<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 08 Apr 2026 03:22:46 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Atlanta Ransomware”</title>
    <link>https://techsnap.systems/tags/atlanta%20ransomware</link>
    <pubDate>Tue, 24 Apr 2018 17:00:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 365: The Unfixable Exploit</title>
  <link>https://techsnap.systems/365</link>
  <guid isPermaLink="false">bebfb1b6-cfe5-4c97-855e-24922aeb957c</guid>
  <pubDate>Tue, 24 Apr 2018 17:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/bebfb1b6-cfe5-4c97-855e-24922aeb957c.mp3" length="33195967" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle. </itunes:subtitle>
  <itunes:duration>38:54</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle.  
</description>
  <content:encoded>
    <![CDATA[<p>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle. </p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/04/23/who_me/">Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register</a> &mdash; ‘I was a snot-nosed kid fresh out of college and thought I knew everything!’</li><li><a title="Spoofing Cell Networks with a USB to VGA Adapter | Hackaday" rel="nofollow" href="https://hackaday.com/2018/04/23/spoofing-cell-networks-with-a-usb-to-vga-adapter/">Spoofing Cell Networks with a USB to VGA Adapter | Hackaday</a> &mdash;  Available through the usual overseas suppliers for as little has $5 USD, these devices can be used unmodified to transmit low-power FM, DAB, DVB-T, GSM, UMTS and GPS signals.</li><li><a title="ShofEL2, a Tegra X1 and Nintendo Switch exploit" rel="nofollow" href="https://fail0verflow.com/blog/2018/shofel2/">ShofEL2, a Tegra X1 and Nintendo Switch exploit</a> &mdash; The Tegra X1 (also known as Tegra210) SoC inside the Nintendo Switch contains an exploitable bug that allow taking control over early execution, bypassing all signature checks.</li><li><a title="Atlanta spends more than $2 million to recover from ransomware attack" rel="nofollow" href="https://www.engadget.com/2018/04/23/atlanta-spends-over-2-million-ransomware-recovery/">Atlanta spends more than $2 million to recover from ransomware attack</a> &mdash; . It appears that firms Secureworks and Ernst &amp; Young were paid $650,000 and $600,000, respectively, for emergency services while Edelman was paid $50,000 for crisis communication services. Overall, the funds seemingly applied to the ransomware attack response add up to approximately $2.7 million.</li><li><a title="Google Chrome 66 Released Today Focuses on Security" rel="nofollow" href="https://www.bleepingcomputer.com/news/google/google-chrome-66-released-today-focuses-on-security/">Google Chrome 66 Released Today Focuses on Security</a> &mdash; The biggest change is that Google Chrome will start showing SSL certificate errors for all Symantec certs issued before June 1, 2016. This is "stage two" of Google's long-term plan on distrusting Symantec certificates altogether.</li><li><a title="Where to get started with monitoring?" rel="nofollow" href="https://pastebin.com/bPn1cGLV">Where to get started with monitoring?</a></li><li><a title="defunkt uses a fool tools for his network" rel="nofollow" href="https://pastebin.com/aFmwbguq">defunkt uses a fool tools for his network</a></li><li><a title="Brian shares some love for Zabbix" rel="nofollow" href="https://pastebin.com/z93N6GzR">Brian shares some love for Zabbix</a></li><li><a title="VMware Patches Pwn2Own VM Escape Vulnerabilities" rel="nofollow" href="https://threatpost.com/vmware-patches-pwn2own-vm-escape-vulnerabilities/124629/">VMware Patches Pwn2Own VM Escape Vulnerabilities</a> &mdash; VMware on Tuesday patched a series of vulnerabilities uncovered earlier this month at Pwn2Own. The flaws enabled an attacker to execute code on a workstation and carry out a virtual machine escape to attack a host server.</li><li><a title="balena - A Moby-based container engine for IoT" rel="nofollow" href="https://www.balena.io/">balena - A Moby-based container engine for IoT</a> &mdash; A Moby-based container engine for IoT</li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Hardware flaws that can’t be solved, human errors at the physical layer, and spoofing cellular networks with a $5 dongle. </p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li></ul><p>Links:</p><ul><li><a title="Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register" rel="nofollow" href="https://www.theregister.co.uk/2018/04/23/who_me/">Sysadmin unplugged wrong server, ran away, hoped nobody noticed • The Register</a> &mdash; ‘I was a snot-nosed kid fresh out of college and thought I knew everything!’</li><li><a title="Spoofing Cell Networks with a USB to VGA Adapter | Hackaday" rel="nofollow" href="https://hackaday.com/2018/04/23/spoofing-cell-networks-with-a-usb-to-vga-adapter/">Spoofing Cell Networks with a USB to VGA Adapter | Hackaday</a> &mdash;  Available through the usual overseas suppliers for as little has $5 USD, these devices can be used unmodified to transmit low-power FM, DAB, DVB-T, GSM, UMTS and GPS signals.</li><li><a title="ShofEL2, a Tegra X1 and Nintendo Switch exploit" rel="nofollow" href="https://fail0verflow.com/blog/2018/shofel2/">ShofEL2, a Tegra X1 and Nintendo Switch exploit</a> &mdash; The Tegra X1 (also known as Tegra210) SoC inside the Nintendo Switch contains an exploitable bug that allow taking control over early execution, bypassing all signature checks.</li><li><a title="Atlanta spends more than $2 million to recover from ransomware attack" rel="nofollow" href="https://www.engadget.com/2018/04/23/atlanta-spends-over-2-million-ransomware-recovery/">Atlanta spends more than $2 million to recover from ransomware attack</a> &mdash; . It appears that firms Secureworks and Ernst &amp; Young were paid $650,000 and $600,000, respectively, for emergency services while Edelman was paid $50,000 for crisis communication services. Overall, the funds seemingly applied to the ransomware attack response add up to approximately $2.7 million.</li><li><a title="Google Chrome 66 Released Today Focuses on Security" rel="nofollow" href="https://www.bleepingcomputer.com/news/google/google-chrome-66-released-today-focuses-on-security/">Google Chrome 66 Released Today Focuses on Security</a> &mdash; The biggest change is that Google Chrome will start showing SSL certificate errors for all Symantec certs issued before June 1, 2016. This is "stage two" of Google's long-term plan on distrusting Symantec certificates altogether.</li><li><a title="Where to get started with monitoring?" rel="nofollow" href="https://pastebin.com/bPn1cGLV">Where to get started with monitoring?</a></li><li><a title="defunkt uses a fool tools for his network" rel="nofollow" href="https://pastebin.com/aFmwbguq">defunkt uses a fool tools for his network</a></li><li><a title="Brian shares some love for Zabbix" rel="nofollow" href="https://pastebin.com/z93N6GzR">Brian shares some love for Zabbix</a></li><li><a title="VMware Patches Pwn2Own VM Escape Vulnerabilities" rel="nofollow" href="https://threatpost.com/vmware-patches-pwn2own-vm-escape-vulnerabilities/124629/">VMware Patches Pwn2Own VM Escape Vulnerabilities</a> &mdash; VMware on Tuesday patched a series of vulnerabilities uncovered earlier this month at Pwn2Own. The flaws enabled an attacker to execute code on a workstation and carry out a virtual machine escape to attack a host server.</li><li><a title="balena - A Moby-based container engine for IoT" rel="nofollow" href="https://www.balena.io/">balena - A Moby-based container engine for IoT</a> &mdash; A Moby-based container engine for IoT</li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 361: It's All in the Log</title>
  <link>https://techsnap.systems/361</link>
  <guid isPermaLink="false">60c0569a-55b4-446f-bf42-6d017d933f4f</guid>
  <pubDate>Thu, 29 Mar 2018 08:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/60c0569a-55b4-446f-bf42-6d017d933f4f.mp3" length="24152919" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.
</itunes:subtitle>
  <itunes:duration>32:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.
Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more! 
</description>
  <content:encoded>
    <![CDATA[<p>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.</p>

<p>Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes" rel="nofollow" href="https://www.mac4n6.com/blog/2018/3/21/uh-oh-unified-logs-in-high-sierra-1013-show-plaintext-password-for-apfs-encrypted-external-volumes-via-disk-utilityapp">Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes</a> &mdash; My verification test is below. Note that it gets stored in on-disk, collected logs (non-volatile logs).</li><li><a title="Thousands of servers found leaking 750MB worth of passwords and keys" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/thousands-of-servers-found-leaking-750-mb-worth-of-passwords-and-keys/">Thousands of servers found leaking 750MB worth of passwords and keys</a> &mdash; Leaky etcd servers could be a boon to data thieves and ransomware scammers.</li><li><a title="Atlanta city government systems down due to ransomware attack" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/atlanta-city-government-systems-down-due-to-ransomware-attack/">Atlanta city government systems down due to ransomware attack</a> &mdash; FBI called in as some city services are interrupted, employees told to turn off PCs.</li><li><a title="Android malware found inside apps downloaded 500,000 times | ZDNet" rel="nofollow" href="http://www.zdnet.com/article/android-malware-found-inside-apps-downloaded-500000-times/">Android malware found inside apps downloaded 500,000 times | ZDNet</a> &mdash;  Cybercriminals have distributed malware to hundreds of thousands of Android users by hiding it inside a series of apparently harmless apps.</li><li><a title="From hacked client to 0day discovery" rel="nofollow" href="https://security.infoteam.ch/en/blog/posts/from-hacked-client-to-0day-discovery.html">From hacked client to 0day discovery</a> &mdash; The client’s account had been blocked because it was spotted sending spam. Once connected to the service, it was clear that the monthly quota of the account was almost reached and that the latest emails sent shown on the dashboard had content that were clearly spam.</li><li><a title="Listener Feedback from Jeff S" rel="nofollow" href="https://pastebin.com/kbBuE71Z">Listener Feedback from Jeff S</a></li><li><a title="Listener Feedback from Tyler" rel="nofollow" href="https://pastebin.com/cPNmQ1JR">Listener Feedback from Tyler</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.</p>

<p>Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes" rel="nofollow" href="https://www.mac4n6.com/blog/2018/3/21/uh-oh-unified-logs-in-high-sierra-1013-show-plaintext-password-for-apfs-encrypted-external-volumes-via-disk-utilityapp">Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes</a> &mdash; My verification test is below. Note that it gets stored in on-disk, collected logs (non-volatile logs).</li><li><a title="Thousands of servers found leaking 750MB worth of passwords and keys" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/thousands-of-servers-found-leaking-750-mb-worth-of-passwords-and-keys/">Thousands of servers found leaking 750MB worth of passwords and keys</a> &mdash; Leaky etcd servers could be a boon to data thieves and ransomware scammers.</li><li><a title="Atlanta city government systems down due to ransomware attack" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/atlanta-city-government-systems-down-due-to-ransomware-attack/">Atlanta city government systems down due to ransomware attack</a> &mdash; FBI called in as some city services are interrupted, employees told to turn off PCs.</li><li><a title="Android malware found inside apps downloaded 500,000 times | ZDNet" rel="nofollow" href="http://www.zdnet.com/article/android-malware-found-inside-apps-downloaded-500000-times/">Android malware found inside apps downloaded 500,000 times | ZDNet</a> &mdash;  Cybercriminals have distributed malware to hundreds of thousands of Android users by hiding it inside a series of apparently harmless apps.</li><li><a title="From hacked client to 0day discovery" rel="nofollow" href="https://security.infoteam.ch/en/blog/posts/from-hacked-client-to-0day-discovery.html">From hacked client to 0day discovery</a> &mdash; The client’s account had been blocked because it was spotted sending spam. Once connected to the service, it was clear that the monthly quota of the account was almost reached and that the latest emails sent shown on the dashboard had content that were clearly spam.</li><li><a title="Listener Feedback from Jeff S" rel="nofollow" href="https://pastebin.com/kbBuE71Z">Listener Feedback from Jeff S</a></li><li><a title="Listener Feedback from Tyler" rel="nofollow" href="https://pastebin.com/cPNmQ1JR">Listener Feedback from Tyler</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
