POPULARITY
Categories
A woman was stabbed multiple times in the upper body on a Tokyo street around noon Monday and was taken to a hospital while remaining conscious, according to investigative sources.
The threat that puts you out of business probably won't look like a movie hack, it'll look like a normal email from your CEO. In this episode of the Registered Investment Advisor Podcast, Seth Greene interviews Scott Alldridge, CEO of IP Services and bestselling author of the VisibleOps series, who explains how modern cybercrime actually works and why most small and mid-sized companies are far more vulnerable than they think. Scott shares real breach stories, including how something as simple as leaving a printer password as “1234” led to a $187,000 theft and forced a firm into a merger. He breaks down why cybersecurity is now a board-level issue, how AI is being weaponized by attackers, and what leaders need to be doing right now to protect their data, their money, and their survival. Key Takeaways: → Most companies think “we're too small to be a target,” but attackers actively go after businesses with as few as 100 employees — and even under $1M in revenue. → Only about 1 in 7 cybersecurity breaches ever gets reported, so what you read in the news is a tiny fraction of what's actually happening. → A single weak password (like “1234” on a networked printer) can give a threat actor a doorway into your entire system. → Attackers don't smash and grab; they sit quietly for weeks or months, watch how you communicate, then imitate leadership to trigger wire transfers that look totally normal. → The “human layer” is still the biggest risk: phishing, social engineering, and reused or weak credentials are where most compromises begin. Scott Alldridge has spent three decades on the frontlines of cyber warfare—turning escalating threats into competitive advantage for business leaders. As co-founder of the IT Process Institute and creator of the globally adopted VisibleOps framework (400,000+ copies sold), he shaped how enterprises worldwide secure and scale technology. His Amazon bestseller, VisibleOps Cybersecurity, is the definitive roadmap for integrating Zero Trust principles into real business results. Today, as CEO of IP Services, one of America's most trusted MSSPs, Scott helps executives verify—not just trust—their cybersecurity posture. Driven by both expertise and altruism, Scott's mission is to ensure businesses of all sizes are resilient and protected—not only to safeguard revenue, but to prevent the devastating personal and professional fallout of cyberattacks. A globally recognized thought leader with 618K+ social media followers, he leverages his platform to raise awareness, share real-world breach stories, and arm leaders with actionable strategies that save companies before it's too late. Connect With Scott: Website: https://ipservices.com/ Instagram: https://www.instagram.com/scottalldridge1/ LinkedIn: https://www.linkedin.com/in/scott-alldridge-1a976/ FREE OFFERSText "Secure25" to 1-541-359-1269 to receive your free Visible Ops Executive Companion book and a free Penetration Scan Test (first 3 listeners only) Learn more about your ad choices. Visit megaphone.fm/adchoices
In this annual Security Squawk tradition, we do two things most people avoid: accountability and predictions. First, we break down the top cyber-attacks of 2025 and translate them into what actually matters for business owners, IT pros, and MSPs. Then we grade our predictions from last year using real outcomes. No excuses. No hand waving. No “well technically.” Why does this episode matter? Because 2025 made one thing painfully clear. Most cyber damage does not come from genius hackers. It comes from predictable failures. Unpatched systems. Over-trusted third parties. Tokens and sessions that live too long. Help desks that can be socially engineered. And organizations that still treat cybersecurity like an IT issue instead of a business survival issue. We start with the Top 10 Cyber-Attacks of 2025 and pull out the patterns hiding behind the headlines. This year's list includes ransomware and extortion campaigns, software supply chain failures, identity and OAuth token abuse, and attacks that caused real operational disruption, not just data exposure. These stories show how attackers scale impact by targeting widely deployed platforms and trusted business tools, then turning that access into downtime, data theft, and brand damage. One of the biggest lessons of 2025 is simple: identity is the new perimeter. Many of the most important incidents were not break-in stories. They were log-in stories. Stolen sessions and OAuth tokens keep working because they let attackers bypass MFA, move quickly, and blend in as legitimate users. If your security strategy is focused only on blocking failed logins, you are watching the wrong signal. 2025 also reinforced how fragile third-party trust has become. Integrations are everywhere. They make businesses faster and more efficient, but they also expand the blast radius. When a third-party tool or service account is compromised, it can become a shortcut into systems that were never directly attacked. In this episode, we talk about practical steps like minimizing access scopes, eliminating unnecessary integrations, shortening token lifetimes, and having a real plan to revoke access when something looks off. We also dig into why on-prem enterprise tools continue to get hammered. Many organizations still run internet-facing platforms that are patched slowly and monitored poorly. Attackers love that combination. In 2025, we saw repeated exploitation of high-value enterprise software where a single weakness led to widespread compromise across industries. If your patching strategy is “we will get to it,” attackers already have. Another major theme this year was operational disruption. Some of the costliest incidents were not just about stolen data. They shut down production, halted sales, broke customer service systems, and created ripple effects across supply chains. That is where executives feel cyber risk the hardest. Data loss hurts. Downtime is a business emergency. Then we grade last year's predictions. Did AI take our jobs? Not even close. What it did do was raise the baseline for both attackers and defenders. AI improved phishing quality, accelerated scams, and forced organizations to confront the risks of adopting new tools without clear controls. We also review our call on token and session-based attacks. That prediction aged well. Identity-layer abuse dominated 2025. The issue was not a lack of MFA. The issue was that attackers did not need to defeat MFA if they could steal what comes after it. We also revisit regulation. It did not arrive all at once. It crept forward. Agencies and lawmakers continued tightening expectations, especially in sectors that keep getting hit. Businesses that wait for mandates before improving controls will pay more later, either through recovery costs, insurance pressure, or lost trust. Finally, we look ahead to 2026 with new predictions that are probable, not obvious. We discuss what is likely to change around identity, help desk security, SaaS governance, and how leaders measure cyber readiness. The short version is this: 2026 will reward companies that treat access as a living system and punish those that treat it like a one-time setup. If you like the show, help us grow it. Subscribe, leave a review, and share this episode with someone who still thinks cybersecurity is just antivirus and a firewall. And if you want to support the podcast directly, buy me a coffee at buymeacoffee.com/securitysquawk.
In this episode, Brad and Spencer from SecurIT360's Offensive Security group delve into the crucial reconnaissance phase attackers undertake before launching an attack. They discuss the real-world impact of seemingly harmless data leaks, how attackers chain them together to build a profile of your organization, and common misconceptions about what data is truly "sensitive" from an external attacker's perspective. Learn how organizations can realistically assess their external attack surface beyond automated scanning and discover creative OSINT techniques defenders can use to mimic attacker reconnaissance.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal pentesting here.
Hewlett Packard Enterprise patches a maximum-severity vulnerability in its OneView infrastructure management software. Cisco warns a critical zero-day is under active exploitation. An emergency Chrome update fixes two high-severity vulnerabilities. French authorities make multiple arrests. US authorities dismantle an unlicensed crypto exchange accused of money laundering. SonicWall highlights an exploited zero-day. Researchers earn $320,000 for demonstrating critical remote code execution flaws in cloud infrastructure components. A U.S. Senator urges electronic health record vendors to give patients greater control over who can access their medical data. Our guest is Larry Zorio, CISO from Mark43, discussing first responders and insider cyber risks. A right-to-repair group puts cash on the table. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Larry Zorio, CISO from Mark43, to discuss first responders sounding the alarm on insider cyber risks. To see the full report, check it out here. Selected Reading HPE warns of maximum severity RCE flaw in OneView software (Bleeping Computer) China-Linked Hackers Exploiting Zero-Day in Cisco Security Gear (SecurityWeek) Google Chrome patches two high severity vulnerabilities in emergency update (Beyond Machines) France arrests 22-year-old over Interior Ministry hack (The Record) France arrests Latvian for installing malware on Italian ferry (Bleeping Computer) FBI dismantles alleged $70M crypto laundering operation (The Register) SonicWall Patches Exploited SMA 1000 Zero-Day (SecurityWeek) Zeroday Cloud hacking event awards $320,0000 for 11 zero days (Bleeping Computer) Senator Presses EHR Vendors on Patient Privacy Controls (Govinfosecurity) A nonprofit is paying hackers to unlock devices companies have abandoned (TechSpot) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Gregory Copley details how the Bondi Beach attackers trained in the Philippines' insurgent areas. While praising Australian intelligence agencies, he blames the Albanese government for encouraging anti-Israel sentiment, arguing this political stance has given license to radical groups and undermined public safety. 1929 PERTHB
In this episode, we discuss Saturday Night's Main Event, Monday Night Raw on Netflix, Mick Foley and WWE Relationship news, the mystery attacker reveal let down, and the rest of the day's news.Don't Forget to Support Our Sponsors:3WA - www.wwwawrestling.comSketchy People - Available now at thegamecrafter.comWrestler Unstoppable - available exclusively through Facebook!Become a supporter of this podcast: https://www.spreaker.com/podcast/fro-wrestling-podcast--2103073/support.
Naveed Akram, who carried out the attack with his father, has emerged from a coma after being shot by the police. Police said investigators expect to question the son once medication wears off and legal counsel is present.
Cyber attacks are no longer a future problem or a Silicon Valley issue. They are happening right now across the United States, quietly and relentlessly, targeting local governments, public agencies, schools, police departments, fire services, and critical infrastructure that most people rely on every day. In this episode of the Security Squawk Podcast, we break down the uncomfortable truth about the current cyber threat landscape and why much of it is flying under the radar. We start with a major data breach involving 700Credit, a financial services company widely used by car dealerships across the country. The breach impacted an estimated 5.8 million consumers, exposing sensitive personal information including names, addresses, birth dates, and Social Security numbers. What makes this incident especially troubling is that it originated through a third-party integration and went undetected until it was too late. This is a textbook example of how supply chain risk, weak API oversight, and poor third-party visibility continue to plague organizations of all sizes. For business owners, IT leaders, and managed service providers, this breach highlights a critical lesson. Security controls inside your own environment are meaningless if your partners, vendors, or integrations are not held to the same standard. Attackers know this, and they are exploiting it aggressively. Next, we shift to a growing and deeply concerning trend involving nation-state threat actors, particularly Russian-backed groups targeting network edge devices. Firewalls, VPN appliances, routers, and other edge infrastructure are now prime targets because they offer direct access to internal networks and often remain poorly monitored or improperly configured. These attacks are not always sophisticated zero-day exploits. In many cases, they succeed because of exposed management interfaces, outdated firmware, or weak credentials. This matters because edge devices sit at the front door of nearly every organization. Once compromised, they allow attackers to persist quietly, move laterally, and stage future attacks without triggering traditional endpoint defenses. The takeaway is clear. If you are not actively inventorying, patching, and monitoring your edge infrastructure, you are already behind. Then we pull the lens back even further and focus on what may be the most underreported cyber crisis happening today. Public sector organizations across the United States are under sustained cyber attack. Cities, towns, school districts, emergency services, and municipal agencies are being hit week after week. These incidents rarely make national headlines. Instead, they show up in small local news outlets, if they are reported at all. We discuss a real-world incident in Attleboro, Massachusetts, where a cybersecurity event disrupted online municipal services and briefly appeared on local television. Stories like this are happening everywhere. From ransomware attacks that shut down city services to breaches that expose resident data, public organizations are being targeted because attackers know they are often underfunded, understaffed, and slow to recover. Using data from ransomware.live and other tracking resources, we highlight how widespread these attacks really are. Thousands of U.S.-based victims are logged publicly, many of them tied to government or quasi-government entities. This is not random. It is a calculated strategy by cybercriminals who understand the pressure public agencies face to restore services quickly, often making them more likely to pay ransoms or quietly rebuild without public disclosure. Throughout the episode, we connect these stories to practical lessons for businesses, MSPs, and IT professionals. Cybersecurity is no longer about preventing every breach. It is about resilience, visibility, and response. It is about understanding where your real risk lies and taking proactive steps before an incident forces your hand. If you work in IT, run an MSP, manage infrastructure, or support public organizations, this episode delivers insight you can use immediately. We cut through the noise, skip the fear marketing, and focus on what actually matters in today's threat environment. Security Squawk exists to make cybersecurity real, relevant, and actionable. If this episode brings value to you, please subscribe, leave a review, and share it with someone who needs to hear it. And if you want to support the show directly, the easiest way is to buy us a coffee at https://buymeacoffee.com/securitysquawk Your support helps us keep producing honest conversations about the threats most people never see until it's too late.
A reward of $150,000 is being offered for information leading to the arrest of anyone that has recently assaulted a postal worker in Buffalo or Niagara Falls. Dave Grosskopf, head of the Buffalo Chapter of the National Association of Letter Carriers tells us more.
Australian police say one of the Bondi attackers, Sajid Akram, was an Indian citizen. He and his son Naveed spent weeks in the Philippines, where there's been a long-running Islamist insurgency, before Sunday's deadly attack on a Jewish festival. Also: millions are at risk of starvation in Afghanistan this winter; peace talks continue in Berlin aimed at ending the Russia-Ukraine war; and the US says it has carried out more strikes on boats it suspects of trafficking drugs in the Pacific Ocean. The Global News Podcast brings you the breaking news you need to hear, as it happens. Listen for the latest headlines and current affairs from around the world. Politics, economics, climate, business, technology, health – we cover it all with expert analysis and insight. Get the news that matters, delivered twice a day on weekdays and daily at weekends, plus special bonus episodes reacting to urgent breaking stories. Follow or subscribe now and never miss a moment. Get in touch: globalpodcast@bbc.co.uk
In this episode of Security Matters, host David Puner welcomes back David Higgins, senior director in CyberArk's Field Technology Office, for a timely conversation about the evolving cyber threat landscape. Higgins explains why today's attackers aren't breaking in—they're logging in—using stolen credentials, AI-powered social engineering, and deepfakes to bypass traditional defenses and exploit trust.The discussion explores how the rise of AI is eroding critical thinking, making it easier for even seasoned professionals to fall for convincing scams. Higgins and Puner break down the dangers of instant answers, the importance of “never trust, always verify,” and why zero standing privilege is essential for defending against insider threats. They also tackle the risks of shadow AI, the growing challenge of misinformation, and how organizations can build a culture of vigilance without creating a climate of mistrust.Whether you're a security leader, IT professional, or just curious about the future of digital trust, this episode delivers actionable insights on identity security, cyber hygiene, and the basics that matter more than ever in 2026 and beyond.
A Hanukkah celebration in Sydney became a massacre and the panel on The Quad says this was no accident, no mystery and no coincidence. As at least 15 Jews are murdered at Bondi Beach, the slogan “Globalize the Intifada” is exposed for what it really is: a call to violence with real blood on its hands. The panel connects the dots between jihadist ideology, Western denial, media propaganda and the systematic failure of governments to protect Jewish communities. If you still think these chants are “just rhetoric,” this conversation will change your mind.
US turns to private firms in cyber offensive Microsoft updates cause queuing failures Phishing campaign delivers Phantom stealer Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Attackers don't need malware anymore; they need trust. Tip: set a simple passphrase for high-risk actions, like wire requests or "urgent" account recovery – especially within finance teams and families. If the caller can't answer it, pause and verify. Adaptive runs deepfake and vishing simulations so employees practice this before it's real. Learn more at adaptivesecurity.com.
Greg Brady spoke to Imam Mohamad Tawhidi, Governing Member of the Global Imams Council about Bondi gunmen inspired by ISIS, travelled to Philippines, Australia police say. Learn more about your ad choices. Visit megaphone.fm/adchoices
As Australia mourn the victims of a shooting, during a Jewish holiday gathering at Bondi Beach, its prime minister pledges solidarity.Anthony Albanese says the attackers were not part of a terror cell, but "clearly, they were motivated by this extremist ideology". The father of a Syrian bystander who was filmed wrestling a gun off an attacker has told the BBC he was driven by "conscience and humanity"Also in the programme: Ukraine's President Zelensky comes under more pressure to compromise at peace talks in Berlin, Chile elects a far-right leader who is an admirer of the dictator, Augusto Pinochet, and police in Los Angeles investigate the suspected murder of the celebrated Hollywood director, Rob Reiner.(Photo shows Australian prime minister Anthony Albanese speaks to the media during a press conference in Sydney, Australia on 15 December 2025. Credit: Steven Markham/EPA)
AP correspondent Donna Warder has an update on the killing of three U.S. citizens in Syria.
Attackers hit React defect as researchers quibble over proof
CISA warns that pro-Russia hacktivist groups are targeting US critical infrastructure. Google patches three new Chrome zero-day vulnerabilities. North Korean actors exploit React2Shell to deploy a new backdoor. Researchers claim Docker Hub secret leakage is now a systemic problem. Attackers exploit an unpatched zero-day in Gogs, the self-hosted Git service. IBM patches more than 100 vulnerabilities across its product line. Storm-0249 abuses endpoint detection and response tools. The DOJ indicts a former Accenture employee for allegedly misleading federal customers about cloud security. Our guest is Kavitha Mariappan, Chief Transformation Officer at Rubrik, talking about understanding & building resilience against identity-driven threats. A malware tutor gets schooled by the law. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On today's Industry Voices segment, we are joined by Kavitha Mariappan, Chief Transformation Officer at Knowledge Partner Rubrik, talking about understanding and building resilience against identity-driven threats. Tune into Kavitha's full conversation here. New Rubrik Research Finds Identity Resilience is Imperative as AI Wave Floods the Workplace with AI Agents (Press release) The Identity Crisis: Understanding and Building Resilience Against Identity-Driven Threats (Report) Agentic AI and Identity Sprawl (Data Security Decoded podcast episode) Host Caleb Tolin and guest Joe Hladik, Head of Rubrik Zero Labs, to unpack the findings from their the report Kavitha addresses. Resources: Rubrik's Data Security Decoded podcast airs semi-monthly on the N2K CyberWire network with host Caleb Tolin. You can catch new episodes twice a month on Tuesdays on your favorite podcast app. Selected Reading CISA: Pro-Russia Hacktivists Target US Critical Infrastructure New cybersecurity guidance paves the way for AI in critical infrastructure | CyberScoop Google Releases Critical Chrome Security Update to Address Zero-Days - Infosecurity Magazine North Korea-linked ‘EtherRAT' backdoor used in React2Shell attacks | SC Media Thousands of Exposed Secrets Found on Docker Hub - Flare Hackers exploit unpatched Gogs zero-day to breach 700 servers IBM Patches Over 100 Vulnerabilities - SecurityWeek Ransomware IAB abuses EDR for stealthy malware execution US charges former Accenture employee with misleading feds on cloud platform's security - Nextgov/FCW Man gets jail for filming malware tutorials for syndicate; 129 Singapore victims lost S$3.2m - CNA Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
This episode is presented by Create A Video – The accused murderer of Ukrainian refugee Iryna Zarutska made his first court appearance this morning. He will continue to be held with no bond. Subscribe to the podcast at: https://ThePetePod.com/ All the links to Pete's Prep are free: https://patreon.com/petekalinershow Media Bias Check: GroundNews promo code! Advertising and Booking inquiries: Pete@ThePeteKalinerShow.com Get exclusive content here!: https://thepetekalinershow.com/See omnystudio.com/listener for privacy information.
The Trump Administration’s new National Security Strategy and the debate on isolationism versus interventionism. The clashes between protestors and Immigration and Customs Enforcement (ICE) agents. Erika Kirk’s recent comments on those who are attacking Turning Point USA in the wake of the assassination of her husband three months ago. Historian Victor Davis Hanson’s New York Post piece, “Citizens are fed up with Dem-invited migrants who have disdain for US law and culture.”See omnystudio.com/listener for privacy information.
This episode is presented by Create A Video – The criminal illegal alien who stabbed a man on Charlotte's light rail train last week was cited for carrying a knife at a train station back in October. He was given a citation and released. Subscribe to the podcast at: https://ThePetePod.com/ All the links to Pete's Prep are free: https://patreon.com/petekalinershow Media Bias Check: GroundNews promo code! Advertising and Booking inquiries: Pete@ThePeteKalinerShow.com Get exclusive content here!: https://thepetekalinershow.com/See omnystudio.com/listener for privacy information.
Ransomware payments pass $4.5 billion Cybercrime networks orchestrate real-world violence Three arrested over possessing hacking tools Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Attackers don't need malware anymore; they need trust. Tip: set a simple passphrase for high-risk actions, like wire requests or "urgent" account recovery – especially within finance teams and families. If the caller can't answer it, pause and verify. Adaptive runs deepfake and vishing simulations so employees practice this before it's real. adaptivesecurity.com.
Attackers don't take holidays off. In this December Patch Tuesday episode, the Automox security team breaks down three high-impact vulnerabilities landing at the end of 2025. Ryan, Mat, and Seth unpack the React2Shell RCE hitting React Server Components, an Azure Monitor Agent flaw that turns the syslog user into a stealthy foothold, and a Windows File Explorer bug where a single click may trigger privilege escalation.You'll hear why light patch months aren't always low-risk, how bundled dependencies can expose you even if you don't “use” React, and why log pipelines remain a prime target for attackers looking to hide their tracks. The team also covers seasonal phishing trends and what to expect as skeleton crews head into the holidays.
https://advancedsafetytech.com/Comparing stun guns and pepper spray? Learn how each tool works, when they're most effective, and what buyers should consider before choosing one. Advanced Safety Tech City: Bethel Address: 12512 Brannon Rd. Website: https://advancedsafetytech.com/
Megyn Kelly is joined by Chamath Palihapitiya, co-host of the “All-In” podcast, to discuss the state of the Trump administration as 2025 comes to an end, ways he can focus on fixing the economy for different groups of Americans, what his plans should be ahead of the 2026 midterms, the viral clip about rich tech wives who focus on fighting for equity and climate change, whether they could better serve society by taking on other sorts of jobs, bombshell new reporting about the dangers of COVID vaccines, a potential cover-up of COVID vaccine-related deaths in children, and more. Then Dave Aronberg and Phil Holloway, MK True Crime contributors, join to discuss the Fani Willis criminal case against Trump officially ending, the drama of the case and how Ashleigh Merchant helped bring down Willis, the January 6 pipe bomber mystery, the Blaze report that's getting major pushback now, Will Smith's alleged friend suing Jada Pinkett Smith for millions, the wild lawsuit allegations, and more. Then NYU students Amelia Lewis and Summer Armstrong join to discuss the assault against Amelia on the street in NYC in broad daylight, how Summer helped find the video footage, the way Megyn and the X community helped get the alleged assailant arrested, his lengthy rap sheet, and more. Palihapitiya- https://x.com/chamathAronberg- https://substack.com/@davearonbergHolloway- https://x.com/PhilHollowayEsqLewis- https://www.tiktok.com/@amelia.lewis506 Subscribe to MK True Crime:Apple: https://podcasts.apple.com/us/podcast/mk-true-crime/id1829831499Spotify: https://open.spotify.com/show/4o80I2RSC2NvY51TIaKkJWYouTube: https://www.youtube.com/@MKTrueCrime?sub_confirmation=1Social: http://mktruecrime.com/ Geviti: Go to https://gogeviti.com/megynand get 20% off with code MEGYN.Tax Network USA: Call 1-800-958-1000 or visit https://TNUSA.com/MEGYNto speak with a strategist for FREE todaySelectQuote: Get the right life insurance for YOU, for LESS. Save more than 50% at https://selectquote.com/MEGYN Follow The Megyn Kelly Show on all social platforms:YouTube: https://www.youtube.com/MegynKellyTwitter: http://Twitter.com/MegynKellyShowInstagram: http://Instagram.com/MegynKellyShowFacebook: http://Facebook.com/MegynKellyShow Find out more information at:https://www.devilmaycaremedia.com/megynkellyshow Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Jesse Kelly honors the fallen on this edition of I'm Right following a horrific attack on America's National Guard. Who is truly responsible? Jesse breaks that down alongside Julio Rosas. This comes as the Democrats are working overtime to run an operation to get a key Trump official fired. What does it have to do with Venezuela? Jesse brings on Ammon Blair to discuss that and more. I'm Right with Jesse Kelly on The First TVMasa Chips: Ready to give MASA or Vandy a try? Get 25% off your first order by going to http://masachips.com/JESSETV and using code JESSETV. Beam: Visit https://shopbeam.com/JESSEKELLY and use code JESSEKELLY to get our exclusive discount of up to 40% off. Choq: Visit https://choq.com/jessetv for a 17.76% discount on your CHOQ subscription for lifeFollow The Jesse Kelly Show on YouTube: https://www.youtube.com/@TheJesseKellyShowSee omnystudio.com/listener for privacy information.
How The Afghan Attacker Could Have Been Stopped by Ron Paul Liberty Report
The case that shocked the country just took an even darker turn. New details have emerged about who Morgan Geyser escaped with, how she was able to break free from a supposedly supervised group home, and the massive systemic failures that let her travel across state lines before anyone realized she was gone. What we're learning now raises disturbing questions about supervision, risk assessment, and why someone with her violent history was ever placed in a neighborhood without warning. Tonight, we break down everything that's happened since her capture in Illinois — including the surprising statements from the man found with her. He claims she fled “because of him,” revealing a relationship that should never have been allowed in the first place. We examine what this connection tells us about her mindset, the breakdown of boundaries in her supervised release, and how a person once committed after a delusion-fueled attack was able to form this kind of attachment without the system catching it. We walk through the escape minute-by-minute: • The GPS monitor alert labeled as a “malfunction.” • The hours-long delay before anyone checked her location. • The missing-person report not reaching police until the next morning. • And the capture behind a truck stop more than 150 miles away. We look at what investigators have uncovered, what the group home missed, and why the Department of Corrections treated a tamper alert like a tech glitch instead of a high-risk event. And then — what happens next. Geyser has waived extradition. Wisconsin is preparing to take her back. Her conditional release is on the brink of being revoked. Multiple agencies are now under scrutiny, and lawmakers are already pushing for major changes to how high-risk supervised releases are handled. This isn't just an escape. It's a case study in how optimism, secrecy, and blind spots can collide in ways that put entire communities at risk. And it's a story that's far from over. Join us as we dig into the timeline, the failures, the psychology, and the fallout. #MorganGeyser #SlenderManCase #HiddenKillers #TrueCrimeNews #Wisconsin #CrimeAnalysis #JusticeSystem #PublicSafety #TrueCrimeToday #CrimeUpdates Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
The case that shocked the country just took an even darker turn. New details have emerged about who Morgan Geyser escaped with, how she was able to break free from a supposedly supervised group home, and the massive systemic failures that let her travel across state lines before anyone realized she was gone. What we're learning now raises disturbing questions about supervision, risk assessment, and why someone with her violent history was ever placed in a neighborhood without warning. Tonight, we break down everything that's happened since her capture in Illinois — including the surprising statements from the man found with her. He claims she fled “because of him,” revealing a relationship that should never have been allowed in the first place. We examine what this connection tells us about her mindset, the breakdown of boundaries in her supervised release, and how a person once committed after a delusion-fueled attack was able to form this kind of attachment without the system catching it. We walk through the escape minute-by-minute: • The GPS monitor alert labeled as a “malfunction.” • The hours-long delay before anyone checked her location. • The missing-person report not reaching police until the next morning. • And the capture behind a truck stop more than 150 miles away. We look at what investigators have uncovered, what the group home missed, and why the Department of Corrections treated a tamper alert like a tech glitch instead of a high-risk event. And then — what happens next. Geyser has waived extradition. Wisconsin is preparing to take her back. Her conditional release is on the brink of being revoked. Multiple agencies are now under scrutiny, and lawmakers are already pushing for major changes to how high-risk supervised releases are handled. This isn't just an escape. It's a case study in how optimism, secrecy, and blind spots can collide in ways that put entire communities at risk. And it's a story that's far from over. Join us as we dig into the timeline, the failures, the psychology, and the fallout. #MorganGeyser #SlenderManCase #HiddenKillers #TrueCrimeNews #Wisconsin #CrimeAnalysis #JusticeSystem #PublicSafety #TrueCrimeToday #CrimeUpdates Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
One National Guard member is dead and another is fighting for his life after an ambush-style attack in the nation's capital. Authorities say they plan to seek the death penalty against the suspect. Meanwhile, President Trump is pausing all immigration from dozens of countries in the wake of the attack. Also on this morning's show: New information is emerging from the devastating fire in Hong Kong as the death toll there continues to climb ... Trump threatens Venezuela, telling US troops a land attack could come very soon ... US negotiators head to Moscow amid new warnings from Vladimir Putin against telling Ukraine. Learn more about your ad choices. Visit podcastchoices.com/adchoices
This is the story Wisconsin never wanted to explain — how the girl who nearly took a child's life in the infamous Slender Man attack was quietly moved into a suburban neighborhood, supervised by nothing more than a plastic ankle monitor, and somehow slipped across state lines with a grown man before anyone sounded the alarm. Tonight, we're taking you through the full timeline of how Morgan Geyser — the attacker in the Slender Man stabbing — went from a secure psychiatric institution to a residential street in Madison. Not because she “served her time,” but because judges, doctors, and state agencies convinced themselves she was ready for “community reintegration,” despite red flags that would stop any other case in its tracks. We dig into the decisions that opened the door: • The court rulings that shifted her from a locked facility to a group home. • The warnings about disturbing reading material and troubling outside contacts. • The placement that got scrapped after residents found out who was coming. • The next placement, quietly sealed by the court to avoid public backlash. • The neighborhood full of families who had no idea she had moved in. • And the ankle-monitor alert that DOC brushed off as a “device glitch” while she walked freely into the night. And then — the escape. A missing GPS signal. A 12-hour communication delay. A 42-year-old man by her side. And a capture behind a truck stop in Illinois after officers realized the woman they found didn't want to say her name because she'd “done something really bad.” This isn't just a story about an escape. It's a story about a system that trusted a fragile treatment plan more than it trusted the memory of what she had already done. It's about the gap between courtroom optimism and real-world danger. And it's about how the people most affected — the victim's family, the neighbors, and the public — were kept in the dark until everything fell apart. If you've ever wondered how someone with a violent, delusion-driven history ends up living quietly next to families with no warning, this breakdown will answer that — and raise questions Wisconsin will be forced to confront. #SlenderManCase #MorganGeyser #TrueCrimeNews #HiddenKillers #CrimeAnalysis #JusticeSystem #Wisconsin #CrimeBreakdown #PublicSafety #TrueCrimeToday Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
This is the story Wisconsin never wanted to explain — how the girl who nearly took a child's life in the infamous Slender Man attack was quietly moved into a suburban neighborhood, supervised by nothing more than a plastic ankle monitor, and somehow slipped across state lines with a grown man before anyone sounded the alarm. Tonight, we're taking you through the full timeline of how Morgan Geyser — the attacker in the Slender Man stabbing — went from a secure psychiatric institution to a residential street in Madison. Not because she “served her time,” but because judges, doctors, and state agencies convinced themselves she was ready for “community reintegration,” despite red flags that would stop any other case in its tracks. We dig into the decisions that opened the door: • The court rulings that shifted her from a locked facility to a group home. • The warnings about disturbing reading material and troubling outside contacts. • The placement that got scrapped after residents found out who was coming. • The next placement, quietly sealed by the court to avoid public backlash. • The neighborhood full of families who had no idea she had moved in. • And the ankle-monitor alert that DOC brushed off as a “device glitch” while she walked freely into the night. And then — the escape. A missing GPS signal. A 12-hour communication delay. A 42-year-old man by her side. And a capture behind a truck stop in Illinois after officers realized the woman they found didn't want to say her name because she'd “done something really bad.” This isn't just a story about an escape. It's a story about a system that trusted a fragile treatment plan more than it trusted the memory of what she had already done. It's about the gap between courtroom optimism and real-world danger. And it's about how the people most affected — the victim's family, the neighbors, and the public — were kept in the dark until everything fell apart. If you've ever wondered how someone with a violent, delusion-driven history ends up living quietly next to families with no warning, this breakdown will answer that — and raise questions Wisconsin will be forced to confront. #SlenderManCase #MorganGeyser #TrueCrimeNews #HiddenKillers #CrimeAnalysis #JusticeSystem #Wisconsin #CrimeBreakdown #PublicSafety #TrueCrimeToday Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Canadian journalist Nora Loreto reads the latest headlines for Wednesday, November 26, 2025.TRNN has partnered with Loreto to syndicate and share her daily news digest with our audience. Tune in every morning to the TRNN podcast feed to hear the latest important news stories from Canada and worldwide.Find more headlines from Nora at Sandy & Nora Talk Politics podcast feed.Become a supporter of this podcast: https://www.spreaker.com/podcast/the-real-news-podcast--2952221/support.Help us continue producing radically independent news and in-depth analysis by following us and becoming a monthly sustainer.Follow us on:Bluesky: @therealnews.comFacebook: The Real News NetworkTwitter: @TheRealNewsYouTube: @therealnewsInstagram: @therealnewsnetworkBecome a member and join the Supporters Club for The Real News Podcast today!
The Slender Man case is back in the headlines for all the wrong reasons — and the questions raised this time are even more unsettling than the original crime. Morgan Geyser, one of the two girls responsible for the near-fatal 2014 Slender Man stabbing, walked out of a Wisconsin group home after cutting off her GPS monitor… and made it all the way to Illinois before anyone finally put a stop to it. Tonight, we break down how this even happened. Because if you think the system learned its lesson after the horror of that attack, think again. We trace the full timeline — from the original case, to the insanity rulings, to the step-downs from secure psychiatric care, to the judge's continued leniency despite red flags about violent material and questionable outside contacts. Then we examine the part that has people furious: how someone with this history was placed in a low-security setting with nothing more than a strap of plastic around her ankle standing between the public and another potential tragedy. This isn't fear-mongering. It's a real look at what happens when the legal system bends over backward to “treat” a violent offender while forgetting that protection of the public is supposed to come first. It's also a look at why the more extreme the delusions behind a violent act, the faster the system seems to nudge toward reintegration — instead of building genuine safeguards. Morgan Geyser is back in custody. But this is a wake-up call for Wisconsin, and honestly, for the entire country. When someone who committed one of the most disturbing attacks of the last decade can just walk out of supervised care and vanish across state lines, the problem isn't the individual — it's the system that allowed it. Join us as we break down what went wrong, how it could've been prevented, and why this case feels far too close to a real-life horror movie. #SlenderManCase #MorganGeyser #TrueCrimeNews #HiddenKillers #Wisconsin #JusticeSystem #CrimeAnalysis #PublicSafety #CrimeStories #TrueCrimeToday Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
The Slender Man case is back in the headlines for all the wrong reasons — and the questions raised this time are even more unsettling than the original crime. Morgan Geyser, one of the two girls responsible for the near-fatal 2014 Slender Man stabbing, walked out of a Wisconsin group home after cutting off her GPS monitor… and made it all the way to Illinois before anyone finally put a stop to it. Tonight, we break down how this even happened. Because if you think the system learned its lesson after the horror of that attack, think again. We trace the full timeline — from the original case, to the insanity rulings, to the step-downs from secure psychiatric care, to the judge's continued leniency despite red flags about violent material and questionable outside contacts. Then we examine the part that has people furious: how someone with this history was placed in a low-security setting with nothing more than a strap of plastic around her ankle standing between the public and another potential tragedy. This isn't fear-mongering. It's a real look at what happens when the legal system bends over backward to “treat” a violent offender while forgetting that protection of the public is supposed to come first. It's also a look at why the more extreme the delusions behind a violent act, the faster the system seems to nudge toward reintegration — instead of building genuine safeguards. Morgan Geyser is back in custody. But this is a wake-up call for Wisconsin, and honestly, for the entire country. When someone who committed one of the most disturbing attacks of the last decade can just walk out of supervised care and vanish across state lines, the problem isn't the individual — it's the system that allowed it. Join us as we break down what went wrong, how it could've been prevented, and why this case feels far too close to a real-life horror movie. #SlenderManCase #MorganGeyser #TrueCrimeNews #HiddenKillers #Wisconsin #JusticeSystem #CrimeAnalysis #PublicSafety #CrimeStories #TrueCrimeToday Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
A Wisconsin woman who nearly killed a classmate in 2014 had a court appearance today. AP correspondent Jennifer King reports.
If you like what you hear, please subscribe, leave us a review and tell a friend!
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.” See omnystudio.com/listener for privacy information.
23-year-old Morgan Geyser has spent the past decade in a mental facility after stabbing her friend and classmate 19 times at the age of 12. Geyser’s story made international headlines after it was revealed that she and another 6th grader lured and attempted to murder their friend to impress a fictional online character “Slenderman” whom they believed to be real. On Sunday, Geyser was found with a 42-year-old man more than 100 miles away just months after being moved to a group home. Geyser fled the home by cutting off her ankle monitor this weekend, after prosecutors had warned the court earlier this year that she was having “violent conversations” with a man outside the facility.See omnystudio.com/listener for privacy information.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.” See omnystudio.com/listener for privacy information.
23-year-old Morgan Geyser has spent the past decade in a mental facility after stabbing her friend and classmate 19 times at the age of 12. Geyser’s story made international headlines after it was revealed that she and another 6th grader lured and attempted to murder their friend to impress a fictional online character “Slenderman” whom they believed to be real. On Sunday, Geyser was found with a 42-year-old man more than 100 miles away just months after being moved to a group home. Geyser fled the home by cutting off her ankle monitor this weekend, after prosecutors had warned the court earlier this year that she was having “violent conversations” with a man outside the facility.See omnystudio.com/listener for privacy information.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.” See omnystudio.com/listener for privacy information.
23-year-old Morgan Geyser has spent the past decade in a mental facility after stabbing her friend and classmate 19 times at the age of 12. Geyser’s story made international headlines after it was revealed that she and another 6th grader lured and attempted to murder their friend to impress a fictional online character “Slenderman” whom they believed to be real. On Sunday, Geyser was found with a 42-year-old man more than 100 miles away just months after being moved to a group home. Geyser fled the home by cutting off her ankle monitor this weekend, after prosecutors had warned the court earlier this year that she was having “violent conversations” with a man outside the facility.See omnystudio.com/listener for privacy information.
23-year-old Morgan Geyser has spent the past decade in a mental facility after stabbing her friend and classmate 19 times at the age of 12. Geyser’s story made international headlines after it was revealed that she and another 6th grader lured and attempted to murder their friend to impress a fictional online character “Slenderman” whom they believed to be real. On Sunday, Geyser was found with a 42-year-old man more than 100 miles away just months after being moved to a group home. Geyser fled the home by cutting off her ankle monitor this weekend, after prosecutors had warned the court earlier this year that she was having “violent conversations” with a man outside the facility.See omnystudio.com/listener for privacy information.
Robach and Holmes cover the latest news headlines and entertainment updates and give perspective on current events in their daily “Morning Run.” See omnystudio.com/listener for privacy information.
Alex Berninger, Senior Manager of Intelligence at Red Canary, and Mike Wylie, Director, Threat Hunting at Zscaler, join to discuss four phishing lures in campaigns dropping RMM tools. Red Canary and Zscaler uncovered phishing campaigns delivering legitimate remote monitoring and management (RMM) tools—like ITarian, PDQ, SimpleHelp, and Atera—to gain stealthy access to victim systems. Attackers used four main lures (fake browser updates, meeting invites, party invitations, and fake government forms) and often deployed multiple RMM tools in quick succession to establish persistent access and deliver additional malware. The report highlights detection opportunities, provides indicators of compromise, and stresses the importance of monitoring authorized RMM usage, scrutinizing trusted services like Cloudflare R2, and enforcing strict network and endpoint controls. The research can be found here: You're invited: Four phishing lures in campaigns dropping RMM tools Learn more about your ad choices. Visit megaphone.fm/adchoices
Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy. In this segment, we'll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker. Segment Resources: Pro-Russian Hackers Use Linux VMs to Hide in Windows Russian Hackers Abuse Hyper-V to Hide Malware in Linux VMs Qilin ransomware abuses WSL to run Linux encryptors in Windows This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Segment 2: Topic - Threat Modeling Humanoid Robots We're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance... Resources https://www.unitree.com/H2 (watch the video!) China's humanoid robots get factory jobs as UBTech's model scores US$112 million in orders The big reveal: Xpeng founder unzips humanoid robot to prove it's not human Exploit Allows for Takeover of Fleets of Unitree Robots - Security researchers find a wormable vulnerability 100-page Paper: The Cybersecurity of a Humanoid Robot 5-page Paper: Cybersecurity AI: Humanoid Robots as Attack Vectors Amazingly, $300 smart vacuums have some of the same exact vulnerabilities and backdoors built into them as the $16,000 humanoid robots! The Day My Smart Vacuum Turned Against Me Segment 3: Weekly News Finally, in the enterprise security news, A $435M venture round A $75M seed round a few acquisitions the producer of the movie Half Baked bought a spyware company AI isn't going well, or is it? maybe we just need to adopt it more slowly and deliberately? ad-blockers are enterprise best practices firewalls and VPNs are security risks, according to insurance claims could you power an entire house with disposable vapes? All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-433
We mix things up with Hot to Go on the move, Brittany and her chairs. Time for a black list for concert goers/celebrity events and The Hailey Smoothie is dead. Plus Paul Folger joins the show. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.