Podcasts about Attackers

  • 1,408PODCASTS
  • 2,647EPISODES
  • 38mAVG DURATION
  • 1DAILY NEW EPISODE
  • Nov 19, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Attackers

Show all podcasts related to attackers

Latest podcast episodes about Attackers

TrustedSec Security Podcast
8.6 - C2 for Me + You

TrustedSec Security Podcast

Play Episode Listen Later Nov 19, 2025 18:40


Attackers and threat actors use command and control techniques, also known as C2, to gain access to networks and communicate with compromised devices. On this episode of Security Noise, Geoff and Skyler are joined by Principal Research Analyst Scott Nusbaum to discuss C2 techniques. Listen as they cover how different types of attackers typically use C2, how that differs from what pentesters and red teamers are using, techniques for blending into cloud environments, and the ever-growing role of AI in C2 systems. How can blue teams work to detect C2s before threat actors take control? Learn ways to reduce your risk in this episode! About this podcast: Security Noise, a TrustedSec Podcast hosted by Geoff Walton and Producer/Contributor Skyler Tuter, features our cybersecurity experts in conversation about the infosec topics that interest them the most. Find more cybersecurity resources on our website at https://trustedsec.com/resources.

Paul's Security Weekly
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433

Paul's Security Weekly

Play Episode Listen Later Nov 17, 2025 116:49


Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy. In this segment, we'll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker. Segment Resources: Pro-Russian Hackers Use Linux VMs to Hide in Windows Russian Hackers Abuse Hyper-V to Hide Malware in Linux VMs Qilin ransomware abuses WSL to run Linux encryptors in Windows This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Segment 2: Topic - Threat Modeling Humanoid Robots We're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance... Resources https://www.unitree.com/H2 (watch the video!) China's humanoid robots get factory jobs as UBTech's model scores US$112 million in orders The big reveal: Xpeng founder unzips humanoid robot to prove it's not human Exploit Allows for Takeover of Fleets of Unitree Robots - Security researchers find a wormable vulnerability 100-page Paper: The Cybersecurity of a Humanoid Robot 5-page Paper: Cybersecurity AI: Humanoid Robots as Attack Vectors Amazingly, $300 smart vacuums have some of the same exact vulnerabilities and backdoors built into them as the $16,000 humanoid robots! The Day My Smart Vacuum Turned Against Me Segment 3: Weekly News Finally, in the enterprise security news, A $435M venture round A $75M seed round a few acquisitions the producer of the movie Half Baked bought a spyware company AI isn't going well, or is it? maybe we just need to adopt it more slowly and deliberately? ad-blockers are enterprise best practices firewalls and VPNs are security risks, according to insurance claims could you power an entire house with disposable vapes? All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-433

Lori & Julia
11/17 Monday Hr 1: More on the Ariana Grande Attacker, Paul Folger Joins and Brittany's Chairs

Lori & Julia

Play Episode Listen Later Nov 17, 2025 29:31


We mix things up with Hot to Go on the move, Brittany and her chairs. Time for a black list for concert goers/celebrity events and The Hailey Smoothie is dead. Plus Paul Folger joins the show. See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

Enterprise Security Weekly (Audio)
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433

Enterprise Security Weekly (Audio)

Play Episode Listen Later Nov 17, 2025 116:49


Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy. In this segment, we'll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker. Segment Resources: Pro-Russian Hackers Use Linux VMs to Hide in Windows Russian Hackers Abuse Hyper-V to Hide Malware in Linux VMs Qilin ransomware abuses WSL to run Linux encryptors in Windows This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Segment 2: Topic - Threat Modeling Humanoid Robots We're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance... Resources https://www.unitree.com/H2 (watch the video!) China's humanoid robots get factory jobs as UBTech's model scores US$112 million in orders The big reveal: Xpeng founder unzips humanoid robot to prove it's not human Exploit Allows for Takeover of Fleets of Unitree Robots - Security researchers find a wormable vulnerability 100-page Paper: The Cybersecurity of a Humanoid Robot 5-page Paper: Cybersecurity AI: Humanoid Robots as Attack Vectors Amazingly, $300 smart vacuums have some of the same exact vulnerabilities and backdoors built into them as the $16,000 humanoid robots! The Day My Smart Vacuum Turned Against Me Segment 3: Weekly News Finally, in the enterprise security news, A $435M venture round A $75M seed round a few acquisitions the producer of the movie Half Baked bought a spyware company AI isn't going well, or is it? maybe we just need to adopt it more slowly and deliberately? ad-blockers are enterprise best practices firewalls and VPNs are security risks, according to insurance claims could you power an entire house with disposable vapes? All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-433

Fitzy & Wippa
What's Next For The Ariana Grande Red Carpet Attacker

Fitzy & Wippa

Play Episode Listen Later Nov 17, 2025 3:35 Transcription Available


“Public nuisance” Johnson Wen, long reported to have repeatedly intruded on pitches and concerts around the world, may finally see those disruptions come to an end, as he now faces jail time.See omnystudio.com/listener for privacy information.

Paul's Security Weekly TV
Year of the (Clandestine) Linux Desktop, topic, and the news - Rob Allen - ESW #433

Paul's Security Weekly TV

Play Episode Listen Later Nov 17, 2025 116:50


Segment 1: Interview with Rob Allen It's the Year of the (Clandestine) Linux Desktop! As if EDR evasions weren't enough, attackers are now employing yet another method to hide their presence on enterprise systems: deploying tiny Linux VMs. Attackers are using Hyper-V and/or WSL to deploy tiny (120MB disk space and 256MB memory) Linux VMs to host a custom reverse shell and reverse proxy. In this segment, we'll discuss strategies and mitigations to battle this novel technique with Rob Allen from Threatlocker. Segment Resources: Pro-Russian Hackers Use Linux VMs to Hide in Windows Russian Hackers Abuse Hyper-V to Hide Malware in Linux VMs Qilin ransomware abuses WSL to run Linux encryptors in Windows This segment is sponsored by ThreatLocker. Visit https://securityweekly.com/threatlocker to learn more about them! Segment 2: Topic - Threat Modeling Humanoid Robots We're entering the age of human-shaped robots, so it seems like a good time to talk about the fact that they ALREADY HAVE CVEs assigned to them. I guess this isn't a terrible thing - John Connor might have had an easier time if he could simply hack the terminators from a distance... Resources https://www.unitree.com/H2 (watch the video!) China's humanoid robots get factory jobs as UBTech's model scores US$112 million in orders The big reveal: Xpeng founder unzips humanoid robot to prove it's not human Exploit Allows for Takeover of Fleets of Unitree Robots - Security researchers find a wormable vulnerability 100-page Paper: The Cybersecurity of a Humanoid Robot 5-page Paper: Cybersecurity AI: Humanoid Robots as Attack Vectors Amazingly, $300 smart vacuums have some of the same exact vulnerabilities and backdoors built into them as the $16,000 humanoid robots! The Day My Smart Vacuum Turned Against Me Segment 3: Weekly News Finally, in the enterprise security news, A $435M venture round A $75M seed round a few acquisitions the producer of the movie Half Baked bought a spyware company AI isn't going well, or is it? maybe we just need to adopt it more slowly and deliberately? ad-blockers are enterprise best practices firewalls and VPNs are security risks, according to insurance claims could you power an entire house with disposable vapes? All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-433

Daily Mitzvah (Audio) - by Mendel Kaplan
Daily Mitzvah, Day 260: Saving a Victim from an Attacker & Saving a Person in Mortal Peril

Daily Mitzvah (Audio) - by Mendel Kaplan

Play Episode Listen Later Nov 15, 2025 36:57


Study the daily lesson of Sefer HaMitzvos for day 260 with Rabbi Mendel Kaplan, where he teaches the mitzvah in-depth with added insight and detail.

study saving victim peril mortal attackers sefer hamitzvos daily mitzvah
Spurs Chat: Discussing all Things Tottenham Hotspur: Hosted by Chris Cowlin: The Daily Tottenham/Spurs Podcast
TOTTENHAM NEWS: "Club Targeting Left-Sided Attacker in January!" Kudus, Odobert, Women: Spurs Update

Spurs Chat: Discussing all Things Tottenham Hotspur: Hosted by Chris Cowlin: The Daily Tottenham/Spurs Podcast

Play Episode Listen Later Nov 15, 2025 16:56


Spurs Chat: Discussing all Things Tottenham Hotspur: Hosted by Chris Cowlin: The Daily Tottenham/Spurs Podcast Hosted on Acast. See acast.com/privacy for more information.

Daily Mitzvah (Video)
Daily Mitzvah, Day 260: Saving a Victim from an Attacker & Saving a Person in Mortal Peril

Daily Mitzvah (Video)

Play Episode Listen Later Nov 15, 2025 37:04


Study the daily lesson of Sefer HaMitzvos for day 260 with Rabbi Mendel Kaplan, where he teaches the mitzvah in-depth with added insight and detail.

study saving victim peril mortal attackers sefer hamitzvos daily mitzvah
@BEERISAC: CPS/ICS Security Podcast Playlist
The Nation-State Attacks Hiding in Your OT Network

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Nov 14, 2025 33:34


Podcast: Industrial Cybersecurity InsiderEpisode: The Nation-State Attacks Hiding in Your OT NetworkPub date: 2025-11-12Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationIn this episode of the Industrial Cybersecurity Insider, Craig Duckworth sits down with Matthew Carr, co-founder of Atumcell and OT penetration testing expert with fifteen years of experience securing operational technology systems. Matthew shares his journey from vulnerability research to specializing in cyber-physical security, recounting the pivotal moment when his exploit code stopped a production line at a major car manufacturer. The conversation addresses the critical gaps in OT security, including why most organizations are unaware of what's actually on their networks, the dangers of default passwords on IoT devices, and how attackers often use espionage rather than ransomware to remain undetected. Matthew reveals how his team safely conducts pentests in production environments, develops proprietary detection rule sets, and helps organizations understand their infrastructure through network mapping. The discussion encompasses a range of topics, from the risks associated with smart TVs in conference rooms to the motivations behind nation-states targeting critical infrastructure, culminating in practical advice on developing a cybersecurity roadmap for cyber-physical systems.Chapters:(00:00:00) - Welcome and Introduction to Matthew Carr's OT Security Journey(00:02:30) - The Moment Exploit Code Stopped a Production Line at a Major Car Manufacturer(00:06:15) - Why Most Organizations Don't Know What's Actually on Their OT Networks(00:09:45) - The Three Pillars of Adamzsel: Pentesting, Monitoring, and Tabletop Exercises(00:14:20) - How Attackers Know Your Infrastructure Better Than You Do(00:18:50) - Smart TVs in Conference Rooms: The Hidden Security Risk with Root Access(00:22:30) - Espionage vs Ransomware: The Cyber Attacks No One Is Talking About(00:26:45) - Why Default Passwords on IoT Devices Are an Attacker's Favorite Entry Point(00:30:20) - Building a Cybersecurity Roadmap for Cyber-Physical Systems(00:33:15) - Closing Thoughts and Free OT Security White Paper from AdamzselLinks And Resources:Atumcell WebsiteMatthew Carr on LinkedInWant to Sponsor an episode or be a Guest? Reach out here.Industrial Cybersecurity Insider on LinkedInCybersecurity & Digital Safety on LinkedInBW Design Group CybersecurityDino Busalachi on LinkedInCraig Duckworth on LinkedInThanks so much for joining us this week. Want to subscribe to Industrial Cybersecurity Insider? Have some feedback you'd like to share? Connect with us on Spotify, Apple Podcasts, and YouTube to leave us a review!The podcast and artwork embedded on this page are from Industrial Cybersecurity Insider, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

Ekot
Ekot 08:00 Omfattande ryska attacker mot Kiev i natt

Ekot

Play Episode Listen Later Nov 14, 2025 15:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

Talos Takes
How Attackers Use Your Own Tools Against You (IR trends Q3 2025)

Talos Takes

Play Episode Listen Later Nov 13, 2025 11:21


In this episode of Talos Takes Hazel sits down with Talos' Bill Largent and Craig Jackson to discuss the latest Cisco Talos Incident Response Quarterly Trends Report (Q3 2025). From a wave of Toolshell events, to a rise in post-exploitation phishing, and the misuse of legitimate tools like Velociraptor, this quarter's cases all point to a theme: attackers are getting very good at living off what's already in your environment. Read the full report at https://blog.talosintelligence.com/ir-trends-q3-2025/

SharkPreneur
Episode 1210: Your Network's Already Under Attack with Scott Alldridge

SharkPreneur

Play Episode Listen Later Nov 10, 2025 20:57


The threat that puts you out of business probably won't look like a movie hack, it'll look like a normal email from your CEO.   In this episode of Sharkpreneur, Seth Greene interviews Scott Alldridge, CEO of IP Services and bestselling author of the Visible Ops series, who explains how modern cybercrime actually works and why most small and mid-sized companies are far more vulnerable than they think. Scott shares real breach stories, including how something as simple as leaving a printer password as “1234” led to a $187,000 theft and forced a firm into a merger. He breaks down why cybersecurity is now a board-level issue, how AI is being weaponized by attackers, and what leaders need to be doing right now to protect their data, their money, and their survival.   Key Takeaways: → Most companies think “we're too small to be a target,” but attackers actively go after businesses with as few as 100 employees — and even under $1M in revenue. → Only about 1 in 7 cybersecurity breaches ever gets reported, so what you read in the news is a tiny fraction of what's actually happening. → A single weak password (like “1234” on a networked printer) can give a threat actor a doorway into your entire system. → Attackers don't smash and grab; they sit quietly for weeks or months, watch how you communicate, then imitate leadership to trigger wire transfers that look totally normal. → The “human layer” is still the biggest risk: phishing, social engineering, and reused or weak credentials are where most compromises begin.   Scott Alldridge has spent three decades on the frontlines of cyber warfare—turning escalating threats intocompetitive advantage for business leaders. As co-founder of the IT Process Institute and creator of the globally adopted VisibleOps framework (400,000+ copies sold), he shaped how enterprises worldwide secure and scale technology.   His Amazon bestseller, VisibleOps Cybersecurity, is the definitive roadmap for integrating Zero Trust principles into real business results. Today, as CEO of IP Services, one of America's most trusted MSSPs, Scott helps executives verify—not just trust—their cybersecurity posture.   Driven by both expertise and altruism, Scott's mission is to ensure businesses of all sizes are resilient and protected—not only to safeguard revenue, but to prevent the devastating personal and professional fallout of cyberattacks. A globally recognized thought leader with 618K+ social media followers, he leverages his platform to raise awareness, share real-world breach stories, and arm leaders with actionable strategies that save companies before it's too late.   Connect With Scott Aldridge: Website: https://ipservices.com/ Instagram: https://www.instagram.com/scottalldridge1/?hl=en LinkedIn: https://www.linkedin.com/in/scott-alldridge-1a976/ Learn more about your ad choices. Visit megaphone.fm/adchoices

Paul's Security Weekly
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432

Paul's Security Weekly

Play Episode Listen Later Nov 10, 2025 98:17


Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the challenge of securing OT systems with Todd Peterson and Joshua Hay from Junto Security. This segment is sponsored by Junto Security. Visit https://securityweekly.com/junto to learn more! Segment 2: Topic - Spotting Red Flags in Online Posts This week's topic segment is all about tuning your 'spidey sense' to spot myths and misconceptions online so we can avoid amplifying AI slop, scams, and other forms of Internet bunk. It was inspired by this LinkedIn post, but we've got a cybersecurity story in the news that we could have easily used for this as well (the report from MIT). Segment 3: Weekly Enterprise News Finally, in the enterprise security news, Some interesting fundings Some more interesting acquisitions a new AI-related term has been coined: cyberslop the latest insights from cyber insurance claims The AI security market isn't nearly as big as it might seem cybercriminals are targeting trucking and logistics to steal goods Sorry dads, science says the smarts come from mom All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-432

Enterprise Security Weekly (Audio)
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432

Enterprise Security Weekly (Audio)

Play Episode Listen Later Nov 10, 2025 98:17


Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the challenge of securing OT systems with Todd Peterson and Joshua Hay from Junto Security. This segment is sponsored by Junto Security. Visit https://securityweekly.com/junto to learn more! Segment 2: Topic - Spotting Red Flags in Online Posts This week's topic segment is all about tuning your 'spidey sense' to spot myths and misconceptions online so we can avoid amplifying AI slop, scams, and other forms of Internet bunk. It was inspired by this LinkedIn post, but we've got a cybersecurity story in the news that we could have easily used for this as well (the report from MIT). Segment 3: Weekly Enterprise News Finally, in the enterprise security news, Some interesting fundings Some more interesting acquisitions a new AI-related term has been coined: cyberslop the latest insights from cyber insurance claims The AI security market isn't nearly as big as it might seem cybercriminals are targeting trucking and logistics to steal goods Sorry dads, science says the smarts come from mom All that and more, on this episode of Enterprise Security Weekly. Visit https://www.securityweekly.com/esw for all the latest episodes! Show Notes: https://securityweekly.com/esw-432

Paul's Security Weekly TV
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432

Paul's Security Weekly TV

Play Episode Listen Later Nov 10, 2025 98:17


Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the challenge of securing OT systems with Todd Peterson and Joshua Hay from Junto Security. This segment is sponsored by Junto Security. Visit https://securityweekly.com/junto to learn more! Segment 2: Topic - Spotting Red Flags in Online Posts This week's topic segment is all about tuning your 'spidey sense' to spot myths and misconceptions online so we can avoid amplifying AI slop, scams, and other forms of Internet bunk. It was inspired by this LinkedIn post, but we've got a cybersecurity story in the news that we could have easily used for this as well (the report from MIT). Segment 3: Weekly Enterprise News Finally, in the enterprise security news, Some interesting fundings Some more interesting acquisitions a new AI-related term has been coined: cyberslop the latest insights from cyber insurance claims The AI security market isn't nearly as big as it might seem cybercriminals are targeting trucking and logistics to steal goods Sorry dads, science says the smarts come from mom All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-432

Enterprise Security Weekly (Video)
OT Security Doesn't Have to be a Struggle, Spotting Red Flags, Enterprise News - Joshua Hay, Todd Peterson - ESW #432

Enterprise Security Weekly (Video)

Play Episode Listen Later Nov 10, 2025 98:17


Segment 1: OT Security Doesn't Have to be a Struggle OT/ICS/SCADA systems are often off limits to cybersecurity folks, and exempt from many controls. Attackers don't care how fragile these systems are, however. For attackers aiming to disrupt operations, fragile but critical systems fit criminals' plans nicely. In this interview, we discuss the challenge of securing OT systems with Todd Peterson and Joshua Hay from Junto Security. This segment is sponsored by Junto Security. Visit https://securityweekly.com/junto to learn more! Segment 2: Topic - Spotting Red Flags in Online Posts This week's topic segment is all about tuning your 'spidey sense' to spot myths and misconceptions online so we can avoid amplifying AI slop, scams, and other forms of Internet bunk. It was inspired by this LinkedIn post, but we've got a cybersecurity story in the news that we could have easily used for this as well (the report from MIT). Segment 3: Weekly Enterprise News Finally, in the enterprise security news, Some interesting fundings Some more interesting acquisitions a new AI-related term has been coined: cyberslop the latest insights from cyber insurance claims The AI security market isn't nearly as big as it might seem cybercriminals are targeting trucking and logistics to steal goods Sorry dads, science says the smarts come from mom All that and more, on this episode of Enterprise Security Weekly. Show Notes: https://securityweekly.com/esw-432

PolySécure Podcast
Actu - 10 novembre 2025 - Parce que... c'est l'épisode 0x659!

PolySécure Podcast

Play Episode Listen Later Nov 10, 2025 34:55


Parce que… c'est l'épisode 0x659! Shameless plug 17 au 20 novembre 2025 - European Cyber Week 25 et 26 février 2026 - SéQCure 2026 14 au 17 avril 2026 - Botconf 2026 28 et 29 avril 2026 - Cybereco Cyberconférence 2026 9 au 17 mai 2026 - NorthSec 2026 3 au 5 juin 2025 - SSTIC 2026 Notes IA AI Agents Are Going Rogue: Here's How to Rein Them In AI Security Agents Get Persona Makeovers List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities Ransomware Attack on European Organizations Surge as Hackers Leveraging AI-Tools for Attacks UofT: Canada isn't doing its part to stop AI surveillance MIT Retracts Controversial AI Ransomware Study Amid Expert Scrutiny Kevin Beaumont: “The whole report is like that …” - Cyberplace Microsoft: SesameOp malware abuses OpenAI Assistants API in attacks Blue MITRE ATT&CKcon - ATT&CKcon 6.0 Chrome Emergency Update to Patch Multiple Vulnerabilities that Enable Remote Code Execution Apple addresses more than 100 vulnerabilities in security updates for iPhones, Macs and iPads Microsoft removing Defender Application Guard from Office Microsoft Entra Credentials in the Authenticator App on Jail-Broken Devices to be Wiped Out Red Teams New BOF Tool Exploits Microsoft Teams' Cookie Encryption allowing Attackers to Access User Chats Microsoft Teams' New “Chat with Anyone” Feature Exposes Users to Phishing and Malware Attacks Hackers Can Exploit Microsoft Teams Vulnerabilities to Manipulate Messages and Alter Notifications Hackers Weaponize Windows Hyper-V to Hide Linux VM and Evade EDR Detection Danish authorities in rush to close security loophole in Chinese electric buses 2025 Insider Risk Report Finds Most Organizations Struggle to Detect and Predict Insider Risks Violent cybercrime surges in Europe amid big payouts Cybercriminals, OCGs team up on lucrative cargo thefts DOJ accuses US ransomware negotiators of launching their own ransomware attacks Legalize Legal Corner - Apple's notarisation – blocking software freedom of developers and users Microsoft's data sovereignty: Now with extra sovereignty! DHS wants more biometric data - even from citizens Divers Microsoft's lack of quality control is out of control Cybersecurity Forecast 2026 - Google Warns Threat Actors Use AI to Enhance Speed and Effectiveness ISPs more likely to throttle CGNAT traffic: Cloudflare Collaborateurs Nicolas-Loïc Fortin Crédits Montage par Intrasecure inc Locaux réels par Intrasecure inc

Ekot
Ekot 08:00:Omfattande attacker mot staden Dnipro i Ukraina

Ekot

Play Episode Listen Later Nov 8, 2025 5:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

The Devlin Radio Show
David Williams: Former Wellington Phoenix attacker reflects on season with the team

The Devlin Radio Show

Play Episode Listen Later Nov 8, 2025 14:15 Transcription Available


Tonight's NZ derby has sparked some memories for a former Wellington Phoenix player. Former attacker David Williams only spent one season in Wellington, but he quickly became a fan favourite in the 2018-2019 season. He most recently played for Perth Glory and now is looking for his next opportunity. He joined Piney on the show to chat about where his career has taken him since his Wellington days and to reflect on his time in the capital. “It's one of those journeys that I've really, really enjoyed. And to this day, my wife and I still speak about my time in Wellington.” LISTEN ABOVE See omnystudio.com/listener for privacy information.

Hot Off The Wire
Supreme Court justices appear skeptical of tariffs; Starbucks' union workers plan strike

Hot Off The Wire

Play Episode Listen Later Nov 6, 2025 18:30


On today's episode: Conservative Supreme Court justices appear skeptical of Trump’s sweeping unilateral tariffs. FAA says it will list airports where it is reducing flights during the government shutdown. Israel identifies latest hostage remains returned by Hamas from Gaza as those of a Tanzanian student. After battering the Philippines, deadly Typhoon Kalmaegi moves toward Vietnam. Judge orders improvements at a Chicago-area immigration facility after claims of inhumane conditions. FDA issues warning to 18 websites selling unapproved Botox. Trump putting a positive spin on the economy after voters rebuked his performance. Judge in Comey case scolds prosecutors as he orders them to produce records from probe. 11 dead after engine fell off UPS plane that crashed and exploded in Kentucky. Mamdani announces transition leaders, vows to deliver on ambitious agenda. Starbucks' union workers plan strike next week unless company agrees to a contract. Wall Street gains ground amid steady flow of earnings reports, upbeat economic updates. The NHL’s all-time leading goal scorer reaches a new milestone in Washington’s blowout win, a big scoring night in the NBA is sparked by an unusual source in Cleveland’s victory over Philadelphia, and an NFL star quarterback in Arizona is being shelved with an injury. NBA staff members meet congressional staffers to discuss gambling scandals, AP sources say. Bill Belichick among 9 coaching semifinalists for Pro Football Hall of Fame's 2026 class. Tiger Woods' son is an All-American as Charlie honored by American Junior Golf Association. Attackers board a ship off the coast of Somalia after firing rocket-propelled grenades. Putin orders Russian officials to submit proposals for possible resumption of nuclear tests. The German government has banned a Muslim group over accusations of violating human rights. —The Associated Press About this program Host Terry Lipshetz is managing editor of the national newsroom for Lee Enterprises. Besides producing the daily Hot off the Wire news podcast, Terry conducts periodic interviews for this Behind the Headlines program, co-hosts the Streamed & Screened movies and television program and is the former producer of Across the Sky, a podcast dedicated to weather and climate. Theme music The News Tonight, used under license from Soundstripe. YouTube clearance: ZR2MOTROGI4XAHRX

Crime Bit with Danelle Hallan
Woman testifies against her attacker at HER OWN MURDER TRIAL | Judy Malinowski

Crime Bit with Danelle Hallan

Play Episode Listen Later Nov 5, 2025 41:13


In this episode of Crime Bit with Danelle Hallan, we look into the case of Judy Malinowski, a mother from Ohio whose story changed U.S. law.After surviving a brutal attack by her boyfriend, Judy fought for two years in the hospital, becoming the first person in history to testify at her own murder trial. Her strength not only brought her attacker to justice but also inspired Judy's Law, protecting future victims of violent crime.How did one woman's fight for her life become a fight for change?Join us as we uncover the story of Judy Malinowski on Crime Bit with Danelle Hallan.

Coffee Moaning
TRUMP ANGER as NYC Prepares for New MAYOR MAMDANI; Train Attacker on CCTV; Kids & Weight Loss Jabs

Coffee Moaning

Play Episode Listen Later Nov 4, 2025 68:06


COFFEE MOANING the PODCAST ON APPLE PODCASTS: https://podcasts.apple.com/gb/podcast/coffee-moaning/id1689250679ON SPOTIFY: https://open.spotify.com/show/3p6z4A1RbhidO0pnOGGZl2?si=IqwD7REzTwWdwsbn2gzWCg&nd=1HOW TO STAY MARRIED (SO FAR) the PODCASTON SPOTIFY: https://open.spotify.com/show/57MT4cv2c3i06ryQlIpUXc?si=1b5ed24f40c54ebaON APPLE PODCASTS: https://podcasts.apple.com/gb/podcast/how-to-stay-married-so-far/id1294257563 Hosted on Acast. See acast.com/privacy for more information.

Bear Attack
S7E10: Bear Attack Sports Report!

Bear Attack

Play Episode Listen Later Nov 3, 2025 103:45


We are down a bear this month, listen to find out who! Due to a certain bear's absence we discuss sport's of the redneck and rich person varieties!We also have a jumbo sized B.A.R. inspired by sports!Attacker's let's get ready to rumble and start your engines! See you in December for our annual yearly wrap up.As always comment, share and spread wide the almighty Beardom!

Highlights from The Pat Kenny Show
The many who don't get the chance to take their attacker to court

Highlights from The Pat Kenny Show

Play Episode Listen Later Oct 31, 2025 14:09


Back at the end of august we revealed on this show that over the past 10 years the Director of Public Prosecutions chose not to prosecute over 67 percent of sexual offence cases submitted to it by gardaí. The information was received under a freedom of information request, and it showcased the burden of proof needed for justice, what it takes to build a case, and importantly, the thousands of people who don't get the chance to take their attacker to court.Our reporter Jessica Woodlock has been looking into these figures and reported for us.

That Millwall Podcast
Femi Azeez: Millwall's New No Fear Attacker | Full Interview

That Millwall Podcast

Play Episode Listen Later Oct 30, 2025 33:03


Learn more about your ad choices. Visit podcastchoices.com/adchoices

ITSPmagazine | Technology. Cybersecurity. Society
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 4 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Oct 29, 2025 3:38


Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself.This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity.

Investec Focus Radio
NOW Ep 113: The new era of cyber risk

Investec Focus Radio

Play Episode Listen Later Oct 29, 2025 15:42


Deepfakes that fool the eye. Voices that sound real. Attacks that never sleep. As artificial intelligence reshapes both offence and defence, cyber risk has gone mainstream. In this episode of No Ordinary Wednesday, Jeremy Maggs speaks with Investec cybersecurity experts Nomalizo Hlazo and Tash van den Heever about the new era of digital resilience where trust, adaptability and awareness are your strongest defences. Podcast key moments 00:00 - Introduction 01:27 - AI on both sides – Attackers and defenders in the digital arms race 02:52 - 2025: The year cyber risk went mainstream 03:46 - Why digital risk is compounding 05:05 - Building resilience through third-party and supply chain visibility 07:15 - Regulation tightens – Balancing compliance and agility 08:57 - Critical infrastructure under threat 10:32 - Building digital trust in a diverse and connected market 11:48 - The future of cybersecurity: Integrity, speed, and adaptability 13:16 - Quantum computing, AI agents, and hyperconnectivity 13:58 - Cybersecurity as a life skill 14:56 - Closing remarks Read more on www.investec.com/now Hosted by seasoned broadcaster, Jeremy Maggs, the No Ordinary Wednesday podcast unpacks the latest economic, business, and political news in South Africa, with an all-star cast of investment and wealth managers, economists, and financial planners from Investec. Listen in every second Wednesday for an in-depth look at what's moving markets, shaping the economy, and changing the game for your wallet and your business. Investec Focus Radio SA

Redefining CyberSecurity
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 4 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE

Redefining CyberSecurity

Play Episode Listen Later Oct 29, 2025 3:38


Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself.This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity.

TechTimeRadio
273: TechTime Radio: Tech turns terrifying: cloud crashes, robot takeovers, satellite leaks, AI love, ghost-seeing Teslas, doorbell surveillance, and blockchain malware. One failure can haunt everything. Tune in—if you dare. | Air Date: 10/28 - 11/3/25

TechTimeRadio

Play Episode Listen Later Oct 28, 2025 61:53 Transcription Available


Want a Halloween scare that sticks with you after the candy's gone? We're pouring a glass and pulling back the curtain on the creepiest corners of everyday tech: a cloud outage that toppled major apps and smart beds, a Prime refund saga with fine-print timelines, and Amazon's bold plan to swap 600,000 human jobs for robots by 2033. The number that matters isn't the 30 cents shaved off a product; it's the blast radius when a single point of failure hits everything from payments to sleep pods.We go deeper with cybersecurity expert Nick Espinosa to map the new threat surface. He breaks down a jaw-dropping study showing unencrypted geostationary satellite traffic—airline passenger data, critical infrastructure chatter, even U.S. and Mexican military communications—floating for the taking. Then we connect the surveillance dots: Ring's partnership with Flock could feed millions of doorbells into a searchable police network. With Ring's track record, do you want your front porch in a national database accessible by natural-language prompts?The uncanny valley gets crowded too. A widower claims an AI replica of Suzanne Somers “feels indistinguishable,” while OpenAI prepares to allow “mature” content for verified adults. We weigh the supposed benefits against the hard psychology: isolation, distorted attachment, and empathy atrophy. For a lighter fright, we test the viral claim that Teslas see “ghosts” in cemeteries—spoiler: that's what a cautious perception model looks like when tombstones confuse it. The real nightmare? Attackers hiding malware inside blockchain smart contracts, using decentralization to dodge takedowns and $2 fees to keep it cheap.From airline IT meltdowns to smart contract exploits, the pattern is clear: concentration of power and data magnifies risk. Redundancy, privacy-by-design, and failure-aware engineering aren't nice-to-haves—they're the only way through. Grab your headphones and your favorite pour, then join us for a tour of the haunted infrastructure underneath daily life.Enjoyed the ride? Follow, share with a friend, and leave a quick review so more curious listeners can find the show. What scared you most—and what would you fix first?Support the show

Ekot
Ekot 17:45 Netanyahu beordrar nya attacker mot Gaza

Ekot

Play Episode Listen Later Oct 28, 2025 20:00


Nyheter och fördjupning från Sverige och världen. Lyssna på alla avsnitt i Sveriges Radio Play.

The Anfield Index Podcast
David Lynch On 75m Attacker Linked To Liverpool

The Anfield Index Podcast

Play Episode Listen Later Oct 23, 2025 21:13


Dave Davis is joined by David Lynch to discuss: •⁠ ⁠⁠Off the field issues around injuries and ticketing •⁠ ⁠⁠Semenyo and Mac Allister links Learn more about your ad choices. Visit podcastchoices.com/adchoices

Ben Fordham: Highlights
‘Can't believe it' - Victim reacts after accused attacker allegedly strikes again

Ben Fordham: Highlights

Play Episode Listen Later Oct 21, 2025 6:10


See omnystudio.com/listener for privacy information.

Alan Jones Daily Comments
‘Can't believe it' - Victim reacts after accused attacker allegedly strikes again

Alan Jones Daily Comments

Play Episode Listen Later Oct 21, 2025 6:10


See omnystudio.com/listener for privacy information.

KentOnline
Podcast: Attacker ‘saw red' at his Folkestone bar Picklebacks and stabbed man with broken bottle

KentOnline

Play Episode Listen Later Oct 21, 2025 19:51


A court has heard a man “saw red” on the night his town centre bar was closing down and thrust a broken bottle into another man's head.Steven Harwood-Brown threw one of his employees to the floor at Folkestone venue Picklebacks, before stabbing the victim, who had intervened to stop the fight.Also in today's podcast, pressure is growing on the leader of Kent County Council after seven MPs demanded she quit and an eighth labelled her behaviour ‘unacceptable.'In a letter to Reform leader Nigel Farage, the Labour MPs said Cllr Linden Kemkaran was ‘clearly not up to the job. Two Kent women who survived domestic abuse are starting a community project to provide clothing and toiletries for other victims.The DV Closet, in Sevenoaks, is a safe space where those who've fled abuse can get the support they need.Long-harboured plans to build a new reservoir in the Kent countryside are finally moving forward as contractors carry out the first phase of ground investigation works.South East Water is planning to build a 200-acre facility on farmland near Canterbury - you can hear from the project manager. And a Kent farmer's told us he's pleased to be able to give apples he grows to charity - to avoid them going to waste.The crop at Hazel Street Farm is no longer financially viable, so the orchard has been handed over to a food project. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Active Self Protection Podcast
POM STOPS Machete-Weilding Attacker! -Alec

Active Self Protection Podcast

Play Episode Listen Later Oct 17, 2025 21:22


This week on the Active Self Protection Podcast we sit down with security professional Alec and discuss the day he was working his shift at a strip mall when he was alerted to the presence of a man holding a machete and how he put himself and a can of POM OC spray in between the attacker and the young people working at the mall that day.  Active Self Protection exists to help good, sane, sober, moral, prudent people in all walks of life to more effectively protect themselves and their loved ones from criminal violence. On the ASP Podcast you will hear the true stories of life or death self defense encounters from the men and women that lived them. If you are interested in the Second Amendment, self defense and defensive firearms use, martial arts or the use of less lethal tools used in the real world to defend life and family, you will find this show riveting.  Join host and career federal agent Mike Willever as he talks to real life survivors and hear their stories in depth. You'll hear about these incidents and the self defenders from well before the encounter occurred on through the legal and emotional aftermath. Music: bensound.com

The Cyber Threat Perspective
Episode 153: How to Prove Your Security Works Before Attackers Do

The Cyber Threat Perspective

Play Episode Listen Later Oct 17, 2025 33:04


In this episode, we dig into how to move from “we think we're secure” to “we can prove it.” We'll lay out a practical loop for validating controls, gathering evidence, and tracking results that leadership understands. If you've ever wondered how to demonstrate security value beyond dashboards and audits, this is your playbook.Blog: https://offsec.blog/Youtube: https://www.youtube.com/@cyberthreatpovTwitter: https://x.com/cyberthreatpov Follow Spencer on social ⬇Spencer's Links: https://go.spenceralessi.com/links Work with Us: https://securit360.com | Find vulnerabilities that matter, learn about how we do internal assume breach pentesting here.

77 WABC Early News
So, who won the big debate last night? A Bronx attacker should have never been on the streets.

77 WABC Early News

Play Episode Listen Later Oct 17, 2025 45:01


So, who won the big debate last night? A Bronx attacker should have never been on the streets. Learn more about your ad choices. Visit megaphone.fm/adchoices

Reboot IT - 501(c) Technology
Cybersecurity Maturity: What Associations Need to Know

Reboot IT - 501(c) Technology

Play Episode Listen Later Oct 16, 2025 39:17


In this episode of Reboot IT, host Dave Coriale sits down with Ben Muscolino, CEO of Breezio, Data Sangria, and co-founder at Vortacity, and Ryan O'Donnell, CTO at Vortacity, to demystify cybersecurity for associations and nonprofits. They explore the evolving threat landscape, the importance of proactive security measures, and how organizations can build a culture of cybersecurity without fear or shame. From phishing-resistant MFA to red team engagements, this conversation is packed with practical advice for leaders and IT professionals alike. Themes and Topics: Cybersecurity Culture and Leadership Cybersecurity must be embraced across the organization, not just by IT. Leaders should foster a “shameless and blameless” environment for open dialogue. Culture impacts how teams respond to threats and education efforts. Phishing and Account Takeover Risks Phishing remains the most common entry point for breaches. Attackers often dwell silently before exploiting access. Social engineering tactics are becoming more sophisticated. Cybersecurity Maturity  Organizations should progress from asset inventory to vulnerability scans, pen tests, and red team engagements. Skipping foundational steps can lead to ineffective or costly security efforts. Tailoring assessments to organizational needs is key. Penetration Testing and Red Teaming Pen tests simulate real-world attacks to expose vulnerabilities. Red team engagements test people, processes, and systems under stealth conditions. Trusted agents within the organization coordinate red team efforts discreetly. Deception Technology and Canary Tokens Canary tokens act as tripwires to detect post-compromise behavior. These tools are low-cost and high-impact for early breach detection. Ideal for organizations with limited cybersecurity resources. Budgeting and Advocacy for Cybersecurity Cybersecurity is often the first to be cut during budget reviews. IT leaders must communicate risk in terms of cost and organizational responsibility. Starting small is better than doing nothing—get from zero to one.

Hacker Valley Studio
How AI Elevates Cyber Hygiene with Jason Rebholz

Hacker Valley Studio

Play Episode Listen Later Oct 10, 2025 21:32


What if protecting your digital twin becomes the new cyber hygiene? In this week's episode, Ron welcomes back cybersecurity leader Jason Rebholz, CEO of Evoke, to discuss how AI is reshaping the fundamentals of cyber hygiene. From data breaches and deepfakes to everyday habits that protect our digital lives, Jason shares how small actions and smarter use of AI can make all the difference. Together, they uncover how our growing digital footprints are giving rise to digital twins, AI replicas that can mirror our behaviors, voices, and even decisions, and what that means for the future of trust, identity, and security. Impactful Moments: 00:00 - Introduction 01:00 - The Neon app data leak story 03:00 - Why our voices are the new passwords 05:00 - How AI can strengthen cyber hygiene 07:00 - Jason's mission to secure AI systems 09:00 - AI as a force multiplier for defenders 11:00 - Deepfakes and the new social engineering playbook 13:00 - Attackers' use of AI and what it means for us 15:00 - The rise of digital twins and identity threats 19:00 - How to defend against “yourself” online 20:00 - Final reflection: Trust in the AI age   Links: Connect with Jason on LinkedIn: https://www.linkedin.com/in/jrebholz/ Check out the TechCrunch article on the Neon app data leak story: https://techcrunch.com/2025/09/25/viral-call-recording-app-neon-goes-dark-after-exposing-users-phone-numbers-call-recordings-and-transcripts/   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/  

98FM's Dublin Talks
*Trigger Warning* Siobhan Reveals Horror Of Bumping Into Her Sex Attacker On Night Out

98FM's Dublin Talks

Play Episode Listen Later Oct 10, 2025 41:55


Warning - This episode contains material that may be triggering. This is one of the most harrowing interviews we've ever done on the podcast. A brave listener, Siobhan, contacted us to talk about how her sex attacker is still walking the streets and even approached her on a night out to intimidate her even more

The Tech Blog Writer Podcast
3447: How DXC Is Using AI to Outsmart Cybercriminals

The Tech Blog Writer Podcast

Play Episode Listen Later Oct 9, 2025 28:36


In this episode, Mike Baker, Vice President and Global CISO at DXC Technology, says the cyber industry has been focusing on the wrong side of AI. He believes too many companies use it only to block threats instead of studying how criminals use it to scale phishing, bypass defenses, and deploy adaptive malware. Attackers are learning faster than ever, and security teams must catch up. Mike argues that defenders need to think differently and use AI as both protection and opportunity. He shares how DXC is already doing this. The company has brought autonomous AI agents into its security operations through a partnership with 7AI. These agents process alerts that used to require hours of human effort. The result is faster detection, less burnout, and more time for analysts to investigate real threats. By cutting manual work by more than eighty percent, DXC has shown how AI can make cybersecurity teams stronger, not smaller. Zero Trust remains a core part of DXC's strategy. Mike calls it a journey that never ends. It needs cultural change, constant learning, and leadership that keeps security invisible to end users. AI now plays a role here too, improving identity checks and spotting access issues in real time. Yet, he reminds us, AI still needs people in the loop for oversight and judgment. We also talk about supply chain risks. Too many companies still treat risk assessments as one-time tasks. Mike pushes for continuous monitoring and close collaboration with suppliers. He closes the conversation on a hopeful note. AI will not replace people in cybersecurity, he says. It will make their work more meaningful and more effective if used with care and common sense.

The Dana Show with Dana Loesch
Absurd Truth: Kavanaugh's Trans Attacker Got Off EASY

The Dana Show with Dana Loesch

Play Episode Listen Later Oct 6, 2025 24:11 Transcription Available


The Transgender man who planned to assassinate Brett Kavanaugh will serve just 8 years. Steak ‘n Shake announces it is installing "the tallest and biggest American flag that local governments will allow" at every restaurant across the country. Disney CEO Bob Iger reinstated Jimmy Kimmel after the cancellation threatened a glitzy party he and his wife were hosting.Thank you for supporting our sponsors that make The Dana Show possible…Noble Gold https://NobleGoldInvestments.com/DanaOpen a new qualified IRA or cash account with Noble Gold and get a free 10-ounce Silver Flag Bar plus a Silver American Eagle Proof Coin.Webroothttps://Webroot.com/danaChange your October from cyber-scary to cyber-secure with 60% off Webroot Total Protection.AmmoSquaredhttps://AmmoSquared.comDon't get caught without ammo and be sure to tell them you heard about Ammo Squared on this show. HumanNhttps://HumanN.comStart supporting your cardiovascular health with SuperBeets now available at your local Walmart. ChapterFor free and unbiased Medicare help from my partners Chapter, dial #250 and say keyword “My Medicare”Chapter and its affiliates are not connected with or endorsed by any government entity or the federal Medicare program. Chapter Advisory, LLC represents Medicare Advantage HMO, PPO, and PFFS organizations and stand-alone prescription drug plans that have a Medicare contract. Enrollment depends on the plan's contract renewal. While we have a database of every Medicare plan nationwide and can help you search among all plans, we have contracts with many but not all plans. As a result, we do not offer every plan available in your area. Currently, we represent 50 organizations which offer 18,160 products nationwide. We search and recommend all plans, even those we don't directly offer. You can contact a licensed Chapter agent to find out the number of products available in your specific area. Please contact Medicare.gov, 1-800-Medicare, or your local State Health Insurance Program (SHIP) to get information on all of your options.PreBornhttps://PreBorn.com/DANA Or DIAL #250 Say the keyword BABY. That's #250, BABY. Together, we can save lives — one mom and one baby at a time.Keltechttps://KelTecWeapons.comKelTec builds every KS7 GEN2 right here in the USA with American materials and workers—upgrade your home defense today. All Family Pharmacyhttps://AllFamilyPharmacy.com/Dana Don't wait until flu season knocks at your door. Use code DANA10 at checkout to save 10%. Relief Factorhttps://ReliefFactor.com OR CALL 1-800-4-RELIEFTurn the clock back on pain with Relief Factor. Get their 3-week Relief Factor Quick Start for only $19.95 today! Byrnahttps://Byrna.com/danaGet your hands on the new compact Byrna CL. Visit Byrna.com/Dana to receive 10% off Patriot Mobilehttps://PatriotMobile.com/DanaDana's personal cell phone provider is Patriot Mobile. Get a FREE MONTH of service code DANA

Global News Podcast
Manchester synagogue attacker named

Global News Podcast

Play Episode Listen Later Oct 3, 2025 29:35


Police have named the man who killed two people at a synagogue in Manchester. Jihad Al-Shamie, a 35-year-old British man of Syrian descent, was shot and killed by officers outside the Heaton Park Hebrew Congregation Synagogue. Also, Donald Trump has declared the US is now in an armed conflict with drug smugglers in the Caribbean Sea. A man alleged to be a high-up figure in the Tren de Aragua gang has been arrested in Colombia. A former Israeli hostage who was held in captivity in Gaza for 16 months has called on Hamas to sign President Trump's peace plan. The disgraced rapper, Sean Diddy Combs, is set to be sentenced on prostitution charges. Luxembourg's Grand Duke Henri is formally abdicating his throne. There is a rogue planet gobbling up gas and dust at an unprecedented rate. Open AI's Sora app raises yet more concerns about artificial intelligence and copyright.The Global News Podcast brings you the breaking news you need to hear, as it happens. Listen for the latest headlines and current affairs from around the world. Politics, economics, climate, business, technology, health – we cover it all with expert analysis and insight. Get the news that matters, delivered twice a day on weekdays and daily at weekends, plus special bonus episodes reacting to urgent breaking stories. Follow or subscribe now and never miss a moment. Get in touch: globalpodcast@bbc.co.uk

Rebel News +
EZRA LEVANT | Rebel News caught suspected Antifa church attacker (INSIDE the Defence department?!)

Rebel News +

Play Episode Listen Later Oct 2, 2025 29:34


The Rebel News podcasts features free audio-only versions of select RebelNews+ content and other Rebel News long-form videos, livestreams, and interviews. Monday to Friday enjoy the audio version of Ezra Levant's daily TV-style show, The Ezra Levant Show, where Ezra gives you his contrarian and conservative take on free speech, politics, and foreign policy through in-depth commentary and interviews. Wednesday evenings you can listen to the audio version of The Gunn Show with Sheila Gunn Reid the Chief Reporter of Rebel News. Sheila brings a western sensibility to Canadian news. With one foot in the oil patch and one foot in agriculture, Sheila challenges mainstream media narratives and stands up for Albertans. If you want to watch the video versions of these podcasts, make sure to begin your free RebelNewsPlus trial by subscribing at http://www.RebelNewsPlus.com

WhatCulture Wrestling
WWE NXT Review - CHAOS Ahead Of NXT Showdown! Mustafa Ali RETURNS To NXT! Mystery Attacker REVEALED! The Showdown Summit?!

WhatCulture Wrestling

Play Episode Listen Later Oct 1, 2025 89:42


The Dadley Boyz review last night's episode of NXT and discuss...CHAOS ahead of NXT Showdown!Mustafa Ali RETURNS to NXT!Mystery attacker REVEALED!Je'Von Evans & Leon Slater team up!The Showdown Summit?!ENJOY!Follow us on Twitter:@AdamWilbourn@MichaelHamflett@MSidgwick@WhatCultureWWEFor more awesome content, check out: whatculture.com/wwe Hosted on Acast. See acast.com/privacy for more information.

Kevin Kietzman Has Issues
Who Will Notice Shutdown?, Frank White is Out, KS Schools Embarrass, T-Mobile Attacker Charged, Chiefs Have Top CB, Sporting KC's Bold Move, Tom Watson Takes a Stand, Record Setting Bridge

Kevin Kietzman Has Issues

Play Episode Listen Later Oct 1, 2025 54:21


   I can think of a thousand things that if they were shutdown today I would notice.  The federal government isn't one of them.   So here we go, will this be another shutdown about nothing that we all forget about or will President Trump make this a shutdown to remember?    Frank White is out as Jackson County Executive... wait until you hear how badly he got smoked at the polls.  Now, who's next and what does it mean for the Royals and Chiefs.  At the same time, a lawsuit in Missouri is likely headed to the state's Supreme Court to keep the Royals and Chiefs from using tax revenue to build.    Kansas schools are becoming the embarrassment of the land as a young, portly principal with blue hair at an Olathe grade school takes a liberal stand.  And a sex ed teacher in Derby is arrested for child endangerment.  Why is this happening in Kansas so often and not Missouri?    The teenager that attacked the usher at T-Mobile Center ten days ago has been charged on two counts of assault but his real punishment may be coming from his school.    The Chiefs have the top cornerback in the league through four games and it's not Trent McDuffie.  Sporting KC makes a big, bold hire to run soccer operations.  Tom Watson has some very strong opinions about the fans at the Ryder Cup while Paul Azinger has strong words for Rory McIlroy.    And our Final Final is a new bridge that is the highest and longest in the world.

Canary Cry News Talk
ANTI-ICE SHOOTING! Left-Wing Terrorism on the RISE, Trump Attacker Spills Blood in Court | CCNT 879

Canary Cry News Talk

Play Episode Listen Later Sep 25, 2025 136:43


ANTI-ICE SHOOTINGS - 09.24.2025 - #879 Take the Survey: https://tiny.cc/cc879 BestPodcastintheMetaverse.com Canary Cry News Talk #879 - 09.24.2025 - Recorded Live to 1s and 0s Deconstructing World Events from a Biblical Worldview Declaring Jesus as Lord amidst the Fifth Generation War! CageRattlerCoffee.com SD/TC email Ike for discount https://CanaryCry.Support   Send address and shirt size updates to canarycrysupplydrop@gmail.com   4TH ANNIVERSARY OF SENJESS AND COOLRUNNINGSMON!    Join the Canary Cry Roundtable This Episode was Produced By:   SIR KULLEN ANDERSON HOBO OF THE AMERICA'S   Executive Producers Sir LX Protocol V2 Baron of the Berrean Protocol*** Felicia D***   Producers of TREASURE (CanaryCry.Support) Malik, American Hobo   Producers of TIME Timestampers: Jade Bouncerson, Morgan E Clankoniphius Links: JAM   SHOW NOTES Greg on X even knew yesterday was the Rapture (X)   PROPAGANDA/IMMIGRANTS BREAKING: 2 dead, 1 shot at ICE facility in Texas (Guardian) Kash Patel Releases Photo of Anti-Ice “clip”  MSNBC GENIUS on Anti-ICE shooter (X/MSNBC)   → Clip: DHS uses Pokemon theme, gotta catch em all, deportation (X) → Clip: DHS uses Theo Von banger deportation video (X) → Post: Theo Von expresses frustration, DHS complies and takes down video (X)    → Trump and Epstein best friends statues, taken down (NY Post/X) → Trump Bitcoin statue    TRUMP/ASSASSANATION  Routh tries to stab himself in the neck after verdict    PROPAGANDA Left-Wing Terrorism Is on the Rise (Atlantic)   SPACE Nasa plans first manned moon mission in February 2026 (BBC)   EXECUTIVE PRODUCERS TALENT/TIME END

rSlash
r/Nuclearrevenge He Killed His Sister's Attacker

rSlash

Play Episode Listen Later Sep 8, 2025 21:12


0:00 Intro 0:07 Unaliving 6:33 Army revenge 15:10 Credit card Learn more about your ad choices. Visit megaphone.fm/adchoices