Podcasts about exploited

  • 901PODCASTS
  • 2,104EPISODES
  • 46mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Mar 14, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about exploited

Latest podcast episodes about exploited

An Ounce
Your Primal Instinct Is Being Exploited

An Ounce

Play Episode Listen Later Mar 14, 2026 7:10


Clickbait psychology, dopamine loops, phantom phone vibrations, and the attention economy all trace back to one ancient survival instinct: the rustle in the grass.The same evolutionary wiring that kept our ancestors alive now drives compulsive scrolling, notification checking, and variable reward behavior. Your brain treats uncertainty like unfinished business — and modern platforms know it.Why do phantom vibrations feel real?Why does anticipation hit harder than resolution?Why does “just one more scroll” feel reasonable?From evolutionary psychology to intermittent reinforcement, from yellow journalism to modern algorithms, this episode examines how curiosity built us — and how engineered uncertainty can quietly pull us.Curiosity built us. Compulsion can undo us.The difference is whether you're exploring — or being pulled.If you appreciate calm, unsensational explorations of psychology, human behavior, and the hidden patterns shaping modern life, you're welcome to stay awhile.#Psychology #HumanBehavior #Clickbait #AttentionEconomy #Dopamine #ModernLife #evolution CHAPTER / TIMESTAMP00:00 — OPEN: The Rustle in the Grass01:07 — The Modern Rustle (Clickbait & Notifications)01:54 — What's Actually Happening03:14 — This Pattern Isn't New04:23 — When it Tilt's05:56 — The Scale Problem06:27 — AN OUNCERECOMMENDED “YOU MIGHT ALSO LIKE” EPISODES1)The Warnings We Forgot — Even Though They Were Written in StoneA quiet examination of tsunami warning stones in Japan — and what happens when memory fades and certainty replaces caution.    https://youtu.be/yxxa1_-nBSo2) It Made Sense at the Time — Why Smart Decisions FailIf you were drawn to how ancient wiring shapes modern behavior, this episode explores how reasonable decisions quietly drift into failure — and why hindsight makes everything look obvious.   https://youtu.be/UJZ214F3VAUADDITIONAL READING AND REFERENCE1. Dopamine & Reward PredictionSchultz, W. (1997) Dopamine neurons and reward predictionhttps://www.sciencedirect.com/science/article/pii/S0896627397001801Supports anticipation spikes and reward prediction error.________________________________________2. Phantom Vibration SyndromeRothberg et al. (2010) Phantom vibration syndromehttps://www.ncbi.nlm.nih.gov/pmc/articles/PMC2940970/Supports phantom buzz reference in script.________________________________________3. Intermittent Reinforcement — Operant ConditioningOverview of B.F. Skinner's workhttps://www.simplypsychology.org/operant-conditioning.htmlSupports variable reward comparison.________________________________________4. Yellow Journalism — Historical PrecedentLibrary of Congress Overviewhttps://www.loc.gov/collections/chronicling-america/articles-and-essays/yellow-journalism/Supports engineered outrage headlines.________________________________________5. Persuasive Technology & Behavior DesignB.J. Fogg Behavior Modelhttps://www.behaviormodel.org/Supports engineered uncertainty loops.

NIGHT DEMON HEAVY METAL PODCAST
Episode #294 - Interview w/Carlos Cruz of Nails/Warbringer/OHM - Part 1

NIGHT DEMON HEAVY METAL PODCAST

Play Episode Listen Later Mar 13, 2026 52:56


This week we bring you the first installment of Jarvis' interview with Carlos Cruz, a veteran drummer perhaps best known for his work in Warbringer and Powertrip. The interview begins with Carlos discussing his deep family roots in music, including his grandfather's recorded output. After a detour into the perils and hazards to the human body of playing heavy metal music for an extended period of time, and the corresponding need for self-care and treatment along the way, the interview traces Carlos' musical journey through high school cover bands to the burgeoning LA thrash movement in the early 2000s and eventually to the pivotal moment when he joined Warbringer in 2010. Listen at nightdemon.net/podcast or anywhere you listen to podcasts! Follow us on Instagram Like us on Facebook

FreightCasts
Who's Killing Trucking? Politics, Policy & The Exploited Driver Behind It All | Brake Check

FreightCasts

Play Episode Listen Later Mar 12, 2026 45:10


Is the trucking industry being pushed to the brink?On this episode of Brake Check, we dive straight into the issues drivers, carriers, and industry leaders are talking about but rarely hear addressed without filters.First, Gord Magill joins the show to break down the degradation of trucking as we know it and what he exposes in his new book about how the industry has evolved ...and not always for the better. From regulatory shifts to structural changes in the business of freight, we examine whether the foundations of trucking are quietly eroding.Then Shannon Everett of American Truckers United climbs into the cab to talk about something drivers across the country are watching closely: Delilah's Law. We dig into what the legislation aims to accomplish, who is supporting it, who is opposing it, and what it could mean for the future of drivers in America. When policy, politics, and profit collide, who actually pays the price?Finally, Paul Gibson joins the conversation to bring it back to the people behind the wheel. While analysts and economists debate the freight cycle, drivers are living the reality every day. We talk about how drivers are feeling right now, what they're seeing in settlements, and where the industry may be failing the very people who keep freight moving.This episode connects the dots between policy, freight economics, and the real-world impact on drivers and carriers. If you care about the future of trucking, this is a conversation you won't want to miss.Guests in this episode Gord Magill – Author and trucking industry analystShannon Everett – American Truckers UnitedPaul Gibson – Broker-Carrier Summit/ Host of the Freight BreakTopics Covered • The changing structure of the trucking industry• Delilah's Law and trucking policy debates• Freight market swings and driver sentiment• The impact of politics and regulation on truckers• What carriers and the industry may be missingSubscribe for more conversations about trucking, freight markets, regulations, and the future of the industry. Follow the Brake Check Podcast Other FreightWaves Shows Learn more about your ad choices. Visit megaphone.fm/adchoices

Exploit Brokers - Hacking News
Cisco & Dell CVSS 10.0 Exploited for YEARS, Claude AI Jailbroken, ScarCruft Jumps Air Gaps | HN64

Exploit Brokers - Hacking News

Play Episode Listen Later Mar 12, 2026 28:07


Two perfect CVSS 10.0 scores in one news cycle. A state-sponsored actor living inside Cisco's SD-WAN platform since 2023. A brand-new lateral movement technique called "Ghost NICs" that leaves no forensic trace. An AI chatbot jailbroken to steal 195 million government records. A North Korean hacking group bridging air-gapped networks with USB drives and an embedded Ruby runtime. And a phishing platform so sophisticated it makes your multi-factor authentication functionally useless. This is Hacking News Episode 64 from Exploit Brokers by Forgebound Research. Five stories, multiple nation-state actors, and some genuinely novel attack techniques. Let's get into it.

Circles Off - Sports Betting Podcast
How a Sharp Bettor Exploited a Secret Tennis Loophole

Circles Off - Sports Betting Podcast

Play Episode Listen Later Mar 11, 2026 12:55


Isaac Rose-Berman, a sharp tennis bettor, uncovered a hidden edge at a recent Indian Wells tournament that most bettors completely missed. The opportunity came from a subtle change in tennis balls, and Isaac breaks down exactly how he spotted it, why it mattered, and the impact it had on his betting strategy. Fans of tennis and sports betting will get a rare, inside look at a true all-time advantage and the methods that sharp bettors use to find opportunities others overlook. In this episode of Legendary Loopholes, host Jacob Gramegna is joined by Isaac Rose-Berman to dive deep into the edge and explain his thought process. Together, they walk viewers through the discovery, making this episode essential for anyone interested in betting strategy, tennis insights, or spotting hidden advantages in sports.

The Emergency Management Network Podcast
Critical Updates from CISA: Navigating the Latest Exploited Vulnerabilities

The Emergency Management Network Podcast

Play Episode Listen Later Mar 4, 2026 3:12


The salient point of this podcast episode revolves around critical updates concerning national security and public health advisories. We provide an overview of newly identified vulnerabilities in the CISA Exploited Vulnerabilities catalog, emphasizing the importance of timely patching and mitigation strategies for federal agencies and critical infrastructure operators. Additionally, we discuss the ongoing security posture changes for U.S. personnel in parts of the Middle East, highlighting the ordered departure of non-emergency government employees from the United Arab Emirates due to escalating threats. Furthermore, we address recent water advisories issued in various states, including precautionary measures for local residents to ensure safe consumption. It is imperative to remain informed and vigilant in light of these developments, as they directly impact community safety and operational readiness.Takeaways:* The IWC 2026 conference is crucial for professionals involved in critical communications.* Critical infrastructure operators must prioritize the newly identified vulnerabilities in the KEV catalog.* A travel advisory has been issued for Kuwait due to the ordered departure of personnel.* Residents of Panama City are advised to boil water following a planned water shutoff.* The situation in the Middle East has led to security alerts for non-emergency US personnel.* Clarendon County has issued a boil water advisory due to a water line repair interruption.SponsorIWCE - https://go.emnmedia.com/IWCE2026CISACISA Alert (Mar 3, 2026) — Adds two exploited vulnerabilities to KEV CatalogCISA — Cybersecurity Advisories feed (shows Mar 3, 2026 alert listing)CISA — Known Exploited Vulnerabilities Catalog (reference list)Travel and SecurityU.S. Mission to the UAE — Security Alert (Mar 3, 2026)OSAC — Travel Advisory: Kuwait (updated Mar 3, 2026)StatesFlorida, City of Panama City — Planned water shut-off & precautionary boil-water notice (Mar 3, 2026)Louisiana, Shreveport Water & Sewerage — Alert Center update (latest update timestamped Mar 3, 2026)South Carolina, Clarendon County, SC — Boil Water Advisory (Mar 3, 2026) This is a public episode. If you'd like to discuss this with other subscribers or get access to bonus episodes, visit emnetwork.substack.com/subscribe

The John Batchelor Show
S8 Ep528: Abdul-Ahad examines Sunni tribal infighting in Ramadi, the failure of a coherent political project, and how ISIS exploited security cracks to present itself as liberators. 6.

The John Batchelor Show

Play Episode Listen Later Mar 2, 2026 7:00


Abdul-Ahad examines Sunni tribal infighting in Ramadi, the failure of a coherent political project, and how ISISexploited security cracks to present itself as liberators. 6.1960

The John Batchelor Show
S8 Ep520: Josiah Hesse explores Mason City's religious history, linking the Music Man allegory to the Scopes trial and traveling preachers who exploited regional evangelical fervor. 13.

The John Batchelor Show

Play Episode Listen Later Feb 27, 2026 9:17


Josiah Hesse explores Mason City's religious history, linking the Music Man allegory to the Scopes trial and traveling preachers who exploited regional evangelical fervor. 13.1886 COURTSHIP OF MILES STANDISH

Cyber Security Today
Cisco SD-WAN Bug Actively Exploited

Cyber Security Today

Play Episode Listen Later Feb 27, 2026 10:15


Cisco SD-WAN Bug Actively Exploited, MCP Azure Takeover Demo, CarGurus Data Leak, and Secret Service Scam Recovery Host Jim Love covers four cybersecurity stories: CSA warns a critical Cisco Catalyst SD-WAN controller vulnerability (CVE-2026-20127) has been exploited since 2023, enabling authentication bypass and rogue peering sessions, and orders U.S. federal agencies to inventory systems, collect logs and forensic artifacts, hunt for compromise, and apply Cisco's fixes by 5:00 PM ET on February 27, 2026, with no workarounds. At RSA, researchers show how flaws in Model Context Protocol (MCP)—a key integration layer for agentic AI—could lead to remote code execution and even Azure tenant takeover, highlighting rising enterprise risk. ShinyHunters reportedly published 12.4 million stolen CarGurus records, raising phishing and fraud concerns tied to vehicle shopping and financing context. Finally, an Ontario tech support scam victim recovers funds through coordinated work by Ontario Provincial Police and the U.S. Secret Service, which traced and froze the money in time. Cybersecurity Today  would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale.  You can find them at Meter.com/cst LINKS Cisco Advisory Cisco Security Advisory – CVE-2026-20127 Authentication bypass vulnerability in Cisco Catalyst SD-WAN https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-rpa-EHchtZk CISA Supplemental Hunt and Hardening Guidance (Cisco SD-WAN Systems) https://www.cisa.gov/news-events/directives/supplemental-direction-ed-26-03-hunt-and-hardening-guidance-cisco-sd-wan-systems Threat Hunt Guide (Technical PDF) Cisco SD-WAN Threat Hunt Guide (jointly referenced in federal guidance) https://media.defense.gov/2026/Feb/25/2003880299/-1/-1/0/CISCO_SD-WAN_THREAT_HUNT_GUIDE.PDF 00:00 Sponsor Message 00:19 Cisco SD-WAN Under Attack 02:48 MCP Azure Takeover Demo 05:28 CarGurus Data Dump 07:16 Secret Service Scam Recovery 09:24 Closing Sponsor Thanks

5bytespodcast
IBM Stock Slide! Clinics Taken Down by Cyber Attack! BeyondTrust Vulnerability Being Exploited!

5bytespodcast

Play Episode Listen Later Feb 26, 2026 20:49


I dive into a devastating cyber attack on medical clinics in the US that sent them into downtime protocols, an update on the BeyondTrust vulnerability, rumors of new product launches by Apple and much more! Reference Links: https://www.rorymon.com/blog/ibm-stock-slide-clinics-taken-down-by-cyber-attack-beyondtrust-vulnerability-being-exploited/

Cyber Security Headlines
Google disrupts UNC2814, 3M+ impacted by TriZetto breach, Cisco bug exploited since 2023

Cyber Security Headlines

Play Episode Listen Later Feb 26, 2026 7:28


Google disrupts UNC2814 3M+ impacted by TriZetto breach Cisco bug exploited since 2023 Get links to all of today's news in our show notes here: Thanks to today's episode sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Picture a "new hire" who interviews well… except they're synthetic: AI video, AI voice, AI backstory. Once they're in, they go after payroll, internal docs, and access. That's the new reality: the attack surface is trust itself. Adaptive fights back with realistic deepfake simulations and training that actually sticks. adaptivesecurity.com.

Exploit Brokers - Hacking News
6 Zero-Days Exploited NOW, Lazarus Poisons npm, AI-Generated Malware & More | HN62

Exploit Brokers - Hacking News

Play Episode Listen Later Feb 26, 2026 24:18


Microsoft just dropped patches for SIX actively exploited zero-day vulnerabilities — and that's just the beginning. In this week's Hacking News, we break down the February 2026 Patch Tuesday emergency, North Korea's Lazarus Group poisoning npm and PyPI through fake job recruiters, nation-state hackers weaponizing Google's Gemini AI (including malware that writes its own payloads), a massive Dutch telecom breach affecting 6.2 million people, and a U.S. government contractor breach that ballooned from 4 million to potentially tens of millions affected. This is Exploit Brokers by Forgebound Research — cybersecurity news, threat intelligence, and insights. Whether you're a security analyst, developer, or just someone who wants to stay informed, this episode has something for you.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, February 24th, 2026: Malicious JPEG Analysis; Calibre Vuln; jsPDF object injection; Roundcube Exploited

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Feb 24, 2026 7:04


Another day, another malicious JPEG https://isc.sans.edu/diary/Another%20day%2C%20another%20malicious%20JPEG/32738 Calibre Path Traversal Leading to Arbitrary File Write and Potentially Code Execution CVE-2026-26064 CVE-2026-26065 https://github.com/kovidgoyal/calibre/security/advisories/GHSA-72ch-3hqc-pgmp https://github.com/kovidgoyal/calibre/security/advisories/GHSA-vmfh-7mr7-pp2w CVE-2026-25755: PDF Object Injection in jsPDF (addJS Method) https://github.com/ZeroXJacks/CVEs/blob/main/2026/CVE-2026-25755.md Roundcube Webmail Exploited CVE-2025-49113 https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10 https://www.openwall.com/lists/oss-security/2025/06/02/3

The John Batchelor Show
S8 Ep499: Jonathan Pelson recounts the evolution of Chinese telecommunications since 1980, AT&T's failure to predict the wireless market, and the early opportunistic founding of Huawei that exploited Western complacency. 1

The John Batchelor Show

Play Episode Listen Later Feb 23, 2026 11:44


  Jonathan Pelson recounts the evolution of Chinese telecommunications since 1980, AT&T's failure to predict the wireless market, and the early opportunistic founding of Huawei that exploited Western complacency. 1

Cyber Security Today
CISA Orders Emergency Patch for Actively Exploited Dell Flaw;

Cyber Security Today

Play Episode Listen Later Feb 20, 2026 8:33


CISA Orders Emergency Patch for Actively Exploited Dell Flaw; Texas Sues TP-Link; Massive ID Verification Data Leak; SSA Database Leak Allegations Host Jim Love covers four cybersecurity stories:  Cybersecurity Today  would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale.  You can find them at Meter.com/cst CISA ordered federal civilian agencies to patch an actively exploited critical Dell RecoverPoint for Virtual Machines vulnerability (CVE-2026-2769) within three days, citing hard-coded credentials that allow unauthenticated root access and links to a China-aligned threat cluster; Texas Attorney General filed suit against TP-Link alleging deceptive security and origin claims and risks tied to Chinese state-linked threats, while TP-Link denies the allegations and says it operates independently, stores U.S. user data on AWS, and bases core operations in the U.S.; researchers found an unsecured MongoDB database tied to AI-powered identity verification provider ID Merit exposing nearly 1 billion records with sensitive personal data, attributed to misconfiguration rather than compromise of the AI systems; and a MarketWatch report describes whistleblower Chuck Borges alleging SSA master data was copied to a cloud environment without oversight, contrasted by the Social Security Commissioner stating the core Numident database remained secure, with Love noting no confirmed public evidence but expressing concern about the implications if such foundational data were compromised. 00:00 Sponsor Message: Meter's Full-Stack Networking 00:19 Headlines: Dell Exploit, TP-Link Lawsuit, Massive Data Leak, SSA Claims 00:45 Urgent Patch Order: Actively Exploited Dell RecoverPoint CVE 02:19 Texas Sues TP-Link Over Router Security & China-Ties Allegations 03:31 AI Identity Verification Leak: Nearly 1 Billion Records Exposed 05:07 Did SSA Data Leak? Whistleblower vs. Official Denial 06:54 Host Take: What If the "Foundational" Database Was Compromised? 07:37 Wrap-Up + Sponsor Thanks and Where to Book a Demo

J Loren Norris
2/20/2026 FORGET FOMO DON'T GET EXPLOITED BY A FOFO

J Loren Norris

Play Episode Listen Later Feb 20, 2026 29:20


2/20/2026 FORGET FOMO DON'T GET EXPLOITED BY A FOFOEPISODE 1745Remember the fake out, the rope-a-dope, the shoulder shake, the ankle breaker, the faint and the head fake! All of these describe ways an opponent might take a player out of the play. Whether guarding the hoop, the hype or the home plate there will always be a fake. Something, someone, some time which competes against your greatest good. Stealing your focus, your attention, your efforts and your energy is the real game. The fake out is to convince you you're gonna miss out on something better. The truth is - THAT'S NOT EVEN YOUR REAL OPPOSITION!! It's a faux foe! Don't let the fear of missing out offered by a scammer keep your from your real wins. Stay the course. Keep your focus. Direct your energy. Finish your assignment!https://j-loren-s-school.thinkific.com/_________________________________________________________Leading Leaders Podcast is a short but impactful leadership video, blog and podcast distributed 5 days a week by J Loren Norris to promote faith, family and freedom in the face of a global leadership drought.Leadership Training, Interviews and EntertainmentVisit ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.StoryPowerAcademy.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ for more training material#leadingleaderspodcast #storypower #transforminggracetv #jlorennorrisLOOK FOR LEADING LEADERS PODCAST ON THESE PLATFORMS:- OBBM Network TV- WorldTrumpetTV- Apple Podcast- Spotify- Amazon- RumbleCopyright 2026 Tell It Like It Is Inchttps://my.linkpod.site/Jlorennorris 

Leading Leaders Podcast with J Loren Norris
2/20/2026 FORGET FOMO DON'T GET EXPLOITED BY A FOFO

Leading Leaders Podcast with J Loren Norris

Play Episode Listen Later Feb 20, 2026 29:20


2/20/2026 FORGET FOMO DON'T GET EXPLOITED BY A FOFOEPISODE 1745Remember the fake out, the rope-a-dope, the shoulder shake, the ankle breaker, the faint and the head fake! All of these describe ways an opponent might take a player out of the play. Whether guarding the hoop, the hype or the home plate there will always be a fake. Something, someone, some time which competes against your greatest good. Stealing your focus, your attention, your efforts and your energy is the real game. The fake out is to convince you you're gonna miss out on something better. The truth is - THAT'S NOT EVEN YOUR REAL OPPOSITION!! It's a faux foe! Don't let the fear of missing out offered by a scammer keep your from your real wins. Stay the course. Keep your focus. Direct your energy. Finish your assignment!https://j-loren-s-school.thinkific.com/_________________________________________________________Leading Leaders Podcast is a short but impactful leadership video, blog and podcast distributed 5 days a week by J Loren Norris to promote faith, family and freedom in the face of a global leadership drought.Leadership Training, Interviews and EntertainmentVisit ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://www.StoryPowerAcademy.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ for more training material#leadingleaderspodcast #storypower #transforminggracetv #jlorennorrisLOOK FOR LEADING LEADERS PODCAST ON THESE PLATFORMS:- OBBM Network TV- WorldTrumpetTV- Apple Podcast- Spotify- Amazon- RumbleCopyright 2026 Tell It Like It Is Inchttps://my.linkpod.site/Jlorennorris 

AMERICA OUT LOUD PODCAST NETWORK
CCP exploited Epstein and Harvard to penetrate US academia

AMERICA OUT LOUD PODCAST NETWORK

Play Episode Listen Later Feb 18, 2026 57:00 Transcription Available


Dr. Li-Meng Yan w/ The Voice of Dr. Yan – When academic independence is traded for money and prestige, the result is less science and more strategic advantage for a rival power. When trafficking and corruption intersect with intelligence operations, the threat moves from moral outrage to national security crisis. We must stop pretending institutional apologies are enough..

Cyber Security Today
BeyondTrust Zero-Day Exploited,

Cyber Security Today

Play Episode Listen Later Feb 16, 2026 10:33


This episode covers multiple active threats and security changes. It warns of an actively exploited critical BeyondTrust remote access vulnerability (CVE-2026-1731, CVSS 9.9) enabling pre-authentication remote code execution in Remote Support and Privileged Remote Access, noting SaaS was patched while on-prem deployments require urgent manual updates and may already be compromised. Microsoft details an evolution of the ClickFix social engineering technique where victims are tricked into running NSLookup commands that use attacker-controlled DNS responses as a malware staging channel, leading to payload delivery (including a Python-based RAT) and persistence via startup shortcuts, alongside increased Lumma Stealer activity.  Cybersecurity Today  would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale.  You can find them at Meter.com/cst Researchers also report Mac-focused campaigns abusing AI-generated content and malicious search ads to push copy-paste terminal commands that install an info stealer (MaxSync) targeting Keychain, browsers, and crypto wallets. T The show describes fake recruiter campaigns targeting developers with coding tests containing malicious dependencies on repositories like NPM and PyPI, linked to the "Gala" operation and nearly 200 packages. Finally, it reviews NPM's authentication overhaul after a supply-chain worm incident—revoking classic long-lived tokens, moving to short-lived session credentials, encouraging MFA and OIDC trusted publishing—while noting remaining risks such as MFA phishing, non-mandatory MFA for unpublish, and the continued ability to create long-lived tokens. 00:00 Sponsor: Meter + Today's Cybersecurity Headlines 00:48 Urgent Patch: BeyondTrust Remote Access RCE (CVE-2026-1731) Actively Exploited 02:45 ClickFix Evolves: DNS Lookups (nslookup) Used as Malware Staging 04:34 Mac Malware via AI Search Results: Fake Terminal Commands Deliver Info-Stealer 06:08 Fake Recruiters, Real Malware: Coding Tests Poison Dev Environments 07:19 NPM Security Overhaul After Supply-Chain Worm—What's Better, What Still Risks 09:11 Wrap-Up, Thanks, and Sponsor Message

Cyber Security Today
Exploited Microsoft Vulnerabilities, Phishing Tactics & Romance Scams: Cybersecurity Today

Cyber Security Today

Play Episode Listen Later Feb 13, 2026 10:26


In this episode of Cybersecurity Today with host Jim Love, we discuss six critical exploited Microsoft vulnerabilities, new phishing tactics using your own servers, and a zero-click vulnerability in Claude's code desktop extensions. We also explore trends in modern romance scams highlighting the younger, tech-savvy adult targets. Tune in for expert insights and practical tips to stay secure. Special thanks to Meter for their support. Hashtag Trending would like to thank Meter for their support in bringing you this podcast. Meter delivers a complete networking stack, wired, wireless and cellular in one integrated solution that's built for performance and scale. You can find them at Meter.com/htt 00:00 Introduction and Sponsor Message 00:45 Microsoft Vulnerabilities: A Growing Concern 02:38 Phishing Attacks Using Your Own Servers 04:16 Zero-Click Vulnerability in Claude AI 06:25 Romance Scams: Not Just Targeting the Elderly 09:14 Conclusion and Weekend Edition Teaser

5bytespodcast
Win11 Outperforms Win10! NTLM to be Disabled by Default! VMware ESXi Being Exploited in Attacks!

5bytespodcast

Play Episode Listen Later Feb 7, 2026 34:18


On this episode, I cover the retirement of a Microsoft product API, the disablement of another Microsoft feature, worrying cyber attack news and much more! Reference Links: https://www.rorymon.com/blog/win11-outperforms-win10-ntlm-to-be-disabled-by-default-vmware-esxi-being-exploited-in-attacks-again/

Cyber Security Headlines
Ukraine tightens controls on Starlink terminals, VMware ESXi flaw now exploited, SolarWinds Web Help Desk bug under attack

Cyber Security Headlines

Play Episode Listen Later Feb 5, 2026 6:52


Ukraine tightens controls on Starlink terminals VMware ESXi flaw now exploited SolarWinds Web Help Desk bug under attack Get the show notes here: https://cisoseries.com/cybersecurity-news-ukraine-tightens-controls-on-starlink-terminals-vmware-esxi-flaw-now-exploited-solarwinds-web-help-desk-bug-under-attack/ Huge thanks to our sponsor, Strike48 Strike48 is the Agentic Log Intelligence Platform that actually puts AI agents to work, maximizing log visibility without blowing your budget. Find threats your siloed tools miss. Get started today with pre-built AI agents and workflows that investigate, detect, and respond 24/7 or build your own at strike48.com/security.

GREY Journal Daily News Podcast
How Russian Hackers Exploited a Microsoft Office Vulnerability in Record Time

GREY Journal Daily News Podcast

Play Episode Listen Later Feb 5, 2026 3:03


Russian-state hackers, identified as APT28, exploited a Microsoft Office vulnerability, CVE-2026-21509, within 48 hours of a security update, compromising devices in diplomatic, maritime, and transport organizations across several countries. The attack used encrypted exploits and payloads executed in memory to evade detection. The campaign began on January 28, targeting organizations in nine countries, including Poland, Slovenia, and Ukraine, affecting defense ministries, transportation operators, and diplomatic entities.Learn more on this news by visiting us at: https://greyjournal.net/news/ Hosted on Acast. See acast.com/privacy for more information.

The Real News Podcast
Poisoned, exploited, abandoned: East Palestine, OH, three years later

The Real News Podcast

Play Episode Listen Later Feb 3, 2026 27:14


It's been three years since a Norfolk Southern “bomb train” carrying toxic chemicals derailed in the small town of East Palestine, Ohio, on the night of Feb. 3, 2023. Three days later, Norfolk Southern pressured local authorities to make the disastrous and completely unnecessary decision to vent five giant carloads of vinyl chloride into a ditch and set the contents on fire, releasing a massive chemical plume into the air, exposing residents in East Palestine and the surrounding areas to deadly toxins in one of the worst industrial disasters in US history. Three years later, residents are still getting sick, many have been financially ruined, they have been abandoned by their government and Norfolk Southern, and forgotten by the public. And, as Katya Schwenk details in a blockbuster new report for The Lever, residents are still waiting for the restitution they were promised from the $600 million settlement that Norfolk Southern agreed to pay to resolve residents' class-action lawsuit over the derailment.Guest:Katya Schwenk is a journalist based in Phoenix, AZ, and a reporter for The Lever. Her reporting and essays have appeared in The Intercept, the Baffler, the American Prospect, and elsewhere.Additional links/info: Katya Schwenk, The Lever / The Real News Network, “Three years later, life in East Palestine, Ohio, is still derailed”Maximillian Alvarez, The Real News Network, “America's toxic future looks like East Palestine, Ohio, today”Credits:Audio Post-Production: Alina NehlichBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-real-news-podcast--2952221/support.Help us continue producing radically independent news and in-depth analysis by following us and becoming a monthly sustainer.Follow us on:Bluesky: @therealnews.comFacebook: The Real News NetworkTwitter: @TheRealNewsYouTube: @therealnewsInstagram: @therealnewsnetworkBecome a member and join the Supporters Club for The Real News Podcast today!

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday, February 2nd, 2026: Google Presentation Abuse; Ivanti Vuln Exploited; Microsoft NTLM Strategy

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Feb 2, 2026 7:15


Google Presentation Abuse https://isc.sans.edu/diary/Google+Presentations+Abused+for+Phishing/32668/ Security Advisory Ivanti Endpoint Manager Mobile (EPMM) (CVE-2026-1281 & CVE-2026-1340) https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM-CVE-2026-1281-CVE-2026-1340?language=en_US Microsoft NTLM Strategy https://techcommunity.microsoft.com/blog/windows-itpro-blog/advancing-windows-security-disabling-ntlm-by-default/4489526

The John Batchelor Show
S8 Ep398: Sean McMeekin describes how Stalin exploited Lend-Lease beyond military necessity, using the program to acquire industrial equipment, raw materials, and nuclear-related supplies while manipulating Western generosity to strengthen Soviet postwar

The John Batchelor Show

Play Episode Listen Later Feb 1, 2026 9:19


Sean McMeekin describes how Stalin exploited Lend-Lease beyond military necessity, using the program to acquire industrial equipment, raw materials, and nuclear-related supplies while manipulating Western generosity to strengthen Soviet postwar capabilities and strategic position.1941 ROSTOV

CiTR -- Powerchord
Black Towers of Hell

CiTR -- Powerchord

Play Episode Listen Later Jan 31, 2026 120:39


Coleman returns with his first show of 2026, with a few late '25 releases and some brand new stuff this month from The Ruins of Beverast, Turpitude, Beholder and more. Plus spots on a string of upcoming punk shows from Nightfeeder, Bootlicker, Languid, and The Exploited. Closing out with a couple 10yr anniversaries from Cobalt and Mizmor, aaaand of course plenty more devastasting, brutal sounds for your earholes.

The Lead Pedal Podcast for Truck Drivers
LP1524 Understanding LMIA in Trucking: How the System Works and Where Newcomers Get Exploited

The Lead Pedal Podcast for Truck Drivers

Play Episode Listen Later Jan 30, 2026 14:54


Understanding LMIA in Trucking: How the System Works and Where Newcomers Get Exploited The LMIA (Labour Market Impact Assessment) system was designed to fill labour shortages—but in trucking, it's often misunderstood and, in some cases, abused. In this episode of the Lead Pedal Podcast, we break down how the LMIA system is supposed to work, how it's used in the trucking industry, and where newcomers can be vulnerable to exploitation. From illegal fees and false promises to job dependency and fear of speaking up, this conversation is about education and protection—not fear. If you're new to Canada, thinking about trucking, or already working under an LMIA, this episode will help you understand the system, recognize red flags, and ask better questions before putting your livelihood at risk. Stop in Comfort and Efficiently With Harnois Énergies Harnois Énergies is expanding its network into Ontario with the upcoming opening of a high-capacity truck stop—the largest in its network to date. Located in Woodstock, Ontario, at Exit 230 on Highway 401, this site will undergo two modernization phases throughout 2026. It will offer truck drivers and travelers a full range of amenities, including diesel and propane fueling, quick-service dining, showers, a large parking area for heavy trucks, RV refill stations, and two convenience stores designed to maximize comfort and efficiency during stops. To complement these services, the site will also host a partner specializing in heavy truck mechanical repairs. If you don't already have your Esso Truck Stop card, visit HarnoisEnergies.com or call 1-800-363-2712. Serving you since 1958—Harnois Énergies     At Bison – They Put Safety First! Bison's "Right to Decide" Policy gives every Driver their ultimate protection. Drivers make the final decision if it is safe to drive and Bison actively encourages Driver's use of this policy.    You can learn more about Bison and the opportunities available at www.bisondriving.com   or call 1-800-527-5781 @BisonTransport #bisontransport     Improve the Compliance of Your Fleet With Compliance Mentorz Compliance Mentorz, a leading commercial safety consulting company, is proud to serve clients nationwide across Canada. But our commitment to safety and compliance doesn't stop at borders – we're excited to extend our support to clients throughout North America. Call 905-486-1666x215 or Learn more at www.compliancementorz.com                         About the Podcast The Lead Pedal Podcast for Truck Drivers helps truck drivers improve their truck driving careers, trucking businesses as owner operators, CDL skills, find trucking jobs, and offer trucking career tips. Learn about the trucking benefits and salaries as a professional truck driver through interviews and tips related to the North American Trucking Industry. The Lead Pedal Podcast is a Canadian based trucking podcast focused on trucking in Ontario, Canada. LISTEN TO THE PODCAST- The show is available at www.theleadpedalpodcast.com , Apple Podcasts, Spotify, iHeartradio, and other popular podcast platforms. Thanks for listening! The Lead Pedal Podcast for Truck Drivers talks all things trucking for people in the transportation industry helping them improve their business and careers. Interviews with industry professionals and truck drivers, trucking equipment information, event coverage, and other features on the industry are meant to be helpful for truck drivers and those in transportation. The Lead Pedal Podcast for Truck Drivers has main episodes released every Monday, Wednesday, and Friday with bonus material on other days. You can learn more about the host and show on our website and make sure to SUBSCRIBE to the show on your favourite podcast platform. www.theleadpedalpodcast.com  What does The Lead Pedal Podcast mean? The Lead (pronounced - Led) stands for acceleration or fast-track of your career or business. It is a play on words and we certainly are not here promoting speeding in the industry. We are hoping this information will help you become a professional driver faster than if you didn't know about many of these topics. Are you enjoying the show? If so we would appreciate you leaving us a rating and review on your favourite podcast platform. www.theleadpedalpodcast.com  Join The Lead Pedal Fan Club where are loyal fans get first chance at specials, discounts on merchandise and much more.The club is free to join and you can learn more at www.theleadpedalfanclub.com  LISTEN TO LEAD PEDAL RADIO with music and entertainment with a trucking theme at www.LeadPedalRadio.com     

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday, January 26th, 2026: FortiOS SSO Vuln Updates; Outlook OOB Update; VMware vCenter Exploited

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jan 26, 2026 4:21


Analysis of Single Sign-On Abuse on FortiOS Fortinet released an advisory. FortiOS devices are vulnerable if configured with any SAML integration, not just FortiCloud https://www.fortinet.com/blog/psirt-blogs/analysis-of-sso-abuse-on-fortios Outlook OOB Update Microsoft released a non-security OOB Update for Outlook, fixing an issue introduced with this months security patches. https://support.microsoft.com/en-us/topic/january-24-2026-kb5078127-os-builds-26200-7628-and-26100-7628-out-of-band-cf5777f6-bb4e-4adb-b9cd-2b64df577491 VMware vCenter Server Vulnerabilities Exploited (CVE-2024-37079, CVE-2024-37080, CVE-2024-37081) A VMWare vCenter vulnerability patched last June is now actively exploited. https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453

Hidden Killers With Tony Brueski | True Crime News & Commentary
Monique Tepe Never Documented the Abuse: Why Victims Stay Silent & How McKee Allegedly Exploited It

Hidden Killers With Tony Brueski | True Crime News & Commentary

Play Episode Listen Later Jan 25, 2026 36:50


Rob Misleh said something on Good Morning America that stops you cold: "She just had to get away from him." He said Monique told him Dr. Michael McKee was emotionally abusive. That she was willing to do anything to escape. That many in the family knew about the torment. Misleh called McKee a monster, said Monique never spoke his name after the 2017 divorce—only "her ex-husband." She was always worried. But nobody thought he'd actually do it.Now look at the court records. No domestic violence allegations. No protection orders. No restraining orders. The divorce paperwork says "incompatibility." That's it. If you read those documents blind, you'd think this was the most amicable split in Ohio history. The family knew the truth. The legal system never did.Police just confirmed the murder weapon was recovered from McKee's Chicago penthouse. NIBIN matched shell casings from the Tepe bedroom to a firearm seized from his residence. His alibi collapsed before his arrest. ATF picked him up at a Chick-fil-A seven minutes from the hospital where he worked. Surveillance footage places him near the Tepe home during the murder window. He allegedly drove 300 miles to execute his ex-wife and her husband while their two children slept in separate rooms.Attorney Eric Faddis examines why so many victims choose not to document abuse in divorce proceedings—the fear that it makes things worse, the belief that staying quiet means staying safe. He breaks down how the legal system treats emotional abuse compared to physical abuse and whether it carries less weight in court. Then there's June 2025: eight years after the divorce, something brought McKee and Monique back into the court system. Six months later, she was dead. For anyone who recognizes their own situation in Monique's story, Eric offers guidance on what steps victims can take when the system wasn't built to see the threat coming.#MoniqueTepe #SpencerTepe #MichaelMcKee #EricFaddis #DomesticViolence #EmotionalAbuse #HiddenKillers #MurderWeapon #NIBIN #TeepeMurdersJoin Our SubStack For AD-FREE ADVANCE EPISODES & EXTRAS!: https://hiddenkillers.substack.com/Want to comment and watch this podcast as a video? Check out our YouTube Channel. https://www.youtube.com/@hiddenkillerspodInstagram https://www.instagram.com/hiddenkillerspod/Facebook https://www.facebook.com/hiddenkillerspod/Tik-Tok https://www.tiktok.com/@hiddenkillerspodX Twitter https://x.com/tonybpodListen Ad-Free On Apple Podcasts Here: https://podcasts.apple.com/us/podcast/true-crime-today-premium-plus-ad-free-advance-episode/id1705422872This publication contains commentary and opinion based on publicly available information. All individuals are presumed innocent until proven guilty in a court of law. Nothing published here should be taken as a statement of fact, health or legal advice.

Risky Business News
Risky Bulletin: Improperly patched bug exploited again in Fortinet firewalls

Risky Business News

Play Episode Listen Later Jan 22, 2026 6:39


A poorly patched bug is being exploited in Fortinet firewalls, hackers go after security testing environments, Jordanian police used Cellebrite against activists, and new Cisco and SmarterMail zero-days. Show notes Risky Bulletin: Improperly patched bug exploited again in Fortinet firewalls

DISGRACELAND
The Runaways: Exploited by the Music Industry, Escape, and Excellent Rock ‘N' Roll

DISGRACELAND

Play Episode Listen Later Jan 20, 2026 38:03


This is the story of five teenage girls who used rock ‘n roll to escape their lives, their names, and their futures—only to find themselves trapped in a nightmare of fame, exploitation, and identity turned inside-out. From the Sunset Strip to a jail cell in England, from David Bowie fantasies to Kim Fowley's real-life horrors, this is how the Runaways reinvented what rebellion could be—and paid the ultimate price in the process. This episode contains themes that may be disturbing to some listeners, including sexual assault and suicide. If you're thinking about suicide, or are worried about a friend or loved one, call the Suicide Prevention Lifeline at 800-273-8255. To listen to Disgraceland ad free and get access to weekly bonus content and more, become a Disgraceland All Access member at ⁠⁠⁠⁠disgracelandpod.com/membership⁠⁠⁠⁠. Sign up for our newsletter and get the inside dirt on events, merch and other awesomeness - ⁠⁠⁠⁠GET THE NEWSLETTER⁠⁠⁠⁠ Follow Jake and DISGRACELAND: ⁠⁠⁠⁠Instagram⁠⁠⁠⁠ ⁠⁠⁠⁠YouTube⁠⁠⁠⁠ ⁠⁠⁠⁠X⁠⁠⁠⁠ (formerly Twitter)  ⁠⁠⁠⁠Facebook Fan Group⁠⁠⁠⁠ ⁠⁠⁠⁠TikTok⁠ To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices

Mark Narrations - The Wafflecast Reddit Stories
I SNAPPED After My Sister EXPLOITED Me As A Free Nanny | Reading Reddit Podcast

Mark Narrations - The Wafflecast Reddit Stories

Play Episode Listen Later Jan 20, 2026 22:34


In today's narration of Reddit stories podcast, OP has had enough of being taken advantage of by her sister who keeps manipulating OP to take care of her kids.0:00 Intro0:20 Story 15:29 Story 1 Comments / OP's Reply8:42 Story 1 Update11:03 Story 1 Update 112:48 Story 1 Update 215:21 Story 1 Update 317:40 Story 1 Update 420:18 Story 1 Comments / OP's Reply#redditupdate #redditrelationship #redditpodcast Hosted on Acast. See acast.com/privacy for more information.

David Bombal
#531: Critical 10/10 n8n Vulnerability EXPLOITED

David Bombal

Play Episode Listen Later Jan 19, 2026 34:05


Security researchers Dor Attias and Ofek Itach demonstrate a critical CVSS 10.0 n8n vulnerability (CVE-2026-21858). Watch the full RCE exploit demo using type confusion to bypass authentication and read sensitive local files. // Dor Attias SOCIAL // LinkedIn: / dor-attias-740758155 // Ofek Itach SOCIAL // LinkedIn: / ofek-it // N8N Hack Blog https://www.cyera.com/research-labs/n... // Cyera Blog // https://www.cyera.com/blog // David's SOCIAL // Discord: discord.com/invite/usKSyzb Twitter: www.twitter.com/davidbombal Instagram: www.instagram.com/davidbombal LinkedIn: www.linkedin.com/in/davidbombal Facebook: www.facebook.com/davidbombal.co TikTok: tiktok.com/@davidbombal YouTube: / @davidbombal Spotify: open.spotify.com/show/3f6k6gE... SoundCloud: / davidbombal Apple Podcast: podcasts.apple.com/us/podcast... // MY STUFF // https://www.amazon.com/shop/davidbombal // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com // MENU // 0:00 - Coming up 0:56 - n8n vulnerability explained 02:33 - n8n hacking demo // How the vulnerability works 09:13 - How bad is it? 11:51 - Vulnerability summary 13:28 - More explained on Cyera blog // Webhooks 16:59 - Webhooks explained 18:09 - Formidable 19:18 - Formidable explained 20:01 - Handling uploaded files in n8n 22:32 - The form webhook node 24:28 - How to exploit 25:54 - Exploit summary 26:46 - How to mitigate 27:37 - How to become a security researcher 32:36 - Conclusion Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only.

GREY Journal Daily News Podcast
Could Your Windows System Be Vulnerable to This Exploited Flaw?

GREY Journal Daily News Podcast

Play Episode Listen Later Jan 16, 2026 2:38


Microsoft released a security update to address a zero-day vulnerability in Desktop Window Manager, tracked as CVE-2026-20805, after detecting active exploitation. The flaw allows local attackers to expose sensitive user-mode memory and potentially escalate privileges. Affected platforms include Windows 10 version 1809, Windows Server 2012, 2012 R2, and 2016. Microsoft urges immediate patch deployment, restriction of low-privilege accounts, and monitoring of DWM processes to mitigate risk. No public proof-of-concept code exists, but organizations running unsupported systems face increased exposure.Learn more on this news by visiting us at: https://greyjournal.net/news/ Hosted on Acast. See acast.com/privacy for more information.

Cyber Security Today
HPE Open View Vulnerability Hits CISA Known Exploited List

Cyber Security Today

Play Episode Listen Later Jan 14, 2026 10:58


Cybersecurity Today: Credit Card Skimming, Valley Rat Malware, WhatsApp Exploit & AI Defenses In this episode of Cybersecurity Today, hosted by Jim Love, we explore several critical cybersecurity threats and advancements. We cover a massive credit card skimming campaign active since early 2022, a severe bug in HPE OneView, the stealthy Valley Rat malware, and a potential zero-click exploit in WhatsApp. Additionally, we delve into AI-driven advancements in cybersecurity defense being developed at US National Laboratories. Stay informed and vigilant with the latest insights in cybersecurity. 00:00 Introduction and Sponsor Message 00:48 Credit Card Skimming Campaign Uncovered 02:49 Critical Vulnerability in HPE OneView 04:16 Valley Rat Malware Threat 06:22 Suspected Zero-Day Vulnerability in WhatsApp 08:29 AI-Powered Cyber Defenses in US National Labs 10:08 Conclusion and Sponsor Message

The John Batchelor Show
S8 Ep289: Guest: Cleo Paskal. Paskal details severe corruption in Saipan, where Chinese interests have exploited visa loopholes and influenced local politics via a casino. Illegal entry by Chinese nationals poses security risks to nearby Guam, though Pala

The John Batchelor Show

Play Episode Listen Later Jan 6, 2026 12:26


Guest: Cleo Paskal. Paskal details severe corruption in Saipan, where Chinese interests have exploited visa loopholes and influenced local politics via a casino. Illegal entry by Chinese nationals poses security risks to nearby Guam, though Palau is receiving U.S. assistance to strengthen defenses against similar influence operations.1944 SAIPAN

5bytespodcast
MongoBleed Being Exploited! RAM Price Inflation Continues! Ads in ChatGPT!

5bytespodcast

Play Episode Listen Later Jan 5, 2026 18:26


On this episode, I cover some security concerns that have bubbled up over the last couple of weeks including MongoBleed and several harmful Chrome extensions, talk of ads coming to ChatGPT and much more! Reference Links: https://www.rorymon.com/blog/mongobleed-being-exploited-ram-price-inflation-continues-ads-in-chatgpt/

Breaking Free from Narcissistic Abuse
You Can Love Them and Still Be Exploited: Sexual Coercion with Cult Expert Pamela Takefman

Breaking Free from Narcissistic Abuse

Play Episode Listen Later Jan 5, 2026 30:28 Transcription Available


Ever wondered how someone can exploit you sexually while you still love them?This week, Pamela Takefman joins Dr. Kerry to explain how sexual coercion works—and why it doesn't always require kidnapping or obvious physical force to be real. We discuss how exploitation can unfold in marriages, spiritual communities, and high-status celebrity circles (including public conversations like the P. Diddy case).Learn how perpetrators gradually test boundaries until extreme exploitation feels normal, and why loving your abuser doesn't mean the abuse isn't real.PODCAST EXTRA EXCLUSIVE SEGMENT Find the exclusive second segment and weekly newsletter here: https://substack.com/@breakingfreenarcabuseMORE ABOUT THE PODCAST EXTRA INTERVIEW 

The Death Studies Podcast
Joshua Hurtado Hurtado on postmortal futures, future studies, de-growth, immortality imaginaries, future collective death, Westworld, and promoting your work in 2026

The Death Studies Podcast

Play Episode Listen Later Jan 2, 2026 75:44


What's the episode about? In this episode, hear Joshua Hurtardo Hurtardo on postmortal futures, future studies, de-growth, immortality imaginaries, future collective death, Westworld, and promoting your work in 2026 Who is Joshua?Joshua Hurtado Hurtado is a Mexican interdisciplinary researcher, currently finalising his PhD research at the University of Helsinki, Finland. He studied International Relations for his Bachelor's degree at the Tecnológico de Monterrey university,in Mexico. He obtained his first Master's degree in International Relations as well, specialising in Ideology and Discourse analysis, from the University of Essex, in the United Kingdom. He did a second Master's degree at the University of Turku, in Finland, this time in Futures Studies. After that, he began hisPhD research at the University of Helsinki, Finland, in Interdisciplinary Environmental Sciences. He uses his expertise in several disciplines and fields of study to conduct theoretical and empirical research on the topics of death and immortality, as well as on the topics of degrowth and sustainability more generally. Scholars in the DeathStudies field will find his articles ‘Towards a postmortalsociety of virtualised ancestors? The Virtual Deceased Person and the preservation of the social bond', ‘Envisioning postmortalfutures: six archetypes on future societal approaches to seeking immortality', and ‘Exploited in immortality: Techno-capitalism and immortality imaginaries in the twenty-firstcentury' published in the journal Mortality, his article ‘Fight, or flee, the future: Affect in contrasting responses against future collective death' published in the journal Journal of Sociology, and his book chapters ‘Westworld, Morality, and Digital Afterlives' in the edited collection Depicting the Afterlife in Contemporary Film and Media: Morality, Religion and Death byAngelique Nairn, and ‘Death, Relationality, and Resistance against Necropolitical Violence in Latin America' in the upcoming edited book Decolonising Death Studies by Panagiotis Pentaris, Stacey Pitsillides and Hajar Ghorbani.  In addition to his academic trajectory, he has also worked at the Ministry of Social Development at the local level in Nuevo León, Mexico, in the roles of policy analyst and later chief of research. He has taught courses at the Undergraduate level at Tecnológico de Monterrey, in Mexico, on Business Models andEntrepreneurship (despite his insistent anti-capitalist critiques) and at the Master's level at the University of Helsinki, on Organizations and EconomicDegrowth. In his spare time, he enjoys reading, watching films and TV series, and playing with Luna, his family's dog. You can contact him via the following email addresses: joshua.hurtado.h@gmail.com (personal), and joshua.hurtado@helsinki.fi (institutional, as of January 2026). You can find him at BlueSky at @joshuahh.bsky.socialHow do I cite the episode in my research and reading lists?To cite this episode, you can use the following citation: Hurtado Hurtado, J. (2026) Interview on The Death Studies Podcast hosted by Michael-Fox, B. and Visser, R. Published 2 January 2026. Available at: www.thedeathstudiespodcast.com,DOI: 10.6084/m9.figshare.30987202What next?Check out more episodes or find out more about the hosts!Got a question? Get in touch.

Volunteer Nation
195. The Top 10 Volunteer Nation Podcast Episodes for 2025 - Our Countdown

Volunteer Nation

Play Episode Listen Later Jan 1, 2026 37:28


As we step into a brand-new year, Tobi takes listeners on a reflective walk through the most popular Volunteer Nation Podcast episodes of 2025, sharing key insights and takeaways from each. Think of this as a Reader's Digest–style recap of the ideas, strategies, and conversations that resonated most with volunteer engagement leaders over the past year and a powerful resource to help you start 2026 with clarity, connection, and momentum! Full show notes: 195. The Top 10 Volunteer Nation Podcast for 2025 - Our Countdown Volunteer Nation Podcast - Episode Highlights [03:16] - #10: Episode 177, Manage Volunteers Like a Pro and Episode 174, Write Volunteer Emails Volunteers Actually Read [07:11] - #9: Episode 163, New Research from Points of Light with Jennifer Sirangelo [09:46] - #8: Episode 143, Three Big Problems with Your Volunteer Recruitment Flyer [13:56] - #7: Episode 166, Train Volunteers with This Simple 4-Step Framework [18:21] - #6: Episode 146, Expanding the Volunteer Jobs to Be Done at Your Nonprofit [23:11] - #5: Episode 157, A Fresh Take on Volunteer Position Descriptions [27:06] - #4: Episode 176, Beyond Pizza Parties: Innovative Volunteer Appreciation Ideas [31:31] - #3: Episode 154, Entitled or Exploited? Volunteer Bias in Organizations [36:46] - #2: Episode 162, The #1 Secret to Deep Volunteer Participation [39:41] - #1: Episode 147, Volunteer Recruitment Trends from Our New Report [45:16] - Key themes from 2025: mindset, clarity, connection, systems, evolving expectations [49:31] - Final reflections Helpful Links Volunteer Management Progress Report  Thanks for listening to this episode of the Volunteer Nation podcast. If you enjoyed it, please be sure to subscribe, rate, and review so we can reach more people like you who want to improve the impact of their good cause. For more tips and notes from the show, check us out at TobiJohnson.com. For any comments or questions, email us at WeCare@VolPro.net.

Cyber Security Today
MongoDB - MongoBleed Vulnerability Exploit Reported On Christmas Day

Cyber Security Today

Play Episode Listen Later Dec 29, 2025 14:01


Cybersecurity Today: MongoDB Vulnerability 'Mongo Bleed' Exploited, Rainbow Six Siege Hacked, Trust Wallet Compromise, and GrubHub Crypto Scams In this episode of Cybersecurity Today, David Shipley covers significant cybersecurity incidents that occurred over the holiday period. The major topics include the 'Mongo Bleed' vulnerability in MongoDB that was disclosed and then publicly exploited on Christmas Day, leading to potential data leaks. Ubisoft's Rainbow Six Siege faced a breach enabling attackers to manipulate in-game functions and distribute billions worth of in-game currency for free. Trust Wallet's browser extension was compromised, resulting in a loss of approximately $7 million in cryptocurrencies. Finally, a phishing scam using a legitimate GrubHub subdomain to promise fake Bitcoin rewards was also discussed. Immediate actions and preventive updates were highlighted for all these incidents. 00:00 Introduction and Sponsor Message 00:48 Mongo Bleed Vulnerability Exploit 04:10 Rainbow Six Siege Breach 08:13 Trust Wallet Extension Hack 10:30 GrubHub Bitcoin Scam 12:02 Conclusion and Sign-Off

10/3: Canada Covered
How some migrant farm workers wind up exploited under the Temporary Foreign Worker program

10/3: Canada Covered

Play Episode Listen Later Dec 23, 2025 28:41


Canada's agriculture industry employs tens of thousands of temporary foreign workers to help pick the produce that winds up on your plate.  While many see this as a lifeline, a way to earn money to send to families back home, there are concerns the system is set up to exploit, and in some cases, abuse them.  Robert Cribb, founder and director of the Investigative Journalism Bureau, joins host Dave Breakenridge to discuss the conditions under which these migrants work, and how the system designed to help bring them here for employment may actually be setting them up for harm.  Further reading: 'This is the new slavery': Migrant farm workers underpaid, abused and injured Learn more about your ad choices. Visit megaphone.fm/adchoices

canada migrant exploited farm workers wind up temporary foreign worker program robert cribb
House Podcastica: A Game of Thrones Podcast

Reposted from They Did What?!, which you can find now or very soon at: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://podcastica.com/podcast/they-did-what⁠⁠ — Kelsey and Gen discuss Predators, directed by David Osit, released December 8th 2025 on Paramount+, as a product of MTV Entertainment, and revisits the cultural phenomenon of To Catch a Predator, the early-2000s Dateline NBC series that set out to publicly expose men seeking sexual contact with minors online. Using archival footage, behind-the-scenes material, and interviews with people involved on all sides, including Chris Hansen himself, Predators poses questions about accountability, spectacle, and the human cost of turning crime into content. Next up: “We Beat The Dream Team”, streaming on HBO Max Send us an email or a voice message to ⁠theydidwhat@podcastica.com⁠, connect with us on Podcastica's discord at ⁠https://discord.gg/hUW632B9PB⁠, or look out for our episode comment posts on ⁠facebook.com/groups/podcastica⁠. We'd love to hear from you! Waiting for our next episode? Leave us a rating or review wherever you get your podcasts and help more people find us to join the fun! Then explore other great shows in the Podcastica network at ⁠podcastica.com⁠!   Mentioned: IndieWire interview with David Osit ⁠https://www.youtube.com/watch?v=uI21Vvu7X1w⁠ NBC News article on Bill Conradt's suicide ⁠https://www.nbcnews.com/id/wbna15592444⁠ Roblox controversy ⁠https://en.wikipedia.org/wiki/Child_safety_on_Roblox⁠ Chris Hansen's Roblox controversy coverage ⁠https://en.wikipedia.org/wiki/Child_safety_on_Roblox⁠ Charges dropped in internet sex-sting cases - Murphy, TX ⁠https://web.archive.org/web/20070609144452/http://www.dallasnews.com/sharedcontent/dws/dn/latestnews/stories/060707dnmetsexsting.36ff8b8.html⁠ Where Are They Now? Chris Hansen ⁠https://www.instagram.com/officialchrishansen?utm_source=ig_web_button_share_sheet&igsh=ZDNlZDc0MzIxNw==⁠ ⁠https://podcasts.apple.com/us/podcast/have-a-seat-with-chris-hansen/id1543252280⁠ ⁠https://open.spotify.com/show/6ia78zSNRXH9n35pd4yNYf?si=336a23236f674268⁠ Skeeter Jean ⁠https://www.youtube.com/@therealskeeterjean⁠ ⁠https://www.instagram.com/therealskeeterjean?utm_source=ig_web_button_share_sheet&igsh=ZDNlZDc0MzIxNw==⁠ Support Resources: National Center for Exploited and Missing Children ⁠https://ncmec.org/theissues/trafficking⁠ US Dept of Justice - Criminal Division - Citizen's Guide To U.S. Federal Child Exploitation And Obscenity Laws ⁠https://www.justice.gov/criminal/criminal-ceos/citizens-guide-us-federal-child-exploitation-and-obscenity-laws⁠ International Protection Alliance - Stop Online Predators ⁠https://protectall.org/what-we-do-to-stop-online-exploitation/prevention/⁠ ⁠ Learn more about your ad choices. Visit megaphone.fm/adchoices

Metal Nerdery
#331 THE YEAR IN METAL – 1996

Metal Nerdery

Play Episode Listen Later Dec 18, 2025 77:46


“You can't be funny if you're happy all the time…”   1996 marked the time that The Super Bowl went Triple X, when Atlanta hosted the Summer Olympics, the United States national debt was a measly $5 Trillion, and the world of heavy metal continued its march forward, trudging past the brief grunge fad into darker, sludgier, and heavier waters.    “Is this KISS?”   The thrash period of the early 90's had already faded away as the grunge period came and went, and the overall vibe of metal was shifting to something even angrier and darker, with a veritable orgy of new metal subgenres popping up and coming online faster than OnlyFans accounts during the lockdowns of 2020, back when we were all just trying to “flatten the herd”.   “Now it's just me and Wristina…she's been by my side forever…she knows all the moves…”   Discover why having a “fistful of Jergens” is essential and why shampoo bottles should really come with a warning label. Get your holiday prime rib dinner properly roasted, get your state of consciousness properly toasted, and JOIN US as we look forward to 2026, a mere 30 years since THE YEAR IN METAL – 1996. Visit www.metalnerdery.com/podcast for more on this episode Help Support Metal Nerdery https://www.patreon.com/metalnerderypodcast Leave us a Voicemail to be played on a future episode: 980-666-8182 Metal Nerdery Tees and Hoodies – metalnerdery.com/merch and kindly leave us a review and/or rating on your favorite Podcast app Follow us on the Socials: Facebook - Instagram - TikTok Email: metalnerdery@gmail.com Can't be LOUD Enough Playlist on Spotify Metal Nerdery Munchies on YouTube @metalnerderypodcast   Show Notes:   (00:01): “Hey…nice shot.” / Richard Patrick…Dick Pat…/ “It's the holiday season…”/ “Squeege?” / “Dennis Leary…the comedian formerly known as Bill Hicks?” / “It's the basis of what ended their friendship…”/ “You can't be funny if you're happy all the time…” / “Other R-worded (you can say it, Trump's president)…” / “All the words that are offensive, we'll just pick a letter…to be 100% politically correct…”/ #politicallycorrect / “You don't have to say ‘W-word'…” / ***WARNING: #listenerdiscretionisadvised *** / “It'd be like a trans-metal song…” / ***WELCOME BACK TO THE METAL NERDERY PODCAST!!!*** / “We're all W words down here, man…”/ “But now it's just me and Wristina…she's been by my side forever…she knows all the moves…”/ “This hand…looks like it could use a fistful of Jergens…” / #shampoowarning   (07:57): ***SOCIAL MEDIA US at #metalnerderypodcast on #TikTok #YouTube #Instagram and #Facebook & EMAIL US at metalnerdery@gmail.com (including your #Shittah!) & PATREON US at patreon.com/metalnerderypodcast *** / Patreon shoutout…/ “Thank you Trip6 for joining us…he's the inspiration for the Angry Matt podcast…”/ YOU CAN GIVE US A CALL AND LEAVE US A VOICEMAIL US AT 980-666-8182!!! / #RussellsWeddingReflections / “Is he a big #MAGMA person?”/ #ChateauElan / “Open bar is scary, dude…”/ #fivecoursemeal / “Fuck the food, dude…we're getting' hammered!”/ “How do you get your filet, sir?” / #primerib / “WTF is prime rib? I could never tell if it's a roast, a steak, a steak-roast, or a roast-steak?” / “It's generally not smoked, it's roasted…”   (19:34): #TheDocket METAL NERDERY PODCAST PRESENTS:  1996 – YEAR IN METAL /  “The Year of Tool, Pantera…the Loads…”/ “Everytime I wanna hear a deep cut, Russell wants to go with the hit, and now, it's the exact opposite…”/ #onmicburp / “I don't know if you do that when you stroke…not like that…”/ #Overkill COLD HARD FACT / BATTLE (The Killing Kind) / “We've gotta do a dive on this at some point…”/ #Annihilator REFRESH THE DEMON (Refresh The Demon)    (29:43): “That's like their #GarageDays …”/ #Slayer GEMINI (Undisputed Attitude) /  “Just don't do that again…”/ “Have we ever played #IcedEarth on this podcast?”/ #IcedEarth I'D DIE FOR YOU (The Dark Saga) / “Is this KISS?”/ “That felt like a gloves of shame moment right there…”/ #Pantera DRAG THE WATERS (The Great Southern Trendkill) / “It's just noise…that's my least favorite…”/ “I don't think we've ever played The Exploited on this show…”/ #TheExploited BEAT THE BASTARDS (Beat The Bastards)   (40:30): “I already pulled it up…how about…this one?”/ #Tool HOOKER WITH A PENIS (Ænima) / “Remember the two different album dives we did of this?”/ #Sepultura ROOTS BLOODY ROOTS (Roots) / “Is this like their Lick It Up?” / “How about some Life Is Peachy?”/ “We need to do a noise episode…” / #KoRn MR. ROGERS (Life Is Peachy) / “If it comes on sounding like #Queensryche I'm gonna laugh…”/ #Neurosis LOCUST STAR (Through Silver In Blood) / “Definitely atmospheric…” / #Assmopheric / #buttexhaust /  “Technically if we eat cows, we're also vegan, right?    (50:55): “In terms of the album cover, relative to the first one…FAIL!”/ #RATM YEAR OF THA BOOMERANG (Evil Empire) / “Let's play Burzum…I'm kidding…remember what that is?”/  “Saffonic noise…” / “I do sling my flagen dugen…”/ #Burzum (Filosofem) / “You gotta work a little harder to kill somebody with a hammer…”/ “He's so shitty that R.E.M. must write all his songs for him…”/ A moment of #STP during Russell's brief absence…/ #StoneTemplePilots AND SO I KNOW (Tiny Music…Songs from the Vatican Gift Shop) / #STPASMR / #markthetime / “How about some Acid Bath, actually?” / “And then…”/ #AcidBath PAEGAN LOVE SONG (Paegan Terrorism Tactics)    (1:03:40): “How about a little Cannibal Corpse?” The first album featuring George “Corpsegrinder” Fisher on vocals… / “How about the #killeropener?” / #CannibalCorpse DEVOURED BY VERMIN (Vile) / “That's good stuff…”/ “I feel like children smell like sadness…”/ “How about a little EyeHateGod?”/ #AI / “What an album cover that is?” / #EyeHateGod  DIXIE WHISKEY (Dopesick) / “That's album number 3 for them, btw…”/  “What was the number 1 #Billboard hit song in 1996?”/ “You know…NOPE!”/ “Let's end the show this way…”/ “You know what they're doing? Reinventing the Metal…”/ THANK YOU FOR JOINING US!!! / #untilthenext #outroreel #likesharesubscribe #happyholidays

System Update with Glenn Greenwald
Sydney Shooting Exploited for Pro-Israel Censorship and Anti-Muslim Crackdowns

System Update with Glenn Greenwald

Play Episode Listen Later Dec 17, 2025 85:46


Pro-Israel political opportunists exploit the tragic shooting on Bondi Beach in an attempt to escalate anti-Muslim hatred as Israel support dwindles. Plus: how Israel pressures Western governments to censor pro-Palestinian sentiment.  ------------------------------- Watch full episodes on Rumble, streamed LIVE 7pm ET. Become part of our Locals community Follow System Update:  Twitter Instagram TikTok Facebook  

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Wednesday, December 17th, 2025: Beyond RC4; Forticloud SSO Vuln Exploited; FortiGate SSO Exploited;

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Dec 17, 2025 6:38


Beyond RC4 for Windows authentication Microsoft outlined its transition plan to move away from RC4 for authentication and published guidance and tools to facilitate this change. https://www.microsoft.com/en-us/windows-server/blog/2025/12/03/beyond-rc4-for-windows-authentication FortiCloud SSO Login Vuln Exploited Arctic Wolf observed exploit attempts against vulnerable FortiGate appliances. https://arcticwolf.com/resources/blog/arctic-wolf-observes-malicious-sso-logins-following-disclosure-cve-2025-59718-cve-2025-59719/ FrePBX Vulnerability Horizon3.ai identified three distinct vulnerabilities in FreePBX. In particular, the authentication by-pass issue should be of concern, but default FreePBX installs do not use the vulnerable web authentication feature. https://horizon3.ai/attack-research/the-freepbx-rabbit-hole-cve-2025-66039-and-others/

Cyber Security Headlines
Rogue NuGet package steals data, Venezuela's PDVSA suffers attack, patched Fortinet flaws exploited

Cyber Security Headlines

Play Episode Listen Later Dec 17, 2025 7:45


Rogue NuGet package steals data Venezuela's PDVSA suffers attack Patched Fortinet flaws exploited Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first cybersecurity company backed by OpenAI. Picture a "new hire" who interviews well… except they're synthetic: AI video, AI voice, AI backstory. Once they're in, they go after payroll, internal docs, and access. That's the new reality: the attack surface is trust itself. Adaptive fights back with realistic deepfake simulations and training that actually sticks. Learn more at adaptivesecurity.com.  

The New Abnormal
How Trump, 79, Is Being Exploited By His 'Friend'

The New Abnormal

Play Episode Listen Later Dec 11, 2025 23:55


Ambassador John Bolton joins Hugh Dougherty to chart the growing dangers of Trump's foreign policy, driven by impulse rather than strategy. Bolton, Trump's former national security adviser, describes a president who ignores formal briefings, takes cues from Mar-a-Lago guests, and makes decisions by “neuron flash,” leaving Venezuela, Europe, and Ukraine trapped in contradiction and drift. As Trump chases a Nobel Prize and treats strongmen like personal allies, Bolton presses a defining question: How long can America's security withstand a leader who refuses to plan? Hosted on Acast. See acast.com/privacy for more information.

The Secret To Success with CJ, Karl, Jemal & Eric Thomas
Exploited: The Real Price of Staying a Consumer

The Secret To Success with CJ, Karl, Jemal & Eric Thomas

Play Episode Listen Later Nov 27, 2025


Life keeps bullying you because you keep handing over the power. Your habits, your phone, your job, your fears, your past — all of it is pushing you around while you stand there acting like you don't have a choice. This episode breaks that cycle wide open. ET, CJ, Karl, and Jemal dive into the truth nobody wants to admit: you're either the bully… or you're getting bullied. By your circumstances. By your imagination (or lack of it). By the systems built to turn you into a full-time consumer. Inside the episode, you'll learn: • Why the picture in your head is more important than the reality in front of you • How to stop giving your power away to fear, bills, people, and your own patterns • Why consumers get exploited, and why producers win every single time • How social media turns you into a victim without you noticing • How intentionality separates the bullied from the unstoppable • Why your gift — not your job — is the real source of your freedom • How to bully the bully in your finances, marriage, career, and internal dialogue • Why one property, one skill, or one shift can flip your entire life trajectory This is one of those episodes you replay when you feel stuck. It's raw. It's practical. It's uncomfortable. And it's exactly what you need. CHAPTERS: 00:00 - Show Intro 01:25 - ET on Bullying Awareness 05:09 - Bully the Bully Strategy 07:32 - Discovering Your Gifts 11:55 - Overcoming Inner Criticism 17:19 - The Reality of Fear 19:14 - Understanding Menopause 22:15 - The Nature of Bullying 25:29 - Utilizing Your Gifts 27:18 - Embrace Assertiveness 30:25 - Valuing Your Worth 33:25 - Work for Your Demands 35:55 - Embracing Change 38:30 - Be the Solution 44:10 - Next Level Conference Overview 46:16 - Future of EYL University 47:40 - Inside The Lab 49:45 - Join the BU Community 50:01 - Support This Podcast