Alert posture used by the United States Armed Forces
POPULARITY
Categories
In Episode 032 of DEFCON ZERQ, Alpha Warrior and Josh Reid unpack the strategic landscape following recent legal and political developments, focusing on timing, optics, and narrative control. The hosts analyze how court rulings, executive responses, and media amplification interact to shape public perception in high-stakes moments. They revisit key themes surrounding institutional authority, questioning whether apparent setbacks are tactical pivots rather than defeats. The discussion emphasizes discernment over emotional reaction, encouraging listeners to evaluate moves within a broader strategic framework rather than through isolated headlines. Alpha and Josh also explore the role of public patience, the importance of understanding legal pathways, and how information is selectively framed to influence momentum. Throughout the episode, they stress the value of staying grounded, maintaining perspective, and recognizing patterns over personalities. Ep. 032 continues the DEFCON ZERQ tradition of blending current events with strategic analysis, challenging the audience to look beyond surface narratives and consider the deeper positioning at play.
Parce que… c'est l'épisode 0x712! Shameless plug 25 et 26 février 2026 - SéQCure 2026 31 mars au 2 avril 2026 - Forum INCYBER - Europe 2026 14 au 17 avril 2026 - Botconf 2026 28 et 29 avril 2026 - Cybereco Cyberconférence 2026 9 au 17 mai 2026 - NorthSec 2026 3 au 5 juin 2026 - SSTIC 2026 19 septembre 2026 - Bsides Montréal 1 au 3 décembre 2026 - Forum INCYBER - Canada 2026 Notes IA Sécurité et le code Kevin Beaumont: “Today in InfoSec Job Security …” - Cyberplace AI Found Twelve New Vulnerabilities in OpenSSL Anthropic rolls out embedded security scanning for Claude Cyber Stocks Slide As Anthropic Unveils ‘Claude Code Security' Plagiat chez Microsoft Microsoft deletes blog telling users to train AI on pirated Harry Potter books Microsoft Uses Plagiarized AI Slop Flowchart To Explain How Git Works The Promptware Kill Chain Why ‘secure-by-design' systems are non-negotiable in the AI era Side-Channel Attacks Against LLMs Gentoo dumps GitHub over Copilot nagware European Parliament bars lawmakers from AI tools AI chatbots to face strict online safety rules in UK LLM-generated passwords ‘fundamentally weak,' experts say PromptSpy ushers in the era of Android threats using GenAI Claude just gave me access to another user's legal documents OpenClaw Security Fears Lead Meta, Other AI Firms To Restrict Its Use Was an Amazon Service Taken Down By Its AI Coding Bot? Kevin Beaumont: “Microsoft need a better way of…” - Cyberplace OpenAI Employees Raised Alarms About Canada Shooting Suspect Months Ago The Internet Is Becoming a Dark Forest — And AI Is the Hunter Souveraineté ou tout ce que je peux faire sur mon terrain India's New Social Media Rules: Remove Unlawful Content in Three Hours, Detect Illegal AI Content Automatically UK to require tech firms to remove nonconsensual intimate images within 48 hours or face fines Greece throws support behind social media bans for kids Kevin Beaumont: “Ireland's data protection watc…” - Cyberplace Spain orders NordVPN, ProtonVPN to block LaLiga piracy sites Poland bans Chinese-made cars from entering military sites Texas sues TP-Link over Chinese hacking risks, user deception Microsoft throws spox under the bus in ICC email flap Digital sovereignty must define itself before it can succeed “Made in EU” - it was harder than I thought. Privacy ou tout ce qui devrait rester à la maison Underground Facial Recognition Tool Unmasks Camgirls Leaked Email Suggests Ring Plans to Expand ‘Search Party' Surveillance Beyond Dogs Mysk
サイバーセキュリティカンファレンス「DEF CON」は、いわゆる“エプスタイン・ファイル”に名が挙がっている 3 名について、将来の全てのイベントへの参加を禁じる追放者リストに追加した。なお、この 3 名は誰一人として刑事責任を問われているわけではない。DEF CON は「追放者リストには多くの個人が含まれるが、その多くは公表されない」としており、2017 年以降、昨年まで公式 Web サイトで公表された追放者はこれまで 6 名のみだった。繰り返しになるが、3 名全員、犯罪への関与は指摘されていない。
This week, we're sharing two segments. First up, a chat with Cooper Quintin, a senior staff technologist at the Electronic Frontier Foundation and developer of the Rayhunter. Rayhunter is open-source firmware to turn specific hotspots into IMSI-catcher, effectively scanning for and logging any signs of fake cell towers (often known under the brand-name of Stingrays) in the area. Law enforcement has at times deployed these as a way of collecting information about phones in the area and could use it to intercept some communications like sms or phone calls. Cooper talks about what's known of law enforcement use of IMSI-catchers, what has been observed of the data collected by deployed Rayhunters, phone security at demonstrations and related topics. Then you'll hear Radio Ausbruch from Frieberg from this month's B(A)D News podcast from the A-Radio Network talking about the repression and deBanking of anti-repression projects like ABC Dresden and Rote Hilfe in Germany based on pressure from the US government related to the so-called Antifa Ost case. This carries heavy implications for prisoner support, anti-racist and other social struggles. Links Cooper at DefCon talking about Rayhunter: https://m.youtube.com/watch?v=meC2JqNAbCA EFF on what Rayhunter has found so far: https://www.eff.org/deeplinks/2025/09/rayhunter-what-we-have-found-so-far Github for Rayhunter: https://github.com/EFForg/rayhunter EFF Mattermost chat platform: https://opensource.eff.org/ A project for detecting Meta Rayban sunglasses: https://github.com/NullPxl/banrays Ouispy bluetooth scanning and notification tool: https://github.com/colonelpanichacks/oui-spy . ... . .. Featured Track: TFSR by The Willows Whisper
John has officially reached DEFCON 1… and apparently, so has his wardrobe. On this episode, John threatens public nudity if his latest sports prediction doesn't come true (yes, we're concerned too). The guys debate whether the Chicago Bears are actually plotting an escape from Chicago, what that would mean for the lakefront, and why stadium drama always gets more attention than the offensive line. Plus, are the Tennessee Titans cooking up fresh new uniforms to distract from the rebuild? We break down the rumors, the rebrands, and whether a new look can fix old problems. Wardrobe malfunctions, moving trucks, and makeover season in the NFL — it's all here. Listen responsibly.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Starkiller represents a significant escalation in phishing infrastructure. A blockchain lender breach affects nearly a million users. The Kimwolf botnet disrupts a peer-to-peer privacy network. Researchers identifiy vulnerabilities in widely used Visual Studio Code extensions. DEF CON bans three men named in the Epstein files. Texas sues TP-Link over supply chain security. Experts question the impact of cyber versus kinetic damage in Venezuela. African law enforcement arrest hundreds of suspected scammers. Tim Starks from CyberScoop explains CISA's upcoming town hall meetings over ICS reporting rules. Warsaw walls off Wi-Fi-wired wheels. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Tim Starks from CyberScoop discussing “CISA to host industry feedback sessions on cyber incident reporting regulation.” Selected Reading Starkiller: New ‘Commercial-Grade' Phishing Kit Bypasses MFA (Infosecurity Magazine) Nearly 1 Million User Records Compromised in Figure Data Breach (SecurityWeek) Kimwolf Botnet Swamps Anonymity Network I2P (Krebs on Security) Flaws in Popular IDE Extensions Allow Data Exfiltration (Infosecurity Magazine) DEF CON bans three Epstein-linked men from future events (The Register) Texas sues TP-Link over Chinese hacking risks, user deception (Bleeping Computer) The Caracas operation suggests cyber was part of the plan – just not the whole operation (CyberScoop) Police arrests 651 suspects in African cybercrime crackdown (Bleeping Computer) Nigerian man gets eight years in prison for hacking tax firms (Bleeping Computer) Poland bans camera-packing cars made in China from military bases (The Register) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
In Episode 031 of DEFCON ZERQ, Alpha Warrior and Josh Reid go live to dissect the intensifying Epstein narrative, the SAVE Act battle in the Senate, and what they see as a broader strategy unfolding ahead of the midterms. The conversation centers on whether Trump is deliberately allowing public frustration to build in order to force accountability through representatives, declassification, and potential emergency powers tied to election infrastructure. They analyze John Solomon's comments about forthcoming revelations regarding 2020 election interference, foreign involvement, and intelligence agencies, connecting it to possible summer disclosures and the political fallout that could follow. The hosts also debate mainstream media's sudden shift in tone on Q, asking whether it's infiltration, misdirection, or something bigger. The episode closes with a deep dive into Zorro Ranch, national security implications, and allegations of scientific espionage tied to Epstein's network. Throughout, Alpha and Josh challenge viewers to think critically, question narratives on both sides, and prepare for what they believe could be a decisive turning point in 2026.
Another shooting occurred yesterday at a high school hockey game, when a transgender father targeted his family and then turned the gun on himself. When will society admit that transgenderism is a mental illness, not something to be affirmed or celebrated? Glenn also discusses a Palestinian activist suggesting that dogs should be banned in New York City. Is Canada about to team up with China? Glenn discusses the possibility of the Canadian government forming an “anti-Trump” trade alliance and what that would mean for Canada. Independent Institute senior fellow Judy Shelton joins to discuss America's struggling economy and how everything she predicted decades ago has sadly come true. Sen. Mike Lee (R-Utah) joins to discuss how close the Senate is to passing the SAVE Act and why the Lee-dubbed "zombie filibuster" needs to go. Glenn lays out why the gold standard needs to come back for America to get out of its mess. Money is more than just something you spend. Glenn explains how every modern problem in America today can be traced back to a progressive policy gone wrong. Why is America intentionally destroying itself from within? Learn more about your ad choices. Visit megaphone.fm/adchoices
Documents released by the U.S. Justice Department show that convicted sex offender Jeffrey Epstein spent years corresponding with figures in the cybersecurity community and repeatedly tried to involve himself with two of the world's biggest hacker conventions, DEF CON and Black Hat, in Las Vegas. According to emails reviewed by Politico, Epstein's interest in cryptography and cybersecurity extended back to at least 2010, and he discussed topics ranging from network security to ways of pushing negative information about himself down in internet search results. Though he expressed a desire to attend these major events — even at times proposing to bring high-profile guests — there's no clear evidence he ever actually got into either conference, and organizers like Jeff Moss have said there's no proof he followed through on plans to attend.The documents also reveal Epstein's broader tech network, including contacts with researchers and entrepreneurs introduced through academic and startup circles. Among those mentioned was Italian security researcher Vincenzo Iozzo, who communicated with Epstein about potential business opportunities and emerging technologies but has denied doing any technical work for him. An FBI file included in the release also alleges Epstein may have had an unidentified “personal hacker” who developed offensive cyber tools sold to governments, though the name was redacted and some of the claims remain unverified.to contact me:bobbycapucci@protonmail.comsource:Jeffrey Epstein spent years building ties to well-known hackers - POLITICO
Documents released by the U.S. Justice Department show that convicted sex offender Jeffrey Epstein spent years corresponding with figures in the cybersecurity community and repeatedly tried to involve himself with two of the world's biggest hacker conventions, DEF CON and Black Hat, in Las Vegas. According to emails reviewed by Politico, Epstein's interest in cryptography and cybersecurity extended back to at least 2010, and he discussed topics ranging from network security to ways of pushing negative information about himself down in internet search results. Though he expressed a desire to attend these major events — even at times proposing to bring high-profile guests — there's no clear evidence he ever actually got into either conference, and organizers like Jeff Moss have said there's no proof he followed through on plans to attend.The documents also reveal Epstein's broader tech network, including contacts with researchers and entrepreneurs introduced through academic and startup circles. Among those mentioned was Italian security researcher Vincenzo Iozzo, who communicated with Epstein about potential business opportunities and emerging technologies but has denied doing any technical work for him. An FBI file included in the release also alleges Epstein may have had an unidentified “personal hacker” who developed offensive cyber tools sold to governments, though the name was redacted and some of the claims remain unverified.to contact me:bobbycapucci@protonmail.comsource:Jeffrey Epstein spent years building ties to well-known hackers - POLITICOBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.
Documents released by the U.S. Justice Department show that convicted sex offender Jeffrey Epstein spent years corresponding with figures in the cybersecurity community and repeatedly tried to involve himself with two of the world's biggest hacker conventions, DEF CON and Black Hat, in Las Vegas. According to emails reviewed by Politico, Epstein's interest in cryptography and cybersecurity extended back to at least 2010, and he discussed topics ranging from network security to ways of pushing negative information about himself down in internet search results. Though he expressed a desire to attend these major events — even at times proposing to bring high-profile guests — there's no clear evidence he ever actually got into either conference, and organizers like Jeff Moss have said there's no proof he followed through on plans to attend.The documents also reveal Epstein's broader tech network, including contacts with researchers and entrepreneurs introduced through academic and startup circles. Among those mentioned was Italian security researcher Vincenzo Iozzo, who communicated with Epstein about potential business opportunities and emerging technologies but has denied doing any technical work for him. An FBI file included in the release also alleges Epstein may have had an unidentified “personal hacker” who developed offensive cyber tools sold to governments, though the name was redacted and some of the claims remain unverified.to contact me:bobbycapucci@protonmail.comsource:Jeffrey Epstein spent years building ties to well-known hackers - POLITICOBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-moscow-murders-and-more--5852883/support.
AI is moving fast from research to real-world deployment, and when things go wrong, the consequences are no longer hypothetical. In this episode, Sean McGregor, co-founder of the AI Verification & Evaluation Research Institute and also the founder of the AI Incident Database, joins Chris and Dan to discuss AI safety, verification, evaluation, and auditing. They explore why benchmarks often fall short, what red-teaming at DEF CON reveals about machine learning risks, and how organizations can better assess and manage AI systems in practice.Featuring:Sean McGregor– LinkedInChris Benson – Website, LinkedIn, Bluesky, GitHub, XDaniel Whitenack – Website, GitHub, XLinks:AI Verification & Evaluation Research InstituteAI Incident Database38th convening of IAAIBenchRiskState of Global AI Incident ReportingUpcoming Events: Register for upcoming webinars here!
Reviewing the 9 midweek games with XG plots, average position maps, data and all of the DEFCON and Bonus Points as Joao Pedro and Palmer continue to bang, Haaland went off injured and Virgil hit 17 points!!
In Episode 030 of DEFCON ZERQ, Alpha Warrior and Josh Reid dive into the psychology behind power structures, perception management, and the subtle mechanisms used to manufacture consensus. The discussion explores how narrative control operates through emotional triggers, fear conditioning, and repetition, shaping public reaction long before facts are fully understood. The hosts examine how institutions rely on confusion, moral framing, and manufactured urgency to drive behavior, while encouraging listeners to recognize patterns instead of reacting impulsively. They analyze how digital culture amplifies outrage cycles, how groupthink is reinforced, and why psychological resilience is a critical skill in modern information warfare. Throughout the episode, Alpha and Josh emphasize mental discipline, self-awareness, and the importance of detaching from engineered emotional responses. Rather than chasing every headline, they argue for slowing down, studying tactics, and understanding how power actually maintains itself. A sharp, tactical conversation focused on discernment, psychological strength, and recognizing the illusion of control before it controls you.
No need to panic because we told you so! We are at a Defcon 1! Nintendo announced and already streamed a Nintendo Partner Direct and PlayStation announced a whopping 60 + minute State of Play this week. We go into a lengthy discussion about both. Speaking of PlayStation, the next franchise to get a multiplayer spin-off is Horizon. Can it stand out among the many live service attempts from PlayStation? We end on the demo for the upcoming game from Capcom, Pragmata, as both Jon and Nick both played it. Thanks for listening! Intro: Horizon Hunters Gathering 5 Things: - Craig Mazin and the future of The Last of Us - Overwatch 2 reverts back to Overwatch - Horizon Hunters Gathering - Nintendo Partner Direct February 2026 - PlayStation State of Play February 2026 Predictions - Pragmata Questions or comments? Please send emails to BetweenTheJoysticks@gmail.com. Follow us on Twitter @JoysticksPod Subscribe to us on Youtube @BetweenTheJoysticks
On this wild Jubal Phone Prank, a high-ranking NFL staffer gets a call that no one wants to receive—especially just days before the Super Bowl. A hotel “manager” drops shocking news about contracts, ownership changes, and an immediate eviction that could derail everything. Tensions rise fast, lawyers get threatened, and the stress hits DEFCON 1 before the truth finally comes out. The wildest, most hilarious prank call podcast from The Jubal Show! Join Jubal Fresh as he masterminds the funniest and most outrageous phone pranks, catching unsuspecting victims off guard with his quick wit, absurd scenarios, and unmatched comedic timing. Whether he's posing as an over-the-top customer service rep, a clueless boss, or an eccentric neighbor, no call is safe from his unpredictable humor. Get ready to laugh out loud and cringe in the best way possible! New episodes drop every weekday—tune in and let the prank wars begin!➡︎ Submit your Jubal Phone Prank - https://thejubalshow.com This is just a tiny piece of The Jubal Show. You can find every podcast we have, including the full show every weekday right here…➡︎ https://thejubalshow.com/podcasts The Jubal Show is everywhere, and also these places: Website ➡︎ https://thejubalshow.com Instagram ➡︎ https://instagram.com/thejubalshow X/Twitter ➡︎ https://twitter.com/thejubalshow Tiktok ➡︎ https://www.tiktok.com/@the.jubal.show Facebook ➡︎ https://facebook.com/thejubalshow YouTube ➡︎ https://www.youtube.com/@JubalFresh Support the show: https://the-jubal-show.beehiiv.com/subscribeSee omnystudio.com/listener for privacy information.
On this wild Jubal Phone Prank, a high-ranking NFL staffer gets a call that no one wants to receive—especially just days before the Super Bowl. A hotel “manager” drops shocking news about contracts, ownership changes, and an immediate eviction that could derail everything. Tensions rise fast, lawyers get threatened, and the stress hits DEFCON 1 before the truth finally comes out. The wildest, most hilarious prank call podcast from The Jubal Show! Join Jubal Fresh as he masterminds the funniest and most outrageous phone pranks, catching unsuspecting victims off guard with his quick wit, absurd scenarios, and unmatched comedic timing. Whether he's posing as an over-the-top customer service rep, a clueless boss, or an eccentric neighbor, no call is safe from his unpredictable humor. Get ready to laugh out loud and cringe in the best way possible! New episodes drop every weekday—tune in and let the prank wars begin!➡︎ Submit your Jubal Phone Prank - https://thejubalshow.com This is just a tiny piece of The Jubal Show. You can find every podcast we have, including the full show every weekday right here…➡︎ https://thejubalshow.com/podcasts The Jubal Show is everywhere, and also these places: Website ➡︎ https://thejubalshow.com Instagram ➡︎ https://instagram.com/thejubalshow X/Twitter ➡︎ https://twitter.com/thejubalshow Tiktok ➡︎ https://www.tiktok.com/@the.jubal.show Facebook ➡︎ https://facebook.com/thejubalshow YouTube ➡︎ https://www.youtube.com/@JubalFresh Support the show: https://the-jubal-show.beehiiv.com/subscribeSee omnystudio.com/listener for privacy information.
documents and explore what the redactions, timelines, and recurring names may signal about ongoing investigations. The discussion centers on 18 U.S.C. §3521 and how witness protection operates without judicial oversight, raising questions about who controls disclosures and why certain information remains hidden. The hosts examine email excerpts, document patterns, and institutional overlaps involving intelligence agencies, biotech interests, and genetic data collection. They also break down how massive data releases can both reveal and obscure truth, and why information saturation may be a deliberate tactic. Throughout the episode, Alpha and Josh emphasize methodical analysis over speculation, encouraging viewers to independently verify documents and understand how power structures protect themselves. This conversation connects legal mechanisms, information control, and historical precedent to frame a broader picture of how narratives are managed when accountability is at stake.
Nuevo magazine que como siempre os trae un muestreo de lo que se cuece en nuestro país, lleno de grandes grupos y nuestros colaboradores aportando su granito de arena. De nuevo Sabino y Kikemaiden os traen sus típicos comentarios y desvarios varios. Seguimos luchando por nuestra escena. -RAVE IN FIRE: STILL STANDING. -BOURBON KINGS & DEF CON 2: HAKA. ---------------- -ZONA CORE (BEA BATHORY)/ALTAMIRA AD: DIVISION. -SANTUARI RADIO/ ORPHANS OF PIETY. --------------------- -LADY DOG: JARRAMPLAS KILLER. -HURACAN ROSE: NOCHE DE MOSCÚ. --------------- -METALINGUS RADIO SHOW/ BLEEDING ABYSS: LONG WAY HOME -ZONA NORTE/ PERVERSONICAS: A ESCAPARRAR. -FEEDBACK EXTREMADURA ROCK/ DAWNSTONE: LEAD TO LIGHT ---------------- -ERGUM: LA TINTA DE LA VOLUNTAD. *TERTULIA *FESTIVA LOBOTOMY EXTREME VOL.IV -MOTH: LEARN TO KNEELK. -ALTO VOLTO: VENENO. ---------------- -JOAKI (NOCHE DE ROCK)/ NADF: EXTRAÑA -ROCK´ANTENA ROLL/ BLACK TV: MAGIA NEGRA. -MAY WITHOT FLOWERS (SECCIÓN GOTHIC/DOOM)/ ARTIC REFLECTIOS. ----------------- -KANTE PINRELICO: SOY DE KARTAGENA. -MASTÍN: CADA VEZ QUE CAEMOS. ------------------- -LA MIRADA NEGRA/LOTURA: NAHIKO. -LA PALLOZA DEL SOLO/SHUT THE GUILT: IN THIS TRENCH. --------------- -BATTERING RAM: INMORATLITY FED BY DEATH. -DRUNKHEN BUDDA: THE BATTLES ON. -FAUSTO TARANTO: CAPERUCITA
In Episode 028 of DEFCON ZERQ, host Josh Reid breaks down the mechanics of psychological warfare and how fear is deliberately manufactured, amplified, and weaponized against populations. The episode focuses on perception management, narrative control, and the use of uncertainty to influence behavior at scale. Josh examines how media cycles, official messaging, and emotional triggers work together to keep people reactive rather than analytical. The discussion also explores the difference between real threats and perceived ones, emphasizing how repetition and authority are used to normalize pressure and compliance. Throughout the episode, attention is given to pattern recognition, critical thinking, and the importance of remaining grounded when information environments are intentionally distorted. Episode 028 offers a focused examination of how chaos is engineered, why fear is such an effective tool, and how awareness becomes the first line of defense.
Mark Omo and James Rowley spoke with us about safecracking, security, and the ethics of doing a bad job. Mark and James gave an excellent talk on the development of their safecracking tools at DEF CON 33: Cash, Drugs, and Guns: Why Your Safes Aren't Safe. It included a section of interaction involving the lock maker's lawyers bullying them and how the Electronic Frontier Foundation (EFF) has a Coders' Rights Project to support security research. As mentioned in the show, the US Cyber Trust Mark baseline has a very straightforward checklist; NISTIR 8259 is the overall standard, NISTIR 8259A is the technical checklist, NISTIR 8259B is the non-technical (process/maintenance) checklist. Roughly the process is NISTIR 8259 -> Plan/Guidance; NISTIR 8259A -> Build; NISTIR 8259B -> Support. We discussed ETSI EN 303 645 V3.1.3 (2024-09) Cyber Security for Consumer Internet of Things: Baseline Requirement and the EU's CRA: Cyber Resilience Act which requires manufacturers to implement security by design, have security by default, provide free security updates, and protect confidentiality. See more here: How to prepare for the Cyber Resilience Act (CRA): A guide for manufacturers. We didn't mention Ghidra in the show specifically, but it is a tool for reverse engineering software: given a binary image, what was the code? Some of the safecracking was helped by the lock maker using the same processor in the PS4 which has many people looking to crack it. See fail0verflow :: PS4 Aux Hax 1: Intro & Aeolia for an introduction. Mark and James have presented multiple times at Hardwear.io, a series of conferences and webinars about security (not wearables). Some related highlights: 2024: Breaking Into Chips By Reading The Datasheet is about the exploit developed for the older lock version on the safes discussed in the show. USA 2025: Extracting Protected Flash With STM32-TraceRip is about STM32 exploits.
We are Virginia Sole-Smith and Corinne Fay and it's time for your January Indulgence Gospel! Today we are talking about former restaurant critic turned diet crusader Pete Wells—and why the New York Times always spends January turning into a women's magazine from hell. CW for discussions of intentional weight loss and lazy fat jokes (from Pete), including some that are offensive to both humans and bassett hounds. You do need to be a paid Just Toast subscriber to listen to this full conversation. Membership starts at just $5 per month!Join Just Toast!Don't want an ongoing commitment? Click "buy for $4!" to listen to just this one.
Alpha Warrior and Josh Reid return with a focused and uncompromising discussion centered on narrative warfare, psychological pressure, and the exposure of systems built on deception. Episode 027 examines how fear, confusion, and information overload are intentionally used to destabilize populations, while stressing the importance of discipline, clarity, and emotional control in moments of escalation. The conversation moves through themes of institutional failure, collapsing credibility, and the consequences of systems that rely on compliance rather than truth. Alpha and Josh emphasize preparedness, personal responsibility, and situational awareness, warning against reactive thinking and premature conclusions. Throughout the episode, they reinforce the idea that endurance, restraint, and resolve are critical as pressure continues to build across political, economic, and cultural fronts, framing the current moment as a test of mindset as much as circumstance.
With players returning from AFCON and favourable fixtures coming up, the instant reaction to Michael Carrick's arrival as head coach against rivals Man City has pulled Man Utd players back into consideration
Alpha Warrior and Josh Reid dig into a dense, high-signal discussion focused on unrestricted warfare, global power dynamics, and the importance of staying calm as events accelerate. The episode connects the Epstein investigation, the Clinton Foundation, financial laundering networks, and intelligence operations, emphasizing how money flows tie together political, corporate, and transnational actors. They explore Q posts, deltas, and comms pointing to escalating accountability, including contempt of Congress, grand jury activity, and institutional exposure. The conversation expands into Iran, proxy warfare, regime destabilization, and energy politics, framing current unrest as part of a broader global pressure test. Throughout the episode, Alpha and Josh stress information discipline, pattern recognition, and emotional control, arguing that panic and anxiety are weapons used against the public. The show closes by reinforcing preparedness, clarity, and the idea that civilization is fragile, defended not by abstractions, but by force, awareness, and resolve.
Over the last 2 years, I've been effectively fighting for my life against the Daily Wire. 95% of what I have gone through, the public knows nothing about. That changes today. I received more information about their latest plot against me and frankly, I am disturbed. In other news, a former employee of Turning Point Action, hired by Tyler Bowyer, has been sentenced for a crime in Arizona. 00:00 - Start. 02:10 - More new details about Daily Wire's weird new project. 13:04 - Ben's history of no-nos. 36:31 - The pressure on me to condemn Kanye and Charlie's dreams. 47:46 - Former Turning Point leader gets probation for signature fraud. 54:46 - Comments. Magisterium AI Go to http://www.Magisterium.com/CANDACE or download the app for free on iOS or Android. Use code CANDACE to upgrade to Pro and get 25% off your first year. Nimi Skincare Save 10% on your order with promo code CANDACE10 at http://www.NimiSkincare.com PureTalk Make the switch today and save an additional 50% off your first month at http://www.PureTalk.com/Owens American Financing NMLS 182334, http://www.nmlsconsumeraccess.org. APR for rates in the 5s start at 6.196% for well qualified borrowers. Call 800-795-1210 for details about credit costs and terms. Visit http://www.AmericanFinancing.net/Owens. Candace Official Website: https://candaceowens.com Candace Merch: https://shop.candaceowens.com Candace on Apple Podcasts: https://t.co/Pp5VZiLXbq Candace on Spotify: https://t.co/16pMuADXuT Candace on Rumble: https://rumble.com/c/RealCandaceO Candace en Español: https://www.youtube.com/@CandaceOwensEnEspanol Candace Owens em Português: https://www.youtube.com/@CandaceOwensemPortugues Candace Owens en Français: https://www.youtube.com/@CandaceOwensEnFrançais Learn more about your ad choices. Visit megaphone.fm/adchoices
In Episode 025 of DEFCON ZERQ, Alpha Warrior and Josh Reid open with discussion around internal conflict within the MAGA movement, addressing online pressure campaigns, attempts to silence dissent, and debates over loyalty versus accountability. The conversation emphasizes the role of public opinion, free speech, and citizen pressure as essential elements of American political power. The episode then moves into detailed discussion of Venezuela, focusing on the military operation that resulted in Nicolás Maduro's capture, the absence of U.S. casualties, and what the operation signals about the current posture of the Trump administration. Alpha and Josh expand the discussion to unrestricted warfare, fifth-generation warfare, and historical examples of power projection, arguing that modern conflict extends far beyond traditional battlefields. Additional segments cover China's global strategy, energy and supply chain leverage, the multipolar world framework, information warfare, and recent statements from U.S. leadership. The episode concludes with audience interaction, geopolitical analysis, and reflections on the responsibilities of citizens during periods of rapid political and military change.
In this episode of DEFCON ZERQ, Alpha Warrior and Josh Reid walk through a wide-ranging, end-of-year discussion focused on pattern recognition, comms, and escalating global tension. The conversation opens with analysis of President Trump's social media posts, symbolism, and timestamps, including the “bald eagle” image and references to “hold the line” and “unleash hell,” which the hosts connect to prior drops and messaging. From there, Alpha and Josh examine developments across Russia, Ukraine, the UK, China, Taiwan, Iran, and Israel, discussing military actions, assassination attempts, arms deals, and economic signals such as silver price movements. The episode also explores the concept of unrestricted warfare, intelligence operations, lone-actor narratives, and the use of psychological and informational warfare against the public. As the final DEFCON ZERQ of 2025, the show reflects on the past year, offers forward-looking expectations for 2026, and closes with a message centered on resilience, perseverance, and staying grounded as events continue to unfold.
In this episode of Mission Matters, Adam Torres interviews DeAnna Charett, Founder & Producer at Bad Habitz Productions, LLC, about her first AFM experience, live pitching, and her veteran-first production model—staffing at least 60% of cast and crew with military veterans while developing projects including Dealer's Choice, The Cairo, and DEFCON 4: Land of the Morning Calm. This interview is part of our AFM 2025 Series. Big thank you to American Film Market ! Follow Adam on Instagram at https://www.instagram.com/askadamtorres/ for up to date information on book releases and tour schedule. Apply to be a guest on our podcast: https://missionmatters.lpages.co/podcastguest/ Visit our website: https://missionmatters.com/ More FREE content from Mission Matters here: https://linktr.ee/missionmattersmedia Learn more about your ad choices. Visit podcastchoices.com/adchoices
In this episode of Mission Matters, Adam Torres interviews DeAnna Charett, Founder & Producer at Bad Habitz Productions, LLC, about her first AFM experience, live pitching, and her veteran-first production model—staffing at least 60% of cast and crew with military veterans while developing projects including Dealer's Choice, The Cairo, and DEFCON 4: Land of the Morning Calm. This interview is part of our AFM 2025 Series. Big thank you to American Film Market ! Follow Adam on Instagram at https://www.instagram.com/askadamtorres/ for up to date information on book releases and tour schedule. Apply to be a guest on our podcast: https://missionmatters.lpages.co/podcastguest/ Visit our website: https://missionmatters.com/ More FREE content from Mission Matters here: https://linktr.ee/missionmattersmedia Learn more about your ad choices. Visit podcastchoices.com/adchoices
A special holiday crossover with The Bang-Bang Podcast! Van Jackson and Lyle Rubin are joined by the preeminent nuclear scholar Scott Sagan to discuss A House of Dynamite, the 2025 political thriller that imagines nuclear catastrophe not as spectacle or obvious madness, but as an orderly sequence of decisions made under crushing time pressure. Structured as interlocking vignettes rather than a single command-room drama, the film moves between the White House, STRATCOM, missile defense sites, continuity bunkers, and civilian spaces, sketching a system that largely works as designed and still produces annihilation.The film's opening establishes its governing logic. Inclination is flattening. Timelines shrink. Judgment collapses into procedure. “Nineteen minutes to impact.” “Sixteen minutes.” “Confirm impact.” Across locations, professionals do their jobs calmly while the meaning drains out of their actions. A senior officer tells a junior colleague to keep the cafeteria line moving. A staffer compiles names and Social Security numbers for the dead. Phones come out. Final calls are made. The end of the world arrives not with hysteria, but with etiquette.Much of the tension turns on probability. Missile defense is described as “hitting a bullet with a bullet.” Sixty-one percent becomes the moral threshold, a coin toss bought with billions of dollars. Baseball chatter at STRATCOM blends into DEFCON alerts. A Civil War reenactment at Gettysburg unfolds alongside real-time catastrophe, collapsing past and present forms of American mass death into a single frame.Scott is critical of the film's portrayal of nuclear command and control. He argues that its depiction of retaliatory decision-making is wrong, that no president would order nuclear strikes against loosely defined adversaries without firm attribution or confirmation, and that the film risks backfiring by encouraging faith in ever more elaborate missile defenses rather than disarmament. Lyle pushes back, questioning whether this confidence in institutional sanity is warranted, especially given the political moment. Either way, the film lands a disturbing insight. The danger is not wild irrationality, but systems that normalize impossible choices. Nuclear war here would not look like collapse. It would look like competence.Further ReadingScott's Wiki page“Just and Unjust Nuclear Deterrence” by ScottThe Limits of Safety: Organizations, Accidents, and Nuclear Weapons by Scott“Thinking and Moral Considerations” by Hannah ArendtReview of A House of Dynamite in Bulletin of Atomic Scientists by Scott and Shreya Lad“Peacecraft and the Nuclear Policy Dilemma” by Van“Fresh Hell: Unjust Nuclear Deterrence and Nuclear Testing” by Van
On Joe Oltmann Untamed today, Joe unleashes fury on the endless parade of corruption and distraction crumbs. He slams the Katie Hobbs scandal exploding to DEFCON-1 in Arizona, exposes Matt Gaetz's explosive revelations of the deep rot that drove him out of Congress, and demands to know why we are still just getting crumbs. From Minnesota's deadly Medicaid fraud killing citizens to Lindsey Graham allegedly laundering Ukraine war funds, Joe exposes the Uniparty's greed while Americans suffer and die.Powerhouse guest David Clements, former law professor, seasoned prosecutor, and fearless host of The Professor's Record, joins Joe to break down the urgent need to free Tina Peters. As a leading voice exposing election fraud and J6 injustices, David lays out how President Trump can use executive authority to override Colorado's defiance of the pardon, drawing on historical precedents of presidents liberating Americans from rogue state captivity. This is a high-stakes call for justice and a roadmap to dismantle the weaponized system silencing whistleblowers.The show closes with a brutal wake-up call: the Uniparty's real, the swamp is thriving, and distractions like Denver's giant see-saws mock our suffering. Joe declares enough is enough it's time to clean house, hold traitors accountable, and reclaim America before the rot consumes us all. This is Joe Oltmann Untamed: righteous anger, undeniable truth, and the battle cry to fight back. Tune in, wake up, and join the untamed resistance today!
In Episode 023 of DEFCON ZERQ, Alpha Warrior and Josh Reid explore emerging signals at the intersection of information warfare, decentralization, and financial systems. The conversation moves through timing, narrative construction, and the psychological pressure surrounding global escalation, while examining how alternative systems challenge centralized control. Alpha and Josh discuss how messaging, fear cycles, and strategic ambiguity are used to shape public perception, and why understanding patterns matters more than reacting to headlines. Throughout the episode, the hosts emphasize discernment, historical context, and the importance of separating genuine signals from amplified noise as new financial and informational paradigms collide.
Hour 4: Nathan Zegura + Cavs at DEFCON 1 full 1579 Fri, 19 Dec 2025 14:50:35 +0000 THdQBXqjqjVrJHexbD51cjKj29qmLQlL sports The Ken Carman Show with Anthony Lima sports Hour 4: Nathan Zegura + Cavs at DEFCON 1 The only place to talk about the Cleveland sports scene is with Ken Carman and Anthony Lima. The two guide listeners through the ups and downs of being a fan of the Browns, Cavaliers, Guardians and Ohio State Buckeyes in Northeast Ohio. They'll help you stay informed with breaking news, game coverage, and interviews with top personalities.Catch The Ken Carman Show with Anthony Lima live Monday through Friday (6 a.m. - 10 a.m ET) on 92.3 The Fan, the exclusive audio home of the Browns, or on the Audacy app. For more, follow the show on X @KenCarmanShow. 2024 © 2021 Audacy, Inc. Sports False https://player.amperwavepodcasting.com?feed-link=htt
Ken Carman and Anthony Lima discuss the Cleveland Cavaliers, whether the team is at "DEFCON 1" amidst a disappointing stretch of the season, and Lima asks a question regarding Christmas gifts.
In Episode 022 of DEFCON ZERQ, Alpha Warrior and Josh Reid react in real time to President Trump's “My Fellow Americans” announcement and unpack the signals surrounding an imminent national address. The conversation dives into escalating global and domestic tensions, including suspected cartel activity, embassy corruption, terror incidents, and mounting pressure inside the Trump administration. Alpha and Josh analyze the Susie Wiles controversy, withheld intelligence, ambassador shakeups, and the possibility of a major internal realignment, while connecting dots between Q references, timing markers, and recent Truth Social posts. The episode also explores media manipulation, foreign influence, censorship pressure campaigns, and why multiple events appear to be converging at once. Fast paced, speculative, and deeply connective, this episode captures the sense that something significant may be approaching and why the hosts believe the next moves matter.
Alpha Warrior and Josh Reid break down one of the most explosive episodes yet as they analyze General Flynn's latest statements, the escalating geopolitical tension in the Caribbean, and the deep infiltration shaping America's internal power struggle. They dig into Patrick Byrne's claims about blackmail and intelligence corruption, Supreme Court cases that could unravel the administrative state, and how Cuban, Venezuelan, and CCP networks have influenced U.S. policy for decades. With rising threats near U.S. waters, shifting military posture, and growing talk of unrestricted warfare, the hosts connect Flynn's warning to the broader information battlefield—arguing that the fight unfolding now spans cyber operations, foreign influence, and covert actors embedded in government itself. Fast-paced, high-signal, and unapologetically direct, this episode lays out why the stakes have never been higher.
Send us a textWe trace Jake's unlikely route from journalism to the White House, how DEF CON's Voting Village began, and why imposter syndrome can be a secret advantage when paired with relentless learning. Then we pull apart cyber strategy, Stuxnet's signal value, and a plan to choke fentanyl through targeted offensive operations against cartels' digital lifelines.• launching a policy career by building expert networks• founding the DEF CON Voting Village and publishing policy insights• managing imposter syndrome with trusted advisors and study• shifting from shields up to active defense in cyber• why Stuxnet's visibility served a political goal• using law enforcement cyber tactics beyond ransomware• how fentanyl economics and pill presses scaled harm• China's precursor role and Sinaloa's market pivot• Coast Guard and HSI authorities for upstream disruption• making fentanyl unprofitable through targeted cyber pressureFind Jake on LinkedIn: Jake BronnBook: Fentanyl, The Mass Poisoning Of America And The Cartel Behind ItSupport the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
Alpha Warrior and Josh Reid take viewers deep into the digital battlefield, breaking down Trump's sudden flood of reposts to patriot accounts, the White House sharing Alpha's viral “Seditious Six” video, and General Flynn's message that the future hinges on Americans using their collective voice. They connect key Q-post timestamps, Trump's Truth Social cues, and Melania's symbolic Christmas imagery to show how public engagement and information warfare now shape political outcomes. The hosts lay out why civic pressure, not passive spectatorship, is driving major shifts, from Cyber Command's reported strike on Serbian servers to Trump's push for paper ballots and tariff-driven tax reform. They call out psychological operations aimed at dividing MAGA, confront Alexander Vindman's claim that troops should disobey Trump, and explain how unified messaging can overwhelm institutional power. With D5 approaching and a major Oval Office announcement imminent, Alpha and Josh underscore that this moment belongs to citizens willing to act, coordinate, and push the system where it must go.
#Timmyboy #rescuecat #news #Defcon #cnn #espn #elonmusk #ufo キャッチャー キャッチャー #uap #nyc #nypost #sportsnews #trump #uae #japan #ukrainaterkini #pets #finland #actors #btc #bitcoin #crypto #aspcomedy #hacking #anime #trump #trumpnews #joerogan #joeroganexperience #newyork #podcast #newsong #interview #funny #politicalpodcast #comedy #TimSchuebel #timmyboycomedypodcast #JolynnCarpenter #1ComedyPodcastUSA #comedy #PGobblefarts #schuebeltim #timjolynnlittleman5148 #Timmyboy #JolynnCarpenter #MajorButtons #TimmyboyTopComedy #elonMusk #ufo #uap #nfl #ravens #politicalpodcast @SnapbackLive1 @south @jimihendrix @harlem @indianarobinson-dawes3160 @megmyers @megmyersbr6473 @megmyersofficial @abc7NY @news @RealWorldPolice @worldstarhiphop https://www.youtube.com/@timjolynnlittleman5148
In Episode 19, Alpha Warrior and Josh Reid dive headfirst into a seismic day of information warfare as General Michael Flynn issues a cryptic but unmistakable call to digital soldiers—“Get ready.” The hosts break down Flynn's timing and his reference to post 532, connecting it to a rapid series of White House reposts featuring 11 veterans, one of them Alpha himself. Josh unpacks the deeper meaning behind these mirrored posts, linking them to long-running military intelligence drops, the Ghost Army, and a newly released PsyOps video echoing the Anon movement's origins. From there, Alpha and Josh explore the explosive revelations surrounding Smartmatic, Venezuela, election interference, and Patrick Byrne's firsthand account of the systems used to manipulate global elections. They connect Byrne's inside intel to the escalating actions taken by Trump, including terrorism designations aimed at networks tied to Soros, Maduro, the Muslim Brotherhood, and cartel-driven insurgencies. This episode ties together covert operations, military presence in Venezuela, corruption inside U.S. institutions, and the cleanup now underway, all while hinting at major dominos preparing to fall. A high-energy, deeply sourced breakdown of a rapidly accelerating timeline.
It's an important one for FPL managers on Clash of the Correspondents as James welcomes Brighton fan Sam Murray and Brentford fan Tom Medd to discuss the latest at their clubs ahead of attractive long-term fixture runs and tomorrow's meeting at The Amex. Verbruggen v Kelleher...? Van Hecke v Van Den Berg...? Minteh v Ouattara...? Welbeck v Thiago...? And sometimes the answer feels like it should be both! Plus form, the search for consistency, Kevin Schade's appeal despite possibly being overpriced, DEFCON and midfield enablers, Kaoru Mitoma's return and lots more... Follow Sam on Twitter/x: https://x.com/FPLSeagull Follow Tom on Twitter/x: https://x.com/FPLDummyTom Tomorrow on Planet FPL: James presents the GW12 Deadline Stream live and in partnership with FPL Team, exclusively on the Planet FPL YouTube Channel at 10am GMT Today on Patreon: The Differential Show GW12 Preview (IT+) & The GW12 Team News Stream (AT) The full Planet FPL schedule for this week can be found via this post: https://www.patreon.com/posts/143760468 Want to become a member of our FPL community and support the Podcast? Join us on Patreon: https://www.patreon.com/planetfpl Follow James on Twitter/x: https://twitter.com/PlanetFPLPod Follow Suj on Twitter/x: https://twitter.com/sujanshah Follow Clayton on Twitter/x: https://twitter.com/claytsAFC Follow David on Twitter/x: https://x.com/FPLHunter10 Follow Nico on Twitter/x: https://twitter.com/nico_semedo Subscribe to our YouTube channel: https://www.youtube.com/@PlanetFPL Like us on Facebook: https://www.facebook.com/planetfpl Follow us on Instagram: https://www.instagram.com/planetfpl #Brighton #Brentford #FPL Learn more about your ad choices. Visit podcastchoices.com/adchoices
In the electric chaos of DEF CON—where dial tones, solder smoke, and hacker legends collide—one figure stands out: John Aff, aka PANDA.A veteran in the hacker community, he moves effortlessly between challenge design, telephony wizardry, mesh networking experiments, and the culture that surrounds it all.Behind the reputation is a journey that started with game hacking, shifted into enterprise security, and evolved into a life built around creativity, community, and technical obsession. It's also a story of identity—of finding a place where personal expression and professional skill finally intersected.This conversation pulls back the curtain on a mind shaped by curiosity, lived experience, and a deep love for the craft.CHAPTERS00:00 - Introduction to Barcode Podcast00:24 - Meet Panda: Cybersecurity Icon01:47 - Panda's Journey into Cybersecurity10:12 - Creating Interactive Challenges for Conferences22:11 - Badge Building: The Art and Science28:00 - Lessons from Offensive Security for Defenders30:11 - Winning the TeleChallenge: A Team Effort35:10 - Nostalgia in Gaming: The Phone Verse Experience37:30 - Understanding LoRa and Mesh Networking43:20 - Real-World Applications of MeshTastic Technology49:14 - The Intersection of Furry Culture and Cybersecurity56:54 - Community Building and Future Aspirations in TechLINKSTeleFreak – https://telefreak.org Home of the legendary TeleChallenge and a cornerstone of phreaking culture at DEF CON.DEF CON – https://defcon.org The world's largest hacker conference and the backdrop for many of Panda's stories, competitions, and breakthroughs.RedSeer Security – https://redseersecurity.com The security practice Panda supports on the defensive and strategic side.Assura, Inc. – https://assurainc.com Where Panda leads offensive security operations and continuous testing programs.MeshTastic – https://meshtastic.org Open-source long-range mesh communication project central to Panda's community work.Comms For All – https://commsforall.com Panda's initiative focused on mesh networking, LoRa radios, and community education.B-Sides Jax – https://bsidesjax.org Conference where Panda built the interactive phone-based badge challenge.HackSpaceCon – https://hackspacecon.com The first conference where you and Panda crossed paths; a major Florida hacker gathering.JLCPCB – https://jlcpcb.com PCB manufacturing service used for producing custom badge hardware.EasyEDA – https://easyeda.com Design tool Panda uses to create the multilayer art and circuitry for badges.Vectorizer.AI – https://vectorizer.ai The AI-powered tool Panda relies on to convert artwork into vector format for PCB badge design.KiCad – https://kicad.org Open-source PCB design suite used for laying out circuits and prototyping badge hardware.Adtran – https://www.adtran.com Telecom hardware vendor whose legacy gateways were used in the BSides Jax phone challenge.QueerCon – https://www.queercon.org Long-running LGBTQ+ hacker community at DEF CON that collaborated with Panda on early badge projects.National Cyber Games (NCA Cyber Games) – https://nationalcybergames.org Competition platform where Panda designed MeshTastic-based CTF challenges.UNF Osprey Security – https://www.unf.edu University of North Florida's student security group that runs CTFs and collaborated locally with Panda.HackRedCon – https://hackredcon.com Security conference where Panda volunteers and participates in community events.Jax2600 – https://2600.com Local chapter of the classic 2600 hacker community, part of Panda's long-term involvement in grassroots infosec groups.Backdoors & Breaches – https://blackhillsinfosec.com/projects/backdoors-breaches Incident response card game Panda used for blue team development and tabletop exercises.
Episode 149: In this episode of Critical Thinking - Bug Bounty Podcast The DEFCON videos are up, and Justin and Joseph talk through some of their favorites.Follow us on XGot any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!====== Links ======Follow your hosts Rhynorater, rez0 and gr3pme on X: ====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.You can also find some hacker swag at https://ctbb.show/merch!====== Resources ======Unicode surrogates conversionPrompt. Scan. ExploitBreaking into thousands of cloud based VPNs with 1 bugExamining Access Control Vulnerabilities in GraphQLSmart Bus Smart HackingPasskeys PwnedBypassing Intent Destination ChecksGemini Agents in Google CalendarExploitation of DOM Clobbering Vuln at ScaleTheHulkSmart Devices, Dumb ResetsMac PRT Cookie Theft====== Timestamps ======(00:00:00) Introduction(00:10:10) Prompt. Scan. Exploit(00:23:52) Breaking into thousands of cloud based VPNs with 1 bug(00:33:25) Access Control Vulns in GraphQL, Smart Bus Hacking, & Passkeys Pwned(00:44:10) Bypassing Intent Destination Checks & Invoking Gemini Agents(00:57:08) DOM Clobbering, Mac PRT Cookie Theft, & Smart Devices, Dumb Resets
Alpha Warrior and Josh Reid plunge into a high-voltage episode of DEFCON ZERQ, exposing how coordinated global smokescreens are masking a much larger battle for control over energy, economics, and human perception. They break down the media's obsession with distractions...from Epstein theatrics to psychological operations, and map them against the real moves playing out behind the curtain: U.S.–Saudi energy dominance, BRICS fractures, China's weakening position, and a worldwide power struggle over resources and currency. Josh details the shift toward a bipolar world order, explaining how puppet governments, intelligence agencies, and proxy conflicts are being deployed to reshape alliances. Alpha ties it all together through the lens of spiritual warfare, collective awakening, and the growing collapse of “The Narrative.” With rapid-fire geopolitical analysis, economic modeling, energy-sector intel, and their trademark no-nonsense approach, the hosts show how every headline is part of a coordinated battle to control the future. A dense, sharp, and eye-opening deconstruction of the global chessboard.
With the international break upon us, it's time to take stock and review how things have gone so far this season
Send us a textThe Ones Ready Team Room just went DEFCON spicy. Peaches drops a verbal frag on soft leadership, lazy generals, and the bureaucratic clown show holding America back. From gutless flag officers whining about accountability to NASA possibly being shoved under the Department of Transportation (seriously?), he's got zero patience for the circus. Peaches calls out the hypocrisy, salutes the few still grinding, and delivers his unfiltered take on how to fix the mess—starting with honesty, toughness, and a little competition. Oh, and yeah—Jared Isaacman for NASA Chief? Bet your ass. Strap in. This one's a ride.⏱️ Timestamps: 00:00 – “Everything We Do Has a Purpose” – Peaches on the real meaning of attributes-based selection. 01:45 – “The Nashville Summit Is Locked and Loaded” – Event hype, early access, and Vegas reveal. 04:20 – “Generals Gone Soft” – Peaches torches the brass crying to the press. 07:30 – “Leadership Without Spine” – How political rot eats the military from the top down. 08:40 – “The Billionaire Fighter Pilot We Need” – Jared Isaacman for NASA boss. 11:10 – “NASA Under DOT? Are You High?” – The dumbest idea Congress has ever had. 13:05 – “Game On, SpaceX” – Peaches breaks down why competition keeps America sharp. 16:45 – “Rant Mode: Engaged” – Peaches asks: am I wrong, or just the only one saying it?
Eclypsium researchers Jesse Michael and Mickey Shkatov to share their work on "BadCam - Now Weaponizing Linux Webcams." Eclypsium researchers disclosed “BadCam,” a set of vulnerabilities in certain Lenovo USB webcams that run Linux and do not validate firmware signatures, allowing attackers to reflash the devices and turn them into BadUSB-style tools. An adversary who supplies a backdoored camera or who gains remote code execution on a host can weaponize the webcam to emulate human-interface devices, inject keystrokes, deliver payloads, and maintain persistence — even re-infecting systems after OS reinstalls. The findings were presented at DEF CON 2025, Lenovo issued updated firmware/tools in coordination with SigmaStar, and researchers warn the same vector could affect other Linux-based USB peripherals, underscoring the need for firmware signing and stronger device attestation. The research can be found here: BadCam: Now Weaponizing Linux Webcams Learn more about your ad choices. Visit megaphone.fm/adchoices