Discover
Jared's Technology Podcast Network
Jared's Technology Podcast Network
Author: Jared Rimer
Subscribed: 3Played: 38Subscribe
Share
© Jared Rimer
Description
This podcast network will have my main tech program when something comes out which is not security related. Sans News Bites, The Security Box, and other tech nuggets will also be here too. Some adult language may be possible in content, and a disclaimer plays on TSB as its a show on the mix. Enjoy!
428 Episodes
Reverse
Hello gang, welcome to another Sans Podcast. I know we're quite behind, and my goal was to do these podcasts between TSB episodes, but the week of the 17th had two meetings, one of which went to a second meeting I decided to stay for. For those who are not clear by this, the two meetings I were to attent happened on two different days, but then one meeting I stayed for happened on the first day and it isn't a regular meeting I stay for.This podcast is going to cover the newsletter that was released way back on January 9th, 2026. My goal is to get us caught up, and I'm going to do my best. Would you like to read the newsletter? Here is the link to read January 9, 2026 and its newsletter if you wish.I believe one of the biggest stories may be this web page California residents can go to so they can opt out of stuff. Let's see what is in the top of the news. California's New Privacy Law Lets Consumers Submit One Demand for All Registered Data Brokers to Stop Collecting Their Information Threat Actor’s Breach was a Resecurity Honeypot Hospitality Staff, Beware ClickFix Attacks that Mimic BSOD Here is what they covered for the rest of the week's news for this newsletter. Cisco Releases Updates for ISE and Snort 3 Distributed Computing Environment/Remote Procedure Call Vulnerabilities n8n Releases Patches for Two Critical Vulnerabilities in One Week Veeam Update Addresses Four Vulnerabilities CISA KEV Adds Code Injection Vulnerabilities in HPE OneView and Microsoft Office PowerPoint Critical Missing Authentication Vulnerability in WHILL Electric Wheelchairs European Space Agency Acknowledges Infosec Breach I hope you all enjoy the program as much as I am bringing it to you, and make it a great day!
Hello folks, welcome to the next TSB, pprogram 266. This week, we are going to talk about a 2025 story dealing with hundreds being detained and several ransomware strains being decrypted through tools available to the public. The blog post leads to the article. The blog is titled 6 ransomware strains decrypted, hundreds detained which sparked some comment last podcast.As part of discussion: Here we go again with more domains being registered, sits there with possible plans should be read from our November diatribes list.We do have videos from Nick Espinosa which include items like the world cup being invaded by AI, breaches of the week, mobile phones being not very secure soon, and a question: Why does your supermarket need your biometrics? Preston Gaylor is along with comments as well. When we were looking at blogs and articles, we saw something about a CSAM article that talked about a suspect who was involved in CSAM and actually getting some substantial jail time. CSAM suspect jailed for close to 10 years is the blog post where I take this article apart. Now to our question from last podcast. Did you get it correct?The question last week was: Let’s get this Monday moving, Jared. You know how sometimes a name change can make everything feel new? Like when The Artist Formerly Known as Prince became a symbol, or when Dunkin’ ditched “Donuts” and got all minimalist on us. Well, Mark Zuckerberg had a major rebrand moment, too, swapping out “Facebook” for “Meta” to match his metaverse vision. But in doing so, he triggered an awkward translation situation. Meta, in Hebrew, means what? A) Chaos, B) Nightmare, C) Dead or D) Broken. The answer is chilling at the end. The answer: C) “Dead.” When Zuckerberg swapped “Facebook” for “Meta,” he might’ve been thinking “next-gen digital frontier,” but Hebrew speakers heard something closer to a funeral announcement. “Meta” sounds like the feminine form of the Hebrew word for “dead” (“מתה”), sparking a wave of memes and mock headstones. Congrats to those who got this right! See you on another podcast coming soon and make it a great day!
Hello gang, welcome to program 36 of the Sans series here at the Jared Rimer Network. I'm Jared Rimer. Here's the thing. We're not taking anything away from any other podcast, we just want to put out the news and things from this great educational institution and put our thoughts in to it. With that said, we'll see what happens, as the News Bites series continues. Sans 35 covered ouch! for January Fake Tech Support: The Only Thing They’re Fixing Is Your Bank Account, so 36 will be the first News Bites of the year.Here is the link to read the Newsletter online and we'd love to hear your thoughts! Again, this is the newsletter for January 6, 2026. Call (888) 405-7524 and drop your messages there, or find contact information throughout the podcast.Here is what is in the top of the news for this newsletter. Patch MongoDB Now to Fix Exploited Memory Leak Guilty Plea from Former Cybersecurity Pros Turned Extortionists Fortinet CVE-2020-12812 is Being Actively Exploited Again <Guilty pleas within the top of the news makes my heart very happy. Let's see what else we can find good within this industry this year, shall we? Here is what else is happening in the rest of the week's news section of the newsletter. South Korean Government Report Says KT Mishandled Femtocell Security, Leading to Snooping and Micropayment Fraud Check Local Network for Kimwolf Residential Proxy Botnet Infection Sedgwick Government Solutions Acknowledges Cybersecurity Incident Affecting File Transfer System KEV Additions: Digiever DS-2105 Pro Network Video Recorders and MongoDB Server New Zealand Healthcare Portal Acknowledges Cybersecurity Incident Covenant Health Breach Follow-up: Nearly 480,000 Individuals Affected HIPAA Journal Lists Largest Healthcare Data Breaches of 2025; Aflac Updates Individuals Affected by June Incident to 22.65 Million We thank you for listening to the tech series, and please let us know what your thoughts are. I do want to know!
Welcome to TSB, episode 265. The Trivia Question this time is:Let’s get this Monday moving, Jared. You know how sometimes a name change can make everything feel new? Like when The Artist Formerly Known as Prince became a symbol, or when Dunkin’ ditched “Donuts” and got all minimalist on us. Well, Mark Zuckerberg had a major rebrand moment, too, swapping out “Facebook” for “Meta” to match his metaverse vision. But in doing so, he triggered an awkward translation situation. Meta, in Hebrew, means what? A) Chaos, B) Nightmare, C) Dead or D) Broken. The answer is chilling at the end. Please feel free to call and leave your guess at (888) 405-7524 and give us your name or name you want to go by as well as your guess. Since we've been gone, we're trying to catch up the blog with podcast announcements with full length show notes of past programs including Sans and TSB.Also, as we announced, we're going to change this show to every two weeks. We're doing this because this will give us more time to find something to talk about, but yet we won't feel burned out. Here are things we might talk about during this open edition of the program. Here we go … another click fix attack Update on Crypto Currency thefts and an old breach Covenant Health is covered in recent breaches of the week The Stupid fucks of the year Diatribes of 2025 Disney to pay a pretty penny for Coppa violations Health breaches and denmark goes digital? 6 ransomware strains decrypted, hundreds detained
Hello folks, welcome to another Sans episode with Jared Rimer.Today, we have Ouch, the newsletter for January 2026. In it, it talks about technical support scams. I've even heard some discussion on other podcasts including Scam Squad, so this means that they're back with a vengeance. The problem is, they don't use the same tactics, techniques and procedures they used to. While the example herein is a popup from a website, it may arrive in an unsolicited text message, or even on social media. I don't think it has hit social media yet, but it could go there, so just be on the lookout.We have headings that are within the newsletter. They include: How a “Helpful” Call Turned Costly What Are Tech Support Scams? What Are They After? How These Scams Work How to Protect Yourself Final Thoughts Each section listed above has something for you, and of course the newsletter is now part of San's podcast series. Here are other links you'll need. Here is a link to the Ouch Podcast on Sans Institute's web site Fake Tech Support: The Only Thing They’re Fixing Is Your Bank Account written by Jennifer Cox Thanks so much for listening, and make it a great day!
Hello folks, welcome to Sans, episode 34. On this episode, we will learn about a ten year anniversary of something that a certain nation state did, Russia. Looks like we've got a couple of more breaches to talk about, and much more. While I will put in the info from the newsletter, the newsletter will have more info including links which I will not include. This will be the last version of the newsletter for now. In the table of contents, under Internet Storm Center which are articles to various things, they mention this. Once recorded, that will be the last podcast until January 2026. Happy new year!Would you like to read the newsletter? Here is the link for December 23, 2025 for your convenience. Ransomware Attack on Romanian Water Management Authority Affected More than 1,000 Systems Widespread Microsoft 365 OAuth Attacks Patch WatchGuard Fireware OS for Exploited Critical Flaw Nigerian Authorities Arrest RaccoonO365 Suspects Indictments Charge 54 People in Connection with ATM Jackpotting Scheme Using Ploutus Malware UK Foreign Office Says it is Investigating Breach University of Phoenix Sends Notifications After Oracle Breach Malicious npm Package Steals WhatsApp Data University of Sydney Discloses Data Breach, Reviews Data Practices NIST Internet Time Services May Be Inaccurate After Pre-emptive Power Outage in Colorado >Contact me through my my">http://www.jaredrimer.net">my web site or listen to the program to learn how you can contact me. All of the methods are available for you.Thanks so much for listening, and make it a great day!
Hello folks, welcome to sans, episode 33. This is going to cover the newsletter for December 19th, which means we're pretty much caught up. Yeah!would you like to view the newsletter to see what might be of interest to you? Here's the newsletter for December 19, 2025. Here is what is in the top of the news and we've got to start with yet another maximum severity flaw. Cisco AsyncOS Unpatched Maximum-Severity Flaw Exploited SonicWall Addresses Actively Exploited Vulnerability in SMA 100 Series Appliances; CISA Adds Flaw to KEV with a One-Week Mitigation Deadline Known Critical Flaws in Fortinet Products are Being Actively Exploited Are you surprised about the fortinet stuff? Seems like they're in Sans practicly every newsletter it seems, even though we missed time due to illness.Here is what is in the rest of the week's news and we start again with a maximum severity bug but this time with an RCE. Patch HPE OneView to Fix Maximum-Severity RCE Flaw ASUS Live Update Vulnerability Added to KEV RAT Allegedly Discovered on Mediterranean Ferry NHS Technology Supplier Discloses Cybersecurity Incident Virginia Mental Health Authority Breach Follow-Up: French Ministry of the Interior Cyberattack Law Enforcement Dismantles Infrastructure for Alleged Ransomware Money Laundering Service I can't wait to see what the update on the French Ministry is. It sounded like the beginning of a particular investigation which was just getting started last podcast and newsletter for December 16. Please contact me through my web site or listen to the podcast to learn how to contact me. Thanks so much for listening, and make it a happy holiday season!
Welcome to the Sans program with Jared Rimer. I hope that everyone will enjoy the program this time. This episode will be talking about the newsletter from December 16, 2025. Would you like a link to the newsletter? Why not check out the newsletter for December 16, 2025 and we'll see what it covers.At the top of the newsletter, they paid a tribute to Dan Kaminsky who was a security researcher and worked tirelessly to make things accessible and found a very serious bug within DNS. He was born in 1979 and died in 2001. The link is to his entry on Wikipedia. Here is what's going on with the top of the news for this newsletter. Apple WebKit and Google Chrome Zero-Days Exploited and Patched More React Vulnerabilities CISA Adds GeoServer and Sierra Vulnerabilities to KEV If you've not patched apple, do so. I believe this only applies to 26.x as when I asked the phone, it gave me 26.2 and nothing in the 18 series.Here's what is in the rest of the week's news for this newsletter. MITRE 25 Most Dangerous Vulnerabilities of 2025 Microsoft is Deprecating RC4 Cipher JLR Follow-up: Payroll Data Breached Prosper and 700Credit Disclose Breaches Coupang Follow-up French Ministry of the Interior’s Email System Suffers Cyberattack Want to contact me? Send an email to tech at menvi.org (put the symbol where it belongs) or give me a call at 888-405-7524. Do find other contact information within the podcast, or go to my web site and learn more about me and find info that way.We thank you for listening, and do make it a great day. Thanks for listening, learning and participating with us! Learning is such a beautiful thing isn't it?
Hello gang, welcome to the Sans News Bites podcast covering the newsletter for December 12, 2025.I know, we should've been continuing to release, but I also have been involved in other things too and taking some time off, but we plan on catching up as there are no meetings we need to attend until next year.I've also been learning about how the RSS features work on getting things linked, and its not as simple as putting the links in place in HTML so we'll continue to improve our show notes and make them better. Do you want to read what is in the newsletter? here is the link to December 12, 2025 if you want to read it. Here's what is in the top of the news. Microsoft Patch Tuesday for December 2025 Includes Exploited Zero-Day Patch Fortinet, Ivanti, and SAP Products for Critical Flaws Patch Fortinet, Ivanti, and SAP Products for Critical Flaws Adobe Security Bulletins Here's the rest of the news Google Patches (Another) Chrome Zero-day Unpatched Gogs Vulnerability is Being Actively Exploited IBM Security Bulletins CISA and Partners Warn of Attacks Against Critical Infrastructure Gartner Warns CISOs to Block AI Browsers Former Accenture Senior Manager Allegedly Lied About Security Control Compliance Pierce County Library System Will Notify 340,000 Individuals Affected by April 2025 Data Breach I hope that you all enjoy the program as much as I am bringing it together for you. Remember, this program reads the news items, and comments on them. We will bring in the editors if they say something I'm thinking as I'm reading the thing. Its quoted in the braille too.Let me know if these show notes are better than past ones. Thanks for listening, make it a great day!
If you haven't gotten the picture yet, this will be the last TSB program of the year.Feel free to visit the blog to learn more about what's going on and I may even post too.Sans will not be going anywhere, and we'll continue to work on catching that up. Some ADA stuff, end of year predictions and chatter about Sans stuff too. Hope you enjoy!
Welcome to sans, episode 30. This will cover the newsletter that was released on December 9, 2025. I hope that people will enjoy the program. This is the link to read the newsletter online. Thanks for reading!
Welcome to program 29 of Sans. The link to the December 5, 2025 newsletter is https://view.email.sans.org/?qs=98500f4c8692dbb312c3051d77038920ed898ed6caa33e4500f4a980442386f2cf208d4038bc473ffe25a888f0f4e9ceafc60e447d83334645b34da0a9bbabbb26d0970656f95232cab5006f8703ffd75d056e09e13503c0">here for you to peruse if you'd like to take a look at it. The top of the news deals with patching including a CVSS of 10 which is the maximumn on this score scale.We've got a couple of breaches, India is rolling back their requirement for security software on phones, and more.Thanks so much for listening to the show, and thanks for learning with us on what is going on in this landscape. It's a lot, but don't take it in all at once.
Welcome to Sans, episode 28 across the Jared Rimer Network. You'll notice a change in the podcast, its Jared's Technology Podcast Network. Same content as the tech blog and podcast, but now reflects what we're trying to do.The Sans issue we're going to cover will be for the newsletter that was for December 2, 2025 as we work to try and catch up.Its link is https://view.email.sans.org/?qs=62bd1cdfd2fc6a82768fc7e448b6600e769e048c38c79f4a6762d3a3d16721db97a1760ab11b741a2d8c43e81023b91a1e3e3812b3acaa8defb82ce5336053f54a245fed6321c85337657b9d082be466 if you want to view it.Thanks so much for listening, reading the blog, and participating in podcasts!
We are so sorry that this is being released late. Its been a bit busy lately.This podcast was aired last wednesday and covers news notes from what people have found as well as our topic of the worst passwords of 2025.Stop">https://www.forbes.com/sites/zakdoffman/2025/11/06/stop-using-every-password-now-thats-on-this-list/">Stop Using Every Password Now That's On This List is the title of this one. Did I mention we have trivia too? To participate, call 888-405-7524 or follow instructions in the program. Enjoy!
We now come with the newsletter for September 21, 2025. We have three idiots going to be talked about, and we even talk about Pharming, that is P H, not F. We neglected it last podcast.Welcome to Sans, episode 27. On this episode, we'll cover Farming, something I realized we didn't cover from last podcast. Then, we'll cover the newsletter, and we'll see what types of comments I have. Here">https://view.email.sans.org/?qs=f988f4249ca0dde285b162c304984dddee170f21a233dfd1669a01d16ebaf9cb60e47212daec371d9aa1ab1f2153e9a7da9c4ff4fd84984614ad984f92541af7431e0284ea2182095892b1d9085c4ef0">Here is the link to the newsletter for November 21, 2025. Thanks so much for listening!
Hello folks, welcome to the program for Sans News Bites. This is episode 26 and it'll cover the newsletter for November 18, 2025. This">https://view.email.sans.org/?qs=a584bedbbeeab05256f36840ed3a3b5f6ebd043f83ccc0a22f51e1952fcbec363ca329ff413074db4293d2a42993b82060eaa63e867df6f38746d83b603a5ca54a02875e671648404d041881205efbfc8ea1d51d8b25b02a">This is the link to the newsletter if you want to read it.Thanks so much for reading. Thanks so much for listening. And thanks so much for learning with us.
Hello gang, welcome to the Security box, podcast 262. On this episode, we're going to learn about actors who abuse the privelage of day to day operations to get shipments from one place to another.We did a deep dive of this through my blog and its a 7 minute read titled Hackers">https://technology.jaredrimer.net/2025/11/04/hackers-to-use-tools-to-breach-freighters-steal-shipments/">Hackers to use tools to breach freighters, steal shipments. This leads to the full article titled Hackers">https://www.bleepingcomputer.com/news/security/hackers-use-rmm-tools-to-breach-freighters-and-steal-cargo-shipments/">Hackers use RMM tools to breach freighters and steal cargo shipments which comes to us from Bleeping Computer. We'll have news, notes and the landscape, and an email which may be making a comeback. We'll have breaches of the week as usual and we'll also see what other stuff we can find as well.I hope you enjoy the program, thanks so much for listening!
Hello gang, its been a long time since we did Sans, and I want to do Sans as it gives us insites in to the landscape. Insite that we don't have otherwise.Let me know if you find a moron of the podcast. Hope you enjoy!Welcome to Sans, episode 25. Yes, its been awhile and I know it. I wanted to get back in to Sans in October but it just wasn't possible with what happened sick wise. I was better in November, but lots of things have been going on but now I want to try and do an episode.This">https://view.email.sans.org/?qs=37dfcc22b7a299ad2af3e3862f664503344a6f6a7b899e99e92e3318e2d7399f15d3ceefc5c91165fac68f723d04bf1924fc9d47b457a566030e6154718e161ce910174565545f09a5a5177fd85c131a">This link is for the newsletter put out Friday November 14, 2025. Since December will be a lot quieter, I hope I can try to get back in to these. I think its a great edition to the podcast set and I've personally missed doing this show. Thanks for everyone's support during my recovery. I greatly appreciate it!
SesameOp seems to be new in town. This">https://technology.jaredrimer.net/2025/11/05/sesameop-malware-abuses-openai-api/">This is the blog post about it.We've not had time to post to the blog, but I did post to the list a few items.We hope you enjoy the show, and we do have a comment from Mr. J. about something we may talk about on our cast as well.
Sorry this podcast is so late. I merged the files on Thursday and never got the files up here. I may have dated the cast for Tjhursday and its still not here. I'm fixing that now.Welcome to the Security box, podcast 260. This is the first time we've done show notes since NCSAM, but that's OK. On this program, we're going to run through the landscape as well as have another interesting topic on EDR stuff. For those who are not familiar with EDR, and you're joining us for the first time, EDR stands for end point detection and response. This is part of some Antivirus tools. There is malware out there that disables this technology and we've been talking about this for quite awhile, even though we've not uploaded to the TSB directory in quite while. The article this time comes from Bleeping Computer and is titled New">https://www.bleepingcomputer.com/news/security/new-edr-freeze-tool-uses-windows-wer-to-suspend-security-software/">New EDR-Freeze tool uses Windows WER to suspend security software which caught Nick's attention. If I remember, Windows WER stands for the "Windows Error Reporting" tool. So if this is the case, this is going to be bad. We'll break this down and we'll see what else the team is going to want to cover. Thanks so much for listening, and make it a great day!If you'd like to support our efforts on what this podcast is doing, you can feel free to donate">http://www.jaredrimer.net/donations.html">donate to the network, subscribing">www.986themix.com/mailman/listinfo/thesecuritybox_986themix.com">subscribing to the security box discussion list or sending us a note through contact information throughout the podcast. You can also find contact details on our blog">https://technology.jaredrimer.net/contact-admins/">blog page found here. Thanks so much for listening, reading and learning! We can't do this alone.




