Use of technological force within cyberspace
POPULARITY
Categories
Cyber warfare is no longer something that happens behind closed doors or in some far-off digital corner. It's happening now—and reshaping the rules of conflict in real time. Drone strikes controlled by apps, ransomware attacks on hospitals—today's battleground is just as likely to be online as on the ground. That science fiction scenario is now a critical, constant threat-the kind that affects us all globally. I'm really excited to introduce you to Dr. Chase Cunningham. He's a retired Navy chief cryptologist with a wealth of experience in cyber operations for the NSA, CIA, FBI—and more. He's the one who pioneered zero-trust security strategies and advises top decision-makers in government and private industry. That gives him a front-row seat to how digital warfare is evolving—and what that means for all of us. He's also the author of Cyber Warfare and the gAbriel Series, where his real-world expertise comes to life in stories that are chillingly plausible. We talk about how cyber conflict is already playing out in Ukraine, how different threat actors operate—and why critical infrastructure is such a tempting target. Chase shares practical advice on what individuals and small businesses can do to better protect themselves. We also look at what governments are doing to defend against these growing threats. That conversation is eye-opening-and urgent. You won't want to miss it. Show Notes: [01:21] Chase is a retired Navy Chief and a cryptologist. He also worked at the NSA. He also put Zero Trust in the formal practice at Forrester research. [03:24] We learn how Chase got involved with computer work and cryptology. [05:29] We're seeing cyber war play out in real time with Russia and Ukraine. [07:13] We talk about the future of war and drones. [08:31] Cyber warfare is just the natural evolution of conflict in the digital space. It's the bridge between espionage and kinetic activity. [09:40] Chase talks about the different actors in the cyber warfare space and their primary targets. [12:05] Critical infrastructure includes oil and gas, piping, water systems, healthcare, and even schools. [14:12] Some of the unique issues with dealing with the attacks from cyber criminals. [19:20] How the CCP plays 3D chess. [22:26] Reducing risk and protecting ourselves includes following best practices. [25:10] What the government is doing to try to mitigate cyber risk. [27:23] Chasing money and finding cyber crime. [32:04] A lot of valuable assets are being developed in the context of war. [35:06] Chase talks about some of the things he covers in his book. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Chase Cunningham - Dr. Zero Trust Dr. Chase Cunningham - LinkedIn Cyber Warfare – Truth, Tactics, and Strategies gAbrIel: A Novel in the gAbrIel Series Unrestricted Warfare: China's Master Plan to Destroy America
Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfare, has aided law enforcement and been featured by CBS 60 Minutes, The New York Times, and Wired. A frequent speaker at RSA, he has twice received the SANS Difference Makers Award for his groundbreaking work.00:00 Introduction02:34 You don't need an expensive university11:00 In order to be successful in cyber, you need to…17:38 What are the bad guys doing?23:13 What does the government do to help?26:24 Consequences for bad actors41:35 The Art of Cyber Warfare44:05 Jon's new book--------------------------------------------------------------To learn more about Jon visit https://www.linkedin.com/in/jondimaggio/https://www.amazon.com/Art-Cyberwarfare-Investigators-Ransomware-Cybercrime-ebook/dp/B09BKLRH8P?ref_=ast_author_dpTo learn more about Dark Rhiino Security visit https://www.darkrhiinosecurity.com
China has accused America of launching cyber attacks. How often does that go on? What kind of offensive and defensive cyber attacks are going on that the average person has no idea about? Tommy talks with Gary Corn, Director of the Technology, Law & Security Program and an adjunct professor of cyber and national security law and the law of armed conflict at American University
Jon DiMaggio is the Chief Security Strategist at Analyst1 with over 15 years of experience tracking cyber threats. Specializing in enterprise ransomware and nation-state attacks, Jon is best known for infiltrating the LockBit ransomware gang during a two-year undercover operation. His research, including Ransomware Diaries and The Art of Cyberwarfare, has aided law enforcement and been featured by CBS 60 Minutes, The New York Times, and Wired. A frequent speaker at RSA, he has twice received the SANS Difference Makers Award for his groundbreaking work.00:00 Introduction02:34 You don't need an expensive university11:00 In order to be successful in cyber, you need to…17:38 What are the bad guys doing?23:13 What does the government do to help?26:24 Consequences for bad actors41:35 The Art of Cyber Warfare44:05 Jon's new book
Episode #74 features a great discussion with Steve Winterfeld, Advisor, and Fractional CISO with Cyber Vigilance Advice (CVA) LLC. Steve is passionate about cybersecurity. He served as CISO for Nordstrom Bank, Director of Cybersecurity for Nordstrom, and Director of Incident Response and Threat Intelligence at Charles Schwab. Steve also published a book on Cyber Warfare and holds CISSP, ITIL, and PMP certifications. We discussed a variety of topics, and during our conversation, Steve offered these resources: On finding job: Lessons Learned on Finding a Cybersecurity Job After a Layoff - Security Boulevard On starting / managing a career: Creating a Roadmap for Your Dream Cybersecurity Career - Security Boulevard
Episode Link: https://open.spotify.com/show/3f8YJAs522S0319YvAYT8TIt didn't drop from the sky—it crept through code. In this jaw-dropping episode of Conspiracy Files, we explore the secret origins of Stuxnet, a sophisticated computer worm so advanced, many believe it was the first true cyberweapon ever unleashed. Who created it? What was the real target? And has it already opened the floodgates to digital warfare we can't see coming?This isn't just about hacking—this is about weaponized technology, covert operations, and a new kind of war the public was never meant to know about.Connect with The Conspiracy Files Podcast:
Today, we're going over your questions. You guys had some follow-ups about my stalker, Timothy C., and I'll be giving you a few more details on that situation. We're also unpacking the RFK Jr. sex scandal—what's real, what's spin, and what it all means. Plus, the government's leaked text messages have been making waves, and I'll be breaking down what they reveal and why you should (and shouldn't) care.—https://policecoffee.com/?gad_source=1&gbraid=0AAAAACG7qmI1dmMkruwgp8vA8w0oECKla&gclid=Cj0KCQjwtJ6_BhDWARIsAGanmKfdkRQ1M1sighZQ-PGpEpsCjrZ8fCigidnvH55bfBUNMa56-yoy_A8aAv34EALw_wcB—https://open.spotify.com/episode/7CcmZWvQEaLTQAQRAFy2BQ?si=FgeO4b9QSi-5eB2cqX2XHw
Today I'm joined by Teddy Pierce, author of Dethrone Davos: Save America, to discuss the shocking waste, fraud, and abuse that the Department of Government Efficiency (DOGE) has been uncovering. From reckless spending to blatant money laundering, we're breaking down how our government has been misusing our hard-earned tax dollars—and why this corruption must be stopped. Transparency and accountability aren't just buzzwords; they're essential for restoring actual integrity to our system. Tune in as we expose what's really going on behind the scenes and why this fight matters for all of us.—Buy Teddy's book, Dethrone Davos: https://www.amazon.com/Dethrone-Davos-America-Theodore-Pierce-ebook/dp/B0D5NKGGNC—https://www.thebrandsunday.com/collections/all
We're already in World War III—just not the kind you're thinking of. Cyber warfare is here, and the battlefield is your inbox, your bank account, and your digital identity. So why are we still acting like it's peacetime? Dr. Eric Cole, cybersecurity pioneer and former CIA hacker, joins the show to drop hard truths about the state of cyber warfare, AI's role in our digital future, and why most people are sleepwalking through a war they don't even realize they're in. From the rise of deepfakes to North Korea's billion-dollar hacking economy, this episode is one you can't afford to ignore. Impactful Moments: 00:00 - Introduction 02:00 - Dr. Eric Cole's journey from the CIA to cybersecurity leadership 07:20 - The fundamentals of hacking and why they still matter 11:00 - AI is only as smart as the data we give it 17:00 - The rise of deepfakes and digital deception 19:45 - Cyber warfare: How North Korea funds its economy through hacking 23:50 - The problem with America's peacetime mentality 30:00 - Should we be worried about AI replacing humans? 36:10 - The key to success: mastering people skills, not just tech skills 40:30 - Final thoughts and where to follow Dr. Eric Cole Connect with Dr. Eric Cole on LinkedIn: https://www.linkedin.com/in/ericcole1/ Check out Dr. Eric Cole's books – Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World: https://www.amazon.com/Cyber-Crisis-Protecting-Business-Threats/dp/B093X3YNPT Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet: https://www.amazon.com/Online-Danger-Protect-Yourself-Internet-ebook/dp/B078WK39TT Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/
Guest: Gary Hayslip, CISO, SoftBank Investment AdvisorsLinkedIn: https://www.linkedin.com/in/ghayslip/Website: cisodrg.com/biographies/gary-hayslip/Host: Dr. Rebecca WynnOn ITSPmagazine
A mysterious Revolutionary War coin, modern cyber terrorism, and a shadowy organization known as the Liberty Unit converge in this groundbreaking techno-thriller that bridges America's past and present. Join Books and Looks for an in-depth review of "Going Dark" by George K. Mehok, a stunning debut novel that weaves together historical intrigue and contemporary cyber warfare. When NSA analyst Paul Knox inherits a mysterious coin from the Revolutionary War, he becomes entangled in a centuries-old fight to protect America from those who would destroy it from within. Written by a former cybersecurity expert, this thriller exposes the frightening possibilities of modern cyber warfare while connecting it to a fascinating piece of Revolutionary War history. Discover how a forgotten historical figure named Jack Jouett and a modern-day NSA analyst might hold the key to America's survival.S ubscribe to Books and Looks for weekly deep dives into the best new releases in history, mystery, fiction, and nonfiction. Links: "Going Dark" Book: https://amzn.to/4khszqe George K. Mehok Website: https://www.georgemehok.com/ Watch on YouTube: https://youtu.be/B97GnLZ_o38 _ Produced by Podcast Studio X.
In this episode we discuss the alarming potential of cyber warfare and its unintended consequences with the Former DoD Cyber Crime Director Jeff Stutzman. Jeff highlighted the vulnerability of surveillance systems and physical security protection due to outdated firmware and neglectful maintenance, emphasizing the critical need for constant vigilance in safeguarding critical infrastructure. Jeff urges listeners, particularly small defense contractors and businesses, to prioritize robust cybersecurity measures, including firewalls, antivirus software, two-factor authentication, and email protection, to mitigate risks in the face of a rapidly evolving cyber threat landscape. Listen now to learn more!
In this episode of the Contested Ground podcast, host Liam Garman welcomes Cyber Daily's David Hollingworth, a cyber security expert and Cyber Uncut podcast host, to unpack the latest in hacking and cyber security in the new era of grey-zone warfare and nation-state cyber attacks. They begin the podcast examining real world examples of warfare-motivated hacking, threat actors for hire, the impact of cyber threats and incidents for nations around the world. They then discuss the differences between "smash-and-grab" ransomware attacks with persistent and embedded state-sponsored cyber attacks. The podcast wraps up examining the increasing speed, accuracy and impact of cyber attacks on industry and government infrastructure across international lines. Enjoy the podcast, The Contested Ground team
In this episode of the Contested Ground podcast, host Liam Garman welcomes Cyber Daily's David Hollingworth, a cyber security expert and Cyber Uncut podcast host, to unpack the latest in hacking and cyber security in the new era of grey-zone warfare and nation-state cyber attacks. They begin the podcast examining real world examples of warfare-motivated hacking, threat actors for hire, the impact of cyber threats and incidents for nations around the world. They then discuss the differences between "smash-and-grab" ransomware attacks with persistent and embedded state-sponsored cyber attacks. The podcast wraps up examining the increasing speed, accuracy and impact of cyber attacks on industry and government infrastructure across international lines. Enjoy the podcast, The Contested Ground team
Send us a textWe dive into the complex world of cybersecurity through the eyes of Jeremy from Intel 471, exploring his journey from journalism to cyber threat intelligence. The discussion encompasses the evolution of cybercrime, the significance of ransomware, and future trends impacting cybersecurity.• Transition from journalism to cyber intelligence • Engaging with threat actors in cyber forums • Overview of Intel 471 and its mission • Ransomware trends and their implications • The intersection of nation-state actors and cybercrime • Impact of law enforcement collaboration on cyber investigations • Predictions for cybersecurity trends in 2025 • Importance of securing exposed attack surfaces • Call to action for increased cyber resilienceSupport the showFollow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
The CIA may not be thrilled with this conversation. Here, Pulitzer Prize-winning author and highly regarded CIA expert Tim Weiner reveals stunning details about the agency's espionage and covert activities. Learn about the CIA's greatest successes and failures, its best weapon, how China and Russia are spying on the U.S., and much more.
Mike Grover is a security researcher, InfoSec expert, and the creator of the infamous O.MG Cable. He gained prominence in 2019 when he showcased his malicious USB cable prototype at DEF CON, capable of recording keystrokes and executing remote commands. Grover's O.MG Cable looks identical to a regular charging cable, but contains a tiny implant that creates a Wi-Fi hotspot, allowing attackers to access the connected device from up to 300 feet away. Since its inception, Grover has refined the O.MG Cable design, making it indistinguishable from normal USB cables and expanding its capabilities. The latest iteration includes features such as geofencing, self-destruct mechanisms, and support for various connector types including Lightning and USB-C. Grover's work aims to raise awareness about hardware security risks while providing tools for red teams and security researchers to test and improve organizational defenses. Shawn Ryan Show Sponsors: https://ROKA.com | Use Code SRS https://ExpressVPN.com/SRS https://ZipRecruiter.com/SRS https://RocketMoney.com/SRS https://prizepicks.onelink.me/LME0/SRS https://ShawnLikesGold.com | 855-936-GOLD #goldcopartner https://americanfinancing.net/srs NMLS 182334, nmlsconsumeraccess.org. Call 866-781-8900 for details about credit costs and terms. Mike Grover Links: Website - https://o.mg.lol/ X - https://x.com/_MG_ LinkedIn - linkedin.com/in/mgrover Please leave us a review on Apple & Spotify Podcasts. Vigilance Elite/Shawn Ryan Links: Website | Patreon | TikTok | Instagram | Download Learn more about your ad choices. Visit podcastchoices.com/adchoices
Expert Security Researcher, Jon DiMaggio, former National Security Agency (NSA) analyst, takes us under cover on the Dark Web, providing us insight in plain terms on: ransomware explained for small business and ransomware risks for small business, how cyber attacks stay undetected, how intelligence gathering is critical to security, secrets of cyber crime gangs, how stolen data is sold by cyber criminals, andunderstanding the hacker mind.Don't miss Jon's book, The Art of Cyber Warfare: https://a.co/d/a2r7C5G Send us a textGrow without Interruption. Stop Breaches. Leverage Advances in Technology with NetGain. Contact NetGain today at 844-777-6278 or reach out online at www.NETGAINIT.com Have a Guest idea or Story for us to Cover? You can now text our Podcast Studio direct. Text direct (904) 867-446
I greet you in Jesus' precious name! It is Friday morning, the 24th of January, 2025, and this is your friend, Angus Buchan, with a thought for today. We go straight to 2 Corinthians 10:4 (Amplified Version): “The weapons of our warfare are not physical [weapons of flesh and blood]. Our weapons are divinely powerful for the destruction of fortresses.” Folks, we need to understand something. We are in a war. We are in a full-scale war and it's not a physical war. It's a war raging in the mind, and we need to use the weapons God has given us to combat this war. “What weapons?” You say. I am talking about prayer, the power of prayer. We've got to pray more and speak less. The Bible - that is our weapon. It's the sword of the Spirit. The word of God says we've got to use it. We've got to watch what we read, what we watch on TV and especially social media. This very message you are listening to now is coming to you on social media, and thank you very much for praying for me and for listening and watching it, because there is so much rubbish that can be watched even by a small child, ten, fourteen years old - things like pornography which is poisoning people, causing people to be depressed, and causing people to stress and to even contemplate suicide.Now I want to read something to you that I've heard from a lady named Cindy McGarvie. She is an Australian lady, and I want you to listen to the power of social media. Iran attacked America and they were expecting the Americans to retaliate with bombs and guns. Listen to this. “The US could have ordered air strikes on Iran's military bases where the missiles were launched, but instead they used both soundless and formless computer technology to achieve a similar end. This is called Cyber Warfare. Cyber Warfare is the use of computer technology to destruct activities of a state or organisation.” They didn't even send a missile or anything. They destructed the whole thing by social media.We need to be careful what we allow our children to watch and what we are watching and we need to use it for the benefit of the Kingdom of God. Remember the Bible tells us in 1 John 4:4: “…greater is He that is within us than he that is in the world.” And that is the whole purpose of thought for today, to bring to your attention, every morning, the importance of God's Holy Word which He has given us to stand against the lies of the devil.Jesus bless you and have a wonderful day. Goodbye.
We're experimenting and would love to hear from you!In this episode of Discover Daily, we explore how RedNote, a Chinese social media platform, has become the unexpected refuge for TikTok users ahead of the January 19th ban, with over 700,000 new American users joining in just two days.Next, we delve into a groundbreaking cybersecurity operation where the FBI, in partnership with French authorities and Sekoia.io, successfully removed dangerous PlugX malware from 4,258 U.S. computers. This sophisticated operation, conducted between August 2024 and January 2025, showcases how law enforcement turned the malware's own self-delete mechanism against itself to protect American digital infrastructure from Chinese state-sponsored hackers.Finally, we celebrate a historic moment in astronomy as the European Space Agency's Gaia telescope concludes its revolutionary sky-scanning mission after 11 years. Having collected over three trillion observations of two billion celestial objects, Gaia's legacy will continue through two major data releases planned for 2026 and beyond, promising to reshape our understanding of the Milky Way galaxy.From Perplexity's Discover Feed:https://www.perplexity.ai/page/the-rednote-apps-boom-in-the-u-1NnpJxlbSEGE_F6HqwBpdwhttps://www.perplexity.ai/page/fbi-hacked-computers-to-uninst-54mfC_E0SUS.e2kNPl191whttps://www.perplexity.ai/page/gaia-sky-scan-completed-gS0fkLxDRyCfaZsPGKrF0wPerplexity is the fastest and most powerful way to search the web. Perplexity crawls the web and curates the most relevant and up-to-date sources (from academic papers to Reddit threads) to create the perfect response to any question or topic you're interested in. Take the world's knowledge with you anywhere. Available on iOS and Android Join our growing Discord community for the latest updates and exclusive content. Follow us on: Instagram Threads X (Twitter) YouTube Linkedin
➡️ If you enjoy this podcast and you want to help to make its existence possible, join our community of geopolitics enthusiasts on PATREON: https://www.patreon.com/DecodingGeopolitics Sign up to my upcoming geopolitics newsletter: https://station-zero.beehiiv.com/subscribe Thank you Conducttr for sponsoring the podcast. Take a look at Conducttr's services and its crisis exercise software at: https://www.conducttr.com This is a conversation with Lennart Meschmayer. Lennart is a researcher at the Center for Security Studies (CSS) at ETH Zurich who's focusing on cyber warfare - how states use cyber power against each other both in times of war and peace and what role does cyber play in conflicts today. And that's exactly what this conversation is all about. We talk about what role does cyber play in the war in Ukraine, why we haven't seen a cyber apocalypse that many have predicted before the war started, why cyber warfare works really differently than most people think, why is Israel a hacking superpower or what would a cyber war between Russia and NATO look like.
Three Buddy Problem - Episode 26: We discuss the discovery of a Palo Alto network firewall attack and a stealthy network edge device backdoor (LITTLELAMB.WOOLTEA), the Cyberhaven hack and the shady world of browser extensions, and a look back at the top research projects that caught our attention in 2025. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).
The Macrodosing crew kicks off the "Best of 2024" with a collection of unforgettable moments from the first half of the year. From wild theories to hilarious tangents and everything in between, Part 1 brings you the highlights that made this year so memorable. Part 2 out tomorrow, enjoy! (00:00:53) Wearing shirts with Arian on them (00:08:08) Naming random athletes (00:19:45) Brace Belden (00:38:49) Chicago office vs. NYC office (00:42:35) Donnie saving a plane (01:07:36) Arian's top 5 white people (01:13:36) Jeff D. Lowe + Don Gorske hater (01:27:48) Jerry vs. Cyber Warfare (01:41:01) Draft Day (01:52:13) OJ Simpson (02:07:28) Big T diss track of Joe Biden (02:15:42) Body building forum thread (02:22:46) Worst day of Big T's life + Arian's first pitch (02:37:34) Nick and Donnie (02:51:12) Big T's elbow injuryYou can find every episode of this show on Apple Podcasts, Spotify or YouTube. Prime Members can listen ad-free on Amazon Music. For more, visit barstool.link/macrodosing
Three Buddy Problem - Episode 26: We dive deep into the shadowy world of surveillance and cyber operations, unpacking Amnesty International's explosive report on NoviSpy, a previously unknown Android implant used against Serbian activists, and the links to Israeli forensics software vendor Cellebrite. Plus, thoughts on the US government's controversial guidance on VPNs, Chinese reports on US intel agency hacking, TP-Link sanctions chatter, Mossad's dramatic exploding beeper operation and the ethical, legal, and security implications of escalating cyber-deterrence. Also, a mysterious BeyondTrust 0-day! Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Costin Raiu (https://twitter.com/craiu) and Ryan Naraine (https://twitter.com/ryanaraine).
In this episode of GREAT POWER PODCAST, host Michael Sobolik speaks with Niklas Swanström about America's supply chain dependencies on Beijing, related threats to national security, and what it would take to build out alternative supply chain networks. Guest biography Dr. Niklas Swanström is the Director of the Institute for Security and Development Policy, and one of its co-founders. He is a Fellow at the Foreign Policy Institute of the Paul H. Nitze School of Advanced International Studies (SAIS) and a Senior Associate Research Fellow at the Italian Institute for International Political Studies (ISPI). His main areas of expertise are conflict prevention, conflict management and regional cooperation; Supply Chain Security, Cyber Warfare and disinformation; Chinese foreign policy and security in Northeast Asia; the Belt and Road Initiative, traditional and non-traditional security threats and its effect on regional and national security as well as negotiations. His focus is mainly on Northeast Asia, Central Asia and Southeast Asia. Resources from the conversation Read Niklas' new book Read Michael's new book Follow Niklas on X Follow Michael on X
Over the past year, the Chinese government has stepped up its cyber operations, focusing not just on espionage or stealing intellectual property, but on hacking to bolster geopolitical goals.U.S. authorities and institutions are used to digital aggression from the likes of Russia. But are now freshly reconsidering the objectives and capabilities of one of the country's other eastern rivals.We discuss those goals and how China using cyberspace to achieve them. We also discuss the latest from Russia. Want to support 1A? Give to your local public radio station and subscribe to this podcast. Have questions? Connect with us. Listen to 1A sponsor-free by signing up for 1A+ at plus.npr.org/the1a.Learn more about sponsor message choices: podcastchoices.com/adchoicesNPR Privacy Policy
We speak to cyber security experts about how cyber warfare works – and how it stays out of the headlines. Then we hear about the aerodynamics tech making athletes more streamlined. And we meet the new Indiana Jones, gaming star Troy Baker.Tell us about the new tech you've tried out in 2024. What gadgets or apps helped you out this year? Send us an email to techlife@bbc.co.uk or Whatsapp us on +44 330 123 0320. Presenter: Chris Vallance Producer: Imran Rahman-Jones Editor: Monica Soriano(Image: A computer-generated, pixelated image of a globe with a neon blue padlock superimposed on top. Credit: Getty Images.)
With Tristan Harris, Aza Raskin and Theresa Payton. Learn more about your ad choices. Visit megaphone.fm/adchoices
Dr Ben Goertzel, CEO of the Artificial Superintelligence Alliance and founder of SingularityNet discusses AI cyberattacks in war and a new grants scheme to accelerate the emergence of human-level artificial general intelligence and ‘superintelligence'.Plus, Happy birthday ChatGPT, National Trust picks 49 good causes to receive Sycamore Gap saplings, Australia passes world-first law banning under-16s from social media accounts.Also in this episode:Rise of the dinosaurs from herbivores to carnivoresWhy has the University of Bath studied the sale of lone bananas as “sad singles”?Three-year-old ‘chef' becomes viral TikTok sensationJudy Garland's iconic ruby slippers go on display in London Hosted on Acast. See acast.com/privacy for more information.
Max's podcast https://podcasts.apple.com/us/podcast/the-final-war/id1770261300Make a Donation to Forbidden Knowledge News https://www.paypal.me/forbiddenknowledgenehttps://buymeacoffee.com/forbiddenReconnect to Everything with BrainsupremeGet 25% off your order here!!https://brainsupreme.co/discount/FKN15Subscribe to Cory Hughe's "Bloody History" substackhttps://bloodyhistory.substack.comSign up for the IMT crypto community Imt.networkBook a free consultation with Jennifer Halcame Emailjenniferhalcame@gmail.comFacebook pagehttps://www.facebook.com/profile.php?id=61561665957079&mibextid=ZbWKwLSick of having mediocre health? Transform your health and vitality with Christian Yordanov's program. Learn more and book a free intro call here (mention FKN at time of booking and he will have a special gift for youhttps://christianyordanov.com/fkn/Watch The Forbidden Documentary: Occult Louisiana on Tubi: https://link.tubi.tv/pGXW6chxCJbC60 PurplePowerhttps://go.shopc60.com/FORBIDDEN10/or use coupon code knowledge10FKN Link Treehttps://linktr.ee/FKNlinksForbidden Knowledge Network https://forbiddenknowledge.news/ Sign up on Rokfin!https://rokfin.com/fknplusPodcastshttps://www.spreaker.com/show/forbiddenAvailable on all platforms Support FKN on Spreaker https://spreaker.page.link/KoPgfbEq8kcsR5oj9FKN ON Rumblehttps://rumble.com/c/FKNpGet Cory Hughes Book!https://www.buymeacoffee.com/jfkbookhttps://www.amazon.com/Warning-History-Cory-Hughes/dp/B0CL14VQY6/ref=mp_s_a_1_1?crid=72HEFZQA7TAP&keywords=a+warning+from+history+cory+hughes&qid=1698861279&sprefix=a+warning+fro%2Caps%2C121&sr=8-1https://coryhughes.org/Johnny Larson's artworkhttps://www.patreon.com/JohnnyLarsonYouTube https://youtube.com/@fknclipspBecome Self-Sufficient With A Food Forest!!https://foodforestabundance.com/get-started/?ref=CHRISTOPHERMATHUse coupon code: FORBIDDEN for discountsThe FKN Store!https://www.fknstore.net/Our Facebook pageshttps://www.facebook.com/forbiddenknowledgenewsconspiracy/https://www.facebook.com/FKNNetwork/Instagram @forbiddenknowledgenews1@forbiddenknowledgenetworkXhttps://x.com/ForbiddenKnow10?t=uO5AqEtDuHdF9fXYtCUtfw&s=09Email meforbiddenknowledgenews@gmail.comsome music thanks to:https://www.bensound.com/Become a supporter of this podcast: https://www.spreaker.com/podcast/forbidden-knowledge-news--3589233/support.
Max Lebow joins us for a thrilling chat about the real life conspiracy story of being hacked and tracked that is actually still unfolding with the Chinese Gov, the FBI and Max. We chat about The Final War, demoralisation, connection with other humans, following the Rabbit, therapy, managing info on Human Resources, MK Ultra, Conspiracies and discernment, Mabus, the THREE books, blue tooth, faraday bags, targeted individuals, Mr. Robot, Q, and interacting with tech in the vaccines. In the second half we talk about who 'they' are, the inherent war, the mob example, destroy to create, the Tower of Babel, dream hacking, the PLA, the dissident thing, when the call came from the FBI, the moment it became a podcast, NSA and FOIA's, the rogue tech billionaire, contact tracing, social credit, blue beam, ai summoning the demon, the risk of EMP's, and the controlled op narrative. Check out his unique and fascinating podcast here: https://linktr.ee/thefinalwar To gain access to the second half of show and our Plus feed for audio and podcast please clink the link http://www.grimericaoutlawed.ca/support. For second half of video (when applicable and audio) go to our Substack and Subscribe. https://grimericaoutlawed.substack.com/ or to our Locals https://grimericaoutlawed.locals.com/ or Rokfin www.Rokfin.com/Grimerica Patreon https://www.patreon.com/grimericaoutlawed Support the show directly: https://grimerica.ca/support-2/ Outlawed Canadians YouTube Channel: https://www.youtube.com/@OutlawedCanadians Our Adultbrain Audiobook Podcast and Website: www.adultbrain.ca Our Audiobook Youtube Channel: https://www.youtube.com/@adultbrainaudiobookpublishing/videos Darren's book www.acanadianshame.ca Check out our next trip/conference/meetup - Contact at the Cabin www.contactatthecabin.com Other affiliated shows: www.grimerica.ca The OG Grimerica Show www.Rokfin.com/Grimerica Our channel on free speech Rokfin Join the chat / hangout with a bunch of fellow Grimericans Https://t.me.grimerica https://www.guilded.gg/chat/b7af7266-771d-427f-978c-872a7962a6c2?messageId=c1e1c7cd-c6e9-4eaf-abc9-e6ec0be89ff3 Leave a review on iTunes and/or Stitcher: https://itunes.apple.com/ca/podcast/grimerica-outlawed http://www.stitcher.com/podcast/grimerica-outlawed Sign up for our newsletter http://www.grimerica.ca/news SPAM Graham = and send him your synchronicities, feedback, strange experiences and psychedelic trip reports!! graham@grimerica.com InstaGRAM https://www.instagram.com/the_grimerica_show_podcast/ Purchase swag, with partial proceeds donated to the show www.grimerica.ca/swag Send us a postcard or letter http://www.grimerica.ca/contact/ ART - Napolean Duheme's site http://www.lostbreadcomic.com/ MUSIC Tru Northperception, Felix's Site sirfelix.bandcamp.com
What will cost the global economy $20 trillion come 2026? In this latest Debrief, hear from author and famed security expert: Eric O'Neill. Eric discusses with Morgan Childs the growing hotbeds for cyber espionage, crime and warfare in the world right now, their consequences. Crucially, they also discuss how individuals and companies alike can safeguard now, to prevent catastrophe moving forward. From SPYSCAPE, the HQ of secrets. A Cup And Nuzzle production. Series producer: Joe Foley. Produced by Morgan Childs. Learn more about your ad choices. Visit megaphone.fm/adchoices
The evolution of tattooing has been characterized by significant changes in techniques, styles, and the overall perception of the craft. Host Aaron Della Vedova sits down with 'the crazy Germans' Marcus Giuliano Stolz and Philip Trier to share their unique journeys into tattooing, emphasizing the importance of traditional apprenticeship methods in skill development and fostering respect within the industry. Aaron and his guests dive into the ever-evolving landscape of technology and art, discussing the rapid pace of innovation and its implications for the future. Aaron emphasizes the importance of understanding global perspectives, particularly in the tattooing community, and expresses excitement about exploring tattoo culture from different parts of the world, specifically Germany. Tune in for an insightful conversation that bridges art, technology, and cultural exchange! Chat Breakdown: 00:01:44 - Exploring Tattooing in Germany 00:03:19 - Marcus' Tattoo Journey 00:11:14 - The Importance of Humility in Tattooing 00:13:07 - Philip's Path to Tattooing 00:16:26 - Self-Taught Tattooing 00:19:01 - Transitioning to Full-Time Tattooing 00:21:38 - Work Ethic in Tattooing 00:24:02 - The Spiritual Journey of Tattooing 00:27:03 - Balancing Perfectionism and Acceptance 00:29:01 - The Reality of a Tattoo Artist's Life 00:36:10 - Authenticity in the Tattoo Industry 00:41:40 - The Importance of Client Respect 00:42:31 - Experimenting with Anesthesia Tattoos 00:46:19 Social Media's Impact on Tattooing 01:04:58 Value of Handmade Art 01:10:00 Future of Cyber Warfare 01:17:48 Ink Regulations in Europe 01:24:59 Colorful Tattoos in Germany 01:29:11 Giving Back to the Tattoo Industry 1:30:45 The Impact of Mindfulness Quotes: "Making needles was its own art form." "We're lucky to have touched that era of tattooing." "In Germany, it's like, when you say I want to be an artist, everybody's shaking their head and that you got to do something serious." "Every minute of tattooing I did in my life is just worth it." "The ones that will succeed in tattooing are the ones that have the talent, the work ethic." "Instagram can't save your ass." "I've always had the opinion that I'm here to be of service, right? I'm not here to decide what your journey is like." "The cat is out of the bag, you cannot put it back in, so you have now cards with which you have to play, you know, that's it." Stay Connected: Connect. with Philipp: https://www.instagram.com/loccomotivetattoos Connect with Marcus: https://www.instagram.com/marcus_giuliano_stolz_tattoo Connect with Aaron: Website: http://www.chatsandtatts.com Tik Tok: https://www.tiktok.com/@chatsandtatts IG: http://www.instagram.com/chatsandtatts Chats & Tatts YouTube: https://www.youtube.com/c/chatsandtatts Aaron IG: http://www.instagram.com/aarondellavedova Guru Tattoo: http://www.Gurutattoo.com
A short podcast updating listeners on the security news of the last few days, as prepared by Catalin Cimpanu and read by Claire Aird. You can find the newsletter version of this podcast here. Show notes Risky Biz News: EU adopts new sanctions framework to cover Russia's cyber warfare and disinformation
The Chinese Communist Party (CCP) aims to “reintegrate Taiwan,” effectively stripping the Taiwanese people of their de facto independence. Achieving this takeover with minimal military action and limited long-term damage to Taiwan's infrastructure and economy would offer the CCP substantial economic, diplomatic, and military advantages. A well-executed, well-resourced, and well-timed cyber-enabled economic coercion campaign could provide the CCP with such an opportunity.To explore these threats, a delegation of FDD experts recently visited Taiwan to conduct war games and tabletop exercises (TTXs). These simulations were designed to evaluate the most salient and dangerous threat scenarios posed by the CCP to the Taiwanese people. The TTX involved 20 participants, primarily from Taiwanese banking and finance sectors, who simulated the roles of senior policymakers in Taiwan, the United States, and China. They assessed the most likely and perilous actions the CCP could take to isolate and coerce Taiwan short of outright warThe TTX produced several key recommendations to enhance economic, cyber, and societal resilience, and offered insights into how the United States and its allies can support Taiwan in its struggle for autonomy. To discuss these findings, FDD's Craig Singleton and RADM (Ret.) Mark Montgomery are joined by Ti-Chen Chen of the Taiwan Academy of Banking and Finance and Ben Jensen of the Center for Strategic and International Studies. Lili Pike of Foreign Policy will moderate the discussion and FDD Founder and President Cliff May, who headed the delegation to Taiwan, will deliver introductory remarks.For more, check out: fdd.org/events/2024/10/04/targeting-taiwan-beijings-playbook-for-economic-and-cyber-warfare/
In this episode of The President's Daily Brief: • A significant escalation of hostilities in Northern Israel as Hezbollah reportedly fires a ballistic missile at the Tel Aviv-area headquarters of Israel's spy agency, Mossad. This marks the first-ever missile attack on the country's commercial capital. • Alarming reports suggest Russia is collaborating with China to develop long-range attack drones for the ongoing war in Ukraine. Documents reviewed by Reuters point to this covert weapons program enhancing Russia's military capabilities. • Sweden's security service accuses Iranian intelligence of orchestrating a cyber-attack that led to 15,000 revenge messages being sent after Quran-burning protests in the country. • And in today's Back of the Brief: An update on would-be assassin Ryan Routh as federal prosecutors officially charge him with attempting to assassinate former President Trump. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. Email: PDB@TheFirstTV.com ☕ Blackout Coffee: https://www.blackoutcoffee.com/PDB Learn more about your ad choices. Visit megaphone.fm/adchoices
Barak Gonen, a senior lecturer in the cybersecurity program at the Jerusalem College of Technology speaks to KAN reporter Naomi Segal about the coordinated communication device attack in Lebanon, and what it means for cyber telecommunications warfare. (Photo: Associated Press)See omnystudio.com/listener for privacy information.
Israel bombs southern Lebanon and said it had thwarted an Iran-backed assassination plot. A second round of attacks in Lebanon saw hand-held radios used by Hezbollah detonated after similar explosions of the group's pagers a day earlier. We look at the Israeli military's secretive, cyber warfare group – Unit 8200. And what the U.S. Federal Reserve's big rate cut will mean for you, and for the U.S. election. Sign up for the Reuters Econ World newsletter here. Listen to the Reuters Econ World podcast here. Find the Recommended Read here. Visit the Thomson Reuters Privacy Statement for information on our privacy and data protection practices. You may also visit megaphone.fm/adchoices to opt out of targeted advertising. Learn more about your ad choices. Visit megaphone.fm/adchoices
Spheres Influential China Iran RussiaThe Ochelli Effect 9-18-2024 Larry HancockWhat is Cyber Warfare coming to? Keeping the American Public at each others throats is priority One in this age of influence. Author Larry Hancock talked with Chuck about the latest efforts to create chaos by the usual suspects in the modern global game for technological supremacy. Plus the easy path to making independent media into useful idiots is pretty smooth with cash and a friendly predisposition. Mocking Bird was more hands-on than the current turn-key operation.Are we so deeply in denial that we will fight each other instead of confronting the true adversaries who are creating chaos?Creating Chaoshttps://www.orbooks.com/catalog/creating-chaos/LARRY HANCOCK:http://larry-hancock.com/https://larryhancock.wordpress.com/REFERENCE LINKS?Chinese Hackers Operate Undetected in U.S. Critical Infrastructure for Half a Decadehttps://thehackernews.com/2024/02/chinese-hackers-operate-undetected-in.htmlLocal Ohio woman posted the wild tale after hearing it from a neighbor, who heard it from a friend, who heard it from their daughterhttps://www.the-independent.com/news/world/americas/us-politics/trump-haitian-eating-pets-immigrants-facebook-source-b2612208.htmlRight-wing influencers say they were dupes in an alleged Russian influence operation. They're keeping their millions, for now https://www.cnn.com/2024/09/13/media/right-wing-media-influencers-tenet-russian-money/index.htmlUS FBI disrupts second Chinese hacking group, director sayshttps://www.reuters.com/technology/cybersecurity/us-fbi-says-it-has-struck-second-chinese-hacking-group-2024-09-18/Babies reacting to dancing cactushttps://www.instagram.com/reel/C9ibQkBNZ-u/?igsh=bjdtMGpuYXBnZTczKeep Ochelli.com and Chuck Goinghttps://www.paypal.com/paypalme/ochelliChuck is the in-person MC and Larry will present remotelyNOVEMBER IN DALLAS 2024JFK Lancer Conference InformationNovember 22-24 2024 Virtual Tickets starting at 74.99In-Person Tickets start at 144.99Student Price is 39.99, must show proof of being a studentUse code Ochelli10 for 10% off your ticketsOn sale at assassinationconference.comDISCOUNT Tickets & Packages + BE Counted as an EFFECTERUse code Ochelli10 for 10% off your ticketDates: November 22nd-24thHotel: Dallas Marriott DowntownRoom prices starting at $169 per nightTo book a room call Marriott Reservations at 1 (800) 228-9290 or (214) 979-9000 and mention the November in Dallas Conference Group RateUse code Ochelli10 for 10% off your ticketIf you would like assistance finding discount flights to the conference or activities for your spouse to do in Dallas they can reach out to Gabby's Getaway Adventures through Facebook or email gabbiesgetawayadventure@gmail.com BE THE EFFECT LIVE Shows and 24/7 Online RadioListen/Chat on the Sitehttps://ochelli.com/listen-live/TuneInhttp://tun.in/sfxkxAPPLEhttps://music.apple.com/us/station/ochelli-com/ra.1461174708Ochelli Link Treehttps://linktr.ee/chuckochelli
September is National Preparedness Month. I'm sure you are prepared with food storage, water storage, ammo storage etc. Have you thought about a cyber attack? What about your bank accounts? Retirement accounts? How are you protecting yourself in a digital era? Who's Jimmy Graham? Jimmy spent over 15 years in the US Navy SEAL Teams earning the rank of Chief Petty Officer (E7). During that time, he earned certifications as a Sniper, Joint Tactical Air Controller, Range Safety Officer for Live Fire, Dynamic Movement and Master Training Specialist. He also served for 7 years as an Operator and Lead Instructor for an Elite Federal Government Protective Detail for High-Risk and Critical environments, to include; Kirkuk, Iraq, Kabul, Afghanistan, Beirut, Lebanon and Benghazi, Libya. During this time he earned his certification for Federal Firearms Instructor, Simunition Scenario Qualified Instructor and Certified Skills Facilitator. Jimmy has trained law enforcement on the Federal, State, and Local levels as well as Fire Department, EMS and Dispatch personnel. His passion is to train communities across the nation in order to enhance their level of readiness in response to active shooter situations. Make sure you subscribe and stay tuned to everything we are doing. Want to get more training? - https://ableshepherd.com/ Need support? https://able-nation.org/ Follow us on: Facebook - https://www.facebook.com/ableshepherd Instagram - https://www.instagram.com/ableshepherd/ Youtube - https://www.youtube.com/@ableshepherd
Three Buddy Problem - Episode 11: Russia's notorious GRU Unit 29155 (previously tied to assassinations, poisonings and coup attempts) now blamed for destructive cyberattacks for sabotage; FBI and DOJ take down 'Doppelganger' network spreading Russian propaganda; CISA's budget, staff, advisories and YARA rules; Influence Operations 2.0; prolific Chinese hackers and global bug-disclosure implications; North Korean hacking capabilities and 0day expertise. Cast: Juan Andres Guerrero-Saade (https://x.com/juanandres_gs)(SentinelLabs), Costin Raiu (https://x.com/craiu) (Art of Noh), Ryan Naraine (https://x.com/ryanaraine) (SecurityWeek)
In this episode of the Global Risk Community podcast, we delve into the pressing topic of Quantum Risk with expert David Carvalho, founder of Naoris Protocol. With over 20 years of experience in cyber security and as an ethical hacker, David discusses the imminent threat of quantum computing to global critical infrastructure. We discussed blockchain-based solutions for trust and transparency, and the development of post-quantum cryptography strategies. If you want to be our guest or suggest a guest, send your email to info@globalriskconsult.com with the subject "Podcast Guest Inquiry." Join us as we explore the future of risk management, cyber security, and sustainability with industry leaders like David Carvalho.
Guest: ✨ Lennart Maschmeyer, Senior Researcher at Center for Security Studies (CSS) at ETH Zurich [@CSS_ETHZurich]On LinkedIn | https://www.linkedin.com/in/lennartmaschmeyer/____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak
Welcome to the Social-Engineer Podcast: The SE Etc. Series. This series will be hosted by Chris Hadnagy, CEO of Social-Engineer LLC, and The Innocent Lives Foundation, as well as Social-Engineer.Org and The Institute for Social Engineering. Join Chris as he discusses topics and news pertaining to the world of Social Engineering. [July 22, 2024] 00:00 - Intro 00:22 - Intro Links - Social-Engineer.com - http://www.social-engineer.com/ - Managed Voice Phishing - https://www.social-engineer.com/services/vishing-service/ - Managed Email Phishing - https://www.social-engineer.com/services/se-phishing-service/ - Adversarial Simulations - https://www.social-engineer.com/services/social-engineering-penetration-test/ - Social-Engineer channel on SLACK - https://social-engineering-hq.slack.com/ssb - CLUTCH - http://www.pro-rock.com/ - innocentlivesfoundation.org - http://www.innocentlivesfoundation.org/ 03:28 - Story 1: Dynamic Phishing Link Attack 05:07 - Story 2: Crown Hack 06:12 - Story 3: Small Town Scam 07:06 - What Can Be Done 10:42 - Wrap Up & Outro - www.social-engineer.com - www.innocentlivesfoundation.org Find us online - Chris Hadnagy - Twitter: @humanhacker - LinkedIn: linkedin.com/in/christopherhadnagy
In this week's MBA Admissions podcast we began by discussing the activity on MBA LiveWire. With most top MBA programs finalizing their incoming classes, we are seeing more MBA programs reducing the size of their wait lists ahead of the beginning of their programs. We then discussed Clear Admit's MBA admissions book, authored by Alex, which is freely available on the Clear Admit site: https://www.clearadmit.com/products/admissions-books/ This book will provide MBA candidates a comprehensive understanding of the MBA admissions process, and enable candidates to really determine the best way to present their candidacy. It is also an easy and fast read. Graham highlighted the upcoming summer application series that Clear Admit is hosting, which began last Wednesday to great success in terms of attendance and content; two MBA programs announced their new MBA admissions essays during this first session. This Wednesday, July 17, is our second session and we will hear and learn from Dartmouth / Tuck, Berkeley / Haas, UNC / Kenan Flagler, Texas / McCombs, and Washington / Foster. Signups are here: https://www.bit.ly/summeressays Graham noted a recently published admissions tip focused on GMAC's common letter of recommendation. For candidates applying to multiple programs, they will likely need to use this recommendation format for at least some of those programs. Graham then mentioned a unique full tuition scholarship offered by HEC Paris. Graham then shared tidbits from four recently published Adcom Q&As, from Columbia, CMU / Tepper, Washington / Foster and Florida / Warrington. For this week, for the candidate profile review portion of the show, Alex selected three ApplyWire entries. This week's first MBA admissions candidate is a military candidate who has worked in cyber warfare, and has a masters degree in computer science. They are looking to use the MBA to transition into the finance sector and investment banking. This week's second MBA candidate is also from the military, and is applying for their MBA after also considering going to law school. They also have a super GRE of 333, and very interesting experiences in the military in special operations. The final MBA candidate for this week is originally from Tajikistan, and she's worked and been educated in several countries including Russia and Germany. We think adcom will really like her profile, but may have concerns with potentially weaker quant skills, and fuzzy post-MBA goals. This episode was recorded in Paris, France and Cornwall, England. It was produced and engineered by the fabulous Dennis Crowley in Philadelphia, USA. Thanks to all of you who've been joining us and please remember to rate and review this show wherever you listen!
Cognitive warfare is no longer science fiction – it is a fact and anyone, whether they are civilians or military, are potential targets. The war for the mind is not just a clever euphemism, it is a fact and it is a battlefield that can be entered in various forms such as neurolinguistic programming, electronics, and chemicals. The military concept now is to treat “cyber” as a place, not a mission. Cyberwarfare relates to fifth-generation warfare, but transcends and expands that model. NATO Allied Command defines cognitive warfare as including, “activities conducted in synchronization with other instruments of power to affect attitudes and behavior by influencing, protecting, or disrupting individual and group cognition to gain an advantage over an adversary.” Tonight on Ground Zero (7-10 pm, pacific time) Clyde Lewis talks with military analyst and writer, Sean Patrick Hazlett about OMEGA POINT – THE ADVENT OF COGNITIVE WARFARE. Listen Live: https://groundzero.radio Archived Shows: https://aftermath.media
In today's episode, we're joined by Jersey Jerry to discuss the intricate world of cyber security and cyber warfare. Join us as we explore the evolving landscape of digital threats, from ransomware attacks to state-sponsored cyber espionage. Learn how governments, businesses, and individuals can protect their digital assets and stay ahead in the ongoing battle for cyber supremacy. From encryption to threat intelligence, this episode offers insights into the ever-present dangers lurking in the virtual realm and the measures needed to mitigate them. Tune in to stay informed and fortified in the face of today's cyber challenges. (00:05:27) People are squatting in Gordon Ramsay's pub (00:12:46) Logan Paul (00:15:35) Bryan Johnson - guy who wants to live forever (00:30:18) Billy's press conference (00:40:20) Cyber WarfareYou can find every episode of this show on Apple Podcasts, Spotify or YouTube. Prime Members can listen ad-free on Amazon Music. For more, visit barstool.link/macrodosing
A Russian hacker group boldly targets critical infrastructure. The Change Healthcare ransomware attack is projected to cost over a billion dollars. Three hundred bucks is the going rate for a SIM swap. PuTTY potentially reveals private keys. Cisco Talos reports a surge in brute-force attacks. Ivanti updates its MDM product. Omni Hotels & Resorts confirm a data breach. Financially motivated hackers target Businesses in Latin America with steganography. A prolific cryptojacker faces decades in prison. On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey. The ransomware equivalent of a Saturday night special. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest On our Learning Layer segment, host Sam Meisenberg and Joe Carrigan continue their discussion of Joe's ISC2 CISSP certification journey using N2K's comprehensive CISSP training course, CISSP practice test, and CISSP practice labs. Sam and Joe discuss content and study strategies for Domain 2, Asset Security. Resources: Domain 2, Asset Security Identify and securely provision information assets, establish handling requirements, manage the data lifecycle, and apply data security controls to comply with applicable laws. 2.1 Identify and classify information and assets 2.2 Establish information and asset handling requirements 2.3 Provision resources securely 2.4 Manage data lifecycle 2.5 Ensure appropriate asset retention (e.g., End-of-Life (EOL), End-of-Support (EOS)) 2.6 Determine data security controls and compliance requirements Are you studying for the CISSP exam, considering taking the test soon, or did you have an unsuccessful exam experience? Here are some CISSP exam pitfalls to avoid so that you're confident and successful on exam day. Selected Reading Hackers Linked to Russia's Military Claim Credit for Sabotaging US Water Utilities (WIRED) T-Mobile, Verizon workers get texts offering $300 for SIM swaps (Bleeping Computer) PuTTY SSH client flaw allows recovery of cryptographic private keys (Bleeping Computer) Large-scale brute-force activity targeting VPNs, SSH services with commonly used login credentials (Talos Intelligence) Ivanti Patches Two Critical Avalanche Flaws in Major Update (Infosecurity Magazine) Omni Hotels confirms data compromise in apparent ransomware attack (SC Media) Steganography Campaign Targets Global Enterprises (GovInfo Security) Nebraska man allegedly defrauded cloud providers of millions via cryptojacking (The Record) Ransomware attack has cost UnitedHealth $872 million; total expected to surpass $1 billion (The Record) ‘Junk gun' ransomware: Peashooters can still pack a punch (Sophos News) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © 2023 N2K Networks, Inc.
Donald Trump makes bond in New York City. Joe Biden introduces the Oyster Bunnies! The Biden White House is mad at those who are mad about Easter being co-opted by "Transgender Day of Visibility." The United States might be about to run out of bombs. The FBI has abused the Fourth Amendment more than 278,000 times? Squatters now have more rights than American citizens. Woke Disney strikes again! Diplomatic blackmail: The president of Mexico wants $20 billion just to talk with Biden. Guest Lara Logan discusses the new information around the destruction of the Francis Scott Key Bridge. Learn more about your ad choices. Visit megaphone.fm/adchoices