POPULARITY
Categories
We're joined by Daniella Mestyanek Young, the author of Uncultured. She was born a third generation member of an influential family, within The Family International, better known as the Children of God cult. She escaped at fifteen, put herself through school, and graduated from college as valedictorian. Daniella joined the Army, became Captain, and she received the Presidential Volunteer Service Award. She was an Intelligence Officer in one of the Army's first Female Engagement Teams. In two tours and six years, she saw patterns in the military that were just like her experiences in the Children of God. Here are Daniella's 10 characteristics of a cult that we talk about: 1. Has a charismatic leader (and a skinny white woman) 2. A sacred assumption 3. The transcendental mission 4. Self-sacrifice of members 5. Limits access to the outside world 6. Distinguishable vernacular 7. Us versus them mentality 8. Exploits members' labor 9. High exit costs 10. Ends justify the means mentality Find Daniella online: https://twitter.com/daniellamyoung https://www.instagram.com/daniellamyoung_ https://www.tiktok.com/@daniellamestyanekyoung By Daniella's book UnCULTured https://www.indiebound.org/book/9781250280114 We're also excited to announce that our long promised merch is here!! We know it's tough sometimes to express your leftist feelings in public. Your ratty Che Guevara and CCCP t-shirts seem better left at home. Now you can fly your crypto-leftist flag and still be completely under the radar with our personal love letter to Juan José Arévalo, philosopher and socialist president of Guatemala, and the airline he nationalized. wetwired.printful.me/ Subscribe on Patreon to support making this show, get premium only episodes, and listen to our entire back catalog. patreon.com/wetwired
Tom Uren and Amberleigh Jack talk about Peter Williams, the general manager of vulnerability research firm Trenchant, who has pleaded guilty to selling exploits to the Russian 0day broker Operation Zero. It's a terrible look, but it doesn't mean the private sector can't be trusted to develop exploits. They also discuss a new report's recommendations to empower the Office of the National Cyber Director. It's a good idea, but it won't make up for the cuts in funding and personnel across the Trump administration's cyber portfolio. This episode is also available on Youtube. Show notes
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line/32428 Apache Tomcat PUT Directory Traversal Apache released an update to Tomcat fixing a directory traversal vulnerability in how the PUT method is used. Exploits could upload arbitrary files, leading to remote code execution. https://lists.apache.org/thread/n05kjcwyj1s45ovs8ll1qrrojhfb1tog BIND9 DNS Spoofing Vulnerability A PoC exploit is now available for the recently patched BIND9 spoofing vulnerability https://gist.github.com/N3mes1s/f76b4a606308937b0806a5256bc1f918
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/diary/Kaitai%20Struct%20WebIDE/32422 WSUS Emergency Update Microsoft released an emergency patch for WSUS to fix a currently exploited critical vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287 Network Security Devices Endanger Orgs with 90s-era Flaws Attackers increasingly use simple-to-exploit network security device vulnerabilities to compromise organizations. https://www.csoonline.com/article/4074945/network-security-devices-endanger-orgs-with-90s-era-flaws.html
In this eye-opening introduction to the Divine Opportunities for Progress and Exploits series, we discover how God's intelligence, purpose, and divine design empower humanity for greatness. Through Scripture, relatable examples, and even lessons drawn from pop culture like Naruto, this message emphasizes the power of mindset, action, and faith in unlocking one's divine potential. You'll learn why failure is not final, how your thoughts shape your destiny, and why God has already equipped you with everything needed to dominate and succeed. By the end of this teaching, you'll be inspired to rise above limitations, act on your ideas, and boldly step into the opportunities God has prepared for your life. You are not an accident; you are a divine idea turned into a living reality. Your mindset determines your capacity for exploits. Failure is feedback, not finality. Productivity is divine — act on your God-given creativity. Dominion starts with understanding your authority in Christ.
Happy Patch Tuesday! In this October episode, security specialists Ryan Braunstein and Mat Lee break down some of the month's most critical vulnerabilities — and why this batch of CVEs might just be the spookiest yet.The duo dives deep into:A Unity Engine remote code execution flaw that impacts games, VR apps, and even training toolsThe Windows Hello bypass vulnerability that lets attackers inject their own biometric data to access local accountsA Microsoft Exchange Server privilege escalation that could expose entire inboxesWith expert insights, real-world context, and a touch of humor, Ryan and Mat unpack what these vulnerabilities mean for IT and security pros — and what steps you should take right now to stay protected
Lessons From The Life of David | Week 6 | Ken Miller--This lesson will cover the early days of David's reign as he attempts to rule his kingdom in a way that honors Yahweh. Having never served as a king before, David has a lot to learn about managing the affairs of state in keeping with Yahweh's commands.--Notes
Three Buddy Problem - Episode 67: We discuss the rise of automated red-teaming, Apple's $2 million exploit chain bounties aimed at outbidding spyware brokers and the iPhone maker's focus on wireless proximity attacks and “tactical suitcase” Wi-Fi exploits. We also hit the news of Paragon spyware targeting European executives and the bizarre story of NSO Group's supposed US investor buyout. Plus, an update on Oracle's zero-day ransomware fiasco, Ivanti's endless patch delays, the ethics of journalists enabling ransomware operations on leak sites, Europe's latest failed push for Chat Control, and VirusTotal's new pricing tiers. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).
Send us a text Guitarist/Vocalist Magnus Garathun (Abhorration, X-Hecatomb, x-Condor, X-Mion's Hill) visits the Morgue to talk about his musical path and Norway's Death Metal beast Abhorration and much more. See you at the Morgue!music:Abhorration-DemonolatryHecatomb-Black Winged Pestilence Condor-Embraced By The EvilMion's Hill- Witches VomitCondor-Riders Of ViolenceAbhorration-Desecrate the Exploits of God Abhorration-The Grace of Immolation contact: thetampamorgue@gmail.com The Tampa Morgue Podcast can be found on Spotify, Amazon Music, Apple Music, Apple Podcasts, YouTube and most places you listen to your podcasts.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
FreePBX Exploit Attempts (CVE-2025-57819) A FreePBX SQL injection vulnerability disclosed in August is being used to execute code on affected systems. https://isc.sans.edu/diary/Exploit%20Against%20FreePBX%20%28CVE-2025-57819%29%20with%20code%20execution./32350 Disrupting Threats Targeting Microsoft Teams Microsoft published a blog post outlining how to better secure Teams. https://www.microsoft.com/en-us/security/blog/2025/10/07/disrupting-threats-targeting-microsoft-teams/ Kibana XSS Patch CVE-2025-25009 Elastic patched a stored XSS vulnerability in Kibana https://discuss.elastic.co/t/kibana-8-18-8-8-19-5-9-0-8-and-9-1-5-security-update-esa-2025-20/382449 QT SVG Vulnerabilities CVE-2025-10728, CVE-2025-10729, The QT group fixed two vulnerabilities in the QT SVG module. One of the vulnerabilities may be used for code execution https://www.qt.io/blog/security-advisory-uncontrolled-recursion-and-use-after-free-vulnerabilities-in-qt-svg-module-impact-qt
We talk about the Imperial Oil layoffs, finance news and pipelines. Dave Gray-Donald interviews Grahame Russell of Rights Watch about their major victory against Hudbay Minerals, setting a legal precedent for filing civil claims against mining companies in Canada. Read his new report, 13 Brave Giants: How We Won the Landmark Hudbay Minerals Lawsuits in Canada and the Mynor Padilla Criminal Trial in Guatemala, and at What Cost! “A remarkable and heartbreaking struggle for corporate accountability and justice spanning nearly 20 years.”
En 1672, le jeune Louis XIV se lance dans la guerre de Hollande pour conquérir les territoires espagnols. L'offensive se transforme en bourbier, mais le général Turenne parvient à renverser le cours de la guerre…Mention légales : Vos données de connexion, dont votre adresse IP, sont traités par Radio Classique, responsable de traitement, sur la base de son intérêt légitime, par l'intermédiaire de son sous-traitant Ausha, à des fins de réalisation de statistiques agréées et de lutte contre la fraude. Ces données sont supprimées en temps réel pour la finalité statistique et sous cinq mois à compter de la collecte à des fins de lutte contre la fraude. Pour plus d'informations sur les traitements réalisés par Radio Classique et exercer vos droits, consultez notre Politique de confidentialité.Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations.
En 1672, le jeune Louis XIV se lance dans la guerre de Hollande pour conquérir les territoires espagnols. L'offensive se transforme en bourbier, mais le général Turenne parvient à renverser le cours de la guerre… Mention légales : Vos données de connexion, dont votre adresse IP, sont traités par Radio Classique, responsable de traitement, sur la base de son intérêt légitime, par l'intermédiaire de son sous-traitant Ausha, à des fins de réalisation de statistiques agréées et de lutte contre la fraude. Ces données sont supprimées en temps réel pour la finalité statistique et sous cinq mois à compter de la collecte à des fins de lutte contre la fraude. Pour plus d'informations sur les traitements réalisés par Radio Classique et exercer vos droits, consultez notre Politique de confidentialité.Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations.
In this episode, we unpack Paul's warning that sin can twist even God's holy law into a base of operations for pride, hypocrisy, and rebellion. Romans 7:8–9 shows how the commandment meant for life can awaken hidden desires and expose self-deception. But the final verdict is clear: the law points us to our desperate need for Christ.Discover how grace and truth in Jesus pierce beneath the surface, strip away self-confidence, and empower us to walk in the Spirit.
In this episode, we speak with Omar Zahzah about his new book Terms of Servitude: Zionism, Silicon Valley, and Digital Settler Colonialism in the Palestinian Liberation Struggle, published by the Censored Press and Seven Stories Press. Our conversation touches on: the gamified collaboration between big-tech and the apparatus of mass murder and apartheid; the digital targeting, harassment and silencing of Palestinian solidarity organizers; the colonial violence invested in the algorithms that shape our lives (and deaths); and the way a profoundly transformative "Virtual Palestine" is created through the protagonism of those resisting genocide and their supporters around the world.Omar Zahzah is a writer, poet, artist, musician, freelance journalist, and Assistant Professor of Arab, and Muslim, Ethnicities and Diasporas (AMED) Studies in the Department of Race and Resistance Studies at San Francisco State University. Omar is the former Education and Advocacy Coordinator for Eyewitness Palestine, a role that saw him training delegates to Palestine on Palestinian political history and culture and racial justice. Omar's writing on Palestine has appeared in outlets such as The Electronic Intifada, Mondoweiss, Al Jazeera, Middle East Eye, andThe Nation. Omar holds a PhD in Comparative Literature from UCLA.Against the Fascist Game is the second season of The Exploits of Play, a podcast about games and capitalism. Join Max Haiven and Faye Harvey as they interview game designers, critical theorists and grassroots activists struggling with games to understand, confront and abolish the rising threat of fascism in our times. We ask questions including: how is the far-right using games as platforms for ideology, recruiting and violence, both close to home and around the world? How have vicious reactionary politics emerged from a form of capitalism where most people feel trapped in an unwinnable game? What do fascism and antifascism mean today? And what role, if any do play and games have in confronting the fascist threat and creating a new world? The Exploits of Play is a production of Weird Economies, a platform for exploring the intricacies and excesses of our economic imaginaries, in cooperation with RiVAL: The ReImagining Value Action Lab. Hosted on Acast. See acast.com/privacy for more information.
Frank Otchere
Frank Otchere
Frank Otchere
App for outing people who were insufficiently mournful of Charlie Kirk critics leaked its own users’ personal data through security blunders: https://san.com/cc/app-for-outing-charlie-kirks-critics-leaked-its-users-personal-data/ Meta is using parents’ back-to-school photos of their girls to advertise Threads to grown men: https://www.theguardian.com/technology/2025/sep/20/parents-outraged-meta-uses-photos-schoolgirls-ads-man AI-Generated YouTube Channel Uploaded Nothing But Videos of Women Being Shot: https://www.404media.co/ai-generated-youtube-channel-uploaded-nothing-but-videos-of-women-being-shot/ Controversy on subreddit r/TwinPeaks over AI: https://www.reddit.com/r/twinpeaks/comments/1npqm2k/ai_generated_content_is_no_longer_allowed/ YouTube to reinstate users banned for spreading COVID misinformation and election misinformation: https://variety.com/2025/digital/news/youtube-reinstate-channels-banned-election-covid-misinformation-1236527333/ Jessica Chastain's new show about preventing extremist violence postponed by AppleTV. Smells like censorship: https://www.instagram.com/p/DO_V2EyEZmj/ If you’re listening on Spotify, you can leave a comment there to let us know what you thought about these stories, or email us at hello@tangoti.com Follow Bridget and TANGOTI on social media! || instagram.com/bridgetmarieindc/ || tiktok.com/@bridgetmarieindc || youtube.com/@ThereAreNoGirlsOnTheInternet See omnystudio.com/listener for privacy information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send credentials as part of the URL. https://isc.sans.edu/diary/Exploit%20Attempts%20Against%20Older%20Hikvision%20Camera%20Vulnerability/32316 Cisco Patches Already Exploited SNMP Vulnerability Cisco patched a stack-based buffer overflow in the SNMP subsystem. It is already exploited in the wild, but requires admin privileges to achieve code execution. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte SonicWall Anti-Rootkit Update SonicWall released a firmware update for its SMA100 devices specifically designed to eradicate a commonly deployed rootkit. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0015 Extended Windows 10 Support Microsoft will extend free Windows 10 essential support for US and European customers. https://www.straitstimes.com/world/united-states/microsoft-offers-no-cost-windows-10-lifeline
Episode 141: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Nick Copi to talk about CSPT, React, CSS Injections and how Nick hacked the pod.Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!====== Links ======Follow your hosts Rhynorater and Rez0 on Twitter:https://x.com/Rhynoraterhttps://x.com/rez0__====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord at https://ctbb.show/discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.You can also find some hacker swag at https://ctbb.show/merch!Today's Sponsor: ThreatLocker. Check out ThreatLocker DAChttps://www.criticalthinkingpodcast.io/tl-dacToday's Guest: https://x.com/7urb01====== Resources ======regexploithttps://github.com/doyensec/regexploitFontleakhttps://adragos.ro/fontleak/debug(function)https://developer.chrome.com/docs/devtools/console/utilities#debug-functiondomloggerpphttps://github.com/kevin-mizu/domloggerpp====== Timestamps ======(00:00:00) Introduction(00:02:40) Google Docs Bug and 7urb0 Introduction(00:13:26) Bring-a-bug story(00:20:21) 7urb0's DEFCON talk teaser & Intrusive Thoughts Worth Sharing(00:30:01) CSPTs and React Apps(00:51:31) CSS Injections(01:04:55) 7urb0's backstory and game hacking(01:18:33) Worst Crit
Demographic anxietyIn many Western countries, non-white populations are growing (via immigration, higher birth rates, etc.). White nationalists exploit fears that whites will become minorities or lose political/cultural dominance.Become a supporter of this podcast: https://www.spreaker.com/podcast/racism-white-privilege-in-america--4473713/support.
A troubling number of U.S. House Democrats - including Reps Henry Cuellar and Vicente Gonzalez - voted Friday to honor Charlie Kirk, a notorious promoter of racist views: https://www.govtrack.us/congress/votes/119-2025/h282The same weekend as a large memorial event for Kirk in Arizona, Texas Republicans attended the Texas Youth Summit in The Woodlands, where they attempted to further radicalize Kirk's grieving fans: https://www.houstonpublicmedia.org/articles/news/politics/2025/09/20/531467/republican-representatives-call-youth-to-action-at-charlie-kirk-tribute-in-the-woodlands/...Resistance is building against the push by Governor Greg Abbott and others to silence Texas college students who choose not to lionize Kirk: https://www.texastribune.org/2025/09/22/texas-free-speech-college-campus-charlie-kirk-greg-abbott/?_bhlid=4a9636c9afe8b0572ffda1819115a6e7d1f10ae7...Senator Ted Cruz, in a rare moment of clarity, says FCC Chairman Brendan Carr's threats against ABC resemble those of a mob boss - of course, he's mainly worried about future censorship of the right: https://www.dallasnews.com/news/politics/2025/09/19/ted-cruz-says-fcc-chair-sounded-like-a-mafia-boss-in-threats-against-abc-over-jimmy-kimmel/Perhaps surprisingly, a conversation between Joe Rogan and Matthew McConaughey finds Rogan opposing the posting of the Ten Commandments in Texas classrooms, and McConaughey supporting the new law: https://www.mysanantonio.com/news/local/politics/article/joe-rogan-matthew-mcconaughey-21052729.phpHouston friends! Join Progress Texas in The Heights on Monday October 20 for our H-Town Hits Back live podcast taping event! Tickets and sponsorship opportunities are available now: https://act.progresstexas.org/a/houston2025eventThanks for listening! Our monthly donors form the backbone of our funding, and if you're a regular, we'd like to invite you to join the team! Find our web store and other ways to support our important work at https://progresstexas.org.
The 1776 Project launches a fear-driven attack on teachers speaking truths about Charlie Kirk, aiming to replace school boards with conservative operatives loyal to billionaires.Subscribe to our Newsletter:https://politicsdoneright.com/newsletterPurchase our Books: As I See It: https://amzn.to/3XpvW5o How To Make AmericaUtopia: https://amzn.to/3VKVFnG It's Worth It: https://amzn.to/3VFByXP Lose Weight And BeFit Now: https://amzn.to/3xiQK3K Tribulations of anAfro-Latino Caribbean man: https://amzn.to/4c09rbE
OPEN HEAVENSMATALA LE LAGI MO LE ASO FARAILE 19 SETEMA 2025(tusia e Pastor EA Adeboye) Manatu Autu: E mafai ona e faia mea maoa'e (You can also do exploits) Tauloto Tusi Paia – Isaia 28:10“Auā o lo‘o i ai le ‘upu ma le ‘upu, o le ‘upu ma le ‘upu; o le vavao ma le vavao, o le vavao ma le vavao; o sina mea itiiti ‘i‘inei ma sina mea itiiti ‘i‘inā.”Faitauga - Tusi Paia: Ioane 14:11-12Ina ua valaau le Atua ia te au ia avea ma faifeau, ou te lei fia tali i lea valaau, ae na ia tuitui mai. O lea na ou fai atu ia te ia, ‘ou te lē fia avea ma kerisiano poo se faifeau, e masani ai. Afai e te finagalo ia avea a'u e pei ona e fai mai ai, ou te manao ia ou faia mea na faia e Iesu, pe sili atu foi. Na faapea mai le Alii, ‘Ua lelei, e leai se faigata. Pau o lea, e tatau ona e amata mai i le tulaga na amata ai Iesu. Sa ia anapogi mo le 40 aso ma le 40 po ona faatoa faia lea o lana vavega muamua'. I lea taimi, e pau le taimi ou te anapogi ai o le taimi o Aso Maliu poo ituaiga anapogi foi lele e mai le taeao ae maea i le 12 i le aoauli. Ua ou fai i le Atua, “40 aso ma le 40 po?” Na ia tali mai,' o oe lava na e manao e te fia pei o Iesu, pe sili atu foi, o lona uiga e tatau ona e amata mai i le mea na amata ai Iesu. Toeitiiti lava ou faapea atu, ‘Le alii e, aua e te popole', ona ou manatu ifo lea ia te au, ‘a iai se mea ua ou iloa i le Matematika, e te amata mai i mea e iloa seia oo i mea e lē iloa atu, fuaiupu faigofie seia oo i fuaiupu faigata ma isi. Ona ou amata anapogi lea mo le tolu aso ma le tolu po. Ou te ta'u atu, e pei e tolu masina. Ina ua maea sina taimi, o le anapogi mo le 3 aso ma po, ua lē toe faigata ia te a'u, ona sosoo atu ai lea o le 5 aso ma po, ona sosoo lea ma le fitu aso ma po seia oo ina mafai le anapogi mo le 40 aso ma po, e faia e faatasi pe faalua i le tausaga.Le au pele e, e mafai ona e ausia le maualuga pe afai o loo e tuputupu pea i le itu sa'o. Aua e te manatu o i latou o loo i tulaga maualuga, na oo iai i se aso se tasi. Auā o lo‘o i ai le ‘upu ma le ‘upu, o le vavao ma le vavao; o sina mea itiiti ‘i‘inei ma sina mea itiiti ‘i‘inā. (Isaia 28:10), a maea, ona e iloa lea ua e iai i se nofoaga na e naunau iai. Ou te talitonu o aoaoga uma a Iesu e mafai ona faapea, ‘e leai se mea e faia e leai se aogā'. E iai le taui e totogi pe afai e te fia avea ma tagata maoa'e. E ono le mafai ona totogiina le tau atoa i le taimi nei, peitai afai e te taumafai e laa i luma mai lea taimi i lea taimi, e le umi ae e iloa ua e oo i le tulaga o loo e naunau iai. E mafai ona amata mai i le tulaga o loo e iai, auā a e faatali sei telē pe sili atu, e te ono lē amata lava. E siitia mea e tuuina atu e le Atua iai latou o ē faamaoni i mea itiiti (Luka 16:10). Faasolosolo ona totogi le tau ia ausia se tulaga e maualuga atu, i le Atua e amata atu nei, i le suafa o Iesu, Amene.
Between The Lines Radio Newsmagazine podcast (consumer distribution)
Independent journalist Justin Glawe: Trump Exploits Charlie Kirk's Murder, Vowing to Investigate and Dismantle Progressive Left GroupsConnecticut Visibility Brigade founder Katherine Hinds and defense attorney Margaret Donovan: Protest Leader Arrested for Exercising Free Speech RightsYouth climate activist and Fridays for Future Cape Cod lead organizer Madison Sheppard: ‘Make Billionaires Pay' International Mobilization for Climate Justice Sept. 19-21Bob Nixon's Under-reported News Summary• Growing U.S. military partnership with the Philippines, threatening China• Trump has fast-tracked deep-sea mining, despite global opposition• Utah unions fight ban on collective bargaining with historic referendumVisit our website at BTLonline.org for more information, in-depth interviews, related links and transcripts and to sign up for our BTL Weekly Summary. New episodes every Wednesday at 12 noon ET, website updated Wednesdays after 4 p.m. ETProduced by Squeaky Wheel Productions: Scott Harris, Melinda Tuhus, Bob Nixon, Anna Manzo, Susan Bramhall, Jeff Yates and Mary Hunt. Theme music by Richard Hill and Mikata.
Join host G Mark Hardy on CISO Tradecraft as he welcomes Patrick Garrity from VulnCheck and Tod Beardsley from Run Zero to discuss the latest in cybersecurity vulnerabilities, exploits, and defense strategies. Learn about their backgrounds, the complexities of security research, and strategies for effective communication within enterprises. The discussion delves into vulnerabilities, the significant risks posed by ransomware, and actionable steps for CISOs and security executives to protect their organizations. Stay tuned for invaluable insights on cybersecurity leadership and management. Chapters 00:00 Introduction and Guest Welcome 00:57 Meet Patrick Garrity: Security Researcher and Skateboard Enthusiast 02:12 Meet Todd Beardsley: From Hacker to Security Research VP 03:58 The Evolution of Vulnerabilities and Patching 07:06 Understanding CVE Numbering and Exploitation 14:01 The Role of Attribution in Cybersecurity 16:48 Cyber Warfare and Global Threat Landscape 20:18 The Rise of International Hacking 22:01 Delegation of Duties in Offensive Warfare 22:25 The Role of Companies in Cyber Defense 23:00 Attack Vectors and Exploits 24:25 Real-World Scenarios and Threats 28:46 The Importance of Communication Skills for CISOs 31:42 Ransomware: A Divisive Topic 38:39 Actionable Steps for Security Executives 45:58 Conclusion and Final Thoughts
Join host G Mark Hardy on CISO Tradecraft as he welcomes Patrick Garrity from VulnCheck and Tod Beardsley from Run Zero to discuss the latest in cybersecurity vulnerabilities, exploits, and defense strategies. Learn about their backgrounds, the complexities of security research, and strategies for effective communication within enterprises. The discussion delves into vulnerabilities, the significant risks posed by ransomware, and actionable steps for CISOs and security executives to protect their organizations. Stay tuned for invaluable insights on cybersecurity leadership and management. Chapters00:00 Introduction and Guest Welcome00:57 Meet Patrick Garrity: Security Researcher and Skateboard Enthusiast02:12 Meet Todd Beardsley: From Hacker to Security Research VP03:58 The Evolution of Vulnerabilities and Patching07:06 Understanding CVE Numbering and Exploitation14:01 The Role of Attribution in Cybersecurity16:48 Cyber Warfare and Global Threat Landscape20:18 The Rise of International Hacking22:01 Delegation of Duties in Offensive Warfare22:25 The Role of Companies in Cyber Defense23:00 Attack Vectors and Exploits24:25 Real-World Scenarios and Threats28:46 The Importance of Communication Skills for CISOs31:42 Ransomware: A Divisive Topic38:39 Actionable Steps for Security Executives
Join host G Mark Hardy on CISO Tradecraft as he welcomes Patrick Garrity from VulnCheck and Tod Beardsley from Run Zero to discuss the latest in cybersecurity vulnerabilities, exploits, and defense strategies. Learn about their backgrounds, the complexities of security research, and strategies for effective communication within enterprises. The discussion delves into vulnerabilities, the significant risks posed by ransomware, and actionable steps for CISOs and security executives to protect their organizations. Stay tuned for invaluable insights on cybersecurity leadership and management. Chapters 00:00 Introduction and Guest Welcome 00:57 Meet Patrick Garrity: Security Researcher and Skateboard Enthusiast 02:12 Meet Todd Beardsley: From Hacker to Security Research VP 03:58 The Evolution of Vulnerabilities and Patching 07:06 Understanding CVE Numbering and Exploitation 14:01 The Role of Attribution in Cybersecurity 16:48 Cyber Warfare and Global Threat Landscape 20:18 The Rise of International Hacking 22:01 Delegation of Duties in Offensive Warfare 22:25 The Role of Companies in Cyber Defense 23:00 Attack Vectors and Exploits 24:25 Real-World Scenarios and Threats 28:46 The Importance of Communication Skills for CISOs 31:42 Ransomware: A Divisive Topic 38:39 Actionable Steps for Security Executives 45:58 Conclusion and Final Thoughts
Unity Without Compromise with Dr. Steven LaTulippe – President Trump sends ICE agents and military forces to restore order in violent cities while critics cry foul. Supporters see his actions as true kindness, protecting citizens from crime and corruption. Rooted in Biblical justice and patriotism, this call urges America to confront evil, defend freedom, and uphold faith, justice, and peace for all...
Unity Without Compromise with Dr. Steven LaTulippe – President Trump sends ICE agents and military forces to restore order in violent cities while critics cry foul. Supporters see his actions as true kindness, protecting citizens from crime and corruption. Rooted in Biblical justice and patriotism, this call urges America to confront evil, defend freedom, and uphold faith, justice, and peace for all...
In this episode of 'Exploits,' Christine Darg discusses the state of society, the decline of moral values, and the importance of spiritual readiness in anticipation of the Messiah's return. With a focus on prophetic events concerning Israel, she emphasizes the significance of genuine faith and the urgency of soul-winning. Reflecting on biblical teachings, Christine urges viewers to examine their faith and live as true believers, prepared for the imminent return of Jesus. Join her for an insightful exploration of faith, prophecy, and the role of believers in these perilous times.
SonicWall SSL VPN flaws now being actively exploited Acting federal cyber chief outlines his priorities U.S. based investors in spyware firms nearly tripled in 2024 Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines. Find the stories behind the headlines at CISOseries.com.
Get instant access to the new Lab 2.0 now. Learn how to stay calm and make smarter decisions when your poker hands take unexpected turns. The world's best poker coach, Uri Peleg, gives you practical strategies and mindset shifts to quickly reevaluate, adapt, and protect your bankroll in tough situations. View the written version of this episode here. 00:00 Hand Example Breakdown 01:47 Range vs. Hand Thinking 03:21 Betting Structures and Exploits 04:28 Adapting When Plans Change 05:58 Reassessing Hand Strength in Action In this poker strategy podcast, Mike Brady and elite coach Uri Peleg explore one of the most important but overlooked skills in poker: knowing what to do when hands don't go as planned. Every player has experienced the frustration of seeing a strong starting hand or a favorable flop turn into a tough spot after unexpected action, but Uri breaks down how to handle these moments with clarity and confidence. Using a real hand example and practical analogies, he shows how focusing on your range rather than just your hand strength leads to smarter decisions and prevents costly mistakes. Listeners will learn how to adjust betting strategies, recognize when their plan is no longer working, and quickly reevaluate based on changing dynamics. This poker strategy podcast also dives into the importance of flexibility — whether it's shifting from aggression to caution, or accepting that folding a big hand can sometimes be the most profitable move. By reframing these situations as opportunities to adapt rather than failures, players gain a mental edge that carries across every stage of the game. If you've ever struggled with letting go of a strong-looking hand or found yourself stubbornly sticking to a plan that no longer makes sense, this poker strategy podcast delivers the perspective shift you need. Whether you're a beginner working through the basics or a seasoned grinder aiming for mastery, you'll come away with actionable insights to stay calm, stay sharp, and keep your bankroll protected when the game throws you curveballs.
Interview with Jeff Swinoga, President & CEO, Exploits Discovery Our previous interview: https://www.cruxinvestor.com/posts/inside-exploits-discoverys-csenfld-new-growth-strategy-4m-cash-680k-oz-gold-3-provinces-7217Recording date: 9th September 2025Exploits Discovery Corp. has completed a remarkable strategic repositioning that transforms the company from a resource-light Newfoundland explorer into a diversified Canadian gold company with substantial assets and compelling valuation metrics. The transformation positions the junior miner to capitalize on the current favorable gold price environment, with gold reaching $3,600 per ounce.The cornerstone of this transformation was the strategic sale of Newfoundland assets to New Found Gold for $7 million in upfront shares plus an additional $1.8 million upon delivery of remaining properties, along with a 1% net smelter return royalty. This transaction created immediate shareholder value while allowing management to focus on higher-potential assets.Most significantly, Exploits Discovery went from zero resources to controlling 680,000 ounces of gold across four high-quality properties in just four months. The flagship Hawkins property in Ontario hosts 300,000 ounces in the McKinnon zone within a 60-kilometer property package near Timmins. The property benefits from established infrastructure and was discovered by Don McKinnon, co-founder of the successful Hemlo gold mine.Complementing the Ontario resource base are three Quebec properties under option from Cartier Resources, offering exceptional high-grade exploration upside. The Fenton property has delivered impressive results including 356 grams per tonne gold over 6 meters, while the Wilson property features similar high-grade chimney-style mineralization.From a valuation perspective, the company presents a compelling opportunity with approximately $10-11 million in treasury value against a current market capitalization of just $9 million, creating an immediate discount to net asset value. Combined with $3.6 million in cash and backing from Eric Sprott's 14% shareholding, the company has substantial financial flexibility to pursue aggressive exploration without near-term dilution pressure.The systematic exploration approach across both jurisdictions, supported by an experienced technical team including property-specific experts, positions Exploits Discovery for multiple value creation catalysts in the favorable gold market environment.Learn more: https://www.cruxinvestor.com/companies/exploits-discoverySign up for Crux Investor: https://cruxinvestor.com
TJ and Kris begin a series of episodes exploring the biblical Nimrod by diving into his legendary background in ancient near eastern material, and his possible involvement in an ancient necromancy ritual.
In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:• Patch It or Pay: Closing the Door on Exploits. This blog is part of Gate 15's Summer of Security: Ransomware Resilience Series, highlighting the essential considerations for organizational leaders and cybersecurity professionals.Main Topics:• House panel approves cyber information sharing, grant legislation as expiration deadlines loom• CISA Delays Cyber Incident Reporting Rule for Critical InfrastructureRansomware & Data Breaches: • Australian Government - Australian Institute of Criminology: Examining the activities and careers of ransomware criminal groups. PDF • Stopping ransomware before it starts: Lessons from Cisco Talos Incident Response• Cyberattack on Jaguar Land Rover threatens to hit British economic growth• Hackers linked to M&S breach claim responsibility for Jaguar Land Rover cyber-attack • How JLR's Cyber Breach is Disrupting Global Operations • Jaguar Land Rover staff home for another day as company reels from cyber attackPresidential Message on National Preparedness Month• National Insider Threat Awareness Month; Help prevent the exploitation of authorized access from causing harm to your organization• Plan to avoid scams this National Preparedness Month• ABA Foundation and FBI Release New Infographic to Help Americans Spot and Avoid Deepfake ScamsQuick Hits:• All IT work to involve AI by 2030, says Gartner, but jobs are safe. All work in IT departments will be done with the help of AI by 2030, according to analyst firm Gartner, which thinks massive job losses won't result.• Salesloft Drift updates• Not Safe for Work: Tracking and Investigating Stealerium and Phantom Infostealers• Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack• Frostbyte10 flaws in Copeland E2 and E3 controllers highlight cyber threats to refrigeration, HVAC, lighting infrastructure• Czech NUKIB alerts critical infrastructure sector to rising cyber risks from Chinese data transfers, remote management• ‘Unrestrained' Chinese Cyberattackers May Have Stolen Data From Almost Every American• Chinese Hackers Impersonate US Lawmaker in Malware Scheme During Trade Talks• US military kills 11 in strike on alleged drug boat tied to Venezuelan cartel, Trump says• Targeting Iran's Leaders, Israel Found a Weak Link: Their Bodyguards• U.S. and Canadian Intelligence Partners Issue Guidance to Protect Western Tech Startups from Exploitation in International Pitch Competitions • The Blockchain Is Not Your Friend: Examining EtherHiding and using Blockchain for Attacks• New Cyber Resources from the Canadian Centre for Cyber Security: Cyber security hygiene best practices for your organization - ITSAP.10.102o Virtualizing your infrastructure (ITSAP.70.011)o Universal plug and play (ITSAP.00.008)
Support the showSupport us on Patreon
Christine Darg discusses the signs of the times and the urgency of preparing for eternity in this episode of Exploits. As global tensions rise and biblical prophecies unfold, Darg emphasizes the importance of living with an eternal perspective. She delves into scriptural insights from Revelation, 1 Corinthians, and other biblical texts, urging believers to discern truth, avoid deception, and cling to the hope found in Jesus Christ. This episode is a call to awaken to the realities of spiritual warfare and the promise of a future beyond this world.
The Future of Cybersecurity: AI, Exploits, and the CVE Database In this special crossover episode of Cybersecurity Today and Hashtag Trending, the hosts explore the use of artificial intelligence (AI) in cybersecurity. The conversation begins with an overview of the ongoing 'arms race' to find and exploit software vulnerabilities, focusing on how AI can change the game. The episode delves into the Common Vulnerability and Exposures (CVE) Database, its importance, and its management by the Mitre Corporation. The discussion then spotlights groundbreaking research by Israeli researchers Effie Wies and Nahman Khayet, who developed a method to automate the creation of exploits using AI, reducing the average exploit development time from 192 days to just 15 minutes. This revelation raises significant concerns about the future of cybersecurity and the need for organizations to accelerate their response times. The podcast also touches on the potential for AI to assist in writing more secure code and defending against vulnerabilities, calling for a more resilient approach to software development and deployment. 00:00 Introduction to the Crossover Show 00:22 The Arms Race in Cybersecurity 00:59 Understanding Zero-Day Exploits 02:13 The Common Vulnerability and Exposures Database (CVE) 05:17 The Impact of AI on Exploit Development 05:54 Interview with Nahman Khayet 08:48 The Future of AI in Cybersecurity 18:16 Challenges and Recommendations for Organizations 30:54 Conclusion and Final Thoughts
Here's the truth nobody tells high-achieving nurses, the system doesn't reward you, it bleeds you dry. The harder you work, the more you're exploited. More shifts. More responsibility. No extra pay. No real recognition.In this raw and powerful solo episode, Liam Caswell exposes the curse of the high-performing nurse — and how years of survival-mode conditioning in nursing can quietly sabotage your future in business.Whether you're still at the bedside or building your business, if you're over-delivering, undercharging, or burnt out before you even start… this one's for you.You'll learn how to stop being a high performer for the system and start becoming one for yourself. Because when your nervous system is stuck in hustle-and-survive mode, no promotion, pivot, or business strategy will fix the burnout. That's an inside job.“Your excellence to cope has become your career prison.” It's time to break out.⏱ EPISODE TIMESTAMPS✔️[1:42] What you're gonna learn in this episode✔️[2:02] The dark truth about high-performing nurses✔️[3:28] Your ‘reward'? More shifts, more stress, no support✔️[5:44] How nursing wires your nervous system for survival✔️[7:45] Why you're stuck in prep mode (aka “business procrastination”)✔️[11:59] New nursepreneur? This is how you sabotage yourself without realising✔️[13:46] Real high performance isn't about doing moreFREE RESOURCES
In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The Salesloft breach TP-Link Zero Days US DoD using Russian software? The Lasagna DoS attack Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-890
In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The Salesloft breach TP-Link Zero Days US DoD using Russian software? The Lasagna DoS attack Show Notes: https://securityweekly.com/psw-890
The media is already trying to bury yesterday's story from Minnesota while Cardinal Dolan sticks his foot in his mouth instead of highlighting the heroic sacrifice of one young man.Sources:https://www.returntotradition.orgorhttps://substack.com/@returntotradition1Contact Me:Email: return2catholictradition@gmail.comSupport My Work:Patreonhttps://www.patreon.com/AnthonyStineSubscribeStarhttps://www.subscribestar.net/return-to-traditionBuy Me A Coffeehttps://www.buymeacoffee.com/AnthonyStinePhysical Mail:Anthony StinePO Box 3048Shawnee, OK74802Follow me on the following social media:https://www.facebook.com/ReturnToCatholicTradition/https://twitter.com/pontificatormax+JMJ+#popeleoXIV #catholicism #catholicchurch #catholicprophecy#infiltration
The media is already trying to bury yesterday's story from Minnesota while Cardinal Dolan sticks his foot in his mouth instead of highlighting the heroic sacrifice of one young man.Sources:https://www.returntotradition.orgorhttps://substack.com/@returntotradition1Contact Me:Email: return2catholictradition@gmail.comSupport My Work:Patreonhttps://www.patreon.com/AnthonyStineSubscribeStarhttps://www.subscribestar.net/return-to-traditionBuy Me A Coffeehttps://www.buymeacoffee.com/AnthonyStinePhysical Mail:Anthony StinePO Box 3048Shawnee, OK74802Follow me on the following social media:https://www.facebook.com/ReturnToCatholicTradition/https://twitter.com/pontificatormax+JMJ+#popeleoXIV #catholicism #catholicchurch #catholicprophecy#infiltration
With Texas poised to pass a redistricting bill to help Donald Trump rig the midterm elections in his favor to retain control of Congress, Democrats are taking the fight to Trump. Trump's renewed engagement with Vladimir Putin on the war in Ukraine has made a new priority of the return of Ukrainian children stolen by Putin.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of threat actors. The vulnerability allows for the creation of arbitrary files as the archive is extracted. https://thehackernews.com/2025/08/winrar-zero-day-under-active.html Citrix Netscaler Exploit Updates The Dutch Center for Cyber Security is updating its guidance on recent Citrix Netscaler attacks. Note that the attacks started before a patch became available, and attackers are actively hiding their tracks to make it more difficult to detect a compromise. https://www.ncsc.nl/actueel/nieuws/2025/07/22/casus-citrix-kwetsbaarheid https://www.bleepingcomputer.com/news/security/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/ OpenSSH Post Quantum Encryption Starting in version 10.1, OpenSSH will warn users if they are using quantum-unsafe algorithms https://www.openssh.com/pq.html
A viral surrogacy video featuring a gay couple sparks outrage after one partner is revealed to be a registered sex offender. The PBD Podcast reacts with a heated debate on child safety, adoption laws, and the moral line between legality and trust in protecting our most vulnerable.
Texas Democrats are back in the headlines — this time flaunting a $40 million jet while fleeing a redistricting vote like cowards. Governor Abbott isn't holding back, and neither are we. Meanwhile, Jim Acosta hits a new low by interviewing an AI version of a Parkland victim. Yes, seriously. Also in this episode: Trump enters the Sydney Sweeney firestorm, defending her viral ad as the Left tries to cancel her. MTG threatens to ditch the GOP, Nancy Mace gets called out for her past posts, and Boston's glitziest neighborhood is now flooded with addicts thanks to “free crack pipes.” You can't make this stuff up.SUPPORT OUR SPONSORS TO SUPPORT OUR SHOW!Stay hurricane-ready and be prepared for any emergency with ReadyWise. Visit https://ReadyWise.com and use promo code CHICKS10 for 10% off your entire purchase.Score 15% off with code CHICKS and give yourself that glow-up with the BON CHARGE Red Light Face Mask at https://BonCharge.com (It's self-care that literally lights up your face!)Stir up your routine with MUDWTR at https://mudwtr.com Use code CHICKS for up to 43% off, free shipping, and a FREE rechargeable frother!Upgrade your summer. Go to https://CozyEarth.com/CHICKS for up to 40% OFF including the Bubble Cuddle Blanket with code CHICKS. VISIT OUR WEBSITE DAILY! https://chicksonright.com SUBSCRIBE TO OUR PODCAST: https://link.chtbl.com/BtHbvS8C?sid=youtube JOIN OUR SUPPORTER COMMUNITY ON LOCALS: https://chicksontheright.locals.com/ JOIN OUR SUPER DOUBLE AWESOME SECRET BUT NOT SECRET EXCLUSIVE GROUP: https://www.facebook.com/groups/388315619071775 Subscribe to our email list: https://politics.chicksonright.com/subscribe/ GET OUR BOOK! https://www.amazon.com/dp/B08H5D3CF1/ref=cm_sw_r_cp_api_fabc_JdhQFbZ363CAY Venmo: @chicksonright Paypal: https://www.paypal.me/chicksonright Get exclusive Chicks merch here: https://www.etsy.com/shop/InRealLifeCreations?ref=seller-platform-mcnav§ion_id=50399398 Even more Merch: https://shop.spreadshirt.com/chicksonright/ Thank you for the Superchats! Watch live to donate and be recognized! Facebook: Chicks on the RightFacebook Group: Chicks on the RightTwitter, IG, Parler, Rumble: @chicksonright