Podcasts about DEFCON

Alert posture used by the United States Armed Forces

  • 1,255PODCASTS
  • 3,525EPISODES
  • 56mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Aug 11, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about DEFCON

Show all podcasts related to defcon

Latest podcast episodes about DEFCON

LINUX Unplugged
627: The 2 a.m. Rescue

LINUX Unplugged

Play Episode Listen Later Aug 11, 2025 84:38 Transcription Available


Wes performs a 2 a.m. rescue at DEFCON, and Chris attempts to build a Linux desktop using nothing but vibes.Sponsored By:Managed Nebula: Meet Managed Nebula from Defined Networking. A decentralized VPN built on the open-source Nebula platform that we love. 1Password Extended Access Management: 1Password Extended Access Management is a device trust solution for companies with Okta, and they ensure that if a device isn't trusted and secure, it can't log into your cloud apps. Unraid: A powerful, easy operating system for servers and storage. Maximize your hardware with unmatched flexibility. Support LINUX UnpluggedLinks:

ITSPmagazine | Technology. Cybersecurity. Society
From Fish Tanks to AI Agents: Why the Words “We're Secure” Means Nothing Without Proof | A Black Hat USA 2025 Conversation with Viktor Petersson | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 11, 2025 27:02


When security becomes more than a checkbox, the conversation shifts from “how much” to “how well.” At Black Hat USA 2025, Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Viktor Petersson, Founder of an SBOM artifact platform, unpack how regulatory forces, cultural change, and AI innovation are reshaping how organizations think about security.Viktor points to the growing role of Software Bill of Materials (SBOMs) as not just a best practice, but a likely requirement in future compliance frameworks. The shift, he notes, is driven largely by regulation—especially in Europe—where security is no longer a “nice to have” but a mandated operational function. Sean connects this to a market reality: companies increasingly see transparent security practices as a competitive differentiator, though the industry still struggles with the hollow claim of simply being “secure.”AI naturally dominates discussions, but the focus is nuanced. Rather than chasing hype, both stress the need for strong guardrails before scaling AI-driven development. Viktor envisions engineers supervising fleets of specialized AI agents—handling tasks from UX to code auditing—while Sean sees AI as a way to rethink entire operational models. Yet both caution that without foundational security practices, AI only amplifies existing risks.The conversation extends to IoT and supply chain security, where market failures allow insecure, end-of-life devices to persist in critical environments. The infamous “smart fish tank” hack in a Las Vegas casino serves as a reminder: the weakest link often isn't the target itself, but the entry point it provides.DEFCON, Viktor notes, offers a playground for challenging assumptions—whether it's lock-picking to illustrate perceived versus actual security, or examining the human factor in breaches. For both hosts, events like Black Hat and DEFCON aren't just about the latest vulnerabilities or flashy demos—they're about the human exchange of ideas, the reframing of problems, and the collaboration that fuels more resilient security strategies.___________Guest:Viktor Petersson, Founder, sbomify | On LinkedIn: https://www.linkedin.com/in/vpetersson/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

PEBCAK Podcast: Information Security News by Some All Around Good People
Episode 220 - Live From Black Hat 2025 and DEFCON 33, Drop In Las Vegas Tourism, Hotel Fees, Agentic AI

PEBCAK Podcast: Information Security News by Some All Around Good People

Play Episode Listen Later Aug 11, 2025 48:00


Welcome to this week's episode of the PEBCAK Podcast!  We've got some amazing stories this week so sit back, relax, and keep being awesome!  Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast   Please share this podcast with someone you know!  It helps us grow the podcast and we really appreciate it!   Tourism drop in Las Vegas https://www.roadsideamerica.com/story/12552 https://www.foxnews.com/travel/las-vegas-tourism-drops-sharply-some-visitors-claim-casinos-empty-amid-rising-costs     Dad Joke of the Week (DJOW)   Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/ Tyson - https://www.linkedin.com/in/tyson-kindler-910658101/ Koby - https://www.linkedin.com/in/koby-caputo-117358145/

All Jupiter Broadcasting Shows
The 2 a.m. Rescue | LINUX Unplugged 627

All Jupiter Broadcasting Shows

Play Episode Listen Later Aug 10, 2025


Wes performs a 2 a.m. rescue at DEFCON, and Chris attempts to build a Linux desktop using nothing but vibes.

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Rahiem

Stats On Stats Podcast

Play Episode Listen Later Aug 10, 2025 5:08


Join us for a conversation with Rahiem, a dedicated member of the Blacks in Cybersecurity community. With five years of DEF CON experience and a passion for media coverage, photography, and design, Rahiem reflects on his journey into tech and the critical importance of representation in the industry.Guest ConnectRahiem ThompsonLinkedIn: https://www.linkedin.com/in/rahiemthompson/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Mariah

Stats On Stats Podcast

Play Episode Listen Later Aug 10, 2025 3:10


Join us for a conversation with Mariah, recorded live at DEF CON 33 in the Blacks in Cybersecurity Village! Mariah shares her unique journey from wedding planning to the world of tech and cybersecurity.Mariah discusses her transition into tech during the pandemic, her experiences in help desk and project management, and how a mentorship program helped her land her first job in cybersecurity. She emphasizes the importance of networking, asking questions, and maintaining a positive mindset throughout the learning process.Whether you're considering a career in tech or just looking for some life advice, Mariah's insights and encouragement will resonate with you. Tune in to hear her valuable tips on resources, networking, and the power of believing in yourself!Guest ConnectMariah HardyLinkedIn: https://www.linkedin.com/in/tylermariahhardy/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/

Dog Days of Podcasting Challenge
Kyle Nishioka : Mad Marv's Notebook

Dog Days of Podcasting Challenge

Play Episode Listen Later Aug 10, 2025


Talking about Toastmasters and taking on the role of District Finance Manager. Also noticed that DefCon is going on this weekend.

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Levone

Stats On Stats Podcast

Play Episode Listen Later Aug 9, 2025 4:27


Join us for a conversation with Levone Campbell, a seasoned cybersecurity expert with 20 years of experience, live from the Blacks in Cybersecurity Village at DEF CON 33. Levone discusses his journey into tech, his dedication to the BIC community, and the vital role of representation in the industry.Guest ConnectLevone CampbellLinkedIn: https://www.linkedin.com/in/levone-campbell-mba-mps-cissp-3b305234/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Samantha

Stats On Stats Podcast

Play Episode Listen Later Aug 9, 2025 3:59


Join us for a conversation with Samantha, a passionate cybersecurity professional and volunteer with Blacks in Cybersecurity (BIC). She shares her inspiring journey from social work to becoming a pen tester, overcoming fears and challenges along the way.Samantha reflects on her transformative experience at DEF CON, where the Blacks in Cybersecurity Village offered a safe and supportive environment. As the leader of the Black Women in Cybersecurity initiative, she is committed to uplifting Black women in the field through mentorship, resources, and community.We dive into the importance of representation in tech, the upcoming Black Women in Cybersecurity cohort, and Samantha's valuable advice for anyone looking to succeed in the tech industry.Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/

Stats On Stats Podcast
Stats on Stats x B.I.C. @ DEF CON 33: Finding Your Village with Yassin & Marc

Stats On Stats Podcast

Play Episode Listen Later Aug 9, 2025 11:31


Join us for a conversation with Marc Lawrence and Yassin Sabir, the co-founders of Respect the Tech. They share their DEF CON 33 experience, including hosting their own Capture the Flag (CTF) competitions and a unique AI bank chatbot challenge designed to educate participants on vulnerabilities in AI systems.In this discussion, they highlight the importance of community, particularly within the Blacks in Cybersecurity network, and how it empowers individuals to thrive in tech. Marc and Yassin also preview their upcoming event, Respect Day, where tech professionals can dive into hands-on workshops and challenges.Whether you're a seasoned expert or just starting out, this conversation is filled with valuable insights and advice on breaking into cybersecurity. Don't miss their tips for success and resources for aspiring tech professionals!Guest ConnectMarc LawrenceLinkedIn: https://www.linkedin.com/in/marcanthonylawrence/Yassin SabirLinkedIn: https://www.linkedin.com/in/yassin-sabir-csap-crtp-01b470157/Respect the TechWebsite: https://www.respectthetech.us/Blacks in CybersecurityWebsite: https://www.blacksincyberconf.com/

The Valenti Show
HOUR 2: Tigers DEFCON Levels

The Valenti Show

Play Episode Listen Later Aug 7, 2025 39:27


Mike and Rico spent the second hour discussing which DEFCON level they are at when it comes to the Tigers. They took plenty of your calls and read your ticket texts throughout the hour.

The Valenti Show
What DEFCON Level Are You At With The Tigers?

The Valenti Show

Play Episode Listen Later Aug 7, 2025 9:54


The guys discuss their concern level with the Tigers right now.

Microsoft Threat Intelligence Podcast
How Microsoft Stays Ahead of the World's Most Dangerous Hackers

Microsoft Threat Intelligence Podcast

Play Episode Listen Later Aug 7, 2025 77:33


In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is joined by Aarti Borkar, Simeon Kakpovi, and Andrew Rapp for a behind-the-scenes look at how Microsoft Threat Intelligence and Microsoft Incident Response teams collaborate as part of a closed-loop system, the emotional toll of breaches, and how organizations of any size can build resilience through preparation and psychological safety. By listening to this segment, you'll get a preview of what this group brought to the main stage of Black Hat this year.  Later, Sherrod chats with Snow, co-founder of the Social Engineering Community Village at DEF CON, about her journey from special effects makeup to elite social engineer, and how empathy, creativity, and even a ladder can be powerful tools in physical security testing.  In this episode you'll learn:       How Microsoft's Digital Crimes Unit uses legal tactics to disrupt threat actors  Why rehearsing your incident response plan can save weeks of recovery time  How AI is being trained to make social engineering phone calls on its own  Some questions we ask:      How would you describe the overall health of the global cybersecurity landscape?  Why does tailoring AI prompts sometimes feel like social engineering?  What is the feedback loop between incident response, intelligence, and product protections?    Resources:   View Aarti Borkar on LinkedIn  View Simeon Kakpovi on LinkedIn   View Andrew Rapp on LinkedIn    View Sherrod DeGrippo on LinkedIn   Microsoft at Black Hat USA 2025    Related Microsoft Podcasts:                    Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast  Uncovering Hidden Risks        Discover and follow other Microsoft podcasts at microsoft.com/podcasts     Get the latest threat intelligence insights and guidance at Microsoft Security Insider    The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  

The Gianni Buttice FPL Podcast
My FPL Team | Locking Players In | Fantasy Premier League Tips 2025/26

The Gianni Buttice FPL Podcast

Play Episode Listen Later Aug 7, 2025 22:33


Double Forest defence and two mid priced forwards under 6% owned have made it in to my team.

Fantasy Football Scout
The FPL Scout: New Drafts, Def Cons, Promoted Teams!

Fantasy Football Scout

Play Episode Listen Later Aug 6, 2025 78:37


Andy, Hibbo and Nacho discuss their NEW drafts, promoted teams and Def Con points! SPONSERED BY FANTEAM - https://af.fanteam.com/click?o=1&a=14&c=7 New Customer Welcome Offer!

Badlands Media
DEFCON ZERQ EP. 004 - DROPS RETURNING - SCAVINO TRUMP COMS - SOROS ON DECK - DURHAM REPORT

Badlands Media

Play Episode Listen Later Aug 6, 2025 127:58 Transcription Available


In Episode 004 of DEFCON ZERQ, Alpha Warrior and Josh Reid dissect the return of high-signal drops, drawing connections between Scavino's posts, Trump's recent statements, and coordinated comms pointing to a broader information offensive. The hosts analyze what these patterns suggest about timing, messaging, and the psychological battlefield ahead. They also dig into Soros's positioning, global narratives around controlled opposition, and the lasting significance of the Durham Report, not as a dead-end, but as a marker in the ongoing exposure of institutional corruption. With a focus on decoding the signals, not the noise, this episode challenges listeners to zoom out, connect the timelines, and prepare for what's next.

Planet FPL - The Fantasy Football Podcast
Leeds United with Ed Salinger | Correspondent Week ep.5 | Planet FPL 2025/26

Planet FPL - The Fantasy Football Podcast

Play Episode Listen Later Aug 5, 2025 48:22


Day 2 of Correspondent Week opens with the Championship titles winners as James is joined be Ed Salinger to discuss all things Leeds United and there are some interesting FPL options to consider. One such, is Joel Piroe, 5.5, talisman forward and on pens. But is it that straightforward? There's discussion on all the new additions, a considered debate on two 4.0 defender options, if Karl Darlow remains an option, and if there may be a hidden DEFCON magnet from the midfield enablers. Follow Ed on Twitter/x: https://x.com/fplrhinos Next on Correspondent Week: ep.6 with Lewis James on Fulham Later today on Correspondent Week: Neil Grover on Bournemouth and Tom Medd on Brentford Tonight on Patreon: The Debrief with Suj on today's four Podcasts (IT+) and After The Podcast with today's Correspondents (AT) Want to become a member of our FPL community and support the Podcast?  Join us on Patreon: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.patreon.com/planetfpl⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Follow James on Twitter/x: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/PlanetFPLPod⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Follow Suj on Twitter/x: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/sujanshah⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Follow Clayton on Twitter/x: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/claytsAFC⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Follow Nico on Twitter/x: https://twitter.com/nico_semedo Subscribe to our YouTube channel: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.youtube.com/@PlanetFPL⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Like us on Facebook: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.facebook.com/planetfpl⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Follow us on Instagram: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.instagram.com/planetfpl⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ #FantasyPremierLeague #FPL #LUFC Learn more about your ad choices. Visit podcastchoices.com/adchoices

@BEERISAC: CPS/ICS Security Podcast Playlist
How to Maximize the ROI at Cybersecurity Conferences

@BEERISAC: CPS/ICS Security Podcast Playlist

Play Episode Listen Later Aug 5, 2025 28:34


Podcast: PrOTect It All (LS 26 · TOP 10% what is this?)Episode: How to Maximize the ROI at Cybersecurity ConferencesPub date: 2025-08-04Get Podcast Transcript →powered by Listen411 - fast audio-to-text and summarizationWelcome back to Protect It All, the podcast where host Aaron Crow goes beyond the basics of OT to explore the dynamic intersection of IT and OT cybersecurity. In this episode, Aaron takes us inside a hacker summer camp in Las Vegas - home to industry giants Black Hat and DEFCON, where tens of thousands of security professionals gather each year.  Drawing from his years of experience attending these events, Aaron unpacks the good, the bad, and the ugly of the conference circuit: from the value of in-person networking and the buzz of vendor events, to the challenges of ROI, overwhelming hype, and the evolving role of sponsors. Plus, he shares hard-won tips for making the most of Vegas - including how to find your tribe, engage meaningfully with vendors, and stay cool (literally and figuratively) amidst the chaos.  Whether you're a first-timer or a seasoned attendee, this episode is packed with honest insights and actionable advice to help you navigate the ever-evolving world of cybersecurity conferences. Key Moments:  03:05 Networking's Importance in Vegas 08:29 Evaluating Black Hat Conference ROI 12:17 "CISOs' Discreet Presence at Vendor Events" 13:22 Buzzword Overload at Conferences 18:40 Relationship-Driven Sales Strategy 21:02 Balancing Conference Costs and Value 25:44 "Prioritize Genuine Leads Only" 27:05 Enhancing Cybersecurity Events Connect With Aaron Crow: Website: www.corvosec.com  LinkedIn: https://www.linkedin.com/in/aaronccrow   Learn more about PrOTect IT All: Email: info@protectitall.co  Website: https://protectitall.co/  X: https://twitter.com/protectitall  YouTube: https://www.youtube.com/@PrOTectITAll  FaceBook:  https://facebook.com/protectitallpodcast    To be a guest or suggest a guest/episode, please email us at info@protectitall.co   Please leave us a review on Apple/Spotify Podcasts: Apple   - https://podcasts.apple.com/us/podcast/protect-it-all/id1727211124 Spotify - https://open.spotify.com/show/1Vvi0euj3rE8xObK0yvYi4The podcast and artwork embedded on this page are from Aaron Crow, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.

ITSPmagazine | Technology. Cybersecurity. Society
From Hacker Defense to Civil Liberties: Threat Modeling Meets Constitutional Law | A Black Hat USA 2025 Keynote Conversation with Jennifer Granick | On Location Coverage with Sean Martin and Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 4, 2025 22:47


At Black Hat USA 2025, Jennifer Granick—Surveillance and Cybersecurity Counsel at the American Civil Liberties Union—takes the keynote stage to make a bold case: we are long overdue for a new threat model, one that sees government surveillance not as a background risk, but as a primary threat to constitutional privacy.Granick draws from decades of experience defending hackers, fighting surveillance overreach, and engaging with the security community since DEFCON 3. She challenges the audience to reconsider outdated assumptions about how the Fourth Amendment is interpreted and applied. While technology has made it easier than ever for governments to collect data, the legal system hasn't kept pace—and in many cases, fails to recognize the sheer scope and sensitivity of personal information exposed through modern services.Her talk doesn't just raise alarm; it calls for action. Granick suggests that while legal reform is sluggish—stymied by a lack of political will and lobbying power—there's an urgent opportunity for the technical community to step up. From encryption to data minimization and anonymization, technologists have the tools to protect civil liberties even when the law falls short.The session promises to be a wake-up call for engineers, designers, policymakers, and privacy advocates. Granick wants attendees to leave not only more informed, but motivated to build systems that limit the unnecessary collection, retention, and exposure of personal data.Her keynote also surfaces a critical cultural shift: from the “Spot the Fed” days of DEFCON to a more nuanced understanding of government roles—welcoming collaboration where it serves the public good, but not at the expense of unchecked surveillance.This conversation reframes privacy as a design problem as much as a legal one—and one that requires collective effort to address. If the law can't fix it, the question becomes: will the technology community rise to the challenge?___________Guest:Jennifer Granick, Surveillance and Cybersecurity Counsel at American Civil Liberties Union | On LinkedIn: https://www.linkedin.com/in/jennifergranick/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974BlackCloak: https://itspm.ag/itspbcwebAkamai: https://itspm.ag/akamailbwcDropzoneAI: https://itspm.ag/dropzoneai-641Stellar Cyber: https://itspm.ag/stellar-9dj3___________ResourcesKeynote: Threat Modeling and Constitutional Law: https://www.blackhat.com/us-25/briefings/schedule/index.html#keynote-threat-modeling-and-constitutional-law-48276Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25ITSPmagazine Webinar: What's Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year's Hacker Conference — An ITSPmagazine Thought Leadership Webinar | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conferenceCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

BarCode
Inner Hacker

BarCode

Play Episode Listen Later Aug 4, 2025 39:40


Ted Harrington explains the power of the hacker mindset and its impact far beyond cybersecurity. He unpacks how curiosity, creativity, and the drive to challenge assumptions can unlock new ways of thinking and problem-solving across all areas of life. Ted offers practical exercises to develop this mindset, shares strategies to overcome imposter syndrome, and highlights the importance of leaning into positive feedback. He also previews the energy and innovation surrounding the upcoming Hacker Summer Camp and the thriving community that powers it.00:00 Introduction to the Hacker Mindset04:50 The Attributes of a Hacker10:04 Challenging Assumptions in Life14:37 Exercises to Cultivate a Hacker Mindset19:31 Upcoming Book Release and Conclusion19:51 The Journey of Writing: From First to Second Book24:17 Overcoming Imposter Syndrome: Strategies and Insights34:29 Hacker Summer Camp: Celebrating a Decade of IoT Village36:55 Creative Concepts: Cybersecurity-Themed Bar IdeasSYMLINKS[Ted Harrington's Website] – Ted Harrington's official website where you can find his blog, professional background, talks, research, and links to his books, podcast, and events. A central hub for his work in cybersecurity and ethical hacking.[Ted Harrington's Podcast – “Tech Done Different”] – Ted's podcast explores how to think differently about technology, security, and leadership. He interviews top minds in security, engineering, and beyond.[Ted Harrington's Books] – A showcase of Ted's published works, including Hackable and the upcoming Inner Hacker, both of which explore ethical hacking, secure software development, and mindset transformation.[Ted Harrington's TED Talk – “Why You Need to Think Like a Hacker”] – In this TEDx talk, Ted explains how the hacker mindset—curiosity, nonconformity, commitment, and creativity—can be a superpower in solving complex problems in both cybersecurity and everyday life.[Ted Harrington on LinkedIn] – Ted's professional LinkedIn profile, where he regularly shares insights on ethical hacking, leadership, and secure software. He's active and encourages messages from those looking to learn or collaborate.[IoT Village Website] – A hacking village founded by Ted Harrington that focuses on IoT security. Hosted at major security conferences like DEF CON, it offers hands-on labs, expert talks, and a collaborative space for learning how to ethically hack IoT devices.

FPL Harry
BEST DEFENDERS FOR FPL GW1!

FPL Harry

Play Episode Listen Later Aug 4, 2025 24:49


FPL GW1 Best Defenders. Should you focus on defensive contributions of attacking output?

Computer Talk Radio
Computer Talk Radio Broadcast 08-02-2025

Computer Talk Radio

Play Episode Listen Later Aug 2, 2025 90:02


This week's full broadcast of Computer Talk Radio includes - 00:00 - Nerd news for normal people - NVIDIA, Windows 11, ChatGPT, Apple, Anker, sunlight - 11:00 - Cybersecurity's importance - Dr Doreen Galli extols the importance of cybersecurity - 22:00 - Family sharing and controls - Keith gives experience of family sharing and parental controls - 31:00 - Marty Winston's Wisdom - Marty tells of the three types of meeting monsters that impact - 39:00 - Scam Series - fake domain - Detecting Facebook ads from a scammer with fake domain - 44:00 - Keske on tech in forensics - Steve revisits conversation about the world of tech and forensics - 56:00 - Faith can exist with technology - Benjamin tells of a need for blending faith into a world of tech - 1:07:00 - Listener Q&A - scammers know - Juan asks Benjamin how scammers know names and locations - 1:16:00 - IT Professional Series - 339 - Dr Doreen Galli shares experience about Blackhat and Defcon - 1:24:00 - Listener Q&A - thunderstorm data - Daniel asks aboung unplugging during thunderstorms with UPS

Critical Thinking - Bug Bounty Podcast
Episode 133: Building Hacker Communities - Bug Bounty Village, getDisclosed, and the LHE Squad

Critical Thinking - Bug Bounty Podcast

Play Episode Listen Later Jul 31, 2025 76:12


Episode 133: In this episode of Critical Thinking - Bug Bounty Podcast we're joined by Harley and Ari from H1 to talk some about community management roles within Bug Bounty, as well as discuss the evolution of Bug Bounty Village at DEFCON, and what they've got in store this year.Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!====== Links ======Follow your hosts Rhynorater and Rez0 on Twitter: https://x.com/Rhynoraterhttps://x.com/rez0__====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord at https://ctbb.show/discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.You can also find some hacker swag at https://ctbb.show/merch!Today's Guests:x.com/infiniteloginshttps://x.com/Arl_roseToday's Sponsor is Adobe. Use code CTBBP0907 in your first report on Adobe Behance, Portfolio, Fonts or Acrobat Web, and earn a one-time 10% bonus reward!====== This Week in Bug Bounty ======BBV Platform Panel about TriageYesWeHACK Makes Debut at Black Hat USA 2025New Dojo challenge featuring a time-based token prediction combined PyYAML deserializationGMSGadget====== Resources ======Bug Bounty VillageSign up for the Disclosed NewsletterDisclosed OnlineHarley's Youtube Channel====== Timestamps ======(00:00:00) Introduction(00:05:51) Bug Stories and Hacking Journeys(00:32:37) Community Management within Bug Bounty(00:39:43) Bug Bounty Village - Origin & 2025 Plans(01:02:39) Disclosed Online and Harley's Upcoming Ebook

Brian, Ali & Justin Podcast
No one panic, but we're at DEFCON 4

Brian, Ali & Justin Podcast

Play Episode Listen Later Jul 30, 2025 19:13


Shouldn't there be a memo about what DEFON we're on? Chicago’s best morning radio show now has a podcast! Don’t forget to rate, review, and subscribe wherever you listen to podcasts and remember that the conversation always lives on the Q101 Facebook page. Brian & Kenzie are live every morning from 6a-10a on Q101. Subscribe to our channel HERE: https://www.youtube.com/@Q101 Like Q101 on Facebook HERE: https://www.facebook.com/q101chicago Follow Q101 on Twitter HERE: https://twitter.com/Q101Chicago Follow Q101 on Instagram HERE: https://www.instagram.com/q101chicago/?hl=en Follow Q101 on TikTok HERE: https://www.tiktok.com/@q101chicago?lang=enSee omnystudio.com/listener for privacy information.

ITSPmagazine | Technology. Cybersecurity. Society
Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Conversation with Sean Metcalf | Redefining CyberSecurity with Sean Martin

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 30, 2025 31:48


⬥GUEST⬥Sean Metcalf, Identity Security Architect at TrustedSec | On LinkedIn: https://www.linkedin.com/in/seanmmetcalf/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥Sean Metcalf, a frequent speaker at conferences like Black Hat, DEF CON, and RSAC, brings a sharp focus to identity security—especially within Microsoft environments like Active Directory and Entra ID. In this episode, he walks through the practical and tactical role of honeypots and deception in detecting intrusions early and with higher fidelity.While traditional detection tools often aim for broad coverage, honeypots flip the script by offering precise signal amidst the noise. Metcalf discusses how defenders can take advantage of the attacker's need to enumerate systems and accounts after gaining access. That need becomes an opportunity to embed traps—accounts or assets that should never be touched unless someone is doing something suspicious.One core recommendation: repurpose old service accounts with long-lived passwords and believable naming conventions. These make excellent bait for Kerberoasting attempts, especially when paired with service principal names (SPNs) that mimic actual applications. Metcalf outlines how even subtle design choices—like naming conventions that fit organizational patterns—can make a honeypot more convincing and effective.He also draws a distinction between honeypots and deception technologies. While honeypots often consist of a few well-placed traps, deception platforms offer full-scale phantom environments. Regardless of approach, the goal remains the same: attackers shouldn't be able to move around your environment without tripping over something that alerts the defender.Importantly, Metcalf emphasizes that alerts triggered by honeypots are high-value. Since no legitimate user should interact with them, they provide early warning with low false positives. He also addresses the internal politics of deploying these traps, from coordinating with IT operations to ensuring SOC teams have the right procedures in place to respond effectively.Whether you're running a high-end deception platform or just deploying free tokens and traps, the message is clear: identity is the new perimeter, and a few strategic tripwires could mean the difference between breach detection and breach denial.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Inspiring Post: https://www.linkedin.com/posts/activity-7353806074694541313-xzQl/Article: The Art of the Honeypot Account: Making the Unusual Look Normal: https://www.hub.trimarcsecurity.com/post/the-art-of-the-honeypot-account-making-the-unusual-look-normalArticle: Trimarc Research: Detecting Kerberoasting Activity: https://www.hub.trimarcsecurity.com/post/trimarc-research-detecting-kerberoasting-activityArticle: Detecting Password Spraying with Security Event Auditing: https://www.hub.trimarcsecurity.com/post/trimarc-research-detecting-password-spraying-with-security-event-auditing⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast: 

Badlands Media
DEFCON ZERQ EP. 003: FIRST ARREST - HUNTED BECOME THE HUNTERS - 2020 COUP - NUCLEAR THREAT

Badlands Media

Play Episode Listen Later Jul 30, 2025 136:30 Transcription Available


In Episode 3 of DEFCON ZERQ, Alpha Warrior and Josh Reid take listeners on a rapid-fire ride through a series of headlines and intel drops, highlighting the shifting global narrative and signs of elite panic. From explosions in Crimea and the Philippines to chatter around Obama and discussions of military tribunals, the hosts tie together media cues, deep state fear, and high-level movements. They revisit the 2020 election as a military-captured operation, consider the implications of a potential first arrest, and ask why the push for fear, especially nuclear fear, is rising now. With references to optics, comms, and counter-narratives, Alpha and Josh weave through topics like Project Looking Glass, the White Hat vs. Black Hat dynamic, and a surge in global resignations and deaths. Grounded in current events and decoded messaging, this episode frames the moment as one where the hunters truly become the hunted.

#FPLUSA Press Play
Defensive Preview | DEFCON 1 | Episode #98

#FPLUSA Press Play

Play Episode Listen Later Jul 30, 2025 88:33


Redefining CyberSecurity
Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Conversation with Sean Metcalf | Redefining CyberSecurity with Sean Martin

Redefining CyberSecurity

Play Episode Listen Later Jul 30, 2025 31:48


⬥GUEST⬥Sean Metcalf, Identity Security Architect at TrustedSec | On LinkedIn: https://www.linkedin.com/in/seanmmetcalf/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥Sean Metcalf, a frequent speaker at conferences like Black Hat, DEF CON, and RSAC, brings a sharp focus to identity security—especially within Microsoft environments like Active Directory and Entra ID. In this episode, he walks through the practical and tactical role of honeypots and deception in detecting intrusions early and with higher fidelity.While traditional detection tools often aim for broad coverage, honeypots flip the script by offering precise signal amidst the noise. Metcalf discusses how defenders can take advantage of the attacker's need to enumerate systems and accounts after gaining access. That need becomes an opportunity to embed traps—accounts or assets that should never be touched unless someone is doing something suspicious.One core recommendation: repurpose old service accounts with long-lived passwords and believable naming conventions. These make excellent bait for Kerberoasting attempts, especially when paired with service principal names (SPNs) that mimic actual applications. Metcalf outlines how even subtle design choices—like naming conventions that fit organizational patterns—can make a honeypot more convincing and effective.He also draws a distinction between honeypots and deception technologies. While honeypots often consist of a few well-placed traps, deception platforms offer full-scale phantom environments. Regardless of approach, the goal remains the same: attackers shouldn't be able to move around your environment without tripping over something that alerts the defender.Importantly, Metcalf emphasizes that alerts triggered by honeypots are high-value. Since no legitimate user should interact with them, they provide early warning with low false positives. He also addresses the internal politics of deploying these traps, from coordinating with IT operations to ensuring SOC teams have the right procedures in place to respond effectively.Whether you're running a high-end deception platform or just deploying free tokens and traps, the message is clear: identity is the new perimeter, and a few strategic tripwires could mean the difference between breach detection and breach denial.⬥SPONSORS⬥LevelBlue: https://itspm.ag/attcybersecurity-3jdk3ThreatLocker: https://itspm.ag/threatlocker-r974⬥RESOURCES⬥Inspiring Post: https://www.linkedin.com/posts/activity-7353806074694541313-xzQl/Article: The Art of the Honeypot Account: Making the Unusual Look Normal: https://www.hub.trimarcsecurity.com/post/the-art-of-the-honeypot-account-making-the-unusual-look-normalArticle: Trimarc Research: Detecting Kerberoasting Activity: https://www.hub.trimarcsecurity.com/post/trimarc-research-detecting-kerberoasting-activityArticle: Detecting Password Spraying with Security Event Auditing: https://www.hub.trimarcsecurity.com/post/trimarc-research-detecting-password-spraying-with-security-event-auditing⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast: 

Brian, Ali & Justin Podcast
No one panic, but we're at DEFCON 4

Brian, Ali & Justin Podcast

Play Episode Listen Later Jul 30, 2025 19:13


Shouldn't there be a memo about what DEFON we're on? Chicago’s best morning radio show now has a podcast! Don’t forget to rate, review, and subscribe wherever you listen to podcasts and remember that the conversation always lives on the Q101 Facebook page. Brian & Kenzie are live every morning from 6a-10a on Q101. Subscribe to our channel HERE: https://www.youtube.com/@Q101 Like Q101 on Facebook HERE: https://www.facebook.com/q101chicago Follow Q101 on Twitter HERE: https://twitter.com/Q101Chicago Follow Q101 on Instagram HERE: https://www.instagram.com/q101chicago/?hl=en Follow Q101 on TikTok HERE: https://www.tiktok.com/@q101chicago?lang=enSee omnystudio.com/listener for privacy information.

The Cognitive Crucible
#227 Matthew Canham on Agentic AI and the Cognitive Security Institute

The Cognitive Crucible

Play Episode Listen Later Jul 29, 2025 45:38


The Cognitive Crucible is a forum that presents different perspectives and emerging thought leadership related to the information environment. The opinions expressed by guests are their own, and do not necessarily reflect the views of or endorsement by the Information Professionals Association. During this episode, Matthew Canham discusses agentic AI's potential to boost productivity by automating tasks and its anticipated influence on user interfaces, potentially creating new security vulnerabilities and opportunities for user manipulation. Matthew emphasized the importance of robust security measures to counteract such threats. He also touched on the "meaning crisis" in modern society, attributing it to increased free time and mental bandwidth, and its connection to rising rates of drug overdoses and suicides. As executive director of the Cognitive Security Institute, Matthew discusses the Institute's growth since 2023, now with over 550 members, and its focus on community engagement and education. He highlighted initiatives like the Cyber Talent Exchange program, connecting job seekers with cybersecurity roles, and addressed AI's significant impact on the job market, leading to overwhelming application numbers. Recording Date: 22 July 2025 Resources: Cognitive Crucible Podcast Episodes Mentioned #89 Ajit Mann and Paul Cobaugh on Narrative #138 Matthew Canham on Cognitive Security #212 Libby Lange on Algorithmic Cognitive Warfare #223 Paul Buvarp on the Demand-side of Disinformation #224 Jake Bebber on Cognitive Warfare #221 Carrick Longley on Influence Automation Cognitive Security Institute NYTimes: A.I. Sludge Has Entered the Job Search The Cognitive Attack Taxonomy (CAT) Crisis of Meaning John Vervaeke Youtube Series Link to full show notes and resources Guest Bio: Dr. Matthew Canham is the Executive Director of the Cognitive Security Institute and a former Supervisory Special Agent with the Federal Bureau of Investigation (FBI), he has a combined twenty-one years of experience in conducting research in cognitive security and human-technology integration. He currently holds an affiliated faculty appointment with George Mason University, where his research focuses on the cognitive factors in synthetic media social engineering and online influence campaigns. He was previously a research professor with the University of Central Florida, School of Modeling, Simulation, and Training's Behavioral Cybersecurity program. His work has been funded by NIST (National Institute of Standards and Technology), DARPA (Defense Advanced Research Projects Agency), and the US Army Research Institute. He has provided cognitive security awareness training to the NASA Kennedy Space Center, DARPA, MIT, US Army DevCom, the NATO Cognitive Warfare Working Group, the Voting and Misinformation Villages at DefCon, and the Black Hat USA security conference. He holds a PhD in Cognition, Perception, and Cognitive Neuroscience from the University of California, Santa Barbara, and SANS certifications in mobile device analysis (GMOB), security auditing of wireless networks (GAWN), digital forensic examination (GCFE), and GIAC Security Essentials (GSEC). About: The Information Professionals Association (IPA) is a non-profit organization dedicated to exploring the role of information activities, such as influence and cognitive security, within the national security sector and helping to bridge the divide between operations and research. Its goal is to increase interdisciplinary collaboration between scholars and practitioners and policymakers with an interest in this domain. For more information, please contact us at communications@information-professionals.org. Or, connect directly with The Cognitive Crucible podcast host, John Bicknell, on LinkedIn. Disclosure: As an Amazon Associate, 1) IPA earns from qualifying purchases, 2) IPA gets commissions for purchases made through links in this post.

CISO Tradecraft
#243 - Navigating Hacker Summer Camp in 2025

CISO Tradecraft

Play Episode Listen Later Jul 29, 2025 26:31


Navigating Hacker Summer Camp: A Comprehensive Guide Join host G Mark Hardy on this episode of CSO Tradecraft as he provides a detailed guide on what to expect at Hacker Summer Camp, a series of significant cybersecurity events including DEFCON, Black Hat, and BSides Las Vegas. G Mark shares historical insights, tips for first-timers, and personal anecdotes from his extensive experience attending these events over the years. Learn about the origins, key activities, and networking opportunities that make these conferences pivotal in the cybersecurity community. Stay tuned for practical advice on planning your visit and making the most out of your Hacker Summer Camp experience. Transcripts: https://docs.google.com/document/d/1Y-MenErnVCzUga4xu20ZIz8hT9xsGSJD   Chapters 00:00 Introduction to Hacker Summer Camp 01:29 History and Significance of DEFCON 02:50 Spot the Fed and Early DEFCON Experiences 05:31 The Evolution of Black Hat 09:34 The Birth and Growth of BSides 11:19 Tips for Attending Hacker Summer Camp 19:57 Networking and Participation Strategies 25:31 Conclusion and Final Thoughts

Destination Linux
429: Open Source AI, End of Clear Linux, & the Security Scoop with Sandfly

Destination Linux

Play Episode Listen Later Jul 28, 2025 74:49


video: https://youtu.be/abgTchtrH0k On this episode of Destination Linux, we are joined by security expert Craig Rowland returns for the “Sandfly Security Scoop,” explaining how the stealthy BPFdoor back‑door evades firewalls and sharing tips for DEF CON and Black Hat attendees. We also unpack listener feedback about phone‑addiction myths and mindful smartphone use. Then we discuss Moonshot's open‑source Kimi AI model that tackles two‑million‑character prompts and beats proprietary LLM benchmarks, sparking a wider chat about open AI guardrails and Linux's role under the hood. Later, there's some bittersweet news that Intel is discontinuing its performance‑tuned Clear Linux distro, prompting nostalgia and debate over rolling vs. hybrid releases. Our tip of the week highlights a crowd‑sourced Linux guide that demystifies getting started with Ubuntu especially for network engineers. Forum Discussion Thread (https://destinationlinux.net/forum) Download as MP3 (https://aphid.fireside.fm/d/1437767933/32f28071-0b08-4ea1-afcc-37af75bd83d6/17fb8c1f-d90d-4b20-ae21-255561ec5c8b.mp3) Support the show by becoming a patron at tuxdigital.com/membership (https://tuxdigital.com/membership) or get some swag at tuxdigital.com/store (https://tuxdigital.com/store) Hosted by: Ryan (DasGeek) = dasgeek.net (https://dasgeek.net) Jill Bryant = jilllinuxgirl.com (https://jilllinuxgirl.com) Michael Tunnell = michaeltunnell.com (https://michaeltunnell.com) Chapters: 00:00:00 Intro 00:02:18 Community Feedback 00:10:20 Sandfly Security Scoop 00:23:15 Defcon VS Blackhat 00:29:31 OpenSource AI Kimi 00:47:38 Clear Linux OS & Intel's future 01:03:49 Community Tip and Trick 01:09:13 Support the Show 01:12:43 Outro 01:13:07 Post Show Links: Community Feedback https://destinationlinux.net/comments (https://destinationlinux.net/comments) https://destinationlinux.net/forum (https://destinationlinux.net/forum) Sandfly Security Scoop https://destinationlinux.net/sandfly (https://destinationlinux.net/sandfly) https://sandflysecurity.com/blog/sandfly-5-5-ai-powered-analysis-advanced-bpfdoor-detection-and-smarter-scanning (https://sandflysecurity.com/blog/sandfly-5-5-ai-powered-analysis-advanced-bpfdoor-detection-and-smarter-scanning) Defcon VS Blackhat https://defcon.org/ (https://defcon.org/) https://www.blackhat.com/ (https://www.blackhat.com/) OpenSource AI Kimi https://www.kimi.com/ (https://www.kimi.com/) https://huggingface.co/spaces/Jhawley/moonshotai-Kimi-K2-Instruct (https://huggingface.co/spaces/Jhawley/moonshotai-Kimi-K2-Instruct) Clear Linux OS & Intel's future https://community.clearlinux.org/t/all-good-things-come-to-an-end-shutting-down-clear-linux-os/10716 (https://community.clearlinux.org/t/all-good-things-come-to-an-end-shutting-down-clear-linux-os/10716) https://news.itsfoss.com/clear-linux-os-discontinued/ (https://news.itsfoss.com/clear-linux-os-discontinued/) https://www.omglinux.com/intel-clear-linux-os-discontinued-2025/ (https://www.omglinux.com/intel-clear-linux-os-discontinued-2025/) Community Tip and Trick https://rikosintie.github.io/Ubuntu4NetworkEngineers/CH02-Install-Tools/ (https://rikosintie.github.io/Ubuntu4NetworkEngineers/CH02-Install-Tools/) Support the Show https://tuxdigital.com/membership (https://tuxdigital.com/membership) https://store.tuxdigital.com/ (https://store.tuxdigital.com/)

Badlands Media
DEFCON ZERQ Ep. 002: The Storm has Arrived – 11.3 Confirmation

Badlands Media

Play Episode Listen Later Jul 23, 2025 111:22 Transcription Available


In Episode 2 of DEFCON ZERQ, Alpha Warrior and Josh Reid present compelling arguments that we've officially entered the “11.3” phase of the information war, citing military law, devolution, and continuity of government as key evidence. They decode Department of Defense Law of War Manual citations, unpack the symbolism behind Trump's latest moves, and point to specific executive orders and global power plays that align with a long-theorized plan. The hosts explore how military occupancy, strategic disinformation, and optics have been used to prepare the public for the storm now arriving. From international chessboard realignments to insider comms and psyop tactics, this episode connects the dots between drops, information dominance, and psychological resilience. Alpha and Josh urge listeners to sharpen their discernment, brace for chaos, and recognize the transformation already underway. This isn't just theory anymore, it's a call to stand ready.

The Post-Quantum World
Open-Source Quantum Sensing at DEF CON – with Mark Carney and Victoria Kumaran at Quantum Village

The Post-Quantum World

Play Episode Listen Later Jul 23, 2025 34:32


DEF CON 33 approaches, bringing with it the fourth year of Quantum Village. Nothing like getting hands-on with quantum computing and sensing technology at the world's leading hacking conference. To that end, this episode explores the open-source quantum sensing device and software that our guests Mark Carney and Victoria Kumaran are presenting in Vegas. And yes, for the third year in a row, host Konstantinos Karagiannis will be speaking, too. Feel like joining 30,000 others in person? We also cover some of the other activities and topics you'll experience.For more on DEF CON, visit https://defcon.org/index.html.  For more on Quantum Village, visit https://quantumvillage.org/.Visit Protiviti at www.protiviti.com/US-en/technology-consulting/quantum-computing-services  to learn more about how Protiviti is helping organizations get post-quantum ready.  Follow host Konstantinos Karagiannis on all socials: @KonstantHacker and follow Protiviti on LinkedIn and Twitter: @Protiviti.  

Countdown with Keith Olbermann
TRUMP SUING MURDOCH MEANS THE TRUMPSTEIN STORY WILL NEVER END - 7.21.25

Countdown with Keith Olbermann

Play Episode Listen Later Jul 21, 2025 87:03 Transcription Available


SEASON 3 EPISODE 147: COUNTDOWN WITH KEITH OLBERMANN A-Block (1:45) SPECIAL COMMENT: We have been burying the lede here. Trump. Is. Suing. Murdoch. Trump and Murdoch are at war. Over Jeffrey Epstein. The two worst people in the country, probably the world, at each other's throats, until further notice. Weeks, months, years. Amid rumors Murdoch's people at the Wall Street Journal are upworking ANOTHER Trump-Epstein/Epstein-Trump/Trumpstein story. And that Murdoch is preparing a Defcon scenario in which he turns Fox News against Trump. Because if Trump is stupid enough to try to put Murdoch out of business, Murdoch will have no choice but to try to put Trump out of business. Trump also seems to be doing everything else he can think of to make sure the Trumpstein story never leads the headlines again. Attacks his own people again. Left a paper trail inside the DOJ and FBI of Pam Bondi searching for thousands of Trump references inside an evidence pit the size of The New York Public Library. Changing the story of the latest plot against him for the sixth time in a week. And watching the polls - 17% approve of his handling of the Epstein issue - actually get worse since just last Thursday (89% want everything, not just the almost-meaningless Grand Jury testimony, released). Oh by the way there IS a Trump Client List inside DOJ/FBI. The only part of Trump's claim that there isn't that's true, is that it may not bear that title. There's literally 40 computers, 70 CDs of video, and 300 gigabytes of data. The Trumpstein story will swamp his presidency. For sheer volume it exceeds almost everything else Trump has ever done. It makes Watergate look like the editing out of four words in a 5,000 word document. IT'S WONDERFUL. Trumpstein, Trumpstein, Trumpstein. ALSO: Trump's unpopularity has now reached 1st Term proportions. Tulsi Gabbard is conflating two Russian stories and claiming the one nobody believed (Russia tampered with voting machines) disproves the one Robert Mueller proved (Russia hacked emails and got them to Trump's campaign). How does that work? I'll explain the psychology of morons who want to please their bosses, with the story of Tennessee Ernie Williams. And if you think Trump isn't brain dead he wrote something that must've come directly from a dream about how the Cleveland Guardians (formed 1901, not named "Indians" until 1915) are one of baseball's "six original teams" (Major League Baseball started 30 years earlier; it's HOCKEY with "the original six" and that's wrong too). B-Block (39:15) POSTSCRIPTS TO THE NEWS: I understand this busts the narrative and reduces our ability to suffer as martyrs, but there is one inarguable and unanswerable fact that disproves the almost-universally accepted premise that CBS cancelled Stephen Colbert solely to appease Trump. It's this: If they are silencing him, why have they decided to keep him on TV for THE NEXT TEN MONTHS? This is the Phil Donahue cancellation all over again. It works to CBS's corporate advantage to make it look like they are sucking up to the psycho. Sorry. This is the least of the reasons. C-Block (1:09:10) MONDAYS WITH THURBER: Haven't done any of his priceless stories lately, and with Trump's new permanent Trumpstein Crisis, it's fitting to do James Thurber's stunningly prophetic saga "The Greatest Man In The World."See omnystudio.com/listener for privacy information.

BarCode
Flight Path

BarCode

Play Episode Listen Later Jul 18, 2025 47:55


In this conversation, Chris Glandon interviews Josh Mason, a Solutions Architect at CINAC and founder of Newb Village. They discuss Josh's journey from being a U.S. Air Force pilot to entering the cybersecurity field, his motivation behind creating Newb Village to support newcomers in the industry, and his new book 'Speak Security with a Business Accent'. They also explore the role of SYNAC in cybersecurity and share insights on creating a welcoming environment for new professionals in the field. The conversation wraps up with a light-hearted discussion about unique bars and venues in the cybersecurity community.00:00 Josh Mason's Journey into Cybersecurity08:38 The Birth of Noob Village20:02 Speak Security with a Business Accent26:59 Transforming Technical Language for Business Impact30:01 Understanding Metrics for Different Audiences33:15 Aligning Business Goals with Security Metrics36:49 Insights into SYNAC and Its Offerings47:22 Exploring Unique Bars and Venues48:37 Imagining a Cybersecurity-Themed BarSYMLINK[Noob Village] - An inclusive space at DEF CON is designed to welcome and guide newcomers in the cybersecurity community. It offers resources like pamphlets, volunteers (“buddies”), and a booth called “No Stupid Questions” to support first-time attendees.Noob Village LinkedIn Page –A LinkedIn organization page with updates about volunteer calls, community news, and DEF CON involvement .[Joshua C. Mason – LinkedIn] - A cybersecurity leader and vCISO profile with extensive experience, offering insights on Noob Village, initiatives for veterans, and IT-to-security career development. Frequently shares event involvement (like DEF CON), mentorship tips, and professional updates.[Joshua C. Mason – Website] – Josh's professional website for Mason Security Consulting (Mason SC), where he offers vCISO services, cybersecurity consultancy, and insights from his military and IT background.[Mason SC Book Page] - Josh Mason's personal site, where signed copies of his book are available. The book includes cybersecurity leadership insights drawn from his experiences in the Air Force and IT.[Onward to Opportunity – A career training program for veterans, offering free training and certification opportunities in areas like project management and IT, including PMP and CISSP prep.[Synack] - A cybersecurity company offering “pen test as a service.” It connects clients with vetted ethical hackers using a managed platform to identify exploitable vulnerabilities efficiently.

ITSPmagazine | Technology. Cybersecurity. Society
Catching Up With Ken Munro After Infosecurity Europe 2025 — Hacking the Planet, One Car, One Plane, and One System at a Time | On Location Podcast With Sean Martin & Marco Ciappelli

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 17, 2025 23:25


Title: "Catching Up With Ken Munro After Infosecurity Europe 2025 — Hacking the Planet, One Car, One Plane, and One System at a Time"A Post–Infosecurity Europe 2025 Conversation with Ken MunroGuestsKen Munro Security writer & speakerhttps://www.linkedin.com/in/ken-munro-17899b1/HostsSean Martin, Co-Founder at ITSPmagazineWebsite: https://www.seanmartin.comMarco Ciappelli, Co-Founder, CMO, and Creative Director at ITSPmagazineWebsite: https://www.marcociappelli.com___________Episode SponsorsThreatLocker: https://itspm.ag/threatlocker-r974___________After a whirlwind week at Infosecurity Europe 2025, I had the chance to reconnect with Ken Munro from Pen Test Partners — a longtime friend, hacker, and educator who brings cybersecurity to life in the most tangible ways. From car hacking escape rooms to flight simulators in pubs, we talked about why touching tech matters, how myth-busting makes us safer, and how learning through play might just be the key to securing our increasingly complex world. Tune in, and maybe bring a cocktail.⸻There's something special about catching up with someone who's not just an expert in cybersecurity, but also someone who reminds you why this industry can — and should — be fun. Ken Munro and I go back to the early days of DEFCON's Aviation Village, and this post-Infosecurity Europe 2025 chat brought all that hacker spirit right back to the surface.Ken and his crew from Pen Test Partners set up shop next to the main Infosecurity Europe venue in a traditional London pub — but this wasn't your average afterparty. They transformed it into a hands-on hacking village, complete with a car demo, flight simulator, ICS cocktail CTF, and of course… a bar. The goal? Show that cybersecurity isn't just theory — it's something you can touch. Something that moves. Something that can break — and be fixed — before it breaks us.We talked about the infamous “Otto the Autopilot” from Airplane, the Renault Clio-turned-Mario Kart console, and why knowing how TCAS (collision avoidance) works on an Airbus matters just as much as knowing your Wi-Fi password. We also dug into the real-world cybersecurity concerns of industrial systems, electronic flight bags, and why European regulation might be outpacing the U.S. in some areas — for better or worse.One of the biggest takeaways? It's time to stop fearing the hacker mindset and start embracing it. Curiosity isn't a threat — it's a superpower. And when channeled correctly, it leads to safer skies, smarter cars, and fewer surprises in the water we drink or the power we use.There's a lot to reflect on from our conversation, but above all: education, community, and creativity are still the most powerful tools we have in security — and Ken is out there proving that, one demo and one pint at a time.Thanks again, Ken. See you at the next village — whichever pub, hangar, or DEFCON corner it ends up in.⸻Keywords: cybersecurity, ethical hacking, pen testing, Infosecurity Europe, embedded systems, car hacking, flight simulator, ICS security, industrial control systems, aviation cybersecurity, hacker mindset, DEFCON___________ResourcesLearn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Badlands Media
DEFCON ZERQ Ep. 001: The Plan to Save the World

Badlands Media

Play Episode Listen Later Jul 16, 2025 121:07 Transcription Available


In the premiere episode of DEFCON ZERQ, Alpha Warrior and Josh Reid launch an unfiltered series breaking down the origins, evolution, and real-world impact of what they call a decades-long military intelligence operation. They trace its roots to a coordinated effort by constitutional-minded generals tracking the theft of advanced defense technologies and infiltration by foreign adversaries. The hosts recount pivotal events: nuclear triggers sent overseas, mysterious air mishaps, the Snowden leaks, and the creation of special teams to investigate corruption. They explain how the rise of social media and viral content transformed public awareness, enabling decentralized citizen journalism to bypass mainstream narratives and fuel a global awakening. From Hillary Clinton's classified emails and uranium deals to election interference and Trump's unexpected rise as a countermeasure, the episode weaves together a sweeping story of covert maneuvers and information warfare. Alpha and Josh stress this is not entertainment but a strategic effort built on breadcrumbs, plausible deniability, and public engagement. This foundational discussion sets the stage for a multi-part series exploring symbolism, narrative control, and how movement warfare is shaping the fight for America's future.

Faith to Live By with Pamela Christian
Call to Highest Defense Alert – DEFCON 1  

Faith to Live By with Pamela Christian

Play Episode Listen Later Jul 16, 2025 59:53 Transcription Available


Guest Alex Newman sheds light on Iran's goals, while an Iranian group calls for Trump's assassination, the Russia/Ukraine conflict escalates, and the MAGA Movement suffers division over perceived lack of transparency and accountability. Readiness both spiritually and naturally are critical now.Faith to Live By is recognized By Feedspot as among the top 15 Charismatic Christian Podcasts: https://podcast.feedspot.com/charismatic_christian_podcasts/ SHOW NOTES – Partial, view complete Show Notes Here.CONNECT WITH TODAY'S GUEST: Alex NewmanAlex is an award-winning international journalist, educator, author, speaker, investor, and consultant with a global reputation for hard-hitting reporting who seeks to glorify God in everything he does. Alex is also the founder of Liberty Sentinel. Read Alex's complete bio: https://libertysentinel.org/bio Visit Alex's web sites: https://www.LibertySentinel.org and https://www.PublicSchoolExit.com and https://www.TheNewAmerican.comGet Alex's book, Indoctrinating Our Children to Death: Government Schools' War on Faith, Family, & Freedom – And How to Stop It from Pam's Amazon Affiliate link: https://m.media-amazon.com/images/I/1117s7FGfhL.jpg GREECE TRIP DETAILS: https://pamelachristianministries.com/beyond-the-podcast LINKS FROM SHOW CONTENT:The Epstein List Exists: https://www.vigilantfox.com/p/epsteins-former-lawyer-says-he-knowsFBI has discreetly initiated investigation: https://conservativebrief.com/fbi-decade-2-93187Trump's Hard Line with Russia: https://americanfaith.com/nato-deal-announced/BONUS: Sign up for Pam's Apologetics Class: https://pamelachristianministries.com/faith-to-live-by-training-center ACTION STEPS: If you like this podcast, help others derive the same benefit you do. Share this podcast with as many people as you can.SUPPORT:STORE: Learn about Pam's books and products from her web store. Select from a variety of enlightening books, CD/DVD's, conference collectibles and more. Get something for yourself and something to share. Use the promo code TRUTH at check out and get 20% off up to two items. https://pamelachristianministries.com/store

Autonomous IT
CISO IT – The Automation Imperative, E10

Autonomous IT

Play Episode Listen Later Jul 15, 2025 10:59


In this episode of Automox's CISO IT Podcast, host Jason Kikta returns from Black Hat and DEF CON in Las Vegas to discuss one of the most talked-about IT events of the summer, and what it truly reveals about automation in IT. Contrary to popular fearmongering, Jason argues that the incident isn't a cautionary tale against automation but a clear call for more thoughtful automation.Jason breaks down why automation, when paired with rigorous testing and strategic controls, is critical to modern IT and cybersecurity success. He challenges listeners to rethink what IT efficiency really means—not job cuts, but freeing teams to tackle the backlog and do more meaningful work. He wraps with a personal challenge: find and automate one tedious task this week using tools like Automox, Okta workflows, or your own scripts.This episode originally aired September 12, 2024 

Microsoft Threat Intelligence Podcast
Tips from Grifter and Lintile for Attending Hacker Summer Camp

Microsoft Threat Intelligence Podcast

Play Episode Listen Later Jul 9, 2025 93:18


In this episode of the Microsoft Threat Intelligence Podcast, host⁠ ⁠⁠Sherrod DeGrippo is joined by Grifter, the legendary Black Hat NOC lead, and Lintile, host of Hacker Jeopardy, to go behind the scenes of DEF CON and Black Hat. They unpack the chaos of managing the world's most hostile networks, share advice for first-time attendees, and explore the vibrant hacker community that thrives on connection, contests, and lifelong friendships. The conversation also covers how to submit compelling CFP abstracts, why live events matter, and the controlled mayhem that defines Hacker Jeopardy each year in Las Vegas.  Heading to Black Hat? Join us at booth #2246 where we will be recording new episodes, and request to attend the VIP Mixer. We'll also be hosting the BlueHat podcast, our friends from GitHub, and experts from our incident response team.  In this episode you'll learn:       Why skipping talks at DEF CON to join contests and villages can be more valuable  Tips for crafting compelling CFP abstracts that stand out among 1,000+ submissions  The importance of connection and niche technical discussions in the hacker community    Some questions we ask:      What advice would you give to someone who has never been to DEF CON?  How does the team plan traps and misdirection in Hacker Jeopardy questions?  What do you think the community should focus on getting out of DEF CON?  Resources:   View Sherrod DeGrippo on LinkedIn     Related Microsoft Podcasts:                    Afternoon Cyber Tea with Ann Johnson  The BlueHat Podcast  Uncovering Hidden Risks        Discover and follow other Microsoft podcasts at microsoft.com/podcasts   Get the latest threat intelligence insights and guidance at Microsoft Security Insider  The Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of N2K media network.  

No Way, Jose!
NWJ 567- The Morning Dump: Russia Goes Hard, False Flag DEFCON 1, Big Beautiful Debt Slavery, & More

No Way, Jose!

Play Episode Listen Later Jul 4, 2025 120:53


Time Stamps:3:30 - Horton is Crushing18:35 - Foreign Policy Round-up51:20 - False Flag DEFCON 159:53 - Big Beautiful Debt Slavery1:02:25 - Does Massie Glow?1:16:48 - Trump Flopping on Immigration?1:37:56 - Israeli Gr8pe1:47:15 - More on Kohberger MurdersWelcome to The Morning Dump, where we dive headfirst into the deep end of the pool of current events, conspiracy, and everything in between. Join us for a no-holds-barred look at the week's hottest topics, where we flush away the fluff and get straight to the substance.Please consider supporting my work- Patreon- https://www.patreon.com/nowayjose2020 Only costs $2/month and will get you access to episodes earlier than the publicNo Way, Jose! Rumble Channel- https://rumble.com/c/c-3379274  No Way, Jose! YouTube Channel- https://youtube.com/channel/UCzyrpy3eo37eiRTq0cXff0g My Podcast Host- https://redcircle.com/shows/no-way-jose Apple podcasts- https://podcasts.apple.com/us/podcast/no-way-jose/id1546040443 Spotify- https://open.spotify.com/show/0xUIH4pZ0tM1UxARxPe6Th Stitcher- https://www.stitcher.com/show/no-way-jose-2 Amazon Music- https://music.amazon.com/podcasts/41237e28-c365-491c-9a31-2c6ef874d89d/No-Way-Jose Google Podcasts- https://www.google.com/podcasts?feed=aHR0cHM6Ly9mZWVkcy5yZWRjaXJjbGUuY29tL2ZkM2JkYTE3LTg2OTEtNDc5Ny05Mzc2LTc1M2ExZTE4NGQ5Yw%3D%3DRadioPublic- https://radiopublic.com/no-way-jose-6p1BAO Vurbl- https://vurbl.com/station/4qHi6pyWP9B/ Feel free to contact me at thelibertymovementglobal@gmail.com#RussiaGoesHard #DroneAttackUkraine #FalseFlagDEFCON1 #DEFCON1July4th #BigBeautifulDebtSlavery #RussiaUkraineConflict #DroneStrikeUkraine #FalseFlagOperation #DEFCON1Alert #July4thCrisis #DebtSlaveryAmerica #RussiaMilitaryAction #UkraineUnderAttack #FalseFlagConspiracy #DEFCON1Threat #IndependenceDayTensions #EconomicDebtSlavery #RussiaAggression #UkraineDroneWar #DebtSlaveryWarning

Basketball Illuminati
See The Vision

Basketball Illuminati

Play Episode Listen Later Jul 2, 2025 71:05


Tom Haberstroh, Amin Elhassan and producer Anthony Mayes love not-so-subtle LeBron, and offer three splashy landing spots for the disgruntled 40 year old. The Milwaukee Bucks have reached Defcon 1 in their quest to keep Giannis happy, mortgaging their future yet again by waiving and stretching Damian Lillard in order to sign Myles Turner. We break the code on the mysterious Malik Beasley situation that snuck into the news cycle on Sunday and cost the free agent a massive payday. Basketball Illuminati is now part of the Count The Dings Network. ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Join the Count The Dings Patreon⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ to support the show, get ad free episodes and exclusive content at⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ www.patreon.com/CountTheDings⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ILLUMINATI MERCH HAS RETURNED⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ - Check it out here:⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ https://bit.ly/CTDMERCH⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Subscribe to Basketball Illuminati! On ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Apple⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ or ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Spotify⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Email us: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠basketballilluminati@gmail.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Twitter: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@bballilluminati⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ Instagram: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠@basketballilluminati Learn more about your ad choices. Visit megaphone.fm/adchoices

Clownfish TV: Audio Edition
Comic Book Publishers are BROKE and Can't Make Payroll?!

Clownfish TV: Audio Edition

Play Episode Listen Later Jul 2, 2025 21:16


Dynamite Entertainment says it can't make payroll next week and is owed nearly $1 million from Diamond Distribution. One of the bosses at Fantagraphics said this is "DEFCON 1" for the comic book industry, and that financially, things have never been this bad. Watch this podcast episode on YouTube and all major podcast hosts including Spotify. CLOWNFISH TV is an independent, opinionated news and commentary podcast that covers Entertainment and Tech from a consumer's point of view. We talk about Gaming, Comics, Anime, TV, Movies, Animation and more. Hosted by Kneon and Geeky Sparkles. D/REZZED News covers Pixels, Pop Culture, and the Paranormal! We're an independent, opinionated entertainment news blog covering Video Games, Tech, Comics, Movies, Anime, High Strangeness, and more. As part of Clownfish TV, we strive to be balanced, based, and apolitical. Get more news, views and reviews on Clownfish TV News - https://news.clownfishtv.com/ On YouTube - https://www.youtube.com/c/ClownfishTV On Spotify - https://open.spotify.com/show/4Tu83D1NcCmh7K1zHIedvg On Apple Podcasts - https://podcasts.apple.com/us/podcast/clownfish-tv-audio-edition/id1726838629

Boomer & Gio
Boomer & Gio Podcast (WHOLE SHOW)

Boomer & Gio

Play Episode Listen Later Jun 25, 2025 165:37


Hour 1 Boomer is back, and both the Yankees and Mets are struggling, with the Mets blowing leads and the Yankees losing in extra innings. The Mets also have a new injury concern with pitcher Sean Manaea's elbow. In NBA news, Kristaps Porzingis was traded to the Atlanta Hawks, and the Knicks have no coach or pick for tonight's draft. The show also covered the Thunder's championship parade and Matt Martin's retirement from the Islanders to join their front office. Hour 2 The Knicks are inactive while Kristaps Porzingis is traded to the Atlanta Hawks. Ahead of tonight's NBA Draft, the Nets have five first-round picks, and two Rutgers players are projected to be top-five selections. In baseball, the Mets' bullpen continues to struggle, blowing a 3-0 lead, while pitcher Sean Manaea has a setback with an elbow injury. The Yankees also lost in extra innings, and a debate over a potential no-hitter sparked a dispute between Shaun Morash and Mike Francesa. The hour ended with a mention of Aaron Rodgers' interview on his private life and a Golf.com video about Gio. Hour 3 Today is expected to be the last day of the heat wave. The Mets' losing streak continued with a defeat by the Braves, and pitcher Sean Manaea suffered a rehab setback due to loose bodies in his arm. The Yankees also lost to the Reds with Chase Burns' impressive MLB debut against them. Tonight is the NBA Draft, with two Rutgers players projected as top-five picks. Aaron Rodgers stated he plans to completely withdraw from the public eye upon retirement. The show also featured discussion on Defcon levels, Joe Benigno's fourth hole-in-one, and super tall intern Zach. Hour 4 Gio detailed Netflix's "Poop Cruise" documentary. Both the Yankees and Mets are on losing streaks, with the Yankees 1-6 in extra innings and the Mets' bullpen continuing to struggle, contributing to their recent defeat by the Braves. Mets pitcher Sean Manaea also had a setback with loose bodies in his arm. A debate arose over Rebecca Lobo's "that's what makes America great" comment. Then Boomer ate a hamburger.

Boomer & Gio
Heat Wave Continues As Do Mets & Yanks Problems; Dickie Lovelady; Rutgers Players Top NBA Picks (Hour 3)

Boomer & Gio

Play Episode Listen Later Jun 25, 2025 41:12


Amidst a heatwave, the Mets face a "Defcon 5" losing streak, despite a favorable pitching matchup. Joe Benigno scored his fourth hole-in-one. Sean Manaea's rehab is set back by loose bodies in his arm. The Yankees also lost, with Jazz Chisholm ejected. Chase Burns dominated his MLB debut. The NBA draft is tonight, with two potential top-5 Rutgers picks. Aaron Rodgers plans a private retirement. Super tall intern Zach's picture caused a social media stir.

Everything I Learned From Movies
Episode 499 - Def-Con 4

Everything I Learned From Movies

Play Episode Listen Later Jun 24, 2025 108:14


Steve & Izzy continue 2025 the Year of the Apocalypse celebrating movies after the fall of man, as they are joined by Jason of the For Screen & Country Podcast to discuss 1985's "Def-Con 4" starring Tim Choate, Lenore Zann & more!!! Are astronauts allowed porn in space? Did Howe have a plan? How long does it take Nova Scotia to become Bartertown?!? Let's find out!!! So kick back, grab a few brews, describe her areolas, and enjoy!!! This episode is proudly sponsored by Untidy Venus, your one-stop shop for incredible art & gift ideas at UntidyVenus.Etsy.com and be sure to follow her on Twitter, Facebook, Instagram & Patreon at @UntidyVenus for all of her awesomeness!!! Try it today!!! Twitter - ⁠⁠⁠⁠www.twitter.com/eilfmovies⁠⁠⁠⁠ Facebook - ⁠⁠⁠⁠www.facebook.com/eilfmovies⁠⁠⁠⁠ Etsy - ⁠⁠⁠⁠www.untidyvenus.etsy.com⁠⁠⁠⁠ TeePublic - ⁠⁠⁠⁠www.teepublic.com/user/untidyvenus Learn more about your ad choices. Visit megaphone.fm/adchoices

Daily Signal News
Victor Davis Hanson: The Trump-Musk Split is a Gift to the Left

Daily Signal News

Play Episode Listen Later Jun 16, 2025 10:32


After Elon Musk publicly criticized Trump's “Big, Beautiful Bill” for overspending, a once-productive relationship spiraled into mutual recriminations, accusations, and veiled threats. Victor Davis Hanson breaks down the sudden, bizarre, and historically unprecedented rupture between two powerful figures who, until recently, appeared to be allies in reshaping America's economic and political direction on today's episode of “Victor Davis Hanson: In His Own Words.”  “ So, what was it all about? People have given all sorts of different explanations. One of them is that the new big, beautiful bill will phase out subsidies for all electric vehicles. And given Tesla's attacks on—people attacking stations, chargers, dealers, individual drivers, the bad publicity the Democrats ginned up, he can't afford that right now. … He's angry about this bill. And then, when Trump sort of brushed it off, he went DEFCON 1.  “Elon Musk needs Donald Trump for the space exploration, for a fair shake on his business deals. And Donald Trump is aided by Elon Musk, especially the SpaceX. So, it's a mutually beneficiary relationship, not just for both of them, but for us, the American people.”