Use of technological force within cyberspace
POPULARITY
Categories
In this explosive hour of The Tara Show, we uncover three major stories flying under the radar: China finally admits to its cyber warfare campaign against the U.S., and the media yawns. The rise of the Democrat “Shadow Electorate”—who's really pulling the strings? The Left drops the mask completely, embracing radicalism out in the open. They're not even pretending anymore—and it's time you knew the truth.
While America's eyes are elsewhere, a bombshell Wall Street Journal report reveals China has openly admitted to cyberattacks on critical U.S. infrastructure — water systems, ports, airports, even nuclear plants. In a secret December meeting, Chinese officials confessed to launching the series of attacks known as Volt Typhoon as punishment for U.S. support of Taiwan. The Biden administration's stunned reaction, Trump's shaky response, and the media's silence raise urgent questions: Are we already under digital siege? And can we afford to keep letting our enemy build the tech our lives depend on?
Tensions between the U.S. and China are heating up fast — from skyrocketing tariffs to shocking admissions of cyberattacks. President Trump doubles down on trade penalties while Chinese officials reportedly confess to hacking U.S. infrastructure in retaliation for Taiwan support. As claims of political compromise and foreign influence swirl, the battle lines between economic warfare and national security are becoming dangerously blurred.
How much of what you read online has been planted there by Russian propagandists? How many times have you followed a social media account, or reposted information from an account, that's controlled by a Russian Troll Farm? How aware are you of Russia's ongoing (and shockingly successful) attempts to cripple and then topple America from within? This episode is a different, much more dystopian kind of scary. Merch and more: www.badmagicproductions.com Timesuck Discord! https://discord.gg/tqzH89vWant to join the Cult of the Curious PrivateFacebook Group? Go directly to Facebook and search for "Cult of the Curious" to locate whatever happens to be our most current page :)For all merch-related questions/problems: store@badmagicproductions.com (copy and paste)Please rate and subscribe on Apple Podcasts and elsewhere and follow the suck on social media!! @timesuckpodcast on IG and http://www.facebook.com/timesuckpodcastWanna become a Space Lizard? Click here: https://www.patreon.com/timesuckpodcast.Sign up through Patreon, and for $5 a month, you get access to the entire Secret Suck catalog (295 episodes) PLUS the entire catalog of Timesuck, AD FREE. You'll also get 20% off of all regular Timesuck merch PLUS access to exclusive Space Lizard merch.
Podcast: Bites & Bytes PodcastEpisode: Securing Food Systems with a Defense Mindset with Brian SchleiferPub date: 2025-04-02Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarization
Everything, everywhere, all at once — but not the movie. This is how cybersecurity experts describe a scenario where a foreign adversary shuts off critical infrastructure, like oil pipelines, water networks, ports, and electric grids, all over the country. The terrifying truth is that China has already hacked into our critical infrastructure. They're “living off the land” and could conceivably attack whenever is most convenient. What's worse? Our political leaders are defunding America's cybersecurity efforts. In order to dig in deeper, Kara talks to Nicole Perlorth, Michael Schmidt, and Lt. Col. Alexander Vindman, (Ret.) Nicole Perlroth spent a decade as the lead cybersecurity reporter at The New York Times, before going inside the tent and joining the advisory board of the Cybersecurity and Infrastructure Security Agency and the Council on Foreign Relations' Cyber Task Force. She is a founding partner at Silverbuckshot Ventures and the host and producer of To Catch a Thief, a new podcast on China's rise to cyber dominance. Michael Schmidt is a Pulitzer Prize-winning investigative reporter for The New York Times and the author of the best-selling book Donald Trump v. The United States. He's also the executive producer and co-creator of the Netflix series Zero Day, a political thriller about a devastating cyberattack on the U.S. Lt. Col. Alexander Vindman is the former director of European Affairs for the National Security Council. Vindman was a key witness during President Trump's first impeachment and testified about Trump's infamous phone call with President Zelensky of Ukraine. He is a senior fellow at the Johns Hopkins Foreign Policy Institute and the author of The Folly of Realism: How the West Deceived Itself About Russia and Betrayed Ukraine. Questions? Comments? Email us at on@voxmedia.com or find us on Instagram, TikTok and Bluesky @onwithkaraswisher. Learn more about your ad choices. Visit podcastchoices.com/adchoices
phoenix persönlich: Jörg Thadeusz im Gespräch mit dem Cyber-War-Experten Sandro Gaycken
Drohnen, Hyperschallraketen, KI und Cyberwar. Wie stellen sich Militäranalysten künftige Konflikte vor?
Drohnen, Hyperschallraketen, KI und Cyberwar. Wie stellen sich Militäranalysten künftige Konflikte vor?
In this week's episode, Laura and Kevin sit down with Ricoh Danielson, a U.S. Army combat veteran turned digital forensics expert and entrepreneur. Ricoh shares his journey from serving in Iraq and Afghanistan to founding Fortitude Tech LLC and 1st Responder, organizations dedicated to cybersecurity and digital forensics. His military experiences instilled in him a mission-driven approach, shaping his ability to respond to cyber threats with precision and discipline. Ricoh discusses the current cybersecurity landscape, highlighting the rise of cyber threats from groups in Romania, Estonia, Ukraine, and Russia. While global adversaries like North Korea and China remain a concern, he emphasizes the evolving dangers posed by independent cybercriminals and organized crime, including Mexican cartels running multi-million dollar scam call centers. He stresses that while governments have defenses in place, individuals and businesses must take ownership of their cybersecurity.A prolific author, Ricoh has written nine books, including Battlefield Parenthood and The Rise of the Vetrepreneur, which explore the resilience of veterans in business and life. Unlike traditional technical field journals, his cybersecurity books take a coffee-table book approach, making the topic more accessible. Ricoh provides practical advice for businesses on building strong cyber defenses and navigating digital threats. He also touches on the impact of shifting political landscapes on cybersecurity and why he encourages professionals to acquire skills that allow them to operate beyond government influence. Ricoh teases future projects, including a potential movie with Laura as his star, and calls on listeners to support veteran entrepreneurship, cybersecurity awareness, and his mission of empowering businesses and individuals against digital threats. This is a must listen!Ricoh Danielson is a U.S. Army combat veteran of Iraq and Afghanistan and a leading figure in digital forensics and cybersecurity. Founder of Fortitude Tech LLC, Ricoh turned his passion for incident response and digital forensics into a nationally recognized powerhouse while attending law school. His expertise spans high-profile cell phone forensic investigations, big data analytics, and cybersecurity innovation. He also leads 1st Responder, supporting businesses of all sizes in navigating and mitigating cyber incidents.A graduate of Thomas Jefferson School of Law, Colorado Tech University, and UCLA Anderson School of Management, Ricoh combines military-honed leadership with technical acumen. He is the author of Battlefield Parenthood and The Rise of the Vetrepreneur, which spotlight the resilience and entrepreneurial spirit of veterans.
Mark Montgomery, senior director of the Center on Cyber and Technology Innovation at FDD and retired U.S. Navy rear admiral, joins the show to discuss how prepared (or ill-prepared) the U.S. is for cyber warfare. ▪️ Times • 03:24 Introduction • 04:20 America: A Target Rich Environment • 05:59 Cyber and mobilization • 08:35 What actually happens? • 11:36 Automation • 16:18 Salt and volt typhoon • 22:04 Continuity of the economy • 28:33 Offense • 35:05 Cyber responses • 38:43 Public opinion • 41:43 Defense of the homeland • 49:30 A new kind of leader Follow along on Instagram, X @schoolofwarpod, and YouTube @SchoolofWarPodcast Find a transcript of today's episode on our School of War Substack
It's become pretty easy to spot phishing scams: UPS orders you never made, banking alerts from companies you don't bank with, phone calls from unfamiliar area codes. But over the past decade, these scams – and the technology behind them – have become more sophisticated, invasive and sinister, largely due to the rise of something called ‘mercenary spyware.'The most potent version of this tech is Pegasus, a surveillance tool developed by an Israeli company called NSO Group. Once Pegasus infects your phone, it can see your texts, track your movement, and download your passwords – all without you realizing you'd been hacked.We know a lot of this because of Ron Deibert. Twenty years ago, he founded Citizen Lab, a research group at the University of Toronto that has helped expose some of the most high profile cases of cyber espionage around the world.Ron has a new book out called Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy, and he sat down with me to explain how spyware works, and what it means for our privacy – and our democracy.Note: We reached out to NSO Group about the claims made in this episode and they did not reply to our request for comment.Mentioned:“Chasing Shadows: Cyber Espionage, Subversion, and the Global Fight for Democracy,” by Ron Deibert“Meta's WhatsApp says spyware company Paragon targeted users in two dozen countries,” by Raphael Satter, ReutersFurther Reading:“The Autocrat in Your iPhone,” by Ron Deibert“A Comprehensive Analysis of Pegasus Spyware and Its Implications for Digital Privacy and Security,” Karwan Kareem“Stopping the Press: New York Times Journalist Targeted by Saudi-linked Pegasus Spyware Operator,” by Bill Marczak, Siena Anstis, Masashi Crete-Nishihata, John Scott-Railton, and Ron Deibert
We're back!
Tune in here for this Thursday edition of the Vince Coakley Radio Program! Vince starts the show talking about President Joe Biden's farewell address, Israel vs. Hamas peace deal, Chinese military's strategy on hacking US infrastructure with cyber security expert Morgan Wright, and the end of the Biden administration. In the second half of the show Vince talks about a potential hostage deal in the Middle East, social media headlines about the LA fires, and a trip down memory lane from the 1970's TV guide with Producer John.See omnystudio.com/listener for privacy information.
Erweitere dein Wissen über digitale Sicherheit mit Cybersecurity ist Chefsache!In dieser Episode begrüßt Nico Werner Dr. Kerstin Zettl-Schabath, Cyber-Konfliktforscherin im Projekt EuRepoC. Gemeinsam werfen sie einen detaillierten Blick auf die Realität und die Mythen digitaler Konflikte.Themen dieser Episode:Cyber-Armageddon entmystifiziert: Warum es solche Szenarien bisher nicht gibt und was Cyber-Konflikte tatsächlich ausmacht.Hackbacks und ihre Grenzen: Die rechtlichen, technischen und politischen Hürden beim digitalen Gegenschlag.Resilienz statt Panik: Warum Bildung und klare Kommunikation entscheidend sind, um den Cyberspace sicherer zu machen.Lessons Learned: Was wir aus realen Cyber-Operationen wie dem DNC-Hack und WannaCry lernen können.Kerstin erklärt, warum ein Perspektivwechsel nötig ist, um Cyber-Bedrohungen effektiv zu begegnen, und warum wir mehr auf Defensive setzen sollten statt auf militärisch konnotierte Begriffe wie „Cyber-War“.
Erweitere dein Wissen über digitale Sicherheit mit Cybersecurity ist Chefsache!In dieser Episode begrüßt Nico Werner Dr. Kerstin Zettl-Schabath, Cyber-Konfliktforscherin im Projekt EuRepoC. Gemeinsam werfen sie einen detaillierten Blick auf die Realität und die Mythen digitaler Konflikte.Themen dieser Episode:Cyber-Armageddon entmystifiziert: Warum es solche Szenarien bisher nicht gibt und was Cyber-Konflikte tatsächlich ausmacht.Hackbacks und ihre Grenzen: Die rechtlichen, technischen und politischen Hürden beim digitalen Gegenschlag.Resilienz statt Panik: Warum Bildung und klare Kommunikation entscheidend sind, um den Cyberspace sicherer zu machen.Lessons Learned: Was wir aus realen Cyber-Operationen wie dem DNC-Hack und WannaCry lernen können.Kerstin erklärt, warum ein Perspektivwechsel nötig ist, um Cyber-Bedrohungen effektiv zu begegnen, und warum wir mehr auf Defensive setzen sollten statt auf militärisch konnotierte Begriffe wie „Cyber-War“.
Erweitere dein Wissen über digitale Sicherheit mit Cybersecurity ist Chefsache!In dieser Episode begrüßt Nico Werner Dr. Kerstin Zettl-Schabath, Cyber-Konfliktforscherin im Projekt EuRepoC. Gemeinsam werfen sie einen detaillierten Blick auf die Realität und die Mythen digitaler Konflikte.Themen dieser Episode:Cyber-Armageddon entmystifiziert: Warum es solche Szenarien bisher nicht gibt und was Cyber-Konflikte tatsächlich ausmacht.Hackbacks und ihre Grenzen: Die rechtlichen, technischen und politischen Hürden beim digitalen Gegenschlag.Resilienz statt Panik: Warum Bildung und klare Kommunikation entscheidend sind, um den Cyberspace sicherer zu machen.Lessons Learned: Was wir aus realen Cyber-Operationen wie dem DNC-Hack und WannaCry lernen können.Kerstin erklärt, warum ein Perspektivwechsel nötig ist, um Cyber-Bedrohungen effektiv zu begegnen, und warum wir mehr auf Defensive setzen sollten statt auf militärisch konnotierte Begriffe wie „Cyber-War“.
Jill Aitoro, SVP for Content Strategy at CyberRisk Alliance joins the podcast this week for a hot topics discussion across recent developments in the ongoing cyber war involving Ukraine, Russia and a supporting cast of many public and private entities including NATO, Microsoft, Lithuania and others. We also dive into recent exploits by China with social media microtargeting campaigns against rare earth mining companies and where their ‘playing the long game' implications could lead. Jill Aitoro, senior vice president of content strategy for CyberRisk Alliance She has more than 20 years of experience editing and reporting on technology, business and policy. Prior to joining CRA, she worked at Sightline Media as editor of Defense News and executive editor of the Business-to-Government Group. She previously worked at Washington Business Journal and Nextgov, covering federal technology, contracting and policy, as well as CMP Media's VARBusiness and CRN and Penton Media's iSeries News. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e314
In this episode of the OODAcast we turn the microphone over to Dr. Bilyana Lily, the world renowned cyber and geopolitical expert, who interviews OODA's CEO and co-founder Matt Devost. The session provides insights which can benefit any entrepreneur, board member, investor or cybersecurity practitioner. Bilyana reviews Matt's journey from a small-town in Vermont to becoming a global leader in cybersecurity, counterterrorism, and risk management and then dives into Matt's work founding groundbreaking companies like FusionX and the Terrorism Research Center, his insights into AI and cyber defense, and even his contributions to Hollywood films like Blackhat. Matt also explores the evolving hacker community, the future of augmented reality, and why exponential technological change will reshape our world. This is a must-watch for anyone interested in the nexus of technology, security, and innovation.
Max's podcast https://podcasts.apple.com/us/podcast/the-final-war/id1770261300Make a Donation to Forbidden Knowledge News https://www.paypal.me/forbiddenknowledgenehttps://buymeacoffee.com/forbiddenReconnect to Everything with BrainsupremeGet 25% off your order here!!https://brainsupreme.co/discount/FKN15Subscribe to Cory Hughe's "Bloody History" substackhttps://bloodyhistory.substack.comSign up for the IMT crypto community Imt.networkBook a free consultation with Jennifer Halcame Emailjenniferhalcame@gmail.comFacebook pagehttps://www.facebook.com/profile.php?id=61561665957079&mibextid=ZbWKwLSick of having mediocre health? Transform your health and vitality with Christian Yordanov's program. Learn more and book a free intro call here (mention FKN at time of booking and he will have a special gift for youhttps://christianyordanov.com/fkn/Watch The Forbidden Documentary: Occult Louisiana on Tubi: https://link.tubi.tv/pGXW6chxCJbC60 PurplePowerhttps://go.shopc60.com/FORBIDDEN10/or use coupon code knowledge10FKN Link Treehttps://linktr.ee/FKNlinksForbidden Knowledge Network https://forbiddenknowledge.news/ Sign up on Rokfin!https://rokfin.com/fknplusPodcastshttps://www.spreaker.com/show/forbiddenAvailable on all platforms Support FKN on Spreaker https://spreaker.page.link/KoPgfbEq8kcsR5oj9FKN ON Rumblehttps://rumble.com/c/FKNpGet Cory Hughes Book!https://www.buymeacoffee.com/jfkbookhttps://www.amazon.com/Warning-History-Cory-Hughes/dp/B0CL14VQY6/ref=mp_s_a_1_1?crid=72HEFZQA7TAP&keywords=a+warning+from+history+cory+hughes&qid=1698861279&sprefix=a+warning+fro%2Caps%2C121&sr=8-1https://coryhughes.org/Johnny Larson's artworkhttps://www.patreon.com/JohnnyLarsonYouTube https://youtube.com/@fknclipspBecome Self-Sufficient With A Food Forest!!https://foodforestabundance.com/get-started/?ref=CHRISTOPHERMATHUse coupon code: FORBIDDEN for discountsThe FKN Store!https://www.fknstore.net/Our Facebook pageshttps://www.facebook.com/forbiddenknowledgenewsconspiracy/https://www.facebook.com/FKNNetwork/Instagram @forbiddenknowledgenews1@forbiddenknowledgenetworkXhttps://x.com/ForbiddenKnow10?t=uO5AqEtDuHdF9fXYtCUtfw&s=09Email meforbiddenknowledgenews@gmail.comsome music thanks to:https://www.bensound.com/Become a supporter of this podcast: https://www.spreaker.com/podcast/forbidden-knowledge-news--3589233/support.
Die Politikwissenschaftlerin Ulrike Franke über Drohnen als riskante Waffen und ihren Einfluss auf die Kriegsführung. Ein Podcast vom Pragmaticus. Das Thema:„Wir haben noch nie einen Krieg gesehen, in dem Drohnen so zentral sind und in so einer großen Zahl eingesetzt werden“, sagt Ulrike Franke über den Ukraine-Krieg. Die Politikwissenschaftlerin erklärt in diesem Podcast, warum diese Waffen für eine neues Zeitalter des Krieges stehen. Drohnen stehen nach ihrer Einschätzung erstens für den wachsenden Einfluss privater Unternehmen und Konzerne in Kriegen zwischen Staaten. Zum Zweiten für die Involvierung von Zivilisten in den Krieg. Nachdem Drohnen eine Hobbytechnologie sind, kann jeder und jede damit umgehen und damit am Krieg beteiiigt werden. Zum Dritten stehen Drohnen für die Macht Chinas: Der staatskapitalistische Staat ist Monopolist bei kleinen Drohnen, das sind jene, die im Ukraine-Krieg eine Hauptolle spielen. Unser Gast in dieser Folge: Ulrike Franke ist Politikwissenschaftlerin und arbeitet mit den Schwerpunkten deutsche und europäische Sicherheit als Senior Policy Fellow beim European Council on Foreign Relations und als Lehrbeauftragte an der Sciences Po Paris. Militärtechnologien insbesondere Drohnentechnologien sind ihre Forschungsthemen und Themen des Podcasts Sicherheitshalber, den sie gemeinsam mit Carlo Masala, Frank Sauer und Thomas Wiegold ins Leben gerufen hat.Dies ist ein Podcast von Der Pragmaticus. Sie finden uns auch auf Instagram, Facebook, LinkedIn und X (Twitter).
October is cybersecurity awareness month. In this episode, Kate and Ben discuss cybersecurity awareness both on an individual and business level as well global and nation state level. Resources/Research:“Cybersecurity statistics in 2024” by Mehdi Punjwani and Sierra Campbell. Published in USA Today website October 4, 2024 and available on https://www.usatoday.com/money/blueprint/business/vpn/cybersecurity-statistics/“Iranian cyber operation targeting the Trump campaign is likely still underway, FBI official says” by Dan De Luce. Published in NBC News website September 6, 2024 and available on https://www.nbcnews.com/investigations/iranian-cyber-operation-targeting-trump-campaign-likely-still-underway-rcna170003“FBI Director Chris Wray warns Congress that Chinese hackers targeting U.S. infrastructure as U.S. disrupts foreign botnet “Volt Typhoon'” by Robert Legare Olivia Gazis, Nicole Sganga. Published in CBS news website January 31, 2024 and available on https://www.cbsnews.com/news/chinese-hackers-pose-danger-american-infrastructure-innovation-fbi-director-warning/"America's Cyber Defense Agency". Published in Cybersecurity & Infrastructure Security Agency website and available on https://www.cisa.gov/ Books: Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers by Andy GreenbergTracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency by Andy GreenbergThis is How They Tell Me the World Ends by Nichol PerlrothCheck out our website at http://artofdiscussing.buzzsprout.com, on Facebook at Art of Discussing and on Instagram @artofdiscussing.Got a topic that you'd like to see discussed? Interested in being a guest on our show? Just want to reach out to share an opinion, experience, or resource? Leave us a comment below or contact us at info@artofdiscussing.com!! We'd love to hear from you! Keep Discussing!Music found on Pixabay. Song name: "Clear Your Mind" by Caffeine Creek Band"
Hi everyone! In this segment, we cover the upcoming eclipse in the sidereal sign of Virgo. We spend time taking a look at the typical eclipse drama and spotting eclipse energy in the media. Sean Combs sex scandals is just TOO sensational. Who isn't involved in this nefarious group of people?! We also discuss health and wellness and how functional wellness is really hitting the media hard as so much truth is exposed in regards to pesticides, artificial colors, and toxins... Hello Ketu in Virgo! Of course, what we should also mention is Uranus in Taurus, REALLY creating a shake up with food! We spend notable time discussing the service oriented quality of Virgo and the beauty that radiates when we share joy in the success of others. I hope you all enjoy! Work with Christine I recently committed to creating more YouTube videos. If you're interested in shifting gears and learning about compatibility, please follow this link: The Characteristics of Your Spouse in Vedic Astrology: All About Your Darakaraka https://youtu.be/i_cOvdSbjy0 patreon.com/astrologynowpodcast innerknowing.yoga astrologynowpodcast@gmail.com instagram: astrologynow_podcast keywords: astrology, jyotish, Vedic astrology, sidereal astrology, nakshatras, spirituality, Christine Rodriguez, aries, libra, scorpio, libra, capricorn, Nakshatra, new moon, taurus, Venus, Jupiter, Pisces, Spirituality, horoscope, retrograde, eclipse, solar eclipse, new moon, lunar eclipse
पूरा Podcast यहाँ देखें: https://youtu.be/TTpW910isBA BeerBiceps SkillHouse का Course Join करने के लिए यहाँ CLICK करें : https://bbsh.in/trshindi-launch-cpyt Use my referral code OFF40 to get a 40% Discount on a standard membership subscription. BeerBiceps SkillHouse को Social Media पर Follow करे :- YouTube : https://www.youtube.com/channel/UC2-Y36TqZ5MH6N1cWpmsBRQ Instagram : https://www.instagram.com/beerbiceps_skillhouse Website : https://bbsh.in/trshindi-launch-cpyt For any other queries EMAIL: support@beerbicepsskillhouse.com In case of any payment-related issues, kindly write to support@tagmango.com Level Supermind - Mind Performance App को Download करिए यहाँ से
पूरा Podcast यहाँ देखें: https://youtu.be/TTpW910isBA BeerBiceps SkillHouse का Course Join करने के लिए यहाँ CLICK करें : https://bbsh.in/trshindi-launch-cpyt Use my referral code OFF40 to get a 40% Discount on a standard membership subscription. BeerBiceps SkillHouse को Social Media पर Follow करे :- YouTube : https://www.youtube.com/channel/UC2-Y36TqZ5MH6N1cWpmsBRQ Instagram : https://www.instagram.com/beerbiceps_skillhouse Website : https://bbsh.in/trshindi-launch-cpyt For any other queries EMAIL: support@beerbicepsskillhouse.com In case of any payment-related issues, kindly write to support@tagmango.com Level Supermind - Mind Performance App को Download करिए यहाँ से
The Line of Fire Radio Broadcast for 09/19/24.
This morning many were greeted with news that what looks like a cyber attack caused thousands of devices to explode. While it sounds like it's out of a cyberpunk novel, this attack helps us understand how technology can be used to build a pattern of life on not just individuals, but an organization or country. This episode has been sponsored by Obsidian Arms, a manufacturer of tools, parts and firearms, as well as operating as an OEM shop for those looking to bring excellence to the market. Their Minnesota-based shop builds and cuts parts out of U.S.-sourced materials. Their gunsmith tools, custom firearms, and capabilities can be found at www.obsidianarms.comSupport the REDACTED Culture Cast at redactedculture.locals.comSSP and boutique products at redactedllc.comFollow us on Instagram at @redactedllc
In the latest episode of Life of a CISO, Dr. Eric Cole reflects on the importance of challenge and growth in both personal and professional life. He compares humans to lions, emphasizing that just as lions are not meant for captivity, humans are not meant to settle into comfortable routines. Instead, we thrive on the excitement of pursuing new goals and pushing ourselves beyond the status quo. Dr. Cole urges listeners to evaluate their own lives, asking whether they've allowed themselves to get too comfortable or if they're actively pursuing the next level of growth and success. He also introduces a powerful analogy, comparing the current state of cybersecurity to World War III. Dr. Cole argues that cyberattacks across the globe, targeting individuals and organizations, represent a form of warfare. Many are unaware of the severity of these attacks, which gives adversaries a significant advantage. By acknowledging the reality of these threats, individuals and businesses can take stronger defensive measures to protect themselves. Dr. Cole's message serves as both a call to action for personal development and a wake-up call for cybersecurity professionals to remain vigilant in the face of modern cyber warfare.
Jonathan and Todd continue the conversation about how the way we talk about cybersecurity puts us in a deficit against the malicious actors and how we might reframe to better equip the defenders.Watch the full video at youtube.com/@aliascybersecurity.Catch the whole episode now at https://bit.ly/47eYPTKListen on Apple Podcasts, Spotify and anywhere you get you're podcasts.
While many people fear the risk of a wider war breaking out in the Middle East, a parallel battle is already ongoing – in the digital sphere. Can China challenge a long-standing duopoly in the airline industry (10:16)? And the latest Carrie Bradshaw index tells us where Americans can afford a solo apartment. Just don't set your heart on New York… (17:22)Listen to what matters most, from global politics and business to science and technology—Subscribe to Economist Podcasts+For more information about how to access Economist Podcasts+, please visit our FAQs page or watch our video explaining how to link your account. Hosted on Acast. See acast.com/privacy for more information.
While many people fear the risk of a wider war breaking out in the Middle East, a parallel battle is already ongoing – in the digital sphere. Can China challenge a long-standing duopoly in the airline industry (10:16)? And the latest Carrie Bradshaw index tells us where Americans can afford a solo apartment. Just don't set your heart on New York… (17:22)Listen to what matters most, from global politics and business to science and technology—Subscribe to Economist Podcasts+For more information about how to access Economist Podcasts+, please visit our FAQs page or watch our video explaining how to link your account.
Are hackers really as successful as they appear? Or is it that they have better messaging? Join us for a conversation about how marketing around cybersecurity might play a part in the hacker mystique.Watch the full video at youtube.com/@aliascybersecurity.Catch the whole episode now at https://bit.ly/47eYPTKListen on Apple Podcasts, Spotify and anywhere you get you're podcasts.
Theresa Payton, author of "Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth," is the CEO at Fortalice Solutions, former CIO at The White House, and previously Deputy Commander of Intelligence on the CBS TV series "Hunted." In this episode, she joins host Taylor Fox to discuss the 2nd paperback edition of "Manipulated," as well as the latest insights on election security, and more. Buy the book at https://amazon.com/Manipulated-Inside-Cyberwar-Elections-Distort/dp/1538188651. • For more on cybersecurity, visit us at https://cybersecurityventures.com
Three Buddy Problem - Episode 7: In this episode, we try to close the book on the CrowdStrike Windows BSOD story, Microsoft VP David Weston's technical documentation and issues around kernel access and OS resilience. We also discuss Binarly's PKFail research, secure boot bypasses, Dan Geer and tech monoculture, software vendor liability issues and the need for inspectability in security mechanisms. The conversation explores cyber angles to train service disruptions in Paris, the history of cyber operations targeting the Olympics, the lack of public acknowledgment and attribution of cyber operations by Western intelligence agencies, and the importance of transparency and case studies in understanding and discussing cyber operations. Hosts: Juan Andres Guerrero-Saade (SentinelLabs), Costin Raiu (Art of Noh), Ryan Naraine (SecurityWeek)
In this edition of Between Two Nerds Tom Uren and The Grugq discuss what the widespread disruption caused by CrowdStrike's faulty update tells us about how useful cyber operations are for war.
On today's Change Agents, Andy Stumpf sits down with Principal Adversary Hunter at the cybersecurity company Dragos, Kyle O'Meara who previously worked at the National Security Agency, and Gus Serino, an industrial cybersecurity consultant, and has worked with large water utilities on security issues. His company is I&C Secure ( https://www.iandcsecure.com/ ). They discuss the reality of cyber war and the vulnerabilities of America's utilities, Change Agents is presented by Montana Knife Company. Use CODE "CHANGEAGENTS10" for 10% off your first order at https://www.montanaknifecompany.com/ MTNTOUGH Go to https://mtntough.com and enter code CHANGEAGENTS to receive 40% OFF - a savings of about $100 your MTNTOUGH+ annual subscription. OnX Offroad Start your adventure with a 7-day free trial and experience the difference. Download onX Offroad today and elevate your offroading experience at https://www.onxmaps.com/offroad/app Change Agents is IRONCLAD Original.
Zero Trust has revolutionized the way agencies everywhere are securing their networks, and this week on Feds at the Edge, we talk with titans in the field, including John Kindervag, Chief Evangelist with Illumio, who in 2010 coined the phrase “zero trust model.” We delve into this stricter cybersecurity program where identity leads in the guideposts in defending today's cyber landscape. Dr. Robert Roser, CISO with the Idaho National Laboratory agrees, “Without identity, nothing else matters.” We also discuss the larger-than-life landscape that agencies are tasked with protecting. Sean Connelly, Federal Zero Trust Architect with CISA reminds listeners, while most know the big three cloud providers, there are over 300. Limiting our understanding to “the main and the plain” could lead to trouble. La Monte R. Yarborough, Acting DCIO, CISO and Executive Director, Office of Information Security, HHS, shares HHS is tasked with protecting 1200+ networks every day.
A recent large-scale attack on an NHS provider by the Russian based criminal group Qilin has exposed lingering vulnerabilities in our digital infrastructure - but an ongoing Chinese state sponsored attack, known as Volt Typhoon, has been described by US officials as a game changer in the realm of cyber warfare. Emma Beals speaks to former founding chief executive of the UK National Cyber Security Centre Professor Ciaran Martin and senior fellow for global cyber policy at the Council on Foreign Relations Tarah Wheeler to find out how much is at stake on this digital battleground, and what we can do about it. Support This Is Not A Drill on Patreon to get early episodes, merchandise and more. Go to Incogni.com/notadrill to get an exclusive 60% off your annual plan with Incogni. Written and presented by Emma Beals. Produced by Robin Leeburn. Original theme music by Paul Hartnoll – https://www.orbitalofficial.com. Incidental music by Simon Williams. Executive Producer Martin Bojtos. Group Editor Andrew Harrison. This Is Not A Drill is a Podmasters production. podmasters.co.uk Learn more about your ad choices. Visit podcastchoices.com/adchoices
Listen to this episode commercial free at https://angryplanetpod.com/Influence campaigns, both subtle and unsubtle, are as old as statecraft. Agencies like the CIA, KGB, and Israel's Mossad have all attempted to force friends and rivals to change. It doesn't work as often as you'd think. Subversion campaigns are often so secretive that their effectiveness is hard to quantify. But Lennart Maschmeyer decided to try.Maschmeyer is on this episode of Angry Planet to tell us all about the limits of cyber war and subversion operations. It's the subject of his new book Subversion: From Covert Operations to Cyber Conflict. Maschmeyer is a senior researcher at the Center for Security Studies at ETH Zurich and his book is a deep look at what works and what doesn't when countries try to influence each other. It throws cold water on Russia's much-hyped “Hybrid War” and the idea of cyber Pearl Harbor.Support this show http://supporter.acast.com/warcollege. Hosted on Acast. See acast.com/privacy for more information.
Share with a friend! (Podfollow) Join Bryan Dean Wright, former CIA Operations Officer, on The Wright Report for an in-depth look at the day's most critical news shaping America and the world. This episode covers: Illinois' Controversial Rebranding: Explore the State of Illinois' move to rebrand criminals as “justice-impacted individuals” and the broader implications of re-categorizing groups from illegal aliens to minor-attracted persons. Russian Military Preparations: Delve into Russia's latest advancements, including preparations for war in space and on land and the potential deployment of nuclear weapons in Ukraine. Iranian-Backed Houthi Missiles: Learn about the new missile capabilities of Iranian-backed Houthi rebels, posing a threat to U.S. naval vessels in the Mediterranean. Cyber War in Taiwan: Get an update on the cyber war in Taiwan, highlighting good news on defensive capabilities against Chinese threats. Exercise and Cancer Prevention: Discover groundbreaking research from the UK on how exercise can significantly improve outcomes for cancer patients and potentially prevent cancer. Don't miss this comprehensive and thought-provoking episode that provides the insights you need to stay informed about the critical issues of the day. Tune in and be part of the conversation! Listen now at PodFollow.com and share with friends to help us grow! "And you shall know the truth, and the truth shall make you free." - John 8:32 Donate (no account necessary) | Subscribe (account required)
Guest: ✨ Theresa Payton, Author & CEO Fortalice® Solutions LLC [@FortaliceLLC]On LinkedIn | https://www.linkedin.com/in/theresapayton/____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode's SponsorsBlackCloak
Welcome back to another episode of Exploit Brokers with your host, Lauro! Today, we're diving deep into the darker uses of AI by criminals. From high-tech identity theft using AI-generated voices and images to unprecedented surges in digital crimes such as hacking and data breaches, we explore how these technologies are shaping modern criminal tactics. In this episode: We discuss a recent incident reported by The Guardian involving AI mimicking BBC presenter Liz Bonnin's voice. Analyze the rise of malware written by AI. Explore the complex relationship between AI advancements and their unintended use in cybercrime. Don't forget to subscribe and hit the bell notification to stay updated with our latest episodes. Your support helps us spread knowledge to more people!
BeerBiceps SkillHouse का Course Join करने के लिए यहाँ CLICK करें : https://bbsh.in/ra-yt-pod101 Use my referral code OFF40 to get a 40% Discount on a standard membership subscription. BeerBiceps SkillHouse को Social Media पर Follow करे :- YouTube : https://www.youtube.com/channel/UC2-Y36TqZ5MH6N1cWpmsBRQ Instagram : https://www.instagram.com/beerbiceps_skillhouse Website : https://linktr.ee/BeerBiceps_SKillHouse For any other queries EMAIL: support@beerbicepsskillhouse.com In case of any payment-related issues, kindly write to support@tagmango.com Level Supermind - Mind Performance App को Download करिए यहाँ से
Today's Friday Op-Ed has to do with two news articles this week on nation-state actors attacking critical national infrastructure and we need to understand that a world at Cyber War is real, and it is spectacular! Give a listen, tell a friend. Thoughts/comments/suggestions welcome at darren@thecyburguy.com
Become a supporter of this podcast: https://www.spreaker.com/podcast/the-daily-mojo-with-brad-staggs--3085897/support.February 26, 2024The Daily Mojo is 2 hours of news, commentary, comedy, and auditory deliciousness."The Cyber War of 2024"AT&T would like to apologize for the cyberattack...I mean..the software patch...here's 5 bucks. Sure are a lot of these cyberattacks happening, it seems, but shut up! Everything's fine! Looks like the CIA has been getting cozy with Ukraine for quite a spell. Drugs, drugs, everywhere! Some turtles are just hipper than others. Phil Bell's Morning Update asks the proverbial question - Can we all just get along...and work things out amongst ourselves? Links:Phil's Morning Updatewww.Freedomworks.orgPBell@Freedomworks.orgOur affiliate partners:We've partnered with The Wellness Company – a based, dedicated group of medical pros – including Dr. Peter McCullough – to bring you a single trustworthy source for your health.www.GetWellMojo.comPromo Code: Mojo50Dave and his crew were roasting historically great coffee before some of these newcomers even thought about creating a coffee brand. He's still the best, in our eyes! www.AmericanPrideRoasters.comNothing says “I appreciate you” like an engraved gift or award. Ron and Misty (mostly Misty) have the perfect solution for you if you need a gift idea for family or your employees!www.MoJoLaserPros.comWe love to support Mike Lindell and his company. He's a real patriot and an American success story!www.MoJoMyPillow.com Promo Code: Mojo50Be ready for anything from a hurricane to man-created stupidity (toilet paper shortage, anyone?). The tools and food storage you need to weather the storm.www.PrepareWithMojo50.com Stay ConnectedWATCH The Daily Mojo LIVE 7-9a CT: www.TheDailyMojo.com (RECOMMEDED)Rumble: HEREFacebook: HEREMojo 5-0 TV: HEREFreedomsquare: HEREOr just LISTEN:The Daily MoJo Channel Become a supporter of this podcast: https://www.spreaker.com/podcast/the-daily-mojo-with-brad-staggs--3085897/support.
In 2024, are we going to see an increase in cyber attacks against Christians? What will it look like, and how do we prepare for it? In this episode of Firepower with Mario Murillo and Todd Coconato, we expose the topics most are unwilling to discuss. Mario Murillo: YouTube https://www.youtube.com/@MarioMurilloMinistry Instagram https://www.instagram.com/mariomurilloministries Twitter https://twitter.com/MarioMurilloMin Website https://mariomurillo.org/ Facebook https://www.facebook.com/mariomurilloministry Todd Coconato: YouTube https://www.youtube.com/@ToddCoconato Instagram https://www.instagram.com/toddcoconato/?hl=en Twitter https://twitter.com/toddcoconato Website https://toddcoconato.com/ Facebook https://www.facebook.com/RealToddCoconato/Original Video https://www.youtube.com/watch?v=Q0dDA4eTO9M&t=1010sBook Link - Armed for Victory https://www.amazon.com/Armed-Victory-Prayer-Strategies-End-Time/dp/0768461685/ref=sr[…]191_13517538&keywords=armed+for+victory&qid=1707507243&sr=8-1
Noor Bin Ladin has been reporting from the World Economic Forum in Davos, all week, and tonight she joins us to discuss many of the things we may have missed. Disease X, Cyber War & Pandemic, Bio-Surveillance, and even some of the rebellious voices of the summit. We'll get your calls and questions in, and perhaps find a few more things to fill in what's left of yet another busy week of shows! Really in the new year flow now, aren't we? Watch the full video rerun here: https://share-link.pilled.net/topic-detail/812381 Proudly Sponsored By: Blue Monster Prep: An Online Superstore for Emergency Preparedness Gear (Storable Food, Water, Filters, Radios, MEDICAL SUPPLIES, and so much more). Use code 'FRANKLY' for Free Shipping on every purchase you make @ https://bluemonsterprep.com/ SUPPORT Quite Frankly: Official Merch: https://tinyurl.com/f3kbkr4s Official Coffee: https://tinyurl.com/2p9m8ndb Sponsor through QFTV: https://www.quitefrankly.tv/sponsor SubscribeStar: https://www.subscribestar.com/quitefrankly One-Time Tip: http://www.paypal.me/QuiteFranklyLive Sign up for the Free Mailing List: https://bit.ly/3frUdOj Send Crypto: BTC: 1EafWUDPHY6y6HQNBjZ4kLWzQJFnE5k9PK LTC: LRs6my7scMxpTD5j7i8WkgBgxpbjXABYXX ETH: 0x80cd26f708815003F11Bd99310a47069320641fC FULL Episodes On Demand: Spotify: https://spoti.fi/301gcES iTunes: http://apple.co/2dMURMq Amazon: https://amzn.to/3afgEXZ SoundCloud: http://bit.ly/2dTMD13 Google Play: https://bit.ly/2SMi1SF BitChute: https://bit.ly/2vNSMFq Rumble: https://bit.ly/31h2HUg Streaming Live On: QuiteFrankly.tv (Powered by Foxhole) DLive: https://bit.ly/2In9ipw Rokfin: https://bit.ly/3rjrh4q Twitch: https://bit.ly/2TGAeB6 YouTube: https://bit.ly/2exPzj4 Rumble: https://bit.ly/31h2HUg How Else to Find Us: Official WebSite: http://www.QuiteFrankly.tv Official Forum: https://bit.ly/3SToJFJ Official Telegram: https://t.me/quitefranklytv GUILDED Hangout: https://bit.ly/3SmpV4G Twitter: @PoliticalOrgy Gab: @QuiteFrankly Truth Social: @QuiteFrankly GETTR: @QuiteFrankly MINDS: @QuiteFrankly
You've probably encountered phishing emails or computer viruses. Or maybe one or more of your accounts has been hacked or compromised. How and why do hackers hack and what are they generally seeking? Our guest this week points out that understanding the answers to those questions is essential for making sense of the psychological, economic, political and social effects of cybercrime. Scott Shapiro is Southmayd Professor of Law and Professor of Philosophy at Yale Law School. He is the author of a new book called, “Fancy Bear Goes Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks.” The book dives into five historical examples, one of which involves its namesake, Fancy Bear, a Russian cyberintelligence unit responsible for hacking the Democratic National Convention. Shapiro joins WITHpod to discuss some of the biggest inflection points in the history of hacking, why the internet is so vulnerable, the role that generative AI may place in future cybercrime and his thoughts on if we should really be concerned about cyberwar.