POPULARITY
Categories
Writers (and comics journalism legends) Laura Hudson and Tim Leong join the show to talk their new Mad Cave series Exploit and their journeys to it. Hudson and Leong discuss the power of honesty, publishing their first comic, the evolution of Exploit, whether they always wanted to make comics, how the series developed, the impact of collaboration, Exploit's origins, channeling frustrations into the work, the book's energy, the importance of looking cool, print journalism trends, looking at comics from the outside, and more.
Reviews: Disney Villains: Gaston #1, Exploit #1, Nectar #1, The Beauty s1, Scream 7 Once again, Jimmy recruits some of his friends and favorite reviewers to help out. Thanks to Avery, Melissa, Steph and Erick. And to Emily for the news which includes: Mike Richardson out at Dark Horse, THE LAST STARFIGHTER gets a comic sequel, Nintendo sues over tariffs & more!
Coruna iOS Exploit Kit Goes Mass-Market, FBI Wiretap Platform Breach Probe, Windows Terminal ClickFix, and Iran-War Cyber Escalation This episode covers several major cybersecurity developments: Google's Threat Intelligence Group details Coruna, a sophisticated iOS exploit kit with 23 exploits and multiple chains affecting iOS 13–17.2.1, shifting from targeted surveillance use to cryptocurrency-scam distribution and a PlasmaLoader payload aimed at stealing wallet data. The FBI is investigating suspicious activity involving its Digital Collection System Network used to support wiretaps and surveillance, with concerns about third-party vendor exposure and broader federal agency targeting. Microsoft reports a new ClickFix variation that abuses Windows Terminal to deploy the Luma Stealer via encoded commands, persistence, Defender exclusions, and browser injection. The show also reviews Iran-linked cyber activity by MuddyWater and others amid regional conflict, including new backdoors and cloud-based exfiltration, and reports that Iranian drone strikes hit AWS data centers in the UAE and Bahrain, causing outages and highlighting data centers as battlefield targets. Cybersecurity Today would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/cst 00:00 Sponsor Message Meter 00:19 Headlines And Intro 00:50 Coruna iOS Exploit Kit 04:06 FBI Wiretap Platform Breach 06:52 ClickFix Hits Windows Terminal 10:00 Iran War Cyber Campaigns 14:59 Drones Hit AWS Data Centers 17:57 Wrap Up And Thanks 18:35 Sponsor Close Meter
(Presented by Thinkst Canary: Most Companies find out way too late that they've been breached. Thinkst Canary changes this. Deploy Canaries and Canarytokens in minutes and then forget about them. Attackers tip their hand by touching 'em giving you the one alert, when it matters. With zero admin overhead and almost no false-positives, Canaries are deployed (and loved) on all 7 continents.) Three Buddy Problem - Episode 88: We unpack the fallout from public documentation of the Coruna iOS exploit kit, the likely connection to the Peter Williams/Trenchant exploit sale to Russians, how it slipped from government hands into criminal use, and the widening use of zero-days by surveillance vendors and cybercriminals. Plus, fresh signs of cyber-warfare activity tied to Iran and Israel, the FBI's disclosure of a breach affecting internal surveillance systems, and the latest debate over AI, security tooling, and Anthropic's public stumbles. Cast: Juan Andres Guerrero-Saade, Ryan Naraine and Costin Raiu.
(Presented by TLPBLACK: High-fidelity threat intelligence and research tools for modern security teams. From curated Passive DNS and real-time C2 monitoring to actionable IOC feeds and daily malware samples, we help defenders detect, hunt, and disrupt threats faster, with seamless integration into SIEM and SOAR workflows.) Matthias Frielingsdorf (co-founder and VP of Research at iVerify) joins the show to discuss the mysterious US government connection to 'Coruna', an iOS exploit kit fitted with 23 exploits across five full chains targeting iPhones iOS 13 through 17.2.1. We talk about a "gut feeling" connecting this to the L3 Trenchant/Peter Williams exploit sale scandal, how a nation-state-grade exploit kit ended up in the hands of a Chinese cybercrime group chasing crypto wallets, and what it means that criminal organizations are now deploying iPhone zero-days at scale. Matthias walks through what iVerify can and can't do on Apple's locked-down platform, why he thinks Apple needs to give defenders more access, the Lockdown Mode debate, the thorny issue of sample sharing in the research community, and practical advice for everyday iPhone users facing a threat landscape that just got a lot more complicated.
Mark Levy brands the ACCC as a "whimpering" observer of the "feather and rocket" effect, where pump prices skyrocket instantly despite fuel being purchased at pre-war rates. He argues that without real penalties, the petrol station remains the most effective tool for theft in Australia.See omnystudio.com/listener for privacy information.
Michael McLaren delivered a scathing critique of the Australian fuel industry, labeling the current situation "bunker nonsense" and arguing that the "price cycle" is a system stacked against the average motorist.See omnystudio.com/listener for privacy information.
Laura Hudson and Tim Leong join the show to talk about their Mad Cave Studios series Exploit.
Why do narcissists target good, empathetic people in relationships?This week, forensic psychologist Dr. Peter Favaro reveals why being a good person might actually make you MORE vulnerable to narcissists—and how that one irrational belief creates the exact confusion toxic people exploit. Wondering if you met a “bad person?” Find out with this free gift from Dr. Kerry! PODCAST EXTRA EXCLUSIVE SEGMENT Find the exclusive second segment and weekly newsletter here. MORE ABOUT THE PODCAST EXTRA INTERVIEW
In this first bonus episode of That Workplace Experience Podcast, host Dan Moscrop is joined by Simon Jordan and Gerry Hopkinson of We Make Progress — a design anthropology and experience strategy studio working across cities, venues and mixed-use developments.Together, they explore a provocative idea:What if we've been designing workplaces the wrong way around?From fluid identity and hybrid work to the limits of “human-centric design,” this conversation challenges the assumption that efficiency equals growth.They unpack:The “Explore vs Exploit” theory of workWhy meaning matters more than corporate purposeWhy buildings shouldn't organise peopleHow participation and stewardship shape long-term successWhy places should behave more like living ecologies than static systemsThis episode steps back from a single project to examine the cultural forces reshaping work, cities and experience today.Watch the episode and download the Workbook for a deeper dive into the episode, and We Make Progress. Video production and camera: Calum LindsayCamera: Miguel Santa ClaraIllustration: Phoebe Gitsham
Calling plays for your team's offense on game day doesn't have to be super complicated, but it does need to be methodical. Your plan to take advantage of the defense has to involve finding their weaknesses and exploiting them. In this episode Joe Daniel and Daniel Chamberlain discuss the four weaknesses of a Defense, how to build your playbook to attack those weaknesses, and how to identify the weaknesses during a game.
« Les lignes de front se sont rallumées à l'aube, s'exclame Le Point Afrique. Depuis hier matin, les Forces armées de la République démocratique du Congo (FARDC), appuyées par les milices locales Wazalendo et soutenues par des drones, ont lancé des attaques simultanées sur plusieurs positions de l'AFC/M23 dans l'est du pays. Les combats les plus intenses se concentrent dans le territoire de Masisi, à proximité immédiate de Rubaya, site minier stratégique. Cette zone produit entre 15 % et 30 % du coltan mondial, minerai indispensable à l'industrie électronique. Pour le M23, l'enjeu est autant militaire qu'économique. (…) Cette nouvelle flambée, note encore Le Point Afrique, intervient au lendemain d'un événement majeur : la mort de Willy Ngoma, porte-parole militaire du M23, tué mardi près de Rubaya lors d'une frappe de drone attribuée aux FARDC. » Les drones : nouvelle arme fatale Le conflit est en train de prendre une nouvelle dimension avec justement l'utilisation de plus en plus massive de drones. En effet, explique Afrikarabia, site spécialisé sur la RDC, « depuis la résurgence du M23, fin 2021, le conflit s'est enlisé au sol pour l'armée congolaise, dont la faiblesse ne lui a jamais permis de reprendre le dessus sur les rebelles, ni de reprendre des localités significatives ». « En échec au sol, Kinshasa a (donc) décidé de déplacer les combats dans les airs, notamment avec l'usage de drones d'attaque. Le décès de Willy Ngoma montre que l'armée congolaise peut désormais mener des attaques ciblées, pointe Afrikarabia. Ses forces spéciales, formées et soutenues par les éléments israéliens des paramilitaires de l'Américain Erik Prince, qui sont déployés à Uvira, sont désormais capables de frapper n'importe où et en toutes circonstances. Les attaques de drones sur les rebelles permettent maintenant aux milices Wazalendos, en premières lignes au sol, de pouvoir gagner du terrain et déloger certaines positions rebelles. Ce qui est désormais le cas autour de Rubaya, de Minembwe et de Kavumu. » Le poids des États-Unis « La dynamique semble, fait inhabituel, évoluer en faveur des forces congolaises », renchérit Ledjely. Et les Américains y sans doute pour quelque chose… En effet, précise le site guinéen, « ces premiers revers enregistrés par la rébellion interviennent après l'accord signé à Washington entre Félix Tshisekedi, Paul Kagame et Donald Trump. Par ailleurs, à la suite du retrait rebelle d'Uvira, des éléments liés à la société paramilitaire fondée par Erik Prince, ex-patron de Blackwater, auraient été aperçus dans la région. Fait notable également, pointe Ledjely : la zone où Willy Ngoma a trouvé la mort se situerait à proximité de l'une des plus importantes mines de coltan du pays. Exploitée par la rébellion depuis qu'elle en a pris le contrôle en 2024, cette mine avait été pourtant intégrée au volet économique de l'accord de Washington. Et dès lors que des intérêts économiques majeurs entrent ouvertement en jeu, les États-Unis pourraient difficilement tolérer toute remise en cause de leurs positions stratégiques, relève encore le site guinéen. Dans ce nouveau contexte, la rébellion de l'AFC/M23 ainsi que ses parrains rwandais pourraient bien découvrir que l'équation militaire dans l'est congolais est en train de changer ». Offensive diplomatique Pendant ce temps, Félix Tshisekedi est à l'offensive sur le plan diplomatique. Le président congolais est en visite en France. Il a été reçu mercredi 25 février à l'Élysée par Emmanuel Macron. « La France a exprimé sa solidarité avec Kinshasa, relève Afrik.com, tout en appelant à une désescalade et à une solution durable conforme au droit international. Cette prise de position a lieu à un moment où la RDC multiplie les démarches diplomatiques pour internationaliser la question sécuritaire et obtenir des soutiens explicites sur la scène mondiale. Pour Kinshasa, chaque déclaration publique de soutien constitue un levier dans le rapport de force régional. Pour Paris, l'équation est plus délicate : préserver la stabilité des Grands Lacs sans rompre les équilibres diplomatiques avec Kigali ». Et dans le même temps, relève encore Afrik.com, un bras de fer diplomatique est en train de se jouer entre la RDC et le Rwanda : « La RDC semble déterminée à arracher au Rwanda la tête de l'Organisation internationale de la francophonie (OIF). (…) La RDC qui envisage de présenter une candidature au secrétariat général de l'organisation. Cette ambition croise celle du Rwanda qui avait déjà annoncé la reconduction de la candidature de l'actuelle secrétaire générale, Louise Mushikiwabo, pour un troisième mandat ».
« Les lignes de front se sont rallumées à l'aube, s'exclame Le Point Afrique. Depuis hier matin, les Forces armées de la République démocratique du Congo (FARDC), appuyées par les milices locales Wazalendo et soutenues par des drones, ont lancé des attaques simultanées sur plusieurs positions de l'AFC/M23 dans l'est du pays. Les combats les plus intenses se concentrent dans le territoire de Masisi, à proximité immédiate de Rubaya, site minier stratégique. Cette zone produit entre 15 % et 30 % du coltan mondial, minerai indispensable à l'industrie électronique. Pour le M23, l'enjeu est autant militaire qu'économique. (…) Cette nouvelle flambée, note encore Le Point Afrique, intervient au lendemain d'un événement majeur : la mort de Willy Ngoma, porte-parole militaire du M23, tué mardi près de Rubaya lors d'une frappe de drone attribuée aux FARDC. » Les drones : nouvelle arme fatale Le conflit est en train de prendre une nouvelle dimension avec justement l'utilisation de plus en plus massive de drones. En effet, explique Afrikarabia, site spécialisé sur la RDC, « depuis la résurgence du M23, fin 2021, le conflit s'est enlisé au sol pour l'armée congolaise, dont la faiblesse ne lui a jamais permis de reprendre le dessus sur les rebelles, ni de reprendre des localités significatives ». « En échec au sol, Kinshasa a (donc) décidé de déplacer les combats dans les airs, notamment avec l'usage de drones d'attaque. Le décès de Willy Ngoma montre que l'armée congolaise peut désormais mener des attaques ciblées, pointe Afrikarabia. Ses forces spéciales, formées et soutenues par les éléments israéliens des paramilitaires de l'Américain Erik Prince, qui sont déployés à Uvira, sont désormais capables de frapper n'importe où et en toutes circonstances. Les attaques de drones sur les rebelles permettent maintenant aux milices Wazalendos, en premières lignes au sol, de pouvoir gagner du terrain et déloger certaines positions rebelles. Ce qui est désormais le cas autour de Rubaya, de Minembwe et de Kavumu. » Le poids des États-Unis « La dynamique semble, fait inhabituel, évoluer en faveur des forces congolaises », renchérit Ledjely. Et les Américains y sans doute pour quelque chose… En effet, précise le site guinéen, « ces premiers revers enregistrés par la rébellion interviennent après l'accord signé à Washington entre Félix Tshisekedi, Paul Kagame et Donald Trump. Par ailleurs, à la suite du retrait rebelle d'Uvira, des éléments liés à la société paramilitaire fondée par Erik Prince, ex-patron de Blackwater, auraient été aperçus dans la région. Fait notable également, pointe Ledjely : la zone où Willy Ngoma a trouvé la mort se situerait à proximité de l'une des plus importantes mines de coltan du pays. Exploitée par la rébellion depuis qu'elle en a pris le contrôle en 2024, cette mine avait été pourtant intégrée au volet économique de l'accord de Washington. Et dès lors que des intérêts économiques majeurs entrent ouvertement en jeu, les États-Unis pourraient difficilement tolérer toute remise en cause de leurs positions stratégiques, relève encore le site guinéen. Dans ce nouveau contexte, la rébellion de l'AFC/M23 ainsi que ses parrains rwandais pourraient bien découvrir que l'équation militaire dans l'est congolais est en train de changer ». Offensive diplomatique Pendant ce temps, Félix Tshisekedi est à l'offensive sur le plan diplomatique. Le président congolais est en visite en France. Il a été reçu mercredi 25 février à l'Élysée par Emmanuel Macron. « La France a exprimé sa solidarité avec Kinshasa, relève Afrik.com, tout en appelant à une désescalade et à une solution durable conforme au droit international. Cette prise de position a lieu à un moment où la RDC multiplie les démarches diplomatiques pour internationaliser la question sécuritaire et obtenir des soutiens explicites sur la scène mondiale. Pour Kinshasa, chaque déclaration publique de soutien constitue un levier dans le rapport de force régional. Pour Paris, l'équation est plus délicate : préserver la stabilité des Grands Lacs sans rompre les équilibres diplomatiques avec Kigali ». Et dans le même temps, relève encore Afrik.com, un bras de fer diplomatique est en train de se jouer entre la RDC et le Rwanda : « La RDC semble déterminée à arracher au Rwanda la tête de l'Organisation internationale de la francophonie (OIF). (…) La RDC qui envisage de présenter une candidature au secrétariat général de l'organisation. Cette ambition croise celle du Rwanda qui avait déjà annoncé la reconduction de la candidature de l'actuelle secrétaire générale, Louise Mushikiwabo, pour un troisième mandat ».
Jérôme Rothen se chauffe contre un autre consultant, un éditorialiste ou un acteur du foot.
C'est la sensation de ces barrages de Ligue des champions : l'Inter Milan, finaliste l'an dernier est éliminé, sorti par les Norvégiens de Bodo/Glimt au terme de deux matches et deux défaites pour les joueurs de Christian Chivu (5-2 en cumulé). Est-ce un exploit inédit ? Voyez-vous la récompense d'un projet ? L'échec de l'Inter est-il honteux ? L'humiliation va-t-elle être fatale pour Chivu ? Un titre en Série A rattraperait-il cette désillusion ? Ce soir, le PSG reçoit Monaco, fort de sa victoire 3-2 à l'aller en Principauté. La qualification est-elle une formalité ? La composition de Luis Enrique est-elle évidente ? Que doit faire Monaco pour espérer la qualification ?Ce podcast est hébergé par Podcastics, la plateforme pour créer et diffuser votre podcast facilement.
Il titolo è salito di oltre il 140% negli ultimi 12 mesi. Ecco perché Learn more about your ad choices. Visit megaphone.fm/adchoices
Report: https://thedfirreport.com/2026/02/23/apache-activemq-exploit-leads-to-lockbit-ransomware/Contact Us: https://thedfirreport.com/contact/
Avec : Daniel Riolo, journaliste. Pierre Rondeau, économiste. Et Yael Mellul, ancienne avocate. - Accompagnée de Charles Magnien et sa bande, Estelle Denis s'invite à la table des français pour traiter des sujets qui font leur quotidien. Société, conso, actualité, débats, coup de gueule, coups de cœurs… En simultané sur RMC Story.
Reddit rSlash Storytime r maliciouscompliance where Eliminate history ? Ok sure. Customer always found a mistake - so we complied I am the highest authority. No English allowed? D'accord. Signage not allowed? Fine. Give me a zero for no name, got it Throw it away if it's not labelled I was told I can only communicate with 2 people. Ok then Clocking in too early? No problem, I'll show up later then. He told me to follow the rules exactly so i did and now the store is short staffed and hes blaming me Department head tried throwing me under the bus Hosted on Acast. See acast.com/privacy for more information.
Après six mois sans jouer pour des douleurs au dos, Arthur Fils faisait son retour à la compétition le 3 février dernier, dix-huit jours plus tard, le Tricolore va disputer une finale à Doha, complètement fou !Le Français est en train de vivre une semaine de rêve après avoir éliminé successivement Majchrzak, Halys, Lehecka et enfin Jakub Mensik en demi-finale, le tombeur de Jannik Sinner. Face à Arthur Fils, c'est l'homme invincible, celui que personne ne veut affronter, Carlos Alcaraz. Si avoir l'opportunité de s'offrir une finale face à l'Espagnol semble être déjà une récompense, le défie semble immense voir impossible ? Alors, Arthur Fils peut-il être le premier joueur cette saison à faire tomber le numéro un mondial ? Ce podcast est hébergé par Podcastics, la plateforme pour créer et diffuser votre podcast facilement.
At its core, the case hinges on a straightforward legal framework: sex trafficking of minors involves recruiting or obtaining someone under eighteen for sexual activity in exchange for money or something of value. The conduct described in this instance followed a consistent pattern. Underage girls were allegedly approached with offers of cash for “massages,” encounters escalated into sexual acts, and payments were made afterward. Reports further described a referral system in which girls were encouraged to bring other girls and were compensated for doing so. Because minors cannot legally consent to commercial sex, the presence of payment and recruitment carries decisive legal weight. The absence of overt force does not negate the charge when the alleged victims are under eighteen.The allegations were not confined to a single episode or location. Similar accounts surfaced across multiple properties and over an extended period, suggesting repetition and coordination rather than isolated misconduct. Critics note that a prior plea agreement and the lack of a completed federal trial do not eliminate the factual allegations that formed the basis of later indictments. The commercial element—cash tied to sexual access involving minors—remains central. When recruitment, payment, and repetition converge, investigators and prosecutors characterize that structure as organized commercial sexual exploitation of minors. Stripped of political framing, the factual framework aligns with the statutory definition of sex trafficking.to contact me:bobbycapucci@protonmail.com
At its core, the case hinges on a straightforward legal framework: sex trafficking of minors involves recruiting or obtaining someone under eighteen for sexual activity in exchange for money or something of value. The conduct described in this instance followed a consistent pattern. Underage girls were allegedly approached with offers of cash for “massages,” encounters escalated into sexual acts, and payments were made afterward. Reports further described a referral system in which girls were encouraged to bring other girls and were compensated for doing so. Because minors cannot legally consent to commercial sex, the presence of payment and recruitment carries decisive legal weight. The absence of overt force does not negate the charge when the alleged victims are under eighteen.The allegations were not confined to a single episode or location. Similar accounts surfaced across multiple properties and over an extended period, suggesting repetition and coordination rather than isolated misconduct. Critics note that a prior plea agreement and the lack of a completed federal trial do not eliminate the factual allegations that formed the basis of later indictments. The commercial element—cash tied to sexual access involving minors—remains central. When recruitment, payment, and repetition converge, investigators and prosecutors characterize that structure as organized commercial sexual exploitation of minors. Stripped of political framing, the factual framework aligns with the statutory definition of sex trafficking.to contact me:bobbycapucci@protonmail.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-moscow-murders-and-more--5852883/support.
At its core, the case hinges on a straightforward legal framework: sex trafficking of minors involves recruiting or obtaining someone under eighteen for sexual activity in exchange for money or something of value. The conduct described in this instance followed a consistent pattern. Underage girls were allegedly approached with offers of cash for “massages,” encounters escalated into sexual acts, and payments were made afterward. Reports further described a referral system in which girls were encouraged to bring other girls and were compensated for doing so. Because minors cannot legally consent to commercial sex, the presence of payment and recruitment carries decisive legal weight. The absence of overt force does not negate the charge when the alleged victims are under eighteen.The allegations were not confined to a single episode or location. Similar accounts surfaced across multiple properties and over an extended period, suggesting repetition and coordination rather than isolated misconduct. Critics note that a prior plea agreement and the lack of a completed federal trial do not eliminate the factual allegations that formed the basis of later indictments. The commercial element—cash tied to sexual access involving minors—remains central. When recruitment, payment, and repetition converge, investigators and prosecutors characterize that structure as organized commercial sexual exploitation of minors. Stripped of political framing, the factual framework aligns with the statutory definition of sex trafficking.to contact me:bobbycapucci@protonmail.comBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.
A common model of AI suggests that there is a single measure of intelligence, often called AGI, and that AI systems are agents who can possess more or less of this intelligence. Cognitive science, in contrast, suggests that there are multiple forms of intelligence and that these intelligences trade-off against each other and have a distinctive developmental profile and evolutionary history. Exploitation, the pursuit of goals, resources and utilities, is characteristic of adult cognition. Alison Gopnik, professor of psychology and affiliate professor of philosophy at the UC Berkeley, and a member of the Berkeley AI Research Group, argues that two very different kinds of cognition characterize childhood and elderhood. Childhood is characterized by exploration. In particular, children seek out information about the world. However, forgoing reward for exploration requires support, care and teaching from others. Care and teaching are particularly characteristic of elders and the intelligence of care has a distinctive structure – it involves empowering others – giving them the resources they need to be effective. The combination of these different kinds of intelligence across the course of a life explains human success. Series: "UC Berkeley Graduate Lectures" [Humanities] [Science] [Show ID: 41068]
A common model of AI suggests that there is a single measure of intelligence, often called AGI, and that AI systems are agents who can possess more or less of this intelligence. Cognitive science, in contrast, suggests that there are multiple forms of intelligence and that these intelligences trade-off against each other and have a distinctive developmental profile and evolutionary history. Exploitation, the pursuit of goals, resources and utilities, is characteristic of adult cognition. Alison Gopnik, professor of psychology and affiliate professor of philosophy at the UC Berkeley, and a member of the Berkeley AI Research Group, argues that two very different kinds of cognition characterize childhood and elderhood. Childhood is characterized by exploration. In particular, children seek out information about the world. However, forgoing reward for exploration requires support, care and teaching from others. Care and teaching are particularly characteristic of elders and the intelligence of care has a distinctive structure – it involves empowering others – giving them the resources they need to be effective. The combination of these different kinds of intelligence across the course of a life explains human success. Series: "UC Berkeley Graduate Lectures" [Humanities] [Science] [Show ID: 41068]
A common model of AI suggests that there is a single measure of intelligence, often called AGI, and that AI systems are agents who can possess more or less of this intelligence. Cognitive science, in contrast, suggests that there are multiple forms of intelligence and that these intelligences trade-off against each other and have a distinctive developmental profile and evolutionary history. Exploitation, the pursuit of goals, resources and utilities, is characteristic of adult cognition. Alison Gopnik, professor of psychology and affiliate professor of philosophy at the UC Berkeley, and a member of the Berkeley AI Research Group, argues that two very different kinds of cognition characterize childhood and elderhood. Childhood is characterized by exploration. In particular, children seek out information about the world. However, forgoing reward for exploration requires support, care and teaching from others. Care and teaching are particularly characteristic of elders and the intelligence of care has a distinctive structure – it involves empowering others – giving them the resources they need to be effective. The combination of these different kinds of intelligence across the course of a life explains human success. Series: "UC Berkeley Graduate Lectures" [Humanities] [Science] [Show ID: 41068]
A common model of AI suggests that there is a single measure of intelligence, often called AGI, and that AI systems are agents who can possess more or less of this intelligence. Cognitive science, in contrast, suggests that there are multiple forms of intelligence and that these intelligences trade-off against each other and have a distinctive developmental profile and evolutionary history. Exploitation, the pursuit of goals, resources and utilities, is characteristic of adult cognition. Alison Gopnik, professor of psychology and affiliate professor of philosophy at the UC Berkeley, and a member of the Berkeley AI Research Group, argues that two very different kinds of cognition characterize childhood and elderhood. Childhood is characterized by exploration. In particular, children seek out information about the world. However, forgoing reward for exploration requires support, care and teaching from others. Care and teaching are particularly characteristic of elders and the intelligence of care has a distinctive structure – it involves empowering others – giving them the resources they need to be effective. The combination of these different kinds of intelligence across the course of a life explains human success. Series: "UC Berkeley Graduate Lectures" [Humanities] [Science] [Show ID: 41068]
A common model of AI suggests that there is a single measure of intelligence, often called AGI, and that AI systems are agents who can possess more or less of this intelligence. Cognitive science, in contrast, suggests that there are multiple forms of intelligence and that these intelligences trade-off against each other and have a distinctive developmental profile and evolutionary history. Exploitation, the pursuit of goals, resources and utilities, is characteristic of adult cognition. Alison Gopnik, professor of psychology and affiliate professor of philosophy at the UC Berkeley, and a member of the Berkeley AI Research Group, argues that two very different kinds of cognition characterize childhood and elderhood. Childhood is characterized by exploration. In particular, children seek out information about the world. However, forgoing reward for exploration requires support, care and teaching from others. Care and teaching are particularly characteristic of elders and the intelligence of care has a distinctive structure – it involves empowering others – giving them the resources they need to be effective. The combination of these different kinds of intelligence across the course of a life explains human success. Series: "UC Berkeley Graduate Lectures" [Humanities] [Science] [Show ID: 41068]
A common model of AI suggests that there is a single measure of intelligence, often called AGI, and that AI systems are agents who can possess more or less of this intelligence. Cognitive science, in contrast, suggests that there are multiple forms of intelligence and that these intelligences trade-off against each other and have a distinctive developmental profile and evolutionary history. Exploitation, the pursuit of goals, resources and utilities, is characteristic of adult cognition. Alison Gopnik, professor of psychology and affiliate professor of philosophy at the UC Berkeley, and a member of the Berkeley AI Research Group, argues that two very different kinds of cognition characterize childhood and elderhood. Childhood is characterized by exploration. In particular, children seek out information about the world. However, forgoing reward for exploration requires support, care and teaching from others. Care and teaching are particularly characteristic of elders and the intelligence of care has a distinctive structure – it involves empowering others – giving them the resources they need to be effective. The combination of these different kinds of intelligence across the course of a life explains human success. Series: "UC Berkeley Graduate Lectures" [Humanities] [Science] [Show ID: 41068]
Join Luke and Earl as we take a indepth tactical look at Aston Villa v Leeds United. On the show - - Thoughts on Daniel Farke adaptation - The Leeds United Data - Daniel Farke Leeds United System - Aston Villa Predicted Lineup - The Tactical Mash UP #astonvilla #avfc #leedsunited #premierleague
Les évadés d'Alcatraz, c'est le titre d'un film mais c'est surtout une histoire vraie. L'histoire de la plus spectaculaire des évasions et de la plus mystérieuse des cavales. Un tour de passe-passe qui s'est joué à l'intérieur d'une prison forteresse. Celle d'Alcatraz, un rocher posé dans la baie de San Francisco, un pénitencier dont jamais personne n'avait réussi à s'enfuir. Trois hommes vont pourtant réussir cet exploit. Exploit qui, malgré une enquête qui n'a jamais été refermée, demeure une pure énigme.Hébergé par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.
I'm delighted to speak with Katja Rewitz in this week's episode. Katja is a second year PhD student at the Dynamics of Human Performance Regulation Laboratory at the University of Hamburg. Her research focuses on human sensations and their influence on decision-making and performance behaviour. In this episode, we discuss a fascinating paper led by Katja which examines the explore-exploit framework related to decision making in sport and exercise. The explore-exploit framework has been instrumental in advancing our understanding of decision-making across fields such as cognitive science, behavioural economics, and clinical psychology. The authors propose that the explore-exploit framework could provide valuable insights into decision-making processes in sports and exercise where decisions naturally occur in dynamic, uncertain environments with fluctuating rewards and inherent costs.
Jérôme Rothen se chauffe contre un autre consultant, un éditorialiste ou un acteur du foot.
In this week's News Roundup, Bridget and Producer Mike cover the tech news stories you might have missed. Amazon’s Ring, a creepy surveillance product, ran a creepy surveillance ad during the Superbowl that triggered a massive public backlash: https://www.cnbc.com/2026/02/12/amazons-ring-cancels-flock-partnership-amid-super-bowl-ad-backlash.html Electronic Frontier Foundation explanation of why Ring is a surveillance nightmare: https://www.eff.org/deeplinks/2026/02/no-one-including-our-furry-friends-will-be-safer-rings-surveillance-nightmare-0 An online community built around fitness/dance app Supernatural is purchased and destroyed by Meta [GIFT LINK]: https://www.theverge.com/tech/871250/supernatural-meta-vr-fitness-community?view_token=eyJhbGciOiJIUzI1NiJ9.eyJpZCI6InFuZzlFUmd2VGsiLCJwIjoiL3RlY2gvODcxMjUwL3N1cGVybmF0dXJhbC1tZXRhLXZyLWZpdG5lc3MtY29tbXVuaXR5IiwiZXhwIjoxNzcwNDY2NTMzLCJpYXQiOjE3NzAwMzQ1MzN9.A67DLWY3HpNyI1PzxCMq4Mf96DELfg2belp-siH7vww&utm_medium=gift-link Marc Benioff 'Jokes' with his employees that ICE is watching them: https://www.404media.co/marc-benioff-jokes-ice-is-watching-salesforce-employees-who-traveled-to-the-u-s/ Salesforce Workers Circulate Open Letter Urging CEO to Denounce ICE: https://www.wired.com/story/letter-salesforce-employees-sent-after-marc-benioffs-ice-comments/ Body camera footage is being used to humiliate young women on YouTube: https://nymag.com/intelligencer/article/body-cam-youtube-foia-abuse.html Let us know what you think by emailing hello@tangoti.com or leaving a comment on Spotify. Follow Bridget and TANGOTI on social media! || instagram.com/bridgetmarieindc/ || tiktok.com/@bridgetmarieindc || youtube.com/@ThereAreNoGirlsOnTheInternet || bsky.app/profile/tangoti.bsky.socialSee omnystudio.com/listener for privacy information.
Send a textIn this adult themed show, tackle a sensitive subject on whether AI porn will be better for society than traditional legacy porn, because no-one is being exploited.But what do you think?Links used during the show-https://www.ticketmaster.co.uk/abba-voyage-tickets/artist/5358174What are your thoughts on this subject? Do you agree or disagree? And are there other things you feel they should have covered?Tune in and listen to the discussion; please share your feedback with us.Although we greatly prefer effusive praise
In this episode of The PDB Afternoon Bulletin: First—President Trump is sending the largest warship in the world toward Iran. The USS Gerald R. Ford will join another carrier already operating in the region as nuclear negotiations remain unresolved. We'll break down what the deployment signals, and what it could mean if talks collapse. Later in the show—The CIA is making a rare public move, releasing a recruitment video designed to turn disaffected officers inside China's military into potential informants. The campaign comes as Xi Jinping's sweeping purge exposes instability within the PLA's leadership. I'll have the details. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. YouTube: youtube.com/@presidentsdailybrief BUBS Naturals: Live Better Longer with BUBS Naturals. For A limited time get 20% Off your entire order with code PDB at https://Bubsnaturals.com Nobl Travel: NOBL gives you real travel peace of mind — security, design, and convenience all in one. Head to https://NOBLTravel.com for 46% off your entire order! #NOBL #ad DeleteMe: Get 20% off your DeleteMe plan when you go to https://joindeleteme.com/PDB and use promo code PDB at checkout. Learn more about your ad choices. Visit megaphone.fm/adchoices
The CISA Known Exploited Vulnerabilities (KEV) catalog is one of the most referenced resources in vulnerability management, but how well do security teams actually understand what it tells them? In this Brand Highlight, Tod Beardsley, Vice President of Security Research at runZero and former CISA section chief who helped manage the KEV on a daily basis, breaks down what the catalog is designed to do and, just as importantly, what it is not.What is the KEV catalog and who is it really for? The KEV is mandated by Binding Operational Directive 22-01 (BOD 22-01), which tasks CISA with identifying vulnerabilities that are known to be exploited and have an available fix. Its primary audience is federal civilian executive branch agencies, but because the catalog is public, organizations everywhere use it as a prioritization signal. Beardsley notes that inclusion on the KEV requires a CVE ID, evidence of active exploitation, a patch or mitigation, and relevance to federal interests, meaning zero-day vulnerabilities and end-of-life systems without CVEs never appear.How should organizations think about KEV entries that are not equally dangerous? Beardsley explains that only about a third of KEV-listed vulnerabilities represent straight-shot remote code execution with no user interaction and no authentication required. The rest span a wide spectrum of severity. EPSS data reveals an inverse bell curve: many KEV entries have extremely low probabilities of exploitation in the next 30 days, while others cluster at the high end with commodity exploits widely available. This means treating every KEV entry as equally critical leads to wasted effort and alert fatigue.That gap between the catalog and real-world decision-making is exactly what KEVology addresses. The research, produced by Beardsley at runZero, enriches KEV data with CVSS metrics, EPSS scores, exploit tooling indicators, and ATT&CK mappings to help security teams filter and prioritize vulnerabilities based on what actually matters to their environment. Rather than prescribing a single priority list, KEVology treats the KEV as data to be analyzed, not doctrine to be followed blindly.To make this analysis accessible and interactive, runZero built KEV Collider, a free, daily-updated web application at runzero.com/kev-collider. The tool lets defenders sort, filter, and layer multiple risk signals across the entire KEV catalog. Because every filter combination is encoded in URL parameters, teams can bookmark and share custom views with colleagues instantly. Beardsley describes KEV Collider as an evergreen companion to the research, updating automatically as new vulnerabilities are added to the catalog each week.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTTod Beardsley, Vice President of Security Research at runZeroOn LinkedIn: https://www.linkedin.com/in/todb/RESOURCESLearn more about runZero: https://www.runzero.comKEVology research report: https://www.runzero.com/resources/kevology/KEV Collider: https://www.runzero.com/kev-collider/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSTod Beardsley, runZero, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, KEVology, KEV Collider, CISA KEV, vulnerability management, exploit scoring, EPSS, CVSS, vulnerability prioritization, exposure management, BOD 22-01, known exploited vulnerabilities, cybersecurity risk, patch management Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
The CISA Known Exploited Vulnerabilities (KEV) catalog is one of the most referenced resources in vulnerability management, but how well do security teams actually understand what it tells them? In this Brand Highlight, Tod Beardsley, Vice President of Security Research at runZero and former CISA section chief who helped manage the KEV on a daily basis, breaks down what the catalog is designed to do and, just as importantly, what it is not.What is the KEV catalog and who is it really for? The KEV is mandated by Binding Operational Directive 22-01 (BOD 22-01), which tasks CISA with identifying vulnerabilities that are known to be exploited and have an available fix. Its primary audience is federal civilian executive branch agencies, but because the catalog is public, organizations everywhere use it as a prioritization signal. Beardsley notes that inclusion on the KEV requires a CVE ID, evidence of active exploitation, a patch or mitigation, and relevance to federal interests, meaning zero-day vulnerabilities and end-of-life systems without CVEs never appear.How should organizations think about KEV entries that are not equally dangerous? Beardsley explains that only about a third of KEV-listed vulnerabilities represent straight-shot remote code execution with no user interaction and no authentication required. The rest span a wide spectrum of severity. EPSS data reveals an inverse bell curve: many KEV entries have extremely low probabilities of exploitation in the next 30 days, while others cluster at the high end with commodity exploits widely available. This means treating every KEV entry as equally critical leads to wasted effort and alert fatigue.That gap between the catalog and real-world decision-making is exactly what KEVology addresses. The research, produced by Beardsley at runZero, enriches KEV data with CVSS metrics, EPSS scores, exploit tooling indicators, and ATT&CK mappings to help security teams filter and prioritize vulnerabilities based on what actually matters to their environment. Rather than prescribing a single priority list, KEVology treats the KEV as data to be analyzed, not doctrine to be followed blindly.To make this analysis accessible and interactive, runZero built KEV Collider, a free, daily-updated web application at runzero.com/kev-collider. The tool lets defenders sort, filter, and layer multiple risk signals across the entire KEV catalog. Because every filter combination is encoded in URL parameters, teams can bookmark and share custom views with colleagues instantly. Beardsley describes KEV Collider as an evergreen companion to the research, updating automatically as new vulnerabilities are added to the catalog each week.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTTod Beardsley, Vice President of Security Research at runZeroOn LinkedIn: https://www.linkedin.com/in/todb/RESOURCESLearn more about runZero: https://www.runzero.comKEVology research report: https://www.runzero.com/resources/kevology/KEV Collider: https://www.runzero.com/kev-collider/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSTod Beardsley, runZero, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, KEVology, KEV Collider, CISA KEV, vulnerability management, exploit scoring, EPSS, CVSS, vulnerability prioritization, exposure management, BOD 22-01, known exploited vulnerabilities, cybersecurity risk, patch management Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Non solo i big dei chip beneficiano della scommessa sull'Ai. Il caso dei produttori di memory card Learn more about your ad choices. Visit megaphone.fm/adchoices
Bill and The Boston Herald's Andrew Callahan look at how the Patriots' offense matches up against the Seahawks' defense. 0:00 Welcome 2:13 Drake Maye's post-season 6:19 Where can Pats have success against Seattle''s defense? 8:27 Stefon Diggs' Impact 10:24 Patriots WR to watch 11:15 TreVeyon Henderson's usage 14:35 Will Campbell's struggles 18:19 Will the Pats be able to run the ball? 26:18 Seahawks' x-factor on defense? 31:25 Off the wall predictions 33:11 Super Bowl LX predictions Learn more about your ad choices. Visit podcastchoices.com/adchoices
Gaius and Germanicus turn their debate to American migration patterns, with Gaius arguing that modern elites exploit immigrants as property for cheap labor and political votes, echoing historical patterns of indentured servitude that built colonial economies. Germanicus draws comparisons to Rome, noting that the empire successfully assimilated diverse races through genuine upward mobility and citizenship pathways that created loyalty across ethnic lines. However, he warns that the Western Empire eventually collapsed when Germanic tribes entered not as individuals seeking assimilation but as unassimilated national groups maintaining separate identities and allegiances. Germanicus cautions that current policies encouraging migrants to remain culturally separate rather than integrating into the host society dangerously resemble the dynamics that fractured Rome. The pair concludes that immigration has been a neuralgic obsession throughout American history, with elites consistently exploiting immigrant labor while simultaneously fearing political insurrection from unassimilated populations.1863 DRAFT RIOTS NYC
When spiritual heroes fall, what happens to our faith—and that of our children? Financial manipulation and abuse within the church can leave deep wounds, shaking the foundation of trust and faith for entire families. In this powerful episode of Christian Parent/Crazy World, host Catherine tackles one of the most urgent and painful issues affecting Christian families today: how to respond when trusted church leaders become charlatans, using their position for financial—or even sexual—exploitation. With real-life stories, audio clips, and biblical insight, this episode equips parents to guide their children through disappointment without abandoning the truth of the Gospel. Joining Catherine is featured guest Clifton Payne Jr., pastor, writer, Hebrew University scholar, and author of What the Bible Really Says About Tithing and Giving: It’s Different Than You Think. Having left the faith for fourteen years after witnessing financial abuse firsthand, Clifton Payne Jr. brings both scholarly expertise and personal experience to this heart-wrenching discussion. What You’ll Discover in This Episode: Financial Abuse—A Widespread Scandal: Hear stories of pastors manipulating the vulnerable, including Clifton Payne Jr.’s grandmother and infamous televangelists promising “seed money” blessings for thousand-dollar gifts. Charlatans Across Denominations: It’s not just one stream of Christianity; financial and sexual misconduct strike churches everywhere—from charismatic circles to mainline denominations to the Catholic church. The Impact on Faith and Family: Discover why these betrayals don’t just hurt individuals—they threaten the faith of the next generation. Catherine lays bare how hypocrisy often drives children and parents alike away from church and sometimes, from God. Biblical Wisdom for Difficult Days: Get to the heart of the Bible’s teachings on money, tithing, and generosity. Clifton Payne Jr. strips away manipulation, revealing how God’s desire for our hearts is profoundly different from the “prosperity gospel” sales pitch. Honest Conversations at Home: Learn how to talk with your children about church scandals—without letting cynicism win. Public harm requires public correction, and as Christian parents, we are called to shepherd our homes by telling the truth. Why This Matters:This episode will challenge, grieve, and encourage you to see beyond the headlines and scandals. It’s a reminder that our faith must be rooted in Christ, not in flawed messengers. When parents grapple honestly with church failures and model God-honoring generosity, they provide children with a foundation that lasts beyond any scandal. Modern Application:Christian parents, are you prepared to shepherd your children through disappointment in the church? Are you modeling discernment, generosity, and faith that isn’t shaken by human failure? About the Guest:Clifton Payne Jr. is a pastor, writer, and biblical scholar with advanced study at the Hebrew University in Jerusalem. His experiences with church financial abuse and long journey back to faith uniquely equip him to address manipulative money tactics and help families find biblical clarity in confusing times. His book, What the Bible Really Says About Tithing and Giving: It’s Different Than You Think, is available on Amazon and other major booksellers. EPISODE LINKS: Clifton Payne Jr.’s Book: What the Bible Really Says About Tithing and Giving: It’s Different Than You Think Subscribe to Catherine's resources for Christian parents on her website. Mike Winger’s Expose on Shawn Bolz & Bethel Church: The Skeletons in Bethel’s Closet Are Now Going to Speak Televangelists: Last Week Tonight with John Oliver Call to Action:How are you preparing your children to discern truth in a world full of spiritual counterfeits? What honest conversations could you start this week—even in the face of heartbreak—to root their faith in Jesus, not fallen heroes? Tune in next week as Catherine and Clifton Payne Jr. dig deeper into what the Bible really teaches about tithing and giving—setting your family free from confusion and manipulation. Discover more Christian podcasts at lifeaudio.com and inquire about advertising opportunities at lifeaudio.com/contact-us.
HOUR 2: Reality shows tend to exploit the worst in people. Why are we so infatuated by them? full 2203 Wed, 28 Jan 2026 21:00:00 +0000 bcUZ74gvLcbb2hHvIxqLSBbKzgNv5sJN news The Dana & Parks Podcast news HOUR 2: Reality shows tend to exploit the worst in people. Why are we so infatuated by them? You wanted it... Now here it is! Listen to each hour of the Dana & Parks Show whenever and wherever you want! © 2025 Audacy, Inc. News False
On this episode, I cover more Windows Update fallout news, information on recent out-of-band patches for Office, the latest AI news and much more! Reference Links: https://www.rorymon.com/blog/out-of-band-patches-released-app-v-script-utilized-in-exploit-win11-boot-errors/
Thursday, January 22, 2026 An internal ICE memo signed by acting director Todd Lyons authorized immigration officers to forcibly enter a person's home to arrest someone with a final order of removal using only an administrative warrant; House Democrats helped Republicans pass a Homeland Security funding bill that includes $10 billion for ICE; JD Vance said Minneapolis would be "less chaotic" if state and local officials would "cooperate" with the Trump administration on immigration enforcement; the Trump administration ordered most federal agencies to review funding sent to 14 Democratic-led states and Washington, D.C.; no written documentation memorializing Trump's verbal "framework" deal with NATO about Greenland exists; Trump sued JPMorgan Chase and its CEO Jamie Dimon for $5 billion; Former special counsel Jack Smith testified publicly before the House Judiciary Committee, saying his investigation produced “proof beyond a reasonable doubt” that Trump “engaged in criminal activity” and that “no one should be above the law in our country”; 49% of voters say the country is worse off than a year ago and 56% disapprove of Trump's overall job performance; and Trump said he's expanding his defamation lawsuit against the New York Times after an unfavorable public opinion poll. Read more: Day 1829: "Exploit the violence." Subscribe: Get the Daily Update in your inbox for free Feedback? Let us know what you think
Get your free $50 Bet here: https://prizepicks.onelink.me/ivHR/SAL2310 NFL Bets You Must Exploit for The Divisional Round(Data source credits: Fantasy Life - Player Profiler - PFF)
David Rothkopf joins Joanna Coles for a blistering, darkly funny tour through what they argue is the accelerating late stage of Donald Trump: a president who can't hold a thought, wanders off mid-meeting, and yet is being weaponized by Stephen Miller, Marco Rubio, JD Vance, and others to push extreme agendas at breakneck speed. Along the way, they unpack Democratic paralysis, early signs of Republican and corporate peeling away, the politics of immigration as it tips from winning issue to liability, and why the real fight now is about stopping the madness before the midterms—plus, because it's 2026, a detour into Doritos, Hollywood finally finding its voice again, and the Melania movie as protest art. Hosted on Acast. See acast.com/privacy for more information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
n8n supply chain attack Malicious npm pagackages were used to attempt to obtain user OAUTH credentials for NPM. https://www.endorlabs.com/learn/n8mare-on-auth-street-supply-chain-attack-targets-n8n-ecosystem Gogs 0-Day Exploited in the Wild An at the time unpachted flaw in Gogs was exploited to compromise git repos. https://www.wiz.io/blog/wiz-research-gogs-cve-2025-8110-rce-exploit Telegram Proxy Link Abuse Telegram proxy links have been abused to deanonymize users https://x.com/GangExposed_RU/status/2009961417781457129