Podcasts about Attackers

  • 1,361PODCASTS
  • 2,428EPISODES
  • 38mAVG DURATION
  • 1DAILY NEW EPISODE
  • Jul 28, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Attackers

Show all podcasts related to attackers

Latest podcast episodes about Attackers

Mo News
Walmart Attacker Faces Terror Charge; Israel Opens Up Gaza Aid; US-EU Tariff Deal; Democrats Hit Polling Low; Astronomer Hires Gwyneth Paltrow Amid KissCam Scandal

Mo News

Play Episode Listen Later Jul 28, 2025 39:33


Headlines:  – Welcome to Mo News (02:00) – National Chocolate Day: Chocolate Price Going Up (02:30) – Michigan Walmart Mass Stabbing Suspect Faces Terrorism Charge (06:40) – Israel Announces Daily Military Pause In Gaza Amid International Pressure, Aid Airdrops Resume (10:00) – U.S. And E.U. Reach Tariff Agreement As Friday Deadline Looms (18:20) – Thailand, Cambodia Set For Ceasefire Talks After Trump's Push (23:00) – Democrats Polling Their Worst With Voters In Decades (24:50) – U.S. Birth Rate Hits All-Time Low (27:30) – Gwyneth Paltrow Hired By Astronomer As Temp Spokesperson After Coldplay KissCam Scandal (33:30) – On This Day In History (35:50) Thanks To Our Sponsors:  – ⁠LMNT⁠ - Free Sample Pack with any LMNT drink mix purchase –⁠ Industrious⁠ - Coworking office. 30% off day pass –⁠ Athletic Greens⁠ – AG1 Powder + 1 year of free Vitamin D & 5 free travel packs – ⁠Incogni⁠ - 60% off an annual plan| Promo Code: MONEWS

WSKY The Bob Rose Show
A good Marine with a gun stopping an attacker with a knife is today's “Smoking Gun”

WSKY The Bob Rose Show

Play Episode Listen Later Jul 28, 2025 1:02


The show-ending “Smoking Gun” segment on the Monday Bob Rose Show 7-28-25

Kan English
A look into the minds of the cyber attackers

Kan English

Play Episode Listen Later Jul 24, 2025 7:58


Israel, long a prime target for cyber attacks, has seen a dramatic increase since the war with Iran last month. The cyber attackers are not just hitting institutional sights, but also going after civilians with sophisticated phishing campaigns, mostly to steal money. Reporter Arieh O’Sullivan spoke with Ori Segal, a co-founder and CEO of Cyvore, an Israeli cybersecurity firm, about the minds of the attackers and cautionary measures everyone should take. (photo: shuttersock) See omnystudio.com/listener for privacy information.

Telecom Reseller
NETSCOUT Enhances Adaptive Threat Response for Telcos, Podcast

Telecom Reseller

Play Episode Listen Later Jul 24, 2025


“Detection is not the end—it's just the beginning.” — Jerry Mancini, NETSCOUT In this episode of Technology Reseller News, Publisher Doug Green speaks with Jerry Mancini of NETSCOUT about the company's latest advancements in automated threat detection and response—with a particular focus on why telecommunications networks are uniquely vulnerable and high-value targets. NETSCOUT, long known for its deep packet inspection and network performance management, is expanding the capabilities of its adaptive threat analytics—a platform designed not only to detect threats but also to assemble and contextualize them using network-level intelligence. Beyond Detection: Seeing the Full Picture While most cybersecurity tools focus on isolated detections—EDR, firewall logs, and suspicious indicators—NETSCOUT's approach centers on reconstructing the complete threat narrative across the enterprise. By capturing packet data continuously and using workflows to connect disparate detections, NETSCOUT enables investigators to: Understand the root cause and lateral movement Detect activity before and after a flagged incident Integrate signals from multiple sources (EDR, NDR, WAF, and more) Investigate threats in real time and retrospectively Why Telcos Are at Greater Risk Mancini highlights the unique role of telco infrastructure in global data movement, making them prime targets for cyber espionage and traffic manipulation. Attackers, such as the Salt Typhoon group, have used compromised routers and peering points to reroute and eavesdrop on massive data flows—impacting not just carriers but their customers across the internet. Best Practices for Threat Hunters NETSCOUT supports both bottom-up investigations (starting with a detected incident) and top-down threat hunts (searching for indicators tied to known campaigns). The platform's ability to store and search packet-level data gives teams visibility that goes far beyond typical log-based detection tools. Mancini's key advice: “You need more than alerts—you need the data to trace back, understand what happened, and act before it's too late.” Where to Learn More Visit netscout.com to explore solutions in: Network Performance Management DDoS Detection & Mitigation Adaptive Threat Analytics NETSCOUT supports both enterprise and service provider environments and is available to assist with immediate and long-term threat management strategies.

IT Privacy and Security Weekly update.
EP 252.5 Deep Dive. The IT Privacy and Security Weekly Update for the Week Ending July 22nd., 2025 and no Trucks

IT Privacy and Security Weekly update.

Play Episode Listen Later Jul 24, 2025 13:19


A single compromised password led to the collapse of 158-year-old UK logistics firm KNP, after hackers—suspected to be the Akira gang—used it to gain access, encrypt systems, and demand a £5 million ransom. Unable to pay, the company lost all its data and folded, putting 700 employees out of work. The breach underscores how weak access controls can have catastrophic consequences.To counter massive botnets, Google is now combining technical defenses with legal action. Its lawsuit against the “BadBox 2.0” operators marks a major shift: targeting criminals behind malware that infected over 10 million Android devices. Google's strategy includes leveraging the CFAA and RICO Act to not just stop malware but dismantle the entire criminal infrastructure—signaling a more aggressive, litigation-driven cybersecurity era.Meanwhile, a new malware delivery method is exploiting DNS—a common but often under-monitored network function. Attackers hide malware in DNS TXT records, break it into chunks, and reassemble it on target systems using standard DNS queries. Since DNS traffic is rarely scrutinized, this technique bypasses traditional defenses, making DNS monitoring essential for comprehensive protection.Travelers to China face serious privacy risks. Authorities are using malware like “Massistant” to extract sensitive data from mobile phones during inspections. Developed by Chinese firm Meiya Pico, the software accesses encrypted texts, location history, and even Signal messages upon installation. Though evidence of compromise may remain, the intrusion happens before detection, raising concerns for anyone bringing devices into the country.China has also shifted its cyberattack strategy by outsourcing operations to private firms. These companies now discover and sell zero-day vulnerabilities to government agencies. This model, which evolved from loosely affiliated hacker groups, blurs the line between state and private enterprise, making attribution difficult. As a result, China-linked hackers increasingly infiltrate U.S. critical infrastructure while masking their origins, and exposure alone no longer seems to deter them.In response to national security concerns, Microsoft has removed China-based engineers from U.S. military cloud projects. A ProPublica investigation revealed their prior involvement, prompting a Pentagon ban on such support. Previously, Chinese engineers worked under U.S. supervision, a practice now deemed too risky for defense-related systems.Microsoft's SharePoint is also under siege. Chinese state actors exploited a critical flaw dubbed “ToolShell” to compromise at least 54 organizations, including those in critical infrastructure. The attack allowed for deep system access, extraction of encryption keys, and installation of web shells—despite prior patches. The incident stresses the need for rapid patching and vigilance, even on widely used enterprise platforms.Cyberwarfare is influencing real-world military dynamics. Ukrainian cyber operatives claim to have digitally crippled a major Russian drone manufacturer, deleting 47TB of production data and disabling access systems. Allegedly backed by military intelligence, the attack highlights how digital sabotage can directly disrupt military production and reshape conflict outcomes. Code is now as consequential as conventional weapons on the modern battlefield.

The Medcurity Podcast: Security | Compliance | Technology | Healthcare
Don't Trust the Link—Double Check That Domain | Medcurity Live 098

The Medcurity Podcast: Security | Compliance | Technology | Healthcare

Play Episode Listen Later Jul 23, 2025 8:38


The domain looks right. The logo checks out. Even the login page feels familiar. But it isn't what it seems.Attackers are using subtle domain tricks—like typos, lookalike characters, and spoofed subdomains—to mimic trusted names in healthcare. These aren't high-tech hacks. They rely on speed, habit, and trust.Once you know what to watch for, they're easier to stop. Listen to the latest Medcurity Podcast for real examples and smart ways to stay ahead.Learn more about Medcurity here: https://medcurity.com#Healthcare #Cybersecurity #Compliance #HIPAA #SecurityRiskAnalysis 

The Segment: A Zero Trust Leadership Podcast
Zero Trust, Mapped and Matured with Dr. Chase Cunningham and John Kindervag

The Segment: A Zero Trust Leadership Podcast

Play Episode Listen Later Jul 22, 2025 52:12


In this dynamic episode of The Segment, two of cybersecurity's biggest names reunite with host, Raghu  Nandakumara, for a no-holds-barred conversation: John Kindervag, the godfather of Zero Trust, and Dr. Chase Cunningham, aka Dr. Zero Trust. What unfolds is a fast-paced, insight-packed dialogue that spans decades of hard-earned wisdom, unexpected humor, and a shared mission to demystify modern cyber defense.John and Chase reflect on the global evolution of Zero Trust—from its scrappy beginnings to its widespread adoption by Fortune 500s, military leaders, and even elder care facilities. They dive into why context-driven maps are now indispensable, how graph-based security is reshaping the cyber terrain, and where AI and automation can give defenders a real edge. Expect candid takes on the limits of SIEMs, the failure of red teaming without strategy, and why defenders need to start thinking like attackers if they want to win.There's personal reflection too—Chase shares why he was reluctant to pick up the Zero Trust torch, and John opens up about the real heart behind the strategy. With wit, war stories, and straight talk, they make a clear case: cybersecurity isn't about perfection—it's about deterrence, resilience, and knowing what truly matters. Topics Covered:The origin and global adoption of Zero Trust Why “good maps” are critical for cyber resilience Real-world applications of AI in cyber defense Why attackers often outmaneuver defenders—and how to change that The psychology of leadership in cybersecurity strategy From Chick-fil-A to Bletchley Park: the unexpected places Zero Trust shows up Chase's take on stock-picking based on breach trends (yes, really)  Resources Mentioned:Think Like an Attacker by Dr. Chase Cunningham John Kindervag's Zero Trust 5-Step Model “Zero Trust Terrain & Holding the High Ground” LinkedIn Live   Stay Connected with our host, Raghu on LinkedInFor more information about Illumio, check out our website at illumio.com 

The Home Defense Show Podcast
Home Defense Show-Using karate against an armed attacker

The Home Defense Show Podcast

Play Episode Listen Later Jul 20, 2025 79:51


This week on The Home Defense Show Skip and Sara discuss why Sara's throwing all his stuff away. Then we talk with Gil Maza about violence against ICE agents and we wrap up with Steve Sulze on the advisability of using karate against an armed attacker.

Talos Takes
Why Attackers Love Your Remote Access Tools

Talos Takes

Play Episode Listen Later Jul 17, 2025 14:22


Attackers are increasingly abusing the same remote access tools that IT teams rely on every day. In this episode, Hazel sits down with Talos security researcher Pierre Cadieux to unpack why these legitimate tools have become such an effective tactic for adversaries.Pierre explains how the flexibility, legitimacy, and built-in capabilities of remote access management tools make them ideal for attackers who want to stay under the radar. They discuss trends Talos Incident Response is seeing in the field, examples of commonly abused tools, and the challenges defenders face when trying to detect misuse.You'll also hear practical advice on what defenders and IT teams can do today to better secure their environments — and what the rise of remote access management tool abuse tells us about attacker behavior and the current state of cybercrime.Resources mentioned:Talos Incident Response Quarterly Trends ReportWhen Legitimate Tools Go Rogue (Talos Blog)

Houston's Morning News w/ Shara & Jim
A Twelfth ICE Attacker Arrested Outside of Dallas

Houston's Morning News w/ Shara & Jim

Play Episode Listen Later Jul 16, 2025 112:29 Transcription Available


Jimmy Barrett takes you through the stories that matter the most on the morning of 07/16/25.

TV4Nyheterna Radio
"Storskaliga attacker mot ukrainska städer"

TV4Nyheterna Radio

Play Episode Listen Later Jul 16, 2025 1:23


Nyheterna Radio 08:00

attackers storskaliga
Cats at Night with John Catsimatidis
Tom Homan - Zero Tolerance for Violent Attackers of ICE Agents | 07-11-25

Cats at Night with John Catsimatidis

Play Episode Listen Later Jul 12, 2025 8:19


Learn more about your ad choices. Visit megaphone.fm/adchoices

The Bob Frantz Authority Podcast
7-10-25 | EXCLUSIVE: Rep. Max Miller Responds to Indictment of Attacker

The Bob Frantz Authority Podcast

Play Episode Listen Later Jul 10, 2025 23:40


Congressman Max Miller joins Bob to talk about charges being filed against the man accused of an antisemitic attack that took place in Ricky River on June 19. Rep. Miller discusses the danger he was placed in, and that of his family if his child had been in the car, as well as the political violence committed in the name of antisemitism and anti-Zionism in general. The Westlake doctor who tried to run him off the road and threatened to kill him has been charged with 2 felonies and several misdemeanors.See omnystudio.com/listener for privacy information.

Irish Tech News Audio Articles
Building Ireland's cyber resilience

Irish Tech News Audio Articles

Play Episode Listen Later Jul 10, 2025 8:59


Senator Craughwell leads the charge to a secure digital future Ireland's digital progress has been extraordinary. From online banking and healthcare systems to remote learning and connected infrastructure, the nation has embraced digitalisation across every sector. However, this transformation has come at a cost. As our digital footprint expands, so too does our exposure to cyber threats. Cybersecurity is no longer just a technical issue. It is a public concern and a national responsibility. We often picture cyberattacks as distant or unlikely events, something that happens to big tech companies or foreign governments. Attacks in recent years have shown that Ireland is not immune. Irish institutions - such as the HSE in 2021 - have faced serious disruptions, but so too have countless smaller businesses. Many incidents never make headlines but the reality is that companies' systems, data, personal privacy, financial assets, and systems managed by IT and OT (operational technology) are under continuous threat. What makes these attacks so dangerous is not just their sophistication. It's how easily they succeed. In most cases, breaches begin with one thing: human error. It can be as simple as an employee opening a fraudulent email, a manager misunderstanding a digital risk, or a staff member who is unaware that their actions have consequences far beyond their screen. Awareness is the missing link Awareness is the critical missing link in our national defence. Most successful cyberattacks don't rely on elite hacking tools; they rely on people not being prepared. Attackers exploit gaps in understanding - gaps that exist in homes, schools, businesses and public services. Awareness needs to be treated as a core component of Ireland's cybersecurity response. Without it, no software or firewall can offer enough protection. Ireland's small and medium-sized enterprises (SMEs) are particularly vulnerable. They make up most of the country's enterprises and employ the majority of our workforce. Yet, many of these organisations do not have dedicated cybersecurity teams or robust training in place. The same applies to charities, community organisations, and voluntary services - sectors that handle sensitive data and are crucial to local life but often lack the resources or know-how to defend against threats. The risk is real. The consequences are national. Partnered with CJHNetwork, Data Edge have participated in conducting cyber reviews across Ireland. We found that a number of SMEs within critical supply chains have already been targeted by cyberattacks. These organisations support navigation, satellite communication, and other essential infrastructure which are of strategic importance. This highlights the growing vulnerabilities in sectors vital to public safety and national services. Building national cyber resilience Cyber risk is not theoretical. It is here, it is growing, and it is reaching into the heart of our critical infrastructure. So, what must Ireland do? How do we build resilience before the next wave of attacks hits us harder? We need a coordinated national effort - one that combines public awareness, skilled training, and long-term investment. It should also ensure consistent funding and empower policy makers to deliver widespread public engagement. This includes strengthening support for SMEs and community organisations, expanding cybersecurity training and awareness across all levels of society, and building a skilled and diverse workforce through education, outreach, and accelerated recruitment. Ireland must also invest in the infrastructure, tools, and partnerships that will enable long-term resilience and readiness. Our active involvement as part of a national cybersecurity consortium includes participation in discussions at Leinster House and ongoing collaboration with policymakers, and we recognise that collective insights and local experience are key to shaping Ireland's cybersecurity landscape. Currently, a positio...

The Howie Carr Radio Network
Comey and Brennan Under Investigation Plus ICE Attackers Charged with Attempted Murder| 7.9.25 - The Grace Curley Show Hour 2

The Howie Carr Radio Network

Play Episode Listen Later Jul 9, 2025 39:10


FBI has launched a criminal investigation of James Comey and John Brennan for their roles in investigating the alleged collusion between Trump and Russia. Visit the Howie Carr Radio Network website to access columns, podcasts, and other exclusive content.

The PinkUn Norwich City Podcast
INSIGHT: Danish attacker Mathias Kvistgaarden signs for Norwich City from Brøndby IF | The Pink Un

The PinkUn Norwich City Podcast

Play Episode Listen Later Jul 8, 2025 21:49


Connor Southwell (@cjsouthwell1902) is joined by Brøndby IF fan and writer Toke Theilade (@TokeTheilade) to discuss Norwich City's seventh first-team summer signing. *** With thanks to our podcast sponsor - First Bus. ** Picture: Norwich City FC *** You can also hear the Pink Un Podcast on Norwich's Community radio station, Future Radio 107.8FM. *** To get in touch with the podcast now and in future, send any comments and questions into the crew with an email to norfolksport@archant.co.uk or get in touch with us @pinkun on Twitter, where our direct messages are open. And if you're interested in sponsoring the pod, or placing an advert in one of our shows, email connor.southwell@newsquest.co.uk ALSO FIND US AT THE FOLLOWING: Subscribe: pinkun.com/podcast Twitter: twitter.com/pinkun Facebook: fb.me/thepinkun Instagram: instagram.com/the_pinkun Find more details on how you can sign up to Pink Un+ here: https://www.pinkun.com/pinkunplus/ #ncfc #norwichcity #norwich

Red White and The Blues: A Chelsea FC Podcast
25/26 CFC Attackers - Keep, Sell, Loan

Red White and The Blues: A Chelsea FC Podcast

Play Episode Listen Later Jul 8, 2025 35:28


Dan and Jay discuss who they would like to see in Chelsea's attack next season!

The Chronicles of a Gooner | The Arsenal Podcast
Eze contact made! Decision time on a striker & Arsenal want THREE attackers

The Chronicles of a Gooner | The Arsenal Podcast

Play Episode Listen Later Jul 1, 2025 56:14


On this episode of the podcast, Harry Symeou discusses all the latest arsenal news. We talk Eberechi Eze after it was confirmed by both David Ornstein and Fabrizio Romano that Arsenal have made contact with the player's representatives. It's the 1st July and so we'll discuss the need for the Gunners to make a decision on the striker front and accelerate the process of signing either Benjamin Sesko or Viktor Gyökeres (the 2 most likely at the time of recording). Plus, we'll talk wanting THREE attackers and the challenge Andrea Berta faces this summer, his first as the Gunners' sporting director. All that and loads more! Viktor Gyökeres Scouting Video: https://www.patreon.com/posts/scouting-session-131522551?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_link Benjamin Sesko Scouting Video: https://www.patreon.com/posts/scouting-session-130983051?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_link Martin Zubimendi Scouting Video: https://www.patreon.com/posts/scouting-session-132096321?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_link Christian Norgaard Scouting Video: https://www.patreon.com/posts/scouting-session-132712509?utm_medium=clipboard_copy&utm_source=copyLink&utm_campaign=postshare_creator&utm_content=join_link Support the podcast & access benefits by joining our Patreon page: https://patreon.com/thechroniclesofagooner?utm_medium=unknown&utm_source=join_link&utm_campaign=creatorshare_creator&utm_content=copyLink Learn more about your ad choices. Visit podcastchoices.com/adchoices

To The Point - Cybersecurity
Cyber Attackers and The Powerful Allure of School Systems with Julia Fallon (Rerun)

To The Point - Cybersecurity

Play Episode Listen Later Jul 1, 2025 53:28


This week we're joined by Julia Fallon, Executive Director of the State Educational Technology Directors Association (SETDA) and she shines a light on the appeal of school systems to cyber attackers. (HINT: it is access to PII to open credit cards, mortgages and more in the name of children that often is only detected many years later.) We also discuss the connection between schools and insurance companies, trends in how school systems are fortifying their security measures, the evolution of infosec to become a front office issue, and what schools can do to integrate cybersecurity into curriculums to both bolster security and lay a pathway for future cyber professionals.   Julia Fallon is the Executive Director of the State Educational Technology Directors Association (SETDA), where she works with U.S. state and territorial digital learning leaders to empower the education community to leverage technology for learning, teaching, and school operations. Involved with learning technologies since 1989, her professional interest lies in making the case for public school systems wherein educators are able to optimize technology-rich learning environments to equitably engage the learners who fill their classrooms. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e339

Ekot
Ekot 17:45 Omfattande ryska attacker mot Ukraina

Ekot

Play Episode Listen Later Jun 29, 2025 15:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

Ekot
Ekot 17:45 Över 60 döda i Gaza senaste dygnet  efter israelisk attacker

Ekot

Play Episode Listen Later Jun 28, 2025 15:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

Crime Alert with Nancy Grace
Woman w Jaw Missing Names Attacker Before Death; Manhunt Ends in Tree Standoff| Crime Alert 8PM 06.26.2025

Crime Alert with Nancy Grace

Play Episode Listen Later Jun 27, 2025 5:41 Transcription Available


An ex obliterates a mom's jaw in a deadly attack; triggering a wild manhunt that culminates in bizarre, hours-long showdown with cops...while perched in a tree. A Louisiana mom is accused of injecting his mom with meth before beating her to death & discarding her in the trash. Plus, a domestic violence situation that really stinks. Jennifer Gould reports. See omnystudio.com/listener for privacy information.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, June 24th, 2025: Telnet/SSH Scan Evolution; Fake Sonicwall Software; File-Fix vs Click-Fix

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jun 25, 2025 4:03


Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each scans than they used to, but the average length of passwords did not change. https://isc.sans.edu/diary/Quick%20Password%20Brute%20Forcing%20Evolution%20Statistics/32068 Introducing FileFix A New Alternative to ClickFix Attacks Attackers may trick the user into copy/pasting strings into file explorer, which will execute commands similar to the ClickFix attack that tricks users into copy pasting the command into the start menu s cmd feature. https://www.mobile-hacker.com/2025/06/24/introducing-filefix-a-new-alternative-to-clickfix-attacks/ Threat Actors Modify and Re-Create Commercial Software to Steal User s Information A fake Sonicwall Netextender clone will steal user s credentials https://www.sonicwall.com/blog/threat-actors-modify-and-re-create-commercial-software-to-steal-users-information

The Cybersecurity Defenders Podcast
#224 - Intel Chat: Otter cookie, Flodrix, Water Curse & Scattered Spider

The Cybersecurity Defenders Podcast

Play Episode Listen Later Jun 24, 2025 31:45


In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.A new malware strain known as OtterCookie, developed by the North Korean APT group Lazarus, has been dissected in a detailed technical analysis by offensive security expert Mauro Eldritch. Attackers are currently exploiting a critical vulnerability in the Langflow platform — an open-source Python-based web app used to build AI workflows and agents — to deliver a new botnet called Flodrix.A new campaign from an emerging threat group named Water Curse is targeting the software supply chain by leveraging GitHub repositories that masquerade as legitimate security tools. The threat actor known as Scattered Spider, also tracked as UNC3944 by Google and Mandiant, has apparently shifted its operational focus from the retail sector to the US insurance industry, according to a new alert from Google's Threat Intelligence Group.

Ekot
Ekot 16:45 Nya israeliska attacker mot iranska atomenergianläggningar

Ekot

Play Episode Listen Later Jun 23, 2025 15:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

Ekot
Ekot 12:30 Israel i nya, kraftfulla attacker mot Iran

Ekot

Play Episode Listen Later Jun 23, 2025 25:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

Morgonpasset i P3
Brannes midsommarfail, gränslösa influencers och USA:s attacker mot Iran

Morgonpasset i P3

Play Episode Listen Later Jun 22, 2025 81:01


Brayan gör debut, irländska julaftnar och Will Smith är på't igen. Lyssna på alla avsnitt i Sveriges Radio Play. Hela veckans Morgonpasset i P3 hör du i Sveriges Radio Play.Branne Pavlovic och Ayan Jamal gör sitt första pass tillsammans. Vad kan gå fel på midsommar? Mycket. Kassa DJ:s och Branne skäms över Will Smith. SR:s utrikeskorre Roger Wilson rapporterar om USA:s attacker mot Iran och P3 Nyheters Philip Carlsson reder i omvärldens reaktioner på USA:s involvering i Israel och Iran-konflikten. Med oss i studion har vi SvD:s journalist Sophia Sinclair som pratar om influencers upptrissade jakt på framgång och den nya poddserien Badfluence. Brayan-duon tippar NBA-avgörandet och Branne langar veckans efterlängtade streamingtips: De sju samurajerna.Tidpunkter i avsnittet:13:20 Roger Wilson.42:08 Nyhetsfördjupning: Omvärldens reaktioner på USA:s attacker mot Iran.56:00 Sophia Sinclair.1:16:57 Bragge recenserar.Kapitellänkarna ovan leder till avsnittet utan musik i Sveriges Radio Play.Programledare: Branne Pavlovic och Ayan Jamal.

The John Hallett Podcast
Situational Awareness Zones | The John Hallett Podcast #87

The John Hallett Podcast

Play Episode Listen Later Jun 21, 2025 19:50


The John Hallett Podcast | Episode #87Welcome back to another episode of The John Hallett Podcast! In Episode 87, we break down one of the most vital concepts in self-defense: Situational Awareness Zones.Whether you're a seasoned martial artist or someone just starting their journey, understanding your environment can mean the difference between avoiding danger and walking straight into it. This episode is all about training your awareness like a skill—because it is one.

Ekot
Ekot 17:45 Tysklands förbundskansler hyllar Israels attacker i Iran

Ekot

Play Episode Listen Later Jun 18, 2025 20:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

Ekot
Ekot 06:00 Nya intensiva attacker mellan Israel och Iran inatt

Ekot

Play Episode Listen Later Jun 18, 2025 15:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

Ekot
Ekot 08:00 Minst 14 döda i attacker mot Kiev

Ekot

Play Episode Listen Later Jun 17, 2025 15:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

The CyberWire
Darknet drug marketplace closed for business.

The CyberWire

Play Episode Listen Later Jun 16, 2025 37:24


International law enforcement takes down a darknet drug marketplace. The Washington Post is investigating a cyberattack targeting several journalists' email accounts. Anubis ransomware adds destructive capabilities. The GrayAlpha threat group uses fake browser update pages to deliver advanced malware. Researchers uncover a stealthy malware campaign that hides a malicious payload in a JPEG image. Tenable patches three high-severity vulnerabilities in Nessus Agent. Attackers can disable Secure Boot on many Windows devices by exploiting a firmware flaw. Lawmakers introduce a bipartisan bill to strengthen coordination between CISA and HHS. Harry Coker reflects on his tenure as National Cyber Director. Maria Varmazis checks in with Brandon Karpf on agentic AI. When online chatbots overshare, it's no laughing Meta.  CyberWire Guest Joining us today to discuss Agentic AI and it relates to cybersecurity and space with T-Minus Space Daily host Maria Varmazis is Brandon Karpf, friend of the show, founder of T-Minus Space Daily, and cybersecurity expert. Selected Reading Police seizes Archetyp Market drug marketplace, arrests admin (Bleeping Computer) Washington Post investigating cyberattack on journalists' email accounts, source says (Reuters) Anubis Ransomware Packs a Wiper to Permanently Delete Files (SecurityWeek) GrayAlpha Hacker Group Weaponizes Browser Updates to Deploy PowerNet Loader and NetSupport RAT (Cyber Security News) Malicious Payload Uncovered in JPEG Image Using Steganography and Base64 Obfuscation (Cyber Security News) Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus (Infosecurity Magazine) Microsoft-Signed Firmware Module Bypasses Secure Boot (Gov Infosecurity) Bipartisan bill aims to create CISA-HHS liaison for hospital cyberattacks (The Record) Coker: We can't have economic prosperity or national security without cybersecurity (The Record) The Meta AI app is a privacy disaster (TechCrunch) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

T-Minus Space Daily
Big news on the Hill for Space Force.

T-Minus Space Daily

Play Episode Listen Later Jun 10, 2025 24:22


Big budget news for the Space Force from Capitol Hill. Quantum Space secured an additional $40 million to accelerate Ranger spacecraft. Attackers are increasingly targeting space assets with advanced malware. And, more. Remember to leave us a 5-star rating and review in your favorite podcast app. Be sure to follow T-Minus on LinkedIn and Instagram. T-Minus Guest Our guest today is Celia Pelaz, COO at Spire Global. You can connect with Celia on LinkedIn, and learn more about Spire Global on their website. Selected Reading House appropriators unveil defense bill, boost Space Force funding (SpaceNews) Quantum Space raises $40 million (SpaceNews) Space ISAC articles - Constellations (Kratos) Axiom Mission 4 (Axiom) NASA raises the odds that an asteroid could hit the moon in 2032 (Space)  Shenzhou-20 crew completes over 10 experiments, tests in past week (CGTN) CEO of space company Axiom breaks down what a $70 million ticket gets you (Business Insider) Space stocks soar as Elon Musk and Donald Trump argue (The Street) T-Minus Crew Survey Complete our ⁠annual audience survey⁠ before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our ⁠media kit⁠. Contact us at ⁠space@n2k.com⁠ to request more info. Want to join us for an interview? Please send your pitch to ⁠space-editor@n2k.com⁠ and include your name, affiliation, and topic proposal. T-Minus is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The CyberWire
White House reboots cybersecurity priorities.

The CyberWire

Play Episode Listen Later Jun 9, 2025 36:12


A new White House executive Order overhauls U.S. cybersecurity policy. The EU updates its “cybersecurity blueprint”. The Pentagon's inspector general  investigates Defense Secretary Hegseth's Signal messages. Chinese hackers target U.S. smartphones. A new Mirai botnet variant drops malware on vulnerable DVRs. 17 popular Gluestack packages on NPM have been compromised. Attackers exploit vulnerabilities in Fortigate security appliances to deploy Qilin ransomware. A Nigerian man gets five years in prison for a hacking and fraud scheme. Our guest is Tim Starks from CyberScoop, discussing Sean Cairncross' journey toward confirmation as the next National Cyber Director. Fire Stick flicks spark a full-on legal blitz. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Tim Starks from CyberScoop, to discuss Sean Cairncross, who's bringing a focus on policy coordination if confirmed as the next National Cyber Director. Selected Reading Trump Administration Revises Cybersecurity Rules, Replaces Biden Order (Infosecurity Magazine) Europe arms itself against cyber catastrophe (Politico) Pentagon watchdog investigates if staffers were asked to delete Hegseth's Signal messages (Associated Press) Chinese hackers and user lapses turn smartphones into a 'mobile security crisis' (Associated Press) iMessage Zero-Click Attacks Suspected in Targeting of High-Value EU, US Individuals (SecurityWeek) New Mirai botnet infect TBK DVR devices via command injection flaw (Bleeping Computer) Malware found in NPM packages with 1 million weekly downloads (Bleeping Computer) Hackers Actively Exploiting Fortigate Vulnerabilities to Deploy Qilin Ransomware (Cyber Security News) Nigerian Involved in Hacking US Tax Preparation Firms Sentenced to Prison (SecurityWeek) Hacked Fire Sticks now come with more than just malware – a possible jail sentence (Cybernews) Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Gooner Talk
The Arsenal Transfer Show EP581 - Kepa Arrizabalaga, Benjamin Sesko, 3 Attackers Wanted!

The Gooner Talk

Play Episode Listen Later Jun 8, 2025 59:32


The Arsenal Transfer Show EP581 - Kepa Arrizabalaga, Benjamin Sesko, 3 Attackers Wanted!Join our Fantasy League: https://fantasy.premierleague.com/leagues/auto-join/kn7vdpTom presents a daily show on The Gooner Talk covering all the latest Arsenal news, Arsenal transfer news, match reaction, press conferences and much more plus a Q&A session taking questions from the LIVE chat. Get all your Arsenal news now and every day. Links to Fantasy code, Twitter, Instagram, audio-only platforms and our channel membership scheme including entry to the Discord community: https://linktr.ee/TheGoonerTalk Become a member at https://plus.acast.com/s/the-gooner-talk. Hosted on Acast. See acast.com/privacy for more information.

Squaring the Strange
Episode 255 - Phantom Attackers with Robert Bartholomew

Squaring the Strange

Play Episode Listen Later Jun 7, 2025 100:56


First we cover a few things on our radar: Ben is reminded of an old mail-based scam, Celestia gets excited over a few astronomical news items, and we both lament the MAHA report and its seemingly made-up citations. Then Robert Bartholomew joins us to discuss the new book he wrote with Paul Weatherhead, "Social Panics and Phantom Attackers: A Study of Imaginary Assailants." Have you heard of the Mad Gasser, Spring-Heeled Jack, the Monkey Man, Whipping Tom, or any of the pet eaters, needle spikers, drones or zeppelins menacing innocent people? In the right time and place, these attackers seemed not only plausible but terrifying. Bob goes over patterns in these attacker phenomenons, as well as the social function they serve -- often a cautionary tale grounded in current moral context, with a dash of xenophobia and fear of technology thrown in. These attackers, while complete fiction, nevertheless had victims: not just those who believed a scratch or bruise was surely from the evildoer, but those who were mistakenly arrested or beaten by vigilante mobs. The societal cost can also be measured in thousands of extra police hours as well as heightened anxiety and stress.

93:20
THE 93:20 REVIEW:- ATTACKERS (& PEP) (EXCERPT)

93:20

Play Episode Listen Later Jun 6, 2025 15:42


Howard, Chris and George evaluate the season of the attacking players at City, and Pep too. Another fascinating chat. *This is the first 15 minutes of the show. For the full episode, and all our other content on the 93:20 player, you can join below - for less than the price of a pint of beer each month.* ninetythreetwenty.com/9320-player/about-9320-player/ SIGN UP FOR OUR NEWSLETTER! A FREE WEEKLY UPDATE WITH NEW CONTENT GUARANTEED AND A WHOLE LOT MORE. CLICK THE LINK BELOW AND ENTER YOUR EMAIL IN THE BOX. ninetythreetwenty.com/the-9320-newsletter/

Bill O’Reilly’s No Spin News and Analysis
Bill O'Reilly: Progressives Won't Punish Police Attackers

Bill O’Reilly’s No Spin News and Analysis

Play Episode Listen Later Jun 4, 2025 5:15


Bill O'Reilly talks about new crime stats for New York City. Learn more about your ad choices. Visit megaphone.fm/adchoices

Breaking Badness
Beyond the Perimeter: How Attackers Use Domains, Phishing & AI and How to Fight Back

Breaking Badness

Play Episode Listen Later Jun 4, 2025 68:24


Welcome to a special RSAC 2025 episode of the Breaking Badness Cybersecurity Podcast! Today, we delve into the critical role of domains in modern cyber attacks. From sophisticated nation-state operations to AI-powered phishing kits and malicious browser extensions, domains are the foundational infrastructure for threat actors. Host Kali Fencl is joined by four leading cybersecurity experts Joe Slowik, Robert Duncan, John Fokker and Vivek Ramachandran to break down how domains are weaponized and what organizations can do to defend themselves on this ever-evolving frontline

BJ & Jamie
Boulder Attacker Charged | Facebook Marketplace Ghost | Tabloid Trash

BJ & Jamie

Play Episode Listen Later Jun 3, 2025 32:50


The man who attacked a group of Jewish people in Boulder over the weekend has been charged. BJ was trying to sell his old BMW on Facebook marketplace. He listed the car for $1000. A woman got in contact with him about the car and then she never showed up. The trial with Justin Baldoni and Blake Lively just had an interesting turn of events.

Mark Simone
Hour 2: Colorado Attacker.

Mark Simone

Play Episode Listen Later Jun 2, 2025 30:53


Mark has details about the latest Ukraine strike on Russia. CNN's Jake Tapper's set an all-time record for low ratings, even though he tried to justify his decision on writing the book about Biden's decline. Mark has a secret on how to lose weight that celebrities do. President Trump was asked about a possible pardon for Diddy and what was Trump's response? Mark Takes Your Calls! Mark Interviews CNBC Contributor Jake Novak. Jake and Mark breakdown the horrible terrorist attack that happened in Colorado over the weekend. The Dems opening the border the last 4 years was a bad recipe for disaster. 6 months later and there isn't really a major player for the Democrats to take Center Stage.

Mark Simone
FULL SHOW: Colorado Attacker, Ukraine Strike, Biden's Better.

Mark Simone

Play Episode Listen Later Jun 2, 2025 66:56


Democrats need a plan to take down the Anti Semitism in the USA. Former President Biden made an appearance over the weekend at Delaware's Memorial Day Event. Joe Biden said he is feeling good after the treatments of his cancer. Mark Interviews NY Post Columnist Michael Goodwin. Michael believes that someone in the Biden Administration knew he had cancer the whole time. Jake Tapper Continues to get heat over his book. Tim Walz is most likely going to be disqualified from any kind of political victory in the future. Mark has details about the latest Ukraine strike on Russia. CNN's Jake Tapper's set an all-time record for low ratings, even though he tried to justify his decision on writing the book about Biden's decline. Mark has a secret on how to lose weight that celebrities do. President Trump was asked about a possible pardon for Diddy and what was Trump's response? Mark Interviews CNBC Contributor Jake Novak. Jake and Mark breakdown the horrible terrorist attack that happened in Colorado over the weekend. The Dems opening the border the last 4 years was a bad recipe for disaster. 6 months later and there isn't really a major player for the Democrats to take Center Stage.

Mark Simone
Hour 2: Colorado Attacker.

Mark Simone

Play Episode Listen Later Jun 2, 2025 32:32


Mark has details about the latest Ukraine strike on Russia. CNN's Jake Tapper's set an all-time record for low ratings, even though he tried to justify his decision on writing the book about Biden's decline. Mark has a secret on how to lose weight that celebrities do. President Trump was asked about a possible pardon for Diddy and what was Trump's response? Mark Takes Your Calls! Mark Interviews CNBC Contributor Jake Novak. Jake and Mark breakdown the horrible terrorist attack that happened in Colorado over the weekend. The Dems opening the border the last 4 years was a bad recipe for disaster. 6 months later and there isn't really a major player for the Democrats to take Center Stage. See omnystudio.com/listener for privacy information.

Mark Simone
FULL SHOW: Colorado Attacker, Ukraine Strike, Biden's Better.

Mark Simone

Play Episode Listen Later Jun 2, 2025 66:54


Democrats need a plan to take down the Anti Semitism in the USA. Former President Biden made an appearance over the weekend at Delaware's Memorial Day Event. Joe Biden said he is feeling good after the treatments of his cancer. Mark Interviews NY Post Columnist Michael Goodwin. Michael believes that someone in the Biden Administration knew he had cancer the whole time. Jake Tapper Continues to get heat over his book. Tim Walz is most likely going to be disqualified from any kind of political victory in the future. Mark has details about the latest Ukraine strike on Russia. CNN's Jake Tapper's set an all-time record for low ratings, even though he tried to justify his decision on writing the book about Biden's decline. Mark has a secret on how to lose weight that celebrities do. President Trump was asked about a possible pardon for Diddy and what was Trump's response? Mark Interviews CNBC Contributor Jake Novak. Jake and Mark breakdown the horrible terrorist attack that happened in Colorado over the weekend. The Dems opening the border the last 4 years was a bad recipe for disaster. 6 months later and there isn't really a major player for the Democrats to take Center Stage. See omnystudio.com/listener for privacy information.

Paul's Security Weekly
Building Cyber Resilience: AI Threats, Mid-Market Risks & Ransomware Trends - Karl Van den Bergh, Tony Anscombe, Eyal Benishti, Nick Carroll, Chad Alessi, Chris Peluso - ESW #409

Paul's Security Weekly

Play Episode Listen Later Jun 2, 2025 98:33


Segment 1 CTG Interview Middle market companies face unique challenges in the ever-evolving cyber environment. Developing a comprehensive cybersecurity approach is a business imperative for middle market companies, and Chad Alessi will discuss the threat landscape, what's keeping IT decision-makers awkward at night, and the best approach to creating a proactive security measure. Cyber Resilience in Action: A Guide for Mid-Market Firms This segment is sponsored by CTG. Visit https://securityweekly.com/ctgrsac to learn more about them! Nightwing Interview Nightwing divested from Raytheon in April 2024 and is entering another year of redefining national security. Amid emerging threats and shifting industry regulations and compliance frameworks, traditional security measures are no longer cutting it. As Cyber Incident Response Manager at Nightwing, Nick Carroll discusses how organizations can continue to build cyber resiliency and stay one step ahead in today's threat landscape. This segment is sponsored by Nightwing. Visit https://securityweekly.com/nightwingrsac to learn more about them! Segment 2 Libraesva Interview Generative AI is having a transformative effect across almost every industry, but arguably the area it has had the most significant impact is cybercrime. Discriminative AI can now learn to recognize what constitutes normal communication patterns, so anything out of the ordinary can be flagged. AI is also enabling human security analysts to automate the triage of reported emails, to rapidly identify false positives and keep up with emerging cybercriminal tactics. Finally, specialized Small Language Models (SLMs) using neural networks are able to analyze and comprehend the semantic intent of the message. This segment is sponsored by Libraesva. Visit https://securityweekly.com/libraesvarsac to learn more about them! IRONSCALES Interview Phishing has evolved—fast. What started as basic email scams has transformed into AI-powered cyber deception. Phishing 1.0: Early phishing relied on spam emails, fake banking alerts, and malware links to trick users into clicking Phishing 2.0: Attackers got smarter—instead of mass emails, they started impersonating real people Phishing 3.0: Now, cybercriminals are using AI to generate fake but highly convincing voices, videos, and images IRONSCALES discusses the current gaps in SEG technology and will showcase industry-first innovations for protection against deepfakes. Assessing Organizational Readiness in the Face of Emerging Cyber Threat Using AI to Enhance Defensive Cybersecurity white paper The Hidden Gaps of SEG Protection white paper This segment is sponsored by IRONSCALES. Visit https://securityweekly.com/ironscalesrsac to learn more about them! Segment 3 Illumio Interview In the post-breach world, speed and clarity are essential for effective cybersecurity. Security teams are inundated with vast amounts of data, much of which is not actionable. To combat cyber threats—and level the playing field—defenders need precise intelligence to identify attacks, dynamically quarantine threats, and prevent cyber disasters, highlighting the power of the security graph. Segment Resources: Rethinking Threat Detection in a Decentralized World Illumio Insights Announcement More information about Illumio Insights This segment is sponsored by Illumio. Visit https://securityweekly.com/illumiorsac for information on Illumio Insights or to sign up for a private preview! ESET Interview The ransomware landscape is rapidly changing. ESET global research team has been closely following ransomware gang disruptions, new players and how the RaaS business model continues to evolve. In this segment, Tony Anscombe will take a look into recent research, hacks and attacks, and explore how the industry and businesses are responding to combat financial risk and mitigate threats. Segment Resources: https://www.welivesecurity.com/en/eset-research/shifting-sands-ransomhub-edrkillshifter/ https://www.welivesecurity.com/en/eset-research/eset-threat-report-h2-2024/ This segment is sponsored by ESET. Visit https://securityweekly.com/esetrsac to learn more about them! Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-409

Awakening
Peter Wilson Shares TRUSTEE Secrets to WINNING in Court

Awakening

Play Episode Listen Later May 23, 2025 88:52


Another call with Peter Wilson discussing how to prepare for Court and self defence in these dangerous times. #commonlaw #natural law #sovereignityAbout my Guest:Ex Royal Navy gunner and armourer, turned professional fighter. Owned and ran own martial arts gym for about 30 years. Always been aware of something not being right in the world, went deep into it after losing over £1million of property in 1 week including own home. So been up and been down even living in a car for a while with his wife Janine and 4 dogs. ---Awakening Podcast Social Media / Coaching My Other Podcasts  ⁠⁠⁠https://roycoughlan.com/⁠⁠ ------------------What we Discussed: 00:45 Where did the Name Checkmate the Matrix come from08:20 Social media Attacks17:00 How to Protect yourself with uprise in Crime 18:50 You are going to be the Bodyguard of You22:00 Weapons to protect you28:10 Attackers do not want to be identified29:40 How do we Create Proper Legal Files33:20 A case against a local council34:20 Acting as a Trustee instead of a McKenzie friend38:30 Council woman claiming she underdtood the law44:00 Council Create their own Rules46:50 The File Needed for Court50:10 3 Copies of the Files needed for Court53:40 Are they allowed to Redact information on the documents 58:45 Getting video recordings after a Data Request1:03:00 Choose your Battles1:06:00 You must always reply to Registed Letter1:09:00 The Companies wait untill the last day to submit a claim1:11:00 AIB Bank did illegal activities1:13:00 The Pigeons must be in small groups and injected1:15:50 Chicken Farm destroyed1:17:00 Wild Cows in the UK1:21:00 Coal Mined in Australia sent to Japan then to UK1:23:00 The Peat in Ireland imported after closing Peat bogs1:23:00 Amazon trees cut for Climate change event1:23:45 The Stupidity of the Climate Change Activists1:26:25 Trying to catch Mc Donalds customers that dump packaging How to Contact Peter:  https://www.claimyourstrawman.com/ https://checkmatethematrix.com/?linkId=lp_513119&sourceId=roy&tenantId=checkmate-the-matrix https://linktr.ee/PeterWilsonReturnToDemocracy  ------------------------------More about the Awakening Podcast:All Episodes can be found at www.awakeningpodcast.org My Facebook Group Mentioned in this Episode https://www.facebook.com/profile.php?id=61572386459383 Awakening Podcast Social Media / Coaching My Other Podcasts  ⁠⁠⁠https://roycoughlan.com/⁠⁠ Our Facebook Group can be found at https://www.facebook.com/royawakening #checkmatethematrix #ucc #peterwilson #trustee

Total Soccer Show: USMNT, EPL, MLS, Champions League and more ...
Dest! Jedi! Wide attackers? Breaking down the USMNT Gold Cup provisional roster | USMNT Weekly

Total Soccer Show: USMNT, EPL, MLS, Champions League and more ...

Play Episode Listen Later May 21, 2025 59:38


We have the latest 60-player provisional roster for the USMNT, and we also have... waaaay too many thoughts about it. Surprise inclusions and omissions, our preferred final rosters and starting elevens, and a deeper look at what the pool itself reveals about the state of the program.WE HAVE A YOUTUBE CHANNEL!⁠⁠⁠⁠⁠⁠We're posting all our episodes here⁠⁠⁠⁠⁠⁠! Smash the like and subscribe etc.!JOIN THE TSS+ PATREON!Check out our Patreon, which houses bonus podcasts, access to our exclusive Discord, blog posts, videos, and much more. Hosted on Acast. See acast.com/privacy for more information.

The John Batchelor Show
Preview Colleague Ambassador Husain Haqqani asks for more information regarding the Kashmir terror attackers who provoked the nuclear talk drama. More later.

The John Batchelor Show

Play Episode Listen Later May 19, 2025 2:09


Preview Colleague Ambassador Husain Haqqani asks for more information regarding the Kashmir terror attackers who provoked the nuclear talk drama. More later. 1965 PAKISTAN-INDIA WAR 

Snacks
Is Debinha running away with NWSL MVP? A look into the current top candidates

Snacks

Play Episode Listen Later May 15, 2025 19:07


On this week's episode, Claire presents her MVP candidate shortlist as the NWSL season dips into the second third of the year. Attackers have been reigning supreme, but which pros and cons could lead to the biggest individual award of 2025?

The Michael Knowles Show
BLM 2.0 - Metcalf's Attacker BLOWS GoFundMe Money On A NEW HOUSE

The Michael Knowles Show

Play Episode Listen Later Apr 16, 2025 45:33


President Trump threatens to obliterate Harvard, the family of the teenager who allegedly murdered Austin Metcalf is using his GoFundMe money to buy a new house, and Katy Perry officially becomes a space cadet.Click here to join the member-exclusive portion of my show: https://bit.ly/4biDlriEp.1716- - -DailyWire+:We're leading the charge again and launching a full-scale push for justice. Go to https://PardonDerek.com right now and sign the petition.Now is the time to join the fight. Watch the hit movies, documentaries, and series reshaping our culture. Go to https://dailywire.com/subscribe today.Live Free & Smell Fancy with The Candle Club: https://thecandleclub.com/michael- - -Today's Sponsors:Balance of Nature - Go to https://balanceofnature.com and use promo code KNOWLES for 35% off your first order PLUS get a free bottle of Fiber and Spice.Birch Gold - Text KNOWLES to 989898 for your free information kit.Done With Debt - Start building the life you deserve! Visit https://donewithdebt.com and talk with one of their strategists. It's FREE!- - -Socials:Follow on Twitter: https://bit.ly/3RwKpq6Follow on Instagram: https://bit.ly/3BqZLXAFollow on Facebook: https://bit.ly/3eEmwygSubscribe on YouTube: https://bit.ly/3L273Ek