POPULARITY
Categories
Ever wondered what happens to your online accounts when you're gone?
A reputed rival to Sussan Ley is refusing to categorically rule out challenging the Liberal leadership, saying he isn't planning on it; Donald Trump has threatened legal action against the BBC over the way a speech he made was edited in a documentary aired by the broadcaster; The Wiggles have admitted to selling a popular headband for kids without warning parents about the dangers of button batteries; Hungarian-British writer David Szalay has won this year's Booker Prize for fiction with his novel, Flesh. Support independent women's media CREDITS Host/Producer: Ailish Delaney Audio Production: Lu HillBecome a Mamamia subscriber: https://www.mamamia.com.au/subscribeSee omnystudio.com/listener for privacy information.
John Barucci joins the show to break down his real-life data breach. John thought he had all the right safeguards in place: cyber insurance, firewalls, security training, and a written information security plan. But a single click on what appeared to be a Social Security Administration email led to bad actors accessing nine client files, altering returns, and changing bank account information in just 38 minutes.SponsorsPadgett - Contact Padgett or Email Jeff PhillipsGet NASBA Approved CPE or IRS Approved CELaunch the course on EarmarkCPE to get free CPE/CE for listening to this episode.Chapters(00:00) - Introduction and Greetings (00:56) - Current Events and Government Shutdown (01:56) - PTIN Renewal and Security Measures (02:59) - Introducing John Bucci's Story (04:34) - John Bucci's Cybersecurity Breach Experience (06:18) - Detailed Chronology of the Breach (18:38) - Immediate Actions Taken Post-Breach (22:14) - IRS and Software Company Responses (27:02) - Client Communication and Further Steps (30:34) - The Weight of Responsibility in Tax Practice (31:22) - The Importance of Having a Plan (32:28) - Immediate Actions Post-Breach (32:53) - Involvement of Thomson Reuters and Stopping the Breach (34:21) - Forensic Investigation and Legal Steps (35:48) - Cyber Insurance and Its Benefits (37:50) - IRS Practitioner Relief Program (43:27) - Final Reflections and Lessons Learned (50:02) - Conclusion and Final Thoughts Follow the Federal Tax Updates Podcast on Social Mediatwitter.com/FedTaxPodfacebook.com/FedTaxPodlinkedin.com/showcase/fedtaxpodConnect with John: https://www.linkedin.com/in/johnbarucciConnect with the Hosts on LinkedInRoger HarrisAnnie SchwabReviewLeave a review on Apple Podcasts or PodchaserSubscribeSubscribe to the Federal Tax Updates podcast in your favorite podcast app!This podcast is a production of Earmark MediaThe full transcript for this episode is available by clicking on the Transcript tab at the top of this pageAll content from this podcast by SmallBizPros, Inc. DBA PADGETT BUSINESS SERVICES is intended for informational purposes only.
Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst In today's episode, we cover the breach at the US Congressional Budget Office and its implications on national security, Microsoft Teams' chat feature being exploited for phishing attacks, and the increasing use of AI in cyber attacks. We also highlight how Canadian veterans are being retrained for careers in cybersecurity through the Coding for Veterans program. Hosted by Jim Love, we thank Meter for supporting this podcast with their complete networking stack solutions. 00:00 Introduction and Sponsor Message 00:51 US Congressional Budget Office Breach 02:27 Microsoft Teams Phishing Exploit 03:42 AI in Cybersecurity Attacks 06:09 Veterans in Cybersecurity 07:44 Conclusion and Sponsor Message
Guest: Ari Herbert-Voss, CEO at RunSybil Topics: The market already has Breach and Attack Simulation (BAS), for testing known TTPs. You're calling this 'AI-powered' red teaming. Is this just a fancy LLM stringing together known attacks, or is there a genuine agent here that can discover a truly novel attack path that a human hasn't scripted for it? Let's talk about the 'so what?' problem. Pentest reports are famous for becoming shelf-ware. How do you turn a complex AI finding into an actionable ticket for a developer, and more importantly, how do you help a CISO decide which of the thousand 'criticals' to actually fix first? You're asking customers to unleash a 'hacker AI' in their production environment. That's terrifying. What are the 'do no harm' guardrails? How do you guarantee your AI won't accidentally rm -rf a critical server or cause a denial of service while it's 'exploring'? You mentioned the AI is particularly good at finding authentication bugs. Why that specific category? What's the secret sauce there, and what's the reaction from customers when you show them those types of flaws? Is this AI meant to replace a human red teamer, or make them better? Does it automate the boring stuff so experts can focus on creative business logic attacks, or is the ultimate goal to automate the entire red team function away? So, is this just about finding holes, or are you closing the loop for the blue team? Can the attack paths your AI finds be automatically translated into high-fidelity detection rules? Is the end goal a continuous purple team engine that's constantly training our defenses? Also, what about fixing? What makes your findings more fixable? What will happen to red team testing in 2-3 years if this technology gets better? Resource: Kim Zetter Zero Day blog EP230 AI Red Teaming: Surprises, Strategies, and Lessons from Google EP217 Red Teaming AI: Uncovering Surprises, Facing New Threats, and the Same Old Mistakes? EP68 How We Attack AI? Learn More at Our RSA Panel! EP71 Attacking Google to Defend Google: How Google Does Red Team
Featuring: Ammosart, Ashgar, Belghast, Kodra, Tamrielo, and Thalen We start off the show with some discussion about Geek Girl Con and how it is a great experience for the entire family. From there, Ash has played a bit more Daggerheart and discusses how not having initiative in that game actually works out really well. Kodra is trying a new mine build in Path of Exile 3.2,7 and we talk a bit about how Rolling Magma Mine has been working. Bel has finished most of the endgame prep and discusses the state of his build and how Breach has been working as a league mechanic. Touhou gets a little less difficult to engage with as Fantasy Maiden Wars attempts to present twenty years worth of assorted games into something more approachable. Tam revisited VTM Bloodlines 2 and thinks that maybe we are misremembering the first game, and how the thing that exists is actually pretty good if you give it enough time. Lastly, Bel finished Frieren this weekend and talks a bit about it being really good and well worth watching. Topics Discussed: Geek Girl Con 2025 Daggerheart Initiative is Overrated Path of Exile 3.27 Rolling Magma Mines Breach So Far Fantasy Maiden Wars Super Robot Wars With Shrine Maidens Touhou VTM Bloodlines 2 Revisited Frieren is Great
In this episode, James talks to Charles Herring about what happens when an IT wizard runs away to join the Navy, works on fighter jets, and then gets thrown into cybersecurity right after 9/11? He shares his unconventional journey from the Wild West days of network defense—complete with fighting worms with worms—to being CISO during the Target breach. Plus: why trauma creates silos, why your SOC is like throwing receipts in garbage bags, and what it takes to build a "good neighborhood" in cybersecurity.
In this episode: With the start of the Florida Legislature's 2026 session approaching, lawmakers just revived two big bills they failed to pass during their last session. One would give fetuses some of the same legal rights as living children — and further cement into law a legal theory known as “fetal personhood” that conservative legal groups want to use to cut off all access to abortion. Another would help fertilizer giant Mosaic Co. fend off lawsuits related to radioactive contamination left behind in the company's former phosphate mines. Show notesThe bill's discussed in today's show: Senate Bill 164 — Civil Liability for the Wrongful Death of an Unborn ChildHouse Bill 167 — Former Phosphate Mining LandsFor further reading (and listening) about fetal personhood and Mosaic's proposed legal shield: Florida AG made sweeping claims in confidential abortion caseFlorida politicians will go further to interfere with abortion – unless Florida voters stop themFlorida lawmakers may help a mining giant fend off lawsuitsMosaic's Next Chapter (Florida Trend - July 2018)And the the story mentioned at the very end of the show: Florida lawmakers took instructions from a landowner's lobbyist. Now Florida taxpayers will pay $83 million for four acres. Get full access to Seeking Rents at jasongarcia.substack.com/subscribe
On this episode of The Sick Podcast, Glenn Crooks and Roberto Abramowitz discuss New York City FC's game 2 loss to Charlotte FC in penalties, the deciding match in Charlotte, why New York may actually have an advantage for game 3, modern penalty techniques, disappointing attendance at Yankee Stadium and much more! Learn more about your ad choices. Visit megaphone.fm/adchoices
Welcome to the Identity Theft Resource Center's (ITRC) Weekly Breach Breakdown for November 7, 2025. I'm Tatiana Cuadras, Communications Assistant for the ITRC. Thanks to SentiLink for their support of the podcast and the ITRC. Each week, we look at the most recent events and trends related to data security and privacy. This week, we discuss how artificial intelligence (AI) search tools can be fooled by fake content, a form of AI manipulation that's reshaping how systems learn and interpret information. I assume that we are all aware of how AI is reshaping how we access and process information. However, it turns out some of these “smart” systems aren't as smart as we thought. In fact, new research shows that AI can be fooled easily. Think of it like your mom seeing an AI-generated photo of you and Michael Jackson on Facebook and telling all her coworkers that you actually met the Michael Jackson. The image looks so real that she believes it even though it's completely fake. That's exactly how some AI systems get “fooled” by realistic but false information. Follow on LinkedIn: www.linkedin.com/company/idtheftcenter/ Follow on Twitter: twitter.com/IDTheftCenter
President and Senior Lecturer of Repairers of The Breach and Moral Mondays, Bishop William J. Barber II, talks about the redistricting effort in North Carolina, his meeting with U.S. House Minority Leader Hakeem Jeffries and more.Become a supporter of this podcast: https://www.spreaker.com/podcast/tavis-smiley--6286410/support.
大主播:Flora(一席老师) 小主播:Shine(一席学生)01. OpenAI Moves to Generate AI Music in Potential Rivalry with Startup SunoOpenAI进军AI音乐生成领域,或将与初创公司Suno展开竞争近期,The Information报道了一条标题为OpenAI Moves to Generate AI Music in Potential Rivalry with Startup Suno 的新闻。OpenAI,是美国一个人工智能研究实验室,用来开发人工智能。例如:ChatGPT就是OpenAI研发的。Move to是“移动到……”,更具体一些就是“开始或着手做……”��What does Open AI move to do?To generate AI music.Generate(读音/ˈdʒenəreɪt/),意思是“生成”。例如:现在用AI生成的图片我们就可以说:AI-generated images.那么OpenAI moves to generate AI music就是“OpenAI要开始做AI音乐”。[图源网络]��OpenAI是第一家开始做AI music的公司吗?其实并不是,我们往后看就知道啦:后面的介词短语in potential rivalry说明了OpenAI这么做其实是陷入潜在的竞争之中。Potential(读音/pəˈtenʃ(ə)l/),意思是“潜在的,有可能的”;同时,我们的“潜力”也可以用potential。Rivalry(读音/ˈraɪv(ə)lri/)是“竞争、较量”。词根是rival,意思是“竞争对手”;再加上一个后缀-ry就变成了“竞争选手之间的较量”。所以,in potential rivalry意思就是“陷入潜在的竞争”。��But who is Open AI's rival?Startup Suno.Start up这个短语是“启动”的意思。不过这里start和up中间没有空格,startup是一个单词,意思是“刚刚启动的公司”,也就是“初创企业”。所以startup Suno意思就是“初创企业Suno”。标题用了一个with startup Suno,说明Open AI的潜在竞争者是一个叫Suno的初创公司。[图源网络]��Back Info:Suno可以直接用AI生成纯音乐,也可以生成含有人声的歌曲。所以新闻标题OpenAI Moves to Generate AI Music in Potential Rivalry with Startup Suno 意思就是:OpenAI进军AI音乐生成领域,或将与初创公司Suno展开竞争。新闻来源:The Information试想一下:��OpenAI进军AI音乐,会对我们听音乐有影响吗?AI音乐会变得更多吗?可能以后我们会听到更多用 AI 创作的曲子,音乐创作会更快、定制音乐也会更方便。但也有人担心版权问题,还担心人类创作者的工作会不会因此受到影响。欢迎大家在评论区留言自己喜欢的歌。除此之外,你想不想听AI的改编版呢?02. Gmail-Linked Credentials Exposed in Massive BreachGmail联合账户的登录凭证在一次大规模数据泄露中被曝光2025年10月28日,科技网站TechRepublic报道了一则标题为Gmail-Linked Credentials Exposed in Massive Breach的新闻。这是一起大规模数据泄露事件,引起广泛轰动。Gmail是谷歌的邮箱。前面的G就是取了Google的首字母G,所以叫Gmail。��What happened to Gmail?Gmail-Linked credentials exposed.Link是“链接”的意思,在第一期栏目中我们曾提到过:星链卫星就是starlink satellite。在标题中,它和Gmail组合在一起再加后缀-ed构成了一个形容词。Gmail-Linked意思就是“和Gmail相连接的”。所以,……linked就是“和……相连接的”。��Then what is linked to Gmail? Credentials. Gmail-Linked credentials.Credentials(读音/krəˈdenʃ(ə)lz/)原本有“资格证”的意思。1)词根-cred来源于拉丁语,意思是“信任”。比如credit就有“信用”的意思;2)后面的-ent表示“有某种性质”——专门用来构成名词或者形容词;3)结尾加一个-ial,表示“和……有关的事物”。那么和具备信任相关的事物,就是“凭证”的意思。所以,Gmail-Linked credentials就是“和Gmail相连接的凭证”。��Back Info:这里的凭证是指登录凭证,比如我们平时登录需要的账号和密码;又因为Gmail 邮箱一般会绑定其他的平台,所以Gmail-Linked credentials是指“跟Gmail绑定账户的登录凭证”,或者也可以说“Gmail联合账户的登录凭证”。因此,一旦Gmail邮箱被泄露,不只是谷歌邮箱本身有风险,跟Gmail登录系统绑定的账号同样会陷入危险之中。所以标题才说Gmail-Linked credentials exposed。Expose(读音/ɪkˈspoʊz/)意思是“泄露”。Ex-意思是“向外”,-pose意思是“放”,那合起来expose向外放,也就是“暴露”。我们不难发现,在标题中exposed前省略了be动词。完整的表达应该是:Gmail-Linked credentials are exposed。��那这次有多少账户的数据被泄露了呢?In massive breach.Massive(读音/ˈmæsɪv/)意思是“大量的”。词根是名词mass(许多,大量),加一个形容词后缀-ive,就变成了massive。Breach(读音/briːtʃ/)意思是“漏洞破坏”,例如:data breach意思就是“数据泄露”。所以,in massive breach在新闻标题中就是说“这是一次大规模的数据泄露事件”。据说有1.83亿Gmail用户密码遭泄露,这也成为了史上最大规模邮箱密码泄漏事件。所以,新闻标题Gmail-Linked Credentials Exposed in Massive Breach意思就是:Gmail联合账户的登录凭证在一次大规模数据泄露中被曝光。新闻来源:TechRepublic03. South Korea's Gyeongju Scrambles to Host Trump, Xi and More Leaders at APEC 韩国庆州紧急筹备,迎接特朗普、习近平等多国领导人出席APEC会议[图源网络]2025年10月29日,TORRE. News报道了一条标题为South Korea's Gyeongju Scrambles to Host Trump, Xi and More Leaders at APEC的新闻。South Korea是“韩国”。Gyeongju是韩国的古都——“庆州”。��What happened to South Korea's Gyeongju?South Korea's Gyeongju Scrambles.Scramble(读音/ˈskræmb(ə)l/)就是炒鸡蛋scrambled eggs里的那个scramble,本意是“搅动或者在混乱中行动”。在新闻里表示“匆忙行动”或“紧急筹备”。比如这里的Gyeongju scrambles to host...就是说“庆州正紧急筹备to host……”。Host意思是“主持人或东道主”。��Back Info:今年的APEC会议(亚太经济合作组织峰会)在韩国举行,可以说South Korea is the host。不过这里的host不是名词,而是动词,是说韩国作为东道主要去承办这个会议。新闻标题中写道to host Trump, Xi and more leaders,意思就是“会迎接美国总统特朗普、我国国家主席习近平,还有更多国家领导人”。At APEC,就是指这件事“在APEC会议上发生的”。所以,新闻标题South Korea's Gyeongju Scrambles to Host Trump, Xi and More Leaders意思就是:韩国庆州紧急筹备,迎接特朗普、习近平等多国领导人出席APEC会议。新闻来源:TORRE. News04. China Builds World's Largest 5G Network with 4.7 Million Base Stations中国建立全球最大的5G网络,拥有470万个基站2025年10月28日,中国环球电视网(CGTN)报道了一条标题为China Builds World's Largest 5G Network with 4.7 Million Base Stations的新闻。5G——第五代通信技术,是我们在手机上经常看到的标志。标题中提到的world's largest 5G network,就是说“世界上最大的5G网络”。��那是谁建了这世界上最大的5G网络呢?China. China builds world's largest 5G network.在这句之后跟了一个with短语——with 4.7 Million Base Stations,表示世界上最大的5G网络有470 万个基站。Base是“基地”,station是“站台”,连起来base station就成了“基站”。[图源网络]��Back Info:这些基站是做什么用的呢?其实5G基站就是5G网络的核心设备,它负责无线信号的覆盖,把有线通信网络和无线终端(比如我们的手机、平板等)连接起来。所以,新闻标题China Builds World's Largest 5G Network with 4.7 Million Base Stations 意思就是:中国建立全球最大的5G网络,拥有470万个基站。新闻来源:CGTN05. China Blows Past Record for Europe Car Sales on Hybrid, EV Gains中国汽车在欧洲销量突破纪录,混合动力与电动车增长成为主要推动力2025年10月29日,彭博社(Bloomberg)报道了一条标题为China Blows Past Record for Europe Car Sales on Hybrid, EV Gains的新闻。Record(读音/ˈrekərd/),意思是“纪录”。例如:break the record意思就是“打破纪录”。但是在标题当中,“破纪录”用了另外一个地道的表达——China blows past record。Blow是吹,past是过去,但是合起来blow past......可不是“吹过去”的意思,而是“轻松超过”。再结合后面的record,就是blows past record——“打破纪录”。��那中国是打破了什么记录呢?For Europe car sales.For表示原因。Europe car sales是指“欧洲汽车的销量”。所以,China Blows past record for Europe car sales意思就是说“中国汽车在欧洲的销量打破纪录”。��那是在哪方面的Europe car sales呢?On hybrid, EV.Hybrid(读音/ˈhaɪbrɪd/)很好理解,它有“杂交物种”的意思,或者是“混合物”;在汽车方面,就是说这个汽车的动力是“混合的,是混合动力车”。这种汽车既能用油又能用电,所以叫混合动力车。EV是electric vehicle(读音/ɪˈlektrɪk/ /ˈviːəkl/)的缩写,意思是“电动汽车”。Gains(读音/ɡeɪnz/),除了有“获得”的意思之外,还可以表示“增长”。所以,for Europe car sales on hybrid, EV gains就是说“由于欧洲混合动力和电动车的汽车销量增长”。新闻标题China Blows Past Record for Europe Car Sales on Hybrid, EV Gains意思就是:中国汽车在欧洲销量突破纪录,混合动力与电动车增长成为主要推动力。新闻来源:Bloomberg
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
大主播:Flora(一席老师) 小主播:Shine(一席学生)01. OpenAI Moves to Generate AI Music in Potential Rivalry with Startup SunoOpenAI进军AI音乐生成领域,或将与初创公司Suno展开竞争近期,The Information报道了一条标题为OpenAI Moves to Generate AI Music in Potential Rivalry with Startup Suno 的新闻。OpenAI,是美国一个人工智能研究实验室,用来开发人工智能。例如:ChatGPT就是OpenAI研发的。Move to是“移动到……”,更具体一些就是“开始或着手做……”��What does open AI move to do?To generate AI music.Generate(读音/ˈdʒenəreɪt/),意思是“生成”。例如:现在用AI生成的图片我们就可以说:AI-generated images.那么OpenAI moves to generate AI music就是“OpenAI要开始做AI音乐”。��OpenAI是第一家开始做AI music的公司吗?其实并不是,我们往后看就知道啦:后面的介词短语in potential rivalry说明了OpenAI这么做其实是陷入潜在的竞争之中。Potential(读音/pəˈtenʃ(ə)l/),意思是“潜在的,有可能的”;同时,我们的“潜力”也可以用potential。Rivalry(读音/ˈraɪv(ə)lri/)是“竞争、较量”。词根是rival,意思是“竞争对手”;再加上一个后缀-ry就变成了“竞争选手之间的较量”。所以,in potential rivalry意思就是“陷入潜在的竞争”。��But who is Open AI's rival?Startup Suno.Start up这个短语是“启动”的意思。不过这里start和up中间没有空格,startup是一个单词,意思是“刚刚启动的公司”,也就是“初创企业”。所以Startup Suno意思就是“初创企业Suno”。标题用了一个with Startup Suno,说明Open AI的潜在竞争者是一个叫Suno的初创公司。��Back Info:Suno可以直接用AI生成纯音乐,也可以生成含有人声的歌曲。所以新闻标题OpenAI Moves to Generate AI Music in Potential Rivalry with Startup Suno 意思就是:OpenAI进军AI音乐生成领域,或将与初创公司Suno展开竞争。新闻来源:The Information试想一下:��OpenAI进军AI音乐,会对我们听音乐有影响吗?AI音乐会变得更多吗?可能以后我们会听到更多用 AI 创作的曲子,音乐创作会更快、定制音乐也会更方便。但也有人担心版权问题,还担心人类创作者的工作会不会因此受到影响。欢迎大家在评论区留言自己喜欢的歌。除此之外,你想不想听AI的改编版呢?02. Gmail-Linked Credentials Exposed in Massive BreachGmail联合账户的登录凭证在一次大规模数据泄露中被曝光2025年10月28日,科技网站TechRepublic报道了一则标题为Gmail-Linked Credentials Exposed in Massive Breach的新闻。这是一起大规模数据泄露事件,引起广泛轰动。Gmail是谷歌的邮箱。前面的G就是取了Google的首字母G,所以叫Gmail。��What happened to Gmail?Gmail-Linked credentials exposed.Link是“链接”的意思,在第一期栏目中我们曾提到过:星链卫星就是starlink satellite。在标题中,它和Gmail组合在一起再加后缀-ed构成了一个形容词。Gmail-Linked意思就是“和Gmail相连接的”。所以,……linked就是“和……相连接的”。��Then what is linked to gmail? Credentials. Gmail-Linked credentials.Credentials(读音/krəˈdenʃ(ə)lz/)原本有“资格证”的意思。1)词根-cred来源于拉丁语,意思是“信任”。比如credit就有“信用”的意思;2)后面的-ent表示“有某种性质”——专门用来构成名词或者形容词;3)结尾加一个-ial,表示“和……有关的事物”。那么和具备信任相关的事物,就是“凭证”的意思。所以,Gmail-Linked credentials就是“和Gmail相连接的凭证”。��Back Info:这里的凭证是指登录凭证,比如我们平时登录需要的账号和密码;又因为Gmail 邮箱一般会绑定其他的平台,所以Gmail-Linked credentials是指“跟Gmail绑定账户的登录凭证”,或者也可以说“Gmail联合账户的登录凭证”。因此,一旦Gmail邮箱被泄露,不只是谷歌邮箱本身有风险,跟Gmail登录系统绑定的账号同样会陷入危险之中。所以标题才说Gmail-Linked credentials exposed。Expose(读音/ɪkˈspoʊz/)意思是“泄露”。Ex-意思是“向外”,-pose意思是“放”,那合起来expose向外放,也就是“暴露”。我们不难发现,在标题中exposed前省略了be动词。完整的表达应该是:Gmail-Linked credentials are exposed。��那这次有多少账户的数据被泄露了呢?In massive breach.Massive(读音/ˈmæsɪv/)意思是“大量的”。词根是名词mass(许多,大量),加一个形容词后缀-ive,就变成了massive。Breach(读音/briːtʃ/)意思是“漏洞破坏”,例如:data breach意思就是“数据泄露”。所以,in massive breach在新闻标题中就是说“这是一次大规模的数据泄露事件”。据说有1.83亿Gmail用户密码遭泄露,这也成为了史上最大规模邮箱密码泄漏事件。所以,新闻标题Gmail-Linked Credentials Exposed in Massive Breach意思就是:Gmail联合账户的登录凭证在一次大规模数据泄露中被曝光。新闻来源:TechRepublic03. South Korea's Gyeongju Scrambles to Host Trump, Xi and More Leaders at APEC 韩国庆州紧急筹备,迎接特朗普、习近平等多国领导人出席APEC会议2025年10月29日,TORRE. News报道了一条标题为South Korea's Gyeongju Scrambles to Host Trump, Xi and More Leaders at APEC的新闻。South Korea是“韩国”。Gyeongju是韩国的古都——“庆州”。��What happened to South Korea's Gyeongju?South Korea's Gyeongju Scrambles.Scramble(读音/ˈskræmb(ə)l/)就是炒鸡蛋scrambled eggs里的那个scramble,本意是“搅动或者在混乱中行动”。在新闻里表示“匆忙行动”或“紧急筹备”。比如这里的Gyeongju scrambles to host...就是说“庆州正紧急筹备to host……”。Host意思是“主持人或东道主”。��Back Info:今年的APEC会议(亚太经济合作组织峰会)在韩国举行,可以说South Korea is the host。不过这里的host不是名词,而是动词,是说韩国作为东道主要去承办这个会议。新闻标题中写道to host Trump, Xi and more leaders,意思就是“会迎接美国总统特朗普、我国国家主席习近平,还有更多国家领导人”。At APEC,就是指这件事“在APEC会议上发生的”。所以,新闻标题South Korea's Gyeongju Scrambles to Host Trump, Xi and More Leaders意思就是:韩国庆州紧急筹备,迎接特朗普、习近平等多国领导人出席APEC会议。新闻来源:TORRE. News04. China Builds World's Largest 5G Network with 4.7 Million Base Stations中国建立全球最大的5G网络,拥有470万个基站2025年10月28日,中国环球电视网(CGTN)报道了一条标题为China Builds World's Largest 5G Network with 4.7 Million Base Stations的新闻。5G——第五代通信技术,是我们在手机上经常看到的标志。标题中提到的world's largest 5G network,就是说“世界上最大的5G网络”。��那是谁建了这世界上最大的5G网络呢?China. China builds world's largest 5G network.在这句之后跟了一个with短语——with 4.7 Million Base Stations,表示世界上最大的5G网络有470 万个基站。Base是“基地”,station是“站台”,连起来base station就成了“基站”。��Back Info:这些基站是做什么用的呢?其实5G基站就是5G网络的核心设备,它负责无线信号的覆盖,把有线通信网络和无线终端(比如我们的手机、平板等)连接起来。所以,新闻标题China Builds World's Largest 5G Network with 4.7 Million Base Stations 意思就是:中国建立全球最大的5G网络,拥有470万个基站。新闻来源:CGTN05. China Blows Past Record for Europe Car Sales on Hybrid, EV Gains中国汽车在欧洲销量突破纪录,混合动力与电动车增长成为主要推动力2025年10月29日,彭博社(Bloomberg)报道了一条标题为China Blows Past Record for Europe Car Sales on Hybrid, EV Gains的新闻。Record(读音/ˈrekərd/),意思是“纪录”。例如:break the record意思就是“打破纪录”。但是在标题当中,“破纪录”用了另外一个地道的表达——China Blows Past Record。Blow是吹,past是过去,但是合起来blow past......可不是“吹过去”的意思,而是“轻松超过”。再结合后面的record,就是blows past record——“打破纪录”。��那中国是打破了什么记录呢?For Europe car sales.For表示原因。Europe car sales是指“欧洲汽车的销量”。所以,China Blows past record for Europe car sales意思就是说“中国汽车在欧洲的销量打破纪录”。��那是在哪方面的Europe Car Sales呢?On Hybrid, EV.Hybrid(读音/ˈhaɪbrɪd/)很好理解,它有“杂交物种”的意思,或者是“混合物”;在汽车方面,就是说这个汽车的动力是“混合的,是混合动力车”。这种汽车既能用油又能用电,所以叫混合动力车。EV是electric vehicle(读音/ɪˈlektrɪk/ /ˈviːəkl/)的缩写,意思是“电动汽车”。Gains(读音/ɡeɪnz/),除了有“获得”的意思之外,还可以表示“增长”。所以,for Europe Car Sales on Hybrid, EV Gains就是说“由于欧洲混合动力和电动车的汽车销量增长”。新闻标题China Blows Past Record for Europe Car Sales on Hybrid, EV Gains意思就是:中国汽车在欧洲销量突破纪录,混合动力与电动车增长成为主要推动力。新闻来源:BloombergRead the world, expand your view! 英语读世界,热点拓视野!每周二晚8点我们不见不散!下期见喽!
Breach of the Covenant | When One Sin Affects Everyone | 11 02 2025
We're back with a look at the new Expedition Breach. This brings new Corvette parts and is set in an abandon world. Hang on it's going to be a bumpy ride.
LG Uplus confirms cybersecurity incident 10 million+ impacted by Conduent breach Russian hackers exploit tools against Ukrainian targets Huge thanks to our sponsor, Conveyor Security reviews don't have to feel like a hurricane. Most teams are buried in back-and-forth emails and never-ending customer requests for documentation or answers. But Conveyor takes all that chaos and turns it into calm. AI fills in the questionnaires, your trust center is always ready, and sales cycles move without stalls. Breathe easier—check out Conveyor at www.conveyor.com.
-As part of an AI-focused reorganization, YouTube CEO Neal Mohan told employees that it will offer voluntary buyouts, according to an internal company memo. At the same time, he emphasized that there would be no specific role eliminations as part of the new structure. -It looks like Meta's Vibes feed is just the start of the company's pivot toward AI slop. In an earnings call, CEO Mark Zuckerberg said that "we're going to add yet another huge corpus of content" to Meta's recommendation system, via AI's ability to create and remix content — so you're likely to see even more AI generated posts on Facebook and Instagram. -Proton, the company behind Proton VPN and other encrypted apps like Proton Mail and Proton Drive, just launched a new web page called the Data Breach Observatory that aims to make accurate cybercrime data more widely accessible. The Observatory is intended to be a continually updated report that records any data leak detected on the dark web, with information sourced from the underground data marketplaces themselves. Learn more about your ad choices. Visit podcastchoices.com/adchoices
What if the path to power demanded a blood price you never saw coming? In a world scarred by the Great Quake's endless storms—where sterilized refugees chase fractured freedoms across divided lands—Episode 11: "The Walls of Freedom" pulls you through the breach. Erika's family nears their throne... but shadows strike without mercy. TJ's unyielding hand offers shelter laced with steel; Virgis's whispers hint at cracks in the calm. Drawn from Sara F. Hathaway's Changing Earth novels—explore more with books & swag at changingearthseries.com. Can you trust the walls that promise everything?Get Prepared with Our Incredible Sponsors! Survival Bags, kits, gear www.limatangosurvival.comEMP Proof Shipping Containers www.fardaycontainers.comThe Prepper's Medical Handbook Build Your Medical Cache – Welcome PBN FamilyPack Fresh USA www.packfreshusa.comSupport PBN with a Donation https://bit.ly/3SICxEq
Prime Minister Sir Keir Starmer has dismissed calls for an investigation into Chancellor Rachel Reeves, after it emerged she did not obtain the required “selective” rental licence for her £3,200-a-month Dulwich home when she moved into No 11 Downing Street following the election. In a letter to the prime minister, Reeves “sincerely” apologised for her “inadvertent error”, but the Tories have said she should be sacked. They cited Starmer's argument after Boris Johnson's fine for breaching Covid rules that “lawbreakers cannot be lawmakers”. The Standard's Chief Political Correspondent Rachael Burford is here with the latest. And in part two The Standard's Chief Theatre Critic and host of The London Theatre Review podcast, Nick Curtis, is here to review Ella Hickson's adaptation of Peter Pan, from the Royal Shakespeare Company, which is showing at The Barbican Centre. Hosted on Acast. See acast.com/privacy for more information.
In this week's Security Squawk Podcast, Bryan Hornung, Randy Bryan, and Reginald Andre break down three massive cybersecurity stories shaping 2025. Bryan kicks off with Qilin — the ransomware gang behind over 700 global attacks this year. Andre covers a New York city that paid a $150,000 ransom to restore operations after a crippling hit. And Randy unpacks a major ISP email breach in Australia that led to SIM-swaps and stolen data. Packed with sharp insights, humor, and practical advice, this episode is a must-listen for MSPs, IT pros, and business owners looking to stay ahead of 2025's top threats.In this week's Security Squawk Podcast, Bryan Hornung, Randy Bryan, and Reginald Andre break down three massive cybersecurity stories shaping 2025. Bryan kicks off with Qilin — the ransomware gang behind over 700 global attacks this year. Andre covers a New York city that paid a $150,000 ransom to restore operations after a crippling hit. And Randy unpacks a major ISP email breach in Australia that led to SIM-swaps and stolen data. Packed with sharp insights, humor, and practical advice, this episode is a must-listen for MSPs, IT pros, and business owners looking to stay ahead of 2025's top threats. ️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! https://streamyard.com/pal/d/65161790...
Israeli strikes ordered by Prime Minister Benjamin Netanyahu kill at least 33 Palestinians in Gaza. It comes after Israel accused Hamas of violating the ceasefire by shooting at IDF soldiers and not handing back hostage bodies. The US President Donald Trump said Israel “should hit back” at Hamas if Israeli soldiers were killed, but added “nothing's going to jeopardise” the truce. Also: President Trump arrives in South Korea; Hurricane Melissa pummels Jamaica; scores of people killed and 81 arrested in a massive drugs raid in Brazil; rapper Flavor Flav becomes official hype man and sponsor of the US Bobsleigh and Skeleton team for the 2026 Winter Olympics. The Global News Podcast brings you the breaking news you need to hear, as it happens. Listen for the latest headlines and current affairs from around the world. Politics, economics, climate, business, technology, health – we cover it all with expert analysis and insight. Get the news that matters, delivered twice a day on weekdays and daily at weekends, plus special bonus episodes reacting to urgent breaking stories. Follow or subscribe now and never miss a moment. Get in touch: globalpodcast@bbc.co.uk
A Note from JamesOh my gosh—I was scared after this one. In this episode, I learned about what's really on the dark web… and the even scarier stuff on what's called the deep web.Eric O'Neill—who, by the way, is the former FBI agent who brought down Robert Hanssen, the biggest double agent in U.S. history—joined me for this conversation. Hanssen was the FBI's top analyst on the Soviet Union, and at the same time, he was secretly working for the Soviet Union—for twenty-two years. Eric was the one who caught him. There was even a movie made about it—Breach (2007).Now Eric has written a book called Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm Scammers. And honestly, it's terrifying what's out there right now—the dark web, the black markets, the cyberattacks, the scams that most of us have no idea are happening in the background of our digital lives.I'll let Eric tell the stories.Episode DescriptionIn this episode, James talks with Eric O'Neill—former FBI counterintelligence operative and the man who captured the most notorious spy in U.S. history—about the unseen cyber battlefield shaping our world today. O'Neill explains how hackers, state actors, and scammers exploit human psychology far more than technology, and why every one of us is a potential target.From the lessons of his undercover work tracking Robert Hanssen to the rise of ransomware and AI-assisted phishing, O'Neill offers both a chilling reality check and a practical guide for staying safe in the digital age. He and James break down how modern espionage has moved online—and what ordinary people can do to protect themselves before it's too late.What You'll LearnHow Eric O'Neill captured Robert Hanssen, the most damaging spy in FBI historyWhy modern cybercrime depends more on human manipulation than hacking codeWhat really happens on the dark web and how it fuels global criminal networksHow AI is changing the speed and sophistication of digital attacksSimple but critical steps you can take right now to protect your data and identityTimestamped Chapters[00:00] Introduction — James sets the stage for a chilling conversation [02:15] Who is Eric O'Neill? The story behind capturing Robert Hanssen [07:45] The day Hanssen was caught — inside the FBI sting [13:10] From spycraft to cybercrime — how espionage went digital [17:30] The real difference between the dark web and the deep web [22:00] Why hackers target people, not systems [27:40] Social engineering and the psychology of manipulation [32:15] AI and the next generation of scams [37:55] How to recognize phishing and digital traps [44:20] Why cybersecurity starts with self-awareness [49:10] Lessons from the field — how espionage teaches us to think critically [54:05] The future of cyber warfare and personal protection [59:00] Final thoughts — the cost of complacencyAdditional ResourcesEric O'Neill – Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm ScammersEric O'Neill – Gray Day: My Undercover Mission to Expose America's First Cyber SpyFilm: Breach (2007) – starring Ryan Phillippe and Chris CooperFBI Official Case Summary – Robert Hanssen Espionage CaseEric O'Neill Official WebsiteSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself.This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity.
Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself.This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity.
Our show today is being sponsored by Free Float Analytics, the only platform measuring board power, connections, and performance for FREE.DAMIONAmazon to announce largest layoffs in company history, in AI push. WHO DO YOU BLAME?Former CEO Jeff BezosAICovid (This wave of layoffs results from overhiring during the pandemic)Executive Chair and largest shareholder Jeff BezosF5 Expects Revenue Hit From Cyber Attack. F5, a $20B billion technology company with impressive gross profit margins of 81%, experienced a cybersecurity incident involving unauthorized access to certain company systems by a sophisticated nation-state threat actor. WHO DO YOU BLAME?The Risk committee: Dreyer, Klein, Montoya, Budnik*Chair Marianne Budnik is deemed to have Cybersecurity experience because she serves as a Chief Marketing Officer in the cybersecurity industryPeter Klein was the CFO at Microsoft for less than 4 years, then was the CFO for WME for 6 months and then has only been a director since 2014.Risk committee member Michael Montoya specifically. F5 revealed that the director mysteriously resigned in the same filing it disclosed the cyberattack, despite having served for only 4 years. According to the proxy, had “extensive experience as an information security executive.” Following his resignation from the Board, Mr. Montoya continued his service with the Company and has been appointed as F5's Chief Technology Operations Officer.The entire board, for doing dumb modern day board things: announced that CEO François Locoh-Donou, would assume the additional role of Chair of the Board following the Company's next Annual Meeting of Shareholders 12 days after they announced the cyberattack.Investors. 98% YES average this year: 7 over 99.2%, including Risk Committee Chair Marriane Budnik with 99.6%. Nobody feels like they have to work hard to impress anyoneF5! It's a god damn cybersecurity company!How climate change is fueling Hurricane Melissa's ferocity. WHO DO YOU BLAME?Exxon CEO Darren Woods because he sued his own shareholders last year: Arjuna Capital, LLC and Follow ThisExxon CEO Darren Woods because just yesterday: Exxon sues California over new laws requiring corporate climate disclosuresExxon CEO Darren Woods because gas and oilClimate ChangeOpenAI says U.S. needs more power to stay ahead of China in AI: ‘Electrons are the new oil' WHO DO YOU BLAME?The fear-and-spending geniuses behind the original Cold War: Truman, Stalin, ChurchillPeople who historically ignored Eisenhower and his statements on the U.S. military-industrial complex when he explicitly warned that defense contractors and the military could exert undue influence on government policy. Sound familiar?Anyone who empowered the board to not be empowered when they tried to fire Sam Altman for such reasons as:Conflicts over OpenAI's rapid growth and direction, especially the tension between aggressive AI deployment vs. safety oversight.Power dynamics between Altman, key researchers, and board members — some may have felt he had too much unilateral control.The college that let Sam Altman drop outSammy Altman Citi's Jane Fraser consolidates power with board chair vote — and a $25 million-plus bonus to boot. WHO DO YOU BLAME?The entire Compensation, Performance Management and Culture CommitteeThese two long-tenured Compensation, Performance Management and Culture Committee membersDiana L. Taylor* 10 other directorships: Brookfield Corporation, Accion (Chair), Columbia Business School (Board of Overseers),Friends of Hudson River Park (Chair), Mailman School of Public Health (Board of Overseers), The Economic Club of New York (Member), Council on Foreign Relations (Member), Hot Bread Kitchen (Board Chair), Cold Spring Harbor Lab (Member), and New York City Ballet (Board Chair)Peter B. Henry*8 other directorships: Nike, Inc., Analog Devices, Inc., National Bureau of Economic Research (Board), The Economic Club of New York (Board), Protiviti (Advisory Board), Biospring Partners (Advisory Board), Makena Capital (Advisory Board), and Two Bridges Football Club (Board)The lowest common denominator effect of bank compensation committees:Wells Fargo CEO Charlie Scharf: ~$30M special equity grant tied to becoming Chair as well as CEO (3 months after meeting)Goldman Sachs: CEO David Solomon & COO John Waldron ~$80M each (retention RSUs vesting in ~5 yrs)KeyCorp: CEO Chris Gorman & four other senior execs: ~$8M for Gorman; ~$17M combined for the five NEOsThe passive ownership (re: management-friendly) of BlackRock, State Street, and Vanguard (combined 22%): without their votes at Goldman then Say on Pay was nearly tied, which might have dissuaded the year of one-off bonuses for banking CEOs??The world is about $4.5 trillion short of securing a sustainable food supply for the future, global food and ag business CEO [Sunny Verghese, CEO of food and ag company Olam Group] says. WHO DO YOU BLAME?The world's top 28 richest people (those worth ~$160 B each) together would equal $4.5 trillionThe world's greatest sycophant Tesla chair RobynDenholm: “On the pay package specifically: “It's not about the money for him. If there had been a way of delivering voting rights that didn't necessarily deliver dollars, that would have been an interesting proposition.”Any two of these basically redundant techbro companies' market caps would sufficeNvidia ~$4.2 trillion Microsoft ~$3.8 trillion Apple ~$3.1 trillion Amazon ~$2.4 trillion Alphabet ~$2.2 trillion Meta Platforms ~$1.8 trillion Broadcom ~$1.3 trillion Taiwan Semiconductor Manufacturing Company ~$1.2 trillionBill Ackman. Because he's a douche.MATTTarget is eliminating 1,800 roles as new CEO Michael Fiddelke gets set to take over the struggling retailer - WHO DO YOU BLAME?Current CEO Brian Cornell, who's “stepping down” to the role of Executive Chair - which is basically still CEO, just on the board and doesn't have to talk to employees anymore, so he can eliminate 1800 jobs and then fade away into a multimillion dollar unaccountable board roleFuture CEO Michael Fiddelke, who starts February 1, 2026, but is current COO and was forced to send the memo to employees telling them 8% of the workforce will be cutMonica Lozano, chair of the compensation and human capital management committee of the board, who's also on the BofA and Apple boards and is the most connected board member at a highly connected board - does the chair of the human capital committee have to weigh in on firing?OpenAI - the memo makes zero mention of the fact that part of Target's problem is that it shit on gays and blacks because of a feckless internet toad named Robby Starbuck, but feels very written by AI which would account for phrases like:“Adjusting our structure is one part of the work ahead of us. It will also require new behaviors and sharper priorities that strengthen our retail leadership in style and design and enable faster execution so we can: Lead with merchandising authority; Elevate the guest experience with every interaction; and Accelerate technology to enable our team and delight our guests.”Does anyone know what that word salad actually means? Doesn't it just mean “you're fired because we basically sucked at our jobs”?Hormel recalls 4.9M pounds of chicken possibly 'contaminated with pieces of metal' - WHO DO YOU BLAME?The audit committee, the closest committee responsible for enterprise risk (ie, metal in chicken) - Stephen M. Lacy, William A. Newlands (also lead director), Debbra L. Schoneman, Sally J. Smith (chair), Steven A. White, Michael P. ZechmeisterThe governance committee - James Snee, the now retired CEO who retired somehow in January but the company still hasn't found a permanent replacement 9 months later - so they're being run by Jeff Ettinger, interim CEO? Chair Gary C. Bhojwani, Elsa A. Murano, Ph.D., William A. Newlands (also lead director), Debbra L. Schoneman, Steven A. WhiteThe one black guy on the board - Steve White - who works at Comcast, is somehow qualified to be on Hormel board, and is on BOTH the audit committee AND governance committeeThe conveyor belt that spit pieces of metal as large as 17mm long into “fire braised chicken” sent to hotels and restaurantsCervoMed appoints McKinsey veteran David Quigley to board of directors - WHO DO YOU BLAME? Board is 2 VCs, a longtime biotech CFO, and five MD/PhDs. And among those 8, there are just two woman - the co-founder/wife of the CEO and a VC. And when they did their search, they could only find a longtime professional opinion haver - a consultant from the big three?Nominating committee for lack of imaginationEx or current McKinsey, Bain, and BCG employed directors - the opinion industrial complex - make up a whopping 4% of ALL US DIRECTORSAmong boards with MULTIPLE ex opinion directors: Kohl's is 25% consultantStarbucks is 27% consultantDisney is 30% consultantsWilliams-Sonoma is 38% consultantCBRE is 40% consultant!Nominating committee chair Jane Hollingsworth, for not looking around the room and saying, “hey dudes, can we add, like, maybe, ONE other lady?”Co founders Sylvie Gregoire and John Alam (also CEO) who own 17.3% of voting power - add in Josh Boger, board chair and 12.3% voter, and you basically have the CEO daddy and his buddy Josh with 29.6% of voting controlSylvie and John's bios, which neglect to mention they're married to one anotherWe are all terrified of the future - which headline is worse for your terror? WHO DO YOU BLAME?The world is about $4.5 trillion short of securing a sustainable food supply for the future, global food and ag business CEO saysBill Gates Says Climate Change ‘Will Not Lead to Humanity's Demise' - ostensibly because billionaires in bunkers will, in fact, survive on cans of metal-filled Hormel chili.Sorry, Yoda. Mentors are going out of styleMan Alarmed to Discover His Smart Vacuum Was Broadcasting a Secret Map of His HouseJennifer Garner's baby food company is going public on the NYSE — should investors be putting their eggs in this basket?Woman Repeatedly Warned by Canadian Exchange Not to Transfer Crypto, Gets Scammed AnywayOpenAI completes restructure, solidifying Microsoft as a major shareholder - MSFT owns 27%, the non profit which controlled the company “for the benefit of humanity” now will only control it for 26% of humanity?Tesla risks losing CEO Musk if $1 trillion pay package isn't approved, board chair says - IF MUSK LEAVES, WHO DO YOU BLAME?Robyn Denholm, board chair, whose job it is to manage Musk, but does it like an overwhelmed permissive mother who parents with chocolate and Teletubbies when the kid has a tantrumKimbal Musk - I was told by a bunch of directors and institutional investors at a conference, no joke, that Kimbal was still on the board (ie, not voted out) to control his brother's ketamine intake and crazy episodes. So if he throws a tantrum and leaves, isn't it bro's fault? This is a binary trade - Musk gets extra pay/control, stock goes up and isn't de-meme'd. Musk doesn't, he leaves and the stock is de-meme'd and drops arguably by 66% or more to be more like a car company with some tech. So do we blame investors, no matter what they do? They meme'd the stock in the first place, he couldn't get a trillion extra dollars if they hadn't pumped up the stock - and now they could vote with humanity (no pay) or meme capitalism (pay)!Techbro middle school conservatism - is this Ben Shapiro and Joe Rogan's fault? A Yale economist paper suggests that Musk's politics cost between 1 and 1.26 million Tesla car sales… Would we even be worried if Musk stayed out of politics? Wouldn't the market have just paid him whatever?Pop quiz: which directors stay on the board if Musk leaves in a tantrum?Jeffrey StraubelKimbal MuskRobyn DenholmJames MurdochKathleen Wilson-ThompsonIra EhrenpreisJack HartungJoe Gebbia
Ever wondered how easy it is to hack a car?
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
In this episode of The Cybersecurity Defenders Podcast, we discuss some intel being shared in the LimaCharlie community.A breach at the Kansas City National Security Campus (KCNSC), a facility responsible for manufacturing roughly 80% of the non-nuclear components for U.S. nuclear weapons, was enabled by two critical Microsoft SharePoint vulnerabilities.COLDRIVER, a Russian state-sponsored group also tracked as UNC4057, Callisto, or Star Blizzard, has shifted rapidly toward new malware development following the public exposure of its previous malware, LOSTKEYS, in May 2025.CISA has officially added three newly exploited vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, urging swift remediation efforts across federal environments. Newer article link.Amazon Web Services (AWS) experienced a major outage on October 20th that impacted thousands of applications globally, disrupting operations for companies and end-users alike.Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform.This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows. Start today for free at limacharlie.io.
Send us a textIn latest F1 news reports indicate that Mercedes were in breach of Cost cap regulations!- where to find me -Twitter: https://twitter.com/CxmeronccTiktok: https://www.tiktok.com/@cxmeroncc_Facebook: https://www.facebook.com/CameronF1TVBusiness Email : cxmeronf1@gmail.com#f1 #formula1 #Formulaone #f1news #mercedes #redbull #ferrari #hamilton #verstappen #f12024 #landonorris
In episode 316 (final answer), we go back on our promises. GGG's newest Path of Exile 1 expansion, 3.27's Keepers of the Flame, has so many QoL improvements, revamped trade, sub ascendancies (Bloodlines), and so much more, that we may, kind of, sort of, possibly, might play more of the original game then we planned. Blast you, GGG! PoE 2 is on hold! Thanks for the great expansion, and thanks, everyone, for your listens each week!(00:00:00) Welcome to Forever Exiled(00:18:55) Private league recap and community thanks(00:23:42) Patch 3.27 reveal and GGG announcements(00:28:50) POE2 progress updates and MTX merges(00:35:30) Asynchronous trade finally arrives(00:40:05) Quality of life upgrades and stash changes(00:45:25) Breach league redesign and gameplay loop(00:51:00) Bloodlines pseudo-ascendancies discussion(00:54:45) Visual clarity, loot filters, and UI chaos(00:58:12) Minion accuracy removal and balance talk(01:01:50) POE1 vs POE2 coexistence and final thoughtsForever Exiled Info:www.foreverexiled.comPatreonTwitter @ForeverExiled82Path of Exile WebsiteWrecker of Days Builds ListDiscord...FE Merch StoreFE Nexus Store
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
The European Commission has issued preliminary findings that both TikTok and Meta are in breach of transparency rules. Brian O'Donovan, our Work and Technology Correspondent tells us more.
U.S. federal cybersecurity policy has regressed by approximately 13%, according to a report from the Cyberspace Solarium Commission 2.0. This decline is attributed to budget cuts and workforce reductions at key agencies, including the Cybersecurity and Infrastructure Security Agency (CISA) and the State Department's Cyber Diplomacy Staff. The report indicates that nearly a quarter of previously implemented recommendations have lost their status, which raises concerns about the nation's ability to effectively address rising cyber threats. Mark Montgomery, a former Navy Rear Admiral, emphasized that these cuts hinder the agency's effectiveness, calling for the restoration of funding and personnel to strengthen national cyber defenses.In addition to the decline in federal cybersecurity readiness, AI-generated code is now responsible for one in five security breaches, as reported by Aikido. The study found that AI coding tools account for 24% of production code, with 43% of U.S. organizations reporting serious incidents linked to AI-related flaws. Interestingly, the report also noted that increasing the number of security tools does not necessarily enhance safety; organizations using six to nine tools experienced a 90% incident rate, compared to 64% for those with one or two tools. Despite these challenges, 96% of industry professionals remain optimistic that AI will eventually produce secure and reliable code.The episode also highlights the impact of generative AI on IT service management, revealing that organizations utilizing this technology have reduced incident resolution times by nearly 18%. A report from SolarWinds indicated that the average resolution time decreased from 27.42 hours to 22.55 hours after implementing generative AI. Furthermore, a survey by Accenture found that 19% of office workers admitted to entering sensitive business information into free, unsecured AI tools, underscoring significant gaps in cybersecurity awareness and training.For Managed Service Providers (MSPs) and IT service leaders, these developments signal a pressing need for improved governance and training regarding AI usage. The findings suggest that organizations should focus on reducing tool sprawl and enhancing employee education on cybersecurity responsibilities. As small business optimism declines amid rising inflation and supply chain issues, MSPs should position themselves as stability partners, helping clients navigate these challenges rather than pushing the latest technology trends. The evolving landscape of cybersecurity threats, particularly those involving AI and automation, necessitates a proactive approach to risk management and incident response. Three things to know today 00:00 U.S. Cyber Defenses Slide as AI Code Risks Rise and Governance Gaps Widen05:41 Inflation, Uncertainty, and Automation Push Small Firms Toward Caution and Cost Control09:23 From Prompt Injections to Hidden Malware, Cyber Attacks Are Shifting Toward Stealth and Precision This is the Business of Tech. Supported by: https://saasalerts.com/platform-overview-for-msps/?utm_source=mspradio
Pentagon's Restrictive Media Policy Following Classified Information Breach. John Batchelor and Jeff McCausland discuss the perplexing new Pentagon policy that restricts information flow and excludes major media. This situation contrasts with the historic media access observed during events like the D-Day invasion in 1944. The current restrictive policy appears to stem from the "great Signal gate controversy" involving Mr. Hegseth. Hegseth transmitted highly classified information regarding an airstrike against Yemen, including details from correspondence with the Central Command commander, using an unclassified Signal transmission. He also inadvertently included the editor of the Atlantic in the chat. An Inspector General investigation into Hegseth's violation of classified information norms is pending. McCausland suggests this incident made the Secretary of Defense fearful, leading to this effort to isolate the American military from the public through media restrictions. 1944
Investigative journalists Mandy Matney and Liz Farrell and attorney Eric Bland tackle one of the most absurd phrases creeping into South Carolina's justice system — ‘Murdaugh fatigue.' After years of uncovering corruption, financial crimes, and systemic failures, many in power and some running for office want to move on… leaving victims behind… AGAIN. Mandy, Liz, and Eric break down the latest in Russell Laffitte's super soft sentencing, and the Billy Squires incident on Hilton Head. Both reveal how the system once again protects people that look like those in power while accepting the bare minimum to jail or prosecute anyone else. And we hope everyone listening remembers that Justice does not get tired — people do. ☕ Cups Up! ⚖️ Episode References “Alex Murdaugh family's shocking murders and deep-rooted secrets revealed in new Hulu limited series” - AP News, updated Oct 16, 2025
____________Podcast Redefining Society and Technology Podcast With Marco Ciappellihttps://redefiningsocietyandtechnologypodcast.com ____________Host Marco CiappelliCo-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybersecurity #Society
On this episode, I cover the worrying breach disclosed by F5, the tumultuous services outage around the globe caused by an AWS outage and much more! Reference Links: https://www.rorymon.com/blog/major-aws-outage-concerning-breach-of-f5-many-issues-caused-by-windows-updates/
Top headlines for Tuesday, October 21, 2025We cover the latest escalation in the Israel-Hamas conflict after a deadly ceasefire breach, examine the controversy surrounding President Trump's plan to expand IVF access amid criticism from pro-life advocates, and discuss OpenAI's decision to halt user-generated videos of Martin Luther King Jr. following a request from his family.00:11 IDF strikes ‘dozens' of Hamas targets in response to attack01:07 Trump IVF plan raises concern about 'commodification of children'02:02 Secular student alliance takes aim at Christian 'privilege'03:06 Beauty queen stripped of title for biblical views honored04:00 Supreme Court lets church's discrimination lawsuit to continue04:50 Female youth pastor gets house arrest for child sexual abuse05:43 OpenAI blocks user-generated videos of Martin Luther King Jr.Subscribe to this PodcastApple PodcastsSpotifyGoogle PodcastsOvercastFollow Us on Social Media@ChristianPost on TwitterChristian Post on Facebook@ChristianPostIntl on InstagramSubscribe on YouTubeGet the Edifi AppDownload for iPhoneDownload for AndroidSubscribe to Our NewsletterSubscribe to the Freedom Post, delivered every Monday and ThursdayClick here to get the top headlines delivered to your inbox every morning!Links to the NewsIDF strikes ‘dozens' of Hamas targets in response to attack | WorldTrump IVF plan raises concern about 'commodification of children' | PoliticsSecular student alliance takes aim at Christian 'privilege' | EducationBeauty queen stripped of title for biblical views honored | U.S.Supreme Court lets church's discrimination lawsuit to continue | PoliticsFemale youth pastor gets house arrest for child sexual abuse | U.S.OpenAI blocks user-generated videos of Martin Luther King Jr. | U.S.
In this episode, Ryan Williams Sr. and Chris Abacon discuss the latest cybersecurity news, including the emergency directive regarding F5 vulnerabilities, the persistent threat posed by Chinese state actors, and the recent seizure of $15 billion in Bitcoin linked to human trafficking scams. They also share personal updates and reflections on their lives, emphasizing the importance of vigilance in cybersecurity and the human element in scams. Article: ED 26-01: Mitigate Vulnerabilities in F5 Devices https://www.cisa.gov/news-events/directives/ed-26-01-mitigate-vulnerabilities-f5-devices?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExMTlYOWM0amlEUlhlcGRhaQEe81SKXeFH9RxVLZZAbRkDQEtOgoMMSplG8clyMUy6rAMrG6pvi1AJtPGvTSQ_aem_pKc3XyUqmDiSRv2jdR0NIw China accessed classified UK systems for a decade, officials say https://www.businesstimes.com.sg/international/china-accessed-classified-uk-systems-decade-officials-say?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExMTlYOWM0amlEUlhlcGRhaQEerSBlhQq3UeoMgS7wAyT23_UuHG-lCvjJBqDl4oaMiGlWi-zw_eDARK1H310_aem_u6P4GrEr3cY7Z8DgboMrCQ Feds seize $15B worth of bitcoin in 'pig butchering' scams that used 'forced labor camps' https://www.usatoday.com/story/news/nation/2025/10/15/bitcoin-chen-zhi-pig-butchering-scams-cambodia/86699378007/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExMTlYOWM0amlEUlhlcGRhaQEeWxaNcIq51rJ2Ia86R-a9IbvPgj607GG5GlO0GuAbYs3UmQKXEhvRUr688A0_aem_eBExvIR6GGnllNEvFb0LnQ# Buy the guide: https://www.theothersideofthefirewall.com/ Please LISTEN
How often do we act like the Israelites in how quickly we turn away from God? Even after experiencing his great deliverances, we are quick to turn away. In this message, Brother Luke looks at a Savior that stands in the breach to make intercession for us even when we rebel against our God. 10.12.25.He.Stands.in.the.Breach.Luke.Hagler
Sun, 19 Oct 2025 14:00:00 GMT http://relay.fm/analogue/242 http://relay.fm/analogue/242 I Have Recognised a Dog Exists 242 Casey Liss and Myke Hurley Spending time with people we love. Spending time with people we love. clean 6499 Spending time with people we love. This episode of Analog(ue) is sponsored by: Squarespace: Save 10% off your first purchase of a website or domain using code ANALOGUE. Fitbod: Get stronger, faster with a fitness plan that fits you. Get 25% off your membership. Saily: Affordable eSIM plans for international travel. Use code 'analogue' for 15% off. Incogni: Take your personal data back with Incogni! Use code ANALOGUE with this link and get 60% off an annual plan. Links and Show Notes: Support Analog(ue) with a Relay Membership Submit Feedback French Bulldog Relay for St. Jude Podcastathon 2025Watch all 12 hours on YouTube. Paul R. Williams Upgrade #582: First Chance to Make One ImpressionThe one where Myke and Jason stole Casey's story. ATP 658: Your First Mistake PhoneCasey's retelling of his phone migration story. Declan and Mikaela's Lemonade Stand Box ATP 660: It's All Chicken SaladCasey and Marco's retelling of Marco visiting Richmond. StokkeMyke's baby furniture manufacturer. Wonder Weeks Hades II Pokémon Legends: Z-A Apple in China(Affiliate link
Sun, 19 Oct 2025 14:00:00 GMT http://relay.fm/analogue/242 http://relay.fm/analogue/242 Casey Liss and Myke Hurley Spending time with people we love. Spending time with people we love. clean 6499 Spending time with people we love. This episode of Analog(ue) is sponsored by: Squarespace: Save 10% off your first purchase of a website or domain using code ANALOGUE. Fitbod: Get stronger, faster with a fitness plan that fits you. Get 25% off your membership. Saily: Affordable eSIM plans for international travel. Use code 'analogue' for 15% off. Incogni: Take your personal data back with Incogni! Use code ANALOGUE with this link and get 60% off an annual plan. Links and Show Notes: Support Analog(ue) with a Relay Membership Submit Feedback French Bulldog Relay for St. Jude Podcastathon 2025Watch all 12 hours on YouTube. Paul R. Williams Upgrade #582: First Chance to Make One ImpressionThe one where Myke and Jason stole Casey's story. ATP 658: Your First Mistake PhoneCasey's retelling of his phone migration story. Declan and Mikaela's Lemonade Stand Box ATP 660: It's All Chicken SaladCasey and Marco's retelling of Marco visiting Richmond. StokkeMyke's baby furniture manufacturer. Wonder Weeks Hades II Pokémon Legends: Z-A Apple in China(Affiliate link
Featuring: Ammosart, Ashgar, Belghast, Grace, Kodra, Tamrielo, and Thalen Hey Folks! This week, Grace and Bel start off the show talking about how good Destiny Rising has been now that they have arrived at the endgame. They also talk a bit about Helhest, the new banner character. Grace shares her initial thoughts about He is Coming a roguelike that they have been playing. Bel shares some of the early spoilers for Path of Exile 3.27 Keepers of the Flame, which we are getting a full reveal for on the 23rd and is starting on the 31st. It seems like we are maybe getting a Breach expansion league, with a bunch of quality of life changes. From there, we dive into the topic that got bumped from last week about how there are so many good games… that it makes it really hard to play less-than-excellent games anymore. We also talk about how players are seeing through pointless grinds, and how AA games are back with a vengeance, while AAA games are floundering. Topics Discussed Destiny Rising Helhest Banner Master and Grandmaster Mode Content Trikora Happened He Is Coming Path of Exile 3.27 Spoilers Keepers of the Flame Breach League When There Are Too Many Games Players Rebelling Against Grind The Rise of AA Games The Floundering of AAA Games Questionable Business Decisions
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com00:00 - PreShow Banter™ — A Real Podcast03:15 - Hackers claim Discord breach exposed data of 5.5 million users – BHIS - Talkin' Bout [infosec] News 2025-10-1305:44 - Story # 1: CamoLeak: Critical GitHub Copilot Vulnerability Leaks Private Source Code24:27 - Story # 2: Hackers claim Discord breach exposed data of 5.5 million users36:52 - Story # 3: Velociraptor leveraged in ransomware attacks46:47 - Story # 4: Huntress Threat Advisory: Widespread SonicWall SSLVPN Compromise54:48 - CTF Challenge
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
A record-breaking Bitcoin seizure. Patch Tuesday notes. Capita fined for unlawful access to personal data. Unity site skimmed by malicious script. Vietnam Airlines breached potentially exposing 20 million passengers. An automotive giant experiences a third-party breach. Tim Starks from CyberScoop is discussing how Sen. Peters tries another approach to extend expired cyber threat information-sharing. In our latest Threat Vector, David Moulton sits down with Harish Singh about hybrid work. And inside North Korea's blueprints for deception. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Tim Starks from CyberScoop is discussing how Sen. Peters tries another approach to extend expired cyber threat information-sharing law. Threat Vector Hybrid work has changed the game, but has your security kept up? In this segment of Threat Vector, David Moulton sits down with Harish Singh, Vice President and Global Head of Infrastructure and Application Management at Wipro, to unpack the evolving cybersecurity landscape at the intersection of digital transformation, SaaS expansion, and AI-powered operations. You can listen to their full discussion here, and catch new episodes every Thursday on your favorite podcast app. Selected Reading Feds Seize Record-Breaking $15 Billion in Bitcoin From Alleged Scam Empire (WIRED) Microsoft October 2025 Patch Tuesday fixes 6 zero-days, 172 flaws (Bleeping Computer) Patch Tuesday, October 2025 ‘End of 10' Edition (Krebs on Security) Capita Fined £14m After 2023 Breach that Hit 6.6 Million People (Infosecurity Magazine) Malicious Code on Unity Website Skims Information From Hundreds of Customers (SecurityWeek) Airline with over 20 million passengers a year involved in customer data breach (Daily Mail) Information Regarding Customer Data Breach (Vietnam Airlines) Auto giant Stellantis discloses data breach affecting North American customers (Top Class Actions) North Korean Scammers Are Doing Architectural Design Now (WIRED) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Clipboard Image Stealer Xavier presents an infostealer in Python that steals images from the clipboard. https://isc.sans.edu/diary/Clipboard%20Pictures%20Exfiltration%20in%20Python%20Infostealer/32372 F5 Compromise F5 announced a wide-ranging compromise today. Source code and information about unpatched vulnerabilities were stolen. https://my.f5.com/manage/s/article/K000157005 https://my.f5.com/manage/s/article/K000156572 https://my.f5.com/manage/s/article/K000154696 Adobe Updates Adobe updated 12 different products yesterday. https://helpx.adobe.com/security.html SAP Patchday Among the critical vulnerabilities patched in SAP s products are two deserialization vulnerabilities with a CVSS score of 10.0 https://support.sap.com/en/my-support/knowledge-base/security-notes-news/october-2025.html https://onapsis.com/blog/sap-security-patch-day-october-2025/
How is the transition to passkeys going in 2025?
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Building Better Defenses: RedTail Observations Defending against attacks like RedTail is more then blocking IoCs, but instead one must focus on the techniques and tactics attackers use. https://isc.sans.edu/diary/Guest+Diary+Building+Better+Defenses+RedTail+Observations+from+a+Honeypot/32312 Sonicwall: It wasn t the user s fault Sonicwall admits to a breach resulting in the loss of user configurations stored in its cloud service https://www.sonicwall.com/support/knowledge-base/mysonicwall-cloud-backup-file-incident/250915160910330 Crowdstrike has Issues Crowdstrike fixes two vulnerabilities in the Windows version of its Falcon sensor. https://www.crowdstrike.com/en-us/security-advisories/issues-affecting-crowdstrike-falcon-sensor-for-windows/ Interrogators: Attack Surface Mapping in an Agentic World A SANS.edu master s degree student research paper by Michael Samson https://isc.sans.edu/researchpapers/pdfs/michael_samson.pdf keywords: ai; agentic; attack surface; crowdstrike; sonicwall; ivanti; zero day; initiative; redline