POPULARITY
Categories
What happens when a HIPAA Business Associate Agreement gets tested in court after a ransomware attack? And what can we learn from it? Let's find out with your hosts are Kip Boyle, CISO with Cyber Risk Opportunities, and Jake Bernstein, Partner with K&L Gates. "New HIPAA Security Rule" episode: https://cr-map.com/podcast/178
OpenAI, CodeRED, Dartmouth, DoorDash, 23andMe, Amazon, Walmart and so many more are part of this week's breaches!
In this episode, the host addresses a previous mistake in naming a company involved in a breach, correcting SitusAMC for Ascensus, and extends apologies. Key topics include US banks assessing a breach fallout from financial tech vendor SitusAMC, ransomware group CioP targeting Broadcom through Oracle's vulnerabilities, a new malware campaign hiding in Blender 3D models named SteelC, supply chain attacks in the JavaScript ecosystem through NPM packages with Shai-Hulud malware, and a phishing scam using lookalike domains to deceive Microsoft account holders. Listeners are reminded to manually type URLs to avoid phishing scams, and are informed about the Thanksgiving weekend schedule change. 00:00 Introduction and Apology 01:26 Cybersecurity Headlines 02:13 US Banks Data Theft Incident 03:44 Broadcom and Oracle ERP Breach 05:29 Blender Malware Campaign 07:45 Shai-Hulud NPM Package Attack 09:41 Phishing Campaign Targeting Microsoft Accounts 11:39 Final Thoughts and Thanksgiving Wishes
This episode focuses on a security incident that prompts an honest discussion about transparency, preparedness, and the importance of strong processes. Sean Martin speaks with Viktor Petersson, Founder and CEO of Screenly, who shares how his team approaches digital signage security and how a recent alert from their bug bounty program helped validate the strength of their culture and workflows.Screenly provides a secure digital signage platform used by organizations that care deeply about device integrity, uptime, and lifecycle management. Healthcare facilities, financial services, and even NASA rely on these displays, which makes the security posture supporting them a priority. Viktor outlines why security functions best when embedded into culture rather than treated as a compliance checkbox. His team actively invests in continuous testing, including a structured bug bounty program that generates a steady flow of findings.The conversation centers on a real event: a report claiming that more than a thousand user accounts appeared in a public leak repository. Instead of assuming the worst or dismissing the claim, the team mobilized within hours. They validated the dataset, built correlation tooling, analyzed how many records were legitimate, and immediately reset affected accounts. Once they ruled out a breach of their systems, they traced the issue to compromised end user devices associated with previously known credential harvesting incidents.This scenario demonstrates how a strong internal process helps guide the team through verification, containment, and communication. Viktor emphasizes that optional security features only work when customers use them, which is why Screenly is moving to passwordless authentication using magic links. Removing passwords eliminates the attack vector entirely, improving security for customers without adding friction.For listeners, this episode offers a clear look at what rapid response discipline looks like, how bug bounty reports can add meaningful value, and why passwordless authentication is becoming a practical way forward for SaaS platforms. It is a timely reminder that transparency builds trust, and security culture determines how confidently a team can navigate unexpected events.Learn more about Screenly: https://itspm.ag/screenly1oNote: This story contains promotional content. Learn more.GUESTViktor Petersson, Co-founder of Screenly | On LinkedIn: https://www.linkedin.com/in/vpetersson/RESOURCESLearn more and catch more stories from Screenly: https://www.itspmagazine.com/directory/screenlyLinkedIn Post: https://www.linkedin.com/posts/vpetersson_screenly-security-incident-response-how-activity-7393741638918971392-otkkBlog: Security Incident Response: How We Investigated a Data Leak and What We're Doing Next: https://www.screenly.io/blog/2025/11/10/security-incident-response-magic-links/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlightKeywords: sean martin, marco ciappelli, viktor petersson, security, authentication, bugbounty, signage, incidentresponse, breaches, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
This episode focuses on a security incident that prompts an honest discussion about transparency, preparedness, and the importance of strong processes. Sean Martin speaks with Viktor Petersson, Founder and CEO of Screenly, who shares how his team approaches digital signage security and how a recent alert from their bug bounty program helped validate the strength of their culture and workflows.Screenly provides a secure digital signage platform used by organizations that care deeply about device integrity, uptime, and lifecycle management. Healthcare facilities, financial services, and even NASA rely on these displays, which makes the security posture supporting them a priority. Viktor outlines why security functions best when embedded into culture rather than treated as a compliance checkbox. His team actively invests in continuous testing, including a structured bug bounty program that generates a steady flow of findings.The conversation centers on a real event: a report claiming that more than a thousand user accounts appeared in a public leak repository. Instead of assuming the worst or dismissing the claim, the team mobilized within hours. They validated the dataset, built correlation tooling, analyzed how many records were legitimate, and immediately reset affected accounts. Once they ruled out a breach of their systems, they traced the issue to compromised end user devices associated with previously known credential harvesting incidents.This scenario demonstrates how a strong internal process helps guide the team through verification, containment, and communication. Viktor emphasizes that optional security features only work when customers use them, which is why Screenly is moving to passwordless authentication using magic links. Removing passwords eliminates the attack vector entirely, improving security for customers without adding friction.For listeners, this episode offers a clear look at what rapid response discipline looks like, how bug bounty reports can add meaningful value, and why passwordless authentication is becoming a practical way forward for SaaS platforms. It is a timely reminder that transparency builds trust, and security culture determines how confidently a team can navigate unexpected events.Learn more about Screenly: https://itspm.ag/screenly1oNote: This story contains promotional content. Learn more.GUESTViktor Petersson, Co-founder of Screenly | On LinkedIn: https://www.linkedin.com/in/vpetersson/RESOURCESLearn more and catch more stories from Screenly: https://www.itspmagazine.com/directory/screenlyLinkedIn Post: https://www.linkedin.com/posts/vpetersson_screenly-security-incident-response-how-activity-7393741638918971392-otkkBlog: Security Incident Response: How We Investigated a Data Leak and What We're Doing Next: https://www.screenly.io/blog/2025/11/10/security-incident-response-magic-links/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlightKeywords: sean martin, marco ciappelli, viktor petersson, security, authentication, bugbounty, signage, incidentresponse, breaches, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Record (?) HIBP Traffic Month; The Week in Breaches; IoT Water Meter Reader with Home Assistant and AI; Sponsored by 1Password https://www.troyhunt.com/weekly-update-479/See omnystudio.com/listener for privacy information.
Several Major US Banks are all caught up this week in breaches. DON'T PANIC.
In the electric chaos of DEF CON—where dial tones, solder smoke, and hacker legends collide—one figure stands out: John Aff, aka PANDA.A veteran in the hacker community, he moves effortlessly between challenge design, telephony wizardry, mesh networking experiments, and the culture that surrounds it all.Behind the reputation is a journey that started with game hacking, shifted into enterprise security, and evolved into a life built around creativity, community, and technical obsession. It's also a story of identity—of finding a place where personal expression and professional skill finally intersected.This conversation pulls back the curtain on a mind shaped by curiosity, lived experience, and a deep love for the craft.CHAPTERS00:00 - Introduction to Barcode Podcast00:24 - Meet Panda: Cybersecurity Icon01:47 - Panda's Journey into Cybersecurity10:12 - Creating Interactive Challenges for Conferences22:11 - Badge Building: The Art and Science28:00 - Lessons from Offensive Security for Defenders30:11 - Winning the TeleChallenge: A Team Effort35:10 - Nostalgia in Gaming: The Phone Verse Experience37:30 - Understanding LoRa and Mesh Networking43:20 - Real-World Applications of MeshTastic Technology49:14 - The Intersection of Furry Culture and Cybersecurity56:54 - Community Building and Future Aspirations in TechLINKSTeleFreak – https://telefreak.org Home of the legendary TeleChallenge and a cornerstone of phreaking culture at DEF CON.DEF CON – https://defcon.org The world's largest hacker conference and the backdrop for many of Panda's stories, competitions, and breakthroughs.RedSeer Security – https://redseersecurity.com The security practice Panda supports on the defensive and strategic side.Assura, Inc. – https://assurainc.com Where Panda leads offensive security operations and continuous testing programs.MeshTastic – https://meshtastic.org Open-source long-range mesh communication project central to Panda's community work.Comms For All – https://commsforall.com Panda's initiative focused on mesh networking, LoRa radios, and community education.B-Sides Jax – https://bsidesjax.org Conference where Panda built the interactive phone-based badge challenge.HackSpaceCon – https://hackspacecon.com The first conference where you and Panda crossed paths; a major Florida hacker gathering.JLCPCB – https://jlcpcb.com PCB manufacturing service used for producing custom badge hardware.EasyEDA – https://easyeda.com Design tool Panda uses to create the multilayer art and circuitry for badges.Vectorizer.AI – https://vectorizer.ai The AI-powered tool Panda relies on to convert artwork into vector format for PCB badge design.KiCad – https://kicad.org Open-source PCB design suite used for laying out circuits and prototyping badge hardware.Adtran – https://www.adtran.com Telecom hardware vendor whose legacy gateways were used in the BSides Jax phone challenge.QueerCon – https://www.queercon.org Long-running LGBTQ+ hacker community at DEF CON that collaborated with Panda on early badge projects.National Cyber Games (NCA Cyber Games) – https://nationalcybergames.org Competition platform where Panda designed MeshTastic-based CTF challenges.UNF Osprey Security – https://www.unf.edu University of North Florida's student security group that runs CTFs and collaborated locally with Panda.HackRedCon – https://hackredcon.com Security conference where Panda volunteers and participates in community events.Jax2600 – https://2600.com Local chapter of the classic 2600 hacker community, part of Panda's long-term involvement in grassroots infosec groups.Backdoors & Breaches – https://blackhillsinfosec.com/projects/backdoors-breaches Incident response card game Panda used for blue team development and tabletop exercises.
In this episode, James Maude sits down with Chris Neuwirth, VP of Cyber Risk at Networks Group, whose path into cybersecurity might be the most unconventional you'll ever hear—from delivering babies as a teenage EMT to penetration testing critical infrastructure today. Chris's journey includes serving as an LAPD officer at Venice Beach, responding to 9/11 at the Pentagon, managing IT during Hurricane Sandy, and running operations as assistant commissioner at New Jersey's Department of Health during COVID-19. Along the way, he's been hacking everything he could get his hands on—from war driving through Manhattan in the early 2000s to conducting sophisticated penetration tests at hospitals and airports today. Chris discusses the importance of organizations being prepared and shares the uncomfortable truth: sometimes the easiest way past your defenses is just showing up and plugging in.
Joseph Avanzato is the Security Operations and Forensics Group Leader at Varonis. In this episode, he joins host Paul John Spaulding to discuss the common tactics attackers exploit and mistakes made by enterprises that lead breaches, as well as how Varonis is uniquely positioned to help public and private customers around the world investigate, contain, and evict attackers from their network. This episode is brought to you by Varonis, whose AI-powered data security platform secures your data at scale – across IaaS, SaaS, and hybrid cloud environments. To learn more about our sponsor, visit https://www.Varonis.com.
Leicester City are set to face a commission next week as they contest Premier League charges related to profitability and sustainability rules#LCFC #Leicester #Leicestercity #leicestercityfc #foxes #championship #efl #football #soccer #psr Hosted on Acast. See acast.com/privacy for more information.
Hyundai, Kia, Genesis Logitech, Princeton, The Washington Post, DoorDash and so much more is part of this week's breaches!
When a young engineer uncovered a sizeable click fraud situation at Google, he discovered a bigger problem; namely, the perverse ingenuity that drives online fraud and scams. "Big Breaches" author Neil Daswani joined us to talk click farms, data breaches, AI exploits, and the big picture of cybercrime today. Learn more about your ad choices. Visit megaphone.fm/adchoices
PREVIEW. Hezbollah Rises Again: Unfinished Business and Ceasefire Breaches in Lebanon. Edmund Fitton-Brown described Hezbollah as a "punched out fighter on the mat getting up slowly," rearming to a new scale of threat. There is definitely "unfinished business in Lebanon." Hezbollah intends to break the ceasefire, which is monitored by the United States and Israel. The Lebanese state has shown reluctance to disarm Hezbollah, which the ceasefire requires. 1899 BEIRUT
A very special Breaches of the Week segment!
Send us a textIn this episode of Privacy Please, host Cameron Ivey discusses significant security threats, including a critical vulnerability in Microsoft's WSUS, a major data breach at the University of Pennsylvania, and the emergence of sophisticated malware known as Glassworm. The conversation highlights the importance of cybersecurity measures and the potential consequences of negligence in IT security. Support the show
The index slipped below its 20-day EMA, flashing the first real sign of caution in weeks. This technical breach hints at short-term fatigue, yet the underlying structure still shows selective strength in defensive and high-beta pockets.With global sentiment mixed and domestic flows steady, traders should stay alert for false breakdowns and intraday reversals — the kind that often mark short-term bottoms.In this episode, Neel Parekh decodes the technical setup, outlines profit-protection strategies, and highlights where smart money might quietly re-enter if volatility spikes.
The index slipped below its 20-day EMA, flashing the first real sign of caution in weeks. This technical breach hints at short-term fatigue, yet the underlying structure still shows selective strength in defensive and high-beta pockets.With global sentiment mixed and domestic flows steady, traders should stay alert for false breakdowns and intraday reversals — the kind that often mark short-term bottoms.In this episode, Neel Parekh decodes the technical setup, outlines profit-protection strategies, and highlights where smart money might quietly re-enter if volatility spikes.
The index slipped below its 20-day EMA, flashing the first real sign of caution in weeks. This technical breach hints at short-term fatigue, yet the underlying structure still shows selective strength in defensive and high-beta pockets.With global sentiment mixed and domestic flows steady, traders should stay alert for false breakdowns and intraday reversals — the kind that often mark short-term bottoms.In this episode, Neel Parekh decodes the technical setup, outlines profit-protection strategies, and highlights where smart money might quietly re-enter if volatility spikes.
Tom Lyons of business website, The Currency, discusses the Central Bank's fining of cryptocurrency exchange, Coinbase Europe over €21 million for breaching anti-money laundering and counter-terrorist monitoring obligations.
Google, HSBC, Conduent, Tesla, Penn, EY, Tata Motors, the Iranian Government, and so many more were in the crosshairs of attackers this week!
Toys ‘R' Us, Nintendo, Sotheby's, Pirelli Tyres, Air France and your AI girlfriend are all having a rather bad week!
Your daily news in under three minutes. At Al Jazeera Podcasts, we want to hear from you, our listeners. So, please head to https://www.aljazeera.com/survey and tell us your thoughts about this show and other Al Jazeera podcasts. It only takes a few minutes! Connect with us: @AJEPodcasts on X, Instagram, Facebook, and YouTube
Guest: Jibran Ilyas, Director for Incident Response at Google Cloud Topics: What is this tabletop thing, please tell us about running a good security incident tabletop? Why are tabletops for incident response preparedness so amazingly effective yet rarely done well? This is cheap/easy/useful so why do so many fail to do it? Why are tabletops seen as kind of like elite pursuit? What's your favorite Cloud-centric scenario for tabletop exercises? Ransomware? But there is little ransomware in the cloud, no? What are other good cloud tabletop scenarios? Resources: EP60 Impersonating Service Accounts in GCP and Beyond: Cloud Security Is About IAM? EP179 Teamwork Under Stress: Expedition Behavior in Cybersecurity Incident Response EP222 From Post-IR Lessons to Proactive Security: Deconstructing Mandiant M-Trends EP177 Cloud Incident Confessions: Top 5 Mistakes Leading to Breaches from Mandiant EP158 Ghostbusters for the Cloud: Who You Gonna Call for Cloud Forensics EP98 How to Cloud IR or Why Attackers Become Cloud Native Faster?
CISA, F5, PNC, Canadian Tire, Discord and so much more are all part of breaches of the week!
Brewery Breach Brings Bitter Blow to Beer Buffs. Windowless Wonders: Digital Daylight for the Jet Set. Collar Communication: Cows Connect Through Clever, Cloud-Controlled Collars. Clever Cameras or Cautious Concerns: Can AI Eyes Really Protect Our Homes? Cleaning Conqueror: The Deebot Delivers Dirt-Defying Design and Drive. Flash, Fuse, and Frame: Gemini's Generative Genius Gets a Photoshop-Free Future. Talking Tech: Translating Travel through Tongues and Tech. Call Combat: Clever Call-Screening Cuts Cold-Caller Chaos. Shark Shield or Style Statement? Scientists Suit Up for Bite-Resistant Breakthroughs.
Three hosts. Gamecubes, Apple Updates, Campers, and Breaches.
Richard Ford – Group Chief Technology Officer (SA), Integrity360 SAfm Market Update - Podcasts and live stream
Tonight we explore whether SA is in line for a rerating with Investec chief economist Annabel Bishop, we discuss the growing financial impact of cyber breaches on companies with Richard Ford from Integrity360, Nedbank's Terence G Sibiya explains how finance can act as a lever for systemic development across Africa, and in our Executive Lounge segment we chat with ABB SA's Graham Abrahams about his sales journey and career passions. SAfm Market Update - Podcasts and live stream
Nintendo, Qantas, SonicWall and how lying is hacking our brains are all part of this week.
Crypto scams and security breaches reached $2.3 billion in 2024 with AI deepfakes and state-sponsored attacks on the rise. Learn how everyday investors can spot early warning signs, protect their wallets, and stay ahead of increasingly sophisticated threats targeting personal crypto holdings. JCH Digital City: Quesnel Address: Blair Street Website: https://www.jchdigital.ca/
APAC stocks trade mixed with demand hampered following the negative handover from the US; European futures flat.RBNZ cut rates by 50bps and kept the door open to further rate cuts.US President Trump said a lot of things will be eliminated due to the shutdown, and he will tell us about the eliminated jobs in four or five days.USD remains on the front foot, NZD lags post-RBNZ, JPY digests soft real cash earnings data.Spot gold continued its advances, in which spot prices climbed above the USD 4,000/oz level.Looking ahead, highlights include German Industrial Output (Aug), Swedish CPIF Flash (Sep), NBP Policy Announcements, FOMC Minutes (Sep), BoE's Pill, ECB's Elderson & Lagarde, Fed's Musalem, Barr, Goolsbee & Kashkari, Supply from UK, Germany & US.Read the full report covering Equities, Forex, Fixed Income, Commodites and more on Newsquawk
In this episode of the Security Squawk Podcast, Bryan Hornung, Randy Bryan, and Reginald Andre dissect three headline-making cybersecurity incidents that highlight how threats keep evolving—just in different directions. Randy kicks things off with WestJet's massive data breach, where over 1.2 million customers had their information exposed, showing how even major airlines struggle with protecting sensitive data in 2025. Andre dives into a shocking story out of Australia—the NSW government accidentally uploading flood victims' personal data to ChatGPT, revealing how AI misuse and data mishandling can turn into a privacy nightmare overnight. Bryan closes with the latest findings showing ransomware attacks are rising again—just as fewer companies renew their cyber insurance policies, setting up the perfect storm for costly business disruptions. The team breaks down what these stories mean for business owners, from growing AI data risks to the real cost of skipping cybersecurity insurance. Expect practical takeaways, sharp insights, and a few laughs along the way as the guys decode what's really happening behind the headlines. ️ New to streaming or looking to level up? Check out StreamYard and get $10 discount! https://streamyard.com/pal/d/65161790...
Breaches of the Week; Welcoming CERN to HIBP; Latest Pilot Jobs and HomeRefill Data Breaches; Brainstorming the Breach Pipeline; Sponsored by Report URI https://www.troyhunt.com/weekly-update-472/See omnystudio.com/listener for privacy information.
Discord, Salesforce, Red Hat, Oracle (again), Renault, Comcast and the US Air Force all made this is just an insane week for breaches!
This conversation delves into the complexities of contract law, focusing on performance, breach, and conditions. It outlines a structured approach to understanding these concepts, emphasizing the differences between common law and UCC standards, the importance of express versus constructive conditions, and the various excuses for non-performance. The discussion also covers anticipatory breach and repudiation, providing a comprehensive framework for law students preparing for exams.Navigating the complexities of contract law can be daunting, especially when it comes to understanding performance standards. Whether you're preparing for a law exam or dealing with real-world contracts, grasping the differences between Common Law and the Uniform Commercial Code (UCC) is crucial. Let's delve into these distinctions and their implications.Common Law Performance Standards: Under Common Law, particularly in service or construction contracts, the principle of substantial performance prevails. This means that as long as the core obligations are met, minor defects do not constitute a breach. The focus is on whether the essence of the contract has been fulfilled, allowing for some flexibility in performance.UCC and the Perfect Tender Rule: In contrast, the UCC, which governs the sale of goods, enforces the perfect tender rule. This strict standard requires that goods delivered must conform exactly to the contract specifications. Any deviation, however minor, can allow the buyer to reject the goods. However, the UCC also provides a right to cure, giving sellers a chance to correct non-conformities under certain conditions.Conditions and Breach: Understanding conditions is vital in both frameworks. Express conditions require strict compliance, while constructive conditions allow for substantial performance. Breaches under Common Law are categorized as minor or material, affecting the remedies available. Under the UCC, non-conforming goods trigger the buyer's rights, but the seller's right to cure can mitigate this.The distinction between Common Law and UCC performance standards highlights the importance of context in contract law. Whether dealing with services or goods, understanding these frameworks can guide you in drafting, negotiating, and enforcing contracts effectively. As you navigate these legal waters, remember that the key lies in the details and the specific terms agreed upon by the parties involved.Subscribe now to stay updated on the latest insights in contract law and more.TakeawaysContracts get intense after formation, especially performance.Understanding performance obligations is crucial for legal analysis.The distinction between common law and UCC standards is vital.Material breach vs. minor breach directly affects remedies.The materiality test determines the severity of a breach.Express conditions require strict compliance, unlike constructive conditions.Impossibility and impracticability are key excuses for non-performance.Anticipatory repudiation allows immediate action by the non-breaching party.The right to cure can mitigate strict performance requirements.Legal drafting can significantly impact risk allocation in contracts.law school, contracts, performance, breach, conditions, UCC, common law, legal analysis, exam preparation
CannCon kicks off solo before Alpha finally rolls in late, and together they tear through the chaos of the day. From a deep dive into Tina Peters' ongoing imprisonment to the DOJ's shady firings, Secret Service failures, and the weaponization of Big Tech, the hosts spotlight the corruption hiding in plain sight. They break down President Trump's moves against corporate embeds like Lisa Monaco, unpack the latest twists in the government shutdown, and call out the hypocrisy of the establishment. With sidebars on Malibu's stalled rebuild, a bizarre NYPD infiltration at the Ryder Cup, and AOC's strange rise, the episode is equal parts sharp analysis and raw banter. Sponsors include Comet by Perplexity, Soft Disclosure, Native Path Collagen, Patriot Injury Lawyers, and Pickaxe.
Breach notification letters set to flood North America's mailboxes New bug in classic Outlook only fixed via Microsoft support Air Force admits SharePoint privacy issue over breach Huge thanks to our sponsor, Nudge Security AI notetakers like Otter AI spread fast. In fact, one Nudge Security customer discovered 800 new accounts created in only 90 days. Viral AI notetakers introduce a slew of data privacy risks by gaining access to calendars and adding themselves to every meeting. Nudge Security can help. Within minutes of starting a free trial, you'll see every AI app, account, and integration, even those created in the past. And, smart automation helps you clean up unwanted accounts and guide users towards approved alternatives. See how you can regain control today at nudgesecurity.com/stopotter
In this episode of the podcast, Ryan Williams Sr. and Shannon Tynes discuss the latest cybersecurity news, including CISA's emergency directive regarding Cisco vulnerabilities, the rise of SIM farms threatening US infrastructure, and the alarming trend of cybercriminals targeting children's data for ransom. They emphasize the importance of cybersecurity awareness and the evolving landscape of cyber threats while also sharing personal updates and reflections on their experiences in the field. Article: CISA orders feds to patch Cisco flaws used in multiple agency hacks https://www.cybersecuritydive.com/news/cisa-emergency-directive-cisco-vulnerabilities-arcanedoor/761150/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExd2lleHdWb1RWbEFZTDBJeQEenjZcbYPfTEpDqYpskC1y_ATnQjy8Xs0O_lBm9CqOYVx3jY2IWAuVe19i1Rk_aem_QN5KLONSnHGtBgaVUXEsXw ‘SIM Farms' Are a Spam Plague. A Giant One in New York Threatened US Infrastructure, Feds Say https://www.wired.com/story/sim-farm-new-york-threatened-us-infrastructure-feds-say/?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExd2lleHdWb1RWbEFZTDBJeQEenLyO6lHFipbOSiGb3VydzS5_tY3hL7Z4kXKi86wzH_Qcfc3tyl4x1uELPgk_aem_KHOxgSVa-qn4XeXt7xdiKQ Nursery hackers threaten to publish more children's profiles online https://www.bbc.com/news/articles/c07vxv8v89lo.amp?fbclid=IwZXh0bgNhZW0CMTAAYnJpZBExd2lleHdWb1RWbEFZTDBJeQEetWzL8TMJE9U0bVS7Uy0EJFnJXxX0Xf7BQRXxJw-U4fatP_ilEnBIKdE6tQc_aem_OaAnjTw17cUrAzhvv9ShRw Buy the guide: www.theothersideofthefirewall.com Please LISTEN
Edition No249 | 28-09-2025 - Today we turn the spotlight squarely on Russia's propaganda machinery — and how its most vicious threats now extend even to Britain's ancient universities. Solovyov has threatened to wipe out the town where I live in an atomic inferno, for no other reason that we refuse to allow Russia to erase Ukraine from the world map. Perhaps he's also upset he can't get to his Italian villas since 2022. So, Russia's foremost propagandist has threatened to wipe out one of the most ancient seats of learning and civilisation, and by extension threaten to kill me. Apart from the bluster and vicious hatred, it's such utterances that show Russia has fallen far from what could be considered civilisation, civilised language and behaviour, and that no regime hack or representative should be allowed in civilised company, at least for the lifetime of the current regime. That ban should also extend to all the minions and enablers of the regime. We'll explore how that fits into a broader pattern: Russia's imperial ambitions, its civilizational decline, and the accelerating slide in global norms under pressure from China, Russia, and their allies — but also how Ukraine and its global backers confront this – showing that resistance, and a reassertion of civilised values is possible – though it comes at a steep price.We begin — shockingly — with Vladimir Solovyov's threat to bomb Oxford and Cambridge.----------This is super important. There are so many Battalions in Ukraine, fighting to defend our freedoms, but lack basics such as vehicles. These are destroyed on a regular basis, and lack of transport is costs lives, and Ukrainian territory. Once again Silicon Curtain has teamed up with Car4Ukraine and a group of wonderful creators to provide much-needed assistance: https://car4ukraine.com/campaigns/autumn-harvest-silicon-curtainAutumn Harvest: Silicon Curtain (Goal€22,000)We'll be supporting troops in Pokrovsk, Kharkiv, and other regions where the trucks are needed the most. 93rd Brigade "Kholodnyi Yar", Black Raven Unmanned Systems Battalionhttps://car4ukraine.com/campaigns/autumn-harvest-silicon-curtain----------SOURCES: “Russia should ‘bomb Oxford', key Putin ally says,” UK News / Yahoo, Sept 2025“Top Russian propagandist issues threat to drop nuclear bombs …” LADbible, Sept 2025 Nancy Ries, *Russia's Atrocity Rhetoric During Its War on Ukraine* (RCIN) An Independent Legal Analysis of the Russian Federation's Breaches of the Genocide Convention (New Lines Institute) “Holding Putin's propagandists accountable for crimes in Ukraine,” Atlantic Council UkraineAlert, June 2024 “Dmitry Medvedev says editors of The Times are ‘legitimate military targets',” The Guardian, Dec 2024 “Russia is at war with Britain …”, The Guardian / Fiona Hill commentary, June 2025 “International Criminal Court arrest warrants for Russian leaders,” Wikipedia / ICC context “Andrey Gurulyov,” Wikipedia (remarks on bombing Britain)----------SILICON CURTAIN LIVE EVENTS - FUNDRAISER CAMPAIGN Events in 2025 - Advocacy for a Ukrainian victory with Silicon Curtainhttps://buymeacoffee.com/siliconcurtain/extrasOur events of the first half of the year in Lviv, Kyiv and Odesa were a huge success. Now we need to maintain this momentum, and change the tide towards a Ukrainian victory. The Silicon Curtain Roadshow is an ambitious campaign to run a minimum of 12 events in 2025, and potentially many more. Any support you can provide for the fundraising campaign would be gratefully appreciated. https://buymeacoffee.com/siliconcurtain/extras----------SUPPORT THE CHANNEL:https://www.buymeacoffee.com/siliconcurtainhttps://www.patreon.com/siliconcurtain----------
Harrods, Stellantis, Volvo, the Canadian Government and so much more is why these segments are ALWAYS open bar!
Roger Stone: The Rise in Security Breaches and Assassinations (6 min) Learn more about your ad choices. Visit megaphone.fm/adchoices
AP correspondent Charles de Ledesma reports NATO warns Russia it will use all means to defend against airspace breaches.
Tiffany, SonicWall, Crowdstrike, SonicWall, Aetna CVS, The Social Security Administration and every financial advisor in Canada and so much more are why we want off this planet this week...
Kevin and Kieran discuss the news that Chelsea have been hit with 74 charges over alleged agent rule breaches, and find out why Inverness Caledonian Thistle are now out of administration. Follow Kevin on X - @kevinhunterday Follow Kieran on X - @KieranMaguire Follow The Price of Football on X - @pof_pod Send in a question: questions@priceoffootball.com Join The Price of Football CLUB: https://priceoffootball.supportingcast.fm/ Check out the Price of Football merchandise store: https://the-price-of-football.backstreetmerch.com/ Visit the website: https://priceoffootball.com/ For sponsorship email - info@adelicious.fm The Price of Football is a Dap Dip production: https://dapdip.co.uk/ contact@dapdip.co.uk Learn more about your ad choices. Visit podcastchoices.com/adchoices
NATO allies confer after Russian incursions, Brad Littlejohn on holding Apple accountable, and Collin Garbarino reviews Downton Abbey: The Grand Finale. Plus, a Boy Scout saves a life, Matthew West's new song offers hope, and the Tuesday morning newsSupport The World and Everything in It today at wng.org/donateAdditional support comes from Planted Gap Year, where young adults combine Bible classes, hands-on farming, and outdoor adventure. More at plantedgapyear.orgFrom PrayMore, a new app for churches to share prayer requests with members and send reminders to pray. Free trial available at praymore.com/worldAnd from iWitness. Powerful audio dramas bringing faith, courage, and history to life in unforgettable ways. iwitnesspod.com
In this episode of The President's Daily Brief: New revelations about Charlie Kirk's accused assassin, Tyler Robinson, and the chilling way he mocked investigators in real time. NATO airspace violated by a Russian drone again, this time over Romania, as President Zelensky warns the latest breach shows the war is spreading. President Trump says he won't impose new U.S. sanctions on Russia unless NATO allies first cut off their purchases of Russian oil. And in today's Back of the Brief—the UN General Assembly votes overwhelmingly for a two-state solution declaration—while also condemning Hamas, managing to call them out and hand them exactly what they want in the same breath. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com.Please remember to subscribe if you enjoyed this episode of The President's Daily Brief.YouTube: youtube.com/@presidentsdailybrief Jacked Up Fitness: Get the all-new Shake Weight by Jacked Up Fitness at https://JackedUpShakeWeight.comTriTails Premium Beef: Reclaim dinner from the jaws of school-year chaos Visit https://trybeef.com/PDB.American Financing: NMLS 182334, nmlsconsumeraccess.org. APR for rates in the 5s start at 6.327% for well qualified borrowers. Call 866-885-1881 for details about credit costs and terms. Visit http://www.AmericanFinancing.net/PDB. Learn more about your ad choices. Visit megaphone.fm/adchoices
Headlines: – Welcome to Mo News (02:00) – Inside The Arrest Of Suspect In Charlie Kirk's Murder (06:00) – Rubio Meets Netanyahu Amid Qatar Strike Fallout (28:15) – Russian Drone Entered Romania's Airspace After Poland Incident (34:15) – Trade Schools Benefit From Trump's Ivy League Fight (37:15) – America's Sex Recession: Record Lows In Intimacy (40:00) – TV's Biggest Night: Recapping The 77th Emmy Awards (44:45) – On This Day In History (48:00) Thanks To Our Sponsors: – LMNT - Free Sample Pack with any LMNT drink mix purchase– Industrious - Coworking office. 50% off day pass | Promo Code: MONEWS50 – Surfshark - 4 additional months of Surfshark VPN | Code: MONEWS – Leesa – 25% off mattress, plus extra $50 off | Promo Code: MONEWS – Factor Meals – 50% your first box plus free shipping | Promo Code: monews50off – Monarch Money - 50% off your first year | Promo Code: MONEWS
The Great Firewall of China, Jaguar Land Rover, Workday, Facebook, Tenable and Qualys, HackerOne and so much more are all part of this week's breaches!
Palo Alto Networks, Zscaler, Cloudflare, Navy Fed, AT&T, more Salesforce fallout and now these segments are officially open bar...