POPULARITY
Categories
The Alan Cox Show
The Alan Cox ShowSee omnystudio.com/listener for privacy information.
DOGE Put Critical Social Security Data at Risk, Whistle-Blower Says CISA warns of actively exploited Git code execution flaw Alleged mastermind behind K-Pop celebrity stock heist extradited to South Korea Huge thanks to our sponsor, Prophet Security Your security analysts didn't sign up to chase false alarms all day. With Prophet Security's AI SOC platform, they won't have to. It works like a tireless teammate—triaging and investigating alerts around the clock. Less burnout. Better coverage. And more time for meaningful work. Learn more atprophetsecurity.ai.
After a WSU Trump supporter was assaulted over a hat, a judge is sending the attacker (a WSU grad student) to jail. Crime is rampant in Seattle’s Belltown neighborhood. Sea-Tac airport is bracing for Labor Day travel. Voter registration numbers for the Democrats are dismal. President Trump issued an executive order aimed at ending cashless bail. // The Democrats continued to show that they’re completely out of touch at the annual DNC summer meeting. The great redistricting fight continues. // Trump is rolling out the National Guard all across the country to crack down on illegal immigration.
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.• Attackers are actively exploiting CVE-2023-46604, a remote code execution vulnerability in Apache ActiveMQ first disclosed in October 2023, that is used to compromise cloud-hosted Linux servers.• AshES Cybersecurity has publicly disclosed a critical zero-day vulnerability in Elastic's Endpoint Detection and Response (EDR) platform, specifically in the Microsoft-signed kernel driver elastic-endpoint-driver.sys.• At least a dozen ransomware groups are now deploying kernel-level EDR killers - tools designed specifically to disable endpoint detection and response solutions - as part of their malware arsenal.• Microsoft has released an in-depth technical analysis of PipeMagic, a modular backdoor linked to ransomware operations carried out by Storm-2460, a financially motivated threat group associated with RansomEXX.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
Transgender ATTACKER FINDS OUT after AMBUSHING ICE Agents with a KNIFE! FAFO!
Erik Menendez was denied parole at his first-ever hearing—36 years and a day after he and his brother Lyle killed their parents, Jose and Kitty Menendez. The board pointed to his prison behavior, past burglaries before the murders, and especially the killing of his mother in their decision. Now, all eyes are on Lyle's parole outcome. Michael Monks and members of the DTLA Residents Association met with city officials and business leaders to address one of downtown's toughest challenges: homelessness tied to acute mental illness episodes. Cracker Barrel lost nearly $100 million in market value after unveiling a new logo, sending shockwaves through investors. A man accused of attacking three people at a Rose Bowl concert has been arrested. Crozier shared his own story of recently having to step in during a similar confrontation.
AP correspondent Charles de Ledesma reports a memorial tree in France has been destroyed.
On this week's show Patrick Gray and Adam Boileau discuss the week's cybersecurity news, including: CISA warns about the path from on-prem Exchange to the cloud Microsoft awards a crisp zero dollar bill for a report about what a mess its internal Entra-authed apps are Everyone and their dog seems to have a shell in US Federal Court information systems Google pays $250k for a Chrome sandbox escape Attackers use javascript in adult SVG files to … farm facebook likes?! SonicWall says users aren't getting hacked with an 0day… this time. This week's episode is sponsored by SpecterOps. Chief product officer Justin Kohler talks about how the flagship Bloodhound tool has evolved to map attack paths anywhere. Bring your own applications, directories and systems into the graph, and join the identity attacks together. This episode is also available on Youtube. Show notes CISA, Microsoft issue alerts on ‘high-severity' Exchange vulnerability | The Record from Recorded Future News Advanced Active Directory to Entra ID lateral movement techniques Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications Cartels may be able to target witnesses after major court hack Federal judiciary tightens digital security as it deals with ‘escalated cyberattacks' | The Record from Recorded Future News Citrix NetScaler flaws lead to critical infrastructure breaches | Cybersecurity Dive DARPA touts value of AI-powered vulnerability detection as it announces competition winners | Cybersecurity Dive Buttercup is now open-source! HTTP/1.1 must die: the desync endgame US confirms takedown of BlackSuit ransomware gang that racked up $370 million in ransoms | The Record from Recorded Future News North Korean cyber-espionage group ScarCruft adds ransomware in recent attack | The Record from Recorded Future News Adult sites are stashing exploit code inside racy .svg files - Ars Technica Google pays 250k for Chromium sandbox escape SonicWall says recent attack wave involved previously disclosed flaw, not zero-day | Cybersecurity Dive Two groups exploit WinRAR flaws in separate cyber-espionage campaigns | The Record from Recorded Future News Tornado Cash cofounder dodges money laundering conviction, found guilty of lesser charge | The Record from Recorded Future News Hackers Hijacked Google's Gemini AI With a Poisoned Calendar Invite to Take Over a Smart Home | WIRED Malware in Open VSX: These Vibes Are Off How attackers are using Active Directory Federation Services to phish with legit office.com links Introducing our guide to phishing detection evasion techniques The State of Attack Path Management
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Security Weekly to discuss how to defend trust and reputation in the age of AI. Santosh will cover both the company and executive challenges of defending against the latest AI attacks, including: Impersonations and Deepfakes Employee Scams Financial Fraud Segment Resources: - https://styxintel.com/blog/what-is-brand-protection/ - https://styxintel.com/blog/brand-impersonation-hurts-business/ - https://styxintel.com/blog/social-engineering-tactics/ In the leadership and communications section, Mind the overconfidence gap: CISOs and staff don't see eye to eye on security posture, Your AI Strategy Needs More Than a Single Leader, Avoid These Communication Breakdowns When Launching Strategic Initiatives, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-408
The All Local Afternoon Update for Wednesday August 13th 2025
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Security Weekly to discuss how to defend trust and reputation in the age of AI. Santosh will cover both the company and executive challenges of defending against the latest AI attacks, including: Impersonations and Deepfakes Employee Scams Financial Fraud Segment Resources: - https://styxintel.com/blog/what-is-brand-protection/ - https://styxintel.com/blog/brand-impersonation-hurts-business/ - https://styxintel.com/blog/social-engineering-tactics/ In the leadership and communications section, Mind the overconfidence gap: CISOs and staff don't see eye to eye on security posture, Your AI Strategy Needs More Than a Single Leader, Avoid These Communication Breakdowns When Launching Strategic Initiatives, and more! Show Notes: https://securityweekly.com/bsw-408
As brands grow more digital, the threats grow more personal. Attackers impersonate executives, spin up fake websites, and leak sensitive data — hurting business reputations and breaking customer trust. How do you defend your organization's reputation and customers' trust? Santosh Nair, Co-Founder and CTO at Styx Intelligence, joins Business Security Weekly to discuss how to defend trust and reputation in the age of AI. Santosh will cover both the company and executive challenges of defending against the latest AI attacks, including: Impersonations and Deepfakes Employee Scams Financial Fraud Segment Resources: - https://styxintel.com/blog/what-is-brand-protection/ - https://styxintel.com/blog/brand-impersonation-hurts-business/ - https://styxintel.com/blog/social-engineering-tactics/ In the leadership and communications section, Mind the overconfidence gap: CISOs and staff don't see eye to eye on security posture, Your AI Strategy Needs More Than a Single Leader, Avoid These Communication Breakdowns When Launching Strategic Initiatives, and more! Visit https://www.securityweekly.com/bsw for all the latest episodes! Show Notes: https://securityweekly.com/bsw-408
Check out our sponsors: ✅ Patriot Mobile - https://patriotmobile.com/partners/chad Episode Description: Chad unloads on the latest bombshells rocking the political world! Leftist media outlets are forced to eat crow as they admit—yet again—that President Trump was right all along about tariffs, the economy, etc. Plus, one of the "BIG BALLS" attackers is revealed, and Chad's got the unfiltered scoop. Buckle up for hard-hitting commentary, razor-sharp wit, and the truth they don't want you to hear! Learn more about your ad choices. Visit megaphone.fm/adchoices
8-12 Adam and Jordana 11a hour
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Welcome to the "Week in Review," where we delve into the true stories behind this week's headlines. Your host, Tony Brueski, joins hands with a rotating roster of guests, sharing their insights and analysis on a collection of intriguing, perplexing, and often chilling stories that made the news. This is not your average news recap. With the sharp investigative lens of Tony and his guests, the show uncovers layers beneath the headlines, offering a comprehensive perspective that traditional news can often miss. From high-profile criminal trials to in-depth examinations of ongoing investigations, this podcast takes listeners on a fascinating journey through the world of true crime and current events. Each episode navigates through multiple stories, illuminating their details with factual reporting, expert commentary, and engaging conversation. Tony and his guests discuss each case's nuances, complexities, and human elements, delivering a multi-dimensional understanding to their audience. Whether you are a dedicated follower of true crime, or an everyday listener interested in the stories shaping our world, the "Week in Review" brings you the perfect balance of intrigue, information, and intelligent conversation. Expect thoughtful analysis, informed opinions, and thought-provoking discussions beyond the 24-hour news cycle. Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
We look at the FPL forwards and midfielders in various price brackets. ━━━━━━━━━━━━━
This week on the Active Self Protection Podcast we sit down with South African Self Defender Tubs and discuss the day he was at work at his family restaurant when a commotion drew him to the parking lot just in time to see a man rushing innocent citizens with a large glass bottle and how he had to react to protect life. More Info: https://fhftc.orgTo Donate: https://fhftc.org/donate/To Sign Up: https://fhftc.org/bullets-bibles-conference/Active Self Protection exists to help good, sane, sober, moral, prudent people in all walks of life to more effectively protect themselves and their loved ones from criminal violence. On the ASP Podcast you will hear the true stories of life or death self defense encounters from the men and women that lived them. If you are interested in the Second Amendment, self defense and defensive firearms use, martial arts or the use of less lethal tools used in the real world to defend life and family, you will find this show riveting. Join host and career federal agent Mike Willever as he talks to real life survivors and hear their stories in depth. You'll hear about these incidents and the self defenders from well before the encounter occurred on through the legal and emotional aftermath. Music: bensound.com
On September 30th Microsoft will only support a new unified multi-factor authentication control configuration. What does this mean for your nonprofit?In March 2023 Microsoft announced that after September 30th, 2025, they would no longer automatically support “legacy” multi-factor authentication controls in the Microsoft 365 Entra ID and General Admin administration portals. The methods your staff are using now will not automatically roll over to be allowed via the new admin dashboard after that date. Steve Longenecker, Community IT's Director of IT Consulting, explains to Carolyn the implications for nonprofits of this change and the Microsoft unified security administration deadline.The takeaways: The new unified authentication dashboard is available now to Microsoft 365 admins.The new Authentication Methods page does not inherit methods allowed in the legacy controls. An administrator needs to manually enable the MFA methods your organization wants to allow. Old MFA options your staff are using now will not roll over automatically to the new dashboard.Microsoft and Community IT are pushing admins to use this opportunity to to exclude less secure MFA methods. Community IT advises against allowing SMS texting and one-time codes sent to personal email addresses as MFA methods. You can upgrade and implement the new MFA and password reset options at any time, and we advise you to do this before September 30, whether or not Microsoft grants an extension of the deadline.If you just started using Microsoft 365 for Nonprofits, you don't need to worry about the deadline because your initial configuration would already be using the new Authentication Methods page. If you haven't made the change or don't know, you need to check before September 30, 2025.This change is visible only to Microsoft administrators, who should be making the change and informing staff where appropriate. If you are a nonprofit leader or board member and have not heard from your IT Director or outsourced IT, check with them to understand the plan for your organization. If you are a nonprofit staffer, pay attention to directions on using the safest MFA to protect your nonprofit.While not directly impacted by this deadline from Microsoft, Carolyn and Steve discuss the importance of “phish-resistant” MFA, preventing Attacker-in-the-Middle (AitM) attacks, for executives and staff working in finance, IT and other highly targeted areas of your operations. NOTE: The timelines on Microsoft changes do sometimes shift, and we are working to keep you updated. Please check for the most recent blog or podcast from us to ensure you have the most recent update. _______________________________Start a conversation :) Register to attend a webinar in real time, and find all past transcripts at https://communityit.com/webinars/ email Carolyn at cwoodard@communityit.com on LinkedIn Thanks for listening.
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00:00 - PreShow Banter™ — Stop Asking Wade if he's in Vegas00:02:16 - Perplexity Uses Stealth Crawlers to Evade No-Crawl Directives – 2025-08-0400:11:25 - Story # 1: Insurance won't cover $5M in City of Hamilton claims for cyberattack, citing lack of log-in security00:18:40 - Story # 2: States Enact Safe Harbor Laws that Provide Affirmative Defenses in Data Breach Litigation00:26:45 - Story # 3: Hackers Destroy Aeroflot's IT Infrastructure, Causing Over 42 Flight Cancellations00:34:18 - Story # 4: Attackers exploit link-wrapping services to steal Microsoft 365 logins00:40:09 - Story # 5: Mozilla flags phishing wave aimed at hijacking trusted Firefox add-ons00:42:18 - Wade's plugin recommendation00:44:39 - Story # 6: Perplexity is using stealth, undeclared crawlers to evade website no-crawl directives00:51:11 - Story # 7: After Backlash, ChatGPT Removes Option to Have Private Chats Indexed by Google00:55:21 - AI 202701:01:01 - What's Ralph been up to?
1. Scrutiny of the "Tea" Dating AppThe women-focused dating app "Tea" faces backlash after two data breaches exposed 72,000 sensitive images and 1.1 million private messages. Though security upgrades were promised, past data remained exposed, and the app lacks end-to-end encryption. Additionally, anonymous features enabling posts about men have sparked defamation lawsuits. Critics argue Tea prioritized rapid growth over user safety, exemplifying the danger of neglecting cybersecurity in pursuit of scale.2. North Korean Remote Work InfiltrationCrowdStrike has flagged a 220% surge in North Korean IT operatives posing as remote workers—over 320 cases in the past year. These operatives use stolen/fake identities, aided by generative AI to craft résumés, deepfake interviews, and juggle multiple jobs. Their earnings fund Pyongyang's weapons programs. The tactic reveals the limits of traditional vetting and the need for advanced hiring security.3. Airportr's Data ExposureUK luggage service Airportr suffered a major security lapse exposing passport photos, boarding passes, and flight details—including those of diplomats. CyberX9 found it possible to reset accounts with just an email and no limits on login attempts. Attackers could gain admin access, reroute luggage, or cancel flights. Although patched, the incident underscores risks of convenience services with poor security hygiene.4. Risks of AI-Generated CodeVeracode's "2025 GenAI Code Security Report" found that nearly 45% of AI-generated code across 80 tasks had security flaws—many severe. This highlights the need for human oversight and thorough reviews. While AI speeds development, it also increases vulnerability if unchecked, making secure coding a human responsibility.5. Microsoft's SharePoint Hack ControversyChinese state hackers exploited flaws in SharePoint, breaching hundreds of U.S. entities. A key concern: China-based Microsoft engineers maintained the hacked software, potentially enabling earlier access. Microsoft also shared vulnerability data with Chinese firms through its MAPP program, while Chinese law requires such data be reported to the state. This raises alarms about outsourcing sensitive software to geopolitical rivals.6. Russian Embassy Surveillance AttackRussia's "Secret Blizzard" hackers used ISP-level surveillance to deliver fake Kaspersky updates to embassies. These updates installed malware and rogue certificates enabling adversary-in-the-middle attacks—allowing full decryption of traffic. The attack shows the threat of state-level manipulation of software updates and underscores the need for update authenticity verification.7. Signal's Threat to Exit AustraliaSignal may pull out of Australia if forced to weaken encryption. ASIO's push for access contradicts Signal's end-to-end encryption model, which can't accommodate backdoors without global compromise. This standoff underscores a broader debate: encryption must be secure for all or none. Signal's resistance reflects the rising tension between privacy advocates and governments demanding access.8. Los Alamos Turns to AILos Alamos National Laboratory has launched a National Security AI Office, signaling a pivot from nuclear to AI capabilities. With massive GPU infrastructure and university partnerships, the lab sees AI as the next frontier in scientific and national defense. This reflects a shift in global security dynamics—where large language models may be as strategically vital as missiles.
Arkansas DA Is Protecting Child Predators By Prosecuting A Father Who Took Out Daughter's Attacker Description: What happens when the people who are supposed to prosecute predators instead turn their attention to the parents trying to stop them? In this explosive episode, we examine the disturbing implications of the case against Aaron Spencer, the Arkansas father who shot and killed Michael Fosler—the man accused of sexually assaulting and kidnapping his daughter. Defense attorney Bob Motta argues that this isn't just an overreach by prosecutors—it's a betrayal of public trust. Fosler had already been arrested on 43 felony counts including rape, grooming, and child pornography involving Spencer's 14-year-old daughter. Yet he walked out of jail on a $5,000 bond and went right back to contacting her, ultimately leading to her disappearance the night Spencer tracked down and fatally confronted him. Instead of thanking Spencer for saving his daughter, the Arkansas DA charged him with second-degree murder. Bob breaks down why this prosecution feels less like justice and more like protection for predators. He outlines the legal mechanisms that could—and should—shield Spencer under Arkansas's self-defense and stand-your-ground laws. And he asks a hard question the state doesn't seem eager to answer: why are they more invested in punishing a desperate father than preventing the next victim? If you're angry, you should be. If you're confused, you're not alone. This is a case where the system looks broken—and very few seem willing to fix it. #ProtectKidsNotPredators #AaronSpencer #TrueCrimeNews #ArkansasDA #HiddenKillers #BobMotta #StandYourGround #JusticeSystemFailure #ProsecutorialInjustice #ChildProtectionNow Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Arkansas DA Is Protecting Child Predators By Prosecuting A Father Who Took Out Daughter's Attacker Description: What happens when the people who are supposed to prosecute predators instead turn their attention to the parents trying to stop them? In this explosive episode, we examine the disturbing implications of the case against Aaron Spencer, the Arkansas father who shot and killed Michael Fosler—the man accused of sexually assaulting and kidnapping his daughter. Defense attorney Bob Motta argues that this isn't just an overreach by prosecutors—it's a betrayal of public trust. Fosler had already been arrested on 43 felony counts including rape, grooming, and child pornography involving Spencer's 14-year-old daughter. Yet he walked out of jail on a $5,000 bond and went right back to contacting her, ultimately leading to her disappearance the night Spencer tracked down and fatally confronted him. Instead of thanking Spencer for saving his daughter, the Arkansas DA charged him with second-degree murder. Bob breaks down why this prosecution feels less like justice and more like protection for predators. He outlines the legal mechanisms that could—and should—shield Spencer under Arkansas's self-defense and stand-your-ground laws. And he asks a hard question the state doesn't seem eager to answer: why are they more invested in punishing a desperate father than preventing the next victim? If you're angry, you should be. If you're confused, you're not alone. This is a case where the system looks broken—and very few seem willing to fix it. #ProtectKidsNotPredators #AaronSpencer #TrueCrimeNews #ArkansasDA #HiddenKillers #BobMotta #StandYourGround #JusticeSystemFailure #ProsecutorialInjustice #ChildProtectionNow Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Twenty years after he tried to light the surrounding forests on fire, Japanese pilot Nobuo Fujita returned to Brookings as an honored guest and presented the town with his family's Samurai sword. (Brookings, Curry County; 1960s) (For text and pictures, see https://offbeatoregon.com/1305c-japanese-pilot-fujita-friendship-with-brookings.html)
Devils Den Attacker Andrew McGann, Was Also An Alleged Child Predator With Claims Ignored In this gripping episode, we delve into the chilling case of James Andrew McGann, the 28-year-old suspect in the brutal double homicide at Devil's Den State Park, Arkansas, where he allegedly stabbed a married couple to death in front of their young daughters. But the horror doesn't stop there—McGann, a former elementary school teacher who went by "Drew," faced ignored complaints of inappropriate behavior toward young female students during his brief career. Despite parental reports of him being "very touchy" with girls, placing them on his lap, and making unsettling comments, internal investigations in Texas found no substantiation, allowing him to resign quietly and shuffle between districts in Texas, Oklahoma, and Arkansas without red flags. We expose the systemic failures known as "passing the trash," where schools prioritize avoiding scandal over child safety, enabling potential predators to evade accountability. Featuring interviews with affected parents like Sierra Marcum and insights from experts on educator misconduct, this episode uncovers how warning signs were dismissed, leaving a trail of vulnerability that culminated in tragedy. #DevilsDenHomicide #AndrewMcGann #AllegedPredator #PassingTheTrash #SchoolSystemFailure #TeacherMisconduct #ChildSafety #TrueCrime #ArkansasMurder #IgnoredComplaints #EducatorAccountability #PodcastEpisode Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Hidden Killers With Tony Brueski | True Crime News & Commentary
Devils Den Attacker Andrew McGann, Was Also An Alleged Child Predator With Claims Ignored In this gripping episode, we delve into the chilling case of James Andrew McGann, the 28-year-old suspect in the brutal double homicide at Devil's Den State Park, Arkansas, where he allegedly stabbed a married couple to death in front of their young daughters. But the horror doesn't stop there—McGann, a former elementary school teacher who went by "Drew," faced ignored complaints of inappropriate behavior toward young female students during his brief career. Despite parental reports of him being "very touchy" with girls, placing them on his lap, and making unsettling comments, internal investigations in Texas found no substantiation, allowing him to resign quietly and shuffle between districts in Texas, Oklahoma, and Arkansas without red flags. We expose the systemic failures known as "passing the trash," where schools prioritize avoiding scandal over child safety, enabling potential predators to evade accountability. Featuring interviews with affected parents like Sierra Marcum and insights from experts on educator misconduct, this episode uncovers how warning signs were dismissed, leaving a trail of vulnerability that culminated in tragedy. #DevilsDenHomicide #AndrewMcGann #AllegedPredator #PassingTheTrash #SchoolSystemFailure #TeacherMisconduct #ChildSafety #TrueCrime #ArkansasMurder #IgnoredComplaints #EducatorAccountability #PodcastEpisode Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
Devils Den Attacker Andrew McGann, Was Also An Alleged Child Predator With Claims Ignored In this gripping episode, we delve into the chilling case of James Andrew McGann, the 28-year-old suspect in the brutal double homicide at Devil's Den State Park, Arkansas, where he allegedly stabbed a married couple to death in front of their young daughters. But the horror doesn't stop there—McGann, a former elementary school teacher who went by "Drew," faced ignored complaints of inappropriate behavior toward young female students during his brief career. Despite parental reports of him being "very touchy" with girls, placing them on his lap, and making unsettling comments, internal investigations in Texas found no substantiation, allowing him to resign quietly and shuffle between districts in Texas, Oklahoma, and Arkansas without red flags. We expose the systemic failures known as "passing the trash," where schools prioritize avoiding scandal over child safety, enabling potential predators to evade accountability. Featuring interviews with affected parents like Sierra Marcum and insights from experts on educator misconduct, this episode uncovers how warning signs were dismissed, leaving a trail of vulnerability that culminated in tragedy. #DevilsDenHomicide #AndrewMcGann #AllegedPredator #PassingTheTrash #SchoolSystemFailure #TeacherMisconduct #ChildSafety #TrueCrime #ArkansasMurder #IgnoredComplaints #EducatorAccountability #PodcastEpisode Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspod Instagram https://www.instagram.com/hiddenkillerspod/ Facebook https://www.facebook.com/hiddenkillerspod/ Tik-Tok https://www.tiktok.com/@hiddenkillerspod X Twitter https://x.com/tonybpod Listen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872
A woman is warning prosecutors to prepare for her demise, after a dangerous abuser with a violent history is freed -- despite her brutal 2-week kidnapping, torture ordeal. A monster, who sadistically tortured & killed his ex, is finally caged after a more than week-long manhunt. His mother is also behind bars accused of helping to cover up the horrific crime. Plus, a deep-fried dispute leaves a couple customers burned! Jennifer Gould reports. See omnystudio.com/listener for privacy information.
Yesterday, five men were sentenced to between 8 and a half and 14 years for their involvement in the horrific torture of Natalie Ennis, after they pleaded guilty to her false imprisonment and assault causing harm at a flat in Henrietta House in Dublin on the 26th of September last year. Natalie spoke to Claire in studio.
July 29, 2025 ~ Chris, Lloyd, and Jamie talk with Alli Baxter, multimedia journalist at UpNorthLive News, to recount the law enforcement and media's rapid response to a mass stabbing at a Traverse City Walmart.
Headlines: – Welcome to Mo News (02:00) – National Chocolate Day: Chocolate Price Going Up (02:30) – Michigan Walmart Mass Stabbing Suspect Faces Terrorism Charge (06:40) – Israel Announces Daily Military Pause In Gaza Amid International Pressure, Aid Airdrops Resume (10:00) – U.S. And E.U. Reach Tariff Agreement As Friday Deadline Looms (18:20) – Thailand, Cambodia Set For Ceasefire Talks After Trump's Push (23:00) – Democrats Polling Their Worst With Voters In Decades (24:50) – U.S. Birth Rate Hits All-Time Low (27:30) – Gwyneth Paltrow Hired By Astronomer As Temp Spokesperson After Coldplay KissCam Scandal (33:30) – On This Day In History (35:50) Thanks To Our Sponsors: – LMNT - Free Sample Pack with any LMNT drink mix purchase – Industrious - Coworking office. 30% off day pass – Athletic Greens – AG1 Powder + 1 year of free Vitamin D & 5 free travel packs – Incogni - 60% off an annual plan| Promo Code: MONEWS
The show-ending “Smoking Gun” segment on the Monday Bob Rose Show 7-28-25
Who is Juventus top 5 goalkeeper, defender, midfielder & attacker of all time? Nima Tavallaey and Carlo Garganese debate, discuss, and analyze a question on this topic sent in from patron/YouTube member. This is an extended clip from this weeks Q & A episode of The Italian Football Podcast available only to patrons on Patreon.com/TIFP and on YouTube Memberships. To listen to this & all other full episodes of The Italian Football Podcast (and support the show), go to Patreon.com/TIFP OR now also available on Spotify OR YouTube Memberships and sign up. Your support makes The Italian Football Podcast possible. Follow us: Twitter, Facebook, Instagram, YouTube Learn more about your ad choices. Visit podcastchoices.com/adchoices
Israel, long a prime target for cyber attacks, has seen a dramatic increase since the war with Iran last month. The cyber attackers are not just hitting institutional sights, but also going after civilians with sophisticated phishing campaigns, mostly to steal money. Reporter Arieh O’Sullivan spoke with Ori Segal, a co-founder and CEO of Cyvore, an Israeli cybersecurity firm, about the minds of the attackers and cautionary measures everyone should take. (photo: shuttersock) See omnystudio.com/listener for privacy information.
“Detection is not the end—it's just the beginning.” — Jerry Mancini, NETSCOUT In this episode of Technology Reseller News, Publisher Doug Green speaks with Jerry Mancini of NETSCOUT about the company's latest advancements in automated threat detection and response—with a particular focus on why telecommunications networks are uniquely vulnerable and high-value targets. NETSCOUT, long known for its deep packet inspection and network performance management, is expanding the capabilities of its adaptive threat analytics—a platform designed not only to detect threats but also to assemble and contextualize them using network-level intelligence. Beyond Detection: Seeing the Full Picture While most cybersecurity tools focus on isolated detections—EDR, firewall logs, and suspicious indicators—NETSCOUT's approach centers on reconstructing the complete threat narrative across the enterprise. By capturing packet data continuously and using workflows to connect disparate detections, NETSCOUT enables investigators to: Understand the root cause and lateral movement Detect activity before and after a flagged incident Integrate signals from multiple sources (EDR, NDR, WAF, and more) Investigate threats in real time and retrospectively Why Telcos Are at Greater Risk Mancini highlights the unique role of telco infrastructure in global data movement, making them prime targets for cyber espionage and traffic manipulation. Attackers, such as the Salt Typhoon group, have used compromised routers and peering points to reroute and eavesdrop on massive data flows—impacting not just carriers but their customers across the internet. Best Practices for Threat Hunters NETSCOUT supports both bottom-up investigations (starting with a detected incident) and top-down threat hunts (searching for indicators tied to known campaigns). The platform's ability to store and search packet-level data gives teams visibility that goes far beyond typical log-based detection tools. Mancini's key advice: “You need more than alerts—you need the data to trace back, understand what happened, and act before it's too late.” Where to Learn More Visit netscout.com to explore solutions in: Network Performance Management DDoS Detection & Mitigation Adaptive Threat Analytics NETSCOUT supports both enterprise and service provider environments and is available to assist with immediate and long-term threat management strategies.
A single compromised password led to the collapse of 158-year-old UK logistics firm KNP, after hackers—suspected to be the Akira gang—used it to gain access, encrypt systems, and demand a £5 million ransom. Unable to pay, the company lost all its data and folded, putting 700 employees out of work. The breach underscores how weak access controls can have catastrophic consequences.To counter massive botnets, Google is now combining technical defenses with legal action. Its lawsuit against the “BadBox 2.0” operators marks a major shift: targeting criminals behind malware that infected over 10 million Android devices. Google's strategy includes leveraging the CFAA and RICO Act to not just stop malware but dismantle the entire criminal infrastructure—signaling a more aggressive, litigation-driven cybersecurity era.Meanwhile, a new malware delivery method is exploiting DNS—a common but often under-monitored network function. Attackers hide malware in DNS TXT records, break it into chunks, and reassemble it on target systems using standard DNS queries. Since DNS traffic is rarely scrutinized, this technique bypasses traditional defenses, making DNS monitoring essential for comprehensive protection.Travelers to China face serious privacy risks. Authorities are using malware like “Massistant” to extract sensitive data from mobile phones during inspections. Developed by Chinese firm Meiya Pico, the software accesses encrypted texts, location history, and even Signal messages upon installation. Though evidence of compromise may remain, the intrusion happens before detection, raising concerns for anyone bringing devices into the country.China has also shifted its cyberattack strategy by outsourcing operations to private firms. These companies now discover and sell zero-day vulnerabilities to government agencies. This model, which evolved from loosely affiliated hacker groups, blurs the line between state and private enterprise, making attribution difficult. As a result, China-linked hackers increasingly infiltrate U.S. critical infrastructure while masking their origins, and exposure alone no longer seems to deter them.In response to national security concerns, Microsoft has removed China-based engineers from U.S. military cloud projects. A ProPublica investigation revealed their prior involvement, prompting a Pentagon ban on such support. Previously, Chinese engineers worked under U.S. supervision, a practice now deemed too risky for defense-related systems.Microsoft's SharePoint is also under siege. Chinese state actors exploited a critical flaw dubbed “ToolShell” to compromise at least 54 organizations, including those in critical infrastructure. The attack allowed for deep system access, extraction of encryption keys, and installation of web shells—despite prior patches. The incident stresses the need for rapid patching and vigilance, even on widely used enterprise platforms.Cyberwarfare is influencing real-world military dynamics. Ukrainian cyber operatives claim to have digitally crippled a major Russian drone manufacturer, deleting 47TB of production data and disabling access systems. Allegedly backed by military intelligence, the attack highlights how digital sabotage can directly disrupt military production and reshape conflict outcomes. Code is now as consequential as conventional weapons on the modern battlefield.
The Medcurity Podcast: Security | Compliance | Technology | Healthcare
The domain looks right. The logo checks out. Even the login page feels familiar. But it isn't what it seems.Attackers are using subtle domain tricks—like typos, lookalike characters, and spoofed subdomains—to mimic trusted names in healthcare. These aren't high-tech hacks. They rely on speed, habit, and trust.Once you know what to watch for, they're easier to stop. Listen to the latest Medcurity Podcast for real examples and smart ways to stay ahead.Learn more about Medcurity here: https://medcurity.com#Healthcare #Cybersecurity #Compliance #HIPAA #SecurityRiskAnalysis
In this dynamic episode of The Segment, two of cybersecurity's biggest names reunite with host, Raghu Nandakumara, for a no-holds-barred conversation: John Kindervag, the godfather of Zero Trust, and Dr. Chase Cunningham, aka Dr. Zero Trust. What unfolds is a fast-paced, insight-packed dialogue that spans decades of hard-earned wisdom, unexpected humor, and a shared mission to demystify modern cyber defense.John and Chase reflect on the global evolution of Zero Trust—from its scrappy beginnings to its widespread adoption by Fortune 500s, military leaders, and even elder care facilities. They dive into why context-driven maps are now indispensable, how graph-based security is reshaping the cyber terrain, and where AI and automation can give defenders a real edge. Expect candid takes on the limits of SIEMs, the failure of red teaming without strategy, and why defenders need to start thinking like attackers if they want to win.There's personal reflection too—Chase shares why he was reluctant to pick up the Zero Trust torch, and John opens up about the real heart behind the strategy. With wit, war stories, and straight talk, they make a clear case: cybersecurity isn't about perfection—it's about deterrence, resilience, and knowing what truly matters. Topics Covered:The origin and global adoption of Zero Trust Why “good maps” are critical for cyber resilience Real-world applications of AI in cyber defense Why attackers often outmaneuver defenders—and how to change that The psychology of leadership in cybersecurity strategy From Chick-fil-A to Bletchley Park: the unexpected places Zero Trust shows up Chase's take on stock-picking based on breach trends (yes, really) Resources Mentioned:Think Like an Attacker by Dr. Chase Cunningham John Kindervag's Zero Trust 5-Step Model “Zero Trust Terrain & Holding the High Ground” LinkedIn Live Stay Connected with our host, Raghu on LinkedInFor more information about Illumio, check out our website at illumio.com
This week on The Home Defense Show Skip and Sara discuss why Sara's throwing all his stuff away. Then we talk with Gil Maza about violence against ICE agents and we wrap up with Steve Sulze on the advisability of using karate against an armed attacker.
Attackers are increasingly abusing the same remote access tools that IT teams rely on every day. In this episode, Hazel sits down with Talos security researcher Pierre Cadieux to unpack why these legitimate tools have become such an effective tactic for adversaries.Pierre explains how the flexibility, legitimacy, and built-in capabilities of remote access management tools make them ideal for attackers who want to stay under the radar. They discuss trends Talos Incident Response is seeing in the field, examples of commonly abused tools, and the challenges defenders face when trying to detect misuse.You'll also hear practical advice on what defenders and IT teams can do today to better secure their environments — and what the rise of remote access management tool abuse tells us about attacker behavior and the current state of cybercrime.Resources mentioned:Talos Incident Response Quarterly Trends ReportWhen Legitimate Tools Go Rogue (Talos Blog)
Congressman Max Miller joins Bob to talk about charges being filed against the man accused of an antisemitic attack that took place in Ricky River on June 19. Rep. Miller discusses the danger he was placed in, and that of his family if his child had been in the car, as well as the political violence committed in the name of antisemitism and anti-Zionism in general. The Westlake doctor who tried to run him off the road and threatened to kill him has been charged with 2 felonies and several misdemeanors.See omnystudio.com/listener for privacy information.
FBI has launched a criminal investigation of James Comey and John Brennan for their roles in investigating the alleged collusion between Trump and Russia. Visit the Howie Carr Radio Network website to access columns, podcasts, and other exclusive content.
Connor Southwell (@cjsouthwell1902) is joined by Brøndby IF fan and writer Toke Theilade (@TokeTheilade) to discuss Norwich City's seventh first-team summer signing. *** With thanks to our podcast sponsor - First Bus. ** Picture: Norwich City FC *** You can also hear the Pink Un Podcast on Norwich's Community radio station, Future Radio 107.8FM. *** To get in touch with the podcast now and in future, send any comments and questions into the crew with an email to norfolksport@archant.co.uk or get in touch with us @pinkun on Twitter, where our direct messages are open. And if you're interested in sponsoring the pod, or placing an advert in one of our shows, email connor.southwell@newsquest.co.uk ALSO FIND US AT THE FOLLOWING: Subscribe: pinkun.com/podcast Twitter: twitter.com/pinkun Facebook: fb.me/thepinkun Instagram: instagram.com/the_pinkun Find more details on how you can sign up to Pink Un+ here: https://www.pinkun.com/pinkunplus/ #ncfc #norwichcity #norwich
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Quick Password Brute Forcing Evolution Statistics After collecting usernames and passwords from our ssh and telnet honeypots for about a decade, I took a look back at how scans changed. Attackers are attempting more passwords in each scans than they used to, but the average length of passwords did not change. https://isc.sans.edu/diary/Quick%20Password%20Brute%20Forcing%20Evolution%20Statistics/32068 Introducing FileFix A New Alternative to ClickFix Attacks Attackers may trick the user into copy/pasting strings into file explorer, which will execute commands similar to the ClickFix attack that tricks users into copy pasting the command into the start menu s cmd feature. https://www.mobile-hacker.com/2025/06/24/introducing-filefix-a-new-alternative-to-clickfix-attacks/ Threat Actors Modify and Re-Create Commercial Software to Steal User s Information A fake Sonicwall Netextender clone will steal user s credentials https://www.sonicwall.com/blog/threat-actors-modify-and-re-create-commercial-software-to-steal-users-information
International law enforcement takes down a darknet drug marketplace. The Washington Post is investigating a cyberattack targeting several journalists' email accounts. Anubis ransomware adds destructive capabilities. The GrayAlpha threat group uses fake browser update pages to deliver advanced malware. Researchers uncover a stealthy malware campaign that hides a malicious payload in a JPEG image. Tenable patches three high-severity vulnerabilities in Nessus Agent. Attackers can disable Secure Boot on many Windows devices by exploiting a firmware flaw. Lawmakers introduce a bipartisan bill to strengthen coordination between CISA and HHS. Harry Coker reflects on his tenure as National Cyber Director. Maria Varmazis checks in with Brandon Karpf on agentic AI. When online chatbots overshare, it's no laughing Meta. CyberWire Guest Joining us today to discuss Agentic AI and it relates to cybersecurity and space with T-Minus Space Daily host Maria Varmazis is Brandon Karpf, friend of the show, founder of T-Minus Space Daily, and cybersecurity expert. Selected Reading Police seizes Archetyp Market drug marketplace, arrests admin (Bleeping Computer) Washington Post investigating cyberattack on journalists' email accounts, source says (Reuters) Anubis Ransomware Packs a Wiper to Permanently Delete Files (SecurityWeek) GrayAlpha Hacker Group Weaponizes Browser Updates to Deploy PowerNet Loader and NetSupport RAT (Cyber Security News) Malicious Payload Uncovered in JPEG Image Using Steganography and Base64 Obfuscation (Cyber Security News) Tenable Fixes Three High-Severity Flaws in Vulnerability Scanner Nessus (Infosecurity Magazine) Microsoft-Signed Firmware Module Bypasses Secure Boot (Gov Infosecurity) Bipartisan bill aims to create CISA-HHS liaison for hospital cyberattacks (The Record) Coker: We can't have economic prosperity or national security without cybersecurity (The Record) The Meta AI app is a privacy disaster (TechCrunch) Audience Survey Complete our annual audience survey before August 31. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Bill O'Reilly talks about new crime stats for New York City. Learn more about your ad choices. Visit megaphone.fm/adchoices