Podcasts about exploits

  • 1,282PODCASTS
  • 3,727EPISODES
  • 51mAVG DURATION
  • 1DAILY NEW EPISODE
  • Sep 15, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about exploits

Show all podcasts related to exploits

Latest podcast episodes about exploits

CISO Tradecraft
#250 - Understanding Vulnerabilities, Exploits, and Cybersecurity

CISO Tradecraft

Play Episode Listen Later Sep 15, 2025 46:48 Transcription Available


Join host G Mark Hardy on CISO Tradecraft as he welcomes Patrick Garrity from VulnCheck and Tod Beardsley from Run Zero to discuss the latest in cybersecurity vulnerabilities, exploits, and defense strategies. Learn about their backgrounds, the complexities of security research, and strategies for effective communication within enterprises. The discussion delves into vulnerabilities, the significant risks posed by ransomware, and actionable steps for CISOs and security executives to protect their organizations. Stay tuned for invaluable insights on cybersecurity leadership and management.  Chapters 00:00 Introduction and Guest Welcome 00:57 Meet Patrick Garrity: Security Researcher and Skateboard Enthusiast 02:12 Meet Todd Beardsley: From Hacker to Security Research VP 03:58 The Evolution of Vulnerabilities and Patching 07:06 Understanding CVE Numbering and Exploitation 14:01 The Role of Attribution in Cybersecurity 16:48 Cyber Warfare and Global Threat Landscape 20:18 The Rise of International Hacking 22:01 Delegation of Duties in Offensive Warfare 22:25 The Role of Companies in Cyber Defense 23:00 Attack Vectors and Exploits 24:25 Real-World Scenarios and Threats 28:46 The Importance of Communication Skills for CISOs 31:42 Ransomware: A Divisive Topic 38:39 Actionable Steps for Security Executives 45:58 Conclusion and Final Thoughts

AMERICA OUT LOUD PODCAST NETWORK
Trump’s ICE and military exploits reflect a true act of kindness

AMERICA OUT LOUD PODCAST NETWORK

Play Episode Listen Later Sep 14, 2025 57:00


Unity Without Compromise with Dr. Steven LaTulippe – President Trump sends ICE agents and military forces to restore order in violent cities while critics cry foul. Supporters see his actions as true kindness, protecting citizens from crime and corruption. Rooted in Biblical justice and patriotism, this call urges America to confront evil, defend freedom, and uphold faith, justice, and peace for all...

UNITY WITHOUT COMPROMISE
Trump’s ICE and military exploits reflect a true act of kindness

UNITY WITHOUT COMPROMISE

Play Episode Listen Later Sep 14, 2025 57:00


Unity Without Compromise with Dr. Steven LaTulippe – President Trump sends ICE agents and military forces to restore order in violent cities while critics cry foul. Supporters see his actions as true kindness, protecting citizens from crime and corruption. Rooted in Biblical justice and patriotism, this call urges America to confront evil, defend freedom, and uphold faith, justice, and peace for all...

Jerusalem Channel
Correctly Understanding Bible Prophecy

Jerusalem Channel

Play Episode Listen Later Sep 13, 2025 28:12


In this episode of 'Exploits,' Christine Darg discusses the state of society, the decline of moral values, and the importance of spiritual readiness in anticipation of the Messiah's return. With a focus on prophetic events concerning Israel, she emphasizes the significance of genuine faith and the urgency of soul-winning. Reflecting on biblical teachings, Christine urges viewers to examine their faith and live as true believers, prepared for the imminent return of Jesus. Join her for an insightful exploration of faith, prophecy, and the role of believers in these perilous times.

Cyber Security Headlines
SonicWall VPM exploits, Fed cyberchief's priorities, U.S spyware investment triples

Cyber Security Headlines

Play Episode Listen Later Sep 12, 2025 8:18


SonicWall SSL VPN flaws now being actively exploited Acting federal cyber chief outlines his priorities U.S. based investors in spyware firms nearly tripled in 2024 Huge thanks to our sponsor, Vanta Do you know the status of your compliance controls right now? Like...right now? We know that real-time visibility is critical for security, but when it comes to our GRC programs…we rely on point-in-time checks. But more than 9,000 companies have continuous visibility into their controls with Vanta. Vanta brings automation to evidence collection across over 35 frameworks, like SOC 2 and ISO 27001. They also centralize key workflows like policies, access reviews, and reporting, and helps you get security questionnaires done 5 times faster with AI. Now that's…a new way to GRC. Get started at Vanta.com/headlines. Find the stories behind the headlines at CISOseries.com.    

Upswing Poker Level-Up
When Poker Hands Don't Go as Planned (w/ Uri Peleg)

Upswing Poker Level-Up

Play Episode Listen Later Sep 11, 2025 8:36 Transcription Available


Get instant access to the new Lab 2.0 now. Learn how to stay calm and make smarter decisions when your poker hands take unexpected turns. The world's best poker coach, Uri Peleg, gives you practical strategies and mindset shifts to quickly reevaluate, adapt, and protect your bankroll in tough situations. View the written version of this episode here. 00:00 Hand Example Breakdown 01:47 Range vs. Hand Thinking  03:21 Betting Structures and Exploits   04:28 Adapting When Plans Change  05:58 Reassessing Hand Strength in Action  In this poker strategy podcast, Mike Brady and elite coach Uri Peleg explore one of the most important but overlooked skills in poker: knowing what to do when hands don't go as planned. Every player has experienced the frustration of seeing a strong starting hand or a favorable flop turn into a tough spot after unexpected action, but Uri breaks down how to handle these moments with clarity and confidence. Using a real hand example and practical analogies, he shows how focusing on your range rather than just your hand strength leads to smarter decisions and prevents costly mistakes.  Listeners will learn how to adjust betting strategies, recognize when their plan is no longer working, and quickly reevaluate based on changing dynamics. This poker strategy podcast also dives into the importance of flexibility — whether it's shifting from aggression to caution, or accepting that folding a big hand can sometimes be the most profitable move. By reframing these situations as opportunities to adapt rather than failures, players gain a mental edge that carries across every stage of the game.  If you've ever struggled with letting go of a strong-looking hand or found yourself stubbornly sticking to a plan that no longer makes sense, this poker strategy podcast delivers the perspective shift you need. Whether you're a beginner working through the basics or a seasoned grinder aiming for mastery, you'll come away with actionable insights to stay calm, stay sharp, and keep your bankroll protected when the game throws you curveballs. 

CruxCasts
Exploits Discovery (CSE:NFLD) - New Found Gold Deal Unlocks $10M+ Treasury Value

CruxCasts

Play Episode Listen Later Sep 11, 2025 18:22


Interview with Jeff Swinoga, President & CEO, Exploits Discovery Our previous interview: https://www.cruxinvestor.com/posts/inside-exploits-discoverys-csenfld-new-growth-strategy-4m-cash-680k-oz-gold-3-provinces-7217Recording date: 9th September 2025Exploits Discovery Corp. has completed a remarkable strategic repositioning that transforms the company from a resource-light Newfoundland explorer into a diversified Canadian gold company with substantial assets and compelling valuation metrics. The transformation positions the junior miner to capitalize on the current favorable gold price environment, with gold reaching $3,600 per ounce.The cornerstone of this transformation was the strategic sale of Newfoundland assets to New Found Gold for $7 million in upfront shares plus an additional $1.8 million upon delivery of remaining properties, along with a 1% net smelter return royalty. This transaction created immediate shareholder value while allowing management to focus on higher-potential assets.Most significantly, Exploits Discovery went from zero resources to controlling 680,000 ounces of gold across four high-quality properties in just four months. The flagship Hawkins property in Ontario hosts 300,000 ounces in the McKinnon zone within a 60-kilometer property package near Timmins. The property benefits from established infrastructure and was discovered by Don McKinnon, co-founder of the successful Hemlo gold mine.Complementing the Ontario resource base are three Quebec properties under option from Cartier Resources, offering exceptional high-grade exploration upside. The Fenton property has delivered impressive results including 356 grams per tonne gold over 6 meters, while the Wilson property features similar high-grade chimney-style mineralization.From a valuation perspective, the company presents a compelling opportunity with approximately $10-11 million in treasury value against a current market capitalization of just $9 million, creating an immediate discount to net asset value. Combined with $3.6 million in cash and backing from Eric Sprott's 14% shareholding, the company has substantial financial flexibility to pursue aggressive exploration without near-term dilution pressure.The systematic exploration approach across both jurisdictions, supported by an experienced technical team including property-specific experts, positions Exploits Discovery for multiple value creation catalysts in the favorable gold market environment.Learn more: https://www.cruxinvestor.com/companies/exploits-discoverySign up for Crux Investor: https://cruxinvestor.com

Fringe Radio Network
The Exploits of Enmerkar - Answers To Giant Questions

Fringe Radio Network

Play Episode Listen Later Sep 10, 2025 37:32 Transcription Available


TJ and Kris begin a series of episodes exploring the biblical Nimrod by diving into his legendary background in ancient near eastern material, and his possible involvement in an ancient necromancy ritual.

The Gate 15 Podcast Channel
Weekly Security Sprint EP 126. Information Sharing progress, ransomware report and news, and Alphabet Soup Month!

The Gate 15 Podcast Channel

Play Episode Listen Later Sep 9, 2025 18:33


In this week's Security Sprint, Dave and Andy covered the following topics:Warm Open:• Patch It or Pay: Closing the Door on Exploits. This blog is part of Gate 15's Summer of Security: Ransomware Resilience Series, highlighting the essential considerations for organizational leaders and cybersecurity professionals.Main Topics:• House panel approves cyber information sharing, grant legislation as expiration deadlines loom• CISA Delays Cyber Incident Reporting Rule for Critical InfrastructureRansomware & Data Breaches: • Australian Government - Australian Institute of Criminology: Examining the activities and careers of ransomware criminal groups. PDF • Stopping ransomware before it starts: Lessons from Cisco Talos Incident Response• Cyberattack on Jaguar Land Rover threatens to hit British economic growth• Hackers linked to M&S breach claim responsibility for Jaguar Land Rover cyber-attack • How JLR's Cyber Breach is Disrupting Global Operations • Jaguar Land Rover staff home for another day as company reels from cyber attackPresidential Message on National Preparedness Month• National Insider Threat Awareness Month; Help prevent the exploitation of authorized access from causing harm to your organization• Plan to avoid scams this National Preparedness Month• ABA Foundation and FBI Release New Infographic to Help Americans Spot and Avoid Deepfake ScamsQuick Hits:• All IT work to involve AI by 2030, says Gartner, but jobs are safe. All work in IT departments will be done with the help of AI by 2030, according to analyst firm Gartner, which thinks massive job losses won't result.• Salesloft Drift updates• Not Safe for Work: Tracking and Investigating Stealerium and Phantom Infostealers• Over 6,700 Private Repositories Made Public in Nx Supply Chain Attack• Frostbyte10 flaws in Copeland E2 and E3 controllers highlight cyber threats to refrigeration, HVAC, lighting infrastructure• Czech NUKIB alerts critical infrastructure sector to rising cyber risks from Chinese data transfers, remote management• ‘Unrestrained' Chinese Cyberattackers May Have Stolen Data From Almost Every American• Chinese Hackers Impersonate US Lawmaker in Malware Scheme During Trade Talks• US military kills 11 in strike on alleged drug boat tied to Venezuelan cartel, Trump says• Targeting Iran's Leaders, Israel Found a Weak Link: Their Bodyguards• U.S. and Canadian Intelligence Partners Issue Guidance to Protect Western Tech Startups from Exploitation in International Pitch Competitions • The Blockchain Is Not Your Friend: Examining EtherHiding and using Blockchain for Attacks• New Cyber Resources from the Canadian Centre for Cyber Security: Cyber security hygiene best practices for your organization - ITSAP.10.102o Virtualizing your infrastructure (ITSAP.70.011)o Universal plug and play (ITSAP.00.008)

Communism Exposed:East and West
China Exploits $2.5 Billion Pentagon-Funded Research, House Report Says

Communism Exposed:East and West

Play Episode Listen Later Sep 8, 2025 5:05


Weird Economies presents
Rulemakers and Rulebreakers with Vicky Osterweil

Weird Economies presents

Play Episode Listen Later Sep 8, 2025 88:33


In this episode we discuss the contradiction within games between gender play and fantasies to control and order; video games as reproductive technology; the playfulness of the far right which could be characterised as play without pleasure; how rulebreaking and gamebreaking play out in liberal democracy and fascism; and the possibilities of play and protest in antifascist practices and riotous revolution.Vicky Osterweil is a writer, worker and agitator based in Philadelphia. She is a founding member of the anarchist writing collective CAW, which can be found at cawshinythings.com She is the author of In Defense of Looting and the forthcoming book The Extended Universe: How Disney Destroyed the Movies and Took Over the World.Against the Fascist Game is the second season of The Exploits of Play, a podcast about games and capitalism. Join Max Haiven and Faye Harvey as they interview game designers, critical theorists and grassroots activists struggling with games to understand, confront and abolish the rising threat of fascism in our times. We ask questions including: how is the far-right using games as platforms for ideology, recruiting and violence, both close to home and around the world? How have vicious reactionary politics emerged from a form of capitalism where most people feel trapped in an unwinnable game? What do fascism and antifascism mean today? And what role, if any do play and games have in confronting the fascist threat and creating a new world? The Exploits of Play is a production of Weird Economies, a platform for exploring the intricacies and excesses of our economic imaginaries, in cooperation with RiVAL: The ReImagining Value Action Lab. Hosted on Acast. See acast.com/privacy for more information.

Voice-Over-Text: Pandemic Quotables
China Exploits $2.5 Billion Pentagon-Funded Research, House Report Says

Voice-Over-Text: Pandemic Quotables

Play Episode Listen Later Sep 8, 2025 5:05


Pandemic Quotables
China Exploits $2.5 Billion Pentagon-Funded Research, House Report Says

Pandemic Quotables

Play Episode Listen Later Sep 8, 2025 5:05


ReImagine Value
Rulemakers and Rulebreakers - Vicky Osterweil on fascist games and and antifascist play

ReImagine Value

Play Episode Listen Later Sep 8, 2025 88:33


In this episode we discuss the contradiction within games between gender play and fantasies to control and order; video games as reproductive technology; the playfulness of the far right which could be characterised as play without pleasure; how rulebreaking and gamebreaking play out in liberal democracy and fascism; and the possibilities of play and protest in antifascist practices and riotous revolution. Vicky Osterweil is a writer, worker and agitator based in Philadelphia. She is a founding member of the anarchist writing collective CAW, which can be found at cawshinythings.com She is the author of In Defense of Looting and the forthcoming book The Extended Universe: How Disney Destroyed the Movies and Took Over the World. Against the Fascist Game is the second season of The Exploits of Play, a podcast about games and capitalism. Join Max Haiven and Faye Harvey as they interview game designers, critical theorists and grassroots activists struggling with games to understand, confront and abolish the rising threat of fascism in our times. We ask questions including: how is the far-right using games as platforms for ideology, recruiting and violence, both close to home and around the world? How have vicious reactionary politics emerged from a form of capitalism where most people feel trapped in an unwinnable game? What do fascism and antifascism mean today? And what role, if any do play and games have in confronting the fascist threat and creating a new world? The Exploits of Play is a production of Weird Economies, a platform for exploring the intricacies and excesses of our economic imaginaries, in cooperation with RiVAL: The ReImagining Value Action Lab.

Communism Exposed:East & West(PDF)
China Exploits $2.5 Billion Pentagon-Funded Research, House Report Says

Communism Exposed:East & West(PDF)

Play Episode Listen Later Sep 8, 2025 5:05


Dystopian Simulation Radio
Moon Rumpy Pumpy - The exploits of a young Thad Roberts

Dystopian Simulation Radio

Play Episode Listen Later Sep 7, 2025 22:50


Support the showSupport us on Patreon

Jerusalem Channel
End Times: No More Delay

Jerusalem Channel

Play Episode Listen Later Sep 7, 2025 29:16


Christine Darg discusses the signs of the times and the urgency of preparing for eternity in this episode of Exploits. As global tensions rise and biblical prophecies unfold, Darg emphasizes the importance of living with an eternal perspective. She delves into scriptural insights from Revelation, 1 Corinthians, and other biblical texts, urging believers to discern truth, avoid deception, and cling to the hope found in Jesus Christ. This episode is a call to awaken to the realities of spiritual warfare and the promise of a future beyond this world.

Cyber Security Today
From CVE To Cyber Attack In Minutes With AI: Cybersecurity Today

Cyber Security Today

Play Episode Listen Later Sep 6, 2025 31:51 Transcription Available


The Future of Cybersecurity: AI, Exploits, and the CVE Database In this special crossover episode of Cybersecurity Today and Hashtag Trending, the hosts explore the use of artificial intelligence (AI) in cybersecurity. The conversation begins with an overview of the ongoing 'arms race' to find and exploit software vulnerabilities, focusing on how AI can change the game. The episode delves into the Common Vulnerability and Exposures (CVE) Database, its importance, and its management by the Mitre Corporation. The discussion then spotlights groundbreaking research by Israeli researchers Effie Wies and Nahman Khayet, who developed a method to automate the creation of exploits using AI, reducing the average exploit development time from 192 days to just 15 minutes. This revelation raises significant concerns about the future of cybersecurity and the need for organizations to accelerate their response times. The podcast also touches on the potential for AI to assist in writing more secure code and defending against vulnerabilities, calling for a more resilient approach to software development and deployment. 00:00 Introduction to the Crossover Show 00:22 The Arms Race in Cybersecurity 00:59 Understanding Zero-Day Exploits 02:13 The Common Vulnerability and Exposures Database (CVE) 05:17 The Impact of AI on Exploit Development 05:54 Interview with Nahman Khayet 08:48 The Future of AI in Cybersecurity 18:16 Challenges and Recommendations for Organizations 30:54 Conclusion and Final Thoughts

Hashtag Trending
From CVE To Cyber Attack In 15 Minutes - Hashtag Trending Weekend

Hashtag Trending

Play Episode Listen Later Sep 6, 2025 31:51 Transcription Available


The Future of Cybersecurity: AI, Exploits, and the CVE Database In this special crossover episode of Cybersecurity Today and Hashtag Trending, the hosts explore the use of artificial intelligence (AI) in cybersecurity. The conversation begins with an overview of the ongoing 'arms race' to find and exploit software vulnerabilities, focusing on how AI can change the game. The episode delves into the Common Vulnerability and Exposures (CVE) Database, its importance, and its management by the Mitre Corporation. The discussion then spotlights groundbreaking research by Israeli researchers Effie Wies and Nahman Khayet, who developed a method to automate the creation of exploits using AI, reducing the average exploit development time from 192 days to just 15 minutes. This revelation raises significant concerns about the future of cybersecurity and the need for organizations to accelerate their response times. The podcast also touches on the potential for AI to assist in writing more secure code and defending against vulnerabilities, calling for a more resilient approach to software development and deployment. 00:00 Introduction to the Crossover Show 00:22 The Arms Race in Cybersecurity 00:59 Understanding Zero-Day Exploits 02:13 The Common Vulnerability and Exposures Database (CVE) 05:17 The Impact of AI on Exploit Development 05:54 Interview with Nahman Khayet 08:48 The Future of AI in Cybersecurity 18:16 Challenges and Recommendations for Organizations 30:54 Conclusion and Final Thoughts

High Performance Nursing with Liam Caswell
How Nursing Exploits High Performers (and What to Do Instead)

High Performance Nursing with Liam Caswell

Play Episode Listen Later Sep 5, 2025 17:46


Here's the truth nobody tells high-achieving nurses, the system doesn't reward you, it bleeds you dry. The harder you work, the more you're exploited. More shifts. More responsibility. No extra pay. No real recognition.In this raw and powerful solo episode, Liam Caswell exposes the curse of the high-performing nurse — and how years of survival-mode conditioning in nursing can quietly sabotage your future in business.Whether you're still at the bedside or building your business, if you're over-delivering, undercharging, or burnt out before you even start… this one's for you.You'll learn how to stop being a high performer for the system and start becoming one for yourself. Because when your nervous system is stuck in hustle-and-survive mode, no promotion, pivot, or business strategy will fix the burnout. That's an inside job.“Your excellence to cope has become your career prison.” It's time to break out.⏱ EPISODE TIMESTAMPS✔️[1:42] What you're gonna learn in this episode✔️[2:02] The dark truth about high-performing nurses✔️[3:28] Your ‘reward'? More shifts, more stress, no support✔️[5:44] How nursing wires your nervous system for survival✔️[7:45] Why you're stuck in prep mode (aka “business procrastination”)✔️[11:59] New nursepreneur? This is how you sabotage yourself without realising✔️[13:46] Real high performance isn't about doing moreFREE RESOURCES

Paul's Security Weekly
Lasagna DoS, AI Slop, Hacker Ultimatums - PSW #890

Paul's Security Weekly

Play Episode Listen Later Sep 4, 2025 124:36


In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The Salesloft breach TP-Link Zero Days US DoD using Russian software? The Lasagna DoS attack Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-890

Paul's Security Weekly (Podcast-Only)
Lasagna DoS, AI Slop, Hacker Ultimatums - PSW #890

Paul's Security Weekly (Podcast-Only)

Play Episode Listen Later Sep 4, 2025 124:36


In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The Salesloft breach TP-Link Zero Days US DoD using Russian software? The Lasagna DoS attack Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-890

Paul's Security Weekly (Video-Only)
Lasagna DoS, AI Slop, Hacker Ultimatums - PSW #890

Paul's Security Weekly (Video-Only)

Play Episode Listen Later Sep 4, 2025 124:36


In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The Salesloft breach TP-Link Zero Days US DoD using Russian software? The Lasagna DoS attack Show Notes: https://securityweekly.com/psw-890

Words of this Life
S.353 Building Capacity For Exploits

Words of this Life

Play Episode Listen Later Aug 31, 2025 81:36


Building Capacity For Exploits by Pastor Rohi Bright

Phaneroo Ministries International
S.353 Building Capacity For Exploits

Phaneroo Ministries International

Play Episode Listen Later Aug 31, 2025 81:36


Building Capacity For Exploits by Pastor Rohi Bright

Answers to Giant Questions
The Exploits of Enmerkar

Answers to Giant Questions

Play Episode Listen Later Aug 29, 2025 35:22


TJ and Kris begin a series of episodes exploring the biblical Nimrod by diving into his legendary background in ancient near eastern material, and his possible involvement in an ancient necromancy ritual.

Return To Tradition
Cardinal Dolan Exploits The Horrifying Story For Partisan Hackery

Return To Tradition

Play Episode Listen Later Aug 28, 2025 16:46


The media is already trying to bury yesterday's story from Minnesota while Cardinal Dolan sticks his foot in his mouth instead of highlighting the heroic sacrifice of one young man.Sources:https://www.returntotradition.orgorhttps://substack.com/@returntotradition1Contact Me:Email: return2catholictradition@gmail.comSupport My Work:Patreonhttps://www.patreon.com/AnthonyStineSubscribeStarhttps://www.subscribestar.net/return-to-traditionBuy Me A Coffeehttps://www.buymeacoffee.com/AnthonyStinePhysical Mail:Anthony StinePO Box 3048Shawnee, OK74802Follow me on the following social media:https://www.facebook.com/ReturnToCatholicTradition/https://twitter.com/pontificatormax+JMJ+#popeleoXIV #catholicism #catholicchurch #catholicprophecy#infiltration

Return To Tradition
Cardinal Dolan Exploits The Horrifying Story For Partisan Hackery

Return To Tradition

Play Episode Listen Later Aug 28, 2025 16:46


The media is already trying to bury yesterday's story from Minnesota while Cardinal Dolan sticks his foot in his mouth instead of highlighting the heroic sacrifice of one young man.Sources:https://www.returntotradition.orgorhttps://substack.com/@returntotradition1Contact Me:Email: return2catholictradition@gmail.comSupport My Work:Patreonhttps://www.patreon.com/AnthonyStineSubscribeStarhttps://www.subscribestar.net/return-to-traditionBuy Me A Coffeehttps://www.buymeacoffee.com/AnthonyStinePhysical Mail:Anthony StinePO Box 3048Shawnee, OK74802Follow me on the following social media:https://www.facebook.com/ReturnToCatholicTradition/https://twitter.com/pontificatormax+JMJ+#popeleoXIV #catholicism #catholicchurch #catholicprophecy#infiltration

CISO Tradecraft
#247 - What most leaders don't understand about AI (with Dave Lewis)

CISO Tradecraft

Play Episode Listen Later Aug 25, 2025 35:09 Transcription Available


In this episode of CISO Tradecraft, host G Mark Hardy engages in an insightful conversation with Dave Lewis, Global Advisory CISO from 1Password, about AI governance and its importance in cybersecurity. They discuss AI policy and its implications, the evolving nature of AI and cybersecurity, and the critical need for governance frameworks to manage AI safely and securely. The discussion delves into the visibility challenges, shadow AI, the role of credentials, and the importance of maintaining fundamental security practices amidst rapid technological advancements. They also touch on the potential risks associated with AI, the misconceptions about its impact on jobs, and the need for a balanced approach to leveraging AI in a beneficial manner while safeguarding against its threats. This episode provides valuable guidance for cybersecurity professionals and organizations navigating the complexities of AI governance. Chapters 00:00 Introduction to AI Governance 00:30 Guest Introduction: Dave Lewis 00:49 The Importance of AI Governance 01:42 Challenges in AI Implementation 03:20 AI in the Modern Enterprise 03:49 Shadow AI and Security Concerns 04:49 AI's Impact on Jobs and Industry 05:27 The Gartner Hype Cycle and AI 05:43 AI's Influence on the Stock Market 06:14 Historical Context of AI 06:32 AI and Credential Security 08:29 The Role of Governance in AI 12:47 The Future of AI and Security 18:36 Governance and Policy Recommendations 19:26 AI Governance and Ethical Concerns 20:01 AI Self-Preservation and Human Safety 20:18 Uncontrollable AI Applications 21:17 Vectors of AI Trouble 21:58 AI Hallucinations and Data Security 22:53 AI Vulnerabilities and Exploits 26:29 Deepfakes and AI Misuse 27:33 Historical Cybersecurity Incidents 29:04 Future of AI and Job Security 33:47 Managing AI Identities and Credentials 34:21 Conclusion and Final Thoughts

Cyber Security Headlines
Malicious Go module, new Mirai botnet, Silk Typhoon exploits cloud

Cyber Security Headlines

Play Episode Listen Later Aug 25, 2025 9:26


Malicious Go module steals credentials via Telegram Mirai-based botnet resurfaces targeting systems globally Silk Typhoon hackers exploit cloud trust to hack downstream customers Huge thanks to our sponsor, Prophet Security Ever feel like your security team is stuck in a loop of alert fatigue and manual investigations? Meet Prophet Security. Their Agentic AI SOC Platform automates the tedious stuff: triaging, investigating, and responding to alerts - so your analysts can focus on real threats. Think 10x faster response times and a smarter way to secure your business. Learn more at prophetsecurity.ai. Find the stories behind the headlines at CISOseries.com.

Victory Fellowship Church Podcast
Elephants 2025, Part 4: Pornography // Jamie Nunnally

Victory Fellowship Church Podcast

Play Episode Listen Later Aug 24, 2025 46:11


Pornography isn't just present in our culture—it's pervasive. The average age of first exposure is 11 for boys, and around 12–13 for girls. About 67% of men and 41% of women view porn at least occasionally. Even in the church, over half of practicing Christians admit to using it, and 67% of pastors have struggled with it—18% currently. The biggest issue? 82% of Christians say no one is helping them. This isn't just a "worldly" issue—it's a tsunami hitting the church. But porn thrives in silence. So, we need to talk about it honestly, embracing the "messy middle"—holding two truths in tension:Porn is an addictive sin that devastates families.Porn is a shortcut that numbs our God-given desires for pleasure and intimacy.1. Porn is an addictive sin.Scripture clearly calls out sexual immorality (porneia) as sin (Colossians 3:5). Porn objectifies people and becomes idolatry—worshiping creation over the Creator. It's not just spiritually harmful; it's mentally and emotionally addictive, rewiring the brain and damaging relationships (1 Cor. 6:18).How it devastates families:Hurts your family tree: Trauma and addiction can leave epigenetic footprints passed to future generations (Exodus 34:7).Creates unrealistic expectations: Porn fosters dissatisfaction with real-life partners and intimacy (Ecclesiastes 9:9).Harms children: Young girls wrestle with distorted self-worth, while boys absorb years of misinformation about sex before marriage.Exploits performers: Many in the industry suffer mental health issues and traumatic backgrounds. Watching porn often means consuming someone else's pain.2. Porn numbs God-given desires.God created us with desires for pleasure and intimacy, but porn offers counterfeit versions—pleasure without fulfillment, intimacy without connection (Proverbs 27:20). Porn silences but never satisfies. People don't view porn because they're bad, but because they've let it hijack their desires.Freedom is possible. The battle plan: Repent, Replace, and Relate.Repent – Turn from sin and toward God (Acts 3:19).Replace – Remove access to porn and renew your mind (Romans 12:2, Matthew 5:29). Married couples should embrace real intimacy (1 Corinthians 7:2-5).Relate – Build accountability with others (James 5:16) and deepen your walk with the Holy Spirit (Galatians 5:16). Don't deny your desires—let Jesus redeem them.SummaryPorn traffics in pleasure without purpose and intimacy without love. But Jesus offers real freedom—not just forgiveness, but power to overcome. You don't need a counterfeit when you can have the real thing: true love, intimacy, and freedom.Are you willing to follow Jesus into the messy middle?

Security Conversations
Zero-day reality check: iOS exploits, MAPP in China and the hack-back temptation

Security Conversations

Play Episode Listen Later Aug 22, 2025 152:15


Three Buddy Problem - Episode 59: Apple drops another emergency iOS patch and we unpack what that “may have been exploited” language really means: zero-click chains, why notifications help but forensics don't, and the uncomfortable truth that Lockdown Mode is increasingly the default for high-risk users. We connect the dots from ImageIO bugs to geopolitics, discuss who's likely using these exploits, why Apple's guidance stops short, and the practical playbook (ADP on, reboot often, reduce attack surface) that actually works. Plus, we debate Microsoft throttling MAPP access for Chinese vendors, the idea of “letters of marque” for cyber (outsourced offense: smart deterrent or Pandora's box?), and dissect two case studies that blur APT and crimeware: PipeMagic's CLFS zero-day and Russia-linked “Static Tundra” riding seven-year-old Cisco bugs. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).

Inside with Jen Psaki
Democrats in BATTLE MODE as Trump exploits servile Republicans

Inside with Jen Psaki

Play Episode Listen Later Aug 21, 2025 41:17


With Texas poised to pass a redistricting bill to help Donald Trump rig the midterm elections in his favor to retain control of Congress, Democrats are taking the fight to Trump. Trump's renewed engagement with Vladimir Putin on the war in Ukraine has made a new priority of the return of Ukrainian children stolen by Putin.

Ba'al Busters Broadcast
Exploits and Expulsions Ep 5 of In Black and White Coverage

Ba'al Busters Broadcast

Play Episode Listen Later Aug 21, 2025 208:23 Transcription Available


I want to thank all of you who take interest in these broadcasts. The topics are often heavy, and while I see myself as a historical analyst first and foremost, my Dad instincts compel me to discuss all things I perceive as potential threats to the well-being of my, and your family. I hope that through sharing this series, more people see this powerful cult of finance as a Mankind problem requiring a Mankind response. All good people from all walks of life must come together under a common, noble cause and protect the innocent. A world void of accountability leads to inescapable hell especially in the age of the Technocrats.This is the 2023 production and collaboration by Dave Gahary and Ayo Kimathi. To get the full BluRay go to:https://www.bannedbyamazon.com/product-page/in-black-and-whiteThis will b presented with commentary. There's a lot of negative and malicious media out there about Ayo and Dave. Use your own discernment and choose to reject the filtered lens of EVIL MURDERERS through which they demand you view reality.You Have to try the Sauce:https://SemperFryLLC.comGo to my site for the direct link to Dr. Monzo's formulated AZURE WELL whole food supplements. Use code BB5 for a discount!Pods & Exclusives AD-FREE! Just $5/mo https://patreon.com/c/DisguisetheLimitsSHOW FUND:https://givesendgo.com/BaalBustersBecome a supporter of this podcast: https://www.spreaker.com/podcast/ba-al-busters-broadcast--5100262/support.

Backup Central's Restore it All
Mr Robot Lessons: Cybersecurity in the Workplace

Backup Central's Restore it All

Play Episode Listen Later Aug 18, 2025 43:32


This episode examines cybersecurity in the workplace through the lens of Mr. Robot's "Exploits" episode, where social engineering takes center stage. Curtis Preston and Prasanna break down how Elliot infiltrates Steel Mountain data center using badge cloning, psychological manipulation, and fake identities.The hosts analyze real-world implications of these attacks, from coffee shop badge theft to exploiting lonely employees. They discuss critical gaps in physical security protocols and explain why cybersecurity in the workplace fails when organizations rely on single points of security. Key topics include visitor badge systems, tailgating prevention, security camera monitoring, and building a culture where employees feel empowered to challenge unauthorized access. The episode reveals how most workplace breaches happen through human exploitation rather than technical hacking, making employee training and robust security protocols critical for protecting sensitive data and systems.

Weird Economies presents
Fight Fight Fight with Jack Bratich

Weird Economies presents

Play Episode Listen Later Aug 18, 2025 76:02


In this episode, we discussed the concept of microfascism, which refers to everyday life practices, and intersubjective relations that establish power dynamics and form the organisation of desire. The yearning for and supplication to power is at work in everyone and must constantly be guarded against, for these are easily amenable to fascist organisations and movements. As the saying goes: “Kill the cop in your head!” We also discussed martial masculinity as it manifests in combat sports such as Mixed Martial Arts (MMA) and Ultimate Fighting Championship (UFC), as well as figures of such franchises such as Dana White, who is a close associate of Trump and many other fascist personalities.Jack Z. Bratich writes about the intersection of popular culture and political culture. He applies social and political theory to such topics as social movements, craft culture, patriarchal subjectivities, and the cultures of secrecy. He is professor of journalism and media studies at Rutgers University and author of On Microfascism: Gender, War, Death (Common Notions, 2022) and Conspiracy Panics: Political Rationality and Popular Culture (2008). His latest publication is “What Can a Body Do(om)?: Fratriarchy's Affects and the Capacities to Break Together” (2025) in Capacities to: Affect Up Against Fascism.Against the Fascist Game is the second season of The Exploits of Play, a podcast about games and capitalism. Join Max Haiven and Faye Harvey as they interview game designers, critical theorists and grassroots activists struggling with games to understand, confront and abolish the rising threat of fascism in our times. We ask questions including: how is the far-right using games as platforms for ideology, recruiting and violence, both close to home and around the world? How have vicious reactionary politics emerged from a form of capitalism where most people feel trapped in an unwinnable game? What do fascism and antifascism mean today? And what role, if any do play and games have in confronting the fascist threat and creating a new world? The Exploits of Play is a production of Weird Economies, a platform for exploring the intricacies and excesses of our economic imaginaries, in cooperation with RiVAL: The ReImagining Value Action Lab. Hosted on Acast. See acast.com/privacy for more information.

Jerusalem Channel
Thy Kingdom Come: When?

Jerusalem Channel

Play Episode Listen Later Aug 17, 2025 27:52


In this episode of Exploits, Christine Darg explores the prophetic significance of Israel in end-times narratives. With emphasis on biblical prophecies, she discusses the transition from the Church Age to the Messianic Kingdom and the restoration of Israel. The episode highlights the fulfillment of biblical promises, the resurgence of anti-Semitism, and the spiritual importance of supporting Israel. Christine also addresses viewers to understand the times through the lens of scripture.

Zion Impact Ministries
Alignment to Divine Concecrations for Kingdom Exploits - David Osei-Hwere #TransformationMount

Zion Impact Ministries

Play Episode Listen Later Aug 17, 2025 71:53


In this sermon, David shares a definition for consencration and talks about how it is critical in our journey as believers to fully accomplish God's will for our lives. Kindly bear with us for the sub-optimal audio quality. We are working to make some improvements

The People’s Show
Overrated/Underrated: Riccio's Scary Exploits

The People’s Show

Play Episode Listen Later Aug 13, 2025 20:52


Riccio, Janda, Dom, and Zach run through your overrated underrated submissions. The views and opinions expressed in this podcast are those of the hosts and guests and do not necessarily reflect the position of Rogers Media Inc. or any affiliate.

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, August 12th, 2025: Erlang OTP SSH Exploits (Palo Alto Networks); Winrar Exploits; Netscaler Exploits; OpenSSH Pushing PQ Crypto;

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Aug 12, 2025 6:52


Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of threat actors. The vulnerability allows for the creation of arbitrary files as the archive is extracted. https://thehackernews.com/2025/08/winrar-zero-day-under-active.html Citrix Netscaler Exploit Updates The Dutch Center for Cyber Security is updating its guidance on recent Citrix Netscaler attacks. Note that the attacks started before a patch became available, and attackers are actively hiding their tracks to make it more difficult to detect a compromise. https://www.ncsc.nl/actueel/nieuws/2025/07/22/casus-citrix-kwetsbaarheid https://www.bleepingcomputer.com/news/security/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/ OpenSSH Post Quantum Encryption Starting in version 10.1, OpenSSH will warn users if they are using quantum-unsafe algorithms https://www.openssh.com/pq.html

SC Church
Strength From Within: Gifts For Great Exploits - Pastor Denny Rodney Duron

SC Church

Play Episode Listen Later Aug 11, 2025 38:27


Welcome to SC Church Podcast! We're so glad you could join us. Today Pastor Denny Rodney Duron shared with us his message:“Strength From Within: Gifts For Great Exploits"

Valuetainment
"Absolutely Evil!" - Gay Registered Sex Offender EXPLOITS Loophole For Surrogate Birth

Valuetainment

Play Episode Listen Later Aug 7, 2025 25:50


A viral surrogacy video featuring a gay couple sparks outrage after one partner is revealed to be a registered sex offender. The PBD Podcast reacts with a heated debate on child safety, adoption laws, and the moral line between legality and trust in protecting our most vulnerable.

Mock and Daisy's Common Sense Cast
TX Dems Jet Off, Acosta Exploits a Dead Kid, & the Sydney Sweeney MAGA Moment | Chicks on the Right

Mock and Daisy's Common Sense Cast

Play Episode Listen Later Aug 5, 2025 69:53


Texas Democrats are back in the headlines — this time flaunting a $40 million jet while fleeing a redistricting vote like cowards. Governor Abbott isn't holding back, and neither are we. Meanwhile, Jim Acosta hits a new low by interviewing an AI version of a Parkland victim. Yes, seriously. Also in this episode: Trump enters the Sydney Sweeney firestorm, defending her viral ad as the Left tries to cancel her. MTG threatens to ditch the GOP, Nancy Mace gets called out for her past posts, and Boston's glitziest neighborhood is now flooded with addicts thanks to “free crack pipes.” You can't make this stuff up.SUPPORT OUR SPONSORS TO SUPPORT OUR SHOW!Stay hurricane-ready and be prepared for any emergency with ReadyWise. Visit https://ReadyWise.com and use promo code CHICKS10 for 10% off your entire purchase.Score 15% off with code CHICKS and give yourself that glow-up with the BON CHARGE Red Light Face Mask at https://BonCharge.com (It's self-care that literally lights up your face!)Stir up your routine with MUDWTR at https://mudwtr.com Use code CHICKS for up to 43% off, free shipping, and a FREE rechargeable frother!Upgrade your summer. Go to https://CozyEarth.com/CHICKS for up to 40% OFF including the Bubble Cuddle Blanket with code CHICKS. VISIT OUR WEBSITE DAILY!  https://chicksonright.com SUBSCRIBE TO OUR PODCAST: https://link.chtbl.com/BtHbvS8C?sid=youtube JOIN OUR SUPPORTER COMMUNITY ON LOCALS:  https://chicksontheright.locals.com/ JOIN OUR SUPER DOUBLE AWESOME SECRET BUT NOT SECRET EXCLUSIVE GROUP: https://www.facebook.com/groups/388315619071775 Subscribe to our email list: https://politics.chicksonright.com/subscribe/ GET OUR BOOK! https://www.amazon.com/dp/B08H5D3CF1/ref=cm_sw_r_cp_api_fabc_JdhQFbZ363CAY Venmo: @chicksonright Paypal: https://www.paypal.me/chicksonright Get exclusive Chicks merch here:  https://www.etsy.com/shop/InRealLifeCreations?ref=seller-platform-mcnav§ion_id=50399398 Even more Merch: https://shop.spreadshirt.com/chicksonright/ Thank you for the Superchats!  Watch live to donate and be recognized! Facebook:  Chicks on the RightFacebook Group:  Chicks on the RightTwitter, IG, Parler, Rumble:   @chicksonright

The Ricochet Audio Network Superfeed
Chicks on the Right: TX Dems Jet Off, Acosta Exploits a Dead Kid, & the Sydney Sweeney MAGA Moment

The Ricochet Audio Network Superfeed

Play Episode Listen Later Aug 5, 2025 69:53


Texas Democrats are back in the headlines — this time flaunting a $40 million jet while fleeing a redistricting vote like cowards. Governor Abbott isn't holding back, and neither are we. Meanwhile, Jim Acosta hits a new low by interviewing an AI version of a Parkland victim. Yes, seriously. Also in this episode: Trump enters […]

Kimmer Show
Jim Acosta Exploits Dead Child with AI for Gun Control Propaganda

Kimmer Show

Play Episode Listen Later Aug 5, 2025 7:05


Jim Acosta uses AI to interview a dead Parkland victim, pushing gun control in a disturbing political stunt. See omnystudio.com/listener for privacy information.

Sbfavorthinking Podcast
Ep. 310-Great Exploits:Inspirational Quote

Sbfavorthinking Podcast

Play Episode Listen Later Aug 5, 2025 9:49


What does it really mean to do great exploits? In this powerful episode, we explore the true definition of great exploits—bold, courageous actions that lead to extraordinary achievements. Drawing from historical, personal, and biblical examples like Daniel 11:32, you'll learn how deep faith, inner strength, and vision can empower you to rise above challenges and fulfill your purpose. Whether you're on a personal growth journey or building a legacy, this episode will inspire you to take bold steps toward greatness.Email: sbfavor@yahoo.comCash App $sbfavorVenmo  ⁨@SBFAVOR⁩ Paypal sblove47@gmail.com

The Morning Xtra
Jim Acosta Exploits Dead Child with AI for Gun Control Propaganda

The Morning Xtra

Play Episode Listen Later Aug 5, 2025 7:05


Jim Acosta uses AI to interview a dead Parkland victim, pushing gun control in a disturbing political stunt. Atlanta's ONLY All Conservative News & Talk Station.: https://www.xtra1063.com/See omnystudio.com/listener for privacy information.

The President's Daily Brief
July 31st, 2025: What Happens If Israel Annexes Gaza? & China Exploits U.S. Weakness

The President's Daily Brief

Play Episode Listen Later Jul 31, 2025 27:20


In this episode of The President's Daily Brief: Israeli Prime Minister Benjamin Netanyahu is expected to unveil a dramatic new proposal to his security cabinet: the annexation of large sections of the Gaza Strip. We'll walk through what the plan entails—and how history may offer clues about what comes next. A top former U.S. spy is warning that China sees vulnerabilities in America's defenses—and is moving aggressively to exploit them. Former President Donald Trump is threatening steep tariffs and penalties on India over its ongoing ties with Russia, adding new strain to the relationship. In today's Back of the Brief—The New York Times used a photo of an emaciated Gazan boy on its front page to spotlight hunger in Gaza. But there's just one problem: the boy had a serious pre-existing condition the paper failed to disclose. Now they've issued a correction. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. YouTube: youtube.com/@presidentsdailybrief Birch Gold: Text PDB to 989898 and get your free info kit on gold American Financing: Call American Financing today to find out how customers are saving an avg of $800/mo. 866-885-1881 or visit https://www.AmericanFinancing.net/PDB - NMLS 182334, https://nmlsconsumeraccess.org Learn more about your ad choices. Visit megaphone.fm/adchoices

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
SANS Stormcast Tuesday, July 29th, 2025:Parasitic Exploits; Cisco ISE Exploit; MyASUS Vuln

SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast

Play Episode Listen Later Jul 29, 2025 5:35


Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a blog detailing the exploit chain to obtain code execution as an unauthenticated user. https://www.zerodayinitiative.com/blog/2025/7/24/cve-2025-20281-cisco-ise-api-unauthenticated-remote-code-execution-vulnerability MyAsus Vulnerablity The MyAsus tool does not store its access tokens correctly, potentially providing an attacker with access to sensitive functions https://www.asus.com/content/security-advisory/

Multipolarista
How the USA exploits Europe, treating its 'allies' like vassals

Multipolarista

Play Episode Listen Later Jul 29, 2025 58:49


The one-sided trade agreement that Donald Trump imposed on the EU illustrates how the US empire exploits its "allies" in Europe as vassals to benefit the American oil/gas industry, Big Tech corporations, and the military-industrial complex. This did not start with Trump, but he has accelerated the vassalization of the European Union. Political economist Ben Norton explains. VIDEO: https://www.youtube.com/watch?v=lpf6ZeABP1I Topics 0:00 Intro 1:04 US empire doesn't have allies, only vassals 2:14 US-EU trade deal & tariffs 5:19 China defended itself in trade war 6:19 Ursula von der Leyen on US energy 7:28 (CLIP) Trump on US-EU trade deal 7:54 USA benefits 8:15 (CLIP) Trump: "the biggest of all the deals" 8:28 Europe gets nothing 9:11 (CLIP) US makes no concessions to EU 9:57 (CLIP) Trump on US fossil fuel exports 10:20 US gets everything, EU gets nothing 11:02 Vassalization of Europe 12:27 BRICS expansion 13:22 NATO Secretary General Mark Rutte 14:03 (CLIP) NATO chief calls Trump "daddy" 14:17 Trump addresses "daddy" comment 14:42 (CLIP) Trump: I'm NATO's "daddy" 15:03 Trump leaks humiliating text messages 16:26 Failure of EU "strategic autonomy" 17:18 NATO demands military spending at 5% of GDP 18:42 US military-industrial complex benefits 20:14 Paying imperial tribute 20:48 Replacing welfare state with warfare state 21:44 EU spending on education 22:08 EU spending on healthcare 22:33 Trump & MAGA take off the mask 23:26 VP JD Vance attacks Europe 23:40 Kissinger: "to be America's friend is fatal" 24:20 Trump boasts of ending Nord Stream 25:39 (CLIP) Trump: "I ended Nord Stream 2" 25:59 US targets European infrastructure 26:26 (CLIP) Trump: US wants to sell oil/gas 26:53 US attacks European "allies" 27:27 Sabotage of Nord Stream pipelines 28:05 Who blew up Nord Stream? 29:20 West opposed UN investigation 30:06 Polish official said US blew up Nord Stream 30:47 Historical amnesia 31:17 Why Germany wanted Nord Stream 32:34 (CLIP) Trump: Europe must buy US oil/gas 32:48 Trump pressured Angela Merkel on Russia 33:15 (CLIP) Trump: Europe must cut Russia ties 34:12 Trump sanctioned Nord Stream 34:55 USA seeks to divide Europe & Russia 35:39 Biden threatened Nord Stream 36:02 (CLIP) Biden: We will end Nord Stream 36:36 Bipartisan vassalage 37:30 US energy exports to Europe 38:08 EU imports of oil 39:25 EU imports of natural gas 39:56 EU imports of LNG 40:45 Climate change catastrophe 41:20 Germany re-opens coal plants 42:00 Germany's pro-war "Greens" 43:19 US imperial strategy: divide Europe 44:56 Imperialist Mackinder's heartland theory 45:28 US fears of Europe-Russia alliance 46:23 NATO's goal: keep US on top 47:24 Deindustrialization of Europe 47:59 EU attacks top trading partner China 48:40 Why are EU leaders Atlanticists? 49:01 EU leaders are literally crying 49:26 EU elites invest in US financial assets 51:57 US Big Tech corporations 52:35 Comprador bourgeoisie 53:48 Western oligarchies 55:00 US empire fears Eurasian integration 56:15 Trump tries to divide Russia & China 56:33 Europe is at a geopolitical crossroads 58:36 Outro