show episodes
 
Are you struggling to find good listening material for learning Chinese? Are you tired of robotic and boring textbook audio? Chillchat is the answer for you! You will find the most authentic conversations between native speakers. Our podcasts not only cover vocabulary and grammar, but we also talk about culture, trends, and other useful topics. With our fun and relaxing conversations, Chinese learning is a breeze! You can DOWNLOAD the transcript at: https://www.buymeacoffee.com/chillchat
 
Greetings from teacher Dee. I am welcoming everyone on board. I am teacher Dee and I am an ESL teacher, corporate trainer and I am based in Shanghai, China. I have been teaching English since 1998 and I have helped hundreds of students and adults learning English for different purposes. I have taught English as a second language to French speaking learners, Japanese speaking learners, Korean speaking learners, Chinese speaking learners and Russian speaking learners. It is my pleasure to help ...
 
Greetings! Since age 15 at the turn of the Millennium I underwent an awakening of curiosity about the mysteries of the world. My grandfather Don Basham wrote many books about spiritual topics and my father Glenn Basham granted me a very artistic atmosphere of classical music in the home I was raised and homeschooled in. I spent about 15 years total traveling all throughout Asia and learning both Japanese and Chinese as well as a myriad of other topics. Now I'm excited to share these discover ...
 
Greetings ladies, gentlemen, government agents, potential sponsors, or anyone who might be listening! CEOTPK is a comedy podcast show about everything alien, conspiracy, and cryptid! Join Nick, the self-proclaimed Third Eye Decalcifier, and Tasker, a bitter neckbeard on a skeptic streak, as they discuss all the secrets and horrors hidden from the world!
 
"One Min Chinese" targets on beginning-level learners who want to learn survival Chinese for traveling purposes. It is produced in forms of mini videos and podcast lessons, and it is about 1-minute long. We understand it is hard to have that time commitment to learn Chinese when you have a busy life, and we want to make the learning of survival Chinese quicker and easier for you!
 
Want to have fun while learning Chinese?! Let your favorite English-speaking taxi driver help you navigate the streets of Taiwan. Take a ride with A-Fu and learn ZHONG WEN with ease! A-fu\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'s Taxi is your number one resource for learning daily Chinese vocabulary and phrases. Updated every month, you\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\\'ll be a fluent Chinese speaker in no time!
 
Do you want to learn some basics in Mandarin Chinese? The tracks presented here are designed to give you a taste of Mandarin Chinese language and culture. You’ll hear short conversations where people greet each other, introduce themselves and their families, describe where they come from and what they do for a living. You’ll hear them talk about sports, ask for directions, buy things, order food in a restaurant, invite someone to dinner – or simply share their experience of learning Chinese. ...
 
Loading …
show series
 
In this episode, we dig a little bit deeper about some of the basic Chinese greetings, including some interesting anecdotes about how some of the Chinese personal pronouns came about and how to move on from using the general patriarchal '他' (‘he') when you don't know the gender of the subject. I am currently away from home and didn't bring my micro…
 
Microsoft researchers detail the lengths to which the Solorigate threat actor went to stay undetected and establish persistence. LuckyBoy malvertising is described. Business email compromise as a reconnaissance technique? More reminders about the risks that accompany remote work. Ben Yelin looks at cyber policy issues facing the Biden administratio…
 
Another security company discloses a brush with the threat actor behind Solorigate. Advice on hardening Microsoft 365 against that same threat actor. Chimera turns out to be interested in airlines as well as semiconductor manufacturing intellectual property. Former President Trump’s last Executive Order addresses foreign exploitation of Infrastruct…
 
The European Medicines Agency says stolen emails about vaccine development were altered before being dumped online. Another backdoor is found associated with the SolarWinds supply chain campaign. DNS cache poisoning vulnerabilities are described. FBI renews warnings about vishing. Iran’s “Enemies of the People” disinformation campaign. Vishing is u…
 
Dave's got the story of a landlord who may run afoul of the Computer Fraud and Abuse Act, Ben wonders if the big tech CEOs could be held liable for contact tracking apps, and later in the show my conversation with Joseph Cox. He is a Senior Staff Writer at Motherboard and will be discussing his recent article How Big Companies Spy on Your Emails. W…
 
Microsoft's Corporate Vice President of Cybersecurity Business Development Ann Johnson brings us on her career journey from aspiring lawyer to cybersecurity executive. After pivoting from studying law, Ann started working with computers and found she had a deep technical aptitude for technology and started earning certifications landing in cybersec…
 
You can DOWNLOAD the PDF study notes at https://www.buymeacoffee.com/chillchat Monthly members have access to all transcripts & notes, bonus episodes and many more perks! In today's episode, we are tackling another essential topic: buying stuff. You might think it's easy but the hard part is to really sound like a native speaker. Let's go! If you w…
 
Guest Selena Larson, senior cyber threat analyst at Dragos, Inc., joins us to discuss their research into recent observations of ICS-targeting threats to manufacturing organizations. Cyber risk to the manufacturing sector is increasing, led by disruptive cyberattacks impacting industrial processes, intrusions enabling information gathering and proc…
 
Well-constructed phishing and smishing are reported out of Tehran. Estimates of SolarWinds compromise insurance payouts. Notes from industry on the convergence of criminal and espionage TTPs. Social engineering hooks baited with greed. Ring patches a bug that could have exposed users’ geolocation (and their reports of crime). Advice on cyber best p…
 
There are other things going on besides Solorigate and deplatforming. There’s news about the SideWinder threat actor and its interest in South Asian cyberespionage targets. Google’s Project Zero describes a complex and expensive criminal effort. CISA discusses threats to cloud users, and offers some security recommendations. A scam-as-a-service aff…
 
Speculation grows that the Solarigate threat actors were also behind the Mimecast compromise. SolarLeaks says it has the goods taken from FireEye and SolarWinds, but caveat emptor. Notes on Patch Tuesday. Joe Carrigan has thoughts on a WhatsApp ultimatum. Our guest is Andrew Cheung of 01 Communique with an update on quantum computing. And farewell …
 
A cyberespionage campaign, so far not attributed to any threat actor, continues to prospect government and industry targets in Colombia. A new bit of malware is found in the SolarWinds backdoor compromise. Mimecast certificates are compromised in another apparent software supply chain incident. Ubiquiti tells users to reset their passwords. A brief…
 
Similarities are found between Sunburst backdoor code and malware used by Turla. CISA expands advice on dealing with Solorigate. Courts revert to paper...and USB drives. More members of the US Congress report devices stolen during last week’s riot. Online inspiration for violence seems distributed, not centralized. Caleb Barlow examines protocols f…
 
John and Jared discuss the difference between how you think your Chinese sounds vs how it really sounds. Surprise surprise, there is a difference! John takes us through an academic paper to tell you which tones you should prioritize to make yourself understood more clearly. Guest interview is with Linda Yi, creator of Panda Cub stories and a herita…
 
Vice President of Security and Support Operations of Alert Logic Tom Gorup shares how his career path led him from tactics learned in Army infantry using machine guns and claymores to cybersecurity replacing the artillery with antivirus and firewalls. Tom built a security automation solution called the Grunt (in recollection of his role in the Army…
 
You can DOWNLOAD the PDF study notes at https://www.buymeacoffee.com/chillchat Monthly members have access to all transcripts & notes, bonus episodes and many more perks! Dear listeners! Welcome to a new season of Chillchat! In season 2, we will be tackling over 40 topics from basic daily chit chatting to more complex discussions. Following this en…
 
Deep Instinct's Shimon Oren joins us to talk about his team's research on "Why Emotet's latest wave is harder to catch than ever before - Part 2." Emotet appears to have reemerged more evasive than before, this time with a payload delivered from a loader that security tools aren’t equipped to handle. Emotet, the largest malware botnet today, starte…
 
Solorigate and its effect on sensitive corporate information. The DC riots show the cybersecurity consequences of brute physical access to systems. A North Korean APT resurfaces with the RokRat Trojan. Ransomware remains very lucrative, and why? Because people continue to pay up. Thomas Etheridge from CrowdStrike on The Role of Outside Counsel in t…
 
CISA updates its guidance on Solorigate, and issues an alert that the threat actor may have used attack vectors other than the much-discussed SolarWinds backdoor. Some reports suggest that a widely used development tool produced by a Czech firm may have been compromised. The cyberespionage campaign is now known to have extended to the Department of…
 
The US Cyber Unified Coordination Group says the Solorigate APT is “likely Russian in origin.” Threat actors are scanning for systems potentially vulnerable to exploitation through a Zyxel backdoor. ElectroRAT targets crypto wallets. Babuk Locker is called the first new ransomware strain of 2021. The New York Stock Exchange re-reconsiders delisting…
 
More assessments of the Solorigate affair, with an excursus on Pearl Harbor. Shareholders open a class action suit against SolarWinds, but no signs of an enforcement action for speculated insider trading. Emissary Panda seems to be working an APT side hustle. Kevin Magee has insights from the Microsoft Digital Defense Report. Our guest is Jason Pas…
 
Updates on the spreading consequences of Solorigate, including Microsoft’s disclosure that threat actors gained access to source code repositories. A hard-coded backdoor is found in Zyxel firewalls and VPNs. Kawasaki Heavy Industries says parties unknown accessed sensitive corporate information. Slack has been having troubles today. Andrea Little L…
 
Vice President of Global Systems Engineering Ellen Sundra shares her career path from life as a college grad who found her niche by creating a training program to a leader in cybersecurity. She realized that training and educating people was her passion. Ellen sees her value in providing soft skills as a natural balance to her technical team at For…
 
Researchers at Cisco's Talos Unit recently published research exploring the tactics, technics and procedures of the global malvertising ecosystem. Craig Williams is head of Talos Outreach at Cisco, and he guides us through the life cycle of malicious online ads, along with tips for protecting yourself and your organization. The research can be foun…
 
Four members of the CyberWire’s Hash Table of experts: Don Welch: Interim CIO of Penn State University Helen Patton: CISO for Ohio State University Bob Turner: CISO for the University of Wisconsin at Madison Kevin Ford: CISO for the State of North Dakota discuss SOC Operations in terms of intrusion kills chains, defensive adversary campaigns, insid…
 
The idea of operations centers has been around as far back as 5,000 B.C. This show covers the history of how we got from general purpose operations centers to the security operations centers today, the limitations of those centers, and what we need to do as a community make them more useful in our infosec program.…
 
In this special episode, John and Jared went back through all of the interviews of 2020 and pulled out the ten best stories. Get ready to laugh, reflect, and possibly shed a tear as we take a trip down memory lane. These stories show how learning Chinese can open doors in all aspects of your life, bringing unexpected and cherished connections… ...e…
 
Cyber threat intelligence analyst Selena Larson takes us on her career journey from being a journalist to making the switch to industrial security. As a child who wrote a book about a green goldfish who dealt with bullying, Selena always liked investigating and researching things. Specializing in cybersecurity journalism led to the realization of h…
 
Hello! Hope everyone had good Christmas! This is the second instalment of the three-part Silk Road series. Key phrases are: collapse of the Roman Empire, Buddhism and Journey to the West. Enjoy ;) To see the transcript, visit: https://chinesecolloquialised.comBy Chinese Colloquialised
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login