POPULARITY
Categories
How to use a short stack poker strategy to build your bankroll. Link to my Patreon (more information and links are at the bottom of this page)https://lowlimitcashgames.com Short Stack Bankroll Building Core Strategy: •Simple, Aggressive, Value-Oriented Play •Avoid marginal spots & postflop heroics •Exploit deeper stacks who overvalue hands postflop •Fold equity + value = primary edge General Guidelines C-bet small (33-50%) on dry boards. •Jam or fold turns, especially if SPR < 2.5. •Don't slowplay top pair+ — go for stacks. •Trap stations, value bet thinly vs calling fish. •Bluff less often unless opponent folds too much. SPR Zones: •SPR 1-2: Stack off with overpairs, top pair/top kicker. •SPR 3-5: Proceed more cautiously; fold TPGK to big aggression from nits. •SPR >5: Avoid unless holding strong hands Vs loose-passive players: •Open tighter. •Value-bet relentlessly. •No bluffing. Vs aggressive regs: •3-bet tighter, trap with top range. •Check-raise more with strong made hands. Opening Ranges by Position: •UTG (8-9%): •66+, AJs+, AQo+, KQs •UTG+1 (9-10%): •55+, AJs+, AQo+, KQs, QJs •MP1 (10-11%): •44+, ATs+, AJo+, KQs, QJs, JTs •MP2 (12-13%): •33+, A9s+, ATo+, KJs+, QJs, JTs, T9s •HJ (14-15%): •22+, A8s+, ATo+, KTs+, QTs+, JTs, 98s, 87s •CO (20-22%): •Any pair, A2s+, A9o+, all suited broadways, QTo+, JTo, most suited connectors •BTN (35-40%): •All pairs, all suited aces, all broadways, most suited connectors and one-gappers, all suited kings down to K2s, offsuit broadways and gappers •SB (25-30%): •Strong suited aces, broadways, suited connectors — raise or fold, avoid limping •BB: •Defend tighter vs. early opens; wider vs. CO/BTN. Mix in 3-bet shoves with hands like 66+, AJo+, ATs+, A5s, KJs against steals. ⸻ 2. Preflop Raise Sizing Guidelines In live cash games, adjusting your raise sizes can exploit common tendencies of opponents. •Opening Raise Sizes: •EP to MP: 4x BB (e.g., $20 in $2/$5 games), adding +1 BB per limper •HJ to CO: 4x–5x BB, exploiting tighter ranges behind •BTN: 5x BB vs. tight blinds, 6x BB+ vs. loose, calling blinds •SB: 5x BB minimum to discourage BB calls •3-Bet Sizing: •In Position (IP) vs. Open: 4x the open size (e.g., open to $20 → 3-bet to $80) •Out of Position (OOP) vs. Open: 5x the open size (e.g., open to $20 → 3-bet to $100) ⸻ 3. Postflop Strategy Guidelines With a 50bb stack, postflop play focuses on stack-to-pot ratio (SPR) management and exploiting opponent tendencies. •SPR Considerations: •Low SPR (4): Avoid committing without strong holdings •C-Betting: •Small c-bets (33–50% pot) on dry boards •Larger c-bets (50–75% pot) on wet boards •Turn Play: •Jam or fold turns, especially if SPR < 2.5 •Avoid giving free cards to drawing hands Brand New! Free content monthly just for signing up as. Free follower. Articles, videos and more. It's 100% free to sign up and follow me here:https://lowlimitcashgames.com Fans of the Pod get ad free, fluff free episode every single Sunday: https://lowlimitcashgames.com Save 10% when you choose the annual option Targeted Low Stakes poker training with hundreds of hours of audio and video teaching exclusively how to crush 1/2 and 1/3 no limit: https://lowlimitcashgames.com Save 10% when you choose the annual option. Hate AK? How to Play AK Master Class For only $49 get this 88 minute training video of me showing you exactly how to play AK, particularly when out of position. https://www.patreon.com/lowlim... The best way to ramp your game up and know how to play any hand in any spot by drilling it over and over again. This is the only product I endorses. Make sure to use my code for a 25% discount at checkout: https://advancedpokertraining.... Use code: lowlimit Free episode on variable, run bad, and tilt. Free for anyone who is a free member and high on my Patreon. https://www.patreon.com/posts/... Want more details on everything that is offered with the training package on Patreon? I go into great detail about it all here: https://podcasts.apple.com/us/...
Are you feeling overwhelmed by a narcissist in a legal battle?
In today's episode of Cybersecurity Today, hosted by David Shipley, a report from the US Department of Justice unveils how criminal organizations use Ubiquitous Technical Surveillance (UTS) to track and kill FBI informants. Hawaiian Airlines experiences a cyber attack, potentially involving ransomware. The Supreme Court upholds Texas's age verification law for accessing online pornographic content. Additionally, researchers discover Bluetooth vulnerabilities affecting various audio devices, posing eavesdropping risks. The show discusses Scattered Spider's successful social engineering attacks on major industries, emphasizing the need for robust cybersecurity measures. 00:00 Introduction to Cybersecurity Threats 00:27 Ubiquitous Technical Surveillance: A Growing Threat 02:33 Assassination Linked to Data Brokers 04:21 Cyber Attacks on Airlines 05:02 Scattered Spider: The Prolific Cyber Threat 08:10 Bluetooth Vulnerabilities Exposed 10:53 US Supreme Court Upholds Texas Porn ID Law 13:32 Conclusion and Contact Information
Considering honey bees have been on earth for between 40 to 150 million years, it pays to consider their hive strategy for success, especially because it maps perfectly onto medical groups.
Sponsor by SEC Playground
In this episode, we delve into the impending crisis in the bond market that dwarfs the 2008 crash. With $10 trillion borrowed since 2020 and major players like Jamie Dimon sounding alarms, traditional banking is becoming increasingly unreliable for funding deals. We explore the risks and the demise of easy money, leading to tighter lending standards. Highlighting Leonard's story, we reveal how private credit is emerging as the new norm—offering faster, more flexible financing. Learn how to navigate the shifting landscape, avoid being left behind, and secure funding to thrive in volatile markets. BUT BEFORE THAT, guess who's secretly getting rich while you struggle! The "Exploit and Escape" Strategy: https://drive.google.com/file/d/16EZMfOM_JYXbqs7t3OZ_fGXDqrWo0sdQ/view?usp=drive_link&video=h3S3u9OFNpE https://BeltwayLending.com/epic/ : 30-year rental loans, no income docs, just your lease, 2 bank statements, and an ID. Fast, no red tape. Perfect for buying and holding real estate without the bank runaround. https://LoopholeLending.com : Get up to $150K at 0% interest for 21 months, no collateral, approval in 30 seconds, cash in 7-14 days. Great for funding marketing, gap funding, rehab, payroll—whatever your business needs. Useful links: https://myescapebook.com/freedom-formula https://epicearnwhileyoulearn.com/yourfirstdeal https://intensive2025.com/ Learn more about your ad choices. Visit megaphone.fm/adchoices
Hackers exploit critical Langflow flaw to unleash Flodrix botnet Organizations warned of vulnerability exploited against discontinued TP-Link routers Russia detects first SuperCard malware attacks skimming bank data via NFC Huge thanks to our sponsor, Adaptive Security — OpenAI's first cybersecurity investment As deepfake scams and GenAI phishing evolve, Adaptive equips security teams with AI-powered phishing simulations featuring realistic personalized deepfakes and engaging security awareness training. Their new AI Content Creator turns threat intel and policy updates into interactive, multilingual training — instantly. Trusted by Fortune 500s and backed by Andreessen Horowitz and OpenAI, Adaptive helps you stay ahead of AI-driven threats. Learn more at adaptivesecurity.com.
In this episode, Therese Markow and Dr. Diane Tober discuss the global egg donation industry, highlighting its lack of regulations and exploitative nature. Dr. Tober details some of her research on egg donors, revealing severe risks and some life-threatening complications that can affect 10-12% of donors. They discuss how donors are often uninformed about the risks and the pressures faced by donors to donate beyond current guidelines. With compensation varying wildly, there are often financial pressures that donors face, too. Finally, Dr. Tober advocates for standardized informed consent, actual limits on donation cycles, and a national registry to track donor health. Key Takeaways: Changes to preserving and freezing eggs in 2013 changed from slow freezing to flash freezing, which better preserved the egg and changed the industry. Not having limits on the number of children that can be born from donated sperm or eggs can have dire consequences for the people conceived from those donations. There are discrepancies in compensation based on education, race, and other traits that are considered to be desirable for intended parents. There are no consistent laws or regulations regarding who pays for donor medical complications. There is no perfect system currently existing for egg donation. But creating a safer system could begin with a donor registry. "Sometimes donors exceed the limit because of the financial incentives, and sometimes donors exceed the limit because they're coerced or enticed by the agencies or clinics that are using them and profiting off of them." — Dr. Diane Tober Connect with Dr. Diane Tober: Professional Bio: https://issr.ua.edu/people/diane-tober/ Website: https://dianetober.com/ Book: Eggonomics: The Global Market in Human Eggs and the Donors Who Supply Them LinkedIn: https://www.linkedin.com/in/dianetober/ Instagram: https://www.instagram.com/perfectdonor/ Facebook: https://www.facebook.com/DianeToberPhD/ Connect with Therese: Website: www.criticallyspeaking.net Threads: @critically_speaking Email: theresemarkow@criticallyspeaking.net Audio production by Turnkey Podcast Productions. You're the expert. Your podcast will prove it.
What if the most dangerous predators aren't lurking in dark alleys, but hiding in plain sight, charming their way into your life?Dr. David Snyder's webinar exposes the psychological tactics of manipulators who:Exploit emotional vulnerabilitiesCreate false connectionsPrey on your deepest insecuritiesLearn how social predators:Use the "Halo Effect" to appear trustworthyIdentify and target emotional weak pointsManipulate through validation and charmThe critical question: Are you truly safe from those who want to use you?Quotes:"People like people who are like themselves. We instinctively, inherently like people who make us feel good about ourselves." - Dr. David Snyder"The more attractive somebody is, physically or emotionally, the more we want to believe they're everything good." - Dr. David Snyder"Lack of action comes down to two basic things: either you don't know what to do, which is a skill set issue, or you're not willing to do it, which is a mindset issue." - Dr. David SnyderActionable Takeaways:Conduct a "Social Circle Audit": Critically examine your relationships and look for red flags. Ask yourself: Does anyone consistently make you feel emotionally drained, manipulated, or consistently shifts blame onto others?Develop a Personal Verification Protocol: Before deeply investing in a new relationship (personal or professional), create a systematic approach to verify someone's background. This includes checking social media, asking mutual connections, and looking for inconsistencies in their stories.Practice the "Emotional Detachment Technique": When meeting someone new, train yourself to step back emotionally and objectively assess their behavior, motivations, and consistency. Don't let initial charm or attractiveness cloud your judgment.Create Personal Boundary Statements: Develop clear, concise statements that define your personal boundaries. Practice communicating these boundaries directly and without apology, which helps repel potential manipulators.Monthly "Relationship Health Check": Schedule a quarterly self-reflection where you honestly evaluate your relationships. Ask: Who adds value to my life? Who drains my energy? Who consistently demonstrates trustworthiness and genuine care?Episode Timeline:0:00-5:00: Introduction and Overview of Machiavellian and Dark Triad TraitsDefining psychopathic and manipulative behaviorsDiscussion of books like "48 Laws of Power"Characteristics of social predators5:00-10:00: The Halo Effect and Psychological ManipulationHow attractiveness influences perceptionMechanisms of creating false positive impressionsTruth bias and emotional vulnerability10:00-15:00: Identifying Vulnerability MarkersPsychological traits that make people susceptible to manipulationRecent life challenges that create emotional openingsPredator targeting strategies15:00-20:00: Predator Identification TechniquesProactive methods of social predatorsHow manipulators create instant connectionsIdentification principle and emotional appeal20:00-25:00: Defensive StrategiesDeveloping personal boundariesRecognizing manipulation tacticsImportance of emotional detachment25:00-35:00: Q&A and Practical ApplicationsAudience questions about dealing with manipulatorsPersonal stories and insightsStrategies for protecting oneself35:00-40:00: Closing and Special OfferRecap of key lessonsPromotion of additional training resourcesMotivational conclusion about personal empowermentTo learn more about Dr. David Snyder and everything about NLP, visit:Website: https://www.nlppower.com/YouTube: https://www.youtube.com/@DavidSnyderNLPInstagram: https://www.instagram.com/davidsnydernlp
#288th for 12nd June, 2025 or 3311! (33-Oh-Leven, not Oh-Eleven, OH-Leven)http://loosescrewsed.comJoin us on discord! And check out the merch store! PROMO CODEShttps://discord.gg/3Vfap47ReaSupport us on Patreon: https://www.patreon.com/LooseScrewsEDSquad Update: PowerPlay Update: - Cycle 33 Fdev recognizes exploit in PowerplaySpecific to Settlement DataWill rollback systems affectedWe won Djinaura! We'll have to see how Antal respondsWolf 10 is the next acquisition targetNiceygy's Power Points - https://elite.niceygy.net/powerpointsFind out more in the LSN-powerplay-hub forum channel.Galnet Update: https://community.elitedangerous.com/Imperial Forces Target Delaine FlagshipNew CG with seeker FSD interrupt missileDev News: Frontier financials: Elite up 75% over yearIssue with power CZs acknowledged?PP exploit being used to snipe major systems acknowledgedPower data paused until next week; rollbackDiscussion:Cheats, Exploits, and BugsCommunity Corner:upvote this and add your voice. It's like 27 weeks in. That's at least 25 weeks late on the fix. The issue has expired and been reposted more than once. Make them pay attention. https://issues.frontierstore.net/issue-detail/70594
Are you missing out on innovation because you're avoiding discomfort? How can you embrace the tension that's required for innovation? In episode 244 of At The Table, Patrick Lencioni and Cody Thompson explore the crucial link between tension and innovation. They argue that real creativity requires discomfort—whether from interpersonal friction or environmental urgency. Through personal stories and business examples, they offer practical ways to embrace conflict and drive change before crisis strikes.Topics explored in this episode: (1:14) Tension Can Be Beneficial* Innovation is universally desired but rarely pursued.* True creativity demands both environmental and interpersonal tension.* Most teams avoid conflict until a crisis forces change.(3:52) Manufacturing Tension and Creativity* Cody discusses how companies often manufacture environmental tension to force innovation, especially when complacency sets in. * Pat connects innovation to creativity, drawing on his experience as an author and screenwriter. (9:17) Does Every Business Need to Innovate?* Innovation applies to all types of companies in different ways.* Entrepreneurs often thrive on tension, but most leaders need to learn it.(14:15) Manufacturing Urgency* Crises like COVID accelerate innovation by necessity.* Teams can simulate pressure by setting rallying cries or tight timelines.(19:24) Fear or Joy Can Drive Innovation * A team's willingness to engage in healthy conflict is directly tied to innovation potential.* The best employees crave meaningful tension and will leave if it's missing.Resources mentioned in this episode: * Only the Paranoid Survive: How to Exploit the Crisis Points That Challenge Every Company, a book by Andrew S. Grove. This episode of At The Table with Patrick Lencioni is brought to you by The Table Group: https://www.tablegroup.com. We teach leaders how to make work more effective and less dysfunctional. We also help their employees be more fulfilled and less miserable. At The Table is a podcast that lives at the connection between work life, leadership, organizational health, and culture. Subscribe on Apple Podcasts (https://apple.co/4hJKKSL), Spotify (https://spoti.fi/4l1aop0), and YouTube (https://bit.ly/At-The-Table-YouTube). Follow Pat Lencioni on https://www.linkedin.com/in/patrick-lencioni-orghealth and http://www.youtube.com/@PatrickLencioniOfficial. Connect with Cody Thompson https://www.linkedin.com/in/cody-thompson-a5918850. Be sure to check out our other podcast, The Working Genius Podcast with Patrick Lencioni, on Apple Podcasts (https://apple.co/4iNz6Yn), Spotify (https://spoti.fi/4iGGm8u), and YouTube (
Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electrical equipment... Read more »
Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electrical equipment... Read more »
Today's blockchain and crypto news Stacks-based Alex Lab to reimburse users after $8.3 million exploit 15-day streak brings Ethereum ETFs to record high cumulative inflow value Justin Sun-connected BiT Global drops wBTC-related legal spat with Coinbase Argentina anti-corruption office clears Javier Milei in Libra crypto promotion scandal Learn more about your ad choices. Visit megaphone.fm/adchoices
Timestamps: 0:00 at a loss here 0:08 Switch 2 exploit discovered 1:56 YouTube Premium Lite ads on Shorts 2:39 Big Beautiful Bro Breakup 4:33 Jawa! 5:15 QUICK BITS INTRO 5:25 OpenAI doesn't want to keep data 6:07 Samsung lock-screen AI ads with your face 6:34 Japanese lander crashes into moon 6:57 Apple arguing with EU over a comma 7:41 Foodies commenting MEATBALL NEWS SOURCES: https://lmg.gg/hKEPx Learn more about your ad choices. Visit megaphone.fm/adchoices
On commence avec du tennis et ce nouvel exploit de la Française Loïs Boisson qui se hisse en demi-finale de Roland Garros après avoir éliminée la jeune pépite Russe Mirra Andréeva
Nouvel exploit des Ukrainiens : ce week-end, ils ont fait sauter des avions russes sur une base aérienne, et hier ils ont fait sauter le pont de Crimée, et ce n'est pas la première fois...Distribué par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.
Why would a security vulnerability take more than two years to fix? Richard chats with Steve Syfuhs about the evolution of the response to KB5015754. Originally published in 2022, the issue involved vulnerabilities in the on-premises certificate authority for Active Directory. Pushing a fix to force the immediate replacement of the certificates could have left users unable to log into Active Directory entirely. Steve explains how the gradual rollout of the fix allowed folks concerned (and paying attention!) to fix it immediately. At the same time, for everyone else, the fix happened as the existing certificates expired. But not every scenario is automatic - some require sysadmin intervention. So, how do you get their attention? The story leads to the February 11, 2025 update that could knock some users off Active Directory, but had an easy and quick fix. The final phase should be September 2025; hopefully, the last stragglers will be ready!LinksKB5014754Microsoft Security Response CenterCreate and Assign SCEP Certificate Profiles in IntuneRecorded April 10, 2025
Forecast = Stormy with a chance of TikTok malware showers—exploit scoring systems hot, but patch management outlook remains partly cloudy. Welcome to Storm⚡️Watch! In this episode, we're diving into the current state of cyber weather with a mix of news, analysis, and practical insights. This week, we tackle a fundamental question: are all exploit scoring systems bad, or are some actually useful? We break down the major frameworks: **CVSS (Common Vulnerability Scoring System):** The industry standard for assessing vulnerability severity, CVSS uses base, temporal, and environmental metrics to give a comprehensive score. It's widely used but has limitations—especially since it doesn't always reflect real-world exploitability. **Coalition Exploit Scoring System (ESS):** This system uses AI and large language models to predict the likelihood that a CVE will be exploited in the wild. ESS goes beyond technical severity, focusing on exploit availability and usage probabilities, helping organizations prioritize patching with better accuracy than CVSS alone. **EPSS (Exploit Prediction Scoring System):** EPSS is a data-driven approach that estimates the probability of a vulnerability being exploited, using real-world data from honeypots, IDS/IPS, and more. It updates daily and helps teams focus on the most urgent risks. **VEDAS (Vulnerability & Exploit Data Aggregation System):** VEDAS aggregates data from over 50 sources and clusters vulnerabilities, providing a score based on exploit prevalence and maturity. It's designed to help teams understand which vulnerabilities are most likely to be actively exploited. **LEV/LEV2 (Likely Exploited Vulnerabilities):** Proposed by NIST, this metric uses historical EPSS data to probabilistically assess exploitation, helping organizations identify high-risk vulnerabilities that might otherwise be missed. **CVSS BT:** This project enriches CVSS scores with real-world threat intelligence, including data from CISA KEV, ExploitDB, and more. It's designed to help organizations make better patching decisions by adding context about exploitability. Next, we turn our attention to a troubling trend: malware distribution via TikTok. Attackers are using AI-generated videos, disguised as helpful software activation tutorials, to trick users into running malicious PowerShell commands. This “ClickFix” technique has already reached nearly half a million views. The malware, including Vidar and StealC, runs entirely in memory, bypassing traditional security tools and targeting credentials, wallets, and financial data. State-sponsored groups from Iran, North Korea, and Russia have adopted these tactics, making it a global concern. For employees, the takeaway is clear: never run PowerShell commands from video tutorials, and always report suspicious requests to IT. For IT teams, consider disabling the Windows+R shortcut for standard users, restrict PowerShell execution, and update security awareness training to include social media threats. We also highlight the latest from Censys, VulnCheck, runZero, and GreyNoise—industry leaders providing cutting-edge research and tools for vulnerability management and threat intelligence. Don't miss GreyNoise's upcoming webinar on resurgent vulnerabilities and their impact on organizational security. And that's a wrap for this episode! We will be taking a short break from Storm Watch for the summer. We look forward to bringing more episodes to you in the fall! Storm Watch Homepage >> Learn more about GreyNoise >>
Roland Garros : La Française Loïs Boisson, 361 eme mondiale, a battu l'américaine Jessica Pegula, classée 3eme mondiale
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently patched flaw in Cisco Wireless Controllers. This arbitrary file upload flaw can easily be used to execute arbitrary code. https://horizon3.ai/attack-research/attack-blogs/cisco-ios-xe-wlc-arbitrary-file-upload-vulnerability-cve-2025-20188-analysis/ Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE A change in PHP 8.1 can expose methods previously expected to be safe . vBulletin fixed a related flaw about a year ago without explicitly highlighting the security impact of the fix. A blog post now exposed the flaw and provided exploit examples. We have seen exploit attempts against honeypots starting May 25th, two days after the blog was published. https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce
The Chinese Communist Party (CCP) has established a broad network inside American universities. This allows them to monitor and use Chinese students, and also ties them in with a broader system of CCP subversion that includes the consulates, front organizations, and sources of funding.Views expressed in this video are opinions of the host and guests and do not necessarily reflect the views of The Epoch Times.
I'll show you how to spot and exploit the 10 most common and costly microstakes and low stakes poker leaks.Get the 4-page PDF, "How to Exploit the Top 10 Preflop Leaks #542": https://www.smartpokerstudy.com/pod542YouTube Video: https://www.smartpokerstudy.com/YouTube542
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Exploit for maximum severity Cisco IOS XE flaw now public Senators as for reinstatement of cyber review board to work on Salt Typhoon investigation Australian ransomware victims now must report their payments Huge thanks to our sponsor, Conveyor Conveyor launched the first AI Agent for Customer Trust. So wtf does that mean? It means the AI agent goes beyond just sharing NDA-gated documents like a SOC 2 with customers or answering security questionnaires. Conveyor's AI Agent, Sue, handles the entire security review process from start to finish. She answers every customer request from sales, completes every questionnaire and executes every communications and coordination task in-between. It's perfect for B2B infosec teams sick of manual security review work. Check it out at www.conveyor.com. Find the stories behind the headlines at CISOseries.com.
fuck that cat manLinks to everything at https://linktr.ee/plumbingthedeathstar including our terrible merch, social media garbage and where to become a subscriber to Bad Brain Boys+ Hosted on Acast. See acast.com/privacy for more information.
Pas de temps de s'échauffer, les "Grandes Gueules du Sport" démarrent fort dès 9h00 : la UNE c'est l'actu brûlante du sport, entre infos, analyses et débats.
In this episode, we discuss the alarming financial situation of the US as it spends more on debt interest than on national defense, and the implications for the US dollar. We outline two possible futures for the dollar – a slow decline or an overnight collapse – and describe strategies for safeguarding and growing wealth during these uncertain times. Key strategies include hedging with gold and Bitcoin, using creative financing to acquire income-producing real estate, and leveraging inflation to reduce debt and increase asset values. The episode emphasizes preparation and strategic positioning to not just survive, but thrive in an economic downturn. BUT BEFORE THAT, hear how Matt bought 55 homes without a bank! Want my exact “Rejection Letter” that closed 55 extra deals? Grab your free copy here: https://3optionloi.com/ About that thing we're doing in Vegas this month: https://intensive2025.com/ Exploit and Escape Strategy: https://drive.google.com/file/d/16EZMfOM_JYXbqs7t3OZ_fGXDqrWo0sdQ/view Learn more about your ad choices. Visit megaphone.fm/adchoices
REDIFF - Les évadés d'Alcatraz, c'est le titre d'un film mais c'est surtout une histoire vraie. L'histoire de la plus spectaculaire des évasions et de la plus mystérieuse des cavales. Un tour de passe-passe qui s'est joué à l'intérieur d'une prison forteresse. Celle d'Alcatraz, un rocher posé dans la baie de San Francisco, un pénitencier dont jamais personne n'avait réussi à s'enfuir. Trois hommes vont pourtant réussir cet exploit. Exploit qui, malgré une enquête qui n'a jamais été refermée, demeure une pure énigme. Retrouvez tous les jours en podcast le décryptage d'un faits divers, d'un crime ou d'une énigme judiciaire par Jean-Alphonse Richard, entouré de spécialistes, et de témoins d'affaires criminelles.Distribué par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.
REDIFF - Les évadés d'Alcatraz, c'est le titre d'un film mais c'est surtout une histoire vraie. L'histoire de la plus spectaculaire des évasions et de la plus mystérieuses des cavales. Un tour de passe-passe qui s'est joué à l'intérieur d'une prison forteresse. Celle d'Alcatraz, un rocher posé dans la baie de San Francisco, un pénitencier dont jamais personne n'avait réussi à s'enfuir. Trois hommes vont pourtant réussir cet exploit. Exploit qui, malgré une enquête qui n'a jamais été refermée, demeure une pure énigme. Retrouvez tous les jours en podcast le décryptage d'un faits divers, d'un crime ou d'une énigme judiciaire par Jean-Alphonse Richard, entouré de spécialistes, et de témoins d'affaires criminelles.Distribué par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.
In this episode of ABA On Call, Rick and Doug dissect the behavioral science behind app design, revealing how tech companies use variable reinforcement schedules to hijack user behavior and drive compulsive engagement. Drawing from core principles of behavior analysis, they explore how seemingly harmless interactions, such as likes, swipes, and notifications, are systematically engineered to reinforce usage patterns. The conversation moves beyond theory into the ethical minefield of digital design, especially its impact on children, teens, and vulnerable users. With examples ranging from red-dot alerts to algorithm-driven content loops, the hosts challenge behavior analysts to confront the weaponization of reinforcement and consider their role in advocating for more ethical technology. To earn CEUs for listening, click here, log in or sign up, pay the CEU fee, + take the attendance verification to generate your certificate! Don't forget to subscribe and follow and leave us a rating and review. Show Notes: A Wall Street Journal investigation
“One time, that wicked king of the Daityas saw his son of lotus-like face and beautiful eyes, surrounded by women, having returned from the home of the guru. In his hand, that boy was holding a slate which had the mark of a chakra at the top and the name of Krishna written with great adoration.” (Narasimha Purana, 41.35-36)
Ireland ranks 117th out of 253 countries, with over 57 million leaked cookies - 4.7 million of which are still active and tied to real user activity. According to the latest research by cybersecurity company NordVPN, Ireland has landed a troubling spot on the global leaderboard for leaked cookies, ranking 117th out of 253 countries. Over 57 million cookies linked to Irish users have been found on the dark web. Although cookies are commonly seen as helpful for improving online experiences, many don't realise that hackers can exploit them to steal personal data and access secure systems. "Cookies may seem harmless, but in the wrong hands, they're digital keys to our most private information," says Adrianus Warmenhoven, cybersecurity expert at NordVPN. "What was designed to enhance convenience is now a growing vulnerability exploited by cybercriminals worldwide." The hidden risk behind everyday browsing Cookies are small text files that websites store on a user's browser to remember preferences, login details, and browsing behaviour. They play a vital role in making online experiences smoother, helping websites load faster, keeping shopping carts full, and allowing users to stay logged in across sessions. Without cookies, the convenience and personalisation of the modern web would be severely limited. However, as the digital landscape evolves, so does the misuse of these tools. Cybercriminals have learned to harvest cookies to hijack sessions, steal identities, and bypass security measures. "Most people don't realise that a stolen cookie can be just as dangerous as a password," says Warmenhoven. "Once intercepted, a cookie can give hackers direct access to accounts and sensitive data, no login required." Millions of pieces of personal data exposed NordVPN's research reveals a massive malware operation that stole almost 94 billion cookies - a dramatic jump from 54 billion just a year ago, marking a 74% increase. Even more concerning, 20.55% of these cookies are still active, posing an ongoing risk to users' online privacy. Most stolen cookies came from major platforms, including Google (4.5 billion), YouTube (1.33 billion), and over 1 billion each from Microsoft and Bing. The growth is just as alarming when comparing personal data exposure over the past few years. In 2024, NordVPN identified 10.5 billion assigned IDs, 739 million session IDs, 154 million authentication tokens, and 37 million login credentials. In 2025, those numbers rose sharply, with 18 billion assigned IDs and 1.2 billion session IDs now exposed. These data types are critical for identifying users and securing their online accounts, making them highly valuable to cybercriminals. The stolen information often included full names, email addresses, cities, passwords, and physical addresses - key personal data that can be used for identity theft, fraud, and unauthorised account access. The data was harvested using 38 different types of malware, more than triple the 12 types identified last year. The most active strains were Redline (41.6 billion cookies), Vidar (10 billion), and LummaC2 (9 billion). These malware families are known for stealing login details, passwords, and other sensitive data. Redline is a powerful infostealer that extracts saved passwords, cookies, and autofill data from browsers, giving hackers direct access to personal accounts. Vidar works similarly but also downloads additional malware, making it a gateway to more complex attacks. LummaC2 is particularly evasive, frequently updating its tactics to slip past antivirus tools and spread across systems undetected. In addition to these known threats, researchers discovered 26 new types of malware not seen in 2024 - a sign of how quickly the cybercrime landscape is evolving. New entries like RisePro, Stealc, Nexus, and Rhadamanthys are especially dangerous. RisePro and Stealc are built to rapidly steal browser credentials and session data, while Nexus targets banking information using mobile emul...
Mike Johnson, Beau Morgan, and Ali Mac talk about some of the biggest storylines that came out of the first day of the SEC meetings yesterday, let you hear Kirby Smart give his thoughts on the transfer portal, react to what Coach Smart had to say, and talk about how Kirby is figuring out how to exploit transfer portal and transfer portal windows.
Les Pacers sont à un match de retrouver les Finales NBA pour la première fois depuis 2000... Porté par un Tyrese Haliburton monstrueux face aux New York Knicks, Indiana rêve de remporter son premier titre. Décrié par une partie de la ligue qui l'avait nommé 'joueur le plus surcoté de NBA' le meneur des Pacers impressionne lors de ces playoffs. Tyrese Haliburton est-il surcoté ? ou est-il une vraie superstar ? Trente-deux ans après Limoges, Monaco n'a pas réédité l'exploit et échoué en finale de l'Euroligue, dimanche à Abu Dhabi contre Fenerbahçe (70-81). La Roca Team aura malgré tout livré un parcours flamboyant dans la compétition, qu'elle quitte la tête haute. Exploit ou déception ? Basket Time avec Pierre Dorian, Fred Weis, Arnaud Valadon et Félix Gabory
Trente-deux ans après Limoges, Monaco n'a pas réédité l'exploit et échoué en finale de l'Euroligue, dimanche à Abu Dhabi contre Fenerbahçe (70-81). La Roca Team aura malgré tout livré un parcours flamboyant dans la compétition, qu'elle quitte la tête haute. Exploit ou déception ?
The episode discusses Moody's recent downgrade of the US credit rating from AAA to AA1, outlining the potential impacts on rent, savings, and jobs. Matt explores the reasons behind the downgrade, previous downgrades by Standard & Poor's and Fitch, and the broader economic implications. It criticizes the US government's handling of its debt and highlights contrasting views from President Trump and major financial entities. The episode also provides a 'five-step exploit and escape strategy' to protect oneself, focusing on hedging with gold and Bitcoin, leveraging debt, securing cheap loans, investing in income-producing real estate, and using inflation to one's advantage. BUT BEFORE THAT, hear why Costco is acting like a central bank! About the "EXPLOIT & ESCAPE" strategy: https://drive.google.com/file/d/16EZMfOM_JYXbqs7t3OZ_fGXDqrWo0sdQ/view?pli=1 Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of the Servants of Grace Theology Segment, Dave Jenkins answers a listener's question: “Why do cults use God falsely in their mission?”Cults often use religious language and biblical imagery to manipulate and control. They twist Scripture, exploit faith, and claim divine authority to lead others into deception. In this episode, Dave unpacks how these spiritual traps work — and how Christians can recognize them and respond with truth, wisdom, and discernment.Audio: Watch Video:What You'll Learn:How cults use religious language to gain trustWhy leaders invoke God's name to justify controlCommon tactics: isolation, fear, control, shameBiblical discernment to spot false teachingHow Christians can stand firm in truth and graceScripture References:Matthew 7:15–172 Timothy 4:3–4Galatians 1:6–9Acts 17:112 Timothy 3:16–171 Timothy 4:1Ephesians 6:10–18Subscribe & Follow:Spotify: https://open.spotify.com/show/22CmXpzbz6JYjemSV0CMwt→ Listen and follow us on SpotifyApple Podcasts: https://podcasts.apple.com/us/podcast/servants-of-grace/id1240932035→ Subscribe and leave a review on AppleYouTube: https://www.youtube.com/servantsofgrace→ Watch episodes and subscribe on YouTubeTheology Segment Archive: https://servantsofgrace.org/servants-of-grace-theology-segment/→ Explore more theology-focused content
In this episode, Dave Jenkins answers a listener's question: "Why do cults use God falsely in their mission?" He explains how cults twist Scripture, exploit faith, and use God's name to manipulate others. You'll learn the key traits of spiritual deception, the psychology of cult control, and how Christians can respond with biblical truth and discernment. Scripture References: Matthew 7:15–17, 2 Timothy 4:3–4, Galatians 1:6–9, Acts 17:11, 2 Timothy 3:16–17, 1 Timothy 4:1, Ephesians 6:10–18 Subscribe & Follow: Spotify: https://open.spotify.com/show/22CmXpzbz6JYjemSV0CMwt → Listen and follow us on Spotify Apple Podcasts: https://podcasts.apple.com/us/podcast/servants-of-grace/id1240932035 → Subscribe and leave a review on Apple YouTube: https://www.youtube.com/servantsofgrace → Watch episodes and subscribe on YouTube Website & Archive: https://servantsofgrace.org/servants-of-grace-theology-segment/ → Explore the full Theology Segment archive on our website
On today's episode, Vince welcomes back investigative journalist Katarina Szulc for a conversation on the evolving dynamics of U.S.-Mexico relations and cartel activity across North America. They discuss Mexico's refusal to accept U.S. assistance in the fight against organized crime, the growing presence of cartels in Canada, and the challenges posed by Canada's legal system in addressing transnational threats. Katarina also shares details about her new work in investigative journalism, focused on exposing organized crime and cartel operations. Borderland is an IRONCLAD Original Watch Borderland: DISPATCHES everywhere you get your podcasts and on Youtube @thisisironclad starting May 20th. SPONSORS: 1stPhorm visit: https://www.1stphorm.com/borderland Free shipping through this link on any orders over $75 Free 30 days in the app for new customers (offer comes via email after the purchase) 110% money back guarantee on all of our products. We believe fully in our products. If you don't love the product or you aren't getting the results you hoped for, let us know and we'll give you your money back … plus 10%! Learn more about your ad choices. Visit megaphone.fm/adchoices
Bienvenue dans Radio Foot 16h10-21h10 T.U. À la Une de cette 1ère émission de la semaine : - Le Cameroun perd un de ses plus grands joueurs. Emmanuel Kundé, ancien capitaine des Lions Indomptables, disparu vendredi à l'âge de 68 ans. ; - Angleterre, la révolution de Palace ! ; - Ligue 1, fin de saison et clubs historiques à la peine. Saint-Étienne à peine remonté, finalement rétrogradé après avoir échoué à domicile face à Toulouse. - Le Cameroun perd un de ses plus grands joueurs. Emmanuel Kundé, ancien capitaine des Lions Indomptables, disparu vendredi à l'âge de 68 ans. Passé par le Canon de Yaoundé, Laval et Reims, le défenseur aux 127 sélections avait remporté la CAN à 2 reprises (1984 et 1988) et disputé 2 Coupes du Monde (1982 et 90). On se souvient notamment d'un penalty crucial inscrit face à l'Angleterre en ¼ de finale, contribuant au magnifique parcours camerounais en Italie. La disparition d'un « baobab », a réagi Rigobert Song. Son ancien coéquipier, André Kana Biyik évoque un « Monstre Sacré ». Un leader silencieux qui a marqué ses coéquipiers par ses exploits mais aussi par son humanité, on l'évoquera avec Joseph-Antoine Bell.- Angleterre, la révolution de Palace ! Crystal Palace a remporté la 144è édition de la FA Cup à Wembley. En battant les Cityzens 1-0, les Eagles s'adjugent pour le 1er trophée majeur de leur longue histoire. Une année sans pour l'équipe de Pep Guardiola, qui doit encore assurer sa place en C1.- Ligue 1, fin de saison et clubs historiques à la peine. Saint-Étienne à peine remonté, finalement rétrogradé après avoir échoué à domicile face à Toulouse. Montpellier était déjà assuré de la relégation en L2. Mauvaise affaire pour Reims, battu 2-1 à Lille, qui termine 16è et devra concentrer ses efforts sur le barrage aller-retour face à Metz. - Exploit du Havre qui arrache une victoire 3-2 à Strasbourg et le maintien, grâce au capitaine Abdoulaye Touré. L'international guinéen auteur de 2 penaltys, dont une « Panenka » pleine de sang froid à la 90è+9, dont les Ciel et Marine se souviendront longtemps !Avec Hugo Moissonnier : Hervé Penot, Éric Rabesandratana et Bruno Constant. Technique/réalisation : Laurent Salerno - Pierre Guérin.
Bienvenue dans Radio Foot 16h10-21h10 T.U. À la Une de cette 1ère émission de la semaine : - Le Cameroun perd un de ses plus grands joueurs. Emmanuel Kundé, ancien capitaine des Lions Indomptables, disparu vendredi à l'âge de 68 ans. ; - Angleterre, la révolution de Palace ! ; - Ligue 1, fin de saison et clubs historiques à la peine. Saint-Étienne à peine remonté, finalement rétrogradé après avoir échoué à domicile face à Toulouse. - Le Cameroun perd un de ses plus grands joueurs. Emmanuel Kundé, ancien capitaine des Lions Indomptables, disparu vendredi à l'âge de 68 ans. Passé par le Canon de Yaoundé, Laval et Reims, le défenseur aux 127 sélections avait remporté la CAN à 2 reprises (1984 et 1988) et disputé 2 Coupes du Monde (1982 et 90). On se souvient notamment d'un penalty crucial inscrit face à l'Angleterre en ¼ de finale, contribuant au magnifique parcours camerounais en Italie. La disparition d'un « baobab », a réagi Rigobert Song. Son ancien coéquipier, André Kana Biyik évoque un « Monstre Sacré ». Un leader silencieux qui a marqué ses coéquipiers par ses exploits mais aussi par son humanité, on l'évoquera avec Joseph-Antoine Bell.- Angleterre, la révolution de Palace ! Crystal Palace a remporté la 144è édition de la FA Cup à Wembley. En battant les Cityzens 1-0, les Eagles s'adjugent pour le 1er trophée majeur de leur longue histoire. Une année sans pour l'équipe de Pep Guardiola, qui doit encore assurer sa place en C1.- Ligue 1, fin de saison et clubs historiques à la peine. Saint-Étienne à peine remonté, finalement rétrogradé après avoir échoué à domicile face à Toulouse. Montpellier était déjà assuré de la relégation en L2. Mauvaise affaire pour Reims, battu 2-1 à Lille, qui termine 16è et devra concentrer ses efforts sur le barrage aller-retour face à Metz. - Exploit du Havre qui arrache une victoire 3-2 à Strasbourg et le maintien, grâce au capitaine Abdoulaye Touré. L'international guinéen auteur de 2 penaltys, dont une « Panenka » pleine de sang froid à la 90è+9, dont les Ciel et Marine se souviendront longtemps !Avec Hugo Moissonnier : Hervé Penot, Éric Rabesandratana et Bruno Constant. Technique/réalisation : Laurent Salerno - Pierre Guérin.
A ton of awesome releases and advancements in this month's ModChat! First comes the release of the Lapse Kernel Exploit for both PS4 12.02 and PS5 10.05 firmwares. BadHTAB for the PS3 evolves into BadWDSD, a separate but better and more exciting development for PS3 owners allowing further access now on Super Slim variants! The original Xbox revision 1.6 gets a huge development as well, now with the ability to reflash the on-board BIOS for the first time. We touch up on some Switch news for the first time in a while, with a new Atmosphere CFW update for the latest Switch firmware, but not all good news when we discuss the EULA changes. However, some reverse engineering efforts towards the WaveBird receiver, Mario Party 4, Mario Kart 64, and even Dinosaur Planet have all released this month!
Today I'm joined by Derek Hansen, VP of Operations at Cox Automotive. We get into how AI is reshaping inventory pricing, pro tips for navigating vehicle tariffs, where vAuto is innovating next—and more. If your dealership is interested in learning more, reach out to Derek by email: derek.hansen@coxautoinc.com This episode is brought to you by: 1, Toma – If your BDC or Service Advisors are buried in calls, it's time for a smarter solution. Toma builds custom AI agents that answer 100% of your dealership's inbound calls and handle tasks like booking service, checking recalls, and scheduling test drives—without tying up your team. Dealers using Toma are saving 30–40 staff hours a week and booking 100+ extra appointments every month. Exclusive for CDG Listeners: Start your no-risk, 1-month free trial @ toma.com/cdg 2. Experian Automotive - Like most Car Dealership Guy Listeners, you're constantly looking for the inside edge on the auto industry. So if you're ready to step up your game to the next level – outpacing the competition and building customer loyalty – there's only one place to go from here: Experian Automotive. They're the only ones with exclusive data across vehicles, consumers, and credit—plus expert data scientists who connect the dots to uncover the insights you need. Get the industry-leading insights from Experian Automotive today! Learn more by visiting @ https://carguymedia.com/4cfcLjZ Need help finding top automotive talent? Get started here: https://www.cdgrecruiting.com/ Interested in advertising with Car Dealership Guy? Drop us a line here: https://cdgpartner.com Interested in being considered as a guest on the podcast? Add your name here: https://bit.ly/3Suismu Topics: 00:15 Biggest inventory challenges today? 00:34 What shaped your career path? 01:08 How is AI changing auto? 03:38 Current market trends to watch? 07:11 Best dealer strategies now? 09:37 How to improve appraisals? 15:45 Global car sourcing tips? 21:39 How predictive analytics helps sales? 33:09 Future car inventory predictions? Check out Car Dealership Guy's stuff: CDG News ➤ https://news.dealershipguy.com/ CDG Jobs ➤ https://jobs.dealershipguy.com/ CDG Recruiting ➤ https://www.cdgrecruiting.com/ My Socials: X ➤ x.com/GuyDealership Instagram ➤ instagram.com/cardealershipguy/ TikTok ➤ tiktok.com/@guydealership LinkedIn ➤ linkedin.com/company/cardealershipguy Threads ➤ threads.net/@cardealershipguy Facebook ➤ facebook.com/profile.php?id=100077402857683 Everything else ➤ dealershipguy.com This podcast is for informational purposes only and should not be relied upon as a basis for investment decisions.
We've all heard of the Robbie Williams Monkey Movie, right? It's all fun and games in the world of the movie, but what if you actually had a little ape son? How would that even work? Super ape sperm? Maybe a super ape egg? So many questions, but as always, the most important seems to be how we can exploit him for money.Links to everything at https://linktr.ee/plumbingthedeathstar including our terrible merch, social media garbage and where to become a subscriber to Bad Brain Boys+Support Jarren's Outpost on Kickstarter: https://www.kickstarter.com/projects/dndnerds/jarrens-outpost Hosted on Acast. See acast.com/privacy for more information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, published an advisory and a fix for a vulnerability in its backup software. watchTowr now released a detailed writeup and exploit for the vulnerability https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/ Exploitation Trends Q1 2025 Vulncheck published a summary of exploitation trends, pointing out that about a quarter of vulnerabilities are exploited a day after a patch is made available. https://vulncheck.com/blog/exploitation-trends-q1-2025 inetpub directory issues The inetpub directory introduced by Microsoft in its April patch may lead to a denial of service against applying patches on Windows if an attacker can create a junction for that location pointing to an existing system binary like Notepad. https://doublepulsar.com/microsofts-patch-for-cve-2025-21204-symlink-vulnerability-introduces-another-symlink-vulnerability-9ea085537741
Alex Golden and Rohan Katti from The Gyro Step Podcast dive into everything Game 3 has in store. What adjustments will the Bucks make? How dominate Indiana has been this series in Games 1 & 2, what winning or losing this first round series means for the future of the Bucks, why the Bucks can still win this, why Indiana is the better overall team, what to expect from Milwaukee's crowd, lineup changes and more!
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widespread-microsoft-entra-lockouts-tied-to-new-security-feature-rollout/ https://learn.microsoft.com/en-us/entra/identity/authentication/feature-availability Erlang/OTP SSH Exploit An exploit was published for the Erlang/OTP SSH vulnerability. The vulnerability is easy to exploit, and the exploit and a Metasploit module allow for easy remote code execution. https://github.com/exa-offsec/ssh_erlangotp_rce/blob/main/ssh_erlangotp_rce.rb Sonicwall Exploited An older command injection vulnerability is now exploited on Sonicwall devices after initially gaining access by brute-forcing credentials. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0022 Unpatched Vulnerability in Bubble.io An unpatched vulnerability in the no-code platform bubble.io can be used to access any project hosted on the site. https://github.com/demon-i386/pop_n_bubble