POPULARITY
Categories
The Repairers at The Breach and The Great Divide 2025 by Bishop Joaquin G. Molina
2 Chronicles 32:1-8 KJV - After these things, and the establishment thereof, Sennacherib king of Assyria came, and entered into Judah, and encamped against the fenced cities, and thought to win them for himself. 2 And when Hezekiah saw that Sennacherib was come, and that he was purposed to fight against Jerusalem, 3 He took counsel with his princes and his mighty men to stop the waters of the fountains which were without the city: and they did help him. 4 So there was gathered much people together, who stopped all the fountains, and the brook that ran through the midst of the land, saying, Why should the kings of Assyria come, and find much water? 5 Also he strengthened himself, and built up all the wall that was broken, and raised it up to the towers, and another wall without, and repaired Millo in the city of David, and made darts and shields in abundance. 6 And he set captains of war over the people, and gathered them together to him in the street of the gate of the city, and spake comfortably to them, saying, 7 Be strong and courageous, be not afraid nor dismayed for the king of Assyria, nor for all the multitude that is with him: for there be more with us than with him: 8 With him is an arm of flesh; but with us is the LORD our God to help us, and to fight our battles. And the people rested themselves upon the words of Hezekiah king of Judah.
Rumble Live show! Youtube Live Show! Click for Cookbooks Amazon CBC Store
Drex covers in-depth look at the ongoing ransomware attack on Kettering Health, attributed to the Interlock gang known for double extortion tactics - stealing data before encrypting systems. The health system demonstrates exemplary crisis communication while maintaining operations and warning patients about related scams. Next, the Scattered Spider cybercriminal group shifts focus to European retail, using social engineering tactics and freelancer networks to target help desks and employees for credential theft. Finally, a massive data scraping incident exposes 1.2 billion Facebook records on dark web marketplaces, including names, emails, birthdays, and phone numbers. Essential updates for healthcare security professionals navigating today's threat landscape. Remember, Stay a Little Paranoid X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
Signal adds Recall blocker Critical Windows Server 2025 dMSA vulnerability warning Pathology lab suffers data breach Huge thanks to our sponsor, Conveyor Still spending hours maintaining a massive spreadsheet of Q&A pairs or using RFP tools to answer security questionnaires? Conveyor's AI doesn't need hand-holding and gets you accurate answers every time with limited knowledge base maintenance. It reads directly from your connected sources—documents, wikis, websites, Confluence, Google drive, and even your Conveyor trust center. You don't maintain a knowledge base. You connect to one. And our AI does the rest for you. See what real auto-fill magic looks like at www.conveyor.com Find the stories behind the headlines at CISOseries.com.
Introduce a re-mixing of cassette, originally published online in November 2022. Address potential copyright issues by removing or reducing background music (e.g., "Carry Out Feelings" by Nazareth and "Ode to Billie Joe" by Bobbie Gentry).Discusses recent violent incident in Washington, D.C., where two Israeli embassy workers were killed, advocating for harsher punishments for violent acts. Also mention a tax reform bill, expressing concern over a possible broken promise regarding no tax on Social Security.Not typically an NBA fan, enjoyed a Knicks vs. Pacers game but criticizes the NBA for becoming political, specifically calling out LeBron James.Newly written poem titled "Breacher Leacher," which is abstract and cryptic, touching on themes of deception and decay.1976 cassette features family members, including Helen May Wright "MawMaw" Adolph, Wendy Fitzgerald, and cousins Steve, Craig, Mike, John Dirk, and Kyle, with MawMaw talking prominently.Cassette captures a lively, chaotic conversation among cousins and aunts, in rural Boothville. The dialogue is informal, filled with interruptions, and reflects childhood antics and family dynamics.Kids talk about starting swimming lessons and playing games like volleyball and kickball at a recreation program. They describe beating one team and losing to another.Kids recount mowing grass, playing with frogs (including trying to run them over with a tractor), and grocery shopping mishaps, like Michael dropping a pickle jar and Stevie stealing jawbreakers.Mention using a CB radio, pretending to be characters like Steve Austin (from "The Six Million Dollar Man"), and engaging in imaginative play, such as frog hunting and pirogue (small boat) adventures in a river.Kids talk about staying at MawMaw's house, Craig's antics, and conflicts with parents. They also mention a baseball game and hopes of hitting home runs.Conversation is filled with playful teasing, complaints about smells (e.g., stink bugs, flatulence), and exaggerated stories, like a frog surviving a tractor blade or a ship in the river.The 1976 cassette captures the carefree, mischievous spirit of childhood in the mid-1970s, with vivid descriptions of rural life, family bonds, and playful banter.Attempt to blend modern opinions with nostalgia for the past.
Drex covers three critical cybersecurity stories in healthcare: Kettering Health Network's ransomware crisis affecting 14 hospitals with patient data at risk, a landmark $700,000 civil penalty against Breach Forums founder Connor Fitzpatrick, and the release of Have I Been Pwned (HIBP) 2.0 with enhanced breach monitoring capabilities. Stay informed on the latest healthcare security threats and solutions.Remember, Stay a Little Paranoid X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
When news broke that Trump’s senior military leadership had used an unsecured group chat to share sensitive information, the consequences were more than political—they were personal. For Kendall Brown, content creator, digital strategist, and a military spouse, the scandal known as SignalGate hit home: her husband’s life was directly endangered by the breach in protocol. Outraged, Kendall recorded a video of herself calling her senator’s office and demanding accountability. The clip went viral, drawing major media attention—and a wave of backlash. But while the threats and hate came in fast, Kendall, known for her sharp wit and thick skin, was more irritated by how unoriginal and not funny the trolls were. In this candid and surprisingly funny conversation with Bridget, Kendall shares what it’s like to live with the real-life consequences of political negligence. They dive into her experience as a military spouse, the realities of online activism, and what many on the left often get wrong about military families. Follow Kendall on TikTok: @kendallybrownRead more: Military Wife Rips Hegseth for Risking ‘Husband’s Life’ in Viral Video – The Daily Beast Follow Bridget across the internet: IG @BridgetMarieInDC TikTok @BridgetMarieInDC YouTube: ThereAreNoGirlsOnTheInternet See omnystudio.com/listener for privacy information.
AI has taken us into uncharted territory.
The Government Accountability Office blocked an attempt by Elon Musk's DOGE to install a team at the congressional watchdog, according to a spokesperson for the independent, nonpartisan agency and an email shared with FedScoop. The spokesperson said that DOGE staffers who attempted to establish a team at the watchdog cited President Donald Trump's executive order creating the efficiency-driven group within the White House. The spokesperson further confirmed that the agency had “declined any requests to have a DOGE team assigned to GAO.” The watchdog also sent an email to its staff Friday about the attempt and its response, a GAO source confirmed. According to the text of that email shared with FedScoop, GAO said it sent a letter to DOGE's acting administrator “stating that GAO is a legislative branch agency that conducts work for Congress. As such, we are not subject to DOGE or Executive Orders.” A top Senate Intelligence Democrat is warning the Office of Personnel Management against cancelling identity protection services that have been provided to current and former federal employees since their data was exposed in the massive 2015 OPM data breach. In a letter sent Friday to OPM acting Director Charles Ezell, Sen. Mark Warner, D-Va., expressed concerns about Department of Government Efficiency-instituted cuts to the personnel agency and plans that it may have to “curtail identity theft monitoring for millions of public servants and their families whose information was compromised in 2015.” The breach of OPM servers by Chinese-backed hackers rocked Washington and the federal workforce a decade ago, as the Social Security numbers, birthdates, addresses and other personal information of more than 21 million individuals were exposed. At the time, Warner, his Virginia Senate colleague Tim Kaine and then-Sens. Ben Cardin and Barbara Mikulski of Maryland co-sponsored the RECOVER Act to provide identity protection services to those impacted by the OPM breach. Congress appropriated funds for those services “for a period of not less than 10 years.” The Daily Scoop Podcast is available every Monday-Friday afternoon. If you want to hear more of the latest from Washington, subscribe to The Daily Scoop Podcast on Apple Podcasts, Soundcloud, Spotify and YouTube.
See omnystudio.com/listener for privacy information.
When a cybersecurity CEO strolls into a hospital and decides to play malware magician with a couple of unlocked computers, you've got yourself a plot twist worthy of a Netflix docuseries. In this episode, we dive headfirst into bizarre breaches, finger-pointing fiascos, and the kind of contractual confusion that'll make you want to reread your SLAs before breakfast. It's a rollercoaster of responsibility, reputation, and really bad behavior. But at the heart of it all is the million-dollar question: who's actually responsible when it all goes sideways? More info at HelpMeWithHIPAA.com/509
Three Buddy Problem - Episode 46: We dig into a Coinbase breach headlined by bribes, rogue contractors and a $20 million ransom demand. Plus, (another!) batch of Ivanti and Microsoft zero-days being exploited in the wild, a new 'Intrusion Logging' feature coming to Android, Apple's iOS 18.5 patches, and the EU announcing its own vulnerability database and software vendor secure-coding pledge. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).
Coinbase was extorted by hackers who bribed employees for user data, America's largest steel producer halts production after a cyberattack, Scattered Spider shifts to targeting US retailers, and the US abandons plans to protect Americans from data brokers. Show notes
In part two of Red Eye Radio with Gary McNamara and Eric Harley, Reuters reports on potential breaches in firewalls done remotely involving solar and wind farms. Also intellectual property rights, the so-called rights of activist judges, passionate audio from Representative Mark Green on the importance of law enforcement and the liberal disdain for law and order and much more. For more talk on the issues that matter to you, listen on radio stations across America Monday-Friday 12am-5am CT (1am-6am ET and 10pm-3am PT), download the RED EYE RADIO SHOW app, asking your smart speaker, or listening at RedEyeRadioShow.com. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Welcome to the Identity Theft Resource Center's (ITRC's) Weekly Breach Breakdown for May 16, 2025. I'm Alex Achten, Senior Director of Communications & Media Relations of the ITRC. Thanks to Sentilink for supporting the ITRC and this podcast. Each week, we look at the most recent events and trends related to data security and privacy. Today, we will analyze the newly formed data privacy consortium. Follow on LinkedIn: www.linkedin.com/company/idtheftcenter/ Follow on Twitter: twitter.com/IDTheftCenter
Daily Devotional - Job 19:1-29 - I Know My Redeemer Lives
Featuring: Michael “Boston” Hannon and Paul “Moonpir” Smith Running Time: 10:53 Music by MusiM: Homepage | Bandcamp Livestream Archive: YouTube This week on TVGP's We Roguelike It we start a brand new game: Shogun Showdown! As we get started on this game we describe the game, talk about Into the Breach, learn some hot strats, and much more! Become a patron of TVGP for just a few dollars a month at E1M1's Patreon Page! Get *two weeks* early access to this show (among other shows), show notes, uncensored outtakes, and more for just $5/month!
In this episode of Reimagining Cyber, Rob Aragao welcomes Matt Gorham, former Assistant Director of the FBI's Cyber Division and current leader of PwC's Cyber and Risk Innovation Institute. Gorham shares critical insights from his 25-year FBI career and discusses the evolution of ransomware—especially the rise of ransomware-as-a-service models and the business-like operations of Eastern European cybercriminal syndicates. He emphasizes the importance of cyber hygiene, incident response planning, and executive-level tabletop exercises. The discussion also covers the often-misunderstood relationship between private companies and law enforcement, as well as the implications of AI, onshoring manufacturing, and the shifting geopolitical cybersecurity landscape. A must-listen for CISOs, board members, and security leaders looking to turn preparation into resilience.Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.
Robert Acosta is the VP of IT at Spanish Broadcasting. In this episode, he joins host Heather Engel and Tia Hopkins, Chief Cyber Resilience Officer and Field CTO at eSentire, to discuss rebuilding after a breach from the inside out, including the best approaches to resilience, general best practices for security programs, and more. Next Level CISO is a Cybercrime Magazine podcast brought to you by eSentire, the Authority in Managed Detection and Response. eSentire's mission is to hunt, investigate and stop cyber threats before they become business disrupting events. To learn more about our sponsor, visit https://esentire.com
Global Crossing Airlines Group confirms cyberattack Google settles privacy lawsuits UK launches software security guidelines Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines.
FaZe ZooMaa, Ben, Aches, Parasite, and Octane break down the Call of Duty League matches from 5/11/2025
This week on the BBC Introducing in Oxfordshire and Berkshire podcast... Kah'Nya joins Dave for a chat and live session - watch her playing Number 1 here: https://www.bbc.co.uk/programmes/p0l94407Plus, Alex catches up with The Amazons for a deep dive into their 21st Century Fiction album - hear the full version on BBC Sounds here: https://www.bbc.co.uk/sounds/play/p0l9484k, we hear what's planned at Reading's multi-venue Are You Listening? Festival with organiser Dave Maul, there's tips from Jess and Alyx at BBC Radio 1, and all the latest new music from Oxfordshire & Berkshire.Here's this week's tracklist: • Dani Sylvia - this is not about me Lester Kamen - Scares You To Death Frannie B - Collateral Sundaughter - Austrian P.S. Finn - Insecure Dogz Or Godz - Oh So Beautiful Mandrake Handshake - Hypersonic Super-Asterid Palmist - Got Another Lover [tipped by Alyx Holcome at BBC Radio 1] The Dazed Minded - Harder to Ignore KalemGR - 3 am Arimea - Deliver Me ZOFIA - Belong Kah'Nya - King of the Palace Kah'Nya - Number 1 (live acoustic session) eliroijon - Breach & Dive Rosa - brave enough [tipped by Jess Iszatt at BBC Radio 1] Logan Cannon - Headdown! Barefoot Molly - How long to the river MANNERS - DISTANCE (REBOOTED) Oscar Scannell - Sleepwalking The Amazons - Wake Me Up • If you're making music in Oxfordshire and Berkshire, send us your tunes with the BBC Introducing Uploader: https://www.bbc.co.uk/introducing/uploader
Cape Breton's Information Morning from CBC Radio Nova Scotia (Highlights)
A Cape Breton-born tech expert says the PowerSchool breach should raise questions about who we trust with our personal information.
Daily Devotional - Job 17:1-16 - Hope In The Shadows“My spirit is broken… where then is my hope?” Job's cry still echoes for many of us today.
This lecture text explores contract interpretation, discussing how courts determine the meaning of agreements using the plain meaning rule and extrinsic evidence, such as course of performance, course of dealing, and usage of trade, while also considering the parol evidence rule. It then differentiates performance obligations under common law and the U.C.C., contrasting substantial performance with the perfect tender rule, and introducing the concept of conditions. The material further explains breach, including material versus minor breaches and anticipatory repudiation, before outlining the rights of third parties through assignment, delegation, and third-party beneficiary contracts, finally addressing ways performance may be excused due to impossibility, impracticability, or frustration of purpose.This conversation delves into the complexities of contract law, focusing on the stages beyond formation, including interpretation, performance, conditions, breach, and third-party rights. The discussion emphasizes the importance of understanding the intent behind contracts, the standards for performance under common law and the UCC, and the implications of breaches. It also covers the roles of conditions, anticipatory repudiation, and the rights of third parties in contractual agreements, concluding with the circumstances under which performance may be excused.Understanding contract law goes beyond just formation.Contract interpretation focuses on the parties' intent.Extrinsic evidence plays a crucial role in ambiguous contracts.Substantial performance is key in common law contracts.The UCC applies a stricter perfect tender rule for goods.Conditions can be express or implied and affect performance duties.Material breaches excuse the non-breaching party from performance.Anticipatory repudiation allows immediate action against a breaching party.Third parties can gain rights through assignment, delegation, or as beneficiaries.Excuses for non-performance include impossibility and frustration of purpose.According to the plain meaning rule, courts interpret unambiguous contract language according to its ordinary meaning, without considering outside evidence.If contract language is ambiguous, courts may consider extrinsic evidence such as prior negotiations, drafts, industry standards, or other contemporaneous writings to determine the parties' intent.Course of performance refers to the parties' behavior under the current contract, while course of dealing refers to their conduct in previous contracts. Both provide insight into the parties' understanding of terms.The parol evidence rule's purpose is generally to prevent parties from using prior or contemporaneous oral or written statements to contradict or change the terms of a complete and final written contract.Common law substantial performance allows enforcement if the essential purpose is met with minor deviations, while the U.C.C.'s perfect tender rule requires goods to conform exactly to contract terms for the buyer to be obligated to accept them.Under the perfect tender rule, a seller might satisfy their obligation despite nonconforming goods by exercising their right to "cure" the defective tender within the contract performance period.A condition precedent is an event that must occur before a party is obligated to perform. An example from the source is a loan disbursement being conditioned on providing proof of income.A material breach is a serious violation going to the essence of the contract that excuses the non-breaching party's performance, while a minor breach is less significant and only entitles the injured party to damages.Upon anticipatory repudiation, the non-breaching party can treat it as a breach and sue immediately, suspend performance and wait, or urge performance and await retraction.An assignment is a transfer of rights under a contract, while a delegation is a transfer of duties. In a delegation, the original party typically remains liable
Welcome to the Identity Theft Resource Center's (ITRC) Weekly Breach Breakdown for May 9, 2025. I'm Timothy Walden. Thanks to SentiLink for their support of the ITRC and this podcast. Each week, we bring you the latest developments in data security and privacy. Today, we're talking about a phishing campaign that's both convincing and dangerous—Social Security scam emails. It could end with someone taking complete control of your computer. It starts with a fake email from the ‘U.S. Social Security Administration' or SSA. Follow on LinkedIn: www.linkedin.com/company/idtheftcenter/ Follow on Twitter: twitter.com/IDTheftCenter
Microsoft to officially abandon passwords and support their deletion. Meta's RayBan smart glasses weaken their privacy terms. 30% of Microsoft code is now being written by AI. Google says prying Chrome from it will damage its security. Nearly 1,000 six-year-old eCommerce backdoors spring to life. eM Client moves to version 10.3 A bunch of terrific listener feedback creates talking points. A little-known, insecure message archiving service comes to light. Show Notes - https://www.grc.com/sn/sn-1024-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT drata.com/securitynow material.security threatlocker.com/twit
Microsoft to officially abandon passwords and support their deletion. Meta's RayBan smart glasses weaken their privacy terms. 30% of Microsoft code is now being written by AI. Google says prying Chrome from it will damage its security. Nearly 1,000 six-year-old eCommerce backdoors spring to life. eM Client moves to version 10.3 A bunch of terrific listener feedback creates talking points. A little-known, insecure message archiving service comes to light. Show Notes - https://www.grc.com/sn/sn-1024-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT drata.com/securitynow material.security threatlocker.com/twit
Microsoft to officially abandon passwords and support their deletion. Meta's RayBan smart glasses weaken their privacy terms. 30% of Microsoft code is now being written by AI. Google says prying Chrome from it will damage its security. Nearly 1,000 six-year-old eCommerce backdoors spring to life. eM Client moves to version 10.3 A bunch of terrific listener feedback creates talking points. A little-known, insecure message archiving service comes to light. Show Notes - https://www.grc.com/sn/sn-1024-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT drata.com/securitynow material.security threatlocker.com/twit
Microsoft to officially abandon passwords and support their deletion. Meta's RayBan smart glasses weaken their privacy terms. 30% of Microsoft code is now being written by AI. Google says prying Chrome from it will damage its security. Nearly 1,000 six-year-old eCommerce backdoors spring to life. eM Client moves to version 10.3 A bunch of terrific listener feedback creates talking points. A little-known, insecure message archiving service comes to light. Show Notes - https://www.grc.com/sn/sn-1024-notes.pdf Hosts: Steve Gibson and Leo Laporte Download or subscribe to Security Now at https://twit.tv/shows/security-now. You can submit a question to Security Now at the GRC Feedback Page. For 16kbps versions, transcripts, and notes (including fixes), visit Steve's site: grc.com, also the home of the best disk maintenance and recovery utility ever written Spinrite 6. Join Club TWiT for Ad-Free Podcasts! Support what you love and get ad-free shows, a members-only Discord, and behind-the-scenes access. Join today: https://twit.tv/clubtwit Sponsors: bitwarden.com/twit joindeleteme.com/twit promo code TWIT drata.com/securitynow material.security threatlocker.com/twit
In this episode of Cybersecurity Today, host Jim Love delves into a range of alarming cyber incidents. A six-year sleeper supply chain attack has compromised thousands of e-commerce websites, exploiting vulnerabilities in Magento extensions from vendors Tigren, Meetanshi, and Magesolution. Russian-controlled open-source tool Easy JSON raises scrutiny over potential threats in critical sectors like defense and finance. In Ontario, a sophisticated bank draft scam costs a business $108,000, emphasizing the need for verification processes. Additionally, a messaging tool used by the Trump administration to archive Signal messages has been hacked twice, highlighting serious concerns over the security of high-level US communications. Stay tuned for the latest insights and expert advice on maintaining cybersecurity. 00:00 Sleeper Supply Chain Attack Activates After Six Years 02:19 Russian Controlled Open Source Tool Raises Alarms 04:32 Fake Bank Draft Fools the Bank 05:56 Signal Archiving Tool Breached 08:33 Conclusion and Contact Information
This lecture explores the principles of contract interpretation, performance obligations, breach of contract, and the rights of third parties. It covers how courts interpret contracts, the significance of performance standards under common law and UCC, the implications of breach, and the conditions under which performance may be excused. The lecture emphasizes the importance of understanding these concepts for effective contract law practice.TakeawaysCourts interpret contracts to reflect the parties' intentions.The plain meaning rule is the starting point for interpretation.Substantial performance allows enforcement despite minor defects.The perfect tender rule requires exact conformity in UCC contracts.Conditions can be express, implied, or constructive.Material breaches excuse the non-breaching party's performance.Anticipatory repudiation allows for immediate legal action.Third parties can acquire rights through assignment or delegation.Impossibility and impracticability can excuse performance.Frustration of purpose can prevent enforcement of contracts.Chapters00:00 Understanding Contract Interpretation04:13 Performance Obligations in Contracts08:01 Breach of Contract and Its Consequences11:49 Rights of Third Parties and Excusing Performancecontract interpretation, performance obligations, breach of contract, third-party rights, contract law, UCC, common law, anticipatory repudiation, conditions, legal doctrines
Tonight's show is going to be of the Open Lines variety as there is a lot of contemplating the first 100 Days of Donald Trump's second term as president, so I'd like to know what the audience thinks. Can't escape the schizophrenic reaction that Trump's AI Pope tweet caused, and in the second half we'll get a Cyber Security report with James and Skip of Patriot Protect. Great week of guests coming up so make sure you stay familiar with the guest calendar on the site! Unleash Your Brain w/ Keto Brainz Nootropic Promo code FRANKLY: https://tinyurl.com/2cess6y7 Read This Month's Newsletter: https://t.co/eMCYWuTi6p Elevation Blend Coffee & Official QF Mugs: https://www.coffeerevolution.shop/category/quite-frankly Official QF Apparel: https://tinyurl.com/f3kbkr4s Sponsor The Show and Get VIP Perks: https://www.quitefrankly.tv/sponsor One-Time Tip: http://www.paypal.me/QuiteFranklyLive Send Holiday cards, Letters, and other small gifts, to the Quite Frankly P.O. Box! 15 East Putnam Ave, #356 Greenwich, CT, 06830 Send Crypto: BTC: 1EafWUDPHY6y6HQNBjZ4kLWzQJFnE5k9PK Leave a Voice Mail: https://www.speakpipe.com/QuiteFrankly Quite Frankly Socials: Twitter/X: @QuiteFranklyTV Instagram: @QuiteFranklyOfficial Discord Chat: https://discord.gg/KCdh92Fn GUILDED Chat: https://tinyurl.com/kzrk6nxa Official Forum: https://tinyurl.com/k89p88s8 Telegram: https://t.me/quitefranklytv Truth: https://tinyurl.com/5n8x9s6f GETTR: https://tinyurl.com/2fprkyn4 MINDS: https://tinyurl.com/4p84d3cx Gab: https://tinyurl.com/mr42m2au Streaming Live On: QuiteFrankly.tv (Powered by Foxhole) Youtube: https://tinyurl.com/yc2cn395 BitChute: https://tinyurl.com/46dfca5c Rumble: https://tinyurl.com/yeytwwyz Kick: https://kick.com/quitefranklytv Audio On Demand: Spotify: https://spoti.fi/301gcES iTunes: http://apple.co/2dMURMq Amazon: https://amzn.to/3afgEXZ SoundCloud: https://tinyurl.com/yc44m474
New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read more »
New breach reports show threat actor dwell times are dropping significantly. It’s a positive development, but there is a caveat. We discuss this caveat and other findings from the 2025 editions of the Verizon Data Breach Investigations Report and the Google M-Trends Report. We also get highlights from the 2025 RSA Conference, and JJ gets... Read more »
It's our World Password Day Special!
In this episode of the Crystal Core Radio Podcast, host Brian is joined by guests Scrag and Range Bambus for a lively roundtable discussion on the latest in gaming news. The show kicks off with exciting insights from Range, making his first appearance on the podcast. As a burgeoning content creator, he shares his journey into streaming and his passion for connecting with audiences via platforms like Twitch and TikTok. The discussion dives into the controversies around recent price hikes by major gaming companies, notably the Xbox and the anticipated Switch 2. Scrag delivers a passionate rant on the greed driving these changes, drawing comparisons with Valve's approach to pricing. Main topics covered include the significant Breach update, featuring active developer involvement and community feedback gathered from Discord. This episode also explores the impact of gaming community dynamics, addressing concerns like console pricing strategies, the role of add-ons in games like World of Warcraft, and the potential shift of major titles to console platforms. Don't miss the thoughtful debates on future gaming directions, including the future of hardware pricing for upcoming gaming consoles, the strategic responses expected from companies like Sony, and the potential influence of cloud gaming. Listeners can look forward to rich discussions on wipe mechanics and their role in game replayability, comparisons between different gaming genres, and speculations on future updates and strategies in popular games. With insightful contributions from both Scrag and Range, this episode offers a comprehensive look at the shifting landscape of the gaming industry.
Waymo expanding fleet in the US, Apple appeals App Store court ruling, South Korea in development on Hypertube. MP3 Please SUBSCRIBE HERE for free or get DTNS Live ad-free. A special thanks to all our supporters–without you, none of this would be possible. If you enjoy what you see you can support the show onContinue reading "TeleMessage Breach Using Modified Versions of Signal Leaks Chats, Contacts – DTH"
Special Breach Report: Q1 2025 Stats! by Nick Espinosa, Chief Security Fanatic
Scott Schober, Cyber Expert, Author of "Hacked Again," and CEO of Berkeley Varitronics Systems, sits down with host David Braue to discuss a cyberattack on The Office of the Comptroller of the Currency. This episode of Data Security is sponsored by Cimcor, the developer of CimTrak, a Real-time, File Integrity Monitoring, Network Configuration, and Compliance solution. Learn more at https://cimcor.com • For more on cybersecurity, visit us at https://cybersecurityventures.com
Founder of Repairers of the Breach and Moral Mondays, the Right Reverend Dr. William Barber, talks about his arrest Monday in the U.S. Capitol Rotunda as he and other faith leaders protested the Republican-led budget bill.Become a supporter of this podcast: https://www.spreaker.com/podcast/tavis-smiley--6286410/support.
Drex covers three critical cybersecurity stories: The FBI's annual Internet Crime Complaints Center report revealing a 9% increase in ransomware attacks and 67 new ransomware variants; JP Morgan Chase's CISO's open letter on third-party supply chain vulnerabilities; and a major data breach at Work Composer exposing 21 million employee screenshots stored in an unsecured Amazon S3 bucket. Key lesson: properly secure your cloud storage configurations.Remember, Stay a Little Paranoid X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
Sean and Alon tear through another crop of five delightfully different video entertainment products for less than an hour apiece:Blaž Urban Gracar and Ferran Ruiz Sala's adaptation of acclaimed pen and paper puzzle book, LOK DigitalTaito's 1983 classic spy simulator Elevator ActionTonda Ros' roguelike print-em-up and game du jour, Blue PrinceHAL Laboratory's Kirby-branded mini golf game, Kirby's Dream CourseJay Ma and Matthew Davis' turn-based bug shover Into The Breach—Now's your big chance to decide which of the five games we played we'll be covering for the next Game Club! Come on down to the Discord and place your vote: https://discord.gg/ACbDjNhMpJWant to submit games for future mini Club episodes? Join the ranks of the High Council by subscribing to the Wide Flank Patreon and you'll gain access to an exclusive channel on the Discord: https://www.patreon.com/wideflankTHE REST: https://linktr.ee/wideflank—Timestamps:00:00:00 - Intro / Admin00:04:01 - Sean's Plan for the Order of the Games00:09:11 - LOK Digital00:21:14 - Elevator Action00:34:32 - Blue Prince00:47:59 - Kirby's Dream Course00:59:56 - Into the Breach—Show notes:LOK Digital: https://store.steampowered.com/app/2207440/LOK_Digital/Elevator Action: https://en.wikipedia.org/wiki/Elevator_ActionBlue Prince: https://store.steampowered.com/app/1569580/Blue_Prince/Kirby's Dream Course - https://en.wikipedia.org/wiki/Kirby's_Dream_CourseInto the Breach: https://store.steampowered.com/app/590380/Into_the_Breach/Elevator Action showed me what games could be: https://ravi64.com/elevator-action-everyday-fun/XP Arcade: Elevator Action: https://retroxp.beehiiv.com/p/xp-arcade-elevator-action30 years of Kirby: HAL, experimentation, and Kirby: https://retroxp.substack.com/p/30-years-of-kirby-hal-experimentation
In this fact-busting 30-minute episode, Jon and Lewis explore Google's AI AgentSpace technology and how it could let business teams run complete workflows without ever leaving the agent environment. They then test the marketing claims behind Openai's latest model features, before dissecting Oracle's cloud data breach. Finally, they map out the potential impact of the proposed Clean Cloud Act on the energy footprint. Hosts:https://www.linkedin.com/in/jonathanshanks/https://www.linkedin.com/in/lewismarshall/
Verizon and Mandiant call for layered defenses against evolving threats. Cisco Talos describes ToyMaker and Cactus threat actors. Researchers discover a major Linux security flaw which allows rootkits to bypass traditional detection methods. Ransomware groups are experimenting with new business models. Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division shares the latest on Salt Typhoon. Global censorship takes a coffee break. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Dave sits down with Deputy Assistant Director Cynthia Kaiser from the FBI Cyber Division who shares a PSA on Salt Typhoon. Selected Reading 2025 Data Breach Investigations Report (Verizon) Mandiant M-Trends 2025 Report (Mandiant) Introducing ToyMaker, an initial access broker working in cahoots with double extortion gangs (Ciso Talos) Linux 'io_uring' security blindspot allows stealthy rootkit attacks (bleepingcomputer) Ransomware groups test new business models to hit more victims, increase profits (the record) Cloudflare: Government-backed internet shutdowns plummet to zero in first quarter (the record) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Once a month, the Packet Protector podcast likes to see what’s going on out there via our news roundup. There’s a lot happening! Today we discuss Fortinet warning that a threat actor has found a way to maintain read-only access on Fortinet devices even if you’ve applied the patch for the original threat. Avanti VPNs... Read more »
Double Tap Episode 406 This episode of Double Tap is brought to you by: Brownells, Midwest Industries, Swampfox Optics, XTech Tactical, Die Free Co., Blue Alpha, and Mitchell Defense Welcome to Double Tap, episode 406! Your hosts tonight are Jeremy Pozderac, Aaron Krieger, Nick Lynch, and me Shawn Herrin, welcome to the show! Die Free Co Contest: For the rest of April: Submit your Die Free CO receipt to be entered to win a prize pack. GOALS August 9th and 10th in Knoxville, Tennessee. https://events.goa.org/goals/ GunCon PUBLIC EVENT - June 28th Location - Cleveland, Ohio at the Twist Drill Building (1242 E 49th St) Industry/Media Events - June 25-28 (Mixed locations around Cleveland area) https://guncon.net/event/guncon-2025/ Dear WLS Pretty Horse - What is everyone's favorite nut? Sandy Ravage - What are some good training drill for an intermediate shooter, something more than 1r1, Mozambique, or transitions and the like but less than full blown shoot house Bigar Kauklanu - Im looking at the brownells branded 12.7" retro a1 barrel in 1 / 7 twist (brownells part # 078000462) for a retro modern monstrosity build with a carry handle receiver. Not too knowledgeable on the pencil profiles so should I run a flaming pig or my yhm phantom m2 on it? Ps, congratulations Jerombé on your son and I hope he doesn't have downs like you. #NoNotesBorthers Mega Lodong - Fusion XP pro. Platypus slayer? Or gimmick? I thought the lead engineer from Dan Wesson went to make gats and is sourcing stuff from turkey, so we get this company called fusion. Is it similar to turduckin? Like turfusion? Tusion? Or is it the fukey? Furkey? You tell me. Rusty S - Dear cunts, and Aaron. Just came back from a two day rifle course running a bull pup. I was struggling to easy get a decent sight picture with my lvpo. I had to smoosh my fat ted Kennedy head into the stock, and was even worse while shooting prone. the instructor said my scope mount was too low. How do I measure what hight mount? Are there standard heights for mounts?And reconditions for the cast would be appreciated Thanks for the help Sexual Snakebite - Hello WLS Cast and Cult. Quick question for you fuckers- I'm thinking about going full retard and puting a Herrington Arms Comp on my PSA Daggerino, but I'm being too much of a bitch to want to buy a new holster for my glawk fawdy. Should I just order another from our beloved BRC and just have another option, or could I just heat that bitch up and push the pistol through the kydex and reform around it? I'm pretty certain that the retention is made mostly with the WML I have attached, which luckily is not an olight since I like my holsters and legs to not be on fire. What do yall think, about things and stuff, and my question? Thank you much for your input. Extra Notes, see below, no, more, below that. Yeah, around there. Lou Skunt - Flash cans & blast forwarding devices are gay. Can I pin & weld a ka-bar to my barrel to achieve 16”? Fred Dog - Most famous person you have met? The winner of this week's swag pack is Bigar Kauklanu! To win your own, go to welikeshooting.com/dashboard and submit a question! Gun Industry News Magpul's Strongest Gloves: The Breach 2.0 Magpul has released a new glove called the Breach 2.0, designed for tough use. It features durable materials and better grip. The price is not mentioned, but it's marketed as a high-quality option for gun enthusiasts. The gloves are currently available. Kastinger Brass Catcher Review The Kastinger Brass Catcher is a special accessory for gun owners that helps collect fired brass cases. It attaches to firearms and prevents spent casings from scattering. It's designed to be easily mounted and is handy for reloading. This product is priced around $30 to $50. It is currently available for purchase.
Welcome to The Times of Israel's Daily Briefing, your 20-minute audio update on what's happening in Israel, the Middle East and the Jewish world. Military reporter Emanuel Fabian joins host Amanda Borschel-Dan for today's episode. Yesterday, the Israel Defense Forces announced the dismissal of the deputy commander of the Golani Brigade’s reconnaissance unit over the March 23 incident in which 15 medics were killed after his forces opened fire on a convoy of ambulances and emergency vehicles in southern Gaza’s Rafah. Fabian explains the findings of a high-level IDF probe. The Lebanese army announced Sunday that it had foiled a planned rocket attack from Lebanon at Israel for the first time since a November ceasefire cut short a year of fighting between Israel and Hezbollah. We learn about what steps the Lebanese Armed Forces are currently taking to fulfill the terms of the ceasefire. On Saturday, for the first time since the IDF resumed its offensive against Hamas in the Strip on March 18, a soldier was killed inside the Strip. The deadly incident took place during work to clear the area close to the border of Hamas infrastructure, including tunnels, as part of efforts to expand Israel’s buffer zone — which now comprises over 30 percent of the Strip. Fabian discusses the IDF's recent activities ahead of his IDF embed to the Morag Corridor today. We learn about the IDF's Bedouin tracker units and hear about an attempt from several Israeli civilians to enter the Gaza Strip on Sunday. Check out The Times of Israel's ongoing live blog for more updates. For further reading: Admitting ‘errors,’ IDF fires officer over killing of 15 rescue workers in Gaza’s Rafah In first since ceasefire, Lebanese army says it foiled rocket attack on Israel Israeli soldier killed in Hamas attack, in first since collapse of Gaza ceasefire Subscribe to The Times of Israel Daily Briefing on Apple Podcasts, Spotify, YouTube, or wherever you get your podcasts. This episode was produced by the Pod-Waves and video edited by Thomas Girsch. IMAGE: Mourners gather around the bodies of 8 Red Crescent emergency responders, recovered in Rafah a week after an Israeli attack, as they are transported for burial from a hospital in Deir al-Balah, Gaza Strip, on March 31, 2025. (AP Photo/Abdel Kareem Hana,File) See omnystudio.com/listener for privacy information.