POPULARITY
Categories
Trump's 15% tariffs and the extra dangers to our pharma and semiconductor exports, how the national finances and the forthcoming budget will be affected. And Dermot Desmond's views on abandoning the Metro are assessed. Brought to you by Greenman OPENPTP+To enjoy early access, ad-free listening and a weekly bonus episode, sign up at pathtopowerpodcast.comGet in touch: mail@pathtopowerpodcast.comFollow the hosts:Matt: https://twitter.com/cooper_mhttps://www.instagram.com/mattcooperlastword/Ivan: https://www.instagram.com/officialivanyates/ Hosted on Acast. See acast.com/privacy for more information.
A viral surrogacy video featuring a gay couple sparks outrage after one partner is revealed to be a registered sex offender. The PBD Podcast reacts with a heated debate on child safety, adoption laws, and the moral line between legality and trust in protecting our most vulnerable.
Texas Democrats are back in the headlines — this time flaunting a $40 million jet while fleeing a redistricting vote like cowards. Governor Abbott isn't holding back, and neither are we. Meanwhile, Jim Acosta hits a new low by interviewing an AI version of a Parkland victim. Yes, seriously. Also in this episode: Trump enters the Sydney Sweeney firestorm, defending her viral ad as the Left tries to cancel her. MTG threatens to ditch the GOP, Nancy Mace gets called out for her past posts, and Boston's glitziest neighborhood is now flooded with addicts thanks to “free crack pipes.” You can't make this stuff up.SUPPORT OUR SPONSORS TO SUPPORT OUR SHOW!Stay hurricane-ready and be prepared for any emergency with ReadyWise. Visit https://ReadyWise.com and use promo code CHICKS10 for 10% off your entire purchase.Score 15% off with code CHICKS and give yourself that glow-up with the BON CHARGE Red Light Face Mask at https://BonCharge.com (It's self-care that literally lights up your face!)Stir up your routine with MUDWTR at https://mudwtr.com Use code CHICKS for up to 43% off, free shipping, and a FREE rechargeable frother!Upgrade your summer. Go to https://CozyEarth.com/CHICKS for up to 40% OFF including the Bubble Cuddle Blanket with code CHICKS. VISIT OUR WEBSITE DAILY! https://chicksonright.com SUBSCRIBE TO OUR PODCAST: https://link.chtbl.com/BtHbvS8C?sid=youtube JOIN OUR SUPPORTER COMMUNITY ON LOCALS: https://chicksontheright.locals.com/ JOIN OUR SUPER DOUBLE AWESOME SECRET BUT NOT SECRET EXCLUSIVE GROUP: https://www.facebook.com/groups/388315619071775 Subscribe to our email list: https://politics.chicksonright.com/subscribe/ GET OUR BOOK! https://www.amazon.com/dp/B08H5D3CF1/ref=cm_sw_r_cp_api_fabc_JdhQFbZ363CAY Venmo: @chicksonright Paypal: https://www.paypal.me/chicksonright Get exclusive Chicks merch here: https://www.etsy.com/shop/InRealLifeCreations?ref=seller-platform-mcnav§ion_id=50399398 Even more Merch: https://shop.spreadshirt.com/chicksonright/ Thank you for the Superchats! Watch live to donate and be recognized! Facebook: Chicks on the RightFacebook Group: Chicks on the RightTwitter, IG, Parler, Rumble: @chicksonright
Texas Democrats are back in the headlines — this time flaunting a $40 million jet while fleeing a redistricting vote like cowards. Governor Abbott isn't holding back, and neither are we. Meanwhile, Jim Acosta hits a new low by interviewing an AI version of a Parkland victim. Yes, seriously. Also in this episode: Trump enters […]
Jim Acosta uses AI to interview a dead Parkland victim, pushing gun control in a disturbing political stunt. See omnystudio.com/listener for privacy information.
What does it really mean to do great exploits? In this powerful episode, we explore the true definition of great exploits—bold, courageous actions that lead to extraordinary achievements. Drawing from historical, personal, and biblical examples like Daniel 11:32, you'll learn how deep faith, inner strength, and vision can empower you to rise above challenges and fulfill your purpose. Whether you're on a personal growth journey or building a legacy, this episode will inspire you to take bold steps toward greatness.Email: sbfavor@yahoo.comCash App $sbfavorVenmo @SBFAVOR Paypal sblove47@gmail.com
Jim Acosta uses AI to interview a dead Parkland victim, pushing gun control in a disturbing political stunt. Atlanta's ONLY All Conservative News & Talk Station.: https://www.xtra1063.com/See omnystudio.com/listener for privacy information.
We've said it before and we'll say it again. Winning doesn't have to be pretty. Good teams find a way to win and off the boot of Munster to find a high flying Xavier Coates was their way to victory. A scrappy, error ridden, ill disciplined display kept the Eels to close for comfort. Stormy Daniel reviews the win over the Eels, highlighting the issues plaguing the Storm's inability to find their best football yet in Season 2025. What's making Storm news, Throwback Team List, your listener questions and TLT - who's in, who's out for the blockbuster against the resurgent Brisbane Broncos. Hosted on Acast. See acast.com/privacy for more information.
Le Tour de France Femmes est à l'honneur dans le 48e épisode de notre podcast Radio Peloton. L'occasion de revenir sur le triomphe de Pauline Ferrand-Prévot mais aussi sur le Tour difficile de Lotte Kopecky. Il est aussi question de la victoire de Giulio Ciccone à la Clasica San Sebastian.
This sermon dives deep into the heart of consecration, anchored in 1 Peter 2:9 and other foundational scriptures. Every believer is set apart for a purpose — but consecration isn't just a spiritual title, it's a daily decision. From Acts 20:32 to Exodus 28:1–3, we explore how sanctification is our responsibility, and how true surrender and separation position us for power, glory, and divine usefulness. You'll learn that consecration is the root that sustains your blessing and secures your harvest. Without it, stagnation and obscurity follow. Discover how to yield your will, walk in discipline, and resist the subtle pull of the world (1 John 2:15–16) — because when God becomes your only desire, nothing else compares.
Dans cette édition :Débat autour de l'expulsion d'une étudiante palestinienne en France suite à ses publications antisémites, malgré son statut de réfugié accordé par l'OFPRA.Sanctions américaines contre la Russie et report de la mise en place de nouveaux droits de douane, suscitant l'insatisfaction du Premier ministre français.Nouvelles technologies déployées pour sécuriser les patrouilleurs autoroutiers face aux automobilistes ne respectant pas les corridors de sécurité.Exploits sportifs français avec les victoires de Léon Marchand aux Championnats du monde de natation et de Yohann Ndoye Brouard en demi-finale du 200m nage libre.Étape difficile pour les coureuses du Tour de France Femmes avec l'entrée dans les Alpes.Notre équipe a utilisé un outil d'Intelligence artificielle via les technologies d'Audiomeans© pour accompagner la création de ce contenu écrit.Hébergé par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.
Dans cette édition :Débat autour de l'expulsion d'une étudiante palestinienne en France suite à ses publications antisémites, malgré son statut de réfugié accordé par l'OFPRA.Sanctions américaines contre la Russie et report de la mise en place de nouveaux droits de douane, suscitant l'insatisfaction du Premier ministre français.Nouvelles technologies déployées pour sécuriser les patrouilleurs autoroutiers face aux automobilistes ne respectant pas les corridors de sécurité.Exploits sportifs français avec les victoires de Léon Marchand aux Championnats du monde de natation et de Yohann Ndoye Brouard en demi-finale du 200m nage libre.Étape difficile pour les coureuses du Tour de France Femmes avec l'entrée dans les Alpes.Notre équipe a utilisé un outil d'Intelligence artificielle via les technologies d'Audiomeans© pour accompagner la création de ce contenu écrit.Hébergé par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.
In this episode of The President's Daily Brief: Israeli Prime Minister Benjamin Netanyahu is expected to unveil a dramatic new proposal to his security cabinet: the annexation of large sections of the Gaza Strip. We'll walk through what the plan entails—and how history may offer clues about what comes next. A top former U.S. spy is warning that China sees vulnerabilities in America's defenses—and is moving aggressively to exploit them. Former President Donald Trump is threatening steep tariffs and penalties on India over its ongoing ties with Russia, adding new strain to the relationship. In today's Back of the Brief—The New York Times used a photo of an emaciated Gazan boy on its front page to spotlight hunger in Gaza. But there's just one problem: the boy had a serious pre-existing condition the paper failed to disclose. Now they've issued a correction. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. YouTube: youtube.com/@presidentsdailybrief Birch Gold: Text PDB to 989898 and get your free info kit on gold American Financing: Call American Financing today to find out how customers are saving an avg of $800/mo. 866-885-1881 or visit https://www.AmericanFinancing.net/PDB - NMLS 182334, https://nmlsconsumeraccess.org Learn more about your ad choices. Visit megaphone.fm/adchoices
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Parasitic SharePoint Exploits We are seeing attacks against SharePoint itself and attempts to exploit backdoors left behind by attackers. https://isc.sans.edu/diary/Parasitic%20Sharepoint%20Exploits/32148 Cisco ISE Vulnerability Exploited A recently patched vulnerability in Cisco ISE is now being exploited. The Zero Day Initiative has released a blog detailing the exploit chain to obtain code execution as an unauthenticated user. https://www.zerodayinitiative.com/blog/2025/7/24/cve-2025-20281-cisco-ise-api-unauthenticated-remote-code-execution-vulnerability MyAsus Vulnerablity The MyAsus tool does not store its access tokens correctly, potentially providing an attacker with access to sensitive functions https://www.asus.com/content/security-advisory/
The one-sided trade agreement that Donald Trump imposed on the EU illustrates how the US empire exploits its "allies" in Europe as vassals to benefit the American oil/gas industry, Big Tech corporations, and the military-industrial complex. This did not start with Trump, but he has accelerated the vassalization of the European Union. Political economist Ben Norton explains. VIDEO: https://www.youtube.com/watch?v=lpf6ZeABP1I Topics 0:00 Intro 1:04 US empire doesn't have allies, only vassals 2:14 US-EU trade deal & tariffs 5:19 China defended itself in trade war 6:19 Ursula von der Leyen on US energy 7:28 (CLIP) Trump on US-EU trade deal 7:54 USA benefits 8:15 (CLIP) Trump: "the biggest of all the deals" 8:28 Europe gets nothing 9:11 (CLIP) US makes no concessions to EU 9:57 (CLIP) Trump on US fossil fuel exports 10:20 US gets everything, EU gets nothing 11:02 Vassalization of Europe 12:27 BRICS expansion 13:22 NATO Secretary General Mark Rutte 14:03 (CLIP) NATO chief calls Trump "daddy" 14:17 Trump addresses "daddy" comment 14:42 (CLIP) Trump: I'm NATO's "daddy" 15:03 Trump leaks humiliating text messages 16:26 Failure of EU "strategic autonomy" 17:18 NATO demands military spending at 5% of GDP 18:42 US military-industrial complex benefits 20:14 Paying imperial tribute 20:48 Replacing welfare state with warfare state 21:44 EU spending on education 22:08 EU spending on healthcare 22:33 Trump & MAGA take off the mask 23:26 VP JD Vance attacks Europe 23:40 Kissinger: "to be America's friend is fatal" 24:20 Trump boasts of ending Nord Stream 25:39 (CLIP) Trump: "I ended Nord Stream 2" 25:59 US targets European infrastructure 26:26 (CLIP) Trump: US wants to sell oil/gas 26:53 US attacks European "allies" 27:27 Sabotage of Nord Stream pipelines 28:05 Who blew up Nord Stream? 29:20 West opposed UN investigation 30:06 Polish official said US blew up Nord Stream 30:47 Historical amnesia 31:17 Why Germany wanted Nord Stream 32:34 (CLIP) Trump: Europe must buy US oil/gas 32:48 Trump pressured Angela Merkel on Russia 33:15 (CLIP) Trump: Europe must cut Russia ties 34:12 Trump sanctioned Nord Stream 34:55 USA seeks to divide Europe & Russia 35:39 Biden threatened Nord Stream 36:02 (CLIP) Biden: We will end Nord Stream 36:36 Bipartisan vassalage 37:30 US energy exports to Europe 38:08 EU imports of oil 39:25 EU imports of natural gas 39:56 EU imports of LNG 40:45 Climate change catastrophe 41:20 Germany re-opens coal plants 42:00 Germany's pro-war "Greens" 43:19 US imperial strategy: divide Europe 44:56 Imperialist Mackinder's heartland theory 45:28 US fears of Europe-Russia alliance 46:23 NATO's goal: keep US on top 47:24 Deindustrialization of Europe 47:59 EU attacks top trading partner China 48:40 Why are EU leaders Atlanticists? 49:01 EU leaders are literally crying 49:26 EU elites invest in US financial assets 51:57 US Big Tech corporations 52:35 Comprador bourgeoisie 53:48 Western oligarchies 55:00 US empire fears Eurasian integration 56:15 Trump tries to divide Russia & China 56:33 Europe is at a geopolitical crossroads 58:36 Outro
Chaque jour, retrouvez les journaux de la rédaction d'Europe 1 pour faire le tour de l'actu.Distribué par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.
Chaque jour, retrouvez les journaux de la rédaction d'Europe 1 pour faire le tour de l'actu.Distribué par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.
Chaque jour, retrouvez les journaux de la rédaction d'Europe 1 pour faire le tour de l'actu.Distribué par Audiomeans. Visitez audiomeans.fr/politique-de-confidentialite pour plus d'informations.
Ce mardi 22 juillet, le peloton s'attaque au terrible mont Ventoux. Une ascension redoutée, symbole de la part de risque et de dépassement dans le cyclisme. En 1967, Tom Simpson y avait trouvé la mort… un rappel brutal que ce sport peut parfois coûter la vie. Mention légales : Vos données de connexion, dont votre adresse IP, sont traités par Radio Classique, responsable de traitement, sur la base de son intérêt légitime, par l'intermédiaire de son sous-traitant Ausha, à des fins de réalisation de statistiques agréées et de lutte contre la fraude. Ces données sont supprimées en temps réel pour la finalité statistique et sous cinq mois à compter de la collecte à des fins de lutte contre la fraude. Pour plus d'informations sur les traitements réalisés par Radio Classique et exercer vos droits, consultez notre Politique de confidentialité.Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations.
In this episode we talked about how we got from Gamergate to the far right fascist politics we're seeing unleashed today. Gamergate refers to a strange phenomenon that occurred in 2014, where a group of video game fans used online platforms - from Reddit to 4Chan to Craigslist - to create a harassment campaign against feminist gamemakers and critics, making tactics like doxxing and shitposting widespread. Gamergate is a signature moment in the ascendency of the new far right. We spoke with Adrienne about how Silicon Valley and its economic framework gave rise to the platforms implicated in fascist movements like Gamergate; whether we are embroiled in the normalisation of dark play; and what the Left should be doing in the face of our servitude to privatised digital infrastructure.Adrienne Massanari is an Associate Professor at the School of Communication at American University and affiliate faculty with the AU Games Center. Her research interests include digital culture, platform politics, game studies, pop culture, and gender and race online. Her most recent book, "Gaming Democracy: How Silicon Valley Leveled Up the Far Right" (MIT Press, 2024), discusses the connections between the far right, Silicon Valley, and gaming culture. She is also the author of "Participatory Culture, Community, and Play: Learning from Reddit" (Peter Lang, 2015).Against the Fascist Game is the second season of The Exploits of Play, a podcast about games and capitalism. Join host Max Haiven and producer Faye Harvey as they interview game designers, critical theorists and grassroots activists struggling with games to understand, confront and abolish the rising threat of fascism in our times. We ask questions including: how is the far-right around the world using games as platforms for ideology, recruiting and violence, both close to home and around the world? How have vicious reactionary politics emerged from a form of capitalism where most people feel trapped in an unwinnable game? What do fascism and antifascism mean today? And what role, if any do play and games have in confronting the fascist threat and creating a new world? The Exploits of Play is a production of Weird Economies, a platform for exploring the intricacies and excesses of our economic imaginaries, in cooperation with RiVAL: The ReImagining Value Action Lab. Hosted on Acast. See acast.com/privacy for more information.
Managed service providers (MSPs) are currently facing unprecedented pressure from clients regarding cybersecurity, with a significant increase in expectations for MSPs to manage their cybersecurity infrastructure. A recent survey revealed that 84% of MSPs report their clients now expect them to handle cybersecurity end-to-end, a notable rise from 65% the previous year. This shift comes as MSPs themselves are under increased scrutiny, with 77% reporting heightened oversight of their security practices. The growing concern over emerging threats, particularly those related to artificial intelligence, has further complicated the landscape, as MSPs find themselves caught between rising client demands and a lack of accountability from cybersecurity vendors.In a related development, a fraudulent impersonator has been using artificial intelligence to mimic the voice and writing style of U.S. Secretary of State Marco Rubio, successfully contacting several high-level officials to manipulate them for sensitive information. This incident highlights the vulnerabilities in secure communication channels and the ease with which attackers can exploit lax data security among government officials. The FBI has issued warnings about ongoing malicious messaging campaigns that utilize AI-generated voice messaging, emphasizing the need for enhanced verification protocols in executive communications.Additionally, attackers have been exploiting Microsoft 365's direct send feature to launch phishing attacks, impacting over 70 organizations. This method allows attackers to send emails that appear to come from legitimate internal addresses, bypassing traditional security measures. Research indicates that conventional phishing awareness training is largely ineffective, with many employees failing to recognize phishing attempts even after training. The study suggests a shift towards interactive training methods, which have proven more effective in reducing the likelihood of falling victim to such scams.Ingram Micro has begun restoring customer ordering capabilities following a ransomware attack that temporarily disabled its systems, but the company's lack of communication during the crisis has raised concerns among partners. The incident serves as a case study in breach communication, highlighting the importance of transparency and effective communication in maintaining trust. Meanwhile, Kaseya has expanded its community investment with the Technology Marketing Toolkit, aimed at enhancing resources for MSPs. However, questions remain about the potential cultural clash and the impact on the independence of the Toolkit's offerings within Kaseya's larger ecosystem. Four things to know today 00:00 MSPs Face Rising Cybersecurity Pressure as Clients Demand Full Protection and Vendors Sidestep Shared Risk04:25 AI Deepfake Impersonates Secretary of State in Sophisticated Attack, Exposing Risks for Executive Security09:17 Ingram Micro Begins System Restoration After Ransomware Attack, But Silence Frustrates12:07 Robin Robins Sells Technology Marketing Toolkit; Joins Kaseya as Strategic Advisor This is the Business of Tech. Supported by: https://getnerdio.com/nerdio-manager-for-msp/ All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
In this episode of Hashtag Trending, host Jim Love covers a range of topics: an increase in copper theft leading to phone and internet outages in North America, allegations against Uber's hidden algorithm for boosting profits by raising fares and cutting driver pay, and a new technique called 'info flood' to trick AI chatbots into providing dangerous information by using academic jargon. The episode explores the implications of these issues and the ongoing challenges for companies and consumers. 00:00 Introduction and Headlines 00:17 Copper Theft Crisis 03:12 Uber's Algorithm Controversy 06:25 Tricking AI with Academic Jargon 07:58 Conclusion and Contact Information
You've had to wait, but we know you won't complain ... because this week we're talkin' bout one of the greatest garage tunes ever - "No Reason to Complain" by The Alarm Clocks. A song of no-'count teenage alienation, and man, it swings! Not many noticed, though - until Tim Warren brought it to the people on Back From the Grave, and then The Lyres covered the tune in '86 and it's cool and Cramps-y. 3 out of 5 is The Woggles from 1990, which sounds great but the vocals might register a complaint or two. in '93 Gaul's Thee Gloomies authored a wonderfully snotty version with tons of reverb. And in 2017, Winnipeg's The Exploits made it weird again with neurotic vocals and organ. Moon over Parma tonight!!
Pas de répis pour nos Grandes Gueules du Sport, ils passent la seconde ! L'une des grosses actus sportives décryptée par nos GG.
Analyse, reportage, décorticage : les GG vous expliquent le gros dossier de la semaine !
In the latest ESET Research Podcast, Aryeh Goretsky and Rene Holt dive into key findings from the APT Activity Report. UnsolicitedBooker, a China-aligned group, showcased relentless persistence by repeatedly attempting to compromise the same organization for several years with its MarsSnake backdoor. Meanwhile, tool-sharing among China-aligned actors like Worok continues to blur attribution, with overlapping activities involving groups such as LuckyMouse and TA428. On the Russia-aligned front, Sednit expanded Operation RoundPress to exploit multiple webmail platforms, Gamaredon kept up its relentless obfuscation efforts in Ukraine, and Sandworm unleashed its ZEROLOT wiper again, erasing critical files of its victims. Aryeh and Rene also discuss the financial schemes of North Korea-aligned groups and the noisy yet coordinated efforts of Iran-aligned actors. Listen to the full episode or download the report on WeLiveSecurity.com. Host: Aryeh Goretsky, ESET Distinguished Researcher Guest: René Holt, Security Awareness Specialist Read more at WeLiveSecurity.com and @ESETresearch on Twitter APT Activity Report Q1 2025
In this episode of 'Cybersecurity Today,' host Jim Love discusses urgent cybersecurity threats and concerns. Cisco has issued emergency patches for two maximum severity vulnerabilities in its Identity Services Engine (ISE) that could allow complete network takeover; organizations are urged to update immediately. A popular WordPress theme, Motors, has a critical vulnerability leading to mass exploitation and unauthorized admin account creation. A new ransomware group, Dire Wolf, has emerged, targeting manufacturing and technology sectors with sophisticated double extortion tactics. Lastly, an Accenture report reveals a dangerous gap between executive confidence and actual AI security preparedness, suggesting most major companies are not ready to handle AI-driven threats. The episode emphasizes the urgent need for immediate action and heightened awareness in the cybersecurity landscape. 00:00 Introduction and Headlines 00:26 Cisco's Critical Security Flaws 03:06 WordPress Theme Vulnerability Exploitation 05:57 Dire Wolf Ransomware Group Emerges 08:27 Accenture Report on AI Security Overconfidence 11:00 Conclusion and Upcoming Schedule
In this edition of Exploits, Christine Darg reviews the extraordinary efforts of an Orthodox Jewish scholar in Jerusalem who seeks to exonerate and reclaim Jesus by addressing historical and theological tensions between Judaism and Christianity. Prophetic actions include the call for a symbolic retrial of Jesus and a Pinyon HaBen ceremony to symbolically welcome Jesus back into the Jewish fold.
The Ghosts of K'aresh has been revealed. The FAZ crew looks at the highlights of what is coming in The War Within's next major patch.
Parents and grandparents have unique challenges in our End-Time technological age but the Lord's promises are sure. Christine Darg tackles this big topic in this edition of Exploits.
Host David Shipley discusses several critical cybersecurity incidents and developments. WestJet, Canada's second-largest airline, faced a cybersecurity breach impacting its mobile app and internal systems. The airline is working with law enforcement to investigate while emphasizing the integrity of its flight operations. Additionally, the Anubis ransomware has evolved, now incorporating a file-wiping function to heighten victim pressure and destruction. The episode also covers a novel malware campaign exploiting Discord's vanity invite system to deliver remote access trojans and info stealers, highlighting platform trust vulnerabilities. Lastly, a significant multi-hour Google Cloud outage caused by an API quota misconfiguration affected numerous services globally, emphasizing the fragility of our interconnected digital infrastructure. The episode underscores the need for robust disaster recovery plans and cautious digital practices. 00:00 Introduction and Overview 00:30 WestJet Cybersecurity Incident 02:15 Anubis Ransomware Evolution 05:35 Discord Vanity Link Hijack 08:35 Google Cloud Outage 10:50 Conclusion and Final Thoughts
#288th for 12nd June, 2025 or 3311! (33-Oh-Leven, not Oh-Eleven, OH-Leven)http://loosescrewsed.comJoin us on discord! And check out the merch store! PROMO CODEShttps://discord.gg/3Vfap47ReaSupport us on Patreon: https://www.patreon.com/LooseScrewsEDSquad Update: PowerPlay Update: - Cycle 33 Fdev recognizes exploit in PowerplaySpecific to Settlement DataWill rollback systems affectedWe won Djinaura! We'll have to see how Antal respondsWolf 10 is the next acquisition targetNiceygy's Power Points - https://elite.niceygy.net/powerpointsFind out more in the LSN-powerplay-hub forum channel.Galnet Update: https://community.elitedangerous.com/Imperial Forces Target Delaine FlagshipNew CG with seeker FSD interrupt missileDev News: Frontier financials: Elite up 75% over yearIssue with power CZs acknowledged?PP exploit being used to snipe major systems acknowledgedPower data paused until next week; rollbackDiscussion:Cheats, Exploits, and BugsCommunity Corner:upvote this and add your voice. It's like 27 weeks in. That's at least 25 weeks late on the fix. The issue has expired and been reposted more than once. Make them pay attention. https://issues.frontierstore.net/issue-detail/70594
POWER FOR TODAY is intended to equip the believers with the supernatural dimension of God, through the teaching of the unadulterated word of God
In this episode of Cybersecurity Today, host David Shipley delves into alarming developments in the cybersecurity landscape. The FBI has flagged a massive malware campaign named Bad Box 2.0, which has compromised 1 million consumer devices globally, turning them into residential proxies. Additionally, a new variant of the Mirai malware is targeting DVR devices via a critical vulnerability. Meanwhile, criminals are shifting their operations from bulletproof hosts to harder-to-trace VPNs and residential proxy networks. The episode also covers urgent calls for post-quantum cryptography readiness amidst looming quantum computing threats, alongside a significant policy shift in the US. President Trump has signed an executive order dismantling former President Biden's extensive cybersecurity initiatives, including efforts focused on AI and quantum cryptography. These regulatory rollbacks emphasize minimal federal oversight and leave long-term digital defense strategies in question. 00:00 Introduction and Major Headlines 00:32 FBI Warns About Bad Box 2.0 Botnet 02:47 DVR Botnet Threats and Exploits 03:59 Shift in Cybercriminal Tactics 05:33 Quantum Computing and Encryption Concerns 07:08 Trump's Cybersecurity Policy Overhaul 11:36 Conclusion and Final Thoughts
POWER FOR TODAY is intended to equip the believers with the supernatural dimension of God, through the teaching of the unadulterated word of God.
A life of exploits requires deep knowledge of God (Col. 1:10) and fruitfulness in every good work (John 15:2), built on unwavering diligence (Prov. 22:29) and excellence like Daniel (Dan. 6:3). Those who live by God's principles (Luke 4:16) and cultivate virtue, temperance (1 Cor. 6:12), and patience (Prov. 25:28) stand out. There are 7 key ways to do exploits: consistency (2 Pet. 1:1–8), discipline, virtue, knowledge, self-control, perseverance, and godliness. Without these, like Reuben (Gen. 49:3–4), greatness slips away. True impact demands living by godly customs—not doing what's right in our own eyes (Judg. 17:6).
POWER FOR TODAY is intended to equip the believers with the supernatural dimension of God, through the teaching of the unadulterated word of God.
After years of grassroots exploration in Newfoundland, Exploits is shifting its focus to resource-backed growth with the acquisition of four gold projects across Ontario, Quebec, and Newfoundland, totaling approximately 680,000 ounces of gold.Jessop explains why the company is prioritizing ounces in the ground at a time when gold prices are rising and investor appetite is returning to hard assets. With new option agreements in hand and a $4 million treasury, Exploits has moved quickly to assemble a portfolio of advanced-stage assets with immediate exploration upside. “We're providing immediate exposure to our shareholders for gold moving even higher,” Jessop says, outlining the rationale behind this strategic pivot.The company's Ontario flagship is the Hawkins Project, located in a Hemlo-style geological setting with a current inferred resource of 328,000 oz at 1.65 g/t Au, most of it within 200 meters of surface. Jessop describes the project as “tremendously underexplored at depth,” drawing comparisons to how Hemlo transformed from a modest deposit into a 20Moz district through deeper drilling. With $2.4M in assessment credits and $10M in prior exploration, Hawkins offers a low-cost path to potential resource expansion.In Quebec, Exploits acquired three properties—Benoist, Wilson, and Fenton—from Cartier Resources. Benoist brings a historical resource of ~240,000 oz, while Wilson and Fenton offer high-grade drill hits, visual gold, and near-term discovery potential. Located near major mining infrastructure in the Abitibi Greenstone Belt, these assets provide regional diversification and optionality in one of the world's most prolific gold camps.Jessop emphasizes the company's disciplined capital strategy. Instead of diluting shareholders to chase speculative discoveries, Exploits will use a “rate-and-rank” system to prioritize drilling targets based on cost-efficiency and potential return. The first steps include securing permits, refining targets, and focusing early drilling on shallow zones that can quickly add value.The interview also covers Exploits' relationship with New Found Gold, whose 2Moz Queensway Project borders Exploits' Newfoundland claims. While not currently the focus of immediate spending, Jessop highlights the upside potential of these assets should regional consolidation occur. “New Found has always been our big brother in the area,” he says, hinting at long-term collaboration possibilities.If you're following emerging gold developers, this interview offers insight into how a small-cap explorer is adapting to current market conditions, de-risking its asset base, and positioning for potential rerating as new ounces are added.
Fred Fugen, l'une des plus grandes figures mondiales de la chute libre, est venu témoigner sur Legend. Dans sa carrière, il totalise notamment plus de 20 000 sauts en parachute. Il a pu voler en wingsuit dans les plus beaux endroits du monde et même voler avec des ailes en carbone munies de mini-réacteurs. Il se livre aussi sur le drame de sa vie : la perte de son meilleur ami, décédé lors d'un saut en Jetman.Retrouvez l'interview complète sur YouTube ➡️ https://youtu.be/V1Z6XkzOhB4Pour toutes demandes de partenariats : legend@influxcrew.comRetrouvez-nous sur tous les réseaux LEGEND !Facebook : https://www.facebook.com/legendmediafrInstagram : https://www.instagram.com/legendmedia/TikTok : https://www.tiktok.com/@legendTwitter : https://twitter.com/legendmediafrSnapchat : https://t.snapchat.com/CgEvsbWV Hébergé par Acast. Visitez acast.com/privacy pour plus d'informations.
I'll show you how to spot and exploit the 10 most common and costly microstakes and low stakes poker leaks.Get the 4-page PDF, "How to Exploit the Top 10 Preflop Leaks #542": https://www.smartpokerstudy.com/pod542YouTube Video: https://www.smartpokerstudy.com/YouTube542
"When a leaky pipe creates a water stain on the wall at Paddy's that resembles the likeness of the Virgin Mary, the gang argues over the best way to exploit their little 'miracle'." -Original Air Date: 7/27/2006- This week we're talking about The Gang Exploits a Miracle, the debut of Matthew Mara aka Rickety Cricket, the propaganda you won't fall for and Faith + 1. This is No Hugging, No Learning, the show about one thing...watching It's Always Sunny in Philadelphia for the first time. Want more NHNL? Next week's episode drops early on Patreon! You can now join the It's a Hyundai tier for FREE for the first 7 days, and then just $5/month after that. You'll get every episode one week early with all of the extra content that we usually clip out of each release and movie reviews from the Seinfeld Extended Universe. Join Us at patreon.com/nohugging As a reminder, don't sign up for this inside the Patreon app - use a web browser on your phone or computer! You will be charged more for signing up inside the app (and that extra money does NOT go to us) Wanna start your own podcast? Do it with Libsyn and get up to 2 months free podcasting service with our Libsyn code HUGGING. Get a FREE No Hugging, No Learning sticker by giving us a 5 star rating and a written review wherever you listen to this! Just be sure to send us your address! Email us: nohuggingnolearningshow@gmail.com Follow us! @nohugging on X @nohugging_nolearning on Instagram @nohugging.bsky.social on Bluesky Music: "The Gang Gets Trapped" by Reed Streets
POWER FOR TODAY is intended to equip the believers with the supernatural dimension of God, through the teaching of the unadulterated word of God.
Link to episode page This week's Cyber Security Headlines – Week in Review is hosted by Rich Stroffolino with guest Steve Knight, former CISO, Hyundai Capital America Thanks to our show sponsor, ThreatLocker ThreatLocker® is a global leader in Zero Trust endpoint security, offering cybersecurity controls to protect businesses from zero-day attacks and ransomware. ThreatLocker operates with a default deny approach to reduce the attack surface and mitigate potential cyber vulnerabilities. To learn more and start your free trial, visit ThreatLocker.com/CISO. All links and the video of this episode can be found on CISO Series.com
POWER FOR TODAY is intended to equip the believers with the supernatural dimension of God, through the teaching of the unadulterated word of God.
API security has evolved from being primarily an infrastructure issue to a complex challenge centered around language and design flaws. Jeremy Snyder, CEO of Firetail, discusses the findings from their latest state of API security report, emphasizing the alarming rise of indirect prompt injection as a significant threat in AI-integrated systems. As APIs underpin much of modern application architecture, understanding how they function and the potential vulnerabilities they present is crucial for organizations aiming to protect themselves from increasingly sophisticated attacks.Snyder highlights the shared responsibility model in API security, where both developers and security teams must collaborate to ensure robust protection. While infrastructure teams manage the basic security measures, developers are responsible for the design and logic of the APIs they create. This evolving understanding of security responsibilities is essential as threat actors become more adept at exploiting API vulnerabilities, particularly through authorization failures, which continue to be a leading cause of breaches.The conversation also delves into the distinction between authentication and authorization, illustrating how both are critical to API security. Authentication verifies a user's identity, while authorization determines what actions that user can perform. Snyder emphasizes that many organizations still struggle with authorization issues, which can lead to significant security risks if not properly managed. The report reveals that the time to resolve security incidents remains alarmingly high, while the time for attackers to exploit vulnerabilities has drastically decreased, raising concerns about the effectiveness of current security measures.As AI technologies become more integrated into applications, the potential for indirect prompt injection attacks increases, necessitating a reevaluation of security practices. Snyder advises organizations to focus on secure design principles and maintain visibility over AI usage within their systems. By implementing governance frameworks and monitoring tools, organizations can better manage the risks associated with shadow AI and ensure that their API security measures are both effective and comprehensive. All our Sponsors: https://businessof.tech/sponsors/ Do you want the show on your podcast app or the written versions of the stories? Subscribe to the Business of Tech: https://www.businessof.tech/subscribe/Looking for a link from the stories? The entire script of the show, with links to articles, are posted in each story on https://www.businessof.tech/ Support the show on Patreon: https://patreon.com/mspradio/ Want to be a guest on Business of Tech: Daily 10-Minute IT Services Insights? Send Dave Sobel a message on PodMatch, here: https://www.podmatch.com/hostdetailpreview/businessoftech Want our stuff? Cool Merch? Wear “Why Do We Care?” - Visit https://mspradio.myspreadshop.com Follow us on:LinkedIn: https://www.linkedin.com/company/28908079/YouTube: https://youtube.com/mspradio/Facebook: https://www.facebook.com/mspradionews/Instagram: https://www.instagram.com/mspradio/TikTok: https://www.tiktok.com/@businessoftechBluesky: https://bsky.app/profile/businessof.tech
Sociologist Arlie Hochschild has spent years talking with people living in rural parts of the country who have been hit hard by the loss of manufacturing jobs and shuttered coal mines. They're the very people President Donald Trump argues will benefit most from his sweeping wave of tariffs and recent executive orders aimed at reviving coal mining in the US. But Hochschild is skeptical that Trump's policies will actually benefit those in rural America. But Hochschild argues that Trump's policies will only fill an emotional need for those in rural America.In her latest book, Stolen Pride, Hochschild visited Pikeville, Kentucky, a small city in Appalachia where coal jobs were leaving, opioids were arriving, and a white supremacist march was being planned. The more she talked to people, the more she saw how Trump played on their shame and pride about their downward mobility and ultimately used that to his political advantage.On this week's episode of More To The Story, host Al Letson talks with Hochschild about the long slide of downward mobility in rural America and why she thinks Trump's policies ultimately won't benefit his most core supporters.Producer: Josh Sanburn | Editor: Kara McGuirk-Allison | Theme music: Fernando Arruda and Jim Briggs | Digital producer: Nikki Frick | Interim executive producers: Brett Myers and Taki Telonidis | Host: Al LetsonDonate today at Revealnews.org/moreSubscribe to our weekly newsletter at Revealnews.org/weeklyFollow us on Instagram @revealnewsRead: Farmers in Trump Country Banked on Clean Energy Grants. Then Things Changed. (Mother Jones)Read: Trump's Trade War Is Here and Promises to Get Ugly (Mother Jones)Listen: The Many Contradictions of a Trump Victory (Reveal) Learn about your ad choices: dovetail.prx.org/ad-choices