Attack on a computer system
POPULARITY
Categories
Watch The X22 Report On Video No videos found (function(w,d,s,i){w.ldAdInit=w.ldAdInit||[];w.ldAdInit.push({slot:17532056201798502,size:[0, 0],id:"ld-9437-3289"});if(!d.getElementById(i)){var j=d.createElement(s),p=d.getElementsByTagName(s)[0];j.async=true;j.src="https://cdn2.decide.dev/_js/ajs.js";j.id=i;p.parentNode.insertBefore(j,p);}})(window,document,"script","ld-ajs");pt> Click On Picture To See Larger Picture Countries limited their CO2 production to save the planet, all they did was. shift everything to China, Trump is now shutting down Obama's climate programs. Trump's economy explodes and the D's/fake news/Fed don't know how to counter the narrative, they tried but it failing. Trump is dividing the Fed and setting everything up for the new economy. Hawaii was going to get hit with a Tsunami because of a major earthquake. Did Trump post Tsunami to let us know that a massive amount of info is going to be dropped? Different countries and the US have have been hit by a cyber attack. The fake news/D's are trying their best to spin the Russia evidence and they are losing to the facts. Did Trump trap Obama with Presidential immunity? Economy https://twitter.com/Geiger_Capital/status/1950545248825798729 Trump Axes Obama's Endangerment Finding During his two terms, Obama enacted several policies that subsidized uncompetitive, unneeded, and unwanted green energy while placing onerous regulations on fossil fuels. During his first term, Trump tried to reverse much of the Obama administration's anti-fossil fuel actions. However, there was only so much that could be done given the constant distractions Trump faced throughout his first term. One of the most consequential environmental regulations that Trump was unable to eliminate was Obama's “Endangerment Finding.” Most Americans have probably never heard of the Endangerment Finding. But this obscure rule has effectively allowed the federal government to label carbon dioxide a harmful “pollutant” that can be regulated under the Clean Air Act. Unfortunately, a U.S. Supreme Court decision allowed the Obama administration to enact the rule in the first place. In 2007, the U.S. Supreme Court ruled in Massachusetts v. EPA that “greenhouse gases are air pollutants covered by the Clean Air Act and that EPA must determine whether or not emissions of greenhouse gases from new motor vehicles cause or contribute to air pollution which may reasonably be anticipated to endanger public health or welfare.” Although this is the standard reading of the ruling, it is not totally accurate. According to the majority opinion, written by former Justice John Paul Stevens, “We need not and do not reach the question whether on remand EPA must make an endangerment finding, or whether policy concerns can inform EPA's actions in the event that it makes such a finding. We hold only that EPA must ground its reasons for action or inaction in the statute.” So, the 2007 decision did not determine that carbon dioxide is a harmful air pollutant. Rather, it granted that the EPA has the authority to determine if carbon dioxide is a harmful greenhouse gas based solely upon unequivocal data. Trump's EPA Administrator, Lee Zeldin, has made rescinding the Endangerment Finding a priority. “A lot of people are out there listening, they might not know what the endangerment finding is. If you ask congressional Democrats to describe what it is, the left would say that it means that carbon dioxide is a pollutant, carbon dioxide is an endangerment to human health. They might say methane is a pollutant, methane is an endangerment to human health,” Zeldin said on the Ruthless podcast. “That's an oversimplified, I would say inaccurate way to describe it,” Zeldin added. “The Obama administration said that carbon dioxide, when mixed with a bunch of other well-mixed gases, greenhouse gases, that it contributes to climate change. How much?
St. Paul has declared a state of emergency over what appears to be a massive cyberattack. The city is working with the Minnesota National Guard, the FBI and two private cybersecurity firms to respond to the cyberattack, which is disrupting city services including payment systems, libraries, recreation centers and city hall. For more on how cyberattacks like this one occur and the issues they can cause, Minnesota Now guest host Chris Farrell talks with Faisel Kaleem, director of cybersecurity and cyber operations programs at Metro State University.
Threat analysis regarding St Pauls Cyber Attacks with expert Jameson Ritter and Liz Collin from Alphanews discussing ICE detainers, MPLS crime and more.
Jon kicks off the show with all the latest news from over night. Plus, Sen Cory Booker rants to congress and continued examples of why the Dem polling numbers are so bad.
7-30 Adam and Jordana 9a hour
In this edition of The Naked Scientists, how is science helping to shape the future of warfare? Like this podcast? Please help us by supporting the Naked Scientists
Gov. Tim Walz activated the National Guard today for cyber protection assistance in response to a cyberattack on the city of St. Paul. Parts of western Minnesota -- including Stevens County -- experienced flash flooding last night as another round of severe storms moved across the region. Those stories and more in today's evening update. Hosted by Jacob Aloi. Music by Gary Meister.
It is never a fun day when one of the busiest cities in Minnesota faces a cyberattack so we turned to probably the best expert to help ‘decrypt' and break it down for us - Kate Kuehn is Vice President of World Wide Technology, she is the leading expert in Information Security Risk and talks us through how this could happen and keeps happening on such a large scale!
We chat with an expert on the cyberattack in Saint Paul from today - Kate Keuhn joins Jason to explain how this happened! Then we chat with Matthew Kazama of TokiDoki Wings for DeRusha Eats!
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Keywordscybersecurity, military transition, Tampa cybersecurity, mentorship, cyber law, incident response, private sector, cybersecurity misconceptions, legal perspectives, cybersecurity growth SummaryIn this episode of No Password Required, hosts Jack Clabby and Kayley Melton sit down with Kurt Sanger — former Deputy General Counsel at U.S. Cyber Command — to talk about the evolving world of cyber law, the wild ride from government service to private sector strategy, and what keeps him grounded in a field that's constantly shifting. Kurt dives into the fast-growing cybersecurity scene in Tampa, the power of mentorship, and why people still get cyber law so wrong. Plus: insights on responding to incidents under pressure and what role the government should (and shouldn't) play in the digital fight. TakeawaysKurt emphasizes that newcomers to cybersecurity are not as far behind as they think.The transition from military to private sector can be challenging but rewarding.Tampa is becoming a significant hub for cybersecurity talent and companies.Understanding cybersecurity misconceptions is crucial for decision-makers.Mentorship plays a vital role in navigating career challenges in cybersecurity.Military and civilian cyber law have distinct differences in enforcement and flexibility.The stakes in private sector cybersecurity can be incredibly high for clients.Kurt's experience highlights the need for collaboration between government and private sectors.Cybersecurity is an ever-evolving field that requires continuous learning.Kurt finds excitement in helping clients during their most challenging times. Sound bites "You're only six months behind.""We're all in the same boat.""The government needs to step back." Chapters 00:00 NPR S6E7 Kurt Sanger52:53 NPR S6E7 Kurt Sanger01:45:47 Introduction to Cybersecurity Conversations01:48:22 Transitioning from Military to Private Sector Cybersecurity01:51:11 The Growth of Tampa as a Cybersecurity Hub01:54:05 Understanding Cybersecurity Misconceptions01:57:15 The Role of Mentorship in Cybersecurity Careers02:00:24 Military vs. Civilian Cybersecurity Law02:03:07 The Excitement of Cyber Command vs. Private Sector02:13:52 High Stakes in Cybersecurity for Small Organizations02:15:44 The Role of Legal Experts in Cybersecurity02:17:21 Translating Technical Jargon for Clients02:18:57 Challenges of Explaining Cyber Operations to Commanders02:22:43 Lifestyle Polygraph: Fun Questions and Insights02:23:30 The 10,000 Hour Rule in Cybersecurity02:29:34 Creative Freedom with LEGO Bricks02:31:27 Tampa's Culinary Delights and Local Favorites
If you like what you hear, please subscribe, leave us a review and tell a friend!
The How of Business - How to start, run & grow a small business.
Cybersecurity expert Nick Mullen shares how you can protect your business from cyber attacks. Small businesses are often the target for today's most dangerous cyber threats. Show Notes Page: https://www.thehowofbusiness.com/575-nick-mullen-cyber-security/ Cyberattacks are no longer just a threat to large corporations - small business owners are now the most frequent and most vulnerable targets. In this episode of The How of Business, Henry Lopez speaks with cybersecurity expert and Entoo Security founder Nick Mullen about how you can protect your business from cyber attacks using clear, practical, and affordable strategies. Nick breaks down the modern cyber threat landscape, including: Ransomware and extortion scams AI-powered phishing emails and voice impersonations The myth of "I'm too small to be a target" The importance of email access controls and proper backups They also explore the FTC Safeguards Rule, which now applies to many more small businesses, and what it means to be compliant. Nick emphasizes the importance of understanding where your data lives, limiting who can access it, and training your team to spot threats before they cause damage. “You might think you're too small to be a target, but $50,000 is a huge payday for a criminal overseas—and they can attack thousands of small businesses every day,” Nick warns. Whether you run a solo business or have a growing team, this episode will give you the clarity and steps you need to protect what you've worked so hard to build. Nick Mullen is the founder of N2 Security, a full-service cybersecurity firm helping small businesses including accountants, bookkeepers, and service providers meet compliance standards and avoid devastating cyberattacks. He has nearly two decades of experience in security, compliance, and governance. This episode is hosted by Henry Lopez. The How of Business podcast focuses on helping you start, run, grow and exit your small business. The How of Business is a top-rated podcast for small business owners and entrepreneurs. Find the best podcast, small business coaching, resources and trusted service partners for small business owners and entrepreneurs at our website https://TheHowOfBusiness.com
D'Zeitunge befaasse sech mat der Cyberattack, déi weider Problemer an der Kommunikatioun gewisen huet, d'Fluglotsen dreeë mat Streik wéinst geplangte virtuelle Kontrolltuerm, an eng Milliard Investitioun fir Findelausbau: dat sinn d'Sujeten an der Presserevue.
In this episode of Yet Another Value Podcast, host Andrew Walker welcomes back David Bastian of Kingdom Capital to analyze United Natural Foods Inc. (UNFI), a grocery distributor at the center of a complex turnaround story. They examine UNFI's legacy issues, including its troubled SuperValu merger, the fallout from over-earning during COVID, and a recent cyberattack. David discusses management's new strategic direction, margin normalization efforts, and the implications of UNFI's critical relationship with Whole Foods and Amazon. They also explore valuation frameworks, industry dynamics, and UNFI's potential path to sustainable earnings growth under improved leadership.______________________________________________________________________[00:00:00] Podcast and guest introduction[00:02:34] What is UNFI[00:03:45] History and UNFI challenges[00:09:24] Cyberattack and recovery[00:10:47] Impact on Whole Foods[00:14:30] Long-term EBITDA targets[00:18:37] Sell-side doubts[00:21:08] Peer margin comparisons[00:24:19] Amazon relationship[00:30:17] Margin paradox[00:34:02] Business asset value[00:40:21] Return on replacement cost[00:43:37] Inflation effects[00:45:18] Industry consolidation[00:48:58] Board ownership concerns[00:54:58] Final thoughts on UNFI[00:58:47] Simplified supplier agreements[00:59:17] Podcast close and disclaimerLinks:Yet Another Value Blog: https://www.yetanothervalueblog.com See our legal disclaimer here: https://www.yetanothervalueblog.com/p/legal-and-disclaimer
IT security breaches are on the rise in South Africa and worldwide, and with AI tools at their disposal, criminals are scaling up their attacks. With the risk of attack so high, organisations are forced to look beyond beefing up security – they must prepare for the unfortunate event where their systems are, in fact, breached. One way to do this is to learn from those organisations whose systems have been breached in the past. This episode of TechCentral's TCS+, the third in a series of three with First Distribution on how to manage cyber crises – watch episodes 1 and 2 here – sees Microsoft portfolio manager at First Distribution Kejen Pillay back to share more insight on this topic. Pillay discusses various lessons from: - The TransUnion breach of March 2022, where 5.2 million records were compromised and a US$15-million ransom demanded; - The CIPC hack of February 2024 and the media furore that ensued; and - The National Health Laboratory Services breach of June 2024. Don't miss this important discussion. TechCentral
In this episode of Unspoken Security, host AJ Nash speaks with Dr. Peter Garraghan, CEO and CTO of Mindgard. They discuss the real-world security risks of artificial intelligence. Peter starts with a simple point: AI is just software, and software is easy to break. He urges businesses using AI to step back and truly understand its vulnerabilities.Peter draws parallels between the current AI boom and past technology cycles like cloud computing. While AI feels revolutionary, the security risks are not new. Threats like data poisoning and prompt injection are modern versions of classic cybersecurity problems. The danger is that AI's human-like interface makes it easy to anthropomorphize, causing users to overlook fundamental security flaws.To manage these risks, Peter advises companies to treat AI like any other software. This means applying the same rigorous security controls, testing protocols, and incident response playbooks. Instead of creating a separate process for AI, organizations should find the gaps in their current security posture and update them. This practical approach helps businesses secure AI systems effectively.Send us a textSupport the show
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Stephen Grootes speaks to Jan Vermeulen, Editor at MyBroadband, about a widespread cybersecurity breach impacting several South African institutions. The Money Show is a podcast hosted by well-known journalist and radio presenter, Stephen Grootes. He explores the latest economic trends, business developments, investment opportunities, and personal finance strategies. Each episode features engaging conversations with top newsmakers, industry experts, financial advisors, entrepreneurs, and politicians, offering you thought-provoking insights to navigate the ever-changing financial landscape. Thank you for listening to a podcast from The Money Show Listen live Primedia+ weekdays from 18:00 and 20:00 (SA Time) to The Money Show with Stephen Grootes broadcast on 702 https://buff.ly/gk3y0Kj and CapeTalk https://buff.ly/NnFM3Nk For more from the show, go to https://buff.ly/7QpH0jY or find all the catch-up podcasts here https://buff.ly/PlhvUVe Subscribe to The Money Show Daily Newsletter and the Weekly Business Wrap here https://buff.ly/v5mfetc The Money Show is brought to you by Absa Follow us on social media 702 on Facebook: https://www.facebook.com/TalkRadio702 702 on TikTok: https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/CapeTalk 702 on YouTube: https://www.youtube.com/@radio702 CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/Radio702 CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567 See omnystudio.com/listener for privacy information.
A massive global cyberattack targeting Microsoft software has had serious ripple effects here in Quebec. The provincial government has confirmed that dozens of its departments and agencies have been affected—including those dealing with healthcare, taxation, immigration, and more. Tech analyst Carmi Levy talks to Ken Connors.
MONEY FM 89.3 - Prime Time with Howie Lim, Bernard Lim & Finance Presenter JP Ong
Mantua Cybersecurity is Singapore’s premier provider of advanced cybersecurity solutions, dedicated to helping businesses across Southeast Asia stay secure in an increasingly complex digital landscape. Founded with deep roots in Singapore, Mantua quickly earned a reputation for delivering innovative, reliable services tailored to the region’s unique cybersecurity needs. Following a temporary consolidation to its Philippine headquarters during the COVID-19 pandemic, Mantua invested heavily in expanding its capabilities and service portfolio. Today, Mantua offers a comprehensive suite of cybersecurity services, including threat intelligence, security operations centre (SOC) services, managed detection and response (MDR), vulnerability assessments, incident response, and strategic consulting. On The Right Business, Hongbin Jeong speaks to Cel Mantua, Co-Founder & Managing Director, Mantua, to find out more.See omnystudio.com/listener for privacy information.
In this Dialogue episode of The Synopsis, we discuss Evolution's 2Q25 earnings. We also give an overview of regulated vs unregulated markets and different complexities of regulation and solving the Asia Cyber attacks.. Evolution 2Q25 Business Update This update quoted several expert call transcripts from Alpha Sense. You can get a free trial to read them for yourselve through this link. ~*~ For full access to all of our updates and in-depth research reports become a Speedwell Member here. Please reach out to info@speedwellresearch.com if you need help getting us to become an approved research vendor in order to expense it. -*-*-*-*-*-*-*-*-*-*-*-*-*-*- Show Notes (0:00) — High Level Earnings Review (19:31) — Overview of Market Regulation (23:17) — UK Investigation and EU Ring-Fencing (29:19) — Asia Market Regulation and Cyber Attacks -*-*-*-*-*-*-*-*-*-*-*-*-*-*- For full access to all of our updates and in-depth research reports, become a Speedwell Member here. Please reach out to info@speedwellresearch.com if you need help getting us to become an approved research vendor in order to expense it. *-*-*- Follow Us: Twitter: @Speedwell_LLC Threads: @speedwell_research Email us at info@speedwellresearch.com for any questions, comments, or feedback. -*-*-*-*-*-*-*-*-*-*- Disclaimer Nothing in this podcast is investment advice nor should be construed as such. Contributors to the podcast may own securities discussed. Furthermore, accounts contributors advise on may also have positions in companies discussed. At the time of publication, one or more contributors to this report has a position in Evolution. Furthermore, accounts one or more contributors advise on may also have a position in Evolution. This may change without notice. Please see our full disclaimers here: https://speedwellresearch.com/disclaimer/
South Korea and China have a complex relationship characterized by economic interdependence, strategic competition, and regional security concerns. Navigating this delicate balance has been a defining challenge for every South Korean president. Newly elected President Lee Jae Myung has assumed power at a time of increasing US-China strategic competition as well as uncertain global supply chains and growing threat from North Korea. Could this new administration mark a shift in Seoul's approach to Beijing? Or will President Lee maintain strategies similar to that of President Yoon?To discuss ROK-China relations, and President Lee's approach to this intricate issue, we are joined on the podcast today by Dr. Ramon Pacheco-Pardo. He is a professor of international relations at King's College London and the KF-VUB Korea Chair at the Center for Security, Diplomacy and Strategy in the Brussels School of Governance. He is also an adjunct fellow with the Korea Chair at the Center for Strategic and International Studies, and the author of several books on the domestic affairs and foreign policy of South and North Korea. Timestamps[00:00] Start[01:44] “[P]ragmatic diplomacy centered on national interests”[05:06] State of Play for Sino-South Korean Relations[09:56] Balancing Between the United States and China[14:47] China Taking Advantage of US-ROK Frictions [19:03] Economic Interdependence as a Leverage[25:39] Xi Jinping Attending APEC South Korea 2025[31:11] American Pressure on Allies to Protect Taiwan
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Day 1,244.Today, after another sleepless night for millions in Kyiv, we bring in experts to look at the shifting strategy of the Russian intelligence services, and hear a firsthand account of Putin's seizure of power and the complicity of Russia's elite. How did a fledgling democracy die?Contributors:Francis Dearnley (Executive Editor for Audio). @FrancisDearnley on X.Roland Oliphant (Senior Foreign Correspondant). @RolandOliphant on X.With thanks to Irina Borogan (investigative journalist) @irinaborogan on X and Andrei Soldatov (investigative journalist). @AndreiSoldatov on X.Content Referenced:‘Our Dear Friends in Moscow: The Inside Story of a Broken Generation' by Andrei Soldatov & Irina Borogan:https://www.amazon.co.uk/Our-Dear-Friends-Moscow-Generation/dp/1541704452 Russia strikes Kyiv metro entrance as civilians shelter inside (The Telegraph):https://www.telegraph.co.uk/world-news/2025/07/21/russia-strikes-kyiv-lukianivska-metro-bomb-shelters-ukraine/ Texas man joins Russian army to “earn respect,” gets lied to as he is sent to front line instead of welding job (Euromaidan Press):https://euromaidanpress.com/2025/07/16/texas-man-joins-russian-army-to-earn-respect-gets-lied-to-as-he-is-sent-to-front-line-instead-of-welding-job/ Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says (Kyiv Independent):https://kyivindependent.com/ukrainian-intel-hackers-hit-gazproms-network-infrastructure-sources-say-07-2025/ SIGN UP TO THE NEW ‘UKRAINE: THE LATEST' WEEKLY NEWSLETTER:https://secure.telegraph.co.uk/customer/secure/newsletter/ukraine/ Each week, Dom Nicholls and Francis Dearnley answer your questions, provide recommended reading, and give exclusive analysis and behind-the-scenes insights – plus maps of the frontlines and diagrams of weapons to complement our daily reporting. It's free for everyone, including non-subscribers.NOW AVAILABLE IN NEW LANGUAGES:The Telegraph has launched translated versions of Ukraine: The Latest in Ukrainian and Russian, making its reporting accessible to audiences on both sides of the battle lines and across the wider region, including Central Asia and the Caucasus. Just search Україна: Останні Новини (Ukr) and Украина: Последние Новости (Ru) on your on your preferred podcast app to find them. Listen here: https://linktr.ee/ukrainethelatestSubscribe: telegraph.co.uk/ukrainethelatestEmail: ukrainepod@telegraph.co.uk Hosted on Acast. See acast.com/privacy for more information.
Microsoft (MSFT) shares reached new all-time highs last week as the stock has risen 20% year to date. As the company battles active cyberattacks impacting SharePoint, Rick Ducat examines the company's chart patterns at these recent highs. Later, Tom White demonstrates an example options trade using a call butterfly. He explains the neutral to bearish tilt that is created with this particular options strategy.======== Schwab Network ========Empowering every investor and trader, every market day.Options involve risks and are not suitable for all investors. Before trading, read the Options Disclosure Document. http://bit.ly/2v9tH6DSubscribe to the Market Minute newsletter - https://schwabnetwork.com/subscribeDownload the iOS app - https://apps.apple.com/us/app/schwab-network/id1460719185Download the Amazon Fire Tv App - https://www.amazon.com/TD-Ameritrade-Network/dp/B07KRD76C7Watch on Sling - https://watch.sling.com/1/asset/191928615bd8d47686f94682aefaa007/watchWatch on Vizio - https://www.vizio.com/en/watchfreeplus-exploreWatch on DistroTV - https://www.distro.tv/live/schwab-network/Follow us on X – / schwabnetwork Follow us on Facebook – / schwabnetwork Follow us on LinkedIn - / schwab-network About Schwab Network - https://schwabnetwork.com/about
Today's episode features Box CEO Aaron Levie, who discusses how AI is transforming enterprise software and whether it's a threat or an opportunity. We also analyze Figma's highly anticipated IPO valuation with our financial columnist Anita Ramaswamy, discussing its impressive growth and the impact of AI. Finally, cybersecurity and enterprise tech reporter Aaron Holmes unpacks the recent Microsoft SharePoint hack, its implications for government and businesses, and the ongoing cybersecurity challenges for Microsoft, including how CEO Satya Nadella's pay is now linked to security improvements.Articles discussed on this episode: Figma's IPO May Be Hot, but Its Outlook Is MurkyFigma Sets Tentative IPO Pricing RangeHackers Exploit Microsoft Flaw in File-Sharing Software
Stock market update for July 21, 2025. This video is for informational purposes only and reflects the views of the host and guest, not Public Holdings or its subsidiaries. Mentions of assets are not recommendations. Investing involves risk, including loss. Past performance does not guarantee future results. For full disclosures, visit Public.com/disclosures.
Welcome to Omni Talk's Retail Daily Minute, sponsored by RetailClub and Mirakl. In today's Retail Daily Minute:Target discontinues price matching with competitors like Amazon and Walmart, citing customer behavior data and focusing on its own value proposition amid ongoing business turnaround efforts.UNFI's operations return to normal following a cyberattack that will cost the grocery distributor $350-400 million in sales, highlighting the growing cybersecurity challenges facing retail supply chains.Amazon Web Services launches an AI agent marketplace with Anthropic as a key partner, creating new distribution channels for AI-powered retail solutions and enterprise automation tools.The Retail Daily Minute has been rocketing up the Feedspot charts, so stay informed with Omni Talk's Retail Daily Minute, your source for the latest and most important retail insights. Be careful out there!
The first computer virus is believed to have been used in 1969 at the University of Washington Computer Center. A person who has never been named installed a program that came to be known as “RABBITS Virus” on one of the computers. The program began replicating itself until it overwhelmed the computer causing it to shut down. Over the years, the scale and sophistication of cyber attacks has increased and with the advent of AI, digital criminals have jumped on the AI bandwagon and become more lethal.
Why is AI failing at basic accounting tasks while claiming to outsmart PhD students? Blake and David dive into the stark reality of AI implementation in accounting, from Ramp's promising new expense management agents to QuickBooks' baffling suggestion to credit and debit the same account. You'll discover the critical security vulnerabilities in AI systems and learn why clients are increasingly using AI to fact-check their accountants' advice. Plus, get a comprehensive breakdown of the top 10 tax planning opportunities in the One Big, Beautiful Bill Act—from permanent 100% bonus depreciation to Trump accounts for children. The hosts also explore which companies will be AI's biggest losers and why the future of accounting lies in financial management, not advisory services.SponsorsOnPay - http://accountingpodcast.promo/onpayCloud Accountant Staffing - http://accountingpodcast.promo/casChapters(00:30) - The Big Beautiful Bill: Tax Provisions Overview (01:53) - AI in Accounting: RAMP's New AI Agents (02:56) - QuickBooks AI Agents: Frustrations and Feedback (06:05) - RAMP's AI Agents: Features and Benefits (14:38) - AI's Impact on Employment: Winners and Losers (20:54) - Grok 4: The Future of AI in Accounting (36:53) - Juno and Tax Prep Automation (37:52) - The Rise of AI in Cyber Attacks (38:26) - Social Engineering and AI (39:18) - Hidden AI Prompts in Academic Papers (41:25) - AI Security Risks and Internal Controls (45:45) - The Accountant's Labor Shortage (46:59) - Tax Planning Opportunities in the New Bill (56:29) - The Impact of the New Tax Bill (01:00:45) - Final Thoughts and Wrap-Up Show NotesRamp agents: Let finance teams do finance https://ramp.com/blog/ramp-agents-announcementMicrosoft shares $500M in AI savings internally days after cutting 9,000 jobshttps://techcrunch.com/2025/07/09/microsoft-shares-500m-in-ai-savings-internally-days-after-cutting-9000-jobs/Indeed, Glassdoor to lay off 1300 staff amid AI pushhttps://techcrunch.com/2025/07/11/indeed-glassdoor-to-lay-off-1300-staff/Workday Stock Takes A Hit After Piper Sandler Survey Flags AI-Driven Headwinds, But Retail's Optimistic https://stocktwits.com/news-articles/markets/equity/workday-stock-takes-a-hit-after-piper-sandler-survey-flags-ai-driven-headwinds/ch8GfqaR5kYElon Musk's xAI launches Grok 4 alongside a $300 monthly subscription https://techcrunch.com/2025/07/09/elon-musks-xai-launches-grok-4-alongside-a-300-monthly-subscription/Hidden AI prompts in academic papers spark concern about research integrity https://www.japantimes.co.jp/news/2025/07/04/japan/ai-research-prompt-injection/Tax provisions in the One Big Beautiful Bill Act https://www.journalofaccountancy.com/news/2025/jun/tax-changes-in-senate-budget-reconciliation-bill/Need CPE?Get CPE for listening to podcasts with Earmark: https://earmarkcpe.comSubscribe to the Earmark Podcast: https://podcast.earmarkcpe.comGet in TouchThanks for listening and the great reviews! We appreciate you! Follow and tweet @BlakeTOliver and @DavidLeary. Find us on Facebook and Instagram. If you like what you hear, please do us a favor and write a review on Apple Podcasts or Podchaser. Call us and leave a voicemail; maybe we'll play it on the show. DIAL (202) 695-1040.SponsorshipsAre you interested in sponsoring The Accounting Podcast? For details, read the prospectus.Need Accounting Conference Info? Check out our new website - accountingconferences.comLimited edition shirts, stickers, and other necessitiesTeePublic Store: http://cloudacctpod.link/merchSubscribeApple Podcasts: http://cloudacctpod.link/ApplePodcastsYouTube: https://www.youtube.com/@TheAccountingPodcastSpotify: http://cloudacctpod.link/SpotifyPodchaser: http://cloudacctpod.link/podchaserStitcher: http://cloudacctpod.link/StitcherOvercast: http://cloudacctpod.link/OvercastClassifiedsREFRAME 2025 - http://accountingpodcast.promo/reframe2025Want to get the word out about your newsletter, webinar, party, Facebook group, podcast, e-book, job posting, or that fancy Excel macro you just created? Let the listeners of The Accounting Podcast know by running a classified ad. Go here to create your classified ad: https://cloudacctpod.link/RunClassifiedAdTranscriptsThe full transcript for this episode is available by clicking on the Transcript tab at the top of this page
Energy Vista: A Podcast on Energy Issues, Professional and Personal Trajectories
As energy infrastructure becomes a battlefield for hybrid threats, NATO is rethinking how to defend its member states beyond traditional warfare. In this special episode, Leslie Palti-Guzman speaks with Dr. Benedetta Berti, Director of Policy Planning at NATO's Office of the Secretary General.Together, they explore: Why energy security is central to NATO's collective defense The growing threat of sabotage, cyberattacks, and underwater cable disruption Strategic vulnerabilities in energy grids, shipping routes, and military fuel logistics NATO's evolving stance on hybrid warfare and systemic challenges posed by ChinaAlso we deep-dive on NATO's deterrence strategies, and the economic upside of defense-industrial innovation.Available on Spotify, Apple Podcasts, YouTube, and all major podcast platforms.This episode was recorded on July 10, 2025
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
CISA gives one day for Citrix Bleed 2 fix Google Gemini flaw hijacks email summaries for phishing Louis Vuitton says UK customer data stolen in cyber-attack Huge thanks to our sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO. Find the stories behind the headlines at CISOseries.com.
Why does security awareness training so often fail? In this episode of Unspoken Security, host AJ Nash welcomes Living Security CEO Ashley M. Rose to discuss this common issue. They explore how compliance-driven, "check-the-box" training creates a false sense of security. This old model relies on vanity metrics and rituals instead of reducing actual human risk.Ashley presents a better way forward through human risk management. This modern strategy moves beyond simple phishing tests and integrates data from your existing security tools. It provides a full view of employee behavior to identify and address risks proactively. The goal is to make security training engaging and effective, not just another task to ignore.The conversation also covers the nuanced relationship between human risk management and insider threat programs. AJ and Ashley discuss how to empower employees and transform them from a potential liability into an organization's greatest security asset, creating a stronger, more resilient workforce.Send us a textSupport the show
Well, well, well. It's been over a year since we last visited the game! In June last year we were putting out the fire, but this week we're dealing with a frosty feline! It's a longer episode and for some reason we were very giggly and very silly when we recorded on Tuesday! Must be something in the water! But, we have the usual array of comments, minifestaytions, and shenanigans for you to listen to - and we always truly appreciate you listening! If Randy were to title this episode, he'd probably call it "Just cruising" or possibly, "Here's a song!"Today's episode looks at the madcap bluster of the overblown opener from the preposterous Jazz; "Mustapha!"NOTE: Skip forward to 30:58 if wanna get straight into the manifestations and wheel spin.The music at the end of the episode is "Scared Outta My Mind", by the brilliant Ivan Anderson, in his guise as "Cyberattack". As we were talking about St. Vincent and her innovative guitar player, I wanted to give you a listen to an artist who is similarly pushing boundaries and taking the instrument into new and interesting areas. You can listen to it here: If you want to get involved in the Kofi Klub, you can make a donation here: https://ko-fi.com/seasidepodreview and let us know which song you want us to add to the wheel! We also have a private channel in our Discord community for donors.Follow us onFacebook: @seasidepodreviewDiscord: https://discord.gg/nrzr2mQjBluesky: @seasidepodreview.bsky.socialKo-Fi: https://ko-fi.com/seasidepodreviewAlso, check out Kev's other podcastsThe Tom Petty Project: https://tompettyproject.comThe Ultimate Catalogue Clash: https://shows.acast.com/uccAnd if you want to check out Randy's music, you can find it here:https://randywoodsband.com Hosted on Acast. See acast.com/privacy for more information.
When a cyberattack hits your nonprofit, do you know what to do? Cybersecurity expert Michael Nouguier, Partner at Cybersecurity Services at Richey May, walks us through the essential steps every nonprofit must take—before, during, and after a cyber event. As host Julia Patrick notes, it's not a matter of if, but when, and being unprepared is no longer an option.From clarifying what cyber insurance actually covers to practicing realistic incident response exercises, Michael offers a pragmatic and step-by-step guide tailored for nonprofit leaders. He points out, “Failure to plan is planning to fail,” and urges organizations to move beyond hope and into action.The conversation dissects misconceptions, such as thinking IT alone can handle a breach or believing cyber insurance is a comprehensive solution. Instead, Michael recommends building internal resilience with tabletop exercises that include the board, C-suite, legal, and communications staff. These scenario-based run-throughs help teams build muscle memory and prevent panic when disaster strikes.Third-party vendors—often a hidden weak spot—are addressed in detail. Michael reminds us, “You are the trusted data collector,” meaning nonprofits must ensure their vendors share the same security culture, including notification clauses and accountability.What if the worst happens? Michael stresses calm, communication, and preservation of evidence. “Don't delete anything,” he cautions, as doing so can sabotage forensic investigations and potential fund recovery. He also reminds leaders to report incidents to local authorities and the FBI's IC3.gov, reinforcing the legal and ethical responsibility to act swiftly and transparently.Perhaps one of the most human insights is around fostering a blame-free culture. Employees fearing punishment won't report mistakes, making things worse. “Everyone—even me—has clicked a phishing link,” Michael admits, highlighting the importance of openness and psychological safety within teams.This is a call to action for NPO leaders to shift from avoidance to preparedness. Cyberattacks are not just technical disruptions—they can financially and operationally dismantle an organization. With the right mindset, strategy, and comms plan, your nonprofit can weather the storm!00:00:00 Welcome and Episode Overview 00:02:00 The Evolution of Richie May's Cybersecurity Services 00:04:00 What Cyber Insurance Really Covers 00:08:00 Third-Party Vendor Risks and Due Diligence 00:12:00 Real-World Impact of Cyberattacks on Nonprofits 00:15:00 Why Response Planning Beats Hoping for the Best 00:17:00 Tabletop Exercises: Practicing Incident Response 00:20:00 Who to Call When a Breach Happens 00:23:00 First Response Steps: Breathe, Engage, Preserve Evidence 00:26:00 Creating a Culture Where Mistakes Are Reported 00:29:00 Episode Recap and Takeaway #TheNonprofitShow #CyberResilience Find us Live daily on YouTube!Find us Live daily on LinkedIn!Find us Live daily on X: @Nonprofit_ShowOur national co-hosts and amazing guests discuss management, money and missions of nonprofits! 12:30pm ET 11:30am CT 10:30am MT 9:30am PTSend us your ideas for Show Guests or Topics: HelpDesk@AmericanNonprofitAcademy.comVisit us on the web:The Nonprofit Show
The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com
Ingram Micro suffers ransomware attack Hacker leaks Telefónica data allegedly from new breach ChatGPT prone to recommending wrong URLs, creating a new phishing opportunity Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines Find the stories behind the headlines at CISOseries.com.
Airbnb is piloting a “Reserve Now, Pay Later” feature in the U.S. and Canada to help guests book stays without upfront payments, aiming to boost affordability while keeping hosts protected under existing cancellation policies. Meanwhile, the U.S. Senate has advanced a budget bill allocating $12.5 billion to modernize air traffic control infrastructure, including consolidating radar and traffic control facilities, as part of broader reform efforts. Finally, Hawaiian Airlines, WestJet, and Qantas have reported cyberattacks ahead of the busy Fourth of July travel weekend, with the FBI attributing the incidents to the hacking group Scattered Spider. Airbnb Tests 'Reserve Now, Pay Later' Senate Bill Has $12.5 Billion for Air Traffic Reform: Here's the Breakdown Airlines Hit by Cyber Attacks: Here's What to Know Connect with Skift LinkedIn: https://www.linkedin.com/company/skift/ WhatsApp: https://whatsapp.com/channel/0029VaAL375LikgIXmNPYQ0L/ Facebook: https://facebook.com/skiftnews Instagram: https://www.instagram.com/skiftnews/ Threads: https://www.threads.net/@skiftnews Bluesky: https://bsky.app/profile/skiftnews.bsky.social X: https://twitter.com/skift Subscribe to @SkiftNews and never miss an update from the travel industry.
AI, Cyber Threats, and Your Business with Chris Noles, Beyond Computer Solutions (North Fulton Business Radio, Episode 880) In this episode of North Fulton Business Radio, host John Ray welcomes back Chris Noles, owner and president of Beyond Computer Solutions, to discuss what every business, large or small, needs to know about modern cybersecurity threats. Chris […] The post AI, Cyber Threats, and Your Business with Chris Noles, Beyond Computer Solutions appeared first on Business RadioX ®.
Productivity Straight Talk - Time Management, Productivity and Business Growth Tips
In this episode of the Small Business Straight Talk Podcast, I sit down with Cyber Resilience Specialist, Jeremiah Baker, to dive into the work he does to help small businesses protect themselves against cybercrime and discuss tips you can implement immediately to better protect yourself and your business from ransomware attacks, wire fraud, email account takeovers, and more. What You'll Discover In This Episode: ✔ How A Cybersecurity Attack Could Impact Your Business ✔ The Important Work Of White Hat Ethical Hackers ✔ What Social Engineering Is & How It's Being Used ✔ Ways Cybercriminals Steal Your Money & Information ✔ How SIM Cards Are Being Swapped & Your Identity Stolen ✔ Current Trending Scam & Hacks To Be Aware Of ✔ The Steps To Take To Protect Yourself & Your Business ✔ So Much More! To access resources and links from this episode, click on https://AmberDeLaGarza.com/383 P.S. Want to discover what's most holding you back in business and receive a personalized playlist to help you overcome those specific challenges? It only takes a few minutes to take the Next Level Business Owner Quiz and get on the path of taking your leadership and business to the next level! And… If you want help managing your time, creating efficiency, making a new hire, reducing the stress and overwhelm of running a business, or making strategic decisions that will help you level up your business, I'd like to talk to you. Let's discuss how we can partner together to help you get unstuck, reduce stress, and determine a clear path to increased profits! Schedule your Discovery Call
In today's episode of Cybersecurity Today, hosted by David Shipley, a report from the US Department of Justice unveils how criminal organizations use Ubiquitous Technical Surveillance (UTS) to track and kill FBI informants. Hawaiian Airlines experiences a cyber attack, potentially involving ransomware. The Supreme Court upholds Texas's age verification law for accessing online pornographic content. Additionally, researchers discover Bluetooth vulnerabilities affecting various audio devices, posing eavesdropping risks. The show discusses Scattered Spider's successful social engineering attacks on major industries, emphasizing the need for robust cybersecurity measures. 00:00 Introduction to Cybersecurity Threats 00:27 Ubiquitous Technical Surveillance: A Growing Threat 02:33 Assassination Linked to Data Brokers 04:21 Cyber Attacks on Airlines 05:02 Scattered Spider: The Prolific Cyber Threat 08:10 Bluetooth Vulnerabilities Exposed 10:53 US Supreme Court Upholds Texas Porn ID Law 13:32 Conclusion and Contact Information
Hawaiian Airlines suffers cyberattack United Natural Foods says cyber incident will impact quarterly income Russia throttles Cloudflare making sites inaccessible Huge thanks to our sponsor, Palo Alto Networks You're moving fast in the cloud and so are attackers. But while SecOps and cloud security teams are working in silos, attackers are exploiting the gaps between them. Cortex Cloud by Palo Alto Networks bridges this divide, unifying teams and stopping attacks with real-time cloud security that includes AI-powered protection, detection and automated response capabilities. Threats are stopped in minutes instead of days, and teams can finally protect cloud environments at the speed and scale of modern attacks. To learn more about how Cortex Cloud stops cloud attacks before they become breaches, visit: paloaltonetworks.com/cortex/cloud-detection-and-response Find the stories behind the headlines at CISOseries.com.
If you like what you hear, please subscribe, leave us a review and tell a friend!
A ceasefire between Israel and Iran appears to be on shaky ground after both sides traded strikes. Iranian hackers appear to be eying potential targets in the US. Consumers have been more cautious spenders lately. Boeing and the FAA are sharing the blame for last year's blowout on an Alaska Airlines flight. Plus, the latest target in a string of consumer boycotts. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Why you should listenLearn why SMB clients are now the #1 target for cyberattacks and how attackers operate (with shocking real-world examples).Discover how Microsoft partners can add value and margin with simplified cybersecurity services — even without deep in-house expertise.Find out how to protect your firm and clients from ransomware and liability without adding massive overhead or complexity.If you think your clients are “too small” to be a target—think again. Cybercriminals are shifting focus toward SMBs, and Microsoft partners are on the front lines, whether they know it or not.In this episode, I talk to René-Sylvain Bédard (RS), CEO of Indominus Managed Security, about how Microsoft partners can simplify cybersecurity, reduce risk, and turn this into a value-added service—not just an afterthought. You'll learn the real risks, where partners are exposed, and how to protect both clients and your own firm.About René-Sylvain BedardRené-Sylvain has nearly 30 years of experience as a technical architect, is the founder and CEO of Indominus. His work spans consulting firms, governments, telecommunications, aerospace, and SMEs. As a Microsoft partner for over 20 years, he has built strong relationships and received expert training allowing him to position Indominus as a leader in consulting, AI, and managed security services.In 2024, he was sacred "Highly Commended", the 2nd place in the "Best Technology Speaker" category at the Speaker Awards in London and within a few months, Indominus Managed Security was nominated to "Best Tech Company" by the Canadian SME Magazine.In 2025, Rene-Sylvain already published his new book "Secure by design", through Rethink Press and Indominus Managed Security won "Best Cybersecurity for SME", by the Canadian Business Awards.Under his leadership, Indominus is committed to fighting cybercrime globally, using innovative technologies and approaches to protect organizations and individuals.Driven by a passion for helping others and creating a safer world, René-Sylvain is confident that Indominus' expertise will shape a future free from cybercrime. With unwavering commitment to excellence and determination to eradicate cybercrime, he is ready to lead Indominus and its partners towards a safer future.Resources and LinksIndominus.msRené-Sylvain's LinkedIn profileRené-Sylvain's Business cardBook: Secure by Design: A leader's guide to keeping cybercriminals out of your businessWant to become a partner? Email partners@indominus.msPrevious episode: 617 - How Top Consultants Are Winning in 2025Check out more episodes of the Paul Higgins PodcastSubscribe to our YouTube channel:
Plus: U.S. considers ending some export waivers for U.S. technology in China. And, the European Commission scrutinizes Elon Musk's X after xAI's acquisition. Victoria Craig hosts. Learn more about your ad choices. Visit megaphone.fm/adchoices
SUBSCRIBE TO JORDAN'S FREE NEWSLETTER. Get the facts, without the spin. UNBIASED offers a clear, impartial recap of US news, including politics, elections, legal news, and more. Hosted by lawyer Jordan Berman, each episode provides a recap of current political events plus breakdowns of complex concepts—like constitutional rights, recent Supreme Court rulings, and new legislation—in an easy-to-understand way. No personal opinions, just the facts you need to stay informed on the daily news that matters. If you miss how journalism used to be, you're in the right place. In today's episode: Court Blocks Trump's Control Over National Guard; Appellate Court Reverses (2:05) ICE Memo Directs Agents to Stop Conducting Workplace Raids In These Locations (6:44) CMS Reportedly Shares Medicaid Data With DHS; Here's What You Need to Know About the Legalities (10:42) States Pull Back State Medicaid Healthcare Programs for Undocumented Immigrants (16:39) Everything We Know About the Targeted Minnesota Attacks and the Shooter (20:14) "No Kings" Protests and Army Parade (33:12) Trump Releases 2024 Financial Disclosures (40:00) Quick Hitters: Washington Post Says It Was the Target of a Cyberattack, Trump Organization Announces Trump Mobile, 50 States Agree to Billion Dollar Settlement with Purdue Pharma, West Virginia Gov. Declares State of Emergency (44:34) Critical Thinking Segment (46:36) SUBSCRIBE TO JORDAN'S FREE NEWSLETTER. Watch this episode on YouTube. Follow Jordan on Instagram and TikTok. All sources for this episode can be found here. Learn more about your ad choices. Visit podcastchoices.com/adchoices