Podcasts about exploited

  • 841PODCASTS
  • 1,985EPISODES
  • 46mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Jun 18, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about exploited

Show all podcasts related to exploited

Latest podcast episodes about exploited

Cyber Morning Call
807 - Sitecore tem senha “b” chumbada no código

Cyber Morning Call

Play Episode Listen Later Jun 18, 2025 5:58


Referências do Episódio/bin/live - hackerspacesVulnerabilities Resolved in Veeam Backup & Replication 12.3.2Is b For Backdoor? Pre-Auth RCE Chain In Sitecore Experience PlatformExploring a New KimJongRAT Stealer Variant and Its PowerShell ImplementationA Wretch Client: From ClickFix deception to information stealer deployment僵尸永远不死:RapperBot僵尸网络近况分析Google Chrome Zero-Day CVE-2025-2783 Exploited by TaxOff to Deploy Trinper BackdoorArtificial Eyes: Generative AI in China's Military IntelligenceRoteiro e apresentação: Carlos Cabral e Bianca OliveiraEdição de áudio: Paulo ArruzzoNarração de encerramento: Bianca Garcia

Choose To Be with Choose Recovery Services; Betrayal Trauma Healing
Is Your Patience Being Honored or Exploited?

Choose To Be with Choose Recovery Services; Betrayal Trauma Healing

Play Episode Listen Later Jun 17, 2025 32:20


Are you struggling with patience in your recovery journey? This week Amie and Alana delve into the nuanced concept of patience, its role in healing from betrayal, and how to cultivate it healthily. Learn to balance patience with reality, recognize unhealthy patterns, and empower yourself to know when your patience is being honored and when it's not.Register Now!Should I Stay Or Go? Struggling with whether to stay in your relationship or leave? Amie's self-paced, step-by-step course helps you work through your feelings, face your fears, and figure out what you really want. You'll gain the clarity and confidence to make the right decision for you—whatever that may be.Help Her Heal Men's Intensive - This immersive intensive is designed specifically for men to learn how to support their partners as they heal from betrayal trauma. You will participate in experiential workshops, receive personalized feedback, and learn practical tools to develop the emotional capacity needed for relationship repair. Join us July 8th-11th in Spanish Fork, UT. NEW - Couple's Add-On Experience - invite your partner to join you for an optional fifth day together in a safe, supportive environment to practice what has been learned.We don't want finances to get in the way of your healing. Scholarships and payment plans are available for all of our intensives. Fill out an application to learn more and see if you qualify.⁠⁠Watch us⁠ on YouTube.Follow us on our NEW Instagram: @choose_recovery_services⁠Schedule⁠ a complimentary consultation.Join our email list to be notified when new episodes air.More from Choose Recovery ServicesBeyond the Facade Podcast - Luke Gordon hosts a podcast geared toward helping men live authentically and in harmony with their values.Choose Healing - Weekly support group for women who have recently experienced betrayal. First four weeks are free!Believing in You - In this program Amie teaches you how to work WITH your brain instead of against it. Learn tools that will help you move forward to trust, love, empowerment, and finding joy once again.Road to Recovery Webinar - Join us on the second Sunday of each month for a FREE interactive discussion that explores tools and strategies to support individuals and couples navigating the challenges of recovery following betrayal.  Intensives - Accelerate your healing journey with one of our intensives, available year-round for individuals, couples, and professionals. Healing Hearts - This is for couples seeking healing after betrayal. It emphasizes the development of empathy, integrity, and authentic intimacy. Help. Her. Heal - This program is for men seeking to learn more about empathy, conflict resolution, and healthy communication. Beyond the Facade: Men's Healing Group - We help men move through the pains of addiction, relationship healing, managing emotions, and moving past shame. Choose Renewal - For women recovering from unwanted sexual behavior, whether it's a recurring challenge or a one-time incident. Betrayal Trauma Recovery Book Study Group - This group provides a safe space for women to discuss books about betrayal trauma, ask questions, and find community support. Resilient Teens - Ongoing support group for teens ages 15-18 whose parents have experienced betrayal in their marriage.Adult Children Uniting for Healing - Ongoing support group for adult children of parents who have experienced betrayal in their marriage.⁠⁠⁠⁠⁠⁠The Empowered Divorce Podcast⁠⁠⁠⁠⁠⁠ with Amie Woolsey for those who are leaning toward divorce.⁠⁠⁠⁠⁠⁠Dating From Within - Learn how to know if you are ready to date again and what a healthy relationship looks like. Should I Stay or Go? - Self-paced course designed to be a companion on your journey toward self-discovery and personal empowerment. 

Black Women’s Health
Ignored, Exploited and Misinformed: The Truth about Women's Health

Black Women’s Health

Play Episode Listen Later Jun 14, 2025 9:07


Women's bodies are studied when it's profitable, ignored when it's not. In this raw episode, Dr Rahman breaks down uncomfortable truths in women's health- why potentially low cost, low risk options get dismissed without study. This scientific neglect and silence creates the opportunity for online influencers and charlatans to make far-fetched, miraculous claims of health and healing to women desperately looking for healing.You'll learn:-why pelvic tone is important and what problems loss of tone can create- how profit/ return on investment often drives what get studied in women's healthComment below: What were your told about your pelvic floor?Black Women's Health PodcastHosted by Dr, Rahmanwww.doctorrahman.com

Fred Nova - in the mix
Fred Nova - Ibiza 25

Fred Nova - in the mix

Play Episode Listen Later Jun 13, 2025 144:59


Ibiza 25... not everyone understands house music Fred Nova in the mix: deep, melancholic & melodic house 30 tracks and remixes from artists like Mind Against, Keinemusik, Boys Noize, Prospa, Andre Espeut, Andrew Sant, Dennis Ferrer, Jerome Sydenham, Simon Doty, Ede, Rampa, Gorge, Yulia Niko, Musumeci, Sante, Dario D'Attis, Sugar Hill, Dj Sandwich, Marc Pané, Dompe, Audiojack, Emanuel Satie, KIRIK, Damian Lazarus, Soma Soul, Mondo Man, Rufus Du Sol, Adam Ten & Mita Gami, Thugfucker, ... Released on great labels like Life And Death, Diynamic, PIV, CircoLoco, Selador, Ibadan Sound, Innervisions, 8Bit, Human By Default, Moon Harbour, Poker Flat, Transa, Definitive, Music For Dreams, Recess, Gruuv, Exploited, Memory Remains, Crosstown Rebels, Get Physical Music, Rose Avenue, Rekids and many more. Make love, not war x

The Morning Show w/ John and Hugh
Pacers exploited probably Thunder's worst shooting night in entire playoffs

The Morning Show w/ John and Hugh

Play Episode Listen Later Jun 6, 2025 14:14


Mark Zinno, Beau Morgan, and Ali Mac continue to recap and react to the Indiana Pacers stunning the Oklahoma City Thunder 111-110 last night in game one of the NBA Finals after the Pacers made a comeback for the ages that was capped by Tyrese Haliburton's 21-foot jumper with 0.3 seconds left in the game that gave Indiana its first and only lead of the game.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Wednesday, June 4th, 2025: vBulletin Exploited; Chrome 0-Day Patch; Roundcube RCE Patch; Multiple HP StoreOnce Vulns Patched

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jun 4, 2025 7:25


vBulletin Exploits CVE-2025-48827, CVE-2025-48828 We do see exploit attempts for the vBulletin flaw disclosed about a week ago. The flaw is only exploitable if vBulltin is run on PHP 8.1, and was patched over a year ago. However, vBulltin never disclosed the type of vulnerability that was patched. https://isc.sans.edu/diary/vBulletin%20Exploits%20%28CVE-2025-48827%2C%20CVE-2025-48828%29/32006 Google Chrome 0-Day Patched Google released a security update for Google Chrome patching three flaws. One of these is already being exploited. https://chromereleases.googleblog.com/ Roundcube Update Roundcube patched a vulnerability that allows any authenticated user to execute arbitrary code. https://roundcube.net/news/2025/06/01/security-updates-1.6.11-and-1.5.10 HP Vulnerabilities in StoreOnce HP patched multiple vulnerabilities in StoreOnce. These issues could lead to remote code execution https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US

Cyber Security Headlines
MS and CrowdStrike partner, Qualcomm bugs exploited, new CISA cut details

Cyber Security Headlines

Play Episode Listen Later Jun 3, 2025 7:30


Microsoft and CrowdStrike partner to link threat actor names Qualcomm sees Adreno bugs under active exploitation New details on proposed CISA cuts Huge thanks to our sponsor, Conveyor Does trying to get the security questionnaire done and back to your customer ever feel like you're herding cats? It's not answering questions - most of you have automation software for that. It's all of the manual back and forth that becomes a slog like communicating between teams, tracking people down to get their review, updating sources and updating systems. Conveyor just launched an AI agent, Sue, to do all of these things and more for you. Learn about Sue at www.conveyor.com.

Truth Talk Weekend
Rescue the Hepless: God's Heart for the Exploited

Truth Talk Weekend

Play Episode Listen Later May 27, 2025 44:55


In this powerful episode of Truth Talk Live, host Robby Dilmore is joined by Whitney Miller of the Invictus Project and Mike Zwick to confront one of the darkest crises of our time—child exploitation and trafficking. With urgency and compassion, the conversation explores the spiritual and societal war being waged against our most vulnerable.

Afternoon Drive with John Maytham
Exploited Underground: Children Trapped in Mining Abuse

Afternoon Drive with John Maytham

Play Episode Listen Later May 21, 2025 5:27


John Maytham delves deeper into this pressing issue and speaks to Gugu Xaba, CEO of Save the Children South Africa, who has been at the forefront of advocating for children's rights and protection. With over 30 years of experience in the development sector, Gugu brings a wealth of knowledge and a profound commitment to safeguarding children. Presenter John Maytham is an actor and author-turned-talk radio veteran and seasoned journalist. His show serves a round-up of local and international news coupled with the latest in business, sport, traffic and weather. The host’s eclectic interests mean the program often surprises the audience with intriguing book reviews and inspiring interviews profiling artists. A daily highlight is Rapid Fire, just after 5:30pm. CapeTalk fans call in, to stump the presenter with their general knowledge questions. Another firm favourite is the humorous Thursday crossing with award-winning journalist Rebecca Davis, called “Plan B”. Thank you for listening to a podcast from Afternoon Drive with John Maytham Listen live on Primedia+ weekdays from 15:00 and 18:00 (SA Time) to Afternoon Drive with John Maytham broadcast on CapeTalk https://buff.ly/NnFM3Nk For more from the show go to https://buff.ly/BSFy4Cn or find all the catch-up podcasts here https://buff.ly/n8nWt4x Subscribe to the CapeTalk Daily and Weekly Newsletters https://buff.ly/sbvVZD5 Follow us on social media: CapeTalk on Facebook: https://www.facebook.com/CapeTalk CapeTalk on TikTok: https://www.tiktok.com/@capetalk CapeTalk on Instagram: https://www.instagram.com/ CapeTalk on X: https://x.com/CapeTalk CapeTalk on YouTube: https://www.youtube.com/@CapeTalk567 See omnystudio.com/listener for privacy information.

The Perez Hilton Podcast with Chris Booker
Blake Lively's Making MORE Threats! Diddy Being Exploited! Free Chris Brown? Rihanna Is Sucking! Joe Biden's Cancer - A Coverup?

The Perez Hilton Podcast with Chris Booker

Play Episode Listen Later May 19, 2025 34:06 Transcription Available


The latest with Diddy! Blake Lively vs journalists! Chris Brown to stay locked up in the UK, but why? Joe Biden is very sick, and something about this feels fishy. Morgan Wallen has us divided! See omnystudio.com/listener for privacy information.

The Narrative
Addicted & Exploited: The Truth About Gambling in Ohio

The Narrative

Play Episode Listen Later May 16, 2025 62:00


Do you want your tax dollars supporting an industry that relies on addiction, drains families’ wealth, and targets the most vulnerable? In this special episode of The Narrative, CCV President Aaron Baer, Policy Director David Mahan, and Communications Director Mike Andrews are joined by gambling experts Les Bernal and Dr. Jonathan Krutz, along with school administrator Mark Mousa, to unpack the dangerous rise of predatory gambling in Ohio—and why Christians must take a stand. This isn't just about gambling. It’s about who pays the price. From alarming suicide rates to billions in personal wealth lost, this conversation reveals the hidden costs of state-sponsored gambling and what it means for the Church, for families, and for our future.

The Clement Manyathela Show
Open line – Are townships being exploited for aesthetics?

The Clement Manyathela Show

Play Episode Listen Later May 14, 2025 39:43


Thabo Shole Mashao in for Clement Manyathela and the listeners discuss whether townships are being exploited for aesthetics without the necessary investment. The Clement Manyathela Show is broadcast on 702, a Johannesburg based talk radio station, weekdays from 09:00 to 12:00 (SA Time). Clement Manyathela starts his show each weekday on 702 at 9 am taking your calls and voice notes on his Open Line. In the second hour of his show, he unpacks, explains, and makes sense of the news of the day. Clement has several features in his third hour from 11 am that provide you with information to help and guide you through your daily life. As your morning friend, he tackles the serious as well as the light-hearted, on your behalf. Thank you for listening to a podcast from The Clement Manyathela Show. Listen live on Primedia+ weekdays from 09:00 and 12:00 (SA Time) to The Clement Manyathela Show broadcast on 702 https://buff.ly/gk3y0Kj For more from the show go to https://buff.ly/XijPLtJ or find all the catch-up podcasts here https://buff.ly/p0gWuPE Subscribe to the 702 Daily and Weekly Newsletters https://buff.ly/v5mfetc Follow us on social media: 702 on Facebook https://www.facebook.com/TalkRadio702 702 on TikTok https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702 See omnystudio.com/listener for privacy information.

The Index
Who is making Russia's drones? The migrant women exploited for Russia's war economy

The Index

Play Episode Listen Later May 13, 2025 20:24 Transcription Available


The full-scale war in Ukraine has been raging for three years now. One of the defining military developments during this conflict has been the use of drones. And both sides have utilised them with devastating effect.These include the small drone operators dropping bombs on unsuspecting troops to the Iranian-designed Shahed kamikaze drones smashing into residential buildings in Ukrainian cities.In Russia, where many people have been drafted into the military, the country has seen a labour shortage in key industries that support its war machine. One such industry is the manufacture of Shahed drones, which are now built in Russia.In 2023, reports about the people building these drones emerged, first in the Russian media, and then in an investigation by the Associated Press. The AP investigation revealed that Russian drone manufacturers had been falsely recruiting young women from a number of African countries, such as Uganda, Rwanda, Kenya, South Sudan, Sierra Leone, and Nigeria – to work in a drone factory located in the Alabuga Special Economic Zone in Russia's Tatarstan. The young women applied through an online advertisement called ‘Alabuga Start', which falsely advertised a work-study program in industries like catering or hospitality and offered free plane tickets and money. But the workers are unaware of the reality where they were put to work in factories building drones that would be launched against Ukraine.According to the Global Organized Crime Index – labour exploitation and false recruitment practices fall under human trafficking, as it involves “a form of coercion, deception, abduction or fraud” – and Eastern Africa leads globally for the most pervasive human trafficking market (with a score of 7.78 out of 10). 6 out of the 9 countries in the region, roughly 67%, score eight or higher for Human Trafficking and is only equalled in the region by arms trafficking.Russia itself has relatively high levels as well, at 7.5 out of 10.This episode will address concerns around the example of Alabuga Start and whether or not it is an example of human trafficking.Presenter: Thin Lei WinSpeaker(s): Julia Stanyard, Senior Analyst, Global Initiative against Transnational Organized CrimeLinksPaper - Who is making Russia's drones? The migrant women exploited for Russia's war economyRussia Country ProfileUkraine Country ProfileSouth Africa Country ProfileUganda Country ProfileKenya Country ProfileRwanda Country ProfileSouth Sudan Country ProfileNigeria Country ProfileSierra Leone Country ProfileThe...

New Ideal, from the Ayn Rand Institute
How Capitalists Are Exploited

New Ideal, from the Ayn Rand Institute

Play Episode Listen Later May 9, 2025 54:32


https://youtu.be/0R_RjyOJeI4 Podcast audio: In this episode of The Ayn Rand Institute Podcast, Ben Bayer, Robertas Bakula, and Tristan de Liège explore how the mixed economy enables the unjust exploitation of society's most productive individuals. Among the topics covered: Why, contrary to Marxist claims, businesspeople are the most exploited group in a mixed economy; How antitrust laws enable the government and less successful companies to exploit successful companies; How tariffs drive the material and spiritual exploitation of producers; How farm subsidies reward stagnation at the taxpayers' expense; How Atlas Shrugged dramatizes the exploitation of producers. Recommended in this podcast are Ayn Rand's books Atlas Shrugged and Capitalism: The Unknown Ideal, and the recent podcast episode on “The Marxists' Exploitation Myth.” The podcast was recorded on May 5, 2025 and posted on May 7, 2025. Listen and subscribe wherever you get your podcasts. Watch archived podcasts here.

lovelustfear
20: lovelustfear | lisa |  that's when everything changed

lovelustfear

Play Episode Listen Later May 8, 2025 47:06


As Lisa rises to fame in the modeling world, her ambition takes her around the globe. What starts as a dream life quickly unravels when she becomes the target of a dangerous sexual predator. Exploited by those in power, she refuses to stay silent, putting herself at risk to uncover the truth and protect others from the same fate. chapters (00:00) listen with caution (00:16) next on lovelustfear (01:44) about lisa (02:40) lisa's story (36:16) questions & answers (44:39) closing thoughts (46:12) charity & organizations (46:42) submit your story (46:53) disclaimer ** This episode contains explicit content, including descriptions of sexual assault, human trafficking, and coerion. Please listen with caution.** quotes "I definitely always had this personality where I like to have a voice." - Lisa "As I became a model in my teens, it was like. The mid nineties, right? So we had all these supermodels and every little girl wanted to be a model." - Lisa I've had certain experiences that I always felt like I could handle." - Lisa "His whole demeanor changed. He was definitely very, very different at this point. I felt like I couldn't leave the room." - Lisa "It just changed everything for me and my trust in men for my body, my trust in myself." - Lisa  "They cannot be silenced anymore. That's where the shift is going to change, because when people, yes, are assaulted, they're speaking out where predators have always relied on the fact that all the victims stay silent." - Lisa topics | #Healing #Transparency #Modeling #Identity #Podcasting #Trauma #Empowerment #Predators #Boundaries #SelfDiscovery #Grooming #Assault #Trust #Relationships #SelfPerception #Mentorship #PowerDynamics #EmotionalImpact #Abuse #ModelingIndustry #SpeakingOut #SurvivorStories #Corruption #PersonalGrowth music | sounds Music (CC BY 4.0): Lost Place Atmospheres 002 by Sascha Ende Very Low Note by Kevin MacLeod (incompetech.com) Other Music and Sound Effects by: Alex Wit, cybercutie, freesound_community, Geoffrey Harvey, Syouki Takahashi, Timothy Kulig, Pixabay, Samuel F. Johanns, AlesiaDavina, and UNIVERSFIELD from Pixabay stay aware | follow | share (lisa) https://www.instagram.com/iamlisaphillips/ https://www.youtube.com/@fromnowonpod https://podcasts.apple.com/us/podcast/from-now-on/id1766405014 https://open.spotify.com/show/1vOhoPrOkwIyCNApzsBlF8 https://www.tiktok.com/@fromnowonpod https://linktr.ee/fromnowonpod National Domestic Violence Hotline (24/7/365) Call 1.800.799.SAFE (7233) Text: START to 88788  https://www.thehotline.org/ https://www.facebook.com/NationalDomesticViolenceHotline https://www.instagram.com/NDVHofficial/ story submission information  If you would like to consider being a guest on lovelustfear or would like your story featured anonymously, please contact us below. submission link | https://lovelustfear.aidaform.com/lovelustfear E-mail | lovelustfearpod@gmail.com Instagram | https://www.instagram.com/lovelustfearpod/ subscription links Amazon Music https://music.amazon.com/podcasts/b06d0ea8-cb29-4c3a-98e6-0249d84df748/lovelustfear Spotify https://open.spotify.com/show/0e3ndcf5u8lZ5lhN1lvWec Apple https://podcasts.apple.com/us/podcast/lovelustfear/id1735876283 RSS feed https://audioboom.com/channels/5125912.rss Want to hear more? Whatever app you're listening on, just rate us and/or leave us a comment or review. Thank you for your support! 

Really Bitch ?!?!
Tribe Meeting_Shannon Sharpe attorney speaks_ Wendy Williams exploited_ Politricks

Really Bitch ?!?!

Play Episode Listen Later May 6, 2025 92:41


The Dan Bongino Show
Which Cabinet Member Was The Biden Admin Spying On? | Episode 34

The Dan Bongino Show

Play Episode Listen Later May 1, 2025 60:00


At the cabinet meeting yesterday, Kash Patel announced a bust of child sex traffickers and RFK claimed that there were major problems in that field through HHS. The fight against child trafficking is on. Also in this episode: the Biden admin kept a dossier on a sitting cabinet member and we're not sure which one. Alone and Exploited, Migrant Children Work Brutal Jobs Across the U.S. ⁠https://www.nytimes.com/2023/02/25/us/unaccompanied-migrant-child-workers-exploitation.html⁠ US, Ukraine sign long-awaited mineral deal two months after Trump, Zelensky White House fight ⁠https://nypost.com/2025/04/30/us-news/us-ukraine-sign-long-awaited-mineral-deal/⁠ Bipartisan Effort To Terminate Trump's Global Tariffs Ends In Defeat ⁠https://dailycaller.com/2025/04/30/bipartisan-effort-to-terminate-trumps-global-tariffs-ends-in-defeat/⁠ Learn more about your ad choices. Visit podcastchoices.com/adchoices

The CyberWire
Lights out, lines down.

The CyberWire

Play Episode Listen Later Apr 28, 2025 30:38


A massive power outage strikes the Iberian Peninsula. Iran says it repelled a “widespread and complex” cyberattack targeting national infrastructure. Researchers find hundreds of SAP NetWeaver systems vulnerable to a critical zero-day. A British retailer tells warehouse workers to stay home following a cyberattack. VeriSource Services discloses a breach exposing personal data of four million individuals. Global automated scanning surged 16.7% in 2024. CISA discloses several critical vulnerabilities affecting Planet Technology's industrial switches and network management products. A Greek court upholds a VPN provider's no-logs policies. Law enforcement dismantles the JokerOTP phishing tool. Our guest is Tim Starks from CyberScoop with developments in the NSO Group trial. How Bad Scans and AI Spread a Scientific Urban Legend. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Special Edition On our ⁠Microsoft for Startups⁠ Spotlight, brought to you by N2K CyberWire and Microsoft, we are shining a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. This episode is part of our exclusive RSAC series where we dive into the real world impact of the Microsoft for Startups Founders Hub.  Along with Microsoft's ⁠Kevin Magee⁠, Dave Bittner talks with an entrepreneur and startup veteran, and founders from three incredible startups who are part of the Founders Hub, each tackling big problems with even bigger ideas.  Dave and Kevin set the stage speaking with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur. Dave and Kevin then speak with three founders: ⁠Matthew Chiodi⁠ of ⁠Cerby⁠, ⁠Travis Howerton⁠ of ⁠RegScale⁠, and ⁠Karl Mattson⁠ of ⁠Endor Labs⁠. So whether you are building your own startup or just love a good innovation story, listen in. For more information, visit the ⁠Microsoft for Startups website⁠. CyberWire Guest We are joined by Tim Starks from CyberScoop who is discussing Judge limits evidence about NSO Group customers, victims in damages trial Selected Reading Nationwide Power Outages in Portugal & Spain Possibly Due to Cyberattack (Cyber Security News) Iran claims it stopped large cyberattack on country's infrastructure (The Record) 400+ SAP NetWeaver Devices Vulnerable to 0-Day Attacks that Exploited in the Wild (Cyber Security News) M&S warehouse workers told not to come to work following cyberattack (The Record) 4 Million Affected by VeriSource Data Breach (SecurityWeek) Researchers Note 16.7% Increase in Automated Scanning Activity (Infosecurity Magazine) Critical Vulnerabilities Found in Planet Technology Industrial Networking Products (SecurityWeek) Court Dismisses Criminal Charges Against VPN Executive, Affirms No-Log Policy (Hackread) JokerOTP Dismantled After 28,000 Phishing Attacks, 2 Arrested (Hackread) A Strange Phrase Keeps Turning Up in Scientific Papers, But Why? (ScienceAlert) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show.  Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Monday, April 28th: Image Steganography; SAP Netweaver Exploited

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Apr 28, 2025 7:55


Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20Payload%20Delivered%20Through%20Steganography/31892 SAP Netweaver Exploited CVE-2025-31324 An arbitrary file upload vulnerability in SAP s Netweaver product is actively exploited to upload webshells. Reliaquest discovered the issue. Reliaquest reports that they saw it being abused to upload the Brute Ratel C2 framework. Users of Netweaver must turn off the developmentserver alias and disable visual composer, and the application was deprecated for about 10 years. SAP has released an emergency update for the issue. https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/ https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/ Any.Run Reports False Positive Uploads Due to false positives caused by MS Defender XDR flagging Adobe Acrobat Cloud links as malicious, many users of Any.Run s free tier uploaded confidential documents to Any.Run. Anyrun blocked these uploads for now but reminded users to be cautious about what documents are being uploaded. https://x.com/anyrun_app/status/1915429758516560190

Business of Tech
Ransomware Hits SMBs Hard, Google OAuth Exploited, Gladinet's Security Flaw, and AI Scraping Issues

Business of Tech

Play Episode Listen Later Apr 22, 2025 15:27


Ransomware attacks targeting small and medium-sized businesses (SMBs) have reached alarming levels, with a recent UK government survey revealing that 1% of organizations reported such incidents, affecting approximately 19,000 entities. This marks a significant increase from the previous year, highlighting a troubling trend where nation-state actors are increasingly focusing on SMBs due to their often inadequate cybersecurity measures. The survey also indicates a decline in board-level cybersecurity responsibility, with only 27% of businesses having a cyber specialist on their board, down from 38% four years ago. As the frequency of ransomware incidents decreases, the cost per incident is rising, emphasizing the need for resilience-focused security measures.In addition to ransomware, a vulnerability in Google's OAuth system has been exploited by phishers to create sophisticated attacks that mimic legitimate emails from Google. This DKIM replay phishing attack allows hackers to bypass security checks, making it difficult for users to detect scams. A notable case involved a developer receiving a fraudulent email that appeared to be a legitimate security alert. This incident underscores the importance of updating security awareness training, as traditional methods may not adequately prepare users for such advanced phishing techniques.Another significant security concern arose from a flaw in Gladinet's Centristack file-sharing platform, which allows remote code execution due to a deserialization issue linked to hard-coded cryptographic keys. This vulnerability has already been exploited in multiple cases, raising alarms within the cybersecurity community. Gladinet has advised customers to upgrade or change their keys to mitigate potential threats. Additionally, Microsoft acknowledged a flaw in its Intune device management tool that inadvertently allowed unauthorized Windows 11 upgrades, prompting organizations to revert affected devices.On a different note, Wikipedia has partnered with Kaggle to create a machine-readable dataset of its content for training AI models, addressing the challenges posed by content scraping. This initiative aims to manage the rising costs associated with non-human traffic while protecting contributors' rights under Creative Commons licensing. Meanwhile, concerns have emerged regarding the impact of AI on human intelligence, with studies indicating that reliance on AI tools may inhibit critical thinking skills, particularly among younger users. As organizations navigate the complexities of AI integration, the need for resilient systems that can adapt to these changes becomes increasingly critical. Four things to know today 00:00 Ransomware Evolves: Targeting Improves, Board Accountability Wanes, and SMBs Face Growing Geopolitical Risk03:32 Secure by Default? Not This Week — Google, Microsoft, and Gladinet Say Otherwise07:32 Wikipedia Feeds the AI Beast—But Wants to on Its Own Terms10:04 AI Overload: How Education, Cognitive Skills, and Enterprise Strategy Are Buckling Under Pressure  Supported by:  https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship https://getflexpoint.com/msp-radio/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech

The Best Damn League Show.
Karmine Corp's Biggest Flaw Will Get Exploited (ft Gilius)

The Best Damn League Show.

Play Episode Listen Later Apr 18, 2025 84:10


Thorin and Peter Dun are joined by Gilius to discuss the biggest flaws of Karmine Corp, thoughts on the League of Legends meta read in the LEC, Myrwn and Carlsen's strong performances, and more!

FriendsLikeUs
Haitian Heritage and Resilience: A Conversation on History and Legacy

FriendsLikeUs

Play Episode Listen Later Apr 16, 2025 68:33


Marina Franklin talks with guest Professor Marlene Daut and Nonye Brown-West. They dive into the incredible history of Haiti with Dr. Marlene Daut on the latest episode of Friends Like Us. Discover the power of education and representation in shaping our narratives.  Nonye Brown-West is a New York-based Nigerian-American comedian and writer. She has been featured in the Boston Globe's Rise column as a Comic to Watch. She has also appeared on Amazon, NPR, PBS, ABC, Sway In The Morning on Sirius XM, and the New York Comedy Festival. Check her schedule on nonyecomedy.com or Instagram to see when she's coming to a city near you. Marlene L. Daut is an author, scholar, editor, and professor. Her books include Tropics of Haiti: Race and the Literary History of the Haitian Revolution in the Atlantic World (Liverpool UP, 2015); Baron de Vastey and the Origins of Black Atlantic Humanism (Palgrave, 2017); Awakening the Ashes: An Intellectual History of the Haitian Revolution (UNC Press, 2023); and The First and Last King of Haiti: The Rise and Fall of Henry Christophe (Knopf, 2025). Her articles on Haitian history and culture have appeared in over a dozen magazines, newspapers, and journals including, The New Yorker (“What's the Path Forward for Haiti?”), The New York Times (“Napoleon Isn't a Hero to Celebrate”), Harper's Bazaar (“Resurecting a Lost Palace of Haiti”), Essence (“Haiti isn't Cursed. It is Exploited”), The Nation (“What the French Really Owe Haiti”), and the LA Review of Books (“Why did Bridgerton Erase Haiti?”). She has won several awards, grants, and fellowships for her contributions to historical and cultural understandings of the Caribbean, notably from the Ford Foundation, the American Council of Learned Societies, the Haitian Studies Association, and the National Endowment for the Humanities. Most recently, she won a grant from the Robert Silvers Foundation for The First and Last King of Haiti. She graduated from Loyola Marymount University with a B.A. in English and French in 2002 and went on to teach in Rouen, France as an Assistante d'Anglais before enrolling at the University of Notre Dame, where she earned a Ph.D. in English in 2009. Since graduating, she has taught Haitian and French colonial history and culture at the University of Miami, the Claremont Graduate University, and the University of Virginia, where she also became series editor of New World Studies at UVA Press. In July 2022, she was appointed as Professor of French and African American Studies at Yale University. Always hosted by Marina Franklin - One Hour Comedy Special: Single Black Female ( Amazon Prime, CW Network), TBS's The Last O.G, Last Week Tonight with John Oliver, Hysterical on FX, The Movie Trainwreck, Louie Season V, The Jim Gaffigan Show, Conan O'Brien, Stephen Colbert, HBO's Crashing, and The Breaks with Michelle Wolf. Writer for HBO's 'Divorce' and the new Tracy Morgan show on Paramount Plus: 'Crutch'.   

The John Batchelor Show
Preview: Colleague Lance Gatling in Tokyo compares MacArthur's remaking of the Japanese economy 1945-1950 with the ambition of the Trump administration to remake the China exploited WTO. More later.

The John Batchelor Show

Play Episode Listen Later Apr 14, 2025 2:12


Preview: Colleague Lance Gatling in Tokyo compares MacArthur's remaking of the Japanese economy 1945-1950 with the ambition of the Trump administration to remake the China exploited WTO. More later. 1925 HONG KONG

Beyond The Horizon
The Epstein Rewind: How Ghislaine Maxwell And Jeffrey Epstein Exploited The Class Divide

Beyond The Horizon

Play Episode Listen Later Apr 12, 2025 27:13


On this morning's edition of the show, we take a look at the headlines from overnight and talk a little bit more about Maxwell and Epstein's propensity to search out the most vulnerable amongst us for their abuse.(commercial at 13:52)To contact me:bobbycapucci@protonmail.comSource:https://www.ft.com/content/0b9d93da-1687-4eb1-bd53-0a84a1b40dff

Cyber Security Today
OpenAI Shuts Down Spammer | New RAT Threatens Windows | WordPress Bug Exploited

Cyber Security Today

Play Episode Listen Later Apr 11, 2025 11:48 Transcription Available


In this episode of Cybersecurity Today, host Jim Love covers the shutdown of a spammer exploiting OpenAI's GPT model, a cybersecurity breach at the US Office of the Comptroller of the Currency, and a new malware operation called 'Operation End Game' targeting major cybercrime networks. He also discusses the emergence of a destructive RAT on GitHub that poses a significant risk to Windows systems, and a critical vulnerability in the WordPress plugin AutoKit that was exploited mere hours after its disclosure. Ensure you stay updated on these evolving threats and the necessary precautions to safeguard your systems. 00:00 Introduction and Headlines 00:25 Spammers Exploit OpenAI's GPT Model 02:14 US Bank Regulator Hacked 04:25 Operation End Game: Tackling Cybercrime 07:06 Neptune RAT: A New Threat to Windows 09:12 WordPress Plugin Vulnerability Exploited 11:25 Conclusion and Contact Information

Crying Out Cloud
Quadruple Supply Chain Attack, IngressNightmare Exploited, and Rumors Abound

Crying Out Cloud

Play Episode Listen Later Apr 9, 2025 28:47


The Epstein Chronicles
The Epstein Rewind: How Ghislaine Maxwell And Jeffrey Epstein Exploited The Class Divide

The Epstein Chronicles

Play Episode Listen Later Apr 8, 2025 27:13


On this morning's edition of the show, we take a look at the headlines from overnight and talk a little bit more about Maxwell and Epstein's propensity to search out the most vulnerable amongst us for their abuse.To contact me:bobbycapucci@protonmail.comSource:https://www.ft.com/content/0b9d93da-1687-4eb1-bd53-0a84a1b40dffBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.

Radio Campus Tours – 99.5 FM
LJDH – Punk and Disordely

Radio Campus Tours – 99.5 FM

Play Episode Listen Later Apr 7, 2025


« UK 82 » c’est le thème de cet épisode, suite à la triomphale venue des EXPLOITED au Bateau Ivre (concert sold out). On démarre avec eux, Cocksparrer et Reich Orgasm. Suivis de Trotskids, PTTB, Angelic Upstarts, Komintern Sect, Vice Squad, GBH, Discharge, Rough, Desechables… « Say to me that punk is dead/ I wish you more contempt/ […] L'article LJDH – Punk and Disordely est apparu en premier sur Radio Campus Tours - 99.5 FM.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday, Apr 4th: URL Frequency Analysis; Ivanti Flaw Exploited; WinRAR MotW Vuln; Tax filing scams; Oracle Breach Update

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Apr 4, 2025 6:16


Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive Using frequency analysis, and training the model with honeypot data as well as log data from legitimate websites allows for a fairly simple and reliable triage of web server logs to identify possible malicious activity. https://isc.sans.edu/diary/Exploring%20Statistical%20Measures%20to%20Predict%20URLs%20as%20Legitimate%20or%20Intrusive%20%5BGuest%20Diary%5D/31822 Critical Unexploitable Ivanti Vulnerability Exploited CVE-2025-22457 In February, Ivanti patched CVE-2025-22457. At the time, the vulnerability was not considered to be exploitable. Mandiant now published a blog disclosing that the vulnerability was exploited as soon as mid-march https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability/ WinRAR MotW Vulnerability CVE-2025-31334 WinRAR patched a vulnerability that would not apply the Mark of the Web correctly if a compressed file included symlinks. This may make it easier to trick a victim into executing code downloaded from a website. https://nvd.nist.gov/vuln/detail/CVE-2025-31334 Microsoft Warns of Tax-Related Scam With the US personal income tax filing deadline only about a week out, Microsoft warns of commonly deployed scams that they are observing related to income tax filings https://www.microsoft.com/en-us/security/blog/2025/04/03/threat-actors-leverage-tax-season-to-deploy-tax-themed-phishing-campaigns/ Oracle Breach Update https://www.bloomberg.com/news/articles/2025-04-02/oracle-tells-clients-of-second-recent-hack-log-in-data-stolen

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday, March 27th: Sitecore Exploited; Blasting Past Webp; Splunk and Firefox Vulnerabilities

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Mar 28, 2025 6:15


Sitecore "thumbnailsaccesstoken" Deserialization Scans (and some new reports) CVE-2025-27218 Our honeypots detected a deserialization attack against the CMS Sitecore using a thumnailaccesstoken header. The underlying vulnerability was patched in January, and security firm Searchlight Cyber revealed details about this vulnerability a couple of weeks ago. https://isc.sans.edu/diary/Sitecore%20%22thumbnailsaccesstoken%22%20Deserialization%20Scans%20%28and%20some%20new%20reports%29%20CVE-2025-27218/31806 Blasting Past Webp Google s Project Zero revealed details how the NSO BLASTPASS exploit took advantage of a Webp image parsing vulnerability in iOS. This zero-click attack was employed in targeted attack back in 2023 and Apple patched the underlying vulnerability in September 2023. But this is the first byte by byte description showing how the attack worked. https://googleprojectzero.blogspot.com/2025/03/blasting-past-webp.html Splunk Vulnerabilities Splunk patched about a dozen of vulnerabilities. None of them are rated critical, but a vulnerability rated High allows authenticated users to execute arbitrary code. https://advisory.splunk.com/ Firefox 0-day Patched Mozilla patched a sandbox escape vulnerability that is already being exploited. https://www.mozilla.org/en-US/security/advisories/mfsa2025-19/

Volunteer Nation
155. Entitled or Exploited? Part 2 Volunteer Responsibilities AND Rights

Volunteer Nation

Play Episode Listen Later Mar 27, 2025 42:45


In this episode of Volunteer Nation, host Tobi Johnson dives deep into the ethical and fair treatment of volunteers. She introduces the Volunteer Bill of Rights, outlining ten essential rights every volunteer should have, from being valued and trained to working in a safe environment. But rights are only part of the equation. Tobi also explores ten key responsibilities volunteers should uphold, such as committing to the organization's mission and respecting boundaries. This insightful conversation highlights the importance of mutual respect and accountability, aiming to build a positive, inclusive, and productive volunteer culture. Don't miss this continuation of Part One, where Tobi tackled volunteer bias, and the complexities of the term entitled volunteer. Full show notes: 155. Entitled or Exploited? Part 2 Volunteer Responsibilities AND Rights Volunteer Bias - Episode Highlights [00:27] - Entitled or Exploited: Volunteer Bias Recap [04:42] - Volunteer Rights and Responsibilities Overview [09:02] - 10 Fundamental Expectations and Protections Volunteers Should Have [17:49] - Additional Rights Related to Staff Interaction [28:45] - Volunteer Responsibilities: A Two-Way Street  Helpful Links VolunteerPro Impact Lab  Volunteer Management Progress Report – The Recruitment Edition Volunteer Nation Episode #154: Entitled or Exploited? Part 1 Volunteer Bias in Organizations Volunteer Nation Episode #101: Tap the Power of Psychological Contracts with Pam Kappelides Volunteer Nation Episode #108: Definition of a Volunteer – Why It Matters to Be Precise Volunteer Nation Episode #129: Paid or Volunteer Role? A Simple Checklist Thanks for listening to this episode of the Volunteer Nation podcast. If you enjoyed it, please be sure to subscribe, rate, and review so we can reach more people like you who want to improve the impact of their good cause. For more tips and notes from the show, check us out at TobiJohnson.com. For any comments or questions, email us at WeCare@VolPro.net.

Economic Update with Richard D. Wolff
How Marx's Class Analysis Could Solve Inequality Now

Economic Update with Richard D. Wolff

Play Episode Listen Later Mar 25, 2025 29:59


In this week's episode of Economic Update, Professor Wolff discusses how Marx's class analysis presents a solution to today's inequality and the challenges to overcoming it we have faced throughout history. In short, since the early existence of human society, people lived in tribes, clans, and villages that exhibited equality of wealth, income, and political power among their members. As modern history began to unfold, slavery, feudalism, and capitalism evolved as society as we know it took shape. In each of those three systems, huge inequalities separated people into masters vs slaves, lords vs serfs, and employers vs employees. Exploited and oppressed slaves, serfs, and employees opposed the inequalities of those systems but were unable to overcome them despite repeated efforts (revolutions). Marx questioned why modern societies failed to install and sustain systems of egalitarian wealth and power distribution (democracy). His answer lay in the understanding that class differences within the organization of production produce inequalities and sustain them. Overcoming those inequalities thus requires ending the class divisions within the organization of production and instead organizing in favor of a worker-cooperative structured method of production.   The d@w Team Economic Update with Richard D. Wolff is a DemocracyatWork.info Inc. production. We make it a point to provide the show free of ads and rely on viewer support to continue doing so. You can support our work by joining our Patreon community: https://www.patreon.com/democracyatwork Or you can go to our website: https://www.democracyatwork.info/donate   Every donation counts and helps us provide a larger audience with the information they need to better understand the events around the world they can't get anywhere else. We want to thank our devoted community of supporters who help make this show and others we produce possible each week.1:01 We kindly ask you to also support the work we do by encouraging others to subscribe to our YouTube channel and website: www.democracyatwork.info

The Jerich Show Podcast
Old MS vuln left open, sperm bank breached, Wordpress sites exploited and more!

The Jerich Show Podcast

Play Episode Listen Later Mar 25, 2025 22:23


In this episode, Erich and Javvad discuss a breach of a sperm bank in California, an 9-year old Microsoft vuln that they feel is too unimportant to patch (although it's being exploited), and a hack of over 2000, Wordpress sites

Western Civ
Episode 447: The New World Exploited

Western Civ

Play Episode Listen Later Mar 21, 2025 23:02


In this episode I cover Spain's colonial efforts between 1492 and 1600, focusing on the broad economic, political, and social trends.Western Civ 2.0

Volunteer Nation
154. Entitled or Exploited? Part 1 - Volunteer Bias in Organizations

Volunteer Nation

Play Episode Listen Later Mar 20, 2025 26:27


In this episode of the Volunteer Nation Podcast, Tobi discusses the concept of volunteer bias in organizations, focusing on the theme, Entitled or Exploited. Using data from the Volunteer Management Progress Report, Tobi highlights issues such as volunteer retention, respect, and organizational challenges. She also delves into the implications of labeling volunteers as 'entitled' and introduces the concept of volunteer exploitation with real-world examples and emphasizes the importance of ethical leadership and boundary setting in volunteer engagement, urging organizations to introspect on their practices.  Full show notes: 154. Entitled or Exploited? Part 1 - Volunteer Bias in Organizations Thanks for listening to this episode of the Volunteer Nation podcast. If you enjoyed it, please be sure to subscribe, rate, and review so we can reach more people like you who want to improve the impact of their good cause. For more tips and notes from the show, check us out at TobiJohnson.com. For any comments or questions, email us at WeCare@VolPro.net.

Cyber Security Today
Cybersecurity Today: Exploited Vulnerabilities and Innovative Threat Mitigations: Wednesday, March 19, 2025

Cyber Security Today

Play Episode Listen Later Mar 19, 2025 8:10 Transcription Available


Cybersecurity Today: Exploited Vulnerabilities and Innovative Threat Mitigations In this episode of Cybersecurity Today, host Jim Love discusses several pressing cybersecurity issues including the exploitation of a server-side request forgery (SSRF) vulnerability in OpenAI's ChatGPT infrastructure (CVE-2024-27564), leading attackers to redirect users to malicious URLs. He also talks about how researchers at Tiny Hack have made breakthroughs in cracking Akira ransomware using high-powered GPUs, and Malwarebytes' warning about malware embedded in free online file converters. The episode highlights the importance of robust cybersecurity measures, innovative methods to combat ransomware, and cautious internet usage. 00:00 Introduction to Cybersecurity Threats 00:19 Exploiting ChatGPT Vulnerabilities 02:15 Cracking Akira Ransomware 05:01 Malware in Free Online Converters 07:12 Conclusion and Listener Support

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast: File Hashes in MSFT BI; Apache Camel Vuln; Juniper Fixes Exploited Vuln; AMI Patches 10.0 Redfish BMC Vuln

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Mar 14, 2025 6:07


File Hashes Analysis with Power BI Guy explains in this diary how to analyze Cowrie honeypot file hashes using Microsoft's BI tool and what you may be able to discover using this tool. https://isc.sans.edu/diary/File%20Hashes%20Analysis%20with%20Power%20BI%20from%20Data%20Stored%20in%20DShield%20SIEM/31764 Apache Camel Vulnerability Apache released two patches for Camel in close succession. Initially, the vulnerability was only addressed for headers, but as Akamai discovered, it can also be exploited via query parameters. This vulnerability is trivial to exploit and leads to arbitrary code execution. https://www.akamai.com/blog/security-research/march-apache-camel-vulnerability-detections-and-mitigations Juniper Patches Junos Vulnerability Juniper patches an already exploited vulnerability in JunOS. However, to exploit the vulnerability, and attacker already needs privileged access. By exploiting the vulnerability, an attacker may completely compromised the device. https://supportportal.juniper.net/s/article/2025-03-Out-of-Cycle-Security-Bulletin-Junos-OS-A-local-attacker-with-shell-access-can-execute-arbitrary-code-CVE-2025-21590?language=en_US AMI Security Advisory AMI patched three vulnerabilities. One of the, an authentication bypass in Redfish, allows for a complete system compromise without authentication and is rated with a CVSS score of 10.0. https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf

Beyond The Horizon
The Epstein Rewind: How Ghislaine Maxwell And Jeffrey Epstein Exploited The Class Divide

Beyond The Horizon

Play Episode Listen Later Mar 14, 2025 27:13


On this morning's edition of the show, we take a look at the headlines from overnight and talk a little bit more about Maxwell and Epstein's propensity to search out the most vulnerable amongst us for their abuse.(commercial at 13:52)To contact me:bobbycapucci@protonmail.comSource:https://www.ft.com/content/0b9d93da-1687-4eb1-bd53-0a84a1b40dff

Movie Trivia Schmoedown
Was Stan Lee Being EXPLOITED?! New documentary claims ex business partners were taking advantage.

Movie Trivia Schmoedown

Play Episode Listen Later Mar 12, 2025 106:34


Stan Lee, the icon, beloved creator of various legends in comic book lore passed away over 6 years ago now. There is a new documentary documenting his final chapter. Inside of that doc, it is alleged that his ex business owners were taking advantage of him. We discuss. Speaking of Marvel, the Daredevil numbers are in and the ratings are...not great. What is happening? Does this spell out worry for Thunderbolts? Are people just over Marvel?  Disney is not allowing press for Snow White currently. This and more as Kristian welcomes back Brett! #stanlee #documentary #netflix #marvel #mcu #snowwhite #rachelzegler #movies  OUR SPONSORS: TRADE COFFEE: Trade is exclusively offering our listeners 40% off your first order at https://www.drinktrade.com/KRISTIAN FACTOR: Eat smart with Factor. Get started at https://www.FACTORMEALS.com/factorpod... and use code FACTORPODCAST to get 50% off your first box plus free shipping. That's code FACTORPODCAST at https://www.FACTORMEALS.com/factorpod... to get 50% off plus free shipping on your first box. ROBINHOOD: Investing involves risk. Rate subject to change. 3% match requires Robinhood Gold at $5/mo for 1 yr from first match, must keep funds in IRA for 5 years. Go to https://www.robinhood.com/boost.  

The Epstein Chronicles
The Epstein Rewind: How Ghislaine Maxwell And Jeffrey Epstein Exploited The Class Divide

The Epstein Chronicles

Play Episode Listen Later Mar 11, 2025 27:13


On this morning's edition of the show, we take a look at the headlines from overnight and talk a little bit more about Maxwell and Epstein's propensity to search out the most vulnerable amongst us for their abuse.(commercial at 13:52)To contact me:bobbycapucci@protonmail.comSource:https://www.ft.com/content/0b9d93da-1687-4eb1-bd53-0a84a1b40dffBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.

Storm⚡️Watch by GreyNoise Intelligence
Cybersecurity Chaos: CISA Controversy, Telecom Hacks, and Exploited Vulnerabilities

Storm⚡️Watch by GreyNoise Intelligence

Play Episode Listen Later Mar 11, 2025 62:30


Forecast: Cloudy with a chance of compromised credentials and scattered vulnerabilities—stay alert out there! ‍ In this episode of Storm⚡️Watch, we're unpacking some of the most pressing developments in cybersecurity and what they mean for the industry. First, we tackle the state of CISA and its mounting challenges. From allegations that the Trump administration ordered U.S. Cyber Command and CISA to stand down on addressing Russian cyber threats, to financial groups pushing back against CISA's proposed incident reporting rule, there's no shortage of turbulence. Adding fuel to the fire, Homeland Security Secretary Kristi Noem has disbanded eight federal advisory committees, including key cybersecurity groups, citing compliance with a Trump-era executive order. Critics argue these cuts could weaken public-private collaboration and hinder CISA's ability to protect critical infrastructure. We'll break down what all this means for the future of cybersecurity leadership in the U.S. Next, we revisit a shocking case involving a U.S. soldier who plans to plead guilty to hacking 15 telecom carriers. This story highlights the ongoing risks posed by insider threats and the vulnerabilities within telecom networks, which are often targeted for their treasure troves of sensitive data. We'll explore how this case unfolded, what it reveals about vetting processes for individuals with access to critical systems, and the broader implications for cybersecurity in government-affiliated organizations. We also spotlight some fascinating research from Censys on a phishing scam exploiting toll systems across multiple states. Attackers are leveraging cheap foreign SIM cards and Chinese-hosted infrastructure in a campaign that keeps evolving. Plus, RunZero sheds light on a critical vulnerability affecting Edimax IP cameras (CVE-2025-1316), while GreyNoise reports on mass exploitation of a PHP-CGI vulnerability (CVE-2024-4577) and active threats linked to Silk Typhoon-associated CVEs. Storm Watch Homepage >> Learn more about GreyNoise >>  

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Friday Feb 28th: Njrat devtunnels.ms; Apple FindMe Abuse; XSS Exploited; @sans_edu Ben Powell EDR vs. Ransomware

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Feb 28, 2025 14:27


Njrat Compaign Using Microsoft dev Tunnels: A recent version of the Njrat remote admin tool is taking advantage of Microsoft's developer tunnels (devtunnels.ms) as a command and control channel. https://isc.sans.edu/diary/Njrat%20Campaign%20Using%20Microsoft%20Dev%20Tunnels/31724 NrootTag Apple FindMy Abuse Malware could use a weakness in the keys used for Apple FindMy to abuse it to track victims. Updates were released with iOS 18.2, but to solve the issue the vast majority of Apple users must update. https://nroottag.github.io/ 360XSS: Mass Website Exploitation via Virtual Tour Framework The Krpano VR library which is often used to implement 3D virtual tours on real estate websites, is currently being abused to inject spam messages. The XSS vulnerabilty could allow attackers to inject even more malicious JavaScript. https://olegzay.com/360xss/ SANS.edu Research: Proof is in the Pudding: EDR Configuration Versus Ransomware. Benjamin Powell https://www.sans.edu/cyber-research/proof-pudding-edr-configuration-versus-ransomware/

The John Batchelor Show
Preview: John Bolton comments that, before or during talks, a ceasefire and call for peacekeeping can be exploited on the battlefield. More

The John Batchelor Show

Play Episode Listen Later Feb 25, 2025 1:05


Preview: John Bolton comments that, before or during talks, a ceasefire and call for peacekeeping can be exploited on the battlefield. More 1921 Armenia

Cult of Hockey podcast
The Cult of Hockey's "Weaknesses on Oilers exploited by Caps" podcast

Cult of Hockey podcast

Play Episode Listen Later Feb 23, 2025 41:36


Let's do this! The Cult of Hockey podcast. By the Faithful and for the Faithful. Today Bruce McCurdy and David Staples dig into the Oilers of Edmonton's 7-3 loss to the Capitals of Washington.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS ISC Stormcast, Jan 29th 2025: Python Crypto Stealer; SimpleHelp Exploited; Apple Silicon Vuln; Teamviewer Vuln; Odd QR Code

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jan 29, 2025 6:07


Learn about fileless crypto stealers written in Python, the ongoing exploitation of recent SimpleHelp vulnerablities, new Apple Silicon Sidechannel attacks a Team Viewer Vulnerablity and an odd QR Code Fileless Python InfoStealer Targeting Exodus This Python script targets Exodus crypto wallet and password managers to steal crypto currencies. It does not save exfiltrated data in files, but keeps it in memory for exfiltration https://isc.sans.edu/diary/Fileless%20Python%20InfoStealer%20Targeting%20Exodus/31630 Campaign Exploiting SimpleHelp Vulnerablity Arcticwolf observed attacks exploiting SimpleHelp for initial access to networks. It has not been verified, but is assumed that vulnerabilities made public about a week ago are being exploited. https://arcticwolf.com/resources/blog-uk/arctic-wolf-observes-campaign-exploiting-simplehelp-rmm-software-initial-access/ Two new Side Channel Vulnerabilities in Apple Silicon SLAP (Data Speculation Attacks via Load Address Prediction): This attack exploits the Load Address Predictor in Apple CPUs starting with the M2/A15, allowing unauthorized access to sensitive data by mispredicting memory addresses. FLOP (Breaking the Apple M3 CPU via False Load Output Predictions): This attack targets the Load Value Predictor in Apple's M3/A17 CPUs, enabling attackers to execute arbitrary computations on incorrect data, potentially leaking sensitive information. https://predictors.fail/ Teamviewer Security Bulletin Teamviewer patched a privilege escalation vulnerability CVE-2025-0065 https://www.teamviewer.com/en-us/resources/trust-center/security-bulletins/tv-2025-1001/ Odd QR Code A QR code may resolve to a different URL if looked at at an angle. https://mstdn.social/@isziaui/113874436953157913 Limited Discount for SANS Baltimore https://sans.org/u/1zQd

The Catholic Current
Good News for Pro-Lifers? (Shawn Carney) 1/28/25

The Catholic Current

Play Episode Listen Later Jan 28, 2025 52:53


We welcome back Shawn Carney of 40 Days for Life to take the temperature of the Pro-Life movement with the change in the American administration. Where does he think we should go next, and how likely is that to occur? Father finishes with Timely Thoughts.   Show Notes 40 Days for Life 40 Days for Life | Linktree 40 Days for Life | Search Your Location Day 41 Magazine To the Heart of the Matter: The 40-Day Companion to Live a Culture of Life What to Say When: The Complete New Guide to Discussing Abortion What to Say When 2: Your Proven Guide in the New Abortion Landscape - How to Discuss, Clarify, and Question Abortion in a Hostile Culture | Shawn Carney Buy Both Books with Special Pricing Defund Planned Parenthood | 40 Days for Life President Donald Trump Signs Pardons for 23 Pro-Life Americans - LifeNews.com Vance Condemns Abortion at March for Life: “We Need More Babies in America” - LifeNews.com Here's 9 Pro-Life Actions President Trump Took During His First Week - LifeNews.com Human Fertility and Current Controversies (Fr. Tadeusz Pacholczyk) 4/22/24 A Fresh Look at IVF (Sister Renée Mirkes) 8/7/24 LIME 5: Exploited by Choice - Mark Crutcher Abortion Was the Leading Cause of Death Worldwide in 2024, Killing 73 Million People - LifeNews.com California Drops Prosecution Against Sandra Merritt, Who Exposed Planned Parenthood Aborted Baby Part Sales - LifeNews.com iCatholic Mobile The Station of the Cross Merchandise - Use Coupon Code 14STATIONS for 10% off | Catholic to the Max Read Fr. McTeigue's Written Works! "Let's Take A Closer Look" with Fr. Robert McTeigue, S.J. | Full Series Playlist Listen to Fr. McTeigue's Preaching! | Herald of the Gospel Sermons Podcast on Spotify Visit Fr. McTeigue's Website | Herald of the Gospel Questions? Comments? Feedback? Ask Father!

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS ISC Stormcast, Jan 24, 2025: XSS in Email, SonicWall Exploited; Cisco Vulnerablities; AI and SOAR (@sans_edu research paper by Anthony Russo)

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jan 24, 2025 14:45


In today's episode, learn how an attacker attempted to exploit webmail XSS vulnerablities against us. Sonicwall released a critical patch fixing an already exploited vulnerability in its SMA 1000 appliance. Cisco fixed vulnerabilities in ClamAV and its Meeting Manager REST API. Learn from SANS.edu student Anthony Russo how to take advantage of AI for SOAR. XSS Attempts via E-Mail https://isc.sans.edu/diary/XSS%20Attempts%20via%20E-Mail/31620 An analysis of a recent surge in email-based XSS attack attempts targeting users and organizations. Learn the implications and mitigation techniques. SonicWall PSIRT Advisory: CVE-2025-23006 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002 CVE-2025-23006 Details of a critical vulnerability in SonicWall appliances (SNWLID-2025-0002) and what you need to do to secure your systems. Cisco ClamAV Advisory: OLE2 Parsing Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA A DoS vulnerability in the popular open source anti virus engine ClamAV Cisco CMM Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-privesc-uy2Vf8pc A patch of a privilege escalation flaw in Cisco s CMM module.

The John Batchelor Show
PREVIEW - WTO Colleague Alan Tonelson analyzes how the PRC exploited WTO rules and what the Trump Administration did about the cheating and theft. More details tonight.

The John Batchelor Show

Play Episode Listen Later Jan 9, 2025 1:54


PREVIEW - WTO Colleague Alan Tonelson analyzes how the PRC exploited WTO rules and what the Trump Administration did about the cheating and theft. More details tonight. 1877 Singapore River

Past Gas by Donut Media
How The Dodge Bros Exploited Henry Ford - Past Gas #269

Past Gas by Donut Media

Play Episode Listen Later Dec 30, 2024 48:20


Thanks to Hankook for sponsoring today's video! Click here http://bit.ly/DynaproTires to learn more about Dynapro tires! This episode is sponsored by/brought to you by BetterHelp. Give online therapy a try at betterhelp.com/PASTGAS and get on your way to being your best self. Join us this week as we dive into the history of Dodge, Part I. John and Horace Dodge started out making bikes in Canada, and now, more than 100 years later their name is associated with one of the biggest car companies in the world. This might have never happened if they didn't get Henry Ford to unwillingly bankroll the operation. But how did they do it? More about Show: Follow Nolan on IG and Twitter @nolanjsykes.   Follow Joe on IG and Twitter @joegweber. Follow Donut @donutmedia, and subscribe to our Youtube and Facebook channels!   Don't forget to subscribe to the podcast for free wherever you're listening or using this link: http://bit.ly/PastGas. If you like the show, telling a friend about it would be helpful! You can text, email, Tweet, or send this link to a friend: http://bit.ly/PastGas. Learn more about your ad choices. Visit podcastchoices.com/adchoices