POPULARITY
Categories
The latest with Diddy! Blake Lively vs journalists! Chris Brown to stay locked up in the UK, but why? Joe Biden is very sick, and something about this feels fishy. Morgan Wallen has us divided! See omnystudio.com/listener for privacy information.
Do not forget to follow us and make our community grow
Thabo Shole Mashao in for Clement Manyathela and the listeners discuss whether townships are being exploited for aesthetics without the necessary investment. The Clement Manyathela Show is broadcast on 702, a Johannesburg based talk radio station, weekdays from 09:00 to 12:00 (SA Time). Clement Manyathela starts his show each weekday on 702 at 9 am taking your calls and voice notes on his Open Line. In the second hour of his show, he unpacks, explains, and makes sense of the news of the day. Clement has several features in his third hour from 11 am that provide you with information to help and guide you through your daily life. As your morning friend, he tackles the serious as well as the light-hearted, on your behalf. Thank you for listening to a podcast from The Clement Manyathela Show. Listen live on Primedia+ weekdays from 09:00 and 12:00 (SA Time) to The Clement Manyathela Show broadcast on 702 https://buff.ly/gk3y0Kj For more from the show go to https://buff.ly/XijPLtJ or find all the catch-up podcasts here https://buff.ly/p0gWuPE Subscribe to the 702 Daily and Weekly Newsletters https://buff.ly/v5mfetc Follow us on social media: 702 on Facebook https://www.facebook.com/TalkRadio702 702 on TikTok https://www.tiktok.com/@talkradio702 702 on Instagram: https://www.instagram.com/talkradio702/ 702 on X: https://x.com/Radio702 702 on YouTube: https://www.youtube.com/@radio702 See omnystudio.com/listener for privacy information.
https://youtu.be/0R_RjyOJeI4 Podcast audio: In this episode of The Ayn Rand Institute Podcast, Ben Bayer, Robertas Bakula, and Tristan de Liège explore how the mixed economy enables the unjust exploitation of society's most productive individuals. Among the topics covered: Why, contrary to Marxist claims, businesspeople are the most exploited group in a mixed economy; How antitrust laws enable the government and less successful companies to exploit successful companies; How tariffs drive the material and spiritual exploitation of producers; How farm subsidies reward stagnation at the taxpayers' expense; How Atlas Shrugged dramatizes the exploitation of producers. Recommended in this podcast are Ayn Rand's books Atlas Shrugged and Capitalism: The Unknown Ideal, and the recent podcast episode on “The Marxists' Exploitation Myth.” The podcast was recorded on May 5, 2025 and posted on May 7, 2025. Listen and subscribe wherever you get your podcasts. Watch archived podcasts here.
Sponsor by SEC Playground
At the cabinet meeting yesterday, Kash Patel announced a bust of child sex traffickers and RFK claimed that there were major problems in that field through HHS. The fight against child trafficking is on. Also in this episode: the Biden admin kept a dossier on a sitting cabinet member and we're not sure which one. Alone and Exploited, Migrant Children Work Brutal Jobs Across the U.S. https://www.nytimes.com/2023/02/25/us/unaccompanied-migrant-child-workers-exploitation.html US, Ukraine sign long-awaited mineral deal two months after Trump, Zelensky White House fight https://nypost.com/2025/04/30/us-news/us-ukraine-sign-long-awaited-mineral-deal/ Bipartisan Effort To Terminate Trump's Global Tariffs Ends In Defeat https://dailycaller.com/2025/04/30/bipartisan-effort-to-terminate-trumps-global-tariffs-ends-in-defeat/ Learn more about your ad choices. Visit podcastchoices.com/adchoices
A massive power outage strikes the Iberian Peninsula. Iran says it repelled a “widespread and complex” cyberattack targeting national infrastructure. Researchers find hundreds of SAP NetWeaver systems vulnerable to a critical zero-day. A British retailer tells warehouse workers to stay home following a cyberattack. VeriSource Services discloses a breach exposing personal data of four million individuals. Global automated scanning surged 16.7% in 2024. CISA discloses several critical vulnerabilities affecting Planet Technology's industrial switches and network management products. A Greek court upholds a VPN provider's no-logs policies. Law enforcement dismantles the JokerOTP phishing tool. Our guest is Tim Starks from CyberScoop with developments in the NSO Group trial. How Bad Scans and AI Spread a Scientific Urban Legend. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Special Edition On our Microsoft for Startups Spotlight, brought to you by N2K CyberWire and Microsoft, we are shining a light on innovation, ambition, and the tech trailblazers building the future right from the startup trenches. This episode is part of our exclusive RSAC series where we dive into the real world impact of the Microsoft for Startups Founders Hub. Along with Microsoft's Kevin Magee, Dave Bittner talks with an entrepreneur and startup veteran, and founders from three incredible startups who are part of the Founders Hub, each tackling big problems with even bigger ideas. Dave and Kevin set the stage speaking with startup veteran and Cygenta co-founder FC about making the leap from hacker to entrepreneur. Dave and Kevin then speak with three founders: Matthew Chiodi of Cerby, Travis Howerton of RegScale, and Karl Mattson of Endor Labs. So whether you are building your own startup or just love a good innovation story, listen in. For more information, visit the Microsoft for Startups website. CyberWire Guest We are joined by Tim Starks from CyberScoop who is discussing Judge limits evidence about NSO Group customers, victims in damages trial Selected Reading Nationwide Power Outages in Portugal & Spain Possibly Due to Cyberattack (Cyber Security News) Iran claims it stopped large cyberattack on country's infrastructure (The Record) 400+ SAP NetWeaver Devices Vulnerable to 0-Day Attacks that Exploited in the Wild (Cyber Security News) M&S warehouse workers told not to come to work following cyberattack (The Record) 4 Million Affected by VeriSource Data Breach (SecurityWeek) Researchers Note 16.7% Increase in Automated Scanning Activity (Infosecurity Magazine) Critical Vulnerabilities Found in Planet Technology Industrial Networking Products (SecurityWeek) Court Dismisses Criminal Charges Against VPN Executive, Affirms No-Log Policy (Hackread) JokerOTP Dismantled After 28,000 Phishing Attacks, 2 Arrested (Hackread) A Strange Phrase Keeps Turning Up in Scientific Papers, But Why? (ScienceAlert) Share your feedback. We want to ensure that you are getting the most out of the podcast. Please take a few minutes to share your thoughts with us by completing our brief listener survey as we continually work to improve the show. Want to hear your company in the show? You too can reach the most influential leaders and operators in the industry. Here's our media kit. Contact us at cyberwire@n2k.com to request more info. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Example of a Payload Delivered Through Steganography Xavier and Didier published two diaries this weekend, building on each other. First, Xavier showed an example of an image being used to smuggle an executable past network defenses, and second, Didier showed how to use his tools to extract the binary. https://isc.sans.edu/diary/Example%20of%20a%20Payload%20Delivered%20Through%20Steganography/31892 SAP Netweaver Exploited CVE-2025-31324 An arbitrary file upload vulnerability in SAP s Netweaver product is actively exploited to upload webshells. Reliaquest discovered the issue. Reliaquest reports that they saw it being abused to upload the Brute Ratel C2 framework. Users of Netweaver must turn off the developmentserver alias and disable visual composer, and the application was deprecated for about 10 years. SAP has released an emergency update for the issue. https://reliaquest.com/blog/threat-spotlight-reliaquest-uncovers-vulnerability-behind-sap-netweaver-compromise/ https://onapsis.com/blog/active-exploitation-of-sap-vulnerability-cve-2025-31324/ Any.Run Reports False Positive Uploads Due to false positives caused by MS Defender XDR flagging Adobe Acrobat Cloud links as malicious, many users of Any.Run s free tier uploaded confidential documents to Any.Run. Anyrun blocked these uploads for now but reminded users to be cautious about what documents are being uploaded. https://x.com/anyrun_app/status/1915429758516560190
Ransomware attacks targeting small and medium-sized businesses (SMBs) have reached alarming levels, with a recent UK government survey revealing that 1% of organizations reported such incidents, affecting approximately 19,000 entities. This marks a significant increase from the previous year, highlighting a troubling trend where nation-state actors are increasingly focusing on SMBs due to their often inadequate cybersecurity measures. The survey also indicates a decline in board-level cybersecurity responsibility, with only 27% of businesses having a cyber specialist on their board, down from 38% four years ago. As the frequency of ransomware incidents decreases, the cost per incident is rising, emphasizing the need for resilience-focused security measures.In addition to ransomware, a vulnerability in Google's OAuth system has been exploited by phishers to create sophisticated attacks that mimic legitimate emails from Google. This DKIM replay phishing attack allows hackers to bypass security checks, making it difficult for users to detect scams. A notable case involved a developer receiving a fraudulent email that appeared to be a legitimate security alert. This incident underscores the importance of updating security awareness training, as traditional methods may not adequately prepare users for such advanced phishing techniques.Another significant security concern arose from a flaw in Gladinet's Centristack file-sharing platform, which allows remote code execution due to a deserialization issue linked to hard-coded cryptographic keys. This vulnerability has already been exploited in multiple cases, raising alarms within the cybersecurity community. Gladinet has advised customers to upgrade or change their keys to mitigate potential threats. Additionally, Microsoft acknowledged a flaw in its Intune device management tool that inadvertently allowed unauthorized Windows 11 upgrades, prompting organizations to revert affected devices.On a different note, Wikipedia has partnered with Kaggle to create a machine-readable dataset of its content for training AI models, addressing the challenges posed by content scraping. This initiative aims to manage the rising costs associated with non-human traffic while protecting contributors' rights under Creative Commons licensing. Meanwhile, concerns have emerged regarding the impact of AI on human intelligence, with studies indicating that reliance on AI tools may inhibit critical thinking skills, particularly among younger users. As organizations navigate the complexities of AI integration, the need for resilient systems that can adapt to these changes becomes increasingly critical. Four things to know today 00:00 Ransomware Evolves: Targeting Improves, Board Accountability Wanes, and SMBs Face Growing Geopolitical Risk03:32 Secure by Default? Not This Week — Google, Microsoft, and Gladinet Say Otherwise07:32 Wikipedia Feeds the AI Beast—But Wants to on Its Own Terms10:04 AI Overload: How Education, Cognitive Skills, and Enterprise Strategy Are Buckling Under Pressure Supported by: https://cometbackup.com/?utm_source=mspradio&utm_medium=podcast&utm_campaign=sponsorship https://getflexpoint.com/msp-radio/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Thorin and Peter Dun are joined by Gilius to discuss the biggest flaws of Karmine Corp, thoughts on the League of Legends meta read in the LEC, Myrwn and Carlsen's strong performances, and more!
Marina Franklin talks with guest Professor Marlene Daut and Nonye Brown-West. They dive into the incredible history of Haiti with Dr. Marlene Daut on the latest episode of Friends Like Us. Discover the power of education and representation in shaping our narratives. Nonye Brown-West is a New York-based Nigerian-American comedian and writer. She has been featured in the Boston Globe's Rise column as a Comic to Watch. She has also appeared on Amazon, NPR, PBS, ABC, Sway In The Morning on Sirius XM, and the New York Comedy Festival. Check her schedule on nonyecomedy.com or Instagram to see when she's coming to a city near you. Marlene L. Daut is an author, scholar, editor, and professor. Her books include Tropics of Haiti: Race and the Literary History of the Haitian Revolution in the Atlantic World (Liverpool UP, 2015); Baron de Vastey and the Origins of Black Atlantic Humanism (Palgrave, 2017); Awakening the Ashes: An Intellectual History of the Haitian Revolution (UNC Press, 2023); and The First and Last King of Haiti: The Rise and Fall of Henry Christophe (Knopf, 2025). Her articles on Haitian history and culture have appeared in over a dozen magazines, newspapers, and journals including, The New Yorker (“What's the Path Forward for Haiti?”), The New York Times (“Napoleon Isn't a Hero to Celebrate”), Harper's Bazaar (“Resurecting a Lost Palace of Haiti”), Essence (“Haiti isn't Cursed. It is Exploited”), The Nation (“What the French Really Owe Haiti”), and the LA Review of Books (“Why did Bridgerton Erase Haiti?”). She has won several awards, grants, and fellowships for her contributions to historical and cultural understandings of the Caribbean, notably from the Ford Foundation, the American Council of Learned Societies, the Haitian Studies Association, and the National Endowment for the Humanities. Most recently, she won a grant from the Robert Silvers Foundation for The First and Last King of Haiti. She graduated from Loyola Marymount University with a B.A. in English and French in 2002 and went on to teach in Rouen, France as an Assistante d'Anglais before enrolling at the University of Notre Dame, where she earned a Ph.D. in English in 2009. Since graduating, she has taught Haitian and French colonial history and culture at the University of Miami, the Claremont Graduate University, and the University of Virginia, where she also became series editor of New World Studies at UVA Press. In July 2022, she was appointed as Professor of French and African American Studies at Yale University. Always hosted by Marina Franklin - One Hour Comedy Special: Single Black Female ( Amazon Prime, CW Network), TBS's The Last O.G, Last Week Tonight with John Oliver, Hysterical on FX, The Movie Trainwreck, Louie Season V, The Jim Gaffigan Show, Conan O'Brien, Stephen Colbert, HBO's Crashing, and The Breaks with Michelle Wolf. Writer for HBO's 'Divorce' and the new Tracy Morgan show on Paramount Plus: 'Crutch'.
Preview: Colleague Lance Gatling in Tokyo compares MacArthur's remaking of the Japanese economy 1945-1950 with the ambition of the Trump administration to remake the China exploited WTO. More later. 1925 HONG KONG
On this morning's edition of the show, we take a look at the headlines from overnight and talk a little bit more about Maxwell and Epstein's propensity to search out the most vulnerable amongst us for their abuse.(commercial at 13:52)To contact me:bobbycapucci@protonmail.comSource:https://www.ft.com/content/0b9d93da-1687-4eb1-bd53-0a84a1b40dff
In this episode of Cybersecurity Today, host Jim Love covers the shutdown of a spammer exploiting OpenAI's GPT model, a cybersecurity breach at the US Office of the Comptroller of the Currency, and a new malware operation called 'Operation End Game' targeting major cybercrime networks. He also discusses the emergence of a destructive RAT on GitHub that poses a significant risk to Windows systems, and a critical vulnerability in the WordPress plugin AutoKit that was exploited mere hours after its disclosure. Ensure you stay updated on these evolving threats and the necessary precautions to safeguard your systems. 00:00 Introduction and Headlines 00:25 Spammers Exploit OpenAI's GPT Model 02:14 US Bank Regulator Hacked 04:25 Operation End Game: Tackling Cybercrime 07:06 Neptune RAT: A New Threat to Windows 09:12 WordPress Plugin Vulnerability Exploited 11:25 Conclusion and Contact Information
On this morning's edition of the show, we take a look at the headlines from overnight and talk a little bit more about Maxwell and Epstein's propensity to search out the most vulnerable amongst us for their abuse.To contact me:bobbycapucci@protonmail.comSource:https://www.ft.com/content/0b9d93da-1687-4eb1-bd53-0a84a1b40dffBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.
« UK 82 » c’est le thème de cet épisode, suite à la triomphale venue des EXPLOITED au Bateau Ivre (concert sold out). On démarre avec eux, Cocksparrer et Reich Orgasm. Suivis de Trotskids, PTTB, Angelic Upstarts, Komintern Sect, Vice Squad, GBH, Discharge, Rough, Desechables… « Say to me that punk is dead/ I wish you more contempt/ […] L'article LJDH – Punk and Disordely est apparu en premier sur Radio Campus Tours - 99.5 FM.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Exploring Statistical Measures to Predict URLs as Legitimate or Intrusive Using frequency analysis, and training the model with honeypot data as well as log data from legitimate websites allows for a fairly simple and reliable triage of web server logs to identify possible malicious activity. https://isc.sans.edu/diary/Exploring%20Statistical%20Measures%20to%20Predict%20URLs%20as%20Legitimate%20or%20Intrusive%20%5BGuest%20Diary%5D/31822 Critical Unexploitable Ivanti Vulnerability Exploited CVE-2025-22457 In February, Ivanti patched CVE-2025-22457. At the time, the vulnerability was not considered to be exploitable. Mandiant now published a blog disclosing that the vulnerability was exploited as soon as mid-march https://cloud.google.com/blog/topics/threat-intelligence/china-nexus-exploiting-critical-ivanti-vulnerability/ WinRAR MotW Vulnerability CVE-2025-31334 WinRAR patched a vulnerability that would not apply the Mark of the Web correctly if a compressed file included symlinks. This may make it easier to trick a victim into executing code downloaded from a website. https://nvd.nist.gov/vuln/detail/CVE-2025-31334 Microsoft Warns of Tax-Related Scam With the US personal income tax filing deadline only about a week out, Microsoft warns of commonly deployed scams that they are observing related to income tax filings https://www.microsoft.com/en-us/security/blog/2025/04/03/threat-actors-leverage-tax-season-to-deploy-tax-themed-phishing-campaigns/ Oracle Breach Update https://www.bloomberg.com/news/articles/2025-04-02/oracle-tells-clients-of-second-recent-hack-log-in-data-stolen
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Sitecore "thumbnailsaccesstoken" Deserialization Scans (and some new reports) CVE-2025-27218 Our honeypots detected a deserialization attack against the CMS Sitecore using a thumnailaccesstoken header. The underlying vulnerability was patched in January, and security firm Searchlight Cyber revealed details about this vulnerability a couple of weeks ago. https://isc.sans.edu/diary/Sitecore%20%22thumbnailsaccesstoken%22%20Deserialization%20Scans%20%28and%20some%20new%20reports%29%20CVE-2025-27218/31806 Blasting Past Webp Google s Project Zero revealed details how the NSO BLASTPASS exploit took advantage of a Webp image parsing vulnerability in iOS. This zero-click attack was employed in targeted attack back in 2023 and Apple patched the underlying vulnerability in September 2023. But this is the first byte by byte description showing how the attack worked. https://googleprojectzero.blogspot.com/2025/03/blasting-past-webp.html Splunk Vulnerabilities Splunk patched about a dozen of vulnerabilities. None of them are rated critical, but a vulnerability rated High allows authenticated users to execute arbitrary code. https://advisory.splunk.com/ Firefox 0-day Patched Mozilla patched a sandbox escape vulnerability that is already being exploited. https://www.mozilla.org/en-US/security/advisories/mfsa2025-19/
In this episode of Volunteer Nation, host Tobi Johnson dives deep into the ethical and fair treatment of volunteers. She introduces the Volunteer Bill of Rights, outlining ten essential rights every volunteer should have, from being valued and trained to working in a safe environment. But rights are only part of the equation. Tobi also explores ten key responsibilities volunteers should uphold, such as committing to the organization's mission and respecting boundaries. This insightful conversation highlights the importance of mutual respect and accountability, aiming to build a positive, inclusive, and productive volunteer culture. Don't miss this continuation of Part One, where Tobi tackled volunteer bias, and the complexities of the term entitled volunteer. Full show notes: 155. Entitled or Exploited? Part 2 Volunteer Responsibilities AND Rights Volunteer Bias - Episode Highlights [00:27] - Entitled or Exploited: Volunteer Bias Recap [04:42] - Volunteer Rights and Responsibilities Overview [09:02] - 10 Fundamental Expectations and Protections Volunteers Should Have [17:49] - Additional Rights Related to Staff Interaction [28:45] - Volunteer Responsibilities: A Two-Way Street Helpful Links VolunteerPro Impact Lab Volunteer Management Progress Report – The Recruitment Edition Volunteer Nation Episode #154: Entitled or Exploited? Part 1 Volunteer Bias in Organizations Volunteer Nation Episode #101: Tap the Power of Psychological Contracts with Pam Kappelides Volunteer Nation Episode #108: Definition of a Volunteer – Why It Matters to Be Precise Volunteer Nation Episode #129: Paid or Volunteer Role? A Simple Checklist Thanks for listening to this episode of the Volunteer Nation podcast. If you enjoyed it, please be sure to subscribe, rate, and review so we can reach more people like you who want to improve the impact of their good cause. For more tips and notes from the show, check us out at TobiJohnson.com. For any comments or questions, email us at WeCare@VolPro.net.
In this week's episode of Economic Update, Professor Wolff discusses how Marx's class analysis presents a solution to today's inequality and the challenges to overcoming it we have faced throughout history. In short, since the early existence of human society, people lived in tribes, clans, and villages that exhibited equality of wealth, income, and political power among their members. As modern history began to unfold, slavery, feudalism, and capitalism evolved as society as we know it took shape. In each of those three systems, huge inequalities separated people into masters vs slaves, lords vs serfs, and employers vs employees. Exploited and oppressed slaves, serfs, and employees opposed the inequalities of those systems but were unable to overcome them despite repeated efforts (revolutions). Marx questioned why modern societies failed to install and sustain systems of egalitarian wealth and power distribution (democracy). His answer lay in the understanding that class differences within the organization of production produce inequalities and sustain them. Overcoming those inequalities thus requires ending the class divisions within the organization of production and instead organizing in favor of a worker-cooperative structured method of production. The d@w Team Economic Update with Richard D. Wolff is a DemocracyatWork.info Inc. production. We make it a point to provide the show free of ads and rely on viewer support to continue doing so. You can support our work by joining our Patreon community: https://www.patreon.com/democracyatwork Or you can go to our website: https://www.democracyatwork.info/donate Every donation counts and helps us provide a larger audience with the information they need to better understand the events around the world they can't get anywhere else. We want to thank our devoted community of supporters who help make this show and others we produce possible each week.1:01 We kindly ask you to also support the work we do by encouraging others to subscribe to our YouTube channel and website: www.democracyatwork.info
In this episode, Erich and Javvad discuss a breach of a sperm bank in California, an 9-year old Microsoft vuln that they feel is too unimportant to patch (although it's being exploited), and a hack of over 2000, Wordpress sites
In this episode I cover Spain's colonial efforts between 1492 and 1600, focusing on the broad economic, political, and social trends.Western Civ 2.0
In this episode of the Volunteer Nation Podcast, Tobi discusses the concept of volunteer bias in organizations, focusing on the theme, Entitled or Exploited. Using data from the Volunteer Management Progress Report, Tobi highlights issues such as volunteer retention, respect, and organizational challenges. She also delves into the implications of labeling volunteers as 'entitled' and introduces the concept of volunteer exploitation with real-world examples and emphasizes the importance of ethical leadership and boundary setting in volunteer engagement, urging organizations to introspect on their practices. Full show notes: 154. Entitled or Exploited? Part 1 - Volunteer Bias in Organizations Thanks for listening to this episode of the Volunteer Nation podcast. If you enjoyed it, please be sure to subscribe, rate, and review so we can reach more people like you who want to improve the impact of their good cause. For more tips and notes from the show, check us out at TobiJohnson.com. For any comments or questions, email us at WeCare@VolPro.net.
Cybersecurity Today: Exploited Vulnerabilities and Innovative Threat Mitigations In this episode of Cybersecurity Today, host Jim Love discusses several pressing cybersecurity issues including the exploitation of a server-side request forgery (SSRF) vulnerability in OpenAI's ChatGPT infrastructure (CVE-2024-27564), leading attackers to redirect users to malicious URLs. He also talks about how researchers at Tiny Hack have made breakthroughs in cracking Akira ransomware using high-powered GPUs, and Malwarebytes' warning about malware embedded in free online file converters. The episode highlights the importance of robust cybersecurity measures, innovative methods to combat ransomware, and cautious internet usage. 00:00 Introduction to Cybersecurity Threats 00:19 Exploiting ChatGPT Vulnerabilities 02:15 Cracking Akira Ransomware 05:01 Malware in Free Online Converters 07:12 Conclusion and Listener Support
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
File Hashes Analysis with Power BI Guy explains in this diary how to analyze Cowrie honeypot file hashes using Microsoft's BI tool and what you may be able to discover using this tool. https://isc.sans.edu/diary/File%20Hashes%20Analysis%20with%20Power%20BI%20from%20Data%20Stored%20in%20DShield%20SIEM/31764 Apache Camel Vulnerability Apache released two patches for Camel in close succession. Initially, the vulnerability was only addressed for headers, but as Akamai discovered, it can also be exploited via query parameters. This vulnerability is trivial to exploit and leads to arbitrary code execution. https://www.akamai.com/blog/security-research/march-apache-camel-vulnerability-detections-and-mitigations Juniper Patches Junos Vulnerability Juniper patches an already exploited vulnerability in JunOS. However, to exploit the vulnerability, and attacker already needs privileged access. By exploiting the vulnerability, an attacker may completely compromised the device. https://supportportal.juniper.net/s/article/2025-03-Out-of-Cycle-Security-Bulletin-Junos-OS-A-local-attacker-with-shell-access-can-execute-arbitrary-code-CVE-2025-21590?language=en_US AMI Security Advisory AMI patched three vulnerabilities. One of the, an authentication bypass in Redfish, allows for a complete system compromise without authentication and is rated with a CVSS score of 10.0. https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025003.pdf
On this morning's edition of the show, we take a look at the headlines from overnight and talk a little bit more about Maxwell and Epstein's propensity to search out the most vulnerable amongst us for their abuse.(commercial at 13:52)To contact me:bobbycapucci@protonmail.comSource:https://www.ft.com/content/0b9d93da-1687-4eb1-bd53-0a84a1b40dff
Stan Lee, the icon, beloved creator of various legends in comic book lore passed away over 6 years ago now. There is a new documentary documenting his final chapter. Inside of that doc, it is alleged that his ex business owners were taking advantage of him. We discuss. Speaking of Marvel, the Daredevil numbers are in and the ratings are...not great. What is happening? Does this spell out worry for Thunderbolts? Are people just over Marvel? Disney is not allowing press for Snow White currently. This and more as Kristian welcomes back Brett! #stanlee #documentary #netflix #marvel #mcu #snowwhite #rachelzegler #movies OUR SPONSORS: TRADE COFFEE: Trade is exclusively offering our listeners 40% off your first order at https://www.drinktrade.com/KRISTIAN FACTOR: Eat smart with Factor. Get started at https://www.FACTORMEALS.com/factorpod... and use code FACTORPODCAST to get 50% off your first box plus free shipping. That's code FACTORPODCAST at https://www.FACTORMEALS.com/factorpod... to get 50% off plus free shipping on your first box. ROBINHOOD: Investing involves risk. Rate subject to change. 3% match requires Robinhood Gold at $5/mo for 1 yr from first match, must keep funds in IRA for 5 years. Go to https://www.robinhood.com/boost.
On this morning's edition of the show, we take a look at the headlines from overnight and talk a little bit more about Maxwell and Epstein's propensity to search out the most vulnerable amongst us for their abuse.(commercial at 13:52)To contact me:bobbycapucci@protonmail.comSource:https://www.ft.com/content/0b9d93da-1687-4eb1-bd53-0a84a1b40dffBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.
Forecast: Cloudy with a chance of compromised credentials and scattered vulnerabilities—stay alert out there! In this episode of Storm⚡️Watch, we're unpacking some of the most pressing developments in cybersecurity and what they mean for the industry. First, we tackle the state of CISA and its mounting challenges. From allegations that the Trump administration ordered U.S. Cyber Command and CISA to stand down on addressing Russian cyber threats, to financial groups pushing back against CISA's proposed incident reporting rule, there's no shortage of turbulence. Adding fuel to the fire, Homeland Security Secretary Kristi Noem has disbanded eight federal advisory committees, including key cybersecurity groups, citing compliance with a Trump-era executive order. Critics argue these cuts could weaken public-private collaboration and hinder CISA's ability to protect critical infrastructure. We'll break down what all this means for the future of cybersecurity leadership in the U.S. Next, we revisit a shocking case involving a U.S. soldier who plans to plead guilty to hacking 15 telecom carriers. This story highlights the ongoing risks posed by insider threats and the vulnerabilities within telecom networks, which are often targeted for their treasure troves of sensitive data. We'll explore how this case unfolded, what it reveals about vetting processes for individuals with access to critical systems, and the broader implications for cybersecurity in government-affiliated organizations. We also spotlight some fascinating research from Censys on a phishing scam exploiting toll systems across multiple states. Attackers are leveraging cheap foreign SIM cards and Chinese-hosted infrastructure in a campaign that keeps evolving. Plus, RunZero sheds light on a critical vulnerability affecting Edimax IP cameras (CVE-2025-1316), while GreyNoise reports on mass exploitation of a PHP-CGI vulnerability (CVE-2024-4577) and active threats linked to Silk Typhoon-associated CVEs. Storm Watch Homepage >> Learn more about GreyNoise >>
Every year the nominees for the Rock n Roll Hall of Fame always seem to raise eyebrows and get tongues wagging. Over the last couple years, the controversy generally is about what exactly constitutes inclusion. Semantics aside, we enjoy getting "The List" and this year we're taking a cue from "High Infidelity" and making our Top 5 list of choices. Who you got? In our "News, Views and Tunes", we hit up the "Capt. Comics Expo" and go over the viral Taylor Swift fan divorce video. Musically, we crank some Blitzkrieg, Budgie, The Exploited, Razor, Sadistic Intent, Mean Mistreated, On Fire and introduce trad metallers Dragonrider in our "Indie Spotlight". If you are curious about the "Whamola" Aaron mentioned, you can view it here. Horns Up!
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Njrat Compaign Using Microsoft dev Tunnels: A recent version of the Njrat remote admin tool is taking advantage of Microsoft's developer tunnels (devtunnels.ms) as a command and control channel. https://isc.sans.edu/diary/Njrat%20Campaign%20Using%20Microsoft%20Dev%20Tunnels/31724 NrootTag Apple FindMy Abuse Malware could use a weakness in the keys used for Apple FindMy to abuse it to track victims. Updates were released with iOS 18.2, but to solve the issue the vast majority of Apple users must update. https://nroottag.github.io/ 360XSS: Mass Website Exploitation via Virtual Tour Framework The Krpano VR library which is often used to implement 3D virtual tours on real estate websites, is currently being abused to inject spam messages. The XSS vulnerabilty could allow attackers to inject even more malicious JavaScript. https://olegzay.com/360xss/ SANS.edu Research: Proof is in the Pudding: EDR Configuration Versus Ransomware. Benjamin Powell https://www.sans.edu/cyber-research/proof-pudding-edr-configuration-versus-ransomware/
Preview: John Bolton comments that, before or during talks, a ceasefire and call for peacekeeping can be exploited on the battlefield. More 1921 Armenia
Let's do this! The Cult of Hockey podcast. By the Faithful and for the Faithful. Today Bruce McCurdy and David Staples dig into the Oilers of Edmonton's 7-3 loss to the Capitals of Washington.
Forecast: Expect increased malicious activity targeting enterprise network infrastructure and remote work platforms. In this episode of Storm⚡️Watch, the crew tackles some of the most pressing stories in cybersecurity and tech. First, we explore the case of Christian Marie Chapman, an Arizona woman who faces federal prison time for orchestrating a scheme that allowed North Korean IT workers to pose as U.S.-based employees. This operation, which generated over $17 million for North Korea, involved Chapman running a "laptop farm" that enabled remote access to U.S. company networks. The scheme not only compromised sensitive company data but also funneled money to North Korea's weapons programs. This story underscores the critical need for robust identity verification and background checks in hiring processes, especially in remote IT roles, to avoid inadvertently aiding malicious actors. Next, we discuss GreyNoise's findings on the active exploitation of a high-severity vulnerability in Palo Alto Networks PAN-OS (CVE-2025-0108). This authentication bypass flaw allows attackers to execute unauthorized PHP scripts, posing significant risks to unpatched systems. Organizations are urged to apply security patches immediately and restrict access to firewall management interfaces to mitigate potential breaches. GreyNoise's real-time intelligence highlights the importance of staying vigilant against evolving threats. In our featured segment, we sit down with Dennis Fisher, a celebrated journalist with over two decades of experience in cybersecurity reporting. Fisher shares insights from his career, including his work as co-founder of *Threatpost* and Editor-in-Chief at *Decipher*. Known for his analytical approach, Fisher has covered major cybersecurity events and delved into the motivations behind both attackers and defenders. His expertise offers a unique perspective on the complexities of information security. Finally, we touch on broader issues in vulnerability management and encryption policies. From GreyNoise's observations of exploitation surges in vulnerabilities like ThinkPHP and ownCloud to Censys' argument against weakening encryption standards, these discussions emphasize the need for proactive measures and smarter prioritization in cybersecurity strategies. Whether it's patching overlooked vulnerabilities or resisting calls to weaken encryption under the guise of security, staying informed is key to navigating today's threat landscape. Storm Watch Homepage >> Learn more about GreyNoise >>
If you're like us, you might have thought that The National Center for Missing and Exploited Children solely focused on helping locate missing children; however, the word "Exploited" actually covers a lot of the situations we as school counselors deal with on a daily basis.In this episode Alejandra from The National Center for Missing and Exploited Children shares how this organization can support educators and the work we do daily.Join our Behavior Detour Conference!
8AM Hour 3 Jeremy White and Joe DiBiase analyze how the Eagles were able to leverage their strengths against the Chiefs weaknesses. They point out how many stars the Eagles have up front as opposed to the lesser known Bills lineman.
Longtime NFL writer and analyst Jason Cole joined PK to recap Super Bowl LIX and the Philadelphia Eagles' triumph in stopping the Kansas City Chiefs' bid for a three-peat.
Exploited vulnerabilities up significantly from previous year First U.S. state to declare ban on DeepSeek Crypto scams make comeback on X Huge thanks to our episode sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Learn about fileless crypto stealers written in Python, the ongoing exploitation of recent SimpleHelp vulnerablities, new Apple Silicon Sidechannel attacks a Team Viewer Vulnerablity and an odd QR Code Fileless Python InfoStealer Targeting Exodus This Python script targets Exodus crypto wallet and password managers to steal crypto currencies. It does not save exfiltrated data in files, but keeps it in memory for exfiltration https://isc.sans.edu/diary/Fileless%20Python%20InfoStealer%20Targeting%20Exodus/31630 Campaign Exploiting SimpleHelp Vulnerablity Arcticwolf observed attacks exploiting SimpleHelp for initial access to networks. It has not been verified, but is assumed that vulnerabilities made public about a week ago are being exploited. https://arcticwolf.com/resources/blog-uk/arctic-wolf-observes-campaign-exploiting-simplehelp-rmm-software-initial-access/ Two new Side Channel Vulnerabilities in Apple Silicon SLAP (Data Speculation Attacks via Load Address Prediction): This attack exploits the Load Address Predictor in Apple CPUs starting with the M2/A15, allowing unauthorized access to sensitive data by mispredicting memory addresses. FLOP (Breaking the Apple M3 CPU via False Load Output Predictions): This attack targets the Load Value Predictor in Apple's M3/A17 CPUs, enabling attackers to execute arbitrary computations on incorrect data, potentially leaking sensitive information. https://predictors.fail/ Teamviewer Security Bulletin Teamviewer patched a privilege escalation vulnerability CVE-2025-0065 https://www.teamviewer.com/en-us/resources/trust-center/security-bulletins/tv-2025-1001/ Odd QR Code A QR code may resolve to a different URL if looked at at an angle. https://mstdn.social/@isziaui/113874436953157913 Limited Discount for SANS Baltimore https://sans.org/u/1zQd
We welcome back Shawn Carney of 40 Days for Life to take the temperature of the Pro-Life movement with the change in the American administration. Where does he think we should go next, and how likely is that to occur? Father finishes with Timely Thoughts. Show Notes 40 Days for Life 40 Days for Life | Linktree 40 Days for Life | Search Your Location Day 41 Magazine To the Heart of the Matter: The 40-Day Companion to Live a Culture of Life What to Say When: The Complete New Guide to Discussing Abortion What to Say When 2: Your Proven Guide in the New Abortion Landscape - How to Discuss, Clarify, and Question Abortion in a Hostile Culture | Shawn Carney Buy Both Books with Special Pricing Defund Planned Parenthood | 40 Days for Life President Donald Trump Signs Pardons for 23 Pro-Life Americans - LifeNews.com Vance Condemns Abortion at March for Life: “We Need More Babies in America” - LifeNews.com Here's 9 Pro-Life Actions President Trump Took During His First Week - LifeNews.com Human Fertility and Current Controversies (Fr. Tadeusz Pacholczyk) 4/22/24 A Fresh Look at IVF (Sister Renée Mirkes) 8/7/24 LIME 5: Exploited by Choice - Mark Crutcher Abortion Was the Leading Cause of Death Worldwide in 2024, Killing 73 Million People - LifeNews.com California Drops Prosecution Against Sandra Merritt, Who Exposed Planned Parenthood Aborted Baby Part Sales - LifeNews.com iCatholic Mobile The Station of the Cross Merchandise - Use Coupon Code 14STATIONS for 10% off | Catholic to the Max Read Fr. McTeigue's Written Works! "Let's Take A Closer Look" with Fr. Robert McTeigue, S.J. | Full Series Playlist Listen to Fr. McTeigue's Preaching! | Herald of the Gospel Sermons Podcast on Spotify Visit Fr. McTeigue's Website | Herald of the Gospel Questions? Comments? Feedback? Ask Father!
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
In today's episode, learn how an attacker attempted to exploit webmail XSS vulnerablities against us. Sonicwall released a critical patch fixing an already exploited vulnerability in its SMA 1000 appliance. Cisco fixed vulnerabilities in ClamAV and its Meeting Manager REST API. Learn from SANS.edu student Anthony Russo how to take advantage of AI for SOAR. XSS Attempts via E-Mail https://isc.sans.edu/diary/XSS%20Attempts%20via%20E-Mail/31620 An analysis of a recent surge in email-based XSS attack attempts targeting users and organizations. Learn the implications and mitigation techniques. SonicWall PSIRT Advisory: CVE-2025-23006 https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002 CVE-2025-23006 Details of a critical vulnerability in SonicWall appliances (SNWLID-2025-0002) and what you need to do to secure your systems. Cisco ClamAV Advisory: OLE2 Parsing Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA A DoS vulnerability in the popular open source anti virus engine ClamAV Cisco CMM Privilege Escalation Vulnerability https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-privesc-uy2Vf8pc A patch of a privilege escalation flaw in Cisco s CMM module.
Join professional investigator Justin Yentes as he pulls back the curtain on modern societal issues and their hidden implications. In this episode, digital forensics expert April joins Justin for a deep dive into the controversial world of child influencers and online safety. From the dangers of exploitation and privacy loopholes on social media to the responsibility of parents to teach children how to safely navigate the digital world, they explore harrowing case studies and offer practical advice for safeguarding the next generation. They bring to light the ways that social media corporations say they are protecting children but in reality, don't. With thoughtful analysis and personal insight, this episode is a must-listen for parents, guardians, and anyone concerned about the impact of social media on children. If you have worries about your child's online safety, please reach out to arizonainvestigativeassociates.com today!
Ben Criddle talks BYU sports every weekday from 2 to 6 pm.Today's Co-Hosts: Ben Criddle (@criddlebenjamin)Subscribe to the Cougar Sports with Ben Criddle podcast:Apple Podcasts: https://itunes.apple.com/us/podcast/cougar-sports-with-ben-criddle/id99676 Stitcherhttps://www.stitcher.com/podcast/espn960sports/cougar-bytes
Have you ever found yourself wrapped up in a relationship, only to wonder later if you were being manipulated? Well, today we're diving deep into the world of seduction, manipulation, and the often overlooked power dynamics at play with the help of CIA veteran Andrew Bustamante, who knows all too well how these tactics are used both in espionage and everyday life. In this eye-opening episode of Women of Impact, we're pulling back the curtain on how the human brain can be influenced by hormones and emotional connections to uncover how to spot those red flags before you get too entangled. Andrew is here to break down the three-step process of human sexuality, explain how predators like narcissists find their targets, and give us the tools to protect ourselves from falling into manipulative traps. Trust me homie, with Andrew's insights, you'll gain a better understanding of the power dynamics at play and how to navigate them with confidence and clarity!! In this episode, we go DEEP into: - How YOU can identify and outsmart manipulators before they even have a chance to play their games - The surprising role hormones play in attraction and why understanding them can give you a serious edge in relationships - How to build authentic connections without falling prey to emotional persuasion - The real difference between seduction and genuine romantic interest - And soooo much more!! By the end of this episode, you'll have a toolkit to recognize and deflect manipulation, understand the role of hormones in emotional and sexual engagement, and maintain control in your relationships. So guys, no more second-guessing or blaming yourselves when things feel off. This episode will arm you with the knowledge to stand strong against manipulation and build relationships that genuinely respect your worth and boundaries!! So let's dive right in, guys!! I'm Lisa Bilyeu and welcome to Women of Impact. SHOWNOTES Ambitious folks just want to feel seen. Life cycle: belonging, connecting, leading, creating. Assumptions help the brain save energy, easily. Vasopressin boosts belonging, fuels frequent hookups. Ravens need more time with female targets. Sex boosts brain power differently for everyone. Exploited admin vulnerabilities for secrets over decades. Czechoslovakian spies faked marriage, stole U.S. secrets. Think logically, not emotionally, to avoid mistakes. CHECK OUT OUR SPONSORS Audible: Sign up for a free 30-day trial at https://audible.com/WOI Vital Proteins: Get 20% off by going to https://www.vitalproteins.com and entering promo code WOI at check out. Quince: Check out Quince: https://quince.com/woi Shopify: Sign up for your one-dollar-per-month trial period at https://shopify.com/lisa LISTEN TO WOMEN OF IMPACT AD FREE + BONUS EPISODES on APPLE PODCASTS: apple.co/womenofimpact FOLLOW LISA: Instagram: https://www.instagram.com/lisabilyeu/ Twitter: https://twitter.com/lisabilyeu YouTube: https://www.youtube.com/womenofimpact Tik Tok: https://www.tiktok.com/@lisa_bilyeu?lang=en Learn more about your ad choices. Visit megaphone.fm/adchoices
PREVIEW - WTO Colleague Alan Tonelson analyzes how the PRC exploited WTO rules and what the Trump Administration did about the cheating and theft. More details tonight. 1877 Singapore River
The Dean's List with Host Dean Bowen – Explore the contrast between two influential figures: Haym Salomon, a Polish immigrant who funded the Continental Army, and John D. Rockefeller, a wealthy oil magnate who reshaped education to serve his agenda. Discover how their legacies reflect patriotism versus power, revealing a deeper narrative about wealth, influence, and the fight for American principles.
System Update returns for new episodes in 2025. Pro-Israel conservatives seize the opportunity to drum up anti-Muslim sentiment after the New Orleans attack. Plus: Biden awards Liz Cheney a presidential medal for defending freedom, dignity and decency. Learn more about your ad choices. Visit megaphone.fm/adchoices
Thanks to Hankook for sponsoring today's video! Click here http://bit.ly/DynaproTires to learn more about Dynapro tires! This episode is sponsored by/brought to you by BetterHelp. Give online therapy a try at betterhelp.com/PASTGAS and get on your way to being your best self. Join us this week as we dive into the history of Dodge, Part I. John and Horace Dodge started out making bikes in Canada, and now, more than 100 years later their name is associated with one of the biggest car companies in the world. This might have never happened if they didn't get Henry Ford to unwillingly bankroll the operation. But how did they do it? More about Show: Follow Nolan on IG and Twitter @nolanjsykes. Follow Joe on IG and Twitter @joegweber. Follow Donut @donutmedia, and subscribe to our Youtube and Facebook channels! Don't forget to subscribe to the podcast for free wherever you're listening or using this link: http://bit.ly/PastGas. If you like the show, telling a friend about it would be helpful! You can text, email, Tweet, or send this link to a friend: http://bit.ly/PastGas. Learn more about your ad choices. Visit podcastchoices.com/adchoices