POPULARITY
Categories
Episode 149: In this episode of Critical Thinking - Bug Bounty Podcast The DEFCON videos are up, and Justin and Joseph talk through some of their favorites.Follow us on XGot any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!====== Links ======Follow your hosts Rhynorater, rez0 and gr3pme on X: ====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.You can also find some hacker swag at https://ctbb.show/merch!====== Resources ======Unicode surrogates conversionPrompt. Scan. ExploitBreaking into thousands of cloud based VPNs with 1 bugExamining Access Control Vulnerabilities in GraphQLSmart Bus Smart HackingPasskeys PwnedBypassing Intent Destination ChecksGemini Agents in Google CalendarExploitation of DOM Clobbering Vuln at ScaleTheHulkSmart Devices, Dumb ResetsMac PRT Cookie Theft====== Timestamps ======(00:00:00) Introduction(00:10:10) Prompt. Scan. Exploit(00:23:52) Breaking into thousands of cloud based VPNs with 1 bug(00:33:25) Access Control Vulns in GraphQL, Smart Bus Hacking, & Passkeys Pwned(00:44:10) Bypassing Intent Destination Checks & Invoking Gemini Agents(00:57:08) DOM Clobbering, Mac PRT Cookie Theft, & Smart Devices, Dumb Resets
Dr. Christoph Sorg is a social scientist at the Humboldt University of Berlin. He researches theories of capitalism and post-capitalism and the new debate on economic planning in times of digitalization and the climate crisis.During the interview we spoke about his work around understanding economic planning and his recent publication Finance as a form of economic planning. His work shows how even in the free market capitalism we live in today, there is actually a significant amount of planning, it's just that the planning is for facilitating capitalist economies, the neoliberal paradox.As the co-founder of projects like Bread Cooperative where we are trying to build out apps that facilitate post-capitalist economic relations, I think it's important for us to properly understand the current state of capitalism so that we know the kind of meaningful interventions we could make. This episode is sponsored by NYM, the world's most private VPN. Unlike traditional VPNs, Nym uses a decentralized mixnet to scramble your internet data — hiding who you're talking to, when, and how often. You can switch between full mixnet mode for maximum anonymity, or a faster VPN mode for everyday use.Use the code blockchainsocialist when signing up and get an extra month!If you liked the podcast be sure to give it a review on your preferred podcast platform. If you find content like this important consider donating to my Patreon starting at just $3 per month. It takes quite a lot of my time and resources so any amount helps. Follow me on Twitter (@TBSocialist) or Mastodon (@theblockchainsocialist@social.coop) and join the r/CryptoLeftists subreddit.Support the showICYMI I've written a book about, no surprise, blockchains through a left political framework! The title is Blockchain Radicals: How Capitalism Ruined Crypto and How to Fix It and is being published through Repeater Books, the publishing house started by Mark Fisher who's work influenced me a lot in my thinking. The book is officially published and you use this linktree to find where you can purchase the book based on your region / country.
Ya sea que gestiones una instancia de Syncthing, un backend de Obsidian con Docker, o tu proxy inverso con Traefik, sabes que la necesidad de revisar logs o reiniciar un contenedor puede surgir en cualquier momento. La solución habitual es la Terminal SSH, lo que te obliga a sacar el portátil o lidiar con interfaces incómodas en el móvil.En este episodio, te presento Docker Manager, una aplicación gratuita y open source construida con Flutter y un hermoso diseño Material Design. Esta herramienta es tu centro de comando definitivo para Docker, diseñado específicamente para pantallas pequeñas, permitiéndote abandonar el tedio del SSH para el 99% de las tareas diarias. Es una solución de productividad pura, muy en la línea de lo que buscamos en atareao con Linux: soluciones prácticas para "cualquier cosa que quieras hacer con Linux".Este episodio es un tutorial práctico paso a paso para que puedas poner Docker Manager en marcha y sacarle el máximo partido:Conexión Segura Multiserver: Explicaremos detalladamente cómo configurar la conexión a múltiples hosts Linux (VPS, Raspberry Pi, máquinas virtuales) y por qué debes utilizar la autenticación por clave privada SSH para mantener tu infraestructura segura. La app se integra perfectamente con tu pila de red móvil, lo que significa que funciona sin problemas a través de VPNs como WireGuard o Tailscale.Control Total de Contenedores: La facilidad para realizar operaciones esenciales: Start, Stop, Restart, Inspect y Remove con un solo toque. Haremos hincapié en el filtrado por Docker Compose Stacks, esencial para quien gestiona múltiples servicios como bases de datos o instancias de Rust alojadas en contenedores.Diagnóstico Avanzado en Movimiento:Logs en Vivo: Revisar los logs en tiempo real es vital para el debugging de emergencia.Estadísticas del Contenedor: Ver el uso de CPU y memoria al instante para identificar cuellos de botella.Shell Interactivo: La característica estrella. Te mostraremos cómo iniciar un shell (bash) dentro de un contenedor o en el host Linux mismo. Esto te da la libertad de usar herramientas como redis-cli o revisar configuraciones rápidas sin abrir un cliente SSH.Mantenimiento y Limpieza del Sistema: Analizaremos la función System Cleanup (Pruning) para deshacernos de esas imágenes y volúmenes "colgantes" que roban espacio.Gestión de Imágenes, Redes y Volúmenes: Un vistazo a cómo la aplicación simplifica la visualización y gestión de estos componentes clave de Docker. Incluso hablaremos de la flexibilidad para configurar el Docker CLI Path, lo que abre la puerta a la gestión de Podman también.Docker Manager es una herramienta indispensable que libera tu escritorio Linux y te da el poder de administración en tu bolsillo. Ya no tendrás que interrumpir tu flujo de trabajo en Neovim o cerrar tu sesión de escritorio GNOME para hacer una comprobación rápida. Es la solución perfecta para mantener tus servicios (desde un servidor web hasta una instancia de Obsidian) funcionando sin problemas 24/7.Más información y enlaces en las notas del episodio
Have you ever wondered what happens when the browser stops being a simple window to the web and starts becoming the control point for how AI touches every part of enterprise life? That was the starting point for my conversation with Michael Shieh, founder and CEO of Mammoth Cyber. What followed was a detailed look at why the browser is turning into the foundation of enterprise AI and why the shift is arriving faster than many expect. Michael shared why employees already spend most of their working lives inside a browser and how this makes it the natural place for AI to support decisions, speed up routine work, and act as the interface between people, applications, and data. But we also spoke about the uncomfortable reality behind that convenience. When consumer AI browsers rush ahead with features that harvest data or request wide-reaching permissions, the trade off between speed and governance becomes harder to ignore. Michael explained how this gap leaves security teams unable to see where sensitive data is being sent or how shadow AI creeps into daily workflows without oversight. During our conversation he broke down what makes an enterprise AI browser different. We talked about policy controlled access, device trust, identity federation, and the safeguards that protect AI from hazards like indirect prompt injection. Michael also described how the Mammoth team built a multi layer security model that monitors what the AI can view, what it cannot view, and how data moves across applications in real time. His examples of DLP at the point of use, low friction controls for workers, and granular visibility for security teams showed how the browser is becoming the new enforcement boundary for zero trust. We also covered the growing tension between traditional access models like VPNs or VDI and the faster, lightweight deployment Mammoth is offering to large enterprises. Hearing Michael explain how some customers replaced heavy remote access stacks in weeks made it clear that this is more than a new product category. It hints at an early move toward AI shaped workflows running directly at the endpoint rather than through centralised infrastructure. As he looked ahead to the next few years, Michael shared why he expects the browser to operate as a kind of operating system for enterprise AI, blending native AI agents, web apps, and policy controls into a single environment. This episode raises an important question. If the browser becomes the place where AI reads, writes, and interprets information, how should enterprises think about identity, trust, and control when the pace of AI adoption accelerates again next year? I would love to hear your thoughts.
Tựa Đề: Đấng Christ Là Con Của Ai?; Kinh Thánh: Ma-thi-ơ 22:41-46; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Connect users to on-premises resources while enforcing Conditional Access policies, including MFA, and eliminate the need for VPNs using Secure Access Service Edge with Microsoft Entra. Route authentication through Microsoft Entra before granting resource access, even within legacy on-premises systems. Boost performance with intelligent local access that keeps internal traffic local while routing only authentication to the cloud. Protect sensitive data from being uploaded to AI apps, and stop prompt injection attacks—without modifying your applications or AI models. Ashish Jain, Microsoft Entra Principal GPM, shares how to strengthen your zero trust architecture while simplifying the access experience for users. ► QUICK LINKS: 00:00 - Secure Access Service Edge 01:12 - Conditional Access controls 01:35 - See it in action 02:21 - Windows client on same network 04:00 - Private Access - Intelligent Local Access 06:21 - Block AI file uploads 07:32 - Prompt injection attacks 09:46 - Wrap up ► Link References Check out https://aka.ms/SASEwithEntra ► Unfamiliar with Microsoft Mechanics? As Microsoft's official video series for IT, you can watch and share valuable content and demos of current and upcoming tech from the people who build it at Microsoft. • Subscribe to our YouTube: https://www.youtube.com/c/MicrosoftMechanicsSeries • Talk with other IT Pros, join us on the Microsoft Tech Community: https://techcommunity.microsoft.com/t5/microsoft-mechanics-blog/bg-p/MicrosoftMechanicsBlog • Watch or listen from anywhere, subscribe to our podcast: https://microsoftmechanics.libsyn.com/podcast ► Keep getting this insider knowledge, join us on social: • Follow us on Twitter: https://twitter.com/MSFTMechanics • Share knowledge on LinkedIn: https://www.linkedin.com/company/microsoft-mechanics/ • Enjoy us on Instagram: https://www.instagram.com/msftmechanics/ • Loosen up with us on TikTok: https://www.tiktok.com/@msftmechanics
Tựa Đề: Đấng Christ Là Con Của Ai?; Kinh Thánh: Ma-thi-ơ 22:41-46; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Tóm Tắt Về Luật Pháp; Kinh Thánh: Ma-thi-ơ 22:34-40; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Tóm Tắt Về Luật Pháp; Kinh Thánh: Ma-thi-ơ 22:34-40; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
This week, Lois Houston and Nikita Abraham are joined by Principal OCI Instructor Orlando Gentil to explore what truly keeps data safe, and what puts it at risk. They discuss the CIA triad, dive into hashing and encryption, and shed light on how cyber threats like malware, phishing, and ransomware try to sneak past defenses. Cloud Tech Jumpstart: https://mylearn.oracle.com/ou/course/cloud-tech-jumpstart/152992 Oracle University Learning Community: https://education.oracle.com/ou-community LinkedIn: https://www.linkedin.com/showcase/oracle-university/ X: https://x.com/Oracle_Edu Special thanks to Arijit Ghosh, David Wright, Kris-Ann Nansen, Radhika Banka, and the OU Studio Team for helping us create this episode. ------------------------------------------ Episode Transcript: 00:00 Welcome to the Oracle University Podcast, the first stop on your cloud journey. During this series of informative podcasts, we'll bring you foundational training on the most popular Oracle technologies. Let's get started! 00:25 Lois: Hello and welcome to the Oracle University Podcast! I'm Lois Houston, Director of Innovation Programs with Oracle University, and with me is Nikita Abraham, Team Lead: Editorial Services. Nikita: Hey everyone! Last week, we discussed how you can keep your data safe with authentication and authorization. Today, we'll talk about various security risks that could threaten your systems. 00:48 Lois: And to help us understand this better, we have Orlando Gentil, Principal OCI Instructor, back with us. Orlando, welcome back! Let's start with the big picture—why is security such a crucial part of our digital world today? Orlando: Whether you are dealing with files stored on a server or data flying across the internet, one thing is always true—security matters. In today's digital world, it's critical to ensure that data stays private, accurate, and accessible only to the right people. 01:20 Nikita: And how do we keep data private, secure, and unaltered? Is there a security framework that we can use to make sense of different security practices? Orlando: The CIA triad defines three core goals of information security. CIA stands for confidentiality. It's about keeping data private. Only authorized users should be able to access sensitive information. This is where encryption plays a huge role. Integrity means ensuring that the data hasn't been altered, whether accidentally or maliciously. That's where hashing helps. You can compare a stored hash of data to a new hash to make sure nothing's changed. Availability ensures that data is accessible when it's needed. This includes protections like system redundancy, backups, and anti-DDoS mechanisms. Encryption and hashing directly support confidentiality and integrity. And they indirectly support availability by helping keep systems secure and resilient. 02:31 Lois: Let's rewind a bit. You spoke about something called hashing. What does that mean? Orlando: Hashing is a one-way transformation. You feed in data and it produces a unique fixed length string called a hash. The important part is the same input always gives the same output, but you cannot go backward and recover the original data from the hash. It's commonly used for verifying integrity. For example, to check if a file has changed or a message was altered in transit. Hashing is also used in password storage. Systems don't store actual passwords, just their hashes. When you log in, the system hashes what you type it and compare the stored hash. If they match, you're in. But your actual password was never stored or revealed. So hashing isn't about hiding data, it's about providing it hasn't changed. So, while hashing is all about protecting integrity, encryption is the tool we use to ensure confidentiality. 03:42 Nikita: Right, the C in CIA. And how does it do that? Orlando: Encryption takes readable data, also known as plaintext, and turns it into something unreadable called ciphertext using a key. To get the original data back, you need to decrypt it using the right key. This is especially useful when you are storing sensitive files or sending data across networks. If someone intercepts the data, all they will see is gibberish, unless they have the correct key to decrypt it. Unlike hashing, encryption is reversible as long as you have the right key. 04:23 Lois: And are there different types of encryption that serve different purposes? Orlando: Symmetric and asymmetric encryption. With symmetric encryption, the same key is used to both encrypt and decrypt the data. It's fast and great for securing large volumes of data, but the challenge lies in safely sharing the key. Asymmetric encryption solves that problem. It uses a pair of keys: public key that anyone can use to encrypt data, and a private key that only the recipient holds to decrypt it. This method is more secure for communications, but also slower and more resource-intensive. In practice, systems often use both asymmetric encryption to exchange a secure symmetric key and then symmetric encryption for the actual data transfer. 05:21 Nikita: Orlando, where is encryption typically used in day-to-day activities? Orlando: Data can exist in two primary states: at rest and in transit. Data at rest refers to data stored on disk, in databases, backups, or object storage. It needs protection from unauthorized access, especially if a device is stolen or compromised. This is where things like full disk encryption or encrypted storage volumes come in. Data in transit is data being sent from one place to another, like a user logging into a website or an API sending information between services. To protect it from interception, we use protocols like TLS, SSL, VPNs, and encrypted communication channels. Both forms data need encryption, but the strategies and threats can differ. 06:19 Lois: Can you do a quick comparison between hashing and encryption? Orlando: Hashing is one way. It's used to confirm that data hasn't changed. Once data is hashed, it cannot be reversed. It's perfect for use cases like password storage or checking the integrity of files. Encryption, on the other hand, it's two-way. It's designed to protect data from unauthorized access. You encrypt the data so only someone with the right key can decrypt and read it. That's what makes it ideal for keeping files, messages, or network traffic confidential. Both are essential for different reasons. Hashing for trust and encryption for privacy. 07:11 Adopting a multicloud strategy is a big step towards future-proofing your business and we're here to help you navigate this complex landscape. With our suite of courses, you'll gain insights into network connectivity, security protocols, and the considerations of working across different cloud platforms. Start your journey to multicloud today by visiting mylearn.oracle.com. 07:39 Nikita: Welcome back! When we talk about cybersecurity, we hear a lot about threats and vulnerabilities. But what do those terms really mean? Orlando: In cybersecurity, a threat is a potential danger and a vulnerability is a weakness an asset possess that a threat can exploit. When a threat and a vulnerability align, it creates a risk of harm. A threat actor then performs an exploit to leverage that vulnerability, leading to undesirable impact, such as data loss or downtime. After an impact, the focus shifts to response and recovery to mitigate damage and restore operations. 08:23 Lois: Ok, let's zero in on vulnerabilities. What counts as a vulnerability, and what categories do attackers usually target first? Orlando: Software and hardware bugs are simply unintended flaws in a system's core programming or design. Misconfigurations arise when systems aren't set up securely, leaving gaps. Weak passwords and authentication provide easy entry points for attackers. A lack of encryption means sensitive data is openly exposed. Human error involves mistakes made by people that unintentionally create security risks. Understanding these common vulnerability types is the first step in building more resilient and secure systems as they represent the critical entry points attackers leverage to compromise systems and data. By addressing these, we can significantly reduce our attack surface and enhance overall security. 09:28 Nikita: Can we get more specific here? What are the most common cybersecurity threats that go after vulnerabilities in our systems and data? Orlando: Malware is a broad category, including viruses, worms, Trojans, and spyware. Its goal is to disrupt or damage systems. Ransomware has been on the rise, targeting everything from hospitals to government agencies. It lock your files and demands a ransom, usually in cryptocurrency. Phishing relies on deception. Attackers impersonate legitimate contacts to trick users into clicking malicious links or giving up credentials. Insider threats are particularly dangerous because they come within employees, contractors, or even former staff with lingering access. Lastly, DDoS attacks aim to make online services unavailable by overwhelming them with traffic, often using a botnet—a network of compromised devices. 10:34 Lois: Orlando, can you walk us through how each of these common cybersecurity threats work? Orlando: Malware, short for malicious software, is one of the oldest and most pervasive types of threats. It comes in many forms, each with unique methods and objectives. A virus typically attaches itself to executable files and documents and spreads when those are shared or opened. Worms are even more dangerous in networked environments as they self-replicate and spread without any user action. Trojans deceive users by posing as harmless or helpful applications. Once inside, they can steal data or open backdoors for remote access. Spyware runs silently in the background, collecting sensitive information like keystrokes or login credentials. Adware might seem like just an annoyance, but it can also track your activity and compromise privacy. Finally, rootkits are among the most dangerous because they operate at a low system level, often evading detection tools and allowing attackers long-term access. In practice, malware can be a combination of these types. Attackers often bundle different techniques to maximize damage. 12:03 Nikita: And what about ransomware? Why it is such a serious threat? Orlando: Ransomware has become one of the most disruptive and costly types of cyber attacks in recent years. Its goal is simple but devastating, to encrypt your data and demand payment in exchange for access. It usually enters through phishing emails, insecure remote desktop protocol ports or known vulnerabilities. Once inside, it often spreads laterally across the network before activating, ensuring maximum impact. There are two common main forms. Crypto ransomware encrypts user files, making them inaccessible. Locker ransomware goes a step further, locking the entire system interface, preventing any use at all. Victims are then presented with a ransom note, typically requesting cryptocurrency payments in exchange for the decryption key. What makes ransomware so dangerous is not just the encryption itself, but the pressure it creates. Healthcare institutions, for instance, can't afford the downtime, making them prime targets. 13:18 Lois: Wow. Thanks, Orlando, for joining us today. Nikita: Yeah, thanks Orlando. We'll be back next week with more on how you use security models to tackle these threats head-on. And if you want to learn about the topics we covered today, go to mylearn.oracle.com and search for the Cloud Tech Jumpstart course. Until next time, this is Nikita Abraham… Lois: And Lois Houston, signing off! 13:42 That's all for this episode of the Oracle University Podcast. If you enjoyed listening, please click Subscribe to get all the latest episodes. We'd also love it if you would take a moment to rate and review us on your podcast app. See you again on the next episode of the Oracle University Podcast.
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy. In this segment, we'll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker. Segment Resources: Pro-Russian Hackers Use Linux VMs to Hide in Windows Russian Hackers Abuse Hyper-V to Hide Malware in Linux VMs Qilin ransomware abuses WSL to run Linux encryptors in Windows This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Segment 2: Topic - Threat Modeling Humanoid Robots We're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance... Resources https://www.unitree.com/H2 (watch the video!) China's humanoid robots get factory jobs as UBTech's model scores US$112 million in orders The big reveal: Xpeng founder unzips humanoid robot to prove it's not human Exploit Allows for Takeover of Fleets of Unitree Robots - Security researchers find a wormable vulnerability 100-page Paper: The Cybersecurity of a Humanoid Robot 5-page Paper: Cybersecurity AI: Humanoid Robots as Attack Vectors Amazingly, $300 smart vacuums have some of the same exact vulnerabilities and backdoors built into them as the $16,000 humanoid robots! The Day My Smart Vacuum Turned Against Me Segment 3: Weekly News Finally, in the enterprise security news, A $435M venture round A $75M seed round a few acquisitions the producer of the movie Half Baked bought a spyware company AI isn't going well, or is it? maybe we just need to adopt it more slowly and deliberately? ad-blockers are enterprise best practices firewalls and VPNs are security risks, according to insurance claims could you power an entire house with disposable vapes? All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-433
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy. In this segment, we'll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker. Segment Resources: Pro-Russian Hackers Use Linux VMs to Hide in Windows Russian Hackers Abuse Hyper-V to Hide Malware in Linux VMs Qilin ransomware abuses WSL to run Linux encryptors in Windows This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Segment 2: Topic - Threat Modeling Humanoid Robots We're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance... Resources https://www.unitree.com/H2 (watch the video!) China's humanoid robots get factory jobs as UBTech's model scores US$112 million in orders The big reveal: Xpeng founder unzips humanoid robot to prove it's not human Exploit Allows for Takeover of Fleets of Unitree Robots - Security researchers find a wormable vulnerability 100-page Paper: The Cybersecurity of a Humanoid Robot 5-page Paper: Cybersecurity AI: Humanoid Robots as Attack Vectors Amazingly, $300 smart vacuums have some of the same exact vulnerabilities and backdoors built into them as the $16,000 humanoid robots! The Day My Smart Vacuum Turned Against Me Segment 3: Weekly News Finally, in the enterprise security news, A $435M venture round A $75M seed round a few acquisitions the producer of the movie Half Baked bought a spyware company AI isn't going well, or is it? maybe we just need to adopt it more slowly and deliberately? ad-blockers are enterprise best practices firewalls and VPNs are security risks, according to insurance claims could you power an entire house with disposable vapes? All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-433
Tựa Đề: Sự Sống Đời Sau; Kinh Thánh: Ma-thi-ơ 22:23-33; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy. In this segment, we'll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker. Segment Resources: Pro-Russian Hackers Use Linux VMs to Hide in Windows Russian Hackers Abuse Hyper-V to Hide Malware in Linux VMs Qilin ransomware abuses WSL to run Linux encryptors in Windows This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Segment 2: Topic - Threat Modeling Humanoid Robots We're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance... Resources https://www.unitree.com/H2 (watch the video!) China's humanoid robots get factory jobs as UBTech's model scores US$112 million in orders The big reveal: Xpeng founder unzips humanoid robot to prove it's not human Exploit Allows for Takeover of Fleets of Unitree Robots - Security researchers find a wormable vulnerability 100-page Paper: The Cybersecurity of a Humanoid Robot 5-page Paper: Cybersecurity AI: Humanoid Robots as Attack Vectors Amazingly, $300 smart vacuums have some of the same exact vulnerabilities and backdoors built into them as the $16,000 humanoid robots! The Day My Smart Vacuum Turned Against Me Segment 3: Weekly News Finally, in the enterprise security news, A $435M venture round A $75M seed round a few acquisitions the producer of the movie Half Baked bought a spyware company AI isn't going well, or is it? maybe we just need to adopt it more slowly and deliberately? ad-blockers are enterprise best practices firewalls and VPNs are security risks, according to insurance claims could you power an entire house with disposable vapes? All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-433
Who actually owns data protection in a nonprofit? In this fast-paced conversation, host Julia C. Patrick sits down with Taysha Adams, Manager Technology Support at JMT Consulting, and Josh Fricovsky, Engineering Director at Cortavo, to tackle the uncomfortable truth: cybersecurity is no longer “someone else's job.”Taysha starts with a reality check: most vulnerabilities don't begin in a server room. They start with everyday behavior. From checking work email on public Wi-Fi to logging in on a friend's device, casual habits open doors to attackers. As she explains, “Everybody's responsible for data security and protection… most vulnerabilities do come in from the end users.” JMT has spent more than a year realigning internal processes, tightening device controls, and partnering with Cortavo so their own team—and their clients—are better shielded.Josh builds on that by showing how fast the threat landscape is evolving. Cortavo's job as a managed service provider is to sit on the “bleeding edge”: endpoint protection, email security, MFA, VPNs, and now mobile device management for a workforce that increasingly works on the move. He notes that “the cost of inaction is going to be 10 to 100 times more than” the investment in proactive security. It's not just about tools; it's about culture, education, and leadership setting the tone.The conversation then moves to the devices we use every day. Laptops, tablets, and phones are cheaper and more plentiful than ever, but every extra device is another front door. The guests stress that nonprofits need clear policies for using personal phones for work, along with mobile device management to protect company data without “controlling” the phone itself.AI takes the discussion to another level. Both guests are enthusiastic users, but they warn that unregulated use is dangerous. Taysha urges organizations to set guardrails and favor licensed or enterprise tools so prompts, donor details, and templates aren't quietly training public models. Josh goes further, recommending offline or private LLMs for sensitive data and pointing out that attackers are already using AI for sophisticated social engineering, including voice cloning and real-time credential theft.Finally, the trio frames cybersecurity as a governance and financial issue, not just an IT problem. Data loss can mean lost clients, destroyed reputation, and even the end of an organization. Partnering with firms like JMT and Cortavo, building internal awareness, and treating security like an essential protection policy—not a luxury—are presented as non-negotiable steps for modern nonprofits.This episode is a must-watch for executives, boards, and staff who touch data in any way—which is everyone.#TheNonprofitShow #NonprofitCybersecurity #DataProtectionFind us Live daily on YouTube!Find us Live daily on LinkedIn!Find us Live daily on X: @Nonprofit_ShowOur national co-hosts and amazing guests discuss management, money and missions of nonprofits! 12:30pm ET 11:30am CT 10:30am MT 9:30am PTSend us your ideas for Show Guests or Topics: HelpDesk@AmericanNonprofitAcademy.comVisit us on the web:The Nonprofit Show
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy. In this segment, we'll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker. Segment Resources: Pro-Russian Hackers Use Linux VMs to Hide in Windows Russian Hackers Abuse Hyper-V to Hide Malware in Linux VMs Qilin ransomware abuses WSL to run Linux encryptors in Windows This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Segment 2: Topic - Threat Modeling Humanoid Robots We're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance... Resources https://www.unitree.com/H2 (watch the video!) China's humanoid robots get factory jobs as UBTech's model scores US$112 million in orders The big reveal: Xpeng founder unzips humanoid robot to prove it's not human Exploit Allows for Takeover of Fleets of Unitree Robots - Security researchers find a wormable vulnerability 100-page Paper: The Cybersecurity of a Humanoid Robot 5-page Paper: Cybersecurity AI: Humanoid Robots as Attack Vectors Amazingly, $300 smart vacuums have some of the same exact vulnerabilities and backdoors built into them as the $16,000 humanoid robots! The Day My Smart Vacuum Turned Against Me Segment 3: Weekly News Finally, in the enterprise security news, A $435M venture round A $75M seed round a few acquisitions the producer of the movie Half Baked bought a spyware company AI isn't going well, or is it? maybe we just need to adopt it more slowly and deliberately? ad-blockers are enterprise best practices firewalls and VPNs are security risks, according to insurance claims could you power an entire house with disposable vapes? All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-433
Tựa Đề: Sự Sống Đời Sau; Kinh Thánh: Ma-thi-ơ 22:23-33; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Chớ Vội Gây Ra Điều Tranh Tụng; Kinh Thánh: Châm-ngôn 25:8-10; Ma-thi-ơ 18:15-17; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Chớ Vội Gây Ra Điều Tranh Tụng; Kinh Thánh: Châm-ngôn 25:8-10; Ma-thi-ơ 18:15-17; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
The Next Privacy Threat: Outlawing VPNs by Nick Espinosa, Chief Security Fanatic
Tựa Đề: Ăn Ở Ngay Lành Giữa Dân Ngoại; Kinh Thánh: 1 Phi-e-rơ 2:11-12; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Ăn Ở Ngay Lành Giữa Dân Ngoại; Kinh Thánh: 1 Phi-e-rơ 2:11-12; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Trọng Trách Dòng Dõi Thánh; Kinh Thánh: 1 Phi-e-rơ 2:9-10; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Trọng Trách Dòng Dõi Thánh; Kinh Thánh: 1 Phi-e-rơ 2:9-10; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Send us a textPodcast Summary – Prepping Academy Podcast: “VPNs Explained – The First Line of Defense for Online Privacy”In this powerful episode of The Prepping Academy Podcast, host Forrest Garvin exposes the truth about VPNs (Virtual Private Networks) — what they really do, how they work, and which ones you can actually trust. As online tracking, censorship, and surveillance continue to rise, using a VPN has become a critical step in protecting your privacy, security, and freedom online.Forrest breaks down how VPNs encrypt your data, hide your location, and shield your digital activity from hackers, corporations, and even your internet provider. You'll discover the top VPNs for privacy, the red flags to avoid, and why many “free” VPNs are more dangerous than helpful. Plus, he shares insider tips on using VPNs with your smartphones, routers, and streaming devices for complete protection.If you value anonymity, freedom, and security in a connected world, this episode is a must-listen. Learn how to stay invisible online — the right way.Keywords: VPN, online privacy, cybersecurity, data protection, internet security, best VPNs 2025, anonymity online, PrepperNet, Prepping Academy Podcast, Forrest Garvin.FREE Webinars:Seating is limited, so reserve your spot now! Dissappear On the InternetCrypto Digital Assets CourseGain Freedom with a Home-Based Business Join PrepperNet.Net - https://www.preppernet.netPrepperNet is an organization of like-minded individuals who believe in personal responsibility, individual freedoms and preparing for disasters of all origins.PrepperNet Support the showPlease give us 5 Stars! www.preppingacademy.com Daily deals for preppers, survivalists, off-gridders, homesteaders https://prepperfinds.com Contact us: https://preppingacademy.com/contact/ www.preppernet.net Amazon Store: https://amzn.to/3lheTRTwww.forrestgarvin.com
Tựa Đề: Tin Chúa Giê-xu Không Bị Xấu Hổ; Kinh Thánh: 1 Phi-e-rơ 2:6-8; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Tin Chúa Giê-xu Không Bị Xấu Hổ; Kinh Thánh: 1 Phi-e-rơ 2:6-8; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Chúa Nắn Nên Con Người; Kinh Thánh: Sáng-thế Ký 2:4-17; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Chúa Nắn Nên Con Người; Kinh Thánh: Sáng-thế Ký 2:4-17; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Đức Chúa Trời Nghỉ Ngơi; Kinh Thánh: Sáng-thế Ký 2:1-3; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Đức Chúa Trời Nghỉ Ngơi; Kinh Thánh: Sáng-thế Ký 2:1-3; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Luôn Cảm Tạ Khi Cầu Nguyện; Kinh Thánh: Phi-líp 1:3-8; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Luôn Cảm Tạ Khi Cầu Nguyện; Kinh Thánh: Phi-líp 1:3-8; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Cầu Nguyện Và Ca Ngợi Chúa Trong Hoạn Nạn; Kinh Thánh: Công-vụ các Sứ-đồ 16:16-33; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Cầu Nguyện Và Ca Ngợi Chúa Trong Hoạn Nạn; Kinh Thánh: Công-vụ các Sứ-đồ 16:16-33; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Recently, Super Testnet built Papa swaps: a novel & optimistic way of doing atomic swaps on Bitcoin. In this episode, he talks about his new projects, why he is in favor of filtering the mempool + BIP 444 activation, and prediction markets. Time stamps: 00:01:28 - Intro: Super Testnet's Return to the Bitcoin Takeover Podcast 00:03:03 - Lightning Privacy Wars: Recapping Super's Monero Challenge & Layer 2 Debates 00:03:43 - Papa Swaps Unleashed: Super's Lightning-Fast Innovation Explained 00:04:57 - Submarine Swaps 101: From Layer 1 to Layer 2 in a Flash 00:06:04 - Phoenix Wallet Magic: Splicing vs. Submarine Swaps – Why Capacity Matters 00:07:55 - Birth of Papa Swaps: From Mexico Chats to Single-Transaction Breakthrough 00:09:19 - Why "Papa"? The Hilarious Submarine Speed Pun Behind the Name 00:10:23 - Hedgehog Protocol Update: When Will It Launch? (Spoiler: Probably Never) 00:12:00 - Hedgehog's Fate & Super's Conference Show-and-Tells 00:12:47 - Papa Swaps Deep Dive: Relative Time Locks & Happy vs. Sad Paths 00:14:47 - How Papa Swaps Work: Secrets, HTLCs, & Atomic Swaps Simplified 00:18:33 - Risks & Tradeoffs: Double Spends, RBF, & Trust in Small Transactions 00:21:02 - Block Space Savings: Papa Swaps vs. Boltz, Moon Wallet, & Lightning Loop 00:22:29 - Papa Swaps' Edge in a Crowded Layer 2 World 00:23:29 - Sidechain Shoutouts: Citrea, Alpen, & Scaling Debates Revisited 00:24:32 - Papa Swaps Today: Proof-of-Concept, Mainnet Risks, & Wallet Adoption 00:27:02 - Will Phoenix & Breeze Integrate Papa or Hedgehog? 00:28:47 - Boltz Exchange Scoop: CEO Kilian Rausch & Co-Founder Michael 00:29:35 - Lightning History: Joule, Bottle Pay, & Nostr Wallet Connect Ideas 00:33:06 - Ad Break: Layer 2 Labs' Drivechains 00:34:57 - Sideshift.ai: Swap Stables for BTC 00:37:10 - BIP 444 Drama 00:38:18 - Spam Filters Work for Bandwidth Savings 00:39:32 - Miners' Risks: Orphan Blocks & 50% Filter Adoption Scenarios 00:42:44 - Mempool Art: Portland Hodl's Block Painting Software & Mara Pool Deals 00:44:28 - Spam Defined: Extra Data vs. Permissionless Purity Debate 00:48:21 - BitVM Dreams: Catching Pikachu on Bitcoin Without Spam 00:50:29 - Citrea & Alpen: BitVM 2/3, ZK Proofs, & Data Availability Concerns 00:52:55 - Citrea Marketing Myths: Inscriptions Over OP_RETURN in Launch 00:53:29 - OP_RETURN vs. Inscriptions: Base Space Scarcity & Pruning Debates 00:56:35 - BIP 444 Breakdown: Temporary Spam Ban & Consensus Changes 01:00:06 - Legal Slippery Slope? OFAC Lists, Sanctions, & Permissionless Fears 01:02:05 - BIP 444 Odds & Details 01:07:15 - Inscriptions as Anchors: Layer 2 Onboarding or Hidden Spam? 01:10:26 - OP_RETURN Drama: V30 Update vs Filters 01:13:31 - Community Toxicity: "Knotzis," "Coretards," & Ad Hominem Fallacies 01:16:40 - Pleb Slop & Purity Quests: Dogma vs. Base Layer Privacy Push 01:20:01 - Spam Doesn't Pay Node Runners – Miners Only 01:21:42 - Pro-Choice Nodes: Custom Policies, Wizards, & Hackathon Ideas 01:25:18 - Windows Wizards & Idea Generation: Super's Creative Process 01:26:24 - Ad Break: Bitcoin.com News – Balanced Global Crypto Coverage 01:27:28 - NoOnes: Ray Youssef's P2P Marketplace for the Global South 01:29:57 - Chat Q&A: Money Transmitters, Legal Fears, & Miner Roles 01:34:00 - Spark Wallet Exposed: Privacy Leaks & Statechain Explorer Risks 01:35:31 - Mercury Wallet Nod: Statechains' Real-World Usage Milestone 01:35:31 - Statechains' Demand: Spark's Success vs. Mercury's Shutdown 01:36:05 - Blinded Servers: Hiding Balances & History in Statechains 01:37:20 - Privacy Mitigations: IP Hiding, VPNs, & Avoiding Key Reuse 01:38:43 - Spark Improvements: CoinJoins & Future Privacy Features 01:40:27 - GDPR Compliance: Bull Bitcoin's CoinJoins & Legal Privacy Push 01:41:57 - Nostr Frustrations: Searching Old Posts Sucks 01:42:58 - ARCash DExplained 01:48:31 - Spam Subjectivity & Consensus Rules Debate 01:51:08 - Objective vs. Subjective: Mempool Policies as Good Rules 01:53:10 - No Hard Fork: BIP 444's Low Adoption & Hash Rate Doubts 01:54:41 - Cultural Conflicts: Ossified Bitcoin & Soft Fork Stalls 01:55:26 - Influencer Consensus 02:37:56 - Bitcoin Prediction Markets: Non-Interactive DLCs & Proxies 02:38:41 - Poly Market UX: Early Exits & Position Transfers 02:40:03 - PSBT Auctions: Non-Interactive Sales Explained 02:41:48 - Agias Protocol: Native Bitcoin Prediction Markets 02:43:03 - Paul Sztorc Story 02:44:19 - Oracle Problem 02:45:48 - Hivemind Insights 02:46:57 - Build Agias 02:48:39 - Predix Collaboration 02:49:16 - Favorite Thinkers: Robin Linus, Liam Eagen 02:50:24 - BitVM's BSV Origins 02:52:52 - Turing Completeness & Craig Wright 02:54:58 - BitVM Evolution 02:55:24 - 2010 Spam Debates with Satoshi & OGs 02:56:52 - Block Size Wars vs. Current Fights 02:57:28 - Nostr Threads with Aaron van Wirdum 02:58:01 - Follow Super: Supertestnet.org 02:59:03 - Infighting Fuels Ethereum & Zcash Growth 02:59:29 - Outro: Thanks to Sponsors & Farewell
Tựa Đề: Cách Cảm Tạ Chúa; Kinh Thánh: 1 Sử-ký 16:7-15,23-29; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
In this conversation, Peter discusses significant developments in the cryptocurrency space, including the partnership between Ripple and Mastercard for credit card settlements on the XRP ledger, updates on Midnight Glacier Drops and mining, the Ethereum ecosystem's transaction metrics, Chainlink's new compliance engine, privacy innovations in VPNs, security in the Cardano ecosystem, and Apex Fusion's cross-chain developments. The conversation highlights the importance of compliance, security, and the evolving landscape of decentralized finance (DeFi).TakeawaysRipple and Mastercard are collaborating to enhance blockchain adoption.The RLUSD credit card settlement is a significant step for stablecoins.Midnight Glacier is increasing token availability for miners.Ethereum's transaction metrics are misleading and need reevaluation.Chainlink's compliance engine is crucial for regulatory adherence.Privacy-focused VPNs are emerging in the crypto space.DeFi hacks highlight the need for better security measures.Cardano's design offers enhanced security against hacks.Apex Fusion is making strides in cross-chain capabilities.Community support is vital for content creators in the crypto space.Chapters00:00 Ripple and Mastercard Partnership03:12 Midnight Glacier Drops and Mining Updates05:58 Ethereum Ecosystem and Transaction Metrics09:05 Chainlink's Automated Compliance Engine11:57 Privacy in VPNs and DeFi Hacks15:11 Cardano's Security and DeFi Opportunities18:03 Apex Fusion and Cross-Chain DevelopmentsDISCLAIMER: This content is for informational and educational purposes only and is not financial, investment, or legal advice. I am not affiliated with, nor compensated by, the project discussed—no tokens, payments, or incentives received. I do not hold a stake in the project, including private or future allocations. All views are my own, based on public information. Always do your own research and consult a licensed advisor before investing. Crypto investments carry high risk, and past performance is no guarantee of future results. I am not responsible for any decisions you make based on this content.
Tựa Đề: Hết Lòng Tạ Ơn Chúa; Kinh Thánh: Thi-thiên 138:1-8; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Half the stuff you've heard about VPNs is total nonsense. No, they don't make you invisible online. AI host Rylie breaks down fact from fiction. Plus, how Chess.com became a billion-dollar empire, a teen's genius and the latest AI fails that'll make you facepalm. Learn more about your ad choices. Visit megaphone.fm/adchoices
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPNs are a target Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-899
Tựa Đề: Biết Ơn Chúa - Thờ Phượng Và Ca Ngợi; Kinh Thánh: Thi-thiên 116:15-19; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPNs are a target Show Notes: https://securityweekly.com/psw-899
This week: Reversing keyboard firmware Ghost networks Invasion of the face changers Ghost tapping and whole lot of FUD AI doesn't code securely, but Aardvark can secure code De-Googling Thermostats Dodgy Android TV boxes can run Debian HackRF vs. Honda Cyberslop AI paper Turning to the darkside Poisoning the watering hole Nagios vulnerabilities VPNs are a target Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-899
In this episode of YAS Podcast, host Daisy Ducati converses with Michael McGrady Jr., contributing legal editor for AVN magazine, discussing recent legislative efforts aimed at regulating sex work and queer identities. They delve into various initiatives, including Michigan's proposed Anti-Corruption of Public Morals Act and the implications of age verification laws on the adult entertainment industry. McGrady provides insights on how such laws could jeopardize freedoms and privacy, emphasizing the need for continued advocacy and resilience within the sex work and queer communities. The episode highlights the importance of voting and staying informed to safeguard rights amidst increasing political and cultural challenges.00:00 Introduction and Overview of the Anti-Corruption of Public Morals Act00:42 Welcome to YAS Podcast01:31 Meet Michael McGrady Jr.04:21 Michael's Journey into Journalism09:01 The Age Verification Debate13:18 Concerns Over Data Privacy and Security18:37 Impact on LGBTQ+ Community21:51 The Role of VPNs and Data Security24:52 Challenges Faced by Legitimate Porn Sites27:11 FTC Settlement Concerns28:45 Regulatory Challenges in the UK31:02 Global Impact on Content Creation34:58 Michigan's Anti-Pornography Bill37:21 Defining Prohibited Materials39:25 Conflation of Queer Identity and Porn45:18 Fighting for Rights and Acceptance48:16 Closing Remarks and Call to ActionLinks: Michael McGrady AVN ProfileHouse Bill No. 4938 ( Anti-Corruption of Public Morals Act.)Daisy InstagramYASStore.ShopDonate to our work YAS Work InstagramYAS Work BlueSkyYAS Work TwitterYAS Work Youtube
Tựa Đề: Bày Tỏ Cụ Thể Lòng Biết Ơn Chúa; Kinh Thánh: Thi-thiên 116:12-14; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Biết Ơn Chúa Vì Sự Giải Cứu; Kinh Thánh: Thi-thiên 116:3-11; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh
Tựa Đề: Nhớ; Tác Giả: VPNS; Loạt Bài: Lịch Cầu Nguyện
Tựa Đề: Biết Ơn Chúa Vì Sự Quan Tâm; Kinh Thánh: Thi-thiên 116:1-2; Tác Giả: VPNS; Loạt Bài: Sống Với Thánh Kinh, Bài Học Kinh Thánh Hằng Ngày, Tĩnh Nguyện Hằng Ngày, Sống Với Thánh Kinh