POPULARITY
Categories
In this episode, we delve into the impending crisis in the bond market that dwarfs the 2008 crash. With $10 trillion borrowed since 2020 and major players like Jamie Dimon sounding alarms, traditional banking is becoming increasingly unreliable for funding deals. We explore the risks and the demise of easy money, leading to tighter lending standards. Highlighting Leonard's story, we reveal how private credit is emerging as the new norm—offering faster, more flexible financing. Learn how to navigate the shifting landscape, avoid being left behind, and secure funding to thrive in volatile markets. BUT BEFORE THAT, guess who's secretly getting rich while you struggle! The "Exploit and Escape" Strategy: https://drive.google.com/file/d/16EZMfOM_JYXbqs7t3OZ_fGXDqrWo0sdQ/view?usp=drive_link&video=h3S3u9OFNpE https://BeltwayLending.com/epic/ : 30-year rental loans, no income docs, just your lease, 2 bank statements, and an ID. Fast, no red tape. Perfect for buying and holding real estate without the bank runaround. https://LoopholeLending.com : Get up to $150K at 0% interest for 21 months, no collateral, approval in 30 seconds, cash in 7-14 days. Great for funding marketing, gap funding, rehab, payroll—whatever your business needs. Useful links: https://myescapebook.com/freedom-formula https://epicearnwhileyoulearn.com/yourfirstdeal https://intensive2025.com/ Learn more about your ad choices. Visit megaphone.fm/adchoices
What if the most dangerous predators aren't lurking in dark alleys, but hiding in plain sight, charming their way into your life?Dr. David Snyder's webinar exposes the psychological tactics of manipulators who:Exploit emotional vulnerabilitiesCreate false connectionsPrey on your deepest insecuritiesLearn how social predators:Use the "Halo Effect" to appear trustworthyIdentify and target emotional weak pointsManipulate through validation and charmThe critical question: Are you truly safe from those who want to use you?Quotes:"People like people who are like themselves. We instinctively, inherently like people who make us feel good about ourselves." - Dr. David Snyder"The more attractive somebody is, physically or emotionally, the more we want to believe they're everything good." - Dr. David Snyder"Lack of action comes down to two basic things: either you don't know what to do, which is a skill set issue, or you're not willing to do it, which is a mindset issue." - Dr. David SnyderActionable Takeaways:Conduct a "Social Circle Audit": Critically examine your relationships and look for red flags. Ask yourself: Does anyone consistently make you feel emotionally drained, manipulated, or consistently shifts blame onto others?Develop a Personal Verification Protocol: Before deeply investing in a new relationship (personal or professional), create a systematic approach to verify someone's background. This includes checking social media, asking mutual connections, and looking for inconsistencies in their stories.Practice the "Emotional Detachment Technique": When meeting someone new, train yourself to step back emotionally and objectively assess their behavior, motivations, and consistency. Don't let initial charm or attractiveness cloud your judgment.Create Personal Boundary Statements: Develop clear, concise statements that define your personal boundaries. Practice communicating these boundaries directly and without apology, which helps repel potential manipulators.Monthly "Relationship Health Check": Schedule a quarterly self-reflection where you honestly evaluate your relationships. Ask: Who adds value to my life? Who drains my energy? Who consistently demonstrates trustworthiness and genuine care?Episode Timeline:0:00-5:00: Introduction and Overview of Machiavellian and Dark Triad TraitsDefining psychopathic and manipulative behaviorsDiscussion of books like "48 Laws of Power"Characteristics of social predators5:00-10:00: The Halo Effect and Psychological ManipulationHow attractiveness influences perceptionMechanisms of creating false positive impressionsTruth bias and emotional vulnerability10:00-15:00: Identifying Vulnerability MarkersPsychological traits that make people susceptible to manipulationRecent life challenges that create emotional openingsPredator targeting strategies15:00-20:00: Predator Identification TechniquesProactive methods of social predatorsHow manipulators create instant connectionsIdentification principle and emotional appeal20:00-25:00: Defensive StrategiesDeveloping personal boundariesRecognizing manipulation tacticsImportance of emotional detachment25:00-35:00: Q&A and Practical ApplicationsAudience questions about dealing with manipulatorsPersonal stories and insightsStrategies for protecting oneself35:00-40:00: Closing and Special OfferRecap of key lessonsPromotion of additional training resourcesMotivational conclusion about personal empowermentTo learn more about Dr. David Snyder and everything about NLP, visit:Website: https://www.nlppower.com/YouTube: https://www.youtube.com/@DavidSnyderNLPInstagram: https://www.instagram.com/davidsnydernlp
#288th for 12nd June, 2025 or 3311! (33-Oh-Leven, not Oh-Eleven, OH-Leven)http://loosescrewsed.comJoin us on discord! And check out the merch store! PROMO CODEShttps://discord.gg/3Vfap47ReaSupport us on Patreon: https://www.patreon.com/LooseScrewsEDSquad Update: PowerPlay Update: - Cycle 33 Fdev recognizes exploit in PowerplaySpecific to Settlement DataWill rollback systems affectedWe won Djinaura! We'll have to see how Antal respondsWolf 10 is the next acquisition targetNiceygy's Power Points - https://elite.niceygy.net/powerpointsFind out more in the LSN-powerplay-hub forum channel.Galnet Update: https://community.elitedangerous.com/Imperial Forces Target Delaine FlagshipNew CG with seeker FSD interrupt missileDev News: Frontier financials: Elite up 75% over yearIssue with power CZs acknowledged?PP exploit being used to snipe major systems acknowledgedPower data paused until next week; rollbackDiscussion:Cheats, Exploits, and BugsCommunity Corner:upvote this and add your voice. It's like 27 weeks in. That's at least 25 weeks late on the fix. The issue has expired and been reposted more than once. Make them pay attention. https://issues.frontierstore.net/issue-detail/70594
Are you missing out on innovation because you're avoiding discomfort? How can you embrace the tension that's required for innovation? In episode 244 of At The Table, Patrick Lencioni and Cody Thompson explore the crucial link between tension and innovation. They argue that real creativity requires discomfort—whether from interpersonal friction or environmental urgency. Through personal stories and business examples, they offer practical ways to embrace conflict and drive change before crisis strikes.Topics explored in this episode: (1:14) Tension Can Be Beneficial* Innovation is universally desired but rarely pursued.* True creativity demands both environmental and interpersonal tension.* Most teams avoid conflict until a crisis forces change.(3:52) Manufacturing Tension and Creativity* Cody discusses how companies often manufacture environmental tension to force innovation, especially when complacency sets in. * Pat connects innovation to creativity, drawing on his experience as an author and screenwriter. (9:17) Does Every Business Need to Innovate?* Innovation applies to all types of companies in different ways.* Entrepreneurs often thrive on tension, but most leaders need to learn it.(14:15) Manufacturing Urgency* Crises like COVID accelerate innovation by necessity.* Teams can simulate pressure by setting rallying cries or tight timelines.(19:24) Fear or Joy Can Drive Innovation * A team's willingness to engage in healthy conflict is directly tied to innovation potential.* The best employees crave meaningful tension and will leave if it's missing.Resources mentioned in this episode: * Only the Paranoid Survive: How to Exploit the Crisis Points That Challenge Every Company, a book by Andrew S. Grove. This episode of At The Table with Patrick Lencioni is brought to you by The Table Group: https://www.tablegroup.com. We teach leaders how to make work more effective and less dysfunctional. We also help their employees be more fulfilled and less miserable. At The Table is a podcast that lives at the connection between work life, leadership, organizational health, and culture. Subscribe on Apple Podcasts (https://apple.co/4hJKKSL), Spotify (https://spoti.fi/4l1aop0), and YouTube (https://bit.ly/At-The-Table-YouTube). Follow Pat Lencioni on https://www.linkedin.com/in/patrick-lencioni-orghealth and http://www.youtube.com/@PatrickLencioniOfficial. Connect with Cody Thompson https://www.linkedin.com/in/cody-thompson-a5918850. Be sure to check out our other podcast, The Working Genius Podcast with Patrick Lencioni, on Apple Podcasts (https://apple.co/4iNz6Yn), Spotify (https://spoti.fi/4iGGm8u), and YouTube (
Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electrical equipment... Read more »
Our security news roundup discusses the compromise of thousands of ASUS routers and the need to perform a full factory reset to remove the malware, why Microsoft allows users to log into Windows via RDP using revoked passwords, and the ongoing risk to US infrastructure from “unexplained communications equipment” being found in Chinese-made electrical equipment... Read more »
Alors que les joueurs de Franck Azéma ont réalisé l'impossible en battant le Stade Toulousain 42-35 lors de la dernière journée de TOP 14 alors que tout le monde les voyait perdants, les Catalans devront tout de même aller chercher leur maintien dans l'élite à Grenoble lors de l'access match qui aura lieu samedi 14 juin. On revient sur la rencontre en compagnie du service des sports !Alors que les joueurs de Franck Azéma ont réalisé l'impossible en battant le Stade Toulousain 42-35 lors de la dernière journée de TOP 14 alors que tout le monde les voyait perdants, les Catalans devront tout de même aller chercher leur maintien dans l'élite à Grenoble lors de l'access match qui aura lieu samedi 14 juin. On revient sur la rencontre en compagnie du service des sports !Crédits audio : Heavy - Huma Humahttps://www.youtube.com/watch?v=_W1E9g8m2ac
Today's blockchain and crypto news Stacks-based Alex Lab to reimburse users after $8.3 million exploit 15-day streak brings Ethereum ETFs to record high cumulative inflow value Justin Sun-connected BiT Global drops wBTC-related legal spat with Coinbase Argentina anti-corruption office clears Javier Milei in Libra crypto promotion scandal Learn more about your ad choices. Visit megaphone.fm/adchoices
Timestamps: 0:00 at a loss here 0:08 Switch 2 exploit discovered 1:56 YouTube Premium Lite ads on Shorts 2:39 Big Beautiful Bro Breakup 4:33 Jawa! 5:15 QUICK BITS INTRO 5:25 OpenAI doesn't want to keep data 6:07 Samsung lock-screen AI ads with your face 6:34 Japanese lander crashes into moon 6:57 Apple arguing with EU over a comma 7:41 Foodies commenting MEATBALL NEWS SOURCES: https://lmg.gg/hKEPx Learn more about your ad choices. Visit megaphone.fm/adchoices
On commence avec du tennis et ce nouvel exploit de la Française Loïs Boisson qui se hisse en demi-finale de Roland Garros après avoir éliminée la jeune pépite Russe Mirra Andréeva
On commence avec du tennis et ce nouvel exploit de la Française Loïs Boisson qui se hisse en demi-finale de Roland Garros après avoir éliminée la jeune pépite Russe Mirra Andréeva
Nouvel exploit des Ukrainiens : ce week-end, ils ont fait sauter des avions russes sur une base aérienne, et hier ils ont fait sauter le pont de Crimée, et ce n'est pas la première fois...Distribué par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.
Why would a security vulnerability take more than two years to fix? Richard chats with Steve Syfuhs about the evolution of the response to KB5015754. Originally published in 2022, the issue involved vulnerabilities in the on-premises certificate authority for Active Directory. Pushing a fix to force the immediate replacement of the certificates could have left users unable to log into Active Directory entirely. Steve explains how the gradual rollout of the fix allowed folks concerned (and paying attention!) to fix it immediately. At the same time, for everyone else, the fix happened as the existing certificates expired. But not every scenario is automatic - some require sysadmin intervention. So, how do you get their attention? The story leads to the February 11, 2025 update that could knock some users off Active Directory, but had an easy and quick fix. The final phase should be September 2025; hopefully, the last stragglers will be ready!LinksKB5014754Microsoft Security Response CenterCreate and Assign SCEP Certificate Profiles in IntuneRecorded April 10, 2025
Forecast = Stormy with a chance of TikTok malware showers—exploit scoring systems hot, but patch management outlook remains partly cloudy. Welcome to Storm⚡️Watch! In this episode, we're diving into the current state of cyber weather with a mix of news, analysis, and practical insights. This week, we tackle a fundamental question: are all exploit scoring systems bad, or are some actually useful? We break down the major frameworks: **CVSS (Common Vulnerability Scoring System):** The industry standard for assessing vulnerability severity, CVSS uses base, temporal, and environmental metrics to give a comprehensive score. It's widely used but has limitations—especially since it doesn't always reflect real-world exploitability. **Coalition Exploit Scoring System (ESS):** This system uses AI and large language models to predict the likelihood that a CVE will be exploited in the wild. ESS goes beyond technical severity, focusing on exploit availability and usage probabilities, helping organizations prioritize patching with better accuracy than CVSS alone. **EPSS (Exploit Prediction Scoring System):** EPSS is a data-driven approach that estimates the probability of a vulnerability being exploited, using real-world data from honeypots, IDS/IPS, and more. It updates daily and helps teams focus on the most urgent risks. **VEDAS (Vulnerability & Exploit Data Aggregation System):** VEDAS aggregates data from over 50 sources and clusters vulnerabilities, providing a score based on exploit prevalence and maturity. It's designed to help teams understand which vulnerabilities are most likely to be actively exploited. **LEV/LEV2 (Likely Exploited Vulnerabilities):** Proposed by NIST, this metric uses historical EPSS data to probabilistically assess exploitation, helping organizations identify high-risk vulnerabilities that might otherwise be missed. **CVSS BT:** This project enriches CVSS scores with real-world threat intelligence, including data from CISA KEV, ExploitDB, and more. It's designed to help organizations make better patching decisions by adding context about exploitability. Next, we turn our attention to a troubling trend: malware distribution via TikTok. Attackers are using AI-generated videos, disguised as helpful software activation tutorials, to trick users into running malicious PowerShell commands. This “ClickFix” technique has already reached nearly half a million views. The malware, including Vidar and StealC, runs entirely in memory, bypassing traditional security tools and targeting credentials, wallets, and financial data. State-sponsored groups from Iran, North Korea, and Russia have adopted these tactics, making it a global concern. For employees, the takeaway is clear: never run PowerShell commands from video tutorials, and always report suspicious requests to IT. For IT teams, consider disabling the Windows+R shortcut for standard users, restrict PowerShell execution, and update security awareness training to include social media threats. We also highlight the latest from Censys, VulnCheck, runZero, and GreyNoise—industry leaders providing cutting-edge research and tools for vulnerability management and threat intelligence. Don't miss GreyNoise's upcoming webinar on resurgent vulnerabilities and their impact on organizational security. And that's a wrap for this episode! We will be taking a short break from Storm Watch for the summer. We look forward to bringing more episodes to you in the fall! Storm Watch Homepage >> Learn more about GreyNoise >>
Roland Garros : La Française Loïs Boisson, 361 eme mondiale, a battu l'américaine Jessica Pegula, classée 3eme mondiale
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
A PNG Image With an Embedded Gift Xavier shows how Python code attached to a PNG image can be used to implement a command and control channel or a complete remote admin kit. https://isc.sans.edu/diary/A+PNG+Image+With+an+Embedded+Gift/31998 Cisco IOS XE WLC Arbitrary File Upload Vulnerability (CVE-2025-20188) Analysis Horizon3 analyzed a recently patched flaw in Cisco Wireless Controllers. This arbitrary file upload flaw can easily be used to execute arbitrary code. https://horizon3.ai/attack-research/attack-blogs/cisco-ios-xe-wlc-arbitrary-file-upload-vulnerability-cve-2025-20188-analysis/ Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE A change in PHP 8.1 can expose methods previously expected to be safe . vBulletin fixed a related flaw about a year ago without explicitly highlighting the security impact of the fix. A blog post now exposed the flaw and provided exploit examples. We have seen exploit attempts against honeypots starting May 25th, two days after the blog was published. https://karmainsecurity.com/dont-call-that-protected-method-vbulletin-rce
The Chinese Communist Party (CCP) has established a broad network inside American universities. This allows them to monitor and use Chinese students, and also ties them in with a broader system of CCP subversion that includes the consulates, front organizations, and sources of funding.Views expressed in this video are opinions of the host and guests and do not necessarily reflect the views of The Epoch Times.
I'll show you how to spot and exploit the 10 most common and costly microstakes and low stakes poker leaks.Get the 4-page PDF, "How to Exploit the Top 10 Preflop Leaks #542": https://www.smartpokerstudy.com/pod542YouTube Video: https://www.smartpokerstudy.com/YouTube542
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
Exploit for maximum severity Cisco IOS XE flaw now public Senators as for reinstatement of cyber review board to work on Salt Typhoon investigation Australian ransomware victims now must report their payments Huge thanks to our sponsor, Conveyor Conveyor launched the first AI Agent for Customer Trust. So wtf does that mean? It means the AI agent goes beyond just sharing NDA-gated documents like a SOC 2 with customers or answering security questionnaires. Conveyor's AI Agent, Sue, handles the entire security review process from start to finish. She answers every customer request from sales, completes every questionnaire and executes every communications and coordination task in-between. It's perfect for B2B infosec teams sick of manual security review work. Check it out at www.conveyor.com. Find the stories behind the headlines at CISOseries.com.
fuck that cat manLinks to everything at https://linktr.ee/plumbingthedeathstar including our terrible merch, social media garbage and where to become a subscriber to Bad Brain Boys+ Hosted on Acast. See acast.com/privacy for more information.
Pas de temps de s'échauffer, les "Grandes Gueules du Sport" démarrent fort dès 9h00 : la UNE c'est l'actu brûlante du sport, entre infos, analyses et débats.
In this episode, we discuss the alarming financial situation of the US as it spends more on debt interest than on national defense, and the implications for the US dollar. We outline two possible futures for the dollar – a slow decline or an overnight collapse – and describe strategies for safeguarding and growing wealth during these uncertain times. Key strategies include hedging with gold and Bitcoin, using creative financing to acquire income-producing real estate, and leveraging inflation to reduce debt and increase asset values. The episode emphasizes preparation and strategic positioning to not just survive, but thrive in an economic downturn. BUT BEFORE THAT, hear how Matt bought 55 homes without a bank! Want my exact “Rejection Letter” that closed 55 extra deals? Grab your free copy here: https://3optionloi.com/ About that thing we're doing in Vegas this month: https://intensive2025.com/ Exploit and Escape Strategy: https://drive.google.com/file/d/16EZMfOM_JYXbqs7t3OZ_fGXDqrWo0sdQ/view Learn more about your ad choices. Visit megaphone.fm/adchoices
REDIFF - Les évadés d'Alcatraz, c'est le titre d'un film mais c'est surtout une histoire vraie. L'histoire de la plus spectaculaire des évasions et de la plus mystérieuses des cavales. Un tour de passe-passe qui s'est joué à l'intérieur d'une prison forteresse. Celle d'Alcatraz, un rocher posé dans la baie de San Francisco, un pénitencier dont jamais personne n'avait réussi à s'enfuir. Trois hommes vont pourtant réussir cet exploit. Exploit qui, malgré une enquête qui n'a jamais été refermée, demeure une pure énigme. Retrouvez tous les jours en podcast le décryptage d'un faits divers, d'un crime ou d'une énigme judiciaire par Jean-Alphonse Richard, entouré de spécialistes, et de témoins d'affaires criminelles.Distribué par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.
REDIFF - Les évadés d'Alcatraz, c'est le titre d'un film mais c'est surtout une histoire vraie. L'histoire de la plus spectaculaire des évasions et de la plus mystérieuse des cavales. Un tour de passe-passe qui s'est joué à l'intérieur d'une prison forteresse. Celle d'Alcatraz, un rocher posé dans la baie de San Francisco, un pénitencier dont jamais personne n'avait réussi à s'enfuir. Trois hommes vont pourtant réussir cet exploit. Exploit qui, malgré une enquête qui n'a jamais été refermée, demeure une pure énigme. Retrouvez tous les jours en podcast le décryptage d'un faits divers, d'un crime ou d'une énigme judiciaire par Jean-Alphonse Richard, entouré de spécialistes, et de témoins d'affaires criminelles.Distribué par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.
In this episode of ABA On Call, Rick and Doug dissect the behavioral science behind app design, revealing how tech companies use variable reinforcement schedules to hijack user behavior and drive compulsive engagement. Drawing from core principles of behavior analysis, they explore how seemingly harmless interactions, such as likes, swipes, and notifications, are systematically engineered to reinforce usage patterns. The conversation moves beyond theory into the ethical minefield of digital design, especially its impact on children, teens, and vulnerable users. With examples ranging from red-dot alerts to algorithm-driven content loops, the hosts challenge behavior analysts to confront the weaponization of reinforcement and consider their role in advocating for more ethical technology. To earn CEUs for listening, click here, log in or sign up, pay the CEU fee, + take the attendance verification to generate your certificate! Don't forget to subscribe and follow and leave us a rating and review. Show Notes: A Wall Street Journal investigation
“One time, that wicked king of the Daityas saw his son of lotus-like face and beautiful eyes, surrounded by women, having returned from the home of the guru. In his hand, that boy was holding a slate which had the mark of a chakra at the top and the name of Krishna written with great adoration.” (Narasimha Purana, 41.35-36)
Ireland ranks 117th out of 253 countries, with over 57 million leaked cookies - 4.7 million of which are still active and tied to real user activity. According to the latest research by cybersecurity company NordVPN, Ireland has landed a troubling spot on the global leaderboard for leaked cookies, ranking 117th out of 253 countries. Over 57 million cookies linked to Irish users have been found on the dark web. Although cookies are commonly seen as helpful for improving online experiences, many don't realise that hackers can exploit them to steal personal data and access secure systems. "Cookies may seem harmless, but in the wrong hands, they're digital keys to our most private information," says Adrianus Warmenhoven, cybersecurity expert at NordVPN. "What was designed to enhance convenience is now a growing vulnerability exploited by cybercriminals worldwide." The hidden risk behind everyday browsing Cookies are small text files that websites store on a user's browser to remember preferences, login details, and browsing behaviour. They play a vital role in making online experiences smoother, helping websites load faster, keeping shopping carts full, and allowing users to stay logged in across sessions. Without cookies, the convenience and personalisation of the modern web would be severely limited. However, as the digital landscape evolves, so does the misuse of these tools. Cybercriminals have learned to harvest cookies to hijack sessions, steal identities, and bypass security measures. "Most people don't realise that a stolen cookie can be just as dangerous as a password," says Warmenhoven. "Once intercepted, a cookie can give hackers direct access to accounts and sensitive data, no login required." Millions of pieces of personal data exposed NordVPN's research reveals a massive malware operation that stole almost 94 billion cookies - a dramatic jump from 54 billion just a year ago, marking a 74% increase. Even more concerning, 20.55% of these cookies are still active, posing an ongoing risk to users' online privacy. Most stolen cookies came from major platforms, including Google (4.5 billion), YouTube (1.33 billion), and over 1 billion each from Microsoft and Bing. The growth is just as alarming when comparing personal data exposure over the past few years. In 2024, NordVPN identified 10.5 billion assigned IDs, 739 million session IDs, 154 million authentication tokens, and 37 million login credentials. In 2025, those numbers rose sharply, with 18 billion assigned IDs and 1.2 billion session IDs now exposed. These data types are critical for identifying users and securing their online accounts, making them highly valuable to cybercriminals. The stolen information often included full names, email addresses, cities, passwords, and physical addresses - key personal data that can be used for identity theft, fraud, and unauthorised account access. The data was harvested using 38 different types of malware, more than triple the 12 types identified last year. The most active strains were Redline (41.6 billion cookies), Vidar (10 billion), and LummaC2 (9 billion). These malware families are known for stealing login details, passwords, and other sensitive data. Redline is a powerful infostealer that extracts saved passwords, cookies, and autofill data from browsers, giving hackers direct access to personal accounts. Vidar works similarly but also downloads additional malware, making it a gateway to more complex attacks. LummaC2 is particularly evasive, frequently updating its tactics to slip past antivirus tools and spread across systems undetected. In addition to these known threats, researchers discovered 26 new types of malware not seen in 2024 - a sign of how quickly the cybercrime landscape is evolving. New entries like RisePro, Stealc, Nexus, and Rhadamanthys are especially dangerous. RisePro and Stealc are built to rapidly steal browser credentials and session data, while Nexus targets banking information using mobile emul...
Mike Johnson, Beau Morgan, and Ali Mac talk about some of the biggest storylines that came out of the first day of the SEC meetings yesterday, let you hear Kirby Smart give his thoughts on the transfer portal, react to what Coach Smart had to say, and talk about how Kirby is figuring out how to exploit transfer portal and transfer portal windows.
Les Pacers sont à un match de retrouver les Finales NBA pour la première fois depuis 2000... Porté par un Tyrese Haliburton monstrueux face aux New York Knicks, Indiana rêve de remporter son premier titre. Décrié par une partie de la ligue qui l'avait nommé 'joueur le plus surcoté de NBA' le meneur des Pacers impressionne lors de ces playoffs. Tyrese Haliburton est-il surcoté ? ou est-il une vraie superstar ? Trente-deux ans après Limoges, Monaco n'a pas réédité l'exploit et échoué en finale de l'Euroligue, dimanche à Abu Dhabi contre Fenerbahçe (70-81). La Roca Team aura malgré tout livré un parcours flamboyant dans la compétition, qu'elle quitte la tête haute. Exploit ou déception ? Basket Time avec Pierre Dorian, Fred Weis, Arnaud Valadon et Félix Gabory
Trente-deux ans après Limoges, Monaco n'a pas réédité l'exploit et échoué en finale de l'Euroligue, dimanche à Abu Dhabi contre Fenerbahçe (70-81). La Roca Team aura malgré tout livré un parcours flamboyant dans la compétition, qu'elle quitte la tête haute. Exploit ou déception ?
The episode discusses Moody's recent downgrade of the US credit rating from AAA to AA1, outlining the potential impacts on rent, savings, and jobs. Matt explores the reasons behind the downgrade, previous downgrades by Standard & Poor's and Fitch, and the broader economic implications. It criticizes the US government's handling of its debt and highlights contrasting views from President Trump and major financial entities. The episode also provides a 'five-step exploit and escape strategy' to protect oneself, focusing on hedging with gold and Bitcoin, leveraging debt, securing cheap loans, investing in income-producing real estate, and using inflation to one's advantage. BUT BEFORE THAT, hear why Costco is acting like a central bank! About the "EXPLOIT & ESCAPE" strategy: https://drive.google.com/file/d/16EZMfOM_JYXbqs7t3OZ_fGXDqrWo0sdQ/view?pli=1 Learn more about your ad choices. Visit megaphone.fm/adchoices
Open Heavens Temple, established on January 30th, 2011, has rapidly become one of the fastest-growing satellite branches of the International Central Gospel Church. Our mission is to raise leaders, shape visions, and influence society through Christ. We are a diverse and vibrant congregation, comprising young professionals, technocrats, entrepreneurs, business executives, public servants, and energetic youth from various ethnic and cultural backgrounds. The church is led by our Senior Pastor, Rev. Eric Xexemeku, a seasoned minister of the gospel with a deep love for God's people and a passion for excellence.
In this episode of the Servants of Grace Theology Segment, Dave Jenkins answers a listener's question: “Why do cults use God falsely in their mission?”Cults often use religious language and biblical imagery to manipulate and control. They twist Scripture, exploit faith, and claim divine authority to lead others into deception. In this episode, Dave unpacks how these spiritual traps work — and how Christians can recognize them and respond with truth, wisdom, and discernment.Audio: Watch Video:What You'll Learn:How cults use religious language to gain trustWhy leaders invoke God's name to justify controlCommon tactics: isolation, fear, control, shameBiblical discernment to spot false teachingHow Christians can stand firm in truth and graceScripture References:Matthew 7:15–172 Timothy 4:3–4Galatians 1:6–9Acts 17:112 Timothy 3:16–171 Timothy 4:1Ephesians 6:10–18Subscribe & Follow:Spotify: https://open.spotify.com/show/22CmXpzbz6JYjemSV0CMwt→ Listen and follow us on SpotifyApple Podcasts: https://podcasts.apple.com/us/podcast/servants-of-grace/id1240932035→ Subscribe and leave a review on AppleYouTube: https://www.youtube.com/servantsofgrace→ Watch episodes and subscribe on YouTubeTheology Segment Archive: https://servantsofgrace.org/servants-of-grace-theology-segment/→ Explore more theology-focused content
In this episode, Dave Jenkins answers a listener's question: "Why do cults use God falsely in their mission?" He explains how cults twist Scripture, exploit faith, and use God's name to manipulate others. You'll learn the key traits of spiritual deception, the psychology of cult control, and how Christians can respond with biblical truth and discernment. Scripture References: Matthew 7:15–17, 2 Timothy 4:3–4, Galatians 1:6–9, Acts 17:11, 2 Timothy 3:16–17, 1 Timothy 4:1, Ephesians 6:10–18 Subscribe & Follow: Spotify: https://open.spotify.com/show/22CmXpzbz6JYjemSV0CMwt → Listen and follow us on Spotify Apple Podcasts: https://podcasts.apple.com/us/podcast/servants-of-grace/id1240932035 → Subscribe and leave a review on Apple YouTube: https://www.youtube.com/servantsofgrace → Watch episodes and subscribe on YouTube Website & Archive: https://servantsofgrace.org/servants-of-grace-theology-segment/ → Explore the full Theology Segment archive on our website
On today's episode, Vince welcomes back investigative journalist Katarina Szulc for a conversation on the evolving dynamics of U.S.-Mexico relations and cartel activity across North America. They discuss Mexico's refusal to accept U.S. assistance in the fight against organized crime, the growing presence of cartels in Canada, and the challenges posed by Canada's legal system in addressing transnational threats. Katarina also shares details about her new work in investigative journalism, focused on exposing organized crime and cartel operations. Borderland is an IRONCLAD Original Watch Borderland: DISPATCHES everywhere you get your podcasts and on Youtube @thisisironclad starting May 20th. SPONSORS: 1stPhorm visit: https://www.1stphorm.com/borderland Free shipping through this link on any orders over $75 Free 30 days in the app for new customers (offer comes via email after the purchase) 110% money back guarantee on all of our products. We believe fully in our products. If you don't love the product or you aren't getting the results you hoped for, let us know and we'll give you your money back … plus 10%! Learn more about your ad choices. Visit megaphone.fm/adchoices
Bienvenue dans Radio Foot 16h10-21h10 T.U. À la Une de cette 1ère émission de la semaine : - Le Cameroun perd un de ses plus grands joueurs. Emmanuel Kundé, ancien capitaine des Lions Indomptables, disparu vendredi à l'âge de 68 ans. ; - Angleterre, la révolution de Palace ! ; - Ligue 1, fin de saison et clubs historiques à la peine. Saint-Étienne à peine remonté, finalement rétrogradé après avoir échoué à domicile face à Toulouse. - Le Cameroun perd un de ses plus grands joueurs. Emmanuel Kundé, ancien capitaine des Lions Indomptables, disparu vendredi à l'âge de 68 ans. Passé par le Canon de Yaoundé, Laval et Reims, le défenseur aux 127 sélections avait remporté la CAN à 2 reprises (1984 et 1988) et disputé 2 Coupes du Monde (1982 et 90). On se souvient notamment d'un penalty crucial inscrit face à l'Angleterre en ¼ de finale, contribuant au magnifique parcours camerounais en Italie. La disparition d'un « baobab », a réagi Rigobert Song. Son ancien coéquipier, André Kana Biyik évoque un « Monstre Sacré ». Un leader silencieux qui a marqué ses coéquipiers par ses exploits mais aussi par son humanité, on l'évoquera avec Joseph-Antoine Bell.- Angleterre, la révolution de Palace ! Crystal Palace a remporté la 144è édition de la FA Cup à Wembley. En battant les Cityzens 1-0, les Eagles s'adjugent pour le 1er trophée majeur de leur longue histoire. Une année sans pour l'équipe de Pep Guardiola, qui doit encore assurer sa place en C1.- Ligue 1, fin de saison et clubs historiques à la peine. Saint-Étienne à peine remonté, finalement rétrogradé après avoir échoué à domicile face à Toulouse. Montpellier était déjà assuré de la relégation en L2. Mauvaise affaire pour Reims, battu 2-1 à Lille, qui termine 16è et devra concentrer ses efforts sur le barrage aller-retour face à Metz. - Exploit du Havre qui arrache une victoire 3-2 à Strasbourg et le maintien, grâce au capitaine Abdoulaye Touré. L'international guinéen auteur de 2 penaltys, dont une « Panenka » pleine de sang froid à la 90è+9, dont les Ciel et Marine se souviendront longtemps !Avec Hugo Moissonnier : Hervé Penot, Éric Rabesandratana et Bruno Constant. Technique/réalisation : Laurent Salerno - Pierre Guérin.
Bienvenue dans Radio Foot 16h10-21h10 T.U. À la Une de cette 1ère émission de la semaine : - Le Cameroun perd un de ses plus grands joueurs. Emmanuel Kundé, ancien capitaine des Lions Indomptables, disparu vendredi à l'âge de 68 ans. ; - Angleterre, la révolution de Palace ! ; - Ligue 1, fin de saison et clubs historiques à la peine. Saint-Étienne à peine remonté, finalement rétrogradé après avoir échoué à domicile face à Toulouse. - Le Cameroun perd un de ses plus grands joueurs. Emmanuel Kundé, ancien capitaine des Lions Indomptables, disparu vendredi à l'âge de 68 ans. Passé par le Canon de Yaoundé, Laval et Reims, le défenseur aux 127 sélections avait remporté la CAN à 2 reprises (1984 et 1988) et disputé 2 Coupes du Monde (1982 et 90). On se souvient notamment d'un penalty crucial inscrit face à l'Angleterre en ¼ de finale, contribuant au magnifique parcours camerounais en Italie. La disparition d'un « baobab », a réagi Rigobert Song. Son ancien coéquipier, André Kana Biyik évoque un « Monstre Sacré ». Un leader silencieux qui a marqué ses coéquipiers par ses exploits mais aussi par son humanité, on l'évoquera avec Joseph-Antoine Bell.- Angleterre, la révolution de Palace ! Crystal Palace a remporté la 144è édition de la FA Cup à Wembley. En battant les Cityzens 1-0, les Eagles s'adjugent pour le 1er trophée majeur de leur longue histoire. Une année sans pour l'équipe de Pep Guardiola, qui doit encore assurer sa place en C1.- Ligue 1, fin de saison et clubs historiques à la peine. Saint-Étienne à peine remonté, finalement rétrogradé après avoir échoué à domicile face à Toulouse. Montpellier était déjà assuré de la relégation en L2. Mauvaise affaire pour Reims, battu 2-1 à Lille, qui termine 16è et devra concentrer ses efforts sur le barrage aller-retour face à Metz. - Exploit du Havre qui arrache une victoire 3-2 à Strasbourg et le maintien, grâce au capitaine Abdoulaye Touré. L'international guinéen auteur de 2 penaltys, dont une « Panenka » pleine de sang froid à la 90è+9, dont les Ciel et Marine se souviendront longtemps !Avec Hugo Moissonnier : Hervé Penot, Éric Rabesandratana et Bruno Constant. Technique/réalisation : Laurent Salerno - Pierre Guérin.
A ton of awesome releases and advancements in this month's ModChat! First comes the release of the Lapse Kernel Exploit for both PS4 12.02 and PS5 10.05 firmwares. BadHTAB for the PS3 evolves into BadWDSD, a separate but better and more exciting development for PS3 owners allowing further access now on Super Slim variants! The original Xbox revision 1.6 gets a huge development as well, now with the ability to reflash the on-board BIOS for the first time. We touch up on some Switch news for the first time in a while, with a new Atmosphere CFW update for the latest Switch firmware, but not all good news when we discuss the EULA changes. However, some reverse engineering efforts towards the WaveBird receiver, Mario Party 4, Mario Kart 64, and even Dinosaur Planet have all released this month!
Today I'm joined by Derek Hansen, VP of Operations at Cox Automotive. We get into how AI is reshaping inventory pricing, pro tips for navigating vehicle tariffs, where vAuto is innovating next—and more. If your dealership is interested in learning more, reach out to Derek by email: derek.hansen@coxautoinc.com This episode is brought to you by: 1, Toma – If your BDC or Service Advisors are buried in calls, it's time for a smarter solution. Toma builds custom AI agents that answer 100% of your dealership's inbound calls and handle tasks like booking service, checking recalls, and scheduling test drives—without tying up your team. Dealers using Toma are saving 30–40 staff hours a week and booking 100+ extra appointments every month. Exclusive for CDG Listeners: Start your no-risk, 1-month free trial @ toma.com/cdg 2. Experian Automotive - Like most Car Dealership Guy Listeners, you're constantly looking for the inside edge on the auto industry. So if you're ready to step up your game to the next level – outpacing the competition and building customer loyalty – there's only one place to go from here: Experian Automotive. They're the only ones with exclusive data across vehicles, consumers, and credit—plus expert data scientists who connect the dots to uncover the insights you need. Get the industry-leading insights from Experian Automotive today! Learn more by visiting @ https://carguymedia.com/4cfcLjZ Need help finding top automotive talent? Get started here: https://www.cdgrecruiting.com/ Interested in advertising with Car Dealership Guy? Drop us a line here: https://cdgpartner.com Interested in being considered as a guest on the podcast? Add your name here: https://bit.ly/3Suismu Topics: 00:15 Biggest inventory challenges today? 00:34 What shaped your career path? 01:08 How is AI changing auto? 03:38 Current market trends to watch? 07:11 Best dealer strategies now? 09:37 How to improve appraisals? 15:45 Global car sourcing tips? 21:39 How predictive analytics helps sales? 33:09 Future car inventory predictions? Check out Car Dealership Guy's stuff: CDG News ➤ https://news.dealershipguy.com/ CDG Jobs ➤ https://jobs.dealershipguy.com/ CDG Recruiting ➤ https://www.cdgrecruiting.com/ My Socials: X ➤ x.com/GuyDealership Instagram ➤ instagram.com/cardealershipguy/ TikTok ➤ tiktok.com/@guydealership LinkedIn ➤ linkedin.com/company/cardealershipguy Threads ➤ threads.net/@cardealershipguy Facebook ➤ facebook.com/profile.php?id=100077402857683 Everything else ➤ dealershipguy.com This podcast is for informational purposes only and should not be relied upon as a basis for investment decisions.
Scammers aren't just phishing your inbox anymore—they're impersonating your voice, your face, and even your coworkers. Deep fakes and social engineering have moved beyond clever tricks and become powerful tools that bad actors are using to infiltrate businesses, breach accounts, and dismantle trust at scale. What used to take a hacker hours and expensive tools can now be done in minutes by anyone with a Wi-Fi connection and a little malicious intent. Our guest today is Aaron Painter, CEO of Nametag, a company leading the charge in next-generation identity verification. Aaron's background includes 14 years at Microsoft and executive roles in cloud tech across Europe and Asia. After witnessing firsthand how easily identity theft could unravel lives—especially during the shift to remote everything—he founded Nametag to answer a critical question: how can we know who's really behind the screen? With Nametag, Aaron is building real-time, high-security ID checks that are already reshaping how help desks and businesses protect users. In this conversation, we unpack the difference between authentication and identity, why traditional methods like security questions are dangerously outdated, and how mobile tech and biometrics are changing the game. Aaron also shares practical tips on protecting your most valuable digital asset—your email—and what consumers and companies alike can do to stay ahead of evolving threats. This one's packed with insight, and more relevant than ever. Show Notes: [00:54] Aaron is the CEO of Nametag. A company he started 5 years ago that focuses on identity verification at high-risk moments. [01:37] He spent 14 years at Microsoft working on product including at Microsoft China. He also ran a cloud computing company that was AWS's largest partner in Europe. [02:12] When everything went remote in 2020, he discovered that there were identity verification issues over phone lines. [03:03] He began building technology that will help accurately identify people when they call in to support or help desks. [04:22] Most of what we think of as identity is really just authentication. [07:41] A common new challenge is the rise of remote work and people having to connect remotely. The rise of technologies that make it easier to impersonate someone is also a problem. [10:38] Knowing who you hire and who you're working with matters. [11:03] Deep fakes and voice cloning has become so much easier. [15:47] How platforms have a responsibility to know their users. [18:11] How deep fakes are being exploited in the corporate world. [19:30] The vulnerability is often the human processes. Back doors and side doors are deleting ways that companies are breached. [23:53] High value accounts and companies that know they have something to protect our early adopters of Aaron's technology. [24:50] Identity verification methods including using mobile phones. The device has cryptography. [27:07] Behavioral biometrics include the way we walk or the way we type. [29:56] If you're working with a company that offers additional security tools, take them up on it. [34:04] Dating sites are starting to do verification profiles. [43:07] We all need to push for more secure ways to protect our accounts. [43:48] The importance of protecting your email. Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review. Links and Resources: Podcast Web Page Facebook Page whatismyipaddress.com Easy Prey on Instagram Easy Prey on Twitter Easy Prey on LinkedIn Easy Prey on YouTube Easy Prey on Pinterest Aaron Painter - LinkedIn Nametag Aaron Painter - Facebook LOYAL: A Leader's Guide to Winning Customer and Employee Loyalty
Today, Hunter spoke with Julie Ciccolini, the CEO of Techtivist. When she was working as a paralegal at the NY Legal Aid Society, Julie, like so many in a Public Defender Office, realized that there was immense amounts of data on police misconduct that was going un-used. So, Julie helped to set up a database that allowed Public Defenders to track and use this data in their cases. Realizing that this issue extended far beyond New York, Julie founded Techtivist as a way to help Public Defenders set up and utilize databases that keep track of police misconduct. Guest Julie Ciccolini, CEO, Techtivist Resources: Check out Techtivist Here https://www.techtivist.com/ Read the Blue Wall of Silence Report Here https://www.nacdl.org/Document/DismantlingtheBlueWallofSilenceTrackLawEnfMiscond Contact Hunter Parnell: Publicdefenseless@gmail.com Instagram @PublicDefenselessPodcast Twitter @PDefenselessPod www.publicdefenseless.com Subscribe to the Patron www.patreon.com/PublicDefenselessPodcast Donate on PayPal https://www.paypal.com/donate/?hosted_button_id=5KW7WMJWEXTAJ Donate on Stripe https://donate.stripe.com/7sI01tb2v3dwaM8cMN Trying to find a specific part of an episode? Use this link to search transcripts of every episode of the show! https://app.reduct.video/o/eca54fbf9f/p/d543070e6a/share/c34e85194394723d4131/home
We've all heard of the Robbie Williams Monkey Movie, right? It's all fun and games in the world of the movie, but what if you actually had a little ape son? How would that even work? Super ape sperm? Maybe a super ape egg? So many questions, but as always, the most important seems to be how we can exploit him for money.Links to everything at https://linktr.ee/plumbingthedeathstar including our terrible merch, social media garbage and where to become a subscriber to Bad Brain Boys+Support Jarren's Outpost on Kickstarter: https://www.kickstarter.com/projects/dndnerds/jarrens-outpost Hosted on Acast. See acast.com/privacy for more information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Attacks against Teltonika Networks SMS Gateways Attackers are actively scanning for SMS Gateways. These attacks take advantage of default passwords and other commonly used passwords. https://isc.sans.edu/diary/Attacks%20against%20Teltonika%20Networks%20SMS%20Gateways/31888 Commvault Vulnerability CVE-2205-34028 Commvault, about a week ago, published an advisory and a fix for a vulnerability in its backup software. watchTowr now released a detailed writeup and exploit for the vulnerability https://labs.watchtowr.com/fire-in-the-hole-were-breaching-the-vault-commvault-remote-code-execution-cve-2025-34028/ Exploitation Trends Q1 2025 Vulncheck published a summary of exploitation trends, pointing out that about a quarter of vulnerabilities are exploited a day after a patch is made available. https://vulncheck.com/blog/exploitation-trends-q1-2025 inetpub directory issues The inetpub directory introduced by Microsoft in its April patch may lead to a denial of service against applying patches on Windows if an attacker can create a junction for that location pointing to an existing system binary like Notepad. https://doublepulsar.com/microsofts-patch-for-cve-2025-21204-symlink-vulnerability-introduces-another-symlink-vulnerability-9ea085537741
Alex Golden and Rohan Katti from The Gyro Step Podcast dive into everything Game 3 has in store. What adjustments will the Bucks make? How dominate Indiana has been this series in Games 1 & 2, what winning or losing this first round series means for the future of the Bucks, why the Bucks can still win this, why Indiana is the better overall team, what to expect from Milwaukee's crowd, lineup changes and more!
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Microsoft Entra User Lockout Multiple organizations reported widespread alerts and account lockouts this weekend from Microsoft Entra. The issue is caused by a new feature Microsoft enabled. This feature will lock accounts if Microsoft believes that the password for the account was compromised. https://www.bleepingcomputer.com/news/microsoft/widespread-microsoft-entra-lockouts-tied-to-new-security-feature-rollout/ https://learn.microsoft.com/en-us/entra/identity/authentication/feature-availability Erlang/OTP SSH Exploit An exploit was published for the Erlang/OTP SSH vulnerability. The vulnerability is easy to exploit, and the exploit and a Metasploit module allow for easy remote code execution. https://github.com/exa-offsec/ssh_erlangotp_rce/blob/main/ssh_erlangotp_rce.rb Sonicwall Exploited An older command injection vulnerability is now exploited on Sonicwall devices after initially gaining access by brute-forcing credentials. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0022 Unpatched Vulnerability in Bubble.io An unpatched vulnerability in the no-code platform bubble.io can be used to access any project hosted on the site. https://github.com/demon-i386/pop_n_bubble