POPULARITY
Categories
Ambassador John Bolton joins Hugh Dougherty to chart the growing dangers of Trump's foreign policy, driven by impulse rather than strategy. Bolton, Trump's former national security adviser, describes a president who ignores formal briefings, takes cues from Mar-a-Lago guests, and makes decisions by “neuron flash,” leaving Venezuela, Europe, and Ukraine trapped in contradiction and drift. As Trump chases a Nobel Prize and treats strongmen like personal allies, Bolton presses a defining question: How long can America's security withstand a leader who refuses to plan? Hosted on Acast. See acast.com/privacy for more information.
En ce début de semaine, RTL2 Pop-Rock Station installe une ambiance réconfortante entre grands classiques et nouveautés avec Fleetwood Mac, Eagles, Sonic Youth, Tame Impala ou encore Snow Patrol. La soirée est marquée par l'hommage à John Lennon, assassiné il y a 45 ans, avec "Just Like Starting Over". Neil Young est également à l'honneur avant l'arrivée de Bob Dylan et Eagles. L'album de la semaine "Unfolded" de Melody's Echo Chamber est mis en lumière avec "Daisy", tandis que la programmation enchaîne Bloodhound Gang, Billy Idol et une collaboration très attendue entre Gorillaz et Idles sur "The God Of Lying". La reprise de la soirée revisite "Rehab" d'Amy Winehouse dans une version industrielle signée Ministry, ouvrant la deuxième heure entre Franz Ferdinand, Sonic Youth, Therapy?, Tom Waits et Kasabian. La fin d'émission fait la part belle aux nouveautés avec Poppy et son futur album "Empty Hands", puis la découverte Fresh Fresh Fresh du jour : Ratboys, groupe indie rock de Chicago, attendu avec un sixième album en février. The Exploited, Tom Waits, Wet et Metallica viennent conclure cette soirée dense sur RTL2 Pop-Rock Station. Tame Impala - Dracula Snow Patrol - Called Out In The Dark John Lennon - (Just Like) Starting Over Fleetwood Mac - Silver Springs (Live) Neil Young & The Crazy Horse - Break The Chain Bob Dylan - Like A Rolling Stone Dropkick Murphys - Johnny, I Hardly Knew Ya Melody's Echo Chamber - Daisy (Feat. El Michels Affair) Eagles - New Kid In Town Bloodhound Gang - Fire Water Burn Billy Idol - Flesh For Fantasy Gorillaz - The God Of Lying (Feat. Idles) Ministry - Rehab Franz Ferdinand - (The Dark Of The) Matinée Imogen Heap - What Have You Done To Me ? The Surfaris - Wipe Out Sonic Youth - 100 % Poppy - Bruised Sky Prince - Kiss Kasabian - Shoot The Runner Ratboys - Anywhere Therapy? - Nowhere The Exploited - U.S.A. Tom Waits - The Piano Has Been Drinking Wet Leg - Chaise Longue Bruise Control - Gone To Ground Metallica - OneHébergé par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.
LISTEN and SUBSCRIBE on:Apple Podcasts: https://podcasts.apple.com/us/podcast/watchdog-on-wall-street-with-chris-markowski/id570687608 Spotify: https://open.spotify.com/show/2PtgPvJvqc2gkpGIkNMR5i WATCH and SUBSCRIBE on:https://www.youtube.com/@WatchdogOnWallstreet/featured A massive web of welfare fraud, ignored warnings, silenced whistleblowers, and political leaders who refused to act—Minnesota's scandal is no isolated case. It's a window into what happens when big government, activist nonprofits, and decades-old refugee policies collide with zero accountability. We trace the money, the politics, the retaliation, and the national implications of a system begging to be exploited. Plus, a moment of levity: a nod to Prince, the legendary Minnesotan who mastered everything except the dysfunction happening in his own backyard.
Australia's pacific development labour program, known as the PALM scheme, is being accused of a form of modern slavery.
Australia's pacific development labour program, known as the PALM scheme, is being accused of a form of modern slavery.
Life keeps bullying you because you keep handing over the power. Your habits, your phone, your job, your fears, your past — all of it is pushing you around while you stand there acting like you don't have a choice. This episode breaks that cycle wide open. ET, CJ, Karl, and Jemal dive into the truth nobody wants to admit: you're either the bully… or you're getting bullied. By your circumstances. By your imagination (or lack of it). By the systems built to turn you into a full-time consumer. Inside the episode, you'll learn: • Why the picture in your head is more important than the reality in front of you • How to stop giving your power away to fear, bills, people, and your own patterns • Why consumers get exploited, and why producers win every single time • How social media turns you into a victim without you noticing • How intentionality separates the bullied from the unstoppable • Why your gift — not your job — is the real source of your freedom • How to bully the bully in your finances, marriage, career, and internal dialogue • Why one property, one skill, or one shift can flip your entire life trajectory This is one of those episodes you replay when you feel stuck. It's raw. It's practical. It's uncomfortable. And it's exactly what you need. CHAPTERS: 00:00 - Show Intro 01:25 - ET on Bullying Awareness 05:09 - Bully the Bully Strategy 07:32 - Discovering Your Gifts 11:55 - Overcoming Inner Criticism 17:19 - The Reality of Fear 19:14 - Understanding Menopause 22:15 - The Nature of Bullying 25:29 - Utilizing Your Gifts 27:18 - Embrace Assertiveness 30:25 - Valuing Your Worth 33:25 - Work for Your Demands 35:55 - Embracing Change 38:30 - Be the Solution 44:10 - Next Level Conference Overview 46:16 - Future of EYL University 47:40 - Inside The Lab 49:45 - Join the BU Community 50:01 - Support This Podcast
Halloween suite et fin a priori, et on démarre avec un titre culte de Slayer, live 1985. Suivi de My Dying Bride, The Exploited, et une doublette horrorcore (rap) avec Three Six Mafia puis 3 Headed Monster (Ouija Macc, Esham et Violent J). On passe ensuite au post punk et au gothic rock avec X […] L'article Mortification et Pestiférés Vol. 2 est apparu en premier sur Radio Campus Tours - 99.5 FM.
NEWS: Zaldy Co exploited in plot against President Marcos Jr., Malacañang says | Nov. 17, 2025Subscribe to The Manila Times Channel - https://tmt.ph/YTSubscribe Visit our website at https://www.manilatimes.net Follow us: Facebook - https://tmt.ph/facebook Instagram - https://tmt.ph/instagram Twitter - https://tmt.ph/twitter DailyMotion - https://tmt.ph/dailymotion Subscribe to our Digital Edition - https://tmt.ph/digital Check out our Podcasts: Spotify - https://tmt.ph/spotify Apple Podcasts - https://tmt.ph/applepodcasts Amazon Music - https://tmt.ph/amazonmusic Deezer: https://tmt.ph/deezer Stitcher: https://tmt.ph/stitcherTune In: https://tmt.ph/tunein#TheManilaTimes#KeepUpWithTheTimes Hosted on Acast. See acast.com/privacy for more information.
Anneke Lucas breaks her silence about life inside a hidden world of power, exploitation and control. In this exclusive HERETICS conversation, she sits down with Andrew to share her experiences growing up inside an elite European network, how it operated behind closed doors, and what it takes to reclaim your mind, body and soul after extreme trauma. SPONSORS: Start fresh at tryfum.com/products/zero-crisp-mint . Over 500,000 people have already made the switch — no nicotine, no vapor, no batteries. Just flavor, fidget, and a fresh start. Get up to 45% off Ekster with my code ANDREWGOLDHERETICS: https://partner.ekster.com/andrewgoldheretics Use Code ANDREW FOR 25% OFF Plaud Note: https://bit.ly/4nJWt7j Plaud Note Pro: https://bit.ly/423JiWv Grab your free seat to the 2-Day AI Mastermind: https://link.outskill.com/ANDREWS2 Cut your wireless bill to 15 bucks a month at https://mintmobile.com/heretics Start your MyHeritage journey now with a 14-day free trial using my link: https://bit.ly/AndrewGoldMyHeritage Without going into graphic detail, Anneke explains: - How certain high-status circles used private estates and castles for secret gatherings - Why she believes she was used as a pawn in high-level blackmail operations - The strange “training” and psychological programming methods she was exposed to as a child - The way money, prestige and secrecy can protect predators for decades - How rumours around powerful figures create a “Jimmy Savile phenomenon” where people suspect, but no one speaks - Her perspective on global networks, elite clubs and meetings often discussed in connection with influence and geopolitics - Why she believes some public figures and celebrities may have been deeply conditioned from a young age - The long journey of healing, de-programming and rebuilding a real sense of self Throughout the interview, Andrew presses on the questions many are afraid to ask: How deep does this go? Who knew? How is it possible that ordinary families can become involved? What does this say about the way power really works – in Belgium, Europe and beyond? #heretics #annekelucas #truecrime Join the 30k heretics on my mailing list: https://andrewgoldheretics.com Check out my new documentary channel: https://youtube.com/@andrewgoldinvestigates Andrew on X: https://twitter.com/andrewgold_ok Insta: https://www.instagram.com/andrewgold_ok Heretics YouTube channel: https://www.youtube.com/@andrewgoldheretics Chapters: 0:00 Anneke Lucas Highlights 01:45 The Belgian Elite & Network of Abuse 07:45 Satanic Rituals 15:19 The Global Network 16:45 Who Was Involved? 20:05 The Jimmy Saville Phenomenon 24:57 The German Mind Control Training 27:58 The Making of a Famous French Sex Slave 35:01 The Bilderberg Group 37:05 Was Rockefeller a Satanist? 40:45 Are Celebrities Being Programmed? Learn more about your ad choices. Visit megaphone.fm/adchoices
In this episode of One in Ten, host Teresa Huizar talks with Dr. Matt Kafafian from George Washington University about his research on how the COVID-19 pandemic has reshaped the nature of the characteristics of exploited youth served by a Children's Advocacy Center. Dr. Kafafian discusses significant findings from studies examining post-pandemic changes in the identification and referral of commercially sexually exploited children and youth. They explore how shifts to online environments and evolving police and social service practices have impacted the demographics and types of exploitation cases being reported. Key points include the new challenges facing child abuse professionals, changes in risk factors, and the implications for screening tools designed to identify vulnerable youth. Dr. Kafafian also discusses emerging trends related to gender differences and mental health issues among exploited youth, highlighting the need for updated tools and approaches in the field. Time Stamps Time Topic 00:00 Introduction and Episode Overview 00:17 Guest Introduction: Dr. Matt Kavian 00:48 Impact of the Pandemic on Youth Exploitation 04:29 Pre-Pandemic Vulnerabilities and Risk Factors 06:53 Changes in Youth Exploitation During the Pandemic 08:39 Study Findings and Hypotheses 24:20 Implications for Child Abuse Professionals 26:35 Future Research Directions 29:17 Acknowledgments and Conclusion ResourcesChanging Profiles of Youth Referred for Commercial Sexual Exploitation before and since the Onset of COVID-19 in the United States - Matthew Kafafian, Ieke de Vries, Amy Farrell, Christen Asiedu, Elizabeth Bouchard, 2025Support the showDid you like this episode? Please leave us a review on Apple Podcasts.
On October 24th, Davidson College dedicated a new sculpture called “With These Hands: A Memorial to the Enslaved and Exploited” by artist Hank Willis Thomas. It acknowledges those individuals who built the college and served the institution in numerous ways but whose story has rarely been included in the college's history. Davidson graduate Clint Smith, an award-winning poet and author, talks about the sculpture's significance for Davidson and the larger community. We also learn about the 2025 “Mad About Modern Home Tour.”
The cost of medical treatments and dental work in Australia can be exorbitant. So it's no wonder more people are accessing their superannuation funds early to pay for things like IVF and desperately dentist bills. It's understandable and allowed in certain circumstances, but there are concerns that some providers are exploiting the system. Today, ABC reporter Celina Edmonds on her investigation into the early access rorts.Featured: Celina Edmonds, ABC reporter
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Infostealer Targeting Android Devices This infostealer, written in Python, specifically targets Android phones. It takes advantage of Termux to gain access to data and exfiltrates it via Telegram. https://isc.sans.edu/diary/Infostealer%20Targeting%20Android%20Devices/32414 Attackers exploit recently patched Adobe Commerce Vulnerability CVE-2025-54236 Six weeks after Adobe's emergency patch, SessionReaper (CVE-2025-54236) has entered active exploitation. E-Commerce security company SanSec has detected multiple exploit attempts. https://sansec.io/research/sessionreaper-exploitation Patch for BIND and unbound nameservers CVE-2025-40780 The Internet Systems Consortium (ISC.org), as well as the Unbound project, patched a flaw that may allow for DNS spoofing due to a weak random number generator. https://kb.isc.org/docs/cve-2025-40780 WSUS Exploit Released CVE-2025-59287 Hawktrace released a walk through showing how to exploit the recently patched WSUS vulnerability https://hawktrace.com/blog/CVE-2025-59287
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
New DShield Support Slack Workspace Due to an error on Salesforce s side, we had to create a new Slack Workspace for DShield support. https://isc.sans.edu/diary/New%20DShield%20Support%20Slack/32376 Attackers Exploiting Recently Patched Cisco SNMP Flaw (CVE-2025-20352) Trend Micro published details explaining how attackers took advantage of a recently patched Cisco SNMP Vulnerability https://www.trendmicro.com/en_us/research/25/j/operation-zero-disco-cisco-snmp-vulnerability-exploit.html https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte Framework BIOS Backdoor The mm command impleneted in Framework BIOS shells can be used to compromise a device pre-boot. https://eclypsium.com/blog/bombshell-the-signed-backdoor-hiding-in-plain-sight-on-framework-devices/ SANS.edu Research: Mark Stephens, Validating the Effectiveness of MITRE Engage and Active Defense https://www.sans.edu/cyber-research/validating-effectiveness-mitre-engage-active-defense/
Charlotte Church is currently starring in the first ever series of BBC1's Celebrity Traitors. But she first found global fame as the young classical singer with the voice of an angel. By 22, she had sold 10 million records and performed for popes, presidents and princes. The success came at a devastating personal cost - here, she tells us what really happened and how she found her way into what is arguably her most powerful iteration yet: her healing phase. This episode was recorded live in Bath earlier this year. ✨ IN THIS EPISODE: 06:33 Reconnecting with Nature 08:55 Psychedelic Experiences and Healing 10:31 Creative Struggles and Musical Journey 16:38 Reflections on the Music Industry 21:09 Family and Ambitions 21:33 Struggles with Patriarchy and Colonialism 22:30 The Symbolism of Tattoos 24:13 Understanding Patriarchy 29:57 Challenges in the Music Industry 31:28 Personal Identity 34:39 Embracing the Wild Woman Archetype 40:08 Balancing Fame and Personal Beliefs
In the creative economy, it is more profitable to be a dead creator than a living working writer. Or that is the lesson learned from the lawsuit the Michael Crichton estate filed against The Pitt. Crichton, who earned a quarter of a billion dollars for his contribution to the NBC show ER -- his contribution being a film script that was later adapted by someone else into a network pilot -- while the actual writers, actors, and crew made considerably less. Jessa and Nico talk about the writers who filed suit against AI, why Basquiat is in his most prolific era yet (37 years after his death), and the curse of the Frida Kahlo Barbie doll. Shownotes and references: http://theculturewedeserve.substack.com
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
More Details About Oracle 0-Day The exploit is now widely distributed and has been analyzed to show the nature of the underlying vulnerabilities. https://isc.sans.edu/diary/Quick%20and%20Dirty%20Analysis%20of%20Possible%20Oracle%20E-Business%20Suite%20Exploit%20Script%20%28CVE-2025-61882%29%20%5BUPDATED%5B/32346 https://labs.watchtowr.com/well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882/ Redis Vulnerability Redis patched a ciritcal use after free vulnerability that could lead to arbitrary code execution. https://redis.io/blog/security-advisory-cve-2025-49844/ GoAnywhere Bug Exploited Microsoft is reporting about the exploitation of the recent GoAnywhere vulnerability https://www.microsoft.com/en-us/security/blog/2025/10/06/investigating-active-exploitation-of-cve-2025-10035-goanywhere-managed-file-transfer-vulnerability/
Register for FREE Infosec Webcasts, Anti-casts & Summits – https://poweredbybhis.com 00:00 - PreShow Banter™ — A little radiation never hurt anybody.03:07 - BHIS - Talkin' Bout [infosec] News 2025-09-2903:29 - Story # 1: As many as 2 million Cisco devices affected by actively exploited 0-day19:07 - Story # 2: Viral call-recording app Neon goes dark after exposing users' phone numbers, call recordings, and transcripts | TechCrunch24:25 - Story # 3: AI Darwin Awards Show AI's Biggest Problem Is Human29:32 - Story # 4: Nikon revokes all C2PA image authenticity certificates after major vulnerability exposed34:14 - Story # 5: ‘You'll never need to work again': Criminals offer reporter money to hack BBC38:18 - Story # 6: Cybersecurity Training Programs Don't Prevent Employees from Falling for Phishing Scams46:48 - Mini CTF Walkthrough56:03 - Story # 7: U.S. Secret Service dismantles imminent telecommunications threat in New York tristate area
If you get a whiff of unemptied bins around MLPP Towers this week, its because Birmingham's very own Face Up have been loitering!We're joined by 3 of Brum's best hardcore export for a chat which covers all facets of their decade-long career, but mostly centres around slagging off their bass player.We get an insight into old bands, hometowns, old careers and what can happen when you place a bet on a game of Bedworth Chess (Connect 4). Tom's getting plastered, Niallism has been minding his business and Niall becomes a convicted Francophile.Music this week is from: Screeching Weasel, Hammer & The Saltwater Krocodiles, None Of Your Fucking Business, Guerrilla Poubelle and The Mercenaries.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Sometimes you don t even need to log in Applications using simple, predictable cookies to verify a user s identity are still exploited, and relatively recent vulnerabilities are still due to this very basic mistake. https://isc.sans.edu/diary/%22user%3Dadmin%22.%20Sometimes%20you%20don%27t%20even%20need%20to%20log%20in./32334 Western Digital My Cloud Vulnerability Western Digital patched a critical vulnerability in its MyCloud device. https://nvd.nist.gov/vuln/detail/CVE-2025-30247 sudo vulnerability exploited A recently patched vulnerability in sudo is now being exploited. https://www.sudo.ws/security/advisories/
China-Linked Group Hits Governments With Stealth Malware Chinese hackers exploit VMware zero-day since October 2024 Apple's iOS fixes a bevy of glitches Huge thanks to our sponsor, Nudge Security The SaaS supply chain is a hot mesh. As your workforce introduces new SaaS apps and integrations, hidden pathways are created that attackers can exploit to gain access to core business systems. That's exactly what happened in the Drift breach, and it will happen again. But, all is not lost. Nudge Security gives you the visibility and control you need to stop these attacks. Within minutes of starting a free trial, you'll discover every SaaS app and integration in your environment, map your SaaS supply chain, and identify risky OAuth grants that could be exploited. The best part? Nudge Security alerts you of breaches impacting your 3rd and 4th party SaaS providers. That's right, even 4th party! So, you can take action quickly to limit the ripple effects. Learn how Nudge can help you secure your entire SaaS ecosystem at nudgesecurity.com/supplychain
greetings friends, I nearly wasn't able to complete this week's episode after being diagnosed with a case of minor men's whiplash acquired while reading the New York Times' recent, “Is It OK To Use Your Phone On The Toilet?” article. Weirdly enough, I was not reading said think (?) piece on the toilet but instead an airport monorail that made an abrupt stop, hence the Joel Gertner signature neck brace that I'll be sporting for the foreseeable future. On the bright side, this does open the doors to the paper of record considering other crucial questions, including but not limited to “can i use the same blanket as the dog?”, “do expiration dates really matter?” and the time honored quandary,”if the Exploited and Anti-Pasti* were both drowning and could only save one, which would it be?” (this is one for The Ethicist) We'll get into (nearly) all of it on this week's show. * -trick question, everyone in Anti-Pasti is an accomplished swimmer, so they'd never need saving.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Webshells Hiding in .well-known Places Our honeypots registered an increase in scans for URLs in the .well-known directory, which appears to be looking for webshells. https://isc.sans.edu/diary/Webshells%20Hiding%20in%20.well-known%20Places/32320 Cisco Patches Critical Exploited Vulnerabilities Cisco released updates addressing already-exploited vulnerabilities in the VPN web server for the ASA and FTD appliances. https://sec.cloudapps.cisco.com/security/center/resources/asa_ftd_continued_attacks https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-z5xP8EUB https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-webvpn-YROOTUW XCSSET Evolves Again Microsoft detected a new XCSSET variant, an infostealer infecting X-Code projects. https://www.microsoft.com/en-us/security/blog/2025/09/25/xcsset-evolves-again-analyzing-the-latest-updates-to-xcssets-inventory/ Exploitation of Fortra GoAnywhere MFT CVE-2025-10035 watchTowr analyzed the latest GoAnywhere MFT vulnerability and exploits used against it. https://labs.watchtowr.com/it-is-bad-exploitation-of-fortra-goanywhere-mft-cve-2025-10035-part-2/
- Charlie Kirk's Murder and Political Narrative (0:00) - Physics and Ballistics of the 30-06 Rifle Round (2:21) - Implications of the Narrative on U.S. Politics (7:57) - International Implications and Military Preparations (33:21) - Religious and Symbolic Aspects of the Narrative (37:09) - Technical and Forensic Analysis of the Shooting (59:14) - Conclusion and Call to Action (1:06:09) - Charlie's Shooting and Cover-Up Theories (1:06:27) - Evidence and Fabrication Claims (1:28:43) - Intelligence Agencies and Conspiracy Theories (1:32:35) - Historical and Modern Cognitive Decline (1:38:44) - AI and Human Knowledge (1:52:59) - Copper Craftsmanship and Health Benefits (2:03:59) - Copper Water Filters and Health Claims (2:19:24) - Craftsmanship and Family Business (2:29:18) - Copper's Industrial and Cultural Significance (2:29:34) - Copper's Multi-Harmonic Resonance and Spiritual Practices (2:30:06) - Gravity Water Systems and Filters (2:37:29) - Historical Use of Copper, Silver, and Gold in Art (2:46:01) - Ancient Civilizations and Knowledge Preservation (2:51:59) - Challenges and Opportunities in Artisanal Craftsmanship (3:00:10) - The Role of AI in Enhancing Craftsmanship (3:04:26) - The Future of Artisanal Crafts and AI Integration (3:05:15) - The Economic and Cultural Value of Craftsmanship (3:08:07) - The Importance of Cultural Heritage and Community (3:09:53) - The Role of AI in Preserving Cultural Knowledge (3:12:24) - The Future of Human Civilization and AI (3:14:07) For more updates, visit: http://www.brighteon.com/channel/hrreport NaturalNews videos would not be possible without you, as always we remain passionately dedicated to our mission of educating people all over the world on the subject of natural healing remedies and personal liberty (food freedom, medical freedom, the freedom of speech, etc.). Together, we're helping create a better world, with more honest food labeling, reduced chemical contamination, the avoidance of toxic heavy metals and vastly increased scientific transparency. ▶️ Every dollar you spend at the Health Ranger Store goes toward helping us achieve important science and content goals for humanity: https://www.healthrangerstore.com/ ▶️ Sign Up For Our Newsletter: https://www.naturalnews.com/Readerregistration.html ▶️ Brighteon: https://www.brighteon.com/channels/hrreport ▶️ Join Our Social Network: https://brighteon.social/@HealthRanger ▶️ Check In Stock Products at: https://PrepWithMike.com
A NY teen is cuffed & charged in a sick sexploitation plot that officials say targeted hundreds of fellow classmates. A vicious video that went viral shows the brutal assault of an elderly woman on a Boston bus. The perp has been arrested & arraigned. Plus, a real hot dog leads firefighters to his rescue! Jennifer Gould reports. See omnystudio.com/listener for privacy information.
00:00:50 – Trump, NFL & Dictatorship ComparisonsThe show opens with Trump mocking the NFL's new kickoff rule as “sissy football.” This segues into a warning about Trump's emergency powers, tariffs, and governing by decree, comparing him to global dictators. 00:13:58 – Free Speech Betrayed After Kirk's DeathDiscussion of Trump, JD Vance, and GOP leaders calling for censorship in the wake of Charlie Kirk's assassination. The Smith-Mundt Act is misrepresented to justify cracking down on the press, with comparisons to Reagan's betrayal of the Second Amendment after the Brady shooting. 00:23:10 – Media Control & False NarrativesGuests like Tucker Carlson and RFK Jr. are accused of aiding efforts to redefine free speech as terrorism. Skepticism is raised toward Steve Bannon's claims and the FBI's version of events, framing it as another push toward surveillance and internet ID mandates. 00:36:17 – Armed Queers & Radical MarxistsCoverage of “Armed Queers SLC,” a Marxist-LGBT militant group in Utah linked to Cuba. Their open revolutionary training and ties to Antifa figures are framed as proof that universities are breeding grounds for leftist terrorism. 00:52:02 – First Amendment vs. ViolenceDebate shifts to why the First Amendment is more important than the Second, arguing that radicalization comes from schools, culture, and censorship itself—not weapons. Liberty is portrayed as inherently dangerous but preferable to state control. 01:18:12 – Internet Control & Epstein Files BuriedSpeculation deepens around the Kirk shooting, with questions about the rifle used, multiple shooters, and hand signals. The assassination is tied to a broader effort to end online anonymity, while the Epstein files are said to be quietly buried under the media fog. 01:34:28 – J.K. Rowling & Faith StrugglesDiscussion of Rowling's “God-shaped vacuum” comments, her shift toward more conservative views, and Pascal's wager. The host critiques her books as amoral and emphasizes grounding in the Bible. 01:49:45 – Authoritarian Conservatism & Cancel CultureCriticism of JD Vance and other GOP leaders for embracing cancel culture, urging snitching on Kirk critics, and mirroring Stasi-style tactics. The host stresses this betrays free speech and liberty. 01:55:23 – Social Media, Radicalization & SchoolsDebunking claims that social media “killed Charlie Kirk.” Instead, government schools are identified as the true source of radicalization, pushing Marxism, LGBT ideology, and secular humanism. 02:28:38 – AI Fails & Security RisksCoverage of how AI coding creates massive security vulnerabilities and relies on underpaid human moderators. The “AI bubble” is framed as a pyramid scheme propped up by propaganda and capital burn. 02:53:43 – Gold Surges Amid Panic CutsFinancial analyst Ed Dowd predicts a “panic rate cut cycle,” driving gold above $3,700. Gold is praised as a hedge against inflation, privacy loss, and collapsing fiat systems, while Trump's tariffs are blamed for worsening the economy. Follow the show on Kick and watch live every weekday 9:00am EST – 12:00pm EST https://kick.com/davidknightshow Money should have intrinsic value AND transactional privacy: Go to https://davidknight.gold/ for great deals on physical gold/silverFor 10% off Gerald Celente's prescient Trends Journal, go to https://trendsjournal.com/ and enter the code KNIGHTFind out more about the show and where you can watch it at TheDavidKnightShow.com If you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Become a supporter of this podcast: https://www.spreaker.com/podcast/the-real-david-knight-show--5282736/support.
In this episode of Narcissists, Gaslighters, and Cheaters, Oh My!, hosts Behk and LAH are joined by Annie—a woman who seemingly had it all together on the outside, but behind closed doors, was trapped in a nightmare that no one saw coming.Annie married young, deeply rooted in the church, and did what was expected of her. Though the marriage wasn't abusive, it became clear over time that it wasn't built to last. Now, years later, she and her ex are thriving as healthy, respectful co-parents—proof that endings don't always have to be ugly.But Annie's real storm came after the marriage. While exploring her identity, healing her spirituality, and dipping her toes back into dating, Annie met a younger man through a Facebook group. What began as flirtation quickly unraveled into obsession.In the tight-knit small town where Annie is a well-known figure, privacy is already hard to come by. But this man weaponized her visibility, using the threat of public embarrassment and exposure to control her every move.
00:00:50 – Trump, NFL & Dictatorship ComparisonsThe show opens with Trump mocking the NFL's new kickoff rule as “sissy football.” This segues into a warning about Trump's emergency powers, tariffs, and governing by decree, comparing him to global dictators. 00:13:58 – Free Speech Betrayed After Kirk's DeathDiscussion of Trump, JD Vance, and GOP leaders calling for censorship in the wake of Charlie Kirk's assassination. The Smith-Mundt Act is misrepresented to justify cracking down on the press, with comparisons to Reagan's betrayal of the Second Amendment after the Brady shooting. 00:23:10 – Media Control & False NarrativesGuests like Tucker Carlson and RFK Jr. are accused of aiding efforts to redefine free speech as terrorism. Skepticism is raised toward Steve Bannon's claims and the FBI's version of events, framing it as another push toward surveillance and internet ID mandates. 00:36:17 – Armed Queers & Radical MarxistsCoverage of “Armed Queers SLC,” a Marxist-LGBT militant group in Utah linked to Cuba. Their open revolutionary training and ties to Antifa figures are framed as proof that universities are breeding grounds for leftist terrorism. 00:52:02 – First Amendment vs. ViolenceDebate shifts to why the First Amendment is more important than the Second, arguing that radicalization comes from schools, culture, and censorship itself—not weapons. Liberty is portrayed as inherently dangerous but preferable to state control. 01:18:12 – Internet Control & Epstein Files BuriedSpeculation deepens around the Kirk shooting, with questions about the rifle used, multiple shooters, and hand signals. The assassination is tied to a broader effort to end online anonymity, while the Epstein files are said to be quietly buried under the media fog. 01:34:28 – J.K. Rowling & Faith StrugglesDiscussion of Rowling's “God-shaped vacuum” comments, her shift toward more conservative views, and Pascal's wager. The host critiques her books as amoral and emphasizes grounding in the Bible. 01:49:45 – Authoritarian Conservatism & Cancel CultureCriticism of JD Vance and other GOP leaders for embracing cancel culture, urging snitching on Kirk critics, and mirroring Stasi-style tactics. The host stresses this betrays free speech and liberty. 01:55:23 – Social Media, Radicalization & SchoolsDebunking claims that social media “killed Charlie Kirk.” Instead, government schools are identified as the true source of radicalization, pushing Marxism, LGBT ideology, and secular humanism. 02:28:38 – AI Fails & Security RisksCoverage of how AI coding creates massive security vulnerabilities and relies on underpaid human moderators. The “AI bubble” is framed as a pyramid scheme propped up by propaganda and capital burn. 02:53:43 – Gold Surges Amid Panic CutsFinancial analyst Ed Dowd predicts a “panic rate cut cycle,” driving gold above $3,700. Gold is praised as a hedge against inflation, privacy loss, and collapsing fiat systems, while Trump's tariffs are blamed for worsening the economy. Follow the show on Kick and watch live every weekday 9:00am EST – 12:00pm EST https://kick.com/davidknightshow Money should have intrinsic value AND transactional privacy: Go to https://davidknight.gold/ for great deals on physical gold/silverFor 10% off Gerald Celente's prescient Trends Journal, go to https://trendsjournal.com/ and enter the code KNIGHTFind out more about the show and where you can watch it at TheDavidKnightShow.com If you would like to support the show and our family please consider subscribing monthly here: SubscribeStar https://www.subscribestar.com/the-david-knight-showOr you can send a donation throughMail: David Knight POB 994 Kodak, TN 37764Zelle: @DavidKnightShow@protonmail.comCash App at: $davidknightshowBTC to: bc1qkuec29hkuye4xse9unh7nptvu3y9qmv24vanh7Become a supporter of this podcast: https://www.spreaker.com/podcast/the-david-knight-show--2653468/support.
Visit Visa Scam: How Nepali Migrants Are Exploited. Discover the urgent realities behind Nepal's soaring 15% labor migration rate in 2025 and why this crisis is unlike any other. This video dives deep into the complex challenges facing Nepali migrants, including exploitation and forced labor by private recruitment agencies, weak foreign labor policies, and the troubling visit visa loophole that fuels corruption and abuse. Learn about the exploitation faced by workers in employer countries and how circular migration traps many Nepalis in cycles of economic vulnerability. We also highlight the heroic rescue of 200 Nepali students during the COVID-19 pandemic and discuss why migrants often remain forgotten despite such efforts. Explore success and failure stories that reveal the true impact of Nepal's current labor migration system and why urgent policy reform is needed now to protect vulnerable workers. Gain insights into the unethical tactics recruitment agencies use, including coded bribery and illegal contracts, and understand how monitoring migrant visas and work details through digital tools could offer some relief. This eye-opening video calls for stronger intervention powers from the Nepalese government and better support for labor migrants to ensure their rights and safety abroad. Stay informed and share to raise awareness about Nepal's foreign labor crisis in 2025.
A former Israeli special forces agent promotes his AI mass surveillance program on Fox News in the wake of the Minnesota shooting, exploiting Americans' fears. Plus: journalist Taylor Lorenz discusses her WIRED article exposing the dark money group paying Dem influencers. Taylor and Glenn also discuss the dangers of the UK's Online Safety Act and the threat of censorship worldwide. ------------------ Watch full episodes on Rumble, streamed LIVE 7pm ET. Become part of our Locals community Follow System Update: Twitter Instagram TikTok Facebook Read Taylor Lorenz's article here Watch Taylor Lorenz on YouTube
Organizations today face escalating cyber risks spanning state-sponsored attacks, supply chain compromises, and malicious apps. ShinyHunters' breaches of Salesforce platforms (impacting Google and Farmers Insurance) show how social engineering—like voice phishing—can exploit trusted vendors. Meanwhile, Russian actors (FSB-linked “Static Tundra”) continue to leverage old flaws, such as a seven-year-old Cisco Smart Install bug, to infiltrate U.S. infrastructure. Malicious apps on Google Play (e.g., Joker, Anatsa) reached millions of downloads before removal, proving attackers' success in disguising malware. New technologies bring fresh vectors: Perplexity's Comet browser allowed prompt injection–driven account hijacking, while malicious RDP scanning campaigns exploit timing to maximize credential theft.Responses vary between safeguarding and asserting control. The FTC warns U.S. firms against weakening encryption or enabling censorship under foreign pressure, citing legal liability. By contrast, Russia mandates state-backed apps like MAX Messenger and RuStore, raising surveillance concerns. Microsoft, facing leaks from its bug-sharing program, restricted exploit code access to higher-risk countries. Open-source projects like LibreOffice gain traction as sovereignty tools—privacy-first, telemetry-free, and free of vendor lock-in.AI-powered wearables such as Halo X smart glasses blur lines between utility and surveillance. Their ability to “always listen” and transcribe conversations augments human memory but erodes expectations of privacy. The founders' history with facial recognition raises additional misuse concerns. As AI integrates directly into conversation and daily life, the risks of pervasive recording, ownership disputes, and surveillance intensify.Platforms like Bluesky are strained by conflicting global regulations. Mississippi's HB 1126 requires universal age verification, fines for violations, and parental consent for minors. Lacking resources for such infrastructure, Bluesky withdrew service from the state. This illustrates the tension between regulatory compliance, resource limits, and preserving open user access.AI adoption is now a competitive imperative. Coinbase pushes aggressive integration, requiring engineers to embrace tools like GitHub Copilot or face dismissal. With one-third of its code already AI-generated, Coinbase aims for 50% by quarter's end, supported by “AI Speed Runs” for knowledge-sharing. Yet, rapid adoption risks employee dissatisfaction and AI-generated security flaws, underscoring the need for strict controls alongside innovation.Breaches at Farmers Insurance (1.1M customers exposed) and Google via Salesforce illustrate the scale of third-party risk. Attackers exploit trusted platforms and human error, compromising data across multiple organizations at once. This shows security depends not only on internal defenses but on continuous vendor vetting and monitoring.Governments often demand access that undermines encryption, privacy, and transparency. The FTC warns that backdoors or secret concessions—such as the UK's (later retracted) request for Apple to weaken iCloud—violate user trust and U.S. law. Meanwhile, Russia's mandatory domestic apps exemplify sovereignty used for surveillance. Companies face a global tug-of-war between privacy, compliance, and open internet principles.Exploited legacy flaws prove that vulnerabilities never expire. Cisco's years-old Smart Install bug, still unpatched in many systems, allows surveillance of critical U.S. sectors. Persistent RDP scanning further highlights attackers' patience and scale. The lesson is clear: proactive patching, continuous updates, and rigorous audits are essential. Cybersecurity demands ongoing vigilance against both emerging and legacy threats.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Getting a Better Handle on International Domain Names and Punycode International Domain names can be used for phishing and other attacks. One way to identify suspect names is to look for mixed script use. https://isc.sans.edu/diary/Getting%20a%20Better%20Handle%20on%20International%20Domain%20Names%20and%20Punycode/32234 Citrix Netscaler Vulnerabilities CVE-2025-7775, CVE-2025-7776 and CVE-2025-8424 Citrix patched three vulnerabilities in Netscaler. One is already being exploited https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694938&articleTitle=NetScaler_ADC_and_NetScaler_Gateway_Security_Bulletin_for_CVE_2025_7775_CVE_2025_7776_and_CVE_2025_8424 git vulnerability exploited (CVE-2025-48384) A git vulnerability patched in early July is now being exploited https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9
DOGE Put Critical Social Security Data at Risk, Whistle-Blower Says CISA warns of actively exploited Git code execution flaw Alleged mastermind behind K-Pop celebrity stock heist extradited to South Korea Huge thanks to our sponsor, Prophet Security Your security analysts didn't sign up to chase false alarms all day. With Prophet Security's AI SOC platform, they won't have to. It works like a tireless teammate—triaging and investigating alerts around the clock. Less burnout. Better coverage. And more time for meaningful work. Learn more atprophetsecurity.ai.
A patch today keeps the zero-day away Jailbreaking ChatGPT-5 Pro The thing about vulnerabilities is they stay vulnerable Huge thanks to our sponsor, Conveyor It's Thursday. Have you been personally victimized by a portal security questionnaire this week? Most solutions just give you a browser extension to copy and paste answers in, still leaving hours of manual work. With Conveyor, you don't have to slog through it yourself. Just open the portal and Conveyor's AI will scroll through each page, find the questions, and fill in answers for you—start to finish. See how at www.conveyor.com Find the stories behind the headlines at CISOseries.com.
As both a science journalist and a sci-fi writer, Annalee Newitz thinks a lot about what our technology-saturated future might hold for us. Newitz's new novella, “Automatic Noodle,” is set in 2060's postwar San Francisco after California has seceded from the U.S. In the midst of an exploitative dystopia, a crew of robots opens a noodle shop with a sweet and resilient commitment to community, excellent food and rebuilding. We talk about what Newitz sees in our AI future, and how the values and community bonds that have long made San Francisco great may fare then, and now. Guests: Annalee Newitz, science journalist, science fiction writer and co-host of the podcast 'Our Opinions are Correct' - their previous book is 'Stories Are Weapons: Psychological Warfare and the American Mind' Learn more about your ad choices. Visit megaphone.fm/adchoices
In this week's Security Sprint, Dave and Andy are joined by Alec Davison and they covered the following topics:Warm Open:• Crypto ISAC• Odin.fun Exploited for $7 Million as 58.2 BTC Stolen in Security Breach• BtcTurk under attack again: withdrawals suspended after alleged $50 million hack & Major Turkish Crypto Exchange BtcTurk Allegedly Hacked for Nearly $50 Million• Treasury Sanctions Cryptocurrency Exchange and Network Enabling Sanctions Evasion and Cyber Criminals• More everyday in the SUN. Join the GRIP! Get the SUN! Main Topics:EPA, WaterISAC caution utilities on drone threats and cyber risks in evolving security landscape. The U.S. Environmental Protection Agency (EPA) and WaterISAC recognized that UASs (unmanned aerial systems), or drones, can pose significant threats to critical infrastructure, due to their accessibility, versatility, and potential for misuse. These threats can range from unauthorized surveillance, physical attacks, and even cyber attacks. Drones have revolutionized the critical infrastructure sector by enabling efficient and cost-effective inspections, reducing the need for manual labor and minimizing safety risks associated with hazardous environments, while providing real-time data and high-resolution imagery, allowing for more accurate monitoring and maintenance of infrastructure assets, leading to improved operational efficiency and reduced downtime. UK NPSA: Security Fences and Gates. Fences, along with integrated gates, play a key role in delivering security solutions both for perimeters and protecting important assets. This guidance is intended to aid those responsible for delivering security solutions including fences and gates to identify the factors that need to be considered. NPSA wish to advise that fences and gates are no longer tested to the Manual Forced Entry Standard (MFES). As a result, all fences and gates which were previously given an MFES rating have been removed from the Catalogue of Security Equipment. This document provides advice on the requirements for security fences and gates and signpost alternative security standards that should be considered. Please use the NPSA Forced Entry Standards Guidance1 to assist you. NPSA Forced Entry Standard 2024Hurricane Erin: • NHC issuing advisories for the Atlantic on Hurricane Erin• Key messages regarding Hurricane Erin• Hurricane Erin to grow, will next threaten US coast with dangerous conditionsQuick Hits:• NOAA - July 2025 was planet's 3rd warmest on record • Dragos Industrial Ransomware Analysis: Q2 2025 • CISA: Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators• Canada's Guide on Biometric Management Is a Useful Resource for All Corporate Security Directors• Canadian Centre for Cyber Securityo Steps to address data spillage in the cloud (ITSAP.50.112)o Introduction to cloud computing (ITSAP.50.110)o Models of cloud computing (ITSAP.50.111)• Norway spy chief blames Russian hackers for hijacking dam• Colt Telecom attack claimed by WarLock ransomware, data up for sale• SNI5GECT: Sniffing and Injecting 5G Traffic Without Rogue Base Stations & Risky Bulletin: Academics pull off novel 5G attack• Hundreds of N-able N-central Instances Affected by Exploited Vulnerabilities• ReliaQuest Uncovers New Critical Vulnerability in SAP NetWeaver• Plex warns users to patch security vulnerability immediately• ClickFix phishing links increased nearly 400% in 12 months, report says
For the past 8 weeks CLAPTONE has been rocking his Ibiza residency and if you have serious fomo like I do, the only cure is this 60 mix mix set from the man himself. And if the mix isnt enough, you can catch CLAPTONE on tour in Aus this November 22 Nov Sydney - Harbour Life [Sold Out] 22 Nov Melbourne – Riva [Final release] 23 Nov Brisbane – Oasis Boat [90% sold out] 28 Nov Sydney - Home [2nd release] 29 Nov – Ice Cream Factory Perth all supporting his latest single "Turn Up The Love". Ive dropped that into the link above too ICYMI . Please keep me posted if you are giving the mix a run, so we can keep the masked marvel in the loop. Enjoy, Ant ✌️:: Global PR Pool :: 0418 580 265
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Securing Firebase: Lessons Re-Learned from the Tea Breach Inspried by the breach of the Tea app, Brendon Evans recorded a video to inform of Firebase security issues https://isc.sans.edu/diary/Securing%20Firebase%3A%20Lessons%20Re-Learned%20from%20the%20Tea%20Breach/32158 WebKit Vulnerability Exploited before Apple Patch A WebKit vulnerablity patched by Apple yesterday has already been exploited in Google Chrome. Google noted the exploit with its patch for the same vulnerability in Chrome. https://nvd.nist.gov/vuln/detail/CVE-2025-6558 Scattered Spider Update CISA released an update for its report on Scattered Spider, noting that the group also calls helpdesks impersonating users, not just the other way around. https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-320a
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Apple Updates Everything: July 2025 Edition Apple released updates for all of its operating systems patching 89 different vulnerabilities. Many vulnerabilities apply to multiple operating systems. https://isc.sans.edu/diary/Apple%20Updates%20Everything%3A%20July%202025/32154 Python Triage A quick python script by Xavier to efficiently search through files, even compressed once, for indicators of compromise. https://isc.sans.edu/diary/Triage+is+Key+Python+to+the+Rescue/32152/ PaperCut Attacks CISA added a 2024 Papercut vulnerability to the known exploited vulnerability list. https://www.cisa.gov/news-events/alerts/2025/07/28/cisa-adds-three-known-exploited-vulnerabilities-catalog
Before a city lawsuit accused her of running a massive illegal rooming house operation, the residents of Virginia Avenue in St. Louis' Tower Grove East neighborhood knew all about Dara Daugherty. Brittany Marquardt says she watched how Daugherty operated as a slumlord while allegedly renting rooms in condemned houses to vulnerable tenants. Marquardt takes us inside the situation and shares how complaints from her and other neighbors ultimately led to a courtroom confrontation with Daugherty. St. Louis Magazine reporter Ryan Krull discusses the latest on the legal case and the impact of Daugherty's surprise filing of bankruptcy earlier this month.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SharePoint Servers Exploited via 0-day CVE-2025-53770 Late last week, CodeWhite found a new remote code execution exploit against SharePoint. This vulnerability is now actively exploited. https://isc.sans.edu/diary/Critical+Sharepoint+0Day+Vulnerablity+Exploited+CVE202553770+ToolShell/32122/ Veeam Voicemail Phishing Attackers appear to impersonate VEEAM in recent voicemail-themed phishing attempts. https://isc.sans.edu/diary/Veeam%20Phishing%20via%20Wav%20File/32120 Passkey Phishing Attack A currently active phishing attack takes advantage of the ability to use QR codes to complete the Passkey login procedure https://expel.com/blog/poisonseed-downgrading-fido-key-authentications-to-fetch-user-accounts/
Ghislaine Maxwell and Jeffrey Epstein systematically exploited the class divide to identify, groom, and traffic vulnerable girls who lacked the social capital, financial resources, or legal protection to fight back. They deliberately targeted young women from economically disadvantaged backgrounds—many of them minors—offering them small amounts of money, promises of education, or social advancement in exchange for massages that quickly escalated into sexual abuse. Epstein's wealth and Maxwell's aristocratic veneer allowed them to present a façade of opportunity, while in reality, they were preying on desperation and lack of options. The imbalance of power was not incidental—it was the very mechanism of their crimes.At the same time, their wealth and elite social connections gave them near-total immunity in the circles they moved in. Maxwell, the daughter of a media mogul, and Epstein, a financier with access to billionaires, royalty, and world leaders, used their status to insulate themselves from scrutiny. Victims were dismissed as unreliable or unworthy of belief, while Maxwell and Epstein were protected by institutions more interested in preserving reputations than seeking justice. The class divide not only enabled the abuse—it silenced the aftermath. The girls were disposable. The predators were untouchable.To contact me:bobbycapucci@protonmail.comSource:https://www.ft.com/content/0b9d93da-1687-4eb1-bd53-0a84a1b40dff
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102 Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812 Huntress saw active exploitation of Wing FTP Server remote code execution (CVE-2025-47812) on a customer on July 1, 2025. Organizations running Wing FTP Server should update to the fixed version, version 7.4.4, as soon as possible. https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-47812-exploited-in-wild https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/ FortiWeb Pre-Auth RCE (CVE-2025-25257) An exploit for the FortiWeb RCE Vulnerability is now available and is being used in the wild. https://pwner.gg/blog/2025-07-10-fortiweb-fabric-rce NVIDIA Vulnerable to Rowhammer NVIDIA has received new research related to the industry-wide DRAM issue known as Rowhammer . The research demonstrates a potential Rowhammer attack against an NVIDIA A6000 GPU with GDDR6 Memory. The purpose of this notice is to reinforce already known mitigations to Rowhammer attacks. https://nvidia.custhelp.com/app/answers/detail/a_id/5671/~/security-notice%3A-rowhammer---july-2025
Watching those on the left attack policy makers in an attempt to politicize one of the most destructive natural disasters […]
David Peterka, Founder of When the Saints, joins Wailer to discuss their work in Malawi. While the stories and statistics are devastating to hear, their work is inspiring and hope-giving in its ongoing impact in such an underserved country. Discover how one team is making a seismic disruption among systemic, cultural evils.--------------------Join the fight to disrupt shallow, meaningless sex and reclaim what's real. By supporting The Naked Gospel Podcast for just $5/month, you become part of a movement that champions faithful marriages, healing after porn, and safe, meaningful relationships. This isn't just a podcast—it's a rebellion against sexual exploitation and cultural lies. And as a thank you, you'll get the exclusive #NoMoreVictims mug to show the world where you stand. Real passion. Real connection. No more victims. Will you disrupt with us? Sign Up Here: https://www.provenmen.org/disruptors/---------------------https://www.whenthesaints.comWhen the Saints Documentary---------------------Watch the episode on YouTubeSupport the show
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Scattered Spider Update The threat actor known as Scattered Spider is in the news again, this time focusing on airlines. But the techniques used by Scattered Spider, social engineering, are still some of the most dangerous techniques used by various threat actors. https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-recommendations?e=48754805 AMI BIOS Vulnerability Exploited CVE-2024-54085 A vulnerability in the Redfish remote access software, including AMI s BIOS, is now being exploited. https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf https://eclypsium.com/blog/ami-megarac-vulnerabilities-bmc-part-3/ Act now: Secure Boot certificates expire in June 2026 The Microsoft certificates used in Secure Boot are the basis of trust for operating system security, and all will be expiring beginning June 2026. https://techcommunity.microsoft.com/blog/windows-itpro-blog/act-now-secure-boot-certificates-expire-in-june-2026/4426856 The Windows Resiliency Initiative: Building resilience for a future-ready enterprise Microsoft announced more details about its future security and resilience strategy for Windows. In particular, security tools will no longer have kernel access, which is supposed to prevent a repeat of the Cloudflare issue, but may also restrict security tools functionality. https://blogs.windows.com/windowsexperience/2025/06/26/the-windows-resiliency-initiative-building-resilience-for-a-future-ready-enterprise/
Experts warn AI and transhumanist biotech may render humans economically inessential, creating a “useless class” as machines outpace human intelligence. Surveillance of biological data by governments and corporations – mostly gathered through mass vaccination programs – could lead to total control, as your digital and bio data are decoded to manipulate decisions with an algorithm tailored to your specific beliefs and profile. Many fear a future “digital dictatorship” where surveillance strips away all privacy and enables streamlined control of citizens by corporations and governments. Dr. Peter McCullough examines the NB.1.8.1 variant's rapid rise and USDA's poultry vaccination plans, questioning COVID vaccine efficacy claims. Joe Allen discusses AI's cognitive impacts, misinformation about transhumanism, and the latest case of AI-driven false accusations. Dr. Peter McCullough is a renowned internist, cardiologist, and Chief Scientific Officer of The Wellness Company. He is co-author of the frequently-banned book The Courage to Face COVID-19. More at https://x.com/P_McCulloughMD⠀Joe Allen is the Transhumanism Editor for War Room and author of Dark Aeon: Transhumanism And The War Against Humanity. He's an expert in tech and religion. More at https://x.com/JOEBOTxyz 「 SUPPORT OUR SPONSORS 」 Find out more about the brands that make this show possible and get special discounts on Dr. Drew's favorite products at https://drdrew.com/sponsors • ACTIVE SKIN REPAIR - Repair skin faster with more of the molecule your body creates naturally! Hypochlorous (HOCl) is produced by white blood cells to support healing – and no sting. Get 20% off at https://drdrew.com/skinrepair • FATTY15 – The future of essential fatty acids is here! Strengthen your cells against age-related breakdown with Fatty15. Get 15% off a 90-day Starter Kit Subscription at https://drdrew.com/fatty15 • PALEOVALLEY - "Paleovalley has a wide variety of extraordinary products that are both healthful and delicious,” says Dr. Drew. "I am a huge fan of this brand and know you'll love it too!” Get 15% off your first order at https://drdrew.com/paleovalley • VSHREDMD – Formulated by Dr. Drew: The Science of Cellular Health + World-Class Training Programs, Premium Content, and 1-1 Training with Certified V Shred Coaches! More at https://vshredmd.com/ • THE WELLNESS COMPANY - Counteract harmful spike proteins with TWC's Signature Series Spike Support Formula containing nattokinase and selenium. Learn more about TWC's supplements at https://twc.health/drew 「 MEDICAL NOTE 」 Portions of this program may examine countervailing views on important medical issues. Always consult your physician before making any decisions about your health. 「 ABOUT THE SHOW 」 Ask Dr. Drew is produced by Kaleb Nation (https://kalebnation.com) and Susan Pinsky (https://twitter.com/firstladyoflove). This show is for entertainment and/or informational purposes only, and is not a substitute for medical advice, diagnosis, or treatment. Learn more about your ad choices. Visit megaphone.fm/adchoices
The latest with Diddy! Blake Lively vs journalists! Chris Brown to stay locked up in the UK, but why? Joe Biden is very sick, and something about this feels fishy. Morgan Wallen has us divided! See omnystudio.com/listener for privacy information.
At the cabinet meeting yesterday, Kash Patel announced a bust of child sex traffickers and RFK claimed that there were major problems in that field through HHS. The fight against child trafficking is on. Also in this episode: the Biden admin kept a dossier on a sitting cabinet member and we're not sure which one. Alone and Exploited, Migrant Children Work Brutal Jobs Across the U.S. https://www.nytimes.com/2023/02/25/us/unaccompanied-migrant-child-workers-exploitation.html US, Ukraine sign long-awaited mineral deal two months after Trump, Zelensky White House fight https://nypost.com/2025/04/30/us-news/us-ukraine-sign-long-awaited-mineral-deal/ Bipartisan Effort To Terminate Trump's Global Tariffs Ends In Defeat https://dailycaller.com/2025/04/30/bipartisan-effort-to-terminate-trumps-global-tariffs-ends-in-defeat/ Learn more about your ad choices. Visit podcastchoices.com/adchoices