Podcasts about Attackers

  • 1,355PODCASTS
  • 2,405EPISODES
  • 38mAVG DURATION
  • 1DAILY NEW EPISODE
  • Jun 27, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Attackers

Show all podcasts related to attackers

Latest podcast episodes about Attackers

Crime Alert with Nancy Grace
Woman w Jaw Missing Names Attacker Before Death; Manhunt Ends in Tree Standoff| Crime Alert 8PM 06.26.2025

Crime Alert with Nancy Grace

Play Episode Listen Later Jun 27, 2025 5:41 Transcription Available


An ex obliterates a mom's jaw in a deadly attack; triggering a wild manhunt that culminates in bizarre, hours-long showdown with cops...while perched in a tree. A Louisiana mom is accused of injecting his mom with meth before beating her to death & discarding her in the trash. Plus, a domestic violence situation that really stinks. Jennifer Gould reports. See omnystudio.com/listener for privacy information.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jun 25, 2025 4:03


Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each scans than they used to, but the average length of passwords did not change. https://isc.sans.edu/diary/Quick%20Password%20Brute%20Forcing%20Evolution%20Statistics/32068 Introducing FileFix A New Alternative to ClickFix Attacks Attackers may trick the user into copy/pasting strings into file explorer, which will execute commands similar to the ClickFix attack that tricks users into copy pasting the command into the start menu s cmd feature. https://www.mobile-hacker.com/2025/06/24/introducing-filefix-a-new-alternative-to-clickfix-attacks/ Threat Actors Modify and Re-Create Commercial Software to Steal User s Information A fake Sonicwall Netextender clone will steal user s credentials https://www.sonicwall.com/blog/threat-actors-modify-and-re-create-commercial-software-to-steal-users-information

The Cybersecurity Defenders Podcast
#224 - Intel Chat: Otter cookie, Flodrix, Water Curse & Scattered Spider

The Cybersecurity Defenders Podcast

Play Episode Listen Later Jun 24, 2025 31:45


In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.A new malware strain known as OtterCookie, developed by the North Korean APT group Lazarus, has been dissected in a detailed technical analysis by offensive security expert Mauro Eldritch. Attackers are currently exploiting a critical vulnerability in the Langflow platform — an open-source Python-based web app used to build AI workflows and agents — to deliver a new botnet called Flodrix.A new campaign from an emerging threat group named Water Curse is targeting the software supply chain by leveraging GitHub repositories that masquerade as legitimate security tools. The threat actor known as Scattered Spider, also tracked as UNC3944 by Google and Mandiant, has apparently shifted its operational focus from the retail sector to the US insurance industry, according to a new alert from Google's Threat Intelligence Group.

Ekot
Ekot 12:30 Israel i nya, kraftfulla attacker mot Iran

Ekot

Play Episode Listen Later Jun 23, 2025 25:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

Ekot
Ekot 16:45 Nya israeliska attacker mot iranska atomenergianläggningar

Ekot

Play Episode Listen Later Jun 23, 2025 15:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

Morgonpasset i P3
Brannes midsommarfail, gränslösa influencers och USA:s attacker mot Iran

Morgonpasset i P3

Play Episode Listen Later Jun 22, 2025 81:01


Brayan gör debut, irländska julaftnar och Will Smith är på't igen. Lyssna på alla avsnitt i Sveriges Radio Play. Hela veckans Morgonpasset i P3 hör du i Sveriges Radio Play.Branne Pavlovic och Ayan Jamal gör sitt första pass tillsammans. Vad kan gå fel på midsommar? Mycket. Kassa DJ:s och Branne skäms över Will Smith. SR:s utrikeskorre Roger Wilson rapporterar om USA:s attacker mot Iran och P3 Nyheters Philip Carlsson reder i omvärldens reaktioner på USA:s involvering i Israel och Iran-konflikten. Med oss i studion har vi SvD:s journalist Sophia Sinclair som pratar om influencers upptrissade jakt på framgång och den nya poddserien Badfluence. Brayan-duon tippar NBA-avgörandet och Branne langar veckans efterlängtade streamingtips: De sju samurajerna.Tidpunkter i avsnittet:13:20 Roger Wilson.42:08 Nyhetsfördjupning: Omvärldens reaktioner på USA:s attacker mot Iran.56:00 Sophia Sinclair.1:16:57 Bragge recenserar.Kapitellänkarna ovan leder till avsnittet utan musik i Sveriges Radio Play.Programledare: Branne Pavlovic och Ayan Jamal.

The John Hallett Podcast
Situational Awareness Zones | The John Hallett Podcast #87

The John Hallett Podcast

Play Episode Listen Later Jun 21, 2025 19:50


The John Hallett Podcast | Episode #87Welcome back to another episode of The John Hallett Podcast! In Episode 87, we break down one of the most vital concepts in self-defense: Situational Awareness Zones.Whether you're a seasoned martial artist or someone just starting their journey, understanding your environment can mean the difference between avoiding danger and walking straight into it. This episode is all about training your awareness like a skill—because it is one.

TV4Nyheterna Radio
"Fortsatta attacker mellan Israel och Iran"

TV4Nyheterna Radio

Play Episode Listen Later Jun 19, 2025 1:14


Ekot
Ekot 06:00 Nya intensiva attacker mellan Israel och Iran inatt

Ekot

Play Episode Listen Later Jun 18, 2025 15:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

Ekot
Ekot 17:45 Tysklands förbundskansler hyllar Israels attacker i Iran

Ekot

Play Episode Listen Later Jun 18, 2025 20:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

Arena Tyckonomi
Svårt läge för iranska regimen efter Israels attacker

Arena Tyckonomi

Play Episode Listen Later Jun 18, 2025 26:22


Hur kommer kriget mellan Israel och Iran fortsätta och hur påverkar Israels attacker den iranska regimen? Gäst: Arvin Khoshnood, statsvetare och Irankännare Programledare: Jon Andersson Foto: Privat/ NY Times TT Nyhetsbyrån

Ekot
Ekot 08:00 Minst 14 döda i attacker mot Kiev

Ekot

Play Episode Listen Later Jun 17, 2025 15:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

The CyberWire
Darknet drug marketplace closed for business.

The CyberWire

Play Episode Listen Later Jun 16, 2025 37:24


International law enforcement takes down a darknet drug marketplace. The Washington Post is investigating a cyberattack targeting several journalists' email accounts. Anubis ransomware adds destructive capabilities. The GrayAlpha threat group uses fake browser update pages to deliver advanced malware. Researchers uncover a stealthy malware campaign that hides a malicious payload in a JPEG image. Tenable patches three high-severity vulnerabilities in Nessus Agent. Attackers can disable Secure Boot on many Windows devices by exploiting a firmware flaw. Lawmakers introduce a bipartisan bill to strengthen coordination between CISA and HHS. Harry Coker reflects on his tenure as National Cyber Director. Maria Varmazis checks in with Brandon Karpf on agentic AI. When online chatbots overshare, it's no laughing Meta.  CyberWire Guest Joining us today to discuss Agentic AI and it relates to cybersecurity and space with T-Minus Space Daily host Maria Varmazis is Brandon Karpf, friend of the show, founder of T-Minus Space Daily, and cybersecurity expert. Selected Reading Police seizes Archetyp Market drug marketplace, arrests admin (Bleeping Computer) Washington Post investigating cyberattack on journalists' email accounts, source says (Reuters) Anubis Ransomware Packs a Wiper to Permanently Delete Files (SecurityWeek) GrayAlpha Hacker Group Weaponizes Browser Updates to Deploy PowerNet Loader and NetSupport RAT (Cyber Security News) Malicious Payload Uncovered in JPEG Image Using Steganography and Base64 Obfuscation (Cyber Security News) Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus (Infosecurity Magazine) Microsoft-Signed Firmware Module Bypasses Secure Boot (Gov Infosecurity) Bipartisan bill aims to create CISA-HHS liaison for hospital cyberattacks (The Record) Coker: We can't have economic prosperity or national security without cybersecurity (The Record) The Meta AI app is a privacy disaster (TechCrunch) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Ekot
Ekot 16:45 Stor oro för eskalerande konflikt i Mellanöstern efter Israels attacker

Ekot

Play Episode Listen Later Jun 13, 2025 15:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

T-Minus Space Daily
Big news on the Hill for Space Force.

T-Minus Space Daily

Play Episode Listen Later Jun 10, 2025 24:22


Big budget news for the Space Force from Capitol Hill. Quantum Space secured an additional $40 million to accelerate Ranger spacecraft. Attackers are increasingly targeting space assets with advanced malware. And, more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. T-Minus Guest Our guest today is Celia Pelaz, COO at Spire Global. You can connect with Celia on LinkedIn, and learn more about Spire Global on their website. Selected Reading House appropriators unveil defense bill, boost Space Force funding (SpaceNews) Quantum Space raises $40 million (SpaceNews) Space ISAC articles - Constellations (Kratos) Axiom Mission 4 (Axiom) NASA raises the odds that an asteroid could hit the moon in 2032 (Space)  Shenzhou-20 crew completes over 10 experiments, tests in past week (CGTN) CEO of space company Axiom breaks down what a $70 million ticket gets you (Business Insider) Space stocks soar as Elon Musk and Donald Trump argue (The Street) T-Minus Crew Survey Complete our ⁠annual audience survey⁠ before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our ⁠media kit⁠. Contact us at ⁠space@n2k.com⁠ to request more info. Want to join us for an interview? Please send your pitch to ⁠space-editor@n2k.com⁠ and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

RNZ: Morning Report
Inquest into death of LynMall attacker continues

RNZ: Morning Report

Play Episode Listen Later Jun 10, 2025 2:48


The coronial inquest into the death of LynnMall attacker Ahamed Samsudeen continues on Wednesday, after a forensic pathologist explained why he had zero chance of surviving as many as a dozen gunshot wounds. Finn Blackwell reports.

The CyberWire
White House reboots cybersecurity priorities.

The CyberWire

Play Episode Listen Later Jun 9, 2025 36:12


A new White House executive Order overhauls U.S. cybersecurity policy. The EU updates its “cybersecurity blueprint”. The Pentagon's inspector general  investigates Defense Secretary Hegseth's Signal messages. Chinese hackers target U.S. smartphones. A new Mirai botnet variant drops malware on vulnerable DVRs. 17 popular Gluestack packages on NPM have been compromised. Attackers exploit vulnerabilities in Fortigate security appliances to deploy Qilin ransomware. A Nigerian man gets five years in prison for a hacking and fraud scheme. Our guest is Tim Starks from CyberScoop, discussing Sean Cairncross' journey toward confirmation as the next National Cyber Director. Fire Stick flicks spark a full-on legal blitz. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Tim Starks from CyberScoop, to discuss Sean Cairncross, who's bringing a focus on policy coordination if confirmed as the next National Cyber Director. Selected Reading Trump Administration Revises Cybersecurity Rules, Replaces Biden Order (Infosecurity Magazine) Europe arms itself against cyber catastrophe (Politico) Pentagon watchdog investigates if staffers were asked to delete Hegseth's Signal messages (Associated Press) Chinese hackers and user lapses turn smartphones into a 'mobile security crisis' (Associated Press) iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals (SecurityWeek) New Mirai botnet infect TBK DVR devices via command injection flaw (Bleeping Computer) Malware found in NPM packages with 1 million weekly downloads (Bleeping Computer) Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware (Cyber Security News) Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison (SecurityWeek) Hacked Fire Sticks now come with more than just malware – a possible jail sentence (Cybernews) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

Risky Business News
Sponsored: Phishing crews have gotten really good at evasion

Risky Business News

Play Episode Listen Later Jun 9, 2025 18:19


In this sponsored interview, Casey Ellis interviews Push Security co-founder and Chief Product Officer Jacques Louw about how good phishing crews have gotten at evading detection. Attackers are hiding their payloads behind legitimate bot-detection tools to stop things like email security gateways from seeing them, as well as locking up phishing pages behind OAuth challenges. Push sees all this because it's installed as a browser plugin and sees what users see. Show notes

The Gooner Talk
The Arsenal Transfer Show EP581 - Kepa Arrizabalaga, Benjamin Sesko, 3 Attackers Wanted!

The Gooner Talk

Play Episode Listen Later Jun 8, 2025 59:32


The Arsenal Transfer Show EP581 - Kepa Arrizabalaga, Benjamin Sesko, 3 Attackers Wanted!Join our Fantasy League: https://fantasy.premierleague.com/leagues/auto-join/kn7vdpTom presents a daily show on The Gooner Talk covering all the latest Arsenal news, Arsenal transfer news, match reaction, press conferences and much more plus a Q&A session taking questions from the LIVE chat. Get all your Arsenal news now and every day. Links to Fantasy code, Twitter, Instagram, audio-only platforms and our channel membership scheme including entry to the Discord community: https://linktr.ee/TheGoonerTalk Become a member at https://plus.acast.com/s/the-gooner-talk. Hosted on Acast. See acast.com/privacy for more information.

Squaring the Strange
Episode 255 - Phantom Attackers with Robert Bartholomew

Squaring the Strange

Play Episode Listen Later Jun 7, 2025 100:56


First we cover a few things on our radar: Ben is reminded of an old mail-based scam, Celestia gets excited over a few astronomical news items, and we both lament the MAHA report and its seemingly made-up citations. Then Robert Bartholomew joins us to discuss the new book he wrote with Paul Weatherhead, "Social Panics and Phantom Attackers: A Study of Imaginary Assailants." Have you heard of the Mad Gasser, Spring-Heeled Jack, the Monkey Man, Whipping Tom, or any of the pet eaters, needle spikers, drones or zeppelins menacing innocent people? In the right time and place, these attackers seemed not only plausible but terrifying. Bob goes over patterns in these attacker phenomenons, as well as the social function they serve -- often a cautionary tale grounded in current moral context, with a dash of xenophobia and fear of technology thrown in. These attackers, while complete fiction, nevertheless had victims: not just those who believed a scratch or bruise was surely from the evildoer, but those who were mistakenly arrested or beaten by vigilante mobs. The societal cost can also be measured in thousands of extra police hours as well as heightened anxiety and stress.

93:20
THE 93:20 REVIEW:- ATTACKERS (& PEP) (EXCERPT)

93:20

Play Episode Listen Later Jun 6, 2025 15:42


Howard, Chris and George evaluate the season of the attacking players at City, and Pep too. Another fascinating chat. *This is the first 15 minutes of the show. For the full episode, and all our other content on the 93:20 player, you can join below - for less than the price of a pint of beer each month.* ninetythreetwenty.com/9320-player/about-9320-player/ SIGN UP FOR OUR NEWSLETTER! A FREE WEEKLY UPDATE WITH NEW CONTENT GUARANTEED AND A WHOLE LOT MORE. CLICK THE LINK BELOW AND ENTER YOUR EMAIL IN THE BOX. ninetythreetwenty.com/the-9320-newsletter/

Bill O’Reilly’s No Spin News and Analysis
Bill O'Reilly: Progressives Won't Punish Police Attackers

Bill O’Reilly’s No Spin News and Analysis

Play Episode Listen Later Jun 4, 2025 5:15


Bill O'Reilly talks about new crime stats for New York City. Learn more about your ad choices. Visit megaphone.fm/adchoices

Breaking Badness
Beyond the Perimeter: How Attackers Use Domains, Phishing & AI and How to Fight Back

Breaking Badness

Play Episode Listen Later Jun 4, 2025 68:24


Welcome to a special RSAC 2025 episode of the Breaking Badness Cybersecurity Podcast! Today, we delve into the critical role of domains in modern cyber attacks. From sophisticated nation-state operations to AI-powered phishing kits and malicious browser extensions, domains are the foundational infrastructure for threat actors. Host Kali Fencl is joined by four leading cybersecurity experts Joe Slowik, Robert Duncan, John Fokker and Vivek Ramachandran to break down how domains are weaponized and what organizations can do to defend themselves on this ever-evolving frontline

Broeske and Musson
BOULDER: Attacker's Family Cooperating with Investigators

Broeske and Musson

Play Episode Listen Later Jun 4, 2025 13:38


FBI and police officials said the family has cooperated with investigators, and Soliman said his family had no knowledge of his plans. That may not be enough to allow them to stay in the U.S. Guest Co-Host: Diane Pearce Please Like, Comment and Follow 'Broeske & Musson' on all platforms: --- The ‘Broeske & Musson Podcast’ is available on the KMJNOW app, Apple Podcasts, Spotify or wherever else you listen to podcasts. --- ‘Broeske & Musson' Weekdays 9-11 AM Pacific on News/Talk 580 AM & 105.9 FM KMJ | Facebook | Podcast| X | - Everything KMJ KMJNOW App | Podcasts | Facebook | X | Instagram See omnystudio.com/listener for privacy information.

BJ & Jamie
Boulder Attacker Charged | Facebook Marketplace Ghost | Tabloid Trash

BJ & Jamie

Play Episode Listen Later Jun 3, 2025 32:50


The man who attacked a group of Jewish people in Boulder over the weekend has been charged. BJ was trying to sell his old BMW on Facebook marketplace. He listed the car for $1000. A woman got in contact with him about the car and then she never showed up. The trial with Justin Baldoni and Blake Lively just had an interesting turn of events.

Privacy Please
S6, E244: They didn't hack in, they just logged in: The LexisNexis Security Incident

Privacy Please

Play Episode Listen Later Jun 3, 2025 15:33 Transcription Available


Send us a textWe explore the recent LexisNexus data breach that exposed sensitive personal information of over 364,000 individuals through a third-party platform accessing their GitHub account. This incident highlights critical vulnerabilities in how data brokers handle our most sensitive information and raises questions about regulatory oversight.• Data exposed included names, date of birth, phone numbers, social security numbers, and driver's license numbers• The breach occurred when someone accessed the company's GitHub account through a third-party platform• Attackers likely found hard-coded credentials that allowed them to move laterally through systems • Data brokers operate with minimal regulation despite handling massive amounts of sensitive information• Better governance policies and automated privacy operations could significantly reduce these risks• Both technical solutions and regulatory approaches are needed to protect consumer dataBreach Occurred: December 25, 2024.Discovery: April 1, 2025.Public Notification: May 27, 2025.Notice Letters Sent: May 24, 2025.Shameless plus: Check out tools like Transcend's autonomous privacy operations to help prevent similar incidents and continue to monitor your privacy activities. Support the show

Storm⚡️Watch by GreyNoise Intelligence
Cyber Threat Showdown: TikTok Malware, Exploit Scoring Wars & Real-World Attacks

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Jun 3, 2025 50:03


Forecast = Stormy with a chance of TikTok malware showers—exploit scoring systems hot, but patch management outlook remains partly cloudy. Welcome to Storm⚡️Watch! In this episode, we're diving into the current state of cyber weather with a mix of news, analysis, and practical insights. This week, we tackle a fundamental question: are all exploit scoring systems bad, or are some actually useful? We break down the major frameworks: **CVSS (Common Vulnerability Scoring System):** The industry standard for assessing vulnerability severity, CVSS uses base, temporal, and environmental metrics to give a comprehensive score. It's widely used but has limitations—especially since it doesn't always reflect real-world exploitability. **Coalition Exploit Scoring System (ESS):** This system uses AI and large language models to predict the likelihood that a CVE will be exploited in the wild. ESS goes beyond technical severity, focusing on exploit availability and usage probabilities, helping organizations prioritize patching with better accuracy than CVSS alone. **EPSS (Exploit Prediction Scoring System):** EPSS is a data-driven approach that estimates the probability of a vulnerability being exploited, using real-world data from honeypots, IDS/IPS, and more. It updates daily and helps teams focus on the most urgent risks. **VEDAS (Vulnerability & Exploit Data Aggregation System):** VEDAS aggregates data from over 50 sources and clusters vulnerabilities, providing a score based on exploit prevalence and maturity. It's designed to help teams understand which vulnerabilities are most likely to be actively exploited. **LEV/LEV2 (Likely Exploited Vulnerabilities):** Proposed by NIST, this metric uses historical EPSS data to probabilistically assess exploitation, helping organizations identify high-risk vulnerabilities that might otherwise be missed. **CVSS BT:** This project enriches CVSS scores with real-world threat intelligence, including data from CISA KEV, ExploitDB, and more. It's designed to help organizations make better patching decisions by adding context about exploitability. Next, we turn our attention to a troubling trend: malware distribution via TikTok. Attackers are using AI-generated videos, disguised as helpful software activation tutorials, to trick users into running malicious PowerShell commands. This “ClickFix” technique has already reached nearly half a million views. The malware, including Vidar and StealC, runs entirely in memory, bypassing traditional security tools and targeting credentials, wallets, and financial data. State-sponsored groups from Iran, North Korea, and Russia have adopted these tactics, making it a global concern. For employees, the takeaway is clear: never run PowerShell commands from video tutorials, and always report suspicious requests to IT. For IT teams, consider disabling the Windows+R shortcut for standard users, restrict PowerShell execution, and update security awareness training to include social media threats. We also highlight the latest from Censys, VulnCheck, runZero, and GreyNoise—industry leaders providing cutting-edge research and tools for vulnerability management and threat intelligence. Don't miss GreyNoise's upcoming webinar on resurgent vulnerabilities and their impact on organizational security. And that's a wrap for this episode! We will be taking a short break from Storm Watch for the summer. We look forward to bringing more episodes to you in the fall! Storm Watch Homepage >> Learn more about GreyNoise >>  

Cats at Night with John Catsimatidis
John Solomon: New Details on Anti-Semitic Terrorist Attacker in Boulder, CO | 06-02-25

Cats at Night with John Catsimatidis

Play Episode Listen Later Jun 3, 2025 8:02


Learn more about your ad choices. Visit megaphone.fm/adchoices

Mark Simone
FULL SHOW: Colorado Attacker, Ukraine Strike, Biden's Better.

Mark Simone

Play Episode Listen Later Jun 2, 2025 66:54


Democrats need a plan to take down the Anti Semitism in the USA. Former President Biden made an appearance over the weekend at Delaware's Memorial Day Event. Joe Biden said he is feeling good after the treatments of his cancer. Mark Interviews NY Post Columnist Michael Goodwin. Michael believes that someone in the Biden Administration knew he had cancer the whole time. Jake Tapper Continues to get heat over his book. Tim Walz is most likely going to be disqualified from any kind of political victory in the future. Mark has details about the latest Ukraine strike on Russia. CNN's Jake Tapper's set an all-time record for low ratings, even though he tried to justify his decision on writing the book about Biden's decline. Mark has a secret on how to lose weight that celebrities do. President Trump was asked about a possible pardon for Diddy and what was Trump's response? Mark Interviews CNBC Contributor Jake Novak. Jake and Mark breakdown the horrible terrorist attack that happened in Colorado over the weekend. The Dems opening the border the last 4 years was a bad recipe for disaster. 6 months later and there isn't really a major player for the Democrats to take Center Stage. See omnystudio.com/listener for privacy information.

Mark Simone
Hour 2: Colorado Attacker.

Mark Simone

Play Episode Listen Later Jun 2, 2025 30:53


Mark has details about the latest Ukraine strike on Russia. CNN's Jake Tapper's set an all-time record for low ratings, even though he tried to justify his decision on writing the book about Biden's decline. Mark has a secret on how to lose weight that celebrities do. President Trump was asked about a possible pardon for Diddy and what was Trump's response? Mark Takes Your Calls! Mark Interviews CNBC Contributor Jake Novak. Jake and Mark breakdown the horrible terrorist attack that happened in Colorado over the weekend. The Dems opening the border the last 4 years was a bad recipe for disaster. 6 months later and there isn't really a major player for the Democrats to take Center Stage.

Mark Simone
FULL SHOW: Colorado Attacker, Ukraine Strike, Biden's Better.

Mark Simone

Play Episode Listen Later Jun 2, 2025 66:56


Democrats need a plan to take down the Anti Semitism in the USA. Former President Biden made an appearance over the weekend at Delaware's Memorial Day Event. Joe Biden said he is feeling good after the treatments of his cancer. Mark Interviews NY Post Columnist Michael Goodwin. Michael believes that someone in the Biden Administration knew he had cancer the whole time. Jake Tapper Continues to get heat over his book. Tim Walz is most likely going to be disqualified from any kind of political victory in the future. Mark has details about the latest Ukraine strike on Russia. CNN's Jake Tapper's set an all-time record for low ratings, even though he tried to justify his decision on writing the book about Biden's decline. Mark has a secret on how to lose weight that celebrities do. President Trump was asked about a possible pardon for Diddy and what was Trump's response? Mark Interviews CNBC Contributor Jake Novak. Jake and Mark breakdown the horrible terrorist attack that happened in Colorado over the weekend. The Dems opening the border the last 4 years was a bad recipe for disaster. 6 months later and there isn't really a major player for the Democrats to take Center Stage.

Mark Simone
Hour 2: Colorado Attacker.

Mark Simone

Play Episode Listen Later Jun 2, 2025 32:32


Mark has details about the latest Ukraine strike on Russia. CNN's Jake Tapper's set an all-time record for low ratings, even though he tried to justify his decision on writing the book about Biden's decline. Mark has a secret on how to lose weight that celebrities do. President Trump was asked about a possible pardon for Diddy and what was Trump's response? Mark Takes Your Calls! Mark Interviews CNBC Contributor Jake Novak. Jake and Mark breakdown the horrible terrorist attack that happened in Colorado over the weekend. The Dems opening the border the last 4 years was a bad recipe for disaster. 6 months later and there isn't really a major player for the Democrats to take Center Stage. See omnystudio.com/listener for privacy information.

Paul's Security Weekly
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409

Paul's Security Weekly

Play Episode Listen Later Jun 2, 2025 98:33


Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-409

Public Key
How Crypto is Transforming Traditional Banking

Public Key

Play Episode Listen Later Jun 2, 2025 30:53


Solana spot ETF applications, the OCC green lighting digital asset activity and the US emphasizing its desire to be the crypto capital of the world.  It's hard not to feel the momentum that is happening in the US and worldwide when it comes to crypto transforming traditional banking.  In this “Live from Links” episode, Eitan Danon (Content Marketing Manager, Chainalysis) has an in person discussion with Carlos Salinas, Head of Digital Assets at Morabanc on the fascinating intersection of fintech, digital assets and traditional banking in Andorra. Carlos shares how his bank has responded to both client demand and new forms of economic activity, highlighting their novel digital asset custody solutions and the transformative role of regulatory frameworks that Andorra implemented three years ahead of its European peers, allowing Morabanc to navigate the burgeoning digital asset landscape effectively.  The conversation highlights the crucial balance between risk mitigation and innovation, drawing parallels between the evolution of derivatives and the current wave of cryptocurrencies, while discussing the bank's strategy in offering stablecoin-based settlement solutions. This is truly a snapshot of current trends but also a look at the future potential for programmable finance and digital assets. Minute-by-minute episode breakdown 2 | Comparing derivatives in the early 2000s to early days of cryptocurrency 4 | Andorra: Unique characteristics and financial environment 6 | Morabanc's role in digital asset custody came from customer demand 11 | The impact the USA momentum on digital assets has around the world 14 | Introducing Morabanc's revolutionary new  stablecoin settlement solution  19 | Consumer protection and crypto security at Morabanc 21 | Future roadmap for Morabanc and digital assets 25 | Attackers try to hack Carlos on LinkedIn Related resources Check out more resources provided by Chainalysis that perfectly complement this episode of the Public Key. Website: Morabanc: We understand the new role of responsible banking, bringing greater value to our stakeholders Blog: New LinkedIn Scam: How to Detect It and Protect Yourself Announcement: MoraBanc offers the first digital asset custody wallet in Andorra Customer Story: Morabanc serves as trusted entry point to world of digital assets Event: Links 2025 Digital Premiere: Free virtual event bringing together the leaders defining the future of blockchain intelligence Blog: U.S. Senate Advances GENIUS Act: Long Awaited Stablecoin Framework Edges Closer to Reality Blog: What the Huione Group Shutdown Signals About the Future of Crypto Scam Infrastructure YouTube: Chainalysis YouTube page Twitter: Chainalysis Twitter: Building trust in Speakers on today's episode Eitan Danon *host* (Content Marketing Manager, Chainalysis) Carlos Salinas (Head of Digital Assets, Morabanc) This website may contain links to third-party sites that are not under the control of Chainalysis, Inc. or its affiliates (collectively “Chainalysis”). Access to such information does not imply association with, endorsement of, approval of, or recommendation by Chainalysis of the site or its operators, and Chainalysis is not responsible for the products, services, or other content hosted therein. Our podcasts are for informational purposes only, and are not intended to provide legal, tax, financial, or investment advice. Listeners should consult their own advisors before making these types of decisions. Chainalysis has no responsibility or liability for any decision made or any other acts or omissions in connection with your use of this material. Chainalysis does not guarantee or warrant the accuracy, completeness, timeliness, suitability or validity of the information in any particular podcast and will not be responsible for any claim attributable to errors, omissions, or other inaccuracies of any part of such material.  Unless stated otherwise, reference to any specific product or entity does not constitute an endorsement or recommendation by Chainalysis. The views expressed by guests are their own and their appearance on the program does not imply an endorsement of them or any entity they represent. Views and opinions expressed by Chainalysis employees are those of the employees and do not necessarily reflect the views of the company. 

Enterprise Security Weekly (Audio)
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409

Enterprise Security Weekly (Audio)

Play Episode Listen Later Jun 2, 2025 98:33


Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-409

Enterprise Security Weekly (Video)
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Eyal Benishti, Chris Peluso, Chad Alessi, Tony Anscombe, Karl Van den Bergh, Nick Carroll - ESW #409

Enterprise Security Weekly (Video)

Play Episode Listen Later Jun 2, 2025 98:33


Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Show Notes: https://securityweekly.com/esw-409

Gentle Touch
212 Sea (22) 2 Navigating Grooming And Surviving A Serial Sex Attacker And Rapist | Ciara Redmond

Gentle Touch

Play Episode Listen Later May 31, 2025 103:55


Ciara on Insta: / missredmondxxx0:00 Youur journey 0:19 Miracles 1:06 brother diagnosed with cancer 1:30 family dynamics 2:00 Playing up in school 2:10 I was bullied 2:30 Meeting Mark 2:40 21 yeas older than me 3:20 It clicked 3:45 Injuries4:50 The hospital phoned my dad 5:00 I was running away 5:10 There was always excuses 5:20 What was your escape 5:50 I thought mark was my escape 6:50 No freedom of choice 7:15 Thrown out of a balcony 8:40 Armed response 9:10 I was his 11:00 Injury 13:10 Massive void 15:30 Consent 16:20 Adiction 18:30 Vulnerable girls 19:20 Control of my mind , body and soul 19:30 Osman warning 20:19 Stalked up untill 2019 22:10 Standing up for myself 22:40 STI25:30 Cementary 28:20 Coping mechanism 28:50 Credit card fraud gang 33:00 Fireproof windows and letterboxes 37:20 The vybe I was getting 38:35 bang to my face 39:40 Feeling disorientated 43:40 I was exhausted 44:00 Bite marks 44:40 lights beamed 45:40 The door was opened 46:35 Daddy come get me 48:20 Operation 49:00 Going half blind 50:00 Eye impairment 51:05 Mediocre pain killers 52:20 Pannic attacks 57:35 6 victims 59:50 Victim number 4 1:05:10 Plead deal 1:05:20 Police interview 1:07:10 He is drawing me 1:09:20 Crime scene 1:09:50 Drinking from a straw 1:10:30 she has lost her teeth 1:13:50 There is no help1:15:50 his brother is grooming 1:24:30 Life skills 1:25:41 How do we support someone with a drug addiction 1:27:05 6ixth sense 1:27:10 His soul is too beautiful 1:28:10 Your not duty bound 1:28:40 Loosing yourself 1:30:10 Special visit 1:33:40 Grooming

OODAcast
Episode 129: The Attacker Mindset: Maxie Reynolds on Red Teaming, Underwater Data Centers, and Human Nature

OODAcast

Play Episode Listen Later May 27, 2025 53:38


In this OODAcast episode, host Matt Devost sits down with Maxie Reynolds, author of The Art of the Attack, to explore the evolution of her unique career from offshore oil rigs to elite red teaming and cybersecurity innovation. Maxie shares how her unconventional path, working a decade in oil and gas, earning degrees while on remote rigs, and eventually breaking into cybersecurity at PwC, shaped her approach to physical and digital security. Her journey led to the creation of a company that builds underwater data centers, a novel fusion of her industrial and red teaming experiences. She discusses the rising interest in submerged infrastructure, particularly after China's moves in the space and the demands of modern AI-driven cooling systems. The conversation dives deep into what it means to adopt an "attacker mindset", seeing opportunities where others see obstacles and using architecture, human psychology, and environment as vectors for access. Maxi outlines how her social engineering engagements hinge on understanding perception, psychology, and pretext creation rather than just technical exploits. She offers real-world stories of infiltrating secure facilities and engaging high-stakes targets using layered personas and misdirection. Through it all, she emphasizes the role of self-awareness, stress management, and emotional discipline in high-pressure operations, often drawing parallels between red teaming and stoicism. Maxie and Matt also examine how to responsibly deliver red team results to leadership, balancing candor with empathy to ensure organizations grow stronger without shame or defensiveness. They reflect on the future of AI in security, the persistence of physical threats, and the irreplaceable value of human judgment. The episode wraps with a powerful reading list and a shared love of books, highlighting titles that explore geopolitics, materials science, and the ungoverned world of the open ocean. This episode is packed with insight, storytelling, and practical wisdom for cybersecurity professionals, technologists, and leaders looking to understand how adversaries think—and how to outsmart them. Additional Links: The Art of Attack: Attacker Mindset for Security Professionals by Maxie Reynolds Maxie on Twitter/X Book Recommendations: How the World Really Works: The Science Behind How We Got Here and Where We're Going by Vaclav Smil The Outlaw Ocean: Journeys Across the Last Untamed Frontier by Ian Urbina Prisoners of Geography: Ten Maps That Explain Everything About the World by Tim Marshall Chip War: The Fight for the World's Most Critical Technology by Chris Miller Stuff Matters: Exploring the Marvelous Materials That Shape Our Man-Made World by Mark Miodownik

Awakening
Peter Wilson Shares TRUSTEE Secrets to WINNING in Court

Awakening

Play Episode Listen Later May 23, 2025 88:52


Another call with Peter Wilson discussing how to prepare for Court and self defence in these dangerous times. #commonlaw #natural law #sovereignityAbout my Guest:Ex Royal Navy gunner and armourer, turned professional fighter. Owned and ran own martial arts gym for about 30 years. Always been aware of something not being right in the world, went deep into it after losing over £1million of property in 1 week including own home. So been up and been down even living in a car for a while with his wife Janine and 4 dogs. ---Awakening Podcast Social Media / Coaching My Other Podcasts  ⁠⁠⁠https://roycoughlan.com/⁠⁠ ------------------What we Discussed: 00:45 Where did the Name Checkmate the Matrix come from08:20 Social media Attacks17:00 How to Protect yourself with uprise in Crime 18:50 You are going to be the Bodyguard of You22:00 Weapons to protect you28:10 Attackers do not want to be identified29:40 How do we Create Proper Legal Files33:20 A case against a local council34:20 Acting as a Trustee instead of a McKenzie friend38:30 Council woman claiming she underdtood the law44:00 Council Create their own Rules46:50 The File Needed for Court50:10 3 Copies of the Files needed for Court53:40 Are they allowed to Redact information on the documents 58:45 Getting video recordings after a Data Request1:03:00 Choose your Battles1:06:00 You must always reply to Registed Letter1:09:00 The Companies wait untill the last day to submit a claim1:11:00 AIB Bank did illegal activities1:13:00 The Pigeons must be in small groups and injected1:15:50 Chicken Farm destroyed1:17:00 Wild Cows in the UK1:21:00 Coal Mined in Australia sent to Japan then to UK1:23:00 The Peat in Ireland imported after closing Peat bogs1:23:00 Amazon trees cut for Climate change event1:23:45 The Stupidity of the Climate Change Activists1:26:25 Trying to catch Mc Donalds customers that dump packaging How to Contact Peter:  https://www.claimyourstrawman.com/ https://checkmatethematrix.com/?linkId=lp_513119&sourceId=roy&tenantId=checkmate-the-matrix https://linktr.ee/PeterWilsonReturnToDemocracy  ------------------------------More about the Awakening Podcast:All Episodes can be found at www.awakeningpodcast.org My Facebook Group Mentioned in this Episode https://www.facebook.com/profile.php?id=61572386459383 Awakening Podcast Social Media / Coaching My Other Podcasts  ⁠⁠⁠https://roycoughlan.com/⁠⁠ Our Facebook Group can be found at https://www.facebook.com/royawakening #checkmatethematrix #ucc #peterwilson #trustee

Total Soccer Show: USMNT, EPL, MLS, Champions League and more ...
Dest! Jedi! Wide attackers? Breaking down the USMNT Gold Cup provisional roster | USMNT Weekly

Total Soccer Show: USMNT, EPL, MLS, Champions League and more ...

Play Episode Listen Later May 21, 2025 59:38


We have the latest 60-player provisional roster for the USMNT, and we also have... waaaay too many thoughts about it. Surprise inclusions and omissions, our preferred final rosters and starting elevens, and a deeper look at what the pool itself reveals about the state of the program.WE HAVE A YOUTUBE CHANNEL!⁠⁠⁠⁠⁠⁠We're posting all our episodes here⁠⁠⁠⁠⁠⁠! Smash the like and subscribe etc.!JOIN THE TSS+ PATREON!Check out our Patreon, which houses bonus podcasts, access to our exclusive Discord, blog posts, videos, and much more. Hosted on Acast. See acast.com/privacy for more information.

The John Batchelor Show
Preview Colleague Ambassador Husain Haqqani asks for more information regarding the Kashmir terror attackers who provoked the nuclear talk drama. More later.

The John Batchelor Show

Play Episode Listen Later May 19, 2025 2:09


Preview Colleague Ambassador Husain Haqqani asks for more information regarding the Kashmir terror attackers who provoked the nuclear talk drama. More later. 1965 PAKISTAN-INDIA WAR 

The Anfield Index Podcast
Xavi Simmons' Big Offer Coming! Luis Diaz To Barcelona Back On & LFC Eye TOP Attacker!

The Anfield Index Podcast

Play Episode Listen Later May 18, 2025 22:16


Welcome to another episode of The Transfer Show as Dave Davis & Trev Downey talk all things Transfers for Europe & Liverpool with big moves coming! Learn more about your ad choices. Visit podcastchoices.com/adchoices

Snacks
Is Debinha running away with NWSL MVP? A look into the current top candidates

Snacks

Play Episode Listen Later May 15, 2025 19:07


On this week's episode, Claire presents her MVP candidate shortlist as the NWSL season dips into the second third of the year. Attackers have been reigning supreme, but which pros and cons could lead to the biggest individual award of 2025?

Paul's Security Weekly
Ransomware in your CPU - PSW #874

Paul's Security Weekly

Play Episode Listen Later May 15, 2025 118:19


This week in the security news: Android catches up to iOS with its own lockdown mode Just in case, there is a new CVE foundation Branch privilege injection attacks My screen is vulnerable The return of embedded devices to take over the world - 15 years later Attackers are going after MagicINFO Hacking Starlink Mitel SIP phones can be hacked Reversing with Hopper Supercharge your Ghidra with AI Pretending to be an anti-virus to bypass anti-virus macOS RCE - perfect colors End of life routers are a hackers dream, and how info sharing sucks Ransomware in your CPU Disable ASUS DriverHub Age verification and privacy concerns Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-874

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, May 12th: Apple Patches; Unipi Technologies Scans;

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later May 13, 2025 6:29


Apple Updates Everything Apple patched all of its operating systems. This update ports a patch for a recently exploited vulnerability to older versions of iOS and macOS. https://isc.sans.edu/diary/31942 It Is 2025, And We Are Still Dealing With Default IoT Passwords And Stupid 2013 Router Vulnerabilities Versions of the Mirai botnet are attacking devices made by Unipi Technology. These devices are using a specific username and password combination. In addition, this version of the Mirai botnet will also attempt exploits against an old Netgear vulnerability. https://isc.sans.edu/diary/It%20Is%202025%2C%20And%20We%20Are%20Still%20Dealing%20With%20Default%20IoT%20Passwords%20And%20Stupid%202013%20Router%20Vulnerabilities/31940 Output Messenger Vulnerability The internal messenger application Output Messenger is currently used in sophisticated attacks. Attackers are exploiting a path traversal vulnerability that has not been fixed. https://www.outputmessenger.com/cve-2025-27920/ Commvault Correction Commvault s patch indeed fixes the recent vulnerability. The Pioneer Release Will Dormann used to experiment will only offer patches after it has been registered, which leads to an error when assessing the patch s efficacy. https://www.darkreading.com/application-security/commvault-patch-works-as-intended

Fightful | MMA & Pro Wrestling Podcast
Alexa Bliss Returns; Orton & Mystery Attacker Target Cena! | WWE Smackdown 5/9/25 Full Show Review

Fightful | MMA & Pro Wrestling Podcast

Play Episode Listen Later May 10, 2025 95:50


Kate (@MissKatefabe) and Alex (@_AlexisCardoza) discuss tonight's episode of Smackdown, May 9, 2025 including:-John Cena returns-Damian Priest and LA Knight vs. Solo Sikoa and Jacob Fatu-No. 1 Contender's Match for the WWE Women's Championship: Jade Cargill vs. Nia JaxGrab your EXCLUSIVE NordVPN Deal by going to http://nordvpn.com/fightful to get a Huge Discount off your NordVPN Plan + a Bonus Gift! It's completely risk free with Nord's 30 day money-back guarantee! ➼ https://nordvpn.com/fightful Try it risk-free now with a 30-day money-back guarantee!All of the odds we speak about on Fightful come from our official partner, BetOnline! Check them out at http://BetOnline.AG for the fastest payouts and earliest lines on sports, wrestling and more!Our Sponsors:* Check out Cigars International and use my code FIGHTFUL for a great deal: https://www.cigarsinternational.com* Check out Hims: https://hims.com/FIGHTFULSupport this podcast at — https://redcircle.com/fightful-pro-wrestling-and-mma-podcast/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

Everyday Miracles Podcast
163. A Miraculous Survival - Priest Stabbed in the Chest Forgives His Attacker!

Everyday Miracles Podcast

Play Episode Listen Later May 8, 2025 38:43


Join the Everyday Miracles podcast with Julie Hedenborg as she welcomes Father Matt Marino from St. Augustine, Florida. In this powerful episode, Father Matt shares his incredible testimony of survival after a brutal and unexpected stabbing. He details the miraculous events and divine intervention that saved his life, his journey of faith, and the profound sense of peace and forgiveness that he felt throughout this harrowing experience. Father Matt's story is a testament to the power of community, the miraculous nature of faith, and the importance of forgiveness. Stay tuned for an inspiring prayer for those struggling with fear and unforgiveness.      00:00 Preview   02:00 Father Matt's Background   06:05 The Attack before breakfast   16:13 The Aftermath and Medical Miracle   27:54 Forgiveness and Reflection   30:42 Startling discovery of demonic voices heard by attacker   32:40 Returning to Normalcy   36:21 Final and Prayer     Ephesians 4:32 "Be kind and compassionate to one another, forgiving each other, just as in Christ God forgave you."      How to reach Father Matt:   https://www.trinitysta.org/    About Father Matt:   An adolescent atheist turned Episcopal priest, Matt likes to drink coffee, talk about Jesus, and will shamelessly invite himself aboard your sailboat. Matt has been rector of Trinity since April Fools day, 2019. Also on Matt's resume: Basketball coach, history teacher, recovery planner, Young Life Area Director, summer camp program architect, youth/young adult director for the Diocese of Arizona, seminary instructor, church planter, consultant, and ballboy for the Phoenix Suns. Each of those experiences has left him more in wonder at the grandeur of the One who made us and calls us home through the cross and empty tomb. Matt and Kari have two grown children, Gabrielle and Luke, who love God and his church. Matt blogs at thegospelside.com

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Thursday, May 1st: Sonicwall Attacks; Cached Windows RDP Credentials

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later May 1, 2025 6:28


Web Scanning for Sonicwall Vulnerabilities CVE-2021-20016 For the last week, scans for Sonicwall API login and domain endpoints have skyrocketed. These attacks may be exploiting an older vulnerability or just attempting to brute force credentials. https://isc.sans.edu/diary/Web%20Scanning%20Sonicwall%20for%20CVE-2021-20016/31906 The Wizards APT Group SLAAC Spoofing Adversary in the Middle Attacks ESET published an article with details regarding an IPv6-linked attack they have observed. Attackers use router advertisements to inject fake recursive DNS servers that are used to inject IP addresses for hostnames used to update software. This leads to the victim downloading malware instead of legitimate updates. https://www.welivesecurity.com/en/eset-research/thewizards-apt-group-slaac-spoofing-adversary-in-the-middle-attacks/ Windows RDP Access is Possible with Old Credentials Credential caching may lead to Windows allowing RDP logins with old credentials. https://arstechnica.com/security/2025/04/windows-rdp-lets-you-log-in-using-revoked-passwords-microsoft-is-ok-with-that/?comments-page=1#comments

20/20
True Crime Vault: Slender Man Attackers

20/20

Play Episode Listen Later Apr 26, 2025 47:31


Interviews with key people connected to the 2014 case in which two 12-year-olds stabbed their friend 19 times and left her for dead, in an effort to appease the mysterious fictional character known as Slender Man. Originally aired: 02/09/18 Learn more about your ad choices. Visit podcastchoices.com/adchoices

The Michael Knowles Show
BLM 2.0 - Metcalf's Attacker BLOWS GoFundMe Money On A NEW HOUSE

The Michael Knowles Show

Play Episode Listen Later Apr 16, 2025 45:33


President Trump threatens to obliterate Harvard, the family of the teenager who allegedly murdered Austin Metcalf is using his GoFundMe money to buy a new house, and Katy Perry officially becomes a space cadet.Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlriEp.1716- - -DailyWire+:We're leading the charge again and launching a full-scale push for justice. Go to https://PardonDerek.com right now and sign the petition.Now is the time to join the fight. Watch the hit movies, documentaries, and series reshaping our culture. Go to https://dailywire.com/subscribe today.Live Free & Smell Fancy with The Candle Club: https://thecandleclub.com/michael- - -Today's Sponsors:Balance of Nature - Go to https://balanceofnature.com and use promo code KNOWLES for 35% off your first order PLUS get a free bottle of Fiber and Spice.Birch Gold - Text KNOWLES to 989898 for your free information kit.Done With Debt - Start building the life you deserve! Visit https://donewithdebt.com and talk with one of their strategists. It's FREE!- - -Socials:Follow on Twitter: https://bit.ly/3RwKpq6Follow on Instagram: https://bit.ly/3BqZLXAFollow on Facebook: https://bit.ly/3eEmwygSubscribe on YouTube: https://bit.ly/3L273Ek