POPULARITY
Categories
In this week's News Roundup, Bridget and Producer Mike cover the tech news stories you might have missed. Amazon’s Ring, a creepy surveillance product, ran a creepy surveillance ad during the Superbowl that triggered a massive public backlash: https://www.cnbc.com/2026/02/12/amazons-ring-cancels-flock-partnership-amid-super-bowl-ad-backlash.html Electronic Frontier Foundation explanation of why Ring is a surveillance nightmare: https://www.eff.org/deeplinks/2026/02/no-one-including-our-furry-friends-will-be-safer-rings-surveillance-nightmare-0 An online community built around fitness/dance app Supernatural is purchased and destroyed by Meta [GIFT LINK]: https://www.theverge.com/tech/871250/supernatural-meta-vr-fitness-community?view_token=eyJhbGciOiJIUzI1NiJ9.eyJpZCI6InFuZzlFUmd2VGsiLCJwIjoiL3RlY2gvODcxMjUwL3N1cGVybmF0dXJhbC1tZXRhLXZyLWZpdG5lc3MtY29tbXVuaXR5IiwiZXhwIjoxNzcwNDY2NTMzLCJpYXQiOjE3NzAwMzQ1MzN9.A67DLWY3HpNyI1PzxCMq4Mf96DELfg2belp-siH7vww&utm_medium=gift-link Marc Benioff 'Jokes' with his employees that ICE is watching them: https://www.404media.co/marc-benioff-jokes-ice-is-watching-salesforce-employees-who-traveled-to-the-u-s/ Salesforce Workers Circulate Open Letter Urging CEO to Denounce ICE: https://www.wired.com/story/letter-salesforce-employees-sent-after-marc-benioffs-ice-comments/ Body camera footage is being used to humiliate young women on YouTube: https://nymag.com/intelligencer/article/body-cam-youtube-foia-abuse.html Let us know what you think by emailing hello@tangoti.com or leaving a comment on Spotify. Follow Bridget and TANGOTI on social media! || instagram.com/bridgetmarieindc/ || tiktok.com/@bridgetmarieindc || youtube.com/@ThereAreNoGirlsOnTheInternet || bsky.app/profile/tangoti.bsky.socialSee omnystudio.com/listener for privacy information.
Send a textIn this adult themed show, tackle a sensitive subject on whether AI porn will be better for society than traditional legacy porn, because no-one is being exploited.But what do you think?Links used during the show-https://www.ticketmaster.co.uk/abba-voyage-tickets/artist/5358174What are your thoughts on this subject? Do you agree or disagree? And are there other things you feel they should have covered?Tune in and listen to the discussion; please share your feedback with us.Although we greatly prefer effusive praise
In this episode of The PDB Afternoon Bulletin: First—President Trump is sending the largest warship in the world toward Iran. The USS Gerald R. Ford will join another carrier already operating in the region as nuclear negotiations remain unresolved. We'll break down what the deployment signals, and what it could mean if talks collapse. Later in the show—The CIA is making a rare public move, releasing a recruitment video designed to turn disaffected officers inside China's military into potential informants. The campaign comes as Xi Jinping's sweeping purge exposes instability within the PLA's leadership. I'll have the details. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. YouTube: youtube.com/@presidentsdailybrief BUBS Naturals: Live Better Longer with BUBS Naturals. For A limited time get 20% Off your entire order with code PDB at https://Bubsnaturals.com Nobl Travel: NOBL gives you real travel peace of mind — security, design, and convenience all in one. Head to https://NOBLTravel.com for 46% off your entire order! #NOBL #ad DeleteMe: Get 20% off your DeleteMe plan when you go to https://joindeleteme.com/PDB and use promo code PDB at checkout. Learn more about your ad choices. Visit megaphone.fm/adchoices
The CISA Known Exploited Vulnerabilities (KEV) catalog is one of the most referenced resources in vulnerability management, but how well do security teams actually understand what it tells them? In this Brand Highlight, Tod Beardsley, Vice President of Security Research at runZero and former CISA section chief who helped manage the KEV on a daily basis, breaks down what the catalog is designed to do and, just as importantly, what it is not.What is the KEV catalog and who is it really for? The KEV is mandated by Binding Operational Directive 22-01 (BOD 22-01), which tasks CISA with identifying vulnerabilities that are known to be exploited and have an available fix. Its primary audience is federal civilian executive branch agencies, but because the catalog is public, organizations everywhere use it as a prioritization signal. Beardsley notes that inclusion on the KEV requires a CVE ID, evidence of active exploitation, a patch or mitigation, and relevance to federal interests, meaning zero-day vulnerabilities and end-of-life systems without CVEs never appear.How should organizations think about KEV entries that are not equally dangerous? Beardsley explains that only about a third of KEV-listed vulnerabilities represent straight-shot remote code execution with no user interaction and no authentication required. The rest span a wide spectrum of severity. EPSS data reveals an inverse bell curve: many KEV entries have extremely low probabilities of exploitation in the next 30 days, while others cluster at the high end with commodity exploits widely available. This means treating every KEV entry as equally critical leads to wasted effort and alert fatigue.That gap between the catalog and real-world decision-making is exactly what KEVology addresses. The research, produced by Beardsley at runZero, enriches KEV data with CVSS metrics, EPSS scores, exploit tooling indicators, and ATT&CK mappings to help security teams filter and prioritize vulnerabilities based on what actually matters to their environment. Rather than prescribing a single priority list, KEVology treats the KEV as data to be analyzed, not doctrine to be followed blindly.To make this analysis accessible and interactive, runZero built KEV Collider, a free, daily-updated web application at runzero.com/kev-collider. The tool lets defenders sort, filter, and layer multiple risk signals across the entire KEV catalog. Because every filter combination is encoded in URL parameters, teams can bookmark and share custom views with colleagues instantly. Beardsley describes KEV Collider as an evergreen companion to the research, updating automatically as new vulnerabilities are added to the catalog each week.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTTod Beardsley, Vice President of Security Research at runZeroOn LinkedIn: https://www.linkedin.com/in/todb/RESOURCESLearn more about runZero: https://www.runzero.comKEVology research report: https://www.runzero.com/resources/kevology/KEV Collider: https://www.runzero.com/kev-collider/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSTod Beardsley, runZero, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, KEVology, KEV Collider, CISA KEV, vulnerability management, exploit scoring, EPSS, CVSS, vulnerability prioritization, exposure management, BOD 22-01, known exploited vulnerabilities, cybersecurity risk, patch management Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Non solo i big dei chip beneficiano della scommessa sull'Ai. Il caso dei produttori di memory card Learn more about your ad choices. Visit megaphone.fm/adchoices
The CISA Known Exploited Vulnerabilities (KEV) catalog is one of the most referenced resources in vulnerability management, but how well do security teams actually understand what it tells them? In this Brand Highlight, Tod Beardsley, Vice President of Security Research at runZero and former CISA section chief who helped manage the KEV on a daily basis, breaks down what the catalog is designed to do and, just as importantly, what it is not.What is the KEV catalog and who is it really for? The KEV is mandated by Binding Operational Directive 22-01 (BOD 22-01), which tasks CISA with identifying vulnerabilities that are known to be exploited and have an available fix. Its primary audience is federal civilian executive branch agencies, but because the catalog is public, organizations everywhere use it as a prioritization signal. Beardsley notes that inclusion on the KEV requires a CVE ID, evidence of active exploitation, a patch or mitigation, and relevance to federal interests, meaning zero-day vulnerabilities and end-of-life systems without CVEs never appear.How should organizations think about KEV entries that are not equally dangerous? Beardsley explains that only about a third of KEV-listed vulnerabilities represent straight-shot remote code execution with no user interaction and no authentication required. The rest span a wide spectrum of severity. EPSS data reveals an inverse bell curve: many KEV entries have extremely low probabilities of exploitation in the next 30 days, while others cluster at the high end with commodity exploits widely available. This means treating every KEV entry as equally critical leads to wasted effort and alert fatigue.That gap between the catalog and real-world decision-making is exactly what KEVology addresses. The research, produced by Beardsley at runZero, enriches KEV data with CVSS metrics, EPSS scores, exploit tooling indicators, and ATT&CK mappings to help security teams filter and prioritize vulnerabilities based on what actually matters to their environment. Rather than prescribing a single priority list, KEVology treats the KEV as data to be analyzed, not doctrine to be followed blindly.To make this analysis accessible and interactive, runZero built KEV Collider, a free, daily-updated web application at runzero.com/kev-collider. The tool lets defenders sort, filter, and layer multiple risk signals across the entire KEV catalog. Because every filter combination is encoded in URL parameters, teams can bookmark and share custom views with colleagues instantly. Beardsley describes KEV Collider as an evergreen companion to the research, updating automatically as new vulnerabilities are added to the catalog each week.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTTod Beardsley, Vice President of Security Research at runZeroOn LinkedIn: https://www.linkedin.com/in/todb/RESOURCESLearn more about runZero: https://www.runzero.comKEVology research report: https://www.runzero.com/resources/kevology/KEV Collider: https://www.runzero.com/kev-collider/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSTod Beardsley, runZero, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, KEVology, KEV Collider, CISA KEV, vulnerability management, exploit scoring, EPSS, CVSS, vulnerability prioritization, exposure management, BOD 22-01, known exploited vulnerabilities, cybersecurity risk, patch management Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
THE KNICKS HAVE DONE IT AGAIN! THEY HAVE USED THE NBA RULES IN THEIR FAVOR! But this time, they exploited a loophole that normally is impossible to exploit given the nature of how it works. However, the Knicks were able to use some magic once again to make trading for Alvarado one of the easiest and low cost moves of the deadline. By making this move, NY also gained access to the buyout market with additional financial flexibility this season and during the offseason. Leon Rose COOKED with this trade... Troy Mahabir breaks all of this down! SHOW CHAPTERS: 00:00 - Intro 00:15 - Presented By FanDuel 00:38 - REAL REASON Knicks Traded For Jose Alvarado 01:29 - Knicks Use Loophole To Make Trade For Alvarado Easier 03:05 - Why Would Yabusele Amend The Contract?! 04:57 - Final Trade After All New Details Have Been Confirmed... 07:25 - Knicks Have Access To Buyout Market IMMEDIATELY! 10:15 - FanDuel UPDATED Odds For Winner Of NBA Finals 12:05 - PISTONS DESERVE TO BE EMBARRASSED! LISTEN NOW TO GET YOUR KNICKS FIX! Catch the latest special interviews, shorts, fan interactions, and more by following the show! Don't forget to turn on notifications so you don't miss another episode! Rather Watch the latest Knicks Recap episode? Catch us on YouTube here: https://www.youtube.com/@TheKnicksRecap Follow The Knicks Recap on all social media platforms! Twitter: https://twitter.com/TheKnicksRecap Instagram: https://www.instagram.com/TheKnicksRecap/ Reddit: https://www.reddit.com/u/TheKnicksRecap?utm_source=share&utm_medium=android_app&utm_name=androidcss&utm_term=1&utm_content=share_button Facebook: https://www.facebook.com/TheKnicksRecap/ Rather Listen to The Knicks Recap on a different platform? Catch us on ALL of your favorite streaming platforms: Apple Podcast: https://apple.co/3SKSl8o Spotify: https://spoti.fi/3QrEfr6 iHeart Radio: https://www.iheart.com/podcast/269-the-knicks-recap-a-new-yor-100895112/ Amazon Music: https://amzn.to/3QoZrOd Other Pod Channels: https://anchor.fm/the-knicks-recap Grab our MERCH featuring some of the graphics you've seen us create to take your Knicks fandom to the NEXT LEVEL: MAIN STORE: https://theknicksrecap.myspreadshop.com/ CashApp: $TheKnicksRecap Have a comment about the show, an interview, or a graphic idea? Reach out to The Knicks Recap on ALL SOCIAL MEDIA PLATFORMS! Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Bill and The Boston Herald's Andrew Callahan look at how the Patriots' offense matches up against the Seahawks' defense. 0:00 Welcome 2:13 Drake Maye's post-season 6:19 Where can Pats have success against Seattle''s defense? 8:27 Stefon Diggs' Impact 10:24 Patriots WR to watch 11:15 TreVeyon Henderson's usage 14:35 Will Campbell's struggles 18:19 Will the Pats be able to run the ball? 26:18 Seahawks' x-factor on defense? 31:25 Off the wall predictions 33:11 Super Bowl LX predictions Learn more about your ad choices. Visit podcastchoices.com/adchoices
durée : 00:03:29 - 100% sport, ici Mayenne - Au cœur d'une saison morose, le Stade Lavallois joue ce mercredi 4 février une affiche de gala en 8e de finale de Coupe de France. Les Tango vont défier l'Olympique Lyonnais au Groupama Stadium. Face à l'équipe en forme du moment, Laval tentera de décrocher un premier quart de finale depuis 1999. Vous aimez ce podcast ? Pour écouter tous les autres épisodes sans limite, rendez-vous sur Radio France.
In der aktuellen Folge von Breach FM sprechen Max und Robert über einen bisher weniger beachteten Cyberangriff auf dezentrale Energieerzeuger in Polen und was das für die Resilienz kritischer Infrastrukturen bedeutet. Wir ordnen den Notepad++-Supply-Chain-Vorfall ein und diskutieren, warum selbst scheinbar unscheinbare Tools ein erhebliches Risiko darstellen können. Außerdem geht es um eine bemerkenswerte Schwachstelle im AWS-Build-Prozess, die theoretisch massive Auswirkungen gehabt hätte. Ein weiteres Thema ist das von Google teilweise zerschlagene Residential-Proxy-Netzwerk und seine Rolle für Cybercrime und staatliche Akteure. Notepad++ Hijacked by State-Sponsored Hackershttps://notepad-plus-plus.org/news/hijacked-incident-info-update/Cyber Attack on Poland's Electric System 2025https://tinyurl.com/mr3ntszcAI Agents vs Humans: Who Wins at Web Hacking in 2026?https://www.wiz.io/blog/ai-agents-vs-humans-who-wins-at-web-hacking-in-2026CodeBreach: Infiltrating the AWS Console Supply Chain and Hijacking AWS GitHub Repositories via CodeBuildhttps://www.wiz.io/blog/wiz-research-codebreach-vulnerability-aws-codebuildNo Place Like Home Network: Disrupting the World's Largest Residential Proxy Networkhttps://cloud.google.com/blog/topics/threat-intelligence/disrupting-largest-residential-proxy-network?hl=en
Gaius and Germanicus turn their debate to American migration patterns, with Gaius arguing that modern elites exploit immigrants as property for cheap labor and political votes, echoing historical patterns of indentured servitude that built colonial economies. Germanicus draws comparisons to Rome, noting that the empire successfully assimilated diverse races through genuine upward mobility and citizenship pathways that created loyalty across ethnic lines. However, he warns that the Western Empire eventually collapsed when Germanic tribes entered not as individuals seeking assimilation but as unassimilated national groups maintaining separate identities and allegiances. Germanicus cautions that current policies encouraging migrants to remain culturally separate rather than integrating into the host society dangerously resemble the dynamics that fractured Rome. The pair concludes that immigration has been a neuralgic obsession throughout American history, with elites consistently exploiting immigrant labor while simultaneously fearing political insurrection from unassimilated populations.1863 DRAFT RIOTS NYC
When spiritual heroes fall, what happens to our faith—and that of our children? Financial manipulation and abuse within the church can leave deep wounds, shaking the foundation of trust and faith for entire families. In this powerful episode of Christian Parent/Crazy World, host Catherine tackles one of the most urgent and painful issues affecting Christian families today: how to respond when trusted church leaders become charlatans, using their position for financial—or even sexual—exploitation. With real-life stories, audio clips, and biblical insight, this episode equips parents to guide their children through disappointment without abandoning the truth of the Gospel. Joining Catherine is featured guest Clifton Payne Jr., pastor, writer, Hebrew University scholar, and author of What the Bible Really Says About Tithing and Giving: It’s Different Than You Think. Having left the faith for fourteen years after witnessing financial abuse firsthand, Clifton Payne Jr. brings both scholarly expertise and personal experience to this heart-wrenching discussion. What You’ll Discover in This Episode: Financial Abuse—A Widespread Scandal: Hear stories of pastors manipulating the vulnerable, including Clifton Payne Jr.’s grandmother and infamous televangelists promising “seed money” blessings for thousand-dollar gifts. Charlatans Across Denominations: It’s not just one stream of Christianity; financial and sexual misconduct strike churches everywhere—from charismatic circles to mainline denominations to the Catholic church. The Impact on Faith and Family: Discover why these betrayals don’t just hurt individuals—they threaten the faith of the next generation. Catherine lays bare how hypocrisy often drives children and parents alike away from church and sometimes, from God. Biblical Wisdom for Difficult Days: Get to the heart of the Bible’s teachings on money, tithing, and generosity. Clifton Payne Jr. strips away manipulation, revealing how God’s desire for our hearts is profoundly different from the “prosperity gospel” sales pitch. Honest Conversations at Home: Learn how to talk with your children about church scandals—without letting cynicism win. Public harm requires public correction, and as Christian parents, we are called to shepherd our homes by telling the truth. Why This Matters:This episode will challenge, grieve, and encourage you to see beyond the headlines and scandals. It’s a reminder that our faith must be rooted in Christ, not in flawed messengers. When parents grapple honestly with church failures and model God-honoring generosity, they provide children with a foundation that lasts beyond any scandal. Modern Application:Christian parents, are you prepared to shepherd your children through disappointment in the church? Are you modeling discernment, generosity, and faith that isn’t shaken by human failure? About the Guest:Clifton Payne Jr. is a pastor, writer, and biblical scholar with advanced study at the Hebrew University in Jerusalem. His experiences with church financial abuse and long journey back to faith uniquely equip him to address manipulative money tactics and help families find biblical clarity in confusing times. His book, What the Bible Really Says About Tithing and Giving: It’s Different Than You Think, is available on Amazon and other major booksellers. EPISODE LINKS: Clifton Payne Jr.’s Book: What the Bible Really Says About Tithing and Giving: It’s Different Than You Think Subscribe to Catherine's resources for Christian parents on her website. Mike Winger’s Expose on Shawn Bolz & Bethel Church: The Skeletons in Bethel’s Closet Are Now Going to Speak Televangelists: Last Week Tonight with John Oliver Call to Action:How are you preparing your children to discern truth in a world full of spiritual counterfeits? What honest conversations could you start this week—even in the face of heartbreak—to root their faith in Jesus, not fallen heroes? Tune in next week as Catherine and Clifton Payne Jr. dig deeper into what the Bible really teaches about tithing and giving—setting your family free from confusion and manipulation. Discover more Christian podcasts at lifeaudio.com and inquire about advertising opportunities at lifeaudio.com/contact-us.
Lucas & Hersch from World Markets joins us to break down why crypto trading infrastructure is fundamentally broken: how fully onchain order books, unified risk engines, and capital-efficient design could reshape perps trading. Chapters: 0:02 Intro & guest background 1:28 From exchanges to hedge funds 3:26 Monad vs MegaETH decision 5:00 Why L2s beat L1s for trading 6:49 DeFi security flaws explained 10:29 How onchain traders find alpha 18:01 What World Markets actually is 21:59 1010 Crash explained 28:13 Why centralized exchanges fail 47:48 The 50% basis trade example 53:00 Hersch finally gets to speak The Gwart Show is sponsored by Ellipsis Labs. Ellipsis Labs builds the most efficient on-chain markets. Their orderbook and Prop AMM products have delivered price improvement to hundreds of billions of dollars in retail volume. Now, they are bringing their expertise to build Phoenix, the best on-chain perpetuals platform. Ellipsis Labs is hiring New York-based engineers. If you're an engineer looking to work with a proven team in making DeFi better, go to ellipsislabs dot xyz slash careers. Learn more about your ad choices. Visit megaphone.fm/adchoices
Send us a textMost football traders assume Betfair has the goal markets nailed.The odds move. The clock ticks. The prices “must” be right.But that assumption is where most traders go wrong.In this episode, I break down how Betfair actually prices goals, why time decay plays a bigger role than real match pressure, and where the market consistently lags behind what's happening on the pitch.You'll learn:How goal prices are really formed pre-match and in-playWhy 0–0 scorelines often create false valueHow pressure, xG, and big chances expose mispriced marketsWhy profitable traders bet against bad pricing, not outcomesThis is essential viewing if you trade:Over goals marketsLay the DrawLate goal strategiesAnd if you want to stop guessing and start trading with evidence, I'll also show you how to use data to turn these ideas into a repeatable edge.Support the showTwitter: @BetfairTCWebsite: https://betfairtradingcommunity.com/en/Facebook: https://www.facebook.com/betfairtradingcommunity
Pas de temps de s'échauffer, les "Grandes Gueules du Sport" démarrent fort dès 9h30 : la UNE c'est l'actu brûlante du sport, entre infos, analyses et débats.
This is the thirty-seventh episode in the Crypto Hipster's Curtain Calls Series, which includes 3–4-minute clips from Seasons 6-8. This compilation draws upon my conversations with:Casey Grooms, co-founder @ Soulbound (8/13/2024, Season 7)Ryan Davis, founder @ People First (6/3/2025, Season 8)Kelsey McGuire, Chief Growth Officer @ Shardeum (5/25/2024, Season 7)Jaime Schwarz, founder @ MRKD (4/4/2024, Season 8)
Jome built a marketplace for new construction homes by solving a transparency problem most people don't know exists: the vast majority of new builds never appear on Zillow, Redfin, or traditional MLS systems. In this episode of BUILDERS, I sat down with Dan Hnatkovskyy, CEO and Co-Founder of Jome, to unpack how he identified a massive category gap during Austin's pandemic housing boom and scaled from scraping builder websites to partnering with 1,700+ builders including 92 of the top 100. Dan shares the specific market moments that unlocked builder partnerships, how he discovered Google's separate product category for new construction, and why early LLM traffic became a meaningful acquisition channel. Topics Discussed: Why IDX feeds and MLS requirements systematically exclude new construction inventory The three market inflection points that accelerated builder partnerships from 500 to 1,500+ in 12 months How Google's separate new construction product category created an arbitrage opportunity against brand-focused builders The manual MVP: Typeform + text message delivery before building any real product Why the mortgage rate lock-in effect (50%+ of mortgages under 3.5% vs 6-7% prevailing rates) compounds the housing shortage Accidentally discovering ChatGPT and Perplexity were driving closed transactions through analytics instrumentation The decision to optimize entirely for buyers despite builders being the sole revenue source GTM Lessons For B2B Founders: Map structural exclusions in existing distribution systems: New construction homes can't enter MLS because they often lack finished addresses, real images, or completed properties—requirements designed for resale homes. This structural incompatibility created a $400B+ blind spot. Dan didn't just find underserved customers; he identified a category systematically locked out of dominant distribution. B2B founders should analyze whether incumbent platforms have structural requirements that exclude segments of the market, not just underserve them. Exploit paid search category mismatches between buyer intent and seller behavior: Dan discovered Google maintains separate product categories for new construction versus resale homes. Zillow and Redfin competed intensely in resale, but new construction was dominated by individual builders (Lennar, DR Horton) who assumed brand-driven intent—similar to car manufacturers. The reality: buyers search "new construction homes in Austin," not "Lennar homes." This category/behavior mismatch created immediate arbitrage. B2B founders should audit whether buyers search by problem/outcome while incumbents bid on brand terms, creating white space for aggregators. Time enterprise outreach to industry stress events, not product readiness: Jome scaled from 500 to 1,500 builders in one year by capitalizing on three specific moments: (1) pandemic demand surge when builders needed millennial/Gen Z reach, (2) 2022 quantitative tightening when builders feared demand collapse, (3) Zillow's 2023 policy change excluding builders with under 10 communities. Dan didn't wait for product-market fit—he mapped when prospects would be most receptive to any solution. B2B founders should create a calendar of industry stress events (regulatory changes, market corrections, competitor policy shifts) and time outreach to these windows regardless of product maturity. Instrument conversion funnels to detect emergent channels before consensus forms: Jome discovered meaningful lead volume and closed transactions from ChatGPT and Perplexity through analytics, not strategy. Only after seeing the data did they experiment with what Dan calls "reinforcement learning with LLMs"—promoting positive results to train the models. This wasn't about SEO or prompt engineering; it was about measurement infrastructure that surfaced signal before the channel was obvious. B2B founders should track referral sources at the closed deal level, not just top-of-funnel, to catch emerging platforms while unit economics are still favorable. Manually deliver value at zero margin before building product: Before any integrations or platform, Jome ran Google Ads to a Typeform, manually created searches in their agent-facing tool, and texted results to buyers. Dan's framework: "Start with manually creating value...and then step by step, improve it, automate it, make it more efficient." He launched this on a personal credit card and got immediate signal. B2B founders should resist the urge to build scalable product until they've proven someone will pay for (or convert on) manual delivery of the outcome. Optimize for the non-paying side when you're building a two-sided marketplace: Despite 100% of revenue coming from builder commissions, every product decision optimizes for buyer experience. Dan's logic: "If we want to bring value to the builders...we need to start with the buyers. We need to create the best possible home buying journey." This isn't idealism—it's recognition that in transaction-based models, buyer liquidity determines builder participation. B2B founders in marketplace businesses must identify which side is supply-constrained and build obsessively for the other side. // Sponsors: Front Lines — We help B2B tech companies launch, manage, and grow podcasts that drive demand, awareness, and thought leadership. www.FrontLines.io The Global Talent Co. — We help tech startups find, vet, hire, pay, and retain amazing marketing talent that costs 50-70% less than the US & Europe. www.GlobalTalent.co // Don't Miss: New Podcast Series — How I Hire Senior GTM leaders share the tactical hiring frameworks they use to build winning revenue teams. Hosted by Andy Mowat, who scaled 4 unicorns from $10M to $100M+ ARR and launched Whispered to help executives find their next role. Subscribe here: https://open.spotify.com/show/53yCHlPfLSMFimtv0riPyM
durée : 00:42:24 - Le mag du rugby au Pays basque : Aviron Bayonnais, Biarritz Olympique et clubs amateurs de fédérale - Ce week-end, l'Aviron Bayonnais ira défier le champion de France en titre, le Stade Toulousain, pour tenter un exploit et se relancer dans la course au top 6. De son côté, le Biarritz Olympique cherchera à renouer avec la victoire en Pro D2 à domicile contre Grenoble dans un duel de bas de tableau. Vous aimez ce podcast ? Pour écouter tous les autres épisodes sans limite, rendez-vous sur Radio France.
HOUR 2: Reality shows tend to exploit the worst in people. Why are we so infatuated by them? full 2203 Wed, 28 Jan 2026 21:00:00 +0000 bcUZ74gvLcbb2hHvIxqLSBbKzgNv5sJN news The Dana & Parks Podcast news HOUR 2: Reality shows tend to exploit the worst in people. Why are we so infatuated by them? You wanted it... Now here it is! Listen to each hour of the Dana & Parks Show whenever and wherever you want! © 2025 Audacy, Inc. News False
On this episode, I cover more Windows Update fallout news, information on recent out-of-band patches for Office, the latest AI news and much more! Reference Links: https://www.rorymon.com/blog/out-of-band-patches-released-app-v-script-utilized-in-exploit-win11-boot-errors/
Le sujet fort de l'actualité foot du jour vu par Jérôme Rothen et la Dream Team.
Can the Nets take down the Clippers? Does Traore get a start? Can the Nets exploit Harden's defense? Find out here with Thomas Leuthner Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Thursday, January 22, 2026 An internal ICE memo signed by acting director Todd Lyons authorized immigration officers to forcibly enter a person's home to arrest someone with a final order of removal using only an administrative warrant; House Democrats helped Republicans pass a Homeland Security funding bill that includes $10 billion for ICE; JD Vance said Minneapolis would be "less chaotic" if state and local officials would "cooperate" with the Trump administration on immigration enforcement; the Trump administration ordered most federal agencies to review funding sent to 14 Democratic-led states and Washington, D.C.; no written documentation memorializing Trump's verbal "framework" deal with NATO about Greenland exists; Trump sued JPMorgan Chase and its CEO Jamie Dimon for $5 billion; Former special counsel Jack Smith testified publicly before the House Judiciary Committee, saying his investigation produced “proof beyond a reasonable doubt” that Trump “engaged in criminal activity” and that “no one should be above the law in our country”; 49% of voters say the country is worse off than a year ago and 56% disapprove of Trump's overall job performance; and Trump said he's expanding his defamation lawsuit against the New York Times after an unfavorable public opinion poll. Read more: Day 1829: "Exploit the violence." Subscribe: Get the Daily Update in your inbox for free Feedback? Let us know what you think
Ecoutez Vous allez en entendre parler avec Tom Lefevre du 23 janvier 2026.Hébergé par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.
In this episode of The Good Grief Podcast, hosts Pete Waggoner and Michael O'Connell sit down with St. Croix County Sheriff Scott Knutson to talk about a growing threat facing older adults: scams that prey on kindness, trust, and fear.From grandparent scams and fake tech support calls to government impersonators and gift card fraud, Sheriff Knutson shares real-world examples from his thirty years in law enforcement. The conversation explores why these crimes are so hard to track, why many victims never report them, and how families can take practical steps to protect their loved ones.This episode is about awareness, education, and breaking the silence around scams so fewer families are harmed.
The trucking market is defying the typical post-holiday slump, with data showing high tender rejections instead of the usual January hangover. Rapid inventory contraction suggests shippers may soon rush to restock, keeping spot rates elevated. However, this boom attracts "chameleon carriers" who utilize magnetic placards to swap identities and bypass safety regulations. Industry experts warn that recent federal notices downplay the severity of this rampant carrier identity theft The problem is exacerbated by the rise of instant-issue insurance platforms, which have removed critical barriers to entry for dangerous operators. This lack of vetting coincides with a surge in nuclear verdicts, leaving the public exposed due to outdated [federal liability minimums]. Financial volatility is also hitting large asset-based carriers, leading the R&R Family of Companies to divest its logistics units to the CJK Group. This sale comes on the heels of the [sudden shutdown of Taylor Express], highlighting liquidity issues in the sector. Competition is heating up elsewhere as the U.S. Postal Service begins soliciting bids from retailers to fill their last-mile delivery networks. By selling reserved capacity, the agency intends to [challenge private carriers] for e-commerce volume. Innovation continues to reshape the landscape, demonstrated by autonomous railcars in Michigan that operate without traditional locomotives. This technology promises to make short-haul rail profitable, potentially luring freight away from trucks. Follow the FreightWaves NOW Podcast Other FreightWaves Shows Learn more about your ad choices. Visit megaphone.fm/adchoices
The trucking market is defying the typical post-holiday slump, with data showing high tender rejections instead of the usual January hangover. Rapid inventory contraction suggests shippers may soon rush to restock, keeping spot rates elevated. However, this boom attracts "chameleon carriers" who utilize magnetic placards to swap identities and bypass safety regulations. Industry experts warn that recent federal notices downplay the severity of this rampant carrier identity theft The problem is exacerbated by the rise of instant-issue insurance platforms, which have removed critical barriers to entry for dangerous operators. This lack of vetting coincides with a surge in nuclear verdicts, leaving the public exposed due to outdated [federal liability minimums]. Financial volatility is also hitting large asset-based carriers, leading the R&R Family of Companies to divest its logistics units to the CJK Group. This sale comes on the heels of the [sudden shutdown of Taylor Express], highlighting liquidity issues in the sector. Competition is heating up elsewhere as the U.S. Postal Service begins soliciting bids from retailers to fill their last-mile delivery networks. By selling reserved capacity, the agency intends to [challenge private carriers] for e-commerce volume. Innovation continues to reshape the landscape, demonstrated by autonomous railcars in Michigan that operate without traditional locomotives. This technology promises to make short-haul rail profitable, potentially luring freight away from trucks. Follow the FreightWaves NOW Podcast Other FreightWaves Shows Learn more about your ad choices. Visit megaphone.fm/adchoices
Security researchers Dor Attias and Ofek Itach demonstrate a critical CVSS 10.0 n8n vulnerability (CVE-2026-21858). Watch the full RCE exploit demo using type confusion to bypass authentication and read sensitive local files. // Dor Attias SOCIAL // LinkedIn: / dor-attias-740758155 // Ofek Itach SOCIAL // LinkedIn: / ofek-it // N8N Hack Blog https://www.cyera.com/research-labs/n... // Cyera Blog // https://www.cyera.com/blog // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:56 - n8n vulnerability explained 02:33 - n8n hacking demo // How the vulnerability works 09:13 - How bad is it? 11:51 - Vulnerability summary 13:28 - More explained on Cyera blog // Webhooks 16:59 - Webhooks explained 18:09 - Formidable 19:18 - Formidable explained 20:01 - Handling uploaded files in n8n 22:32 - The form webhook node 24:28 - How to exploit 25:54 - Exploit summary 26:46 - How to mitigate 27:37 - How to become a security researcher 32:36 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.
Podcast SEO and monetization strategies tailored for local businesses is today's episode discussion. Favour Obasi-ike emphasizes the importance of metadata, noting that elements like podcast titles, descriptions, and author names serve as critical search signals for discovery.By treats these fields as structured data, creators can establish local authority and ensure their content surfaces in specific user queries across platforms like Spotify and Apple Podcasts.The source further highlights the compounding value of backlinking, explaining how consistent episode releases create a vast network of searchable links that drive traffic back to a brand's website. Ultimately, the text argues that a well-optimized podcast acts as a long-term intellectual property asset that builds credibility and solves audience problems through searchable, evergreen audio content.In the 2026 search ecosystem, local visibility is no longer a matter of chance; it is a matter of engineering. This episode serves as a strategic blueprint for local businesses to command "page dominance" by transforming audio content into a high-authority digital asset. By deploying a "spread map" strategy—scaling influence from local roots to international authority—business owners can ensure their brand is the definitive answer to specific consumer queries.The objective is to move beyond the "hobbyist" mindset and treat podcasting as a capital-efficient SEO machine. We explore how to build an "engine" that runs independently via technical metadata and RSS syndication, allowing your brand to reside permanently in the search database.Key Takeaways for Local Business Owners1. Metadata is Your Search ID: Your title, author field, and description must match the exact phrases your customers use. If your "ID" doesn't match the search query, the algorithm cannot process your "legal documents," and your business remains invisible.2. Exploit the 50x50 Rule: Syndication is a volume game. By appearing on 50 platforms, you create thousands of high-authority backlinks. This sheer volume of structured data makes your brand unavoidable in local searches.3. Implementation over Information: ROI is the result of action, not note-taking. Podcasting is a long-term index fund for your brand; the earlier you start the "audio documentation," the more interest your digital legacy accrues. Move from "doer" to "architect" today.Need to Book An Appointment?>> Book a Complimentary SEO Discovery Call with Favour Obasi-Ike>> Visit Work and PLAY Entertainment website to learn about our digital marketing services>> Join our exclusive SEO Marketing community>> Read SEO Articles>> Subscribe to the We Don't PLAY Podcast>> Purchase Flaev Beatz Beats OnlinePodcast Timestamps[00:00:00] – The Spread Map: Establishing the strategic journey from local business to international brand authority.[00:03:00] – Statistical Authority: Reviewing personal benchmarks (600 episodes, 156 countries) as a model for growth.[00:06:00] – The Harry Potter Paradox: Why naming your show for the "benefit" is the only way to be found before you are famous.[00:10:00] – The Psychology of Blue Links: Why "Blue Links" signify trust and confidence in the search results.[00:14:00] – Spotify Signal Case Study: Using the phrase "workout habits for men over 40" to identify exact-match search signals.[00:22:00] – Compounding Link Math: The 50x50 breakdown of how to generate 2,500 links across platforms like SiriusXM and iHeart.[00:31:00] – The Celese Interaction: Overcoming ADHD and task-paralysis by choosing documentation over perfection.[00:45:00] – The Legacy Challenge: Transitioning from a task-based worker to a legacy-based brand architect.The Mathematics of Syndication & The "Compounding Effect"Strategic dominance is a function of Depth and Cadence. While frequency is important, "Depth" is determined by your average episode length. A 60-minute episode provides sixty times more data points for an algorithm to index than a one-minute clip.The true ROI of podcasting is found in the Compounding Link Formula:50 Episodes (One year of weekly audio documentation) x 50 Distribution Platforms (Apple, Spotify, SiriusXM, Podchaser, Castbox, iHeart, etc.) = 2,500 High-Authority BacklinksThis volume creates a "digital balloon that never pops." As you add more helium (content), the structure becomes stiffer and more secure. To maximize this, maintain a Cadence (release cycle) closer to "1" (daily). A faster cadence spins the RSS feed more frequently, signaling to search engines that your brand is an active, relevant authority.The following 15 monetization levers are the tactical parameters required to convert conversational documentation into long-term ROI and a lasting digital legacy.Episode Breakdown on the 15 Monetization StrategiesPART 1: CORE DISCOVERY METADATA (Your Digital ID Card)1. Podcast TitleExecution: Match the show name to the specific topic or core benefit your audience seeks.So What? Listeners search for solutions and interests, not your name. A descriptive title ensures discoverability in search before you have a famous brand.2. Podcast DescriptionExecution: Exploit the full ~4,000-character limit as a "Search Bank." Use refined keywords, clear value propositions, and a strong call-to-action.So What? This is your show's primary Search ID. If it doesn't match user queries, algorithms can't "read" or rank your content effectively.3. Author/Host FieldExecution: Strategically expand your name with professional identifiers (e.g., "Alex Chen | Venture Capital Analyst").So What? This data feeds APIs and LLMs, establishing your niche authority within recommendation systems and digital assistants.4. Genre & Category SelectionExecution: Use platform hierarchies (e.g., ListenNotes, Apple) to select precise Primary, Secondary, and Tertiary categories.So What? Correct categorization moves you from competing with millions of general shows to dominating a specific, interested listener ecosystem.5. Episode TitleExecution: Adopt a clear, "Guest-First" or "Topic-First" naming convention (e.g., "Dr. Sarah Lee: The Neuroscience of Sleep").So What? It maximizes clarity for listeners and SEO. A guest's name at the front captures their audience and amplifies "link juice" to that episode URL.6. Episode DescriptionExecution: Implement web-style formatting: use H2/H3 headers, bullet points, timestamps, and hyperlinks to key resources.So What? Structured data helps both listeners scan and bots "dissect" your content, boosting engagement metrics and canonical linking power.PART 2: VISUAL & TECHNICAL EXECUTION7. Podcast Cover ArtExecution: Command professionalism with compliant, 3000 x 3000 pixels, visually simple art that is legible at thumbnail size.So What? High-quality, optimized art provides an immediate competitive edge against the significant portion of shows using amateur visuals.8. Episode Cover Art (Optional but Powerful)Execution: For key interviews, create guest-centric visuals that differ from your main show art.So What? Visual differentiation in a subscriber's feed signals unique, fresh value, increasing click-through rates for specific high-interest topics.9. Ad Roll PlacementsExecution: Strategically engineer ad breaks: pre-roll (for direct response), mid-roll (for highest attention), post-roll (for brand storytelling).So What? These are primary monetization vehicles. Placement affects listener retention and ad performance by capturing attention at different psychological stages.10. RSS Feed ManagementExecution: Balance your public RSS feed with private, gated feeds (via platforms like Hello Audio or Supercast) for bonus or premium content.So What? Private feeds enable direct community monetization and foster loyalty by delivering exclusive, "trust-based" content to high-value subscribers.PART 3: DISTRIBUTION & AMPLIFICATION11. Email & Affiliate LeverageExecution: Use automated tools to turn podcast transcripts into newsletter content that drives traffic to affiliate offers or key resources.So What? This captures high-intent listeners where they live (their inbox), converting passive listening into measurable action.12. Social Media DistributionExecution: Systematically cross-post short, thematic audio clips (with captions and video) to platforms like LinkedIn and Instagram.So What? It transforms one hour of recording into weeks of "top-of-funnel" awareness, building connection volume and attracting new audiences.13. Backlink GenerationExecution: Understand that every major hosting platform (Spotify, Apple) creates a backlink to your website from your show profile.So What? This generates vital "link juice" from high-authority domains, strengthening your primary website's search engine ranking.14. Website Integration & AnalyticsExecution: Host a dedicated podcast page on your site and connect it to Google Search Console.So What? This allows you to track how people find and interact with your podcast via search, providing data to refine your topic and keyword strategy.15. Sonic Branding (Musical Intelligence)Execution: Deploy a distinct instrumental theme for each season or series.So What? A fresh sonic identity signals a new "era" or focus for your show, boosting production value and maintaining listener retention through auditory novelty.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
(Presented by Material Security (https://material.security): We protect your company's most valuable materials -- the emails, files, and accounts that live in your Google Workspace and Microsoft 365 cloud offices.) Three Buddy Problem - Episode 81: We dissect New York Times reporting on the "precision" of US cyber operations in Venezuela, the competing narratives around offensive cyber capabilities and "letters of marque" for private hackers. Plus, a mysterious failed cyber attack on Poland's power grid, internet blackouts in Iran (with fascinating DNS telemetry revealing Chinese bank traffic and Russian website spikes), and news of China's ban on US/Israeli cybersecurity software. We also cover Check Point's research on "VoidLink" (is it a successor to ShadowPad?), Microsoft's threat intelligence sharing practices, and Google Project Zero's disclosure of zero-click vulnerabilities caused by AI-powered transcription features. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).
Get your free $50 Bet here: https://prizepicks.onelink.me/ivHR/SAL2310 NFL Bets You Must Exploit for The Divisional Round(Data source credits: Fantasy Life - Player Profiler - PFF)
David Rothkopf joins Joanna Coles for a blistering, darkly funny tour through what they argue is the accelerating late stage of Donald Trump: a president who can't hold a thought, wanders off mid-meeting, and yet is being weaponized by Stephen Miller, Marco Rubio, JD Vance, and others to push extreme agendas at breakneck speed. Along the way, they unpack Democratic paralysis, early signs of Republican and corporate peeling away, the politics of immigration as it tips from winning issue to liability, and why the real fight now is about stopping the madness before the midterms—plus, because it's 2026, a detour into Doritos, Hollywood finally finding its voice again, and the Melania movie as protest art. Hosted on Acast. See acast.com/privacy for more information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
n8n supply chain attack Malicious npm pagackages were used to attempt to obtain user OAUTH credentials for NPM. https://www.endorlabs.com/learn/n8mare-on-auth-street-supply-chain-attack-targets-n8n-ecosystem Gogs 0-Day Exploited in the Wild An at the time unpachted flaw in Gogs was exploited to compromise git repos. https://www.wiz.io/blog/wiz-research-gogs-cve-2025-8110-rce-exploit Telegram Proxy Link Abuse Telegram proxy links have been abused to deanonymize users https://x.com/GangExposed_RU/status/2009961417781457129
Moins flamboyant dans le jeu depuis plusieurs semaines et moins impressionnant physiquement, le PSG a laissé filer son premier titre de la saison en étant éliminé en 16es de finale de la Coupe de France, puni également par le retour de son inefficacité. Cette défaite face au voisin du Paris FC (1-0) et cette élimination si tôt dans la compétition - une première depuis 12 ans - matérialise une période moins faste pour les champions d'Europe, qui sont sur un fil ces derniers temps. Déjà la semaine dernière lors du Trophée des champions, les Parisiens avaient arraché au bout du temps additionnel (95e) la séance de tirs au but et la victoire face à l'OM (2-2, tab 4-1), surtout grâce à leur force mentale. Au cours du match, les coéquipiers de Marquinhos avaient souvent été gênés par les Marseillais, contre qui ils s'étaient déjà inclinés en début de saison en Ligue 1 (1-0). Face au Paris FC il y a huit jours en championnat (2-1), ils n'ont également jamais réussi à se mettre totalement hors de danger. Cela a été le cas aussi à Metz avant la trêve hivernale (3-2) et en Ligue des champions contre l'Athletic Bilbao (0-0) trois jours avant.Hébergé par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.
Donald Trump's greatest danger has never been his intelligence or strategy — it's his emptiness. Easily distracted, endlessly flattered, and driven by grievance rather than principle, Trump has become the ideal vehicle for forces far more disciplined and extreme than he is. This video breaks down how Trump's chaos creates an opening for figures like Stephen Miller, the architect of the administration's ethnonationalist agenda, and Elon Musk, whose oligarchic power and reactionary politics increasingly shape public life. Together, ideology and concentrated wealth exploit a hollow presidency to dismantle democratic norms, international law, and the postwar world order. Independent media has never been more important. Please support this channel by subscribing here: https://www.youtube.com/channel/UCkbwLFZhawBqK2b9gW08z3g?sub_confirmation=1 Join this channel with a membership for exclusive early access and bonus content: https://www.youtube.com/channel/UCkbwLFZhawBqK2b9gW08z3g/join Buy Anthony's microphone: https://kellards.com/products/electro-voice-re20-broadcast-announcer-microphone-black-bundle-with-mic-shockmount-broadcast-arm Buy Anthony's black t'shirt: https://www.uniqlo.com/us/en/products/E455365-000/00?colorDisplayCode=09 Five Minute News is an Evergreen Podcast, covering politics, inequality, health and climate - delivering independent, unbiased and essential news for the US and across the world. Visit us online at http://www.fiveminute.news Follow us on Bluesky https://bsky.app/profile/fiveminutenews.bsky.social Follow us on Instagram http://instagram.com/fiveminnews Support us on Patreon http://www.patreon.com/fiveminutenews You can subscribe to Five Minute News with your preferred podcast app, ask your smart speaker, or enable Five Minute News as your Amazon Alexa Flash Briefing skill. CONTENT DISCLAIMER The views and opinions expressed on this channel are those of the guests and authors and do not necessarily reflect the official policy or position of Anthony Davis or Five Minute News LLC. Any content provided by our hosts, guests or authors are of their opinion and are not intended to malign any religion, ethnic group, club, organization, company, individual or anyone or anything, in line with the First Amendment right to free and protected speech. Learn more about your ad choices. Visit megaphone.fm/adchoices
Protestors and democrat mouthpieces turn up the heat on the unnecessary death of a motorist who tried to run over an ICE agent in Minneapolis. But she wasn't an innocent victim by any stretch. Eric Swalwell proves the F word is the democrats' new secret weapon to sound tough. Doxxing ICE agents and showing up at their homes won't end well for activists, warns an Iraq war veteran named Carl Higbie.
How many time do you plan to write in the wrong year before the next episode of the Campus Comics Cast? Who is even still writing dates? Timestamps: 00:00:00 Opening Music 00:00:10 Intro 00:02:28 Listener Feedback 00:06:40 Next Phase catalog start 00:09:25 DC 00:31:08 Image 00:49:04 Panels catalog start 00:52:58 Panels Highlights 01:01:45 Marvel 01:15:04 Next Episode 01:15:47 Outros 01:16:30 Stingers When was the last time a comic book catalog actually surprised you—and made you rethink what you're pre-ordering for the next two months? This episode dives into the latest Next Phase and Panels catalogs, helping you sort through a lighter-than-usual slate of publishers, movie tie-ins, and stealth reprints so you can focus your budget on the issues that are actually worth your pull list. Whether you are juggling limited shelf space, trying to spot the next hot key issue, or just want more fun reads and fewer regrets, the discussion gives you a curated roadmap instead of 500 pages of guesswork. Discover which new series (like tech‑thriller Exploit and narcoleptic-mystery Narco) are most likely to deliver fresh, satisfying reads instead of forgettable #1s. Learn which anniversary and legacy-style issues (such as Green Lantern #600 and Moonstar #1) might matter long-term for collectors, and which “first appearance” claims are more marketing than milestone. Get practical guidance on where to spend and where to skip—across Marvel, DC, Image, Mad Cave, IDW, and more—so your pre-orders match your actual reading tastes. Hit play now to hear the full catalog walk-through and lock in your smartest pre-order choices before final order cutoff sneaks up on you.
Cameron Gilbert of Browns Valley and Michael Hubbard of Olivehurst were charged with numerous wildlife violations. Gilbert pleaded guilty to felony animal abuse, unlawful spotlighting, using dogs to hunt bear, and hunting without a license. Hubbard pleaded no contest to misdemeanor animal abuse, hunting bear with dogs, and unlawful possession of wildlife. On January 9th, Rise Gold will go before the Nevada County Superior Court to argue that it has vested rights to work the Idaho-Maryland mine.Scammers are targeting the family members of people incarcerated at Wayne Brown Correctional Facility using the Sheriff's Jail Media Report Page
Get your free $50 here: https://prizepicks.onelink.me/ivHR/SAL2310 Players with HUGE Money Incentives to Exploit in Week 18 (must take bets)(Data source credits: Fantasy Life - Player Profiler - PFF)
Cybersecurity Today: MongoDB Vulnerability 'Mongo Bleed' Exploited, Rainbow Six Siege Hacked, Trust Wallet Compromise, and GrubHub Crypto Scams In this episode of Cybersecurity Today, David Shipley covers significant cybersecurity incidents that occurred over the holiday period. The major topics include the 'Mongo Bleed' vulnerability in MongoDB that was disclosed and then publicly exploited on Christmas Day, leading to potential data leaks. Ubisoft's Rainbow Six Siege faced a breach enabling attackers to manipulate in-game functions and distribute billions worth of in-game currency for free. Trust Wallet's browser extension was compromised, resulting in a loss of approximately $7 million in cryptocurrencies. Finally, a phishing scam using a legitimate GrubHub subdomain to promise fake Bitcoin rewards was also discussed. Immediate actions and preventive updates were highlighted for all these incidents. 00:00 Introduction and Sponsor Message 00:48 Mongo Bleed Vulnerability Exploit 04:10 Rainbow Six Siege Breach 08:13 Trust Wallet Extension Hack 10:30 GrubHub Bitcoin Scam 12:02 Conclusion and Sign-Off
Active exploitation of Fortinet VPN bypass utility observed Google possibly allowing users to change default gmail address June Aflac attack resulted in data theft Thanks to our episode sponsor, ThreatLocker Want real Zero Trust training? Zero Trust World 2026 delivers hands-on labs and workshops that show CISOs exactly how to implement and maintain Zero Trust in real environments. Join us March 4–6 in Orlando, plus a live CISO Series episode on March 6. Get $200 off with ZTWCISO26 at ztw.com. Find the stories behind the headlines at CISOseries.com
Trust Wallet suffers an exploit on its browser extension. Aave DAO rejects an alignment proposal. Uniswap approves UNIfication. And Ethereum fellows publish a paper on Speedy Secure Finality. Read more: https://ethdaily.io/850 Sponsor: Arkiv is an Ethereum-aligned data layer for Web3. Arkiv brings the familiar concept of a traditional Web2 database into the Web3 ecosystem. Find out more at Arkiv.network Content is for informational purposes only, not endorsement or investment advice. The accuracy of information is not guaranteed.
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Week 16 is upon us and it's time for another edition of 'The Fantasy Film Room' with Matt Harmon and Nate Tice. The dynamic duo identify matchups that have them stressed in Week 16. Tice also provides 'fantasy watch guide' for the top prospects in this year's CFP. The two then preview a massive divisional TNF matchup between the Los Angeles Rams and Seattle Seahawks. Joel Smyth then joins the show to share his 5 players that you need to keep an eye on in fantasy this weekend.(3:30) - Fantasy Fallout: Tua benched in Miami, Quinn Ewers takes over as QB1(17:30) - Fantasy Film Room: Matchups we are STRESSED about in Week 16 (18:30) - Lions WRs vs. Steelers DBs (29:10) - Chargers WRs vs. Cowboys defense (35:40) - Terry McLaurin vs Quinyon Mitchell (39:25) - Cowboys WRs vs. Chargers DBs(46:25) - Jaguars WRs vs. Broncos DBs(51:20) - CFP fantasy prospects to know(1:07:40) - TNF preview: Rams @ Seahawks(1:18:15) - Buzz is Building: 5 players to watch in Week 16 Subscribe to the Yahoo Fantasy Forecast on your favorite podcast app:
The Pittsburgh Steelers are preparing for the Detroit Lions in Week 16, and this huge AFC vs. NFC showdown certainly has a lot of attention as both 8-6 teams are looking to solidify their spot in the NFL Playoff Picture. What are the matchups the Steelers can exploit vs. the Lions? Join Andrew Wilbar and Corey Eckenroth on the latest Steelers Fix podcast which comes courtesy of the Steel Curtain Network and the Fans First Sports Network. For a limited time, visit AuraFrames.com and get $35 off Aura's best-selling Carver Mat frames by using promo code STEELCURTAIN at checkout. Check out our exclusive 20% off deals with Hyper Natural, Big Fork Brands, and Strong Coffee Company HERE Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on. https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Command%20Injection%29/32554 React2Shell: Technical Deep-Dive & In-the-Wild Exploitation of CVE-2025-55182 Wiz has a writeup with more background on the React2Shell vulnerability and current attacks https://www.wiz.io/blog/nextjs-cve-2025-55182-react2shell-deep-dive Notepad++ Update Hijacking Notepad++ s vulnerable update process was exploited https://notepad-plus-plus.org/news/v889-released/ New macOS PackageKit Privilege Escalation A PoC was released for a new privilege escalation vulnerability in macOS. Currently, there is no patch. https://khronokernel.com/macos/2024/06/03/CVE-2024-27822.html
Week 15 is upon us and it's time for another edition of 'The Fantasy Film Room' with Matt Harmon and Nate Tice. The dynamic duo identify guys having good season on bad teams you need in the fantasy playoffs. The two also preview a divisional TNF matchup between the Atlanta Falcons and Tampa Bay Buccaneers. Joel Smyth then joins the show to share his 5 players that you need to keep an eye on in fantasy this weekend.(1:00) - Diamonds in the Rough Offenses Pt. 1: Browns, Saints, Giants(39:00) - Diamonds in the Rough Offenses Pt. 2: Commanders, Bengals, Dolphins(1:01:15) - TNF Preview: Falcons @ Buccaneers(1:13:20) - Buzz is Building with Joel Smyth Subscribe to the Yahoo Fantasy Forecast on your favorite podcast app:
Sanctions Hit Russian Economy Hard as Middlemen Charge Massive Premiums for Imports and Demand Huge Energy Discounts — Michael Bernstam — Bernstam details how countries including China and Turkey exploit Russia's economic isolation through sanctions. China demands oil discounts of up to $19 per barrel while simultaneously charging an 87% premium for manufactured goods exported to Russia. This arbitrage mechanism has contributed to a severe recession in Russia's civilian economy (5.4% contraction). Russia has increasingly relied on gold reserves to cover government budget deficits and sustain essential spendi32ng. 19
In this episode, we tackle pressing issues with Congressman Brad Finstad, who sheds light on the alarming rise of fraud in government programs, including a shocking scandal involving funds meant for autistic children. We also discuss the implications of energy policy on the economy, the risks surrounding AI investments, and the ongoing investigation by Nebraska's Attorney General into foreign money influencing elections. Additional interview with Shannon Davis from American Alternative Assets.See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.