital diverting patients, canceling non-emergency surgeries after cyberattack - The Record from Recorded Future News All classes canceled at Irish university as it announces ‘significant IT breach' - The Record from Recorded Future News Switzerland's largest university confirms ‘serious cyberattack' - The Record from Recorded Future News Dutch Police Read Messages of Encrypted Messenger 'Exclu' Julius 'zeekill' Kivimäki, former Lizard Squad hacker, arrested in France - The Record from Recorded Future News New York attorney general fines developer of stalking apps - The Record from Recorded Future News Microsoft alleges attacks on French magazine came from Iranian-backed group | Ars Technica Hackers linked to North Korea targeted Indian medical org, energy sector - The Record from Recorded Future News Google Cuts Company Protecting People From Surveillance To A ‘Skeleton Crew,' Say Laid Off Workers Feds get guilty plea in Ubiquiti data extortion case - The Record from Recorded Future News For Hire: Ex-Ubiquiti Developer Charged With Extortion Microsoft notifies UK customers affected by hackers abusing ‘verified publisher' tag - The Record from Recorded Future News Darknet drug market BlackSprut openly advertises on billboards in Moscow - The Record from Recorded Future News Toyota sealed up a backdoor to its global supplier management network | The Daily Swig
On this week's show Patrick Gray and Adam Boileau discuss the week's security news, including: Unpatched ESXi boxes are getting rinsed GoAnywhere MFT file transfer boxes are too Royal Mail data being ransomed by Lockbit Advanced materials manufacturer and finance company among latest rware victims Guilty plea in Ubiquiti case Much, much more This week's show is brought to you by Red Canary. Red Canary's Adam Mashinchi is this week's sponsor guest. He joins us to talk about the impact layoffs are having on infosec teams. Links to everything that we discussed are below and you can follow Patrick or Adam on Mastodon if that's your thing. Show notes Risky Biz News: Ransomware wave hits thousands of VMWare ESXi servers Risky Biz News: Zero-day alert for GoAnywhere file transfer servers Royal Mail faces threat from ransomware group LockBit | Reuters ION brings clients back online after ransomware attack: Source | Business Insurance Hackers who breached ION say ransom paid; company declines comment | Reuters Blow to Morgan Advanced Materials as cyber-attack to cost millions to deal with | Evening Standard K-12 schools in Tucson, Nantucket respond to cyberattacks - The Record from Recorded Future News Ransomware gang attempts to extort UK school by posting files about at-risk children - The Record from Recorded Future News British steel industry supplier Vesuvius ‘currently managing cyber incident' - The Record from Recorded Future News Tallahassee hospital diverting patients, canceling non-emergency surgeries after cyberattack - The Record from Recorded Future News All classes canceled at Irish university as it announces ‘significant IT breach' - The Record from Recorded Future News Switzerland's largest university confirms ‘serious cyberattack' - The Record from Recorded Future News Dutch Police Read Messages of Encrypted Messenger 'Exclu' Julius 'zeekill' Kivimäki, former Lizard Squad hacker, arrested in France - The Record from Recorded Future News New York attorney general fines developer of stalking apps - The Record from Recorded Future News Microsoft alleges attacks on French magazine came from Iranian-backed group | Ars Technica Hackers linked to North Korea targeted Indian medical org, energy sector - The Record from Recorded Future News Google Cuts Company Protecting People From Surveillance To A ‘Skeleton Crew,' Say Laid Off Workers Feds get guilty plea in Ubiquiti data extortion case - The Record from Recorded Future News For Hire: Ex-Ubiquiti Developer Charged With Extortion Microsoft notifies UK customers affected by hackers abusing ‘verified publisher' tag - The Record from Recorded Future News Darknet drug market BlackSprut openly advertises on billboards in Moscow - The Record from Recorded Future News Toyota sealed up a backdoor to its global supplier management network | The Daily Swig
In this supper club episode of Syntax, Wes and Scott recorded a live open table episode with guests calling in to talk about Wasm, building Riverside.fm, home networking, getting a job at Microsoft, Svelte and Sveltekit, htmx, and more! Auth0 - Sponsor Auth0 is the easiest way for developers to add authentication and secure their applications. They provides features like user management, multi-factor authentication, and you can even enable users to login with device biometrics with something like their fingerprint. Not to mention, Auth0 has SDKs for your favorite frameworks like React, Next.js, and Node/Express. Make sure to sign up for a free account and give Auth0 a try with the link below. https://a0.to/syntax Appwrite - Sponsor Appwrite is a self-hosted backend-as-a-service platform that provides developers with all the core APIs required to build any application. Get free cloud credits by signing up for early access to the Appwrite Cloud launch! Show Notes 00:30 Welcome 01:49 Safari aspect ratio bug 04:17 Thoughts on Vercel announcements? NextJS Conf 10:07 Gideon Riverside CTO Riverside.fm Careers 14:44 Do JS devs need to branch out? 16:52 Wasm Web Assembly (WASM) Rustlings 19:46 Sponsor: Auth0 21:03 Which company will Vercel aquire next? Guillermo Rauch Akamai Acquires Linode 27:12 Svelte Kit and Vercel 30:20 Why don't you terminate your own ethernet cables? 30:58 How does Fly.io compare to Vercel? Fly.io 31:36 Did Wes learn Vue? 32:10 Brad jumping on the Remix train Remix 34:18 Layout shift caused by images in Markdown 38:30 Maintaining home networking Ubiquiti 44:44 Taking a course lead to a job with Microsoft Soumya's YouTube - Geekysrm / website / Twitter 47:38 Sponsor: Appwrite 48:39 Are you still using your Synology NAS? Synology 53:53 Is Svelte ready for smaller team projects? Svelte Kit Wyze 56:03 HTMX htmx Alpine.js 01:49 Docker Wasm preview Introducing the Docker+Wasm Technical Preview WebAssembly System Interface Tweet us your tasty treats Scott's Instagram LevelUpTutorials Instagram Wes' Instagram Wes' Twitter Wes' Facebook Scott's Twitter Make sure to include @SyntaxFM in your tweets