Podcasts about exploited

  • 847PODCASTS
  • 1,996EPISODES
  • 46mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jul 18, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about exploited

Show all podcasts related to exploited

Latest podcast episodes about exploited

Beyond The Horizon
How Ghislaine Maxwell And Jeffrey Epstein Exploited A Class Divide

Beyond The Horizon

Play Episode Listen Later Jul 18, 2025 27:13


Ghislaine Maxwell and Jeffrey Epstein systematically exploited the class divide to identify, groom, and traffic vulnerable girls who lacked the social capital, financial resources, or legal protection to fight back. They deliberately targeted young women from economically disadvantaged backgrounds—many of them minors—offering them small amounts of money, promises of education, or social advancement in exchange for massages that quickly escalated into sexual abuse. Epstein's wealth and Maxwell's aristocratic veneer allowed them to present a façade of opportunity, while in reality, they were preying on desperation and lack of options. The imbalance of power was not incidental—it was the very mechanism of their crimes.At the same time, their wealth and elite social connections gave them near-total immunity in the circles they moved in. Maxwell, the daughter of a media mogul, and Epstein, a financier with access to billionaires, royalty, and world leaders, used their status to insulate themselves from scrutiny. Victims were dismissed as unreliable or unworthy of belief, while Maxwell and Epstein were protected by institutions more interested in preserving reputations than seeking justice. The class divide not only enabled the abuse—it silenced the aftermath. The girls were disposable. The predators were untouchable.To contact me:bobbycapucci@protonmail.comSource:https://www.ft.com/content/0b9d93da-1687-4eb1-bd53-0a84a1b40dff

The Epstein Chronicles
How Ghislaine Maxwell And Jeffrey Epstein Exploited A Class Divide

The Epstein Chronicles

Play Episode Listen Later Jul 17, 2025 27:13


Ghislaine Maxwell and Jeffrey Epstein systematically exploited the class divide to identify, groom, and traffic vulnerable girls who lacked the social capital, financial resources, or legal protection to fight back. They deliberately targeted young women from economically disadvantaged backgrounds—many of them minors—offering them small amounts of money, promises of education, or social advancement in exchange for massages that quickly escalated into sexual abuse. Epstein's wealth and Maxwell's aristocratic veneer allowed them to present a façade of opportunity, while in reality, they were preying on desperation and lack of options. The imbalance of power was not incidental—it was the very mechanism of their crimes.At the same time, their wealth and elite social connections gave them near-total immunity in the circles they moved in. Maxwell, the daughter of a media mogul, and Epstein, a financier with access to billionaires, royalty, and world leaders, used their status to insulate themselves from scrutiny. Victims were dismissed as unreliable or unworthy of belief, while Maxwell and Epstein were protected by institutions more interested in preserving reputations than seeking justice. The class divide not only enabled the abuse—it silenced the aftermath. The girls were disposable. The predators were untouchable.To contact me:bobbycapucci@protonmail.comSource:https://www.ft.com/content/0b9d93da-1687-4eb1-bd53-0a84a1b40dffBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday, July 14th, 2025: Suspect Domain Feed; Wing FTP Exploited; FortiWeb Exploited; NVIDIA GPU Rowhammer

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jul 14, 2025 6:53


Experimental Suspicious Domain Feed Our new experimental suspicious domain feed uses various criteria to identify domains that may be used for phishing or other malicious purposes. https://isc.sans.edu/diary/Experimental%20Suspicious%20Domain%20Feed/32102 Wing FTP Server RCE Vulnerability Exploited CVE-2025-47812 Huntress saw active exploitation of Wing FTP Server remote code execution (CVE-2025-47812) on a customer on July 1, 2025. Organizations running Wing FTP Server should update to the fixed version, version 7.4.4, as soon as possible. https://www.huntress.com/blog/wing-ftp-server-remote-code-execution-cve-2025-47812-exploited-in-wild https://www.rcesecurity.com/2025/06/what-the-null-wing-ftp-server-rce-cve-2025-47812/ FortiWeb Pre-Auth RCE (CVE-2025-25257) An exploit for the FortiWeb RCE Vulnerability is now available and is being used in the wild. https://pwner.gg/blog/2025-07-10-fortiweb-fabric-rce NVIDIA Vulnerable to Rowhammer NVIDIA has received new research related to the industry-wide DRAM issue known as Rowhammer . The research demonstrates a potential Rowhammer attack against an NVIDIA A6000 GPU with GDDR6 Memory. The purpose of this notice is to reinforce already known mitigations to Rowhammer attacks. https://nvidia.custhelp.com/app/answers/detail/a_id/5671/~/security-notice%3A-rowhammer---july-2025

Charlie Crimebuster's Crime Talk
Podcast - Jennifer Kesse Missing-Disney World Crime

Charlie Crimebuster's Crime Talk

Play Episode Listen Later Jul 14, 2025 31:53


19 years ago, in Central Florida, home of Disney World, young Jennifer Kesse went missing. Now 19 years later this cold case has been announced hot again by the FDLE. Learn about this crime and things about it you did not know before. Hear about the behind the scene things that this family did to keep this case alive. Discover how new techiques may lead to solving this mystery of the missing in Central FLorida. Learn about what really happens behind the make believe Castles and fun for families in Central Florida. This and more on this episode.  "If you know something about this case, say something" call 941-201-4009 Contact Charlie: charliecrimebuster@gmail.com  Support: www.peacemakernetwork.com  Web: www.charliecrimebuster.com YouTube: www.youtube.com/@charliecrimebuster Music and Sound Effect: www.pixabay.com    

Cyber Morning Call
822 - FileFix: primeiros ataques reais são detectados

Cyber Morning Call

Play Episode Listen Later Jul 14, 2025 3:58


Referências do EpisódioKongTuke FileFix Leads to New Interlock RAT VariantIntroducing FileFix – A New Alternative to ClickFix AttacksIntroducing FileFix – A New Alternative to ClickFix AttacksVídeo que fiz sobre ClickFixWing FTP Server Remote Code Execution (CVE-2025-47812) Exploited in the WildEvolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware TechniquesRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia

Cybercrime Magazine Podcast
Cybercrime Wire For Jul. 11, 2025. Activision Pulled Game, Players Exploited. WCYB Digital Radio.

Cybercrime Magazine Podcast

Play Episode Listen Later Jul 11, 2025 1:18


The Cybercrime Wire, hosted by Scott Schober, provides boardroom and C-suite executives, CIOs, CSOs, CISOs, IT executives and cybersecurity professionals with a breaking news story we're following. If there's a cyberattack, hack, or data breach you should know about, then we're on it. Listen to the podcast daily and hear it every hour on WCYB. The Cybercrime Wire is brought to you Cybercrime Magazine, Page ONE for Cybersecurity at https://cybercrimemagazine.com. • For more breaking news, visit https://cybercrimewire.com

The Luke Macias Show
Texas Disaster Exploited By Libs

The Luke Macias Show

Play Episode Listen Later Jul 9, 2025 46:17


Watching those on the left attack policy makers in an attempt to politicize one of the most destructive natural disasters […]

The Naked Gospel
Rescuing the Forgotten: Freedom for Exploited Girls in Malawi

The Naked Gospel

Play Episode Listen Later Jul 7, 2025 89:09


David Peterka, Founder of When the Saints, joins Wailer to discuss their work in Malawi. While the stories and statistics are devastating to hear, their work is inspiring and hope-giving in its ongoing impact in such an underserved country. Discover how one team is making a seismic disruption among systemic, cultural evils.--------------------Join the fight to disrupt shallow, meaningless sex and reclaim what's real. By supporting The Naked Gospel Podcast for just $5/month, you become part of a movement that champions faithful marriages, healing after porn, and safe, meaningful relationships. This isn't just a podcast—it's a rebellion against sexual exploitation and cultural lies. And as a thank you, you'll get the exclusive #NoMoreVictims mug to show the world where you stand. Real passion. Real connection. No more victims. Will you disrupt with us? Sign Up Here: https://www.provenmen.org/disruptors/---------------------https://www.whenthesaints.comWhen the Saints Documentary---------------------Watch the episode on YouTubeSupport the show

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday June 30th, 2025: Scattered Spider; AMI BIOS Exploited; Secure Boot Certs Expiring; Microsoft Resliliency Initiative

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jun 30, 2025 7:29


Scattered Spider Update The threat actor known as Scattered Spider is in the news again, this time focusing on airlines. But the techniques used by Scattered Spider, social engineering, are still some of the most dangerous techniques used by various threat actors. https://cloud.google.com/blog/topics/threat-intelligence/unc3944-proactive-hardening-recommendations?e=48754805 AMI BIOS Vulnerability Exploited CVE-2024-54085 A vulnerability in the Redfish remote access software, including AMI s BIOS, is now being exploited. https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf https://eclypsium.com/blog/ami-megarac-vulnerabilities-bmc-part-3/ Act now: Secure Boot certificates expire in June 2026 The Microsoft certificates used in Secure Boot are the basis of trust for operating system security, and all will be expiring beginning June 2026. https://techcommunity.microsoft.com/blog/windows-itpro-blog/act-now-secure-boot-certificates-expire-in-june-2026/4426856 The Windows Resiliency Initiative: Building resilience for a future-ready enterprise Microsoft announced more details about its future security and resilience strategy for Windows. In particular, security tools will no longer have kernel access, which is supposed to prevent a repeat of the Cloudflare issue, but may also restrict security tools functionality. https://blogs.windows.com/windowsexperience/2025/06/26/the-windows-resiliency-initiative-building-resilience-for-a-future-ready-enterprise/

Ask Dr. Drew
Dangerous Shots & Bots: Surveillance Under Your Skin & How Bio Data Is Exploited In An AI Tech Dystopia w/ Joe Allen & Dr. Peter McCullough – Ask Dr. Drew – Ep 500

Ask Dr. Drew

Play Episode Listen Later Jun 29, 2025 73:36


Experts warn AI and transhumanist biotech may render humans economically inessential, creating a “useless class” as machines outpace human intelligence. Surveillance of biological data by governments and corporations – mostly gathered through mass vaccination programs – could lead to total control, as your digital and bio data are decoded to manipulate decisions with an algorithm tailored to your specific beliefs and profile. Many fear a future “digital dictatorship” where surveillance strips away all privacy and enables streamlined control of citizens by corporations and governments. Dr. Peter McCullough examines the NB.1.8.1 variant's rapid rise and USDA's poultry vaccination plans, questioning COVID vaccine efficacy claims. Joe Allen discusses AI's cognitive impacts, misinformation about transhumanism, and the latest case of AI-driven false accusations. Dr. Peter McCullough is a renowned internist, cardiologist, and Chief Scientific Officer of The Wellness Company. He is co-author of the frequently-banned book The Courage to Face COVID-19. More at https://x.com/P_McCulloughMD⠀Joe Allen is the Transhumanism Editor for War Room and author of Dark Aeon: Transhumanism And The War Against Humanity. He's an expert in tech and religion. More at https://x.com/JOEBOTxyz 「 SUPPORT OUR SPONSORS 」 Find out more about the brands that make this show possible and get special discounts on Dr. Drew's favorite products at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://drdrew.com/sponsors⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠  ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ • ACTIVE SKIN REPAIR - Repair skin faster with more of the molecule your body creates naturally! Hypochlorous (HOCl) is produced by white blood cells to support healing – and no sting. Get 20% off at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://drdrew.com/skinrepair⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ • FATTY15 – The future of essential fatty acids is here! Strengthen your cells against age-related breakdown with Fatty15. Get 15% off a 90-day Starter Kit Subscription at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://drdrew.com/fatty15⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ • PALEOVALLEY - "Paleovalley has a wide variety of extraordinary products that are both healthful and delicious,” says Dr. Drew. "I am a huge fan of this brand and know you'll love it too!” Get 15% off your first order at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://drdrew.com/paleovalley⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ • VSHREDMD – Formulated by Dr. Drew: The Science of Cellular Health + World-Class Training Programs, Premium Content, and 1-1 Training with Certified V Shred Coaches! More at ⁠⁠⁠⁠https://vshredmd.com/⁠⁠⁠⁠ • THE WELLNESS COMPANY - Counteract harmful spike proteins with TWC's Signature Series Spike Support Formula containing nattokinase and selenium. Learn more about TWC's supplements at ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twc.health/drew⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ 「 MEDICAL NOTE 」 Portions of this program may examine countervailing views on important medical issues. Always consult your physician before making any decisions about your health. 「 ABOUT THE SHOW 」 Ask Dr. Drew is produced by Kaleb Nation (⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://kalebnation.com⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠) and Susan Pinsky (⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠https://twitter.com/firstladyoflov⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠e⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠). This show is for entertainment and/or informational purposes only, and is not a substitute for medical advice, diagnosis, or treatment. Learn more about your ad choices. Visit megaphone.fm/adchoices

MRCTV's Podcast -Public Service Announcement
Episode 719: Anonymous Sources Exploited for Anti-Trump Spin

MRCTV's Podcast -Public Service Announcement

Play Episode Listen Later Jun 25, 2025 33:58


The current dominant spin about President Trump's bunker-busting bombs on Iran's nuclear facilities comes from anonymous intelligence sources who are guessing that the Iranian nuclear program has only been set back about three months. Once again, reporters like CNN's Natasha Bertrand exploit shadowy sources for an anti-Trump spin, pretending all the way that there's no politics being played.

Cyber Morning Call
807 - Sitecore tem senha “b” chumbada no código

Cyber Morning Call

Play Episode Listen Later Jun 18, 2025 5:58


Referências do Episódio/bin/live - hackerspacesVulnerabilities Resolved in Veeam Backup & Replication 12.3.2Is b For Backdoor? Pre-Auth RCE Chain In Sitecore Experience PlatformExploring a New KimJongRAT Stealer Variant and Its PowerShell ImplementationA Wretch Client: From ClickFix deception to information stealer deployment僵尸永远不死:RapperBot僵尸网络近况分析Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper BackdoorArtificial Eyes: Generative AI in China's Military IntelligenceRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia

Choose To Be with Choose Recovery Services; Betrayal Trauma Healing
Is Your Patience Being Honored or Exploited?

Choose To Be with Choose Recovery Services; Betrayal Trauma Healing

Play Episode Listen Later Jun 17, 2025 32:20


Are you struggling with patience in your recovery journey? This week Amie and Alana delve into the nuanced concept of patience, its role in healing from betrayal, and how to cultivate it healthily. Learn to balance patience with reality, recognize unhealthy patterns, and empower yourself to know when your patience is being honored and when it's not.Register Now!Should I Stay Or Go? Struggling with whether to stay in your relationship or leave? Amie's self-paced, step-by-step course helps you work through your feelings, face your fears, and figure out what you really want. You'll gain the clarity and confidence to make the right decision for you—whatever that may be.Help Her Heal Men's Intensive - This immersive intensive is designed specifically for men to learn how to support their partners as they heal from betrayal trauma. You will participate in experiential workshops, receive personalized feedback, and learn practical tools to develop the emotional capacity needed for relationship repair. Join us July 8th-11th in Spanish Fork, UT. NEW - Couple's Add-On Experience - invite your partner to join you for an optional fifth day together in a safe, supportive environment to practice what has been learned.We don't want finances to get in the way of your healing. Scholarships and payment plans are available for all of our intensives. Fill out an application to learn more and see if you qualify.⁠⁠Watch us⁠ on YouTube.Follow us on our NEW Instagram: @choose_recovery_services⁠Schedule⁠ a complimentary consultation.Join our email list to be notified when new episodes air.More from Choose Recovery ServicesBeyond the Facade Podcast - Luke Gordon hosts a podcast geared toward helping men live authentically and in harmony with their values.Choose Healing - Weekly support group for women who have recently experienced betrayal. First four weeks are free!Believing in You - In this program Amie teaches you how to work WITH your brain instead of against it. Learn tools that will help you move forward to trust, love, empowerment, and finding joy once again.Road to Recovery Webinar - Join us on the second Sunday of each month for a FREE interactive discussion that explores tools and strategies to support individuals and couples navigating the challenges of recovery following betrayal.  Intensives - Accelerate your healing journey with one of our intensives, available year-round for individuals, couples, and professionals. Healing Hearts - This is for couples seeking healing after betrayal. It emphasizes the development of empathy, integrity, and authentic intimacy. Help. Her. Heal - This program is for men seeking to learn more about empathy, conflict resolution, and healthy communication. Beyond the Facade: Men's Healing Group - We help men move through the pains of addiction, relationship healing, managing emotions, and moving past shame. Choose Renewal - For women recovering from unwanted sexual behavior, whether it's a recurring challenge or a one-time incident. Betrayal Trauma Recovery Book Study Group - This group provides a safe space for women to discuss books about betrayal trauma, ask questions, and find community support. Resilient Teens - Ongoing support group for teens ages 15-18 whose parents have experienced betrayal in their marriage.Adult Children Uniting for Healing - Ongoing support group for adult children of parents who have experienced betrayal in their marriage.⁠⁠⁠⁠⁠⁠The Empowered Divorce Podcast⁠⁠⁠⁠⁠⁠ with Amie Woolsey for those who are leaning toward divorce.⁠⁠⁠⁠⁠⁠Dating From Within - Learn how to know if you are ready to date again and what a healthy relationship looks like. Should I Stay or Go? - Self-paced course designed to be a companion on your journey toward self-discovery and personal empowerment. 

Black Women’s Health
Ignored, Exploited and Misinformed: The Truth about Women's Health

Black Women’s Health

Play Episode Listen Later Jun 14, 2025 9:07


Women's bodies are studied when it's profitable, ignored when it's not. In this raw episode, Dr Rahman breaks down uncomfortable truths in women's health- why potentially low cost, low risk options get dismissed without study. This scientific neglect and silence creates the opportunity for online influencers and charlatans to make far-fetched, miraculous claims of health and healing to women desperately looking for healing.You'll learn:-why pelvic tone is important and what problems loss of tone can create- how profit/ return on investment often drives what get studied in women's healthComment below: What were your told about your pelvic floor?Black Women's Health PodcastHosted by Dr, Rahmanwww.doctorrahman.com

Fred Nova - in the mix
Fred Nova - Ibiza 25

Fred Nova - in the mix

Play Episode Listen Later Jun 13, 2025 144:59


Ibiza 25... not everyone understands house music Fred Nova in the mix: deep, melancholic & melodic house 30 tracks and remixes from artists like Mind Against, Keinemusik, Boys Noize, Prospa, Andre Espeut, Andrew Sant, Dennis Ferrer, Jerome Sydenham, Simon Doty, Ede, Rampa, Gorge, Yulia Niko, Musumeci, Sante, Dario D'Attis, Sugar Hill, Dj Sandwich, Marc Pané, Dompe, Audiojack, Emanuel Satie, KIRIK, Damian Lazarus, Soma Soul, Mondo Man, Rufus Du Sol, Adam Ten & Mita Gami, Thugfucker, ... Released on great labels like Life And Death, Diynamic, PIV, CircoLoco, Selador, Ibadan Sound, Innervisions, 8Bit, Human By Default, Moon Harbour, Poker Flat, Transa, Definitive, Music For Dreams, Recess, Gruuv, Exploited, Memory Remains, Crosstown Rebels, Get Physical Music, Rose Avenue, Rekids and many more. Make love, not war x

The Morning Show w/ John and Hugh
Pacers exploited probably Thunder's worst shooting night in entire playoffs

The Morning Show w/ John and Hugh

Play Episode Listen Later Jun 6, 2025 14:14


Mark Zinno, Beau Morgan, and Ali Mac continue to recap and react to the Indiana Pacers stunning the Oklahoma City Thunder 111-110 last night in game one of the NBA Finals after the Pacers made a comeback for the ages that was capped by Tyrese Haliburton's 21-foot jumper with 0.3 seconds left in the game that gave Indiana its first and only lead of the game.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Wednesday, June 4th, 2025: vBulletin Exploited; Chrome 0-Day Patch; Roundcube RCE Patch; Multiple HP StoreOnce Vulns Patched

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jun 4, 2025 7:25


vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%28CVE-2025-48827%2C%20CVE-2025-48828%29/32006 Google Chrome 0-Day Patched Google released a security update for Google Chrome patching three flaws. One of these is already being exploited. https://chromereleases.googleblog.com/ Roundcube Update Roundcube patched a vulnerability that allows any authenticated user to execute arbitrary code. https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10 HP Vulnerabilities in StoreOnce HP patched multiple vulnerabilities in StoreOnce. These issues could lead to remote code execution https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US

Cyber Security Headlines
MS and CrowdStrike partner, Qualcomm bugs exploited, new CISA cut details

Cyber Security Headlines

Play Episode Listen Later Jun 3, 2025 7:30


Microsoft and CrowdStrike partner to link threat actor names Qualcomm sees Adreno bugs under active exploitation New details on proposed CISA cuts Huge thanks to our sponsor, Conveyor Does trying to get the security questionnaire done and back to your customer ever feel like you're herding cats? It's not answering questions - most of you have automation software for that. It's all of the manual back and forth that becomes a slog like communicating between teams, tracking people down to get their review, updating sources and updating systems. Conveyor just launched an AI agent, Sue, to do all of these things and more for you. Learn about Sue at www.conveyor.com.

Truth Talk Weekend
Rescue the Hepless: God's Heart for the Exploited

Truth Talk Weekend

Play Episode Listen Later May 27, 2025 44:55


In this powerful episode of Truth Talk Live, host Robby Dilmore is joined by Whitney Miller of the Invictus Project and Mike Zwick to confront one of the darkest crises of our time—child exploitation and trafficking. With urgency and compassion, the conversation explores the spiritual and societal war being waged against our most vulnerable.

Afternoon Drive with John Maytham
Exploited Underground: Children Trapped in Mining Abuse

Afternoon Drive with John Maytham

Play Episode Listen Later May 21, 2025 5:27


John Maytham delves deeper into this pressing issue and speaks to Gugu Xaba, CEO of Save the Children South Africa, who has been at the forefront of advocating for children's rights and protection. With over 30 years of experience in the development sector, Gugu brings a wealth of knowledge and a profound commitment to safeguarding children. Presenter John Maytham is an actor and author-turned-talk radio veteran and seasoned journalist. His show serves a round-up of local and international news coupled with the latest in business, sport, traffic and weather. The host’s eclectic interests mean the program often surprises the audience with intriguing book reviews and inspiring interviews profiling artists. A daily highlight is Rapid Fire, just after 5:30pm. CapeTalk fans call in, to stump the presenter with their general knowledge questions. Another firm favourite is the humorous Thursday crossing with award-winning journalist Rebecca Davis, called “Plan B”. Thank you for listening to a podcast from Afternoon Drive with John Maytham Listen live on Primedia+ weekdays from 15:00 and 18:00 (SA Time) to Afternoon Drive with John Maytham broadcast on CapeTalk https://buff.ly/NnFM3Nk For more from the show go to https://buff.ly/BSFy4Cn or find all the catch-up podcasts here https://buff.ly/n8nWt4x Subscribe to the CapeTalk Daily and Weekly Newsletters https://buff.ly/sbvVZD5 Follow us on social media: CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/CapeTalk CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567 See omnystudio.com/listener for privacy information.

The Perez Hilton Podcast with Chris Booker
Blake Lively's Making MORE Threats! Diddy Being Exploited! Free Chris Brown? Rihanna Is Sucking! Joe Biden's Cancer - A Coverup?

The Perez Hilton Podcast with Chris Booker

Play Episode Listen Later May 19, 2025 34:06 Transcription Available


The latest with Diddy! Blake Lively vs journalists! Chris Brown to stay locked up in the UK, but why? Joe Biden is very sick, and something about this feels fishy. Morgan Wallen has us divided! See omnystudio.com/listener for privacy information.

The Narrative
Addicted & Exploited: The Truth About Gambling in Ohio

The Narrative

Play Episode Listen Later May 16, 2025 62:00


Do you want your tax dollars supporting an industry that relies on addiction, drains families’ wealth, and targets the most vulnerable? In this special episode of The Narrative, CCV President Aaron Baer, Policy Director David Mahan, and Communications Director Mike Andrews are joined by gambling experts Les Bernal and Dr. Jonathan Krutz, along with school administrator Mark Mousa, to unpack the dangerous rise of predatory gambling in Ohio—and why Christians must take a stand. This isn't just about gambling. It’s about who pays the price. From alarming suicide rates to billions in personal wealth lost, this conversation reveals the hidden costs of state-sponsored gambling and what it means for the Church, for families, and for our future.

The Clement Manyathela Show
Open line – Are townships being exploited for aesthetics?

The Clement Manyathela Show

Play Episode Listen Later May 14, 2025 39:43


Thabo Shole Mashao in for Clement Manyathela and the listeners discuss whether townships are being exploited for aesthetics without the necessary investment. The Clement Manyathela Show is broadcast on 702, a Johannesburg based talk radio station, weekdays from 09:00 to 12:00 (SA Time). Clement Manyathela starts his show each weekday on 702 at 9 am taking your calls and voice notes on his Open Line. In the second hour of his show, he unpacks, explains, and makes sense of the news of the day. Clement has several features in his third hour from 11 am that provide you with information to help and guide you through your daily life. As your morning friend, he tackles the serious as well as the light-hearted, on your behalf. Thank you for listening to a podcast from The Clement Manyathela Show. Listen live on Primedia+ weekdays from 09:00 and 12:00 (SA Time) to The Clement Manyathela Show broadcast on 702 https://buff.ly/gk3y0Kj For more from the show go to https://buff.ly/XijPLtJ or find all the catch-up podcasts here https://buff.ly/p0gWuPE Subscribe to the 702 Daily and Weekly Newsletters https://buff.ly/v5mfetc Follow us on social media: 702 on Facebook https://www.facebook.com/TalkRadio702 702 on TikTok https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702 See omnystudio.com/listener for privacy information.

The Index
Who is making Russia's drones? The migrant women exploited for Russia's war economy

The Index

Play Episode Listen Later May 13, 2025 20:24 Transcription Available


The full-scale war in Ukraine has been raging for three years now. One of the defining military developments during this conflict has been the use of drones. And both sides have utilised them with devastating effect.These include the small drone operators dropping bombs on unsuspecting troops to the Iranian-designed Shahed kamikaze drones smashing into residential buildings in Ukrainian cities.In Russia, where many people have been drafted into the military, the country has seen a labour shortage in key industries that support its war machine. One such industry is the manufacture of Shahed drones, which are now built in Russia.In 2023, reports about the people building these drones emerged, first in the Russian media, and then in an investigation by the Associated Press. The AP investigation revealed that Russian drone manufacturers had been falsely recruiting young women from a number of African countries, such as Uganda, Rwanda, Kenya, South Sudan, Sierra Leone, and Nigeria – to work in a drone factory located in the Alabuga Special Economic Zone in Russia's Tatarstan. The young women applied through an online advertisement called ‘Alabuga Start', which falsely advertised a work-study program in industries like catering or hospitality and offered free plane tickets and money. But the workers are unaware of the reality where they were put to work in factories building drones that would be launched against Ukraine.According to the Global Organized Crime Index – labour exploitation and false recruitment practices fall under human trafficking, as it involves “a form of coercion, deception, abduction or fraud” – and Eastern Africa leads globally for the most pervasive human trafficking market (with a score of 7.78 out of 10). 6 out of the 9 countries in the region, roughly 67%, score eight or higher for Human Trafficking and is only equalled in the region by arms trafficking.Russia itself has relatively high levels as well, at 7.5 out of 10.This episode will address concerns around the example of Alabuga Start and whether or not it is an example of human trafficking.Presenter: Thin Lei WinSpeaker(s): Julia Stanyard, Senior Analyst, Global Initiative against Transnational Organized CrimeLinksPaper - Who is making Russia's drones? The migrant women exploited for Russia's war economyRussia Country ProfileUkraine Country ProfileSouth Africa Country ProfileUganda Country ProfileKenya Country ProfileRwanda Country ProfileSouth Sudan Country ProfileNigeria Country ProfileSierra Leone Country ProfileThe...

New Ideal, from the Ayn Rand Institute
How Capitalists Are Exploited

New Ideal, from the Ayn Rand Institute

Play Episode Listen Later May 9, 2025 54:32


https://youtu.be/0R_RjyOJeI4 Podcast audio: In this episode of The Ayn Rand Institute Podcast, Ben Bayer, Robertas Bakula, and Tristan de Liège explore how the mixed economy enables the unjust exploitation of society's most productive individuals. Among the topics covered: Why, contrary to Marxist claims, businesspeople are the most exploited group in a mixed economy; How antitrust laws enable the government and less successful companies to exploit successful companies; How tariffs drive the material and spiritual exploitation of producers; How farm subsidies reward stagnation at the taxpayers' expense; How Atlas Shrugged dramatizes the exploitation of producers. Recommended in this podcast are Ayn Rand's books Atlas Shrugged and Capitalism: The Unknown Ideal, and the recent podcast episode on “The Marxists' Exploitation Myth.” The podcast was recorded on May 5, 2025 and posted on May 7, 2025. Listen and subscribe wherever you get your podcasts. Watch archived podcasts here.

lovelustfear
20: lovelustfear | lisa |  that's when everything changed

lovelustfear

Play Episode Listen Later May 8, 2025 47:06


As Lisa rises to fame in the modeling world, her ambition takes her around the globe. What starts as a dream life quickly unravels when she becomes the target of a dangerous sexual predator. Exploited by those in power, she refuses to stay silent, putting herself at risk to uncover the truth and protect others from the same fate. chapters (00:00) listen with caution (00:16) next on lovelustfear (01:44) about lisa (02:40) lisa's story (36:16) questions & answers (44:39) closing thoughts (46:12) charity & organizations (46:42) submit your story (46:53) disclaimer ** This episode contains explicit content, including descriptions of sexual assault, human trafficking, and coerion. Please listen with caution.** quotes "I definitely always had this personality where I like to have a voice." - Lisa "As I became a model in my teens, it was like. The mid nineties, right? So we had all these supermodels and every little girl wanted to be a model." - Lisa I've had certain experiences that I always felt like I could handle." - Lisa "His whole demeanor changed. He was definitely very, very different at this point. I felt like I couldn't leave the room." - Lisa "It just changed everything for me and my trust in men for my body, my trust in myself." - Lisa  "They cannot be silenced anymore. That's where the shift is going to change, because when people, yes, are assaulted, they're speaking out where predators have always relied on the fact that all the victims stay silent." - Lisa topics | #Healing #Transparency #Modeling #Identity #Podcasting #Trauma #Empowerment #Predators #Boundaries #SelfDiscovery #Grooming #Assault #Trust #Relationships #SelfPerception #Mentorship #PowerDynamics #EmotionalImpact #Abuse #ModelingIndustry #SpeakingOut #SurvivorStories #Corruption #PersonalGrowth music | sounds Music (CC BY 4.0): Lost Place Atmospheres 002 by Sascha Ende Very Low Note by Kevin MacLeod (incompetech.com) Other Music and Sound Effects by: Alex Wit, cybercutie, freesound_community, Geoffrey Harvey, Syouki Takahashi, Timothy Kulig, Pixabay, Samuel F. Johanns, AlesiaDavina, and UNIVERSFIELD from Pixabay stay aware | follow | share (lisa) https://www.instagram.com/iamlisaphillips/ https://www.youtube.com/@fromnowonpod https://podcasts.apple.com/us/podcast/from-now-on/id1766405014 https://open.spotify.com/show/1vOhoPrOkwIyCNApzsBlF8 https://www.tiktok.com/@fromnowonpod https://linktr.ee/fromnowonpod National Domestic Violence Hotline (24/7/365) Call 1.800.799.SAFE (7233) Text: START to 88788  https://www.thehotline.org/ https://www.facebook.com/NationalDomesticViolenceHotline https://www.instagram.com/NDVHofficial/ story submission information  If you would like to consider being a guest on lovelustfear or would like your story featured anonymously, please contact us below. submission link | https://lovelustfear.aidaform.com/lovelustfear E-mail | lovelustfearpod@gmail.com Instagram | https://www.instagram.com/lovelustfearpod/ subscription links Amazon Music https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748/lovelustfear Spotify https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWec Apple https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283 RSS feed https://audioboom.com/channels/5125912.rss Want to hear more? Whatever app you're listening on, just rate us and/or leave us a comment or review. Thank you for your support! 

Really Bitch ?!?!
Tribe Meeting_Shannon Sharpe attorney speaks_ Wendy Williams exploited_ Politricks

Really Bitch ?!?!

Play Episode Listen Later May 6, 2025 92:41


The Dan Bongino Show
Which Cabinet Member Was The Biden Admin Spying On? | Episode 34

The Dan Bongino Show

Play Episode Listen Later May 1, 2025 60:00


At the cabinet meeting yesterday, Kash Patel announced a bust of child sex traffickers and RFK claimed that there were major problems in that field through HHS. The fight against child trafficking is on. Also in this episode: the Biden admin kept a dossier on a sitting cabinet member and we're not sure which one. Alone and Exploited, Migrant Children Work Brutal Jobs Across the U.S. ⁠https://www.nytimes.com/2023/02/25/us/unaccompanied-migrant-child-workers-exploitation.html⁠ US, Ukraine sign long-awaited mineral deal two months after Trump, Zelensky White House fight ⁠https://nypost.com/2025/04/30/us-news/us-ukraine-sign-long-awaited-mineral-deal/⁠ Bipartisan Effort To Terminate Trump's Global Tariffs Ends In Defeat ⁠https://dailycaller.com/2025/04/30/bipartisan-effort-to-terminate-trumps-global-tariffs-ends-in-defeat/⁠ Learn more about your ad choices. Visit podcastchoices.com/adchoices

The CyberWire
Lights out, lines down.

The CyberWire

Play Episode Listen Later Apr 28, 2025 30:38


A massive power outage strikes the Iberian Peninsula. Iran says it repelled a “widespread and complex” cyberattack targeting national infrastructure. Researchers find hundreds of SAP NetWeaver systems vulnerable to a critical zero-day. A British retailer tells warehouse workers to stay home following a cyberattack. VeriSource Services discloses a breach exposing personal data of four million individuals. Global automated scanning surged 16.7% in 2024. CISA discloses several critical vulnerabilities affecting Planet Technology's industrial switches and network management products. A Greek court upholds a VPN provider's no-logs policies. Law enforcement dismantles the JokerOTP phishing tool. Our guest is Tim Starks from CyberScoop with developments in the NSO Group trial. How Bad Scans and AI Spread a Scientific Urban Legend. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Special Edition On our ⁠Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, we are shining a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. This episode is part of our exclusive RSAC series where we dive into the real world impact of the Microsoft for Startups Founders Hub.  Along with Microsoft's ⁠Kevin Magee⁠, Dave Bittner talks with an entrepreneur and startup veteran, and founders from three incredible startups who are part of the Founders Hub, each tackling big problems with even bigger ideas.  Dave and Kevin set the stage speaking with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur. Dave and Kevin then speak with three founders: ⁠Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. So whether you are building your own startup or just love a good innovation story, listen in. For more information, visit the ⁠Microsoft for Startups website⁠. CyberWire Guest We are joined by Tim Starks from CyberScoop who is discussing Judge limits evidence about NSO Group customers, victims in damages trial Selected Reading Nationwide Power Outages in Portugal & Spain Possibly Due to Cyberattack (Cyber Security News) Iran claims it stopped large cyberattack on country's infrastructure (The Record) 400+ SAP NetWeaver Devices Vulnerable to 0-Day Attacks that Exploited in the Wild (Cyber Security News) M&S warehouse workers told not to come to work following cyberattack (The Record) 4 Million Affected by VeriSource Data Breach (SecurityWeek) Researchers Note 16.7% Increase in Automated Scanning Activity (Infosecurity Magazine) Critical Vulnerabilities Found in Planet Technology Industrial Networking Products (SecurityWeek) Court Dismisses Criminal Charges Against VPN Executive, Affirms No-Log Policy (Hackread) JokerOTP Dismantled After 28,000 Phishing Attacks, 2 Arrested (Hackread) A Strange Phrase Keeps Turning Up in Scientific Papers, But Why? (ScienceAlert) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday, April 28th: Image Steganography; SAP Netweaver Exploited

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Apr 28, 2025 7:55


Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20Payload%20Delivered%20Through%20Steganography/31892 SAP Netweaver Exploited CVE-2025-31324 An arbitrary file upload vulnerability in SAP s Netweaver product is actively exploited to upload webshells. Reliaquest discovered the issue. Reliaquest reports that they saw it being abused to upload the Brute Ratel C2 framework. Users of Netweaver must turn off the developmentserver alias and disable visual composer, and the application was deprecated for about 10 years. SAP has released an emergency update for the issue. https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/ https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/ Any.Run Reports False Positive Uploads Due to false positives caused by MS Defender XDR flagging Adobe Acrobat Cloud links as malicious, many users of Any.Run s free tier uploaded confidential documents to Any.Run. Anyrun blocked these uploads for now but reminded users to be cautious about what documents are being uploaded. https://x.com/anyrun_app/status/1915429758516560190

Business of Tech
Ransomware Hits SMBs Hard, Google OAuth Exploited, Gladinet's Security Flaw, and AI Scraping Issues

Business of Tech

Play Episode Listen Later Apr 22, 2025 15:27


Ransomware attacks targeting small and medium-sized businesses (SMBs) have reached alarming levels, with a recent UK government survey revealing that 1% of organizations reported such incidents, affecting approximately 19,000 entities. This marks a significant increase from the previous year, highlighting a troubling trend where nation-state actors are increasingly focusing on SMBs due to their often inadequate cybersecurity measures. The survey also indicates a decline in board-level cybersecurity responsibility, with only 27% of businesses having a cyber specialist on their board, down from 38% four years ago. As the frequency of ransomware incidents decreases, the cost per incident is rising, emphasizing the need for resilience-focused security measures.In addition to ransomware, a vulnerability in Google's OAuth system has been exploited by phishers to create sophisticated attacks that mimic legitimate emails from Google. This DKIM replay phishing attack allows hackers to bypass security checks, making it difficult for users to detect scams. A notable case involved a developer receiving a fraudulent email that appeared to be a legitimate security alert. This incident underscores the importance of updating security awareness training, as traditional methods may not adequately prepare users for such advanced phishing techniques.Another significant security concern arose from a flaw in Gladinet's Centristack file-sharing platform, which allows remote code execution due to a deserialization issue linked to hard-coded cryptographic keys. This vulnerability has already been exploited in multiple cases, raising alarms within the cybersecurity community. Gladinet has advised customers to upgrade or change their keys to mitigate potential threats. Additionally, Microsoft acknowledged a flaw in its Intune device management tool that inadvertently allowed unauthorized Windows 11 upgrades, prompting organizations to revert affected devices.On a different note, Wikipedia has partnered with Kaggle to create a machine-readable dataset of its content for training AI models, addressing the challenges posed by content scraping. This initiative aims to manage the rising costs associated with non-human traffic while protecting contributors' rights under Creative Commons licensing. Meanwhile, concerns have emerged regarding the impact of AI on human intelligence, with studies indicating that reliance on AI tools may inhibit critical thinking skills, particularly among younger users. As organizations navigate the complexities of AI integration, the need for resilient systems that can adapt to these changes becomes increasingly critical. Four things to know today 00:00 Ransomware Evolves: Targeting Improves, Board Accountability Wanes, and SMBs Face Growing Geopolitical Risk03:32 Secure by Default? Not This Week — Google, Microsoft, and Gladinet Say Otherwise07:32 Wikipedia Feeds the AI Beast—But Wants to on Its Own Terms10:04 AI Overload: How Education, Cognitive Skills, and Enterprise Strategy Are Buckling Under Pressure  Supported by:  https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship https://getflexpoint.com/msp-radio/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

The Best Damn League Show.
Karmine Corp's Biggest Flaw Will Get Exploited (ft Gilius)

The Best Damn League Show.

Play Episode Listen Later Apr 18, 2025 84:10


Thorin and Peter Dun are joined by Gilius to discuss the biggest flaws of Karmine Corp, thoughts on the League of Legends meta read in the LEC, Myrwn and Carlsen's strong performances, and more!

FriendsLikeUs
Haitian Heritage and Resilience: A Conversation on History and Legacy

FriendsLikeUs

Play Episode Listen Later Apr 16, 2025 68:33


Marina Franklin talks with guest Professor Marlene Daut and Nonye Brown-West. They dive into the incredible history of Haiti with Dr. Marlene Daut on the latest episode of Friends Like Us. Discover the power of education and representation in shaping our narratives.  Nonye Brown-West is a New York-based Nigerian-American comedian and writer. She has been featured in the Boston Globe's Rise column as a Comic to Watch. She has also appeared on Amazon, NPR, PBS, ABC, Sway In The Morning on Sirius XM, and the New York Comedy Festival. Check her schedule on nonyecomedy.com or Instagram to see when she's coming to a city near you. Marlene L. Daut is an author, scholar, editor, and professor. Her books include Tropics of Haiti: Race and the Literary History of the Haitian Revolution in the Atlantic World (Liverpool UP, 2015); Baron de Vastey and the Origins of Black Atlantic Humanism (Palgrave, 2017); Awakening the Ashes: An Intellectual History of the Haitian Revolution (UNC Press, 2023); and The First and Last King of Haiti: The Rise and Fall of Henry Christophe (Knopf, 2025). Her articles on Haitian history and culture have appeared in over a dozen magazines, newspapers, and journals including, The New Yorker (“What's the Path Forward for Haiti?”), The New York Times (“Napoleon Isn't a Hero to Celebrate”), Harper's Bazaar (“Resurecting a Lost Palace of Haiti”), Essence (“Haiti isn't Cursed. It is Exploited”), The Nation (“What the French Really Owe Haiti”), and the LA Review of Books (“Why did Bridgerton Erase Haiti?”). She has won several awards, grants, and fellowships for her contributions to historical and cultural understandings of the Caribbean, notably from the Ford Foundation, the American Council of Learned Societies, the Haitian Studies Association, and the National Endowment for the Humanities. Most recently, she won a grant from the Robert Silvers Foundation for The First and Last King of Haiti. She graduated from Loyola Marymount University with a B.A. in English and French in 2002 and went on to teach in Rouen, France as an Assistante d'Anglais before enrolling at the University of Notre Dame, where she earned a Ph.D. in English in 2009. Since graduating, she has taught Haitian and French colonial history and culture at the University of Miami, the Claremont Graduate University, and the University of Virginia, where she also became series editor of New World Studies at UVA Press. In July 2022, she was appointed as Professor of French and African American Studies at Yale University. Always hosted by Marina Franklin - One Hour Comedy Special: Single Black Female ( Amazon Prime, CW Network), TBS's The Last O.G, Last Week Tonight with John Oliver, Hysterical on FX, The Movie Trainwreck, Louie Season V, The Jim Gaffigan Show, Conan O'Brien, Stephen Colbert, HBO's Crashing, and The Breaks with Michelle Wolf. Writer for HBO's 'Divorce' and the new Tracy Morgan show on Paramount Plus: 'Crutch'.   

The John Batchelor Show
Preview: Colleague Lance Gatling in Tokyo compares MacArthur's remaking of the Japanese economy 1945-1950 with the ambition of the Trump administration to remake the China exploited WTO. More later.

The John Batchelor Show

Play Episode Listen Later Apr 14, 2025 2:12


Preview: Colleague Lance Gatling in Tokyo compares MacArthur's remaking of the Japanese economy 1945-1950 with the ambition of the Trump administration to remake the China exploited WTO. More later. 1925 HONG KONG

Beyond The Horizon
The Epstein Rewind: How Ghislaine Maxwell And Jeffrey Epstein Exploited The Class Divide

Beyond The Horizon

Play Episode Listen Later Apr 12, 2025 27:13


On this morning's edition of the show, we take a look at the headlines from overnight and talk a little bit more about Maxwell and Epstein's propensity to search out the most vulnerable amongst us for their abuse.(commercial at 13:52)To contact me:bobbycapucci@protonmail.comSource:https://www.ft.com/content/0b9d93da-1687-4eb1-bd53-0a84a1b40dff

Cyber Security Today
OpenAI Shuts Down Spammer | New RAT Threatens Windows | WordPress Bug Exploited

Cyber Security Today

Play Episode Listen Later Apr 11, 2025 11:48 Transcription Available


In this episode of Cybersecurity Today, host Jim Love covers the shutdown of a spammer exploiting OpenAI's GPT model, a cybersecurity breach at the US Office of the Comptroller of the Currency, and a new malware operation called 'Operation End Game' targeting major cybercrime networks. He also discusses the emergence of a destructive RAT on GitHub that poses a significant risk to Windows systems, and a critical vulnerability in the WordPress plugin AutoKit that was exploited mere hours after its disclosure. Ensure you stay updated on these evolving threats and the necessary precautions to safeguard your systems. 00:00 Introduction and Headlines 00:25 Spammers Exploit OpenAI's GPT Model 02:14 US Bank Regulator Hacked 04:25 Operation End Game: Tackling Cybercrime 07:06 Neptune RAT: A New Threat to Windows 09:12 WordPress Plugin Vulnerability Exploited 11:25 Conclusion and Contact Information

Crying Out Cloud
Quadruple Supply Chain Attack, IngressNightmare Exploited, and Rumors Abound

Crying Out Cloud

Play Episode Listen Later Apr 9, 2025 28:47


The Epstein Chronicles
The Epstein Rewind: How Ghislaine Maxwell And Jeffrey Epstein Exploited The Class Divide

The Epstein Chronicles

Play Episode Listen Later Apr 8, 2025 27:13


On this morning's edition of the show, we take a look at the headlines from overnight and talk a little bit more about Maxwell and Epstein's propensity to search out the most vulnerable amongst us for their abuse.To contact me:bobbycapucci@protonmail.comSource:https://www.ft.com/content/0b9d93da-1687-4eb1-bd53-0a84a1b40dffBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday, Apr 4th: URL Frequency Analysis; Ivanti Flaw Exploited; WinRAR MotW Vuln; Tax filing scams; Oracle Breach Update

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Apr 4, 2025 6:16


Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive Using frequency analysis, and training the model with honeypot data as well as log data from legitimate websites allows for a fairly simple and reliable triage of web server logs to identify possible malicious activity. https://isc.sans.edu/diary/Exploring%20Statistical%20Measures%20to%20Predict%20URLs%20as%20Legitimate%20or%20Intrusive%20%5BGuest%20Diary%5D/31822 Critical Unexploitable Ivanti Vulnerability Exploited CVE-2025-22457 In February, Ivanti patched CVE-2025-22457. At the time, the vulnerability was not considered to be exploitable. Mandiant now published a blog disclosing that the vulnerability was exploited as soon as mid-march https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability/ WinRAR MotW Vulnerability CVE-2025-31334 WinRAR patched a vulnerability that would not apply the Mark of the Web correctly if a compressed file included symlinks. This may make it easier to trick a victim into executing code downloaded from a website. https://nvd.nist.gov/vuln/detail/CVE-2025-31334 Microsoft Warns of Tax-Related Scam With the US personal income tax filing deadline only about a week out, Microsoft warns of commonly deployed scams that they are observing related to income tax filings https://www.microsoft.com/en-us/security/blog/2025/04/03/threat-actors-leverage-tax-season-to-deploy-tax-themed-phishing-campaigns/ Oracle Breach Update https://www.bloomberg.com/news/articles/2025-04-02/oracle-tells-clients-of-second-recent-hack-log-in-data-stolen

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday, March 27th: Sitecore Exploited; Blasting Past Webp; Splunk and Firefox Vulnerabilities

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Mar 28, 2025 6:15


Sitecore "thumbnailsaccesstoken" Deserialization Scans (and some new reports) CVE-2025-27218 Our honeypots detected a deserialization attack against the CMS Sitecore using a thumnailaccesstoken header. The underlying vulnerability was patched in January, and security firm Searchlight Cyber revealed details about this vulnerability a couple of weeks ago. https://isc.sans.edu/diary/Sitecore%20%22thumbnailsaccesstoken%22%20Deserialization%20Scans%20%28and%20some%20new%20reports%29%20CVE-2025-27218/31806 Blasting Past Webp Google s Project Zero revealed details how the NSO BLASTPASS exploit took advantage of a Webp image parsing vulnerability in iOS. This zero-click attack was employed in targeted attack back in 2023 and Apple patched the underlying vulnerability in September 2023. But this is the first byte by byte description showing how the attack worked. https://googleprojectzero.blogspot.com/2025/03/blasting-past-webp.html Splunk Vulnerabilities Splunk patched about a dozen of vulnerabilities. None of them are rated critical, but a vulnerability rated High allows authenticated users to execute arbitrary code. https://advisory.splunk.com/ Firefox 0-day Patched Mozilla patched a sandbox escape vulnerability that is already being exploited. https://www.mozilla.org/en-US/security/advisories/mfsa2025-19/

Volunteer Nation
155. Entitled or Exploited? Part 2 Volunteer Responsibilities AND Rights

Volunteer Nation

Play Episode Listen Later Mar 27, 2025 42:45


In this episode of Volunteer Nation, host Tobi Johnson dives deep into the ethical and fair treatment of volunteers. She introduces the Volunteer Bill of Rights, outlining ten essential rights every volunteer should have, from being valued and trained to working in a safe environment. But rights are only part of the equation. Tobi also explores ten key responsibilities volunteers should uphold, such as committing to the organization's mission and respecting boundaries. This insightful conversation highlights the importance of mutual respect and accountability, aiming to build a positive, inclusive, and productive volunteer culture. Don't miss this continuation of Part One, where Tobi tackled volunteer bias, and the complexities of the term entitled volunteer. Full show notes: 155. Entitled or Exploited? Part 2 Volunteer Responsibilities AND Rights Volunteer Bias - Episode Highlights [00:27] - Entitled or Exploited: Volunteer Bias Recap [04:42] - Volunteer Rights and Responsibilities Overview [09:02] - 10 Fundamental Expectations and Protections Volunteers Should Have [17:49] - Additional Rights Related to Staff Interaction [28:45] - Volunteer Responsibilities: A Two-Way Street  Helpful Links VolunteerPro Impact Lab  Volunteer Management Progress Report – The Recruitment Edition Volunteer Nation Episode #154: Entitled or Exploited? Part 1 Volunteer Bias in Organizations Volunteer Nation Episode #101: Tap the Power of Psychological Contracts with Pam Kappelides Volunteer Nation Episode #108: Definition of a Volunteer – Why It Matters to Be Precise Volunteer Nation Episode #129: Paid or Volunteer Role? A Simple Checklist Thanks for listening to this episode of the Volunteer Nation podcast. If you enjoyed it, please be sure to subscribe, rate, and review so we can reach more people like you who want to improve the impact of their good cause. For more tips and notes from the show, check us out at TobiJohnson.com. For any comments or questions, email us at WeCare@VolPro.net.

Economic Update with Richard D. Wolff
How Marx's Class Analysis Could Solve Inequality Now

Economic Update with Richard D. Wolff

Play Episode Listen Later Mar 25, 2025 29:59


In this week's episode of Economic Update, Professor Wolff discusses how Marx's class analysis presents a solution to today's inequality and the challenges to overcoming it we have faced throughout history. In short, since the early existence of human society, people lived in tribes, clans, and villages that exhibited equality of wealth, income, and political power among their members. As modern history began to unfold, slavery, feudalism, and capitalism evolved as society as we know it took shape. In each of those three systems, huge inequalities separated people into masters vs slaves, lords vs serfs, and employers vs employees. Exploited and oppressed slaves, serfs, and employees opposed the inequalities of those systems but were unable to overcome them despite repeated efforts (revolutions). Marx questioned why modern societies failed to install and sustain systems of egalitarian wealth and power distribution (democracy). His answer lay in the understanding that class differences within the organization of production produce inequalities and sustain them. Overcoming those inequalities thus requires ending the class divisions within the organization of production and instead organizing in favor of a worker-cooperative structured method of production.   The d@w Team Economic Update with Richard D. Wolff is a DemocracyatWork.info Inc. production. We make it a point to provide the show free of ads and rely on viewer support to continue doing so. You can support our work by joining our Patreon community: https://www.patreon.com/democracyatwork Or you can go to our website: https://www.democracyatwork.info/donate   Every donation counts and helps us provide a larger audience with the information they need to better understand the events around the world they can't get anywhere else. We want to thank our devoted community of supporters who help make this show and others we produce possible each week.1:01 We kindly ask you to also support the work we do by encouraging others to subscribe to our YouTube channel and website: www.democracyatwork.info

Western Civ
Episode 447: The New World Exploited

Western Civ

Play Episode Listen Later Mar 21, 2025 23:02


In this episode I cover Spain's colonial efforts between 1492 and 1600, focusing on the broad economic, political, and social trends.Western Civ 2.0

Cyber Security Today
Cybersecurity Today: Exploited Vulnerabilities and Innovative Threat Mitigations: Wednesday, March 19, 2025

Cyber Security Today

Play Episode Listen Later Mar 19, 2025 8:10 Transcription Available


Cybersecurity Today: Exploited Vulnerabilities and Innovative Threat Mitigations In this episode of Cybersecurity Today, host Jim Love discusses several pressing cybersecurity issues including the exploitation of a server-side request forgery (SSRF) vulnerability in OpenAI's ChatGPT infrastructure (CVE-2024-27564), leading attackers to redirect users to malicious URLs. He also talks about how researchers at Tiny Hack have made breakthroughs in cracking Akira ransomware using high-powered GPUs, and Malwarebytes' warning about malware embedded in free online file converters. The episode highlights the importance of robust cybersecurity measures, innovative methods to combat ransomware, and cautious internet usage. 00:00 Introduction to Cybersecurity Threats 00:19 Exploiting ChatGPT Vulnerabilities 02:15 Cracking Akira Ransomware 05:01 Malware in Free Online Converters 07:12 Conclusion and Listener Support

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast: File Hashes in MSFT BI; Apache Camel Vuln; Juniper Fixes Exploited Vuln; AMI Patches 10.0 Redfish BMC Vuln

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Mar 14, 2025 6:07


File Hashes Analysis with Power BI Guy explains in this diary how to analyze Cowrie honeypot file hashes using Microsoft's BI tool and what you may be able to discover using this tool. https://isc.sans.edu/diary/File%20Hashes%20Analysis%20with%20Power%20BI%20from%20Data%20Stored%20in%20DShield%20SIEM/31764 Apache Camel Vulnerability Apache released two patches for Camel in close succession. Initially, the vulnerability was only addressed for headers, but as Akamai discovered, it can also be exploited via query parameters. This vulnerability is trivial to exploit and leads to arbitrary code execution. https://www.akamai.com/blog/security-research/march-apache-camel-vulnerability-detections-and-mitigations Juniper Patches Junos Vulnerability Juniper patches an already exploited vulnerability in JunOS. However, to exploit the vulnerability, and attacker already needs privileged access. By exploiting the vulnerability, an attacker may completely compromised the device. https://supportportal.juniper.net/s/article/2025-03-Out-of-Cycle-Security-Bulletin-Junos-OS-A-local-attacker-with-shell-access-can-execute-arbitrary-code-CVE-2025-21590?language=en_US AMI Security Advisory AMI patched three vulnerabilities. One of the, an authentication bypass in Redfish, allows for a complete system compromise without authentication and is rated with a CVSS score of 10.0. https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf

Beyond The Horizon
The Epstein Rewind: How Ghislaine Maxwell And Jeffrey Epstein Exploited The Class Divide

Beyond The Horizon

Play Episode Listen Later Mar 14, 2025 27:13


On this morning's edition of the show, we take a look at the headlines from overnight and talk a little bit more about Maxwell and Epstein's propensity to search out the most vulnerable amongst us for their abuse.(commercial at 13:52)To contact me:bobbycapucci@protonmail.comSource:https://www.ft.com/content/0b9d93da-1687-4eb1-bd53-0a84a1b40dff

Movie Trivia Schmoedown
Was Stan Lee Being EXPLOITED?! New documentary claims ex business partners were taking advantage.

Movie Trivia Schmoedown

Play Episode Listen Later Mar 12, 2025 106:34


Stan Lee, the icon, beloved creator of various legends in comic book lore passed away over 6 years ago now. There is a new documentary documenting his final chapter. Inside of that doc, it is alleged that his ex business owners were taking advantage of him. We discuss. Speaking of Marvel, the Daredevil numbers are in and the ratings are...not great. What is happening? Does this spell out worry for Thunderbolts? Are people just over Marvel?  Disney is not allowing press for Snow White currently. This and more as Kristian welcomes back Brett! #stanlee #documentary #netflix #marvel #mcu #snowwhite #rachelzegler #movies  OUR SPONSORS: TRADE COFFEE: Trade is exclusively offering our listeners 40% off your first order at https://www.drinktrade.com/KRISTIAN FACTOR: Eat smart with Factor. Get started at https://www.FACTORMEALS.com/factorpod... and use code FACTORPODCAST to get 50% off your first box plus free shipping. That's code FACTORPODCAST at https://www.FACTORMEALS.com/factorpod... to get 50% off plus free shipping on your first box. ROBINHOOD: Investing involves risk. Rate subject to change. 3% match requires Robinhood Gold at $5/mo for 1 yr from first match, must keep funds in IRA for 5 years. Go to https://www.robinhood.com/boost.  

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday Feb 28th: Njrat devtunnels.ms; Apple FindMe Abuse; XSS Exploited; @sans_edu Ben Powell EDR vs. Ransomware

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Feb 28, 2025 14:27


Njrat Compaign Using Microsoft dev Tunnels: A recent version of the Njrat remote admin tool is taking advantage of Microsoft's developer tunnels (devtunnels.ms) as a command and control channel. https://isc.sans.edu/diary/Njrat%20Campaign%20Using%20Microsoft%20Dev%20Tunnels/31724 NrootTag Apple FindMy Abuse Malware could use a weakness in the keys used for Apple FindMy to abuse it to track victims. Updates were released with iOS 18.2, but to solve the issue the vast majority of Apple users must update. https://nroottag.github.io/ 360XSS: Mass Website Exploitation via Virtual Tour Framework The Krpano VR library which is often used to implement 3D virtual tours on real estate websites, is currently being abused to inject spam messages. The XSS vulnerabilty could allow attackers to inject even more malicious JavaScript. https://olegzay.com/360xss/ SANS.edu Research: Proof is in the Pudding: EDR Configuration Versus Ransomware. Benjamin Powell https://www.sans.edu/cyber-research/proof-pudding-edr-configuration-versus-ransomware/

The John Batchelor Show
Preview: John Bolton comments that, before or during talks, a ceasefire and call for peacekeeping can be exploited on the battlefield. More

The John Batchelor Show

Play Episode Listen Later Feb 25, 2025 1:05


Preview: John Bolton comments that, before or during talks, a ceasefire and call for peacekeeping can be exploited on the battlefield. More 1921 Armenia

Past Gas by Donut Media
How The Dodge Bros Exploited Henry Ford - Past Gas #269

Past Gas by Donut Media

Play Episode Listen Later Dec 30, 2024 48:20


Thanks to Hankook for sponsoring today's video! Click here http://bit.ly/DynaproTires to learn more about Dynapro tires! This episode is sponsored by/brought to you by BetterHelp. Give online therapy a try at betterhelp.com/PASTGAS and get on your way to being your best self. Join us this week as we dive into the history of Dodge, Part I. John and Horace Dodge started out making bikes in Canada, and now, more than 100 years later their name is associated with one of the biggest car companies in the world. This might have never happened if they didn't get Henry Ford to unwillingly bankroll the operation. But how did they do it? More about Show: Follow Nolan on IG and Twitter @nolanjsykes.   Follow Joe on IG and Twitter @joegweber. Follow Donut @donutmedia, and subscribe to our Youtube and Facebook channels!   Don't forget to subscribe to the podcast for free wherever you're listening or using this link: http://bit.ly/PastGas. If you like the show, telling a friend about it would be helpful! You can text, email, Tweet, or send this link to a friend: http://bit.ly/PastGas. Learn more about your ad choices. Visit podcastchoices.com/adchoices