2016 film
POPULARITY
Ep. 198 is the second episode of our brand-new “Best of…” series. Anderson McKean of Page & Palette Bookstore joined me for the Best of Thrillers, with her all-time TOP TEN favorite thriller novels…and, a couple buzzy thrillers that didn't work for her. Also, Anderson talks about how she started reading thrillers, the wide variety available in the genre, and books from her list that would be perfect for those new to the genre! This post contains affiliate links through which I make a small commission when you make a purchase (at no cost to you!). CLICK HERE for the full episode Show Notes on the blog. Highlights What draws her to the thriller genre. From domestic to psychological thrillers, Anderson talks about the variety of the genre. Her favorite sub-genres and what doesn't work for her. Anderson picks a few books from her list that would be good starter books for those new to the genre. Anderson's All-Time Top Ten Thrillers [10:33] Gone Girl by Gillian Flynn (2012) | Amazon | Bookshop.org [12:44] Room by Emma Donoghue (2010) | Amazon | Bookshop.org [16:57] It Girl by Ruth Ware (2022) | Amazon | Bookshop.org [20:41] A Rip Through Time by Kelley Armstrong (2022) | Amazon | Bookshop.org [24:16] Everyone Here Is Lying by Shari Lapena (2023) | Amazon | Bookshop.org [27:43] The Good Sister by Sally Hepworth (2020) | Amazon | Bookshop.org [31:38] Wrong Place Wrong Time by Gillian McAllister (2022) | Amazon | Bookshop.org [34:17] Red Queen by Juan Gómez-Jurado (2018) | Amazon | Bookshop.org [37:48] When the Stars Go Dark by Paula McLain (2021) | Amazon | Bookshop.org [41:12] These Silent Woods by Kimi Cunningham Grant (2021) | Amazon | Bookshop.org [45:37] High-Profile Thrillers That Did Not She Didn't Love [48:35] The House Across the Lake by Riley Sager (2022) | Amazon | Bookshop.org [48:41] None of This Is True by Lisa Jewell (2023) | Amazon | Bookshop.org [49:01] Other Books Mentioned The Plot by Jean Hanff Korelitz (2021) [13:23] The Girl on the Train by Paula Hawkins (2015) [16:06] The Blue Hour by Paula Hawkins (2024) [16:13] Where the Crawdads Sing by Delia Owens (2021) [16:38] The Woman in Cabin 10 by Ruth Ware (2016) [20:58] I Have Some Questions for You by Rebecca Makkai (2023) [21:50] Zero Days by Ruth Ware (2023) [23:05] Vantage Point by Sara Sligar (2025) [23:11] One Perfect Couple by Ruth Ware (2024) [23:54] The Time Traveler's Wife by Audrey Niffenegger (2003) [24:51] Death at a Highland Wedding by Kelley Armstrong (2025) [27:35] What Have You Done by Shari Lepena (2024) [30:09] The Couple Next Door by Shari Lepena (2016) [30:24] Someone We Know by Shari Lepena (2019) [30:31] Strange Sally Diamond by Liz Nugent (2023) [32:23] The Mother-In-Law by Sally Hepworth (2019) [33:26] The Soulmate by Sally Hepworth (2022) [33:50] The Darling Girls by Sally Hepworth (2023) [33:53] Just Another Missing Person by Gillian McAllister (2023) [36:36] The Girl with the Dragon Tattoo by Stieg Larsson (2005) [38:04] The Bourne Identity by Robert Ludlum (1980) [39:24] In Light of All Darkness by Kim Cross (2023) [42:25] The Death of Us by Abigail Dean (2025) [44:17] Our Endless Numbered Days by Claire Fuller (2015) [47:20] The Nature of Disappearing by Kimi Cunningham Grant (2024) [48:11] The Fury by Alex Michaelides (2024) [49:47] The Silent Patient by Alex Michaelides (2019) [49:53]
Okay y'all, I need to brace you for this one. I've got Danelle Delgado on the show, and I'm doing everything I can to keep my inner fangirl in check. This woman? She's a powerhouse - single mum, cancer survivor, business coach, author of I Choose Joy - and she somehow manages to serve up the truth with equal parts fire and heart. We talk about what it really means to have no zero days, why choosing joy isn't fluff, and how pain has a seat at the growth table. Honestly, this conversation shook me in the best way. Let's dive right in.Highlights:(04:18) No zero days - where it all began(10:42) Everyone left. That's when I heard myself(22:05) Money on my terms. Period(28:47) Tim Grover's text that floored me(40:10) You don't need a big audience(47:19) Your voice is your mic - use it wellFind out more about Danelle:WebsiteLinkedIn: Danelle DelgadoInstagram: DanelleDelgadoFacebook: DanelleBDelgadoThe Winning MembershipQualia Mind - click hereCoupon Code: SHOCKANDYALL (15% off any purchase)Visit Nicole's on demand fitness platform for live weekly classes and a recorded library of yoga, strength training, guided audio meditations and mobility (Kinstretch) classes, as well: https://www.sweatandstillness.comGrab Nicole's bestselling children's book and enter your email for A FREE GIFT: https://www.yolkedbook.comFind Nicole on Instagram:https://www.instagram.com/nicolesciacca/Tik Tok: https://www.tiktok.com/@thenicolesciaccaFacebook: https://www.facebook.com/nicolesciaccayoga/Youtube:https://www.youtube.com/channel/UC1X8PPWCQa2werd4unex1eAPractice yoga with Nicole in person in Santa Monica, CA at Aviator Nation Ride. Get the App to book in: https://apps.apple.com/us/app/aviator-nation-ride/id1610561929Book a discovery call or virtual assessment with Nicole here: https://www.calendly.com/nicolesciaccaThis Podcast is proudly produced by Wavemakers AudioMentioned in this episode:www.Neurohacker.com/shockandyall and use the code SHOCKANDYALL to get 15% off your first order
Referências do EpisódioFirefox Security Response to pwn2own 2025Hackers earn $1,078,750 for 28 zero-days at Pwn2Own BerlinHow Interlock attacks IT specialists with fake CAPTCHAs and ClickFixClickFixの被害をJSOCの複数のお客様にて観測Roteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Rik van Duijn keert terug aan tafel en vertelt hoe zijn bedrijven Zolder en Attic Security het Nederlandse mkb helpen veiliger te werken met Microsoft 365. We bespreken waarom Microsoft jouw omgeving niet vanzelf optimaal beveiligt, hoe Rik een app bouwde die security toegankelijk maakt, en waarom zijn klanten variëren van vier tot vijfduizend gebruikers. Verder duiken we in zuurdeeg, phishing-as-a-service, Teams-miserie en het hackverleden van Rik – inclusief virussen op z'n ouderlijk huisnetwerk. Kortom: een aflevering over digitale veiligheid, menselijke fouten, ethisch hacken én barcodescanners op 4G.Waar Zolder focust op consultancy en pentesten, biedt Etic een SaaS-oplossing die security-advies combineert met monitoring en eenvoudige instellingen via een app. Rik legt uit hoe het framework werkt, waarom het ook buiten Microsoft 365 toepasbaar is, en waarom hun grootste uitdaging geen techniek maar communicatie is. Daarnaast bespreken we business email compromise, money mules, en de culturele barrière die e-mail en Teams veroorzaken bij cybersecurity.ShownotesAttic SecurityZolderRSA Conference San FranciscoIC3 (Internet Crime Complaint Center) rapporten van de FBIAzure Sentinel SIEM van MicrosoftMicrosoft Security BlogOver backdoor software zoals NetBus en Back OrificeDe Pathé fraudezaakNIS2-richtlijnTijdschema0:00:00 Waarom Microsoft 365 extra beveiliging nodig heeft0:01:50 Zuurdesem maken uit de lucht, gisten en afvallen0:04:13 San Francisco sourdough en RSA Conference0:05:32 Wat doen Zolder en Etic Security precies0:09:30 Waarom Microsoft het niet zelf dichttimmert0:12:49 De Attic-app: security voor elke gebruiker via pushnotificaties0:16:19 Azure Sentinel en baseline securitychecks0:20:30 Business email compromise: fraude groter dan ransomware0:25:22 Phishing-as-a-service en cookie hijacking0:29:20 Groeien buiten Nederland met app-gebaseerde security0:34:01 Teams vs Slack: zware apps, matige UX0:39:03 Favoriete pentest-klussen: barcodescanners en cloudinfra0:44:26 Security-by-design en samenwerken met devteams0:48:46 Het hacker-verleden van Rik: NetBus, MSN en GTA warez0:52:44 Van kok in de keuken naar securityconsultant#security #microsoft365 #startups #ethicalhacking #zolder #attic #emailfraude #pentesting #teams #phishing #shownotes #mnodt #techpodcastZie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
Ever wondered why some people seem consistently productive and energized while others constantly bounce between burnout and recovery? The answer isn't superhuman genetics or fancy supplements - it's understanding the fundamental science of energy management. After working for 100+ consecutive days without a traditional day off, I've discovered something counterintuitive: sustainable productivity has nothing to do with motivation or willpower. It's about aligning with our biological design rather than fighting against it. Weekends are social constructs, but rest is biological. When you implement strategic, science-backed rest protocols throughout your day, you can maintain high energy levels without requiring complete disconnection. This approach is validated by leaders like Sam Altman, CEO of OpenAI, who dedicates significant space in his productivity blog to health optimization. This isn't about pushing through fatigue—it's about preventing fatigue from accumulating in the first place. Ready to transform how you work? Book a free trial coaching session through this link in the show notes to discover the missing pieces in your energy optimization routine. https://calendly.com/angelashurina/executive-momentum-360 Whether you're aiming to grow a business, advance your career, or simply live with more vitality, sustainable energy management is the foundation everything else builds upon. Text Me Your Thoughts and IdeasSupport the show Brought to you by Angela Shurina EXECUTIVE & OPTIMAL PERFORMANCE COACH
Millions of Apple Airplay-Enabled Devices Can Be Hacked via Wi-Fi Google tracked 75 zero days exploited in the wild in 2024 France ties Russian APT28 hackers to 12 cyberattacks on French orgs Thanks to today's episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO.
MITRE gets last-minute bailout from CISA Krebs exits SentinelOne after security clearance pulled Apple fixes two zero-days exploited in targeted iPhone attacks Thanks to this week's episode sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. For the stories behind the headlines, visit CISOseries.com. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, And helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines.
On this episode of Bounced From The Roadhouse:Special Guests in 4B:Zero Days LeftLibrary of CongressMorgan Wallen Purchases a BikeFake NewsDino goes PurplePoop on the MoonBackground MusicMegamillions MultiplierUnclaimed LuggagePimp our RidesQuestions? Comments? Leave us a message! 605-343-6161Don't forget to subscribe, leave us a review and some stars Hosted on Acast. See acast.com/privacy for more information.
Jacob coaches the Special Olympics again, 0 days without an incident, nose hairs connected to the moustache, & The human body is weird. Email us at OpenMicersPodcast@gmail.comwww.openmicers.comLinktr.ee/OpenMicersPodcast To watch video of the podcast: www.youtube.com/@jayfunktasticFollow us on Instagram & Threads: @OpenMicersPodcast, @JayFunktastic, @JacobCraigComedyVisit www.BrezCoffeeCo.com and use the code “OMPodcast” at checkout for 10% off of your order! Join our Patreon at www.patreon.com/ompodcast Hosted on Acast. See acast.com/privacy for more information.
Hello folks, welcome to program 381 of the technology blog and podcast series. We are going to start with an interesting video with Trend Micro that talks about customer success. Making sure customers are happy is the key to having a successful company, and this does not matter what the business is. Next, in our first article we're going to talk about, we're talking about one that should really have more of a punishment than 10 years. The article talks about a guy who basicly sabotoged his former employer after he got terminated. Thinking that he wouldn't be caught at whatever he got caught doing, he put in a kill switch which disabled the company computer network. If you read the article titled Developer">https://www.bleepingcomputer.com/news/security/developer-guilty-of-using-kill-switch-to-sabotage-employers-systems/">Developer guilty of using kill switch to sabotage employer's systems from Bleeping Computer, what did you think of it? Do you agree with the 10 years he ould get if found guilty? Why or why not? Email, imessage, text, WhatsApp or call and leave a comment on the comment line. Let me know if your comments should be aired. Microsoft">https://krebsonsecurity.com/2025/03/microsoft-6-zero-days-in-march-2025-patch-tuesday/">Microsoft: 6 Zero-Days in March 2025 Patch Tuesday comesfrom Krebs On security as we have a segment on Windows Update. If you can, get those updates going. Email/Imessage tech at menvi.orgtext/WhatsApp: 804-442-6975Leave a message or talk to me: (888) 405-7524 or (818) 527-4754. Enjoy the program!
Three Buddy Problem - Episode 38: On the show this week, we look at a hefty batch of Microsoft zero-days exploited in the wild, iOS 18.3.2 fixing an exploited WebKit bug, a mysterious Unpatched.ai being credited with Microsoft Access RCE flaws, and OpenAI lobbying for the US to ban China's DeepSeek. Plus, discussion on a Binarly technical paper with new approach to finding UEFI bootkits, Mandiant flagging custom backdoors on Juniper routers, and MEV 'sandwich attacks' front-running cryptocurrency transactions. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).
Referências do EpisódioWindows Win32 Kernel Subsystem Elevation of Privilege Vulnerability New - CVE-2025-24983Windows NTFS Information Disclosure Vulnerability New - CVE-2025-24984Windows Fast FAT File System Driver Remote Code Execution Vulnerability New - CVE-2025-24985Windows NTFS Information Disclosure Vulnerability New - CVE-2025-24991Windows NTFS Remote Code Execution Vulnerability New - CVE-2025-24993Microsoft Access Remote Code Execution Vulnerability New - CVE-2025-26630Microsoft Management Console Security Feature Bypass Vulnerability New - CVE-2025-26633Apple fixed the third actively exploited zero-day of 2025Exposure of Sensitive Information to an Unauthorized ActorUse of hardcoded key used for remote backup server password encryptionXSS flaw in Fortiview/SecurityLogs pagesCross Site Request Forgery in admin endpointIncorrect authorization in GUI consoleMultiple command injections on CLIMultiple format string vulnerabilitiesOs command injection on vm download featureBallista – New IoT Botnet Targeting Thousands of TP-Link Archer RoutersNew XCSSET malware adds new obfuscation, persistence techniques to infect Xcode projectsDCRat backdoor returnsAnalyzing Elysium, a Variant of the Ghost (Cring) Ransomware FamilyRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
Three Buddy Problem - Episode 37: This week, we revisit the public reporting on a US/Russia cyber stand down order, CISA declaring no change to its position on tracking Russian threats, and the high-level diplomatic optics at play. Plus, a dissection of ‘The Lamberts' APT and connections to US intelligence agencies, attribution around ‘Operation Triangulation' and the lack of recent visibility into these actors. We also discuss a fresh batch of VMware zero-days, China's i-Soon ‘hackers-for-hire' indictments, the Pangu/i-Soon connection, and a new wave of Apple threat-intel warnings about mercenary spyware infections. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).
Referências do EpisódioVMSA-2025-0004: VMware ESXi, Workstation, and Fusion updates address multiple vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226)Android Security Bulletin—March 2025Cellebrite zero-day exploit used to target phone of Serbian student activistSilk Typhoon targeting IT supply chainUnveiling EncryptHub: Analysis of a multi-stage malware campaign Not Lost in Translation: Rosetta 2 Artifacts in macOS IntrusionsRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia
In dieser Episode tauchst Du mit Gastgeber Björn Schorre und Gast Tim Schmaderbeck tief ins Thema "No Zero Days" ein – und warum unternehmerisches Denken nicht nur etwas für Selbstständige ist. Gerade als angestellter Ingenieur kannst Du Deine Karriere massiv vorantreiben, wenn Du Dich wie ein Unternehmer im Unternehmen verhältst. Tim erklärt, warum proaktive Mitarbeitende nicht nur schneller aufsteigen, sondern auch die Innovationskraft ihres Unternehmens stärken. Du erfährst, welche Gewohnheiten erfolgreiche Intrapreneure haben, warum selbstgesteuertes Lernen ein Gamechanger ist und wieso es nicht ausreicht, einfach nur gute Arbeit abzuliefern – Du musst auch sichtbar machen, was Du leistest. Ob Du angestellter Ingenieur bist oder selbst ein Team leitest – diese Episode liefert Dir konkrete Tipps, wie Du unternehmerisches Denken in Deinem Job verankerst und damit nicht nur Deine Karriere, sondern auch Dein Unternehmen voranbringst. Hör rein – und mach den ersten Schritt zu Deinem eigenen No Zero Day! Tim's Unternehmen "Mentorwerk" -> https://mentorwerk.de/ Agiles BarCamp in Herford -> https://agile-owl.de/ systems.camp in Padernborn -> https://systemscamp.org/ Gewinnspiel: mailto:feedback@zukunftsarchitekten-podcast.de ### ############### Meine Mailadresse: mailto:feedback@zukunftsarchitekten-podcast.de ### ############### Brauchst Du Unterstützung bei der Erstellung eines Lastenheftes oder hast eine Frage dazu, dann findest Du meine Email in den Shownotes. Klicke darauf oder kopiere sie in Dein Emailprogramm und schicke mir eine Mail und wir sprechen darüber. Dann kannst Du Dir in meinem Online-Kalender auch gerne direkt einen Termin buchen: https://kalender.bjoernschorre.de ### ############### P.S.: Mein Buch zum Thema Lastenhefte ist da. Du findest es auf der Verlagsseite von tredition -> https://shop.tredition.com/booktitle/Erfolgreich_Lastenhefte_schreiben/W-337-928-077?utm_source=zukunftsarchitekten-podcast.de&utm_medium=podcast&utm_campaign=generic
In our latest episode, we review the Zero Day and Paradise tv series. Throughout the episode, we draw parallels between the themes of these shows and real-world events, such as the recent aviation disasters, bank outages, and the ongoing plan of billionaires prepping for doomsday via underground bunkers."Zero Day" explores a chilling scenario where a cyber attack disrupts the electric grid, causing chaos and destruction. (Find on Netflix)On the other hand, "Paradise" presents a story about a catastrophic event that forces the elite to retreat to a hidden bunker, leaving the general population to fend for themselves. (Find on Hulu)Tune into the discussion! Don't forget to visit our website at www.therealisthevisionary.com to join our community, share your thoughts, and stay updated on our latest episodes. And be sure to follow us on TikTok and Instagram for more behind-the-scenes content and updates.Become a supporter of this podcast: https://www.spreaker.com/podcast/the-realist-the-visionary--3304218/support.
Apple, the UK, and data protection, you can get pwned really fast, Australia says no Kaspersky for you!, the default password is on the Internet, topological qubits, dangerous AI tools, old software is not just old but vulnerable too, tearing down Sonic Walls, CWE is good but could be great, updating your pi-hole, should you watch "Zero Day"? my non-spoiler review will tell you, no more DBX hellow SBAT!, and I love it when chat logs of secret not-so-secret ransomware groups are leaked! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-863
Apple, the UK, and data protection, you can get pwned really fast, Australia says no Kaspersky for you!, the default password is on the Internet, topological qubits, dangerous AI tools, old software is not just old but vulnerable too, tearing down Sonic Walls, CWE is good but could be great, updating your pi-hole, should you watch "Zero Day"? my non-spoiler review will tell you, no more DBX hellow SBAT!, and I love it when chat logs of secret not-so-secret ransomware groups are leaked! Show Notes: https://securityweekly.com/psw-863
Apple, the UK, and data protection, you can get pwned really fast, Australia says no Kaspersky for you!, the default password is on the Internet, topological qubits, dangerous AI tools, old software is not just old but vulnerable too, tearing down Sonic Walls, CWE is good but could be great, updating your pi-hole, should you watch "Zero Day"? my non-spoiler review will tell you, no more DBX hellow SBAT!, and I love it when chat logs of secret not-so-secret ransomware groups are leaked! Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-863
Apple, the UK, and data protection, you can get pwned really fast, Australia says no Kaspersky for you!, the default password is on the Internet, topological qubits, dangerous AI tools, old software is not just old but vulnerable too, tearing down Sonic Walls, CWE is good but could be great, updating your pi-hole, should you watch "Zero Day"? my non-spoiler review will tell you, no more DBX hellow SBAT!, and I love it when chat logs of secret not-so-secret ransomware groups are leaked! Show Notes: https://securityweekly.com/psw-863
A ton of stories for you this week including the iPhone 16E bringing premium features at a (relatively) budget-friendly €730. Ireland is on track to join CERN as an associate member, opening up exciting opportunities for research and business development. Plus how Irish data centers consume more electricity than all residential properties combined and why we want more!After that, our guest is Zero Days organiser Mark Lane, who shares his cyber security journey and how it started literally on the streets of Dublin! For more on the event, see ZeroDays.ieJoin Niall and Dusty right now for analysis and entertaining banter on Irish and world tech this week.Listen to Tech Radio on Apple, Spotify or YouTube—----- Apple - https://podcasts.apple.com/us/podcast/tech-radio-ireland/id256279328Spotify - https://open.spotify.com/show/5vAWM1vvHbQKYE79dgCGY2YouTube - https://www.youtube.com/@TechRadioIrelandRSS - https://feeds.transistor.fm/techradio
Send us a textWhen I think about habits, I think about Mike Brown. Today, Mike joins us to share his journey after being diagnosed with ALS in October 2023 and how his lifelong commitment to fitness has helped him cope with the challenges. We take a serious look at Mike's philosophy of “zero days to waste,” and the importance of making every day, and every interaction, meaningful.Mike shares stories about his career in law enforcement, the effects of his diagnosis on his family, and the crucial lessons he's learned along the way. Despite the immense challenges, he continues to embody resilience and discipline, something I have witnessed firsthand over years of friendship. Tune in for a conversation that will inspire you to take control of your habits, maintain a positive outlook, and live each day with purpose.Support Mike and others living with ALS by volunteering or donating ALS United. - - - - - - - - - - -Thanks to our sponsors: Atheltic Brewing | The Patriot Fund | Few Will HuntSupport Consequence of HabitSubscribe: Apple Podcast | SpotifyCheck us out: Instagram | Twitter | WebsiteThe show is Produced and Edited by Palm Tree Pod Co.
The hosts analyze a series of recently released vulnerabilities and CVEs, offer expert insights, and detail their implications for cybersecurity. They review key threats impacting Active Directory, Windows systems, and Apple devices, emphasizing the ease of exploitation and the pressing need for timely patching. The conversation stresses the importance of implementing strong, defense-in-depth cybersecurity strategies.
Three Buddy Problem - Episode 31: Dennis Fisher steps in for Ryan Naraine to moderate discussion on a very busy week in cybersecurity. The cast dig into the wave of big research reports, the disbanding of the Cyber Safety Review Board (CSRB), the ongoing flood of exploits targeting security appliances from Ivanti and SonicWall, and the recent Lumen research on Juniper router backdoors. Plus, the challenges of coordinating disclosures, the tough realities of intelligence work, and the complex landscape of nation-state attacks -- especially around Chinese threat actors and Western defenses. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Dennis Fisher. Ryan Naraine (https://twitter.com/ryanaraine) in on work travel.
In this episode of Trust Issues, host David Puner dives into the recent high-profile cyberattack on the U.S. Treasury Department. Joined by Andy Thompson, CyberArk Labs' Senior Offensive Research Evangelist, and Joe Garcia, CyberArk's Principal DevOps Solutions Engineer, they explore the timeline, details and implications of the attack. Discover proactive security recommendations, insights into zero-day vulnerabilities and the broader impact on federal cybersecurity. Tune in to learn how to help bolster your defenses against future cyber threats.To read CyberArk Labs' analysis of the U.S. Treasury attack, check out the teams' blog, "The US Treasury Attack: Key Events and Security Implications."
Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings & Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect! The 12 Days of Malware lyrics On the first day of Christmas, my malware gave to me: A keylogger logging my keys. On the second day of Christmas, my malware gave to me: 2 Trojan Apps... And a keylogger logging my keys. On the third day of Christmas, my malware gave to me: 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fourth day of Christmas, my malware gave to me: 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fifth day of Christmas, my malware gave to me: 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the sixth day of Christmas, my malware gave to me: 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the seventh day of Christmas, my malware gave to me: 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eighth day of Christmas, my malware gave to me: 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the ninth day of Christmas, my malware gave to me: 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the tenth day of Christmas, my malware gave to me: 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eleventh day of Christmas, my malware gave to me: 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the twelfth day of Christmas, my malware gave to me: 12 Hackers hacking... 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. Learn more about your ad choices. Visit megaphone.fm/adchoices
Vegas Golden Knights Insider Hockey Show with Frank Harnish and Ryan Wallis
Andrew Tate's platform, formerly known as Hustler's University, has been hacked, exposing the data of over 800,000 users. Meanwhile, Russian hackers have exploited critical zero-day vulnerabilities in Firefox and Windows, demonstrating the growing sophistication of cyberattacks. In this video, we'll break down the Andrew Tate hack, the implications of leaked user data, and how Russian threat actors are chaining vulnerabilities for remote code execution. Stay informed on the latest in cybersecurity and learn how to protect yourself against these emerging threats. If you enjoy this content, don't forget to like, comment, and subscribe to stay updated on the latest in digital crime and cybersecurity! #AndrewTate #Cybersecurity #Hackers #DataBreach #ZeroDay #RussianHackers #HustlersUniversity #TheRealWorld #CyberThreats #DigitalSafety #Malware #Hacktivism #DataLeaks #FirefoxExploit #WindowsExploit #NationStateHackers #TechNews #OnlineSecurity #TheRealWorld
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast Bitfinex hacker gets 5 years in jail https://www.bleepingcomputer.com/news/security/bitfinex-hacker-gets-5-years-in-prison-for-120-000-bitcoin-heist/ Serial swatter pleads guilty https://www.justice.gov/opa/pr/california-teenager-pleads-guilty-florida-making-hundreds-swatting-calls-across-united https://www.wired.com/story/alan-filion-torswats-guilty-plea-federal-charges-swatting/ Woodysgamertag gets swatted: https://www.youtube.com/watch?v=ERUArsRV1Xc Foreign threat actors abusing RDP as attack vector https://www.cisa.gov/news-events/alerts/2024/10/31/foreign-threat-actor-conducting-large-scale-spear-phishing-campaign-rdp-attachments Threat actors are more commonly using zero-days https://therecord.media/surge-zero-day-exploits-five-eyes-report Christmas comes early https://www.marthastewart.com/2220623/when-to-decorate-for-christmas Dad Joke of the Week (DJOW) Please share this podcast with someone you know! It helps us grow the podcast and we really appreciate it! Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/
Three Buddy Problem - Episode 22: We discuss Volexity's presentation on Russian APT operators hacking Wi-Fi networks in “nearest neighbor attacks,” the Chinese surveillance state and its impact on global security, the NSA's strange call for better data sharing on Salt Typhoon intrusions, and the failures of regulatory bodies to address cybersecurity risks. We also cover two new Apple zero-days being exploited in the wild, the US Government's demand that Google sell the Chrome browser, and the value of data in the context of AI. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs) (SentinelLabs), Costin Raiu (https://twitter.com/craiu) (Art of Noh) and Ryan Naraine (https://twitter.com/ryanaraine) (SecurityWeek).
Zero Days to Expiration oder kurz 0DTE Optionen sind eine spezielle Form von Optionskontrakten, die am selben Tag verfallen, an dem sie gehandelt werden. Diese kurzlebigen Derivate haben in den letzten Jahren stark an Popularität gewonnen und machen mittlerweile einen bedeutenden Anteil des Optionshandels aus. Nach über zwei Jahren manuellen und automatisierten 0DTE-Handels ziehe ich im aktuellen CapTrader Cash Call eine Zwischenbilanz. Zuvor drehen wir noch einen kurzen Schlenker über die Versicherungswirtschaft. Als treuer Kunde profitiere ich seit vielen Jahren von den günstigen Preisen, dem riesigen Wertpapierangebot und dem hervorragenden Service von CapTrader. Gemeinsam haben wir daher ein besonderes Paket zur Depoteröffnung geschnürt. Ab sofort erhalten alle Neukunden ein Gratisgespräch mit mir zu einem Finanzthema ihrer Wahl - exklusiv über meine Partnerseite.
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast here. Show notes Risky Biz News: Most of 2023's top exploited vulnerabilities were initially zero-days
Forecast: CYBER WEATHER ALERT | Volt Typhoon bringing sustained APT activity across the Pacific Rim. Expect persistent perimeter probing with a 100% chance of state-sponsored shenanigans. Pack your EDR umbrella! This week's episode tackles a disturbing story from Disney World where a terminated employee allegedly hacked into their menu system to alter critical peanut allergy information. We dig into the attack details then don our tin-foil hats to explore the potential real-world consequences of malicious insider threats. We're excited to share Sophos' latest research on Pacific Rim, an extensive investigation into nation-state adversaries targeting edge devices. We hone in on this event through the filter of GreyNoise's analysis of this multi-year APT campaigns, and show you live threat data through the GreyNoise Visualizer to demonstrate the ongoing nature of these attacks. VulnCheck brings us two fascinating pieces - a deep examination of ABB vulnerabilities affecting industrial control systems, and an innovative new command-and-control feature called ShellTunnel in the go-exploit framework. GreyNoise has been especially busy, uncovering zero-day vulnerabilities in live streaming cameras using AI assistance. We'll discuss their technical breakdown of CVE-2024-8956 and CVE-2024-8957, which CISA just added to their Known Exploited Vulnerabilities catalog. The October NoiseLetter is out with the latest threat intelligence insights, and don't miss upcoming events including the Quarterly Roadmap Showcase and a special webinar on discovering zero-days with AI. Storm Watch Homepage >> Learn more about GreyNoise >>
Enjoy those millennia in the crystals, cucks!
Pokémon game developer breached TrickMo hits with 40 new trojan variants Nation-state actor exploits Ivanti zero-days Thanks to today's episode sponsor, Conveyor It's spooky season, and nothing's scarier than all of your account execs asking if you're done with their customer security questionnaires. Don't worry—Conveyor is here to help. Conveyor's market leading AI automates the most time-consuming parts of customer security reviews: answering security questionnaires and sharing security docs like your SOC 2 with customers. Get instant AI answers to questionnaires and host an enterprise-grade trust center where customers can download documents and self-serve answers to their own questions. End the horror show. Try it for free at www.conveyor.com. Get the story behind the headlines at CISOSeries.com.
Three Buddy Problem - Episode 8: This week's show digs into Microsoft's in-the-wild zero-day woes, Patch Tuesday and the absence of IOCs, a wormable Windows TCP/IP flaw that the Chinese government knew about for months, Iran's aggressive hacking US election targets, CrowdStrike v Qihoo360 and major problems with APT naming conventions. Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek)
Haley and Jillian dive right into a national park summer vacation with Yosemite and the horrors of the half dome hike. Then Jillian talks about Sierra Nevada Bighorn Sheep for conservation corner. Sources: Yosemite National Park, The National Park Foundation Yosemite National Park, Yosemite Mariposa County John Muir, National Park Service Ansel Adams, National Park Service Half Dome Day Hike, National Park Service Deaths in Yosemite National Park, Roberts & Spiegel Injury Lawyers Half Dome hiker tried to grab Arizona woman as she tumbled to her death, Mike Moffitt, SF Gate How I Almost Died Climbing Yosemite's Half Dome, Swati Vijaykumar, India Currents A perilous summit in Yosemite has caused at least 300 accident in the past 15 years. Here's why people keep sleeping and falling, Aria Bendix, Business Insider Sierra Nevada Bighorn Sheep Facts, California Department of Fish and Wildlife Sierra Nevada Bighorn Sheep Foundation Episode 172 - Bighorn Sheep: Nature's Hard Hats, Life, Death, and Taxonomy
Three Buddy Problem - Episode 4: The boys delve into the massive AT&T call logs breach, the Snowflake incidents and the notion of shared-fate/shared responsibilities; news on fresh Apple notifications about mercenary spyware on iPhones and the effectiveness of notifications for different types of controversial targets. Plus, thoughts on Microsoft's zero-day disclosures and useless Patch Tuesday bulletins, AI-powered disinformation campaigns, and the US government's malware sharing initiative fading away. Hosts: Costin Raiu (Art of Noh), Juan Andres Guerrero-Saade (SentinelLabs), Ryan Naraine (SecurityWeek).
Brenden Schaeffer discusses Wednesday's Cardinals loss in the series finale in Miami as the Marlins walked it off in the ninth after Matthew Liberatore made the start on zero days rest. That is correct. With Kyle Gibson coming up injured moments, literally minutes before the game, Liberatore was summoned to pitch into the fourth inning despite having thrown about 16 hours prior. It started as badly as possible but Libby settled in to give the Cardinals a chance. The rest of the bullpen helped. The Cardinal offense hardly did. Sigh. We discuss the game and look ahead to Thursday at Rickwood Field (Brenden will be live from Birmingham). Follow this podcast feed for daily Cardinals content all season long! --- Send in a voice message: https://podcasters.spotify.com/pod/show/bschaeffer12/message
In this episode of the Two Minute Drill, Drex discusses recent vulnerabilities in Google Chrome that impact over two billion users and the publication of CSC 2.0's targeted report on cybersecurity in the healthcare industry. The episode also covers a significant cyber attack on London hospitals, emphasizing the urgent need for robust security measures in healthcare facilities worldwide.Remember, Stay a little paranoid.Subscribe: https://www.thisweekhealth.com/subscribe/Linkedin: https://www.linkedin.com/company/ThisWeekHealthTwitter: https://twitter.com/thisweekhealthDonate: Alex's Lemonade Stand: Foundation for Childhood Cancer - https://www.alexslemonade.org/mypage/3173454
When you're the biggest target... Searching for Search How long will a Windows XP machine survive unprotected on the Internet? Free Laundry VPNs and Firewalls Netgate SG1100 Ad Industry vs. Google Privacy Sandbox Bitwarden and passkeys Token2 passkey dongle 312 Scientists & Researchers Respond Show Notes - https://www.grc.com/sn/SN-975-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT 1bigthink.com business.eset.com/twit mylio.com/TWIT25
When you're the biggest target... Searching for Search How long will a Windows XP machine survive unprotected on the Internet? Free Laundry VPNs and Firewalls Netgate SG1100 Ad Industry vs. Google Privacy Sandbox Bitwarden and passkeys Token2 passkey dongle 312 Scientists & Researchers Respond Show Notes - https://www.grc.com/sn/SN-975-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT 1bigthink.com business.eset.com/twit mylio.com/TWIT25
When you're the biggest target... Searching for Search How long will a Windows XP machine survive unprotected on the Internet? Free Laundry VPNs and Firewalls Netgate SG1100 Ad Industry vs. Google Privacy Sandbox Bitwarden and passkeys Token2 passkey dongle 312 Scientists & Researchers Respond Show Notes - https://www.grc.com/sn/SN-975-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT 1bigthink.com business.eset.com/twit mylio.com/TWIT25
When you're the biggest target... Searching for Search How long will a Windows XP machine survive unprotected on the Internet? Free Laundry VPNs and Firewalls Netgate SG1100 Ad Industry vs. Google Privacy Sandbox Bitwarden and passkeys Token2 passkey dongle 312 Scientists & Researchers Respond Show Notes - https://www.grc.com/sn/SN-975-Notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to this show at https://twit.tv/shows/security-now. Get episodes ad-free with Club TWiT at https://twit.tv/clubtwit You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Sponsors: canary.tools/twit - use code: TWIT 1bigthink.com business.eset.com/twit mylio.com/TWIT25
This week we are joined by Ruth Ware! Ruth Ware is an international number one bestseller. Her thrillers In a Dark, Dark Wood, The Woman in Cabin 10, The Lying Game, The Death of Mrs Westaway, The Turn of the Key, One by One, The It Girl and Zero Days have appeared on bestseller lists around the world, including the Sunday Times and New York Times, and have sold more than six million copies. Her books have been optioned for both film and TV, and she is published in more than 40 languages. Make sure to check her out!In this episode, we discuss traveling for work, having both social and solo modes, being in the headspace for writing, setting boundaries, the importance of supporting independent bookstores, fan fiction, being a modern day Agatha Christie, and so much more. You don't want to miss our discussion about how Ruth transitioned from writing children's books to thrillers. Give this episode a listen!Recommendations from this episode: In a Dark Dark WoodThe It GirlBaby ReindeerThe TraitorsThe Butcher Game Follow Ruth Ware: @ruthwarewriterFollow Carly: @carlyjmontagFollow Emily: @thefunnywalshFollow the podcast: @aloneatlunchpodPlease rate and review the podcast! Spread the word! Tell your friends! Email us: aloneatlunch@gmail.comSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
From JavaScript to AsyncRAT https://isc.sans.edu/diary/From%20JavaScript%20to%20AsyncRAT/30788 TeamCity Patches https://www.jetbrains.com/privacy-security/issues-fixed/?product=TeamCity&version=2024.03 Okta Verify for Windows Auto-update Arbitrary Code Execution CVE-2024-0980 https://trust.okta.com/security-advisories/okta-verify-windows-auto-update-arbitrary-code-execution-cve-2024-0980/ Google Zero Day Report https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/Year_in_Review_of_ZeroDays.pdf
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
From JavaScript to AsyncRAT https://isc.sans.edu/diary/From%20JavaScript%20to%20AsyncRAT/30788 TeamCity Patches https://www.jetbrains.com/privacy-security/issues-fixed/?product=TeamCity&version=2024.03 Okta Verify for Windows Auto-update Arbitrary Code Execution CVE-2024-0980 https://trust.okta.com/security-advisories/okta-verify-windows-auto-update-arbitrary-code-execution-cve-2024-0980/ Google Zero Day Report https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/Year_in_Review_of_ZeroDays.pdf
Merry Christmas and Happy Holidays from the CyberWire and our friends! Enjoy our rendition of the 12 Days of Malware created by Dave Bittner and performed by Dave and friends: Rachel Tobac, Jayson Street, Ron Eddings & Chris Cochran, Ray [Redacted], Dinah Davis, Camille Stewart, Rick Howard, Michelle Dennedy, Jack Rhysider, Johannes Ullrich, and Charity Wright. Ba dum bum bum. Sing along if you are game! Check out our video for the full effect! The 12 Days of Malware lyrics On the first day of Christmas, my malware gave to me: A keylogger logging my keys. On the second day of Christmas, my malware gave to me: 2 Trojan Apps... And a keylogger logging my keys. On the third day of Christmas, my malware gave to me: 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fourth day of Christmas, my malware gave to me: 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the fifth day of Christmas, my malware gave to me: 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the sixth day of Christmas, my malware gave to me: 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the seventh day of Christmas, my malware gave to me: 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eighth day of Christmas, my malware gave to me: 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the ninth day of Christmas, my malware gave to me: 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the tenth day of Christmas, my malware gave to me: 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the eleventh day of Christmas, my malware gave to me: 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! (Bah-dum-dum-dum!) 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys. On the twelfth day of Christmas, my malware gave to me: 12 Hackers hacking... 11 Phishers phishing... 10 Darknet markets... 9 Rootkits rooting... 8 Worms a wiping... 7 Scripts a scraping... 6 Passwords spraying... 5 Zero Days! 4 Crypto scams... 3 Web shells... 2 Trojan Apps... And a keylogger logging my keys.