Computing term
POPULARITY
Categories
The EU imposes sanctions after cyberattacks. DHS boosts surveillance spending. AI firms recruit weapons-risk experts. Stryker disruption, no patient impact. LeakNet leans on ClickFix. Sears chatbot data spills. A Chinese security firm leaks a private key. Tech giants team up on scams. Teens sue xAI over alleged AI-generated abuse. On today's Threat Vector segment, David Moulton and guest Erica L. Shoemate, founder of The EN Strategy Group, explore how AI is fundamentally reshaping the security landscape. Cyber crooks cause a complimentary curbside convenience. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. Threat Vector What if the choices we make about AI security today determine who holds power tomorrow? On this Threat Vector segment, David Moulton and guest Erica L. Shoemate, founder of The EN Strategy Group, explore how AI is fundamentally reshaping the security landscape, from compressed decision-making timelines and asymmetric threat capabilities to the erosion of trust that creates strategic vulnerabilities. You can listen to David and Erica's full conversation here and catch new episodes of Threat Vector from Palo Alto Networks each Thursday on your favorite podcast app. Selected Reading EU Sanctions Iranian and Chinese Firms for Cyberattacks Against European Networks (TechNadu) DHS-built surveillance apparatus to surge in year ahead, documents show (FedScoop) AI firm Anthropic seeks weapons expert to stop users from 'misuse' (BBC) Stryker attack wiped tens of thousands of devices, no malware needed (Bleeping Computer) LeakNet ransomware uses ClickFix and Deno runtime for stealthy attacks (Bleeping Computer) Sears Exposed AI Chatbot Phone Calls and Text Chats to Anyone on the Web (WIRED) China's biggest cybersecurity firm accidentally leaked an SSL key in a public installer (Neowin) Google has signed the Industry Accord Against Online Scams and Fraud. (Google) Teenage girls sue Musk's xAI, accusing Grok tool of creating child sexual abuse material (The Guardian) Free parking in Russia after Distributed Denial-of-Service attack knocks city's parking system offline (Bitdefender) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
You get a front-row seat to how Michael Grande turned hard-won tech chops and late-night studio hacks into real music-business wins. From escaping NAMM chaos and leveraging smart PR and management, to transforming a throwaway “stupid idea” into Card Chords—an Amazon-topping guitar tool born from a Cricut, Guitar Center testing, and sheer persistence—you see how necessity, experimentation, and saying yes the first time landed him in Jimi Hendrix's old bedroom at Electric Lady Studios, shredding in the lineage of Vai and Satriani, and inventing Tone Picks on the fly. Along the way, you're reminded that when you know you're right, you embrace it, protect your IP, and keep swinging big—whether that's launching music schools, eyeing Shark Tank with a bold offer, or pivoting your career from Wall Street CTO and Certified Ethical Hacker to full-on guitar innovator. Then you're pushed to rethink how you teach, lead, and build your own music brand. You learn why great schools and studios run on clear mission statements, strong unique selling propositions, and a coaching mindset that focuses on the student, not the curriculum—getting them hooked on the songs they actually want to play, then turning them toward what they need. You see how asking potential customers for their own answers, treating every audience like they matter, and showing up like a coach instead of a teacher all point to one core operating principle: you're never off-duty, because you Always Be Performing—ALWAYS. 00:00:00 Gig Gab 525 – Monday, March 16th, 2026 March 16th: Freedom of Information Day Guest co-host: Michael Grande from Card Chords and more 00:02:14 Getting out of NAMM 00:03:10 Have a good PR guy! Christopher Buttner 00:04:15 Hey, NAMM: How high can I go? 00:06:09 Can you afford NOT to hire a manager? Or a PR person? Our Mistakes are Our Tuition – Business Brain 00:08:04 COVID Vaccines lead to Card Chords Mike was a (very successful) Certified Ethical Hacker & CTO on Wall Street 00:11:09 Dad – come up with an idea to teach people how to play guitar “That's a stupid idea” – Ignore, and move on. Bought a Cricut machine, built the prototype and tested it on hundreds of guitars at Guitar Center Came out on December 21st, and became Amazon's #1 Musical Accessories item within 30 days Also includes an eBook to teach out Beatles, Bon Jovi, Guns and Roses songs WITH Card Chords 00:16:35 Born of Necessity! 00:18:39 The birth of Tone Picks Story time: I didn't bring a 12-string to Electric Lady Studios at 3am Taped two picks together to simulate a 12-string sound. 00:21:41 How did you get on the list of Electric Lady Studios session players? Mike was a shredder after Steve Vai, Joe Satriani, etc 00:22:27 Recording in Jimi Hendrix's old bedroom at Electric Lady Studios! Say yes the first time! Sponsors 00:25:39 SPONSOR: Factor, America's #1 Ready-To-Eat Meal Kit, can help you fuel up fast with flavorful and nutritious ready-to-eat meals delivered straight to your door. Visit FactorMeals.com/giggab50off and use code giggab50off for 50% off! 00:27:22 SPONSOR: Gusto. Get three months free when you run your first payroll when you start at https://gusto.com/giggab 00:28:51 Mike uses Gusto for his Music Schools! 00:30:33 Running music schools Mike's Book: From Teacher to Coach: (And why you would NEVER want to be a Teacher) Taught private lessons, then students wanted more, so… Mike started The Staten Island School of Rock 00:33:37 Mike's coaching methods are different Learning hands-on Getting students hooked on the songs you want to play THEN turn them around 00:34:42 You gotta be juiced about playing the songs Gig Gab 500 with Skylar and the drum coaching story 00:37:16 You need to have a mission statement Mike's: “We build the confidence and self-esteem through music lessons” You need a Unique Selling Proposition! 00:39:30 Mike's Unique Selling Proposition Never answer the question… ask the potential customer for the answer! 00:41:48 A teacher focuses on the curriculum, a coach focuses on the student 00:42:44 Mary Fanaro's Rwanda Rocks Rwanda's Minister of Education: The children of Rwanda don't need teachers, they need coaches. 00:48:08 When you know you're right, embrace it. 00:49:45 Always Be Performing…ALWAYS! 00:53:18 An audience wants to be treated 00:55:23 We're always wearing 00:57:54 The Chinese stole Mike's IP for Card Chords Mike's got a new product that is in the running for Shark Tank Mike's offer to Shark Tank will be: 20% of his company for $1 01:03:23 Gig Gab 525 Outtro Follow Michael Grande CardChords.com Contact Gig Gab! @GigGabPodcast on Instagram feedback@giggabpodcast.com Sign Up for the Gig Gab Mailing List The post From Wall Street Hacker to Music Mogul: Michael Grande's Journey – Gig Gab 525 appeared first on Gig Gab.
This is a recap of the top 10 posts on Hacker News on March 14, 2026. This podcast was generated by wondercraft.ai (00:30): Ageless Linux – Software for humans of indeterminate ageOriginal post: https://news.ycombinator.com/item?id=47381791&utm_source=wondercraft_ai(01:57): What happens when US economic data becomes unreliableOriginal post: https://news.ycombinator.com/item?id=47378638&utm_source=wondercraft_ai(03:25): Games with loot boxes to get minimum 16 age rating across EuropeOriginal post: https://news.ycombinator.com/item?id=47371692&utm_source=wondercraft_ai(04:52): RAM kits are now sold with one fake RAM stick alongside a real oneOriginal post: https://news.ycombinator.com/item?id=47375085&utm_source=wondercraft_ai(06:20): Montana passes Right to Compute act (2025)Original post: https://news.ycombinator.com/item?id=47376767&utm_source=wondercraft_ai(07:48): XML is a cheap DSLOriginal post: https://news.ycombinator.com/item?id=47375764&utm_source=wondercraft_ai(09:15): Claude March 2026 usage promotionOriginal post: https://news.ycombinator.com/item?id=47380647&utm_source=wondercraft_ai(10:43): GIMP 3.2 releasedOriginal post: https://news.ycombinator.com/item?id=47380465&utm_source=wondercraft_ai(12:11): Head of FCC threatens broadcaster licenses over critical coverage of Iran warOriginal post: https://news.ycombinator.com/item?id=47380294&utm_source=wondercraft_ai(13:38): Please do not A/B test my workflowOriginal post: https://news.ycombinator.com/item?id=47375682&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
This week, pro-Iranian hackers claimed responsibility for a devastating cyberattack against U.S. medical device company Stryker. They have also targeted data centers and industrial facilities in both the United States and Israel. As the war with Iran continues, experts are expecting an increase in such cyber-attacks in an effort to degrade the war effort, strain cyber security efforts and cause as much damage to American companies, and the economy as possible. FOX's Tonya J. Powers speaks with Michael Crean, Senior Vice President of Managed Services at SonicWall, a comprehensive, AI-driven cybersecurity solutions company that specializes in next-generation firewalls and cloud security, who says the goal is to wear down the war effort and hit Americans at home. Click Here To Follow 'The FOX News Rundown: Evening Edition' Learn more about your ad choices. Visit podcastchoices.com/adchoices
Hacker After Dark 3-13-26 by 1010 XL Jax Sports Radio
This is a recap of the top 10 posts on Hacker News on March 13, 2026. This podcast was generated by wondercraft.ai (00:30): Meta Platforms: Lobbying, dark money, and the App Store Accountability ActOriginal post: https://news.ycombinator.com/item?id=47362528&utm_source=wondercraft_ai(01:55): Can I run AI locally?Original post: https://news.ycombinator.com/item?id=47363754&utm_source=wondercraft_ai(03:21): “This is not the computer for you”Original post: https://news.ycombinator.com/item?id=47359744&utm_source=wondercraft_ai(04:47): TUI Studio – visual terminal UI design toolOriginal post: https://news.ycombinator.com/item?id=47362613&utm_source=wondercraft_ai(06:13): Vite 8.0 Is OutOriginal post: https://news.ycombinator.com/item?id=47360730&utm_source=wondercraft_ai(07:39): Qatar helium shutdown puts chip supply chain on a two-week clockOriginal post: https://news.ycombinator.com/item?id=47363584&utm_source=wondercraft_ai(09:05): 1M context is now generally available for Opus 4.6 and Sonnet 4.6Original post: https://news.ycombinator.com/item?id=47367129&utm_source=wondercraft_ai(10:30): The Wyden Siren Goes Off Again: We'll Be "Stunned" by NSA Under Section 702Original post: https://news.ycombinator.com/item?id=47366374&utm_source=wondercraft_ai(11:56): Elon Musk pushes out more xAI founders as AI coding effort faltersOriginal post: https://news.ycombinator.com/item?id=47366666&utm_source=wondercraft_ai(13:22): E2E encrypted messaging on Instagram will no longer be supported after 8 MayOriginal post: https://news.ycombinator.com/item?id=47363922&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
This week, pro-Iranian hackers claimed responsibility for a devastating cyberattack against U.S. medical device company Stryker. They have also targeted data centers and industrial facilities in both the United States and Israel. As the war with Iran continues, experts are expecting an increase in such cyber-attacks in an effort to degrade the war effort, strain cyber security efforts and cause as much damage to American companies, and the economy as possible. FOX's Tonya J. Powers speaks with Michael Crean, Senior Vice President of Managed Services at SonicWall, a comprehensive, AI-driven cybersecurity solutions company that specializes in next-generation firewalls and cloud security, who says the goal is to wear down the war effort and hit Americans at home. Click Here To Follow 'The FOX News Rundown: Evening Edition' Learn more about your ad choices. Visit podcastchoices.com/adchoices
Gator legend Patric Young and Ryan "the Hacker" Green preview Florida's path to the SEC Championship on Gator Bytes!Follow us on social media!►Twitter: https://twitter.com/1010xl►Tik Tok: https://www.tiktok.com/@1010xl►Instagram: https://www.instagram.com/1010xljax►Facebook: https://www.facebook.com/1010xlCheck us out wherever you stream podcasts!►Apple: https://podcasts.apple.com/us/podcast/1010-xl-jax-sports-radio/id1011442917►Soundcloud: https://soundcloud.com/1010xl-92-5-fm-jax►Spotify: https://open.spotify.com/show/4QMbFucyBE1NnCHes9A7CVFind all of our shows here! https://1010xl.com/listen/#gators #floridagators #florida #floridafootball #gatorsfootball #floridagatorsfootball #uf #sec #secfootball #cfb #collegefootball #football #jonsumrall #tramelljones #jadanbaugh #floridabasketball #gatorsbasketball #toddgolden #floridagatorsbasketball #secbasketball #collegebasketball #cbb
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
This is a recap of the top 10 posts on Hacker News on March 12, 2026. This podcast was generated by wondercraft.ai (00:30): Malus – Clean Room as a ServiceOriginal post: https://news.ycombinator.com/item?id=47350424&utm_source=wondercraft_ai(01:56): Shall I implement it? NoOriginal post: https://news.ycombinator.com/item?id=47357042&utm_source=wondercraft_ai(03:22): Innocent woman jailed after being misidentified using AI facial recognitionOriginal post: https://news.ycombinator.com/item?id=47356968&utm_source=wondercraft_ai(04:48): Show HN: s@: decentralized social networking over static sitesOriginal post: https://news.ycombinator.com/item?id=47344548&utm_source=wondercraft_ai(06:14): Asian governments roll out 4-day weeks, WFH to solve fuel crisis caused by warOriginal post: https://news.ycombinator.com/item?id=47352215&utm_source=wondercraft_ai(07:40): ATMs didn't kill bank teller jobs, but the iPhone didOriginal post: https://news.ycombinator.com/item?id=47351371&utm_source=wondercraft_ai(09:06): Returning to Rails in 2026Original post: https://news.ycombinator.com/item?id=47347064&utm_source=wondercraft_ai(10:32): Big data on the cheapest MacBookOriginal post: https://news.ycombinator.com/item?id=47349277&utm_source=wondercraft_ai(11:58): Dolphin Progress Release 2603Original post: https://news.ycombinator.com/item?id=47348304&utm_source=wondercraft_ai(13:24): US private credit defaults hit record 9.2% in 2025, Fitch saysOriginal post: https://news.ycombinator.com/item?id=47349806&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
A cybersecurity breach exposed files connected to the FBI's investigation of Jeffrey Epstein after a hacker gained unauthorized access to a server at the FBI's New York Field Office in February 2023. The intrusion occurred at the bureau's Child Exploitation Forensic Lab when a server used to handle digital evidence was accidentally left vulnerable by an FBI special agent navigating internal procedures for managing forensic data. According to information reviewed from Justice Department documents and sources familiar with the incident, the hacker was able to access files tied to the Epstein investigation. The breach reportedly came to light after the intruder left a message on the compromised system, alerting investigators that someone had accessed the server. The FBI later described the event as an isolated cyber incident, saying access was quickly cut off and the affected network secured while an internal investigation continued.The identity and nationality of the hacker remain unknown, though officials believe the breach was likely carried out by an independent cybercriminal rather than a foreign government intelligence service. Sources familiar with the incident said the hacker appeared unaware that the system belonged to a law enforcement agency and reportedly reacted with disgust after encountering child exploitation evidence on the device. The intruder allegedly left a note threatening to report the material to authorities before the FBI eventually secured the system. While it remains unclear exactly which Epstein-related files were accessed or whether any data was downloaded, the incident highlights the potential intelligence value of the Epstein case files, which contain sensitive information about the financier's activities and connections.to contact me:bobbycapucci@protonmail.comsource:Epstein files compromised by foreign hacker who breached FBI – Reuters | Cybernews
Hackers with ties to Iran have claimed responsibility for a cyberattack at Stryker, a medical device company based in the U.S. Stryker says the attack disrupted global Microsoft networks, but it believes the situation is "contained." CBS News contributor Chris Krebs explains what the attack could mean about escalation in the Iran war and how the partial government shutdown is making an impact. Today's teens and tweens are less independent and spend less time with friends away from their families compared to previous generations, research shows. Dr. Becky Kennedy and Dr. Sheryl Ziegler explain how parents can help their children build independence while also staying connected to them. The fourth contestant eliminated from "Survivor: In the Hands of the Fans" joins "CBS Mornings" to discuss being voted off and playing the game again. John Grisham, who has written 52 bestsellers, reveals the name of his new novel on "CBS Mornings" and talks about how writing about espionage compares to his legal thrillers. To learn more about listener data and our privacy practices visit: https://www.audacyinc.com/privacy-policy Learn more about your ad choices. Visit https://podcastchoices.com/adchoices
Hacker After Dark 3-11-26 by 1010 XL Jax Sports Radio
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
This is a recap of the top 10 posts on Hacker News on March 11, 2026. This podcast was generated by wondercraft.ai (00:30): Don't post generated/AI-edited comments. HN is for conversation between humansOriginal post: https://news.ycombinator.com/item?id=47340079&utm_source=wondercraft_ai(01:59): Create value for others and don't worry about the returnsOriginal post: https://news.ycombinator.com/item?id=47332074&utm_source=wondercraft_ai(03:29): Temporal: The 9-year journey to fix time in JavaScriptOriginal post: https://news.ycombinator.com/item?id=47336989&utm_source=wondercraft_ai(04:59): Whistleblower claims ex-DOGE member says he took Social Security data to new jobOriginal post: https://news.ycombinator.com/item?id=47335572&utm_source=wondercraft_ai(06:29): Making WebAssembly a first-class language on the WebOriginal post: https://news.ycombinator.com/item?id=47331811&utm_source=wondercraft_ai(07:59): The MacBook NeoOriginal post: https://news.ycombinator.com/item?id=47334293&utm_source=wondercraft_ai(09:29): How we hacked McKinsey's AI platformOriginal post: https://news.ycombinator.com/item?id=47333627&utm_source=wondercraft_ai(10:59): Zig – Type Resolution Redesign and Language ChangesOriginal post: https://news.ycombinator.com/item?id=47330836&utm_source=wondercraft_ai(12:29): Lego's 0.002mm specification and its implications for manufacturing (2025)Original post: https://news.ycombinator.com/item?id=47335237&utm_source=wondercraft_ai(13:59): The dead Internet is not a theory anymoreOriginal post: https://news.ycombinator.com/item?id=47340935&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Timestamps:3:45 - Icebreaker Content13:50 - Iran Insanity1:00:43 - World at War1:29:30 - Epstein File HackersWelcome to The Morning Dump, where we dive headfirst into the deep end of the pool of current events, conspiracy, and everything in between. Join us for a no-holds-barred look at the week's hottest topics, where we flush away the fluff and get straight to the substance.Please consider supporting my work- Patreon- https://www.patreon.com/nowayjose2020 Only costs $2/month and will get you access to episodes earlier than the publicNo Way, Jose! Rumble Channel- https://rumble.com/c/c-3379274 No Way, Jose! YouTube Channel- https://youtube.com/channel/UCzyrpy3eo37eiRTq0cXff0g My Podcast Host- https://redcircle.com/shows/no-way-jose Apple podcasts- https://podcasts.apple.com/us/podcast/no-way-jose/id1546040443 Spotify- https://open.spotify.com/show/0xUIH4pZ0tM1UxARxPe6Th Stitcher- https://www.stitcher.com/show/no-way-jose-2 Amazon Music- https://music.amazon.com/podcasts/41237e28-c365-491c-9a31-2c6ef874d89d/No-Way-Jose Google Podcasts- https://www.google.com/podcasts?feed=aHR0cHM6Ly9mZWVkcy5yZWRjaXJjbGUuY29tL2ZkM2JkYTE3LTg2OTEtNDc5Ny05Mzc2LTc1M2ExZTE4NGQ5Yw%3D%3DRadioPublic- https://radiopublic.com/no-way-jose-6p1BAO Vurbl- https://vurbl.com/station/4qHi6pyWP9B/ Feel free to contact me at thelibertymovementglobal@gmail.com#IranInsanity #WorldAtWar #EpsteinFiles #EpsteinHack #IranWar #WW3 #EpsteinFilesLeaked #IranChaos #GlobalConflict #EpsteinTruth #IranMadness #WorldWarNow #EpsteinFilesHack #IranCrisis #WarOnTheHorizon #ExposeEpstein #IranEscalation #WorldWar3 #EpsteinDocuments #InsaneIran
If you like what you hear, please subscribe, leave us a review and tell a friend!
"Hacking is more than just a crime. It's a survival trait." In which we Hack the Planet! and talk electronic music, 90s fashion, and Hackers with the wonderful Ryan Keely.Ryan Keely:https://www.instagram.com/ryankeelytm/Alex's zine!https://www.patreon.com/HighOccultureThe OC Again online:https://www.buzzsprout.com/2411525We LOVE Magpie Cinema Club!https://linktr.ee/magpiecinemaclubYou can buy a You Are Good logo shirt DESIGNED BY THE GREAT LIZ CLIMO here. (Liz Climo designed our logo!)https://www.bonfire.com/you-are-good-shirts160/You Are Good is a feelings podcast about movies.You can make a contribution to Palestine Children's Relief Fund here:https://www.pcrf.net/Miranda Zickler produced and edited this episode:https://linktr.ee/mirandatheswampmonsterFresh Lesh produces the beats for our episodes.
Remember when computer hackers weren't all incels? Travel with us to a bygone era as we talk about the 1995 movie Hackers, starring Johnny Lee Miller and Angelina Jolie. Tune in next week when our movie will be... Godzilla: All Monsters Attack. ----- On March 17th Emily will be on the podcast Scam Goddess. Make sure to tune in! Pre-order Amazing Spider-Man: Spider-versity co-written by Jordan Morris. Get yourself a signed copy of all 5 issues by clicking this link! bit.ly/spideyschool
Hacker After Dark 3-10-26 by 1010 XL Jax Sports Radio
A cybersecurity breach exposed files connected to the FBI's investigation of Jeffrey Epstein after a hacker gained unauthorized access to a server at the FBI's New York Field Office in February 2023. The intrusion occurred at the bureau's Child Exploitation Forensic Lab when a server used to handle digital evidence was accidentally left vulnerable by an FBI special agent navigating internal procedures for managing forensic data. According to information reviewed from Justice Department documents and sources familiar with the incident, the hacker was able to access files tied to the Epstein investigation. The breach reportedly came to light after the intruder left a message on the compromised system, alerting investigators that someone had accessed the server. The FBI later described the event as an isolated cyber incident, saying access was quickly cut off and the affected network secured while an internal investigation continued.The identity and nationality of the hacker remain unknown, though officials believe the breach was likely carried out by an independent cybercriminal rather than a foreign government intelligence service. Sources familiar with the incident said the hacker appeared unaware that the system belonged to a law enforcement agency and reportedly reacted with disgust after encountering child exploitation evidence on the device. The intruder allegedly left a note threatening to report the material to authorities before the FBI eventually secured the system. While it remains unclear exactly which Epstein-related files were accessed or whether any data was downloaded, the incident highlights the potential intelligence value of the Epstein case files, which contain sensitive information about the financier's activities and connections.to contact me:bobbycapucci@protonmail.comsource:Epstein files compromised by foreign hacker who breached FBI – Reuters | CybernewsBecome a supporter of this podcast: https://www.spreaker.com/podcast/the-epstein-chronicles--5003294/support.
This is a recap of the top 10 posts on Hacker News on March 10, 2026. This podcast was generated by wondercraft.ai (00:30): Tony Hoare has diedOriginal post: https://news.ycombinator.com/item?id=47324054&utm_source=wondercraft_ai(01:54): Online age-verification tools for child safety are surveilling adultsOriginal post: https://news.ycombinator.com/item?id=47322635&utm_source=wondercraft_ai(03:19): After outages, Amazon to make senior engineers sign off on AI-assisted changesOriginal post: https://news.ycombinator.com/item?id=47323017&utm_source=wondercraft_ai(04:44): Meta acquires MoltbookOriginal post: https://news.ycombinator.com/item?id=47323900&utm_source=wondercraft_ai(06:09): I put my whole life into a single databaseOriginal post: https://news.ycombinator.com/item?id=47321233&utm_source=wondercraft_ai(07:34): Yann LeCun raises $1B to build AI that understands the physical worldOriginal post: https://news.ycombinator.com/item?id=47320600&utm_source=wondercraft_ai(08:59): Redox OS has adopted a Certificate of Origin policy and a strict no-LLM policyOriginal post: https://news.ycombinator.com/item?id=47320661&utm_source=wondercraft_ai(10:24): Show HN: How I topped the HuggingFace open LLM leaderboard on two gaming GPUsOriginal post: https://news.ycombinator.com/item?id=47322887&utm_source=wondercraft_ai(11:49): Two Years of Emacs SoloOriginal post: https://news.ycombinator.com/item?id=47317616&utm_source=wondercraft_ai(13:14): Debian decides not to decide on AI-generated contributionsOriginal post: https://news.ycombinator.com/item?id=47324087&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
A Scottish hacker in a dressing gown, drinking beer at 4 a.m., may have stumbled across evidence of a secret U.S. space fleet — and the government wanted him to spend 70 years behind bars for it.*No AI Voices Are Used In The Narration Of This Podcast*PRINT VERSION: https://weirddarkness.com/mckinnon-nasa-hacker-ufo/WeirdDarkness® is a registered trademark. Copyright ©2026, Weird Darkness.#WeirdDarkness, #WeirdDarkNEWS
The Cybercrime Magazine Podcast brings you daily cybercrime news on WCYB Digital Radio, the first and only 7x24x365 internet radio station devoted to cybersecurity. Stay updated on the latest cyberattacks, hacks, data breaches, and more with our host. Don't miss an episode, airing every half-hour on WCYB Digital Radio and daily on our podcast. Listen to today's news at https://soundcloud.com/cybercrimemagazine/sets/cybercrime-daily-news. Brought to you by our Partner, Evolution Equity Partners, an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies. Learn more at https://evolutionequity.com
This is a recap of the top 10 posts on Hacker News on March 09, 2026. This podcast was generated by wondercraft.ai (00:30): Ireland shuts last coal plant, becomes 15th coal-free country in Europe (2025)Original post: https://news.ycombinator.com/item?id=47307055&utm_source=wondercraft_ai(01:54): US Court of Appeals: TOS may be updated by email, use can imply consent [pdf]Original post: https://news.ycombinator.com/item?id=47305461&utm_source=wondercraft_ai(03:18): FontCrafter: Turn your handwriting into a real fontOriginal post: https://news.ycombinator.com/item?id=47306655&utm_source=wondercraft_ai(04:42): Building a Procedural Hex Map with Wave Function CollapseOriginal post: https://news.ycombinator.com/item?id=47311815&utm_source=wondercraft_ai(06:06): Is legal the same as legitimate: AI reimplementation and the erosion of copyleftOriginal post: https://news.ycombinator.com/item?id=47310160&utm_source=wondercraft_ai(07:31): How the Sriracha guys screwed over their supplierOriginal post: https://news.ycombinator.com/item?id=47304831&utm_source=wondercraft_ai(08:55): Florida judge rules red light camera tickets are unconstitutionalOriginal post: https://news.ycombinator.com/item?id=47312090&utm_source=wondercraft_ai(10:19): Bluesky CEO Jay Graber is stepping downOriginal post: https://news.ycombinator.com/item?id=47313884&utm_source=wondercraft_ai(11:43): OpenAI is walking away from expanding its Stargate data center with OracleOriginal post: https://news.ycombinator.com/item?id=47315128&utm_source=wondercraft_ai(13:08): JSLinux Now Supports x86_64Original post: https://news.ycombinator.com/item?id=47311484&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Send a textThe cybersecurity battlefield is evolving at a lightning pace—and in 2025, we saw threats go from sophisticated to unstoppable. Identity has become the new frontline, with hackers weaponizing OAuth tokens, SaaS integrations, and impersonations to breach even the most secure environments. But here's the brutal truth: if you're not prepared for these attack vectors, you're already one step behind.In this electrifying episode, Sergey Novikov, CyberProof's director of cyber security content, exposes the shocking shifts that are defining 2025's cyber landscape—and why you can't afford to ignore them. He reveals how nation-states are collaborating openly in a cyber arms race, blending espionage, financial theft, and disruptive operations into devastating hybrid attacks. AI isn't just an overhyped buzzword anymore; it's turbocharging ransomware, automating infiltration, and lowering the bar for low-skill hackers to launch advanced, lightning-fast attacks.You'll discover:How identity has overtaken infrastructure as the primary attack surface, and what this means for your organization's defenses.The dangerous collaboration among state-sponsored groups—blurring lines between espionage and cybercrime—and why it's shaping the next wave of threats.Surprising insights on supply chain attacks targeting SaaS platforms and third-party vendors—plus real-world examples like the water supply hack that could have poisoned millions.The terrifying rise of AI-driven autonomous attacks capable of multi-step, pincer-movement operations with minimal human intervention.Why the global cyber power struggle—especially between nations like Russia, China, and Iran—will spill over into the digital realm even more aggressively in 2026.This isn't just another “cybersecurity forecast”—it's a wake-up call. If you're serious about protecting your business, personal data, or even your family from the chaos coming next year, this episode is your first line of defense.Sergey Novikov isn't just talking theory; he's a top cybersecurity thought leader, unraveling the complex tactics used by today's cyber adversaries and sharing hard truths about where we're headed.Are you ready to face the terrifying realities of tomorrow's cyber world? If you're a security professional, a business owner, or anyone who depends on digital trust, you cannot afford to miss this.Tune in now. Get informed. Get prepared. The future of cybersecurity starts today.Support the showFollow the Podcast on Social Media! Tesla Referral Code: https://ts.la/joseph675128 YouTube: https://www.youtube.com/@securityunfilteredpodcast Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcast Affiliates➡️ OffGrid Faraday Bags: https://offgrid.co/?ref=gabzvajh➡️ OffGrid Coupon Code: JOE➡️ Unplugged Phone: https://unplugged.com/Unplugged's UP Phone - The performance you expect, with the privacy you deserve. Meet the alternative. Use Code UNFILTERED at checkout*See terms and conditions at affiliated webpages. Offers are subject to change. These are affiliated/paid promotions.
What if the biggest UFO secrets in history were hiding in plain sight inside government computers? In this episode, we dive into the astonishing true stories of two hackers who risked everything to uncover classified UFO information. From British hacker Gary McKinnon infiltrating NASA and Pentagon networks in search of suppressed technologies to Matthew Bevan's earlier breach of U.S. Air Force systems while hunting for evidence of anti-gravity propulsion and the legendary Hangar 18, their digital intrusions exposed shocking vulnerabilities in military cybersecurity and ignited international controversy. But these weren't ordinary cybercrimes. Their pursuit of UFO truth triggered global headlines, extradition battles, and fears of espionage at the highest levels of government. Were they reckless hackers, curious truth-seekers, or accidental whistleblowers who stumbled too close to secrets the world was never meant to see? Join us as we unravel the wild saga of two men, two historic hacks, and the relentless quest to uncover what governments may be hiding about UFOs. Please take a moment to rate and review us on Spotify and Apple. Book Ryan on CAMEO at: https://bit.ly/3kwz3DO Patreon: http://www.patreon.com/somewhereskies ByMeACoffee: http://www.buymeacoffee.com/UFxzyzHOaQ PayPal: sprague51@hotmail.com Substack: https://ryansprague.substack.com/ All Socials and Books: https://linktr.ee/somewhereskiespod Email: ryan.sprague51@gmail.com SpectreVision Radio: https://www.spectrevision.com/podcasts Opening Theme Song by Septembryo Closing Song by Per Kiilstofte Copyright © 2026 Ryan Sprague. All rights reserved. #UFOs #UAP #UFODisclosure #AlienLife #UFOCommunity #Conspiracy #CyberSecurity #Hacking #SomewhereInTheSkies #Spies #Spying #UFOHackers #ComputerHackers #GaryMcKinnon Learn more about your ad choices. Visit megaphone.fm/adchoices
Fergus Hay is the CEO & co-founder of The Hacking Games, a recruitment tech platform that uses AI to identify gamers whose skills can be transferred to ethical hacking and cybersecurity roles. In this episode, Hay joins hosts Paul John Spaulding, Kyle Haglund, VP of Audio Engineering at Cybercrime Magazine, and Sam White, Video Producer at Cybercrime Magazine, to discuss his company, what inspired the creation of it, why ethical hackers are valuable, and more. • For more on cybersecurity, visit us at https://cybersecurityventures.com
This is a recap of the top 10 posts on Hacker News on March 08, 2026. This podcast was generated by wondercraft.ai (00:30): Ask HN: Please restrict new accounts from postingOriginal post: https://news.ycombinator.com/item?id=47300329&utm_source=wondercraft_ai(01:56): Agent Safehouse – macOS-native sandboxing for local agentsOriginal post: https://news.ycombinator.com/item?id=47301085&utm_source=wondercraft_ai(03:22): FrameBookOriginal post: https://news.ycombinator.com/item?id=47298044&utm_source=wondercraft_ai(04:48): Apple's 512GB Mac Studio vanishes, a quiet acknowledgment of the RAM shortageOriginal post: https://news.ycombinator.com/item?id=47296302&utm_source=wondercraft_ai(06:14): The changing goalposts of AGI and timelinesOriginal post: https://news.ycombinator.com/item?id=47299009&utm_source=wondercraft_ai(07:41): Ask HN: How to be alone?Original post: https://news.ycombinator.com/item?id=47296547&utm_source=wondercraft_ai(09:07): Cloud VM benchmarks 2026Original post: https://news.ycombinator.com/item?id=47293119&utm_source=wondercraft_ai(10:33): I ported Linux to the PS5 and turned it into a Steam MachineOriginal post: https://news.ycombinator.com/item?id=47296849&utm_source=wondercraft_ai(11:59): LibreOffice Writer now supports MarkdownOriginal post: https://news.ycombinator.com/item?id=47298885&utm_source=wondercraft_ai(13:26): Warn about PyPy being unmaintainedOriginal post: https://news.ycombinator.com/item?id=47293415&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Language Hacker joins the show to talk about the Theory Crafting Event and the upcoming Master's Tour. Are we excited for Cataclysm? Let's find out!
FBI investigates suspicious activities on agency network Over 100 GitHub repositories distributing BoryptGrab stealer Hackers abuse .arpa DNS and ipv6 to evade phishing defenses Get links to all the stories in our show notes: https://cisoseries.com/cybersecurity-news-fbi-network-breach-github-distributes-stealer-hackers-abuse-arpa/ Huge thanks to our sponsor, Dropzone AI Here is a number worth knowing before RSAC. The average enterprise SOC sees tens of thousands of alerts a day. Most get triaged. A fraction get thoroughly investigated. The rest sit in the queue or get auto-closed. Dropzone AI puts AI SOC agents on every one of those alerts. Every alert investigated, end to end, across your full tool stack, around the clock. Over 300 deployments in production today. They are at RSAC this year. Booth 455. dropzone.ai/rsa-2026-ai-diner
Nederlandse inlichtingendiensten waarschuwen dat Russische hackers accounts op Signal en WhatsApp van overheidsmedewerkers, militairen en journalisten hebben overgenomen. Niet door de encryptie te breken, maar door slimme social-engineeringaanvallen: slachtoffers werden verleid om verificatiecodes of QR-codes te delen. Daarmee konden aanvallers toegang krijgen tot privéchats en groepsgesprekken. In deze aflevering bespreken we hoe deze aanval werkt en waarom zelfs versleutelde chatapps geen garantie zijn voor veilige communicatie.
This is a recap of the top 10 posts on Hacker News on March 07, 2026. This podcast was generated by wondercraft.ai (00:30): Tell HN: I'm 60 years old. Claude Code has re-ignited a passionOriginal post: https://news.ycombinator.com/item?id=47282777&utm_source=wondercraft_ai(01:56): LLMs work best when the user defines their acceptance criteria firstOriginal post: https://news.ycombinator.com/item?id=47283337&utm_source=wondercraft_ai(03:23): Uploading Pirated Books via BitTorrent Qualifies as Fair Use, Meta ArguesOriginal post: https://news.ycombinator.com/item?id=47285960&utm_source=wondercraft_ai(04:49): Ki Editor - an editor that operates on the ASTOriginal post: https://news.ycombinator.com/item?id=47286311&utm_source=wondercraft_ai(06:16): UUID package coming to Go standard libraryOriginal post: https://news.ycombinator.com/item?id=47283665&utm_source=wondercraft_ai(07:43): Put the zip code firstOriginal post: https://news.ycombinator.com/item?id=47292485&utm_source=wondercraft_ai(09:09): Effort to prevent government officials from engaging in prediction marketsOriginal post: https://news.ycombinator.com/item?id=47291406&utm_source=wondercraft_ai(10:36): A decade of Docker containersOriginal post: https://news.ycombinator.com/item?id=47289311&utm_source=wondercraft_ai(12:02): CasNumOriginal post: https://news.ycombinator.com/item?id=47291292&utm_source=wondercraft_ai(13:29): Yoghurt delivery women combatting loneliness in JapanOriginal post: https://news.ycombinator.com/item?id=47287344&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Hacker After Dark 3-6-26 by 1010 XL Jax Sports Radio
This is a recap of the top 10 posts on Hacker News on March 06, 2026. This podcast was generated by wondercraft.ai (00:30): Global warming has accelerated significantlyOriginal post: https://news.ycombinator.com/item?id=47275088&utm_source=wondercraft_ai(01:57): System76 on Age Verification LawsOriginal post: https://news.ycombinator.com/item?id=47270784&utm_source=wondercraft_ai(03:24): Tech employment now significantly worse than the 2008 or 2020 recessionsOriginal post: https://news.ycombinator.com/item?id=47278426&utm_source=wondercraft_ai(04:51): Where things stand with the Department of WarOriginal post: https://news.ycombinator.com/item?id=47269263&utm_source=wondercraft_ai(06:19): Workers who love ‘synergizing paradigms' might be bad at their jobsOriginal post: https://news.ycombinator.com/item?id=47274676&utm_source=wondercraft_ai(07:46): Hardening Firefox with Anthropic's Red TeamOriginal post: https://news.ycombinator.com/item?id=47273854&utm_source=wondercraft_ai(09:13): US economy unexpectedly sheds 92k jobs in FebruaryOriginal post: https://news.ycombinator.com/item?id=47275035&utm_source=wondercraft_ai(10:41): Tell HN: I'm 60 years old. Claude Code has ignited a passion againOriginal post: https://news.ycombinator.com/item?id=47282777&utm_source=wondercraft_ai(12:08): LibreSprite – open-source pixel art editorOriginal post: https://news.ycombinator.com/item?id=47272799&utm_source=wondercraft_ai(13:35): Plasma Bigscreen – 10-foot interface for KDE plasmaOriginal post: https://news.ycombinator.com/item?id=47282736&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Hacker After Dark 3-5-26 by 1010 XL Jax Sports Radio
Are the Florida Gators the BEST TEAM in the Country?Gator legend Patric Young and Ryan "the Hacker" Green discuss on Gator Bytes!Follow us on social media!►Twitter: https://twitter.com/1010xl►Tik Tok: https://www.tiktok.com/@1010xl►Instagram: https://www.instagram.com/1010xljax►Facebook: https://www.facebook.com/1010xlCheck us out wherever you stream podcasts!►Apple: https://podcasts.apple.com/us/podcast/1010-xl-jax-sports-radio/id1011442917►Soundcloud: https://soundcloud.com/1010xl-92-5-fm-jax►Spotify: https://open.spotify.com/show/4QMbFucyBE1NnCHes9A7CVFind all of our shows here! https://1010xl.com/listen/#gators #floridagators #florida #floridafootball #gatorsfootball #floridagatorsfootball #uf #sec #secfootball #cfb #collegefootball #football #jonsumrall #tramelljones #jadanbaugh
This is a recap of the top 10 posts on Hacker News on March 05, 2026. This podcast was generated by wondercraft.ai (00:30): Wikipedia was in read-only mode following mass admin account compromiseOriginal post: https://news.ycombinator.com/item?id=47263323&utm_source=wondercraft_ai(01:58): Google Workspace CLIOriginal post: https://news.ycombinator.com/item?id=47255881&utm_source=wondercraft_ai(03:26): Judge orders government to begin refunding more than $130B in tariffsOriginal post: https://news.ycombinator.com/item?id=47261688&utm_source=wondercraft_ai(04:54): GPT-5.4Original post: https://news.ycombinator.com/item?id=47265045&utm_source=wondercraft_ai(06:23): The L in "LLM" Stands for LyingOriginal post: https://news.ycombinator.com/item?id=47257394&utm_source=wondercraft_ai(07:51): No right to relicense this projectOriginal post: https://news.ycombinator.com/item?id=47259177&utm_source=wondercraft_ai(09:19): Pentagon formally labels Anthropic supply-chain riskOriginal post: https://news.ycombinator.com/item?id=47266084&utm_source=wondercraft_ai(10:48): Good software knows when to stopOriginal post: https://news.ycombinator.com/item?id=47261561&utm_source=wondercraft_ai(12:16): Relicensing with AI-Assisted RewriteOriginal post: https://news.ycombinator.com/item?id=47257803&utm_source=wondercraft_ai(13:44): A GitHub Issue Title Compromised 4k Developer MachinesOriginal post: https://news.ycombinator.com/item?id=47263595&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Uma tela capaz de exibir imagens em 3D sem a necessidade de óculos promete mudar a forma como marcas se comunicam com consumidores em ambientes físicos. Essa é a proposta do Spatial Signage, nova solução da Samsung voltada para experiências imersivas em espaços comerciais. Apresentada recentemente durante a CES, a tecnologia chega agora ao mercado brasileiro com potencial para transformar vitrines, lojas, museus e até arenas esportivas. No novo episódio do Podcast Canaltech, conversamos com Kauê Melo, diretor sênior da Divisão B2B da Samsung Brasil, para entender como funciona essa tecnologia e quais setores devem ser os primeiros a adotá-la. Durante a conversa, o executivo explica como o Spatial Signage se diferencia de painéis tradicionais de LED, qual é a experiência de visualização para o público e como a inteligência artificial pode ajudar empresas a criar conteúdos tridimensionais de forma mais simples. Você também vai conferir: linha 5 do metrô de São Paulo agora tem 4G e 5G em todas as estações, Telecom discute cobrar por “tokens de IA” no lugar de gigabytes e Hackers exploram poucas brechas, mas com grande impacto. Este podcast foi roteirizado por Fernada Santos e apresentado por Marcelo Fischer e contou com reportagens de Wendel Martins e Jaqueline Souza, sob coordenação de Anaísa Catucci. A trilha sonora é de Guilherme Zomer, a edição de Yuri Sousa e a arte da capa é de Erick Teixeira.See omnystudio.com/listener for privacy information.
Hacker After Dark 3-4-26 by 1010 XL Jax Sports Radio
This is a recap of the top 10 posts on Hacker News on March 04, 2026. This podcast was generated by wondercraft.ai (00:30): MacBook NeoOriginal post: https://news.ycombinator.com/item?id=47247645&utm_source=wondercraft_ai(01:56): Motorola GrapheneOS devices will be bootloader unlockable/relockableOriginal post: https://news.ycombinator.com/item?id=47241551&utm_source=wondercraft_ai(03:22): Nobody gets promoted for simplicityOriginal post: https://news.ycombinator.com/item?id=47246110&utm_source=wondercraft_ai(04:48): Something is afoot in the land of QwenOriginal post: https://news.ycombinator.com/item?id=47249343&utm_source=wondercraft_ai(06:15): An interactive map of Flock CamsOriginal post: https://news.ycombinator.com/item?id=47252049&utm_source=wondercraft_ai(07:41): Agentic Engineering PatternsOriginal post: https://news.ycombinator.com/item?id=47243272&utm_source=wondercraft_ai(09:07): Building a new FlashOriginal post: https://news.ycombinator.com/item?id=47253177&utm_source=wondercraft_ai(10:34): TikTok will not introduce end-to-end encryption, saying it makes users less safeOriginal post: https://news.ycombinator.com/item?id=47241817&utm_source=wondercraft_ai(12:00): Dario Amodei calls OpenAI's messaging around military deal ‘straight up lies'Original post: https://news.ycombinator.com/item?id=47255662&utm_source=wondercraft_ai(13:26): Government grant-funded research should not be published in for-profit journalsOriginal post: https://news.ycombinator.com/item?id=47248341&utm_source=wondercraft_aiThis is a third-party project, independent from HN and YC. Text and audio generated using AI, by wondercraft.ai. Create your own studio quality podcast with text as the only input in seconds at app.wondercraft.ai. Issues or feedback? We'd love to hear from you: team@wondercraft.ai
Possible iPhone-hacking toolkit used by spies Hacker mass-mails HungerRush extortion emails Tycoon 2FA phishing platform dismantled Get the show notes here: https://cisoseries.com/cybersecurity-news-iphone-hacking-toolkit-used-by-spies-hungerrush-extortion-emails-tycoon-phishing-platform-dismantled/ Huge thanks to our sponsor, Adaptive Security This episode is brought to you by Adaptive Security, the first security awareness platform built to stop AI-powered social engineering. Picture a "new hire" who interviews well… except they're synthetic: AI video, AI voice, AI backstory. Once they're in, they go after payroll, internal docs, and access. That's the new reality: the attack surface is trust itself. Adaptive fights back with realistic deepfake simulations and training that actually sticks. adaptivesecurity.com.
We heard there was a new The 'Burbs on Peacock so we made the thrifty choice and watched the old The 'Burbs from 1989, starring Tom Hanks and Carrie Fisher. Tune in next week when our movie will be... Hackers. ----- Follow Emily on Instagram and visit Emily's ETSY store FlemGems See Matt at the Punch Line in San Francisco March 3-7 with Beth Stelling. Jordan wants you to order Predator Bloodshed right away! So do it! Also, Jordan has something great coming out soon: Amazing Spider-Man: Spider-Versity
Hacker After Dark 3-3-26 by 1010 XL Jax Sports Radio
Most doctors treat the average patient. But you are not average, and this episode gives you the precision medicine blueprint to treat yourself like the individual you are, using multi-omic testing, biohacking technology, and longevity science to optimize every layer of your biology. -Watch this episode on YouTube for the full video experience: https://www.youtube.com/@DaveAspreyBPR Host Dave Asprey sits down with Dr. Anil Bajnath, a Board-Certified Family Physician, author of The Longevity Equation, and President and Founder of the American Board of Precision Medicine. He serves as Adjunct Professor at the George Washington University School of Medicine and CEO of the Institute for Human Optimization. Dr. Bajnath is certified through the Institute for Functional Medicine, board certified in anti-aging and regenerative medicine, and is one of the few clinicians actively applying genomics, transcriptomics, proteomics, and epigenetics together in a real clinical practice. Together, Dave and Dr. Bajnath break down why population-based medicine fails individuals, how functional medicine and precision science combine to unlock real human performance, and why your mitochondria sit at the foundation of every longevity strategy worth pursuing. They dig into how AI can help you decode your own inflammasome biology, why biohackers are using “sex drugs” to extend longevity, why vagal nerve stimulation directly suppresses the NLRP3 inflammasome, and which biomarkers like MMP9 and homocysteine mainstream medicine keeps ignoring. They also cover peptides, supplements, the dark side of metformin, microdosing for anti-aging, and why biohacking works best when it's personalized and precise. This is essential listening for anyone serious about longevity, smarter not harder health strategies, metabolism, sleep optimization, brain optimization, functional medicine, and taking full control of their biology. You'll Learn: Why precision medicine outperforms population-based health strategies for human performance How to layer genomics, transcriptomics, and proteomics into one complete biological picture Which longevity biomarkers your doctor is likely ignoring, including MMP9 and homocysteine How vagal nerve stimulation suppresses the NLRP3 inflammasome and drives anti-aging benefits The real story on metformin, peptides, and which supplements actually move the needle How AI can help you understand your own biology and act on it faster Why biohacking precision beats random stacking every time Thank you to our sponsors! • Igniton | Head over to Igniton.com and use code DAVE for an exclusive 15% off your first order. • BEYOND Biohacking Conference 2026 | Register with code DAVE300 for $300 off https://beyondconference.com • Caldera + Lab | Go to https://calderalab.com/DAVE and use code DAVE at checkout for 20% off your first order. • Screenfit | Get your at-home eye training program for 40% off using code DAVE at https://www.screenfit.com/dave. Dave Asprey is a four-time New York Times bestselling author, founder of Bulletproof Coffee, and the father of biohacking. With over 1,000 interviews and 1 million monthly listeners, The Human Upgrade brings you the knowledge to take control of your biology, extend your longevity, and optimize every system in your body and mind. Each episode delivers cutting-edge insights in health, performance, neuroscience, supplements, nutrition, biohacking, emotional intelligence, and conscious living. New episodes are released every Tuesday, Thursday, Friday, and Sunday (BONUS). Dave asks the questions no one else will and gives you real tools to become stronger, smarter, and more resilient. Keywords: precision medicine, biohacking, Dave Asprey Cialis, Anil Bajnath, American Board of Precision Medicine, multi-omics, genomics, transcriptomics, proteomics, epigenetics, NLRP3 inflammasome, vagal nerve stimulation, MMP9, homocysteine, mitochondria, longevity, anti-aging, peptides, BPC-157, metformin, rapamycin, functional medicine, human performance, supplements, EGCG, exposome, nitric oxide, vascular health, metabolism, brain optimization, AI health, biohacking technology, Dave Asprey Sex Drugs Resources: • Learn More About Anil's Work And the Institute For Human Optimization At: https://ifho.org/ • Get My 2026 Clean Nicotine Roadmap | Enroll for free at https://daveasprey.com/2026-clean-nicotine-roadmap/ • Dave Asprey's Latest News | Go to https://daveasprey.com/ to join Inside Track today. • Danger Coffee: https://dangercoffee.com/discount/dave15 • My Daily Supplements: SuppGrade Labs (15% Off) • Favorite Blue Light Blocking Glasses: TrueDark (15% Off) • Dave Asprey's BEYOND Conference: https://beyondconference.com • Dave Asprey's New Book – Heavily Meditated: https://daveasprey.com/heavily-meditated • Join My Substack (Live Access To Podcast Recordings): https://substack.daveasprey.com/ • Upgrade Labs: https://upgradelabs.com Timestamps: 00:00 – Trailer 00:53 – Intro to Precision Medicine 01:58 – Dr. Bajnath's Holistic Health Journey 05:03 – Pharmaceuticals vs. Supplements 07:58 – Peptides and Longevity Molecules 10:34 – Sexual Health and Vitality 13:56 – Vascular Health and Blood Flow 15:14 – Multi-Omics Approach 19:03 – DNA and Genomics 22:17 – Transcriptomics and RNA 24:24 – Proteomics and Inflammation Markers 32:00 – The Human Exposome 34:55 – Key Health Biomarkers 36:58 – Cell Membrane Dynamics 40:28 – Biological Investment Strategy 41:53 – Life Extension Possibilities 48:52 – Bioenergetics and Mitochondria 49:47 – Quantum Medicine and the Future 51:33 – Vagal Nerve Stimulation See Privacy Policy at https://art19.com/privacy and California Privacy Notice at https://art19.com/privacy#do-not-sell-my-info.
Hacker After Dark 3-2-26 by 1010 XL Jax Sports Radio
Cyberattacks that used to take months now take minutes. And your defenders still can't keep up.Rob T. Lee, Chief AI Officer of the SANS Institute, and David A. Bray, Chair of the Accelerator at the Stimson Center, explain why AI gives attackers a structural advantage. Attackers don't care if their AI breaks something. Your security team can't take that risk. That asymmetry changes everything.✅ You'll discover:✅ Why attackers will always remove the human in the loop faster than defenders can, and the risk calculus that creates✅ How "death by 1,000 cuts" works: $300 per person times 10,000 targets via SIM farms equals a single ransomware payout✅ The federated learning approach that lets organizations share threat intelligence without exposing their own data or vulnerabilities✅ Why hackers are exploiting AI hallucinations by writing real code libraries for packages that models reliably hallucinate✅ How to identify the right cybersecurity talent: hire for learning velocity and the "fiddling mindset," not static AI credentials✅ Why boards must stop treating cybersecurity as prevention and start rewarding rapid detection and response✅ The pre-compute vs. post-compute distinction for AI agent safety that most executives are missing entirely✅ When autonomous cyber defense will actually be viable (hint: think pilotless planes and robotic surgeons)⏱️ TIMESTAMPS0:00 AI has made "death by 1,000 cuts" attacks scalable0:39 Why the AI security lifecycle matters now2:27 Military history lessons for cyber defense strategy5:00 Federated learning: sharing threat intelligence without exposing data6:48 How incident response must evolve for AI-speed attacks8:05 The human-in-the-loop dilemma: defenders vs. attackers11:37 Distraction attacks: coordinated multi-target campaigns15:37 Autonomous agents as a new attack surface19:44 Hackers weaponizing AI hallucinations against developers22:23 Development velocity as the real "swarm" capability24:20 Perverse incentives: why stopping an attack still counts as failure27:09 Your personal attack surface grew from 3 devices to 5031:22 Protecting AI tool chains from becoming prime targets34:25 Hackathons as the future of cybersecurity hiring36:53 Patterns of life: instrumenting your enterprise for anomaly detection38:18 When will we trust AI defenders without human oversight?41:09 Pre-compute vs. post-compute: where AI agent safety rules must live46:45 AI trust, hallucinations, and prompt injection as information warfare51:42 Building security culture: leadership, not blame
Cyberwar shadows the US Israel attack on Iran. Hackers hijack Pakistani news broadcasts. President Trump orders all federal agencies to stop using AI technology from Anthropic. The Health Care Cybersecurity and Resiliency Act clears a hurdle. A new RAT streamlines double extortion attacks against Windows systems. CISA updates warnings on a zero-day targeting Ivanti Connect Secure devices. A North Korea-linked group targets air-gapped systems. Monday business breakdown. On our Afternoon Cyber Tea segment from Microsoft Security, host Ann Johnson speaks with Rob Suárez, Vice President and Chief Information Security Officer at CareFirst BlueCross BlueShield, about cybersecurity in healthcare. Tim Starks from CyberScoop has the latest goings on at CISA. Microsoft says the slop stops here. Remember to leave us a 5-star rating and review in your favorite podcast app. Miss an episode? Sign-up for our daily intelligence roundup, Daily Briefing, and you'll never miss a beat. And be sure to follow CyberWire Daily on LinkedIn. CyberWire Guest Today we are joined by Tim Starks from CyberScoop as he is discussing ongoing challenges at CISA. If you are interested in this topic, you can learn more here. Afternoon Cyber Tea On our Afternoon Cyber Tea segment from Microsoft Security, host Ann Johnson speaks with Rob Suárez, Vice President and Chief Information Security Officer at CareFirst BlueCross BlueShield, about cybersecurity in healthcare. You can hear the full conversation here, and catch new episodes of Afternoon Cyber Tea every other Tuesday on your favorite podcast app. Selected Reading US-Israel and Iran Trade Cyberattacks: Pro-West Hacks Cause Disruption as Tehran Retaliates (SecurityWeek) Western Cybersecurity Experts Brace for Iranian Reprisal (BankInfo Security) Pakistan's Top News Channels Hacked and Hijacked With Anti-Military Messages (Hackread) Anthropic confirms Claude is down in a worldwide outage (Bleeping Computer) Trump Orders Government to Stop Using Anthropic After Pentagon Standoff (New York Times) OpenAI Will Deploy AI in US Military Classified Networks (GovInfo Security) Senate Health Cyber Bill Clears Committee Hurdle (GovInfo Security) Double whammy: Steaelite RAT bundles data theft, ransomware (The Register) CISA warns that RESURGE malware can be dormant on Ivanti devices (Bleeping Computer) North Korean APT Targets Air-Gapped Systems in Recent Campaign (SecurityWeek) Astelia secures $35 million in combined seed and Series A funding. (N2K Pro Business Briefing) Microsoft gets tired of “Microslop,” bans the word on its Discord, then locks the server after backlash (Windows Latest) Share your feedback. What do you think about CyberWire Daily? Please take a few minutes to share your thoughts with us by completing our brief listener survey. Thank you for helping us continue to improve our show. Want to hear your company in the show? N2K CyberWire helps you reach the industry's most influential leaders and operators, while building visibility, authority, and connectivity across the cybersecurity community. Learn more at sponsor.thecyberwire.com. The CyberWire is a production of N2K Networks, your source for strategic workforce intelligence. © N2K Networks, Inc. Learn more about your ad choices. Visit megaphone.fm/adchoices
Corey told me about his AI cat reel problem. He found these AI-genearted cat videos hilarious. Who makes these? He kept sending them to his wife. Then he tried to stop watching and he couldn't. So I went down the rabbit hole of how social media algorithms actually work. It starts simple. Upvote, downvote, sort by time. But by 2017 Facebook has a metric that quietly reshapes what two billion people see. Then a leaked playbook lands, and a CEO takes the stand in Los Angeles. Today is an investigation into what happens when the algorithm knows you better than you know yourself. Episode Page Support The Show Subscribe To The Podcast Join The Newsletter