Podcasts about Cyberwarfare

Use of technological force within cyberspace

  • 604PODCASTS
  • 1,189EPISODES
  • 39mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 7, 2025LATEST
Cyberwarfare

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about Cyberwarfare

Show all podcasts related to cyberwarfare

Latest podcast episodes about Cyberwarfare

Easy Prey
Cyber Warfare

Easy Prey

Play Episode Listen Later May 7, 2025 37:25


Cyber warfare is no longer something that happens behind closed doors or in some far-off digital corner. It's happening now—and reshaping the rules of conflict in real time. Drone strikes controlled by apps, ransomware attacks on hospitals—today's battleground is just as likely to be online as on the ground. That science fiction scenario is now a critical, constant threat-the kind that affects us all globally. I'm really excited to introduce you to Dr. Chase Cunningham. He's a retired Navy chief cryptologist with a wealth of experience in cyber operations for the NSA, CIA, FBI—and more. He's the one who pioneered zero-trust security strategies and advises top decision-makers in government and private industry. That gives him a front-row seat to how digital warfare is evolving—and what that means for all of us. He's also the author of Cyber Warfare and the gAbriel Series, where his real-world expertise comes to life in stories that are chillingly plausible. We talk about how cyber conflict is already playing out in Ukraine, how different threat actors operate—and why critical infrastructure is such a tempting target. Chase shares practical advice on what individuals and small businesses can do to better protect themselves. We also look at what governments are doing to defend against these growing threats. That conversation is eye-opening-and urgent. You won't want to miss it. Show Notes: [01:21] Chase is a retired Navy Chief and a cryptologist. He also worked at the NSA. He also put Zero Trust in the formal practice at Forrester research. [03:24] We learn how Chase got involved with computer work and cryptology. [05:29] We're seeing cyber war play out in real time with Russia and Ukraine. [07:13] We talk about the future of war and drones. [08:31] Cyber warfare is just the natural evolution of conflict in the digital space. It's the bridge between espionage and kinetic activity. [09:40] Chase talks about the different actors in the cyber warfare space and their primary targets. [12:05] Critical infrastructure includes oil and gas, piping, water systems, healthcare, and even schools. [14:12] Some of the unique issues with dealing with the attacks from cyber criminals. [19:20] How the CCP plays 3D chess. [22:26] Reducing risk and protecting ourselves includes following best practices.  [25:10] What the government is doing to try to mitigate cyber risk. [27:23] Chasing money and finding cyber crime. [32:04] A lot of valuable assets are being developed in the context of war. [35:06] Chase talks about some of the things he covers in his book.  Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.  Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Chase Cunningham - Dr. Zero Trust Dr. Chase Cunningham - LinkedIn Cyber Warfare – Truth, Tactics, and Strategies gAbrIel: A Novel in the gAbrIel Series Unrestricted Warfare: China's Master Plan to Destroy America

Dark Rhino Security Podcast
S17 E0 (VIDEO) Tracking Cyber Criminals

Dark Rhino Security Podcast

Play Episode Listen Later Apr 17, 2025 46:34


Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfare, has aided law enforcement and been featured by CBS 60 Minutes, The New York Times, and Wired. A frequent speaker at RSA, he has twice received the SANS Difference Makers Award for his groundbreaking work.00:00 Introduction02:34 You don't need an expensive university11:00 In order to be successful in cyber, you need to…17:38 What are the bad guys doing?23:13 What does the government do to help?26:24 Consequences for bad actors41:35 The Art of Cyber Warfare44:05 Jon's new book--------------------------------------------------------------To learn more about Jon visit https://www.linkedin.com/in/jondimaggio/https://www.amazon.com/Art-Cyberwarfare-Investigators-Ransomware-Cybercrime-ebook/dp/B09BKLRH8P?ref_=ast_author_dpTo learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com

WWL First News with Tommy Tucker
Is cyber warfare going on between the US and other countries all the time?

WWL First News with Tommy Tucker

Play Episode Listen Later Apr 17, 2025 24:27


China has accused America of launching cyber attacks. How often does that go on? What kind of offensive and defensive cyber attacks are going on that the average person has no idea about? Tommy talks with Gary Corn, Director of the Technology, Law & Security Program and an adjunct professor of cyber and national security law and the law of armed conflict at American University

Dark Rhino Security Podcast
S17 E0 Tracking Cyber Criminals

Dark Rhino Security Podcast

Play Episode Listen Later Apr 16, 2025 46:34


Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfare, has aided law enforcement and been featured by CBS 60 Minutes, The New York Times, and Wired. A frequent speaker at RSA, he has twice received the SANS Difference Makers Award for his groundbreaking work.00:00 Introduction02:34 You don't need an expensive university11:00 In order to be successful in cyber, you need to…17:38 What are the bad guys doing?23:13 What does the government do to help?26:24 Consequences for bad actors41:35 The Art of Cyber Warfare44:05 Jon's new book

Talking Cloud with an emphasis on Cloud Security
74-Talking Cloud Podcast-with Steve Winterfeld, Advisory & Fractional CISO, Cyber Vigilance Advice (CVA) LLC

Talking Cloud with an emphasis on Cloud Security

Play Episode Listen Later Apr 14, 2025 46:29


Episode #74 features a great discussion with Steve Winterfeld, Advisor, and Fractional CISO with Cyber Vigilance Advice (CVA) LLC. Steve is passionate about cybersecurity. He served as CISO for Nordstrom Bank, Director of Cybersecurity for Nordstrom, and Director of Incident Response and Threat Intelligence at Charles Schwab. Steve also published a book on Cyber Warfare and holds CISSP, ITIL, and PMP certifications. We discussed a variety of topics, and during our conversation, Steve offered these resources: On finding job: Lessons Learned on Finding a Cybersecurity Job After a Layoff - Security Boulevard On starting / managing a career: Creating a Roadmap for Your Dream Cybersecurity Career - Security Boulevard 

Conspiracy Files : Conspiracy Theories
The Stuxnet Virus: The First Digital Weapon of World War 3?

Conspiracy Files : Conspiracy Theories

Play Episode Listen Later Apr 2, 2025 34:57


Episode Link: https://open.spotify.com/show/3f8YJAs522S0319YvAYT8TIt didn't drop from the sky—it crept through code. In this jaw-dropping episode of Conspiracy Files, we explore the secret origins of Stuxnet, a sophisticated computer worm so advanced, many believe it was the first true cyberweapon ever unleashed. Who created it? What was the real target? And has it already opened the floodgates to digital warfare we can't see coming?This isn't just about hacking—this is about weaponized technology, covert operations, and a new kind of war the public was never meant to know about.Connect with The Conspiracy Files Podcast:

Uncommon Sense with Ginny Robinson
Answering Your Questions – My Stalker, RFK Jr.'s Scandal, & Leaked Government Texts

Uncommon Sense with Ginny Robinson

Play Episode Listen Later Mar 30, 2025 44:01


Today, we're going over your questions. You guys had some follow-ups about my stalker, Timothy C., and I'll be giving you a few more details on that situation. We're also unpacking the RFK Jr. sex scandal—what's real, what's spin, and what it all means. Plus, the government's leaked text messages have been making waves, and I'll be breaking down what they reveal and why you should (and shouldn't) care.—https://policecoffee.com/?gad_source=1&gbraid=0AAAAACG7qmI1dmMkruwgp8vA8w0oECKla&gclid=Cj0KCQjwtJ6_BhDWARIsAGanmKfdkRQ1M1sighZQ-PGpEpsCjrZ8fCigidnvH55bfBUNMa56-yoy_A8aAv34EALw_wcB—https://open.spotify.com/episode/7CcmZWvQEaLTQAQRAFy2BQ?si=FgeO4b9QSi-5eB2cqX2XHw

government fbi conspiracies accountability behind the scenes scandals controversy cia fake news conspiracy theories breaking news propaganda hacking censorship free speech misinformation law enforcement surveillance whistleblowers stalker leaked texts nsa national security stalking robert f kennedy jr breaking barriers deep state dark web answering your questions espionage mainstream media secret societies crisis management blackmail court cases power struggles data breach legal system civil liberties social engineering media bias legal battle hidden truth investigative journalism hidden agendas truth seekers cyber threats sex scandals election interference deep web crisis communications crime and punishment data mining cyberwarfare ethical dilemmas intelligence community reputation management restraining orders public perception press freedom surveillance state privacy concerns public trust investigative reporting security breach surveillance capitalism doxxing crisis response internet safety personal safety government overreach public discourse false narratives legal implications information warfare digital privacy digital forensics shadow government government corruption news coverage alternative media political strategy security challenges cyberstalking digital rights intelligence agencies government accountability online harassment public awareness legal defense wiretapping personal protection online bullying media narratives citizen journalism government transparency classified information government oversight phone hacking state secrets political games media control media circus media spin public scrutiny secret recordings government ethics inside politics narrative control mass deception online activism victim advocacy opposition research whistleblower protection journalism ethics online journalism secret agendas watchdog journalism
Uncommon Sense with Ginny Robinson
Exposing Government Corruption with Teddy Pierce, Author of Dethrone Davos: Save America

Uncommon Sense with Ginny Robinson

Play Episode Listen Later Mar 12, 2025 20:16


Today I'm joined by Teddy Pierce, author of Dethrone Davos: Save America, to discuss the shocking waste, fraud, and abuse that the Department of Government Efficiency (DOGE) has been uncovering. From reckless spending to blatant money laundering, we're breaking down how our government has been misusing our hard-earned tax dollars—and why this corruption must be stopped. Transparency and accountability aren't just buzzwords; they're essential for restoring actual integrity to our system. Tune in as we expose what's really going on behind the scenes and why this fight matters for all of us.—Buy Teddy's book, Dethrone Davos: https://www.amazon.com/Dethrone-Davos-America-Theodore-Pierce-ebook/dp/B0D5NKGGNC—https://www.thebrandsunday.com/collections/all

cancel culture transparency exposing censorship freedom of speech financial freedom world economic forum davos doge new world order deep state great reset financial independence american politics america first secret societies great awakening rothschild gold standard christian nationalism wef self reliance election fraud decentralization puppet master money laundering tax reform homesteading self sufficiency civil liberties save america false flags media bias election integrity hidden power national debt klaus schwab constitutional rights investigative journalism hidden agendas truth seekers federalism cfr dark money breaking the chains government spending cyberwarfare economic collapse economic justice decentralized finance financial crimes investigative reporting biblical justice dethrone independent media ruling class fraud prevention one world government intentional communities special interests corporate greed tax fraud economic inequality shadow government government corruption political corruption alternative media financial responsibility american independence tax havens sound money class warfare government accountability crony capitalism economic warfare fiscal responsibility bilderberg group government waste taxpayer money trilateral commission foreign influence money in politics conservative politics wealth preservation government surveillance controlled opposition woke capitalism government transparency ballot harvesting globalist agenda government oversight liberty movement american patriotism justice warriors political persecution moral leadership small government financial accountability rebuilding america economic resilience shadow banking alternative finance fraud investigation political accountability balanced budget wealth redistribution american decline free speech movement moral economy free market capitalism alternative news parallel economy underground economy government ethics narrative control civil resistance esg scores black budget american restoration davos agenda honest money economic liberty regenerative economy populist movement fair taxation
Hacker Valley Studio
Cyber Warfare, Digital Deception, and the Hidden Threats We Ignore with Dr. Eric Cole

Hacker Valley Studio

Play Episode Listen Later Mar 8, 2025 41:45


We're already in World War III—just not the kind you're thinking of. Cyber warfare is here, and the battlefield is your inbox, your bank account, and your digital identity. So why are we still acting like it's peacetime? Dr. Eric Cole, cybersecurity pioneer and former CIA hacker, joins the show to drop hard truths about the state of cyber warfare, AI's role in our digital future, and why most people are sleepwalking through a war they don't even realize they're in. From the rise of deepfakes to North Korea's billion-dollar hacking economy, this episode is one you can't afford to ignore.   Impactful Moments: 00:00 - Introduction 02:00 - Dr. Eric Cole's journey from the CIA to cybersecurity leadership 07:20 - The fundamentals of hacking and why they still matter 11:00 - AI is only as smart as the data we give it 17:00 - The rise of deepfakes and digital deception 19:45 - Cyber warfare: How North Korea funds its economy through hacking 23:50 - The problem with America's peacetime mentality 30:00 - Should we be worried about AI replacing humans? 36:10 - The key to success: mastering people skills, not just tech skills 40:30 - Final thoughts and where to follow Dr. Eric Cole   Connect with Dr. Eric Cole on LinkedIn: https://www.linkedin.com/in/ericcole1/ Check out Dr. Eric Cole's books –  Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World: https://www.amazon.com/Cyber-Crisis-Protecting-Business-Threats/dp/B093X3YNPT Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet: https://www.amazon.com/Online-Danger-Protect-Yourself-Internet-ebook/dp/B078WK39TT Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

ITSPmagazine | Technology. Cybersecurity. Society
Cyber Wars: How Elite Teams Stay Ahead of the Game | A Conversation with Gary Hayslip | The Soulful CXO Podcast with Dr. Rebecca Wynn

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 4, 2025 15:37


Guest: Gary Hayslip, CISO, SoftBank Investment AdvisorsLinkedIn: https://www.linkedin.com/in/ghayslip/Website: cisodrg.com/biographies/gary-hayslip/Host: Dr. Rebecca WynnOn ITSPmagazine  

Snapshots
#109 - Revolutionary War Mystery Meets Modern Cyber Warfare

Snapshots

Play Episode Listen Later Feb 25, 2025 19:08


A mysterious Revolutionary War coin, modern cyber terrorism, and a shadowy organization known as the Liberty Unit converge in this groundbreaking techno-thriller that bridges America's past and present. Join Books and Looks for an in-depth review of "Going Dark" by George K. Mehok, a stunning debut novel that weaves together historical intrigue and contemporary cyber warfare. When NSA analyst Paul Knox inherits a mysterious coin from the Revolutionary War, he becomes entangled in a centuries-old fight to protect America from those who would destroy it from within. Written by a former cybersecurity expert, this thriller exposes the frightening possibilities of modern cyber warfare while connecting it to a fascinating piece of Revolutionary War history. Discover how a forgotten historical figure named Jack Jouett and a modern-day NSA analyst might hold the key to America's survival.S ubscribe to Books and Looks for weekly deep dives into the best new releases in history, mystery, fiction, and nonfiction. Links: "Going Dark" Book: https://amzn.to/4khszqe George K. Mehok Website: https://www.georgemehok.com/ Watch on YouTube: https://youtu.be/B97GnLZ_o38 _ Produced by Podcast Studio X.

Govcon Giants Podcast
Shields UP! The Cyber Warfare Fallout That Could Hit YOU Next!

Govcon Giants Podcast

Play Episode Listen Later Feb 23, 2025 9:57


In this episode we discuss the alarming potential of cyber warfare and its unintended consequences with the Former DoD Cyber Crime Director Jeff Stutzman. Jeff highlighted the vulnerability of surveillance systems and physical security protection due to outdated firmware and neglectful maintenance, emphasizing the critical need for constant vigilance in safeguarding critical infrastructure. Jeff urges listeners, particularly small defense contractors and businesses, to prioritize robust cybersecurity measures, including firewalls, antivirus software, two-factor authentication, and email protection, to mitigate risks in the face of a rapidly evolving cyber threat landscape. Listen now to learn more!

Defence Connect Podcast
CONTESTED GROUND: The expanding world of state-sponsored cyber warfare

Defence Connect Podcast

Play Episode Listen Later Feb 21, 2025 38:51


In this episode of the Contested Ground podcast, host Liam Garman welcomes Cyber Daily's David Hollingworth, a cyber security expert and Cyber Uncut podcast host, to unpack the latest in hacking and cyber security in the new era of grey-zone warfare and nation-state cyber attacks. They begin the podcast examining real world examples of warfare-motivated hacking, threat actors for hire, the impact of cyber threats and incidents for nations around the world. They then discuss the differences between "smash-and-grab" ransomware attacks with persistent and embedded state-sponsored cyber attacks. The podcast wraps up examining the increasing speed, accuracy and impact of cyber attacks on industry and government infrastructure across international lines. Enjoy the podcast, The Contested Ground team

Cyber Security Uncut
CONTESTED GROUND: The expanding world of state-sponsored cyber warfare

Cyber Security Uncut

Play Episode Listen Later Feb 20, 2025 38:51


In this episode of the Contested Ground podcast, host Liam Garman welcomes Cyber Daily's David Hollingworth, a cyber security expert and Cyber Uncut podcast host, to unpack the latest in hacking and cyber security in the new era of grey-zone warfare and nation-state cyber attacks. They begin the podcast examining real world examples of warfare-motivated hacking, threat actors for hire, the impact of cyber threats and incidents for nations around the world. They then discuss the differences between "smash-and-grab" ransomware attacks with persistent and embedded state-sponsored cyber attacks. The podcast wraps up examining the increasing speed, accuracy and impact of cyber attacks on industry and government infrastructure across international lines. Enjoy the podcast, The Contested Ground team

Security Unfiltered
Understanding Cyber Warfare and Emerging Security Trends With Jeremy Kirk From Intel 471

Security Unfiltered

Play Episode Listen Later Feb 18, 2025 50:39 Transcription Available


Send us a textWe dive into the complex world of cybersecurity through the eyes of Jeremy from Intel 471, exploring his journey from journalism to cyber threat intelligence. The discussion encompasses the evolution of cybercrime, the significance of ransomware, and future trends impacting cybersecurity.• Transition from journalism to cyber intelligence • Engaging with threat actors in cyber forums • Overview of Intel 471 and its mission • Ransomware trends and their implications • The intersection of nation-state actors and cybercrime • Impact of law enforcement collaboration on cyber investigations • Predictions for cybersecurity trends in 2025 • Importance of securing exposed attack surfaces • Call to action for increased cyber resilienceSupport the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today

The I.T. Career Podcast
89: The Cyber Warfare Secrets Every Cybersecurity Pro Should Know

The I.T. Career Podcast

Play Episode Listen Later Feb 17, 2025 68:14


3 Takeaways
The CIA's Secrets: Spy Missions, Cyber Wars & Covert Operations (#235)

3 Takeaways

Play Episode Listen Later Feb 4, 2025 23:18


The CIA may not be thrilled with this conversation. Here, Pulitzer Prize-winning author and highly regarded CIA expert Tim Weiner reveals stunning details about the agency's  espionage and covert activities. Learn about the CIA's greatest successes and failures, its best weapon, how China and Russia are spying on the U.S., and much more.

Shawn Ryan Show
#164 Mike Grover - How Hacking Tools Are Changing Cyber Warfare

Shawn Ryan Show

Play Episode Listen Later Jan 29, 2025 155:07


Mike Grover is a security researcher, InfoSec expert, and the creator of the infamous O.MG Cable. He gained prominence in 2019 when he showcased his malicious USB cable prototype at DEF CON, capable of recording keystrokes and executing remote commands. Grover's O.MG Cable looks identical to a regular charging cable, but contains a tiny implant that creates a Wi-Fi hotspot, allowing attackers to access the connected device from up to 300 feet away. Since its inception, Grover has refined the O.MG Cable design, making it indistinguishable from normal USB cables and expanding its capabilities. The latest iteration includes features such as geofencing, self-destruct mechanisms, and support for various connector types including Lightning and USB-C. Grover's work aims to raise awareness about hardware security risks while providing tools for red teams and security researchers to test and improve organizational defenses. Shawn Ryan Show Sponsors: https://ROKA.com | Use Code SRS https://ExpressVPN.com/SRS https://ZipRecruiter.com/SRS https://RocketMoney.com/SRS https://prizepicks.onelink.me/LME0/SRS https://ShawnLikesGold.com | 855-936-GOLD #goldcopartner https://americanfinancing.net/srs NMLS 182334, nmlsconsumeraccess.org. Call 866-781-8900 for details about credit costs and terms. Mike Grover Links: Website - https://o.mg.lol/ X - https://x.com/_MG_ LinkedIn - linkedin.com/in/mgrover Please leave us a review on Apple & Spotify Podcasts. Vigilance Elite/Shawn Ryan Links: Website | Patreon | TikTok | Instagram | Download Learn more about your ad choices. Visit podcastchoices.com/adchoices

Cyber Crime Junkies
Ransomware Gang TAKE DOWN: Secrets from the Dark Web.

Cyber Crime Junkies

Play Episode Listen Later Jan 28, 2025 51:55 Transcription Available


Expert Security Researcher, Jon DiMaggio, former National Security Agency (NSA) analyst, takes us under cover on the Dark Web, providing us insight in plain terms on: ransomware explained for small business and ransomware risks for small business, how cyber attacks stay undetected, how intelligence gathering is critical to security, secrets of cyber crime gangs, how stolen data is sold by cyber criminals, andunderstanding the hacker mind.Don't miss Jon's book, The Art of Cyber Warfare: https://a.co/d/a2r7C5G Send us a textGrow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446

Thought For Today
Weapons of Warfare

Thought For Today

Play Episode Listen Later Jan 24, 2025 3:20


I greet you in Jesus' precious name! It is Friday morning, the 24th of January, 2025, and this is your friend, Angus Buchan, with a thought for today. We go straight to 2 Corinthians 10:4 (Amplified Version): “The weapons of our warfare are not physical [weapons of flesh and blood]. Our weapons are divinely powerful for the destruction of fortresses.” Folks, we need to understand something. We are in a war. We are in a full-scale war and it's not a physical war. It's a war raging in the mind, and we need to use the weapons God has given us to combat this war. “What weapons?” You say. I am talking about prayer, the power of prayer. We've got to pray more and speak less. The Bible - that is our weapon. It's the sword of the Spirit. The word of God says we've got to use it. We've got to watch what we read, what we watch on TV and especially social media. This very message you are listening to now is coming to you on social media, and thank you very much for praying for me and for listening and watching it, because there is so much rubbish that can be watched even by a small child, ten, fourteen years old - things like pornography which is poisoning people, causing people to be depressed, and causing people to stress and to even contemplate suicide.Now I want to read something to you that I've heard from a lady named Cindy McGarvie. She is an Australian lady, and I want you to listen to the power of social media. Iran attacked America and they were expecting the Americans to retaliate with bombs and guns. Listen to this. “The US could have ordered air strikes on Iran's military bases where the missiles were launched, but instead they used both soundless and formless computer technology to achieve a similar end. This is called Cyber Warfare. Cyber Warfare is the use of computer technology to destruct activities of a state or organisation.” They didn't even send a missile or anything. They destructed the whole thing by social media.We need to be careful what we allow our children to watch and what we are watching and we need to use it for the benefit of the Kingdom of God. Remember the Bible tells us in 1 John 4:4: “…greater is He that is within us than he that is in the world.” And that is the whole purpose of thought for today, to bring to your attention, every morning, the importance of God's Holy Word which He has given us to stand against the lies of the devil.Jesus bless you and have a wonderful day. Goodbye.

Discover Daily by Perplexity
The RedNote App's Boom in the US, FBI Hacked Computers to Uninstall Malware, and Gaia Sky Scan Completed

Discover Daily by Perplexity

Play Episode Listen Later Jan 18, 2025 6:00 Transcription Available


We're experimenting and would love to hear from you!In this episode of Discover Daily, we explore how RedNote, a Chinese social media platform, has become the unexpected refuge for TikTok users ahead of the January 19th ban, with over 700,000 new American users joining in just two days.Next, we delve into a groundbreaking cybersecurity operation where the FBI, in partnership with French authorities and Sekoia.io, successfully removed dangerous PlugX malware from 4,258 U.S. computers. This sophisticated operation, conducted between August 2024 and January 2025, showcases how law enforcement turned the malware's own self-delete mechanism against itself to protect American digital infrastructure from Chinese state-sponsored hackers.Finally, we celebrate a historic moment in astronomy as the European Space Agency's Gaia telescope concludes its revolutionary sky-scanning mission after 11 years. Having collected over three trillion observations of two billion celestial objects, Gaia's legacy will continue through two major data releases planned for 2026 and beyond, promising to reshape our understanding of the Milky Way galaxy.From Perplexity's Discover Feed:https://www.perplexity.ai/page/the-rednote-apps-boom-in-the-u-1NnpJxlbSEGE_F6HqwBpdwhttps://www.perplexity.ai/page/fbi-hacked-computers-to-uninst-54mfC_E0SUS.e2kNPl191whttps://www.perplexity.ai/page/gaia-sky-scan-completed-gS0fkLxDRyCfaZsPGKrF0wPerplexity is the fastest and most powerful way to search the web. Perplexity crawls the web and curates the most relevant and up-to-date sources (from academic papers to Reddit threads) to create the perfect response to any question or topic you're interested in. Take the world's knowledge with you anywhere. Available on iOS and Android Join our growing Discord community for the latest updates and exclusive content. Follow us on: Instagram Threads X (Twitter) YouTube Linkedin

Decoding Geopolitics with Dominik Presl
#45 Lennart Maschmeyer: How Ukraine Avoided a Cyber-Apocalypse & Why Cyberwarfare Isn't What You Think

Decoding Geopolitics with Dominik Presl

Play Episode Listen Later Jan 6, 2025 42:05


➡️ If you enjoy this podcast and you want to help to make its existence possible, join our community of geopolitics enthusiasts on PATREON: https://www.patreon.com/DecodingGeopolitics Sign up to my upcoming geopolitics newsletter: https://station-zero.beehiiv.com/subscribe Thank you Conducttr for sponsoring the podcast. Take a look at Conducttr's services and its crisis exercise software at: https://www.conducttr.com This is a conversation with Lennart Meschmayer. Lennart is a researcher at the Center for Security Studies (CSS) at ETH Zurich who's focusing on cyber warfare - how states use cyber power against each other both in times of war and peace and what role does cyber play in conflicts today. And that's exactly what this conversation is all about. We talk about what role does cyber play in the war in Ukraine, why we haven't seen a cyber apocalypse that many have predicted before the war started, why cyber warfare works really differently than most people think, why is Israel a hacking superpower or what would a cyber war between Russia and NATO look like. 

Security Conversations
Palo Alto network edge device backdoor, Cyberhaven browser extension hack, 2024 research highlights

Security Conversations

Play Episode Listen Later Dec 27, 2024 113:11


Three Buddy Problem - Episode 26: We discuss the discovery of a Palo Alto network firewall attack and a stealthy network edge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).

Macrodosing: Arian Foster and PFT Commenter
Best of 2024 - Part 1 | Dec 26, 2024

Macrodosing: Arian Foster and PFT Commenter

Play Episode Listen Later Dec 26, 2024 186:07


The Macrodosing crew kicks off the "Best of 2024" with a collection of unforgettable moments from the first half of the year. From wild theories to hilarious tangents and everything in between, Part 1 brings you the highlights that made this year so memorable. Part 2 out tomorrow, enjoy! (00:00:53) Wearing shirts with Arian on them (00:08:08) Naming random athletes (00:19:45) Brace Belden (00:38:49) Chicago office vs. NYC office (00:42:35) Donnie saving a plane (01:07:36) Arian's top 5 white people (01:13:36) Jeff D. Lowe + Don Gorske hater (01:27:48) Jerry vs. Cyber Warfare (01:41:01) Draft Day (01:52:13) OJ Simpson (02:07:28) Big T diss track of Joe Biden (02:15:42) Body building forum thread (02:22:46) Worst day of Big T's life + Arian's first pitch (02:37:34) Nick and Donnie (02:51:12) Big T's elbow injuryYou can find every episode of this show on Apple Podcasts, Spotify or YouTube. Prime Members can listen ad-free on Amazon Music. For more, visit barstool.link/macrodosing

Security Conversations
US government's VPN advice, dropping bombs on ransomware gangs

Security Conversations

Play Episode Listen Later Dec 23, 2024 118:40


Three Buddy Problem - Episode 26: We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International's explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite. Plus, thoughts on the US government's controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad's dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence. Also, a mysterious BeyondTrust 0-day! Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).

Great Power Podcast
China and Supply Chains

Great Power Podcast

Play Episode Listen Later Dec 12, 2024 46:26


In this episode of GREAT POWER PODCAST, host Michael Sobolik speaks with Niklas Swanström about America's supply chain dependencies on Beijing, related threats to national security, and what it would take to build out alternative supply chain networks. Guest biography Dr. Niklas Swanström is the Director of the Institute for Security and Development Policy, and one of its co-founders. He is a Fellow at the Foreign Policy Institute of the Paul H. Nitze School of Advanced International Studies (SAIS) and a Senior Associate Research Fellow at the Italian Institute for International Political Studies (ISPI). His main areas of expertise are conflict prevention, conflict management and regional cooperation; Supply Chain Security, Cyber Warfare and disinformation; Chinese foreign policy and security in Northeast Asia; the Belt and Road Initiative, traditional and non-traditional security threats and its effect on regional and national security as well as negotiations. His focus is mainly on Northeast Asia, Central Asia and Southeast Asia. Resources from the conversation Read Niklas' new book Read Michael's new book Follow Niklas on X Follow Michael on X

1A
ICYMI: Unpacking China And Russia's New Cyber Warfare Strategies

1A

Play Episode Listen Later Dec 10, 2024 11:11


Over the past year, the Chinese government has stepped up its cyber operations, focusing not just on espionage or stealing intellectual property, but on hacking to bolster geopolitical goals.U.S. authorities and institutions are used to digital aggression from the likes of Russia. But are now freshly reconsidering the objectives and capabilities of one of the country's other eastern rivals.We discuss those goals and how China using cyberspace to achieve them. We also discuss the latest from Russia. Want to support 1A? Give to your local public radio station and subscribe to this podcast. Have questions? Connect with us. Listen to 1A sponsor-free by signing up for 1A+ at plus.npr.org/the1a.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy

Tech Tent
Cyber warfare

Tech Tent

Play Episode Listen Later Dec 10, 2024 26:29


We speak to cyber security experts about how cyber warfare works – and how it stays out of the headlines. Then we hear about the aerodynamics tech making athletes more streamlined. And we meet the new Indiana Jones, gaming star Troy Baker.Tell us about the new tech you've tried out in 2024. What gadgets or apps helped you out this year? Send us an email to techlife@bbc.co.uk or Whatsapp us on +44 330 123 0320. Presenter: Chris Vallance Producer: Imran Rahman-Jones Editor: Monica Soriano(Image: A computer-generated, pixelated image of a globe with a neon blue padlock superimposed on top. Credit: Getty Images.)

The Brian Kilmeade Show Free Podcast
China's cyberwarfare, AI and hacking threat

The Brian Kilmeade Show Free Podcast

Play Episode Listen Later Nov 29, 2024 42:51


With Tristan Harris, Aza Raskin and Theresa Payton. Learn more about your ad choices. Visit megaphone.fm/adchoices

Tech and Science Daily | Evening Standard
What is AI cyber warfare?

Tech and Science Daily | Evening Standard

Play Episode Listen Later Nov 29, 2024 9:04


Dr Ben Goertzel, CEO of the Artificial Superintelligence Alliance and founder of SingularityNet discusses AI cyberattacks in war and a new grants scheme to accelerate the emergence of human-level artificial general intelligence and ‘superintelligence'.Plus, Happy birthday ChatGPT, National Trust picks 49 good causes to receive Sycamore Gap saplings, Australia passes world-first law banning under-16s from social media accounts.Also in this episode:Rise of the dinosaurs from herbivores to carnivoresWhy has the University of Bath studied the sale of lone bananas as “sad singles”?Three-year-old ‘chef' becomes viral TikTok sensationJudy Garland's iconic ruby slippers go on display in London Hosted on Acast. See acast.com/privacy for more information.

Forbidden Knowledge News
The Final War: Cyber Warfare, Espionage, Disinformation & Surveillance | Greg Lebow

Forbidden Knowledge News

Play Episode Listen Later Nov 23, 2024 63:42


Max's podcast https://podcasts.apple.com/us/podcast/the-final-war/id1770261300Make a Donation to Forbidden Knowledge News https://www.paypal.me/forbiddenknowledgenehttps://buymeacoffee.com/forbiddenReconnect to Everything with BrainsupremeGet 25% off your order here!!https://brainsupreme.co/discount/FKN15Subscribe to Cory Hughe's "Bloody History" substackhttps://bloodyhistory.substack.comSign up for the IMT crypto community Imt.networkBook a free consultation with Jennifer Halcame Emailjenniferhalcame@gmail.comFacebook pagehttps://www.facebook.com/profile.php?id=61561665957079&mibextid=ZbWKwLSick of having mediocre health? Transform your health and vitality with Christian Yordanov's program. Learn more and book a free intro call here (mention FKN at time of booking and he will have a special gift for youhttps://christianyordanov.com/fkn/Watch The Forbidden Documentary: Occult Louisiana on Tubi: https://link.tubi.tv/pGXW6chxCJbC60 PurplePowerhttps://go.shopc60.com/FORBIDDEN10/or use coupon code knowledge10FKN Link Treehttps://linktr.ee/FKNlinksForbidden Knowledge Network https://forbiddenknowledge.news/ Sign up on Rokfin!https://rokfin.com/fknplusPodcastshttps://www.spreaker.com/show/forbiddenAvailable on all platforms Support FKN on Spreaker https://spreaker.page.link/KoPgfbEq8kcsR5oj9FKN ON Rumblehttps://rumble.com/c/FKNpGet Cory Hughes Book!https://www.buymeacoffee.com/jfkbookhttps://www.amazon.com/Warning-History-Cory-Hughes/dp/B0CL14VQY6/ref=mp_s_a_1_1?crid=72HEFZQA7TAP&keywords=a+warning+from+history+cory+hughes&qid=1698861279&sprefix=a+warning+fro%2Caps%2C121&sr=8-1https://coryhughes.org/Johnny Larson's artworkhttps://www.patreon.com/JohnnyLarsonYouTube https://youtube.com/@fknclipspBecome Self-Sufficient With A Food Forest!!https://foodforestabundance.com/get-started/?ref=CHRISTOPHERMATHUse coupon code: FORBIDDEN for discountsThe FKN Store!https://www.fknstore.net/Our Facebook pageshttps://www.facebook.com/forbiddenknowledgenewsconspiracy/https://www.facebook.com/FKNNetwork/Instagram @forbiddenknowledgenews1@forbiddenknowledgenetworkXhttps://x.com/ForbiddenKnow10?t=uO5AqEtDuHdF9fXYtCUtfw&s=09Email meforbiddenknowledgenews@gmail.comsome music thanks to:https://www.bensound.com/Become a supporter of this podcast: https://www.spreaker.com/podcast/forbidden-knowledge-news--3589233/support.

Grimerica Outlawed
#269 - Max Lebow - The Final War, Hacked and Tracked

Grimerica Outlawed

Play Episode Listen Later Nov 4, 2024 55:18


Max Lebow joins us for a thrilling chat about the real life conspiracy story of being hacked and tracked that is actually still unfolding with the Chinese Gov, the FBI and Max.   We chat about The Final War, demoralisation, connection with other humans, following the Rabbit, therapy, managing info on Human Resources, MK Ultra, Conspiracies and discernment, Mabus, the THREE books, blue tooth, faraday bags, targeted individuals, Mr. Robot, Q, and interacting with tech in the vaccines.   In the second half we talk about who 'they' are, the inherent war, the mob example, destroy to create, the Tower of Babel, dream hacking, the PLA, the dissident thing, when the call came from the FBI, the moment it became a podcast, NSA and FOIA's, the rogue tech billionaire, contact tracing, social credit, blue beam, ai summoning the demon, the risk of EMP's, and the controlled op narrative.   Check out his unique and fascinating podcast here: https://linktr.ee/thefinalwar   To gain access to the second half of show and our Plus feed for audio and podcast please clink the link http://www.grimericaoutlawed.ca/support.   For second half of video (when applicable and audio) go to our Substack and Subscribe. https://grimericaoutlawed.substack.com/ or to our Locals  https://grimericaoutlawed.locals.com/ or Rokfin www.Rokfin.com/Grimerica Patreon https://www.patreon.com/grimericaoutlawed   Support the show directly: https://grimerica.ca/support-2/ Outlawed Canadians YouTube Channel: https://www.youtube.com/@OutlawedCanadians Our Adultbrain Audiobook Podcast and Website: www.adultbrain.ca Our Audiobook Youtube Channel:  https://www.youtube.com/@adultbrainaudiobookpublishing/videos Darren's book www.acanadianshame.ca Check out our next trip/conference/meetup - Contact at the Cabin www.contactatthecabin.com Other affiliated shows: www.grimerica.ca The OG Grimerica Show www.Rokfin.com/Grimerica Our channel on free speech Rokfin Join the chat / hangout with a bunch of fellow Grimericans  Https://t.me.grimerica https://www.guilded.gg/chat/b7af7266-771d-427f-978c-872a7962a6c2?messageId=c1e1c7cd-c6e9-4eaf-abc9-e6ec0be89ff3   Leave a review on iTunes and/or Stitcher: https://itunes.apple.com/ca/podcast/grimerica-outlawed http://www.stitcher.com/podcast/grimerica-outlawed Sign up for our newsletter http://www.grimerica.ca/news SPAM Graham = and send him your synchronicities, feedback, strange experiences and psychedelic trip reports!! graham@grimerica.com InstaGRAM https://www.instagram.com/the_grimerica_show_podcast/  Purchase swag, with partial proceeds donated to the show www.grimerica.ca/swag Send us a postcard or letter http://www.grimerica.ca/contact/ ART - Napolean Duheme's site http://www.lostbreadcomic.com/  MUSIC Tru Northperception, Felix's Site sirfelix.bandcamp.com 

True Spies
True Spies: Debriefs - Eric O'Neill on the frontiers of cyberwarfare

True Spies

Play Episode Listen Later Oct 15, 2024 41:28


What will cost the global economy $20 trillion come 2026? In this latest Debrief, hear from author and famed security expert: Eric O'Neill. Eric discusses with Morgan Childs the growing hotbeds for cyber espionage, crime and warfare in the world right now, their consequences. Crucially, they also discuss how individuals and companies alike can safeguard now, to prevent catastrophe moving forward. From SPYSCAPE, the HQ of secrets. A Cup And Nuzzle production. Series producer: Joe Foley. Produced by Morgan Childs. Learn more about your ad choices. Visit megaphone.fm/adchoices

Chats & Tatts
The Crazy Germans' Episode ft. Marcus Giuliano Stolz and Philipp Trier

Chats & Tatts

Play Episode Listen Later Oct 9, 2024 92:51 Transcription Available


The evolution of tattooing has been characterized by significant changes in techniques, styles, and the overall perception of the craft. Host Aaron Della Vedova sits down with 'the crazy Germans' Marcus Giuliano Stolz and Philip Trier to share their unique journeys into tattooing, emphasizing the importance of traditional apprenticeship methods in skill development and fostering respect within the industry.   Aaron and his guests dive into the ever-evolving landscape of technology and art, discussing the rapid pace of innovation and its implications for the future. Aaron emphasizes the importance of understanding global perspectives, particularly in the tattooing community, and expresses excitement about exploring tattoo culture from different parts of the world, specifically Germany.    Tune in for an insightful conversation that bridges art, technology, and cultural exchange!   Chat Breakdown:   00:01:44 - Exploring Tattooing in Germany 00:03:19 - Marcus' Tattoo Journey 00:11:14 - The Importance of Humility in Tattooing 00:13:07 - Philip's Path to Tattooing 00:16:26 - Self-Taught Tattooing 00:19:01 - Transitioning to Full-Time Tattooing 00:21:38 - Work Ethic in Tattooing 00:24:02 - The Spiritual Journey of Tattooing 00:27:03 - Balancing Perfectionism and Acceptance 00:29:01 - The Reality of a Tattoo Artist's Life 00:36:10 - Authenticity in the Tattoo Industry 00:41:40 - The Importance of Client Respect 00:42:31 - Experimenting with Anesthesia Tattoos 00:46:19 Social Media's Impact on Tattooing 01:04:58 Value of Handmade Art 01:10:00 Future of Cyber Warfare 01:17:48 Ink Regulations in Europe 01:24:59 Colorful Tattoos in Germany 01:29:11 Giving Back to the Tattoo Industry 1:30:45 The Impact of Mindfulness   Quotes: "Making needles was its own art form." "We're lucky to have touched that era of tattooing."  "In Germany, it's like, when you say I want to be an artist, everybody's shaking their head and that you got to do something serious." "Every minute of tattooing I did in my life is just worth it." "The ones that will succeed in tattooing are the ones that have the talent, the work ethic." "Instagram can't save your ass."  "I've always had the opinion that I'm here to be of service, right? I'm not here to decide what your journey is like." "The cat is out of the bag, you cannot put it back in, so you have now cards with which you have to play, you know, that's it."   Stay Connected:   Connect. with Philipp: https://www.instagram.com/loccomotivetattoos Connect with Marcus: https://www.instagram.com/marcus_giuliano_stolz_tattoo   Connect with Aaron:⁠   Website: http://www.chatsandtatts.com⁠ Tik Tok: https://www.tiktok.com/@chatsandtatts  IG: http://www.instagram.com/chatsandtatts Chats & Tatts YouTube: https://www.youtube.com/c/chatsandtatts Aaron IG:⁠ http://www.instagram.com/aarondellavedova⁠ Guru Tattoo: http://www.Gurutattoo.com

Risky Business News
Risky Biz News: EU adopts new sanctions framework to cover Russia's cyber warfare and disinformation

Risky Business News

Play Episode Listen Later Oct 9, 2024 7:20


A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast here. Show notes Risky Biz News: EU adopts new sanctions framework to cover Russia's cyber warfare and disinformation

FDD Events Podcast
Targeting Taiwan: Beijing's Playbook for Economic and Cyber Warfare

FDD Events Podcast

Play Episode Listen Later Oct 4, 2024 70:51


The Chinese Communist Party (CCP) aims to “reintegrate Taiwan,” effectively stripping the Taiwanese people of their de facto independence. Achieving this takeover with minimal military action and limited long-term damage to Taiwan's infrastructure and economy would offer the CCP substantial economic, diplomatic, and military advantages. A well-executed, well-resourced, and well-timed cyber-enabled economic coercion campaign could provide the CCP with such an opportunity.To explore these threats, a delegation of FDD experts recently visited Taiwan to conduct war games and tabletop exercises (TTXs). These simulations were designed to evaluate the most salient and dangerous threat scenarios posed by the CCP to the Taiwanese people. The TTX involved 20 participants, primarily from Taiwanese banking and finance sectors, who simulated the roles of senior policymakers in Taiwan, the United States, and China. They assessed the most likely and perilous actions the CCP could take to isolate and coerce Taiwan short of outright warThe TTX produced several key recommendations to enhance economic, cyber, and societal resilience, and offered insights into how the United States and its allies can support Taiwan in its struggle for autonomy. To discuss these findings, FDD's Craig Singleton and RADM (Ret.) Mark Montgomery are joined by Ti-Chen Chen of the Taiwan Academy of Banking and Finance and Ben Jensen of the Center for Strategic and International Studies. Lili Pike of Foreign Policy will moderate the discussion and FDD Founder and President Cliff May, who headed the delegation to Taiwan, will deliver introductory remarks.For more, check out: fdd.org/events/2024/10/04/targeting-taiwan-beijings-playbook-for-economic-and-cyber-warfare/

The President's Daily Brief
September 26th, 2024: Hezbollah Missiles Target Tel Aviv, Russia's Covert Drone Program, & Iranian Cyber Warfare

The President's Daily Brief

Play Episode Listen Later Sep 26, 2024 24:14


In this episode of The President's Daily Brief: • A significant escalation of hostilities in Northern Israel as Hezbollah reportedly fires a ballistic missile at the Tel Aviv-area headquarters of Israel's spy agency, Mossad. This marks the first-ever missile attack on the country's commercial capital. • Alarming reports suggest Russia is collaborating with China to develop long-range attack drones for the ongoing war in Ukraine. Documents reviewed by Reuters point to this covert weapons program enhancing Russia's military capabilities. • Sweden's security service accuses Iranian intelligence of orchestrating a cyber-attack that led to 15,000 revenge messages being sent after Quran-burning protests in the country. • And in today's Back of the Brief: An update on would-be assassin Ryan Routh as federal prosecutors officially charge him with attempting to assassinate former President Trump. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. Email: PDB@TheFirstTV.com ☕ Blackout Coffee: https://www.blackoutcoffee.com/PDB Learn more about your ad choices. Visit megaphone.fm/adchoices

Kan English
Do Hezbollah pager blasts mark new stage in cyber warfare?

Kan English

Play Episode Listen Later Sep 24, 2024 9:52


Barak Gonen, a senior lecturer in the cybersecurity program at the Jerusalem College of Technology speaks to KAN reporter Naomi Segal about the coordinated communication device attack in Lebanon, and what it means for cyber telecommunications warfare. (Photo: Associated Press)See omnystudio.com/listener for privacy information.

Reuters World News
New wave of blasts in Lebanon, Israel's cyber warfare unit and Fed's big rate cut

Reuters World News

Play Episode Listen Later Sep 19, 2024 12:40


Israel bombs southern Lebanon and said it had thwarted an Iran-backed assassination plot. A second round of attacks in Lebanon saw hand-held radios used by Hezbollah detonated after similar explosions of the group's pagers a day earlier. We look at the Israeli military's secretive, cyber warfare group – Unit 8200. And what the U.S. Federal Reserve's big rate cut will mean for you, and for the U.S. election.   Sign up for the Reuters Econ World newsletter here. Listen to the Reuters Econ World podcast here. Find the Recommended Read here.  Visit the Thomson Reuters Privacy Statement for information on our privacy and data protection practices. You may also visit megaphone.fm/adchoices to opt out of targeted advertising. Learn more about your ad choices. Visit megaphone.fm/adchoices

The Ochelli Effect
The Ocjhelli Effect 9-18-2024 Larry Hancock

The Ochelli Effect

Play Episode Listen Later Sep 19, 2024 64:25


Spheres Influential China Iran RussiaThe Ochelli Effect 9-18-2024 Larry HancockWhat is Cyber Warfare coming to? Keeping the American Public at each others throats is priority One in this age of influence. Author Larry Hancock talked with Chuck about the latest efforts to create chaos by the usual suspects in the modern global game for technological supremacy.  Plus the easy path to making independent media into useful idiots is pretty smooth with cash and a friendly predisposition. Mocking Bird was more hands-on than the current turn-key operation.Are we so deeply in denial that we will fight each other instead of confronting the true adversaries who are creating chaos?Creating Chaoshttps://www.orbooks.com/catalog/creating-chaos/LARRY HANCOCK:http://larry-hancock.com/https://larryhancock.wordpress.com/REFERENCE LINKS?Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decadehttps://thehackernews.com/2024/02/chinese-hackers-operate-undetected-in.htmlLocal Ohio woman posted the wild tale after hearing it from a neighbor, who heard it from a friend, who heard it from their daughterhttps://www.the-independent.com/news/world/americas/us-politics/trump-haitian-eating-pets-immigrants-facebook-source-b2612208.htmlRight-wing influencers say they were dupes in an alleged Russian influence operation. They're keeping their millions, for now https://www.cnn.com/2024/09/13/media/right-wing-media-influencers-tenet-russian-money/index.htmlUS FBI disrupts second Chinese hacking group, director sayshttps://www.reuters.com/technology/cybersecurity/us-fbi-says-it-has-struck-second-chinese-hacking-group-2024-09-18/Babies reacting to dancing cactushttps://www.instagram.com/reel/C9ibQkBNZ-u/?igsh=bjdtMGpuYXBnZTczKeep Ochelli.com and Chuck Goinghttps://www.paypal.com/paypalme/ochelliChuck is the in-person MC and Larry will present remotelyNOVEMBER IN DALLAS 2024JFK Lancer Conference InformationNovember 22-24 2024 Virtual Tickets starting at 74.99In-Person Tickets start at 144.99Student Price is 39.99, must show proof of being a studentUse code Ochelli10 for 10% off your ticketsOn sale at assassinationconference.comDISCOUNT Tickets & Packages + BE Counted as an EFFECTERUse code Ochelli10 for 10% off your ticketDates: November 22nd-24thHotel: Dallas Marriott DowntownRoom prices starting at $169 per nightTo book a room call Marriott Reservations at 1 (800) 228-9290 or (214) 979-9000 and mention the November in Dallas Conference Group RateUse code Ochelli10 for 10% off your ticketIf you would like assistance finding discount flights to the conference or activities for your spouse to do in Dallas they can reach out to Gabby's Getaway Adventures through Facebook or email gabbiesgetawayadventure@gmail.com BE THE EFFECT LIVE Shows and 24/7 Online RadioListen/Chat on the Sitehttps://ochelli.com/listen-live/TuneInhttp://tun.in/sfxkxAPPLEhttps://music.apple.com/us/station/ochelli-com/ra.1461174708Ochelli Link Treehttps://linktr.ee/chuckochelli

The Protector Culture Podcast with Jimmy Graham
The Protector Culture Podcast with Jimmy Graham Ep. 118: Cyber Warfare

The Protector Culture Podcast with Jimmy Graham

Play Episode Listen Later Sep 7, 2024 60:13


September is National Preparedness Month. I'm sure you are prepared with food storage, water storage, ammo storage etc. Have you thought about a cyber attack? What about your bank accounts? Retirement accounts? How are you protecting yourself in a digital era? Who's Jimmy Graham? Jimmy spent over 15 years in the US Navy SEAL Teams earning the rank of Chief Petty Officer (E7). During that time, he earned certifications as a Sniper, Joint Tactical Air Controller, Range Safety Officer for Live Fire, Dynamic Movement and Master Training Specialist. He also served for 7 years as an Operator and Lead Instructor for an Elite Federal Government Protective Detail for High-Risk and Critical environments, to include; Kirkuk, Iraq, Kabul, Afghanistan, Beirut, Lebanon and Benghazi, Libya. During this time he earned his certification for Federal Firearms Instructor, Simunition Scenario Qualified Instructor and Certified Skills Facilitator. Jimmy has trained law enforcement on the Federal, State, and Local levels as well as Fire Department, EMS and Dispatch personnel. His passion is to train communities across the nation in order to enhance their level of readiness in response to active shooter situations. Make sure you subscribe and stay tuned to everything we are doing. Want to get more training? - https://ableshepherd.com/ Need support? https://able-nation.org/ Follow us on: Facebook - https://www.facebook.com/ableshepherd Instagram - ​​https://www.instagram.com/ableshepherd/ Youtube - https://www.youtube.com/@ableshepherd

Security Conversations
Ep11: Cyberwarfare takes an ominous turn

Security Conversations

Play Episode Listen Later Sep 6, 2024 75:13


Three Buddy Problem - Episode 11: Russia's notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down 'Doppelganger' network spreading Russian propaganda; CISA's budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise. Cast: Juan Andres Guerrero-Saade (https://x.com/juanandres_gs)(SentinelLabs), Costin Raiu (https://x.com/craiu) (Art of Noh), Ryan Naraine (https://x.com/ryanaraine) (SecurityWeek)

Risk Management Show
Quantum Risk: Before It's Too Late with David Carvalho

Risk Management Show

Play Episode Listen Later Aug 23, 2024 33:04


In this episode of the Global Risk Community podcast, we delve into the pressing topic of Quantum Risk with expert David Carvalho, founder of Naoris Protocol. With over 20 years of experience in cyber security and as an ethical hacker, David discusses the imminent threat of quantum computing to global critical infrastructure. We discussed blockchain-based solutions for trust and transparency, and the development of post-quantum cryptography strategies. If you want to be our guest or suggest a guest, send your email to info@globalriskconsult.com with the subject "Podcast Guest Inquiry." Join us as we explore the future of risk management, cyber security, and sustainability with industry leaders like David Carvalho.   

ITSPmagazine | Technology. Cybersecurity. Society
Subversion in the Digital Age | A Conversation with Lennart Maschmeyer | Redefining Society with Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 25, 2024 42:05


Guest: ✨ Lennart Maschmeyer, Senior Researcher at Center for Security Studies (CSS) at ETH Zurich [@CSS_ETHZurich]On LinkedIn | https://www.linkedin.com/in/lennartmaschmeyer/____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak

The Social-Engineer Podcast
Ep. 268 - The SE ETC Series - Phishing, Impersonation and Bad Actors - Oh My!

The Social-Engineer Podcast

Play Episode Listen Later Jul 22, 2024 12:01


Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Join Chris as he discusses topics and news pertaining to the world of Social Engineering. [July 22, 2024]   00:00 - Intro 00:22 - Intro Links -          Social-Engineer.com - http://www.social-engineer.com/ -          Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ -          Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ -          Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ -          Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb -          CLUTCH - http://www.pro-rock.com/ -          innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/                                                 03:28 - Story 1: Dynamic Phishing Link Attack 05:07 - Story 2: Crown Hack 06:12 - Story 3: Small Town Scam 07:06 - What Can Be Done 10:42 - Wrap Up & Outro -          www.social-engineer.com -          www.innocentlivesfoundation.org   Find us online -          Chris Hadnagy -          Twitter: @humanhacker -          LinkedIn: linkedin.com/in/christopherhadnagy

Clear Admit MBA Admissions Podcast
MBA Wire Taps 365—Cyber warfare to Finance. Special Operations, 333 GRE. Tajikistan, to Moscow and Berlin.

Clear Admit MBA Admissions Podcast

Play Episode Listen Later Jul 15, 2024 32:41


In this week's MBA Admissions podcast we began by discussing the activity on MBA LiveWire.  With most top MBA programs finalizing their incoming classes, we are seeing more MBA programs reducing the size of their wait lists ahead of the beginning of their programs. We then discussed Clear Admit's MBA admissions book, authored by Alex, which is freely available on the Clear Admit site: https://www.clearadmit.com/products/admissions-books/ This book will provide MBA candidates a comprehensive understanding of the MBA admissions process, and enable candidates to really determine the best way to present their candidacy. It is also an easy and fast read. Graham highlighted the upcoming summer application series that Clear Admit is hosting, which began last Wednesday to great success in terms of attendance and content; two MBA programs announced their new MBA admissions essays during this first session. This Wednesday, July 17, is our second session and we will hear and learn from Dartmouth / Tuck, Berkeley / Haas, UNC / Kenan Flagler, Texas / McCombs, and Washington / Foster. Signups are here: https://www.bit.ly/summeressays Graham noted a recently published admissions tip focused on GMAC's common letter of recommendation. For candidates applying to multiple programs, they will likely need to use this recommendation format for at least some of those programs. Graham then mentioned a unique full tuition scholarship offered by HEC Paris. Graham then shared tidbits from four recently published Adcom Q&As, from Columbia, CMU / Tepper, Washington / Foster and Florida / Warrington. For this week, for the candidate profile review portion of the show, Alex selected three ApplyWire entries. This week's first MBA admissions candidate is a military candidate who has worked in cyber warfare, and has a masters degree in computer science. They are looking to use the MBA to transition into the finance sector and investment banking. This week's second MBA candidate is also from the military, and is applying for their MBA after also considering going to law school. They also have a super GRE of 333, and very interesting experiences in the military in special operations. The final MBA candidate for this week is originally from Tajikistan, and she's worked and been educated in several countries including Russia and Germany. We think adcom will really like her profile, but may have concerns with potentially weaker quant skills, and fuzzy post-MBA goals. This episode was recorded in Paris, France and Cornwall, England. It was produced and engineered by the fabulous Dennis Crowley in Philadelphia, USA. Thanks to all of you who've been joining us and please remember to rate and review this show wherever you listen!

Ground Zero Media
Show sample for 6/7/24: OMEGA POINT – THE ADVENT OF COGNITIVE WARFARE W/ SEAN PATRICK HAZLETT

Ground Zero Media

Play Episode Listen Later Jun 8, 2024 7:52


Cognitive warfare is no longer science fiction – it is a fact and anyone, whether they are civilians or military, are potential targets. The war for the mind is not just a clever euphemism, it is a fact and it is a battlefield that can be entered in various forms such as neurolinguistic programming, electronics, and chemicals. The military concept now is to treat “cyber” as a place, not a mission. Cyberwarfare relates to fifth-generation warfare, but transcends and expands that model. NATO Allied Command defines cognitive warfare as including, “activities conducted in synchronization with other instruments of power to affect attitudes and behavior by influencing, protecting, or disrupting individual and group cognition to gain an advantage over an adversary.” Tonight on Ground Zero (7-10 pm, pacific time) Clyde Lewis talks with military analyst and writer, Sean Patrick Hazlett about OMEGA POINT – THE ADVENT OF COGNITIVE WARFARE. Listen Live: https://groundzero.radio Archived Shows: https://aftermath.media

Macrodosing: Arian Foster and PFT Commenter
The Rise of Cyber Warfare (ft. Jersey Jerry)

Macrodosing: Arian Foster and PFT Commenter

Play Episode Listen Later Apr 18, 2024 114:01


In today's episode, we're joined by Jersey Jerry to discuss the intricate world of cyber security and cyber warfare. Join us as we explore the evolving landscape of digital threats, from ransomware attacks to state-sponsored cyber espionage. Learn how governments, businesses, and individuals can protect their digital assets and stay ahead in the ongoing battle for cyber supremacy. From encryption to threat intelligence, this episode offers insights into the ever-present dangers lurking in the virtual realm and the measures needed to mitigate them. Tune in to stay informed and fortified in the face of today's cyber challenges. (00:05:27) People are squatting in Gordon Ramsay's pub (00:12:46) Logan Paul (00:15:35) Bryan Johnson - guy who wants to live forever (00:30:18) Billy's press conference (00:40:20) Cyber WarfareYou can find every episode of this show on Apple Podcasts, Spotify or YouTube. Prime Members can listen ad-free on Amazon Music. For more, visit barstool.link/macrodosing

The CyberWire
The rebirth of Russia's cyber warfare.

The CyberWire

Play Episode Listen Later Apr 17, 2024 32:04


A Russian hacker group boldly targets critical infrastructure. The Change Healthcare ransomware attack is projected to cost over a billion dollars. Three hundred bucks is the going rate for a SIM swap. PuTTY potentially reveals private keys. Cisco Talos reports a surge in brute-force attacks. Ivanti updates its MDM product. Omni Hotels & Resorts confirm a data breach. Financially motivated hackers target Businesses in Latin America with steganography. A prolific cryptojacker faces decades in prison. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. The ransomware equivalent of a Saturday night special.  Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K's comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe discuss content and study strategies for Domain 2, Asset Security.  Resources: Domain 2, Asset Security Identify and securely provision information assets, establish handling requirements, manage the data lifecycle, and apply data security controls to comply with applicable laws. 2.1 Identify and classify information and assets 2.2 Establish information and asset handling requirements 2.3 Provision resources securely 2.4 Manage data lifecycle 2.5 Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS)) 2.6 Determine data security controls and compliance requirements Are you studying for the CISSP exam, considering taking the test soon, or did you have an unsuccessful exam experience? Here are some CISSP exam pitfalls to avoid so that you're confident and successful on exam day. Selected Reading Hackers Linked to Russia's Military Claim Credit for Sabotaging US Water Utilities (WIRED) T-Mobile, Verizon workers get texts offering $300 for SIM swaps (Bleeping Computer) PuTTY SSH client flaw allows recovery of cryptographic private keys (Bleeping Computer)  Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials (Talos Intelligence) Ivanti Patches Two Critical Avalanche Flaws in Major Update (Infosecurity Magazine) Omni Hotels confirms data compromise in apparent ransomware attack (SC Media) Steganography Campaign Targets Global Enterprises (GovInfo Security) Nebraska man allegedly defrauded cloud providers of millions via cryptojacking (The Record) Ransomware attack has cost UnitedHealth $872 million; total expected to surpass $1 billion (The Record) ‘Junk gun' ransomware: Peashooters can still pack a punch (Sophos News)  Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.

Pat Gray Unleashed
The New Battlefield: Cyber Warfare | Guest: Lara Logan | 4/2/24

Pat Gray Unleashed

Play Episode Listen Later Apr 2, 2024 100:46


Donald Trump makes bond in New York City. Joe Biden introduces the Oyster Bunnies! The Biden White House is mad at those who are mad about Easter being co-opted by "Transgender Day of Visibility." The United States might be about to run out of bombs. The FBI has abused the Fourth Amendment more than 278,000 times? Squatters now have more rights than American citizens. Woke Disney strikes again! Diplomatic blackmail: The president of Mexico wants $20 billion just to talk with Biden. Guest Lara Logan discusses the new information around the destruction of the Francis Scott Key Bridge. Learn more about your ad choices. Visit megaphone.fm/adchoices