POPULARITY
Categories
Turkel describes the genocidal targeting of women through forced sterilization and sexual violence, comparing these atrocities to the Holocaust. He also exposes how the Chinese state exploits Uyghur slave labor for global exports, implicating Western consumers in funding the regime's "industrial scale" oppression through tainted supply chains. 1940
HOUR 3- Blind Charlie's Exploits, Show Grades and MORE full 1985 Wed, 17 Dec 2025 16:38:00 +0000 bT0lQkAxl3SQyMJhWLqJ7F10RnjgjJfL society & culture Klein/Ally Show: The Podcast society & culture HOUR 3- Blind Charlie's Exploits, Show Grades and MORE Klein.Ally.Show on KROQ is more than just a "dynamic, irreverent morning radio show that mixes humor, pop culture, and unpredictable conversation with a heavy dose of realness." (but thanks for that quote anyway). Hosted by Klein, Ally, and a cast of weirdos (both on the team and from their audience), the show is known for its raw, offbeat style, offering a mix of sarcastic banter, candid interviews, and an unfiltered take on everything from culture to the chaos of everyday life. With a loyal, engaged fanbase and an addiction for pushing boundaries, the show delivers the perfect blend of humor and insight, all while keeping things fun, fresh, and sometimes a little bit illegal. 2024 © 2021 Audacy, Inc. Society & Culture False https://player.amperwavepodcasting.com
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Possible exploit variant for CVE-2024-9042 (Kubernetes OS Command Injection) We observed HTTP requests with our honeypot that may be indicative of a new version of an exploit against an older vulnerability. Help us figure out what is going on. https://isc.sans.edu/diary/Possible%20exploit%20variant%20for%20CVE-2024-9042%20%28Kubernetes%20OS%20Command%20Injection%29/32554 React2Shell: Technical Deep-Dive & In-the-Wild Exploitation of CVE-2025-55182 Wiz has a writeup with more background on the React2Shell vulnerability and current attacks https://www.wiz.io/blog/nextjs-cve-2025-55182-react2shell-deep-dive Notepad++ Update Hijacking Notepad++ s vulnerable update process was exploited https://notepad-plus-plus.org/news/v889-released/ New macOS PackageKit Privilege Escalation A PoC was released for a new privilege escalation vulnerability in macOS. Currently, there is no patch. https://khronokernel.com/macos/2024/06/03/CVE-2024-27822.html
England doggedly pursue strengthening their fledgling foothold on the eastern shores of the continent (1497-1618), determined to make their mark in the New World’s Northern Hemisphere. Check out the YouTube versions of this episode at: https://youtu.be/kfwkvpSugeA https://youtu.be/pSkKhj27hHM Eyewitness History podcast with Josh Cohen at https://amzn.to/3NWd6N6 Vietnam War books available at https://amzn.to/3ox3eAj ENJOY Ad-Free content, Bonus episodes, and Extra materials when joining our growing community on https://patreon.com/markvinet SUPPORT this channel by purchasing any product on Amazon using this FREE entry LINK https://amzn.to/3POlrUD (Amazon gives us credit at NO extra charge to you). Mark Vinet's TIMELINE video channel: https://youtube.com/c/TIMELINE_MarkVinet Website: https://markvinet.com/podcast Facebook: https://www.facebook.com/mark.vinet.9 Twitter: https://twitter.com/HistoricalJesu Instagram: https://www.instagram.com/denarynovels Mark's Books: https://amzn.to/3k8qrGM See omnystudio.com/listener for privacy information.
Interview with Jeff Swinoga, CEO of Exploits Discovery Corp.Our previous interview: https://www.cruxinvestor.com/posts/exploits-discovery-csenfld-new-found-gold-deal-unlocks-10m-treasury-value-7947Recording date: 5th December 2025Exploits Discovery Corp (CSE:NFLD) is a resource-stage gold exploration company focused on advancing properties with established historic resources in premier Canadian mining jurisdictions including Quebec and Ontario. Today it has completed a transformational deal with New Found Gold, receiving 2.8 million shares now valued at over $11 million plus a 1% royalty on properties along the Appleton fault. CEO Jeff Swinoga discusses how the company has strategically repositioned from grassroots exploration to resource-stage development.Key Highlights:- New Found Gold Transaction: 2.8M shares valued at $11M+ (up from $7M at announcement) with 1% NSR royalty on Bullseye and other properties adjacent to Keats discovery.- Enhanced Treasury: Approximately $3.6M in working capital against $11M market cap - analyst Brian Lundin notes company is "trading at cash value" with investors getting "the gold for free"- Resource Portfolio: Acquired three Quebec properties and one district-scale Ontario asset containing ~700,000 ounces of historic gold resources.- January 2026 Drilling: Fenton property programme targeting high-grade gold along magnetic corridors intersecting diabase dykes, following extensive geophysical work- Strategic Backing: Eric Sprott holds ~14% ownership stakeSwinoga explains: "We wanted our shareholders to benefit from a rising gold price by having resources in the ground."The company is at an inflection point, transitioning from transaction completion to operational execution with immediate drilling catalysts and systematic technical work designed to improve targeting beyond previous operators' efforts.Learn more: https://cruxinvestor.comSign up for Crux Investor: https://cruxinvestor.com
PREVIEW — Bob Zimmerman — Russia Exploits Starlink on the Battlefield. Bob Zimmerman analyzes how the Ukraine war has extended into low-earth orbit through contested control of Starlink satellite communications infrastructure. Zimmerman documents that although SpaceX has publicly supported Ukraine through satellite access denial to Russian military forces, Russia has systematically acquired black-market Starlink terminals, enabling operational control of reconnaissance and attack drones throughout the conflict zone. Zimmerman characterizes this persistent technological challenge as a significant strategic problem that U.S. officials and Ukrainian military command are actively attempting to resolve through terminal tracking, signal disruption, and device authentication protocols, representing an emerging domain of space-age warfare previously unanticipated in terrestrial conflict planning. 1941
This is a free preview of a paid episode. To hear more, visit themazaj.substack.comTerrifying.In this episode I take a hard look at the uneasy space where artificial intelligence and human attachment intersect. Drawing on clinical research, design incentives, and several troubling real-world cases, I explore how large language models can echo the rhythms of i…
The boys return for another week to discuss the latest in Greek football, the gift that keeps on giving.UEFA CompetitionOlympiakos narrowly loses to Real MadridPanathinaikos see off Sturm GrazPAOK conceded late to draw with BrannAEK shock Fiorentina in Florence SLGRA chaotic Athenian derby ends in victory for AEKPAOK win away against LevadiakosOlympiakos leave Arginio with a narrow victoryAris win their first game in the league since SeptemberGreek Cup previewOther newsKaretsas flying for GenkMouzakitis presented with the Golden Boy Web AwardTzimas scores his first Premier League goal for BrightonWarda close to leaving Greek football...againGive us a follow on:X: https://twitter.com/HellasfootyInstagram: https://www.instagram.com/hellasfooty/Facebook: https://www.facebook.com/@HellasFootyRead our blogs on: https://hellasfooty.blogspot.com/Intro music credit to George Prokopiou (Ermou Street)
New to Soulution Grace Church? Click here: sgcph.org/im-new-here/Accepted Christ as your Lord and Savior today? Click here: sgcph.org/sign-me-up/Want to give your tithes and love offering? Click here: sgcph.org/give/Stay Connected!Facebook: https://bit.ly/2B59wymYoutube: bit.ly/394U2HbInstagram: https://bit.ly/2Cc4jpjTikTok: https://bit.ly/3Ji78BK
Marty sits down with Erik Cason to discuss the dangers of centralized AI systems, the need for decentralized technology, Bitcoin as a tool against fiat exploitation, and organizing a new political movement to restore freedom for the working class. Erik on Twitter: https://x.com/Erikcason Crypto Sovereignty: https://cryptosovereignty.org/ STACK SATS hat: https://tftcmerch.io/ Our newsletter: https://www.tftc.io/bitcoin-brief/ TFTC Elite (Ad-free & Discord): https://www.tftc.io/#/portal/signup/ Discord: https://discord.gg/VJ2dABShBz Opportunity Cost Extension: https://www.opportunitycost.app/ Shoutout to our sponsors: Bitkey https://bit.ly/TFTCBitkey20 Unchained https://unchained.com/tftc/ Obscura https://obscura.net/ SLNT https://slnt.com/tftc CrowdHealth https://www.joincrowdhealth.com/tftc Salt of the Earth: https://drinksote.com/tftc Join the TFTC Movement: Main YT Channel https://www.youtube.com/c/TFTC21/videos Clips YT Channel https://www.youtube.com/channel/UCUQcW3jxfQfEUS8kqR5pJtQ Website https://tftc.io/ Newsletter tftc.io/bitcoin-brief/ Twitter https://twitter.com/tftc21 Instagram https://www.instagram.com/tftc.io/ Nostr https://primal.net/tftc Follow Marty Bent: Twitter https://twitter.com/martybent Nostr https://primal.net/martybent Newsletter https://tftc.io/martys-bent/ Podcast https://www.tftc.io/tag/podcasts/
FC aka Freaky Clown is an ethical hacker and social engineer with over 30 years of experience in cybersecurity. He is the author of "How I Rob Banks: And Other Such Places," and is the co-founder of Cygenta. In this episode, FC joins host Scott Schober to discuss his experience and exploits, including his past in the industry, what inspired the book, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com
Starting off with the original Xbox getting a new cosmetic hardmod to introduce power and eject button sounds, as well as a return to form with XBMC4XBOX Redux's release. We also discuss the latest Atmosphere CFW update as it contains some pretty important information for CFW users thanks to the latest system firmware update. The PS4 and PS5 get a lot more love thanks to a new kernel exploit release working on both systems. There's also a few entry points which have gotten awesome developments with Y2JB being paired with Lapse for a full jailbreak, as well as new entry points being seen with the Netflix app and now games using the Ren'py engine!
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
OWASP Top 10 2025 Release Candidate OWASP published a release candidate for the 2025 version of its Top 10 list https://owasp.org/Top10/2025/0x00_2025-Introduction/ Citrix/Cisco Exploitation Details Amazon detailed how Citrix and Cisco vulnerabilities were used by advanced actors to upload webshells https://aws.amazon.com/blogs/security/amazon-discovers-apt-exploiting-cisco-and-citrix-zero-days/ Testing Quantum Readyness A website tests your services for post-quantum computing-resistant cryptographic algorithms https://qcready.com/
Link to episode page This week's Department of Know is hosted by Rich Stroffolino with guests Jacob Coombs, CISO, Tandem Diabetes Care, and Ross Young, Co-host, CISO Tradecraft Thanks to our show sponsor, Vanta What's your 2 AM security worry? Is it "Do I have the right controls in place?" Or "Are my vendors secure?" ….or the really scary one: "how do I get out from under these old tools and manual processes? Enter Vanta. Vanta automates manual work, so you can stop sweating over spreadsheets, chasing audit evidence, and filling out endless questionnaires. Their trust management platform continuously monitors your systems, centralizes your data, and simplifies your security at scale. Vanta also fits right into your workflows, using AI to streamline evidence collection, flag risks, and keep your program audit-ready—ALL…THE…TIME. With Vanta, you get everything you need to move faster, scale confidently—and get back to sleep. Get started at vanta.com/headlines All links and the video of this episode can be found on CISO Series.com
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Apple Patches Everything, Again Apple released a minor OS upgrade across its lineup, fixing a number of security vulnerabilities. https://isc.sans.edu/diary/Apple%20Patches%20Everything%2C%20Again/32448 Remote Access Tools Used to Compromise Trucking and Logistics Attackers infect trucking and logistics companies with regular remote management tools to inject malware into other companies or learn about high-value loads in order to steal them. https://www.proofpoint.com/us/blog/threat-insight/remote-access-real-cargo-cybercriminals-targeting-trucking-and-logistics Google Android Patch Day Google released its usual monthly Android updates this week https://source.android.com/docs/security/bulletin/2025-11-01
Got a question or comment? Message us here!
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
XWiki SolrSearch Exploit Attempts CVE-2025-24893 We have detected a number of exploit attempts against XWiki taking advantage of a vulnerability that was added to the KEV list on Friday. https://isc.sans.edu/diary/XWiki%20SolrSearch%20Exploit%20Attempts%20%28CVE-2025-24893%29%20with%20link%20to%20Chicago%20Gangs%20Rappers/32444 AMD Zen 5 Random Number Generator Bug The RDSEED function for AMD s Zen 5 processors does return 0 more often than it should. https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7055.html SleepyDuck malware invades Cursor through Open VSX Yet another Open VSX extension stealing crypto credentials https://secureannex.com/blog/sleepyduck-malware/
We're joined by Daniella Mestyanek Young, the author of Uncultured. She was born a third generation member of an influential family, within The Family International, better known as the Children of God cult. She escaped at fifteen, put herself through school, and graduated from college as valedictorian. Daniella joined the Army, became Captain, and she received the Presidential Volunteer Service Award. She was an Intelligence Officer in one of the Army's first Female Engagement Teams. In two tours and six years, she saw patterns in the military that were just like her experiences in the Children of God. Here are Daniella's 10 characteristics of a cult that we talk about: 1. Has a charismatic leader (and a skinny white woman) 2. A sacred assumption 3. The transcendental mission 4. Self-sacrifice of members 5. Limits access to the outside world 6. Distinguishable vernacular 7. Us versus them mentality 8. Exploits members' labor 9. High exit costs 10. Ends justify the means mentality Find Daniella online: https://twitter.com/daniellamyoung https://www.instagram.com/daniellamyoung_ https://www.tiktok.com/@daniellamestyanekyoung By Daniella's book UnCULTured https://www.indiebound.org/book/9781250280114 We're also excited to announce that our long promised merch is here!! We know it's tough sometimes to express your leftist feelings in public. Your ratty Che Guevara and CCCP t-shirts seem better left at home. Now you can fly your crypto-leftist flag and still be completely under the radar with our personal love letter to Juan José Arévalo, philosopher and socialist president of Guatemala, and the airline he nationalized. wetwired.printful.me/ Subscribe on Patreon to support making this show, get premium only episodes, and listen to our entire back catalog. patreon.com/wetwired
Tom Uren and Amberleigh Jack talk about Peter Williams, the general manager of vulnerability research firm Trenchant, who has pleaded guilty to selling exploits to the Russian 0day broker Operation Zero. It's a terrible look, but it doesn't mean the private sector can't be trusted to develop exploits. They also discuss a new report's recommendations to empower the Office of the National Cyber Director. It's a good idea, but it won't make up for the cuts in funding and personnel across the Trump administration's cyber portfolio. This episode is also available on Youtube. Show notes
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Phishing with Invisible Characters in the Subject Line Phishing emails use invisible UTF-8 encoded characters to break up keywords used to detect phishing (or spam). This is aided by mail clients not rendering some characters that should be rendered. https://isc.sans.edu/diary/A%20phishing%20with%20invisible%20characters%20in%20the%20subject%20line/32428 Apache Tomcat PUT Directory Traversal Apache released an update to Tomcat fixing a directory traversal vulnerability in how the PUT method is used. Exploits could upload arbitrary files, leading to remote code execution. https://lists.apache.org/thread/n05kjcwyj1s45ovs8ll1qrrojhfb1tog BIND9 DNS Spoofing Vulnerability A PoC exploit is now available for the recently patched BIND9 spoofing vulnerability https://gist.github.com/N3mes1s/f76b4a606308937b0806a5256bc1f918
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Bilingual Phishing for Cloud Credentials Guy observed identical phishing messages in French and English attempting to phish cloud credentials https://isc.sans.edu/diary/Phishing%20Cloud%20Account%20for%20Information/32416 Kaitai Struct WebIDE The binary file analysis tool Kaitai Struct is now available in a web only version https://isc.sans.edu/diary/Kaitai%20Struct%20WebIDE/32422 WSUS Emergency Update Microsoft released an emergency patch for WSUS to fix a currently exploited critical vulnerability https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287 Network Security Devices Endanger Orgs with 90s-era Flaws Attackers increasingly use simple-to-exploit network security device vulnerabilities to compromise organizations. https://www.csoonline.com/article/4074945/network-security-devices-endanger-orgs-with-90s-era-flaws.html
In this eye-opening introduction to the Divine Opportunities for Progress and Exploits series, we discover how God's intelligence, purpose, and divine design empower humanity for greatness. Through Scripture, relatable examples, and even lessons drawn from pop culture like Naruto, this message emphasizes the power of mindset, action, and faith in unlocking one's divine potential. You'll learn why failure is not final, how your thoughts shape your destiny, and why God has already equipped you with everything needed to dominate and succeed. By the end of this teaching, you'll be inspired to rise above limitations, act on your ideas, and boldly step into the opportunities God has prepared for your life. You are not an accident; you are a divine idea turned into a living reality. Your mindset determines your capacity for exploits. Failure is feedback, not finality. Productivity is divine — act on your God-given creativity. Dominion starts with understanding your authority in Christ.
Happy Patch Tuesday! In this October episode, security specialists Ryan Braunstein and Mat Lee break down some of the month's most critical vulnerabilities — and why this batch of CVEs might just be the spookiest yet.The duo dives deep into:A Unity Engine remote code execution flaw that impacts games, VR apps, and even training toolsThe Windows Hello bypass vulnerability that lets attackers inject their own biometric data to access local accountsA Microsoft Exchange Server privilege escalation that could expose entire inboxesWith expert insights, real-world context, and a touch of humor, Ryan and Mat unpack what these vulnerabilities mean for IT and security pros — and what steps you should take right now to stay protected
Lessons From The Life of David | Week 6 | Ken Miller--This lesson will cover the early days of David's reign as he attempts to rule his kingdom in a way that honors Yahweh. Having never served as a king before, David has a lot to learn about managing the affairs of state in keeping with Yahweh's commands.--Notes
Three Buddy Problem - Episode 67: We discuss the rise of automated red-teaming, Apple's $2 million exploit chain bounties aimed at outbidding spyware brokers and the iPhone maker's focus on wireless proximity attacks and “tactical suitcase” Wi-Fi exploits. We also hit the news of Paragon spyware targeting European executives and the bizarre story of NSO Group's supposed US investor buyout. Plus, an update on Oracle's zero-day ransomware fiasco, Ivanti's endless patch delays, the ethics of journalists enabling ransomware operations on leak sites, Europe's latest failed push for Chat Control, and VirusTotal's new pricing tiers. Cast: Juan Andres Guerrero-Saade (https://twitter.com/juanandres_gs), Ryan Naraine (https://twitter.com/ryanaraine) and Costin Raiu (https://twitter.com/craiu).
Send us a text Guitarist/Vocalist Magnus Garathun (Abhorration, X-Hecatomb, x-Condor, X-Mion's Hill) visits the Morgue to talk about his musical path and Norway's Death Metal beast Abhorration and much more. See you at the Morgue!music:Abhorration-DemonolatryHecatomb-Black Winged Pestilence Condor-Embraced By The EvilMion's Hill- Witches VomitCondor-Riders Of ViolenceAbhorration-Desecrate the Exploits of God Abhorration-The Grace of Immolation contact: thetampamorgue@gmail.com The Tampa Morgue Podcast can be found on Spotify, Amazon Music, Apple Music, Apple Podcasts, YouTube and most places you listen to your podcasts.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
FreePBX Exploit Attempts (CVE-2025-57819) A FreePBX SQL injection vulnerability disclosed in August is being used to execute code on affected systems. https://isc.sans.edu/diary/Exploit%20Against%20FreePBX%20%28CVE-2025-57819%29%20with%20code%20execution./32350 Disrupting Threats Targeting Microsoft Teams Microsoft published a blog post outlining how to better secure Teams. https://www.microsoft.com/en-us/security/blog/2025/10/07/disrupting-threats-targeting-microsoft-teams/ Kibana XSS Patch CVE-2025-25009 Elastic patched a stored XSS vulnerability in Kibana https://discuss.elastic.co/t/kibana-8-18-8-8-19-5-9-0-8-and-9-1-5-security-update-esa-2025-20/382449 QT SVG Vulnerabilities CVE-2025-10728, CVE-2025-10729, The QT group fixed two vulnerabilities in the QT SVG module. One of the vulnerabilities may be used for code execution https://www.qt.io/blog/security-advisory-uncontrolled-recursion-and-use-after-free-vulnerabilities-in-qt-svg-module-impact-qt
En 1672, le jeune Louis XIV se lance dans la guerre de Hollande pour conquérir les territoires espagnols. L'offensive se transforme en bourbier, mais le général Turenne parvient à renverser le cours de la guerre…Mention légales : Vos données de connexion, dont votre adresse IP, sont traités par Radio Classique, responsable de traitement, sur la base de son intérêt légitime, par l'intermédiaire de son sous-traitant Ausha, à des fins de réalisation de statistiques agréées et de lutte contre la fraude. Ces données sont supprimées en temps réel pour la finalité statistique et sous cinq mois à compter de la collecte à des fins de lutte contre la fraude. Pour plus d'informations sur les traitements réalisés par Radio Classique et exercer vos droits, consultez notre Politique de confidentialité.Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations.
En 1672, le jeune Louis XIV se lance dans la guerre de Hollande pour conquérir les territoires espagnols. L'offensive se transforme en bourbier, mais le général Turenne parvient à renverser le cours de la guerre… Mention légales : Vos données de connexion, dont votre adresse IP, sont traités par Radio Classique, responsable de traitement, sur la base de son intérêt légitime, par l'intermédiaire de son sous-traitant Ausha, à des fins de réalisation de statistiques agréées et de lutte contre la fraude. Ces données sont supprimées en temps réel pour la finalité statistique et sous cinq mois à compter de la collecte à des fins de lutte contre la fraude. Pour plus d'informations sur les traitements réalisés par Radio Classique et exercer vos droits, consultez notre Politique de confidentialité.Hébergé par Ausha. Visitez ausha.co/politique-de-confidentialite pour plus d'informations.
In this episode, we unpack Paul's warning that sin can twist even God's holy law into a base of operations for pride, hypocrisy, and rebellion. Romans 7:8–9 shows how the commandment meant for life can awaken hidden desires and expose self-deception. But the final verdict is clear: the law points us to our desperate need for Christ.Discover how grace and truth in Jesus pierce beneath the surface, strip away self-confidence, and empower us to walk in the Spirit.
App for outing people who were insufficiently mournful of Charlie Kirk critics leaked its own users’ personal data through security blunders: https://san.com/cc/app-for-outing-charlie-kirks-critics-leaked-its-users-personal-data/ Meta is using parents’ back-to-school photos of their girls to advertise Threads to grown men: https://www.theguardian.com/technology/2025/sep/20/parents-outraged-meta-uses-photos-schoolgirls-ads-man AI-Generated YouTube Channel Uploaded Nothing But Videos of Women Being Shot: https://www.404media.co/ai-generated-youtube-channel-uploaded-nothing-but-videos-of-women-being-shot/ Controversy on subreddit r/TwinPeaks over AI: https://www.reddit.com/r/twinpeaks/comments/1npqm2k/ai_generated_content_is_no_longer_allowed/ YouTube to reinstate users banned for spreading COVID misinformation and election misinformation: https://variety.com/2025/digital/news/youtube-reinstate-channels-banned-election-covid-misinformation-1236527333/ Jessica Chastain's new show about preventing extremist violence postponed by AppleTV. Smells like censorship: https://www.instagram.com/p/DO_V2EyEZmj/ If you’re listening on Spotify, you can leave a comment there to let us know what you thought about these stories, or email us at hello@tangoti.com Follow Bridget and TANGOTI on social media! || instagram.com/bridgetmarieindc/ || tiktok.com/@bridgetmarieindc || youtube.com/@ThereAreNoGirlsOnTheInternet See omnystudio.com/listener for privacy information.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Exploit Attempts Against Older Hikvision Camera Vulnerability Out honeypots observed an increase in attacks against some older Hikvision issues. A big part of the problem is weak passwords, and the ability to send credentials as part of the URL. https://isc.sans.edu/diary/Exploit%20Attempts%20Against%20Older%20Hikvision%20Camera%20Vulnerability/32316 Cisco Patches Already Exploited SNMP Vulnerability Cisco patched a stack-based buffer overflow in the SNMP subsystem. It is already exploited in the wild, but requires admin privileges to achieve code execution. https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-x4LPhte SonicWall Anti-Rootkit Update SonicWall released a firmware update for its SMA100 devices specifically designed to eradicate a commonly deployed rootkit. https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0015 Extended Windows 10 Support Microsoft will extend free Windows 10 essential support for US and European customers. https://www.straitstimes.com/world/united-states/microsoft-offers-no-cost-windows-10-lifeline
Episode 141: In this episode of Critical Thinking - Bug Bounty Podcast Justin sits down with Nick Copi to talk about CSPT, React, CSS Injections and how Nick hacked the pod.Follow us on twitter at: https://x.com/ctbbpodcastGot any ideas and suggestions? Feel free to send us any feedback here: info@criticalthinkingpodcast.ioShoutout to YTCracker for the awesome intro music!====== Links ======Follow your hosts Rhynorater and Rez0 on Twitter:https://x.com/Rhynoraterhttps://x.com/rez0__====== Ways to Support CTBBPodcast ======Hop on the CTBB Discord at https://ctbb.show/discord!We also do Discord subs at $25, $10, and $5 - premium subscribers get access to private masterclasses, exploits, tools, scripts, un-redacted bug reports, etc.You can also find some hacker swag at https://ctbb.show/merch!Today's Sponsor: ThreatLocker. Check out ThreatLocker DAChttps://www.criticalthinkingpodcast.io/tl-dacToday's Guest: https://x.com/7urb01====== Resources ======regexploithttps://github.com/doyensec/regexploitFontleakhttps://adragos.ro/fontleak/debug(function)https://developer.chrome.com/docs/devtools/console/utilities#debug-functiondomloggerpphttps://github.com/kevin-mizu/domloggerpp====== Timestamps ======(00:00:00) Introduction(00:02:40) Google Docs Bug and 7urb0 Introduction(00:13:26) Bring-a-bug story(00:20:21) 7urb0's DEFCON talk teaser & Intrusive Thoughts Worth Sharing(00:30:01) CSPTs and React Apps(00:51:31) CSS Injections(01:04:55) 7urb0's backstory and game hacking(01:18:33) Worst Crit
A troubling number of U.S. House Democrats - including Reps Henry Cuellar and Vicente Gonzalez - voted Friday to honor Charlie Kirk, a notorious promoter of racist views: https://www.govtrack.us/congress/votes/119-2025/h282The same weekend as a large memorial event for Kirk in Arizona, Texas Republicans attended the Texas Youth Summit in The Woodlands, where they attempted to further radicalize Kirk's grieving fans: https://www.houstonpublicmedia.org/articles/news/politics/2025/09/20/531467/republican-representatives-call-youth-to-action-at-charlie-kirk-tribute-in-the-woodlands/...Resistance is building against the push by Governor Greg Abbott and others to silence Texas college students who choose not to lionize Kirk: https://www.texastribune.org/2025/09/22/texas-free-speech-college-campus-charlie-kirk-greg-abbott/?_bhlid=4a9636c9afe8b0572ffda1819115a6e7d1f10ae7...Senator Ted Cruz, in a rare moment of clarity, says FCC Chairman Brendan Carr's threats against ABC resemble those of a mob boss - of course, he's mainly worried about future censorship of the right: https://www.dallasnews.com/news/politics/2025/09/19/ted-cruz-says-fcc-chair-sounded-like-a-mafia-boss-in-threats-against-abc-over-jimmy-kimmel/Perhaps surprisingly, a conversation between Joe Rogan and Matthew McConaughey finds Rogan opposing the posting of the Ten Commandments in Texas classrooms, and McConaughey supporting the new law: https://www.mysanantonio.com/news/local/politics/article/joe-rogan-matthew-mcconaughey-21052729.phpHouston friends! Join Progress Texas in The Heights on Monday October 20 for our H-Town Hits Back live podcast taping event! Tickets and sponsorship opportunities are available now: https://act.progresstexas.org/a/houston2025eventThanks for listening! Our monthly donors form the backbone of our funding, and if you're a regular, we'd like to invite you to join the team! Find our web store and other ways to support our important work at https://progresstexas.org.
The 1776 Project launches a fear-driven attack on teachers speaking truths about Charlie Kirk, aiming to replace school boards with conservative operatives loyal to billionaires.Subscribe to our Newsletter:https://politicsdoneright.com/newsletterPurchase our Books: As I See It: https://amzn.to/3XpvW5o How To Make AmericaUtopia: https://amzn.to/3VKVFnG It's Worth It: https://amzn.to/3VFByXP Lose Weight And BeFit Now: https://amzn.to/3xiQK3K Tribulations of anAfro-Latino Caribbean man: https://amzn.to/4c09rbE
Join host G Mark Hardy on CISO Tradecraft as he welcomes Patrick Garrity from VulnCheck and Tod Beardsley from Run Zero to discuss the latest in cybersecurity vulnerabilities, exploits, and defense strategies. Learn about their backgrounds, the complexities of security research, and strategies for effective communication within enterprises. The discussion delves into vulnerabilities, the significant risks posed by ransomware, and actionable steps for CISOs and security executives to protect their organizations. Stay tuned for invaluable insights on cybersecurity leadership and management. Chapters00:00 Introduction and Guest Welcome00:57 Meet Patrick Garrity: Security Researcher and Skateboard Enthusiast02:12 Meet Todd Beardsley: From Hacker to Security Research VP03:58 The Evolution of Vulnerabilities and Patching07:06 Understanding CVE Numbering and Exploitation14:01 The Role of Attribution in Cybersecurity16:48 Cyber Warfare and Global Threat Landscape20:18 The Rise of International Hacking22:01 Delegation of Duties in Offensive Warfare22:25 The Role of Companies in Cyber Defense23:00 Attack Vectors and Exploits24:25 Real-World Scenarios and Threats28:46 The Importance of Communication Skills for CISOs31:42 Ransomware: A Divisive Topic38:39 Actionable Steps for Security Executives
Join host G Mark Hardy on CISO Tradecraft as he welcomes Patrick Garrity from VulnCheck and Tod Beardsley from Run Zero to discuss the latest in cybersecurity vulnerabilities, exploits, and defense strategies. Learn about their backgrounds, the complexities of security research, and strategies for effective communication within enterprises. The discussion delves into vulnerabilities, the significant risks posed by ransomware, and actionable steps for CISOs and security executives to protect their organizations. Stay tuned for invaluable insights on cybersecurity leadership and management. Chapters 00:00 Introduction and Guest Welcome 00:57 Meet Patrick Garrity: Security Researcher and Skateboard Enthusiast 02:12 Meet Todd Beardsley: From Hacker to Security Research VP 03:58 The Evolution of Vulnerabilities and Patching 07:06 Understanding CVE Numbering and Exploitation 14:01 The Role of Attribution in Cybersecurity 16:48 Cyber Warfare and Global Threat Landscape 20:18 The Rise of International Hacking 22:01 Delegation of Duties in Offensive Warfare 22:25 The Role of Companies in Cyber Defense 23:00 Attack Vectors and Exploits 24:25 Real-World Scenarios and Threats 28:46 The Importance of Communication Skills for CISOs 31:42 Ransomware: A Divisive Topic 38:39 Actionable Steps for Security Executives 45:58 Conclusion and Final Thoughts
Join host G Mark Hardy on CISO Tradecraft as he welcomes Patrick Garrity from VulnCheck and Tod Beardsley from Run Zero to discuss the latest in cybersecurity vulnerabilities, exploits, and defense strategies. Learn about their backgrounds, the complexities of security research, and strategies for effective communication within enterprises. The discussion delves into vulnerabilities, the significant risks posed by ransomware, and actionable steps for CISOs and security executives to protect their organizations. Stay tuned for invaluable insights on cybersecurity leadership and management. Chapters 00:00 Introduction and Guest Welcome 00:57 Meet Patrick Garrity: Security Researcher and Skateboard Enthusiast 02:12 Meet Todd Beardsley: From Hacker to Security Research VP 03:58 The Evolution of Vulnerabilities and Patching 07:06 Understanding CVE Numbering and Exploitation 14:01 The Role of Attribution in Cybersecurity 16:48 Cyber Warfare and Global Threat Landscape 20:18 The Rise of International Hacking 22:01 Delegation of Duties in Offensive Warfare 22:25 The Role of Companies in Cyber Defense 23:00 Attack Vectors and Exploits 24:25 Real-World Scenarios and Threats 28:46 The Importance of Communication Skills for CISOs 31:42 Ransomware: A Divisive Topic 38:39 Actionable Steps for Security Executives 45:58 Conclusion and Final Thoughts
Unity Without Compromise with Dr. Steven LaTulippe – President Trump sends ICE agents and military forces to restore order in violent cities while critics cry foul. Supporters see his actions as true kindness, protecting citizens from crime and corruption. Rooted in Biblical justice and patriotism, this call urges America to confront evil, defend freedom, and uphold faith, justice, and peace for all...
Get instant access to the new Lab 2.0 now. Learn how to stay calm and make smarter decisions when your poker hands take unexpected turns. The world's best poker coach, Uri Peleg, gives you practical strategies and mindset shifts to quickly reevaluate, adapt, and protect your bankroll in tough situations. View the written version of this episode here. 00:00 Hand Example Breakdown 01:47 Range vs. Hand Thinking 03:21 Betting Structures and Exploits 04:28 Adapting When Plans Change 05:58 Reassessing Hand Strength in Action In this poker strategy podcast, Mike Brady and elite coach Uri Peleg explore one of the most important but overlooked skills in poker: knowing what to do when hands don't go as planned. Every player has experienced the frustration of seeing a strong starting hand or a favorable flop turn into a tough spot after unexpected action, but Uri breaks down how to handle these moments with clarity and confidence. Using a real hand example and practical analogies, he shows how focusing on your range rather than just your hand strength leads to smarter decisions and prevents costly mistakes. Listeners will learn how to adjust betting strategies, recognize when their plan is no longer working, and quickly reevaluate based on changing dynamics. This poker strategy podcast also dives into the importance of flexibility — whether it's shifting from aggression to caution, or accepting that folding a big hand can sometimes be the most profitable move. By reframing these situations as opportunities to adapt rather than failures, players gain a mental edge that carries across every stage of the game. If you've ever struggled with letting go of a strong-looking hand or found yourself stubbornly sticking to a plan that no longer makes sense, this poker strategy podcast delivers the perspective shift you need. Whether you're a beginner working through the basics or a seasoned grinder aiming for mastery, you'll come away with actionable insights to stay calm, stay sharp, and keep your bankroll protected when the game throws you curveballs.
TJ and Kris begin a series of episodes exploring the biblical Nimrod by diving into his legendary background in ancient near eastern material, and his possible involvement in an ancient necromancy ritual.
Support the showSupport us on Patreon
In the secure news: Automakers respond to Flipper Zero attacks More on the unconfirmed Elastic EDR 0-Day When Secure Boot does its job too well Crazy authenitcation bypass Hacker ultimatums AI Slop Impatient hackers Linux ISOs are malware Attackers love drivers Hacking Amazon's Eero, the hard way Exploits will continue until security improves The Salesloft breach TP-Link Zero Days US DoD using Russian software? The Lasagna DoS attack Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw-890
The media is already trying to bury yesterday's story from Minnesota while Cardinal Dolan sticks his foot in his mouth instead of highlighting the heroic sacrifice of one young man.Sources:https://www.returntotradition.orgorhttps://substack.com/@returntotradition1Contact Me:Email: return2catholictradition@gmail.comSupport My Work:Patreonhttps://www.patreon.com/AnthonyStineSubscribeStarhttps://www.subscribestar.net/return-to-traditionBuy Me A Coffeehttps://www.buymeacoffee.com/AnthonyStinePhysical Mail:Anthony StinePO Box 3048Shawnee, OK74802Follow me on the following social media:https://www.facebook.com/ReturnToCatholicTradition/https://twitter.com/pontificatormax+JMJ+#popeleoXIV #catholicism #catholicchurch #catholicprophecy#infiltration
The media is already trying to bury yesterday's story from Minnesota while Cardinal Dolan sticks his foot in his mouth instead of highlighting the heroic sacrifice of one young man.Sources:https://www.returntotradition.orgorhttps://substack.com/@returntotradition1Contact Me:Email: return2catholictradition@gmail.comSupport My Work:Patreonhttps://www.patreon.com/AnthonyStineSubscribeStarhttps://www.subscribestar.net/return-to-traditionBuy Me A Coffeehttps://www.buymeacoffee.com/AnthonyStinePhysical Mail:Anthony StinePO Box 3048Shawnee, OK74802Follow me on the following social media:https://www.facebook.com/ReturnToCatholicTradition/https://twitter.com/pontificatormax+JMJ+#popeleoXIV #catholicism #catholicchurch #catholicprophecy#infiltration
With Texas poised to pass a redistricting bill to help Donald Trump rig the midterm elections in his favor to retain control of Congress, Democrats are taking the fight to Trump. Trump's renewed engagement with Vladimir Putin on the war in Ukraine has made a new priority of the return of Ukrainian children stolen by Putin.
SANS Internet Stormcenter Daily Network/Cyber Security and Information Security Stormcast
Erlang OTP SSH Exploits A recently patched and easily exploited vulnerability in Erlang/OTP SSH is being exploited. Palo Alto collected some of the details about this exploit activity that they observed. https://unit42.paloaltonetworks.com/erlang-otp-cve-2025-32433/ WinRAR Exploited WinRAR vulnerabilities are actively being exploited by a number of threat actors. The vulnerability allows for the creation of arbitrary files as the archive is extracted. https://thehackernews.com/2025/08/winrar-zero-day-under-active.html Citrix Netscaler Exploit Updates The Dutch Center for Cyber Security is updating its guidance on recent Citrix Netscaler attacks. Note that the attacks started before a patch became available, and attackers are actively hiding their tracks to make it more difficult to detect a compromise. https://www.ncsc.nl/actueel/nieuws/2025/07/22/casus-citrix-kwetsbaarheid https://www.bleepingcomputer.com/news/security/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/ OpenSSH Post Quantum Encryption Starting in version 10.1, OpenSSH will warn users if they are using quantum-unsafe algorithms https://www.openssh.com/pq.html
A viral surrogacy video featuring a gay couple sparks outrage after one partner is revealed to be a registered sex offender. The PBD Podcast reacts with a heated debate on child safety, adoption laws, and the moral line between legality and trust in protecting our most vulnerable.
Texas Democrats are back in the headlines — this time flaunting a $40 million jet while fleeing a redistricting vote like cowards. Governor Abbott isn't holding back, and neither are we. Meanwhile, Jim Acosta hits a new low by interviewing an AI version of a Parkland victim. Yes, seriously. Also in this episode: Trump enters the Sydney Sweeney firestorm, defending her viral ad as the Left tries to cancel her. MTG threatens to ditch the GOP, Nancy Mace gets called out for her past posts, and Boston's glitziest neighborhood is now flooded with addicts thanks to “free crack pipes.” You can't make this stuff up.SUPPORT OUR SPONSORS TO SUPPORT OUR SHOW!Stay hurricane-ready and be prepared for any emergency with ReadyWise. Visit https://ReadyWise.com and use promo code CHICKS10 for 10% off your entire purchase.Score 15% off with code CHICKS and give yourself that glow-up with the BON CHARGE Red Light Face Mask at https://BonCharge.com (It's self-care that literally lights up your face!)Stir up your routine with MUDWTR at https://mudwtr.com Use code CHICKS for up to 43% off, free shipping, and a FREE rechargeable frother!Upgrade your summer. Go to https://CozyEarth.com/CHICKS for up to 40% OFF including the Bubble Cuddle Blanket with code CHICKS. VISIT OUR WEBSITE DAILY! https://chicksonright.com SUBSCRIBE TO OUR PODCAST: https://link.chtbl.com/BtHbvS8C?sid=youtube JOIN OUR SUPPORTER COMMUNITY ON LOCALS: https://chicksontheright.locals.com/ JOIN OUR SUPER DOUBLE AWESOME SECRET BUT NOT SECRET EXCLUSIVE GROUP: https://www.facebook.com/groups/388315619071775 Subscribe to our email list: https://politics.chicksonright.com/subscribe/ GET OUR BOOK! https://www.amazon.com/dp/B08H5D3CF1/ref=cm_sw_r_cp_api_fabc_JdhQFbZ363CAY Venmo: @chicksonright Paypal: https://www.paypal.me/chicksonright Get exclusive Chicks merch here: https://www.etsy.com/shop/InRealLifeCreations?ref=seller-platform-mcnav§ion_id=50399398 Even more Merch: https://shop.spreadshirt.com/chicksonright/ Thank you for the Superchats! Watch live to donate and be recognized! Facebook: Chicks on the RightFacebook Group: Chicks on the RightTwitter, IG, Parler, Rumble: @chicksonright
In this episode of The President's Daily Brief: Israeli Prime Minister Benjamin Netanyahu is expected to unveil a dramatic new proposal to his security cabinet: the annexation of large sections of the Gaza Strip. We'll walk through what the plan entails—and how history may offer clues about what comes next. A top former U.S. spy is warning that China sees vulnerabilities in America's defenses—and is moving aggressively to exploit them. Former President Donald Trump is threatening steep tariffs and penalties on India over its ongoing ties with Russia, adding new strain to the relationship. In today's Back of the Brief—The New York Times used a photo of an emaciated Gazan boy on its front page to spotlight hunger in Gaza. But there's just one problem: the boy had a serious pre-existing condition the paper failed to disclose. Now they've issued a correction. To listen to the show ad-free, become a premium member of The President's Daily Brief by visiting PDBPremium.com. Please remember to subscribe if you enjoyed this episode of The President's Daily Brief. YouTube: youtube.com/@presidentsdailybrief Birch Gold: Text PDB to 989898 and get your free info kit on gold American Financing: Call American Financing today to find out how customers are saving an avg of $800/mo. 866-885-1881 or visit https://www.AmericanFinancing.net/PDB - NMLS 182334, https://nmlsconsumeraccess.org Learn more about your ad choices. Visit megaphone.fm/adchoices