Podcasts about compromised

  • 1,474PODCASTS
  • 2,143EPISODES
  • 41mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Apr 4, 2025LATEST
compromised

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about compromised

Show all podcasts related to compromised

Latest podcast episodes about compromised

American Institute of CPAs - Personal Financial Planning (PFP)
When theft gets taxing with Bob Keebler

American Institute of CPAs - Personal Financial Planning (PFP)

Play Episode Listen Later Apr 4, 2025 19:12


In this episode, Cary Sinnett is joined by renowned CPA and tax expert Bob Keebler to unpack the complexities of theft and casualty loss deductions under IRC Section 165. From pig butchering scams to IRA fraud and Ponzi schemes, this episode dives deep into the kinds of losses the IRS will—and won't—let you deduct, what qualifies as a profit motive, and how financial planners can guide their clients through one of the most emotionally and financially painful tax situations. Five Key Insights for CPA Financial Planners: Profit Motive Determines Deductibility To qualify under Section 165(c)(2), a theft or loss must stem from a transaction entered into for profit. Losses from romantic or emotional scams—where no profit motive exists—do not qualify. Five Scam Archetypes to Know A recent IRS CCA outlined five fraud scenarios: Compromised account scams Pig butchering (crypto fraud) Phishing and impersonation Romance scams Kidnapping/extortion schemes Only the first three had profit motives and were deductible. The IRA Trap: The Tax Hit Before the Scam If a client is duped into withdrawing funds from an IRA and then loses the money to a scam, they face a double blow—taxable income and no deductible loss. CPA advisors must flag this risk early. Documentation Is Critical for IRS Support To substantiate a theft loss, clients need: Bank records (e.g., wire transfers) Law enforcement reports A clear, detailed paper trail showing the loss and the attempt to recover funds Directing the IRS to the assigned FBI agent can strengthen the claim. Mitigation and Planning: Protecting Vulnerable Clients Encourage older or high-net-worth clients to follow a “1–2% rule” on risky investments. Foster opens dialogue with family members and advisors to prevent fraud and ensure support if it occurs. Access resources related to this podcast: Note: If you're using a podcast app that does not hyperlink to the resources, visit Libsyn (PFP) to access show notes with direct links. IRC Section 165 IRS CCA 2025-101015 (the ruling discussed) Revenue Procedure 2009-20 (Ponzi Scheme Safe Harbor) AICPA PFP Section Guiding your clients who are financial caregivers Scam Tracker Risk Report This episode is brought to you by the AICPA's Personal Financial Planning Section, the premier provider of information, tools, advocacy, and guidance for professionals who specialize in providing tax, estate, retirement, risk management and investment planning advice. Also, by the CPA/PFS credential program, which allows CPAs to demonstrate competence and confidence in providing these services to their clients. Visit us online to join our community, gain access to valuable member-only benefits or learn about our PFP certificate program. Subscribe to the PFP Podcast channel at Libsyn to find all the latest episodes or search “AICPA Personal Financial Planning” on your favorite podcast app.  

The Richie Baloney Show!
Carney COMPROMIZED Says Pierre Poilievre Over Liberal MP China Scandal

The Richie Baloney Show!

Play Episode Listen Later Apr 1, 2025 5:12


Mark Carney COMPROMISED Says Pierre Poilievre Over Liberal MP China ScandalBecome a supporter of this podcast: https://www.spreaker.com/podcast/radio-baloney-the-richie-baloney-show--4036781/support.

Successful Farming Podcast
Saturday Short: Handling Compromised Animals

Successful Farming Podcast

Play Episode Listen Later Mar 29, 2025 1:59


Livestock owners work hard to ensure their animals are cared for through all stages of production. Despite their efforts, some animals will become injured or sick, and decisions must be made. Consider these tips for treatment, and consult with your veterinarian. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Gospel Baptist Church, Bonita Springs, FL - Fundamental, Independent, Bible Believing
The Compromised Church, Revelation 2:12-17 (Pastor Chris Barrows )

Gospel Baptist Church, Bonita Springs, FL - Fundamental, Independent, Bible Believing

Play Episode Listen Later Mar 28, 2025 36:26


Erin Burnett OutFront
Panetta: When Classified Plans Are Compromised, It Endangers Lives

Erin Burnett OutFront

Play Episode Listen Later Mar 27, 2025 51:44


Trump claims to know nothing about America's extraordinary security breach while fully supporting his defense secretary who wrote in a group chat when bombs would drop. Plus, Homeland Security Secretary Kristi Noem visits the brutal Supermax prison Trump holds up as a model. Learn more about your ad choices. Visit podcastchoices.com/adchoices

Type 2 Diabetes Talk
70: The Invisible Cause of Prediabetes and Type 2 Diabetes

Type 2 Diabetes Talk

Play Episode Listen Later Mar 25, 2025 24:43


Have you ever wondered what the cause of type 2 diabetes or prediabetes is? Or why prediabetes and type 2 diabetes seem to come with a host of other health issues, like weight gain, high blood pressure or cholesterol problems? In this insightful episode, we unpack the invisible culprit behind it all: metabolic dysregulation. This little-known but powerful driver lies at the heart of these conditions and may even be the reason your health feels out of balance.Join us as we explore how metabolic dysregulation develops, the issue that lies at its core (high glucose, high insulin and insulin resistance), why it's so often overlooked in traditional healthcare, and, most importantly, what you can do to reverse it. CHAPTERS2:43 What is metabolic dysregulation?4:29 Symptoms of metabolic dysregulation5:44 Key issues behind metabolic dysregulation8:05 Compromised metabolic functions11:36 High insulin and insulin resistance14:55 Request a fasting insulin test17:11 How to treat the cause, not just symptomsFor show notes and resources, please visit: https://Type2DiabetesTalk.comTo share your questions and suggestions, leave us a voice message or email at: https://Type2DiabetesTalk.com/messageExplore our proven programs and services, visit: https://Type2DiabetesTalk.com/programsSubscribe to our free weekly newsletter for podcast updates, valuable nutrition tips and more: https://Type2DiabetesTalk.com/subscribe

The Common Sense Show
Compromised Justice Robert's, New JFK Details

The Common Sense Show

Play Episode Listen Later Mar 24, 2025 56:04


Compromised Justice Robert's, New JFK Details

The Smerconish Podcast
Senator Angus King (I-ME): Social Security is being compromised, and President Trump needs to do something about it

The Smerconish Podcast

Play Episode Listen Later Mar 24, 2025 12:17


Michael talks to Independent Senator Angus King of Maine, about President Trump's promise to not touch Social Security, while people in his administration seem to be trying to cut the entitlement that millions of Americans pay in to. Original air date 24 March 2025.

Pablo Azurdia Podcast
Foundation Compromised

Pablo Azurdia Podcast

Play Episode Listen Later Mar 24, 2025 73:45


Send us a text      We are all at liberty in making our dreams, visions and wonders become a reality. What sets the difference is whether they are build upon a foundation or not. The rain, floods and wind are inevitable to face, but the question is, will your house remain standing? May this sermon be a blessings to you all! 

Lake Pointe Church Podcast
Choosing Courage in a Compromised Culture | Letters To The American Church | Pastor Josh Howerton

Lake Pointe Church Podcast

Play Episode Listen Later Mar 23, 2025 52:08


The Direct Care Derm
Compromised, Acneic Skin Solutions Your 5-Minute Dermatologist Isn't Teaching You About | Christine Preston & NeoGenesis

The Direct Care Derm

Play Episode Listen Later Mar 20, 2025 50:12


Episode 047 | Christine Preston is a compromised Skin Therapist (certificate in Skin Therapy from George Brown College) who has been certified since 2016. Since then, she's been helping women across North America achieve calm, clear skin by helping them identify their triggers and creating skin care routines that work. She opened the Skin Discovery Spa in 2021 where she helps her clients clear acne, calm rosacea and relieve eczema-prone skin. (Did someone say road trip?!

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday March 17th: Mirai Makes Mistakes; Compromised Github Action; ruby-saml vulnerability; Fake GitHub Security Alert Phishing

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Mar 17, 2025 6:38


Mirai Bot Now Incorporating Malformed DrayTek Vigor Router Exploits One of the many versions of the Mirai botnet added some new exploit strings attempting to take advantage of an old DrayTek Vigor Router vulnerability, but they got the URL wrong. https://isc.sans.edu/diary/Mirai%20Bot%20now%20incroporating%20%28malformed%3F%29%20DrayTek%20Vigor%20Router%20Exploits/31770 Compromised GitHub Action The popular GitHub action tj-actions/changed-files was compromised and leaks credentials via the action logs https://www.stepsecurity.io/blog/harden-runner-detection-tj-actions-changed-files-action-is-compromised ruby-saml authentication bypass A confusion in how to parse SAML messages between two XML parsers used by Ruby leads to an authentication bypass in saml-ruby. https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials/ GitHub Fake Security Alerts Fake GitHub security alerts are used to trick package maintainers into adding OAUTH privileges to malicious apps. https://www.bleepingcomputer.com/news/security/fake-security-alert-issues-on-github-use-oauth-app-to-hijack-accounts/

Mobberly Baptist Church
03-16-2025 – Revelation: The Compromised Church – Longview Campus

Mobberly Baptist Church

Play Episode Listen Later Mar 17, 2025


Revelation: The Compromised Church Dr. Andrew Hébert

Health Newsfeed – Johns Hopkins Medicine Podcasts
Is compromised sleep related to the development of cancer? Elizabeth Tracey reports

Health Newsfeed – Johns Hopkins Medicine Podcasts

Play Episode Listen Later Mar 17, 2025 1:03


If your sleep is chronically interrupted or too long or short in duration, you may be at increased risk for some types of cancer, research suggests. Sleep expert Charlene Gamaldo at Johns Hopkins says it's unclear whether sleep quality puts … Is compromised sleep related to the development of cancer? Elizabeth Tracey reports Read More »

Health Newsfeed – Johns Hopkins Medicine Podcasts
How might compromised sleep put one at risk for poorer health outcomes? Elizabeth Tracey reports

Health Newsfeed – Johns Hopkins Medicine Podcasts

Play Episode Listen Later Mar 17, 2025 1:06


While it's been observed that disease and poor sleep seem to sort together, ongoing research is looking into the why of it. Johns Hopkins sleep expert Charlene Gamaldo says a couple of possible causes have emerged. Gamaldo: A couple of … How might compromised sleep put one at risk for poorer health outcomes? Elizabeth Tracey reports Read More »

Redeemer Covenant Church
When the Gospel Becomes Compromised

Redeemer Covenant Church

Play Episode Listen Later Mar 16, 2025 56:55


SJWellFire: Final Days Report
Is Trump Compromised? FDR: 408

SJWellFire: Final Days Report

Play Episode Listen Later Mar 15, 2025 41:33


Is Trump controlled? If so, by what Country?

DOGS
Research shows money matters in education, historic funding agreement reached and then compromised and much more

DOGS

Play Episode Listen Later Mar 15, 2025


Research shows money matters in education. No student left behind with historic funding agreement in NSW. This agreement was immediately compromised when the shadow minister refused to confirm they would not commit to the agreement. US- Trump and the problematic origin of charter schools and voucher systems.Great State School of the week- Clunes Primanry Schoolwww.adogs.info

The Home Defense Show Podcast
How to get good food for your family when the food supply is compromised

The Home Defense Show Podcast

Play Episode Listen Later Mar 14, 2025 62:20


This week on The Home Defense Show Skip & Sara talk about the public's lack of confidence in the US food supply. Then they speak with author and radio host Rick Vuyst about how to start raising your own vegetables. In segment 3 firearms and Krav Maga instructor Steve Sulze talks about how to deal with bad neighbors without getting yourself shot.

The Sports Junkies
Our Emails Have Been Compromised / Big Caps Win

The Sports Junkies

Play Episode Listen Later Mar 12, 2025 13:21


From 03/12 Hour 1: The Sports Junkies discuss how their emails are getting flooded with spam.

The Sports Junkies
H1: Compromised Emails, Better or Worse, Tiger Undergoes Surgery

The Sports Junkies

Play Episode Listen Later Mar 12, 2025 42:55


03/12 Hour 1: Our Emails Have Been Compromised / Big Caps Win - 1:00 Better or Worse - 15:00 Tiger Woods Ruptured His Achilles Tendon - 33:00

Grace 242
How NOT to Trust Your Inner Knowing

Grace 242

Play Episode Listen Later Mar 2, 2025 31:04


To kick off 2025, we are spotting ways in which the DNA of the faith one for all delivered to the saints (Jude 3) is mutated and changed.Title: How NOT to Trust Your Inner KnowingScripture Reading: Isaiah 30:21 ESVOne of the messages that gets circulated in Christian circles is listening to your heart or, as one author writes, your "inner knowing." In today's message we first look at why we can't trust our hearts. Then Pastor Bill gives four checks for discerning between your own inner voice that cannot be trusted and the voice of the Holy Spirit. Those four checks are: 1. Does it Align with the Bible?2. Are You Accounting for Your Own Sinfulness?3. Who Ultimately Gets the Glory?4. What Sort of Road Does it Resemble?

Adversary Universe Podcast
China's Cyber Enterprise Grows: CrowdStrike 2025 Global Threat Report

Adversary Universe Podcast

Play Episode Listen Later Feb 27, 2025 34:00


China's cyber enterprise is rapidly growing: China-nexus activity was up 150% across industries in 2024, with a 200-300% surge in key sectors such as financial services, media, manufacturing, and industrials/engineering. CrowdStrike identified seven new China-nexus adversaries in 2024. “After decades investing in offensive cyber capabilities, China has achieved parity with some of the top players out there, and I think that is the thing that should terrify everybody,” Adam says.   China-nexus threat actors aren't the only ones evolving their cyber operations. As the CrowdStrike 2025 Global Threat Report shows, nation-state and eCrime adversaries spanning regions and skill levels are gaining speed and refining their techniques. They're learning what works and what doesn't, and they're scaling their effective tactics to achieve their goals. So what works? Voice phishing (vishing) skyrocketed 442% between the first and second half of 2024 as adversaries leaned on vishing, callback phishing, and help desk social engineering to access target networks. Generative AI played a key role in social engineering, where its low barrier to entry and powerful capabilities help adversaries create convincing content at scale. Compromised credentials also proved handy last year, helping threat actors enter and move laterally through organizations and operate as legitimate users.  What doesn't work as well? Malware. 79% of detections in 2024 were malware-free, indicating a rise in hands-on-keyboard activity as adversaries face stronger security defenses.  Tune in to hear Adam and Cristian dig into the key findings of the CrowdStrike 2025 Global Threat Report, which also examines the latest on cloud-focused attacks, vulnerability exploitation, and nation-state activity around the world.

Bitcoin Takeover Podcast
S16 E10: Eric Voskuil & John Carvalho on Bitcoin & Austrian Economics

Bitcoin Takeover Podcast

Play Episode Listen Later Feb 26, 2025 501:14


In recent years, Bitcoin has undergone a major culture shift which promotes stagnation, complacency & simping to politicians over maximizing the utility of the money. Eric Voskuil & John Carvalho join the show to remind everyone what the mission really is. State of Bitcoin - [00:01:17] Bitcoin Maximalism - [00:01:32] Bitcoin as a Ponzi Scheme - [00:02:27] Transaction Fees - [00:04:57] History of Bitcoin Tokens (Omni, Counterparty, Mastercoin) Definition of Tokens - [00:08:01] Custodial Problems with Tokens - [00:09:12] Bitcoin and Fiat Money - [00:11:09] Why Bitcoiners Talk About Money - [00:15:49] Stateless Money - [00:17:44] Austrian Economics and Bitcoin - [00:21:01] Monetary Inflation vs. Price Inflation - [00:26:01] Cantillon Effect - [00:29:00] Dollar Inflation and Gold - [00:33:59] Misunderstandings in the Bitcoin Community - [00:41:42] Bitcoin Semantics - [00:43:21] Bitcoin Divisibility - [01:00:13] Bitcoin Deflation - [01:03:41] Maxi Price and One Coin Assumption - [01:07:43] Competition Between Monies - [01:13:42] Scaling Bitcoin - [01:22:41] Bitcoin for the Unbanked - [01:26:14] Maximizing Throughput - [01:36:11] Right to Fork - [01:45:45] Running Old Bitcoin Versions - [01:51:35] Bitcoin as Money vs. Credit - [01:56:26] Settlement in Bitcoin - [02:07:45] Peer-to-Peer Credit Systems - [02:14:47] Fractional Reserve Banking - [02:26:32] Bitkit Wallet and Spending vs. Saving - [02:36:13] Block size increases and Bitcoin adoption - [03:00:00] Scaling Bitcoin and transaction validation - [03:01:00] Bitcoin overflowing into Litecoin and quantum resistance - [03:02:00] Pruning historical data and exchange price - [03:03:00] Lightning system complexity and Bitcoin's value proposition - [03:05:00] Bitcoin as an investment and speculation - [03:07:00] Optimizing Bitcoin throughput and developer motivations - [03:09:00] Scaling Bitcoin and speculation - [03:11:00] Shitcoins, scams, and Bitcoin's security model - [03:13:00] Litecoin's extension blocks and Mimblewimble - [03:15:00] Bitcoin's security and the legitimacy of altcoins - [03:17:00] Shitcoins and Bitcoin's essential aspects - [03:19:00] Majority hash power censorship and attacks - [03:21:00] Bitcoin speculation and market dynamics - [03:23:00] Michael Saylor's Bitcoin strategy and MicroStrategy's history - [03:26:00] Saylor's Bitcoin investment and market manipulation - [03:29:00] Saylor's stock sales and Bitcoin's future - [03:31:00] Blockstream's accomplishments and the Chia project - [03:33:00] Blockstream's influence and SegWit - [03:35:00] Adam Back's influence and Blockstream's hype - [03:37:00] Bitcoin Core's power and the need for competition - [03:39:00] Initial block download performance and Bitcoin Core's architecture - [03:41:00] UTXO store and Bitcoin Core's performance - [03:43:00] Parallelism in Bitcoin Core and assumed UTXO - [03:45:00] Initial block download time and Bitcoin Core's scalability - [03:47:00] Monoculture in Bitcoin development and IBD performance - [03:49:00] UTXO cache and shutdown time - [03:51:00] Trust assumptions in Bitcoin Core and UTXO commitments - [03:53:00] Bitcoin Core's halting problem and theoretical download limits - [03:55:00] Sponsorships: Sideshift, LayerTwo Labs, Ciurea - [03:57:00] Drivechains and ZK rollups - [04:02:00] ZK rollups and liquidity on Ethereum - [04:04:00] Drivechains and altcoins - [04:06:00] Scaling Bitcoin and cultural taboos - [04:08:00] Engineer-driven change and Monero's approach - [04:10:00] Confidential transactionsL Zano & DarkFi - [04:12:00] Fungibility and Bitcoin's metadata - [04:14:00] Privacy, metadata, and state surveillance - [04:16:00] Privacy, taint, and Bitcoin mixing - [04:18:00] Bitcoin mixing and plausible deniability - [04:20:00] Mining and company registration - [04:22:00] Block reward and hash power - [04:24:00] Privacy and mixing - [04:26:00] Privacy in the Bitcoin whitepaper and zero-knowledge proofs - [04:28:00] Dark Wallet and John Dillon - [04:30:00] Dark Wallet and Li Bitcoin - [04:32:00] Amir Taaki's projects and software development - [04:34:00] Dark Wallet funding and developer costs - [04:36:00] Libbitcoin's code size and developer salaries - [04:38:00] John Dillon and Greg Maxwell - [04:40:00] Opportunistic encryption and BIPs 151/152 - [04:42:00] Dandelion and privacy - [04:44:00] BIP 37 and Bloom filters - [04:46:00] Consensus cleanup and the Time Warp bug - [04:48:00] Merkle tree malleability and 64-byte transactions - [04:50:00] 64-byte transactions and SPV wallets - [04:52:00] Coinbase transactions and malleability - [04:54:00] Invalid block hashes and DoS vectors - [04:56:00] Core bug and ban list overflow - [04:58:00] Storing hashes of invalid blocks - [05:00:00] DoS vectors and invalid blocks - [05:02:00] Malleated Merkle trees and 64-byte transactions - [05:04:00] 64-byte transactions and Merkle tree malleability - [05:06:00] Null points and malleated blocks - [05:08:00] Redundant checks and the inflation soft fork - [05:10:00] Op code separator and code complexity - [05:12:00] Transaction order in a block - [05:14:00] Forward references in blocks - [05:16:00] Coinbase transaction rules - [05:18:00] Time Warp bug and Litecoin support - [05:20:00] Quadratic op roll bug - [05:22:00] Stack implementation and op roll - [05:24:00] Templatized stack and op roll optimization - [05:26:00] Non-standard transactions and direct submission to miners - [05:28:00] Mempool policy and DoS - [05:30:00] Monoculture and competing implementations - [05:32:00] Consensus cleanup and Berkeley DB - [05:34:00] Code vs. consensus - [05:36:00] Bitcoin Knots and Luke-jr - [05:38:00] 300 kilobyte node and Luke-jr's views - [05:40:00] Bitcoin Knots and performance - [05:42:00] Bitcoin Knots and censorship - [05:44:00] Censorship and miner incentives - [05:46:00] Censorship and hash power - [05:48:00] Soft forks and censorship - [05:50:00] Ordinals and covenants - [05:52:00] RBF and zero-confirmation transactions - [05:54:00] Double spending and merchant risk - [05:56:00] First-seen mempool policy and RBF - [05:58:00] Low-value transactions and RBF - [06:00:00] Computational cost of actions - [06:00:15] Building infrastructure and system disruption - [06:00:20] Threat actors and economic disruption - [06:00:26] Double spending detection and system control - [06:00:29] Safety and manageability of zero comp transactions - [06:00:41] Security of zero comp transactions - [06:00:51] RBF (Replace-by-fee) and its relevance - [06:01:06] Bitcoin's mempool and transaction handling - [06:01:25] Mempool overflow and resource management - [06:02:08] Transaction storage and mining - [06:02:45] Miners' incentives and fee maximization - [06:03:07] Mempool policy and DOS protection - [06:03:41] Transaction validation and block context - [06:04:11] Fee limits and DOS protection - [06:05:13] Transaction sets, graph processing, and fee maximization - [06:06:24] Mining empty blocks and hash rate - [06:07:34] Replace-by-fee (RBF) and its purpose - [06:08:07] Infrastructure and RBF - [06:09:14] Transaction pool and conflict resolution - [06:09:44] Disk space, fees, and DOS protection - [06:11:06] Fee rates and DOS protection - [06:12:22] Opt-in RBF and mempool full RBF - [06:13:45] Intent flagging in transactions - [06:14:45] Miners obeying user intent and system value - [06:17:06] Socialized gain and individual expense - [06:18:17] Service reliability and profitability - [06:19:06] First-seen mempool policy - [06:19:37] Mempool policy and implementation - [06:20:06] User perspective on transaction priority - [06:21:14] Mempool conflicts and double spending - [06:22:10] CPFP (Child Pays for Parent) - [06:22:24] Mempool management and fee rates - [06:24:30] Mempool complexity and Peter Wuille's work - [06:25:54] Memory and disk resource management - [06:27:37] First-seen policy and miner profitability - [06:29:25] Miners' preference for first-seen - [06:30:04] Computational cost and fee optimization - [06:31:10] Security, Cypherpunk mentality, and the state - [06:35:25] Bitcoin's security model and censorship resistance - [06:41:02] State censorship and fee increases - [06:43:00] State's incentive to censor - [06:46:15] Lightning Network and regulation - [06:48:41] NGU (Number Go Up) and deference to the state - [06:51:10] Reasons for discussing Bitcoin's security model - [06:53:25] Bitcoin's potential subversion and resilience - [06:55:50] Lightning Network subsidies and scaling - [06:57:36] Mining protocols and security - [07:02:02] Braidpool and centralized mining - [07:04:44] Compact blocks and latency reduction - [07:07:23] Orphan rates and mining centralization - [07:08:16] Privacy and threat environments - [07:08:40] Social graphs, reputation, and identity - [07:10:23] Social scalability and Bitcoin - [07:12:36] Individual empowerment and anonymity - [07:16:48] Trust in society and the role of the state - [07:18:01] Payment methods and trust - [07:20:15] Credit reporting agencies and regulation - [07:22:17] Hardware wallets and self-custody - [07:23:46] Security vulnerabilities in Ledger - [07:27:14] Disclosure of secrets on Ledger devices - [07:36:27] Compromised machines and hardware wallets - [07:42:00] Methods for transferring signed transactions - [07:48:25] Threat scenarios and hardware wallet security - [07:50:47] Hardware wallet usage and personal comfort - [07:56:40] Coldcard wallets and user experience - [08:02:23] Security issues in the VX project - [08:03:25] Seed generation and hardware randomness - [08:12:05] Mastering Bitcoin and random number generation - [08:17:41]

NorthWoods Church Matters
Ep 224 | 7 Churches of Revelation - The Compromised Church of Thyatira, Part 2

NorthWoods Church Matters

Play Episode Listen Later Feb 24, 2025 21:37


In this episode of NorthWoods Church Matters, Matt, Bobby, and the gang continue our discussion on the church in Thyatira and Christ's stern warning against tolerating false teaching. What does it mean for a church to remain faithful when surrounded by corruption? We explore Jesus' call to repentance, the reality of spiritual warfare, and how sound doctrine serves as a foundation for endurance. The conversation delves into theological triage, the difference between essential and secondary beliefs, and the dangers of unchecked false doctrine in the church. Plus, we tackle how to balance love and truth when confronting error and why protecting sound doctrine is an act of love. Join us as we unpack these crucial lessons for the church today! Here's the article Matt references by Al Mohler!

Communism Exposed:East and West
Chinese Hackers Compromised Organizations in 70 Nations, Warn US Federal Agencies

Communism Exposed:East and West

Play Episode Listen Later Feb 24, 2025 3:59


Voice-Over-Text: Pandemic Quotables
Chinese Hackers Compromised Organizations in 70 Nations, Warn US Federal Agencies

Voice-Over-Text: Pandemic Quotables

Play Episode Listen Later Feb 24, 2025 3:59


Cyber Security Today
Two Vulnerabilities Compromised OpenSSH Safety: Cyber Security Today for February 20, 2025

Cyber Security Today

Play Episode Listen Later Feb 20, 2025 6:55 Transcription Available


Cyber Security Today: OpenSSH Vulnerabilities and Black Stash's Stolen Cards In this episode, host Jim Love discusses two significant OpenSSH vulnerabilities that risk man-in-the-middle and denial-of-service attacks. The hacker group Black Stash has released 4 million stolen credit cards for free, potentially enticing further illegal activities. Palo Alto Networks' firewalls face active attacks, with multiple CVEs allowing privilege escalation and bypassing authentication. Critical updates and secure management practices are emphasized to protect systems. 00:00 Introduction and Headlines 00:21 OpenSSH Vulnerabilities Explained 02:39 BlackStash's Stolen Credit Card Dump 04:40 Palo Alto Networks Under Attack 06:21 Conclusion and Contact Information

Mornings with Carmen
Just because a ministry gets a goverment grant doesn't mean they are compromised - Elizabeth Neumann | Stetson hats and Stetson's Faith - Jennifer Hayden Stokes

Mornings with Carmen

Play Episode Listen Later Feb 17, 2025 48:57


Security analyst Elizabeth Neumann talks about her past working in the Faith-Based and Community Initiative Office, how the Federal Government works through them to help the poor and those in need.  It's not a matter of church-government entanglement.  Jennifer Hayden Stokes, author of "The Pioneer's Way," talks about JB Stetson, the maker of the Stetson hat, and his life of faith that affected others lives.  Faith Radio podcasts are made possible by your support. Give now: Click here  

NorthWoods Church Matters
Ep 223 | 7 Churches of Revelation - The Compromised Church of Thyatira, Part 1

NorthWoods Church Matters

Play Episode Listen Later Feb 17, 2025 26:45


In this episode of the Northwood Church Matters Podcast, we dive into the message to the church in Thyatira from Revelation. Join Pastor Matt, Ivan, Carey, and Pastor Bobby as they explore the tension between growth in love and faithfulness and the dangerous tolerance of sin. What does it mean when Jesus, with eyes like fire and feet like bronze, confronts a church for tolerating Jezebel? How does our silence in the face of sin actually endorse it? Are there times where we should be silent? Plus, we unpack the historical context of Thyatira, the influence of idolatry, and the modern parallels we see in our churches today.

Coffee, the Bible, and Paige
7. Revelation 2:12-17: "To Pergamum - the Compromised Church"

Coffee, the Bible, and Paige

Play Episode Listen Later Feb 17, 2025 29:26


Pergamum allowed the Nicolaitans in.. who were these Nicolaitans? Why was that a bad thing?

The Salcedo Storm Podcast
S10, Ep. 34: Government Abuse Of Our People MUST End

The Salcedo Storm Podcast

Play Episode Listen Later Feb 13, 2025 23:51


On this Salcedo Storm Podcast:Chris Hinkle, is a former FBI Supervisory Special Agent who served as a federal agent for 25 years.  He led the FBI's Civil Rights Program in Mississippi. ANDJohn Gentry is a former CIA analyst. He's now a professor of Intelligence studies at the School of defense and strategic studies at Missouri state university. He's the author of the book, Diversity Dysfunction, The DEI Threat to national security intelligence.”

Trey's Table
Trey's Table Episode 243: Eric Adams is Compromised

Trey's Table

Play Episode Listen Later Feb 13, 2025 24:56


Is Eric Adams being held hostage?

The John Batchelor Show
"PREVIEW: Conversation with Professor Sean McMeekin about evidence that Stalin compromised Operation Market Garden to slow the Allied advance on Berlin. More later."

The John Batchelor Show

Play Episode Listen Later Feb 8, 2025 2:51


"PREVIEW: Conversation with Professor Sean McMeekin about evidence that Stalin compromised Operation Market Garden to slow the Allied advance on Berlin. More later." 1944 MARKET GARDEN

Risque Business News
DEI to MEI and a Compromised Treasury

Risque Business News

Play Episode Listen Later Feb 6, 2025 46:58


Welp! The gals are finally discussing the orange elephant in the Oval Office. Mae covers Trumps rollback on DEI department hires and his switch to MEI. He's also hoping to give trans military employees the boot so to speak. We talk about the trans military members that meet his MEI metrics and are fighting back. Laura gives a run down of how everyone's favorite oligarch and n*z* (allegedly!) Elon Musk is skirting government clearance to manage (steal from) the US Treasury with a group of 19 year old incels. So that's fun! And to round it out we discuss a woman in Pakistan who was stood up and is now demanding over 100k from the government. Imagine ghosting so hard they go after the president? It's a free for all!  Follow us  @RisqueBusinessNews  @mae_planert @laurasogar

Your Bestitician
How Do I Know if I Have a Compromised Skin Barrier?

Your Bestitician

Play Episode Listen Later Feb 6, 2025 17:01


Today, we're diving into a topic that's overlooked but so crucial: how to know if you have a compromised skin barrier. We'll also discuss how to restore your barrier using insights from the legendary Dr. Zein Obagi and his innovative ZO Skin Health products. By the end of this episode, you'll know exactly how to spot a compromised barrier, why it happens, and how to bring your skin back to optimal health. 

Conversations That Matter
Yes, Our Daily Bread is Compromised

Conversations That Matter

Play Episode Listen Later Feb 4, 2025 79:43


Matt Lucas, the president of Our Daily Bread, maintains that the organization has not shifted its doctrinal convictions, yet lists celebrating diversity as a historic, biblical Christian teaching alongside salvation in Christ alone and the infallibility of Scripture. I don't think anyone working for Our Daily Bread in 1938 would have said this. The fact is, Our Daily Bread has been trafficking in social justice teachings in the MeToo and BLM vein for a few years. Jon reviews some of these teachings so that Our Daily Bread readers can be informed and make up their own minds.To Support the Podcast: https://www.worldviewconversation.com/support/Become a Patronhttps://www.patreon.com/jonharrispodcastFollow Jon on Twitter: https://twitter.com/jonharris1989Follow Jon on Facebook: https://www.facebook.com/jonharris1989/Support this podcast at — https://redcircle.com/conversations-that-matter8971/donationsAdvertising Inquiries: https://redcircle.com/brandsPrivacy & Opt-Out: https://redcircle.com/privacy

I Hate This Team
JT Miller has been compromised to a permanent end

I Hate This Team

Play Episode Listen Later Feb 1, 2025 37:17


We did a y'all. Manifesting works. On this truncated emergency episode we react to JT Miller getting traded to the New York Rangers. If you'd like to, support the show and receive weekly bonus episodes head on over to https://patreon.com/IHateThisTeam Presented by DraftKings - Use Promo Code THPN at sign up at https://www.draftkings.com/ for exclusive offers!

John Fredericks Radio Network
Episode #1780 UNRWA Is Irredeemably Compromised

John Fredericks Radio Network

Play Episode Listen Later Jan 27, 2025 41:14


1/27/2025 PODCAST Episodes #1778 - #1780 GUESTS: Neil McCabe, Dr. Kelly Victory, Sen. Doug Mastriano, Sen. Mike Oliverio, Rabbi Yaakov Menken + YOUR CALLS! at 1-888-480-JOHN (5646) and GETTR Live! @jfradioshow #GodzillaOfTruth #TruckingTheTruth   Want more of today's show? Episode #1778 Most MAGA cabinet picks in U.S. History; Mr. Ellison Needs To Go Back To The Drawing Board Episode #1779 Sen. Mastriano Still Haven't Ruled Out A Run For The Governorship! Episode #1780 UNRWA Is Irredeemably Compromised   https://johnfredericksradio.libsyn.com/

The Mainly Eminem Podcast
Eminem's Vault Compromised

The Mainly Eminem Podcast

Play Episode Listen Later Jan 27, 2025 52:49


Join us as we discuss the leaks and how they came about, What next for Em and his team and will he take home any Grammys at next months show?

2 Beers Podcast
Episode 220: Drew's Compromised Immune System - Boxing, NFL, NHL, Severance, Star Wars, Shameless

2 Beers Podcast

Play Episode Listen Later Jan 25, 2025 87:23


Beer 1: Boxing - Inoue Victory - destroys Kim in Japan; Ryan Garcia / Devin Haney Update NFL - Conference Championship Picks NHL - Mikko Rantanen trade announced - Canes pushing the chips again Beer 2: Severance - brief discussion on S2E2 Bad Batch - Why anyone should watch Clone Wars and Bad Batch Shameless - Drew has been watching in the background

Cybercrime Magazine Podcast
Cyber Strong. Compromised Credentials & Active Directories. Jeff Morrison, Pentera.

Cybercrime Magazine Podcast

Play Episode Listen Later Jan 23, 2025 15:27


Jeff Morrison is the Field Engineering Team Lead at Pentera. In this episode, he joins host Heather Engel to discuss compromised credentials and active directories, including the biggest challenges organizations face in this space, poor credential hygiene, how enterprises can address credential-based threats, and more. Cyber Strong is a Cybercrime Magazine podcast series brought to you by Pentera, the leader in automated security validation. Learn more about our sponsor at https://pentera.io.

Joe DeCamara & Jon Ritchie
Are the Eagles compromised by Hurts' knee injury?

Joe DeCamara & Jon Ritchie

Play Episode Listen Later Jan 22, 2025 12:06


Joe DeCamara believes the Eagles will beat the Commanders but is concerned that Jalen Hurts limited in what he can do. The Morning team deabtes how worried you should be with hurts' health. Nick Sirianni seemed confident Jalen will play Sunday but will he be effected by injury.

The Hartmann Report
Is the GOP Already Compromised?

The Hartmann Report

Play Episode Listen Later Jan 17, 2025 57:59


House Republicans have cheated the usual rules to take Mike Turner off his committee to punish him for supporting Ukraine. Will Trump and the GOP stand up to Putin, or is this a sign they are they under his control? Phil Ittner joins Thom live from Ukraine.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

The Valenti Show
Valenti on Brady Calling Lions Game on Saturday: He Is "Fully Compromised"

The Valenti Show

Play Episode Listen Later Jan 16, 2025 13:38


Valenti criticizes Tom Brady for the compromising position he's in calling the Lions game this Saturday while also pursuing Ben Johnson as Raiders head coach.

Packet Pushers - Full Podcast Feed
PP045: Reducing the Risk of Compromised Digital Certificates with CAA and Certificate Transparency

Packet Pushers - Full Podcast Feed

Play Episode Listen Later Jan 14, 2025 31:28


Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today’s Packet Protector we look at mechanisms that domain owners can take to ensure the validity of their digital certificates. More specifically, we cover Certification Authority Authorization (CAA) and Certificate Transparency (CT). Our guest is Ed Harmoush. Ed is a... Read more »

Packet Pushers - Fat Pipe
PP045: Reducing the Risk of Compromised Digital Certificates with CAA and Certificate Transparency

Packet Pushers - Fat Pipe

Play Episode Listen Later Jan 14, 2025 31:28


Transport Layer Security (TLS) relies on certificates to authenticate Web sites and enable encryption. On today’s Packet Protector we look at mechanisms that domain owners can take to ensure the validity of their digital certificates. More specifically, we cover Certification Authority Authorization (CAA) and Certificate Transparency (CT). Our guest is Ed Harmoush. Ed is a... Read more »

Data Driven
Niv Braun on AI Security Measures and Emerging Threats

Data Driven

Play Episode Listen Later Jan 14, 2025 53:11 Transcription Available


In today's episode, we're thrilled to have Niv Braun, co-founder and CEO of Noma Security, join us as we tackle some pressing issues in AI security.With the rapid adoption of generative AI technologies, the landscape of data security is evolving at breakneck speed. We'll explore the increasing need to secure systems that handle sensitive AI data and pipelines, the rise of AI security careers, and the looming threats of adversarial attacks, model "hallucinations," and more. Niv will share his insights on how companies like Noma Security are working tirelessly to mitigate these risks without hindering innovation.We'll also dive into real-world incidents, such as compromised open-source models and the infamous PyTorch breach, to illustrate the critical need for improved security measures. From the importance of continuous monitoring to the development of safer formats and the adoption of a zero trust approach, this episode is packed with valuable advice for organizations navigating the complex world of AI security.So, whether you're a data scientist, AI engineer, or simply an enthusiast eager to learn more about the intersection of AI and security, this episode promises to offer a wealth of information and practical tips to help you stay ahead in this rapidly changing field. Tune in and join the conversation as we uncover the state of AI security and what it means for the future of technology.Quotable Moments00:00 Security spotlight shifts to data and AI.03:36 Protect against misconfigurations, adversarial attacks, new risks.09:17 Compromised model with undetectable data leaks.12:07 Manual parsing needed for valid, malicious code detection.15:44 Concerns over Agiface models may affect jobs.20:00 Combines self-developed and third-party AI models.20:55 Ensure models don't use sensitive or unauthorized data.25:55 Zero Trust: mindset, philosophy, implementation, security framework.30:51 LLM attacks will have significantly higher impact.34:23 Need better security awareness, exposed secrets risk.35:50 Be organized with visibility and governance.39:51 Red teaming for AI security and safety.44:33 Gen AI primarily used by consumers, not businesses.47:57 Providing model guardrails and runtime protection services.50:53 Ensure flexible, configurable architecture for varied needs.52:35 AI, security, innovation discussed by Niamh Braun.

Jay's Analysis
Vatican Compromised! Jerusalem Vs. Athens - Jay Dyer & FrDcn Ananias Sorem (Half)

Jay's Analysis

Play Episode Listen Later Dec 28, 2024 95:17


Fr.Dcn. Ananias Sorem returns to cover the relationship between Jerusalem and Athens – revelation and reason. Firstly, they are and aren't in tension – and we'll see how. Secondly, terms and words are not synonymous – there may be overlap at times, but the meanings of the words are unique in Orthodox theology. Second, we want to look at the Amazon synod, the relationship to Vatican II and perennialism and true and false ecumenism. Send Superchats at any time here: https://streamlabs.com/jaydyer/tip Get started with Bitcoin here: https://www.swanbitcoin.com/jaydyer/ The New Philosophy Course is here: https://marketplace.autonomyagora.com/philosophy101 Set up recurring Choq subscription with the discount code JAY44LIFE for 44% off now https://choq.com Lore coffee is here: https://www.patristicfaith.com/coffee/ Orders for the Red Book are here: https://jaysanalysis.com/product/the-red-book-essays-on-theology-philosophy-new-jay-dyer-book/ Subscribe to my site here: https://jaysanalysis.com/membership-account/membership-levels/ Follow me on R0kfin here: https://rokfin.com/jaydyernism, evangelicalism, Arianism, cults, Hebrew roots, JWs, etc. Subscribe to my site here: https://jaysanalysis.com/membership-account/membership-levels/ Follow me on R0kfin here: https://rokfin.com/jaydyerBecome a supporter of this podcast: https://www.spreaker.com/podcast/jay-sanalysis--1423846/support.

Johnjay & Rich On Demand
Someone's Security is Compromised....

Johnjay & Rich On Demand

Play Episode Listen Later Dec 26, 2024 54:30


↓ LISTEN LIVE ↓https://www.iheart.com/live/1047-kiss-fm-61/?cmp=ios_share&sc=ios_social_share&pr=false&fbclid=PAAaZsB7idB4FkjlOpphNLT8ah2smVpndvDIg32LS45Ar81jOYEC8CrSi3XCg