POPULARITY
Categories
We start this week with Emanuel's and Joseph's coverage of Tea, a women's dating safety app that was breached multiple times. After the break, Sam and Emanuel talk about how a new UK law about age verification is impacting peoples' ability to see footage about current events. In the subscribers-only section, Jason explains that LeBron James is not in fact pregnant. YouTube version: https://youtu.be/q17GRPq7K3o Women Dating Safety App 'Tea' Breached, Users' IDs Posted to 4chan A Second Tea Breach Reveals Users' DMs About Abortions and Cheating UK Users Need to Post Selfie or Photo ID to View Reddit's r/IsraelCrimes, r/UkraineWarFootage Credit Card Companies Are Hurting the Future of Video Games Steam Bends to Payment Processors on Porn Games LeBron James' Lawyers Send Cease-and-Desist to AI Company Making Pregnant Videos of Him Subscribe at 404media.co for bonus content. Learn more about your ad choices. Visit megaphone.fm/adchoices
Tea, the viral dating safety app built to help women share red flags about men, just suffered another massive data breach. The initial leak exposed 72,000 sensitive images (selfies and photo IDs used for verification). The second security issue has revealed over 1.1 million messages including chats where users shared phone numbers, discussed abortions, and talked about cheating partners.
St. Paul has declared a state of emergency over what appears to be a massive cyberattack. The city is working with the Minnesota National Guard, the FBI and two private cybersecurity firms to respond to the cyberattack, which is disrupting city services including payment systems, libraries, recreation centers and city hall. For more on how cyberattacks like this one occur and the issues they can cause, Minnesota Now guest host Chris Farrell talks with Faisel Kaleem, director of cybersecurity and cyber operations programs at Metro State University.
“It's got a [vulnerability] score of a 9.8, and this is on a scale of 10 and I've really never seen 10. So 9.8 is basically just as bad as it gets.”This episode is inspired by an ongoing global cybersecurity incident. In mid‑July attackers began actively exploiting Microsoft SharePoint vulnerabilities in what's now known as the “ToolShell” exploit chain.This flaw is classified as a remote code execution vulnerability with an extremely high CVSS (Common Vulnerability Scoring System ) score of 9.8, making it highly dangerous.Featuring Tyler Moffitt, Senior Security Analyst at OpenText Cybersecurity, the episode explores the severity of this 9.8 CVSS score vulnerability and its impact on organizations that haven't applied the necessary patches. Learn about the attack kill chain, what makes this flaw so dangerous, and practical steps to safeguard your systems. Patch immediately, audit your access logs, and stay ahead of the threat. CSA Advisory:https://www.csa.gov.sg/alerts-and-advisories/advisories/ad-2025-016Follow or subscribe to the show on your preferred podcast platform.Share the show with others in the cybersecurity world.Get in touch via reimaginingcyber@gmail.com As featured on Million Podcasts' Best 100 Cybersecurity Podcast and Best 70 Chief Information Security Officer CISO Podcasts rankings.
The Tea App promised a safe, anonymous space for women to share personal experiences with men they dated. Instead, it leaked their private data. There’s tons of inaccurate, fear mongering information about the leak out there. So in this episode, we’ll break down what happened with the Tea App leak, why it matters, and what it reveals about tech’s ongoing failure to take women’s privacy seriously. A Second Tea Breach Reveals Users’ DMs About Abortions and Cheating: https://www.404media.co/a-second-tea-breach-reveals-users-dms-about-abortions-and-cheating/ Women Dating Safety App 'Tea' Breached, Users' IDs Posted to 4chan: https://www.404media.co/women-dating-safety-app-tea-breached-users-ids-posted-to-4chan/ Miami New Times’ longread on Girl Don’t Date Him: https://www.miaminewtimes.com/news/blind-date-6335973 Tea: Inside the new app where women anonymously review men: https://www.dazeddigital.com/life-culture/article/68302/1/tea-the-new-app-where-women-anonymously-review-men 'It's fun watching you burn': Man suing women for defamation actually harassed them on dating apps, defendants say: https://lawandcrime.com/lawsuit/its-fun-watching-you-burn-man-suing-women-for-defamation-actually-harassed-them-on-dating-apps-defendants-say/ If you’re listening on Spotify, you can leave a comment there or email us at hello@tangoti.com! Follow Bridget and TANGOTI on social media! Many vids each week. instagram.com/bridgetmarieindc/ tiktok.com/@bridgetmarieindc youtube.com/@ThereAreNoGirlsOnTheInternet See omnystudio.com/listener for privacy information.
The gang's all here. And we're going to take a little break, but that doesn't mean we're leaving you all hanging.Into The Breach was among one of the first of the postmortem series episodes and it was also released a few years ago for all to hear. Well, compared to the product we release now for all of you, we decided that it could always be done better. So today, we bring to you part 1 of 4 f the newly remastered start of the first stories that we're told that eventually led to this podcast and the love we have for all of you who support it. Really Hope you enjoyWant to Talk to us?Website: Rage Across the InternetJoin the Forums to get the Code for our discord and come chat with us!Email: rageacrosspodcast@gmail.comTwitter: @rageacrossFacebook: Rage Across the InternetWe've got a YouTube too, check it Right HereSeason 5's theme is: No Culture by Silent Partner
Today, we're going to go deeper into the world of cyber attacks than we have ever done before. We'll be looking at the insurance claims that they produce as well as the longer-term consequences for their victims Often as journalists covering cyber insurance we focus on the big hacks, the headline numbers, and gloss over the detail of the personal stories and the real hard yards that have to be run to recover from an attack and the potential long-term consequences for a business, its directors, its customers and all other stakeholders. As the immediate damage and business interruption triggers potential regulatory, statutory and other serious third-party consequences, these hard yards often have to be run down multiple different paths simultaneously. The in-depth interviews that follow will deepen your understanding of the more complex and long-tail nature of this peril. I'd like to put you right in the room in the shoes of the Directors of a company as an attack unfolds. We're going behind the scenes to uncover what it's really like when a business becomes the target of a digital assault, from the immediate shock to the long-term repercussions that are often ignored by boards. We're also going to go into detail on how the nature of the cyber threat and the tactics of cyber criminals are evolving. To help me in this task my guests are: Magnus Jelen, (pictured top) Director of Incident Response EMEA for Coveware, a firm that helps victims of cyber extortion recover their data; and three senior executives at Beazley: Raf Sanchez (pictured 2nd from top), Beazley's Head of Cyber Services, Cyber Risks. Melissa Collins, (pictured 2nd from bottom) Head of Third Party Cyber & Tech Claims, and Wayne Imrie, (pictured bottom) Head of London Market Wholesale Executive Risks. Magnus and Raf are right on the front line, dealing with the immediate consequences of a hack. Magnus even deals with the hackers themselves. Melissa deals with the external insurance claims that result and Wayne is a Directors and Officers (D&O) specialist who has a deep understanding of how the D&O and Cyber insurance products interact. LINKS: As promised, here is the link to Beazley's latest Risk and Resilience Survey Spotlight on Tech Transformation & Cyber Risk 2025: https://www.beazley.com/en-001/news-and-events/spotlight-on-tech-transformation-cyber-risk-2025/
Hacktivist attack grounds Russian flights Naval group denies breach, hackers beg to differ Dating app breach exposes thousands of women's pictures Huge thanks to our sponsor, Dropzone AI Let me tell you about Dropzone AI—they're revolutionizing how security teams work. Companies like CBTS and Zapier use their AI to investigate alerts automatically, freeing up analysts for the work that really matters. We're talking 40-minute investigations done in 3 minutes. You can meet the Dropzone team at BlackHat in Startup City, or just head to dropzone.ai for a self-guided demo. Trust me, this is the future of security operations.
This is in relation to Channel Nine showing behind-the-goals vision of the Toby Greene and Dane Rampe incident.See omnystudio.com/listener for privacy information.
This is in relation to Channel Nine showing behind-the-goals vision of the Toby Greene and Dane Rampe incident.See omnystudio.com/listener for privacy information.
NASCAR announces data breach following March cyberattack Plankey appears to be on track to lead CISA Microsoft investigates another outage affecting 365 admin center Huge thanks to our sponsor, Dropzone AI Today's sponsor is Dropzone AI, the leader in AI-powered SOC automation. Major companies like Zapier and UiPath are using Dropzone to give their security teams superpowers. Imagine your analysts focusing on real threats while AI handles every routine investigation—in minutes, not hours. If you're heading to BlackHat, stop by their booth in Startup City. But you don't have to wait—check out their self-guided demo at dropzone.ai and see why Fortune 500s are making the switch. Find the stories behind the headlines at CISOseries.com.
Send us a textEp. 97 of the Cyber Law Revolution is live!In this episode, we discuss the unfortunate breach of the Tea App and lessons learned. First, update your data retention policy (why are we keeping selfies after verification?!). Second, make sure your scaling your cybersecurity with the size and scope of your company. Finally, your PR/crisis communication strategy is crucial.Keep the questions, call, comments, etc. coming! 410-917-5189 or spollock@mcdonaldhopkins.com
A breach of contract occurs when a party to a valid agreement fails to perform their obligations without a legal excuse. A party can commit a breach through non-performance, where they simply do not do what was promised, or through defective/partial performance, where they do something but not in the agreed-upon way.A minor breach is insignificant and allows the contract's overall purpose to be fulfilled, requiring the non-breaching party to continue performance while suing for damages. A material breach, however, is so severe it defeats the contract's essential purpose, allowing the non-breaching party to terminate the contract and sue for full damages.Anticipatory breach occurs when a party clearly indicates they will not perform their future obligations before performance is due. The non-breaching party can immediately treat it as a breach and sue, or they can wait for the performance date, though the latter carries the risk of losing the right to terminate if performance eventually occurs.A failure of condition is when a prerequisite event for a party's duty to perform does not occur, thus discharging that duty without the party being at fault. A breach of contract, conversely, involves a failure to perform a duty that was owed, indicating a wrongful non-compliance with the contract terms.Frustration of purpose excuses performance when an unforeseen event destroys the underlying reason for entering the contract, even if performance remains technically possible. For example, if you rent a room specifically to watch a parade, and the parade is canceled (frustration), it differs from the building burning down (impossibility).The Perfect Tender Rule (UCC § 2-601) states that a buyer can reject goods if they fail to conform to the contract in any respect. A common exception is the seller's right to cure (UCC § 2-508), allowing them to correct defective performance within the contract time or under certain conditions.The main objective of compensatory damages is to place the non-breaching party in the financial position they would have been in had the contract been fully performed. This aims to protect the injured party's expectation interest by covering losses incurred due to the breach.A court might order specific performance when monetary damages are inadequate to compensate the injured party, such as in cases involving unique goods (e.g., rare art, custom-made items) or real estate. This remedy ensures the aggrieved party receives the exact performance promised in the contract.The duty to mitigate damages requires the non-breaching party to take reasonable steps to minimize their losses after a breach occurs. This concept is important because it prevents economic waste and ensures that damages awarded are only for unavoidable losses, encouraging efficient behavior.Restitution, as a remedy for breach of contract, aims to restore any benefit conferred by the non-breaching party to the breaching party. It primarily prevents unjust enrichment, ensuring that a party does not unfairly profit from another's loss or from an unenforceable contract.
Selfies, Drivers Licenses, & Locations. All made publicly available by the developer. The Article: https://lunduke.substack.com/p/the-tea-app-breach-60gb-of-personal More from The Lunduke Journal: https://lunduke.com/ This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit lunduke.substack.com/subscribe
In this episode of The President's Daily Brief: Microsoft sounds the alarm after revealing that Chinese hackers breached a U.S. agency tied to America's nuclear weapons stockpile. Mass protests and European Union backlash force Ukrainian President Volodymyr Zelenskyy to propose a new anti-corruption bill. Voice of America is under scrutiny following claims that executives met with Chinese officials to discuss more favorable media coverage. And in today's Back of the Brief—Iran agrees to host U.N. nuclear watchdogs… but refuses to grant them access to any actual nuclear sites. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. YouTube: youtube.com/@presidentsdailybrief DeleteMe: Visit https://joindeleteme.com/BRIEF & Get 20% off your DeleteMe plan. TriTails Premium Beef: Visit https://trybeef.com/pdb & get $10 off 20 Lbs Ground Beef Special Learn more about your ad choices. Visit megaphone.fm/adchoices
This week on IA on AI, we break down the McDonald's hiring bot fiasco — yes, the one where an AI chatbot exposed data from over 60 million job applicants due to a shockingly simple security lapse. We explore why these matters to internal auditors and what basic control failures like this can teach us about staying vigilant as AI becomes more embedded in business processes. Plus: An update on the EU AI Act and why U.S.-based organizations should still be paying attention How Google's AI caught a cyberattack in real time — and what this signals for the future of human-in-the-loop systems A $4 trillion milestone for Nvidia and a record-setting $2B seed round for a new AI startup A reality check on AGI: what it is, what it isn't, and why the hype may be outpacing the science Be sure to follow us on our social media accounts on LinkedIn: https://www.linkedin.com/company/the-audit-podcast Instagram: https://www.instagram.com/theauditpodcast TikTok: https://www.tiktok.com/@theauditpodcast?lang=en Also be sure to sign up for The Audit Podcast newsletter and to check the full video interview on The Audit Podcast YouTube channel. * This podcast is brought to you by Greenskies Analytics. the services firm that helps auditors leapfrog up the analytics maturity model. Their approach for launching audit analytics programs with a series of proven quick-win analytics will guarantee the results worthy of the analytics hype. Whether your audit team needs a data strategy, methodology, governance, literacy, or anything else related to audit and analytics, schedule time with Greenskies Analytics.
Visit: RadioLawTalk.com for information & full episodes! Follow us on Facebook: bit.ly/RLTFacebook Follow us on Twitter: bit.ly/RLTTwitter Follow us on Instagram: bit.ly/RLTInstagram Subscribe to our YouTube channel: www.youtube.com/channel/UC3Owf1BEB-klmtD_92-uqzg Your Radio Law Talk hosts are exceptional attorneys and love what they do! They take breaks from their day jobs and make time for Radio Law Talk so that the rest of the country can enjoy the law like they do. Follow Radio Law Talk on Youtube, Facebook, Twitter & Instagram!
We're back with a brand-new season of Random but Memorable! ✨
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
On this episode we reveal what the next season is going to be about, and fight a looooot of bad guy robots... https://linktr.ee/SpellbookGaming
Independent investigative journalism, broadcasting, trouble-making and muckraking with Brad Friedman of BradBlog.com
In today's episode, host Jim Love covers recent cybersecurity threats, including malware hidden in DNS records, a custom backdoor targeting SonicWall SMA devices, the US military assuming a network compromise after Chinese hackers targeted VPNs and email servers, and a $27 million theft from the BigONE crypto exchange. The show highlights how attackers are using innovative techniques to evade detection and emphasizes the need for increased vigilance in monitoring and securing systems. 00:00 Introduction to Cybersecurity News 00:26 Malware Hidden in DNS Records 02:26 SonicWall Devices Under Attack 04:30 US Military Breach by Chinese Hackers 07:07 $27 Million Crypto Theft 08:58 Conclusion and Listener Engagement
In today's turbulent global political landscape, relationships between the people, organized groups and the state is shaped by interactions frought with compromise, confrontation, containment, and control. This week's moment of confrontation between state representatives of South Africa and the United States provide opportunities to examine where unresolved historical trauma, structural inequality, and ideological warfare define terrains of struggle in the Contemporary World System.South African President Ramaphosa's recent US visit saw a propaganda assault from the U.S. President featuring inaccurate and unintentionally ironic uses of images from anti-Apartheid era cultural and political struggles as well as current struggles in the Democratic Republic of Congo which highlight continuing instances of state violence and neocolonial entanglements. While white nationalist in both South Africa and the United States continue to enjoy racially-engendered economic status advantage, a small Black managerial elite in both countries thrives as the majority in both countries either remain impoverished or are threatened with even more economic marginality. Oppression reflected in populist movements like South Africa's Economic Freedom Fighters and the US's Repairers of the Breach afford another opportunity to compare efforts of social confrontation and political compromise. As Trump repeated lies about South Africa, the United States moved another step toward its own political and economic reckoning. The Trump-deployed “Project 2025,” spearheaded by Office of Management and Budget Director Russell Vought and others, took more steps in its efforts to entrench extreme wealth inequality while seeing other efforts to advance a white Christian theocracy fail at an increasingly besieged US Supreme Court. The propaganda-labeled “Big Beautiful Bill” passed by the US House of Representatives is a blueprint for dismantling democratic safeguards and weaponizing the state to favor corporate and white nationalist interests. As has always been the case, this moment demands intellectual warfare, legal resistance, and community-based institution-building. The people must decide: compromise, confront, contain—or control.JOIN KNARRATIVE: https://www.knarrative.com it's the only way to get into #Knubia, where these classes areheld live with a live chat.To shop Go to:TheGlobalMajorityMore from us:Knarrative Twitter: https://twitter.com/knarrative_Knarrative Instagram: https://www.instagram.com/knarrative/In Class with Carr Twitter: https://twitter.com/inclasswithcarrSee Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
In this special live episode of Autonomous IT, Live! we walk through a high-stakes incident response drill that mimics a disturbingly realistic threat scenario: an attacker gains access to your internal tools — not by breaking in, but by logging in.Here's the setup: a user unknowingly reuses compromised credentials with the company's SSO provider. An attacker logs in, flies under the radar, and impersonates internal IT support using Slack, email, and calendar invites. Their goal? Convince employees to install a fake remote access tool—all while avoiding anyone likely to report suspicious behavior.Join Landon Miles, Tom Bowyer, and Ryan Braunstein as they:
264 Mid Day Mix Fix is a Deep House inspired mix featuring tracks and remixes by Breach, FISHER, Nora En Pure, Alex Aair, Yellow Claw, Robin Thicke, Robin Schulz, Maroon 5 and more. The post 264 MIDDAY MIX FIX appeared first on Ed Unger Music.
Today on the Vote Common Good Podcast, we're joined by Billy Ray — the acclaimed screenwriter behind Hunger Games, Captain Phillips, The Comey Rule, Breach, and more. But Billy isn't just telling stories on the screen — he's helping shape the story of our democracy. He works with Democratic candidates across the country, helping them speak with clarity, courage, and conviction.
The extraordinary data leak about 19,000 Afghans trying to flee to the UK, which led to a £850 million secret relocation scheme, which in turn, led to a super-injunction to cover it all up until this week.
“The simple believe everything, but the prudent give thought to their steps.” — Proverbs 14:15In an age where scams are becoming more sophisticated by the day, Scripture reminds us that discernment isn't optional—it's essential. As believers, protecting the resources God has entrusted to us is more than a practical concern—it's an act of stewardship. Here's how you can guard your finances with wisdom, not fear.Scams Are Everywhere—But So Is WisdomFraudsters use every channel available: phone calls, text messages, emails, and even impersonations of people you trust. But as followers of Christ, we're not called to panic. We're called to walk in wisdom (Ephesians 5:15). That begins with slowing down and thinking critically.Pause before you respond. Scammers rely on urgency. If someone pressures you to act immediately—whether claiming your account is locked or your money is at risk—take a step back. Hang up. Verify the source independently. Urgency is often a red flag. Avoid untraceable payments. No legitimate organization will ask for payment via wire transfer or gift cards. These are the preferred tools of scammers because they're nearly impossible to recover.Practical Steps for Digital ProtectionFinancial stewardship now includes digital awareness. Here are practical ways to protect yourself and your family:Use credit cards, not debit cards, for online purchases. Credit cards usually come with stronger fraud protection. Enable two-factor authentication (2FA) on all your financial accounts. Even if a scammer gets your password, they can't access your account without a second form of verification. Don't reuse passwords. Use a secure password manager, such as Bitwarden or NordPass, to create and store strong, unique passwords. Set up account alerts. Most banks allow you to monitor activity in real-time, giving you a heads-up if something unusual occurs. Freeze your credit. It's free to do and offers one of the best defenses against identity theft. You can always unfreeze it temporarily when needed. Avoid public Wi-Fi for financial transactions. Wait until you're on a secure network or at home to check your bank accounts or make purchases. Limit what you share on social media. Personal details, such as birthdays or family names, can be used to guess passwords or security questions. Adjust your privacy settings and post wisely. Shred sensitive documents before discarding them. Even in the digital age, identity thieves still dig through trash. Don't click on unfamiliar links, even if they appear to come from someone you know. When in doubt, contact the person or organization directly for clarification.Stewarding Wisdom in CommunityScammers often target the vulnerable, particularly older adults and teenagers. So make this a shared effort. Discuss online fraud with your family. Equip them with knowledge. If you receive a letter or email about identity protection following a data breach, verify it by contacting the company directly, rather than through the provided link or number.Financial faithfulness today includes digital vigilance. But there's no need for fear. By taking these simple steps, you can walk confidently, knowing you're stewarding God's resources with care.A Tool for Wise Stewardship: The FaithFi AppLooking for a practical way to manage your money with wisdom and peace of mind? The FaithFi app is a secure tool that helps you track your spending, plan your giving, and align your finances with biblical values. With 256-bit encryption, your data is protected, and your login credentials are never stored. FaithFi Pro users also receive exclusive articles, digital devotionals, and daily encouragement.Visit FaithFi.com and click “App” or search “FaithFi” in your app store to get started today.Steward your finances wisely. Protect what God has entrusted to you. And walk in peace, not panic.On Today's Program, Rob Answers Listener Questions:My 14-year-old son just started his first full-time summer job, working around 37 to 40 hours a week. I'd like to help him get started with investing and am considering opening a Roth IRA in his name. What's the best way to set that up, and where should we go to open the account?We're debt-free and recently bought a home. Our current vehicle is paid off, but we're thinking about adding a second car with a monthly payment of around $500. I'm a little uneasy about the added expense. How can we determine if this is a wise financial move for us at this time?Resources Mentioned:Faithful Steward: FaithFi's New Quarterly Magazine (Become a FaithFi Partner)The Money Challenge for Teens: Prepare for College, Run from Debt, and Live Generously by Dr. Art RainerThe Finish Line PledgeSchwab Intelligent Portfolios | BettermentBitwarden | NordPassWisdom Over Wealth: 12 Lessons from Ecclesiastes on MoneyLook At The Sparrows: A 21-Day Devotional on Financial Fear and AnxietyRich Toward God: A Study on the Parable of the Rich FoolFind a Certified Kingdom Advisor (CKA) or Certified Christian Financial Counselor (CertCFC)FaithFi App Remember, you can call in to ask your questions most days at (800) 525-7000. Faith & Finance is also available on the Moody Radio Network and American Family Radio. Visit our website at FaithFi.com where you can join the FaithFi Community and give as we expand our outreach.
What does it take to stay calm in the face of constant cyber pressure—and why does that mindset matter more than ever? In this episode of Security Matters, host David Puner speaks with Den Jones, founder and CEO of 909Cyber, about his transition from enterprise chief security officer (CSO) to cybersecurity consultant. They explore what it means to lead with clarity and composure in a high-stakes environment, the realities of launching a firm in a crowded market, and how pragmatic security strategies—especially around identity, AI, and Zero Trust—can help organizations navigate AI-driven threats, talent shortages, and operational complexity. It's a candid conversation about what works and what doesn't when it comes to modern security leadership.
Rabbi Jacobson will discuss the following topics: 17 Tammuz Why is breaching the walls surrounding Jerusalem a tragedy marked by a fast day? How is this day relevant to our lives? What can we learn from its tragedies to help motivate us during these turbulent times? What does this period teach us about current events? Why will these days be transformed into joyous holidays? What actions should we take during this time? What are both positive and negative signs of the imminent redemption? Does G-d protect each one of us? Are Jews more susceptible to suffering? Why do we grieve during the Three Weeks and don't just accept that this was G-d's will? What is the central theme and lesson from this week's Torah portion? How do we determine when we must take initiative like Pinchas and not ask our leaders? Should we seek out a modern-day Pinchas to zealously protect us against our enemies? What are we to think about Jews marching with our enemies? Do you know who this musician is? Why do people accuse Israel of committing genocide when Israel is the victim? What is wrong with our PR? What can we do differently to help present the true narrative? Three Weeks Pinchas The story gone viral: A musician inspires a woman to light candles Could the possible election of an openly anti-Semitic mayor in New York city be Hashem's way of getting Jews to move to Israel? War in Gaza
Tax professional data breaches have exploded in 2025, with 327 reported incidents affecting over 342,000 taxpayers in just half a year. Glenn Gizzy, a 36-year IRS veteran now specializing in data breach prevention, reveals the sophisticated tactics criminals use to infiltrate tax practices. From phishing emails disguised as client referrals, to hackers who wait until returns are filed before changing bank account information. This conversation covers essential protection measures including Written Information Security Plans (WISP), IP PINs, proper cyber insurance coverage, and the critical steps to take immediately after discovering a breach.SponsorsPadgett - Contact Padgett or Email Jeff Phillips(00:00) - Introduction and Greetings (02:21) - Today's Guest and Topic: Scams and Data Breaches (02:56) - IRS Statistics on Data Breaches (05:33) - Common Scams and How They Work (09:48) - Phishing Emails and Ransomware (14:51) - Fake Charities and Donation Scams (17:30) - Refund Thefts and Data Breaches (21:28) - IRS Communication and Taxpayer Awareness (30:10) - Signs of a Data Breach for Practitioners (32:42) - Immediate Steps After a Data Breach (34:32) - Multi-Step Process and Insurance Involvement (37:42) - Filing Returns After a Breach (40:54) - Identity Protection PIN (IP PIN) (48:10) - Written Information Security Plan (WISP) (53:06) - Protecting EFIN, PTIN, and CAF Numbers (55:25) - Final Thoughts and Conclusion Connect with Glennhttps://www.linkedin.com/in/glenn-gizzi-4b6ab5205Get NASBA Approved CPE or IRS Approved CELaunch the course on EarmarkCPE to get free CPE/CE for listening to this episode.Connect with the Roger and Annie on LinkedInhttps://www.linkedin.com/in/rogerharrispbs/https://www.linkedin.com/in/annie-schwab-852418261/ReviewLeave a review on Apple Podcasts or PodchaserSubscribeSubscribe to the Federal Tax Updates podcast in your favorite podcast app!This podcast is a production of the Earmark Media
I'll discuss what you should do in the wake of the latest data breach.
How do we repair the breach?Focus on Christ & Christ alonePressure doesn't shake or break youStarting & finishing strong via the power of the GospelStaying hungry; comfort kills hungerFaith, how you walk, will be your biggest testimonyAre you relentless? - don't let go of the standard of GodIs 58:1-6 / Is 58:11-12 / Is 58:14 / 1Cor 3:9-11 / Heb 11:8-10 / Prov 25:28 / Mal 4 / Is 61:1-4
In this episode of Cybersecurity Today, host Jim Love discusses major updates on the recent cyber attack on Marks and Spencer, revealing new details and arrests. The breach involved sophisticated social engineering that infiltrated the company's network through an IT service provider, leading to 150GB of stolen data. Love then covers a massive insider breach at a Brazilian bank where an IT worker facilitated the theft of $140 million by selling login credentials. Lastly, the episode highlights a McDonald's HR data breach caused by weak security practices in an AI screening app, exposing millions of job applicant records. Key insights on these incidents emphasize the importance of robust cybersecurity measures and internal controls. 00:00 Introduction and Headlines 00:20 Marks and Spencer Hack: New Developments 04:07 Brazilian Bank Breach: An Inside Job 06:40 McDonald's HR Data Breach: A Comedy of Errors 10:21 Conclusion and Upcoming Features
For your communication to be credible, you can't just say it — you have to do it.Want people to believe what you say? According to Richard Edelman, the words you choose only get you halfway there. To build real trust, he says, you have to practice what you preach.“Action builds trust,” says Edelman. “If you don't do something, you can't talk about it.” As the president and CEO of Edelman, a leading global communications marketing firm, Edelman is widely recognized for his thought leadership in marketing and PR, especially on issues related to corporate trust, brand reputation, and social responsibility. His annual Edelman Trust Barometer reveals a sobering reality: "Two-thirds of people believe leaders lie to them now, business leaders, government leaders, even journalists." For people and organizations that want to rebuild trust, whether in a one-on-one relationship or with a customer base of millions, Edelman's advice is simple: "Decide, do, communicate."In this episode of Think Fast, Talk Smart, Edelman and host Matt Abrahams explore strategies for winning trust when traditional authority no longer guarantees it. In an age of skepticism, Edelman's insights show that sustainable trust comes not from perfect messaging, but from consistently aligning your actions with your words.Episode Reference Links:Richard Edelman158. Hope for Cynics: Building Trusting Relationships through Communication Connect:Premium Signup >>>> Think Fast Talk Smart PremiumEmail Questions & Feedback >>> hello@fastersmarter.ioEpisode Transcripts >>> Think Fast Talk Smart WebsiteNewsletter Signup + English Language Learning >>> FasterSmarter.ioThink Fast Talk Smart >>> LinkedIn, Instagram, YouTubeMatt Abrahams >>> LinkedInChapters:(00:00) - Introduction (03:06) - The Evolution of Trust (04:17) - Rebuilding Trust After a Breach (05:10) - Leaders as Influencers (06:22) - New Media Ecosystems (08:06) - The Role of AI in Communication (09:26) - Key Qualities for Future Leaders (10:26) - The Final Three Questions (17:57) - Conclusion ********This Episode is brought to you by Strawberry.me. Get $50 off coaching today at Strawberry.me/smartBecome a Faster Smarter Supporter by joining TFTS Premium.
As Harper's graduation looms, a new villainous client's contract case intrigues Mal but tempts Harper to try an... alternative dispute resolution. Learn more about your ad choices. Visit megaphone.fm/adchoices
ICYMI: Hour Two of ‘Later, with Mo'Kelly' Presents – Regular guest contributor & Associate Director of Communications for VIZIO, Chris Woolsey joins the program to share the latest offerings from VIZIO's “Watch Free+” including a “Shark Attack!” with Sharknado (1,2, and 3), Open Water (1,2, and 3) & Bull Shark (1,2, and 3) AND a “Full Throttle Summer” with ‘Breach,' ‘Running' with the Devil & Night of the Sicario…PLUS – Thoughts on Fox News program “The Five's” review of the forthcoming James Gunn DC Studios release ‘Superman' - on KFI AM 640…Live everywhere on the iHeartRadio app & YouTube @MrMoKelly
ICYMI: ‘Later, with Mo'Kelly' Presents – Regular guest contributor & Associate Director of Communications for VIZIO, Chris Woolsey joins the program to share the latest offerings from VIZIO's “Watch Free+” including a “Shark Attack!” with Sharknado (1,2, and 3), Open Water (1,2, and 3) & Bull Shark (1,2, and 3) AND a “Full Throttle Summer” with ‘Breach,' ‘Running' with the Devil & Night of the Sicario - on KFI AM 640…Live everywhere on the iHeartRadio app & YouTube @MrMoKelly
SummaryIn this episode of the Blue Security Podcast, hosts Andy and Adam discuss the recent layoffs at Microsoft and the broader implications for the tech industry. They share personal experiences and insights on navigating job loss, the randomness of layoffs, and the importance of preparation. The conversation also covers practical advice for job seekers, including tips for interviews and negotiating severance packages. The hosts emphasize the need for continuous networking and maintaining an updated resume to stay prepared for unexpected career changes.----------------------------------------------------YouTube Video Link: https://youtu.be/mDZXNqmGpas----------------------------------------------------Documentation:https://www.cnn.com/2025/07/02/tech/microsoft-layoffs-9000-employees----------------------------------------------------Contact Us:Website: https://bluesecuritypod.comBluesky: https://bsky.app/profile/bluesecuritypod.comLinkedIn: https://www.linkedin.com/company/bluesecpodYouTube: https://www.youtube.com/c/BlueSecurityPodcast-----------------------------------------------------------Andy JawBluesky: https://bsky.app/profile/ajawzero.comLinkedIn: https://www.linkedin.com/in/andyjaw/Email: andy@bluesecuritypod.com----------------------------------------------------Adam BrewerTwitter: https://twitter.com/ajbrewerLinkedIn: https://www.linkedin.com/in/adamjbrewer/Email: adam@bluesecuritypod.com
Got a question or comment? Message us here!In this episode, our security engineers break down the latest cybersecurity headlines, from the real scoop behind the “16 billion password” leak to the rise of hacker groups like Scattered Spider.
In this episode, we explore the strategic battle for Tinian, a crucial turning point in the Pacific War. As Marines launched an ambitious assault, intense artillery and naval bombardments battered Japanese defenses, paving the way for a daring landing on narrow northern beaches. Marines overcame challenging terrain and fierce resistance to secure critical positions such as Mount Lasso and Ushi Point Airfield. Despite setbacks, including tragic losses from artillery fire, Marine forces advanced steadily inland. With control of vital airfields and fresh reinforcements arriving, the Marines prepared for the final, decisive push against desperate enemy holdouts on the southern cliffs—setting the stage for the dramatic conclusion ahead. ************* Visit HistoryoftheMarineCorps.com to subscribe to our newsletter, explore episode notes and images, and see our references. Follow us on social media for updates and bonus content: Facebook and Twitter (@marinehistory) and Instagram (@historyofthemarines). Visit AudibleTrial.com/marinehistory for a free audiobook and a 30-day trial.
July 7, 2025: Mick Coady, CTO at Armis, joins Drex for the news. This episode examines a sobering milestone: the first confirmed patient death directly attributed to a ransomware attack on London's blood distribution system. The conversation explores how a single cyber incident creates cascading effects across entire healthcare networks, flooding neighboring hospitals with redirected patients and overwhelming emergency departments. With 28 healthcare security incidents reported in June alone—many involving third-party vendors—the discussion questions whether the industry fully understands how interconnected systems create compounding vulnerabilities. From agricultural equipment with satellite connectivity to medical devices running outdated firmware, every connected endpoint represents a potential entry point for attackers. Key Points: 01:43 Ransomware Attack Leads to Patient Death 06:10 Rural Healthcare During Cyber Attacks 09:11 Third-Party Risks in Cybersecurity 10:29 Cybersecurity in Agriculture and Implications News Articles: Ransomware attack contributed to patient's death, says Britain's NHS HHS Breach Portal College students hacked into tractors. Manufacturers wanted them to do it X: This Week Health LinkedIn: This Week Health Donate: Alex's Lemonade Stand: Foundation for Childhood Cancer
Ingram Micro suffers ransomware attack Hacker leaks Telefónica data allegedly from new breach ChatGPT prone to recommending wrong URLs, creating a new phishing opportunity Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines Find the stories behind the headlines at CISOseries.com.
Iran is known to be one of the world's major nation-state actors in cyberspace and that fact has returned to the forefront since its war with Israel started on June 13.David DiMolfetta, who covers cyber for our partner publication Nextgov/FCW, joins for this episode to break down how Iran typically operates in cyber and what U.S. government agencies are watching out for as the conflict continues.The defense industrial base is also on notice for potential intrusions on their systems, as David explains to our Ross Wilkers.David also provides an update on what we are learning about the breach into U.S. telecommunications networks, which was carried out by the Chinese hacking group known as Salt Typhoon but discovered two years after it started.Iran-backed hackers may target US defense companies tied to Israel, agencies warnDHS expects Iran's cyber forces will target US networks after strikes on nuclear sitesUS charges Iranian operatives with hacking Trump campaignTrump campaign allegedly hacked, blames Iran for stealing internal communicationsTreasury sanctions Iranian cyber officials tied to 2023 water system hacksUS agencies assessed Chinese telecom hackers likely hit data center and residential internet providersFBI awaits signal that Salt Typhoon is fully excised from telecom firms, official saysSalt Typhoon hacks ‘a wake up call' to secure telecom services, lawmakers saySalt Typhoon hackers possibly targeted telecom research at US universitiesUS sanctions Chinese firm behind sweeping Salt Typhoon telecom hacksAt least 8 US carriers hit in Chinese telecom hacks, senior official saysChinese telecom espionage began with ‘much broader' aims, officials sayHundreds of organizations were notified of potential Salt Typhoon compromiseNYPD officer database had security flaws that could have let hackers covertly modify officer data
We're joined by Trent Kusters (League of Geeks), John Axon (Capybara Games), and Adam Dolin (God of War: Ragnarok) to discuss Lords of Diskonia, the 41st game in the UFO 50 collection. “War has come to Land of Disks, and the red and blue armies are on a collision course!” Next week: Night Manor Audio edited by Dylan Shumway Discussed in this episode: I Tried Cycling the Length of Japan: 3,000km and 27 Days on the Road | Long Way North https://www.youtube.com/watch?v=RpH8vt5WLV0 Carrom https://en.wikipedia.org/wiki/Carrom Crokinole https://boardgamegeek.com/boardgame/521/crokinole How Tabletop Design Helped Shape ‘UFO 50' https://gdcvault.com/play/1035154/How-Tabletop-Design-Helped-Shape JTolmar - Disks Rogue https://noisyowl.com/disksrogue/ Crossbows and Catapults https://boardgamegeek.com/boardgame/2129/crossbows-and-catapults Catacombs (Third Edition) https://boardgamegeek.com/boardgame/195137/catacombs-third-edition Beast Breaker https://vodeo.games/bb Designing ‘MARVEL SNAP' https://www.youtube.com/watch?v=HjhsY2Zuo-c Into the Breach https://subsetgames.com/itb.html Air, Land, and Sea https://boardgamegeek.com/boardgame/247367/air-land-and-sea Hot Streak https://www.cmyk.games/products/hot-streak BALL X PIT https://www.ballxpit.com/ Storytelling through Systems (requires GDC Vault membership) https://gdcvault.com/browse?keyword=storytelling+through+systems# https://www.youtube.com/eggplantshow http://discord.gg/eggplant https://www.patreon.com/eggplantshow
In 2016, the Mississippi River punched a hole in the Len Small levee, built to protect farmland along an S-shaped curve in the river known as Dogtooth Bend. That hole was never repaired. Here & Now's Chris Bentley reports on how some farmers in the area have had to give up their land. And, John Ruskey calls the Mississippi River "a creative force" that sculpts the landscape and rejuvenates the people who experience it up close. But climate change is making that force stronger and more destructive. Bentley took a canoe ride with Ruskey and reports on the future of the river. Then, Bentley and Here & Now's Peter O'Dowd reflect on their reporting along the Mississippi River and share thoughts on how the river has shaped the history and landscape of North America.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy
The guys recap their weekends, Cory remembers a nickname of a friend back in the day
The guys recap their weekends, Cory remembers a nickname of a friend back in the daySee omnystudio.com/listener for privacy information.