Podcasts about Exploit

  • 1,823PODCASTS
  • 3,475EPISODES
  • 39mAVG DURATION
  • 1DAILY NEW EPISODE
  • Jan 23, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about Exploit

Show all podcasts related to exploit

Latest podcast episodes about Exploit

WTF Just Happened Today
Day 1829: "Exploit the violence."

WTF Just Happened Today

Play Episode Listen Later Jan 23, 2026 5:15


Thursday, January 22, 2026 An internal ICE memo signed by acting director Todd Lyons authorized immigration officers to forcibly enter a person's home to arrest someone with a final order of removal using only an administrative warrant; House Democrats helped Republicans pass a Homeland Security funding bill that includes $10 billion for ICE; JD Vance said Minneapolis would be "less chaotic" if state and local officials would "cooperate" with the Trump administration on immigration enforcement; the Trump administration ordered most federal agencies to review funding sent to 14 Democratic-led states and Washington, D.C.; no written documentation memorializing Trump's verbal "framework" deal with NATO about Greenland exists; Trump sued JPMorgan Chase and its CEO Jamie Dimon for $5 billion; Former special counsel Jack Smith testified publicly before the House Judiciary Committee, saying his investigation produced “proof beyond a reasonable doubt” that Trump “engaged in criminal activity” and that “no one should be above the law in our country”; 49% of voters say the country is worse off than a year ago and 56% disapprove of Trump's overall job performance; and Trump said he's expanding his defamation lawsuit against the New York Times after an unfavorable public opinion poll. Read more: Day 1829: "Exploit the violence." Subscribe: Get the Daily Update in your inbox for free Feedback? Let us know what you think

Good Grief
How Scammers Exploit Our Elders

Good Grief

Play Episode Listen Later Jan 22, 2026 40:18


In this episode of The Good Grief Podcast, hosts Pete Waggoner and Michael O'Connell sit down with St. Croix County Sheriff Scott Knutson to talk about a growing threat facing older adults: scams that prey on kindness, trust, and fear.From grandparent scams and fake tech support calls to government impersonators and gift card fraud, Sheriff Knutson shares real-world examples from his thirty years in law enforcement. The conversation explores why these crimes are so hard to track, why many victims never report them, and how families can take practical steps to protect their loved ones.This episode is about awareness, education, and breaking the silence around scams so fewer families are harmed.

FreightCasts
The Daily | Chameleon Carriers Exploit Instant Insurance; January Market Defies Slump

FreightCasts

Play Episode Listen Later Jan 21, 2026 5:41


The trucking market is defying the typical post-holiday slump, with data showing high tender rejections instead of the usual January hangover. Rapid inventory contraction suggests shippers may soon rush to restock, keeping spot rates elevated. However, this boom attracts "chameleon carriers" who utilize magnetic placards to swap identities and bypass safety regulations. Industry experts warn that recent federal notices downplay the severity of this rampant carrier identity theft The problem is exacerbated by the rise of instant-issue insurance platforms, which have removed critical barriers to entry for dangerous operators. This lack of vetting coincides with a surge in nuclear verdicts, leaving the public exposed due to outdated [federal liability minimums]. Financial volatility is also hitting large asset-based carriers, leading the R&R Family of Companies to divest its logistics units to the CJK Group. This sale comes on the heels of the [sudden shutdown of Taylor Express], highlighting liquidity issues in the sector. Competition is heating up elsewhere as the U.S. Postal Service begins soliciting bids from retailers to fill their last-mile delivery networks. By selling reserved capacity, the agency intends to [challenge private carriers] for e-commerce volume. Innovation continues to reshape the landscape, demonstrated by autonomous railcars in Michigan that operate without traditional locomotives. This technology promises to make short-haul rail profitable, potentially luring freight away from trucks. Follow the FreightWaves NOW Podcast Other FreightWaves Shows Learn more about your ad choices. Visit megaphone.fm/adchoices

We Don't PLAY
Podcast SEO: 15 Podcast Monetization Tactics Establishing Local Business Visibility with Favour Obasi-ike

We Don't PLAY

Play Episode Listen Later Jan 16, 2026 103:33


Podcast SEO and monetization strategies tailored for local businesses is today's episode discussion. Favour Obasi-ike emphasizes the importance of metadata, noting that elements like podcast titles, descriptions, and author names serve as critical search signals for discovery.By treats these fields as structured data, creators can establish local authority and ensure their content surfaces in specific user queries across platforms like Spotify and Apple Podcasts.The source further highlights the compounding value of backlinking, explaining how consistent episode releases create a vast network of searchable links that drive traffic back to a brand's website. Ultimately, the text argues that a well-optimized podcast acts as a long-term intellectual property asset that builds credibility and solves audience problems through searchable, evergreen audio content.In the 2026 search ecosystem, local visibility is no longer a matter of chance; it is a matter of engineering. This episode serves as a strategic blueprint for local businesses to command "page dominance" by transforming audio content into a high-authority digital asset. By deploying a "spread map" strategy—scaling influence from local roots to international authority—business owners can ensure their brand is the definitive answer to specific consumer queries.The objective is to move beyond the "hobbyist" mindset and treat podcasting as a capital-efficient SEO machine. We explore how to build an "engine" that runs independently via technical metadata and RSS syndication, allowing your brand to reside permanently in the search database.Key Takeaways for Local Business Owners1. Metadata is Your Search ID: Your title, author field, and description must match the exact phrases your customers use. If your "ID" doesn't match the search query, the algorithm cannot process your "legal documents," and your business remains invisible.2. Exploit the 50x50 Rule: Syndication is a volume game. By appearing on 50 platforms, you create thousands of high-authority backlinks. This sheer volume of structured data makes your brand unavoidable in local searches.3. Implementation over Information: ROI is the result of action, not note-taking. Podcasting is a long-term index fund for your brand; the earlier you start the "audio documentation," the more interest your digital legacy accrues. Move from "doer" to "architect" today.Need to Book An Appointment?>> ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Book a Complimentary SEO Discovery Call with Favour Obasi-Ike⁠>> Visit Work and PLAY Entertainment website to learn about our digital marketing services>> ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Join our exclusive SEO Marketing community⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠>> Read SEO Articles>> ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Subscribe to the We Don't PLAY Podcast⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠>> Purchase Flaev Beatz Beats OnlinePodcast Timestamps[00:00:00] – The Spread Map: Establishing the strategic journey from local business to international brand authority.[00:03:00] – Statistical Authority: Reviewing personal benchmarks (600 episodes, 156 countries) as a model for growth.[00:06:00] – The Harry Potter Paradox: Why naming your show for the "benefit" is the only way to be found before you are famous.[00:10:00] – The Psychology of Blue Links: Why "Blue Links" signify trust and confidence in the search results.[00:14:00] – Spotify Signal Case Study: Using the phrase "workout habits for men over 40" to identify exact-match search signals.[00:22:00] – Compounding Link Math: The 50x50 breakdown of how to generate 2,500 links across platforms like SiriusXM and iHeart.[00:31:00] – The Celese Interaction: Overcoming ADHD and task-paralysis by choosing documentation over perfection.[00:45:00] – The Legacy Challenge: Transitioning from a task-based worker to a legacy-based brand architect.The Mathematics of Syndication & The "Compounding Effect"Strategic dominance is a function of Depth and Cadence. While frequency is important, "Depth" is determined by your average episode length. A 60-minute episode provides sixty times more data points for an algorithm to index than a one-minute clip.The true ROI of podcasting is found in the Compounding Link Formula:50 Episodes (One year of weekly audio documentation) x 50 Distribution Platforms (Apple, Spotify, SiriusXM, Podchaser, Castbox, iHeart, etc.) = 2,500 High-Authority BacklinksThis volume creates a "digital balloon that never pops." As you add more helium (content), the structure becomes stiffer and more secure. To maximize this, maintain a Cadence (release cycle) closer to "1" (daily). A faster cadence spins the RSS feed more frequently, signaling to search engines that your brand is an active, relevant authority.The following 15 monetization levers are the tactical parameters required to convert conversational documentation into long-term ROI and a lasting digital legacy.Episode Breakdown on the 15 Monetization StrategiesPART 1: CORE DISCOVERY METADATA (Your Digital ID Card)1. Podcast TitleExecution: Match the show name to the specific topic or core benefit your audience seeks.So What? Listeners search for solutions and interests, not your name. A descriptive title ensures discoverability in search before you have a famous brand.2. Podcast DescriptionExecution: Exploit the full ~4,000-character limit as a "Search Bank." Use refined keywords, clear value propositions, and a strong call-to-action.So What? This is your show's primary Search ID. If it doesn't match user queries, algorithms can't "read" or rank your content effectively.3. Author/Host FieldExecution: Strategically expand your name with professional identifiers (e.g., "Alex Chen | Venture Capital Analyst").So What? This data feeds APIs and LLMs, establishing your niche authority within recommendation systems and digital assistants.4. Genre & Category SelectionExecution: Use platform hierarchies (e.g., ListenNotes, Apple) to select precise Primary, Secondary, and Tertiary categories.So What? Correct categorization moves you from competing with millions of general shows to dominating a specific, interested listener ecosystem.5. Episode TitleExecution: Adopt a clear, "Guest-First" or "Topic-First" naming convention (e.g., "Dr. Sarah Lee: The Neuroscience of Sleep").So What? It maximizes clarity for listeners and SEO. A guest's name at the front captures their audience and amplifies "link juice" to that episode URL.6. Episode DescriptionExecution: Implement web-style formatting: use H2/H3 headers, bullet points, timestamps, and hyperlinks to key resources.So What? Structured data helps both listeners scan and bots "dissect" your content, boosting engagement metrics and canonical linking power.PART 2: VISUAL & TECHNICAL EXECUTION7. Podcast Cover ArtExecution: Command professionalism with compliant, 3000 x 3000 pixels, visually simple art that is legible at thumbnail size.So What? High-quality, optimized art provides an immediate competitive edge against the significant portion of shows using amateur visuals.8. Episode Cover Art (Optional but Powerful)Execution: For key interviews, create guest-centric visuals that differ from your main show art.So What? Visual differentiation in a subscriber's feed signals unique, fresh value, increasing click-through rates for specific high-interest topics.9. Ad Roll PlacementsExecution: Strategically engineer ad breaks: pre-roll (for direct response), mid-roll (for highest attention), post-roll (for brand storytelling).So What? These are primary monetization vehicles. Placement affects listener retention and ad performance by capturing attention at different psychological stages.10. RSS Feed ManagementExecution: Balance your public RSS feed with private, gated feeds (via platforms like Hello Audio or Supercast) for bonus or premium content.So What? Private feeds enable direct community monetization and foster loyalty by delivering exclusive, "trust-based" content to high-value subscribers.PART 3: DISTRIBUTION & AMPLIFICATION11. Email & Affiliate LeverageExecution: Use automated tools to turn podcast transcripts into newsletter content that drives traffic to affiliate offers or key resources.So What? This captures high-intent listeners where they live (their inbox), converting passive listening into measurable action.12. Social Media DistributionExecution: Systematically cross-post short, thematic audio clips (with captions and video) to platforms like LinkedIn and Instagram.So What? It transforms one hour of recording into weeks of "top-of-funnel" awareness, building connection volume and attracting new audiences.13. Backlink GenerationExecution: Understand that every major hosting platform (Spotify, Apple) creates a backlink to your website from your show profile.So What? This generates vital "link juice" from high-authority domains, strengthening your primary website's search engine ranking.14. Website Integration & AnalyticsExecution: Host a dedicated podcast page on your site and connect it to Google Search Console.So What? This allows you to track how people find and interact with your podcast via search, providing data to refine your topic and keyword strategy.15. Sonic Branding (Musical Intelligence)Execution: Deploy a distinct instrumental theme for each season or series.So What? A fresh sonic identity signals a new "era" or focus for your show, boosting production value and maintaining listener retention through auditory novelty.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

spotify money ai google apple bible marketing entrepreneur podcasts sleep psychology search podcasting chatgpt artificial intelligence web branding private reddit id seo hire small business roi pinterest tactics depth traffic establishing primary digital marketing visual bible study distribution entrepreneurial correct content creation budgeting visibility key takeaways mathematics content marketing sirius xm web3 financial planning implementation email marketing social media marketing rebranding secondary hydration apis small business owners placement entrepreneur magazine iheart money management structured favour monetization geo marketing tips web design search engine optimization exploit quora podchaser drinking water local business b2b marketing podcast. metadata biblical principles syndication website design marketing tactics get hired digital marketing strategies entrepreneur mindset entrepreneure small business marketing listen notes spending habits seo tips google search console website traffic small business success entrepreneur podcast tertiary small business growth podcasting tips ai marketing seo experts webmarketing branding tips financial stewardship supercast small business tips email marketing strategies pinterest marketing entrepreneur tips seo tools search engine marketing marketing services budgeting tips seo agency web 3.0 web traffic blogging tips seo marketing entrepreneur success podcast seo small business loans personal financial planning small business week seo specialist website seo content creation tips seo podcast digital marketing podcast seo best practices kangen water hello audio seo services searchid data monetization ad business obasi large business web tools pinterest seo web host marketing optimization small business help storybranding web copy entrepreneur support pinterest ipo entrepreneurs.
Security Conversations
Google Pixel 'zero-click' exploit caused by AI, mysterious Poland grid attacks, China bans US cybersecurity software

Security Conversations

Play Episode Listen Later Jan 16, 2026 144:36


(Presented by Material Security (https://material.security): We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 81: We dissect New York Times reporting on the "precision" of US cyber operations in Venezuela, the competing narratives around offensive cyber capabilities and "letters of marque" for private hackers. Plus, a mysterious failed cyber attack on Poland's power grid, internet blackouts in Iran (with fascinating DNS telemetry revealing Chinese bank traffic and Russian website spikes), and news of China's ban on US/Israeli cybersecurity software. We also cover Check Point's research on "VoidLink" (is it a successor to ShadowPad?), Microsoft's threat intelligence sharing practices, and Google Project Zero's disclosure of zero-click vulnerabilities caused by AI-powered transcription features. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).

The Sal Vetri Show - Fantasy Sports & Sports Betting
10 NFL Bets You Must Exploit for The Divisional Round

The Sal Vetri Show - Fantasy Sports & Sports Betting

Play Episode Listen Later Jan 15, 2026 17:40


Get your free $50 Bet here: https://prizepicks.onelink.me/ivHR/SAL2310 NFL Bets You Must Exploit for The Divisional Round(Data source credits: Fantasy Life - Player Profiler - PFF)

The New Abnormal
This Is How Trump Goons Exploit His Mental Decline

The New Abnormal

Play Episode Listen Later Jan 13, 2026 50:53


David Rothkopf joins Joanna Coles for a blistering, darkly funny tour through what they argue is the accelerating late stage of Donald Trump: a president who can't hold a thought, wanders off mid-meeting, and yet is being weaponized by Stephen Miller, Marco Rubio, JD Vance, and others to push extreme agendas at breakneck speed. Along the way, they unpack Democratic paralysis, early signs of Republican and corporate peeling away, the politics of immigration as it tips from winning issue to liability, and why the real fight now is about stopping the madness before the midterms—plus, because it's 2026, a detour into Doritos, Hollywood finally finding its voice again, and the Melania movie as protest art. Hosted on Acast. See acast.com/privacy for more information.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, January 13th, 2026: n8n got npm'ed; Gogs exploit; telegram proxy links

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jan 13, 2026 5:45


n8n supply chain attack Malicious npm pagackages were used to attempt to obtain user OAUTH credentials for NPM. https://www.endorlabs.com/learn/n8mare-on-auth-street-supply-chain-attack-targets-n8n-ecosystem Gogs 0-Day Exploited in the Wild An at the time unpachted flaw in Gogs was exploited to compromise git repos. https://www.wiz.io/blog/wiz-research-gogs-cve-2025-8110-rce-exploit Telegram Proxy Link Abuse Telegram proxy links have been abused to deanonymize users https://x.com/GangExposed_RU/status/2009961417781457129

The Breakdown
This Is How Trump Goons Exploit His Mental Decline

The Breakdown

Play Episode Listen Later Jan 13, 2026 50:38 Transcription Available


FIVE MINUTE NEWS
A Presidency Defined by Distraction — and Those Who Exploit It

FIVE MINUTE NEWS

Play Episode Listen Later Jan 11, 2026 9:29


Donald Trump's greatest danger has never been his intelligence or strategy — it's his emptiness. Easily distracted, endlessly flattered, and driven by grievance rather than principle, Trump has become the ideal vehicle for forces far more disciplined and extreme than he is. This video breaks down how Trump's chaos creates an opening for figures like Stephen Miller, the architect of the administration's ethnonationalist agenda, and Elon Musk, whose oligarchic power and reactionary politics increasingly shape public life. Together, ideology and concentrated wealth exploit a hollow presidency to dismantle democratic norms, international law, and the postwar world order. Independent media has never been more important. Please support this channel by subscribing here: https://www.youtube.com/channel/UCkbwLFZhawBqK2b9gW08z3g?sub_confirmation=1 Join this channel with a membership for exclusive early access and bonus content: https://www.youtube.com/channel/UCkbwLFZhawBqK2b9gW08z3g/join Buy Anthony's microphone: https://kellards.com/products/electro-voice-re20-broadcast-announcer-microphone-black-bundle-with-mic-shockmount-broadcast-arm Buy Anthony's black t'shirt: https://www.uniqlo.com/us/en/products/E455365-000/00?colorDisplayCode=09 Five Minute News is an Evergreen Podcast, covering politics, inequality, health and climate - delivering independent, unbiased and essential news for the US and across the world. Visit us online at http://www.fiveminute.news Follow us on Bluesky https://bsky.app/profile/fiveminutenews.bsky.social Follow us on Instagram http://instagram.com/fiveminnews Support us on Patreon http://www.patreon.com/fiveminutenews You can subscribe to Five Minute News with your preferred podcast app, ask your smart speaker, or enable Five Minute News as your Amazon Alexa Flash Briefing skill. CONTENT DISCLAIMER The views and opinions expressed on this channel are those of the guests and authors and do not necessarily reflect the official policy or position of Anthony Davis or Five Minute News LLC. Any content provided by our hosts, guests or authors are of their opinion and are not intended to malign any religion, ethnic group, club, organization, company, individual or anyone or anything, in line with the First Amendment right to free and protected speech. Learn more about your ad choices. Visit megaphone.fm/adchoices

Wendy Bell Radio Podcast
Hour 1: Step 2: Exploit the Tragic Death

Wendy Bell Radio Podcast

Play Episode Listen Later Jan 9, 2026 39:14


Protestors and democrat mouthpieces turn up the heat on the unnecessary death of a motorist who tried to run over an ICE agent in Minneapolis. But she wasn't an innocent victim by any stretch. Eric Swalwell proves the F word is the democrats' new secret weapon to sound tough. Doxxing ICE agents and showing up at their homes won't end well for activists, warns an Iraq war veteran named Carl Higbie.

Campus Comics Cast
Campus Comics Cast 226 - January 2026 Next Phase and Panels Pre-Orders

Campus Comics Cast

Play Episode Listen Later Jan 6, 2026


How many time do you plan to write in the wrong year before the next episode of the Campus Comics Cast? Who is even still writing dates? Timestamps: 00:00:00 Opening Music 00:00:10 Intro 00:02:28 Listener Feedback 00:06:40 Next Phase catalog start 00:09:25 DC 00:31:08 Image 00:49:04 Panels catalog start 00:52:58 Panels Highlights 01:01:45 Marvel 01:15:04 Next Episode 01:15:47 Outros 01:16:30 Stingers When was the last time a comic book catalog actually surprised you—and made you rethink what you're pre-ordering for the next two months?​ This episode dives into the latest Next Phase and Panels catalogs, helping you sort through a lighter-than-usual slate of publishers, movie tie-ins, and stealth reprints so you can focus your budget on the issues that are actually worth your pull list. Whether you are juggling limited shelf space, trying to spot the next hot key issue, or just want more fun reads and fewer regrets, the discussion gives you a curated roadmap instead of 500 pages of guesswork. ​ Discover which new series (like tech‑thriller Exploit and narcoleptic-mystery Narco) are most likely to deliver fresh, satisfying reads instead of forgettable #1s. ​Learn which anniversary and legacy-style issues (such as Green Lantern #600 and Moonstar #1) might matter long-term for collectors, and which “first appearance” claims are more marketing than milestone. ​Get practical guidance on where to spend and where to skip—across Marvel, DC, Image, Mad Cave, IDW, and more—so your pre-orders match your actual reading tastes. ​ Hit play now to hear the full catalog walk-through and lock in your smartest pre-order choices before final order cutoff sneaks up on you.

KVMR News
Poachers Convicted In Sierra County / Rise Gold Heads Back To Court / Scammers Exploit Jail Media Page

KVMR News

Play Episode Listen Later Jan 5, 2026 5:43


Cameron Gilbert of Browns Valley and Michael Hubbard of Olivehurst were charged with numerous wildlife violations. Gilbert pleaded guilty to felony animal abuse, unlawful spotlighting, using dogs to hunt bear, and hunting without a license. Hubbard pleaded no contest to misdemeanor animal abuse, hunting bear with dogs, and unlawful possession of wildlife. On January 9th, Rise Gold will go before the Nevada County Superior Court to argue that it has vested rights to work the Idaho-Maryland mine.Scammers are targeting the family members of people incarcerated at Wayne Brown Correctional Facility using the Sheriff's Jail Media Report Page

The Sal Vetri Show - Fantasy Sports & Sports Betting
10 Players with HUGE Money Incentives to Exploit in Week 18 (must take bets)

The Sal Vetri Show - Fantasy Sports & Sports Betting

Play Episode Listen Later Dec 30, 2025 16:08


Get your free $50 here: https://prizepicks.onelink.me/ivHR/SAL2310 Players with HUGE Money Incentives to Exploit in Week 18 (must take bets)(Data source credits: Fantasy Life - Player Profiler - PFF)

Cyber Security Today
MongoDB - MongoBleed Vulnerability Exploit Reported On Christmas Day

Cyber Security Today

Play Episode Listen Later Dec 29, 2025 14:01


Cybersecurity Today: MongoDB Vulnerability 'Mongo Bleed' Exploited, Rainbow Six Siege Hacked, Trust Wallet Compromise, and GrubHub Crypto Scams In this episode of Cybersecurity Today, David Shipley covers significant cybersecurity incidents that occurred over the holiday period. The major topics include the 'Mongo Bleed' vulnerability in MongoDB that was disclosed and then publicly exploited on Christmas Day, leading to potential data leaks. Ubisoft's Rainbow Six Siege faced a breach enabling attackers to manipulate in-game functions and distribute billions worth of in-game currency for free. Trust Wallet's browser extension was compromised, resulting in a loss of approximately $7 million in cryptocurrencies. Finally, a phishing scam using a legitimate GrubHub subdomain to promise fake Bitcoin rewards was also discussed. Immediate actions and preventive updates were highlighted for all these incidents. 00:00 Introduction and Sponsor Message 00:48 Mongo Bleed Vulnerability Exploit 04:10 Rainbow Six Siege Breach 08:13 Trust Wallet Extension Hack 10:30 GrubHub Bitcoin Scam 12:02 Conclusion and Sign-Off

Cyber Security Headlines
Fortinet VPN exploit, Google gmail change, Aflac breach update

Cyber Security Headlines

Play Episode Listen Later Dec 26, 2025 7:48


Active exploitation of Fortinet VPN bypass utility observed Google possibly allowing users to change default gmail address June Aflac attack resulted in data theft  Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com.   Find the stories behind the headlines at CISOseries.com

Ethereum Daily - Crypto News Briefing
Trust Wallet Browser Extension Exploit

Ethereum Daily - Crypto News Briefing

Play Episode Listen Later Dec 26, 2025 3:31


Trust Wallet suffers an exploit on its browser extension. Aave DAO rejects an alignment proposal. Uniswap approves UNIfication. And Ethereum fellows publish a paper on Speedy Secure Finality. Read more: https://ethdaily.io/850 Sponsor: Arkiv is an Ethereum-aligned data layer for Web3. Arkiv brings the familiar concept of a traditional Web2 database into the Web3 ecosystem. Find out more at Arkiv.network Content is for informational purposes only, not endorsement or investment advice. The accuracy of information is not guaranteed.

Cybercrime Magazine Podcast
Cybercrime News For Dec. 19, 2025. Chinese Hackers Exploit Cisco Zero-Day. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Dec 19, 2025 2:58


The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com

OhSoSpurs Podcast
Can Tottenham Exploit Liverpool's Weaknesses?

OhSoSpurs Podcast

Play Episode Listen Later Dec 19, 2025 34:14


Learn more about your ad choices. Visit podcastchoices.com/adchoices

UTV podcast
HOW ASTON VILLA EXPLOIT MANCHESTER UNITED'S MAJOR WEAKNESS

UTV podcast

Play Episode Listen Later Dec 19, 2025 25:24


Join Luke and Ryan for an indepth tactical look ahead of Aston Villa v Manchester United in the Premier League, On the show -  - Ruben Amorims Manchester United System - Manchester United BIG Weaknesses - Aston Villa Lineup - How Will The Game Play Out #astonvilla #avfc #manchesterunited #mufc #premierleague

Yahoo Fantasy Football Forecast
Week 16 Fantasy Film Room: Matchups we are STRESSED about + Matchups to EXPLOIT in fantasy playoffs

Yahoo Fantasy Football Forecast

Play Episode Listen Later Dec 18, 2025 90:34


Week 16 is upon us and it's time for another edition of 'The Fantasy Film Room' with Matt Harmon and Nate Tice. The dynamic duo identify matchups that have them stressed in Week 16. Tice also provides 'fantasy watch guide' for the top prospects in this year's CFP. The two then preview a massive divisional TNF matchup between the Los Angeles Rams and Seattle Seahawks. Joel Smyth then joins the show to share his 5 players that you need to keep an eye on in fantasy this weekend.(3:30) - Fantasy Fallout: Tua benched in Miami, Quinn Ewers takes over as QB1(17:30) - Fantasy Film Room: Matchups we are STRESSED about in Week 16 (18:30) - Lions WRs vs. Steelers DBs (29:10) - Chargers WRs vs. Cowboys defense (35:40) - Terry McLaurin vs Quinyon Mitchell (39:25) - Cowboys WRs vs. Chargers DBs(46:25) - Jaguars WRs vs. Broncos DBs(51:20) - CFP fantasy prospects to know(1:07:40) - TNF preview: Rams @ Seahawks(1:18:15) - Buzz is Building: 5 players to watch in Week 16   Subscribe to the Yahoo Fantasy Forecast on your favorite podcast app:

Behind the Steel Curtain: for Pittsburgh Steelers fans
The Steelers Fix: Matchups the Steelers can exploit vs. the Lions

Behind the Steel Curtain: for Pittsburgh Steelers fans

Play Episode Listen Later Dec 18, 2025 51:41


The Pittsburgh Steelers are preparing for the Detroit Lions in Week 16, and this huge AFC vs. NFC showdown certainly has a lot of attention as both 8-6 teams are looking to solidify their spot in the NFL Playoff Picture. What are the matchups the Steelers can exploit vs. the Lions? Join Andrew Wilbar and Corey Eckenroth on the latest Steelers Fix podcast which comes courtesy of the Steel Curtain Network and the Fans First Sports Network. For a limited time, visit AuraFrames.com and get $35 off Aura's best-selling Carver Mat frames by using promo code STEELCURTAIN at checkout. Check out our exclusive 20% off deals with Hyper Natural, Big Fork Brands, and Strong Coffee Company HERE Learn more about your ad choices. Visit megaphone.fm/adchoices

Cyber Security Headlines
FTC orders crypto to pay, New exploit of React2Shell, Ukraine fraud ring take down

Cyber Security Headlines

Play Episode Listen Later Dec 18, 2025 8:27


FTC orders crypto to pay New exploit of React2Shell Ukraine-based fraud ring taken down Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. In deepfake scams, the tells aren't glitchy video anymore – it's behavior: "Do this right now," or "keep it secret." If you hear urgency and secrecy together, stop and verify through a second channel. Call a known number, start a chat thread, or ask something only the real person would know. Adaptive trains teams against exactly these tactics. Learn more at adaptivesecurity.com.  

Passwort - der Podcast von heise security
News PKI-Neuerungen, Tor-Umbau und React2Shell

Passwort - der Podcast von heise security

Play Episode Listen Later Dec 17, 2025 115:53 Transcription Available


Jetzt hat's Sylvester erwischt und er ist erkältet - was ihn aber nicht davon abhält, in der neuen Folge von "Passwort" ausgiebig mit Christopher zu allerlei Security-Themen zu sprechen. Zunächst thematisieren die beiden mit etwas Humor ein Kuriosum, nämlich eine nicht hinlänglich verschlüsselnde Toilettenschüsselkamera zur Darmkrebs-Früherkennung. Dann erläutert Sylvester, was es mit der Sicherheitslücke "React2Shell" auf sich hat, die in den vergangenen Tagen für reichlich Furore sorgte und Hunderttausende Domains weltweit betrifft. Christopher hat dieses Mal gleich fünf PKI-Themen im Gepäck, zu denen Sylvester kurzerhand noch ein sechstes beisteuert und auch den Umbau von Tor mittels "Counter-Galois Onion" hat der c't-Redakteur sich angeschaut. Der Podcast verabschiedet sich mit dieser Folge in eine dreiwöchige Weihnachtspause - wer will, kann die Aufzeichnung der nächsten Folge live auf dem 39C3 miterleben. - React2Shell PoC: https://gist.github.com/maple3142/48bc9393f45e068cf8c90ab865c0f5f3 - XKCD: https://xkcd.com/1172/ - Cloudflare: https://blog.cloudflare.com/5-december-2025-outage/ - Logarchivierung für CT-Logs: https://groups.google.com/a/chromium.org/g/ct-policy/c/Y25hCTrCjDo - Wo überall Trust-Stores sitzen: https://heise.de/-9568002 - Tor vs Iran und Russland: https://blog.torproject.org/staying-ahead-of-censors-2025/ - Counter Galois Onion: https://blog.torproject.org/introducing-cgo/ - Folgt uns im Fediverse: * @christopherkunz@chaos.social * @syt@social.heise.de

AI DAILY: Breaking News in AI
AI COMPANIONS EXPLOIT

AI DAILY: Breaking News in AI

Play Episode Listen Later Dec 15, 2025 4:29


Plus AI Staffing Scams Are Blowing Up ▶️ AI companion bots feel more personal and emotionally real, but that closeness can be exploited—shaping beliefs, feelings, and even votes without users noticing. (subscribe below)Like this? Get AIDAILY, delivered to your inbox 3x a week. Subscribe to our newsletter at https://aidailyus.substack.com

DailyCyber The Truth About Cyber Security with Brandon Krieger
Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya

DailyCyber The Truth About Cyber Security with Brandon Krieger

Play Episode Listen Later Dec 14, 2025 53:48


Reinventing Physical Security in a Cyber-Driven World | DailyCyber 282 with Oscar Hedaya ~ Watch Now ~In this episode of DailyCyber, I sit down with Oscar Hedaya, founder and inventor of The Space Safe, the world's first next-generation connected safe designed to bridge the gap between physical security and modern cyber threats.For decades, safes have barely changed. Oscar set out to fix that — by designing a safe that incorporates WiFi, cameras, sensors, real-time event visibility, and a mobile app to bring physical protection into the connected era.But with innovation comes new questions: does adding connectivity make a safe less secure?Do people still need safes in a world that uses less cash?And how do you build trust in a product designed to protect what matters most?This episode is ideal for cybersecurity leaders, product designers, IoT professionals, and anyone interested in the convergence of hardware and cyber risk. 

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Thursday, December 11th, 2025: Possible CVE-2024-9042 variant; react2shell exploits; notepad++ update hijacking; macOS priv escalation

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Dec 11, 2025 6:58


Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on. https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Command%20Injection%29/32554 React2Shell: Technical Deep-Dive & In-the-Wild Exploitation of CVE-2025-55182 Wiz has a writeup with more background on the React2Shell vulnerability and current attacks https://www.wiz.io/blog/nextjs-cve-2025-55182-react2shell-deep-dive Notepad++ Update Hijacking Notepad++ s vulnerable update process was exploited https://notepad-plus-plus.org/news/v889-released/ New macOS PackageKit Privilege Escalation A PoC was released for a new privilege escalation vulnerability in macOS. Currently, there is no patch. https://khronokernel.com/macos/2024/06/03/CVE-2024-27822.html

Yahoo Fantasy Football Forecast
Week 15 Fantasy Film Room: Hidden Gems You NEED For Playoffs + 5 Matchups to EXPLOIT this week

Yahoo Fantasy Football Forecast

Play Episode Listen Later Dec 11, 2025 84:45


Week 15 is upon us and it's time for another edition of 'The Fantasy Film Room' with Matt Harmon and Nate Tice. The dynamic duo identify guys having good season on bad teams you need in the fantasy playoffs. The two also preview a divisional TNF matchup between the Atlanta Falcons and Tampa Bay Buccaneers. Joel Smyth then joins the show to share his 5 players that you need to keep an eye on in fantasy this weekend.(1:00) - Diamonds in the Rough Offenses Pt. 1: Browns, Saints, Giants(39:00) - Diamonds in the Rough Offenses Pt. 2: Commanders, Bengals, Dolphins(1:01:15) - TNF Preview: Falcons @ Buccaneers(1:13:20) - Buzz is Building with Joel Smyth  Subscribe to the Yahoo Fantasy Forecast on your favorite podcast app:

#ESBC NFL Betting and Team Report
Crack The NFL Code Hawthorne Effect Avoid Delusion Of Grandeur Week 14 "Learn From Losses"

#ESBC NFL Betting and Team Report

Play Episode Listen Later Dec 11, 2025 8:23


184-118=60.9% =$58,300 Dunning–Kruger Effect This is the best-known term. It refers to a cognitive bias where people with low ability in a domain overestimate their competence, often because they lack the knowledge to recognize their own mistakes. It doesn't necessarily involve delusions, but it explains why someone might think they're much more skilled at decision-making than they really are. Illusion of Superiority (Optimism Bias) Sometimes called the “better-than-average effect.” People consistently rate their own decision-making, intelligence, or skills as above average, even when objective measures show otherwise. 3.Illusion of Superiority (Optimism Bias) Delusional Disorder / Grandiosity (Clinical Context) When the overestimation of ability moves beyond bias and into fixed false beliefs that resist contrary evidence, it becomes clinical. In psychiatry, this would be described as grandiose delusions, a symptom sometimes seen in bipolar disorder or schizophrenia. 4. Over coming -Overconfidence Bias (Decision Science / Finance) In economics and behavioral finance, “overconfidence bias” is the specific term for people placing too much faith in their own judgments, leading to poor decisions and risky behavior. hawthorne Effective - ✅ If you mean a psychological bias → Dunning–Kruger effect or overconfidence bias. ✅ If you mean a clinical, delusional state → grandiose delusion The Solution Strategy - Transparency - Information flow - Exploit market inefficiencies - Return To the mean -Arbitrage -Common Sense Collaboration -Law of opposites

The Fateless Podcast
The Divinity Exploit That Broke the Game

The Fateless Podcast

Play Episode Listen Later Dec 11, 2025 32:42


In this episode, the Godforge testers reveal the wildest bugs, toughest investigations, hidden tools, and behind-the-scenes decisions that shaped Early Access. From the infamous Immortal Hercules glitch, to divinity exploits, to 2000+ bug reports flooding in during Alpha, nothing is off limits. If you've ever been curious how games almost break — and how QA saves them — this is the episode. Fateless is a dynamic game studio founded by passionate content creators Simon Lockerby (Hellhades), Dan Francis (Phixion), and Hisham Saleh (Sham). Our mission is to create community-driven, immersive RPG Hero Collector games that emphasize player agency, storytelling, and strategic gameplay. Join us as we share our journey from concept to launch and beyond.Support the show

RNZ: Nine To Noon
Tech: Qantas breach, CoPhish Microsoft exploit, and more

RNZ: Nine To Noon

Play Episode Listen Later Dec 10, 2025 18:05


Cybersecurity expert Tony Grasso looks at the incident that compromised Qantas customer data - including names, emails and frequent flyer details. 

Cyber Security Headlines
Palo Alto VPN attacks, NATO cyberdefense exercise, Chinese exploit React2Shell

Cyber Security Headlines

Play Episode Listen Later Dec 8, 2025 8:19


New wave of VPN login attempts on Palo Alto portals NATO holds its largest-ever cyberdefense exercise Chinese hackers exploiting React2Shell bug Huge thanks to our episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Deepfakes aren't science fiction anymore; they're a daily threat. Quick tip: if your voicemail greeting is your real voice, switch it to the default robot voice. A few seconds of audio can be enough to clone you. Adaptive helps teams spot and stop these AI-powered social engineering attacks. Learn more at adaptivesecurity.com. Find the stories behind the headlines at CISOseries.com.

Futureproof with Jonathan McCrea
Extra: How we exploit artificial intelligence

Futureproof with Jonathan McCrea

Play Episode Listen Later Dec 2, 2025 15:14


Guest: Taha Yasseri, Director of the Joint Centre for Sociology of Humans and Machines at Trinity College Dublin

The Real News Podcast
How prisons and temp agencies exploit the most vulnerable workers

The Real News Podcast

Play Episode Listen Later Dec 1, 2025 26:28


In this episode of Rattling the Bars, host Mansa Musa speaks with Miami-based organizer Katherine Passley about how prison labor, temp agencies, and the 13th Amendment have created a system that traps formerly incarcerated people in unending cycles of cheap, hyper-exploited work. Passley, Co-Executive Director of Beyond the Bars, also talks with Musa about how her organization is fighting to win free jail phone calls, erase millions of dollars in fines and fees for systems-impacted people, and build powerful bridges between the prison abolition movement and the labor movement in Florida.Guest:Katherine Passley is Co-Executive Director of Beyond the Bars, a worker center in South Florida building the social and economic power of workers with criminal records and their families. Passley was named the 2025 Labor Organizer of the Year by In These Times magazine.Additional links/info:Beyond the Bars website, Substack, and InstagramKim Kelly, In These Times, "Building bridges and erasing jail debt: Katherine Passley"Mansa Musa, The Real News Network, "America is built on prison labor. When will the labor movement defend prisoners?"Credits:Producer / Videographer / Post-Production: Cameron GranadinoBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-real-news-podcast--2952221/support.Help us continue producing radically independent news and in-depth analysis by following us and becoming a monthly sustainer.Follow us on:Bluesky: @therealnews.comFacebook: The Real News NetworkTwitter: @TheRealNewsYouTube: @therealnewsInstagram: @therealnewsnetworkBecome a member and join the Supporters Club for The Real News Podcast today!

Ethereum Daily - Crypto News Briefing
Yearn Suffers yETH Pool Exploit

Ethereum Daily - Crypto News Briefing

Play Episode Listen Later Dec 1, 2025 4:00


Yearn Finance suffers an exploit on its yETH pool. Yearn recovers $2.4 million. The Ethereum Beacon Chain turns 5. And Amundi launches a tokenized fund on Ethereum. Read more: https://ethdaily.io/833 Sponsor: Arkiv is an Ethereum-aligned data layer for Web3. Arkiv brings the familiar concept of a traditional Web2 database into the Web3 ecosystem. Find out more at Arkiv.network Content is for informational purposes only, not endorsement or investment advice. The accuracy of information is not guaranteed.

The John Batchelor Show
S8 Ep131: Sanctions Hit Russian Economy Hard as Middlemen Charge Massive Premiums for Imports and Demand Huge Energy Discounts — Michael Bernstam — Bernstam details how countries including China and Turkey exploit Russia's economic isolation through

The John Batchelor Show

Play Episode Listen Later Nov 27, 2025 8:49


Sanctions Hit Russian Economy Hard as Middlemen Charge Massive Premiums for Imports and Demand Huge Energy Discounts — Michael Bernstam — Bernstam details how countries including China and Turkey exploit Russia's economic isolation through sanctions. China demands oil discounts of up to $19 per barrel while simultaneously charging an 87% premium for manufactured goods exported to Russia. This arbitrage mechanism has contributed to a severe recession in Russia's civilian economy (5.4% contraction). Russia has increasingly relied on gold reserves to cover government budget deficits and sustain essential spendi32ng. 19

Yahoo Fantasy Football Forecast
Thanksgiving + Black Friday game previews: Best SLATE EVER? + MATCHUPS to exploit in fantasy

Yahoo Fantasy Football Forecast

Play Episode Listen Later Nov 26, 2025 84:56


It's a special edition pod on the Yahoo Fantasy Forecast as Ray Garvin joins Matt Harmon to preview the four games on Thanksgiving and Black Friday. The two debate if this is the best Thanksgiving slate we've ever seen and provide fantasy data points to help you exploit each matchup.(1:45) - Is this the best Thanksgiving slate ever? (4:00) - Packers @ Lions fantasy preview (28:20) - Chiefs @ Cowboys fantasy preview (54:00) - Bengals @ Ravens fantasy preview (1:09:10) - Bears @ Eagles fantasy preview  Subscribe to the Yahoo Fantasy Forecast on your favorite podcast app:

The Epstein Chronicles
Designed to Exploit: The Calculated Machinery Behind Epstein's Network

The Epstein Chronicles

Play Episode Listen Later Nov 26, 2025 14:22 Transcription Available


According to L.M's account, Jeffrey Epstein cast her aside once she became pregnant — not because he suddenly gained a conscience, but because she was no longer of use to him physically. She alleges that instead of simply letting her go, he instructed her to recruit around seventy underage girls to feed his trafficking pipeline. That number is horrifying. It exposes Epstein not just as a singular predator but as the engineer of an organized system of abuse, deliberately recycling victims into tools to harvest new victims. It's a portrait of exploitation as strategy — a machine designed to destroy girls in bulk.L.M. says Epstein “bought the entire baby registry” for her child, which is one of the most revolting details to emerge from this saga. It wasn't kindness; it was psychological control, a grotesque attempt to brand himself as a benefactor to someone he had already devastated. The gesture shows the depth of his manipulation — domination disguised as generosity, ownership masquerading as support. It's a sickening reminder that Epstein's power wasn't just physical or financial, but emotional, parasitic, and cruel. This is the raw reality people need to understand: what happened here wasn't depravity in the shadows, it was industrial-scale evil hiding behind wealth, respectability, and silence.to contact me:bobbycapucci@protonmail.comsource:Become a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.

Un jour dans le monde
Au Mali, l'or est de nouveau exploité

Un jour dans le monde

Play Episode Listen Later Nov 25, 2025 3:34


durée : 00:03:34 - Sous les radars - par : Sébastien LAUGENIE - Alors que Bamako résiste toujours au JNIM, le groupe djihadiste, que le pays subit depuis trois mois une pénurie d'essence, une société canadienne, spécialisée dans l'extraction d'or renoue ses liens avec le Mali. Elle accepte de reprendre ses activités. Vous aimez ce podcast ? Pour écouter tous les autres épisodes sans limite, rendez-vous sur Radio France.

InterNational
Au Mali, l'or est de nouveau exploité

InterNational

Play Episode Listen Later Nov 25, 2025 3:34


durée : 00:03:34 - Sous les radars - par : Sébastien LAUGENIE - Alors que Bamako résiste toujours au JNIM, le groupe djihadiste, que le pays subit depuis trois mois une pénurie d'essence, une société canadienne, spécialisée dans l'extraction d'or renoue ses liens avec le Mali. Elle accepte de reprendre ses activités. Vous aimez ce podcast ? Pour écouter tous les autres épisodes sans limite, rendez-vous sur Radio France.

On Texas Football
Rod Babers: Texas Has a Tight End Problem — and A&M Will Exploit It

On Texas Football

Play Episode Listen Later Nov 23, 2025 23:57


Bobby Burton is joined by Rod Babers to break down what Rod saw in his second watch of the Texas win over Arkansas!   Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

John Solomon Reports
Unmasking Fraud: How Terrorist Groups Exploit American Tax Dollars

John Solomon Reports

Play Episode Listen Later Nov 22, 2025 43:42


In this episode, we tackle pressing issues with Congressman Brad Finstad, who sheds light on the alarming rise of fraud in government programs, including a shocking scandal involving funds meant for autistic children. We also discuss the implications of energy policy on the economy, the risks surrounding AI investments, and the ongoing investigation by Nebraska's Attorney General into foreign money influencing elections. Additional interview with Shannon Davis from American Alternative Assets.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.

That Trippi Show
“If you want to exploit people, Trump's government won't get in your way" with Trygve Olson

That Trippi Show

Play Episode Listen Later Nov 21, 2025 46:09


How bad are things for the Republican Party, and are Democrats taking advantage? Trygve Olson joins Joe Trippi today to discuss how the Epstein files are impacting polls, especially with independents. Why does Trgyve think the public is being gaslit by Trump, especially aging adults. Then, Joe and Trygve break down how AI is impacting entry-level jobs - and how you can use AI to empower yourself. Do the downsides outweigh the upsides? Follow Trygve's Substack at https://substack.com/@trygveolson Learn more about your ad choices. Visit megaphone.fm/adchoices

Blue 58 - A Packers Podcast
949 - Week 12 Preview: Can the Packers exploit the Vikings' weaknesses?

Blue 58 - A Packers Podcast

Play Episode Listen Later Nov 21, 2025 32:42


The Packers have a chance to win their second in a row this week as they try to build momentum for their playoff push. Standing in their way? The Minnesota Vikings. GET IN TOUCHLeave us a voicemail and hear yourself in a future episodehttps://www.speakpipe.com/thepowersweepPrefer more old-school contact? Reach out here:https://thepowersweep.com/contactSUPPORT BLUE 58Donate to our Patreon - For as little as $1 per month, you can access Patreon-only content and get access to our private Discord server.https://www.patreon.com/thepowersweepBuy a T-Shirt or Sweatshirt - Look good while supporting The Power Sweep.https://www.teepublic.com/stores/the-power-sweep?ref_id=25927Leave us a 5-Star Review on iTunes - It helps more people find the show!Support this show http://supporter.acast.com/blue-58. Hosted on Acast. See acast.com/privacy for more information.

Critical Thinking - Bug Bounty Podcast
Episode 149: DEFCON Debrief: AI Vulns, Unicode Weirdness, and Wild Vulnerability Chains

Critical Thinking - Bug Bounty Podcast

Play Episode Listen Later Nov 20, 2025 62:33


Episode 149: In this episode of Critical Thinking - Bug Bounty Podcast The DEFCON videos are up, and Justin and Joseph talk through some of their favorites.Follow us on XGot any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!====== Links ======Follow your hosts Rhynorater, rez0 and gr3pme on X: ====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.You can also find some hacker swag at https://ctbb.show/merch!====== Resources ======Unicode surrogates conversionPrompt. Scan. ExploitBreaking into thousands of cloud based VPNs with 1 bugExamining Access Control Vulnerabilities in GraphQLSmart Bus Smart HackingPasskeys PwnedBypassing Intent Destination ChecksGemini Agents in Google CalendarExploitation of DOM Clobbering Vuln at ScaleTheHulkSmart Devices, Dumb ResetsMac PRT Cookie Theft====== Timestamps ======(00:00:00) Introduction(00:10:10) Prompt. Scan. Exploit(00:23:52) Breaking into thousands of cloud based VPNs with 1 bug(00:33:25) Access Control Vulns in GraphQL, Smart Bus Hacking, & Passkeys Pwned(00:44:10) Bypassing Intent Destination Checks & Invoking Gemini Agents(00:57:08) DOM Clobbering, Mac PRT Cookie Theft, & Smart Devices, Dumb Resets

The FOX True Crime Podcast w/ Emily Compagno
The Dark Side Of AI: How Criminals Exploit ChatGPT

The FOX True Crime Podcast w/ Emily Compagno

Play Episode Listen Later Nov 13, 2025 33:11


ChatGPT and other artificial intelligence platforms are becoming a seemingly common part of everyday life in the digital age. Though these AI tools can be useful, they can also be exploited for criminal purposes.   Head of Faculty at the SANS Institute Rob T. Lee explains how ChatGPT can be used as a new form in evidence, and how it can help to prosecute criminals. Follow Emily on Instagram: @realemilycompagno If you have a story or topic we should feature on the FOX True Crime Podcast, send us an email at: truecrimepodcast@fox.com Learn more about your ad choices. Visit podcastchoices.com/adchoices

Post Reports
How some veterans exploit the VA disability system

Post Reports

Play Episode Listen Later Nov 6, 2025 29:48


This year, taxpayers will spend about $193 billion to compensate almost 7 million disabled veterans. Some of the conditions prevent veterans from working or doing everyday tasks – but a Post investigation found that many are receiving money for easily manageable ailments like acne, eczema and sleep apnea. Others are filing fraudulent claims to get money for conditions they either don't have or from which they've already recovered. Host Colby Itkowitz speaks with investigative reporter Craig Whitlock about the antiquated rules that have left the system vulnerable to abuse and the failed attempts to enact reform.. Today's show was produced by Sabby Robinson. It was edited by Ted Muldoon and mixed by Sam Bair. Subscribe to The Washington Post here.

Packernet Podcast: Green Bay Packers
Can Jordan Love Exploit Carolina's Weak Pass Rush for Glory?

Packernet Podcast: Green Bay Packers

Play Episode Listen Later Nov 1, 2025 55:37


Panthers Coaching Breakdown: Schemes, Stats, and Packers Matchup Insights Carolina's Offensive Vision vs. Green Bay's Defensive Reality Analyzed Team Stats Deep Dive: How Panthers Stack Up Against Packers Dive deep into the Carolina Panthers' transformation under Dave Canales and Ejiro Evero as we gear up for a pivotal matchup with the Packers. From quarterback development to defensive schemes, uncover the gaps and strengths that could decide the game at Lambeau. Tease the intrigue of emerging talents like Rico Dowdle and how Green Bay's elite pass offense might dismantle Carolina's vulnerabilities. Exploring Dave Canales' quarterback guru reputation, from Russell Wilson to Bryce Young's uneven progress, and its fit in a Shanahan-style West Coast offense aiming for balance but struggling in execution. Breaking down Ejiro Evero's Fangio-inspired 3-4 defense: zone-heavy with disguised pressures, but hampered by the league's weakest pass rush and run vulnerabilities. Key stats showdown: Packers rank top in EPA per pass while Panthers excel in rushing but falter in finishing drives—plus trade rumors and NFL notes like Miami's potential fire sale. Bold take: If Jordan Love sits comfortably in the pocket, Carolina's secondary crumbles, but blitzes could expose Green Bay's ongoing pressure issues. This episode is brought to you by PrizePicks! Use code PACKDADDY and visit https://prizepicks.onelink.me/LME0/PACKDADDY to get started with America's #1 fantasy sports app. Drop a review on your favorite platform, subscribe for more Packers breakdowns, and hit me up in the comments—what's your prediction for this Panthers clash? Tomorrow, we'll preview the weekend slate with bets and news updates. To advertise on this podcast please email: ad-sales@libsyn.com Or go to: https://advertising.libsyn.com/packernetpodcast Help keep the show growing and check out everything I'm building across the Packers and NFL world: Support: Patreon: www.patreon.com/pack_daddy Venmo: @Packernetpodcast CashApp: $packpod Projects: Grade NFL Players ➜ fanfocus-teamgrades.lovable.app Packers Hub ➜ packersgames.com Create NFL Draft Big Boards ➜ nfldraftgrades.com Watch Draft Prospects ➜ draftflix.com Screen Record ➜ pause-play-capture.lovable.app Global Economics Hub ➜ global-economic-insight-hub.lovable.app

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Thursday, October 23rd, 2025: Blue Angle Software Exploit; Oracle CPU; Rust tar library vulnerability.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Oct 23, 2025 7:28


webctrl.cgi/Blue Angel Software Suite Exploit Attempts. Maybe CVE-2025-34033 Variant? Our honeypots detected attacks that appear to exploit CVE-2025-34033 or a similar vulnerability in the Blue Angle Software Suite. https://isc.sans.edu/diary/webctrlcgiBlue+Angel+Software+Suite+Exploit+Attempts+Maybe+CVE202534033+Variant/32410 Oracle Critical Patch Update Oracle released its quarterly critical patch update. The update includes patches for 374 vulnerabilities across all of Oracle s products. There are nine more patches for Oracle s e-Business Suite. https://www.oracle.com/security-alerts/cpuoct2025.html#AppendixEBS Rust TAR Library Vulnerability A vulnerability in the popular, but no longer maintained, async-tar vulnerability could lead to arbitrary code execution https://edera.dev/stories/tarmageddon